Thursday, October 31, 2019
Monotheist Religion Essay Example | Topics and Well Written Essays - 1500 words
Monotheist Religion - Essay Example There, the three monotheist religions concur, God made himself manifest, principally through Moses, the prophet. And they agree that God further revealed himself and his will in other documents: the New Testament and Christ, for Christianity, the Qur’an and Muhammad, for Islam, and the Oral Torah and its sages, for Judaism, respectively. The three monotheisms, further, confront one and the same problem, and the basic logic of monotheism dictates the range of solutions that each of the monotheisms addresses: the problem of God’s justice and mercy and how these are to be reconciled with the condition of the everyday world. A religion of numerous gods finds many solutions to one problem; a religion of only one God presents one to many. Life is seldom fair. Rules rarely work. To explain the reason why, polytheisms adduce multiple causes of chaos, a god per anomaly. Diverse gods do various things, so, it stands to reason, ordinarily outcomes conflict. Monotheism by nature ex plains many things in a single way. One God rules. Life is meant to be fair, and just rules are supposed to describe what is ordinary, all in the name of that one and only God. So in monotheism a simple logic governs to limit ways of making sense of things. But that logic contains its own dialectics. If one true God has done everything, then, since he is God all-powerful and omniscient, all things are credited to and blamed on him. In that case he can be either good or bad, just or unjust but not both. Within that framework, the three monotheisms pursue their distinctive expressions of the common faith in the one and only God, just and merciful, who created the world and made himself known through men of his choice and words of his own selection. (Paul Mojzes, Leonard Swidler, 2002) Judaism and Islam concur that culture and society cohere with religion, so there is no distinction between secularity and religiosity, state and church such as Christianity from Constantine's time forward contemplated. They in particular sustain comparison because they are sufficiently congruent in basic, indicative traits for the exercise to yield revealing contrast: alike, and then not alike, in that order. Both are religions of law, both monotheisms conceive of God in the same terms, both place heavy stress upon the formation of a society that conforms to God's will, expressed in verbal revelation having to do with social norms, and both set forth through jurisprudence an elaborate and articulated message. Different from all other religions Judaism, Christianity, and Islam share a common belief in one, unique God, creator of heaven and earth, whose self-manifestation is achieved through particular prophets, beginning with Moses, continuing, for Christianity and Islam, with Jesus, and ending, for Islam, with Muhammad. So far as Judaism is the religion of the written Torah, Christianity tells the story of Judaism within its own narrative, and Islam takes account of the stories of both Judaism and Christianity. For its part, Judaism in the confrontation with triumphant Christianity and Islam had to take account of the claim of the newcomers to worship the one and only God who made Himself known to holy Israel at Sinai. And Judaism did not classify the new monotheisms as idolatry, which category encompassed all other religions through all time. It follows that the three monotheisms accord recognition to one another, if not always unambiguously and if never enthusiastically. Not only so, bu t all three accord special status to the Hebrew scriptures of ancient Israel. All
Tuesday, October 29, 2019
SIX STEPS OF MARKETING RESEARCH Essay Example | Topics and Well Written Essays - 2000 words
SIX STEPS OF MARKETING RESEARCH - Essay Example Marketing research specifies the information required to address these issues, designs the methods for collecting information, manages and implements the data collection process, analyzes, and communicates the findings and their implications." (Introduction to Marketing Research) "Is collected for the first time. It is original and collected for a specific purpose, or to solve a specific problem. It is expensive, and time consuming, but is more focused than secondary research. There are many ways to conduct primary research. We consider some of them." (Introduction to Marketing Research) 2. Mystery Shopping: "Companies will set up mystery shopping campaigns on an organizations behalf. Often used in banking, retailing, travel, cafes and restaurants, and many other customers focused organizations, mystery shoppers will enter, posing as real customers. They collect data on customer service and the customer experience. Findings are reported back to the commissioning organization. There are many issues surrounding the ethics of such an approach to research." (Introduction to Marketing Research) Now what is means by 'Secondary Data Collection Procedure in Marketing Research According to a definition "is data which has been collected by individuals or agencies for purposes other than those of our particular research study. For example, if a government department has conducted a survey of, say, family food expenditures, then a food manufacturer might use this data in the organization's evaluations of the total potential market for a new product. Similarly, statistics prepared by a ministry on agricultural production will prove useful to a whole host of people and organizations, including those marketing agricultural supplies". (Secondary Source Information) However, in order to achieve this ob objective, there are certain ways as follows: 1. By applying the secondary data collection, sometimes it replaces primary sources, because the secondary data solves most of the problems facing. 2. A real secondary data is more simple and cheaper if compared with the primary data, while by applying the secondary gives more fruitful result than primary sources. 3. While adapting to collect information by applying secondary data, it consumes less time than adapting to primary source. 4. You can get more perfect and accurate information by adapting to secondary source, more than adapting
Sunday, October 27, 2019
Life Cycle Analysis To Assess District Energy
Life Cycle Analysis To Assess District Energy Introduction Life Cycle Analysis is the method used by individuals working in procurement to assess District Energy. This is done so as to understand the amount needed to create cooling on the site; though this analysis is carried out for the duration of 20 40 years and then it is equated with district cooling proposal. The concept of Life Costing is being widely used because of the productivity associated with it. Practically, mechanical / electrical equipment live short lives, but energy consumption, maintenance and renewal programmes are expenses. Both present and future costs are genuine, Example, in a rolling maintenance programme for major installations capital comes from the same fund. If these situations can be met then whole-life costing is vital. (Ferry 1964) Use of Whole life costing methods within the mechanical and electrical installations s most profitable since the amount of money spent on these is always growing. Variances between expenditure and running cost are constant in evaluation of energy-consuming systems. Drawbacks affecting calculations for whole-life costing is unaccountable in building fabric, because, Firstly, running costs of energy-consuming systems equate to considerable sum of the total whole-life costs. Secondly, restrictions on life span of mechanical / electrical installations and since they become obsolete quickly imply these installations should be considered for shorter periods as compared to building fabric. Thirdly, assumptions are held over short period time frames, any hypothesis on cost, interest rates and taxation are possibly more legitimate. (Ferry 1964) Fig 4.1 displays the proportional values of the various life cycle costs that a building owner would need to consider in order to produce cooling on site. (Damecour 2008) As can be seen in the above diagram, there are 3 clear parts to manufacture cooling on site; Natural gas or electricity, Operation and maintenance and Capital. Capital costs Capital for equipment is a fraction of the total installation cost. It is critical to consider this when deciding on what amount can be reduced by using district cooling system. For example in chiller plants, the chiller and cooling towers make up 25% of total cost. [See fig4.2] (Damecour 2008) Operation and maintenance: To operate chillers and cooling towers there is a need for well trained staff and budget for wear and tear of machines. Chillers need water and chemicals to work accurately. It is mandatory for the owner to insure all heavy machinery such as boilers, chillers and cooling towers. Besides, heavy machinery is sold with warranty contracts. Details of Case Study This case study evaluates the capital connected with a district cooling plant and Air cooled chiller package, but over a time frame of 30 years. The particulars of both are below. District Cooling Plant Employer: Emirates Central Cooling Systems Corporation (EMPOWER), Dubai Engineer for the Works: Ellerbe Becket Inc and Tebodin Middle East Ltd. Scope of work: The capacity of the job involved supply, installation, testing and commissioning of a central cooling plant. The plant will have a capacity of 56,000 tonnes of refrigeration. The specification of the building is 135 metres long x 40 metres wide and 37 metres high from basement floor level to the top of the parapet wall. Transgulf Electomechanical LLC, are the contractor on this project and will perform all functions relating to mechanical, electrical, process, civil and architectural components, including supply and installation of machinery. The capacity of work extends towards supply and installation of the instrumentation and controls in two phases for up to 40 ETSs (Energy transfer stations) located in developers buildings around DHCC area and wiring them back to the central plant. It includes engineering as required, procurement and provision of manpower, materials, equipment and two years defect liability period. Project Time Schedule: In March 2008, the first 18000 tons of refrigeration has been connected to the pipeline network. The balance load will happen during part II of the work. The details of the equipment installed are indicated in the Annexure 4.1. District cooling system model Firstly, chilled water is scattered between DCS and buildings through a three-level chilled water piping system, which comprises of production loop with constant speed pump. Each chiller has a dedicated production loop pump, and the two are controlled together. Secondly, distribution loop pumps defeat pressure loss, as acquired by chilled water flowing between DCS and the buildings. Distribution is hydraulically separated from production loop by existence of separate bypass pipes between the loops. All distribution loop pumps have changeable speed. Thirdly, secondary loop in each building includes a number of changeable speeds, with variable flow chilled pumps, for distributing chilled water through the airside apparatus in the building. Heat exchangers are built-in to segregate distribution loop of DCS from secondary loop in each building, which keeps system pressure in the distribution loop at a low. Lastly, there are total 4 zones T1, T2, T3 and T4 as indicated in the drawing (Fig 4.3) which shows the location of the ETS stations and the load detail. The load details of Phase I are in Annexure 4.2. Air Cooled Chiller Package Transgulf Electromechanical has provided information on air cooled chiller package for comparison. Employer : Dubai World Trade Centre Engineer : RMJM consultants. Capacity of chiller : 275 TR Type : Air cooled chiller Information on machinery, model number and power consumption are in annexure 4.3. Factors considered for costing 1. The real cooling capacity that a building needs is a much lower number than the chiller capacity. On the basis of the design cooling loads predicted for the twenty one buildings in four building zone the connected load is 18000 TR and the actual load is 15738 TR. Accordingly the district cooling plant is designed for 8 chillers working (8 x 2000 TR = 16000 TR) and 1 standby (2000 TR). The connected load (17796 TR) correlates to sum of fixed capacity of the chiller plants needed by each building if each had a plant, but 16000 TR relates to the cooling capacity required of a DCS to serve 21 ETS stations. Outcome of diversity in cooling load among buildings can be taken advantage of by using district cooling plant to serve groups of buildings. Air cooled chiller packages are in multiples of 275 TR (66 chiller packages) as total load of 18150 TR to be fixed in 21 buildings. 2. Study is based on NPV (present worth value) and EAC (equivalent annual cost); across initial and operating costs. Choice depends on which requires least LCC (life-cycle cost) and can execute the duty for its life span. (Al Daini et al 2002). Comparisons are made only between co-terminated proposals, to guarantee comparable results. Co-termination means, lives of systems involved end at the same time, which is not the case in this work. When alternatives have unequal lives, time span for analysis can be set by common multiples of system lives or a study period ending with disposal of all systems. Common-multiple method is used to accommodate NPV for unequal-life systems. Like in this case study, least common multiple is 30 years for the district cooling plant. This means the air cooled chilled package has a lifetime of 15 years; and would be substituted once during the analysis period. The total NPV for analysis is derived by adding the NPV of single entity considered, both future single payment (i.e. replacement cost) items and series of equal future payment (i.e. annual operating cost). The value of money is the job of available interest rates and inflation rate. In equivalent annual method, all costs incurred over time are changed to an equal yearly amount. The EAC comparison method is most fitting, especially for systems that comprise of many subsystems with unequal life spans. In this case, there is no need to assume the replacement of a system. 3. Owning Costs: Economic analysis demands derivation of first cost and operational costs for every projected selection. It is significant in correctly assessing to reach a final decision, for overall approach and system choices. Life cycle cost evaluation comprises of first costs, utility costs, maintenance costs, operational costs, utility escalation rates and owners cost of money. (Richards et al 2000). There are four rudiments to calculate annual owning costs: Initial cost, Analysis or study period, Cost of capital and other periodic costs like replacement, refurbishment or disposal fees. These combined with operating costs, equates to economic analysis. (ASHRAE 2003) Initial costs A fair ballpark of capital cost of parts has resulted from cost records of installations of similar le design or quotations from manufacturers and contractors or referring market available cost- estimations. Analysis period Time span during which an economic analysis is carried out affects the outcome. This is decided by clear objectives, like length of planned ownership or loan repayment period. As the length of time in analysis period grows, the net present value decreases. The time period is not affected by equipment depreciation or service life, though it may be valuable for the study. In this study a single design life of 15 years was used to show a midway point between small and medium capacity equipment range for air cooled chiller package. Smaller equipment has a life span of 10 to 15 years while medium size equipment has 15 to 20 years. (Archibald et al 2002) In district cooling plants, machinery is all large scale and has a life span of 30 to 40 years as declared by district solution providers (Tabreed 2007). Though, in this analysis 30 years is considered to minimize the intricacy and work. Interest or discount rate Borrowed capital has high interest rates, albeit this rate is not apt enough to use in the study. Discount rate instead is used to give the actual value of money. This rate is affected by individual investment and profit, while interest rates are fixed. (ASHRAE 2003) Most establishments use WACC to calculate costs of capital as organizations can produce capital through debt or equity. Although return required for equity and debt is varied, debt holders have high risk as they access the organizations profits. Hence cost of the capital is calculated by taking a weighted average of both, and the weightings are introduced by level of debt and equity in the companys asset base, or the companys gearing. (EMA 2002) This estimation is from the hypothesis of cost of capital as 10% (as per break up in Annexure 4.4) to DCS by private sector. Operating costs Operating costs comprises of; cost of electricity, wages of employees, supplies, water, materials, chemicals and annual frequent costs associated with functioning of the system. For the vapor compression system, operating costs are subject to electricity needed to work the compressor. Extra electricity is needed to work the condenser water pump and cooling tower fans. This has been regarded in the calculation. DEWA tariff has also been considered. Wages are as per current UAE market rate. Maintenance Costs Maintenance cost is equal to final cost estimated for air-conditioning systems. Most frequently used maintenance towards building HVAC services are run-to-failure (unsuitable for the hospital), preventive, and predictive maintenance. Run to failure, capital is not spent until the machinery gives way. Preventive maintenance is planned by run time or calendar. Predictive maintenance is done by supervising machinery and using condition and performance indices to increase repair intervals. HVACR maintenance and utility costs form a high percentage of operating cost, hence it is critical to reduce cost on maintenance by managing the process well. Maintenance cost is hard to measure as it is liable on many variables like local labor rates, experience, age of the system, length of time of operation, etc. Although a fair prediction is derived from quotations for repairs and Annual maintenance contracts. Sensitivity analysis Most whole-life cost calculation includes a lot of suppositions and it is not probable to get the effect of change in these practically. One method of testing results attained from whole life cost calculation is to repeat the calculations in a methodical way, changing the value of a single variable (i.e. assumption) each time, and then one can see how sensitive results are to changes in the variable under consideration. Results if seen on a graph can show when; example, one component becomes more attractive than another. (Ferry 1964) Consequently, sensitivity analysis was done to learn the effect of change in DEWA tariff rate on life costs by keeping all parameters same and results are reflected in Figure I and Figure IV. Also the same was done by changing hours of operation; results are seen in Figure III and Figure VI. Explanatory notes to the costing Capital costs Air cooled chiller package 275 TR chiller package is used for contrast study as data of cost and power usage are accessible for a recent project completed in 2007 (Dubai World trade centre) Design fees are taken @ 4 % as per market trend in contracting business in Dubai. Total load requirement as per ETS integrator data is 18,000 TR which needs 66 number of 275 TR air cooled chiller packages. Hence cost as per 66 chiller packages was noted. District cooling plant The capital cost figures shown are for a recently executed project (Phase I completed in March 2008) at Dubai Health care city. Architect/Consultant fees are taken @ 8% as per market trend in contracting business in Dubai. Plant is constructed for 56,000 TR capacity. Civil cost should be allocated to 56,000 TR . Though this difference was not made in capital cost. Chiller cost is 18,000 TR (2000 TR x 9nos) in line with phase I ETS load. Land cost is taken from Dubai rent prices in 2006 in the Dubai Health care city. (UAE property trends 2006) Economic calculation requires consideration towards the space for the cooling machine which will be vacated for other purposes since the consumer is connected to the DC network (Soderman 2007). Although this was not considered in the calculation. Operating costs District cooling plant Power consumption for the plant is from SCADA reports as per annexure 4.5. The power consumption charges are assumed at 20 fils/kwh as per DEWA tariff rates from May2008. Sensitivity analysis by changing the rate to 33 fils/kwh is also done to learn the influence of revised rates from DEWA since June2008. Dubai health care city has residential, hospital buildings and office buildings and so has different running hours. Running hours are assumed as 4800 hrs per year (16 hours /day x 300 days working) and all calculations are based on 4800 hrs of operation. Results for operating at 3200 hrs and 6000 hrs are evaluated. Water costs are assumed as 4 fils/gallon as per DEWA tariff and run hours are 4800 hrs as per above. Air cooled package Power consumption is assumed as 20 fils/kwh as per DEWA tariff rate from May 2008. Since the start of slab tariff, consumption charges for each chiller package will be 20 fils/kwh as total consumption would not exceed the slab. Water and chemical requirements are not applicable for air cooled chiller package, since cooling tower is removed and chilled water system being a closed system the makeup water requirements are irrelevant to consider in costing. Life cycle costs are from budget costing figures formulated from basic equipment sizes, not detailed design solutions. This is supposed to be precise for comparison. 4.5 Inferences from cost comparison Figure I Figure IV District cooling plant has huge initial capital cost, though in the long term it is more advantageous. According to present worth method, district cooling is advantageous from 13th year when present worth becomes lower than air cooled chiller package, which is even before replacement of the chiller package. As operating and maintenance costs are sizably less with the same tariff for electricity as per before May 2008. Since the start of slab tariff rates for electricity from May 2008, air cooled chiller package NPV is lower than district cooling. As increase in operating costs of district cooling because of higher tariff (33 fils/kwh) when compared to air-cooled chiller package (20 fils/kwh) neutralises the advantage of less power consumption per unit of cooling produced by district cooling as compared to air cooled chiller package. Thus the massive disparity in capital costs of district cooling makes it not worth. Figure II In district cooling, capital cost is 56% while operation and maintenance is 44% of the cost. Compared to air cooled chiller package, initial capital investment is 30% while operation and maintenance is 70%. Hence throughout a life cycle of 30 years, OM costs for air cooled chiller package are much higher than the benefit of low capital investment. With equivalent annual cost method, district cooling plant is beneficial when weighed against air-cooled chiller package. Figure III and Figure VI 1. Operating hours of a cooling plant differ widely with use, example the chiller plant in typically HVAC equipment in commercial buildings run for a portion of 2,500 to 3,500 hours that the building is occupied. But in the industrial sector, commercial cooling systems are expanded to comprise of process cooling and function on two shifts or around the clock. Here it is possible to note that the plant runs for 8,000 hours per year. (Archibald et al 2002) Cost differentiation shows as operating hours lessen, differences in present worth between the DCP and ACC reduces. As hours of operation lessen, OM costs lessen and DCP loses the advantage to ACC. Although with more operating hours DCP becomes much more attractive than ACC. 2. As per the present worth method, DCP becomes productive from 15th year, the present worth becomes less than ACC because of substituting of the chiller package with 3600 hours of operation, in the 13th year with 4800 hours of operation and in 9th year of operation with 6000 hours of operation. Here it is visible how costs; except initial capital costs; can influence decisions. Figure V Comparison of DCP and ACC considering inflation is shown. Rates supposed for inflation the difference in costs of ACC and DCP over 30 years increases as compared to the cost comparison without inflation. District cooling system considerations and benefits. High cooling load demand and density are predominant reasons to select District Cooling. It is most commonly seen in universities, government facilities and hospitals, or in office and industrial complexes and high- rise urban districts. A high load density means a less extensive distribution system, which is very expensive. Shorter runs also minimize thermal and pressure losses and maintenance costs. A desirable companion to high load density is a favorable load factor. Means that the aggregate load over time tends to approach the peak block load condition. This analysis considers both factors, thus making DCP a better option. Infrastructure Requirements District Cooling Scheme needs a central plant and a central pipeline network to function. Consideration of these site necessities for district cooling facilities in planning and programming process for Strategic New Development areas in the beginning stage is priority to hold the master plans and certain easy execution of District Cooling Scheme. (Parsons 2003) Due to fast paced construction process any changes to the master plans and infrastructure corridors, can severely impact the completion of the district cooling project. Traffic Impact Review Since some of the pipelines laying works need to be on busy roads it is important to have an extensive Traffic Impact Assessment. For Dubai health care city careful notification was provided to the stakeholders to guarantee no inconvenience was caused due to pipeline installation. Under Ground Congestion These are higher than anticipated costs since there may be unexpected costs relating to congestion in underground services. These need to be overcome primarily in the planning process. (IDEA 2007) Chilled Water Temperature Differential Low chilled water temperature differential (ΆT) is a major district cooling weakness. Poor ΆT performance at cooling coils means lost cooling capacity, wasted energy, extra cost and added complexity for a thermal utility, its chilled water customers, or both. Health care city district cooling plant has power consumption of 1.12 kw/tr which is more than the desired consumption of less than 1 kw/tr due to low chilled water temperature difference. This increases operating costs. To encourage customers to invest in technology to improve ΆT performance in their buildings, an increasing number of utilities have established chilled water rates that vary inversely with ΆT . Figure 4.4 is an example of rates charged to customers from one prominent university in the United States. As can be seen, the lower the ΆT, the greater the rate. Conversely, customers that minimize their flow rate per ton cooling are rewarded. (Moe 2005) Risks and Uncertainties Faced By District Cooling Customers There is no bargaining power with the District Cooling Services Provider once a building is connected to District Cooling Scheme and Uncertainties over future tariffs. Risks and Uncertainties Faced By District Cooling Investors Demand is unpredictable, Uncertainty in dealing with building owners on District Cooling Supply Agreement (negotiations can be time consuming), Unpredictability relating to land costs for District Cooling plant room and distribution pipelines and High initial capital investments with long payback periods. (Parsons 2003) Strategic Environmental Assessment Noise The central chiller plant and pumps of the district cooling scheme are housed in underground plant rooms, this reduces the noise. As buildings connecting to District Cooling Scheme do not need to have their own chiller plant, the district cooling user building will have no noise. Appropriate techniques can be implemented to reduce the noise during construction stage of district cooling scheme. (Parsons 2003) Air Quality District cooling reduces electricity energy thus minimising carbon dioxide emission and will help improve air quality. Based on the case study for 4800 hours of operation the energy saving by using district cooling would be (1.91 -1.12)kw/ton x 4800 hrs x 18000 tons i.e. 68,256,000 KWh , which is equivalent to 104,772,960 lbs of CO2 (Electricity carbon emission factor 1.535 lbs CO2/KWh).(EPA 2006) Benefits of district cooling for project owners: A highly efficient solution: Given that this region has extreme heat, air conditioning can account for as much as 70% of the energy consumption in a typical building. Moving this load from individual houses to a central plant, the housing electric load is reduced considerably and along with it the number of electric substations and length and sizes of electric cables. District cooling requires far less electric power than multiple plant rooms or ducted splits. Also the plant room can house the electric substation, enormously reducing the electric works. Significant capital and O M cost reduction: Removing in-building or on-premise chiller plants by using district cooling schemes; means that availability of free land for other use. Also project owners do not need to buy more land to operate and maintain complex central air conditioning plants. They also need not have to replace expensive equipment. The industry has a two part tariff structure which is complex to understand. It is based on an Annual Capacity or Connection Charge for every ton committed to a property and also a Consumption Charge for the energy used measured through an energy meter installed for every end user. Palm district cooling has developed a new form of tariff structure that maintains the consumption charge but replaces the annual capacity charge or connection charge with a One Time Service Connection Charge (AED/sq ft) of the property. (Prashant 2007) Benefits of this tariff structure: Developer need not pay advance cost for DC, Developer does not need to pay for any air-conditioning chiller units during construction stage. The tenant or property owner contributes to the cost of the DC system at the time of purchasing his property [as he would do with conventional AC equipment]. When district cooling is an option, the building owner can invest capital towards amenities for tenants. Reduced project complexity means faster project completion: Dedicated experienced professionals take over the complex task of providing the cooling needs of the project, simplifying and expediting the project development cycle and expediting move-in dates and income generation Improved ROI numbers: Reduced initial up-front capital outlays for developers, faster move-in dates, reduced OM costs and the elimination of costs related to technical staff all translate into less financial risk for project owners, with improved return on investment and better project economies overall for developers and owners. No idle expensive capacity: District Cooling Solutions allow project owners to buy the capacity they need when they need it. Improved reliability and ease of operation: Economies of scale allow for sophisticated redundant systems resulting in superior 100% up-time performance and ease of operation for project owners. Units used are high-tech and industrial which dramatically decreases the failure frequency compared to commercial equipment. District cooling reliability is in excess of 99.94%. (Source: IDEA). (Papadopoulos et al 2006) The central chiller plant concept, almost by definition, is more flexible and more reliable and possesses a greater degree of redundancy than the concept involving individual cooling packages. Greater flexibility in design: Architects have more creative leeway due to the elimination of heavy machinery. Ecologically friendly: It provides for a noise free, clean environment for the tenants. The absence of tall towers allows for a clean environment.
Friday, October 25, 2019
Comparing the Assimilation into American Culture of the Irish and the Native American :: Compare Contrast Sociological Boundaries
Comparing the Assimilation into American Culture of the Irish and the Native American Many people would agree that the Irish have been successful in assimilating into American culture and the Native American has been unsuccessful. There have been many boundaries that both groups have encountered but they are more of a hardship for the Native American. These include Racial and Cultural boundaries, Personal boundaries, Sociological boundaries, Political and Economic boundaries, and Geographical boundaries. Â Â Â Â Â Racial and Cultural boundaries are probably the hardest obstacle that Native Americans have encountered. These are the physical differences. The Irish are a group of people that speak English. Since English is the national language of the United States and most people in America speak English, this was an obstacle that the Irish did not have to overcome. The Native Americans, however, did not speak English, so before they could function as a full member of society and get a good job they first had to learn how to speak English. The Irish are also for the most part a Catholic group. The Native Americans were not, this was another hardship for them. Most of the Irish customs were similar to those already being practiced in the United States. Native Americans had customs that were very different. Â Â Â Â Â Another boundary that was harder for the Native Americans than the Irish was personal boundaries. Native Americans had less education then the Irish did, they also did not know English and that was another hardship they faced. Both Native Americans and the Irish started out working in blue collar jobs, but the Irish eventually made there way out and into the white collar world. Native Americans still hold blue collar jobs. Â Â Â Â Â Sociological boundaries were another set of boundaries that both groups had to face. There were not many Native Americans left due to wars between individual tribes, the trail of tears and other similar walks to reservations, and to disease. So there were not many Native Americans left to assimilate into American culture. Comparing the Assimilation into American Culture of the Irish and the Native American :: Compare Contrast Sociological Boundaries Comparing the Assimilation into American Culture of the Irish and the Native American Many people would agree that the Irish have been successful in assimilating into American culture and the Native American has been unsuccessful. There have been many boundaries that both groups have encountered but they are more of a hardship for the Native American. These include Racial and Cultural boundaries, Personal boundaries, Sociological boundaries, Political and Economic boundaries, and Geographical boundaries. Â Â Â Â Â Racial and Cultural boundaries are probably the hardest obstacle that Native Americans have encountered. These are the physical differences. The Irish are a group of people that speak English. Since English is the national language of the United States and most people in America speak English, this was an obstacle that the Irish did not have to overcome. The Native Americans, however, did not speak English, so before they could function as a full member of society and get a good job they first had to learn how to speak English. The Irish are also for the most part a Catholic group. The Native Americans were not, this was another hardship for them. Most of the Irish customs were similar to those already being practiced in the United States. Native Americans had customs that were very different. Â Â Â Â Â Another boundary that was harder for the Native Americans than the Irish was personal boundaries. Native Americans had less education then the Irish did, they also did not know English and that was another hardship they faced. Both Native Americans and the Irish started out working in blue collar jobs, but the Irish eventually made there way out and into the white collar world. Native Americans still hold blue collar jobs. Â Â Â Â Â Sociological boundaries were another set of boundaries that both groups had to face. There were not many Native Americans left due to wars between individual tribes, the trail of tears and other similar walks to reservations, and to disease. So there were not many Native Americans left to assimilate into American culture.
Thursday, October 24, 2019
Cyber Crime
Crime is on the rise just about everywhere these days, but nowhere has this up rise in crime become more apparent than in cyber space. Like so many other aspects of our lives, major fraud has gone high tech.The  FBI estimates that businesses alone lose an upwards of $1.5 trillion annually as a direct result of cyber crimes. The number of these crimes has tripled in the past two years and the numbers continue to climb. (O’Leary & O’Leary)  p. 287Through the duration of this essay we will be embarking on a journey into the dark and seedy world of cyber crime. Within this text you will find, the definition of cyber crime, the most  typical types of cyber criminals, as well as the most common forms of cyber crime.The exact definition of cyber crime is still evolving. ( www.davislogic.com/cybercrime.htm ). Cyber crime, or computer crime,  is an extremely broad term. This term is most commonly used to describe criminal activity committed where a computer or network is the source, tool, or target of a crime. Like traditional crime, cyber crime can take many shapes and occur at any time or any place.When  an  individual  is  the  main  target  of  cyber crime,  the  computer à ‚ can  be  considered  a  tool  rather  than  the  target.  These  crimes  generally  involve  less  technical  expertise  as  the  damage  done  manifests  itself  in  the  real  world. In these types of cases the damage dealt is primarily psychological.By now many of us  are all too familiar with spam. Spam or spamming refers to the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term can also  be applied to similar abuses in other media.Some of these abuses include; instant messaging spam, web search engine spam, s pam in blogs, wiki spam, mobile phone messaging spam, social networking spam, as well as internet forum spam. As applied to email, specific anti-spam laws are relatively new, however limits on unsolicited  electronic communications have existed in some forms for some time.Another common crime plauging cyber space is identity theft.  Internet identity theft is different from common identity theft in a few different ways. Common identity theft is different from common identity theft takes place after something is physically stolen from you like a wallet containing credit cards and a driver’s license or an un-shredded credit card statement from your garbage bin.The thief would take these stolen articles and use them to make a fraudulent purchase or something of that  nature. Internet identity theft can be much more devastating than conventional identity theft at times due to the fact that most victims of internet identity theft are completely unaware that anything has been stolen from them until it is far too late.                                                                                                                        Gone are the days when we had to step outside to purchase our groceries, book flights, and vacations, or simply transfer money between bank accounts.Today, we can simply grab our checkbooks, debit cards or credit cards, sit down at a computer in the comfort and safety of our home, and complete these transactions with passwords and PIN numbers.Thanks to advances in technology, the types of transactions we can now complete online are virtually endless. Unfortunately, the increase in online transactions has been accompanied byà ‚ an increase in online identity theft. Fraudulent access to personal information over the internet is increasingly prevalent and sophisticated.Two  forms of  identity  theft  are  at  the  forefront  of  this  internet  piracy are phishing and pharming.  Both pharming and phishing are methods used to steal personal information from unsuspecting people over the internet. Phishing typically involves fraudulent bulk email messages that  guide recipients to (legitimate looking) fake web sites and try to get them to supply personal information like account passwords. Pharming is in many ways similar to phishing.Pharmers  also  send  emails.  The  consumer,  however,  can  be  duped  by  the  pharmer  without  even opening  an  email  attachment.  The  consumer  compromises  his  personal  financial  information  simply  by opening  the  email  message.The  pharming  email  message  contains  a  virus that  installs  a  small  software  program  on  the  end user’s  computer.  Subsequently,  when  the  consumer  tries  to visit  an  official  web  site,  the  pharmer’s  software  program  redirects  the  browser  to  the  pharmer’s  fake  version  of the  web  site.  This allows the  pharmer  to  capture  the  personal  financial  information that  the  consumer  enters  into  the  counterfeit  web  site,  and  the  consumer’s  a ccount  is  again  compromised.The  latest  form  of  pharming  does  not  require  email  at  all.  Password stealing  Trojan  horses  can  attack  through  Microsoft  Messenger  where  key loggers  are  run.  Key loggers  are  viruses  that  track  a  user’s  keystrokes  on  legitimate  sites  and  steal  passwords,  allowing  a  thief  to  have  access  to  a  consumer’s  password  for  future  fraudulent  transactions.The  most  common  blunder  people  make  when  the  topic  of  a  computer  virus  arises  is  to  refer  to  a worm or Trojan horse as a virus. While  the  words  Trojan,  worm  and  virus  are  often  used  interchangeably,  they  are  not  exactly  the  same.à ‚ Viruses,  worms  and  Trojan  horses  are  all  malicious programs that  can  cause  damage  to  your  computer, but  there  are  differences  among  the  three,  and  knowing  those  differences  can  help  you  to  better  protect  your  computer  from  their  often  damaging  effects.A  computer virus attaches  itself  to  a program  or  file enabling  it  to  spread  from  one  computer  to another,  leaving  infections  as  it  travels.  Like  a  human  virus,  a  computer  virus  can  range  in  severity. Some  viruses may  cause  only  mildly  annoying  effects  while  others  can  damage  your hardware, software or files.Almost  all  viruses  are  attached  to  an  executable file , which means  the  virus  may  exist  on  your computer, however, it may not actually  infect  your  computer  unless  you  run  or  open  the  malicious  program. It  is  important  to  note  that  a  virus  cannot  be  spread  without  human  action,  such  as  running an  infected  program in order to  keep  it  going. People  continue  the  spread  of  a  computer  virus,  mostly unknowingly, by sharing infecting files or sending emails viruses as attachments in the email.In  summary, the  same  types  of  fraud  schemes  that  have  victimized  consumers  and  investors  for  many years  before  the  creation  of  the  internet  are  now  appearing  online. In  the  process,  they  not  only  cause  harm  to  consumers  and  investors,  but  also  undermine  consumer  confidence  in  legitimate  e-commerce  and  the  internet.People who commit cyber crime are cyber criminals. Like cyber crime, cyber criminals can take many forms. These criminals are typically terrorists, child predators, members of organized crime, employees, outside users, hackers and crackers. It is important to point out the difference between hackers and crackers. Hackers are individuals who gain unauthorized access to a computer system simply for the thrill of it. Crackers do the same thing, but for malicious purposes.Computer  hackin g  is  most  common  among  teenagers  and  young  adults,  although  there  are  many older  hackers  as  well.  Many  hackers  are  true  technology  buffs  who  enjoy  learning  more  about  how computers  work  and  consider  computer  hacking  an  art  form.  They  often  enjoy  programming  and  have expert level  skills  in  one  particular  program.For  these  individuals,  computer  hacking  is  a  real  life  application  of  their  problem solving  skills.  It is perceived as a  chance  to  demonstrate, or showcase their abilities, and talents, and not  an  opportunity  to  harm  others.Cracking is the act of breaking into a computer system, often on a  network. Cont rary to popular belief, crackers are hardly mediocre hackers.  Computer hackers were early pioneers of computing. These early pioneers were frantically dedicated to inventing and exploring how things worked. As a part of the sixties generation, these hackers were also prone toward being anti-establishment and somewhat disrespectful towards property rights.Eventually a pair of these hackers, Steve Wozniak and Steven Jobs, hacked together the first commercially successful personal computer, the Apple. The sixties generation hackers flooded this new industry and many quickly attained positions of wealth and authority creating the inf ormation communications ecology that dominates Western life. Meanwhile, two things happened.1.      A new generation of hackers emerged.2.     The world economic and social order went completely digital, and so crime as we know it went digital as well.It  is  somewhere  at  the  interstices  of  the  new  generation  of  alienated  young  hackers  ( they  sometimes  refer  to  themselves  as  â€Å"cyberpunks†)  and  the  world  of  sometimes organized  crime  that  we  locate the  concept  of  the  cracker.  The  term  is,  to  some  degree,  an  attempt  by  the now established  older-generation  hackers  to  separate  themselves  from  computer  crime.The  debate  still  rages  as  to  what  constitutes  the  difference  between  hacking  and  cracking.  Some  say  that  cracking  represents  any  and  all forms  of  rule breaking  and  illegal  activity  using  a  computer.  Others  would  define  cracking  only  as  particularly  destructive criminal  acts. Others would  claim  that  the  early  hackers  were  explicitly anarchistic  and  that  acts  of  willful  destruction  against  â€Å"the  system† have  a  place  in  the  hacker  ethos,  and  that  therefore  the  term  cracker  is  unnecessary  and  insulting.This concludes our journey into the world of cyber crime. Through the course of our journey we have successfully defined cyber crime, identified typical cyber criminals, and discussed some of  the most common forms of cyber crime.The  effects  of  cyber crime  are  far  reaching.  It  would  be  a  difficult  task  to  find  someone  who  has  never  been  affected  by  malicious  internet  activity,  or  who  does  not at  the  very  least  know  someone  who  has  been  negatively  impacted  by  cyber criminals. Advances  in internet  technology  and  services  continue  to  open  up  innumerable  opportunities  for  learning,  networking and  increasing  productivity.  However,  malware  authors,  spammers  and  phishers  are  also  rapidly  adopting  new  and  varied  attack  vectors .If  the internet  is  to  become  a  safer  place,  it  is  imperative  to  understand  the  trends  and  developments  taking  place  in  the  internet  threat  landscape  and  maintain  online security  practices. Internet  threats  continue  to  increase  in  volume  and  severity.It  is  important  that  computer  users  are  on  guard  in  order  to  make  themselves  less  vulnerable  to  risks  and  threats.  Staying on top of  the  trends  and  developments  taking  place  in  online  security  is  critical  for  both  industry  researchers  and  all  computer  users  alike. References    O’Leary, T. J. , & O’Leary L. I. ( 2008 ) . Computing essentials introductory  2008.                 New York: The McGraw-Hill Companies.    Cyber Crime. ( 2008 ) . Types of cyber crime. Retrieved September 27th , 2008 ,                 From http://www.davislogic.com/cybercrime.htm
Wednesday, October 23, 2019
Cause and Effect: Unprotected sex Essay
In today’s society, many young teens have begun to experience unprotected sex. Having unprotected sex may result in sexually transmitted diseases (also known as STD) and/or pregnancy. Although some STD’s are curable, they would have to be cured immediately. As for the main focus, teenage pregnancy, many teenagers do not realize the responsibility, commitment, and hard work they have to put into raising a child. It is not only being there for them, but also having both parents being financially stabled. Teenagers must protect themselves properly in order to avoid these incidents at an early stage in life because they, themselves, have not yet fully developed. In my opinion, the three main causes that lead to teen pregnancy are unprotected sex, lack of sex education, and sexual crimes. Unprotected sex is probably the most well-known factor leading to teen pregnancy. The cause of this can be from highly aroused young kids who don’t want to stop having sex because th ey have to get a condom. A condom is the best teen pregnancy prevention item sold in the United States. A lot of other young adults think that they don’t need a condom so they move onto the â€Å"pulling out method†so that they don’t ejaculate into the female’s reproductive system that can soon lead to pregnancy. What most young adults don’t know is that this method isn’t always safe. It’s way better to just be prepared and be safe with a condom in hand. Unprotected sex is the main cause to pregnancy at a young age. In my opinion, and I’m sure a lot of other individuals will agree with me on this one, but it is way better to spend three dollars on a small pack of condoms than a lifetime expense on a baby because you didn’t â€Å"Wrap it Up†. Carelessness is a reason to unprotected sex leading to teen pregnancy. Sexual education is needed in the classrooms of young adults today. It teaches them how to be safe, and how to still have sex but prevent pregnancy. Lack of sexual education can lead to pregnancy and other things like sexual transmitted diseases. With more information about sex taught to these teenagers, the pregnancy rate in young adults will drop. Take Tony from â€Å"The Other Wes Moore†for example. He didn’t have the knowledge needed to prevent him from getting his girlfriend pregnant at such a young age. The cause of lacking education in sex leads to these young kids getting themselves into situations they shouldn’t be getting into. They need to be taught better to prevent this from happening. The crime rate in America constantly goes up and goes down depending on where you are located. Rape is another cause for the young pregnancy that is happening. Police need to do a way better job at locating these rapists to protect these young female teenagers from getting harmed. Rape is when someone forcibly takes an individual and obligates them into having sex, most of the time this is unprotected sex. These crimes usually take place in the cities. Because of rape, not only do these young females get pregnant but sometimes they either won’t know who raped them or they would have to raise a baby on their own.
Tuesday, October 22, 2019
the kingfish essays
the kingfish essays Huey. P. Long was a man to be reckoned with. Regardless of the attitude one takes toward his radical populist politics, it is indisputable that the Kingfish was Louisiana politics from the late 1920s until his assassination in 1935. He remains one of the great political paradoxes of the 20th century, a man who openly believed in using the machinery of state for economic intervention in pursuit of social and political ends...and yet has been hailed as a champion of the little man, enfranchiser of the poor and the disadvantaged (Wall). Contradictory though he was, with the natural gift of cleverness, his proverbial razor-sharp wit, and claimed affinity with the common man, he learned to use and abuse those time-honored methods for ensuring the absolute supremacy of a political machine (Wall). Long managed to secure his position as the virtual dictator of Louisiana through his strong-arm tactics and by using the old southern politics of personality to publicize his war against the established economic hierarchy. Where he diverts from old southern politics is in his focus on issues and his drive to put his policies into practice. At the time of Longs career, Louisiana politics was still very much the politics of poverty and ruralism. Long fed off this condition and delivered his famous Every man a King on February 23, 1934. The speech was the manifesto of the Share Our Wealth Program and represented possibly the most aggressive plan of governmental economic intervention in the history of the United States. The Kingfish wanted the government to confiscate the wealth of the nation's rich and privileged. He called his program Share Our Wealth. It called upon the federal government to guarantee every family in the nation an annual income of $5,000...He also proposed limiting private fortunes to $50 million, legacies to $5 million, and annual incomes t ...
Monday, October 21, 2019
The Layers of Earths Atmosphere
The Layers of Earths Atmosphere The envelope of gas surrounding our planet Earth, known as the atmosphere, is organized into five distinct layers. These layers start at ground level, measured at sea level, and rise into what we call outer space. From the ground up they are: the troposphere,the stratosphere,the mesosphere,the thermosphere, andthe exosphere. In-between each of these major five layers are transition zones called pauses where temperature changes, air composition, and air density occur. Pauses included, the atmosphere is a total of 9 layers thick! The Troposphere: Where Weather Happens Of all the atmospheres layers, the troposphere is the one were most familiar with (whether you realize it or not) since we live at its bottom the Earths surface. It hugs the Earths surface and extends upward to about high. Troposphere means, ‘where the air turns over’. A very appropriate name, since it is the layer where our day-to-day weather takes place. Starting at sea level, the troposphere goes up 4 to 12 miles (6 to 20 km) high. The bottom one third, that which is closest to us, contains 50% of all atmospheric gasses. This is the only part of the whole makeup of the atmosphere that is breathable. Thanks to its air being heated from below by the earths surface which absorbs the suns heat energy, tropospheric temperatures decrease as you travel up into the layer. At its top is a thin layer called the tropopause, which is just a buffer between the troposphere and the stratosphere. The Stratosphere: Ozones Home The stratosphere is the next layer of the atmosphere. It extends anywhere from 4 to 12 miles (6 to 20 km) above Earths surface up to 31 miles (50 km). This is the layer where most commercial airliners fly and weather balloons travel to. Here the air doesn’t flow up and down but flows parallel to the earth in very fast moving air streams. Its temperature also increases as you go up, thanks to the abundance of natural ozone (O3) the byproduct of solar radiation and oxygen which has a knack for absorbing the suns harmful UV rays. (Anytime temperatures increase with elevation in meteorology, its known as an inversion.) Since the stratosphere has warmer temperatures at its bottom and cooler air at its top, convection (thunderstorms) is rare in this part of the atmosphere. In fact, you can visibly spot its bottom layer in stormy weather by where the anvil-shaped tops of cumulonimbus clouds are. How so? Since the layer acts as a cap to convection, the tops of storm clouds have nowhere to go but spread outward. After the stratosphere, there is again a buffer layer, this time called the stratopause. The Mesosphere: The Middle Atmosphere Starting roughly 31 miles (50 km) above Earths surface and extending up to 53 miles (85 km) is the mesosphere. The mesospheres top region is the coldest naturally occurring place on Earth. Its temperatures can dip below -220 Â °F (-143 Â °C, -130 K)! The Thermosphere: The Upper Atmosphere After the mesosphere and mesopause come the thermosphere. Measured between 53 miles (85 km) and 375 miles (600 km) above the earth, it contains less than 0.01% of all air within the atmospheric envelope. Temperatures here reach upward to 3,600Â Â °F (2,000 Â °C), but because the air is so thin and there are so few gas molecules to transfer the heat, these high temperatures would amazingly feel very cold to our skin. The Exosphere: Where Atmosphere and Outer Space Meet Some 6,200 miles (10,000 km) above the earth is the exosphere the atmospheres outer edge. It is where weather satellites orbit the earth. What About the Ionosphere? The ionosphere isnt its own separate layer but is actually the name given to the atmosphere from about 37 miles (60 km) to 620 miles (1,000 km) high. (It includes the top-most parts of the mesosphere and all of the thermosphere and exosphere.) Gas atoms drift into space from here. It is called ionosphere because in this part of the atmosphere the sun’s radiation is ionized, or pulled apart as it travels earth’s magnetic fields to the north and south poles. This pulling apart is seen from earth as auroras. Edited by Tiffany Means
Sunday, October 20, 2019
Aboriginal or Torres Strait Islander Australians
The purpose of this report is to evaluate the accessibility, acceptability and availability of public health care services among Aboriginal or Torres Strait Islander of Australia. Despite improvements in health technology and the high quality of health services in Australia, this group continues to suffer health inequities. This is evident from high rate of chronic disease among Indigenous Australians. The disparities in health among non-indigenous and indigenous Australians arise from many factors including the difference in socioeconomic status, cultural beliefs, and geographical locations. This is evident from high rate of chronic disease among indigenous Australians. This report explores the barrier to the accessibility of adequate health care services and recommends solutions to improve acceptability of public health care services. Aboriginal and Torres Strait Islander people were the first inhabitants of Australia. They have distinct culture and social tradition separate from general population of Australia. The estimated population of Aboriginal and Torres Strait Islander people was 669,900 or 3% of the total population, the majority of whom resided in New South Wales and Queensland (Australian Bureau of Statistics, 2011). They experience health inequity and poor health outcome due to their low socioeconomic status, psychosocial risk factors, poor standard of living and poor geographical location (Markwick, et al., 2014). Structural determinants of health relate to geographical accessibility, income status and affordability and acceptability factors that act as major barriers in access to health services for indigenous people (Germov, 2014, p. 76). Availability of health service means presence of appropriate health care resource relevant to the needs of the population. Equity of access is dependent on income and cultural setting of diverse population groups (Gulliford et al., 2016). Although the standard of health services in Australia is excellent, however the distribution of service is not uniform throughout Australia. As indigenous Australians resides in remote locations, the number of specialist physician decreases due to remoteness (Larkins et al., 2015). In urban areas too, the public health service are concentrated in those areas where people of high socio-economic status resides (Violà ¡n et al., 2014). Economic disadvantage among Aboriginal and Torres Strait Islander people is another cause of inaccessibility to health care services (Aspin et al., 2012, pp. 73-75). The unaffordability of health care services has led to high prevalence of health complex disease conditions such as kidney failure, circulatory disease and its associated comorbidity. For example study by (McDonald, 2013, pp. 170-173) revealed that current health disadvantage like kidney problem is linked to social disadvantage among indigenous Australians. The cultural sensitivity of a population is a crucial indicator for determining the level of availability and accessibility of health (Purnell, 2014). It also has impact on health promotion and screening activities (Chalmers et al., 2014, p. 111). Many factors inhibit the acceptability of health services. Firstly, due to their cultural beliefs, indigenous Australians have different concepts and understanding of illness (Thompson et al., 2013, p. 473). Due to lack of awareness and poor knowledge about disease and their morbidity, they avoid primary level of treatment and many chronic disease are diagnosed at later stage of disease (Frey et al., 2013, pp. 519-529). Secondly, reluctance to engage in care because of cultural beliefs has impact on the relation between indigenous people and health professionals. For example culture act as a barrier in effective communication between indigenous patients and health care providers. Such patients are more inclined to traditional method of curi ng disease than depending on scientific health service. Even if they access the service, they have little knowledge about diagnostic process and disease. This leads to conflict between as the expectation of health care providers and patient differs significantly (Dell’Arciprete et al., 2014). Hence instead of approaching health care service, they seek spiritual interventions. This attitude significantly affects the availability and accessibility of preventive health care service (Hunt et al., 2015, pp. 461-467). Lack of cross cultural communication influences the accessibility and acceptability of health service (Germov, 2014). The accessibility and acceptability of care is related to social acceptance of health service according to consumer’s cultural preferences. Many people have different tradition beliefs which act as a barrier in accepting health care service (Dillip et al., 2012). This is evident from the fact many aboriginals reported lack of trust in mainstream health care service because they felt their cultural preferences were not taken into account. Many times language act as a barrier between proper health discussion among indigenous Australians and non-indigenous health professionals (Shahid et al., 2013). Cross cultural miscommunication occurs when health professionals do not understand concerns or gestures of patients and the thought patterns of indigenous people. Due to this gap, therapeutic relationship is compromised and Aboriginal groups do not accept the available health service (Dell’Arciprete et al., 2014). Unavailability of care also occurs due to discrimination of indigenous groups on the basis of their race and poor social position. Racial discrimination significantly lead to deleterious health outcome in indigenous Australians (Cunningham & Paradies, 2013). Health professional behaviour such as racist attitude, unwelcome comment and evil treatment also influences the indigenous people ability to access and accept mainstream health services (Price & Dalgleish, 2013). Many indigenous patients wanted health professionals to respect their personal choice, cultural preference and autonomy in receiving. But conflict arose due to lack of cultural awareness among health professionals leading to poor patient-physician relationship (Artuso et al., 2013, pp. 193). The health status of a population depends on physical availability of health service structure, their organization and functioning. In case of Aboriginal and Torres Islander people, health service is not uniformly distributed in their area (Willis et al., 2016). Even if a health service is available, there is shortage of adequate medical staffs to treat disease and illness. Lack of transport is also a factor that hinders their access to care (Nilson et al., 2014, pp. 3394-3405). Due to remoteness of location, many professionals do wish to come to this area and with low-skilled physicians, the overall health outcome among this group is very poor (Durey & Thompson, 2012). Social justice principle is the key to address inequities in health due to social position. This principle enables giving high priority to socially disadvantaged group irrespective of their financial instability.  The uptake can be improved by following the principle of access, equity, rights and participation in social justice (Germov, 2014). After analysing the factors associated with lack of accessibility of mainstream health services in Aboriginal and Torres Islander people, the recommended ways to improve public health services includes the following: The first step is making affordable and high quality service available locally in the area of Aboriginal and Torres Islander people. Arrangement should be made for proper transport facilities to increase the pace of receiving care. Exhibiting flexibility in health care delivery is also important so that the process do not seem burdensome to indigenous groups (Paniagua, 2013). This also follows the right of equality according to social justice principle and by this step health service is distributed to needy person even if they do not the capability to pay for the costly service (Germov, 2014). Health care system also needs to address the cultural incompetence in medical staff through enhancing cultural awareness and developing holistic model of care (Kirmayer, 2012, p. 149). It is necessary to engage more number of indigenous health professionals to promote delivery of culturally safe care. This strategy promotes greater participation amongst Aboriginal and Torres Strait Islander peo ple and therefore reflects social justice principles (). Health care staff should adopt cultural competence strategy such as understanding of cross-cultural communication style and providing treatment in such a way that their cultural obligation is not denied (Douglas et al., 2014). The disparities in health outcome between indigenous and non-indigenous Australians occur due to lack of accessibility and acceptability of health care services and poor socioeconomic status, cultural beliefs, structural barriers and lack of cross-communication skills. The report brought into focus different issues that act as barrier in seeking care and provided recommendation to improve health care delivery. The main focus should be on adopting culturally appropriate health care service to enhance indigenous people’s trust on medical services. Artuso, S., Cargo, M., Brown, A., & Daniel, M. (2013). Factors influencing health care utilisation among Aboriginal cardiac patients in central Australia: a qualitative study. BMC Health services research, 13(1), 1, p. 193. Aspin, C., Brown, N., Jowsey, T., Yen, L., & Leeder, S. (2012). Strategic approaches to enhanced health service delivery for Aboriginal and Torres Strait Islander people with chronic illness: a qualitative study. BMC Health services research, 12(1), 1, pp. 73-75. Australian Bureau of Statistics. (June 2011). Estimates of Aboriginal and Torres Strait Islander Australians, June 2011. Abs.gov.au. Retrieved 9 October 2016, from https://www.abs.gov.au/ausstats/abs@.nsf/mf/3238.0.55.001 Chalmers, K. J., Bond, K. S., Jorm, A. F., Kelly, C. M., Kitchener, B. A., & Williams-Tchen, A. J. (2014). Providing culturally appropriate mental health first aid to an Aboriginal or Torres Strait Islander adolescent: development of expert consensus guidelines. International journal of mental health systems,8(1), p. 111 Doi: 10.1186/1752-4458-8-6. Cunningham, J., & Paradies, Y. C. (2013). Patterns and correlates of self-reported racial discrimination among Australian Aboriginal and Torres Strait Islander adults, 2008–09: analysis of national survey data. International journal for equity in health, 12(1), 1. Dell’Arciprete, A., Braunstein, J., Touris, C., Dinardi, G., Llovet, I., & Sosa-Estani, S. (2014). Cultural barriers to effective communication between Indigenous communities and health care providers in Northern Argentina: an anthropological contribution to Chagas disease prevention and control.International journal for equity in health, 13(1), 1. Dell’Arciprete, A., Braunstein, J., Touris, C., Dinardi, G., Llovet, I., & Sosa-Estani, S. (2014). Cultural barriers to effective communication between Indigenous communities and health care providers in Northern Argentina: an anthropological contribution to Chagas disease prevention and control.International Journal For Equity In Health, 13(1), 6. https://dx.doi.org/10.1186/1475-9276-13-6 Dillip, Angel, Sandra Alba, Christopher Mshana, Manuel W Hetzel, Christian Lengeler, Iddy Mayumana, Alexander Schulze, Hassan Mshinda, Mitchell G Weiss, and Brigit Obrist. 2012. "Acceptability – A Neglected Dimension Of Access To Health Care: Findings From A Study On Childhood Convulsions In Rural Tanzania". BMC Health Services Research 12 (1). doi:10.1186/1472-6963-12-113. Douglas, M. K., Rosenkoetter, M., Pacquiao, D. F., Callister, L. C., Hattar-Pollara, M., Lauderdale, J., ... & Purnell, L. (2014). Guidelines for implementing culturally competent nursing care. Journal of Transcultural Nursing, Doi: 10.1177/1043659614520998. Durey, A., & Thompson, S. C. (2012). Reducing the health disparities of Indigenous Australians: time to change focus. BMC health services research, 12(1), 1. Frey, R., Gott, M., Raphael, D., Black, S., Teleo?Hope, L., Lee, H., & Wang, Z. (2013). ‘Where do I go from here’? A cultural perspective on challenges to the use of hospice services. Health & social care in the community, 21(5), 519-529. Germov, J. (2014). Second opinion: an introduction to health sociology| NOVA. The University of Newcastle's Digital Repository, 76. Gulliford M, et al. 2016. "What Does 'Access To Health Care' Mean? - Pubmed - NCBI".Ncbi.Nlm.Nih.Gov. https://www.ncbi.nlm.nih.gov/pubmed/12171751. Hunt, L., Ramjan, L., McDonald, G., Koch, J., Baird, D., & Salamonson, Y. (2015). Nursing students' perspectives of the health and healthcare issues of Australian Indigenous people. Nurse education today, 35(3), 461-467. Kirmayer, L. (2012). Rethinking cultural competence. Transcultural Psychiatry, 49(2), 149. Larkins, S., Woods, C. E., Matthews, V., Thompson, S. C., Schierhout, G., Mitropoulos, M., ... & Bailie, R. S. (2015). responses of aboriginal and Torres strait islander Primary health-care services to continuous Quality improvement initiatives. Frontiers in public health, 3. Markwick, A., Ansari, Z., Sullivan, M., Parsons, L., & McNeil, J. (2014). Inequalities in the social determinants of health of Aboriginal and Torres Strait Islander People: a cross-sectional population-based study in the Australian state of Victoria. International journal for equity in health, 13(1), 1. McDonald, S. P. (2013). End-stage kidney disease among Indigenous peoples of Australia and New Zealand. Kidney international supplements,3(2), 170-173. Nilson, C., Kearing-Salmon, K. A., Morrison, P., & Fetherston, C. (2015). An ethnographic action research study to investigate the experiences of Bindjareb women participating in the cooking and nutrition component of an Aboriginal health promotion programme in regional Western Australia. Public health nutrition, 18(18), 3394-3405. Paniagua, F. A. (2013). Assessing and treating culturally diverse clients: A practical guide. Sage Publications. Price, M., & Dalgleish, J. (2013). Help-seeking among indigenous Australian adolescents: exploring attitudes, behaviours and barriers. Youth Studies Australia, 32(1), 10. Purnell, L. D. (2014). Guide to culturally competent health care. FA Davis. Shahid, S., Durey, A., Bessarab, D., Aoun, S. M., & Thompson, S. C. (2013). Identifying barriers and improving communication between cancer service providers and Aboriginal patients and their families: the perspective of service providers. BMC health services research, 13(1), 460. Thompson, S. L., Chenhall, R. D., & Brimblecombe, J. K. (2013). Indigenous perspectives on active living in remote Australia: a qualitative exploration of the socio-cultural link between health, the environment and economics. BMC Public Health, 13(1), 473. Violà ¡n, C., Foguet-Boreu, Q., Roso-Llorach, A., Rodriguez-Blanco, T., Pons-Viguà ©s, M., Pujol-Ribera, E., ... & Valderas, J. M. (2014). Burden of multimorbidity, socioeconomic status and use of health services across stages of life in urban areas: a cross-sectional study. BMC Public Health,14(1), 1. Willis, E., Reynolds, L., & Keleher, H. (Eds.). (2016). Understanding the Australian health care system. Elsevier Health Sciences.
Friday, October 18, 2019
Cause and effect of media on children and youth Annotated Bibliography
Cause and effect of media on children and youth - Annotated Bibliography Example The short-term exposure to such media increases the likelihood of aggressive thoughts and behaviors. It has been found that the characteristics of viewers, media content, and social environment influence the level to which violent media causes aggression in youth. in the end, it has been suggested that public policy makers, parents, and entertainment communities should play an active role in decreasing the level of media-violence exposure to youth and children. The researchers of this study focused on the impact of media on sexual behaviors and perceptions of children and youth. Using systematic review of the social science and biomedical literature and consulting sexual content of mass media, the effects of exposure on the sexual behaviors and attitudes of adolescents were studied. The results of the study reveal that television is one of the main sources of sexual content for adolescents. Media-literacy programs and parental influence can be used as effective measures to control the exposure of sexual content to adolescents. In this study, the researcher has explored the effects of television violence on children and youth. The researcher has used one hundred and forty-six articles related to behavioral science journals to identify the effects of television violence. Four major issues covered by the research in this study include the question of catharsis, emotional effects, effects on learning, and effects on aggressive behavior. A considerable increase in the aggressive behaviors of children has been found to be the most significant and alarming effect of violent television on children. Media has both positive and negative health effects on children and youth. In this study, the researchers have explored the ways media can have positively and negatively influence the health of adolescents. Excessive use of cell
Approaches To Crime Prevention Assignment Example | Topics and Well Written Essays - 1000 words
Approaches To Crime Prevention - Assignment Example Government takes these prevention measures in order to reduce the ratio of crimes in the society, enforce the law and thus maintaining the environment of justice and peace in the society. The application of these crime preventive measures is very important for any community. These criminals actually use negative ways in order to harm the community people and thus gain advantage of their own. There should be strict rules and regulations and then a strong control system on the implementation of these rules will definitely help community people. There are different approaches of crime prevention that can be used in different situations. These different situations may be based on the difference in the activities, difference in focus of intrusion and the difference in the effects of those crimes. Various models have been identified so far (Morgan et. al., 2012). Everything has been systematic now. Same is the case with our criminal justice system. It has developed into a better and beneficial system now, just because of the scientific changes made in it (Geoffrey, 2012). The variety in the crime preventive approaches is the result of all the strategically changes made in it. These approaches may include community prevention approach, family prevention approach, situational environmental approach and developmental environmental approach. The analysis of all these four approaches is given below in detail. Law enforcement was the best policy by the Court in order to take preventive measures against the crimes but as there are several reasons behind crime commitment, so there must be several techniques in order to stop them. Only law enforcement would not be enough for them. Therefore in addition to law enforcement the above four approaches were introduced within different periods. There are some approaches, which actually involves citizens and the community in order to enhance the effectiveness of the crime prevention measures
Roles of Estrogen in Development Essay Example | Topics and Well Written Essays - 1250 words
Roles of Estrogen in Development - Essay Example Most species with two sexes exhibit sexually dimorphic behavior and physical characteristics. New research suggests that the presence of estrogen, specifically estradiol, has an active role in sexual differentiation. Several sexual dimorphic structures in the brain have been observed in laboratory experiments. This study had been performed using male and female rats and had proved the differences in size of corpus callosum between two sexes had existed facilitated by estrogen. Estrogen plays an important role in male reproduction, critical for sustained fertility in some species. Reducing estrogen's interaction with its receptor(s) in monkey and mouse models is associated with reduced sperm motility and, in some cases, documented elimination of sperm fertilizing ability, suggesting that normal epididymal function may be estrogen dependent. The objective of the experiments was to evaluate the effects of reduced endogenous estrogen on development of epididymal function in the pig, a species in which males have very high levels of endogenous estrogen. Furthermore, reducing endogenous estrogen during postnatal development appears to have transient effects on porcine epididymal function. These transient effects suggest that the pig, with its high endogenous estrogen, may respond differently than other species to reduced estrogen synthesis (McCarthy, et al). This particular study provides a viable claim of estrogens importance on development of reproductive sys tem particularly in male specie. The development of the positive feedback of estrogen in normally fed animals and its possible alterations in animals subjected to restricted food intake has been the focus of another study and had indicated that the gonadotropin response to estrogen positive feedback develops gradually and quantitatively as the animal matures and undernutrition-induced delayed puberty is not caused by inability of the hypothalamic-pituitary unit to respond to positive estrogen feedback, but rather to ovarian failure to release estrogen in amounts sufficient to trigger a gonadotropin surge (Ronnekleiv, et al). Another study had determined whether endogenous estrogen, the levels of which increase with advancing pregnancy, regulates growth and development of the baboon fetal adrenal cortex. In the end it propose that estrogen acts directly on the fetal adrenal cortex to selectively repress the morphological and functional development of the fetal zone, potentially as a feedback system to maintain physio logical secretion of estrogen precursors and thus placental estrogen production to promote normal primate fetal and placental development (Albretch, et al). Despite the estrogens' significance on development, some studies apparently speak of its contribution to developmental errors. Evidences have accumulated that exposure to environmental components with estrogenic activity causes reproductive disorders in human populations. Studies conducted over the past 50 years have clearly shown a continual decline in semen quality accompanied by an increase in male reproductive disorders during this period in industrial countries. As healthy gametes are a prerequisite for healthy children, such disorders are a significant problem not only for the current society, but also for future generations. Epidemiological, clinical, and experimental studies have suggested that excessive exposure to estrogens and xenoestrogens during fetal and neonatal
Thursday, October 17, 2019
ELEVATOR PARKING SYSTEM IN TURKEY Research Paper
ELEVATOR PARKING SYSTEM IN TURKEY - Research Paper Example It is therefore inevitable for the company to employ an effective branding and marketing strategy that is intended at wining the loyalty of consumers to the brand. The incorporation of technology within the storage and elevator services is one of the most significant strengths of the company. This is due to the fact that technology is increasingly being applied and appreciated within business processes (Hume 35). In this regard it is evident that the image of the company id favored within the market as compared to competitors. In addition the usefulness, uniqueness and cost effectiveness of the parking system reflects its advantage over business rivals and hence a business strength. Furthermore the company’s brand has already established within the market which makes it at a better position within the market. The competitiveness of the company within the market is being challenged by competitive businesses. The competitiveness emanates from the businesses that provide the parking and storage services and the new entrants in the market. In addition, the company is faced with a challenge in its marketing strategy. This is one of the weaknesses faced by the company because the marketing strategy is not designed to achieve the loyalty of customers to the brand. The Turkey market is characterized by numerous market segments such as the middle working class who own personal cars, families, the rich and the wealthy. These market segments reflect the vast opportunities within the market which would be utilized by the company. Additionally the company has an opportunity of expanding its market through application of effective branding and marketing strategies. It is argued that through effective marketing communication, companies are able to promote the loyalty of consumers to the brand (Trumfio 43). The competition within this business from
Self-reflective report Assignment Example | Topics and Well Written Essays - 1500 words
Self-reflective report - Assignment Example The abundance of advice on management techniques, approaches to business and organizational leadership, and even instruction manuals for achieving personal and business success implies that there are no immediate, quick-fix solutions to ensure that the individual becomes a successful, effective manager. New, radical, exciting approaches are published on a regular basis, and it is difficult for the individual not to accept the latest theory as the ultimate answer. Some of these approaches are more appealing – the Japanese Management Philosophy is a personal favorite. The appeal of taking on a tried and tested approach, and subjecting oneself and an organization to the parameters of that theory is clear. There are, however, limitations to an approach which relies heavily on the suggestions of others in the field. The danger is that while the theory may seem appealing, the practical impossibility of transferring all the conditions under which the theory was developed to an organi zation remains. Each business will have its own unique set of challenges, its individual requirements for change, and its own human component. A personal management philosophy should be developed by each manager, dependent on the contexts he/she is in and the experience and knowledge he/she has built up. This approach will prevent the uncritical adoption of a particular philosophy as the basis from which to work within an organization. This essay will propose that the three most important aspects of effective management, and by implication, the three most important characteristics of a good manager are, firstly, high emotional intelligence – an awareness of the importance of people in organizations, a perceptive recognition of people’s strengths and weaknesses, and an ability to motivate and communicate effectively with people, as well as an honest and realistic level of self-knowledge; secondly, an openness to change, and a flexible, adaptable approach to business, an d the organization, so as to meet the challenges of an ever-changing global business and economic environment; and thirdly an ability to think and act rationally, based not only on emotional responses, but on the needs of people in an organization, and the organization itself. The additional characteristics of a good manager mentioned in this essay are all related to these three essential facets, and serve further to explore the proposal that a personal management style, evolving from a joining of management theory and philosophy, personal experience and capabilities, and the immediate context of the manager’s environment is essential for good management. In all organizations, the influence of humans is paramount. It is people who are able to drive any organization toward becoming effective, profitable or successful, and adaptable. It is thus essential that knowledge regarding the human interaction within an organization be part of the manager’s approach. The more trad itional aspects of the business – productivity, efficiency, marketability, and so on – are not to be neglected, but the structuring and management of interpersonal relationships, teamwork management, and personal management must be considered. A manager can only provide leadership when his/her own self-awareness is ongoing and
Wednesday, October 16, 2019
Immigration Essay Example | Topics and Well Written Essays - 500 words - 2
Immigration - Essay Example The failure to successfully integrate the Asian culture values and norms in the American culture is ostensible through their education and the accounts of Asian American writers, who relate the hardships Asian students face in schools because of their ethnicities in an Asian American journal called â€Å"Burning Cane†(Lowe, 1996, p. 53). Lowe cites the story by Monique Thuy-Dung Truong that tells the story of a Vietnamese-American woman in a predominantly white school. She feels overwhelmed by the vast majority of white population in her school. Her feelings of isolation were further deepened by her nationalistic history teacher, Mrs. Hammerick, who constantly made her feel like â€Å"she was telling all the boys that her first name of Pearl and her last name was Harbor†. (Lowe, 1996, p. 55) Truong’s story highlights how the teacher particularly left her feeling isolated around the boys in class, as she indoctrinated them with her nationalist and bigoted ideology and forewarned them from developing any ties with her. The feelings of being ostracized were indeed painful but the narrator was able to find long-lasting friendship in outcasts like her, Kelly and Michelle. However, it was not race that had set them apart but Kelly’s weight and Michelle’s poverty. Truong’s story creates a contrast between the various ways the society has now been divided. In the midst of this social turmoil, the girls develop a unique bond that is created as a result of their empathy for one another; even though their struggles were different, but they were able to cross the boundaries of race, physical appearance and socioeconomic class. While Truong’s protagonist was reduced to a status of an enemy in the eyes of her peers, another story by Patrick Leong in the Burning cane describes the struggles of a Chinese-Mexican in America, who is torn
Self-reflective report Assignment Example | Topics and Well Written Essays - 1500 words
Self-reflective report - Assignment Example The abundance of advice on management techniques, approaches to business and organizational leadership, and even instruction manuals for achieving personal and business success implies that there are no immediate, quick-fix solutions to ensure that the individual becomes a successful, effective manager. New, radical, exciting approaches are published on a regular basis, and it is difficult for the individual not to accept the latest theory as the ultimate answer. Some of these approaches are more appealing – the Japanese Management Philosophy is a personal favorite. The appeal of taking on a tried and tested approach, and subjecting oneself and an organization to the parameters of that theory is clear. There are, however, limitations to an approach which relies heavily on the suggestions of others in the field. The danger is that while the theory may seem appealing, the practical impossibility of transferring all the conditions under which the theory was developed to an organi zation remains. Each business will have its own unique set of challenges, its individual requirements for change, and its own human component. A personal management philosophy should be developed by each manager, dependent on the contexts he/she is in and the experience and knowledge he/she has built up. This approach will prevent the uncritical adoption of a particular philosophy as the basis from which to work within an organization. This essay will propose that the three most important aspects of effective management, and by implication, the three most important characteristics of a good manager are, firstly, high emotional intelligence – an awareness of the importance of people in organizations, a perceptive recognition of people’s strengths and weaknesses, and an ability to motivate and communicate effectively with people, as well as an honest and realistic level of self-knowledge; secondly, an openness to change, and a flexible, adaptable approach to business, an d the organization, so as to meet the challenges of an ever-changing global business and economic environment; and thirdly an ability to think and act rationally, based not only on emotional responses, but on the needs of people in an organization, and the organization itself. The additional characteristics of a good manager mentioned in this essay are all related to these three essential facets, and serve further to explore the proposal that a personal management style, evolving from a joining of management theory and philosophy, personal experience and capabilities, and the immediate context of the manager’s environment is essential for good management. In all organizations, the influence of humans is paramount. It is people who are able to drive any organization toward becoming effective, profitable or successful, and adaptable. It is thus essential that knowledge regarding the human interaction within an organization be part of the manager’s approach. The more trad itional aspects of the business – productivity, efficiency, marketability, and so on – are not to be neglected, but the structuring and management of interpersonal relationships, teamwork management, and personal management must be considered. A manager can only provide leadership when his/her own self-awareness is ongoing and
Tuesday, October 15, 2019
Conclusion and managerial implications Essay Example for Free
Conclusion and managerial implications Essay A streak is a short period of good or bad luck. A team is said to have a winning streak when it wins many games consecutively, and to have a loosing streak when it looses many matches in a row. It is quite easy to say that a team has good players, and therefore has a high chance of winning. Upon closer consideration, though, it may become apparent that the skill and style of play of the teams playing against them has an important part to play, and so are other factors like coaching and the spirit in the players. In this work, we have considered some variables that appear likely to influence the team’s chance of winning. Specifically, we chose opponent 3-points per game, team 3-points per game, team free throws per game, team turnovers per game, opponent turnovers per game, team rebounds per game and opponent rebounds per game as key determining variables in determining the winning chance of a basketball team. We had to deal with the occurrence unusually large or small values in the data, since they affect the final outcome. Therefore we formed a multiple regression model for prediction, and modified it until we came up with a model with six variables. Our model can be trusted to predict the chance of a team winning by up to 80%, and the percentage win can be predicted with an error margin 0. 1479 percentage points about 95% of the time. Our model showed us that the more turnovers a team has and the more rebounds from an opponent, the less the chance of winning. However, the more 3-point shots, free throws and rebounds made, and the more turnovers an opponent makes, the greater a team’s chance of winning. 3 TABLE OF CONTENTS Executive summary 2 Objective of the study 4 Data description 5 Technical report 6 12 Conclusion and managerial implications 14 Appendices Appendix I: Descriptive statistics for the variables 15 Appendix II: Box plots for the variables 16 Appendix III: Scatter plots, winning chance vs. each variable 17 Appendix IV: Multiple regression details for 8-variable model 20 Appendix V: Residual plots for the 8 variables 21 Appendix VI: Best subsets regression details 23 Appendix VII: Regression details for 5-variable model 24. Appendix VIII: Residual Plots for 5 variables 26 Appendix IX: Regression excluding residual outliers for 5-variable model 28 Appendix X: Regression for 6-variable model 29 Appendix XI: Residual plots for 6-variable model 30 Appendix XII: (a) The final regression model 32 Appendix XII: (b) Residual plots for the final regression model 33 4 OBJECTIVE OF THE STUDY The objective of his study is to create a regression model for predicting the percentage wining of a basketball team among many basketball teams in a particular basketball season. Regression analysis is a method that aids us in predicting the outcome of a variable, given the values of one or more other (independent) variables. The model thus obtained is examined to ascertain the reliability of its prediction. In our analysis, therefore, we are out to examine a multiple regression model that we shall build, and improve on it until we find the best model for the job. We are motivated by the fact that fans of teams every now and then go into arguments (and even betting) about what chance there is for a particular team to win. Winning a game, we believe, is not entirely a chance occurrence. We therefore want to investigate what factors can be expected to determine the winning chance of a team. We do not expect to get a magical model, but that we will have to modify our model until its predictive ability has been greatly improved. The importance of this work lies in the fact that, without accurate knowledge of the most influential factors affecting a phenomenon, one may end up spending a lot of resources (time, energy and money) on a factor that might not be so important, at the expense of the really important factors. This results in a lot of input with no corresponding output, thereby leading to frustration. This can be especially true in sports and related activities. This work is our little contribution to more efficient planning and sport outing for a basketball team. 5 DATA DESCRIPTION The data that we have used is taken from †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ It presents the statistics for sixty-eight (68) teams in a sporting season. Therefore we shall not be going into issues of time series or other techniques that come into play when dealing with data that has been collected over an extended period. The data presents a list of 68 basketball teams. Each team has played a number of games in a particular basketball sporting season. The spreadsheet contains a lot of information on these 68 teams, such as their winning percentage and vital statistics of the games played in this particular season. In this work, we are going to designate a dependent variable (Y) and seven independent variables (X1, X2, X3, X4, X5, X6 and X7). The variables are defined as follows: Y = Winning Percentage X1 = Opponent’s 3-point per game X2 = Team’s 3-point per game X3 = Team’s free throws pr game X4 = Team’s turnover per game X5 = Opponent’s turnover per game X6 = Team’s rebound per game X7 = Opponent’s rebound per game With the above variables, we shall formulate a regression model for the winning percentage of a team in this data. 6 TECHNICAL REPORT 6. 1 Preliminaries Our first task, having obtained the data, is to examine the descriptive statistics for each of our independent variables. The Minitab result is presented in Appendix I. The data appears to be normally distributed, since the mean and median are close. To further verify this, we will look at the box plots for each of the variables. The box plots reveal that the data is normally distributed, except for â€Å"turnover per game†and â€Å"opponent turnover per game†with one outlier each, and â€Å"home rebound per game†with three outliers. The Box plots are presented in Appendix II. To further understand our data, we still look at the scatter plots of each variable against the winning percentage. This will show us the extent to which each of then influence the winning percentage. Although this is not the final regression model, it presents us with marginal regression relationships between each variable and the winning percentage. The details of the results are presented in Appendix III. The marginal regressions reveal that some of the variables are more influential to the winning percentage than others, but we note that this is not the final regression model yet. On close examination, we observe that Opponent’s 3-point per game accounts for very little of the chances of winning a game, and in fact is negatively correlated with percentage wins of a team. A similar case arises concerning Team’s turnover per game, only that the relationship is even weaker here. The same goes for Team’s rebound per game. The rest exhibit a positive correlation. The strongest correlation observable from the scatter plots is that of Team’s free throws per game, and the weakest positive correlation is that of Opponent’s turnover per game. 6. 2 6. 4. 1 7 Regression analysis is a very useful analysis tool. Moreover, with the aid of modern computers, data analysis is even easier (and sometimes fun) to carry out. The final model we have been able to come up with will help in predicting the winning chance of a basketball team. We would like to state here that our model does not have magical powers of prediction. The predictive accuracy of the model has been stated in the body of this work, and shows us that it does not incorporate EVERY variable that affects the winning chance of a team. It is common knowledge that factors like the co-operation between team management and players, relationship among players, the individual skills of the players and the support of a team’s fans play a very important role in a team’s ability to win a game, and so do many other factors. Yet these factors cannot be quantitatively described so as to be included in the model. Nevertheless, we believe that the variables we have analyzed have very important roles to play, and therefore should not be ignored. We therefore recommend, based on our findings, that a team should strategize its game so as to minimize their turnovers, since from our model they have the strongest negative effect on their winning chance. Similarly, the opponent’s rebound will do damage. On the other hand, a basketball team should, as much as possible, maximize their 3-point shots, free throws, rebounds and the opponent’s turnovers, since according to our model, these have a positive influence on their winning chance. Finally to the sports fan, you can know what to expect from a team if you can observe the above-mentioned variables. So, instead of raising your heart rate in blind anticipation, you can assess for yourself the chance that your favorite team will not let you down. In the meantime, we wish you the best of luck! 8 APPENDIXES 8. 1 APPENDIX I: Descriptive Statistics for the variables 1. Descriptive Statistics Variable N N* Mean SE Mean StDev Variance Minimum Winning percentage 68 0 0. 5946 0. 0197 0. 1625 0. 0264 0. 2333 Opp 3-point per game 68 0 6. 318 0. 107 0. 880 0. 774 3. 788 3-point per game 68 0 6. 478 0. 161 1. 326 1. 757 3. 645 Free throws per game 68 0 14. 203 0. 280 2. 307 5. 323 8. 536 Turn-over, pg 68 0 14. 086 0. 164 1. 355 1. 835 10. 974 Opponent Turn-over,pg 68 0 14. 755 0. 192 1. 583 2. 506 11. 438 Home rebound per game 68 0 35. 380 0. 389 3. 209 10. 297 27. 323 Oppnt rebound per game 68 0 33. 841 0. 258 2. 128 4. 528 28. 970 Variable Q1 Median Q3 Maximum Range IQR Winning percentage 0. 4707 0. 5938 0. 7403 0. 9487 0. 7154 0. 2696 Opp 3-point per game 5. 688 6. 323 6. 956 8. 138 4. 350 1. 268 3-point per game 5. 782 6. 433 7. 413 9. 471 5. 825 1. 631 Free throws per game 12. 619 14. 322 15. 883 19. 568 11. 032 3. 264 Turn-over, pg 13. 116 14. 000 14. 875 17. 656 6. 682 1. 759 Opponent Turn-over,pg 13. 574 14. 769 15. 514 18. 406 6. 969 1. 939 Home rebound per game 33. 304 35. 383 37. 063 45. 548 18. 226 3. 758 Oppnt rebound per game 32. 611 33. 754 35. 047 39. 938 10. 968 2. 436 2. Descriptive Statistics: Winning percentage Variable N N* Mean SE Mean StDev Minimum Q1 Median Winning percentage 68 0 0. 5946 0. 0197 0. 1625 0. 2333 0. 4707 0. 5938 Variable Q3 Maximum IQR Variance Range Winning percentage 0. 7403 0. 9487 0. 2696 0. 026 o. 7154 8. 2 APPENDIX II: Box Plots for the variables 8. 3 APPENDIX III: Scatter Plots (With Corresponding Regression Equations) Regression Analysis: Winning percentage versus Opp 3-point per game The regression equation is Winning percentage = 0. 729 0. 0212 Opp 3-point per game S = 0. 162686 R-Sq = 1. 3% R-Sq(adj) = 0. 0% Regression Analysis: Winning percentage versus 3-point per game The regression equation is Winning percentage = 0. 397 + 0. 0304 3-point per game S = 0. 158646 R-Sq = 6. 2% R-Sq(adj) = 4. 7% Regression Analysis: Winning percentage versus Free throws per game The regression equation is Winning percentage = 0. 058 + 0. 0378 Free throws per game S = 0. 138185 R-Sq = 28. 8% R-Sq(adj) = 27. 7% Regression Analysis: Winning percentage versus Turn-over, pg The regression equation is Winning percentage = 1. 14 0. 0387 Turn-over, pg S = 0. 155019 R-Sq = 10. 4% R-Sq(adj) = 9. 0% Regression Analysis: Winning percentage versus Opponent Turn-over,pg The regression equation is Winning percentage = 0. 293 + 0. 0204 Opponent Turn-over,pg S = 0. 160503 R-Sq = 4. 0% R-Sq(adj) = 2. 5% Regression Analysis: Winning percentage versus Home rebound per game The regression equation is Winning percentage = 0. 243 + 0. 0237 Home rebound per game S = 0. 144773 R-Sq = 21. 9% R-Sq(adj) = 20. 7% Regression Analysis: Winning percentage versus Oppnt rebound per game The regression equation is Winning percentage = 1. 44 0. 0249 Oppnt rebound per game S = 0. 154803 R-Sq = 10. 7% R-Sq(adj) = 9. 3% 8. 4 APPENDIX IV: Multiple Regression Details Regression Analysis: Winning perc versus 3-point per , Free throws , The regression equation is Winning percentage = 0. 633 + 0. 0224 3-point per game + 0. 0176 Free throws per game 0. 0622 Turn-over, pg + 0. 0414 Opponent Turn-over,pg + 0. 0267 Home rebound per game 0. 0296 Oppnt rebound per game 0. 0172 Opp 3-point per game Predictor Coef SE Coef T P Constant 0. 6327 0. 2123 2. 98 0. 004 3-point per game 0. 022369 0. 007221 3. 10 0. 003 Free throws per game 0. 017604 0. 005720 3. 08 0. 003 Turn-over, pg -0. 062214 0. 007380 -8. 43 0. 000 Opponent Turn-over,pg 0. 041398 0. 006398 6. 47 0. 000 Home rebound per game 0. 026699 0. 004175 6. 39 0. 000 Oppnt rebound per game -0. 029645 0. 004594 -6. 45 0. 000 Opp 3-point per game -0. 01724 0. 01130 -1. 53 0. 132 S = 0. 0747588 R-Sq = 81. 1% R-Sq(adj) = 78. 8% Analysis of Variance Source DF SS MS F P Regression 7 1. 43486 0. 20498 36. 68 0. 000 Residual Error 60 0. 33533 0. 00559 Total 67 1. 77019 Source DF Seq SS 3-point per game 1 0. 10906 Free throws per game 1 0. 53614 Turn-over, pg 1 0. 24618 Opponent Turn-over,pg 1 0. 13117 Home rebound per game 1 0. 13403 Oppnt rebound per game 1 0. 26527 Opp 3-point per game 1 0. 01302 Unusual Observations 3-point Winning Obs per game percentage Fit SE Fit Residual St Resid 2 4. 59 0. 79412 0. 63575 0. 02114 0. 15837 2. 21R 27 6. 60 0. 76667 0. 60456 0. 01272 0. 16211 2. 20R 30 6. 21 0. 50000 0. 65441 0. 01571 -0. 15441 -2. 11R 45 4. 75 0. 25000 0. 39253 0. 02404 -0. 14253 -2. 01R R denotes an observation with a large standardized residual. 8. 5 APPENDIX V: Residuals plots for the 8 variables 8. 6 APPENDIX VI: Best Subsets Regression Best Subsets Regression: Winning perc versus Opp 3-point , 3-point per , Response is Winning percentage O O H p O F p o p p r p m n p e o e t e n 3 3 e r r t n e e p p h t b b o o r T o o i i o u T u u n n w r u n n t t s n r d d n p p p o p p e e e v o e e r r r e v r r r e g g g , r g g a a a , a a Mallows m m m p p m m. Vars R-Sq R-Sq(adj) Cp S e e e g g e e 1 28. 8 27. 7 161. 5 0. 13818 X 1 21. 9 20. 7 183. 5 0. 14477 X 2 46. 9 45. 3 106. 1 0. 12021 X X 2 41. 2 39. 4 124. 4 0. 12658 X X 3 55. 2 53. 1 81. 7 0. 11126 X X X 3 54. 9 52. 8 82. 9 0. 11172 X X X 4 73. 8 72. 2 24. 9 0. 085772 X X X X 4 65. 1 62. 9 52. 4 0. 098958 X X X X 5 77. 7 75. 9 14. 6 0. 079790 X X X X X 5 76. 8 74. 9 17. 6 0. 081431 X X X X X. 6 80. 3 78. 4 8. 3 0. 075569 X X X X X X 6 78. 1 75. 9 15. 5 0. 079781 X X X X X X 7 81. 1 78. 8 8. 0 0. 074759 X X X X X X X 8. 7 APPENDIX VII: Regression Analysis with Five Variables Regression Analysis The regression equation is Winning percentage = 0. 528 + 0. 0250 3-point per game 0. 0631 Turn-over, pg + 0. 0471 Opponent Turn-over,pg + 0. 0349 Home rebound per game 0. 0336 Oppnt rebound per game Predictor Coef SE Coef T P Constant 0. 5280 0. 2213 2. 39 0. 020 3-point per game 0.025031 0. 007617 3. 29 0. 002. Turn-over, pg -0. 063103 0. 007859 -8. 03 0. 000 Opponent Turn-over,pg 0. 047061 0. 006531 7. 21 0. 000 Home rebound per game 0. 034908 0. 003176 10. 99 0. 000 Oppnt rebound per game -0. 033572 0. 004713 -7. 12 0. 000 S = 0. 0797903 R-Sq = 77. 7% R-Sq(adj) = 75. 9% Analysis of Variance Source DF SS MS F P Regression 5 1. 37547 0. 27509 43. 21 0. 000 Residual Error 62 0. 39472 0. 00637 Total 67 1. 77019 Source DF Seq SS 3-point per game 1 0. 10906. Turn-over, pg 1 0. 13137 Opponent Turn-over,pg 1 0. 15696 Home rebound per game 1 0. 65508 Oppnt rebound per game 1 0. 32300 Unusual Observations 3-point Winning Obs per game percentage Fit SE Fit Residual St Resid 8 4. 13 0. 83333 0. 66281 0. 02375 0. 17053 2. 24R 13 6. 79 0. 55172 0. 72095 0. 02073 -0. 16923 -2. 20R 27 6. 60 0. 76667 0. 60253 0. 01331 0. 16414 2. 09R 30 6. 21 0. 50000 0. 66321 0. 01474 -0. 16321 -2. 08R 45 4. 75 0. 25000 0. 41575 0. 02187 -0. 16575 -2. 16R. R denotes an observation with a large standardized residual. APPENDIX VII (Continued): Descriptive Statistics for five Variables Descriptive Statistics Variable N N* Mean SE Mean StDev Variance Minimum Winning percentage 68 0 0. 5946 0. 0197 0. 1625 0. 0264 0. 2333 3-point per game 68 0 6. 478 0. 161 1. 326 1. 757 3. 645 Turn-over, pg 68 0 14. 086 0. 164 1. 355 1. 835 10. 974 Opponent Turn-over,pg 68 0 14. 755 0. 192 1. 583 2. 506 11. 438 Home rebound per game 68 0 35. 380 0. 389 3. 209 10. 297 27. 323 Oppnt rebound per game 68 0 33. 841 0. 258 2. 128 4. 528 28. 970 Variable Q1 Median Q3 Maximum Range IQR Winning percentage 0. 4707 0. 5938 0. 7403 0. 9487 0. 7154 0. 2696 3-point per game 5. 782 6. 433 7. 413 9. 471 5. 825 1. 631 Turn-over, pg 13. 116 14. 000 14. 875 17. 656 6. 682 1. 759 Opponent Turn-over,pg 13. 574 14. 769 15. 514 18. 406 6. 969 1. 939 Home rebound per game 33. 304 35. 383 37. 063 45. 548 18. 226 3. 758 Oppnt rebound per game 32. 611 33. 754 35. 047 39.938 10. 968 2. 436 8. 8. APPENDIX VIII: Residual Plots for 5 variables 8. 9 APPENDIX IX: Regression Excluding Residual Outliers Regression Analysis: The regression equation is Winning percentage = 0. 487 + 0. 0184 Free throws per game + 0. 0240 Opponent Turn-over,pg + 0. 0188 Home rebound per game 0. 0303 Oppnt rebound per game 0. 0243 Opp 3-point per game Predictor Coef SE Coef T P Constant 0. 4873 0. 2956 1. 65 0. 105 Free throws per game 0. 018444 0. 009412 1. 96 0. 055 Opponent Turn-over,pg 0. 024021 0. 009784 2. 46 0. 017 Home rebound per game 0. 018835 0. 006555 2. 87 0. 006 Oppnt rebound per game -0. 030258 0. 007625 -3. 97 0. 000 Opp 3-point per game -0. 02428 0. 02129 -1. 14 0. 259 S = 0. 118905 R-Sq = 49. 8% R-Sq(adj) = 45. 7% Analysis of Variance Source DF SS MS F P Regression 5 0. 84309 0. 16862 11. 93 0. 000 Residual Error 60 0. 84831 0. 01414 Total 65 1. 69140 Source DF Seq SS Free throws per game 1 0. 47458 Opponent Turn-over,pg 1 0. 03295 Home rebound per game 1 0. 04175 Oppnt rebound per game 1 0. 27543 Opp 3-point per game 1 0. 01839 Unusual Observations Free throws Winning Obs per game percentage Fit SE Fit Residual St Resid 12 12. 2 0. 3333 0. 5854 0. 0270 -0. 2521 -2. 18R 34 12. 2 0. 9487 0. 6218 0. 0297 0. 3269 2. 84R 42 14. 5 0. 2333 0. 5227 0. 0400 -0. 2893 -2. 58R 43 12. 5 0. 2500 0. 4925 0. 0367 -0. 2425 -2. 14R R denotes an observation with a large standardized residual. 8. 10 APPENDIX X: Regression with 6 Variables Regression Analysis: Winning perc versus 3-point per , Free throws , The regression equation is Winning percentage = 0. 565 + 0. 0239 3-point per game + 0. 0163 Free throws per game 0. 0630 Turn-over, pg + 0. 0436 Opponent Turn-over,pg + 0. 0265 Home rebound per game 0. 0310 Oppnt rebound per game Predictor Coef SE Coef T P Constant 0. 5654 0. 2100 2. 69 0. 009 3-point per game 0. 023949 0. 007224 3. 32 0. 002 Free throws per game 0. 016290 0. 005717 2. 85 0. 006 Turn-over, pg -0. 062984 0. 007443 -8. 46 0. 000 Opponent Turn-over,pg 0. 043571 0. 006305 6. 91 0. 000 Home rebound per game 0. 026482 0. 004218 6. 28 0. 000 Oppnt rebound per game -0. 031028 0. 004552 -6. 82 0. 000 S = 0. 0755690 R-Sq = 80. 3% R-Sq(adj) = 78. 4% Analysis of Variance Source DF SS MS F P Regression 6 1. 42184 0. 23697 41. 50 0. 000 Residual Error 61 0. 34835 0. 00571 Total 67 1. 77019 Source DF Seq SS 3-point per game 1 0. 10906 Free throws per game 1 0. 53614 Turn-over, pg 1 0. 24618 Opponent Turn-over,pg 1 0. 13117 Home rebound per game 1 0. 13403. Oppnt rebound per game 1 0. 26527 Unusual Observations 3-point Winning Obs per game percentage Fit SE Fit Residual St Resid 27 6. 60 0. 76667 0. 60084 0. 01262 0. 16582 2. 23R 44 6. 03 0. 23333 0. 38536 0. 02559 -0. 15202 -2. 14R 45 4. 75 0. 25000 0. 41158 0. 02076 -0. 16158 -2. 22R R denotes an observation with a large standardized residual. 8. 11 APPENDIX XI: Residual Plots for the 6-variable Model 8. 12 APPENDIX XII (a): The Final Regression Model. Regression Analysis: Winning perc versus 3-point per , Free throws , The regression equation is Winning percentage = 0. 604 + 0. 0226 3-point per game + 0. 0167 Free throws per game 0. 0660 Turn-over, pg + 0. 0420 Opponent Turn-over,pg + 0. 0256 Home rebound per game 0. 0292 Oppnt rebound per game Predictor Coef SE Coef T P Constant 0. 6038 0. 2065 2. 92 0. 005 3-point per game 0. 022564 0. 007108 3. 17 0. 002 Free throws per game 0. 016706 0. 005600 2. 98 0. 004 Turn-over, pg -0. 066016 0. 007456 -8. 85 0. 000 Opponent Turn-over,pg 0. 041969 0. 006229 6. 74 0. 000 Home rebound per game 0. 025649 0. 004152 6. 18 0. 000 Oppnt rebound per game -0. 029173 0. 004561 -6. 40 0. 000 S = 0. 0739739 R-Sq = 80. 8% R-Sq(adj) = 78. 8% Analysis of Variance Source DF SS MS F P Regression 6 1. 37853 0. 22976 41. 99 0. 000 Residual Error 60 0. 32833 0. 00547 Total 66 1. 70686 Source DF Seq SS 3-point per game 1 0. 10202 Free throws per game 1 0. 50620 Turn-over, pg 1 0. 30758 Opponent Turn-over,pg 1 0. 11512 Home rebound per game 1 0. 12372. Oppnt rebound per game 1 0. 22390 Unusual Observations 3-point Winning Obs per game percentage Fit SE Fit Residual St Resid 26 6. 60 0. 76667 0. 60237 0. 01238 0. 16429 2. 25R 29 6. 21 0. 50000 0. 64694 0. 01477 -0. 14694 -2. 03R 43 6. 03 0. 23333 0. 38546 0. 02505 -0. 15213 -2. 19R 44 4. 75 0. 25000 0. 41580 0. 02045 -0. 16580 -2. 33R R denotes an observation with a large standardized residual. APPENDIX XII (b): Residual Plots for the final regression model. APPENDIXXII (b): Continued REFERENCES Please state the source of data here.
Subscribe to:
Posts (Atom)