Saturday, December 28, 2019

Healthcare analyzation Free Essay Example, 2750 words

Managed care system has been developed with a view to mitigate the emerging challenges associated with the complex healthcare industry. It assists in cost saving, providing reimbursement and ascertaining improvement of the quality aspect. In fact, it is revealed that before the development of managed care, the clinicians mainly practiced medicines without considering the cost being incurred. With the establishment of managed care, cost and necessity, both are considered to be an important part associated with the healthcare industry (Bergman & Homer, 1988). The Challenges and Problems Associated With Managed Care in America The spread of managed care within the US reflects the healthcare system being undertaken by the American public and the policymakers. It has been further explained that challenges with respect to the managed healthcare system take into account both the professionals and the providers. The significant areas pertaining to the healthcare industry that face the challenge of managed care include ethical, legal and regulatory issues. In fact, an in-depth analysis along with observations has further revealed that the managed care system is reducing the inclusion of latest technology in the healthcare sector. We will write a custom essay sample on Healthcare analyzation or any topic specifically for you Only $17.96 $11.86/pageorder now Apart from this, it has also been depicted that managed care at times worsens the relationship between the patients and the professionals. Besides, this particular healthcare system has greatly interfered in the personal preference of the patients in case of medical treatment. The implementation of managed care has hampered a patient’s ability to choose and select the professionals of own preference. In this regard, if the patient receives treatment from the preferred professional, he/she is likely to gain confidence on the treatment and the entire process would be effective. Moreover, the provider or the patients become competent enough to undergo a treatment plan. Managed care creates a hurdle in the execution of effective communication among the physicians and the patients. Further researches have also revealed that managed care limits the treatment of the professionals. It also limits the ability of the doctors with respect to referring t o the specialist. By extensively interfering within the process of treatment, it limits a patient’s trust upon the doctors. Another vital issue that managed care faces can be determined to be the scheme associated with the salaried employees. In accordance with this scheme, it rewards the professionals along with the hospitals for limiting the provisions related to medical services that lays an impact on the area of interest.

Friday, December 20, 2019

Physical Therapy For The Medical Field - 1237 Words

Imagine a soldier that looses a limb in battle, an athlete who breaks an bone or tears a muscle during practice or a game, a child born with a disability condition, or a police officer that has been shot or injured in the line of duty all have the same thing in common. Each of these different situations and many others activities require a Doctor of Physical Therapy in order to treat their complication. Being a Physical Therapists is a job that will always be needed; there will always be people that need help regaining their physical health. It is all about helping people ranging in all ages from the elderly, adults, teens, and children who have problems with their body, muscles and joints. People should follow the consequentialist view in any career field that they decide to pursue. Physical therapist need to have certain habits to succeed in the medical field. If they do not have these certain habits they will not be as successful as the therapist that do have these habits. Therefo re, there are certain traits I believe a physical therapist needs to have, which is the ability to give encouragement, to be very knowledgeable, have a lot patience, and be personable in order to be successful in the job field. Ultimately, the main characteristic a physical therapist has to have is the ability to encourage their patients. Physical therapists know how to accentuate the positive and redirect any negativity that the patient might have during their weeks of treatment. PhysicalShow MoreRelatedPhysical Therapy And The Medical Field1624 Words   |  7 Pagesstand painlessly without the assistance of a licensed medical professional. Whether you were born with a debilitating medical condition or a physical disability occurred due to an accident or aging, there is someone that can help treat these conditions. Physical Therapists! Physical Therapy is a very rewarding and vital profession in the medical field. The average of all occupations is 11%; According to The Bureau of Labor Statistics, Physical Therapy’s projected job outlook in the years 2012-2022Read MorePhysical Therapy For The Medical Field1208 Words   |  5 PagesPhysical Therapist Core Virtues A soldier that looses a limb in ba ttle, an athlete who breaks an bone or tears a muscle during practice or a game, a child born with a deformity that causes trouble for one’s body, and a police officer that has been shot and injured in the line of duty, are all that have one thing in common. Each of these different situations and many others activities require a Doctor of Physical Therapy in order recover. Physical Therapists help the elderly, adults, teens, and childrenRead MorePhysical Therapy And The Medical Field1694 Words   |  7 PagesI became interested in physical therapy very recently, last week exactly. I became interested in physical therapy when I was researching it in class for a lame project my annoying teacher made me do. Even though my dad and all but one of his brothers are in the medical field, I didn’t really know too many details about working in the medical field. I always thought it was just too much school and didn’t give enough down time. After researching it I became m ore interested because it is a very intermediateRead MorePhysical Therapy Case Study944 Words   |  4 PagesAmerican Board of Physical Therapy Residency and Fellowship Education (ABPTRFE), a residency is a â€Å"post-professional program meant to train physical therapists in a specialty area† (American Board of Physical Therapy Residency and Fellowship Education, 2017b). The ABPTRFE currently recognizes nine specialty areas within the field of physical therapy, and there have been residency programs created in each of the nine recognized specialty areas (American Board of Physical Therapy Specialties, 2017)Read MoreDiagnostic Medical Sonographer vs. Physical Therapist1422 Words   |  6 PagesDiagnostic Medical Sonographer vs. Physical Therapist Miami Dade College Professor SLS 1125 December 1st, 2010 Job Description The Diagnostic Sonography more commonly known as Ultrasound is a medical procedure in which you use high frequency sound waves to produce visual images of organs tissues or blood flow inside the body. Ultrasound is regularly known as the procedure used to examine women who are expecting. Although, Sonography is used in many different ways other than for expectantRead MorePhysical And Occupational Therapists Help Improve Someone s Life1610 Words   |  7 Pages Physical and occupational therapists have the opportunity to improve someone’s life. Even though both jobs are improving someone’s life, they treat each patient’s individual problems differently and with various techniques. Physical and occupational therapists do not only need to know how to treat the patient’s problem, but they need to be able to work around schedules and understand the problems the patient is facing. Both jobs need to be able to relate to the patient on a personal level makingRead MoreBecoming A Physical Therapist For Doctors And Physicians1676 Words   |  7 PagesWithin our homes, schools, and community, there are many different fields of medicine to accommodate for the accelerating demand for doctors and physicians. With so many fields and concentrations of medicine, different schools have emerge to keep up with the demand. Now, not only are there primary care physicians, but also fields such as pediatrics and physical therapy. Since entering college, I have always had an internal debate and frustration on what I wanted to do and who I wanted to become andRead MorePhysical Therapy Assistant Essay760 Words   |  4 Pages The medical field is expanding ever so rapidly in today’s society. In the field of Physical Therapy one needs to have the understanding of how the human body works and the injuries one body could sustain. I have chosen a career to help others to battle back from life-changing injuries or surgeries. I will take the first step of joining the medical field by obtaining a physical therapist associates degree. I will become a Physical Therapist Assistant. Career Description Physical Therapy AssistantsRead MoreWhat Field Of Physical Therapy1724 Words   |  7 PagesIntro to PT Paper There are many areas, settings in Physical therapy .Such as Pediatrics, acute care, aquatics, geriatrics, education, oncology and so much more. I will be explaining what field of physical therapy that I strongly feel of pursuing and my least favorite field. Then I will give my whys and why nots feedback for each field that I talk about. In the area of acute care, physical therapy is provided to patients who are admitted to a hospital for a short-term period of time. They can beRead MoreThe Effects Of Physical Therapists On The Medical Field1706 Words   |  7 PagesAn abundance of physical therapists will continue to be needed in the medical field because of the continuous rate of injuries. Physical therapists treat injury or medical problems that limit a patient’s ability to function in everyday life. Physical therapist treat patients of all ages and promote interactions with patients, family, caregivers and other health professionals. Most people have been through physical therapy or will go through physical therapy sometime in their lives. Participating

Thursday, December 12, 2019

Cryptography and Network Security

Question: Describe about the Cryptography and Network Security? Answer: Introduction Cryptography is a coordinated documented which obtains ideas from arithmetic, gadgets and programming. Cryptography has been practiced from historic times starting from when Julius Caesar sent messages to the generals by means supplanting each letter set with 3 bits ahead letters in order like E is supplanted with H, C with F et cetera. The intention was to convey the message securely without being known not and even the detachment (Singh, Pal and Bhatia 2013). Therefore, the principle reason for existing was to store the data securely, pass it securely and along these lines keep it from assaults. Critical review of the encryption / decryption techniques This section critically analyzes and reviews several encryption / decryption techniques with a thorough explanation of how each of the technique works as well as evaluation of their individual strengths and weaknesses, properties and characteristics (Bauer 2013). Monoalphabetic substitution techniques In this particular technique, cipher text letters usually replace a particular plaintext. A fixed replacement structure determines the monoalphabetic substitution. To be more precise, if a particular letter such as an e is replaced with M; it means that all of es in that particular document will always be replaced only by M. The main concept behind this technique is a permutation of particular alphabets (Goyal and Kinger 2013). Inverse permutation is to be used for the decryption technique of the encrypted or ciphered text. The mathematical description of this technique is discussed below: If S (E) were a collection of symmetrical permutations, a monoalphabetic substitution would be f(a1. . .ar) := (a1, . . . , ar) for (a1, . . . , ar) r Method The general approach: The invariants are the distribution of frequencies of different and individual letters or alphabets or characters. Repeated patterns also significantly appear in the encrypted or ciphered text. This particular variant of cryptographic procedure is dependent upon replacing one single character with a particular and fixed character (Heydari, Shabgahi and Heydari 2013). The cryptanalysis of the Monoalphabetic substitution makes use of its invariants, which is of properties of substance that stay unaltered under encryption: Single characters or alphabets and the corresponding allocation of it is invariant. The alphabet or character content happens exactly the equal number of times as the contrasting characters in the plain text. Irregular plans in the plaintext show up furthermore in the figure content. Just in unprecedented situations, cryptanalysis is exceptionally algorithmic (Huang 2015). Despite of that, it can be implied that framework implements the degree to which it can be determined how clear is its theoretical reason is, the successful game plan validates the cryptanalyst. Strengths One of the main advantages of monoalphabetic substitution is it is comparatively simple, easily comprehensive and implementation is easy. The number of possible keys is (26!) which significantly reduces the impact of brute force attacks (Jain, Dedhia and Patil 2015). To be more precise the exact number of keys involved in this type of cryptographic technique is 4 x 1026. Weaknesses The weakness of monoalphabetic substitution process is its language characteristics. By nature, human languages tend to be significantly redundant. There are certain letters that are most commonly used such as S, O, N, R, A, T or I (Kahate 2013). On the contrary, there are certain letters that are used comparatively rarely such as Z, Q, K, J or Q. Figure 1: English letter frequencies (Source: Kuppusamy, Pitchai Iyer and Krithivasan 2014) Therefore, monoalphabetic ciphers do not provide 100 % security and thereby can be cracked quite easily using statistical methods, such as shown above. Cesar shift cipher Cesar cipher is one of the sub procedures that fall under monoalphabetic cipher texts. It consists of a very simple and comprehendible and thereby it is quite easy to crack or break the encrypted message or ciphered text (McGrew et al. 2014). This algorithm or technique has such a name because Julius Caesar originally used it. Method The fundamental approach for encryption applied in this technique involves creating the ciphered text alphabet by left shifting the particular alphabets using the accurate the number of places as demonstrated by the key being used (Mekhaznia and Menai 2014). On the contrary, the decryption process similarly involves a significantly simple and comprehensive process that only associates itself with the corresponding letter of the cipher text. However, it is to be noted that, although the key may be unknown, breaking the code can be easy if it is known that shift cipher is applied for that particular purpose (Mohan, Devi and Prakash 2015). It is most possibly the first known substitution cipher used and attested in military activities. The main idea lying behind this technique is to replace each letter with the third letter. The main mathematical calculation can be represented as: c = E (k, p) = (p + k) mod 26 p = D (k, c) = (c k) mod 26 Strengths The strengths or advantages of Caesar shift cipher are described below: It focuses on mapping alphabets in permutations randomly, rather than simply shifting the alphabets or characters. Weaknesses The fundamental weakness of Cesar cipher is it is comparatively easy to break mainly because of its simple nature. It is not that strong in terms of the security aspects provided by it (Mozaffari-Kermani et al. 2014). Normally utilized letters like "e" show up rapidly as the "x" in the illustration. Words with rehashed letters like "meet" in the case demonstrate that reiteration in the cipher text. What's more, in reality this is weak to the point that the day-by-day cryptogram keep running by a few daily papers is ordinarily a Cesar shift substitution. Simple transposition techniques Transposition cipher is a commonly used type of cryptographic (encryption / decryption) technique (Nema and Jain 2013). The algorithm for transposition technique involves the following steps: Step 1: the first step deals with selecting a proper password Step 2: the plain text is required to be known Step 3:It is required to draw a table with matching number of columns with the exact number of alphabets; the number of rows should be adequate for accommodating the alphabets or characters involved in the plain text (Othman, Hassoun and Owayjan 2015). Step 4: The fourth steps requires arranging the password so as to the accurate number of appearance of the alphabet with respect to the letter a is to be assigned in the beginning of the position no matter what column it is. Step 5: The position of the alphabet in the respective columns is required to be understood for continuing the process until the password position has been covered fully (Pachghare 2015). This process, when executed in reverse is referred to as decryption. Router cipher There are numerous different approaches to transpose messages than columnar transposition utilizing squares and rectangles. The state of the geometric figure utilized can be shifted, and the technique for engraving and removing content can be differed (Pommerening 2014). Columnar techniques are the most normal in military utilization, since they are the simplest to learn and utilize dependably, be that as it may, different techniques might be experienced. Some of these normal techniques are appeared underneath. Strengths Transposition can be utilized to create a mixed request of the letters in the letter set for use as a substitution letters in order (Pommerening 2014). Transposition frames part of a portion figure, where letters are partitioned into parts, then the parts are assembled in an alternate request, fitting in with various letters. Weaknesses This arrangement relied on upon accurately distinguishing the width of the network and the lucky appearance of the Q and U (Rueppel 2012). Without the Q and U and with no sign of the width, significantly more experimentation would be required for an effective arrangement. Transposition columnar cipher The section explains the encryption and decryption procedures applied for columnar transposition cipher (Sharma et al. 2013). The steps for encryption in columnar transposition are discussed below: Step 1: The password is set Step 2: ASCII code is to be yielded by converting the alphabets included in the password. The first alphabet in the original word or sentence can be easily found replacing with the largest ASCII value Step 3: This step focuses on finding out the accurate length of the plain text Step 4: The determination of the exact number of rows is based on the length of the plain text and the length of the password combined (Shrivastava, Sharma and Chouhan 2013). The number of column should be known beforehand from the number of letters in the password. Step 5: The rows not entirely filled using the characters are completed with applying exceptions. Step 6: The step 4 determines the size of array depending upon which the arrangement of the plain text is performed (Singh, Pal and Bhatia 2013). Step 7: The columns should be positioned as an according to the step 2. Step 8: This is the final step from which the encrypted message is received. Key: 4 1 2 3 5 Plaintext: d a t a e n c r y p t i o n Cipher text: anttciarodep yn Weaknesses: Most transposition frameworks improve content by single letters. It is conceivable to revise complete words or gatherings of letters as opposed to single letters, yet these methodologies are not exceptionally secure and have minimal handy worth. Bigger gatherings than single letters protect a lot of unmistakable plain content. Columnar transposition frameworks can be misused when keys are reused with messages of the same length (Shrivastava, Sharma and Chouhan 2013). The plain content to messages with reused keys can frequently be recouped without respect to the real strategy for enciphers. Once the plain content is recuperated, the strategy can be recreated. Rail fence cipher The rail fence is a simple to apply transposition that scatters up the request of the letters of a message in a speedy helpful manner. It likewise has the security of a key to make it a smidgen harder to break. The Rail Fence figure works by composing your message on interchange lines over the page, and afterward perusing off every line thusly (Singh and Manimegalai 2015). For instance, the plain content is composed as demonstrated as follows, with all spaces uprooted. Strengths Rail fence technique is reading so as to be decoded it in masterminding it in segments or columns before understanding it (Van Tilborg and Jajodia 2014). Along these lines, it is very much a simple and quick procedure, and it is less inclined to botches. Weaknesses One of the issues that this type of technique faces is that the security of the code is dependent on the way that a cryptanalyst does not know the technique for encryption (Singh and Manimegalai 2015). Henceforth, once the technique for encryption is broken, the code is broken as of now. Another issue with this type of technique is that is not exceptionally solid. This implies the quantity of conceivable arrangements is small to the point that a cryptanalyst can attempt all of them by hand (Singh and Johari 2015). Consequently, the rail wall figure is anything but difficult to break as we just need to test all the conceivable divisors up to a large portion of the length of the content. Permutation cipher It is another type of transposition technique in use for many years. The fundamental aspect lies in choosing the length of permutation and thereafter, the key becomes the random permutation (Singh and Johari 2015). It is not similar to monoalphabetic ciphers. The Permutation Cipher is harder to break with a cipher text-just assault. In any case, it succumbs effortlessly to a known plaintext assault. Truth be told, if one knows plaintext and cipher text, then it is not troublesome for him to decide the length m and after that locate the key (Singh 2014). In spite of the fact that the Substitution Cipher and the Permutation Cipher is not secure, they are imperative components in cutting edge cryptosystems. Break the plaintext up into groups of a fixed size, d define a permutation of the integers 1 to d called f within each block, permute the letters according to f the key is (d, f) For example, let d = 5 and let f is given by: 1 --------- 3 2 ---------- 4 3 -------- 1 4 ------- 5 5 --------- 2 Strengths The primary strength of this cipher is that is difficult to break as compared to the other cipher procedures (Van Tilborg and Jajodia 2014). Weaknesses However, permutation cipher is not hundred percent secure. Selection and justification of techniques used The researcher study about three types of encryption technique namely, substitution cipher, transposition cipher and permutation cipher. The researcher finds that the rail fence technique is the simplest technique, which can be crack easily. The rail fence technique is a transposition cipher. Here the transposition is based on rearranging total text either typographical or mathematical; the output of this arranging is called cipher (Singh and Johari 2015). The rail fence technique uses a zigzag pattern to encrypt the plaintext. Here the programmer performs a test of a rail fence technique but the generated output is very simple. Thus, this cipher text can be crack easily, even it can be solve with a pen and paper. Here one example of the rail fence techniques is described with the basic concept of encryption. If the plain text is, DEFEND THE EAST WALL OF CASTE. Than the cipher, text will produce as follows (here the value of key is 3): Than the program read this line along the row and a string variable collect the total character set (Singh 2014). Here the researcher encrypts this text a find the following set of text as a cipher test. From the above example, the programmer identify that it is not a right choice to encryption a plaintext. Now the programmer identify that the substitution and transportation cipher techniques are pretty much similar and easy to crack (Van Tilborg and Jajodia 2014). Therefore, the programmer choose the permutation cipher as an encryption stranded to encrypt a plain text, because this is more complex to crack than other techniques. The programmer chose the permutation cipher to encrypt the plain text. The permutation cipher is similar to the columnar transformation is some ways, here the method of permutation is acts on blocks of latter instead of the selecting the entire cipher text. In mathematical concept the permutation is perform by rearranging the set of elements. In this program, every word is shifted to the left, but the shift order is depend on the key (Rueppel 2012). For an instance, the order of the plain text is {Day1,Day2,Day3}, than after the permutation is seems like that { Day2,Day3,Day1}. Here the programmer chooses a keyword of length 3 than this program spilt this plain text according to the keyword length. Here the programmer demonstrated this in the following example. Figure 2: The plain text and the permutated text (Source: Pachghare 2015) The above section demonstrated the encryption process of the permutation cipher, here the programmer define the method of conversion of encrypted text to plain text. As the encryption method use keyword length to split the plain text here decryption also use same concept to split the text. At first, the order of the keyword is set at the top of the columns. Than the programmer set the method to rearrange the cipher text according to this order, and read the plain text row wise (Othman, Hassoun and Owayjan 2015). For better understanding of decryption technique the programmer this process with an example, is given underneath. Lets take the keyword length is 5, and set the cipher text according to their order row by row (figure). Figure 3: Representing the cipher text row by row. (Source: Sharma et al. 2013) Now the program record the letters of the keyword to form original keyword, and similarly the program rearrange the elements in the same way. Here the recoded grid is showing in below figure. Figure 4: The recorded grid. (Source: Mohan, Devi and Prakash 2015) The encryption algorithm: Step 1: the keyword is in the small alphabet. Step 2: the keyword is converted in ASCII value. It provides simplest way to find the alphabet comes first. Step 3: in this step, the plaintext length is found. Step 4: The length of the secret key and the length of the plaintext is utilized to decide the quantity of lines that will be made as the quantity of section is as of now known as the quantity of the keyword characters (Kahate 2013). Step 5: here the rows are completed by the exception. Step 6: according to the step 4, the plaintext is arranged. Step 7: according to the step 2, the columns are readied. Step 8: it prints the encrypted text and print it. Execute the previous steps 1 to 7 again. Evidence of success The permutation cipher is implemented in java; here the programmer provides the evidence of successfully execution program and its outcome. Here the programmer uses the NetBeans framework to implement this application (Huang 2015). The input of the application is taken plaintext from the user and it provides cipher text. After generating the cipher text the program also decrypt this message and, generate the plain text. Figure 5: Taking plaintext from user (Source: created by authod) Figure 6: Print the encrytion and dycryption text (Source: The texing Table) The testing table: Test No Text size File size Expected outcomes Encryption outcomes Decryption Outcomes Encryption Time Span Decryption TimeSpan Cipher Key Key size 1 8 5 bytes Correctly encrypted Successful Here the programmer try to encrypt the plain text 0.01000 0.01701 megabuck 8 bit 2 8 20 bytes Correctly encrypted Successful Here the programmer try to encrypt the plain text 0.02900 0.11400 megabuck 8 bit 3 8 16 bytes Correctly encrypted Successful Here the programmer try to encrypt the plain text 0.00900 0.01400 megabuck 8bit Conclusion The motivation behind encryption and unscrambling is to guarantee those messages imparted between two elements are sheltered and secure from any sort of digital or system assault. Encryption and unscrambling guarantees that message begin from the approved sender and decoded by legitimate recipient. Subsequently the investigation of different strategies to camouflage messages or content with a specific end goal to stay away from its capture attempt from unapproved client is known as cryptography. To guarantee the wellbeing in correspondence cryptography and its procedures are utilized. There are numerous encryption and unscrambling strategies accessible however; these techniques have their own focal points and inconveniences. In this work I proposed an exceptionally basic however viable symmetric key encryption strategy. References Bauer, C.P., 2013.Secret history: The story of cryptology. CRC Press. Goyal, K. and Kinger, S., 2013. Modified Caesar Cipher for Better Security Enhancement.International Journal of Computer Applications,73(3). Heydari, M., Shabgahi, G.L. and Heydari, M.M., 2013. Cryptanalysis of transposition ciphers with long key lengths using an improved genetic algorithm.World Applied Sciences Journal,21(8), pp.1194-1199. Huang, Y., 2015.Comparing the Efficiency of Hybrid and Public Key Encryption Schemes(Doctoral dissertation). Jain, A., Dedhia, R. and Patil, A., 2015. Enhancing the security of caesar cipher substitution method using a randomized approach for more secure communication.arXiv preprint arXiv:1512.05483. Kahate, A., 2013.Cryptography and network security. Tata McGraw-Hill Education. Kuppusamy, A., Pitchai Iyer, S. and Krithivasan, K., 2014. Two-Key Dependent Permutation for Use in Symmetric Cryptographic System.Mathematical Problems in Engineering,2014. McGrew, D., Bailey, D. and Campagna, M., 2014.R. Dugal," AESCCM Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS). RFC 7251, June Mekhaznia, T. and Menai, M.E.B., 2014. Cryptanalysis of classical ciphers with ant algorithms.International Journal of Metaheuristics,3(3), pp.175-198. Mohan, M., Devi, M.K. and Prakash, V.J., 2015. Security Analysis and Modification of Classical Encryption Scheme.Indian Journal of Science and Technology,8(14), p.1. Mozaffari-Kermani, M., Tian, K., Azarderakhsh, R. and Bayat-Sarmadi, S., 2014. Fault-resilient lightweight cryptographic block ciphers for secure embedded systems.Embedded Systems Letters, IEEE,6(4), pp.89-92. Nema, P. and Jain, A., 2013. A Comparative Survey on Various Encryption Techniques for Information Security. Othman, H., Hassoun, Y. and Owayjan, M., 2015, October. Entropy model for symmetric key cryptography algorithms based on numerical methods. InApplied Research in Computer Science and Engineering (ICAR), 2015 International Conference on(pp. 1-2). IEEE. Pachghare, V.K., 2015.Cryptography and information security. PHI Learning Pvt. Ltd.. Pommerening, K., 2014. Cryptology Part I: Classic Ciphers (Mathematical Version). Pommerening, K., 2014. Monoalphabetic Substitutions. Rueppel, R.A., 2012.Analysis and design of stream ciphers. Springer Science Business Media. Sharma, A., Bhatnagar, A., Tak, N., Sharma, A. and Avasthi, J., 2013. An Approach Of Substitution Method Based On ASCII Codes In Encryption Technique.arXiv preprint arXiv:1302.4510. Shrivastava, G., Sharma, R. and Chouhan, M., 2013. Using Letters Frequency Analysis in Caesar Cipher with Double Columnar Transposition Technique.International Journal of Engineering Sciences Research Technology,2(6), pp.1475-1478. Singh, A.P., Pal, S.K. and Bhatia, M.P.S., 2013. The Firefly Algorithm and Application in Cryptanalysis of Monoalphabetic Substitution Ciphers.American Journal of Computer Science and Engineering Survey (AJCSES),1(1), pp.33-52. Singh, K.J. and Manimegalai, R., 2015. Evolution of Encryption Techniques and Data Security Mechanisms.World Applied Sciences Journal,33(10), pp.1597-1613. Singh, L. and Johari, R., 2015, January. Comparative Analysis of Cryptography Cipher Techniques. In2015 Fifth International Conference on Advanced Computing Communication Technologies. Singh, S., 2014. Codes And Ciphers.International Journal of Advanced Research in Computer Science,5(6). Van Tilborg, H.C. and Jajodia, S. eds., 2014.Encyclopedia of cryptography and security. Springer Science Business Media

Wednesday, December 4, 2019

USPS Synthesis Essay free essay sample

Over the past two centuries, the United States Postal Office has helped the United States grow by providing communication across the country. The USPS quickly able to provide communication all across the world. In the fast paced society, it is difficult to for the USPS to keep up with all the new gadgets. Especially because the internet allows people to communicate with others in a much more efficient and reliable way. Customers also choose other companies like UPS and Fedex. By reconstructing the USPS, it can slowly meet the standards of a changing world. One of the steps to helping the USPS keep up with all the new technology is to increase services and give their customers more options. People are choosing other ways because postal services aren’t as efficient as the internet. According to Source A, they are dropping from six- to five-day delivery. With the lack of faith in their services and drop in delivery days, the number of customers will probably decrease due to the slow services. We will write a custom essay sample on USPS Synthesis Essay or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The USPS should be providing a seven-day delivery service so their customers can be guaranteed to receive their letters and packages faster and easier. The inefficient and unreliable service causes the number of mail to decrease but increasing services can help attract and gain the trust of customers. Throughout the years, the number of letters and packages are decreasing. According the Source B, the mail volume has decreased drastically from 2000 to 2009, while the number of delivery points has increased. There are less mail but more delivery points, which means mailmen would have mail that are scattered all over the city, causing the efficiency of the services to decrease. Though the mail volume has decreased, there is still a great amount of people who value handwritten letters (Source F) and those people are probably one of the factors that help the USPS stay in business. If they plan out their distributions correctly, their mailmen would be able shorten their route and fasten the rates of people receiving mail. The USPS needs a boost in organization, which will be able to increase the efficiency of the distributions and allow mailmen to help out at the post offices. Most people choose the internet instead of the USPS because of the slow, unexcited workers. Source A suggests to motivate the staff members. Giving workers more benefits and higher wages can help motivate them to work efficiently. Customers often stand in line waiting for ten to fifteen minutes because of the workers who take their time and can’t wait until they get to leave work. Another suggestion from Source A is closing branches and having each center provide different services. Those who need to mail a simple letter can get out of the post office faster and those who need help with larger packages can get the assistance they need. Faster working and motivated staff members can help the customers get assistance as soon as possible and can help the USPS meet the needs of this fast changing world. The USPS is a great way to help people communicate with each other, especially with those who live far away. The lack of efficiency and motivated workers restricts USPS from moving forward and meeting the standards of what people expect nowadays. It has helped the United States for the past two centuries and there are still people who love to send mail so it would be disappointing to see the USPS close down. The USPS needs to train their workers so that they can provide and increase efficient services as well as gain trust from the customers who drifted away.

Thursday, November 28, 2019

Another Eternity by Purity Ring free essay sample

Purity Ring, an electronic pop duo formed in 2010, has reemerged onto the electronic pop music scene with their second album, Another Eternity. Back in 2012, Purity Ring’s album Shrines attracted a loyal audience with specific tastes for the intricately textured, eerie, ethereal melodies, produced by Corin Roddick’s instrumentals, and the gentle pitch shifting vocals performed by Megan James. The album’s most popular singles, such as â€Å"Ungirthed†, combine abstract lyrics (â€Å"The dust of my knuckles familiar/ to culminated piles/ to culminated piles of bones/ that shift when the earth quakes and trembles, trembles†) and airy yet impactful electro-pop instrumentals that are nearly indistinguishable throughout the album. Another Eternity introduces a similar, yet entirely renewed style for Purity Ring. The album still utilizes some of the same musical and lyrical styles of Shrines, with a more mainstream pop feel. This has both hindered and helped the duo’s success; while many devoted fans have expressed dismay at these alterations, many new fans have been attracted to this far less esoteric album. We will write a custom essay sample on Another Eternity by Purity Ring or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Another Eternity tells a more clear set of stories than Shrines and is therefore more memorable and catchy. The lyrics are poetic, yet simple and straightforward (this is especially apparent in the chorus of â€Å"Bodyache†: â€Å"I, I, I lied, now I’m wide awake/I, I, I cried till my body ache†). The trap beats and electro-pop lightness are less heavy-handed than in Shrines, yet they maintain a similar futuristic, distant mood. James’s vocals are sweet as she sings of twisted, strange ideas (â€Å"I could hear your back cracking/Over the sky so you could wear it/Thunder whispered low so/You could bear it in†). This juxtaposition is further expressed with wispy, enlightening instrumentals that give one the sensation of floating on clouds, surrounded by twinkling stars. All in all, both albums are brilliant and subtly unique. They contradict, yet complement each other and are both worth exploring for new listeners. The underrated talent and creativity of Corin Roddick and Megan James definitely deserves a larger audience. To get a taste of their style, check out their full set at this year’s Coachella or their music videos on YouTube!

Sunday, November 24, 2019

Ffdfd Essay Example

Ffdfd Essay Example Ffdfd Essay Ffdfd Essay Tractors: MILLAT TRACTORS LIMITED Analysis of Financial Statements Financial Year 2004 Financial Year 2010 July 27, 2011 RECORDER REPORT 0 Comments Millat Tractors Limited (MTL) was established in 1964 to introduce and market Massey Ferguson (MF) Tractors in Pakistan. An assembly plant was set up in 1967 to assemble tractors in semi-knocked down (SKD) condition. The company was nationalized under Economic Reforms Order in 1972 and started assembling and marketing tractors on behalf of Pakistan Tractor Corporation (PTC), which was formed by the Government for import of tractors in SKD condition. In 1980, the Government decided to produce indigenous tractors and entrusted this task to PTC. In 1981, the MTL took over this task. This was the turning point in the companys history and it went about the task methodically and rapidly. Just in one years time, the company took a giant step towards self-reliance by setting up the first engine assembly plant in Pakistan. The MTL made a strategic decision right in the beginning to bring those manufacturing facilities in-house for which capabilities did not exist in the country and for parts, which required high precision and investment. Therefore, in 1984, sophisticated manufacturing facilities for the machining of intricate components were set up. Currently, critical components like engine blocks, sump, transmission case, axle housing, hydraulic lift cover, front axle support and centre housing are all being machined most successfully in-house at MTL from local sourced castings. In 1992, the company was privatised. The employees joined hands and took over the management by winning an open bid. To maintain its leadership role in tractor manufacturing in the country, the MTL continues to look towards future, to identify and exploit new opportunities and to consolidate existing ones. The Tractor Assembly Plant is part of this philosophy. The plant started its production in 1992. The establishment of this modern plant not only increased production capacity to 16,000 tractors per year on a single shift basis, but also provided a quantum jump to the quality of the assembled tractors and pushed the MTL into the ranks of the major tractor manufacturing companies of the world. : In 1993, MTL also acquired the management control of Bolan Castings Limited (a Public Limited Company specializing in intricate automotive castings) in partnership with employees of the company, in 1993. The company established a new company named Millat Industrial Products (Pvt) Limited to manufacture quality automotive batteries, thus enabling the Millat Group to capture the efficiencies associated with vertical integration. In addition, the Millat Group comprises of Bolan Castings Ltd. , which produces thin walled castings such as engine block, cylinder head, centre housing etc. Also, Millat Equipment Ltd. produces gears and shafts of international standard for tractors. However, these subsidiaries contributed 1. 18% to MTLs consolidated net sales and 8. 15% to consolidated profit after taxation in FY10 (1. 14% and 6. 50% respectively in FY09). Due to low contribution to consolidated MTL performance, the financial analysis in this report is based on MTLs standalone tractor operations. Recent results (1Q11) The company achieved a sales volume of 29,718 Tractors in these nine months as against 28,939 tractors for the corresponding period of last year, showing an increase of 2. %. During current period, 30,638 Tractors were produced as compared to 29,865 tractors for corresponding period last year, showing an increase of 2. 6%. distribution and marketing expenses actually declined to Rs 431 million as compared to Rs 500 million, while the administrative expenses increased. Operating profit was slightly higher at Rs 2. 3 billion as compared to Rs 2. 2 billion in the same period last year. Other operating income was however higher by 60. 8%, thus pushing the overall income higher. Pre-tax profit for nine months amounted to Rs 2,594. 1 million as compared to Rs 2,355. million of the corresponding period of previous year showing an increase of 10. 2%. Profit after tax increased to 1,807. 2 million from 1,609. 5 million of the corresponding period of previous year, showing an increase of 12. 28%. EPS was recorded at Rs 49. 37 as compared to Rs 43. 97 the same period last year. A new high-spec tractor model in 50hp range the MF-350, was developed for the small to medium sized farmers. The product was well received and was highly appreciated by the farming community due to its improved features such as power steering, oil immersed disc-brakes, heavy duty straddle axle etc. With the inclusion of this new model, Millat now offers a range of six tractor models that best suit our agro-climatic conditions, size of farms and buying capacities of the farmers. Presently, MTL has the highest deletion level of 90% and 55% in low engine and high engine capacity tractors respectively. The lower deletion level in high engine capacity tractors still makes it susceptible to exchange rate fluctuations. In the wake of appreciation, the company is therefore at a greater advantage and vice versa. Millat Tractors has the potential to export the tractors but is restricted because of the agreement with their principals M/s AGCO. RECENT PERFORMANCE (FY10) Net sales increased by 39. 53% from Rs 15. 91 billion in FY09 to Rs 22. 20 billion in FY10. This was due to the increased production of tractors, which enabled Millat tractors to fulfil the unmet demand for tractors in the market. This was a significant achievement for Millat Tractors, as its major competitor, Al-Ghazi Tractors, did not witness any significant increase in sales due to restricted production capacity. The demand for tractors rose due to government support schemes like the Benazir Tractor Scheme. Cost of sales increased by 36. 03% from Rs 13. 0 billion in FY09 to Rs 18. 37 billion in FY10, due the depreciation of PKR against JPY, USD and GBP over July 2009-June 2010. This, coupled with the rise in steel prices, negatively impacted the margins of auto manufacturers and assemblers who import steel and the required components from Japan or elsewhere. With major imports of CKD kits coming from UK, the gross profit of the company is directly related to the Pound Sterling to Rupee price movement and leaves the company susceptible to changes in exchange rate. This resulted in a net 59. 15% increase in gross profit, from Rs 2. 1 billion in FY09 to Rs 3. 83 billion in FY10. Millat Tractors also managed to boost its fundamentals in the operating expenses category, allowing a minor 5. 71% increase in distribution and administrative expenses. Thus the operating profit increased by a large 79. 04%, from Rs 1. 76 billion in FY09 to Rs 3. 14 billion in FY10. Other operating income greatly increased by 126. 47% mainly due to increase in gain on sales of short-term investments. Other operating expenses increased by 52. 54% due to investment in workers profit participation fund. Thus an 86. 1% increase was recorded in the EBIT from Rs 1. 79 billion in FY09 to Rs 3. 35 billion in FY10. Finance cost decreased by 76. 15% due to settlement of short term borrowing from banks, leading to a marked reduction in finance cost. However, taxation incr eased by 95. 85% due to imposition of 17% Value Added Tax on local tractor sales. Thus the profit after taxation increased by 88. 01%, from Rs 1. 22 billion in FY09 to Rs 2. 28 billion in FY10. A lesser increase was witnessed in the earnings per share, which increased by 50. 40% from Rs 51. 87 per share in FY09 to Rs 78. 01 per share in FY10. Market comparison The demand for tractors increased significantly in the year 2009-10. The industry booked a total of 74,000 units as against 40,836 units booked in the preceding year, thus registering an increase of 81%. Federal and Provincial tractor schemes and better support prices of crops, especially wheat and rice, were the main contributing factors towards increase in demand. However, the governments role as not entirely supportive of the industry as import of tractors was allowed free of taxes or duties while the local industry was subject to tariffs under the Tariff Based System. However, despite these odds, Millat Tractors continued to dominate the market and retained its market share. At present there are two tractor companies in Pakistan, which are involved in manufacturing of indigenized tractors: a local company, Millat Tractors Limited, which produces Massey Ferguson Tractors under franchise from AGCO; and Al-Ghazi Tractors Limited which is an entity of a foreign UAE-based Group Al-Futtaim purchased under privatisation in 1992 and manufacturing Fiat New Holland tractors. Millat Tractors possesses 57% of the market share while the rest 43% is held by Al-Ghazi Tractors. The production capacity of each company is currently 30,000 tractors per annum, although Millat Tractors achieves this capacity in double shifts whereas Al-Ghazi Tractors needs to employ a single shift only, due to its larger plant size. In the past, both the companies had failed to meet the supply against increasing demand and the limited capacity of production resulted into abnormal delay in deliveries to the farmers. Thus in FY10, Millat Tractors adopted the policy of working on overtime schedules, to meet the high demand, resulting in a significant increase in sales and profitability from 29,785 tractors produced in FY09 to 40,177 tractors produced in FY10. The sales statistics in terms of the number of tractors similarly increased from 30,234 to 40,080. However, the major competitor, Al-Ghazi Tractors, did not manage to increase its production, where production marginally from 30,183 units in FY09 to 31,430 units in FY10. The market comparison ratios are based on the financial statements of Millat Tractors and Al-Ghazi Tractors for FY10. The financial year of Millat Tractors ended on 30th June 2010, whereas Al-Ghazi Tractors ended its financial year on 31st December 2010. Hence this market comparison is only indicative as the companies may have been subject to different market conditions over their respective periods under review. The profitability ratios show that Millat Tractors achieved a 17. 27 gross profit margin in FY10, compared to 18. 51 of the industry average. This indicates that Millat Tractors is achieving its profit margins satisfactorily, although its competitor Al-Ghazi Tractors is better able to manage its cost of goods sold. The net profit margin of Millat Tractors is similarly slightly lower at 10. 29 compared to 11. 54 prevalent in the industry. Return on assets for Millat Tractors is also lower at 19. 42, compared to the 22. 16 industry average. This means that Millat Tractors is not fully deploying its assets to generate the maximum amount of sales. However, return on equity is much higher at 54. 49 compared to 42. 5 industry average. This is because Millat Tractors has a much lower proportion of equity in its equity-liabilities structure, and coupled with an impressive profitability performance, this gives rise to a high return on equity. The current ratio of Millat Tractors is lower at 1. 40 compared to 3. 57 for the industry. This is because Al-Ghazi Tractors has much lower amount of trade payables, Rs 1. 24 billion, compared to Rs 7. 48 billion of trade payables on Millat Tractors balance sheet. However, since the current ratio of Millat Tractors is higher than the benchmark of 1. 0, it means that Millat has a sound liquidity position and unlike Al-Ghazi, it does not hold excess current assets on its balance sheet. The inventory turnover of Millat Tractors at 40. 15 days is higher than the industry average of 33. 01 days. This indicates that inventory management at Millat Tractors is poorer, thus requiring more number of days to sell the entire inventory stock on hand. However, this can be expected with Millat Tractors approach of meeting the unmet demand for locally manufactured tractors. The day sales outstanding for Millat Tractors is also higher at 7. 37 days compared to 6. 7 days for the industry, due to the higher trade debts of Rs 454 million fort Millat, compared to Rs 364 million for Al-Ghazi. This implies poorer receivables management at Millat, although the higher receivables are to be antic ipated in line with Millats higher sales. Overall, the operating cycle at Millat was recorded at 47. 52 days, compared to 39. 88 days for the industry. Total asset turnover for Millat Tractors was slightly lower at 1. 89 compared to 1. 92 for the industry, implying that Millat has yet to achieve the high sales turnover in line its investments in assets. However, sales to equity ratio for Millat is 5. 0, higher than the industry average of 3. 83. This is to be noted in connection with the fact that the equity-liabilities breakup of Millat is Rs 4. 19-7. 57 billion whereas Al-Ghazi employs Rs 6. 36-1. 30 billion of equity-liabilities. Thus the lower proportion of equity and high sales at Millat Tractors enables it to enjoy a high sales to equity ratio and this indicates a proper utilization of equity investment to generate the healthy sales turnover. The debt to asset ratio at Millat is higher at 64. 37 compared to 40. 69 for the industry, hence the industry can be deemed to be able t o meet its debt bligations in a better manner, compared to Millat. Similarly, the debt to equity ratio is higher at 1. 81 compared to 1. 01 prevalent in the industry. However, this implies the usage of more leverage at Millat Tractors, which is a positive indicator of being able to generate a high return for investors. Times interest earned for Millat Tractors is consequently lower at 352. 30 compare to 1271. 86 for the industry, due to the employment of Rs 10. 29 billion security deposits borrowing whereas AL-Ghazi does not employ any borrowings. However, Millats long term debt to equity ratio is lower at 0. 3 compared to 0. 51 for the industry, implying that the greater proportion of Millats debt is in the category of current liabilities. In line with its impressive profitability performance in FY10, Millat achieved higher earnings per share of Rs 78. 01 per share compared to Rs 61. 24 for the industry. The positive indicators of profitability performance were accordingly transmit ted to the market, hence the market price for MTL stock averaged at Rs 395. 97 per share in FY10, compared to Rs 306. 30 per share for the industry. The price earnings ratio for Millat was also slightly higher at 5. 08 compared to 4. 8 for the industry, indicating that the strong position as the market leader was greatly reflected in the share price of MTL stock. Millats profits were reflected in the dividend per share, which was recorded at Rs 65. 00 per share compared to Rs 43. 75 per share for the industry. However, the book value per share was lower for Millat Tractors at Rs 143. 16 per share compared to an industry average of Rs 219. 92 per share. This was due to a higher total shareholders equity at Al-Ghazi Tractors of Rs 6. 36 billion compared to only 21,468,200 shares, whereas at Millat the figures were Rs 4. 9 billion of equity with 29,284,400 shares. Stock performance Stock returns of weekly continuously-compounded returns over January-December 2010 shows that the standar d deviation of these stock returns is fairly high at 5. 83%. The future stock returns are expected to vary with a standard deviation of 5. 83%: this is to be expected from MTLs high capital gain and healthy dividend payout stock. In addition, the stock price has consistently exhibited an increasing trend throughout FY10, which reemphasizes the strong position of Millat Tractors in the tractor industry. Beta analysis of the company stock over Jul09-Jun10 shows that the beta of Millat Tractors is relatively low at 0. 45, as given by the slope of the trend line. This indicates that the stock is not highly reflective of KSE-100 performance. However, this means that the market factors influencing KSE-100 do not greatly impact Millat Tractors and the company is well poised to outperform the market, in line with its strong fundamentals and secure positioning in the tractor industry. Financial analysis (FY04-10) The profitability ratios of Millat Tractors improved significantly over FY09-10. The gross profit margin improved from 15. 4 in FY09 to 17. 27 in FY10 due to the well-managed cost of goods sold, even in the scenario of depreciating PKR and rising steel prices. The net profit margin increased by a larger amount, from 7. 64 in FY09 to 10. 29 in FY10 since the operating expenses were only allowed a 5. 71%, thus preserving the gross profits of the company. Return on assets increased fr om 17. 91 in FY09 to 19. 42 in FY10 on the back of an 88. 01% increase in profit after taxation, compared to a 73. 47% increase in total assets. The increase in assets was driven by an 86. 73% increase in current assets resulting from a 19. 0% increase in stock in trade, 257. 26% increase in trade debts and a 250. 83% increase in short-term investments. Return on equity increased from 36. 05 in FY09 to 54. 49 in FY10 due to the 88. 01 increase in net income, compared to a 24. 37% increase in total equity. The increase in equity resulted from a 57. 70% enhancement in unappropriated profit, pointing to the strengthening bottom-line of the company. The current ratio decreased from 1. 69 in FY09 to 1. 40 in FY10. This was the consequence of an 86. 73% increase in current assets as mentioned above, compared to a 124. 83% increase in current liabilities. Current liabilities mainly increased due to a 139. 60% increase in trade payables. The increase in current assets and current liabilities was the result of higher working capital requirements at Millat Tractors, in order to sustain the 39. 53% increase in sales over FY09-10. Asset management ratios analysis indicates that inventory turnover decreased from 48. 74 days in FY09 to 40. 15 days in FY10 due to 19. 20% increase in stock in trade. Thus the improved bottom-line performance at Millat Tractors was driven by an increase in sales augmented by improved inventory management, as a result of the implementation of IFS software. However, the day sales outstanding increased from 2. 88 days in FY09 to 7. 37 days in FY10 due to the increase of 257. 26% in trade debts. This points to deteriorating receivables management at the company which resulted in more number of days being required to recover trade debts. Overall, the operating cycle decreased from 51. 62 days in FY09 to 47. 52 days in FY09. Total asset turnover decreased from 2. 35 in FY09 to 1. 89 in FY10, indicating that Millat Tractors has yet to generate a sufficiently high sales turnover to justify the 73. 47% increase in the value of total assets portfolio over FY09-FY10. However, the sales to equity ratio improved from 4. 72 in FY09 to 5. 30 in FY10 due to the lesser 24. 37% increase in total equity compared to 73. 47% increase in total assets. Debt to assets increased from 50. 30 in FY09 to 64. 37 in FY10 as a result of the 121. 97% increase in total liabilities compared to 73. 47% increase in total assets. This implies decreasing ability of Millat Tractors to meet its debt obligations, which are mainly in the category of trade payables; trade payables increased by 139. 60% over FY09-10. Similarly, the debt to equity ratio increased by a lesser amount, from 1. 1 in FY09 to 1. 81 in FY10, because the increase in equity was lesser at 24. 37%. While this bodes negative for Millat Tractors, it also indicates that the company is employing a greater amount of leverage in its working capital requirements, which is likely to enhance sales of the company and ultimately generate higher return for investors. In addition, long-term debt to equity decreased from 1. 53 in FY09 to 0. 43 in FY10, since a 65. 17% decrease was recorded in long-term liabilities. This was mainly due to settlement of deferred revenue and decrease in deferred tax liability. However, the times interest earned increased significantly from 44. 09 in FY09 to 352. 30 in FY10 due to the 86. 71% increase in EBIT coupled with the 76. 15% decrease in finance cost. Finance cost decreased due to the settlement of short-term borrowings since the mark-up accrued on short-term borrowings in the current liabilities category also decreased by 42. 87% over FY09-10. The earnings per share of Millat Tractors increased from Rs 51. 87 per share in FY09 to Rs 78. 01 per share in FY10 on the back of high profitability achieved in FY10. The market price per share also exhibited a strong growth from Rs 227. 0 per share in FY09 to Rs 395. 97 per share in FY10. The growth in profits was shared with the stockholders, by increase in cash dividends per share from Rs 45. 00 per share in FY09 to Rs 65. 00 per share in FY10. Thus MTL stock proved to a high capital gains as well as a high dividend payout stock. Thus the price earnings ratio increased from 4. 38 in FY09 to 5. 08 in FY10, as the healthy performance of the company based on strong fundamentals, was reflected in investors perceptions and the market price of the company. However, the book value per share remained almost constant from Rs 143. 88 per share in FY09 to Rs 143. 6 per share in FY10. This was because the increase in total shareholders equity was 24. 37% compared to a 25% increase in total number of outstanding shares over FY09-10. Future outlook Today, Millat Tractors Limited is the leading company that specializes in the manufacturing of tractors, diesel engines, Forklift Trucks, and a range of other agricultural equipments. Presently the market share of MTL hovers around 57% in terms of sales. With a present production capacity of 30,000 tractors, the company plans to expand it to 40,000 in the years to come. Capacity utilization, however, exceeds 150%. Machining capacity of major components is being bolstered along with Double Shift operation to come at par with the ever-growing demand. High price of oil in the international market is creating inflationary pressure in the economy. As a result, the cost of borrowing has become higher than the preceding years. This coupled with worldwide shortage of steel is gradually rendering the company inefficient in terms of manufacturing cost. Furthermore, the GoP has regulated the prices of tractors. This coupled with lower deletion level for new entrant is creating an uneven playing field. However, the proposal to allow local assemblers to increase the price of agricultural tractors is under consideration. This will provide a breather to the company and will consequently augment the company revenue. Worst energy crisis prevailing in the country and lack of skilled manpower are the major risks which are being addressed through standby energy arrangements and in-house training of workforce. The recent natural catastrophe in the form of floods has worsened the conditions and has posed new challenges of rebuilding the infrastructure and rehabilitation of farming community. Development of new products through innovation and diversification remain in focus for continued growth and progress. Millat has made investments in new machining lines for cylinder block and engine head to maintain high quality standards. In addition, implementation of the IFS software means that the procedural automation and visibility brought by IFS would enable Millat to achieve greater production efficiency in future. The support of the government to the agriculture sector in terms of support prices to the local farmers provides greater opportunities for MTL. This enhanced income available to the farmers will not only enable them to buy agricultural inputs, but also educate themselves to modern agricultural practices to improve productivity, which is low compared to international standards. The government policy to encourage corporate farming will also create a demand for the companys products, which could also include higher horse power range of tractors and implements. COURTESY: Economics and Finance Department, Institute of Business Administration, Karachi, prepared this analytical report for Business Recorder. DISCLAIMER: No reliance should be placed on the [above information] by any one for making any financial, investment and business decision. The [above information] is general in nature and has not been prepared for any specific decision making process. [The newspaper] has not independently verified all of the [above information] and has relied on sources that have been deemed reliable in the past. Accordingly, the newspaper or any its staff or sources of information do not bear any liability or responsibility of any consequences for decisions or actions based on the [above information].

Thursday, November 21, 2019

Sexual promiscuity of female adolescents Research Paper

Sexual promiscuity of female adolescents - Research Paper Example Generally women who indulge in promiscuous sexual relationship are tagged as sluts and are degraded in decent societies. However in African American women, the tendency to involve in casual sex is higher as they have less education about healthy sexual practice and safe sex. From the traditional point, promiscuous sex was regarded as an evil and the women of such character were regarded as fallen woman. Now the structure of the society and view of sex in society has changed drastically. People take sex more causally and get involved in relationship without any moral and ethical basis. The sexual promiscuity in female adolescents is a delicate issue as the casual sex behavior of females is depended on many factors. These factors are the social situation of the female, their educational qualification, living standard and sexual instincts. Moreover, this casual sex behavior is also provoked by substance usage and alcohol consumption. It is a known fact that drugs and alcohol mostly induce the tendency to have sex among female and male equally well. It is not an easy task to eradicate this social evil of sexual promiscuity in African Female adults. The root cause of this behavior is not educating these females in the right direction. Many a times, teenage African American girls do not understand the negative consequences of sex before attaining maturity. With the wrong family background and the lack of education, these African females and males involve in sex and become victims of mental and physical disorder in the future. It is mostly the sexual promiscuity of female African women and male which leads to the rising of STDs and HIV at early stages of their life. Moreover, it is also common to find that sexually promiscuous female adolescents are caught up with depression and other emotional disorders at early stages of their life. For instance, the sexually promiscuous adolescents are those girls who led a care free sexual life during

Wednesday, November 20, 2019

Erick Erikson Stage 8 Essay Example | Topics and Well Written Essays - 1500 words

Erick Erikson Stage 8 - Essay Example In the art of making up a balance between these two forces, there arises a psychosocial vacuum. It is from this point of view that Erikson developed his theory. He believed that the ego exists all through a lifetime (Bee, 2009). He also challenged a fellow psychologist, Sigmund Freud, by noting that behavior was not all defensive. In his belief on the enormous influence of culture on behavior, he explained the interaction between the body (physiology), mind (psychology), and culture (ethos) in the process of development. Philosophically, he summed the stages into two important principles; One’s world gets bigger as they grow, and, Failure cumulates along the stages (Bee, 2009). The literature describes Erickson’s eight stages of psychological development. Infancy stage (birth to 18 months) According to Erickson theory of psychological development, first stage occurs from birth to one year or 18 months. This is a fundamental stage for child’s development. At infan cy stage, the basic conflict is between trust and mistrust, significant event at this stage is feeding. At this phase, a child develops senses of trust to their parents or caregiver, after they have shown care, reliability, or consistency, and affections. Lack in providing support, care, and reliability; will lead to a child developing senses of mistrust to people surrounding them; the guardians, caregivers, and parents (Crain, 2011). Infants are usually dependent, thus, their development of trust is ultimately based on quality and dependability to their parents or caregivers. In a successful development of child’s trust, she/he will be feeling secure and safe with the world. Caregivers and parents who are emotionally unavailable, inconsistent or unreliable, and rejecting their children, they will lead to the development in feelings of mistrust (Crain, 2011). Therefore, failure of a child to develop trust with their caregiver, will lead to believe that, the world is unpredict able and inconsistent, hence, leading to fear. At the later ages in life, child with trust will have personality of confidence or fearless while those who had mistrust will develop personality of fear. Stage two: Autonomy versus Shame and Doubt It begins from 18 months to 3 years. Mobility of children was focused during development of the theory. The physical development advances, and the child try to press for their independence. Some of the common behaviors noticed are making choices on clothes to wear, picking the toys to play with, and choosing what to eat. A child in this stage tends to be autonomous or independent (Wrightsman, 2010). The child is in dire need of their parent’s support, to avoid experiencing failure. In this process, protection from constant failure and ridicule should be avoided through encouragement. Parents should not criticize their children for accidents, and failures, at the same time, not to perform every task for the child. If self- control is at tained without loss of self –esteem, then the child grows will be characterized with will as a virtue. If children are encouraged at this stage, they will become more independent and therefore, autonomy will be achieved. However, if constantly criticized, they begin to feel ashamed of their abilities, thus, developing poor self- esteem and later become doubtful (Kail & Cavanaugh, 2010). Stage three, pre-school (3 to 5 years) At the third stage of psychological development, it occurs between the

Monday, November 18, 2019

Economic evaluation Essay Example | Topics and Well Written Essays - 5000 words

Economic evaluation - Essay Example In this paper, the roles of NICE in the provision of guidance are outlined with a specific reference made to the guidance on domestic violence. Also, the other organizations that provide similar guidance are discussed in the essay. The political, social, environmental, and economic contexts of the guidance are also outlined in the paper. Further, the cost-effectiveness of the guidance is assessed and compared to the previous methods and the implications of the guidance are discussed. Part B of the paper focuses on a publicly funded healthcare system in a country. The National Health Service of the United Kingdom is selected for the study. The various wayhs in which the organization obtains funds and resources are discussed. In addition, the economic models are evaluated within the section and the various health funding by different governments are compared in part B of this paper. NICE involves five different areas of public guidance. The first area is the guidance on the behaviour change. This guidance is mainly focussed on the individual approach. The aim of the guidance is to change the behaviours of persons at individual levels. It, therefore, recommends various behaviours that can result into healthy lifestyles amongst different group of people living in a region or area (NICE, 2014). Secondly, NICE offers guidance on exercise-referral-schemes. This guidance has more emphasis on physical exercises as stated on the definition. It aims to improve on the quality of physical exercises administered by medical practitioners or professionals. It helps the healthcare professionals to provide effective interventions in addition to the sensitization on the methods which can be used to promote physical activity. The methods are four in total. Also, Nice has been very active in the guidance on the various interventions to be used by schools to get rid of smoking. That demonstrates the roles of NICE in the fight against drug abuse. In that case, NICE makes use

Friday, November 15, 2019

Trump’s Foreign Policy Agenda on North Korea

Trump’s Foreign Policy Agenda on North Korea Which administration cabinet officer supported foreign policy on North Korea ? Secretary of Defense James Mattis has supported The president in negotiations with North Korea. Mattis has been against military action against North Korea. However, Mattis is very aware of the danger that North Korea is posing to the United States. This threat has been steadily growing and Secretary of Defense Mattis believes that â€Å"North Korea has accelerated the threat that it poses to its neighbors and the world through its illegal and unnecessary missile and nuclear weapons programs.[6]† Mattis has maintained alliances and attended meetings with leaders and representatives of nations that are allies of the US in order to provide pressure from all sides in order to deter and control North Korea’s nuclear proliferation. Secretary of State Rex Tillerson has also been closely involved in the creation of foreign policy on North Korea. Tillerson’s mentality towards North Korea is very similar to that of Secretary of Defense Mattis. Tillerson believes that nego tiations towards peace â€Å"can only be achieved by denuclearizing, giving up their weapons of mass destruction.[7]† Both cabinet members have played key roles in the Trump administration on the topic of North Korean foreign policy. Was the Congress heavily involved? Congress has not been heavily involved in North Korean foreign policy. Under President Obama’s term, Congress had passed sanctions. But under President Trump’s term, Congress has not been involved with foreign policy on North Korea. It has been handled so far only by the president in the form of executive orders, along with the council of his cabinet members, mainly Secretary of State Rex Tillerson and Secretary of Defense James Mattis. Which interest groups were involved? The two big interest groups in this situation are Russia and China. Both countries have supplied aid to North Korea in order to keep it in power, but for different reasons. China has supported North Korea for so long in order to keep a buffer zone between them and South Korea, a United States ally. China does not want the US at their border and will keep supporting North Korea as long as the trade-off of goods for this buffer zone is worth it. Russia has also been supplying North Korea with resources for many years, but the reason it is doing so is that it wants to reassert itself as a global power. Russia wants to extend its influence outside of Europe and into the Asian Pacific. Both nations seek to gain something from the survival and future growth of North Korea as a key player in the region. South Korea is the biggest interest group, with North Korea being right above them. If North Korea launched an attack, South Korea would be the first and most likely target of said attack. T hey will be the first affected by any change in North Korea, for better or worse. The United States also has interests in the region. South Korea has US military bases and is a key ally in the region. If North Korea attacked the south, it would destabilize the region and pose an immediate threat to US interests. If North Korea stopped its production of nuclear weapons and stopped performing tests, it would lower tensions and allow the US to comfortably remain in the region in order to ensure democratic control of the region. The History of North Korean policy The United States policy on North Korea begins with the Korean war. This war began in June 1950 and came to an end in July 1953. This war came to fruition when North Korean leader Kim il-Sung successfully convinced Soviet leader Joseph Stalin that the time had come to launch an invasion of South Korea. On June 25, 1950, the north had begun an attack by striking across the 38th parallel into the south. In response to this attack, President Truman decided not to seek a declaration of war from Congress, believing that it would be an overreaction. Immediate action was needed and Truman decided to go directly to the United Nations. He requested sanctions against North Korea, and â€Å"Under U.S. guidance, the UN called for the invasion to halt (June 25), then for the UN member states to provide military assistance to the ROK (June 27). [1]† However, this did not stop the fighting and did not keep the North from killing those who protested against them. Once the United States began to back South Korea with troops, they managed to push them back past the 38th parallel until China began to send reinforcements. Soon, a stalemate was reached at the 38th parallel. In July 1953, an armistice was reached but the war was not declared officially over. Future sanctions against North Korea first came from the United Nations. These sanctions began after North Korea displayed its capacity for the creation of nuclear weaponry with its first nuclear test in 2006. The first sanctions came from resolution 1718, â€Å"which prevents a range of goods from entering or leaving the Democratic People’s Republic of Korea and imposes an asset freeze and travel ban on persons related to the nuclear-weapon programme.[2]† The latest sanctions to come from the UN were passed on September 11, 2017, with resolution 2375. These sanctions limited North Koreas exports â€Å"including a ban on the sale of natural gas liquids to the North-East Asian nation, and on its textile expo rts — while also prohibiting Member States from providing work authorizations to its nationals.[3]† However, North Korea has continually ignored these sanctions and continued to have a nuclear weapons program. The United States has also enacted sanctions against North Korea, beginning in 2016 with President Obama. The proposed sanctions passed both the house and senate. The sanctions â€Å"Impose[d] mandatory sanctions for entities that are involved in North Korea’s mineral or metal trade, which contribute to a large component of the country’s foreign export earnings.[4]† The most recent sanctions have come from President Trump on September 25, 2017, which were enacted as executive orders. The executive order â€Å"expanded his controversial travel ban to include people from North Korea, Venezuela and Chad, citing security concerns.[5]† However, despite these actions, North Korea has not been deterred from continuing its developments of Nucle ar weapons. Evaluation of the foreign policy on North Korea The United States foreign policy on North Korea has been focused on sanctions that will put a strain on both their economy and the progression of their nuclear program. These sanctions have limited both their imports and exports so that they may not purchase resources nor make money by selling the goods that they do have, such as natural gas. These sanctions have been ineffective, no matter how restrictive they have been, due to their allies supplying them with the resources that they need to maintain power. Further sanctions will prove to be fruitless if this issue is not solved, and it may be best to find another way to limit their production of nuclear arms. However, this will not be possible if North Korea is pushed to the point where it will attack. In the past few months, the president has been threatening military action towards North Korea if they do not stop testing ICBMs. President Trump has posted a tweet on the matter, stating that â€Å"Our country has been unsuccessful ly dealing with North Korea for 25 years, giving billions of dollars & getting nothing. Policy didnt work![8]† The growing threat of North Korea is a result of its recent successful missile tests. This success paired with the ineffectiveness of past sanctions is pushing The United States towards considering a preemptive strike on North Korea, especially if negotiations break down further. Conclusions   Military action is not needed in order to resolve the threat that North Korea is posing on the United States and its allies. Sanctions have proved to be ineffective towards deterring them from continuing a nuclear weapons program, but perhaps a different course of action could be taken to progress these talks. It would be best to refrain from escalating the situation by remaining quiet and not speak about military action, which may be what they want because that would allow them to justify the existence of their program. A neutral party may be necessary to provide a medium for communications between the United States and North Korea. The two leaders would not be able to speak and negotiate publicly due to the ramifications of doing so. North Korea would begin to lose support from their allies, Russia and China. The United States also could not hold public negotiations due to their classification of North Korea as a sponsor of terrorism. Negotiating with North Korea may give the impression that the US will negotiate with terrorists. This part of the problem can be solved by declassifying them as a sponsor of terror. This would ease tensions slightly and may even open a small path for diplomacy. A party that is both familiar with and impartial towards the United States and North Korea would ease the progression of diplomacy. This would be the way to de-escalate the situation in North Korea and avoid military action that would lead to a second Korean war, which is what forced these tensions to be created in the first place. Works Cited Millett, Allan R. Korean War. Encyclopaedia Britannica, Encyclopà ¦dia Britannica, inc, 17 July 2017. Accessed 2 Dec. 2017.SECURITY COUNCIL CONDEMNS NUCLEAR TEST BY DEMOCRATIC PEOPLE’S REPUBLIC OF KOREA, UNANIMOUSLY ADOPTING RESOLUTION 1718 (2006). United Nations, United Nations, 14 Oct. 2006, www.un.org/press/en/2006/sc8853.doc.htm. Accessed 2 Dec. 2017.Security Council Imposes Fresh Sanctions on Democratic People’s Republic of Korea, Including Bans on Natural Gas Sales, Work Authorization for Its Nationals. United Nations, United Nations, 11 Sept. 2017, www.un.org/press/en/2017/sc12983.doc.htm. Accessed 2 Dec. 2017.Fifield, Anna. Punishing North Korea: A rundown on current sanctions. The Washington Post, The Washington Post, 22 Feb. 2016. Accessed 4 Dec. 2017.US expands travel ban to include N Korea. BBC, BBC, 25 Sept. 2017, www.bbc.com/news/world-us-canada-41382585. Accessed 4 Dec. 2017Manchester, Julia. Mattis: North Korea threat has ‘accelerated’. The Hill, The Hill, 28 Oct. 2017. Accessed 5 Dec. 2017Sanger, David E. Rex Tillerson Rejects Talks With North Korea on Nuclear Program. The New York Times, The New York Times, 17 Mar. 2017. Accessed 6 Dec. 2017.Trump, Donald J. (@realDonaldTrump) â€Å"Our country has been unsuccessfully dealing with North Korea for 25 years, giving billions of dollars & getting nothing. Policy didnt work!† 9 Oct. 2017, 3:50 AM, Tweet

Wednesday, November 13, 2019

The Devils Arithmetic - Relationships Essay -- Jane Yolen

The Devil’s Arithmetic is written by Jane Yolen. The story’s main character is Hannah. Hannah is a thirteen year old girl who is unappreciative of her family and everything they do for her. During a Seder dinner, Hannah is transported back in time to rural Poland in 1942. In this time Hannah becomes Chaya. During a wedding procession, she is captured and taken to a concentration camp. In the camp Hannah experienced different kinds of family structures. Some of the family structures Hannah experienced in the camp were with her immediate family, her friendships, and with other strangers. During her time as Chaya, Hannah was involved in many family structures. One of which is with her immediate family. She witnessed self sacrifice of herself and the others around her. While getting ready for her Uncle Shmuel’s wedding, she received two blue ribbons. Her Aunt Gitl gave her a blue dress, and to go with the dress she gave Hannah a pair of blue ribbons, which she had been saving for her wedding night. â€Å"These I was saving for my wedding night-about which you know so much,† (pg. 6) Gitl sacr...

Sunday, November 10, 2019

Indian two-wheeler industry Essay

Overview The Indian two-wheeler (2W) industry recorded sales volumes of 13. 4 million units in 2011-121, a growth of 14. 0% over the previous year. In a year wherein growth in other automobile segments particularly, passenger vehicle (PV) and medium & heavy commercial vehicle (M&HCV), slowed down to single digits – marred by demand slowdown due to northward movement of inflation, fuel prices and interest rates – the 14% growth recorded by the 2W industry remained steady. However, the momentum in the 2W industry’s volume growth too has been losing steam lately as evident from the relatively lower volume growth of 11. 0% recorded in H2, 2011-12 (YoY) against a growth of 17. 1% recorded in H1, 2011-12 (YoY). The deceleration in growth is largely attributable to the motorcycles segment which grew at a much lower rate of 7. 8% (YoY) in H2, 2011-12 vis-a-vis 16. 4% in H1, 2011-12; even as the scooters segment continued to post 20%+ (YoY) expansion during both halves of the last fiscal. With this, the share of the scooters segment in the domestic 2W industry volumes increased to 19. 1% in 2011-12 from 17. 6% in 2010-11. Overall, ICRA expects the domestic 2W industry to report a volume growth of 8-9% in 2012-13 as base effect catches up with the industry that has demonstrated a strong volume expansion over the last three years at cumulative annual growth rate (CAGR) of 21. 8%. Over the medium term, the 2W industry is expected to report a volume CAGR of 9-11% to reach a size of 24-26 million units (domestic + exports) by 2016-17, as we believe the various structural positives associated with the domestic 2W industry including favourable demographic profile, moderate 2W penetration levels (in relation to several other emerging markets), under developed public transport system, growing urbanization, strong replacement demand and moderate share of financed purchases remain intact. Table 1: Trend in Sales Volumes of the Indian 2W Industry Volumes (Units, Nos.) Domestic Motorcycles Scooters Mopeds Total Domestic 2010-11 9,019,090 2,073,797 697,418 11,790,305 Exports 2010-11 Motorcycles Scooters Mopeds Total Exports Source: SIAM Q1 2011-12 2,464,143 532,867 190,672 3,187,682 Q1 2011-12 1,480,983 52,312 6,295 1,539,590 1 Refers to domestic sales volumes ICRA LIMITED 482,566 20,949 1,461 504,976 YoY Growth (%) Q2 2011-12 Q3 2011-12 Q4 2011-12 2,558,515 650,155 192,859 3,401,529 2,556,782 659,643 186,472 3,402,897 2,514,699 720,176 206,863 3,441,738 Q2 2011-12 Q3 2011-12 Q4 2011-12 492,408 24,696 3,478 520,582 448,090 23,950 2,796 474,836. 434,521 21,010 1,341 446,872 2010-11 22. 9% 41. 8% 23. 5% 25. 8% 2010-11 34. 3% 73. 6% -8. 8% 35. 0% Q1 2011-12 17. 5% 13. 3% 21. 0% 17. 0% Q1 2011-12 27. 1% 100. 4% -44. 0% 28. 6% Q2 2011-12 15. 4% 29. 0% 7. 0% 17. 3% Q2 2011-12 31. 7% 88. 5% 159. 2% 34. 0% Q3 2011-12 9. 2% 21. 6% 2. 6% 11. 0% Q3 2011-12 21. 8% 92. 0% 188. 0% 24. 5% Q4 2011-12 6. 3% 29. 4% 16. 4% 11. 1% Q4 2011-12 18. 1% 29. 0% -2. 3% 18. 5% Corporate Ratings Anjan Deb Ghosh +91 22 3047 0006 anjan@icraindia. com Analyst Contacts: Subrata Ray +91 22 3047 0027 subrata@icraindia. com Jitin Makkar +91 124 4545 368jitinm@icraindia. com. MEDIUM TERM DEMAND DRIVERS STAY PUT An analysis of the mix of Indian populace and the structure of the Indian 2W industry brings to the fore several key attributes namely, India’s demographic advantage, moderate 2W penetration levels and shrinking of replacement cycle; factors that have combined to propel the industry’s volumes over the last 10 years from 4 million units in 2001 to 13 million units in 2011. In ICRA’s view, these growth drivers are likely to remain relevant over the medium term and continue to provide impetus to the industry’s volumes. Chart 1: Estimated population of India’s Youth (20-40 years age) 250 Demographic Advantage 229 207 206 189 200 161 157 million 150 100 41 million youth estimated to be added to India’s population mix over the next five years 50 0 2001 Male 2011E Female 2016E Source: Census 2001; Census 2011; ICRA’s Estimates In the age bracket of 20-40 years, which is the key target segment for 2W, around 77 million youth got added to the Indian population mix in the last decade, which has been the key contributor to the 2W industry’s volume growth over the last 10 years. India’s demography continues to remain favourably on its side with average age of 25 years, which is 9 years younger than China, and more than 12 years and 19 years younger than the US and Japan, respectively. Over the next five years, the incremental addition in India’s youth population is estimated to be ~41 million, a fairly large number that is likely to sustain the strong demand for 2W. The 20-40 years age group is characterized by a combination of earning power and high spending propensity, which should increase the likelihood of conversion of potential ownership into actual ownership. Chart 2: Trend in 2W Penetration in Indian Households 18 16 35% 13. 8 14 Underpenetrated Market 35% The 2W penetration level in Indian households was 12% in 2001. This low 2W penetration provided the structural thrust to the domestic industry’s volume growth over the last decade whose annualized volumes expanded by a factor of 3. 4x during this period. As of 2011, the 2W penetration levels in Indian households, while having increased to 21%, continue to remain moderate and much lower than in some of the other emerging markets such as Brazil, Indonesia, Thailand and Taiwan. Also, the penetration rates differ vastly between India’s rural and urban areas, with rural areas being under-penetrated by a factor of 2. 5x as compared to urban areas. Additionally, the social trend in favour of nuclear families is expected to further increase the number of households which could be potential targets for the 2W industry. 30% 12 million 40% 16. 8 25% 25% 10 7. 9 8 5. 4 6 20% 14% 15% 10% 4 7% 2 5% 0 0% 2001 No. of Rural Households 2011 No. of Urban Households 2W Penetration – Rural 2W Penetration – Urban Source: Census 2011 ICRA LIMITED Chart 3: Trend in 2W Population in India. 30 25 million 20 Population of 22. 5 million units, equivalent to cumulative 2W sales volumes from 1995 to 2001 Population of 51. 8 million units, equivalent to cumulative 2W sales volumes from 2007 to 2011 24. 0 15 13. 3 10 9. 3 5 0 2001 2W Population – Rural 2011 2W Population – Urban Source: Census 2011, SIAM, ICRA’s Estimates Chart 4: Age Profile of 2W in India 100% 90% 30% 39% 80% 70% 53% 17% 60% 50% 21% 40% 30% 35% 52% 20% 10% 0% 40% 11% Motorcycle > 10 years Scooters 6-10 years Source: SIAM, ICRA’s Estimates ICRA LIMITED Shrinking Replacement Cycle 27. 8 Mopeds 0-5 years. While the 2W population in India has more than doubled over the last decade, the replacement cycle is estimated to have reduced from around 7 years (in 2001) to around 5 years (in 2011). The reduction in 2W replacement cycle implies that the average annual mileage covered per 2W has been on the rise, given that (distance run multiplied by age) of 2Ws is unlikely to have changed much over the years. As per industry estimates, around 50% of the total domestic sales of 2W are now made to first-time buyers, 30% to customers looking to upgrade from their existing vehicle, and 20% to buyers seeking a second vehicle for the household. The break-up suggests that currently around 50% of the sales in the domestic 2W market are made to replacement buyers. Considering that the industry has sold around 49 million 2W in the domestic market in the last five years, the total replacement demand works out to be a fairly large number. Add to this the healthy growth in sales to first-time buyers in recent years, driven in particular by sales to the rural market, the replacement opportunity could only increase in the future. From the consumer perspective, although replacement involves fresh capital spending, the inducement of upgrading to an improved technology 2W, having better performance, features and more attractive styling; complemented with increased spending propensity are expected to be the prime ingredients feeding replacement demand. SEGMENTAL ANALYSIS OF THE 2W INDUSTRY The motorcycles segment accounts for a bulk of 2W industry’s sales volumes; however, the scooters segment has grown relatively faster over the last five years Chart 5: Trend in 2W Segment Volume Mix (Domestic) 100% 90%. 4. 5% 12. 0% Chart 6: Trend in segment-wise sales volume growth of 2W 5. 7% 5. 8% 6. 0% 5. 9% 5. 8% 45% 14. 5% 15. 5% 15. 6% 17. 6% 19. 1% 35% 80% 70% 25% 60% 50% 40% 83. 5% 15% 79. 8% 78. 7% 78. 4% 76. 5% 75. 1% 30% 5% 20% -5% 10% 0% 2006-07 Source: SIAM 2007-08 2008-09 2009-10 2010-11 Motorcycles Scooters Mopeds 2011-12 2006-07 2007-08 2008-09 2009-10 2010-11 2011-12 -15% Motorcycles Scooters Mopeds Source: SIAM With sales volumes of 10. 1 million units, the motorcycles segment is the largest sub-segment of the domestic 2W industry accounting for a bulk of its volumes. However, over the last five years, the motorcycles segment has seen its volume share in the domestic 2W industry slide down to 75. 1% in 2011-12 from the highs of 83. 5% recorded in 2006-07. Although domestic motorcycle volumes grew at 9. 0% CAGR during the last five years, both the scooters segment as well as the mopeds segment grew at a much faster CAGR of 22. 2% and 17. 0%, respectively; contributing to reduction in the motorcycle segment’s volume share. The three 2W sub-segments are targeted at distinct consumer categories. The motorcycles are targeted at the male population in both rural areas as well as urban areas (with further segmentation based on usage pattern – family bike or individual bike, consumer profile – commuter Vs performance seeker etc); the scooters are more of an urban phenomenon targeted at the female population (TVS Scooty, Hero Pleasure), male population (Hero Maestro) as well as unisex offerings (Honda Activa, TVS Wego); mopeds are targeted at the lower middle-class segment and derive a large part of their volume share from the rural sector where they are used as a utility vehicle bearing heavy loads on rough village roads. While each of the three sub-segments has distinctive growth drivers, we expect the scooters segment to maintain its pace of growth faster than that of the 2W industry as a whole. The faster volume growth of the scooters segment is expected to be driven by (a) growing acceptability of gearless scooters, particularly by women; (b) rising urbanization and increasing proportion of working women; (c) expanding product offerings in the scooters segment; and (d) comparatively lower base. Accordingly, ICRA expects the scooters segment to gradually increase its share in the domestic 2W market from 19. 1% in 2011-12 to ~27% by 2016-17E. With this, the volumes in the domestic scooters market are estimated to get doubled by 2016-17E over the current levels.

Friday, November 8, 2019

porn on the net essays

porn on the net essays Why is the Internet so enticing for pedophiles? Its created easily accessible stimulation for child molesters. Anybody can download pictures in complete anonymity. They do not have to make any kind of human contact (Trebilcock 102). There may be definitions to describe pornography, but they do not truly examine the destruction, degradation, and the pathetic nature of the concept. The word pornography is more destructive than one might believe. It would fit perfectly into Sonia Maasik and Jack Solomons essay entitles Cheap Thrills. The essay talks about the influencing images of music, video and television. The computer is becoming more and more influencing because of the internet these days. The problem with this type of material today is it is assessable on every computer that is connected on-line to the Internet. Pornography should be eliminated on the Internet so that impressionable individuals can not access the degrading Al Gore says Some say that we should refrain from action, that all action to block childrens access to objectable content amounts to censorship. To them I say, blocking your childs access to objectionable Internet content is not censoring thats called parenting( Simons B10). Eliminating pornography on the net will help to decrease the large amount of pornography users, which will decrease crime. Dr. Victor Cline, from the University of Utah, conducted a study regarding serial murders and rapists. He observed users developing a four-step pattern with pornography. The first step in his study was the addiction. The serial murders and rapist claimed that at first they become addicted to the material. Dr. Clines study didnt stop there. The serial murderers and rapists claimed to continue on with their addiction. They increased to the next step of Dr. Clines observed patterns. ...

Wednesday, November 6, 2019

The Stone Angel essays

The Stone Angel essays In the novel, The Stone Angel by Margaret Laurence, it becomes quite evident that Hagar Shipleys inability to communicate is the source of the problems encountered in her life. It is this vicious quality that further enhances the inaccuracy of perception provided by Hagar. We will look at failed relationships of Hagars past regarding her brothers, her father Jason Currie, her husband Bram, and Hagars encounter with her realization of the truth. Even when Hagar was a young girl, her inability to communicate was easily recognizable. She was even then incapable of showing affection to others. In her young teens, Hagar was confronted with a situation she wasnt able to cope with emotionally. Dan Shipley, her older brother by four years, was dying and craved the comfort of their deceased mother. Matt, her eldest brother, begged and pleaded Hagar to put on their mothers shawl and hold Dan while he died. At the mention of this proposal, Hagar stiffened and and drew away her hands. Hagar is unable to do what is demanded of her: ...all I could think of was that meek woman Id never seen, that woman that Dan was said to resemble so much and from whom hed inherited a frailty I could not help but detest, however much a part of me wanted to sympathize. To play at being her it is beyond me. I cant Matt. I was crying, shaken by torments he never even suspected, wanting above all else to do the thing he asked, but unable to bend enough (page 25) Although Hagar believes she is successfully avoiding exposure of weakness on her part by holding back her emotions, she is only showing her weakness as a person, through lack of compassion for her dying brother. This experience with her brother Matt caused many disturbances in their future relationship,...

Monday, November 4, 2019

Business Ethics; Constitutional Law; Antitrust and Monopoly Essay

Business Ethics; Constitutional Law; Antitrust and Monopoly - Essay Example It dictates the kinds of businesses that investors indulge in, the legal specifications and tax requirements. Upcoming business enterprises must comply with these rules and regulations (Steven, 2008 p.78). Antitrust in the business world explains how it seeks to make sure that business enterprises compete fairly in the market. This in the past, has had an effect on the economy of many countries in the world. With beliefs that free, commercial trade is advantageous to consumers, businesses and economy, this law restricts monopolization and restraints of trade activities. Four main areas emanate from this: pursuit of monopoly power, agreements between competitors, contract arrangements between buyers and sellers and business mergers (Keith, 2007 p.120). A monopoly is a market whereby there is only one supplier or manufacturer or producer of a product. This means that a producer provides a good or service without any competition. The goods have no close substitutes (Jens, 2008 p.89). A legal doctrine describes a set of rules and regulations established through a process of precedence in the common law. This helps in making judgments in legal cases. Laws in legal doctrines stipulate that judges make a judgment about cases in reference to cases that in the past had judgment passed. Judges have the power to refer to other cases if the one he is handling is similar. This helps bring down time spent on cases and helps reach judgment faster. The law allows for use of this technique. Situations in legal doctrines are for instance; a company accused of counterfeiting goods that belong to an original company. If a person is before a court of law under the accusation of stealing the design of another person, he is to face the same judgment that the company undergoes. This shows that the two cases are common and that the same judgment applies to both the cases. An idea to the addition of the