Wednesday, July 31, 2019

Public Addressing System

Table of Contents Acknowledgment†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Abstract†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Introduction†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Background of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Statement of the Problem†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Objective of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Scope and Limitations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. * Significance of the Study†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Conceptual Framework†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Discussion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã ¢â‚¬ ¦Ã¢â‚¬ ¦ * Schematic Diagrams†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ * Parts List†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Conclusion†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Glossary†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Appendices†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Recommendations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ AcknowledgmentThe proponents would like to express their sincerest and deepest gratitude to the following for their contribution and involvement in the project: to God Al mighty, for His unfathomable grace and overwhelming blessings, to their parents, for providing the place to stay throughout the project. If it weren’t for their financial, emotional, mental, and spiritual support, the proponents wouldn’t have completed the project, to the librarians of the Don Honorio Ventura Technological State University for their assistance, to their supportive Electronics Engineering Department Instructor, Engr.May Layson for giving them the opportunity to fulfill this project and lastly, to their friends, classmates, colleagues and everyone who were not mentioned who also, even in their small ways, helped in the improvement and fulfillment of the project, and supported the proponents until the end. They are forever in debt to everyone for their undying support, for without them, this project wouldn’t be completed. Abstract There had been a number of projects that focuses on the important aspects of a Public Addressing System.This study was then conducted in order to understand and appreciate the working principles of PA systems from their construction, functions and daily applications. Specifically, this research aimed to identify the role and reliability of PA Systems as a tool for communications. The design of the device was based on the perspectives of the instructors on how the system will satisfy the needs of the institution. The advantages and disadvantages of using the tool were also discussed. Weighted means were computed to analyze the significance of the project.The results showed that the project is capable of being an optional sound reinforcement system since it can do mixing and amplifying signals of different inputs. This in turn benefits the student’s society as it enables them to have means of addressing with one another through a sound amplification system. This also helps in reducing the constraints of having a poor sense of communication in a limited range. Nonetheless, the students involved also agree that the accuracy of the data obtained from the test results are quite difficult to ensure considering that the knowledge about the device is limited.Future researchers could easily take enhancements recommended for the betterment of the project. Moreover, legal consultation had been correlated to this tool. As stated from literatures, these finding clearly emphasizes the need for some additional resources from the previous studies and advices from instructors to ensure the reliability and validity of the results obtained. Items that point out to lack of available components must be taken out. Furthermore, outcomes of project enhancement and appraisal can be more successful by combining the concepts and ideas made based from the prototype versions.Introduction Communication plays an important role in the development of a nation. It is an integral part of development. Societies cannot change and develop without communication, as it is a process of social interaction throug h which people are influenced by ideas, attitudes, knowledge and behavior of each other. Nowadays, communication has attained a great importance in the developmental programs. It is through the process of communication that people are made aware of the nature and objectives of the programs.The useful developmental messages are conveyed to the target groups through various communication approaches. This helps people in acquiring new knowledge required for coping with fast changing society and in adoption of innovations for the improvement of their practices, methods and quality of life. Through the advancement of technology, electronics paved way for the development of communication systems. One of the innovations brought about these technologies is the Public Addressing System.A Public Addressing System or simply PA System is an electronic sound amplification and distribution system. It is anything that amplifies sound so more people can hear it. Most basic systems these days includ e several different parts such as one or more microphones, one or more speakers, a mixer that allows the user to control the volume, tone and balance of different voices or instruments, an amplifier (built into the mixer, built into the speakers, or purchased separately) and stands to hold the speakers and microphones at appropriate height and angles.From this documentation, the researchers were able to explore and delve deeper about the concepts on how a PA System work and how does it contribute to development in the field of communication systems. Background of the Study A Public Address (PA) system is a collection of audio equipment that allows broadcasts over a designated area. Often found in schools and office buildings, PA systems can be used for general announcements or emergency information, providing a simple way to get information out quickly. PA systems can be basic or advanced, and people can customize them to fit a variety of needs.There are even personal models that ca n be less expensive, but allow for a much shorter range. The term is also used for systems which may additionally have a mixing console, amplifiers, and loudspeakers suitable for music as well as speech, used to reinforce a sound source, e. g. , recorded music or a person giving a speech, and distributing the sound throughout a venue or building. Sound reinforcement systems and PA systems may use some similar components, but with differing application, although the distinction between the two is not clear-cut.Sound reinforcement systems are for live music or performance, whereas PA systems are primarily for reproduction of speech. The presence of the light weight components included in the circuit makes it easier to carry, and therefore, making it handy. Recently from the previous projects, we have used several components to amplify signals. Some of which are the bipolar junction transistor, field-effect transistor and metal-oxide semiconductor transistor, now we will use one of the best amplifying device, the IC OP-AMP. 41 OP-AMP is a versatile IC that can be used as a differential amplifier. From this, the researchers must be able to conceptualize and build effective Portable Public Addressing System using operational amplifiers and other electronic components as the center of the study. Statement of the Problem What is the purpose of a Public Addressing System? The purpose of a portable PA system is to provide an accessible way of addressing in a crowd. This is very useful when communications are to be made in a limited broadcasting range. Objective of the StudyTo be able to conceptualize and build an effective public addressing system using IC-Operational Amplifiers and other electronic components and understand and appreciate its principles of operation as well as its primary function and applications. Scope and Limitations While a simple and portable PA system is often fairly expensive, it can provide a speaker with some options for addressing a crowd of people. This type of public announcement hardware provides someone with extremely limited broadcasting range, often including only a single speaker, but still serves to amplify the user's voice.All PA systems are also delimited since they have a potential for audio feedback, which occurs when sound from the speakers returns to the microphone and is then re-amplified and sent through the speakers again. Another thing is, more advanced versions increase in price considerably, especially with numerous cords, wireless hubs, and adaptors that may be required. This all depends, however, on what a person or business needs in terms of PA system hardware and installation. Significance of the StudyThe project is intended to enrich and upgrade the knowledge of the proponents about the different uses of IC Operational Amplifiers by constructing a simple portable Public Addressing System. This study will be a significant endeavor in promoting the construction of useful devices with the advancem ents of electronics. It will also be beneficial to the students and instructors in some applications employing conduction of gatherings, meetings, seminars and workshops for effective learning in their classroom setting particularly in different concepts related to electronics.By understanding the needs of the students and benefits of quality education, these instructors and students are assured of a competitive advantage. Moreover, this project will provide recommendations on how to evaluate the performance of the researchers involved in accordance to the outcome of the study. Conceptual Framework A Public Address System is an electronic sound amplification and distribution system with an audio input, amplifier and an audio output. The Portable Public-Addressing System (PA systems) is capable of amplifying different input signals like microphone, audio, and guitar signals simultaneously.Microphones The transmission can begin with a microphone, which is a device that can assist in m agnifying an audio source's volume. A microphone is classified as a device that transforms sound into an electrical signal. Microphones used in PA systems are usually dynamic or condensers. Dynamic microphones are more rugged than condensers and are able to withstand the elements a little better. Condenser microphones utilize their own power source and produce better-quality audio signals, but can sometimes be so sensitive that they also receive background noises.Mixers If a microphone or another audio source is used in a PA system, it is plugged into a mixer. The mixer allows for multiple channels of sound to be broadcast at different levels. This can help prevent feedback if a PA system will involve multiple microphones, instruments, or other audio sources. For example, someone may use a PA system to sing along with a pre-recorded CD. The CD track could be plugged into one channel, while the singer's voice would be broadcast through another. Amplifier The amplifier is usually side by side or incorporated with the mixer.The amplifier's job is to magnify the audio signal by manipulating its varying frequency qualities. Gain in an amplifier refers to the decibel level of the sound coming out of the speakers. Another quality, Output Dynamic Range, refers to the loud and soft levels of a specific channel's sound. Too low of an output could result in just broadcasting noise; too high of an output can lead to distortion. Loudspeakers The loudspeaker is the output end of the PA system, transforming the electrical signal back into sound that a group can hear.A good loudspeaker system will separate the differing sound frequencies and broadcast them through different sound channels for better quality output. Parts of a loudspeaker system include a woofer, which broadcasts low frequency sounds; and tweeters, the drivers of high frequency output. Some speakers also contain crossover systems that are responsible for separating these frequencies, reducing the electrical no ise that can sometimes accompany a PA system broadcast. Discussions The design of the system internally contains three major stages. These stages are connected to each other to attain the circuit of a Portable Public Address System.The first stage is the power supply of the circuit; has a center-tapped transformer with the primary set to 220Vac and secondary of 12-0-12Vac. This transformer is connected to diodes and capacitor which is responsible for filtering and to produce a full-wave output. This output will become a DC voltage which will serve as +VCC for the next stage. The second stage is for the Pre-amplifiers. There are three Pre-amplifiers which contain two inputs for the microphone and one for the guitar. The Pre-amplifiers in the project use an IC which is generally considered as one the most versatile component there is.The purpose of the IC is to amplify the input sound signals to produce a sound suitable for speakers. Normally in the pre-amp, the output of the sound is not quite satisfying. An increase in the volume of the sound will be attained when it is connected into another stage which is the Power-Amplifier stage. This is the last stage of the circuit. The Power-Amplifier is one that drives the input sound coming from the pre-amplifier to produce an output through speakers. The Power-Amplifier uses an IC also. The loudness of the sound is produced by the Power-Amplifier. Schematic Diagrams * Audio * Guitar Microphone * Microphone Power Amplifier * Power Supply Parts list Label| Quantity| Description| R1, R2, R3| 3| 1K 1/4W Resistor| R4, R5, R6| 3| 10K Logarithmic Pot| R7| 1| 1Meg 1/4W Resistor| R8, R10| 2| 10K 1/4W Resistor| R9, R11| 2| 100K Linear Pot| C1, C2, C5, C6| 1| 0. 1uF Ceramic Disc Capacitor| C3, C4| 2| 22nF Ceramic Disc Capacitor| U1, U2| 2| 741 Op Amp| J1, J2, J3| 3| Input Jacks| MISC| 1| Board, Wire, Knobs, IC Sockets| Conclusion A Portable Public Address System is an electronic sound amplification and distribution system with a microphone, amplifier and loudspeakers used to allow a person to address a large public for example for announcements of ovements at large and noisy air and terminals. The PA system contains a mixing console where the amplifiers and loudspeakers are suitable for music and as well as speech used to reinforce a sound source and distributing the sound throughout a venue or building. It is often used in small areas such as school auditoriums, churches, small bars or other places. The significance of being portable is by means of you can carry it anywhere because it is lighter and useful for emergency or immediate announcements.It also contains two systems combine in one module. The two systems may use some similar components but with different application. It has a sound reinforcement system which is the guitar input use for music performance and a PA system which is the microphone input use for speech purposes. Glossary A Amplify – to  make  larger,  greater,  or  st ronger;  enlarge;  extend. Audio – pertains to employed  in  the  transmission,  reception,  reproduction  of  sound. B Bipolar junction transistor (BJT) – has three terminals connected to three doped semiconductor regions.Board – piece  of  wood  sawed  thin,  and  of  considerable  length  andbreadth  compared  with  the  thickness. C Condenser-lens  or  combination  of  lenses  that  gathers  andconcentrates  light  in  a  specified  direction,  often  used  to direct  light  onto  the  projection  lens  in  a  projection  system. Constraints – limitation  or  restriction. Circuit – the  complete  path  of  anelectric  current,  including  the  generating  apparatus, intervening  resistors,  or  capacitors. Capacitor – is a passive two-terminal electrical component used to store energy in an electric field.Console â€⠀œ a physical device to operate a computer. D differential amplifier  Ã¢â‚¬â€œ a type of electronic amplifier that amplifies the difference between two voltages but does not amplify the particular voltages. F field-effect transistor  (FET) is a  transistor  that uses an  electric field  to control the shape and hence the  conductivity  of a  channel  of one type of  charge carrier  in a  semiconductor  material feedback – occurs when a sound loop exists between an audio input (for example, a  microphone  or  guitar pickup) and an audio output (for example, a  loudspeaker).H hub  Ã¢â‚¬â€œ makes the networking of multiple computers in the home or office easier. I Integrated circuit (IC) – the patterned diffusion of trace  elements  into the surface of a thin  substrate  of  semiconductor  material. Input  Ã¢â‚¬â€œ term  denoting  either an entrance or changes which are inserted into a  system  and which activate /modify a  process. J Jack – is a small, round electrical connector found on audio and video products that is used to interconnect components. Junction – point where at least three circuit paths meet. KKnob – a small rounded ornament or handle. M MOSFET (metal-oxide semiconductor field-effect transistor – special type of field-effect transistor (  FET  ) that works by electronically varying the width of a channel along which charge carriers (  electron  s or  hole  s) flow. Microphone – an acoustic-to-electric transducer or sensor that converts sound into an electrical signal. N Noise  Ã¢â‚¬â€œ unwanted sound. O Operational-Amplifiers – widely used electronic devices today, being used in a vast array of consumer, industrial, and scientific devices.Output – term denoting either an exit or changes which exit a system and which activate/modify a process. P Portable – denotes something that is handy. Plug – a male fitting for making an electrical connection to a live circuit by insertion in a receptacle (as an outlet). Pre-amplifier (pre-amp) – an electronic amplifier that prepares a small electrical signal for further amplification or processing Potentiometer – commonly used to control electrical devices such as volume controls on audio equipment. RResistor – is part of an electrical circuit that resists the flow of current. Reinforcement – is when a behavior is increased or maintained by its consequences. Rugged – having a rough uneven surface. S Signal – a detectable physical quantity or impulse (as a voltage, current, or magnetic field strength) by which messages or information can be transmitted. Speaker – an output device used specially for audio signals. T Transistor – a semiconductor device used to amplify and switch electronic signals and electrical power.Terminal – a position in a  circuit  or device at which a connection can be made or broken. References Articles * Basic P. A. Systems: A Primer For Using P. A. Systems by Yorkville Sound Books * Electronic Devices and Circuit Theory by Robert L. Boylestad and Louis Nashelsky * Electronic Principles by Albert Paul Malvino * Teach Yourself Electricity and Electronics 5th Edition by Stan Gibilisco Websites * www. yorkville. com * www. wikipedia. com * www. circuitstoday. com * www. ehow. com * www. howstuffworks. com Appendices LM741 Operational Amplifier General DescriptionThe LM741 series are general purpose operational amplifiers which feature improved performance over industry standards like the LM709. They are direct, plug-in replacements for the 709C, LM201, MC1439 and 748 in most applications. The amplifiers offer many features which make their application nearly foolproof: overload protection on the input and output, no latch-up when the common mode range is exceeded, as well as freedom from oscillations. The LM741C is identical to t he LM741/LM741A except that the LM741C has their performance guaranteed over a 0 °C to +70 °C temperature range, instead of ? 5 °C to +125 °C. Connection Diagram Recommendations All PA systems have a potential for audio feedback, which occurs when sound from the speakers returns to the microphone and is then re-amplified and sent through the speakers again. Sound engineers take several steps to maximize gain before feedback. If you are setting up a sound system and want to avoid feedback, there are a few general measures that can help avoid such problem: * Keep a certain distance between the position of the microphone and the speakers. * Use a unidirectional microphone. If you have access to an equalizer, dampen the frequencies where feedback is occurring. * Ensure that both microphone and speakers are in good performance state. * Never place a mobile phone near the speakers or even at the microphone. Since the Power-Amplifier is responsible for the driving of the input soun d (coming from the pre-amplifier), it is necessary to have an efficient circuit of a power amplifier with a sufficient wattage needed to obtain a desired output. The greater the wattage value of a power amplifier circuit, the better the output sound.

Tuesday, July 30, 2019

Assesment 6 Practical Team Sport

BTEC SubsidiaryExtended Diploma In Sport QCF Level 3 Unit 8: Practical Sport (PT) Unit 22: Rules, Regulations and Officiating in Sport (R&R) Assessment 6 of 8 P1 Skills and techniques- Passing: the skill off passing is used when a player on the same team is giving the ball to another member, this is called passing and this is used to spread the play across the line of attack as the ball in tag rugby cannot be passed forward so generally the ball will be thrown sideways or backwards using the following technique.When the player feels that it is right they will look for a pass by doing this there head position will be looking to where they plan on the ball reaching and this is typically to the midriff of a player on their team so to perform this skill they will have their feet shoulder width apart so that they have balance but also they will have the ball in both hands so that they do not drop it when using the passing action which is having both hands either side of the ball bringing the ball back to create momentum and power and then bring it towards their target and releasing giving the force that is required for it to reach their team mate.Catching: This skill is when you are receiving a pass as you will have to catch the ball and to do this to make your teams play fluent and quick you must have a good technique on how to catch the ball.To have a good technique on catching the ball you must make sure your hands are clear and visible for your teammate to see that you are ready for the ball but then when the ball is heading in your direction you must make sure that your feet are shoulders width apart and that you have a solid base and you are balanced then make sure your hands are close to your chest so that if you happen to miss the ball it will rebound off your chest and will be easier to catch , before catching the ball your head and eyes must be looking at the irection of the ball so that you are ready then when successfully catching the ball look for optio n on whether to pass it on or make a run forwards. Intercepting: The skill of intercepting is used when you prevent the opposition’s team from making a pass and you catch it which then converts possession into your teams favour.The technique of this skill is identifying where the ball is going to go and getting your body position correct to quickly react and catch it before a player on their team does for example if you are about to go in for an interception you will need to keep eyes on the ball and make sure all your body is in line with the ball including your hands so that you can grasp it in mid-flight. After you have caught the ball there will usually be a gap in their defence so as soon as you catch it there will be the opportunity to run for the score zone.Blocking: This is a skill used again for preventing the opposition from retaining the ball and the technique for this is to get any body part in the way of the balls intended destination. The technique to doing this is to make your body as big as possible with the biggest surface area as possible. To do this you will need to stretch out every limb possible and direct them in the way that the ball is heading so that you can block it. Tactics: on1 defending: This is when your team is the defending team and every person on your team has a person to mark on their team and it is your job to mark them so within tag rugby you would be lined up in your defensive line opposite the person you will be marking, a good point to this is that everyone on their team will be marked however if the person you are marking gets passed you then there is very little cover to prevent them from scoring a try. on 1: This is a tactic used when there is a specifically good player on the oppositions team and it is used by 2 players marking the 1 player that is dangerous to their team and it is there job to mark and defend against this one player, an advantage of this is that it may prevent that one player from scoring how ever because two people are marking 1 player it will leave a player on the other team without someone marking them so it could expose their defence.Zonal defending: this is where the defending team do not mark a person instead they mark zones so for example within tag rugby there would be teammates marking the middle sections and wide sections off the pitch and it is their responsibility to make sure that no one gets past them in that area however this can be quite a hard tactic to implement as everyone in the team needs to be disciplined else gaps would open up in the defence leading to opportunities for the attacking team to score.Half court: This tactic is again one that you would use for defending and this is where your team will only defend half the pitch so when the other team has it in there half they will not pressure them and let them have the ball but then as soon as the ball comes into the defensive half there will be high pressure on the ball carriers and players around them to try and gain possession back and limit the amount of chances the team will get, However leaving the team with this amount of space gives them time to build up pace which could mean that the defending team may not be able to catch the attacking team. M1 Passing:

Monday, July 29, 2019

Critical Response paper Essay Example | Topics and Well Written Essays - 750 words

Critical Response paper - Essay Example The Japanese supported limited travels by Koreans, and this explains their suppressive rule that locked Koreans from the rest of the world. Increased travel meant more Koreans were intermingling with the outside world thus social changes would occur. The era also brings about social disparity in the Korean society as the elites considered themselves superior. Presence of westerners and elites meant to devalue Korean tradition and social values. On the contrary, the Koreans are seen to be opposing Japanese and Western assimilation, a factor that contributes mainly to societys isolation from the rest of the world. Shin and Robinson (53) describes the role that broadcasting media played in suppressing Korean culture and history. The authors focus on the manner in which Japanese used radio to bring changes to Korean culture. The 1924-1945 also marks the beginning of Korean freedom in radio broadcasting. Koreans can be seen to be transforming from the imposed Japanese radio programs characterized by censorship to the broadcasting freedom by the end of 1945. The authors bring to attention the role that radio played in spreading Japanese Propaganda and cultural ideologies. The Korean situation presents the theme of radio colonization and its effects on culture and tradition. However, the era also marked radio broadcasting policy change for the Koreans where the Japanese became a bit lenient on radio broadcasting censorship. However, the freedom to Korea’s broadcasting corporations revived the society’s culture. The era, thus, marked the revival of traditional music, drama and arts an d also assimilation to modern music. Korean radios were, therefore, means of subverting the predominant Japanese culture. The revival of Korean history and culture shows how radio colonization can suppress traditional norms, culture, and behavior. The events of early 1930s in Korea brought about themes

Sunday, July 28, 2019

Where does the thoroughbred come from Essay Example | Topics and Well Written Essays - 5000 words

Where does the thoroughbred come from - Essay Example This paper will also show how the creation of British â€Å"Classic† races late in the eighteenth century and early in the nineteenth century changed the nature of racing and thus changed the way Thoroughbreds were being bred. Ths paper will also detail the distinctive physical appearance of the Thoroughbred which is the result of several centuries of selective breeding. The paper will also detail the history of how the breed first emerged in other countries and on other continents and how it prospers today as the hub of two multibillion dollar international industries, agribusiness and legalized gambling. This paper will also describe the way the Thoroughbred’s speed and stamina have created other breeds such as the Standardbred and The Hackney Horse. It will also discuss how the Thoroughbred has been utilized to improve other breeds of horses, such as the Quarter-Horse, the Morgan and the Irish Draught Horse. Paleontologists have traced back the origin and development of the horse about fifty million years. The species evolved from a four-toed, flat-footed herbivore known as Eohoppus, who stood only two feet high. The most ancient discoveries of the species were found in North America. Researchers believe that the horse disappeared from that continent by 10,000 B.C. and would not return until European settlers imported horses beginning in the sixteenth century. The assumption is that the Eohopppus was able to move from North America to Europe and Asia utilizing the land bridges between the continents which existed in the Ice Age. From the Eohoppus, or â€Å"Dawn Horse†, the species evolved into its present form as a grazing animal with solid hooves and strong, long teeth. It was more than four thousand years ago when man was first able to tame and domesticate the horse. Originally, they raised the species for its meat and its milk. But with the development of the chariot and then the saddle, the horse became a main source for transportation, both

Saturday, July 27, 2019

Crowdfunding Essay Example | Topics and Well Written Essays - 750 words

Crowdfunding - Essay Example The four main types of crowdfunding are donation-based crowdfunding, reward-based crowdfunding, lending-based crowdfunding and equity-based crowdfunding. In this type of funding, there are no financial returns to the contributors or investors. In many cases, this type of crowdfunding is used for raising money for charitable projects. Some of these projects include disaster relief and medical bills (Nesta, 3). For example, an organization such as the Red Cross might conduct a campaign aimed at getting people to donate. Such donations have no returns attached to them. The donors are satisfied when a given project is completed. The motivation for the donors is non-monetary. Many organizations that use this type of crowdfunding rely on their websites to get contributors, although other outlets such as social media may be used. In this type of funding, the donations are gathered and assigned to a given project (Gadja &Walton, 8). This then helps get more donations because the funders understand that their money will be used for a specific purpose. In the end, the donors may give repeated donations if the organization keeps on updating the m of the progress of the ongoing project. Examples of such platforms include JustGiving (England), Startme (South Africa) and m-changa (Kenya) (Gadja &Walton, 8). This type of funding involves people contributing to a given business or project in exchange for some type of reward. In many cases, this reward is in the form of product or service offered by the organization seeking the funding (Nesta, 3). This is the most popular type of crowdfunding and is mainly used for creative and entrepreneurial projects. Usually, this model allows for the rewards to be given to the contributors based on the amounts contributed; the more a person donates, the better the rewards received. The donation is usually higher than the monetary value of the reward given, and this

Friday, July 26, 2019

Banning Flag Burning Thesis Proposal Example | Topics and Well Written Essays - 1250 words

Banning Flag Burning - Thesis Proposal Example The above lines perfectly capture the symbolic significance of the national flag. The flag is the most visible emblem of the country and is a reminder of the people who sacrificed their lives for the country. If one were to fully understand what the flag essentially stands for, it would become pretty evident that any act of insult to the flag is but blasphemous. Opposition to the banning of flag burning have been grounded on the premises of freedom of expression and speech. It has been argued that defacing the national flag is justified as a means of protected speech, a claim that is vindicated by the First Amendment to the Constitution of the USA. But one needs to understand the gravity of the situation. It is this very flag which stands as a tall symbol of the freedom guaranteed to every citizen of USA. People's protests are meant against the government, not the country. A clear distinction needs to be made between the government, which merely runs the country, and the nation itsel f. A nation, in all its essence, is greater than the political party in power. And thus, grave offence to a highly esteemed symbolic entity in the name of protest, does not do justice to the nation. More often than not, these protests are aimed at a political leader and his policies, and there are several alternative methods to exhibit public disapproval in such cases. Burning effigies of the leader in question is still justified, but burning the national flag is not only inappropriate, it also fails to serve the purpose. Flag burning is often defended on the grounds of civil liberties granted by the democratic governmental setup. The First Amendment protects the right to free speech, not vandalism.... As there are no absolute laws which deem flag burning illegal, the courts have often found it difficult to prosecute acts of flag desecration. The two most popular cases of flag burning have been Texas v. Johnson, and United States v. Eichman both in the year 1990. And in both the aforementioned cases, the Supreme court declared that flag burning was protected under the First Amendment to the Constitution. But there have been other acts of flag desecration that have ended in conviction. It is rather interesting to note that the cases which did in fact end in conviction involved milder forms of flag desecration like using the flag for commercial purposes. In one such case Halter v. Nebraska, the owner of a bottling company was charged with selling bottles with the American flag imprinted on them in 1905. In 1903, Nebraska made it a crime to â€Å"sell, expose for sale, or have in possession for sale, any article of merchandise upon which shall have been printed or placed, for purpose s of advertisement, a representation of the flag of the United States†. Under this law, the Supreme court ruled 8-1 to uphold Halter’s conviction. This case was significant for a variety of reasons- it was one of the first Supreme court cases pertaining to protection of the national flag, and also because it was seen as a moral victory for people who sought greater government regulation in the matter.

Relationship between Communication and Maslow's Hierarchy of Research Paper

Relationship between Communication and Maslow's Hierarchy of Needs - Research Paper Example It is logical that some needs are impossible to be satisfied without communication, for example, social needs (friendship, love) are impossible without a partner which implies his or her search by means of communication, and this paper will investigate into the role of the interpersonal communication in the human needs satisfaction. Every individual has his or her needs which are the things that are necessary for living and survival, depending on the level of the needs. The needs are the things that make an individual act in a proper way to satisfy them and to stay alive, which means that the needs cannot be left unsatisfied. Many of the needs of a human being imply interpersonal communication: for example, such need as love or any other form of relationship demands a partner finding which is possible only by means of communication with the potential partner. This paper will consider to which extent the communication between the individuals is important in terms of human needs satisfaction. The hypothesis of the present research is that the interpersonal communication is important for satisfaction of human needs at all their levels and significantly affects this process and may be an unalienable component of the successful result. An Outline of Human Needs. Abraham Maslow’s theoretical works on the phenomenon of the human needs is the material which is most often referred to in this regard. He described all the needs of a human being by means of their hierarchic organization, graphically also known as the Maslow pyramid, into five levels: physiological needs, safety needs, love or belonging needs, esteem needs, and self-actualization. (Maslow, 1943, 370-396). The first level, physiological needs, obviously, is the primary level which includes the basic human needs necessary for survival, such as eating and sleeping. (Maslow, 1943, 373). The second level, safety needs, is the level implying securing the life safety and the things which are also necessary for

Thursday, July 25, 2019

Social Media Marketing Essay Example | Topics and Well Written Essays - 500 words

Social Media Marketing - Essay Example Its presence on Facebook has meant that the Facebook users can put a â€Å"like† on the fan page and comment on different products offered by Fantasia Hookah Tobacco. What is more important, the community members can interact with each other via social networking (Veer, 2011). It is important to understand the psychographics and demographics of the people who like this page and want to be a part of what Fantasia Hookah Tobacco has to offer to them through the Internet. The professional enhancement of Fantasia Hookah Tobacco would be measured by the people who join it on Facebook and the way it is able to offer them a range of possibilities through Facebook. In my opinion, it is crucial to touch upon quite a few pointers as they remain domineering as far as the delivery of social media marketing realms is concerned. One of my goals is to realize the way Fantasia Hookah Tobacco is able to transgress boundaries and reach out to people who are taken as the most appropriate ones when it comes to the Facebook platform. However, this requires extra surveillance and caution on the part of my research as it is important to be sure that wastage does not come about and that there are immense areas where growth and development of Fantasia Hookah Tobacco occur (James, 2011). College students must get attracted by the Facebook platform and if they do not like this page and seem disinterested in visiting the webpage, it will mean wastage. Fantasia Hookah Tobacco looks up to the marketing that is being done on the Facebook platform as, in my opinion, it can entice the young ones into something that is cool and trendy, as well as warrant their attention in due course of time. I would receive instant feedback from them as far as the tobacco products are concerned and employ this feedback to good effect, which should eventually boost the business in the long run (Wunker, 2012). This will make things running in proper order for Fantasia

Wednesday, July 24, 2019

Economics Essay Example | Topics and Well Written Essays - 1000 words - 28

Economics - Essay Example Thatcher follows a policy of monetarism and this is the difference with the other administration. Thatcher strongly believed in an open and privatized economy. Therefore her government worked fiercely towards privatizing some of the major government organizations. This era advocated policies of free markets and nationalizations of banks and financial institutions. The soul of this era was the Big Bang of financial deregulation that prevailed in the market in the year 1986. The economy was left free to open trade by reduction of tariffs and trade duties. Thatcher government was in favor of market optimization by inviting competition. To fight with the inflation Thatcher, after coming to power increased the taxes and reduced government spending. It was reported that the first year of her tenure in the office, was marked by a reduction of 1 billion pounds in the government spendings. Policies were adopted to reduce the powers of the labor unions. Ordinary people were encouraged to own h ouses and the companies they work for. Large number of council houses was sold off to the tenants. Her government brought about reforms in government expenditure snd thus made the economy of Britain more effectual. This paper centers on the economic principles employed during the Thatcher era and justify the use of these different approaches under the current economic scenario of our country. (Pearce, n.d.) Under this section we cover the major economic policies adopted during the Thatcher era. We further analyze the effectiveness of these policies in our country, especially in the current scenario when the economic conditions are almost the same as the one in United Kingdom before Margaret Thatcher took over as the president of United Kingdom. â€Å"When Mrs. Thatcher won the election in 1979, economic growth stood at just over 2% but this apparently respectable figure hid many problems. Unemployment had been rising from

Tuesday, July 23, 2019

Due Process Rights Research Paper Example | Topics and Well Written Essays - 500 words

Due Process Rights - Research Paper Example The Due Process also is intended to make people feel that the government is fair in the way it treats citizens in the legal process by listening to both sides of the story (Cornell University Law School, 1992). In Procedural Due Process, the government has to do more than just act in accordance with the law, by observing and granting citizens far procedures, whether or not the procedures are provided for within the law. It would be unconstitutional for the government to deny citizens the due process. The Procedural Due Process is intended to guarantee basic fairness to all citizens regardless of the crimes purported to be committed. Fairness entails a variety of aspects including a chance to be heard in a timely and meaningful manner, the making of a decision based on substantial evidence and the right to even appeal the decision if need be. Due process also puts in focus the importance of individual rights and interests in question, so that the more important the interests are, the more reason why the due process must be afforded to a citizen. The Procedural Due Process entails three main steps, which begin by asking whether there has been a deprivation of rights. Secondly, it has to be established whether the deprivation is of life, liberty or property, and thirdly, there needs to be established what procedures to follow to ensure justice (Chemerinsky, n.d.). The first step determines whether the court would go through the due process, because if there has been a deprivation then it is important to undertake a procedural due process analysis. By undertaking the process, the court must determine the right procedures to follow, and consequently if the government procedures available are inadequate, this will constitute a deprivation of the due process. In these three steps, the Constitution advocates for a fair hearing, before a tribunal or court. The citizen in question must e given the opportunity to present their evidence, while

Monday, July 22, 2019

Children and adults Essay Example for Free

Children and adults Essay The Effective Early Learning Project based at Worcester University highlights two ways in which adults can help children progress; The first is the way the adult encourages the child to be autonomous, to get on and try new things; The second, is the way the adult offers experiences which are stimulating, challenging and interesting. Adults need to be a supporting factor when the child is in a risky environment. Children and adults alike enjoy climbing trees; adults know when they are too high as do children. This is a whole other debate in terms of nature or nurture debate. This is where we could explore the idea of children learning to be safe when risk taking or is it already there. Stephenson (2003) wrote about a child on a swing, Swinging was very popular with these younger children, but more often than the older children their reactions indicated that they felt unsafe and wanted the swing slowed down. Therefore the child has taken the risk, has agreed a boundary, enjoyed the activity and acknowledged the safety aspect. The adult was there to ensure the safety and also make the activity a positive one by being readily available. Children must face all different kinds of risks in order to support their development and learning. Stine (1997) wrote that to support their learning and development is a complex issue. There always has to be provision for a physical challenge. More and more educational settings are using outdoor play/activity to challenge the children. Although, what is an acceptable risk to one person, may be completely the opposite of another. Bruce and Meggitt (2002) write that outdoor space needs to be available most of the time; They continue that, safety is the only consideration for keeping children in doors. Children can feel safe in risk taking environments and activities in many ways. Initially the adult to child ratio, with a high number of adults children can be supported and helped to achieve. Secondly by minimising, if possible, the risk aspect. This could be ensuring the activity is a positive and acceptable environment. Thirdly by giving the children all the opportunities available for physical risk taking, children need a stimulating and challenging environment. And finally, a well maintained balance between the childs safety and the challenge of the activity. In an educational setting, an adult carer will go to the risk area and carry out an assessment. They will check the route to be taken, dangers in the area and also any area that poses extreme concern. An adult carer should also think about the child to adult ratio. A local nursery allows children to climb trees. Due to the child to adult ratio, the nursery feels that the level of risk posed can be curtailed by having by having the children supervised and supported through the activity by adults. The children are therefore enjoying the activity of risk taking, as well as feeling safe in knowing an adult is available to help at any time. Another factor that the adult carer should be aware of is the idea of making a childs environment completely hazard free. Therefore taking away any risk or danger. Walsh (1993) thought that children in an environment that is completely safe could become bored and this could lead to self initiated risk taking that could be dangerous. Durberry (2001) felt that children who grow up in an ultra safe environment would lack confidence in their own physical ability. This would be due to the poor opportunities for the children to build and extend upon their exiting knowledge. He continued that children had to be both confident and competent physically in order to feel competent emotionally. The ideals on risk taking vary from culture to culture. Although the main aim remains the same. The child needs to remain safe, but feel they are being challenged and stimulated. To minimise hazards there needs to be a high adult to child ratio. Children need opportunities to explore and do so independently. Over the last decade, the childs freedom of choice has been limited. Adult carers are sometimes over anxious about letting the child experiment with risk taking. The procedures and guidelines that are in place give the adult carer a frame work on which to base their activities upon. The adult carer should exploit and become fluent in the procedures and guidelines in place. This in turn will provide groundwork for safe risk taking. Bibliography Smith, P., Cowie, H. Blades, M. (2003) Understanding Childrens Development, London: Blackwell Publishing.  Bruce, T. Meggitt, C. (2002) Childcare Education, London: Hodder Stoughton.  DfEE (2003) Early Years (Volume 23, Number 1), London: Taylor Francis

How Authors Affected the Frontier Movement Essay Example for Free

How Authors Affected the Frontier Movement Essay The Frontier Movement is a period in American history that refers to the westward movement of Americans toward the Pacific Ocean during the mid-1800s lasting until the early 1900’s. This movement was characterized by an expansionist zeal for opportunity and adventure, but was also heavily characterized by widespread social oppression and reform. It was during this time that both authors and reformists were inspired to write and share their ideas, many of which called attention to the often ignored social injustices of the time. These author’s ideas not only were inspired by the movement (the beginning of American Literature), but also heavily fueled and contributed to the movement in return. Authors Mark Twain and Susan B. Anthony, for example, played an important role in the frontier movement through their writings as they used these to convey the feelings they held toward America’s crooked social discrimination and socio-economic disparities. Mark Twain and Susan B. Anthony are considered to be two of America’s first American Literature authors. Mark Twain, known as the â€Å"Father of America Literature†, became an author in the West after the end of the Civil War. Susan B. Anthony, known as one of the first women’s activists, works focused mainly on the gender inequality customary of the time. Both of these author’s works are recognized as being bold and reflecting much of the American frontier movement’s attitude and ailments. Their works helped fuel their readers understanding of who they were and helped inspire their audience in the spirit of the frontier movement. Mark Twain’s works often embodied the newly discovered American frontier spirit of individuality and adventure. His works were both entertaining and encouraged Americans to create their own destiny. This was both a popular and significant notion during the frontier movement as it embodied the idea’s Americans had about expanding westward in search of a new life. In addition to his inspirational and humorous works, his writings also addressed the social discrimination he witness during the era of the frontier movement. Many of his works, like Huckleberry Finn for example, showed the possibility of bringing change to a world dominated by racism and foolishness. His works both captured American’s imagination, inspired American’s frontier attitude, and called attention to social wrongs. Susan B. Anthony’s works focused more on the boldness of the American. Rather than idolizing the spirit of America, she often called Americans out on the social injustices prevalent throughout America during the frontier era and promoted change. She called attention to both American racism and especially gender inequality. While Americans were beginning to identify the distinctly American characteristics they took pride in, Susan B. Anthony identified the aspects of American life that Americans came to realize they should be ashamed of. Her writings and causes were bold, reflecting the rugged American Spirit, but her works also helped shape the social aspects of the American Frontier movement. The frontier movement of America marked the beginning of American identity, and thus the beginning of American Literature. It was this movement that influenced the works of becoming authors, many, who in turn, influenced the frontier movement. Mark Twain and Sarah B. Anthony both contributed to the frontier movement through their writings in that they helped Americans realize their identity. During the frontier movement, Americans began to see themselves as an adventurous and bold people, and it was these authors who helped Americans gain and develop an understanding of who they were, even though their ideas were often negative. In short, by providing Americans with literature about who the American people were, the authors helped inspire Americans to express this new attitude of adventure and recognize American social values in the Frontier Movement.

Sunday, July 21, 2019

Load Balancing as an Optimization Problem: GSO Solution

Load Balancing as an Optimization Problem: GSO Solution METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is employed to solve the above mentioned optimization problem. In the proposed method, excellent features of various existing load balancing algorithms as discussed chapter 2 are also integrated. PROPOSED METHODOLOGY There are numerous cloud computing categories. This work mainly focuses on a public cloud. A public cloud is based on the typical cloud computing model, and its services provided by service provider [42]. A public cloud will comprises of several nodes and the nodes are in different physical locations. Cloud is partitioned to manage this large cloud. A cloud consists of several cloud partition with each partition having its own load balancer and there is a main controller which manage all these partition. 3.2.1 Job Assignment Strategy Algorithm for assigning the jobs to cloud partition as shown in Fig. 2 Step 1: jobs arrive at the main controller Step 2: choosing the cloud partition Step 3: if cloud partition state is idle or normal state then Step 4: jobs arrive at the cloud partition balancer. Step 5: assigning the jobs to particular nodes based on the strategy. Figure 3.1: Flowchart of Proposed Job Assignment Strategy. Load Balancing Strategy In cloud, Load Balancing is a technique to allocate workload over one or more servers, network boundary, hard drives, or other total resources. Representative datacenter implementations depends on massive, significant computing hardware and network communications, which are subject to the common risks linked with any physical device, including hardware failure, power interruptions and resource limits in case of high demand. High-quality of load balance will increase the performance of the entire cloud.Though, there is no general procedure that can work in all possible different conditions. There are several method have been employed to solve existing problem. Each specific method has its merit in a specific area but not in all circumstances. Hence, proposed model combines various methods and interchanges between appropriate load balance methods as per system status. Here, the idle status uses an Fuzzy Logic while the normal status uses a global swarm optimization based load balancing strategy. Load Balancing using Fuzzy Logic When the status of cloud partition is idle, several computing resources are free and comparatively few jobs are receiving. In these circumstances, this cloud partition has the capability to process jobs as fast as possible so an effortless load balancing method can be used. Zadeh [12] proposed a fuzzy set theory in which the set boundaries were not precisely defined, but in fact boundaries were gradational. Such a set is characterized by continuum of grades of membership function which allocates to each object a membership grade ranging from zero to one [12]. A new load balancing algorithm based on Fuzzy Logic in Virtualized environment of cloud computing is implemented to achieve better processing and response time. The load balancing algorithm is implemented before it outstretch the processing servers the job is programmed based on various input parameters like assigned load of Virtual Machine (VM) and processor speed. It contains the information in each Virtual machine (VM) and numbers of request currently assigned to VM of the system. Therefore, It recognize the least loaded machine, when a user request come to process its job then it identified the first least loaded machine and process user request but in case of more than one least loaded machine available, In that case, we tried to implement the new Fuzzy logic based load balancing technique, where the fuzzy logic is very natural like human language by which we can formulate the load balancing problem. The fuzzification process is carried out by fuzzifier that transforms two types of input data like assigned load and processor speed of Virtual Machine (VM) and one output as balanced load which are required in the inference system shown in figure 3.2, figure 3.3 and figure 3.4 respectively. By evaluating the load and processor speed in virtual machine in our proposed work like two input parameters to produce the better value to equalize the load in cloud environment, fuzzy logic is used. These parameters are taken for inputs to the fuzzifier, which are needed to estimate the balanced load as output as shown in figure 3.4. Figure 3.2: Membership input function of Processor Speed Figure 3.3: Membership input function of Assigned Load Figure 3.3: Membership output function of Balanced Load To affiliate the outputs of the inferential rules [13] , low-high inference method is employed. A number of IF-THEN rules are determined by making use of the rule-based fuzzy logic to get the output response with given input conditions, here the rule is comprised from a set of semantic control rules and the supporting control objectives in the system. If (processor_speed is low) and (assigned_load is least) then (balanced_load is medium) If (processor_speed is low) and (assigned_load is medium) then (balanced_load is low) If (processor_speed is low) and (assigned_load is high) then (balanced_load is low) If (processor_speed is Medium) and (assigned_load is least) then (balanced_load is high) If (processor_speed is Medium) and (assigned_load is medium) then (balanced_load is medium) If (processor_speed is Medium) and (assigned_load is high) then (balanced_load is low) If (processor_speed is high) and (assigned_load is least) then (balanced_load is high) If (processor_speed is high) and (assigned_load is medium) then (balanced_load is medium) If (processor_speed is high) and (assigned_load is high) then (balanced_load is medium) If (processor_speed is very_high) and (assigned_load is least) then (balanced_load is high) If (processor_speed is very_high) and (assigned_load is medium) then (balanced_load is high) If (processor_speed is very_high) and (assigned_load is high) then (balanced_load is medium) As shown above, there are 12 potential logical output response conclusions in our proposed work. The Defuzzification is the method of changing fuzzy output set into a single value and the smallest of minimum (SOM) procedure is employed for the defuzzification. The total sum of a fuzzy set comprises a range of output values that are defuzzified in order to decode a single output value. Defuzzifier embraces the accumulated semantic values from the latent fuzzy control action and produces a non-fuzzy control output, which enacts the balanced load associated to load conditions. The defuzzification process is used to evaluate the membership function for the accumulated output. The algorithm-1 is defined to manage the load in Virtual machine of cloud computing as follows: Begin Request_to_resource() L1 If (resource free) Begin Estimate connection_string() Select fuzzy_rulebase() Return resource End Else Begin If (Anymore resource found) Select_next_resource() Go to L1 Else Exit End End The proposed algorithm starts with request a connection to resource. It tests for availability of resource. It Calculate the connection strength if the resource found. Then select the connection, which is used to access the resource as per processor speed and load in virtual machine using fuzzy logic. Load Balancing using GSO (Glowworm Swarm Optimization) When the status of cloud partition is normal, tasks arrives with faster rate compare to idle state and the condition becomes more complex, thus a novel strategy is deployed for load balancing. Each user desired his job in the shortest time; as a result the public cloud requires a strategy that can finish the job of all users with adequate response. In this optimization algorithm, each glowworm i is distributed in the objective function definition space [14]. These glowworms transfer own luciferin values and have the respective scope called local-decision range . As the glow searches in the local-decision range for the neighbor set, in the neighbor set, glow attracted to the neighbor with brightest glow. That is glow selects neighbor whose luciferin value greater than its own, and the flight direction will change each time different will change with change in selected neighbor. Each glowworm encodes the object function value at its current location into luciferin value and advertises the same within its neighborhood. The neighbor’s set of glowworm comprises of those glowworms that have comparatively a higher luciferin value and that are situated within a dynamic decision range and their movements are updated by equation (8) at each iteration. Local-decision range update: (8) and is the glowworm local-decision range at the iteration, is the sensor range, is the neighbourhood threshold, the parameter generates the rate of change of the neighborhood range. Local-decision range consist of the following number of glow: (9) and, is the glowworm position at the t iteration, is the glowworm luciferin at the iteration.; the set of neighbours of glowworm comprises of those glowworms that have a comparatively higher luciferin value and that are situated within a dynamic decision range whose range is defined above by a circular sensor range Each glowworm as given in equation (10), i elects a neighbor j with a probability and process toward it as: Probability distribution used to select a neighbor: (10) Movement update: (11) Luciferin-update: (12) and is a luciferin value of glowworm at each iteration, leads to the reflection of the accumulative goodness of the path . This path is followed by the glowworms in their ongoing luciferin values, the parameter only ascends the function fitness values, is the value of test function. In this optimization algorithm, each glowworm is distributed in the objective function definition space [43]. These glowworms transfer own luciferin values and have the respective scope called local-decision range . As the glow searches in the local-decision range for the neighbor set, in the neighbor set, glow attracted to the neighbor with brightest glow. That is glow selects neighbor whose luciferin value greater than its own, and the flight direction will change each time different will change with change in selected neighbor. Figure 3.4 shows the flowchart of GSO algorithm. In the context of load balancing for cloud computing GSO algorithm check the status of the server simultaneously if it is free. For example a user wants to download a file size of 50 MB. It checks by iteration if user gets entered in server, it gets the message as achieve target. Figure 3.4: Flowchart of GSO Analysis of the Accrual Anomaly | Accounting Dissertation Analysis of the Accrual Anomaly | Accounting Dissertation Sloan (1996), in a determinative paper, added the accrual anomaly in the list of the market imperfections. Since then, academics have focused on the empirical investigation of the anomaly and the connection it has with other misspricing phenomena. The accrual anomaly is still at an embryonic stage and further research is needed to confirm the profitability of an accruals based strategy net of transaction costs. The current study investigates the accrual anomaly while taking into consideration a UK sample from 1991 to 2008. In addition, the predictive power of the Fama and French (1996) factors HML and SMB is being tested along with the industrial production growth, the dividend yield and the term structure of the interest rates. Chapter 1 Introduction Since the introduction of the random walk theory which formed the basis for the evolvement of the Efficient Market Hypothesis (EMH hereafter) proposed by Fama (1965), the financial literature has made many advances but a piece of the puzzle that is still missing is whether the EMH holds. Undoubtedly, the aforementioned debate can be considered as one of the most fruitful and fast progressing financial debates of the last two decades. The Efficient Market Hypothesis has met many challenges regardless of which of its three forms are being investigated. However, the weak form and semi strong hypothesis have been the most controversial. A literally vast collection of academic papers discuss, explore and argue for phenomena that seem to reject that the financial markets are efficient. The famous label of â€Å"anomaly† has taken several forms. Many well-known anomalies such as the contrarian investment, the post announcement drift, the accruals anomaly and many others are just the beginning of an endless trip. There is absolutely no doubt that many more are going to be introduced and evidence for the ability for the investors to earn abnormal returns will be documented. Recently, academics try to expand their investigation on whether these well-documented anomalies are actually profitable due to several limitations (transaction costs etc) and whether the anomalies are connected. Many papers are exploring the connection of the anomalies with each other proposing the existence of a â€Å"principal† misspricing that is documented into several forms. The current study tries to look into the anomaly that was initially documented by Sloan (1996) and has been labelled as the â€Å"accrual anomaly†. The accrual anomaly can be characterised as being at an embryonic stage if the basis for comparison is the amount of publications and the dimensions of the anomaly that light has been shed on. The facts for the accrual anomaly suggest the existence of the opportunity for investors to earn abnormal returns by taking advantage of simple publicly available information. On the other hand, accruals comprising an accounting figure have been approached from different points of view with consequences visible in the results of the academic papers. Furthermore, Stark et al (2009) challenge the actual profitability of the accrual anomaly by simply taking transaction costs into consideration. The present paper employs an accrual strategy for a sample comprising of UK firms during 1991-2008. The aim is to empirically investigate the profitability of such strategies during the whole data sample. The methodology for the calculation of accruals is largely based on the paper of Hardouvelis et al (2009). Stark et al (2009) propose that the positive excess returns of the accruals’ strategy are based on the profitability of small stock. In order to investigate the aforementioned claim, the current study employs an additional strategy by constructing intersecting portfolios based on accruals and size. Finally, five variables are being investigating at the second part of the study for their predictive power on the excess returns of the constructed portfolios. The monumental paper of Fama and French (1996) documented an impressive performance of two constructed variables (the returns of portfolios named HML and SMB). In addition, the dividend yield of the FTSE all share index, the industrial production growth and the term structure of the interest rates will be investigated as they are considered as potential candidates for the prediction of stock returns. Chapter 2 Literature review 2.1. Introduction During the last century the financial world has offered many substantial advances. From the Portfolio Theory of Markowitz (1952) to the development of the Capital Asset Pricing Model of Sharpe (1964) and Lintner (1965), and from the market Efficient Market Hypothesis (hereafter EMH), developed by Fama (1965), to the recent literature that challenges both the CAPM and the EMH, they all seem to be a chain reaction.   The financial academic world aims to give difficult but important answers on whether markets are efficient and on how investors should allocate their funds. During the last two decades, many researchers have documented that there exist strategies that challenge the claim of the supporters of the efficient and complete markets. In this chapter, the effort will be focused on reviewing the financial literature from the birth of the idea of the EMH until the recent publications that confirm, reject or challenge it. In a determinative paper, Fama (1970) defined efficient markets and categorised them according to the type of information used by investors. Since then, the finance literature has offered a plethora of studies that aim to test or prove whether markets are indeed efficient or not. Well known anomalies such as the post announcement drift, the value-growth anomaly or the accruals anomaly have been the theme of many articles ever since. 2.2. Review of the value-growth anomaly We consider as helpful to review the literature for the value growth-anomaly since it was one of the first anomalies to be investigated in such an extent. In addition, the research for the value-growth anomaly has yielded a largely productive debate on whether the documented returns are due to higher risk or other source of mispricing. Basu (1970) concluded that stocks with high Earnings to Price ratio tend to outperform stocks with low E/P. Lakonishok, Shleifer and Vishny (1994) documented that stocks that appear to have low price to a fundamental (book value, earnings, dividends etc) can outperform stocks with high price to a fundamental measure of value. Lakonishok, Shleifer and Vishny (1994) initiated a productive period that aimed to settle the dispute on the EMH and investigate the causes of such â€Å"anomalies†. Thus, the aforementioned researchers sparked the debate not only on the market efficiency hypothesis but also on what are the sources for these phenomena. Fama and French (1992) supported the idea that certain stocks outperform their counterparts due to the larger risk that the investors bear. Lakonishok, Shleifer and Vishny (1994) supported the idea that investors fail to correctly react to information that is available to them. The same idea was supported by many researchers such as Piotroski (2001). The latter also constructed a score in order to categorise stocks with high B/M that can yield positive abnormal returns (namely, the F Score). Additionally, the â€Å"market efficiency debate â€Å"drove behavioural finance to rise in popularity. The value-growth phenomenon has yielded many articles that aim to find evidence that a profitable strategy is feasible or trace the sources of these profits but, at the same time, the main approach adopted in each study varies significantly. Asness (1997) and Daniel and Titman (1999) examine the price momentum, while Lakonishok, Sougiannis and Chan (2001) examine the impact of the value of intangible assets on security returns. In addition, researchers have found evidence that the value-growth strategies tend to be successful worldwide, as their results suggest. To name a few, Chan, Hamao and Lakonishok (1991) focused on the Japanese market, Put and Veld (1995) based their research on France, Germany and the Netherlands and Gregory, Harris and Michou (2001) examined the UK stock market. It is worth mentioning that solely the evidence of such profitable strategies could be sufficient to draw the attention of practitioners, but academics are additionally interested in exploring the main cause of these arising opportunities as well as the relationship between the aforementioned phenomena (namely, the value growth, post announcement drift and the accrual anomaly). In general, two schools of thought have been developed: the one that supports the risk based explanation or, in other words, that stocks yield higher returns simply because they are riskier, and the one that supports that investors fail to recognise the correct signs included in the available information. 2.3. The accruals anomaly 2.3.1. Introduction of the accrual anomaly. Sloan (1996) documented that firms with high (low) accruals tend to earn negative (positive) returns in the following year. Based on this strategy, a profitable portfolio that has a long position on stocks with low accruals and short position on stocks with high accruals yields approximately 10% abnormal returns. According to Sloan (1996) investors tend to overreact to information on current earnings. Sloan’s (1996) seminar paper has been characterised as a productive work that initiated an interesting to follow debate during the last decade. It is worth noting that even the very recent literature on the accrual anomaly has not reached reconciling conclusion about the main causes of this particular phenomenon and about whether a trading strategy (net of transaction costs) based solely on the mispricing of accruals can be systematically profitable. At this point it is worth mentioning that the accruals have been found to be statistically significant and negative to predict future stock returns. On the other hand, there are papers that examine the accruals and its relations with the aggregate market. A simple example is the paper published by Hirshleifer, Hou and Teoh (2007), who aim to identify the relation of the accruals, if any, with the aggregate stock market. Their findings support that while the operating accruals have been found to be a statistical significant and a negative predictor of the stock returns, the relation with the market portfolio is strong and positive. They support that the sign of the accruals coefficient varies from industry to industry reaching a peek when the High Tech industry is taken into account (1.15), and taking a negative value for the Communication and Beer/Liquor industry. 2.3.2 Evidence for the international presence of the phenomenon. Researchers that investigated the accruals anomaly followed different approaches. At this point, it is worth noting that the evidence shows the accrual anomaly (although it was first found to be present in the US market) to exist worldwide. Leippold and Lohre (2008) examine the accrual anomaly within an international framework. The researchers document that the accrual anomaly is a fact for a plethora of markets. The contribution of the paper though, is the large and â€Å"complete† number of tests used, so that the possibility of pure randomness would be eliminated. Although, similar tests showed that momentum strategies can be profitable, recent methodologies used by the researchers and proposed by Romano and Wolf (2005) and Romano, Shaikh and Wolf (2008), suggest that the accruals anomaly can be partially â€Å"random†. It is noteworthy that the additional tests make the â€Å"anomaly† to fade out for almost all the samples apart from the markets of US, Australia and Denmark. Kaserer and Klingler (2008) examine how the over-reaction of the accrual information is connected with the accounting standards applied. The researchers constructed their sample by solely German firms and their findings document that the anomaly is present in Germany too. We should mention at this point that, interestingly, prior to 2000, that is prior to the adoption of the international accounting standards by Germany, the evidence did not support the existence of the accrual anomaly. However, during 2000-2002, Kaserer and Klingler (2008) found that the market overreacted to accrual information. Hence, the authors support the idea that an additional cause of the anomaly is the lack of legal mechanisms to enforce the preparation of the financial statements according to the international accounting standards which might gave the opportunity to the firms to â€Å"manipulate† their earnings. Another paper that focuses on the worldwide presence of the accruals mispricing is that of Rajgopal and Venkatachalam (2007). Rajgopal and Venkatachalam examined a total of 19 markets and found that the particular market anomaly exists in Australia, UK, Canada and the US. The authors’ primal goal was to identify the key drivers that can distinguish the markets where the anomaly was documented. Their evidence supports the idea that an accrual strategy is favoured in countries where there is a common law tradition, an extensive accrual accounting and a low concentration of firms’ ownership combined with weak shareholders’ rights. LaFond (2005) also considers the existence of the phenomenon within a global framework. The author’s findings support the notion that the accrual anomaly is present worldwide. In addition, LaFond argues that there is not a unique driving factor responsible for the phenomenon across the markets. It is worth noting that LaFond (2005) documented that this particular market imperfection is present in markets with diverse methodology of accrual accounting. Findings are against the idea that the accrual anomaly has any relation with the level of the shareholders protection or a common law tradition, as suggested by Rajgopal and Venkatachalam (2007). Finally, the author suggests that, if any, it is not the different method of accrual accounting (measurement issues) that favours or eliminates the accrual anomaly, but the accrual accounting itself. 2.3.3. Further Evidence for the roots of the accruals anomaly. Additionally, papers such as those of Thomas and Zang (2002) or Hribar (2000) decompose accruals into changes in different items (such as inventory, accounts payable etc). The findings catholically suggest that extreme changes in inventory affect returns the most. On the other hand, many articles connect the accruals with information used by investors, such as the behaviour of insiders or analysts, as the latter can be considered a major signal to the investors for a potential manipulation of the firms’ figures. In particular, Beneish and Vargus (2002) documented that firms with high accruals and significant insider selling have substantial negative returns.  Bradshaw (2001) and Barth and Hutton (2001) examine the analysts’ reports and their relation with the accruals anomaly. Their findings support that the analysts’ forecasting error tends to be larger for firms with high accruals, while analysts do not revise their forecasts when new information for accruals is available. Gu and Jain (2006) decompose accruals into changes in inventory, changes in accounts receivable and payable and depreciation expenses and try to identify the impact of the individual components to the anomaly. Consistent with Sloan (1996), Gu and Jain (2006) document that the accrual anomaly exists at the components level. The findings are important since Desai et al (2004) supported the connection of the accrual anomaly with a single variable (cash flows from operations). The researchers suggest that the results yielded by Desai et al (2004) were highly dependent on the methodology used and thus, suggested that the accruals anomaly is â€Å"alive and well†. Moreover, other articles try to confirm whether the anomaly is mainly caused by the wrong interpretation of the information contained in accruals. Ali et al. (2000), investigate whether the naà ¯ve investors’ hypothesis holds. Following the methodology introduced by Hand (1990) and Walther (1997), they found that for smaller firms, which are more likely to be followed by sophisticated investors, the relation between accruals and negative future returns is weaker compared to larger firms, which are followed by many analysts. Therefore, the researchers suggest that, if anything, the naà ¯ve investors’ hypothesis does not hold. In contrast to other market anomalies where findings suggest that the naà ¯ve investors hypothesis holds, the accruals anomaly is suggested as unique. Shi and Zhang (2007) investigate the earnings fixation hypothesis suggesting that the accruals anomaly is based on the investors â€Å"fixation† or â€Å"obsession† on earnings. Their primal hypothesis is that if investors are highly based on the reports about earnings and misprice the value-relevant earnings, then the returns should be dependent not only on the accruals but also on how the stock’s price changes according to reported earnings.  The researchers’ hypothesis is confirmed and finding support that an accrual strategy for firms whose stocks’ price highly fluctuates according to earnings yields a 37% annual return. Sawicki and Shrestha (2009) aim to examine two possible explanations for the accruals anomaly. Sloan (1996) proposed the fixation theory under which investors fixate on earnings and thus overvalue or undervalue information for accruals. Kothari et al. (2006) proposed the â€Å"agency theory of overvalued equity† according to which managers of overvalued firms try to prolong the period of this overvaluation which causes accruals to increase.  The paper uses the insider trading and other firm characteristics and tries to compare and contrast the two major explanations. Evidence produces bd Sawicki and Shrestha (2009) support the Kothari et al. (2006) explanation for the accrual anomaly. In a relatively different in motif paper, Wu and Zhang (2008) examine the role that the discount rates play in the accrual anomaly. They argue that if anything, the anomaly is not caused by irrationality from the investors’side but by the rationality of firms as it is proposed by the q-theory of investment. They argue that since the discount rates fall and more projects become profitable (which makes accruals to increase) future stock returns should decline. In other words, if the capital investment correctly adjusts to the current discount rates, the accruals should be negatively correlated with the future returns and positively correlated with the current returns. The evidence of Wu and Zhang (2008) support that the accruals are negatively correlated with the future stock returns but the contribution of the paper is in that they document that current stock returns are positively correlated with the accruals. 2.3.4. The relation of the accrual anomaly with other market imperfections. Many papers examine the relation between the accruals anomaly and other well-known anomalies such as the post announcement drift or the value-growth phenomenon. Desai et al. (2002), suggest that the â€Å"value-growth† anomaly and the accruals anomaly basically interact and conclude that the  ¨accruals strategy and the C/P reflect the same underlying phenomena†. Collins and Hribar (2000) suggest that there in no link between the accruals anomaly and the â€Å"PAD†, while Fairfield et al. (2001) support that the accruals anomaly is a sub-category of an anomaly caused by the mistaken interpretation of the information about growth by the investors. Cheng and Thomas (2006) examine the claim that the accrual anomaly is a part of a broader anomaly (and more specifically, the value-glamour anomaly). Prior literature suggested that the operating cash flows to price ratio subordinates accruals in explaining future stock returns (Deshai et al (2004)). Their evidence suggests that the Operating CF to price ratio does not subsume neither abnormal nor total accruals in future announcement returns. This particular result does not confirm the claim that the accrual anomaly is a part of a broad value-glamour anomaly. Atwood and Xie (2005) focus on the relation of the accrual anomaly and the mispricing of the special items first documented by Burgstahler, Jiambalvo and Shevlin (2002). Their hypothesis that the two phenomena are highly related is confirmed since the researchers found that special items and accruals are positively correlated. Additionally, further tests yielded results that suggest that the two imperfections are not distinct, while the special items have an impact on how the market misprices the accruals. Louis and Sun (2008) aim to assess the relation between the abnormal accrual anomaly and the post earnings announcement drift anomaly. The authors hypothesize that both anomalies are related to the management of the earnings and thus, they aim to find whether the two are closely connected. The findings are consistent with the primal hypothesis, as they found that â€Å"firms with large positive change of earnings that were least likely to have manipulated earning downwards† did not suffer from PEAD, while the same result was yielded for firms that had large negative change of earnings that were least likely to have managed their earnings upwards. As supported by many researchers the value-growth anomaly and accruals anomaly might be closely related or they might even be caused by the similar or even identical roots.  Fama and French (1996) support that the book to market factor captures the risk of default, while Khan (2008) suggests that in a similar pattern firms with low accruals have a larger possibility to bankrupt. Therefore, many researchers try to connect the two phenomena or to answer whether a strategy based on the accruals can offer more than what the value growth strategy offers. Hardouvelis, Papanastopoulos, Thomakos and Wang (2009) connect the two anomalies by assessing the profitability of interacting portfolios based on the accruals and value-growth measures. Their findings support that positive returns are obtainable and magnified when a long position is held for a portfolio with low accruals while combined with stocks that are characterised as high market to book. The difference of a risked-based explanation or an imperfection of the markets is considered to be a major debate, as it can challenge the market efficiency hypothesis. Many researchers, such as Fama and French (1996) noted that any potential profitable strategy is simply due to the higher risk that the investors have to bear by holding such portfolios. In a similar way, the profitable accruals strategies are considered as a compensation for a higher risk. Stocks that yield larger returns are compared or labelled as stocks of firms that are close to a financial distress. Khan (2000) aims to confirm or reject the risk-based explanation of the accruals anomaly. The researcher uses the ICAPM in order to test if the risk captured by the model can explain the anomaly first documented by Sloan (1996). It is worth noting that the descriptive statistics results for the sample used showed that firms that had low accruals also had high bankruptcy risk.  The contribution of the paper is that, by proposing a four factor model enhanced by recent asset pricing advances, it showed that a great portion of the mispricing that results in the accrual anomaly can be explained within a risk-based framework. Furthermore, Jeffrey Ng (2005) examines the risk based explanation for the accrual anomaly which proposes that accruals include information for financial distress. As proposed by many papers, the accrual anomaly is simply based on the fact that investors bare more risk and thus low accrual firms have positive abnormal returns. The researcher tries to examine how and if the abnormal returns of a portfolio which is short on low accruals stocks and long on high accrual firms changes when controlling for distress risk. Evidence supports that at least a part of the abnormal returns are a compensation for bearing additional risk. Finally, the results support that the big portion of the high abnormal returns of the accrual strategy used in the particular paper is due to stocks that have high distress risk. 2.3.5. The accruals anomaly and its relation with firms’ characteristics. A noteworthy part of the academic literature examines the existence of some key characteristics or drivers that are highly correlated with the accruals anomaly. Many researchers have published papers that aim to identify the impact of firm characteristics such as the size of the firm, characteristics that belong to the broader environment of the firms such as the accounting standards or the power of the minority shareholders. Zhang (2007) investigates whether the accrual anomaly varies cross-sectionally while being related with firms’ specific characteristics. The researcher primarily aims to explain which the main reason for the accrual anomaly is. As Zhang (2007) mentions, Sloan (1996) attributes the accrual anomaly to the overestimation of the persistence of accruals by investors, while Fairfield (2003) argues that the accrual anomaly is a â€Å"special case of a wider anomaly based on growth†. The evidence supports the researcher’s hypothesis that characteristics such as the covariance of the employee growth with the accruals have an impact on the future stock returns. Finally, Zhang (2007) documents that that accruals co-vary with investment in fixed assets and external financing. Louis, Robinson and Sbaraglia (2006) examine whether the non-disclosure of accruals information can have an impact on the accruals anomaly. The researchers, dividing their sample into firms that disclose accruals information on the earnings announcement and firms that do not, investigate whether there exists accruals’ mispricing. The evidence supports that for firms that disclose accruals information, the market manages to correctly understand the discretionary part of the change of the earnings. On the contrary, firms that do not disclose accruals information are found to experience â€Å"a correction† on their stock price. Chambers and Payne’s (2008) primal aim is to examine the relation of the accrual anomaly and the auditing quality. The researchers’ hypothesis is that the accruals mispricing is related with the quality of auditing.  Additionally, their findings support that the stock prices do not reflect the accruals persistence characterising the lower-quality audit firms. Finally, their empirical work finds that the returns are greater for the lower-quality audit portfolio of firms. Palmon, Sudit and Yezegel (2008) examine the relation of the accruals mispricing and the company size. Evidence shows that company size affects the returns and, as the researchers documented, the negative abnormal returns are mostly due to larger firms while the positive abnormal returns come from the relatively small firms. Particularly, as the strategy with the highest profits they found the one that had a short position in the largest-top-accrual decile and a long position in the smallest-low-accrual decile. Bjojraj, Sengupta and Zhang (2009) examine the introduction of the Sarbanes-Oxley Act and the FAS 146 and how these two changes affected the accrual anomaly. FAS 146 (liabilities are recognized only when they are incurred) reduced the company’s ability to â€Å"manipulate† earnings while the SOX aims to enhance the credibility of the financial statements. The evidence recognises a change on how the market conceives information about restructurings charges. The authors propose that a possible explanation is that before the introduction of SOX and the FAS 146, the market was reluctant due to the ability of the firms to manage earnings. Finally, Bjojraj, Sengupta and Zhang (2009) document that post to the FAS 146 and the SOX act, low accrual portfolios do not generate positive abnormal returns. 2.4. The applications of the accruals phenomenon and reasons why it is not arbitraged away. The importance of the analysis of the anomalies is substantial for two reasons. Firstly, the profitability of a costless strategy challenges the EMH, especially if the strategy is based on bearing no additional risk. Secondly, managers’ incentives to manipulate the financial statements and consequently the accruals would be obvious if a profitable strategy based on such widely available information existed. Chen and Cheng (2002) find that the managers’ incentive to record abnormal accruals is highly correlated with the accrual anomaly. The hypothesis of the researchers, which their findings support, was that the investors fail to detect when the managers aim to record abnormal accruals and that may contribute to the accruals anomaly. Richardson’s (2000) main objective is to examine whether the information contained in the accruals is utilized by short sellers. As the researcher mentions, previous articles such as that of Teoh and Wong (1999) found that sell side analysts were unable to correctly â€Å"exploit† the information contained in accruals for future returns. Richardson suggests that short sellers are considered as sophisticated enough to utilize the accruals information. Findings confirm previous work, such as that of Sloan (2000), who suggests that even short sellers do not correctly utilize the information contained into accruals. Ali, Chen, Yao and Yu (2007) examine whether and how equity funds benefit from the accrual anomaly by taking long position into low accruals firms. The researchers aim to identify how exposed are the equity firms to such a well known anomaly and what characteristics these funds share. By constructing a measure called â€Å"accruals investing measure† (AIM), they try to document the portion of the low accruals firms into the actively managed funds. The evidence shows that generally funds are not widely exposed to low accruals firms but when they do so, they have an average of 2.83% annual return. It is worth noting that the annual return is net of transaction costs. Finally, the side-effects of high volatility in returns and in fund flows of the equity funds that are partially based on the accrual anomaly might be the reason behind the reluctance of the managers. Soares and Stark (2009) used UK firms to test whether a profitable accrual strategy is feasible net of transactions costs. Their findings support that indeed the accrual anomaly is present in the UK market. The authors suggest that for such a strategy to be profitable, someone is required to trade on firms with small market capitalization. They also suggest that although the accruals’ mispricing seems to exist also in the UK, the transaction costs limit the profits to such an extent that the accrual anomaly could be difficult characterised as a challenge to the semi strong form of the efficient market hypothesis. Finally, we should not neglect to mention two papers that discourse on why the markets do not simply correct the accruals anomaly. According to the classical theory, markets are so imperfect that can produce the incentive to the market to correct the â€Å"anomalies† at any point of time. Mashruwala, Rajgopal and Shevlin (2006) examined the transactions costs and the idiosyncratic risk as possible reasons of why the accrual anomaly is not arbitraged away. The researchers aimed to investigate why the market does not correct the anomaly, but also to identify whether the low accruals firms are riskier. The paper poses the question of what stops the informed investors from taking long positions into profitable stocks according to the accrual anomaly so that they can arbitrage it away. The paper examines the practical difficulty of finding substitutes so that the risk can be minimized and its relation with the accrual anomaly. Additionally, the paper investigates the transaction co sts and findings support that according to the accrual anomaly, the profitable stocks tend to be the ones with low stock prices and low trading volume. Lev and Nissim (2004) focus on the persistence of the accr

Saturday, July 20, 2019

Literary Analysis of The True Story of Hansel and Gretel Essay

Set in Poland during the German occupation, â€Å"The True Story of Hansel and Gretel† is told as a fairy tale, utilizing many of the elements that are common to fairy tales. This book reflects the Grimm brothers’ fairy tale, â€Å"Hansel and Gretel.† However, in Murphy’s parable, Hansel and Gretel are two Jewish children who are abandoned by their father and stepmother in order to save them from the Nazis. Setting the tale in Nazi Germany creates an atmosphere of fear and anxiety, and establishes a set of circumstances in which it is possible for people to act in ways that would be unacceptable under other circumstances. The stepmother is a good example of this. She is the force in the family – it is she who decides that everyone in the family will have a better chance of survival, if they split up – the children going off alone together and the parents going in another direction. Unlike the portrayal of the stepmother in the Grimm fairy tale, this stepmother is not wicked. She is strong willed and determined, but not evil, although she is protecting herself and her husband by abandoning the children. Using the stepmother as the villain is common in fairy tales, according to Stone in her article â€Å"Things Walt Disney Didn’t Tell Us.† She suggests that the woman of the family is nearly always chosen for the part of the villain. But in Murphy’s story, the stepmother’s actions, while they may appear villainous at the outset, may be construed as heroic in the end, because she only abandons the children in order to save them. She also cares deeply about the children’s welfare, enough that she loses her life as a result of attempting to find them. In this instance, Murphy is reminding us that the horrors of the time were so great th... ...s not asked to use logic and hence the emotional impact of the story is more direct and perhaps more potent. This book left me with a deeper sense of the horrors experienced by the Polish people, especially the Jews and the gypsies, at the hands of the Germans, while illustrating the combination of hope and incredible resilience that kept them going. Works Cited Murphy, Louise, (2013). The Real Story of Hansel and Gretel. Penguin Books. Stone, Kay (1975). Things Walt Disney Never Told Us. The Journal of American Folklore, Vol 88, No 347, Women and Folklore pp42-50, University of Illinois Press. Hansjorg, Hohr, (2000). Dynamic Aspects of Fairy Tales: social and emotional competence through fairy tales. Scandinavian Journal of Educational Research, Vol 44, No 1, Department of Education, Norwegian University of Science and Technology