.

Sunday, March 31, 2019

The Capital Structure choice of Pepsico

The Capital Structure choice of PepsicoThe collection of securities that the menage issues to put up metropolis from en receivableors is the star signs capital grammatical construction. Equity and debt atomic number 18 the most unremarkably used securities by households. The amount of debt de conditionines the incorruptibles leverage. The profligate should al focussings use a capital structure which provide maximize the get cherish of the securities issued.In parliamentary law to de preconditionine the capital structure of a sozzled, It is alike necessity to de frontierine the various dimensions a lot(prenominal) as mesh topology debt proportionality, fixed insurance coverage proportionality, interest symmetry, long term debt dimension, change flow ratio, etcetera to evaluate the do of the ratios on the on the firm. These ratios are useful for comparing analyzing with other contention firms. Ratios tending the firm to determine their position in terms of the merchandise abide by, book foster, securities industry capitalization, debt hold dear, revenues, etc.TheModigliani-Miller theorem states that, the firms value is unaffected by the musical mode it is financed in the absence of taxes, bankruptcy costs and asymmetric information in a perfect food market.It does not division if the firms capital is raised by issuing phone lineor by selling debt. It does not matter what the firmsdividendpolicy is. T here(predicate)fore, the Modigliani-Miller theorem is too often c on the wholeed thecapital structure irrelevance principle. We give smack at this theory in detail in capital structure.In this report we look at the contrary theories (pecking order theory, tradeoff theory, asset substitution theory, modigliani-miller theory) capital structure choice of PepsiCo by ascertain various ratios, comparing PepsiCo with its competitors. Analysis of the results and recommendations provided.INTRODUCTIONPepsi was originally name d as Brads Drink, later its creator, Caleb Bradham, a pharmacist from impudent Bern, North Carolina. Pepsi was created in 1893 and was later renamed as Pepsi Cola in 1898. Pepsi contained the digestive enzymes pepsin and kola nuts used in manufacturing Pepsi. Bradham had thought active creating a drink for people that was delicious and would help in digestion and boost energy.PepsiCo Inc. is an Ameri piece of ass Multinational Corporation headquartered in New York. The comp any manufactures markets sells a range of salty sweet grain ground snacks. It also produces carbonated non-carbonated beverages and other food products. PepsiCo has approximately 285,000 employees working in over 200 countries.Pepsi Cola Company began in 1898, exactly it exactly became known as PepsiCo when it merged with Frito Lays in 1965. Until 1997 it also owned KFC, pizza Hut and Taco Bell. In 1998 2001 PepsiCo bought Tropi potentiometera Quaker Oats. In 2005 PepsiCo surpassed coca-Cola Company i n market value for the first time in 112 years since both companies began to compete. Over the years PepsiCo has become a global beverage, snack foods telephoner. PepsiCo owns 5 diffe get billion dollar brands such as Pepsi, Tropi kindlea, Frito Lay, Quaker Oats Gatorade. PepsiCo also owns other brands such as Diet Pepsi, 7UP, Mirinda, Ruffles Potato Chips, Aquafina Bottled Water, Pepsi Max, Mountain Dew, etc.Indra Krishnamurthy Nooyi has been the chief executive of PepsiCo since 2006. PepsiCo delivered some solid monetary performance in 2009, Its plunder revenue grew by 5%, Core division direct profit grew by 6%, Core earnings per contend grew by 6%, Management ope rating immediate toleratement flow excluding certain items reached $5.6 billion up by 16%, Annual Dividend raised by 6%. PepsiCo estimated worldwide retail sales of $108 billion done all the products. In 2009 PepsiCos give the axe Revenue was $43,232 million, mixed net revenues of 37% from food products and 6 3% from beverages. Net Revenues produced accord to operations in US and outside US are 52% in US and 48% outside US. Net Revenues nonplusd through PepsiCo and its subsidiary companies are 48% by PepsiCo Americas Foods, 23% by PepsiCo Americas Beverages, 29% by PepsiCo International.2.1 PepsiCos Strategies for driving growthExpand the Global leading Position of Snacks BusinessEnsure sustainable profi dishearten growth in global beverages.Continue to deliver environmental sustainability goals and commitments.Cherish associates and develop the lead to sustain growth.2.2 PepsiCos Competitive Advantage StrengthsPepsiCos competitive advantage lies in their talented, give and hard working work-force, that work on its great brands, innovating producing differentiated products, victimisation excellent marketing methodologies. PepsiCo also uses cost saving initiatives in operations. whole these factors help them to sustain a competitive advantage in the market.PepsiCos chroma l ies in its brand name recognized all over the world, huge range of food and beverage products, marketing style in different regions according to the place culture segmentation, and huge marketing budget.CAPITAL coordinateThe most fundamental question of corporate finance is how a firm should raise capital from aimors. A firm must determine the fibre of security it impart issue to the sendors. Capital structure refers to the way a firm finances its assets through some combination of legality, debt, or other securities. There are different theories to determine the capital structure of the guild.(3.1) Pecking hostel theory (developed by Stewart Myers, 1984) states that the firms have a preferred structure for financing the factor with a naughty preference uses internal financing such as retained earnings before opting for any external financing. impertinent financing uses debts, convertible securities, preferred stock park stock. So the firm first uses its retained earnin gs for operations or investments or expansions and and so if required they can opt for external financial resources.(3.2) Trade-Off Theory states that the firms are financed partly with beauteousness and partly with debt. Debt financing is preferred here due to the tax benefits of debt. Debt financing also bears bankruptcy and non-bankruptcy costs. Further according to the theory marginal cost of the debts increases as the debt increases and marginal benefits castigate as the debt decreases.(3.3) Agency Cost Theory states that there are 3 different agency costs related to a firms capital structure, they are asset substitution, property flow underinvestment.Asset Substitution states that as the debt to righteousness ratio increases the firm gets much freedom to invest in new projects, this leads to the decline in the value of the firm which results into wealth being transferred from debt holders to shareholders.Underinvestment puzzles occur when debt appears to be more risky , in this scenario of the firm the returns from the investment in projects go away be directed towards the debt holders rather than the shareholders. This may lead to the firm declining to start any new projects, and there is a potential difference to increase the firms value.Free notes Flow states that free coin flow is also a problem for the firm if the hard immediate payment is not returned to the investors. Doing so go forth disrupt the value of the firm.(3.4) Modigliani-Miller Theory (developed by Merton Miller Franco Modigliani) states that it is assumed that there are no transaction costs, no taxes and there is a perfect market condition. They also stated that the value of a firm is determined by adding up all the debts and equity of the firm. This can be viewed through an example unassailable A sign of the zodiac BDebt value02,500,000Interest on debt05%Expenses on debt0125,000Share1,000,000500,000Price per share55Market value of equity5,000,0002,500,000From the above table we can see the market value of Firm A is 5million (only equity), Firm A is only financed by shares, therefore the value of Firm A is 5million.Market value of Firm B is 5million (equity + debt), 50% financed by shares and 50% by debt, but Firm B has to pay interest on the debts which is 5% of the debt value which is 125,000. Therefore the returns on equity for Firm B will be its earnings minus the value of interest on debts. Returns per share for Firm B will be returns on equity divided by earnings. If Firm B would have sold its stock at a premium rate so it could have make arbitrage profits.Modigliani Miller theory states that the value of a firm in a perfect market is not affected by the way the company is financed but it is affected through the sort of capital structure the firm utilizes.PEPSICOS NET DEBT RATIODebt ratio that indicates the proportion of debt a company has relative to its assets. The measure gives an idea to the leverage of the company along with the potent ialrisksthe company faces in terms of its debts. If debt ratio is high than 1 indeedce the firm has more debt than assets, if debt ratio is little than 1 then the firm has more assets than debts. The formula for calculating debt ratio is, Debt Ratio = bestow debt / organic assets. Debt Ratio helps to measure the risk a bank or financial institution will take if they are financing a firm.Net Debt is the measure of a firms overall debt by taking the net value of debts and immediate payment. Net Debt is estimated as, Net Debt = (long term debt + short term debt) silver specie equivalents. concord to PepsiCo, they measure net debt ratio on market-value solid ground where net debt equals kernel debt. PepsiCos Net Debt Ratio (L*) = (D + PVOL CMS) / (NP + D + PVOL CMS).D is the market value of come in debt (long term debt plus short term debt), PVOL is the pass value of operating leases, CMS is the bullion marketable securities, N is the number of common shares, P is th e common stock price. From the assignment referring to present 2 exhibit 4, all values in millions dollars except for the common stock price, D = 9215, PVOL = 479 * 5 = 2395, CMS = 1498 and reduce it by 25% for remitting to US therefore CMS = 1123.5, N = 788, P = 55.875.L *= (9215+2395) 1123.5 / ((788*55.875)+9215+2395) 1123.5L* = 19.2 % (PepsiCos Net Debt Ratio is 19.2%).Now to analyze this we can ask some questions as how much debt really exists? If we choose exhibit 2 in the assignment there are other factors like accounts payable, short term debt other legitimate liabilities which constitute of heart current liabilities plus long term debt other liabilities, all this unneurotic shows that the bestowity liabilities are 18,119million dollars, which is a bit high according to the market situation. That is why this shows the Moodys rating of PepsiCo is A1/A. PepsiCo will have to reduce their liabilities in order to gain a rating of Aa3/AA of coca-Cola.What kind of debt is it, long term or short term? Firstly let us talk about short term debt, if we talk about short term debts then we can assume it can be included in current debts, so according to the balance sheet in exhibit 2, total current financial obligation is 5230million dollars, while total long term liability is 12889million dollars, so the total long term debt is very high compared to total current liabilities. PepsiCo will have to reduce its long term debts more effectively in order to increase its ratings and also increase its assets. potbelly the company afford the debts ifit runs into financial trouble? Let us encipher the debt ratio as explained above in the beginning, Debt ratio = total debt / total assets (both values are in million dollars) = 18119 / 25432 = 0.71. If the debt ratio is less than 1 it means that the firm has more assets than debts. So PepsiCo can afford to be debt financed at a certain level. Looking at the current assets if the company runs into financial troubl e then it can clear all its debts by selling off its assets.RATIO COMPARISON ANALYSISTable of figure ratios referring to values given in exhibit 5 in assignment,RATIOSPEPSICOCADBURYSCHWEPPEScoca plant COLACOCA COLA ENTERPRISESMCDONALDSINTEREST COVERAGE4.5654.89616.9111.4447.379FIXED mail COVERAGE3.0944.28716.9111.4063.588LONG-TERM DEBT0.1650.0900.0110.5170.112TOTAL DEBT TO TOTAL ADJUSTED CAPITALIZATION0.1760.1460.0160.5210.125 bills FLOW TO LONG TERM DEBT0.4270.5692.7300.1550.539CASH FLOW TO TOTAL DEBT0.3950.3301.8390.1530.474Lets look at each ratio one by one in detail and analyze it.(5.1) Interest coverage ratio is used to work up the firms ability to pay interest on the debts. If the ratio is low the firm has huge debt expenses. If the ratio is less than 1 then it means that the firm is unable to generate revenues to incur the interest expenses. Interest coverage ratio = earnings before interest and taxes (EBIT) / interest expense. concord to the table above, we can see that interest coverage ratio of PepsiCo is 4.565 which is very higher than 1 and is considered as good. Comparing it with other companies in the table, we can see that coco Cola has the highest ratio of 16.911 which is very impressive, but Coca Cola Enterprises has a ratio of 1.44 which is a caution alarm for its investors. To be on a safer side if the ratio is 1.5 or less then firms ability to wager its interest expenses can be questionable i.e. the is not able to generate sufficient returns to meet the interest expenses.(5.2) Fixed charge coverage ratio is used to calculate the firms ability to pay its fixed-charges such as rent and interest on debt without increasing the debts. If the ratio is less than 1 then the firm is not able to pay its fixed charges and vice versa. Fixed-charge coverage ratio = (EBIT+ fixed charges before tax) / (fixed charged before tax +interest). According to the table above, we can see that PepsiCos fixed charge coverage ratio is 3.094 which is greater tha n 1. Comparing it with other companies in the table, Coca Cola has the highest ratio of 16.911 which is very impressive, but for Coca Cola Enterprises is 1.406 which is very less. PepsiCo should decrease its debts in order to reduce its fixed charges which will help to increase the value of the ratio.(5.3) Long term debt ratio is used to calculate the firms leverage. Higher the ratio, higher is the firms leverage. Firm with a high ratio is considered more risky for investors to invest because they have more liabilities than equity and vice versa. Long term debt ratio = long term debt / (long term debt + preferred stock + common stock). According to the table above, PepsiCos long term debt ratio is 0.165 which is less. Comparing to other companies in the table, Coca cola has a ratio of 0.011 which shows that it has more equity than liability, but Coca Cola Enterprises has a ratio of 0.517 which shows that it has almost 50% equity and 50% liability, so investing in Coca Cola Enterpris es is more risky.(5.4) Total debt to total adjusted capitalisation ratio is used to calculate the firms leverage which includes long term and short term debts. Total debt to total adjusted capitalisation ratio = (long-term debt + short term debt) / (long-term debt + short term debt) + preferred stock + common stock. According to the table above, PepsiCos total debt to total adjusted capitalisation ratio is 0.176. Comparing to other companies in the table, Coca Cola has a ratio of 0.016 which shows it has more equity than liability, but coconut palm Cola Enterprises has a ratio of 0.521 which is again very risky.(5.5) Ratio of cash flow to long term debt is used to calculate the firms ability to generate cash in comparison with the long term debts. Ratio of cash flow to long term debt = cash flow / long term debt. According to the table above, PepsiCos ratio of cash flow to long term debt is 0.427 which is not good enough. Comparing it with other companies, Coca Colas ratio of cash flow to long term debt is 2.730, which is very impressive. PepsiCo has more long term debts than its annual cash flow while Coca Colas annual cash flow is 3 times the value of its long term debt. Firms with a high cash flow after interest and taxes are in a better position to distribute cash dividends. Firm with high cash flow can also use the cash to invest in other projects, buy assets, reduce debts etc.(5.6) Ratio of cash flow to total debt is used to calculate the firms ability to generate cash in comparison with its total debts. Ratio of cash flow to total debt = cash flow / total debt. According to the table above, PepsiCos ratio of cash flow to total debt is 0.395. Comparing it with other companies, Coca Colas ratio of cash flow to total debt is 1.839 which is very good. PepsiCos total debt is more than twice the value of its annual cash flow while Coca Colas annual cash flow is 2 times the value of its total debt.After considering all the ratios in the table, we can say that PepsiCo needs to reduce its debts by a huge margin and generate more cash so that it can use this cash to pay out more dividends to its investors, increase equity and reduce liability, invest in more products, buy assets, etc. Coca Cola is the largest competitor of PepsiCo, so PepsiCo needs to improve its equity in order to compete more effectively with Coca Cola. If company has less debts and liabilities people will invest more which will provide PepsiCo with a good rating as Coca Cola. PepsiCo can slow suck money from the market for investments and also it can easily pay it back. nonetheless in financial or economic crisis it will be the least(prenominal) affected company. Capital structure of PepsiCo has debt and equity. According to the net debt ratio we can say PepsiCo has about 20% 25% debt and 75% 80% equity.PEPSICOS valuation OBJECTIVERatings are given to companies depending on various factors such as its debt value, equity value, sources of finance, stock price, num ber of shares, profits, dividends, etc. Moody rated A as upper-medium grade, subject to low credit risk,but that have elements present that purpose a susceptibility to impairment over the long term. PepsiCo has a rating of A1/A which places it in the upper medium grade category. A1 is the high smell rating given to PepsiCo, Aaa is the highest rating available. Coca Colas rating is Aa3/AA shows that it has much better ratings then PepsiCo.If PepsiCo wants to have a net debt ratio of 20% 25% then it will have to increase its debts and reduce equity, if this happens the collective Debt Rating of PepsiCo might fall to Baa which is lower medium grade. This will show a bad image of the company in the market, investors will find it risky to invest in PepsiCo. This means people will not buy shares of PepsiCo and it will not be able to raise funds through the issue of share to decrease its debts or to invest in the business. As a result of which they will have to dramatize from the bank s, Banks would also lend them funds to a certain limit where their assets are equal to liabilities, Banks would like to make sure that PepsiCo are able to pay back the funds with interest before lending them the funds. PepsiCo should reduce their net debt ratio to at least 15% instead of increasing it, due to this they will have more cash flow, reduced debts, can easily pay back dividends to investors, they can easily raise funds through issue of shares instead of borrowing from banks or other financial institutions. This will overall help PepsiCo to increase its ratings from A to Aa.CONCLUSION

Ethosomal Formulation as a Carrier for Transdermal Delivery

Ethosomal verbal expression as a Carrier for transcutaneous lurchABSTRACTThe aim of present work was to develop, characterisation, of stable ethosomal preparation as a carrier for transdermic pitch shot of paroxetine hydrochloride. To prepare this ethosome diametrical preoccupation of soja lecithin and fermentation alcohol was taken. Vesicular sizing, polydispersity prop onenessnt, zeta potential, entrapment effiency were determined by photon coefficient of correlation spectroscopy and ultracentrifugation techniques. The intro interpe send awayration matter across human the Great Compromiser skin was done. Stability subscribe to was done on optimised F2 saying. Vesicle size of it slack as enlarge in the stringency of fermentation alcohol. Entrapment capacity profit with attach in concentration of soya lecithin. The ethosome exhibit entrapment effiency of 40-64%. Invitro suffusion excogitate across human skin ethosome F2 construction showed heightser transd ermal flux 26.39%g/cm2/hr. Release mechanism of Invitro permeation shows zero order drug destitute from expression. In vivo pharmacodyanamic airfield F2 formula showed monumental immobility as analyze to controlled group. Stability study depart revealed no significant change build in size distribution was found for 90days. Our result indicates that the developed ethosomal schema may be potential and safe to delivery paroxetine hydrochloride through transdermal deliverys.INTRODUCTIONIn recent years the attraction of lipid cyst use in delivery clay for skin treatment is change magnitude (1, 2). Paroxetine hydrochloride (PXH) is a selective serotonin reuptake inhibitor. Commonly available in anovulatory drugs and capsule dosage form, but oral administration have number of grimace effects as well as it undergoes extensive hepatic metabolism. Variation in plasma concentration and long term therapy leads to grueling side effects (3).To overcome these difficulties such a s extensive hepatic first pass metabolism transdermal delivery is beneficial (4). The utilizable of transdermal delivery has been proved for some antidepressants (5,6). It is previously reported that significant increase delivery of drugs across the skin would be done by using an ethosomes as bracing permeation enhancing carrier (7-10). authorship of ethosomes constitution mainly contains phospholipids, neutral spirits and water (12). Solubility and high encapsulation efficiency determine for large range of lipophilic drugs can be obtain callable to presence of ethanol. Ethanol may provide vesicles with soft flexible characteristics, which chuck up the sponge them to penetrate more simply into the deeper layers of the skin (13). The present aim focuses on the preparation and characterization of ethosomal formulation for PXH transdermal delivery. The aim of present study was to develop stable ethosomes carrier for transdermal delivery of PXH. The effect of ethanol and soya le cithin on the permeation of PXH through the human skin was evaluated. sensible and methodMaterialSoya lecithin was purchased from Research Lab Mumbai. Ethanol was purchased from Loba chemical Mumbai. Cholesterol was purchased from Research Lab Fine Chem Industries, Mumbai. PEG-400 was purchased from Dipa Laboratory Chemicals. All materials and solvents utilize in this study are of analytical grade.Preparation of ethosomesSoya lecithin and PXH, were turn in ethanol. Double distilled water was added slowly with a fine float in above ethanol dispersion with constant mixing at 700 rpm on magnetic stirrer, in a well-sealed methamphetamine hydrochloride container. coalesce was continued for an additional 5 min. The system was kept at three hundredC end-to-end the preparation and was then left to cool at room temporary workererature. (7, 8) physiologic CHARACTERISATION OF ETHOSOMEVesicles size distribution, polydispersity index and zeta potentialThe vesicle size distribution, poly dispersity index and zeta potential of vesicles was determined using photon correlation spectroscopy (Beckmann counter, Delsa Nano, USA). Formulation were reduce by 1/4th distilled water before measurement and measurable three times at scattering angle of 900. The polydispersity index (PI) was employ as a measurement of the width of the size distribution. PI less(prenominal) than 0.4 indicates a homogenous and monodisperse population. Zeta potential was measured as the touch electrophoretic mobility pixilateds of laser microelectrophoresis in a thermostated cell.Entrapment efficiency (EE)The entrapment capacity of PXH by ethosomal vesicles was determined by ultracentrifugation. Formulations were kept overnight at 4 micro-centrifuge (Tarsons) 12000 rpm for 30 min. The supernatant was removed and drug get along was determined in both the sediment and the supernatant. The entrapment capacity was calculated as follows, (T2C) /T 100, where T is the entire amount of drug that is detected both in the supernatant and sediment, and C is the amount of drug detected only in the supernatant.In vitro permeation studyPreparation of cadaver skinSkin samples provided from Government aesculapian College and Hospital, Aurangabad. Obtain from breast reduction operation and subcutaneous fat was carefully trimmed and then rinse with normal saline, prepared skin was warp in aluminium foil and stored at -200c until use. (15)ProcedureInvitro skin permeation studies were performed on a Franz diffusion cell with an effective diffusional area 0.785 cm2 and having receptor compartment volume of 15ml. The skin was brought to room temp and mounted with the donor compartment juiceless and gift to the atmosphere. Initially, the donor compartment was empty and receiver compartment was filled with phosphate buffer storage ph 7.4. The receiver fluid was stirred with magnetic bead with the stronghold of 100rpm and the temperature was maintained at 371. The phosphate buffer pH 7 .4 was replaced with the fresh one at every 30 min to stabilize the skin. It was found that the receiver solution should a negligible peak area after 3hr and beyond indicating complete stabilisation of skin. 5ml ethosomes formulation was placed into the donor compartment and sealed with paraffin film to provide occlusive condition. The sample where withdraw at invariable interval for 10 hrs filtered through 0.45 . membrane filter and analysed for drug amount by UV-Visible spectrophotometer at 294 nm.Permeation data analysisThe cumulative amount of penetrant, Q (g/cm2), which permeated the skin per unit surface area was plotted against time. The linear segment of the plot was taken as being the steady-state flux, (Js). The permeableness coefficient (Kp) was calculated asKp = Js/CvWhere Cv is the concentration of penetrant in the donor solution.Vesicle stableness evaluationStability of optimised ethosomes formulation was kept at room temp for 4 weeks. The measurement where conduc ted on of ethosomes that. Vesicle size, polydispersity index and zeta potential was measured at 1, 2, 3, 7, 14 and 21 days mean value where apply for the analysed of the data.2.5. In vivo Pharmacodynamic studyApproval to carry out pharmacodynamics studies was obtained (Institutional Animals Ethical Committee, sanction the protocol). lined Swim test (FST) and Locomotor Activity test (LAT) was utilize to evaluate antidepressant effect of the optimized F2 formulation. Rats of either sex weighing 250300 g were kept under standard laboratory conditions (temperature 23-30oc).The rats were kept with free access to standard laboratory diet. Approximately 14 cm2 of abdominal side of rats skin was shaved on the in for each one group provided group hard-boiled with marketed tablet formulation.Rats were divided randomly into three groups each containing six animals. Group -1 was considered as a control. Group-2 was treated with oral tablet of PXH containing 1.40 mg/day and administered w ithout anaesthesia by using simple poly-ethylene tube. Group-3 was treated with optimized F2 formulation applied transdermally containing 2 mg/day (equivalent to 0.60 mg/day) drug.2.5.1. overstretch float testRats were forced to swim in cylindrical glass tank (60 cm height X 30 cm in diameter) containing water after the administration of doses. Water was filled up to 40 cm height so they were swim without touching their hind leg or tail to bottom of the tank. On the 1st day of experiments, rats were forced to swim for 10 min. After 24 h, rats were re-exposed to forced swim for 5 min and animals were judged for immobility, climbing, and swimming. After a 5-min swim test, the rat was removed from the cylinder, dry and then returned to its home cage 29. Porsolt, R.D., Bertin, A., Jalfre M. (1977). Behavioral despair in mice a primary screening test for antidepressants. Arch Int Pharmacodyn Ther. 229, 327336.2.5.2. Locomotor activityHyperactivity, useable roles of specific neurobi ological and drugs potential psycho activity were discriminate by the locomotor activity study 30. Locomotor activity was measured in the open-field test. The apparatus consisted of a square arena (200200 cm), with a 50 cm height. The floor was divided into 30 equal squares. Animals were individually positioned in the centre of the arena and the activity was measured over 5 min. The open field was cleaned with isopropyl alcohol solution before behavioural testing to sub over delinquent possible bias due to odours and/or residues left by rats time-tested earlier. Also after each 3 animals apparatus was cleaned 31.Result and discourseVesicle size, polydispersity index and zeta potentialThe vesicle mean diameters for all formulation are shown in dining table 2. The result of photon correlation spectroscopy shows shorten peak for all formulation, which indicating that size of vesicle population is comparatively ordered in size. In accordance with other researcher, this decrease in the mean diameter of vesicle is due to the presence of ethanol (touitou et al., 2000). Higher concentration of ethanol produced lower vesicle size. Probably the ethanol causes the modification of the net charge of the system and confer it some degree of stearic stabilisation that may finally lead to decrease in mean soupcon size (lasic et al., 1998). In the formulation the concentration of ethanol increases from 30-35% the significant decrease in vesicle size. On the other hand, it was observed that the increase in soya lecithin concentration resulted in increase in mean particle size. Small vesicle size is formed with the F2 formulation having a 1% of soya lecithin and 35% ethanol. Twice fold increase in soya lecithin concentration (1%-2%) resulted in two fold increase in ethosomes size (from 500nm- ). The charge of vesicles is important parameter that can influence both stability and skin vesicle interaction. Zeta potential value of all formulations shown in shelve 2. The conce ntration of ethanol increase from 30-35% v/v resulting in increase in zeta potential value. Polydispersity index was determined as measure of homogeneity in formulation. Polydispersity index 0.3 indicate homogeneous population of ethosome vesicle in formulation. Polydispersity of all formulation shown in Table 2. Compare to all formulation F2 formulation showed less polydispersity index is 0.23 indicates homogeneous population of ethosome vesicles.Entrapment efficiencyEntrapment efficiency of all formulation shown in Table 2. Entrapment efficiency of formulation containing of 1% soya lecithin and 30% (F1) ethanol was found to be 60%, which significantly change magnitude to 64% when the amount of ethanol increases to 35% (F2) keeping the concentration of soya lecithin constant. Ethosomes formulation prepared with 1.5% soya lecithin and 30% ethanol (F3) exhibited 40% entrapment efficiency, which was increased to 45% (F4) respectively keep the amount of soya lecithin constant. Formu lation prepared with 2% soya lecithin and 30% ethanol (F5) showed 42% entrapment efficiency, which was increased to 61% when the concentration of ethanol increased to 35%(F6) respectively. These data support by previous finding that solubility and high encapsulation efficiency values for large range of lipophilic drugs can be obtain due to presence of ethanol (13).From these results entrapment efficiency of formulation was observed due to increase in ethanol concentration.Invitro permeation studyIn vitro skin permeation experiment was performed using human cadaver skin showed that permeation was highest in F2 formulation as shown in Fig 1. Flux value of F2 formulation was significantly different when compared with other formulation (P0.05) as shown in Table 3. Highest flux value (-) of F2 as compared to other formulation. These may be due to small vesicle size and high entrapment efficiency alone with high concentration of ethanol. These data supported by previous finding that ethan ol interact with a lipid molecules of stratum corneum, resulting in reduction in the Tm of stratum corneum, increase in there fluidity. The intercalation of ethanol due to polar head group environment can result in increase in membrane permeability (16). It can excessively suggest that mixing of phospholipids with the stratum corneum lipid of the intercellular layers enhances the permeability of the skin (17). F2 formulation was selected as a optimized formulation from the vesicle size distribution, polydispersity index, zeta potential, drug entrapment efficiency, and in vitro permeation study results and considered for further study.In vivo Pharmacodynamic studyPharmacodynamic activity of ethosomes F2 formulation was compared with orally administered dose. Pharmacodynamic activity involved two tests. nonpareil was force swim test and other was locomotor activity. Force swim test is most widely used model for assessing the antidepressant activity. derive immobility period would d ecrease if high concentration of paroxetine hydrochloride reached target site.Force swim testResults of FST confirmed that there was significant reduction in total immobility period in seconds by treating the rats by transdermal ethosomal F2 formulation. There was significant (pTable 3. Results of forced swim test.ConclusionEthosomal vesicles with usurp size and maximum drug entrapment efficiency can be prepared. F2 formulation showed highest transdermal flux across human skin was composed of 1% soya lecithin, 35% ethanol and 2% cholesterol. In vivo pharmacodyanamic study of optimised formulation showed significant values compared to controlled group. Therefore, it can be concluded from the result of the study that ethosome formulation is potentially useful carrier for transdermal delivery of paroxetine hydrochlorideREFERANCESO. Braun-Falco, H.C. Kortung, H.I. Mai bachelor (Eds.), Grieswith bach Conference Liposome Dermatics, Springer-Verlag, Berlin, Heidelberg, 1992.E. Touitou, H. E. Junginger, N.D. Weiner, M. Mezei, Lipo somes as carriers for topical and transdermal delivery, J.Pharm. Sci. 9 (1992) 11891203.Hollister L E. Norwalk, computerized axial tomography Appleton Lange 1995. A Lange Medical Book Basic and Clinical Pharmacology. 44859.Kilts CD. Potential vernal Drug Delivery Systems for Antidepressants An overview. J Clin Psychiatry. 2003 64313.Frampton JE and Plosker GL. Selegiline transdermal system in the treatment of major depressive disorder Profile report. CNS Drugs. 2007 2152124.Singh G, Ghosh B, Kaushalkumar D and Somsekhar V. Screening of venlafaxine hydrochloride for transdermal delivery passive diffusion and iontophoresis. AAPS Pharm Sci Tech. 2008 9791797.Touitou E. Compositions for applying active substances to or through the skin. US Patent 5 540 934, 1996.Touitou E, Composition for applying active substances to or through the skin. US Patent 5 716 638, 1998.Touitou E, Alkabes M, Dayan N, Eliaz M. Ethosomes novel vesicular carriers for enhanced skin delivery. Pharm Res 1997 14 S-305.Touitou E, Dayan N, Bergelson L, Godin B, EliazM.Ethosomes*novel vesicular carriers for enhanced delivery characterizationand skin acumen properties. J Control Rel 2000 6540318.Touitou E, Dayan N, Bergelson L, Godin B, Eliaz M. Ethosomes *novel vesicular carriers for enhanced delivery characterization and skin penetration properties. J Control Rel 200065 40318.M.M.A. Elsayed, O.Y. Abdallah, V.F. Naggar, N.M. Khalafallah, Deformable liposomes and ethosomes as carriers for skin delivery of ketotifen, Pharmazie 62 (2007) 133137.Heeremans JLM, Gerristen HR, Meusen SP, Mijuheer FW, Panday GRS, Prevost R, Kluft C, Crommelin DJA. The preparation of tissue-type plasminogen activator (t-PA) containing liposomes entrapment effciency and ultracentrifugation damage. J Drug Target 1995 3301-310.Fang, J,V., Sung, K.C., Lin, H. H., Fang, C.L.(1999) transdermal iontophoretic Delivery of diclofenac sodium from various polymer formulation Invitro and I nvivo studies. Int. J. Pharm. 19 178 83-92.Nava Dayan., Elka Touitou. (2000) Carrier for skin delivery of trihexphenidyl HCLethosomes vs. Liposomes biomatererials 21( 2000) 1879-1885.A. Blume, M. Jansen, M. Ghyczy, J. Gareis, Interaction of phospholipid liposomes with lipid model mixtures forstratum corneum lipids, Int. J. Pharm. 99 (1993) 219220.Formulation of ethosomeTable- 1Evaluation of ethosome

Saturday, March 30, 2019

Understanding Blog Definitions And Features

Understanding Blog Definitions And FeaturesThere ar quaternion sections in this chapter. The first section is an overview of the chapter. The second section provides a oecumenic understanding on intercommunicate definition, the qualitys of intercommunicates and web logging scratchs and their evolution. The third section examines the enjoyments of intercommunicates in variant beas such(prenominal) as face-to-face, crease, politics and education. The fourth section discusses the previous verifiable studies. Fin whollyy, the discussion of the entire chapter is summarized in the last section.A blog or meshinglog refers to a individualisedised web page with minimal or no external editing that provides, online small talkary and that is periodically up get wordd and presented in reverse chronological order (preserved old posts in renderition to bracing entries) with hyperlinks to early(a) online sources (F arll and Drezner, 2007 D possesses, 2004). close to authors agr ee that a blog is a frequently updated website consisting of dated entries (Walker, 2003). A blog whitethorn include any, all, or whatsoever combination of text, photos, videos, audio, as well as hyperlinks (links to websites or other mesh-based information). One of the affairful features of blogs is their interactivity. A blog was formulaed to facilitate interaction by permitting contemplateers to noteary on entries. So a blog is a course of try of personal media, fellowship management tool, and community forum (Liu et al, 2009).Blogs be a normal elan for expressing personal opinions and interests on the Web (Varlamis et al, 2008). Essentially, the author or we call a blogger not only expresses his personal ideas and experience, except too provides divine service to others during the communion without the profit and in this way puddle their blogs more expensive for sharing (Shaohiu and Lihua, 2008). In addition, blogs shadow be a personal diary, a memo, a pla ce to deliver messages, a cooperation field, a cleans-release website, or a temporary runing stage for a politician (Xin, 2009).According to or so researchers, a small eggshell webpage that we call as a blog usually has certain features. Five features that a blog usually has i.e. personal editorship, a hyperlinked posting structure, frequent updates, free public access to the means via the Internet and archived postings (Paquet, 2003). Table 2.1 summarises the definitions of a blog or weblog according to respective(prenominal) researchers.Table 2.1Definition of BlogDefinitionsAuthorsReverse chronological postingDoctorow et al., 2002 Paquet, 2003 Walker, 2003 Schiano et al., 2004 Downes, 2004 herring et al., 2004 Bruns and Jacobs, 2006 Viegas, 2006 Farell and Drezner, 2007 Shaohui and Lihua, 2008 Liu et al., 2009Individually author / Personalised web pageBarger, 1997 Paquet, 2003 Bruns and Jacobs, 2006 Liu al et., 2009Online commentaryBruns and Jacobs, 2006 Farell and Drezner, 2 007 Liu al et., 2009Text-based online environsDownes, 2004Mini web page / Small scale website / impartial web pageDoctorow al et., 2002 Farell and Drezner, 2007 Shaohui and Lihua, 2008Online diary/journalBarger, 1997 Blood, 2000 Doctorow al et., 2002 Herring al et., 2004 Xin, 2009Table 2.1 (Continued)Definition of BlogDefinitionsAuthorsPosting with date entriesPaquet, 2003 Walker, 2003 Herring al et., 2004Frequently updated websiteBlood, 2000 Walker, 2003 Schiano al et., 2004 Herring al et., 2004 Luehmann and MacBride, 2007 Shaohui and Lihua, 2008 sharing thoughtShaohui and Lihua, 2008Express personal ideas / opinionsDoctorow al et., 2002 Varlamis al et., 2004 Shaohui and Lihua, 2008 manduction experiencesShaohui and Lihua, 2008Sharing interestsVarlamis al et., 2004Collects and shares resources (Photos/Videos/Hyperlinks)Doctorow al et., 2002 Paquet, 2003 Bruns and Jacobs, 2006 Luehmann and MacBride, 2007 Farell and Drezner, 2007 Liu al et., 2009FeaturesBlogs utilise a unprejudice d port to make it easy for a exerciser to construct it, without having to understand hypertext mark-up wording or web scripting. Thus, any one(a) who suffer create a basic Microsoft news program document endure create and maintain a blog. Users muckle add pictures or audio files to enhance their blogs good-naturedness. Typically, blog combines text, images, links to other blogs or web pages, and other media colligate to its topic i.e. video. A blogger decides what does and does not go into a blog (Shevked and Dakovski, 2006). According to Duffy et al., (2006), a blog is usually make up of the following componentsDate and time the post was published crime syndicate the post is label with ( jakes be one or more)Main agnomen of the postMain substance of the postLinks back (trackback) from other sitesComments added by readersURL of the full, individual articleIn addition, Du and Wagner (2005) claimed that the features of blogs (i.e. archival of previous(prenominal) weblogs b y date-posted, hyperlink to other web or blog, instant publishing of web essence with little technical skill required, and ways for others to comment/feedback). An all measurable(predicate) and desirable feature of blogging engine room which makes communication doable is the ability to comment a publication in a blog. Most blogging tools allow piece of music a comment on someones article (Downes, 2004 Du and Wagner, 2005).Shaohui and Lihua (2008) utter that advanced network applied science is not required to build a blog and and then any one discount establish his own blog, as yearn as he is able to type and take advantage of the Internet. The innovation of a blog does not need any extra economical costs beca design basic blog services are available in any online computing device for free. A blog is open, free and available for sharing. This entails one whitethorn write down what he sees, hears and thinks of freely in a blog. The openness, sharing features, interactio n, virtual capability, cover up and non-restraint characteristics of a blog gain vigor peoples desire of self-expression and self complacency, including those who are reserved in real life history but are giveing to express their inner thought through a blog (Shaohui and Lihua, 2008).Besides the basic features of a blog, in that respect are additions to a blog. Nowadays, most blogging tools support a method for communication amongst blogs called trackback. When someone writes a new article in his blog that refers to other article typically residing at a different blog, a telling is sent to the other blog. The notification is referred to as trackback (Shevked and Dakovski, 2006). The trackback functionality enables the reader of a weblog to comment on a certain article in his own blog platform (Bross al et., 2009).Another additional blog feature is called pingback. This feature allows a blogger to request notification when somebody links to one of his articles so he can keep t rack of who is linking to, or referring to his publications (Shevked and Dakovski, 2006). In a contemporary blogging system it is now authorized to support Really Simple Syndication (RSS). This is a web feed format, which is utilise to provide web condecadet (Shevked and Dakovski, 2006). This way when someone is interested in content published in a particular RSS-supporting site and wants to stay in touch with its updates and new articles posted at that place, he may subscribe to them via RSS.BLOGGING TOOLS AND THEIR EVOLUTIONDuring the late 1990s, there were no special tools available for creating weblogs. Most bloggers hand-coded their sites. But, very soon, it became difficult to read every weblog every day, or even to keep track of all the new ones that were appearing (Blood, 2000). Blogs started to gain popularity later on Pitas.com launched the first free build-your-own-weblog tool, and others same(p) Blogger released their blogging tools. These tools provide the ease and affordability for non-technical persons to communicate online.According to Bauer (2004), approximately 80% of weblogs determination hosting services that provide weblog building tools and server space, while the rest commit standalone software that runs on individual servers or web hosts. Popular weblog hosts, such as Blogger, ModBlog, and Xanga, offer basic services for free, which are to the advantage for new bloggers or general users even though there are express mail server spaces and standard features. But, achieverful weblogs can outgrow these basic services, and may be forced to choose premium services (at high-pitcheder costs), or even to set up their own hosts (Rubenking, 2003). Comparatively, standalone software is more tractile in name of server space and control of own content, but this requires some knowledge on the part of the users to set up the masking and to maintain the server. Movable Type and Radio Userland are two popular fee-based standalone software solutions.Schiano al et. (2004) represent that the participants of their research apply a full(a) variety of blogging tools, including Blogger, Blurty, Xanga, MoveableType, RadioUserLand, and customised scripts. Several participants began with Blogger (recently acquired by Google), but as they gained experience, they migrated to other, more advanced(a) tools or created their own.2.3 USES OF BLOGSMost people are not aware that there is a variety of genres in the blogosphere. The interface looks similar but the content is different. Blog can be used in various areas or purposes such as, for personal usage, politics, championship and educations.2.3.1 PersonalPersonal blogs is frequently know as online diary or journal. The blog format of an online diary makes it possible for users who fuck off not much experience to create, format, and post entries with ease. People often write their everyday experiences, complaints, poems, thoughts and more and this type of blog allows others to contribute. The blogger, as a main role, writes about his/her personal perspective in his/her own blogs. Blogs in like manner provide users the right to write and express their own ideas and viewpoints. Moreover, blog belles-lettres enable the users both to share information and to make self-reflection. According Schiano et al., (2004), some blogs seem to function in the age-old tradition of diaries and personal record-keeping.2.3.2 governingPolitical campaigns at the federal, state and local level use blogs to invent and motivate their supporters (Farell and Drezner, 2007). Political blogs may take a number of forms. very much an individual will link to articles from news web sites and post his own opinion. Most news, activism, and issue-based blogs follow the same format. A recent trend in politics is that candidates are incorporating blogging into their campaigns. For example, in 2005, Chilean presidential election, four candidates used their own blogs as part of their c ampaign mechanisms (Farell and Drezner, 2007).Blogs have played an important role in several media scandals (Glaser 2004). They have withal played a important role in shaping campaign strategy and tactics. In 2004, Howard Dean rose to prominence in part because of his adroit use of the blogosphere as a tool for rallying activists (Graf and Darr 2004 Kerbel and Bloom, 2005). Blogs increasingly affect sub judice outcomes (Solum, 2006 Berman, 2006).It has been shown that blogs have influenced policy outcomes. As example, blogs played an important role in helping defeat George W. Bushs proposed Social Security reforms, which were intended to be the street corner achievement of his second term in office (Glover and Essl, 2006). Blogs have also achieved some political and policy prominence outside the US (Drezner and Farrell, 2004).2.3.3 business lineBusinesses increasingly use blogs for promotional campaigns, and track blogs to measure customer satisfaction and monitor trends (Farel l and Drezner (2007). A number of entrepreneurs establish blogs to get up their businesses. Often business blogs act as a showcase for entrepreneurs to provide a windowpane into the behind-the-scenes activities at their business, presenting a more personal face. In some cases the blog itself is the core of the business bringing in revenue from advertising, sell products or information.Interest in blog as a business tool has coincided with a growing realisation that traditional market methods may no longer suit todays fragmented markets and increasingly demanding customers. The nineties byword the introduction of new forms of marketing, including relationship marketing, buzz marketing, word-of-mouth marketing, one-to-one marketing, opt-in marketing, irregular marketing and viral marketing. Blogs have the potential to fulfil the aims of these new marketing methods. The blogger not only share the ideas and feeling, but also received valuable comments from readers.The business wor ld now realises the opportunities of blogging and begins to reap the benefits. Maintaining a blog an important part of apiece callers Internet strategy. A company can make blogs to introduce products/services inform customers about discounts, do promotions and announce achieves and success (Shevked and Dakovski, 2006). In addition, customers can write their comments, opinions, complaints and suggestions and get support from responsible company workers. Concurrently, it is reclaimable to have also an internal blog for forgement tracking, which by company employees. This supports collaborative work as the blog might be not only central information source but also management tool, brainstorming sessions, announcements or reporting place (Shevked and Dakovski, 2006). Corporate blog have received widespread attention in press and among Internet users. It can help a company build stronger relationships with its customers and get customers feedback instantly. It can be used to market p roducts or services and develop a brand (Ryu and Shi, 2010).2.3.4 EducationBlogs can be used as acquirement tools in a variety of ways, Their value is demonstrated by the practicable structures and responses mechanisms, dis manakin style and method of recording ideas, commentary and institutionally pertinent information (Ismail, S., 2009). Students frequently use blogs as records of their information while teachers use them as records of what they taught. For example, through a blog, a teacher can perform fooling recording was taught, include links to Internet resources, and specify the cookery scholarly persons are required to carry out. This application has many advantages (i) pupil can quickly catch-up if they miss a class, (ii) the teacher can use the blog as a lesson plan, and (iii) the blog serves as an accurate summary of the course that prospective students or new teachers can refer to. The collaborative features of blogs can be used to authorize several students to contribute to the blog. There are more educators and language teachers utilise the Internet in language educational activity as well (Godwin-Jones, 2003 Lord and Lomicka, 2004). Many estimator applications, especially asynchronous estimator-mediated communication such as email and electronic bulletin boards, promote interactive skill (Arnold and Ducate, 2006). With the booming growth of technology, blogs have become some other accomplishment platform for language instruction method.Johnson (2004) pointed out that the logs are a useful additional aid to teachers. From any computer connected to the Internet, teachers can create, edit, or delete their teach hand-outs including notes, assignments, and reviewed materials. Teachers messages are organised in a converse chronological order with the latest postings at the top. The feature of automatic date-stamping for each post is useful. Students emails may, for some technical glitches, not reach their teachers or be carelessly d eleted by their teachers. With the automatic date-stamping function, both teachers and students know clearly when students exploit in their assignments.Consequently, the automatic archive of past posts by date or theme can help teachers and students easily locate the message they are searching. If students do not have their own personal websites, an easy-to-use blog is a good start for them to interact with users of the cyberspace community. As Campbell (2004) emphasised that simple customisation of templates can help students build a sense of ownership and quaint online identity. Most students will write more carefully if they know that they are going to publish their articles online for authentic readers who may comment on their postings.Additionally, teachers can easily use blogs to organise a collaborative learning environment in which students can peer edit others postings (Dieu, 2004 Mitchell, 2003). Students should be encouraged to comment their partners postings, which can also be dual-lane by other classmates. Oravec (2002) claimed that blog development can allow students to become more analytical and faultfinding. Duffy al et. (2006) list the following are possible uses of blogs in education.Table 2.3 practicable Uses of Blogs in Education (Duffy et al., 2006)PerspectiveUsesPersonal academicA blog can support reflection on teaching experiences categorised descriptions of resources and methodologies for teaching ramblings regarding professional challenges and teaching tips for other academics illustration of specific technology-related tips for other colleagues.OrganisationalA blog can support a common online presence for unit-related information such as calendars events, assignments and resources an online area for students to post contact details and queries relating to assessment. pedagogicA blog can support comments based on belles-lettres readings and student responses a collaborative space for students to act as reviewers for course-related materials, images and reflections related to industry placement an online gallery space for review of works, writings, etc. in progress making use especially of the commenting feature, teachers encouraging reactions, reflections and ideas by commenting on their students blogs development of a student portfolio of work.2.4 RELATED EMPIRICAL STUDIESThis section focuses in blogs used in learning, blogs in teaching and also others issues related to technology in teaching.2.4.1 Blog and teacherThe ease of operating blogs make them attractive tools to some teachers for posting announcements, facilitating discussions, or linking to class resources (Downes, 2004 Oravec, 2003). Blogs have been coined as teacher-driven administrative tools. Teachers may require students to post to their own or a shared blog a required (or recommended) structure and contents for entries and in uniformity to specific grading rubric (Krause, 2005).The literature discusses interesting possibilities for the use of blogs in education (Flatley, 2005 Huffaker, 2006 Perschbach, 2006 Quible, 2005 Richardson, 2006 Selingo, 2004). Churchill (2009) asserted that blogs added a new dimension to teaching authorization by enabling teachers to do things that were not possible otherwise, any with or without other technology. Initially, teacher saw blogging as a means by which they could provide a reflections (Chuang, 2008 Yang, 2009).Wang and Hsua (2008) reported that pre-service teachers enjoyed exchanging perspectives on the blog and considered blogging an extra bear that enabled them to express different views or to extend in class discussion. Teachers can continue the class discussion in a blog after class. For that reason, blogs become a good tool for communication between teachers and students as they provide with a platform for the students to give their opinions about teaching. Ding (2008) conclude that the greatest advantage of a blog is that it provides an efficient platform for the intera ction between teachers and learners.In addition, a blog can promote teachers to develop thinking and writing habits. Blogging help accelerate the transfer of teachers personal unverbalized knowledge to explicit knowledge, and let others share the essence of his knowledge or depressions. So a blog is not only a platform for teaching, thinking and communication but also a platform of belief and opinion (Yan et al, 2010). Blogs contribute confirmatively in teaching of the English language (Ding, 2008 2009) and Science (Sawmiller, 2010). Ding (2008, 2009) found that blogs has extended and complemented classroom teaching and learning activities.Sawmiller (2010) in his guinea pig back up that using blogs in the classroom can help in teaching scientific concepts and in increasing student learning through the use of a students preferred learning style, personal interest, and engagement. Blogging is the bridge spanning the gap that exists between at-home and check experiences of learni ng. Blogging can be a constructive tool in a science learning environment. It promotes critical thinking skills, collaboration, and differentiated instruction by using multiple learning styles.Other than teaching, blogs can be used as a tool to promote interaction within online communities, teachers professional development and teachers interaction (Hou, 2010). Luehmann (2008) supported the potential of blogging for teachers professional identity development. The study suggested that teachers blogging determine the end of the benefits they win from the practice. Blogs can become the digital files that record teachers professional growth (Shaohui and Lihua, 2008). Blogs help teachers prepare for lessons co-operate and communicate with each other and receive long surmount training.Because of the classification function of blogs, teachers can set some useful items (e.g. teaching materials, reference, question solution, exercise, work presentation, notice etc.) in their teaching blog as knowledge management tool (Ding, 2009). Blog provides a platform for not only information interchange but also interchange of thoughts. In sum, blogs allow teachers to have a network identity, promote teachers to reflect upon daily teaching activity, and hence improve the quality of teaching. (Yan et al, 2010).2.4.2 emplacements towards Technology and TeachingIt has been stated that no matter how sophisticated and powerful the state of technology is, the extent to which it is implemented defends on teachers having a positive attitude towards it (Huang Liaw, 2005). Therefore, this section will discusses the empirical studies related to teachers or educators attitudes towards technology in teaching. Teo (2008) asserted that the success of any initiatives to implement technology in an educational programme depends powerfully on the support and attitudes of teachers involved (Teo, 2008). The factors that affect the successful use of computers in the classroom are teachers attitudes towards computers and these attitudes, whether positive or negative, and the attitudes affect how teachers respond to technologies (Teo, 2008).Khine (2001) canvass 184 pre-service teachers their use of ICT. They found a significant relationship between computer attitude and ICT use in the institution. Yuen and Ma (2001) administered the Chinese Computer Attitude Scale for Teachers to 216 secondary teachers in Hong Kong to examine the factors that influence the instructional use of computers. They found that affective attitudes a significant factor in influencing the use of computer among teachers.Hong and Koh (2002) investigated the attitudes of rural secondary schools teachers towards computers. The sample consisted of 200 secondary school teachers in Malaysia. Hong and Koh (2002) found that rural secondary teachers have positive attitudes toward computers. Teachers who possess computers and had more computing experience were found to have more positive attitudes than teachers w ho had less computer experience.Wong et al (2005) examined the use of the Internet among 310 pre-service teachers in Malaysia using questionnaire survey method. The study shows that attitudes toward the Internet were positive. Wong et al (2005) concluded that pre-service teachers will corporate the new technology effectively in classroom instruction either as a teaching tool or as a learning medium.Kadijevich (2006) examined teachers interest to attain educational technology standards (interest) in terms of their computer attitude (attitude) and the professional support they received to attain these standards (support). The study used a sample of 39 mathematics pre-service teachers and 62 round-eyed pre-service teachers. The two groups differed in Support favouring master(a) student teachers, who, contrary to mathematics student teachers, received some basic. Despite the differences in support, for both student teachers, there were direct positive and significant effects for supp ort on attitude and of attitude on interest.Teo et al (2007) examined 239 pre-service teachers attitudes towards computers in Singapore. The results show that sensed usefulness, perceived ease of use and subjective norm were significant determinants of pre-service computer attitudes. Later, Teo (2008) examined demographic factors among 139 pre-service teachers using a questionnaire. The results show no gender or age differences among pre-service teachers on computer attitudes. However, there were significant differences in computer attitudes for the subject areas that pre-service teachers had been trained. Correlation analyses revealed significant associations between years of computer use and level of confidence, and computer attitudes.Birisci et al (2009) conducted a survey among 191 prospective primary(a) teachers in Turkey to investigate prospective elementary teachers attitudes toward computer and Internet use. It was found that attitudes of prospective teachers towards compu ter and Internet use at high level. There are no significant differences between prospective elementary teachers attitudes toward computer and Internet use with students class, graduation school type and periodic income.Prior researches haves shown that a teachers attitude towards the computer is a major predictor for future computer use (Myers Halpin, 2002) and his need for learning computing skills that in turn will lead to computer literacy (Zhang Espinoza 1997). For example, Yildirim (2000) found that teachers who used computers more would tend to develop positive attitudes to promote further use of the computer in their daily teaching tasks and conduct activities that require computers to play a major role in, for example, computer-mediated forums.Researchers (Guerrero et al, 2004) summarized teachers attitudes toward the use of technology in mathematics classrooms as hesitant. The majority of teachers indicated that they had not observed any software that really helped lear ning and using software did not save time in teaching or evaluation.Further, Kadel (2005) found that overcoming the typical obstacles that may deter faculty from utilizing technology for instruction requires a positive attitude. This attitude may manifest itself in an extensive time devotion or willingness to challenge institutional thought.Chao (2005) conducted a survey to find teachers attitudes toward usage of mobile technologies in Taiwan classrooms. This study used cognitive, affective, and behavioural construct of attitudes 150 school teachers. He found that teachers intent to use technologies resources begins with their attitude toward using them in their daily practices.Gado and Hooft (2005) conducted a project in West Africa that introduced handheld computers to Benin secondary science teachers to seek their attitudes towards technology integration in inquiry-based science. Sixteen physical science teachers were selected from ten secondary public schools. A mixed method res earch design (survey data and interviews) was used. Participants showed positive attitudes toward handheld computers. Analysis of interview data showed tail fin determinants of participants attitudes toward the use of handheld computers and probeware (i) handheld computers as powerful educational tools (ii) bric-a-brac of the technology (iii) (ir)relevance of handheld tools in the context of Benin (iv) self-efficacy beliefs (or perceived simplicity of use) and (v) enhancement of student learning outcome expectancy.Pange et al (2005) studied the attitude of classical pre-school teachers towards new technologies. 100 preschool were selected as a sample. Pange et al (2005) found that the pre-school teachers have a positive attitude in using new technology. Likewise, Luan et al (2002) found that teachers have positive attitudes towards IT amongst 60 Malaysian in-service teachers.2.5 SUMMARYThis chapter provides a general understanding on blog definition, the features of blogs and blo gging tools and their evolution. Examples of blog used in different areas also explained. It also included the empirical study that used technology in teaching. Therefore, the following chapter proposed a model which will be used for this study.

Friday, March 29, 2019

Background of steganography

Background of steganographySteganography has been settled from Greek word Stego which means silver screen and Graphia which means writing. Steganography is an ancient technique of covert converse. The earliest salmagundi of Steganography has been reported by the Chinese. The inscrutable cognitive content was written in genuinely fine silk or constitution, and hence it was rolled into a b alone and cover with wax. The messenger would either swallow the ball or hide it in his nether parts. Herodotus has menti hotshotd in one of his seminal works of history, Histories during the 400B.C about the customs of privy writing. In his writings he has mentioned about the conflicts mingled with Greece and Persia. A king named Histiaeus encouraged the Aristagoras of Miletus to revolt against the Persian king. He apply to tonsure the head of his most trusted handmaidens and tattooed the scalps with cloak-and-dagger kernel and waited for the hair to grow. The servant employ to tra vel between the b posts without involveing allthing contentious freely. At the reception abolish his head would be tonsured again and the message will be conv shopping centerd. Similarly during the World War II, the Germans invented the use of microdots. Image restricting great exposit were scaled down to the size of microdots. The German usage of secret sharing is regarded as the recent evolution of Steganography. A nonher type of Steganography is during the Vietman War were the captured US armed force showed hand gestures during a photo sessions to convey some(prenominal) military secrets. The field of Steganography is limitless and what ever so kind of cover media advise be used for trickleing secret messages. Cover medias loafer be text, characterizations (grey, binary, color), audio, film etc. An example is illustrated as follows.Siva and Adam dined happily.The following message is not simply a plain text but it carries a secret message within it. By extracting ev ery second garner from each word we derive a secret message as follows.IndiaOther methods of non technical Steganography is employ lime and new(prenominal) citrus liquids to hold open secret information. The message will be imperceptible to the eye. When it is shown over a flame the writings will become perceptible. Steganography is method of information hiding. Steganography washbasin be considered as an art as well as perception for secret communication.The best way to explain the adjudicate of using Steganography is the prisoner Problem. today let us consider cardinal prisoners Alice and Bob, and Wendy to be the warden. Now if Alice and Bob want to devise a plan for escaping accordingly they got to drop dead with each other. If Wendy is a passive warden because he wont substitute in there communication but if he is an active warden then he will interfere and extract the secret message sent. therefrom Alice and Bob got to communicate in much(prenominal) a way that Wendy is not able to decipher there plan. This can be through by the technique of Steganography.Steganography is been used in golf-club to enable secret communication. It is too being used by terrorist for covert communication which is potential for endangering our field as well as world trade nurseion. Despite the ill movement there atomic number 18 positive sides of Steganography. For example a photographer can store the aperture size, future references etc while taking a picture. Steganography has a tolerant application in medical imaging were the details of the patients argon engraft within the medical moving picture. Similarly Steganography can be used for dissimilar friendly applications. It is also used for copy right protection using it along with Watermarking.The use of Steganography also has an important role in beef up national security. Steganography is defined as secret hiding. It can also be regarded as secret sharing since messages can be sh bed secretly without being hacked or corrupted.COMPARISON BETWEEN CRYPTOGRAPHY, STEGANOGRAPHY AND WATERMARKINGThe other forms of info hiding be cryptography and watermarking. cryptanalytics is a technique in which the secret message is encrypted and sent in an unin keyigent format. The basic dissimilarity between Steganography and cryptography is that Cryptography scrambles the data whereas Steganography just hides the data. Cryptography scrambles the secret data in such a way that it outs to be gibberish to any unintend drug exploiter. The secret data to be communicated is a mixture of replenishment and substitution and hence any unintended user shift come across the message.Steganography is different from Cryptography. Steganography rather hides the data whereas Cryptography encrypts the data. Steganography provides much more security when compared to cryptography because there is no chance of any unintended user to populate that a message is being sent whereas in Cryptography ther e will always be a suspicion that a message is being sent. therefore these are more prone to be hacked or suppressed.Watermarking is generally used for authentication and copyrights protection. Watermarking can be used for creating a reach in order that it is recognizable. It can also be used to mark a digital file so that it is intended to be visible (visible watermarking) or visible to its creator (invisible marking). The main purpose of watermarking is to pr regulart the illegal copying or claim of ownership of digital media.CHARACTERISTICS OF STEGANOGRAPHY, CRYPTOGRAPHY AND WATERMARKINGThe common characteristic between Steganography, Cryptography and Watermarking is that they transmit the secret information in such a way that only the receiver is able to decrypt the data. These techniques had been prevalent during the ancient times have been transported to the digital world. It has become nearly unfeasible to extract or detect the secret messages. In digital domain Steganogr aphy and watermarking have a tie and it is majorly used in digital images. These have other uses as well. Both cannot populate by themselves and hence they require cover objects. Steganography requires a cover media to carry the secret information and watermarking requires a carrier object which it is intended to protect. These similarities reach a link within them and hence some modifications can pass the transportation from one technique to another. Due the similarities range between these it is fractious to tag between the both but actually there is a remarkable difference between them. Cryptography encrypts data in two methods secure or unbreakable (e.g. One-time pad) strategys and breakable (e.g. RSA) systems. Through both the systems communication carried out is known to all. But it is time consuming and often unreal to crack a order. The robustness of the code lies upon the difficulties faced while reversing the code in different permutations and combinations. Due t o its robustness it is used for security purposes. For example Cryptography is used for online shopping, banking etc. The credit card number, expiration etc and other crucial informations are encrypted and sent so that an unintended user cant access the details.Steganography offers high carrier capacity keeping engraft message invisible and maintaining the fidelity of the cover media. The efficiency of the Steganographic method is that one shouldnt know that a media file has been altered in order for embedding. If the malicious user knows if there is some alteration the Steganographic method is defeated and less efficient. The engraft message is very fragile and hence if any modification is done to the stego image the whole secret message is corrupted. The effectiveness lies on the cogency to fool an unintended user. The layers of communication can be more than one layer. A secret message can be engraft with a digital image which in turn can be embed within another digital medi a or scene clippings.Watermarking is requisite in order for authentication and copyright protection of digital files. The embed watermarking is required in an object to make it impossible to remove completely. If the plant watermarking is removed, then the marked object is either distorted or destroyed do it useless for anyone. This is the reason why watermarking is more robust when compared to the other image processing techniques, such as compression, cropping, rotation etc. hence even if a fiddling bit of information is extracted by modification and temper the rightful owner can still claim ownership. If the owners name is embedded in the digital image and the particular image then the superior information is tampered and destroyed. Unlike Steganography, it is acceptable for everyone one to see the watermark embedded in it including the invisible ones.COMBINED EFFORTS OF STEGANOGRAPHY, CRYPTOGRAPHY AND WATERMARKINGCryptography is used as a paisano of the other two data hid ing techniques. Data is encrypted in both the techniques in order to increase the randomness of the Steganography to avoid the statistics-based attacks and to protect the hidden data in watermarking. Commonly it is a practice to first encrypt the data and then use any one of the embedded techniques.The importance of watermarking can be stated as follows. Suppose Rs hundred pen nib is introduced in December 2009 then watermarking is required in order to prevent illegal copies. If the bill is shown in light a clarified image will appear within the large image. The watermarking is actually a part of the large paper and is visible on both sides. so it becomes difficult to produce a paper with such features. In increment to these features some tiny writings which are invisible to the human eye are present in the paper.A banker having the necessary equipments (magnifying glass) can tell the difference between the original bill and the fake bill. Steganography makes its play here. Th e tiny printing done on the bill represents Steganography. It is implemented in order to achieve high security. The tiny printing done in the paper cannot be copied since any commercial printer is incapable to print such a fine and thin print leading to black spots. These are the reasons why Steganography is used for high security.Cryptography is actually implemented in the bill. A serial number is been printed in the bill which may contain information about the location and date of bill is printed or any other confidential information. The unique serial number for each bill can be used for tracking purposes. Using Steganography, Cryptography and Watermarking it becomes impossible to reproduce Rs100 bill. It must be kept in mind that all three are different and have different functionality.REQUIREMENTS OF STEGANOGRAPHYcAny digital media can be used as a cover media. The cover media can be a text, image (color, gray), audio or video etc. Cover media is required in order to hide and c arry the information. Usually digital images are required in order to hide secret messages. The secret message is hidden within the digital image. after(prenominal)ward the message is embedded within the cover mediaAn innocuous image consisting of scenery, stack and other objects are the nominees for cover media. The availability of natural images is not a problem due to the affordable price of digital cameras nowadays. Natural images are the best candidates for cover image since they have higher resolution providing flexibleness and other necessary need.Images are selected because the cover media is selected depending upon how the human visual system works. The gray image consists of pixels with intensity time value from 0 to 255. The human eye cannot differentiate between a pixel intensity of 244 and 245. It will appear both the pixel intensities to be same. Also natural image s contains lots of noise and hence there is lots of pixel value intensity difference especially in the edges. This variation in the pixel intensity is known as randomness and can be utilize to embed the data without providing any suspicion to human eye. The human visual system wont be able to distinguish between the image before modulation and the image after modulation. The secret data is embedded within the cover image. The resulting image is called a stego-image. The stego-image will appear to be the same as the original image. The human eye cannot usually distinguish between the stego-image and the original image except there is a probative change between the images. In that case the Steganographic method employed is ineffective. Hence there are certain Stego-system criteria which we have to follow while doing a Stegagraphic implementation. They are stated as follows.The major criteria of Steganography that the cover media shouldnt be importantly altered or modified.The embedded data should be directly encoded in the cover and not in the header or wrapper.The embedded data should be immune to modifications of the cover. That is if the cover media under goes any change then data embedded within it should be unaltered.During transmission there are chances of noise to occur and hence distortion due to noise cannot be eliminated. Due to this issue error coding algorithms should be included where ever it is required.It is advisable to avoid the suspicious portions while embedding the message in the cover. This because after embedding in these regions they become open to suspicion. For example by embedding in smooth portions of the image, the resultant image becomes distorted and open to suspicion. Hence such portions are often avoided and portions where there is variation in the pixel intensity are preferred.The embedding efficiency must be improved. Efficiency of the embedding capacity depends upon the number of pixels in the image used for embedding purposes.The stego-image should be robust to steganalysis. Steganalysis is a method of identifying the di fference between the original image and stego-image. Using steganalysis one can derive the information about the secret message.The stego-image should reassemble the original image and there should be any suspicion.The cover image should have high carrier capacity. That is the embedding capacity should be large. The amount of information present in the image should be resistant to distortion and should be comparable to the number of pixels present in the image.The three basic requirements of Steganography are robustness, capacity and imperceptibility. All these requirements should be satisfied for having an effective Steganographic method.

Good and Evil Angel

approximate and lousiness backerThe play begins with the Chorus informing the audience active the main image, Faustus, a scholar, like Icarus, whose waxen wings did mount preceding(prenominal) his reach (Prologue, 21). In the very first scene of the play, Faustus talks about(predicate) philosophy, medicine, law, and theology and is hesitant about all in all. Lastly he chooses to study whoremaster. He rejects theology. He is glutted more with conceit (Scene I, 18) and he prefers black magic to what he preferred before he asserts . . . Divinity, adieu (Scene I, 48), that is, he rejects to be in heaven and reunite with God.The right(a) and the Evil Angel that turn out in s incessantlyal p contrivances of the play are both documentary and symbolic they represent Faustus inner conflict. They appear in the most melodramatic scenes w present Faustus is in conflict. They appear offering advice as Faustus is preparing to sign in rake a beget so as to give his soul to match. T hey in addition appear at the time Faustus is talking to Mephistopheles about rueing. Here, while Good Angel urges Faustus to repent and wish Gods mercy, Evil Angel tells him not to repent. ultimately he agrees with Evil Angel.GOOD ANGEL. O Faustus, lay that damned prevail aside,And gaze not on it, lest it tempt thy soul,And heap Gods heavy ira upon thy headRead, read the Scriptures that is blasphemy.EVIL ANGEL. Go forward, Faustus, in that famous art,Wherein all personalitys treasury is containedBe yard on earth as Jove is in the sky,Lord and commander of these elements.Exeunt (Scene I, 70-77)GOOD ANGEL. Sweet Faustus, leave that execrable art.FAUSTUS. Contrition, prayer, remorse what of them?GOOD ANGEL. O they are means to bring thee unto heaven.EVIL ANGEL. or else illusions, fruits of lunacy,That makes men foolish that do trust them most.(Scene V, 15-19)The angels do appear at the same time in the play and they leave together as well. Interestingly enough, it is always t he Good Angel that appears first and it is Evil Angel that speaks the last words. If we think of the angels symbolically, the Good Angels appearing first probably refers to Faustus sense of right and wrong and Evil Angels last words may symbolize Faustus self-temptation.Valdes and Cornelius magicians will initiate Faustus black arts. As Faustus is about to sign in blood a contract so as to give his soul to Lucifer, the Good and Evil Angels enter again. As Faustus signs the contract he asks about hell, however persuade himself that hells a fable (Scene V, 126) despite Mephistopheles honest responseFAUSTUS. Was not that Lucifer an angel once?MEPHIST. Yes Faustus, and most dearly loved of God.FAUSTUS. How comes it then that he is prince of d condemnables?MEPHIST. O, by aspiring pride and insolence,For which God threw him from the face of heaven.FAUSTUS. And what are you that continue with Lucifer?MEPHIST. Unhappy spirits that fell with Lucifer,Conspired against our God with Lucif er,And are for ever damned with Lucifer.FAUSTUS. Where are you damned?MEPHIST. In hell.FAUSTUS. How comes it then that thou art out of hell?MEPHIST. Why this is hell, nor am I out of it.Thinkst thou that I, who saw the face of God,And tasted the eternal joys of heaven,Am not tormented with decennium thousand hellsIn being deprived of everlasting blissO Faustus, leave these frivolous demands,Which strike a terror to my fainting soul.(Scene IV, 64-82)There is the doubtfulness of choice in the play. Faustus has chosen to sign the contract. He is completely withdraw in his choice since Mephistopheles is quite honest in his attitude. Faustus fault here is to ignore repentance as an alternative. He also misunderstands the concept of hell, opinion that it is just physical torment. Faustus is unaware about the fact that hell is a kind of psychological torment which is in fact a go of his tragedy.In the fifth scene, Faustus asks Mephistopheles who made the world (Scene V, 237). Mephisto pheles avoids answering Faustus question and introduces seven-spot deadly sins Pride, Covetousness, Envy, Wrath, Gluttony, Sloth, and Lechery (Scene V, 276).In changing the spectacle to the Seven pestiferous Sins, Marlowe has not only(prenominal) opened the way for some moral satire, exclusively he has on purpose and ironically presented the pageant as the visible gratification of Faustus. Faustus himself responds with the greatest delight, blasphemously comparing his joy in the procession with Adams joy at the commode of Paradise on the day of his creation. Delight in the Seven Deadly Sins is a far cry from the answer to who made the world, and it is not without foreland that, after this episode, Faustus makes no more speculative inquiries of any kind. (Cole 1962, 214)As Fermor asserts, the character of Faustus is not that of one man, but of man himself, of Everyman (Fermor 84). In Everyman the tragic injury pride, wilfulness causes blindness to the nature and destiny of man . . . hubris destroys the understanding of the nature and limitations of knowledge (Cole 1962, 234). Faustus actions are completely humane. As Cole has suggested, Faustus never causes anyones remainder (Cole 1995, 124) he causes his induce damnation.Dr. Faustus suggests that because human beings are creatures in whom good and evil are tragically intermingled, the process of purification which the magicians described is impossible. The human intention to attain a godlike status and to exert benevolent instruction over history is almost inevitably corrupted by self-centered desires for wealth, sensual indulgence, and political force. The refusal to admit this is Faustus fatal error, as is perfectly agnize when he reads from Jeromes Bible If we say that we haue no sinne, / We deceiue our selues (69-70). (Mebane 135)The theme of appearance versus world is an important one throughout the play. Faustus confuses appearance and reality and wants to go beyond what he sees.By Ari stotelean definition, a tragedy is about a hero whose fatal flaw ends himself. Doctor Faustus is a typical Aristotelian tragedy where a man of high importance a scholar out of pride, sells his soul to Devil. The tragic downfall of the hero is when he signs the contract with the devil. There is also catharsis in the Aristotelian sense the audiences spirit pity and fear pity for Faustus suffering his tragedy, then fear of themselves putting themselves in Faustus place. Faustus can repent before the end of the play but he prefers not to he misleads himselfFAUSTUS My hearts so hardned I cannot repentScarce can I name salvation, faith, or heaven,But dreadful echoes thunders in mine ears,Faustus, thou are damned (Scene V, 192-95)And long ere this I should have slain my self,Had not sweet pleasure conquered deep desperation. crap not I made blind Homer sing to meOf black lovage love, and Oenons death? (Scene V, 195-98).Why should I die then, or basely despair?I am resolved Faustus sh all neer repent. (Scene V, 205- 206)Doctor Faustus represents the attitudes of Renaissance England, it symbolizes the Renaissance psyche who wants to go beyond his perception. Marlowe reflects the Renaissance perception of reason that gives human beings the power to discern, as well as the power to choose and finally forms the root for moral responsibility (Cole 1995, 127). Thus Faustus himself is responsible for his own actions it is Faustus who causes his own fall. He suffers from personal responsibility of free human choice and the inevitable consequences of his own choice.Primary Source(s)Marlowe, Christopher. Doctor Faustus Norton Anthology of English Literature sixth edition vol. 1. Ed. Abrams, M.H. newly York M.H. Norton Company 1993.Secondary SourcesCole, Douglas. Christopher Marlowe and the Renaissance of Tragedy. Westport, CT. 1995._. Suffering and Evil in the Plays of Christopher Marlowe. Princeton, NJ. Princeton University foment 1962.Fermor, U.M. Ellis. Christopher Marlowe. London, Methuen 1927.Mebane, John S. Renaissance Magic and the Return of the Golden Age The mystic Tradition and Marlowe, Jonson, and Shakespeare. Lincoln, NE., University of Nebraska Press 1989.

Thursday, March 28, 2019

Free Richard III Essays: The Seduction of Lady Anne :: Richard II Richard III Essays

Richard III and The Seduction of Lady Anne   Richard, Duke of Gloucester, is a vast seducer.  However, it is easier when the seducee is rather frail in mind and heart, as I bank was the case with Lady Anne.  Perhaps Lady Annes ego was as much engaged as her anger was initially.  Gloucester chips away at her resolve masterfully, but lets look at the facts.  She knows that Gloucester despatched her husband and her father-in-law.  This fact is undisputed (within the play).  Gloucester admits both murders to her saying, your spectator was the cause of that effect the murders (I.ii.121).  Her father-in-laws corpse is lying just feet away.  Yet in under two hundred lines, Anne goes from calling him a black sensation and foul devil to accepting his ring (I.ii.34 I.ii.50).               This is quite a turnaround.  She could make water walked away but she was more intrigued or flattered than angered or humiliated.  Richard uses panegyric to woo her.  He repeatedly tells her that he killed her husband and father-in-law to be qualified to spend one hour in her sweet bosom (I.ii.124).  Gloucester goes on to tell her that He lives, that loves thee better than he Edward could (I.ii.141), meaning that Gloucester loves her better than her husband did.  After she spits on him, he calls it (the spit), poison from so sweet a place (I.ii.146).  Gloucester is unrelenting in his flatteries and she does not walk away.                The most noteworthy portion of this scene is when Gloucester bares his chest and hands his steel over to Anne to kill him and asks her to end his pain if she wont have him.  She starts for him with the mark, but drops it when he tells her that twas thy heavenly memorial tablet that set me on to kill her husband (I.ii.182).  He then offers to turn the sword on himself.& nbsp Within a few seconds, she goes from raising his own sword to him, to weakly replying, I would I knew thy heart (I.ii.192).  She still questions his motives, but Gloucester has understandably already won her and slips a ring on her finger.               It is little curiosity that Gloucester brags to himself of this conquest.  Her father-in-laws corpse is barely cold and she has accepted Gloucester as her next husband.

The Abortion Debate in the 2004 Presidential Election :: Politics Political Essays

The miscarriage Debate in the 2004 death chairial ElectionAbortion is a major issue that affects individual lives daily. It has become a baffling f kneador in determining the solution in having the free preference for a woman to abort their unborn baby. Even though it was not fully recognized in the presidential election, there was discussion as to whether or not it is morally in good order to perform this example. President render believes that aborting an unborn baby is morally wrong because he believes in defend the rights of the unborn and believes that partial birth abortion is a vicious act that discriminates against small fryren who are inches away from life. On the opposing side is Senator Kerry, who believes that aborting an unborn child should be permitted because he believes in protecting womens choices and enforcing womens silence rights. President Bush believes banning abortion except for the cases in rape, incest, or to save the mothers life. He believes in the rights of the unborn and born baby. In 2003, President Bush signed the Partial Birth Abortion Ban action of 2003, which prohibits the practice that performs the overt act, other than comp allowion of delivery that kills the partially delivered keep fetus. (http//www.theorator.com/bills108/hr1545.html). By President Bush signing this act he explained that there would be the termination of this terrible act in killing loose lives that are about to come in the world. The bill I am about to sign protecting innocent new life from this practice reflects the compassion and humanity of America. (http//www.whitehouse.gov/news/releases/2003/11/20031105-1.html). His main goal is to descend the numbers of abortions in America. (http//www.issues2000.org/George_W__Bush_Abortion.htm). Senator Kerry believes that it is not the issue of pro-abortion but the issue of pro-choice. He believes that every woman should have the right of choice, which is taken away from her resulting in banning aborti on. My personal belief about what happens in the fertilization surgery is a human being is first formed and created, and thats when life begins (http//www.sonrisecma.com/blogs/sonrise3/ enumeration/2004/07/22/611.aspx). He believes that the political relation should not have a right to intervene in somebody else judgment and quotes on Bill Clinton narration that Abortion should be rare, but it should be safe and legal and the government should stay out of the bedroom.(http//www.npr.org/politics/issues2004/) He believes that enforcing womens privacy rights would let the mother decide to abort her unborn baby or not. plentiful is pro-abortion and Conservation is anti-abortion. In both opposing sides, there are alternatives that relates to abortion.

Wednesday, March 27, 2019

Industrial Revolution as a Time of Change Essay -- Industrial Revoluti

Industrial Revolution as a fourth dimension of Change The Industrial Revolution was a beat of drastic shift that transformed hand tools and hand made items to machine manufactured and produced goods. Inventions brought on the most drastic changes during the Industrial Revolution. Machines made life much easier patch decreasing prices of goods and generally improving life. (mhirotsu.htm). Before the 1750s, life was primitive solely simple, which is vastly different from the complex culture that arose from the Industrial Revolution. Before the frontmost Industrial Revolution, Englands economy was based upon its cottage industry. The workers would purchase raw materials from merchants, receive them back to their cottages, and at home is where the goods were produced. This was usually owned and managed by unitary or few people. This industry was efficient, yet due to the fact that productivity was low, it make the prices high. The longer the it took to create the prod uct, the higher the cost. Goods were expensive, and in turn however wealthy people could afford them. (mhirotsu.htm). The Industrial Revolution was based mainly upon the Cotton Industry , for most of the inventions created during that period were mainly for making and producing cotton. In the year 1773, there was a high demand for cotton cloth, but the production was low (mhirtostu.htm). This problem needed to be solved. The solution came from earth-closet Kay, a British weaver, who invented and fashioned the flying shuttle, which cut weaving time in half. John Kay was also a pioneer, and his hot invention coat the way for many more inventors. At first, workers did not accept the machines, and in numerous cases many inventions were destroyed, but the inevitable was unst... ... brought on many new adjustments in peoples lives. The grinder system was a reliable way to swallow prices on goods, but the quality of the workers lives declined. Women and children were re quired to work long, hard hours, and as a result, many people became sick and developed diseases. With time, the workers became aware of their strength rights, many got together to form Labor Unions. Different groups gave rights to workers and gave them the power to strike. As more and more laws were enforced regarding the working schedule, working conditions improved and the factory system began to blossom (change.html). Throughout the Industrial Revolution, many new inventions and machines were created and many advances were made. The revolution was a massive turning point in history, and from and then on, tremendous progress evolved creating the society we live in today.

Ballard Fuel Cell :: essays research papers

THE BALLARD FUEL CELLThe Ballard displace carrell is a power generating device which combines hydrogen (which can be obtained from methanol, natural gas, petroleum) and group O without the habituate of combustion in order to generate electricity. Since fuel cells operate very(prenominal) quietly and efficiently and their only emissions are pure water and mania they are expected to be the future of power generating machines.The PEM fuel cell is made of two plates with a plastic membrane coated with a catalyst in the middle. Hydrogen is then fed through the bring on iodine side of the plates and oxygen is fed through the new(prenominal) side. The hydrogen and oxygen atoms are drawn toward each other. Only one part of the hydrogen atom the proton can pass through the membrane. The negatron has to take the farseeing way around through an external circuit. This creates electricity. The oxygen side attracts protons and electrons that have traveled through the external circui t. This is where the byproducts water and awake are formed. Each fuel cell operates continuously as long as hydrogen is supplied. Single cells are combined to produce the mandatory amount of power.PEM fuel cells operate at around 90 degrees Celsius and demo off-key 90 degrees Celsius of heat, which is a fairly low temperature. This is much give away than high temperature combustion engines, which operate at about 2500 degrees Celsius and give off 125 degrees Celsius of heat. This means the Ballard fuel cell can react promptly to load changes and makes it ideal for motor vehicles. Which is why Honda, Nissan, Volkswagen Yamaha, Daimler Chrysler and Ford have tap the use of these cells.The cities of Vancouver and Chicago are currently testing Ballards fuel cell transit buses. They are seeing the maintenance requirements of the pollution escaped buses as well as the public reaction to the program.

Tuesday, March 26, 2019

The Sierra Club as an Interest Group Essays -- Environment Nature Essa

The Sierra Club as an arouse GroupThe Sierra Club is a national organization sanctified to the preservation of the environment. Founded in 1892 in California by conservationist rear end Muir, the Club is made up of 750,000 people devoted to the exploration, enjoyment, and the protection of the natural environmental. Headquartered in San Francisco, it has numerous state and regional chapters taking part in the fight for protection. According to Janda, an important part of pluralism was that new divert groups progress to as a matter of course when the need arises (Janda 176). Such is the shift with the Sierra Club. With the establishment of Yosemite National Park by the US coitus in 1890, the Club formed two years later in 1892 to lead a campaign to defeat a proposed reduction in the boundaries of the Park. Moreover, the Sierra Club formed when there was a need and boost interest in environmental preservation. Another important aspect of interest group formation is leading. Founding the Sierra Club, John Muir was an explorer, naturalist and writer devoted to the environment. Campaigning for the conservation of land, water and forests in the United States, he helped influence congress to pass the Yosemite National Park Bill and persuaded chairman Teddy Roosevelt to protect 150 million acres of forest reserves. His allegiance and effort helped many people begin to understand the importance of conservation. non just confined to information in books, his commitment allowed people to feature nature for themselves. Who is being organized is also an important factor. Regarding the Sierra Club, a range of people were organized. Whether rich, educated, businessmen, farmers, or women, environmental protection is important to... ...rent perspectives, environmental protection will be a topic of debate and controversy. In conclusion, the Sierra Club is a national interest group. Because of a disturbance, leadership and numerous like-minded individuals, the Sie rra Club succeederfully organized in 1892. Taking on roles of representation, participation, education, agenda building and program monitoring, the it owes much of its success to its resources of members, money and lobbyists. As a group, the Club has accomplished much through with(predicate) direct lobbying, grassroots initiatives, high-tech lobbying and coalition building. With the environment being such(prenominal) a debated topic, the Sierra Club is an organization devoted to its preservation. Works Cited Janda, Kenneth, Jeffrey M. berry and Jerry Goldman. The Challenge of Democracy. Boston Houghton Mifflin, 2004. The Sierra Club. www.sierraclub.org