Tuesday, December 24, 2019

Missionaries Are to Blame in Chinua Achebes Things Fall...

Missionaries Are to Blame in Chinua Achebes Things Fall Apart The burden and calling to reach out and help others, enfold many people in society throughout the world. Rich or poor, young or old, black, red or white, the motive is helping those with a need. As Chinua Achebe points out in his book, Things Fall Apart, though there is the aspiration to lend a hand, it can sometimes become deadly, and even fatal to the lives of people. Although the missionaries try help convert the Ibo village of Umuofia to Christianity, their presence in Africa is harmful to the lives and culture of the Ibo. The men that come to Umuofia destroy the cultural balance of faith and religion that encompasses the native people in Africa.†¦show more content†¦They assist in, ...[building] a trading store and for the first time palm-oil and kernel became things of great price, and much money flowed into Umuofia (146). Economically, the Ibo villages improve, and slowly schools and hospitals are erected. Education and knowledge from the outside world becomes accessible, as well as quality of the lives of many, both spiritually and physically. The missionaries rescue and, ...welcome twins and such abomination (130), and save them from cruel deaths. After that, the osu or outcasts also think that it is possible to be accepted into society. A new society, which saves twins from dying because of superstition from the tribes and receives outcasts with warm and loving hospitality. However, although the missionaries bring the start of advanced technology and education to Africa, their wish to im prove comes with a price that greatly outweighs the good. The strategy of the Europeans is to attack religion, the central factor that controls the lives of so many. Slowly, with that influence, they win many of the tribes brothers, and [their] clan can no longer act like one. (145) Anarchy reigns, when the two clans are torn apart with the superior white mans religion overcoming traditional beliefs. Following the example of religion, the government tags along, bringing with them new rules where, ...the DistrictShow MoreRelatedAchebe1599 Words   |  7 Pages Achebe’s Defense of The Ibo People in Things Fall Apart Option 1 The late Chinua Achebe is considered to be one of the most important voices in African literature. Born in colonial Nigeria in the 1930’s, Achebe joined the first wave of African writers who were determined to represent their country in a way that would truthfully depict the past and present. Before the arrival of the first wave writers, the history of pre-colonial Africa was portrayed as a place of barbarous activity. EuropeanRead MoreThings Fall Apart by Chinua Achebe Essay1064 Words   |  5 PagesIn Achebe’s book, â€Å"Things Fall Apart†, the life of a Nigerian man named Okowkwo is depicted. At first look, it may seem that Okowkwo’s story is the main theme of the book, but upon further examination it is easy to see that the plight of his indigenous Igbo people are the main theme representing what really fell apart. Achebe introduces the reader to the intricate culture of the Igbo people from the earliest chapters in the book. He describes rituals, laws, and religion of these people with greatRead More Fate and Free Will in Chinua Achebes Things Fall Apart Essay1232 Words   |  5 PagesFate and Free Will in Chinua Achebes Things Fall Apart   Ã‚  Ã‚   The tragic story of Okonkwo in Chinua Achebes Things Fall Apart offers many examples of Igbo beliefs regarding free will and fate. Religious life for the Igbo was thoroughly intertwined with secular life. According to the text, the Igbo believed in fate; that nothing happened by chance as every happenstance was the result of Chukwu or Gods will. Yet the Igbo also believed that ancestors, lesser gods, and their own chi or personalRead MoreThe British Empire and Colonization975 Words   |  4 PagesCaucasian people in the process of colonization. Chinua Achebe clearly demonstrates the harmful effects colonization has on Umuofia in the book Things Fall Apart, a novel about a man named Okonkwo and the changes he experiences during the British colonization of his home :Umuofia, the British forces western education, Christianity, and their court system upon the Igbo people which in return severely damages their culture. In the novel Things Fall Apart, Chinua Achebe demo nstrates how the education of IgboRead MoreThings Fall Apart vs. Heart of Darkness Essay1617 Words   |  7 PagesAfrican Colonization through Literature: Things Fall Apart Vs. Heart of Darkness History is an extraordinary mix of truth and fiction. The dichotomy that is bred from different historic al perspectives opens the eyes of those who study history to the semi-fabricated nature of much of humanities past. For most of recorded history, events have been recorded and retold through the eyes of the victors. Only recently have people had the opportunity to view both sides of issues. The Western practiceRead MoreChinua Achebe s Things Fall Apart1164 Words   |  5 PagesPardis Kianoush Western Civilization II Nicole Watkins 11/26/2014 Things Fall Apart Things Fall Apart, written by Chinua Achebe is a story which follows the life and foreshadowed downfall of Okonkwo, a respected warrior in his Umuofia clan in Nigeria. Disgusted by his late father, Unoka, and the reputation of incompetence and laziness he left behind, Okonkwo was determined to not let history repeat itself. He worked diligently and became a wealthy patriarch for his family. The beginning of Okonkwo’sRead MoreEssay on Gender Roles in Things Fall Apart, by Chinua Achebe2254 Words   |  10 Pages Upon an initial reading of Chinua Achebe’s Things Fall Apart, it is easy to blame the demise of Okonkwo’s life and of the Umofia community on the imperialistic invasions of the white men. After all, Okonkwo seemed to be enjoying relative peace and happiness before then. He did have a few mishaps; one of them resulted in him being exiled for eight years. Nonetheless, he returned to his home town with high spirits and with prospects of inc reased success. However, everything has changedRead MoreChinua Achebe s Things Fall Apart1388 Words   |  6 PagesEnglish language? Chinua Achebe, the author of the great African novel,  ¨Things Fall Apart ¨ argues that Joseph Conrad s book  ¨Heart Of Darkness ¨ was a false depiction of Africa and the writing was too racist and made the white race seem superior to the native Africans. The novel â€Å"Things Fall Apart† by Chinua Achebe is about the Ibo people and how they have to face the threat of colonization and the white people’s religion which is Christianity. When Achebe portrayed the missionaries and Europeans,Read More Parental Relationships in Chinua Achebe’s Things Fall Apart and Buchi Emecheta’s The Joys of Motherhood1818 Words   |  8 PagesParental Relationships in Chinua Achebe’s Things Fall Apart and Buchi Emecheta’s The Joys of Motherhood Chinua Achebe’s Things Fall Apart, and Buchi Emecheta’s The Joys of Motherhood, are two novels that emphasize the complexities of relationships between parents and their children. In Achebe’s story, the protagonist of the novel, Okonkwo, has distant relationships with his children (particularly Nwoye and Ezinma) because their father sees them as inadequate in many ways. Okonkwo hasRead MoreThings Fall Apart and a Small Place: Comparing the Theme of Cultural Integrity1295 Words   |  6 Pagesweakness. Chinua Achebes Things Fall Apart also portrays a struggle between two cultures. Okonkwo tries to act against the British colonizer by killing one of their messengers and stopping their influence; however, no one follows Okonkwos lead. They all are confused as to how they should react to the powerful outsiders. In the eyes of Kincaid they would be considered weak. Okonkwo is the only one who tried to do something about the British, even if it was futile. Things Fall Apart chronicles

Sunday, December 15, 2019

Wireless sensor network and its Applications Free Essays

Introduction Wireless sensor networks use sensing techniques to gather information about a phenomenon and react to the events in a specified environment by the means of Sensors. These small, inexpensive, smart devices, which are connected through wireless links, provide unique opportunities for controlling and monitoring environments. Technically, a sensor translates the information from the physical world into signals and prepares them for analysis and processing. We will write a custom essay sample on Wireless sensor network and its Applications or any similar topic only for you Order Now The terms, Wireless Nodes, Sensor nodes and motes can be used interchangeably in different contexts. Here we refer to them as motes. Motes are typically produced in large quantities and are usually densely distributed in the network. Their size(or their components size) varies from macroscopic- scale to microscopic or even sometimes nanoscopic-scale. â€Å"Micro-sensors with on-board processing and wireless interfaces can be utilized to study and monitor a variety of phenomena and environments at close proximity.† A mote is consisted of four major components: Processing Unit: For data processing and â€Å"managing the procedures that make the motes collaborate with other nodes to carry out the assigned sensing tasks.† Sensing Unit: To sense the physical world and convert the data into digital signal ready for processing. Transceiver Unit: To provide the connection of nodes in the network. Power Unit: To supply energy for the device components. Based on the application, motes may have some additional components such as location finding system, mobilizer and power generator. These components should be put together in a way to fit in a small size module, be adaptive to different environments and consume as little power as possible. The components of a mote Figure is a representation of data acquisition about a phenomena (Process) in the real world which can be sensed by a sensor. The sensed signal needs often needs some changing in order to be processed (Signal Conditioning). For example in order to make the signal range appropriate for conversion some changes on signal magnitude is needed through signal amplification. Unwanted noise can also be removed through this stage. The analog signal is then transformed to digital signal by using ADC and is ready for further processing or storage. Data acquisition and actuation Applications: Wireless sensor networks can be used in places where wired systems cannot be deployed (e.g., a remote or dangerous area). It can also be used in commercial products to improve the performance or quality of them or provide convenience for their users. Sensor can sense many different variables such as: temperature, humidity, pressure and movement. They can sense an environment continuously or they can be event driven and sense an event when it occurs. Wireless sensor networks can support a wide range of applications. Battlefield surveillance, Bridge and highway monitoring, Earthquake detection, Habitat Monitoring, Health care, Industrial monitoring and control, Tracking wildfires, Traffic flow and surveillance, Video surveillance and Weather monitoring are few examples of its applications. Military Applications One of the first applications of sensor network was military sensing. WSN could be used for monitoring the critical equipment, vehicle or weapons to make sure they are in a proper condition. Terrains, paths and roads could be monitored to sense the presence of opposing forces. They also can be used to enhance the targeting system of ammunitions. Human teams can be replaced by sensor networks in places affected by biological and chemical warfare or incidents in order to perform nuclear reconnaissance and prevent humans to be exposed to radiations. Traffic surveillance Traffic surveillance is another example of WSN applications. Sensors are placed in predefined places to gather data and send it via wireless links to data centres for further processing. This data can be beneficial for statistical purposes such as vehicle count per day, the number of cars per lane and the average speed of vehicles. It can also be useful for real time applications such as traffic flow monitoring, incident reporting and managing the traffic lights in order to prevent heavy traffics. Real-time traffic flow control Medical Applications: Wireless sensor network benefits are being explored by many hospitals and medical centres around the world. As it can be seen in Figure sensors can be implanted in patient body or connected to him in order to collect information about his vital signs such as heart beat, blood pressure and oxygen level in blood. This information can be transferred patient’s medical record for future examinations and long-term inspections. It also can be displayed in real-time or alert physicians based on the sensor program in case of any sudden change in under-care patient condition. http://www.infotech.oulu.fi/Annual/2007/opme.html Realization of these various applications requires wireless ad hoc networking techniques. However they are not suitably designed for special features and applications of sensor networks. WSN vs. Mobile Adhoc Netoworks [12] Although there are lots of similarities between Mobile ad networks (MANET) and WSN for instance their lack of network infrastructure, use of multi-hop routing and wireless channel, there are some major differences to point out. Nodes in MANET are designed for human interaction such as laptop and PDAs, whereas in WSN motes are usually left unattended in remote or dangerous locations with the least possible interactions. In WSN â€Å"the topology of the network may change dynamically† due to node failure. It can happen because sometimes motes in some specific areas may be damaged and fail. In some network topologies motes have a sleep/awake cycle in order to save energy, so the topology needs to change when a mote is not available at a specific time. In WSN unlike MANETs the source of energy is limited and the nodes are sometimes left unattended in places where there is no access to them to change or recharge their batteries. â€Å"The range of communications is typically within a few meters and at low rates (some kilobits per second); there are typically a few kilobytes of memory and the processor may operate at speeds of only some megahertz.† Mote design and communication aspect of WSN is totally application dependent and changes based on different application requirements. Motes in some wireless sensor applications remain sleep for the most of their lifetime and transfer their information in a timely basis in order to save energy. So the traffic flow in the network is almost infrequent and delay time is usually higher than MANET networks. Overview of 802.15.4 1-http://www.ieee802.org/15/pub/TG4.html - IEEE 802.15 WPANâ„ ¢ Task Group 4 (TG4) 2-http://www.zigbee.org/Specifications.aspx a ZigBee Alliance the Official Website 3-http://www.eetimes.com/showArticle.jhtml?articleID=173600329 - EE Times: The global electronics engineering community The IEEE 802.15.4 and the Zigbee alliance have been working together in order to improve WSN efficiency, safety, security, reliability and convenience of this technology. IEEE 802.15.4 focuses on physical layer and MAC layer at the 868MHz (Europe), 915MHz (US) and 2.4GHz (worldwide) ISM bands whereas Zigbee alliances work on higher level protocols. â€Å"The IEEE 802.15 was chartered to investigate a low data rate solution with multi-month to multi-year battery life and very low complexity. It is operating in an unlicensed, international frequency band.† â€Å"Some of the characteristics of IEEE 802.15.4 include: Data rates of 250 kbps, 40 kbps, and 20 kbps CSMA-CA(Carrier sense multiple access with collision avoidance) channel access Fully handshaked protocol for transfer reliability Power management to ensure low power consumption 16 channels in the 2.4GHz ISM band, 10 channels in the 915MHz I and one channel in the 868MHz band.† â€Å"The ZigBee specification enhances the IEEE 802.15.4 standard by adding network and security layers and an application framework. From this foundation, Alliance developed standards, technically referred to as public application profiles, can be used to create a multi-vendor interoperable solutions. For custom application where interoperability is not required, manufacturers can create their own manufacturer specific profiles.† [2]Some of the characteristics of ZigBee include: Global operation in the 2.4GHz frequency band according to IEEE 802.15.4 Regional operation in the 915Mhz (Americas) and 868Mhz (Europe). Frequency agile solution operating over 16 channels in the 2.4GHz frequency Incorporates power saving mechanisms for all device classes [802]IEEE 802.15.4 standard defines PHY (physical layer) and MAC (medium access control) layer for the purpose of low data rate wireless communications which consume very low power. Physical Layer Some of the main characteristics of the PHY are the processes of sensing the environment, turning on/off the transceiver, estimating the receiver power/link quality indication and transmitting/receiving the information between two nodes. It finally sends the result of channel assessment to the MAC layer. The PHY is responsible for providing two services: PHY Data Service: â€Å"Enables the transmission and reception of PHY protocol data units (PPDUs) across the physical radio channel. PHY management service There are different frequency bands and data rates which a device should be able to operate with which are summarized in Table ?. Table – Frequency bands and data rates Mac Layer MAC layer provides access to the physical radio channel to transmit MAC frames. Some of the main characteristics of MAC sublayer are network beaconing, frame validation, Guarantees time slots (GTS) and handles node associations. The MAC layer is responsible for providing two services: MAC Data Service: â€Å"Enables the transmission and reception of MAC protocol data units (MPDUs) across the PHY data service.† MAC Management Service IEEE 802.15.4 MAC can work with both beacon enabled and non-beacon models. When it is on non-beacon model it is a simple CSMA/CA protocol but in beacon enable mode it works with super frame structure, shown in Fig. The frame starts with a Beacon which is sent by coordinator periodically. The frame also contains inactive period and active period. During the inactive period the device switches to low power mode and communicate with others during active period. The Beacon Interval is calculated based different attributes. In Active period the portion is divided into 16 slots which consist of three parts: Connection Access Period (CAP), Collision Free Period (CFP) (the GTS sections within it is for specific nodes) and the beacon. Fig Superframe structure Network Topologies ZigBee supports 3 types of topologies: Star, Mesh(peer-to-peer) and Cluster tree as shown in Fig . – Star topology: In this topology the communication is only between the single central controller called Personal Area Network (PAN) coordinator and other devices in the network which is mostly suitable for small networks such as single hop networks. A PAN coordinator usually has a unique identifier which is only used by this specific coordinator and allows different star networks to operate separately in the same area. – Mesh topology: This topology also has a PAN coordinator like Star topology but with the difference of having communication not only between coordinator and devices but between devices as well when they are in the range of one another. Although it makes the network structure more complex, but as a result of allowing multi-hop routing it is suitable for large networks. It also can be an adhoc network with self-healing and self-organizing characteristics. – Cluster tree topology: Cluster tree network is a form of peer-to-peer network. One coordinator operates as a PAN coordinator which has the responsibility of defining Cluster Heads (CH). The CH is a kind of Full Function Device (FFD) which can act as a coordinator. Each Reduced Function Device (RFD) then can selects its CH and joins that cluster. This kind of structure has a great impact on energy saving in the network which will be discussed later. Fig Topology Model Energy Conservation and measurement: [24]A wireless sensor network is created with hundreds or thousands of sensor motes, distributed independently in a remote area with the responsibility of sensing the environment, processing information and communicating with other motes in the network for years with a limited source of energy provided by a small battery which is almost impossible to be changed or recharged during motes life time. Therefore the concept of energy consumption management in the network has become one of the most important aspects of wireless sensor network design and implementation. The power saving approach has affected the mote design, power management strategies, communication and routing protocols of the WSN. Generally energy saving methods are divided in two major categories: Energy saving at Mote level; aims to selects the most energy efficient components of the device and trade off unnecessary operations in order to save energy based on the application requirements. Energy saving at Communication level; selecting the most efficient communication methods and protocols to conserve energy at this level. Power saving at mote level: The first step in saving energy at mote level is to find out where the energy is consumed in the mote. As it was mentioned before, a mote consists of 4 components: Processing Unit, Sensor, Transceiver and a Power supply to provide energy for the mentioned parts. Based on the experimental measurements in [40] data transmission is more energy consuming that data processing. Passive sensors such as temperature sensors on the other hand consume a small amount of power compared to other components which is almost usually negligible. Table shows a power model of a Mica2 mote in different states. How to cite Wireless sensor network and its Applications, Essay examples

Saturday, December 7, 2019

Organisation Equality and Diversity Research

Question: Discuss about the Organisation Equality and Diversity Research. Answer: Introduction: It is often been controversial that empathy and trust are essential and important for having an effective and cooperative workforce in an organization. It should also be noted that trust is essential in all aspects of life, i.e. personal, professional and social. It imbibes friendships facilitating negotiations and bargaining that minimizes costs of transaction related to inter-organizational exchanges. Conflicts regarding international politics are also resolved through trust and empathy (Basu, 2014). The decisions of an organization, mostly related to investments are also affected. Trust facilitates investments of assets in an effective way by giving assurance to the parties that there would be no event of bargaining power abuse post agreement making. Empathy and trust can be considered to be fundamental ingredients to obtain a productive and positive work process and the environment (Colgan, 2015). Literature Overview: The concept of empathy and trust has become so prominent in academic analysis and public debate. The interest in these competencies, especially in the developed countries is related to the affair of trust declining in both governmental and private organizations and the professionals working. This concern has been raised by debates as social capital motion in the developing countries. Gladman, Porock Griffiths said that it should be noted that trust is considered as a major factor that influences aspects like relationship marketing, investments of capital, cross-cultural communication and well as various other types of cooperation (Gladman, Porock Griffiths, 2014). It has become very important with time to have proper trust management inside the organizations. As per Hill, the assignment deals with the review of empathy and trust in an organization. However, major challenges that are methodological and conceptual that is to be addressed while analysing this vital concept (Hill, 2015 ). Trust has been an important factor for prediction of outcomes related to cooperative behaviour, organizational commitment, citizenship behaviour in an organization, and loyalty of the employees. In order to build trust among the employees within an organization, it should be the desired goals of all the employees. As per Heales et al, the challenge is how to develop and efforts to maintain the trust among the employees and by the employees in the organization. Empathy and trust are the fundamentals to have effective communication, understanding, and relationships (Heales et al., 2016). These two factors are essential for developing and improving the solutions, retaining and winning the business along with diffusing or avoiding conflicts. Trust and empathy are necessary to retain the customers and handling the complaints (Henderson Bigby, 2016). According to the recent times, there is more demand to be more efficient in communication in order to be successful in handling business as well as life. According to Love, Lopez Kim, the steps associated with sales that are closing techniques, persuasion, benefits and features do not contribute in building relationships and rapport that can be specified as trust, empathy, sympathetic and understanding communications. Persuasion from one side does not sustain for a longer term and is often found to be insulting, mostly while handling the complaints (Love, Lopez Kim, 2014). Empathy and trust are way more crucial to achieve and have a sustainable business as well as personal relationships. There have been instances; it is hard to sell when many consumers and people associated with business are not much interested in exposing themselves to the circumstances where there are chances of being asked to make decisions (Lewis, 2015). This results in extra pressure on the arrival process of a deal. For this special skills are required to manage the circumstances under which business is executed. Petersen, Tabita Agger said tha t most of the business gurus who are associated with the areas of management, communications, and self-development are referred in some or the other way to the significance of empathy which the real comprehension of the feelings and position of the other person. Having the ability to step back and make efforts in achieving detachment from emotions is necessary for having constructive and effective relationships (Petersen, Tabita Agger, 2015). Trust has been studied in various disciplines and every discipline has its own definitions, findings, and concepts. Mostly trust is treated as a state, expectation or belief in a positive way. As per Shanahan et al, it can also be defined as the expectations that people, or institutions or groups with which we come in contact with cooperate and interact and act in conductive ways to well-being of all (Shanahan et al., 2015). However, in most of the cases being sure of others is not feasible as others prove to be free agents and trusting them is a kind of gamble that involves certain risks. It is risky for the future and the contingency is the action of others. There are different models of trust, most of them take the tractors perspective or are static. Among the few proposers of trust theories, Zand is one who presents a very prominent interactive model. Consideration is made between "P" and "O" to be two individuals in the scene. If it happens that P lacks trust, he will tend to disclose some accurate or relevant information, become not willing to influence sharing and have the tendency to control O (Tierney et al., 2014). If the assumption is taken that O is lacking trust and perceives the initial behaviour of P as not worth trusting. O will feel the justification in mistrusting P. As P will perceive behaviour of O as not worth trusting, he will get the confirmation in the expectation which he had initially that O would not worth trusting and P will tend to behave with lesser trust than when he did enter. Some features of trust concepts are also found such as: Trust is interpersonal Trust is situational rather than a global influence Trust must be voluntary as it is a choice and not compulsion. Trust depends on being conscious as both the parties are very much aware of each other's trust. Empathy is the capacity of relating and experiencing the emotions, experience or thoughts of others. Empathy can be devoted to be much more than conventional sympathy that is being able to support and understand others with sensitivity or compassion. As per Uppal, in a workplace environment, being empathetic can show respect for colleagues showing the care which is like going reverse of the rules and regulations (Uppal, 2016). It can be considered as a powerful tool in the belt of leadership of a well-respected and well-liked executive. Empathy, in an organization, gives rise to a safe feeling with personal failures. Leaders are also encouraged to understand the main cause of performing poorly. One of the models of empathy was derived by Fleiss. He stated that empathy is the trial identification and its process can be described as to involve four parts that are distinct. The first part includes the analyst as the object of strive on an individual. Secondly, the second person identifies with the first person who is to be emphasized and replicates him (Walton, 2015). After having experienced the strife of the individual, the analyst reflects it back to the first person with knowledge that in internal. From the stated process, the analyst acquires the basics of emotions for his or her interpretation. Diagnostic Tools Used During the Study: Johari Window: This is a technique which is used in assisting people in understanding relationships with others as well as themselves. This tool was created by psychologists Harrington Ingham and Joseph Luft in the year 1955. It was used during the study as this tool primarily assisted groups that are self-help by nature and corporate organizations as heuristic exercise. As per Wates, this exercise involved subjects who were provided with a list of adjectives and they had to choose some that appeared to them as describing their personality (Wates, 2014). The peers of the subject were given the list and every individual had to choose adjectives of the same number that gave the description of the subject. The adjectives were then placed in a grid during the study. Thomas-Kilmann Conflict Questionnaire: The second tool that was used during the study was the Thomas-Kilmann Conflict Questionnaire which had many pairs of statements which described probable responses corresponding to the behaviour regarding a situation of conflict. One had to choose either A or B among the options if they corresponded to the behaviour of the individuals. If it did not resonate with their behaviour, they were free to select the statement or responses which he or she would feel like using more. Some of the statements from the questionnaire are: There are situations when I happen to let other people be accountable for problem-solving. Instead of negotiating things upon which we disagree, I give efforts on those matters on which both the parties agree. A. I give efforts in finding a compromising solution. I happen to handle all of the concerns, both of the other party's and mine. The third tool that was used by during the group study was the Belbin team inventory. It is a tool that helps in measuring the behaviour of each team player and provides the language in order to ensure that proper collaboration and communication of better understanding happens between the teams. Each and every team is its diversity and thus, Belbin team inventory helped in identifying the strengths and weaknesses of the team. This tool was used as it finds application in the management of change, management of conflict, coaching, recruitment and development of leadership (Zhang et al., 2014). The development of plans and goals that are professional are complemented by this comprehensive tool. This tool was also used during the study to seek positive impact on individual working environment and relationships currently. The results of the diagnostics tests were as follows: Understanding of the way the team members saw themselves within the environment of work. Learning a language that was common in order to communicate with the collaborations and teammates. Understanding along with having a visualization of how the roles of the team would come to life. The strengths that were identified during the study were that the team members became diligent, earnest, anxious for effectiveness, perfection and having polished results, troubleshooting of issues. The weaknesses that were observed after scrutinizing the entire work in order to find errors are inclined towards unduly worries and being reluctant for delegation. Realistic Development Plan After proper study throughout the task through the diagnostic tools and literature overview, the following realistic development plan was made. What do I want/ need to learn? What will I do to achieve this? What resources or support will I need? What will be my success criteria? Target dates for review and completion 1) To be able to manage team effectively So as to manage a team effectively, crucial requirement of being able to communicate effectively, managing time properly, leadership, team issue resolving skills, etc. are required. For this a plan is required to be designed with an executable strategy and implementation of the plan has to be done as efficiently as possible. To have a team building up or to have an effective team, it is mandatory to get the support of the individual team members. In order to boost up the effectiveness of communication, there has to be encouragement among the members of team regarding interpersonal relationship. The success of every individual team members is the foundation of the success of the leader of the team. The success also depends on the efforts that will be in the direction of achieving effectiveness in team management so as to be effective in all aspects. The Belbin team inventory can provide with the knowledge regarding being able to accept challenges, ability to thrive under pressure and courage to cross over obstacles professionally. It would provide with the required drive in order to ensure that the team keeps accelerating and never loses momentum or its force. 2) Development of personal identity: To develop professional identification, knowledge of expert standards, skills that are enhanced and behaviour that is appropriate are essential. These three elements need to be implemented in balanced ways so that the identity in a professional scenario is achieved as well as enhanced. A logical observation has to be done along with making judgements that would be completely impartial according to the requirement. Weightage has to be given to the options of the team in a way that is dispassionate so as to enhance individual identification in workplace. Having an explicitly defined professional behaviour will help to have an enhanced professional identification. Learning the tacit behaviours that are according to the norms of the company or the organization is also important. High rate of success will be determined by learning the appropriate behaviour associated with the professional identification in an organization. Conclusion: In an organization where trust and empathy are low, negative consequences associated with economies can be expected. Every aspect running the organization would be costlier and longer in duration as people in the organization will be needed to take various measures in order to compensate for low trust. The leaders in the organization do realize while calculating and analyzing the costs that how not having standardized trust becomes a hindrance in economic matters in the growth of the organization. Thus, reviewing the significance of empathy and trust in an organization has been able to provide us with valuable knowledge. References Basu, R., 2014. Managing quality in projects: An empirical study. International journal of project management, 32(1), pp.178-187. Colgan, F., 2015. Voice and visibility: tackling the'invisibility'of the sexual orientation strand in UK organisation equality and diversity research (Doctoral dissertation, London Metropolitan University). Gladman, J., Porock, D. and Griffiths, A., 2014. Better mental health: care for older people with cognitive impairment in general hospitals. Final report. NIHR Service Delivery and Organisation programme, 2012. Hill, R., 2015. Addressing inequalities: Rebecca Hill on how her organisation grew confident using the Health Equalities Framework tool in a virtual environment. Learning Disability Practice, 18(8), pp.13-13. Heales, L.J., Hug, F., MacDonald, D.A., Vicenzino, B. and Hodges, P.W., 2016. Is synergistic organisation of muscle coordination altered in people with lateral epicondylalgia? A casecontrol study. Clinical Biomechanics, 35, pp.124-131. Henderson, D. and Bigby, C., 2016. We Were More Radical back then: Victoria's First Self-Advocacy Organisation for People with Intellectual Disability. Health and History, 18(1), pp.42-66. Love, P.E., Lopez, R. and Kim, J.T., 2014. Design error management: interaction of people, organisation and the project environment in construction. Structure and Infrastructure Engineering, 10(6), pp.811-820. Lewis, R., 2015. The organisation of care for people with multimorbidity in general practice: An exploratory case study of service delivery. Morris, L., Pallister, C. and Lavin, J., 2015. Pilot analysis exploring the impact of deprivation on engagement and weight outcomes in people attending a commercial weight management organisation. Appetite, 87, p.400. Petersen, N. and Tabita Agger, B., 2015. Social Work with Homeless People and IT in the projekt UDENFOR Homeless Organisation. Homeless in Europe, Spring 2015, 1011. Viitattu 5.1. 016. Shanahan, C.J., Hodges, P.W., Wrigley, T.V., Bennell, K.L. and Farrell, M.J., 2015. Organisation of the motor cortex differs between people with and without knee osteoarthritis. Arthritis research therapy, 17(1), p.164. Tierney, S., Stock, N., Preston, R. and Cunniffe, C., 2014. Stronger together: collective endeavours of a cleft and research organisation to promote the role of young people affected by a cleft in research. Uppal, N., 2016. A study of culture in a non-profit organisation in India: organisational development and change. Journal for Global Business Advancement, 9(3), pp.215-230. Walton, M.H., 2015. Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation. Ashgate Publishing, Ltd.. Wates, N., 2014. The Community Planning Handbook: How people can shape their cities, towns villages in any part of the world. Routledge. Zhang, L., Luo, Y., Tao, F., Li, B.H., Ren, L., Zhang, X., Guo, H., Cheng, Y., Hu, A. and Liu, Y., 2014. Cloud manufacturing: a new manufacturing paradigm. Enterprise Information Systems, 8(2), pp.167-187.

Saturday, November 30, 2019

The Precedence of Perseverance free essay sample

During my eighteen years of existence I have been subjected to countless advisements, proposals, teachings and guidance. And though I am extremely grateful for all the lessons have I have encountered, one specific piece of advice triumphs over the rest. A British author known as Samuel Johnson once declared, â€Å"Great works are performed not by strength, but by perseverance.† The significance and impact that this quote had over me was enough to form and shape my behaviors for the duration of my high school career. I spent all four years attempting to maintain an aura of diligence and understand the components of perseverance. If one were to look up the definition of perseverance they would simply see a cluster of large synonyms that have little purpose and lack compelling denotation. Nevertheless, over the years I have learned that perseverance is more of a state-of-mind than it is a simple adjective. In 2007 when I became a high school student I quickly realized a lot of things about myself. We will write a custom essay sample on The Precedence of Perseverance or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page I became aware that success was an important part of my education and in order to obtain my desired success, I was going to have to develop an incredibly persistent work ethic. I made a plan to always take notes in class and never miss a homework assignment. Little did I know, however, that those were only the beginning steps in becoming an accomplished student. I needed to demonstrate my ability to remain determined, focused, and devoted. Even being slightly stubborn and relentless proved itself helpful when it came to challenges in my education. In specific subjects such as Math and Science the words of Johnson seemed to have a surprising effect on me. Algebra and Chemistry contained some of the hardest concepts I’ve ever had to deal with. It was in these two classes that I learned I did not possess the natural strength that these subjects required. What I did possess, however, was perseverance. I worked unbelievably hard, spending many of my lunches, studies, and afternoons obtaining extra help in both classes. I became focused on not just learning the material, but actually understanding it. The notes and homework assignments went beyond normal school work and I treated every task like it was a test. I soon realized that I was no longer treating these courses like a high school class, rather a personal assessment taxing my endurance. I had now entered a state-of-mind. The exact state-of-mind that is perseverance. The quote by Johnson has taught me that to persevere is to maintain the highest level of motivation that one has. High school was a time for me to perfect my capability to persevere and I plan to use my capabilities starting the first day I walk through the college campus doors. The ability to remain motivated and maintain immunity against defeat is perhaps the most important ability that one can acquire. For me, I was able to begin my journey towards this ability due to the insightful words of Samuel Johnson.

Tuesday, November 26, 2019

The modern finance theory is based on the capital asset pricing model The WritePass Journal

The modern finance theory is based on the capital asset pricing model Abstract The modern finance theory is based on the capital asset pricing model AbstractIntroductionTheory2.1 Prospect Theory2.1.1Certainty Effect2.1.2 Reflection Effect2.1.3 Isolation Effect2.2 Behavioural Capital Asset Pricing Theory2.3 Behavioral Portfolio TheorySome Models3.1 DSSW Model3.2 BSV Model3.3 DHS Model3.4 HS ModelAnomalies4.1 Closed-end fund puzzle4.2 the equity premium puzzleConclusionReferenceRelated Abstract As some anomalies are hardly explained by the traditional finance, the behaviour finance is introduced. It was first introduced by Kahneman and Tversky (1979), which they presented the prospect theory. In fact, investors’ behaviour often violates the expected utility theory, some of them trade irrrationally. Then Shefrin and Statman (1994) base on the CAPM, and put investor sentiment into the model to make the BAPM. They thought noise traders and information traders would interact and influenced the price setting, including the noise traders’ behaviour in the BAPM let the asset pricing more precise. Another important theory is the behavioral portfolio theory. The theory states that when investors choose portfolios, they on the one hand want to be security, while on the other hand they potentially also want to reach aspiration levels. So it lets BPT investors to choose bonds and lottery tickets together come true. According to these phenomenon which happen to investorsâ €™ portfolio selection, many researchers give their explaination. Generally speaking, bahaviour finance is based on two theories, which is limits of arbitrage and investor sentiment. DSSW model is based on the former theory while BSW model, DHS model and HS model are based on the latter one. There are also some more models in the behaviour finance area. These models can explain some anomalies, such as Closed-end fund puzzle and the equity premium puzzle. In this paper these two anomalies would be treated as examples to explain how behaviour finance explain these anomalies. Introduction The modern finance theory is based on the capital asset pricing model (CAPM), Markowitz’s Portfolio Theory, Arbitrage Pricing Theory (APT). The model CAPM is introduced by Sharpe (1964), Lintner (1965), and Black (1972). It provides the pricing mechanism of capital assets and the decision factor of risk isÃŽ ²(the relationship between firm returns and market returns). These theories are based on the Efficiency market hypothesis (EMH) and the CAPM can be used to test the EMH. While its analysis framework confined within the scope of rational analysis, when more and more anomalies arise in the market, they are hard to be explained by standard finance which is based on the EMH. In this situation, the questioning of modern finance beginned when the prospect theory is introduced by Kahneman and Tversky (1979). And then the behavioural finance is introduced to explain these snomalies. The definition of behavioural finance is that â€Å"Behavioural finance- that is, finance from a broader social science perspective including psychology and sociology- is now one of the most vital research programs, and it stands in sharp contradiction to much of efficient markets theory.† (Shiller, 2003 p83) It is a Marginal subject and opposite to the traditional finance, and it tries to explain the importance of investors’ emotion and mental mistakes, which would influence their decision-making process (Ricciardi and Simon, 2000). At first, behaviour finance is marginalized as â€Å" anomalies literature† (Frankfurter and McGoun, 2000).it has been researched for a long time, and then it has been accepted after more and more journals focusing on the discussion of anomalies. Section 2 of the paper explains three main theories of behaviour finance, which are prospect theory, behavioural capital asset pricing theory and behavioral portfolio theory. Section 3 presents some models which provided by the behaviour finance. Section 4 discusses the application of behaviour finance to explain anomalies. Section 6 concludes. Theory 2.1 Prospect Theory Prospect theory is the one of the most important theory in the behavioural finance. Investors   usually do not perform rationally, and prospect theory handles this issue. Expected Utility Theory is a kind of desceiptive model which is used to make decisions under risks, and the result is a criteria for investors to choose. While a large number of experimental research shows that investors choices are inconsistent with the basic tenets of utility theory. Kahneman and Tversky (1979) classify these differences into some areas, which is certainty effect, reflection effect and isolation effect. 2.1.1Certainty Effect Certainty effect is people often underestimate outcomes which are probable when compare outcomes which are received with certainty (Kahneman and Tversky, 1979). In order to demonstrate this issue, Allais (1953) gives a series of choice problems. On of the problem is that: Option 1: 2,500 with probability   0.33 2,400 with probability   0.66 0 with probability  Ã‚  Ã‚  Ã‚  Ã‚   0.01 Option 2: 2,400 with certainty The question is which option would give you the best chance to maximize your profits? The result shows that 82% people choose the option 2 among 72 people, most of them violated expected utility theory. According to the expected utility theory, the profit in option 1 (2500*0.33+ 2400*0.66+ 0*0.01= 2409) is greater than the option 2 (2400), while people prefer choosing the profit which is certain rather than choosing the profit which is risk. 2.1.2 Reflection Effect While when gains are replaced by loses, the result would be that the risk preference of people is contrary to the positive prospects, it transfers from risk aversion to risk seeking, and this is labeled as the reflection effect. For example, 92% people choose a probobility of 80% to loss 4000 when they are offered another choice which is a certainty loss of 3000. This example also shows that not only the positive domain violate the expected utility theory, but also the negative domain violate it in the same manner. 2.1.3 Isolation Effect When people choose one investment between alternatives, they usually exclude the common factors to consider, and focus on their different components. This division would lead to different reslults, for the same pair of investments can be divided into common and distinctive components in many different ways. This phenomenon is called the isolation effect. For example there is two-stage choice problem, the first stage is that people have a probability of 0.25 to go to the second stage, and in the second stage, you have to have a choice between the winning 3,000 of certainty and winning 4,000 of 0.8 probobility. The result states that 78% of 141 people choose the former one. While in this game, people should have had a choice between 0.25* 0.8= 0.2 possibility to win 4,000, and a 0.25* 1.0= 0.25 possibility to win 3,000, and this choice was demotrated by Allais (1953) that a marjor of people would choose a 0.2 chance to win 4,000. so in this situation, people ignore the first stage and based on the second stage to choose prospect. Prospect theory divides the choice process into two phases, one is editing and the other one is evaluation. Editing phase is used to analyse the options in order to get the simplified result, evaluation is to evaluate the edited prospects and choose one which has highest value. Editing includes four operations which are coding, combination, segregation and cancellation. According to the prospect theory, if a prospect is regular (p + q 1, or x ≠¥ 0 ≠¥ y, or x ≠¤ 0 ≠¤ y ), which also means neither strictly positive nor strictly negative, the equation would be: (1)  Ã‚   V(x, p; y, q) = Ï€(p) v(x) +Ï€(q) v(y) In this equation, the total value of an edited prospect is denoted V, and   it is expressed by two scales. The first scaleÏ€is connected with each possibility p and the decision weight isÏ€(p), the other scale is v, which the outcome is v(x) with a number x. the value of prospect in Equation (1) is the same as the result of expected utility theory. While if the prospects are strictly positive or strictly negative, they must use another rule. When prospects are in the editing phase, they are often divided into two parts, which is the riskless part and the risky part. The evaluation would use the next equation: If p + q = 1 and either x y 0 or x y 0, then (2)  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   V(x, p; y, q) = v(y) +Ï€(p) [v(x) – v(y)] It means that the value of a strictly positive or strictly negative prospect is the same as the sum of the value of the riskless part and the value-difference between the outcomes multipling the weight associated with the more extreme outcome. Investors evaluation base on the value function and weighting function (Kahneman and Tversky, 1979). Prospect theory uses value function to explain the same meaning of utility. There are two arguments in the value function, the first one is the asset position which can be treated as reference point, and the other one is the magnitude of the change from the reference point. Value function normally concave for positive outcome and convex for negative outcome, and the losses is steeper than the gains. When the value approachs to the reference point, the value fuction is steepest, and the whole value fuction is S-shaped. Decision weights are usually different from the probability axioms, investors often overestimate the small probabilities, this situation often happens in gambling and insurance. While for other situations, decision weights are commonly lower than the corresponding probabilities However, there are two drawbacks existing in the prospect theory. Firstly, it uses the value function and weighting function to evaluate theory, while there are no specific functions and instead using examples to explain. It is a kind of experimental process. Secondly, there is no specific standard for reference point, it makes the theory not so pricise. 2.2 Behavioural Capital Asset Pricing Theory The behavioural capital asset pricing theory is based on the capital asset pricing model (CAPM) and the difference is that the behavioural capital asset pricing theory consider the behaviour of traders. It focuses on the market which noise traders and information traders affect each other. Information traders are traders in the condition of CAPM, they obey the Bayesian learning rule to evaluate the returns and most importantly, they never make cognitive errors. However, noise traders are contrary to information traders, they commit cognitive errors and break the Bayesian rules. These two traders interact and determine the asset price. Market is efficient when information traders are dominant in the market, while if dominant traders are noise traders, market is inefficient. What is the difference between markets in which prices are efficient and markets in which prices are not efficient? The main difference is that there is a single driver property existing the market which prices are efficient. As Shefrin and Statman (1994, p345) said, â€Å"This single driver drives the mean-variance efficient frontier, the return distribution of the market portfolio, the premium for risk, the term structure, and the price of options.† It satisfies the minimun information which required to cause the changes to the outcome distribution of the market portfolio. While a second driver is introduced to the market by noise traders, and it let the price far away from the price efficiency. They often creat some abnormal returns to particular securities. The expected return of security is determined by behavioural ÃŽ ², which is the ÃŽ ² of tangent mean variance efficient asset portfolio. Noise traders’ action let the relationship between security returns and bet a weaker. While at the same time, they built a positive relationship between abnormal returns and beta (Chopra, Lakonishok, and Ritter, 1992). When the prices are efficient in the market, price efficiency protects particular noise traders. At that time, the function of noise traders is to rise the trading volume. However, if the prices are not efficient, new information cannot be a sufficient statistic. Yet prices, volatility, the premium for risk, option prices and the term structure are still influenced by old information. Noise traders affect the return of securities through the term structure and they can arouse inefficient inversion which exists in the term structure. The behaviourÃŽ ² is introduced by the behavioural asset pricing model (BAPM), when the noise traders are included in the model, the behaviourÃŽ ² represents a lower risk than the traditionalÃŽ ². The BAPM research a series of issues such as risk premium, the term structure, and option prices in the situation of existing noise traders. The BAPM not only considers the performance characteristics of value, but also includes the characteristics of utility, therefore, on the one hand it has to accept the market efficiency when considering the unbeatable market, on the other hand it must reject the market efficiency when consider the irrational behaviours. This contradiction lead the finance to further research. 2.3 Behavioral Portfolio Theory The behavioural portfolio theory (BPT) is introduced by Shefrin and Statman (2000) and it is based on the SP/A theory (Lopes, 1987) and Safety-First Portfolio theory (Roy, 1952). Roy’s (1952) safety-first theory and Markowitz’s (1952a) mean-variance portfolio theory are introduced at the same year, however their opinion are different to the Friedman-Savage puzzle. The former theory is consistent with the puzzle while the latter one is not. SP/A theory is a psychological theory and it has been a choice framework. Security, potential and aspiration are the meaning of letters SP/A and they also reflect investors’ choice under uncertainty. The efficient frontier of BPT is different from the mean-variance efficient frontier, and the optimal portfolios of BPT and CAPM are not the same. BPT investors think about the expected wealth when they select portfolios. On the one hand, they want portfolios to be security, on the other hand they potentially want to reach aspiration levels. So BPT investors combine bonds and lottery tickets together. The BPT is classified into two versions, a single mental account version (BPT-SA) and a multiple mental account version (BPT-MA). Their differences are that BPT-SA investors use a single mental account to manage their portfolios while BPT-MA investors use several mental accounts to integrate their portfolios. So BPT investors are the same as investors in the Friedman-Savage puzzle, they both present risk averse and risk seeking. They buy risk-free investments for the low aspiration mental account and buy speculative bonds for the high aspiration mental account. BPT-SA investors treat the portfolio as a whole like mean-variance investors, and they also take covariances into consideration. So the framework of choosing portfolio are similar between BPT-SA and mean-variance theory, the difference is that their efficient portfolios are not the same. Portfolios in the BPT-MA is like layered pyramids, and every layer has its own aspiration level. The bottom layer is designed to protect investors from poverty and the top layer let investors have a chance becoming rich. BPT-MA investors are quite different from BPT-SA investors, they ignore covariances and treat portfolios separately in to different mental accounts. Because BPT-MA investors ignore covariance between layers, there is a risk that they may put the same security but with different positions into different layers. The similar evidence is provided by Jorion (1994), he finds that when investors invest globally, they put securities and currencies into different layers of the pyramid, while he thinks the overlay structure is not so useful, because it overlooks covariances between securities and currencies and it leads to 40 basis points loss of efficiency. Some Models 3.1 DSSW Model Behaviour finance is based on two theories, which is limits of arbitrage and investor sentiment. According to the tradition finance, arbitrage plays a key role in achieving the market efficiency. Its basic point is that even irrational investors exist in the market and let prices deviate their value, rational investors would eliminate their influence to prices, and finally prices and the value are consistent. However, behaviour finance thinks arbitrage is not unlimited, one of the reason is that arbitrageurs are risk averse and have resonably short horizons, its posibility to be dominant is small. For example, when arbitrageurs sell assets short, they first must know noise traders are bullish and they must be bullish in the future, And then noise traders would buy back the stock. While it is hard to predict noise traders thought, so arbitrageurs have to bear the risk and this would limit their willingness to take position against noise traders. The model consists of noise traders and sophisticated investors. There are some investors not following economists’ advice to invest, and they only trust their own research. So Black (1986) called these investors who have no private information and irrationally act â€Å"noise traders†. Noise traders obtain lots of information which comes from technical analysts, economic consultants and stockbrokers and they falsely believe this information is useful to predict the future price of risky asset. So noise traders choose portfolios according to such incorrect beliefs Alpert and Raiffa (1982). On the contrary, sophisticated traders make use of noise traders’ irrational misperceptions. They buy stocks when noise traders depress prices, while they sell stocks when noise traders think prices would be bullish. According to the risk of noise traders, the model can explain some financial market anomalies. These anomalies are the excess volatility of and mean reversion in stock market price, the Mehra-Prescott equity premium, the closed-end fund puzzles and some other anomalies. However, there is a drawback existing in the model, which is that it can not explain how investors make decisions. The assumption is that investors base on the behaviour portfolio theory to choose their portfolios, according to the different layers, they make different investment choices even for same assets. 3.2 BSV Model A huge amount of empirical evidence have shown two kinds of pervasive phenomenon, which are underreaction and overreaction of stock prices. Underreaction means that investors predict higher average return than the actual average return when good news are announced. in other words, the stock underreacts to the good news. if the average return comes from a series of announcements of good news and it is lower when compared with the average return coming from a series of bad news announcements, it is defined as overreaction (Barberis, Shleffer, and Vishny, 1998). BSV model is introduced by Barberis, Shleffer, and Vishny (1998). Investors often present two phenomena, which is conservatism and representativeness heuristic. Conservatism can be defined that people often react slowly when people encounter new evidence (Edwards, 1968). When investors face evidence which has high weigh but low strength, they do not care much about the low strenngh and react moderately to the evidence. While if the evidence has high strength but low weight, they overreact it like representativeness. Representativeness heuristic is the second important psychological phenomenon (Tversky and Kahneman, 1974). It means that investors focus on recent patterns in the data while give little weight to the properties of the population which generates the data (Fama, 1998). In the situation of representativeness heuristic, if a company performs well in the past and has a high growth, investor would ignore the truth that this well perform would hardly repeat itself. The result would be that they overestimate the value of the company and be disappointed when the expected growth does not come true. The BSV model bases on the two phenomena, and explain how investors decision-making model leads to the market price deviating the efficient market. The model also deals with the problem why arbitrage is limited, the reason it that investors’ sentiment are hard to forcast. The more extreme of investorsà ¢â‚¬â„¢ sentiment, the more further of price away from the actual value. It is known that earnings are a random walk, while investors falsely classify them into two earnings regimes. They underreact or overreact to a change in earnings, these lead to short-term momentum in stock returns and long-term reversal. The BSV model perform well on the anomalies it was designed to explain, while the forcast of long-term return reversal is not so good. 3.3 DHS Model Daniel et al. (1998) also provide a model which includes investor sentiment to deal with the situation of overreaction and underreaction. They try to use psychological theory to support their framework and classify investors’ sentiment into overconfidence and biased self-attribution. Overconfidence is defined that investors often overestimate their forecast ability when they have more significant information than others, so they often overlook their prediction errors. Biased self-attribution is investors feel confident when they find public information is the same as their information, but the confidence would not decrease proportionately when public information is opposite to their private information. According to the DHS model, it has been known that investors overreact to private information, while on the contrary investors underreact to public information signals. When public information signals eliminate behaviour bias, this would lead to short-term momentum of stock returns while long-run reversal. The model can reconcile this situation, it transfers the wealth from imperfect rational traders (e.g. noise traders) to rational traders and then price setting is dominated by rational traders. While even in this situation, rational traders could not be predominance in the long term. De Long et al. (1991) state that noise traders are risk averse and they prefer investing more money to risky, high expected return assets, if they overconfident about the true information signals, they would obtain more profits than those rrational investors. The forcasts of DHS are similar with BSV, they share the same empirical successes and failures. And this comment can also apply to Hong and Stein (1997). 3.4 HS Model The model is provided by Hong and Stein (1999) in 1999, it also called the unified behaviour model. The model is different from BSV model and DHS model, it classifies agents into newswatchers and momentum traders. Each of them are restricted rational. Newswatchers making investment dicisions base on private information signals of movement of future values. Their drawback is that they do not use the current or past prices to choose portfolios. While on the contrary, momentum traders mainly base on the movement of past prices changes to invest. However, they also have limitations, which their forecasts should be â€Å"simple† function of the history of past prices. In this model, there is one more assumption, which is private information would spread slowly in the newswatcher group. The underreaction and overreaction are based on the private information spread slowly across the newswatcher population. As first, newswatchers underreact to the private information, then momentum tr aders try to make use of it to arbitrage, while it leads to overreaction. Anomalies 4.1 Closed-end fund puzzle There are some anomalies existing in the financial market, one of them is closed-end fund puzzle. The definition of it is that: â€Å"The closed-end fund puzzle is the empirical finding that closed-end fun shares typically sell at prices not equal to the per share market value of assets the fund holds† (Shleifer and Thaler, 1992, p. 75). The puzzle is that closed-end funds are sold with 10 percent premium at first, while after around 120 days, the premium of 10 percent moves to a discount of over 10 percent (Weiss, 1989). And then discounts fluctuate over the period of funds, they would narrow and then disappear until the closed-end funds terminate. This proposition has been researched in the past, they pointed out that the value of securities maybe overstate when compared with their true value of the assets. And they provided three explainations, which are agency costs, tax liabilities and illiquidity of assets. Generally speaking, agency costs are constant, it cannot let prices fluctuate. Moreover, it even cannot explain why rational invettors buy funds at a premium initially and finally sell them at a discount. Restricted stock and block discount hypotheses are two versions of asset illiquidity, they explain the reason to sell stocks at a discount, that is, trading fees are expensive. The tax liabilities’ explaination is that the gain tax has included in the funds, so discounts happen. while these three standard explanations cannot explain the puzzle together or separately. Another explaination is provided by De long, Shleifer, Summers and Waldmann (1990) (DSSW). They develop DSSW model to explain rational investors and noise traders interact in financial markets, and the key point is that noise traders’ sentiment are unpredictable. So the noise traders’ sentiment influence the demand of closed-end fund shares and then influence the changes in discounts. The model makes two hypotheses, they assume rational investors are short horizons, they focus on the interim resale of prices rather than the present values of dividends. The other assumption is that noise traders’ sentiment is stochastic and hard to predicted by rational investors. If investors are optimistic about the return of funds, funds will be sold at premia or only a little discounts. While if noise traders are pessimistic, it will result of a large discounts. There are two kinds of risk when investors hold closed-end funds, which are the risk of holding the fund’s portfolio and the risk of noise traders’ sentiment causing prices changes. If noise traders become continuously pessimistic about closed-end funds, this risk would be systematic. And then its influence will not be restricted in the closed-end funds. According to this aituation, it is easy to find that holding the fund is risker than holding its portfolio, and then prices of closed-end funds wou ld be lower than their true value. There is a fact that closed-end funds are mainly traded by individual investors. And individual investors also invest small stocks. According to the empirical evidence which researched by Shleifer and Thaler (1992), it shows that the performance of small stocks also influence the changes of discounts. If the small stocks do well, the discounts of closed-end funds would be narrow. 4.2 the equity premium puzzle When researchers observed the economy of the United States during 1889 to 1979, they found that the annual return of stocks was seven percent, however, the return of treasury bills was less than 1 percent after 1926. Mehra and Prescott (1985) stated that this huge gap causes from the huge difference of risk aversion. They explained the high equity premium with having excess of 30 risk aversion. While the actual figure observed is only close to 1. so it is a problem that why is the equity premium so large. Benartzi and Thaler (1995) gived two concepts which comes from the psychology of decision-making. The first one is loss aversion, and the other one is mental accounting. Loss aversion is similar with the Kahneman and Tversky’s (1979) descriptive theory. It becomes more sensitive to loss money rather than increase wealth. It is also opposite to the expected utility theory. Mental accounting is defined that â€Å"mental accounting refers to the implicit methods individuals use to code and evaluate financial outcomes: transactions, investments, gambles, etc† (Benartzi and Thaler, 1995, p.74). Investors are loss aversion, so if they invest stocks, they would care about the security of portfolios. While stock prices are fluctuated, frequent performance evaluation would make investors feel loss. So stocks are less attracted by investors. Only when the return of stocks keeps a high level, investors would replace bonds with stocks. Barberis, Huang and Santos (2001) explain this puzzle in another aspect and they introduce a model. The model not only bases on the onsumption but also bases on fluctuations of investors’ loss averse. As it is known to all, investors are sensitive to their decrease of wealth rather than to increase. And The changes of loss aversion depends on investors’ prior investment performance. If investors are profit in the prior period, they would become less loss averse. While if the loss is over the profit, or there existing loss in the prior period, investors would become more loss averse. According to this situation ,it needs a large premium to let investors hold stocks. However, the conclusion is made under some conditions. Firstly, researchers only use a single risky asset to do research for the sake of simplicity. So in the real economy which has lots of risky assets, it is not easy to identify what investors are loss averse about. Another one is that it is not clear to what range the preferences can interpret financial data and risky gambles. Conclusion The behaviour finance as a Marginal subject has been developed quickly during the recent years. It combines the finance, psychology, sociology and anthropology to explain finance. According to the empirical research of the finance market, some anomalies cannot be explained by the traditional finance. While the behaviour finance use a unique aspect to systematically explain these anomalies, such as Closed-end fund puzzle and the equity premium puzzle. compared with the traditional finance, the behaviour finance does not have a complete systematic theory. However, the prospect theory (Kahneman and Tversky, 1979), the behavioural capital asset pricing theory (Shefrin and Statman, 1994) and the behavioral portfolio theory (Shefrin and Statman, 2000) constitute the fundamental systematic behaviour finance theory. They introduce an evidence that investors not always perform as rational traders, there are a part of traders perform irrrationally. Traders do not obey the expected utility theo ry. Then talking about the prices setting, the original CAPM model which is used to set prices of asset is not appropriate, noise traders often commit cognitive errors and their actions would influence the price setting. So the BAPM model which includes the investors influence can make prices more real. The main point of BPT theory is that investors choose portfolios basing their different layers of needs. The bottom layer is designed to protect investors from poverty and the top layer let investors have a chance becoming rich. In order to explain anomalies, some models have been introduced. For example, DSSW, BSV, DHS and HS models. They investigate the influence of investors’ sentiment from two aspects, which are limits of arbitrage and investor sentiment. However, the behaviour finance has its inherent drawbacks. As Fama (1998) states that even the behaviour finance can explain some anomolies existing in the capital market, it does not mean market efficiency should be abandoned. The data shows that the frequency of overreaction of stock prices is the same as underreaction, so it can be seen that anomalies are chance results in the market efficiency hypothesis. Moreover, anomalies existing in the long-term return are fragile, they tend to be a reasonable changes. Behaviour finance is the sum of anomolies which EMH and CAPM cannot explain, And it does not have its own independent evidence. So the development of behaviour finance needs further research. Reference Shiller, R. J. 2003. From efficient markets theory to behavioral finance. Journal of Economic Perspectives 17, pp. 83-104. Ricciardi, V. and Simon, H. K. 2000. What is behavioral finance. Business, Education and Technology Journal, fall. Frankfurter, G. M., McGoun, E. G. 2000. Market efficiency and behavioral finance: the nature of the debate. The Journal of Psychology and Financial Markets 1, pp. 200–210. Allais, M. 1953. Le Comportement de 1Homme Rationnel devant le Risque, Critique des Postulats et Axiomes de 1Ecole Americaine. Econometrica 21, pp. 503-546. Kahneman, D. and Tversky, A. 1979. Prospect theory: an analysis of decision under risk. Econometrica 47(2), pp. 263-292. Chopra, N., Lakonishok, J. and Ritter, J. 1992. Performance measurement methodology and the question of whether stocks overreact. Journal of Financial Economics 31, pp. 235-268. Shefrin, H. and Statman. M. 1994. Behavioral capital asset pricing theory. Journal of Financial and Quantitative Analysis 29(3), pp. 323-349. Lopes, L. 1987. Between hope and fear: the psychology of risk. Advances in Experimental   Social Psychology 20, pp. 255-295 Roy, A. D. 1952. Safety-First and the holding of assets. Econometrica 20, pp. 431-449. Markowitz, H. 1952. Portfolio selection. Journal of Finance 6, pp. 77-91. Jorion, P. 1994. Mean-Variance analysis of currency overlays. Financial Analysts Journal 50, pp. 48-56. Shefrin, H. and Statman, M. 2000. Behavioural portfolio theory. Journal of Financial and Quantitative Analysis 35(2), pp. 127-151. De Long, J. B., Shleifer, A., Summers, L. H. and Waldmann, R. J. 1990. Noise trader risk in financial markets. Journal of Political Economy 98(4), pp. 703-738. Alpert, M. and Raiffa, H. 1982. A progress report on the training of probability assessors. In Judgment under Uncertainty: Heuristics and Biases, edited by Daniel Kahneman, Paul Slovic,   and Amos Tversky. Cambridge: Cambridge Univ. Press. Samuelson, P. A. 1958. An exact consumption-loan model of interest with or without the social contrivance of money. J.P.E. 66, pp. 467-82. Black, F. 1986. Noise. Journal of Finance 41, pp. 529-543. Edwards, W. 1968. Conservatism in human information processing. In: Kleinmutz, B. (Ed.), Formal Representation of Human Judgment. John Wiley and Sons, New York, pp. 17-52. Tversky, A. and Kahneman, D. 1974. Judgment under uncertainty: heuristics and biases. Science 185, pp. 1124-1131. Barberis, N., Shleifer, A. and Vishny, R. 1998. A   model of investor sentiment. Journal of Financial Economics 49, pp. 307-343. Fama, E. F. 1998. Market efficiency, long-term returns, and behavioral finance. Journal of Financial Economics 49, pp. 283-306. De Long, J. B., Shleifer, A., Summers, L. H. and Waldmann, R. J. 1991. The survival of noise traders in financial markets. Journal of Business 64, pp. 1-20. Daniel, K., Hirshleifer, D. and Subrahmanyam, A. 1998. Investor psychology and security market under and overreactions. Journal of Finance 53(6), pp. 1839-1885. Weiss, K. 1989. The post-offering price performance of closed-end funds. Financial Management Autumn, pp. 57-67. Shleifer, A. and Thaler, R. H. 1991. Investor sentiment and the closed- end fund puzzle. Journal of Finance 46(1), pp. 75-109. Mehra, R. and Prescott, E. R. 1985. The equity premium puzzle. Journal of Monetary Economics, pp. 145-161. Benartzi, S. and Thaler, R. H. 1995. Myopic loss aversion and the equity puzzle. The Quarterly Journal of Economics 110(1), pp. 73-92. Barberis, N., Huang, M. and Santos, T. 2001. Prospect theory and asset prices. The Quarterly Journal of Economics February. Hong, H. and Stein, J. C. 1999. A unified theory of underreaction, momentum trading, and overreaction in asset markets. Journal of Finance 54(6), pp. 2143-2184.

Friday, November 22, 2019

Chapter 9 Review Questions

Unit 9 (E. B. ) 1. What is magnetism? When two pieces of iron are attracted to each other by physical means or electrical means. 2. Torque is A. Strength that a motor produces by turning. 3. A magnetic field is D. All the above. 4. True or False: A permanent magnet is a piece of material that has been magnetized and can hold its magnetic strength for a reasonable length of time. True. 5. How is an electromagnet produced? Through electricity. 6. Which of the following produces the best electromagnet? B. soft iron 7. Unlike poles of a magnet repel each other and like poles attract each other. 8. What part does polarity play in the operation of an electric motor? It allows the motor to run continuously. 9. What part of a motor produces an inductive magnetic field within itself to facilitate the rotating motion? Rotor and stator. 10. What part does the frequency of alternating current play in the operation of an electric motor? Helps change polarity 120 times a second. 11. What would be the speed of a two-pole motor operating on a 120 volts 60 Hertz power supply? 3450rpm 12. What are the five types of single-phase motors used in the industry? 3. Which of the following correctly lists the motor’s starting torque from lowest to highest? B. Shaded pole, three phase, permanent split capacitor, capacitor start. 14. Which of the following is a common use of a shaded pole motor? A. Furnace fan motor. 15. How does a shaded pole motor operate? The shaded poles produce a magnetic field that is out of phase with the magnetic field of the main winding. 16. How can a shaded pole motor be reversed? The stator must be reversed to change the positions of the shaded poles, and this usually means disassembling the motor. 17. What determines the rotation of a shaded pole motor? B. Location of shaded pole. 18. Draw a diagram of a three speed, shaded pole motor. 19. What enables a split phase motor to develop enough torque to begin rotation? The method of splitting the phase of incoming power to produce a second phase of power, giving the motor enough displacement to start. 20. What removes the starting winding from the electrical circuit of an open type split phase motor once it reaches 75% of its operating speed? Centrifugal switch. 21. What are the three probable areas of trouble in a split phase motor? The bearings, windings, and the centrifugal switch. 22. What is the unit of measurement for the strength of a capacitor? C. microfarad. 23. What is the purpose of the capacitor? To boost the starting torque or running efficiency of a single phase motor. 24. What is the difference between a running and a starting capacitor? Starting capacitors are usually made of plastic and used to assist a single phase motor in starting. A running capacitor has an oil filled case and is mainly used to increase a motor’s running efficiency. 25. List the five capacitor replacement rules. 1. The voltage of any capacitor used for replacement must be equal or greater than that of the one being replaced. 2. The strength of the starting capacitor replacement must be at least equal to but not more than 20% greater than the one being replaced. 3. The strength of the running capacitor replacement may vary by plus or minus 10% of the strength of the one being replaced. 4. If capacitors are installed in parallel, the sum of the capacitors is the total capacitance. 5. The total capacitance of capacitors in series may be found in the following formula: 26. Explain the operation of a permanent split capacitor motor. It has two windings, running and starting. A running capacitor is put in series with the starting winding. The capacitor causes the electron to flow through the starting winding to shift it out of phase with the running winding. Therefore, a rotating magnetic field is set up, causing the rotor to turn. 27. How are a PSC motor and a capacitor start capacitor run motor similar? C. Both use starting relays. 28. What are the advantages and disadvantages of using the following types of motors? A. Shaded pole motor- 29. What are the similarities between an open type split phase motor and a capacitor start motor? C. Both have a centrifugal switch. 30. Which of the following is an advantage in using a three phase motor? B. Stronger. 31. Draw a wiring diagram of a capacitor start capacitor run motor: 32. True or false: All starting apparatuses are mounted externally to the hermetic compressor shell. True. 33. What is the purpose in troubleshooting any electric motor? 34. Which of the following is the capacitance of an 88 uf and a 108 uf starting capacitor connected in series? A. 196uf. 35. Which of the following is the capacitance of two 20 uf running capacitors connected in parallel? B. 20uf. 36. If a capacitor produces 15 A on a 240 volt supply, which of the following is its microfarad rating? A. 166 uf. 37. Which of the following capacitors could be used to replace a 35 uf, 370 volt running capacitor? B. 35uf, 390 volt. 38. Which of the following capacitors could be used to replace a 188 uf, 250 volt starting capacitor? C. 200uf, 250 volts. 39. Which of the following capacitors or combination of capacitors could be used to replace a 45 uf 370 volt running capacitor? A. 40uf, 440 volt. 40. Which of the following capacitors or combination of capacitors could be used to replace an 88uf 250 volt starting capacitor? D. 150uf, 250V. 41. Find the common, start, and run terminals of the following hermetic compressor. 42. Briefly explain the procedure for troubleshooting hermetic compressor motors. Electrically taking resistance readings of the windings with a good ohmmeter. 43. What are the electrical failures categories for hermetic compressor motors? Open, shorted, or grounded. 44. What precautions should be taken when checking hermetic compressor motors? Infinity. 45. What would be the highest allowable resistance reading for a grounded compressor motor? Zero. 46. What are the advantages of using an electronically commutated motor over a PSC motor? 47. Explain the construction of an ECM. The direct current converters convert the alternating current that the power company supplies to direct current, which can then be regulated to vary the speed of the motor. 48. An ECM is a B. Three-phase DC motor. 49. True or False: The resistance readings of the windings of a properly operating ECM should be equal. False. 50. True or False: The line voltage power supply of an ECM should never be disconnected or connected with the power on. True. Chapter 9 Review Questions Unit 9 (E. B. ) 1. What is magnetism? When two pieces of iron are attracted to each other by physical means or electrical means. 2. Torque is A. Strength that a motor produces by turning. 3. A magnetic field is D. All the above. 4. True or False: A permanent magnet is a piece of material that has been magnetized and can hold its magnetic strength for a reasonable length of time. True. 5. How is an electromagnet produced? Through electricity. 6. Which of the following produces the best electromagnet? B. soft iron 7. Unlike poles of a magnet repel each other and like poles attract each other. 8. What part does polarity play in the operation of an electric motor? It allows the motor to run continuously. 9. What part of a motor produces an inductive magnetic field within itself to facilitate the rotating motion? Rotor and stator. 10. What part does the frequency of alternating current play in the operation of an electric motor? Helps change polarity 120 times a second. 11. What would be the speed of a two-pole motor operating on a 120 volts 60 Hertz power supply? 3450rpm 12. What are the five types of single-phase motors used in the industry? 3. Which of the following correctly lists the motor’s starting torque from lowest to highest? B. Shaded pole, three phase, permanent split capacitor, capacitor start. 14. Which of the following is a common use of a shaded pole motor? A. Furnace fan motor. 15. How does a shaded pole motor operate? The shaded poles produce a magnetic field that is out of phase with the magnetic field of the main winding. 16. How can a shaded pole motor be reversed? The stator must be reversed to change the positions of the shaded poles, and this usually means disassembling the motor. 17. What determines the rotation of a shaded pole motor? B. Location of shaded pole. 18. Draw a diagram of a three speed, shaded pole motor. 19. What enables a split phase motor to develop enough torque to begin rotation? The method of splitting the phase of incoming power to produce a second phase of power, giving the motor enough displacement to start. 20. What removes the starting winding from the electrical circuit of an open type split phase motor once it reaches 75% of its operating speed? Centrifugal switch. 21. What are the three probable areas of trouble in a split phase motor? The bearings, windings, and the centrifugal switch. 22. What is the unit of measurement for the strength of a capacitor? C. microfarad. 23. What is the purpose of the capacitor? To boost the starting torque or running efficiency of a single phase motor. 24. What is the difference between a running and a starting capacitor? Starting capacitors are usually made of plastic and used to assist a single phase motor in starting. A running capacitor has an oil filled case and is mainly used to increase a motor’s running efficiency. 25. List the five capacitor replacement rules. 1. The voltage of any capacitor used for replacement must be equal or greater than that of the one being replaced. 2. The strength of the starting capacitor replacement must be at least equal to but not more than 20% greater than the one being replaced. 3. The strength of the running capacitor replacement may vary by plus or minus 10% of the strength of the one being replaced. 4. If capacitors are installed in parallel, the sum of the capacitors is the total capacitance. 5. The total capacitance of capacitors in series may be found in the following formula: 26. Explain the operation of a permanent split capacitor motor. It has two windings, running and starting. A running capacitor is put in series with the starting winding. The capacitor causes the electron to flow through the starting winding to shift it out of phase with the running winding. Therefore, a rotating magnetic field is set up, causing the rotor to turn. 27. How are a PSC motor and a capacitor start capacitor run motor similar? C. Both use starting relays. 28. What are the advantages and disadvantages of using the following types of motors? A. Shaded pole motor- 29. What are the similarities between an open type split phase motor and a capacitor start motor? C. Both have a centrifugal switch. 30. Which of the following is an advantage in using a three phase motor? B. Stronger. 31. Draw a wiring diagram of a capacitor start capacitor run motor: 32. True or false: All starting apparatuses are mounted externally to the hermetic compressor shell. True. 33. What is the purpose in troubleshooting any electric motor? 34. Which of the following is the capacitance of an 88 uf and a 108 uf starting capacitor connected in series? A. 196uf. 35. Which of the following is the capacitance of two 20 uf running capacitors connected in parallel? B. 20uf. 36. If a capacitor produces 15 A on a 240 volt supply, which of the following is its microfarad rating? A. 166 uf. 37. Which of the following capacitors could be used to replace a 35 uf, 370 volt running capacitor? B. 35uf, 390 volt. 38. Which of the following capacitors could be used to replace a 188 uf, 250 volt starting capacitor? C. 200uf, 250 volts. 39. Which of the following capacitors or combination of capacitors could be used to replace a 45 uf 370 volt running capacitor? A. 40uf, 440 volt. 40. Which of the following capacitors or combination of capacitors could be used to replace an 88uf 250 volt starting capacitor? D. 150uf, 250V. 41. Find the common, start, and run terminals of the following hermetic compressor. 42. Briefly explain the procedure for troubleshooting hermetic compressor motors. Electrically taking resistance readings of the windings with a good ohmmeter. 43. What are the electrical failures categories for hermetic compressor motors? Open, shorted, or grounded. 44. What precautions should be taken when checking hermetic compressor motors? Infinity. 45. What would be the highest allowable resistance reading for a grounded compressor motor? Zero. 46. What are the advantages of using an electronically commutated motor over a PSC motor? 47. Explain the construction of an ECM. The direct current converters convert the alternating current that the power company supplies to direct current, which can then be regulated to vary the speed of the motor. 48. An ECM is a B. Three-phase DC motor. 49. True or False: The resistance readings of the windings of a properly operating ECM should be equal. False. 50. True or False: The line voltage power supply of an ECM should never be disconnected or connected with the power on. True.

Wednesday, November 20, 2019

List the four polymers from which hydrogels can be made, and, for each Assignment

List the four polymers from which hydrogels can be made, and, for each one, list the advantages and disadvantages of each.at least one different possible application for each hydrogel - Assignment Example It has emulsifying and adhesive properties making it suitable for glue manufacturing. Its ability to form films makes it useful in making contact lenses and envelope seals (Gnanou & Fontanille 24). The surfactants in detergents, found in Sodium Polyacrylate are efficient in binding hard water elements such as, calcium and magnesium making them a choice Sequestering agent in detergents. Sodium polyacrylate is also used in making diapers and some brands of sanitary towels owing to their super absorbent ability (Gnanou & Fontanille 34). They have a thermoplastic ability that makes it possible for them to be processed as a melt at high temperatures. They have elastomeric ability. This enables it to regain its original shape even after stretching (Gnanou & Fontanille

Tuesday, November 19, 2019

Feminism In The Real world Essay Example | Topics and Well Written Essays - 1250 words

Feminism In The Real world - Essay Example Many women today support the equality of genders while brushing aside the idea of feminism. Some do not consider themselves feminist, but their actions compared to the description offered by the dictionary indicate they support to feminist. Therefore, from the past feminism to modern era, it is evident that it exist in the real world.despite its existence, it is evident that the face of feminism is changing, but the principles remain static regardless of the time. The success of the 20th century cannot be compared with the current situation. The role of women and position has been changing as a result of several issues that were solved through liberation. From a humble and oppressed background beginning in the 1800s, women have been faced by serious challenges that could not be solved by the actions of their male counterpart. Despite women active participation in the struggle for the abolition of slavery, they were sidelined, and several rights denied (Lovenduski, 1986, p. 56).The first wave of liberation, which has been named feminism led to the allowance of women to vote. The success, however, was not achieved in all the other demands. The start of the industrial revolution led to discrimination based on sex, and despite the role accomplished by the women in the earlier slavery struggles, they were not allowed to assume offices. They were given positions that did not require decision making. The mistreating and discrimination based on sex r esulted in the creation of and start of second liberation. The second liberation started in the 1960s addressed issues relating to employment discrimination and other social injustices that were not addressed in the earlier revolution. The urge for second liberation was brought about by the discriminatory laws passed by their male counterpart that barred discrimination in the basis of race originality, religion, color and not sex. This law did not address the feminine problems thereby forcing women to start

Saturday, November 16, 2019

Gender stereotypes Essay Example for Free

Gender stereotypes Essay According to the oxford dictionary the definition of stereotype is â€Å" A widely held but fixed and oversimplified image or idea of a particular type of person or thing†. Everyone has a preconceived notion about a ‘MAN’ and a ‘WOMEN’, a man’s work or women’s work, the characteristic ways in which a man or a women is defined also has some preconceived notions. These preconceived notions can be defined as stereotypes. The stereotypes begin at an early age, even as an infant it is already decided that blue is for boys and pink is for girls, even their toys are decided, have you ever witnessed a small boy ever agreeing to like or play with Barbie dolls? I haven’t. Stereotypes are embedded in our society to such an extent that we don’t even realise it, they influence our thought process, the way we become less indifferent towards things, the way we perceive things everything is defined by a simple word:- Stereotype. Even in the 21st century stereotypes exist, it is considered curtsey when a man opens the door for women, but is it really? Or has it always been like this? Why is it that the man has to propose to the love of his life why can’t a women to do? Why is it that women have to always be in the kitchen and cook? Why dothey have to take care of the kids? These are still some of the most common stereotypes that exist but no one really does much about it. Usually, the female stereotypic part is to get married and have children. She is also expected to put her relations well-being before her own, be loving, compassionate, caring, nurturing, and sympathetic. The male stereotypic part is to be the financial provider. He is also to be assertive, competitive, independent, courageous, and career? focused, expected to keep his emotions aside or in check. These stereotypes can hinder a person’s development and make them restricted to the confinement of the stereotype that precedes their gender and never be able to grow out of it. â€Å"Women were created from the rib of man to be beside him, not from his head to top him, nor from his feet to be trampled by him, but from under his arm to be protected by him, near to his heart to be loved by him. † ? David O. McKay.

Thursday, November 14, 2019

An Annotation of John Crowe Ransoms Blue Girls Essay -- Crowe Ransom

An Annotation of John Crowe Ransom's Blue Girls Simply put, Blue Girls is about beauty. The poem focuses on the realization and truthfulness that beauty undoubtedly fades. The speaker appeals to young girls, warning them to not put all their hope in their beauty, but to still utilize it before it diminishes. Blue Girls By John Crowe Ransom Twirling your blue skirts, travelling the sward Under the towers of your seminary, Go listen to your teacher old and contrary Without believing a word. Tie the white fillets then about your hair And think no more of what will come to pass Than bluebirds that go walking on the grass And chattering on the air. Practise your beauty, blue girls, before it fail; And I will cry with my loud lips and publish Beauty which all our power shall never establish, It is so frail. For I could tell you a story which is true; I know a lady with a terrible tongue, Blear eyes fallen from blue, All her perfections tarnished &endash; yet it is not long Since she was lovelier than any of you. The "your" in this poem signifies young adolescent girls attending school. While the moral of the poem could apply to anyone, he probably chose young girls as his audience because they are often the most aware and the most controlled by outward beauty. He also chose the color blue here, which can mean "intellectual" when speaking of a woman. So, "blue" could very well refer to the knowledge the girls hold, or it could just be the color of their skirts. I prefer the first meaning, especially since we find out that they are attending school in the next line. A sward is a grassy area of land, thus suggesting that the girls lead a carefree life of "twirling" and "travel... ... his point across here: beauty does indeed fade away, so some other purpose in life is necessary. In this poem, Ransom offers the girls three main lessons, which, although they seem contradictory, are really closely related: (1) Beauty does fade. (2) Use your beauty as much as you can before it fades. (3) Have something in your life besides beauty, so that when it fades, you are not left with nothing. He describes beauty as delicate and rare, unable to be established. He focuses on the lightheartedness of young girls, how they are caught up in beauty, and he warns them to be conscientious of the fact that their beauty will fade and that they cannot put all their hope on their beauty. At the same time, he encourages them to "practice" their beauty until it is gone, and he promises to celebrate that beauty as best he can, with all its value and frailty.