Wednesday, December 25, 2019

The Destruction of the Minke Whale in Mobe Dick by Herman...

Captain Ahab was a fictional character that participated in whale hunting in a book called Moby Dick. Moby Dick was the name of the great white whale that Captain Ahab was pursing to hunt. â€Å"The Minke Whale also known as the baleen whale is the smallest of the rorqual species, and the females are normally larger than the males,† Sea Shepherd1, but due to commercial whaling they are facing extinction. Minke Whale Hunting is a problem in Antarctic Ocean which is also known as the Southern Ocean, They are being killed by the Japanese to be used for sushi. â€Å"The Japanese and other countries have been hunting whales since the 1800’s†, studies that were recorded in 1986 have shown that over 30,000 Minke whales have been killed.4 People should pay†¦show more content†¦We are currently losing our Minke Whale because they are unable to reproduce due to hunting. The predicted effects are that they will be no longer existing.1 Brian Handwerk4 discusses the Southern Sanctuary which was established as a â€Å"compromise effort during this weeks meeting.† The Southern Sanctuary was developed in 1994 and presumed, â€Å"that 19 million square miles (50 million square kilometers) of waters surrounding Antarctica—as a critical space safe from commercial whaling. Most of the worlds whales feed in these waters.†4 People should care about whales because they are being hunted, which is illegal. The whales’ population is damage due to hunting. The people who eat sushi with whale meat in it. The people are a part of the problem because they are demanding an animal that is near extinction. The ecosystem is affected because whales are a part of it. Whales are a part of the ocean. In the ocean is revolving cycle, such as planktons being eating by fish, which are eaten by whales. In order for the ocean to function, a cycle has to happen, Jeremy Jackson5. A solution could be finding another meat to use to substitute whale meat, or having a numerous amount of customer that stop demanding sushi. By lower demand the Japanese will have no reason to kill the Minke whale because it is not a request. While some conservationists argue that the minke

Tuesday, December 17, 2019

Multiple Intelligences Seminar and Workshop - 14464 Words

Teaching and Learning through Multiple Intelligences Seminar/Workshop Content Outline: PART I – Explanation 1. What is the theory of multiple intelligences (M.I.)? 2. How does this theory differ from the traditional definition of intelligence? 3. What do multiple intelligences have to do with my classroom? 4. How has M.I. theory developed since it was introduced in 1983? 5. Who are the critics of this theory and what do they say? 6. What are some benefits of using the multiple intelligences approach in my school? 7. How can applying M.I. theory help students learn better? 8. How can I find out more about M.I. theory? PART II – Demonstration 1. Seeing MI in action 2. What do M.I. lesson plans†¦show more content†¦- These intelligences may define the human species. To help understand how you learn best, take this short Multiple Intelligences Self- Inventory. There are just a few questions to answer, which should take approximately five minutes to complete. ACTIVITY: Testing and Evaluation of Participants MI – use the Testing Form/ Questionnaire 1.2 How does this theory differ from the traditional definition of intelligence? Gardners multiple intelligences theory challenged traditional beliefs in the fields of education and cognitive science. According to a traditional definition, intelligence is a uniform cognitive capacity people are born with. This capacity can be easily measured by short-answer tests. According to Howard Gardner, intelligence is: - The ability to create an effective product or offer a service that is valued in a culture; - A set of skills that make it possible for a person to solve problems in life; - The potential for finding or creating solutions for problems, which involves gathering new knowledge. An educational system based on national standards and efficient, relatively cheap, universal multiple choice testing is central to the traditional concept of intelligence. In practice a students score on an I.Q.2 test or WISC3 ranks his or her strengths and weaknesses. It qualifies students for special services (such as programs for the gifted orShow MoreRelatedExecutive Summary: CATSA Essay2792 Words   |  12 Pages(CATSA) maintains 3 critical issues. These issues are processing inefficiency, lack of communication between the departments, and insufficient planning. Mark Duncan has been given the task to fix these critical issues. Mark plans to use business intelligence (BI) system to help with these critical issues. Ideally a BI system should help analyze data by department, record important information, and help forecast traffic for future periods. Although a BI system will definitely help them function moreRead MoreAn Effective Tool For Social Interaction And Individual Social Development1511 Words   |  7 Pagespositive results and continue to try to develop the skills with a higher level of awareness, in terms of my own behaviors when interacting with my children, family, and other people. I am making a conscious effort to develop a more elevated social intelligence. L.E.A.P.S. S.P.A.C.E. is not the only tool for social interaction. When talking specifically about Empathy, â€Å"Albrecht believes there are two opportunities to build empathy. With the first moment-to-moment experience of connecting with peopleRead MoreAssignment : Situational Awareness ( S )1664 Words   |  7 Pagesthey explain what they are trying to say in a way that is articulate, well thought, and accurate? The final is Empathy (E). Empathy is a person’s ability to connect with others on an emotional level and show genuine concern. (Albrecht, Social Intelligence, 2006) S.P.A.C.E. is an excellent tool for social interaction and individual social development. I feel that Albrecht has successfully identified the key elements that ultimately determine how a person is perceived by others in any social, professionalRead MoreI Am A Visual Learner1124 Words   |  5 Pagesexperience. These results can be utilized when choosing classes. â€Å"Sometimes, you may choose one class rather than another because the class format fits well with your learning style† (Simon, 2014, p. 19). Some classes are lecture, some seminar, and some workshop. When you understand your learning type and you determine how you are being taught you can decide if you are properly matched. It does not necessarily pose a problem if you are mismatched as long as you can determine the best way to handleRead MoreArgos Donaldson Case International Management2203 Words   |  9 Pagesother European countries, this means that nothing is implied from the message, as everything wil l be clearly detailed. So the higher up the context ranking you go the more information becomes implicit and if Donaldson would have consider that the multiple-choice survey wouldn’t have been inappropriate and Donaldson could have all the required info. Communication is also an issue because it is clear that there is a lack of it between the Detroit head office and the European office, so the communicationRead MoreEssay on Ilm Developing Yourself and Others2711 Words   |  11 Pageslearning and development style of myself and a team member we both completed a Multiple Intelligence (MI) test developed by Howard Gardner. After completion of the test on myself I have discovered that I have a learning style of Logical – Mathematical, with a majority score of 37, closely followed by Interpersonal with a score of 32, (see Appendix 1). People who are strong in logical-mathematical intelligence are good at reasoning, recognising patterns and logically analyse problems. TheseRead MoreSas Institute Term Paper4392 Words   |  18 Pagesrivals, and their capability to implement these resources to grow the firm is significant as well. The use of cross-functional teams is something SAS is capable of using to capitalize on the use of their resources, as well as the ability to hold seminars for customers on how to better utilize their products. Furthermore, SAS has a specialized team of consultants that their customers use to enable them to be fully trained on the use of their products. SAS concentrates on a focus differentiationRead MoreDevelopment of a Math Laboratory at the Professional Development School2830 Words   |  12 Pagesto go into classrooms where elementary teachers were having difficulty with math instruction and help revise their instructional techniques so they were employing more up to date methods and manipulatives. As a mentor teacher, I presented math workshops to elementary teachers in the new methods of teaching math. Because of this background, since I have come to Elmhurst College, I have been instructing the math methods course to preservice teachers. My classes have been successful, as many studentsRead MoreObjectives And Objectives Of Strategic Management6960 Words   |  28 Pagesof leadership focused on discovering the constant relationship between leadership behaviours and the group performance, the contemporary theories emphasized the significance of situational factors (such as stress level, job structure, leader’s intelligence, followers’ traits, etc.) as well.† Some of the essential leadership theories are given in bullet points below (Bolden 2003). †¢ Trait Theory †¢ Hersey Blanchard Situational Leadership Theory †¢ Six Emotional Leadership Styles †¢ Transactional LeadershipRead MoreSchool Based Management of Fortune High School, Marikina City, Philippines2094 Words   |  9 Pagesstudents in order to make them fully equipped with the knowledge and skills in Reading. We further want our students, especially already being in the Secondary Level, be aligned with the Reading Level of Learners appropriately match with their age and intelligence levels. We have scrutinized our students to identify those who have Reading problems in different areas and levels. Thus, we have been consistent in updating a plausible schedule opposite our academic classes to give ample time to enhance the

Monday, December 9, 2019

Australian Competition And The Consumer Act -Myassignmenthelp.Com

Question: Discuss About The Australian Competition And The Consumer Act? Answer: Introducation It is to be stated that the conduct or action of a party to a contract will be held to be unconscionable if such conduct defies good conduct and is considered unreasonable. The provision of unconscionable conduct however, is ambiguous as there are no clear definitions of it provided by the law (Knapp, Crystal and Prince 2016). It is to be mentioned that the clause of unconscionable conduct is governed by the common law of Australia. Schedule 2 of the Australian Competition and Consumer Act 2010 also governs the provision of unconscionable conduct. Section-21 of the Australian Consumer Law states that a contract should be signed by a consumer, only if he completely understands the terms of such contract. However, such principle holds true for written contracts. A person dealing with the acquisition and supply of goods will be regarded to have conducted in an unconscionable manner if he fails to act in good faith or impose any unreasonable terms on the weaker party. Unconscionable conduct will also be said to have been exhibited by the stronger party if he uses undue influence on the weaker party to enter into such contract. Subsection 21(3) mentions that the court will consider the circumstances which are reasonably foreseeable to a reasonable man in determining whether the subsection of the aforementioned act has been breached. It can be stated according to subsection 4c that the court will assess the terms of the contract and the execution of duties of the parties in determining whether any unconscionable conduct was exhibited by either of the parties. In addition it can be said that the court might also assess the circumstances of the parties at the time when the contract was formed. Intervention of equity is essential and inevitable in certain circumstances according to common law to protect the interests of the weaker party to a contract. However equity intervenes in circumstance where one of the parties takes advantage of disability of the weaker party. If it is established that one of the parties intended to form the contract on harsh terms which were likely to create oppressive results for the weaker party, such party has the right to rescind the contract. The case, Louth v Diprose High Court of Australia (1992) 175 CLR 621; [1992] HCA 61 deals with the clause of unconscionable conduct. In this case the defendant had emotionally blackmailed the plaintiff to buy a house for her. The defendant had taken advantage of the plaintiffs feelings for her. However, after their relationship failed and the two fell out the plaintiff started legal proceedings against the defendant and claimed the house back. The court held that the plaintiff had every right to claim the house back. The action of the defendant was held to be unconscionable as she had emotionally blackmailed him to buy the house and such conduct created an atmosphere of crisis and was not necessary to be exhibited in reality. Another important case dealing with the same provision is Blomley v Ryan (1956) 99 CLR 362. In this case the defendant had agreed to buy from the plaintiff a farm. The plaintiff regularly used to be intoxicated due to alcohol intake and was 78 years of age. The court held that plaintiff did not have the capacity to make a rationale judgment about the decision to sell the plot of land as he was under the influence of alcohol. The consideration amount was also well below the market price. Commercial Bank of Australia v Amadio (1983) 151 CLR 447; [1983] HCA 14 in this remarkable case addressed an important issue in relation to unconscionable conduct exhibited by a party. The defendant had induced the plaintiffs to act as guarantors of a loan taken by the defendant. The parents of the defendant were Italians and therefore had very little understanding of the English language. It was held by the court that the defendants had the right to rescind the contract as the defendants conduct was considered to defy good conduct and therefore intervention of equity was necessary. Kakavas v Crown Melbourne Ltd [2013] HCA 25 is a relatively recent case dealing with the same provision. The High court of Australia interpreted section 51 AA OF THE Trade Practices Act 1947 and applied the same in the aforementioned case. However, the aforementioned section was repealed and replace by the section 20 of the Australian competition and consumer act 2010. In this case the plaintiff had an interest in gambling. The court held that the habit of gambling did not constitute a special disability or disadvantage and therefore the question of unconscionable conduct did not arise. Application In this chosen case study Rofi is a refugee from Burma who has arrived in Australia. He does not have proper understanding of the English language. Rofi had entered into a contract with the agent of Bolton Connect Pty Ltd, John. It is to be mentioned that John had been aware of the fact that Rofi does not good command or understanding of the English language. He had induced him to enter into the contract. Therefore in this circumstance the court will analyze and assess the circumstance of Rofi at the time of entering into the contract. The court will assess the way the terms of the contract were carried out. Although it was mentioned to him, that if he decides to rescind the contract he would be liable to pay a penalty of 1200 dollars, it cannot be expected that he had completely understood the aforementioned clause as he did not have proper understanding of the English language and lacked technical knowledge. Further it is to be stated that the agent John had access to translator de vices which he did not use while explaining the terms of the contract Rofi as he was in a hurry to meet his targets. Therefore, after discussing and analyzing the facts of the case, it can be stated that John had exhibited unconscionable conduct when he attempted to induce Rofi into entering the contract. The court can apply the provision as stated in section 21(4) of the Australian Consumer Law in order to establish unconscionable conduct. The aforementioned provision states that court must consider the circumstances of the parties at the time of contract formation. It can further be established by the findings and the decisions of the courts in the cases discussed above that Rofi has the right to rescid the contract as he did not understand the hidden penalty charge of the contract. Rofi in this situation was exposed to a detrimental position by John who had tried to take advantage of his disability. Conclusion Thus, in conclusion it can be said that a contract had formed between Bolton Connect Pty Ltd. and Rofi. However such contract was entered in to by Rofi due the unconscionable conduct of John and therefore Rofi has the right to rescind the contract without paying any penalty charge. References Australian Competition and Consumer Act 2010 Blomley v Ryan (1956) 99 CLR 362 Commercial Bank of Australia v Amadio (1983) 151 CLR 447; [1983] HCA 14 Kakavas v Crown Melbourne Ltd [2013] HCA 25 Knapp, C. L., Crystal, N. M., Prince, H. G. (2016). Problems in Contract Law: cases and materials. Wolters Kluwer Law Business. Louth v Diprose High Court of Australia (1992) 175 CLR 621; [1992] HCA 6

Sunday, December 1, 2019

Origins of Change Management

Change is the process of making someone or something to look different from its original view. Hence, change management is the application of techniques that deal with change, whether in an organizational setting or individually. Change is a complex aspect that is hard to adapt, despite it being constant. It is also a broad topic that needs to be split for easy understanding. There are different types of change. There are three types of change: developmental, transitional and transformational, Ackerman (1997).Advertising We will write a custom essay sample on Origins of Change Management specifically for you for only $16.05 $11/page Learn More Developmental change is usually planned for and it involves the techniques applied so as to develop a process or skill at a certain angle in an organization. Transitional change seeks at the implementation of a new idea, totally different from the existing one being used. It is also planned. Transformational change is an assumption based type created by the members of an organization. These transformations make an organization differ in terms of its structure, strategies and its processes. There are various theories that have been put forward to explain the origin of change. There was the general Contingency Theory. It uses the principle of â€Å"it depends†. For example, when the best leadership or management has to be put forth, it would depend on the situation or institution being considered, For instance, in a hospital or university, a more participative style has to be considered since there is a lot of consultation required. According to this theory, some factors had to be considered before implementing the change that had been planned. Under management, the â€Å"depending factors†, which contribute to the change, are dependent on an organization. Other theories explaining the origin of change management are either contemporary or historical. Contemporary theories of mana gement Systems theory has a direct impact on the adaptation of change in an organization. A system is a unified entity comprised of several single units linked together to form the complete entity. The withdrawal, as well as introduction of one aspect of the company causes a noticeable change. A system is formed by four main aspects. These are inputs, processes, outputs and outcomes, all of which bring common feedback to the system. Inputs are the resources that are first considered in the organization. After completion of the processes, outputs such as services and goods come about as a result. Outcomes would be maybe the improvement of the quality of life by the targeted group using the latter. Feedback would be the reactions of the human resource group who undertook the overall running of the processes. It could also be from members of the public who used the service or product. The external environment could also provide feedback; for instance, policies from the government, effe cts of technology and the economic conditions.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This theory may seem very easy to implement, but many organizations over time have been unable to incorporate it into their systems. However, with the competition facing many companies, some managers have tried to incorporate it. This new way of looking at an organization has caused tremendous changes not only in the management but also in the overall outlook of a company. This theory has an effect of enabling managers to effectively supervise all aspects of the organization. This involves the general administration and supervision of workers, unlike traditionally when managers only specialized on a specific area of the management. The chaos theory also tries to explain the origin of the change management concept. The random events experienced in general life were also experienced in the organizat ional setting. Some managers over the years believed that these organizational events could somehow be controlled. The chaotic theory states that events are often not controlled. Theorists of this aspect normally compare this theory to the biological nature. They claim that systems naturally enter into a complex state whereby they change their form and become volatile. They require more energy to sustain their complexity, as they continue changing their structure, until it finally splits. On splitting, they combine with other complex systems or even the pieces exist entirely on their own. Since these processes are uncontrolled, the same concept is applied in management. Many organizations and the world as a whole undergo such processes. Change is part of it and to companies is the trend. A practical example would be an organization that recruits employees from a different company. These employees come with some aspects of their previous company which would either positively or negat ively affect the current company. These factors are sometimes adapted by the new company employees hence bringing change that cannot be easily controlled into it. With such changes reaching the top management, the entire management would have been altered and made complex. If for some reason the managing director of that company decides to quit and go start another company, he would incorporate the many skills he or she would have acquired from various companies he or she would have worked for.Advertising We will write a custom essay sample on Origins of Change Management specifically for you for only $16.05 $11/page Learn More The result would be a more sophisticated management. It is therefore clear, how this theory has had an effect on various organizations, especially with the uncontrollable changes that come with it. Historical theories of Management Scientific Management Theory (1890-1940), was developed by Frederick Taylor. Over the years, it was observed that large companies went through a routine work of manufacturing products for their customers, hence having the same management. The theory espoused this careful measurement and specifications of activities by the companies. He brought about the standardization of tasks to companies that were involved in routinized activities and tasks. Bureaucratic Management Theory (1930-1950), established by Max Weber, brought in a different perspective from the scientific theory. He based his theory on the division of organizations into smaller units. A proper authority and control was then to be established amongst these units to form a complete system. He stated that a detailed standard procedure of activities was to be administered by the specific units and comprehensively develop the organization. Human Relations Movement (1930-today) came as a result of the reactions from the two theories. Governments and unions identified the dehumanizing effects of the theories; for instance th e stress experienced by an individual with his/her unique qualifications and hence capabilities to the companies. Human resource departments were then introduced to organizations. Its responsibility was to relate the qualification of their employees to the needs of the organization and then balance them out. The department was also supposed to measure the input required in a certain sector of the organization and provide sufficient workforce, to reduce on the strain by few individuals.Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Overview of the research on change management and innovation In this fast world, organizations are facing changes in development sin all aspects; including economically, technologically and globally. These changes are causes of challenges facing organizations, risks and business uncertainties, and managers have a great responsibility in ensuring that they adapt to these changes and cope positively. Strategies are being put forward by companies to cope up with the competition and other challenges being faced as a result of the eruption of many companies. An organization is to improve on its development by having planned change for an increased effectiveness. (Cummings Worley, 2005, pg. 1). Strategic planning is a factor employed in curbing the competitive changes. It is considered wise for an organization to plan for how to tackle change rather than waiting for the change to take place and then react towards it. Innovation has been considered to be the best solution for this. Organi zations put into practice the creative ideas by its members in coming up with new and acceptable products and services for their customers. To increase their efficiency, the latest technologies have to be adapted. This may involve the use of computer-in-manufacturing as well as the incorporation of the ERP systems. This adoption of technology affects the employee body that has to be acquiring skills and techniques of incorporating the technologies. For a company to succeed, it has to have a competitive advantage over other companies. (David, 2005, pg. 8) It is therefore important for the various organizations to put into focus the importance of innovation as a way of managing change in their management for them to maintain continuity and a profitable growth. Innovation leads to a better competitive edge, which leads to more profits for the stakeholders. References Ackerman, L. (1997). Development, transition or transformation: the question of change in organizations. London: Oxford Publishers. Cummings, Thomas G. Worley, G. (2005). Organization, Development and Change. (8th Ed). Mason, Ohio: Thomson South-Western. David, Fred R. (2005). Strategic Management: Concepts and Cases. (10thEd). Upper Saddle River, New Jersey: Pearson Prentice-Hall. This essay on Origins of Change Management was written and submitted by user Bryleigh Wolf to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Tuesday, November 26, 2019

Good To Graet Example

Good To Graet Example Good To Graet – Book Report/Review Example GOOD TO GREAT GOOD TO GRAET In the book â€Å"Good to Great†, Collins reflects on factors that make it possible for some companies to experience a transition from being just average companies into becoming great global companies. He also visits the possibilities that may hinder other companies from ever experiencing this kind of transition. The opinion of the writer is rightly placed in stating in emphatic terms that greatness is not an automatic force that will accompany anyone who claims to be in business. Rather, businesses must be seen as putting in efforts that proofs that they are ready to transit into greatness.Collins is lesson oriented and critical at the same time as he both outlines characteristics of companies that transited from good to great and condemned others that remained stagnant in growth. A critical aspect of the book is when the writer gives seven characteristics of transiting companies. Collins notes that leaders must be humble, whiles driving what is be st for their companies. He also admonishes the need to invest in people, confront brutal facts, and identify a company’s overlapping circles. Furthermore, the writer preaches that companies that want to succeed without a culture of discipline will fail; just as those who refuse to incorporate technology. Finally, there is a call to value small initiatives.Generally, the lesson that Collins spells out in his book are very thought provoking, precise and practical. It is not surprising that he could use real company examples.Cited WorkCollins, Jim. Good to Great: Why Some Companies Make the Leap...And Others Dont. HarperCollins Publishers: New York. Print. 2001.

Saturday, November 23, 2019

Spinner Shark Facts (Carcharhinus brevipinna)

Spinner Shark Facts (Carcharhinus brevipinna) The spinner shark (Carcharhinus brevipinna) is a type of requiem shark. It is a live-bearing, migratory shark found in warm ocean waters. Spinner sharks get their name from their interesting feeding strategy, which involves spinning through a school of fish, snapping them up, and often leaping into the air. Fast Facts: Spinner Shark Scientific Name: Carcharhinus brevipinnaDistinguishing Features: Slender shark with long snout, black-tipped fins, and habit of spinning through water when feeding.Average Size: 2 m (6.6 ft) length; 56 kg (123 lb) weightDiet: CarnivorousLife Span: 15 to 20 yearsHabitat: Coastal waters of the Atlantic, Pacific, and Indian OceansConservation Status: Near ThreatenedKingdom: AnimaliaPhylum: ChordataClass: ChondrichthyesOrder: CarcharhiniformesFamily: CarcharhinidaeFun Fact: Spinner sharks dont eat humans, but will bite if they are excited by other food. Description The spinner shark has a long and pointed snout, slender body, and relatively small first dorsal fin. Adults have black-tipped fins that look as though they were dipped in ink. The upper body is gray or bronze, while the lower body is white. On average, adults are 2 m (6.6 ft) long and weigh 56 kg (123 lb). The largest recorded specimen was 3 m (9.8 ft) long and weighed 90 kg (200 lb). Spinner shark. Spinner sharks and blacktip sharks are commonly confused with each other. The spinner has a slightly more triangular dorsal fin that is further back on the body. An adult spinner shark also has a distinctive black tip on its anal fin. However, juveniles lack this marking and the two species share similar behaviors, so its difficult to tell them apart. Distribution Due to difficulty distinguishing between blacktip and spinner sharks, the spinners distribution is uncertain. It can be found in the Atlantic, Indian, and Pacific Oceans, with the exception of the eastern Pacific. The species prefers warm coastal water that is less than 30 m (98 ft) deep, but some subpopulations migrate into deeper water. Spinner shark distribution. Chris_huh Diet and Predators Bony fishes are the staple of the spinner sharks diet. The sharks also eat octopus, squid, cuttlefish, and stingrays. The sharks teeth are made for grabbing prey rather than cutting it. A group of spinner sharks chases a school of fish then charges it from below. A spinning shark snaps up fish whole, often carrying enough momentum to leap into the air. Blacktip sharks also employ this hunting technique, although it is less common. Humans are the spinner sharks primary predator, but spinner sharks are also eaten by larger sharks. Reproduction and Life Cycle Spinner sharks and other requiem sharks are viviparous. Mating occurs from spring to summer. The female has two uteri, which are divided into compartments for each embryo. Initially, each embryo lives off its yolk sac. The yolk sac forms a placental connection with the female, which then provides nutrients until the pups are born. Gestation lasts from 11 to 15 months. Mature females give birth to 3 to 20 pups every other year. Spinner sharks start reproducing between the ages of 12 and 14 and can live until they are 15 to 20 years old. Spinner Sharks and Humans Spinner sharks dont eat large mammals, so bites from this species are uncommon and not fatal. The fish will bite if provoked or excited during a feeding frenzy. As of 2008, a total of 16 unprovoked bites and one provoked attack were attributed to spinner sharks. The shark is valued in sport fishing for the challenge it presents as it leaps from the water. Commercial fishermen sell the fresh or salted meat for food, the fins for shark fin soup, the skin for leather, and the liver for its vitamin-rich oil. Conservation Status The IUCN classifies the spinner shark as near threatened worldwide and vulnerable along the southeastern United States. The number of sharks and the population trend is unknown, mainly because spinner sharks are so often confused with other requiem sharks. Because spinner sharks live along highly populated coasts, they are subject to pollution, habitat encroachment, and habit degradation. However, overfishing poses the most significant threat. The US National Marine Fisheries Service 1999 Fishery Management Plan for Atlantic Tunas, Swordfish, and Sharks sets bag limits for recreational fishing and quotas for commercial fishing. While sharks of the species grow quickly, the age at which they breed approximates their maximum lifespan. Sources Burgess, G.H. 2009. Carcharhinus brevipinna. The IUCN Red List of Threatened Species 2009: e.T39368A10182758. doi:10.2305/IUCN.UK.2009-2.RLTS.T39368A10182758.enCapape, C.; Hemida, F.; Seck, A.A.; Diatta, Y.; Guelorget, O. Zaouali, J. (2003). Distribution and reproductive biology of the spinner shark, Carcharhinus brevipinna (Muller and Henle, 1841) (Chondrichthyes: Carcharhinidae). Israel Journal of Zoology. 49 (4): 269–286. doi:10.1560/DHHM-A68M-VKQH-CY9FCompagno, L.J.V. (1984). Sharks of the World: An Annotated and Illustrated Catalogue of Shark Species Known to Date. Rome: Food and Agricultural Organization. pp. 466–468. ISBN 92-5-101384-5.Dosay-Akbulut, M. (2008). The phylogenetic relationship within the genus Carcharhinus. Comptes Rendus Biologies. 331 (7): 500–509. doi:10.1016/j.crvi.2008.04.001Fowler, S.L.; Cavanagh, R.D.; Camhi, M.; Burgess, G.H.; Cailliet, G.M.; Fordham, S.V.; Simpfendorfer, C.A. Musick, J.A. (2005). Sharks, Rays and Chimaeras: The Sta tus of the Chondrichthyan Fishes. International Union for Conservation of Nature and Natural Resources. pp. 106–109, 287–288. ISBN 2-8317-0700-5.

Thursday, November 21, 2019

Ethics Essay Example | Topics and Well Written Essays - 750 words - 8

Ethics - Essay Example At the same time, he did the very best he could and is confident that he well documented Jamie’s case and that, unfortunately, the final decision is left to the SAT board. As a professional, he feels that his time should be compensated as agreed upon and he should respectfully ask him to reconsider his decision not to pay. What legal and ethical actions can you take to collect your fees? It is implied from the case study that no written contract was signed stating that there was not a guarantee that the written documentation provided would convince the SAT committee to allow Jamie additional time on the exam. A verbal contract in this case would not be binding because both parties would likely disagree on what was agreed upon. Legally, it does not appear that anything can be done. Can you send the account to a collection agency? Why or why not? FERPA rules guarantee a student’s right to educational privacy. In this case, sending the issue to a collection agency would re quire a statement of the case, which would most certainly involve the child’s name, or a variation thereof. As such, this would be considered a breach of confidentiality and could actually land the psychologist in trouble. Are the parents or Jamie responsible for the fees? Explain. In this case, the parents would be responsible for the fees. ... Chapter 11: The Case of Ludwig Do you agree with Ludwig’s clinical decision? Do you agree with his rationale? I do not agree with Ludwig’s clinical decision primarily because it does not appear that he explored all viable options. For one, we do not see where he has discussed the issue with Ella at all. If they have a strong working relationship, as mentioned in the case study, then she would likely be open to hearing his suggestion. At that time, if she completely rejected the idea, then they could formulate other more viable treatment options. One suggestion is that he could advise Ella to go with her family and attend family therapy sessions, while he continued to see her in individual sessions. In this manner, they could continue their strong counseling relationship together. Oddly enough, I do agree with Ludwig’s rationale simply because it makes sense in the context of the decision he made. In his mind, he was watching out for Ella’s best interest, b ut in doing so, he lost sight of his responsibility to the patient. From your perspective, would it have made a difference if he had consulted with Ella? Would it have made a difference if he had consulted with or obtained supervision from a colleague? In my opinion, it would have made a difference if he had consulted with Ella. It has been established that they have a good counselor-patent relationship already established. As such, it would be likely that Ella would seriously consider his opinion. At the very least, they would have had an open dialogue where Ella could decide to reject or accept Ludwig’s opinion. Had Ludwig consulted with a colleague, he would surely have been counseled that he had an ethical responsibility to refer Ella for family therapy. This would

Tuesday, November 19, 2019

Comprehensive Classroom and Organization Plan Research Paper

Comprehensive Classroom and Organization Plan - Research Paper Example As such, one’s teaching philosophy also evolves as one attempts to improve in the profession. To a larger extent, one also strives to achieve personal growth. Peters (2009) quotes Stephen Brookfield (1990) on the two purposes of a teaching philosophy: personal purpose and pedagogical purpose. At a personal level, a teaching philosophy serves as a vision to remain grounded on the reasons behind what one has chosen to pursue as a career. The pedagogical purpose, on the other hand, defines the difference that one is making in a student’s life and his/her learning. A number of educational theorists have influenced my own teaching philosophy. Prominent among them are Howard Gardner, John Dewey, Paolo Freiri, and Kurt Hahn. I believe that teaching and learning have transformative powers, and for changes to happen within and without, content must always interact with the context. I make a strong point of allowing students to â€Å"learn by doing† and continuously provid ing opportunities to create a link between theory and daily situations. Furthermore, I believe learning happens in a social context and pedagogy must be inclusive with special attention to the diverse population inside the classroom. Towards implementing this philosophy, it is essential to provide careful attention to classroom management and organization. Classroom Management and Organization Plan The Rules. Dixie (2007) justifies the need for rules and routines stating that: â€Å"by providing our pupils with a system of well-defined rules, routines and sanctions you will be providing these youngsters with the security they need at this crucial stage of their lives, and in doing so, you will be providing a firm foundation for learning† (p. 19). I have adopted a less authoritative and more democratic system of establishing rules in the classroom. It stems from the desire to give students the right to feel safe, emotionally and physically, in the classroom. Furthermore, by in volving the students in the process of creating the rules, I hope to instill within them a sense of ownership of the rules established. First grade students are usually familiar with rules in school and the teacher’s role is to facilitate and ask probing questions to encourage important rules to be articulated. I find this a meaningful exercise because later in life, â€Å"they need to know how to participate in decision-making and obey with discretion so that they do not give the responsibility for their own behavior to someone else† (Lewis, 2008, p. 42). Some of the rules that students established are listed below. I facilitated to ensure that rules are stated in positive sentences [avoiding negative words, such as ‘no’, ‘not’, and ‘don’t]. (1) Always ask permission before taking someone else’s things. (2) Listen to the teacher and classmates, and wait for your chance to speak. (3) Treat others fairly and honestly. (4) Ke ep your work space clean and the whole classroom tidy. Procedures and Routines. Similar to rules, routines and procedures were created with participation from the students. It is essential to discuss the reasons behind these routines to the students. For instance, in transferring from one classroom to another during Art Class, they have to walk quietly and ensure that they have all the materials required for

Sunday, November 17, 2019

One of the major characteristics that Beowulf and Hamlet Essay Example for Free

One of the major characteristics that Beowulf and Hamlet Essay One of the major characteristics that Beowulf and Hamlet share is the fact that they both rid Denmark of a treacherous monster who poses a serious threat to the land. Beowulf uses his warrior-like skills to fight and conquer a physical monster who literally haunts the swamps outside the state and plagues it with murderous acts. Hamlet’s monster is also one who commits murderous acts, though this is in the form of his uncle Claudius who kills the King (Hamlet’s father) and usurps the Danish throne. The two men, Hamlet and Beowulf, are thrown into these battles as youth, and both take on the challenge willingly. In fact, Beowulf travels from Geatland specifically to meet the challenge of fighting Grendel. Hamlet too takes it upon himself to kill Claudius as soon as he finds out that this man has been the agent of his father’s death. Another characteristic that both Hamlet and Beowulf share is their death and the method in which this occurs. Both are defeated in their final efforts at ridding their homelands of the evil that had infiltrated. In fact, both die though their efforts are successful. Beowulf dies at the hand of the final monster (the dragon) whom he succeeds in slaying, but who also deals Beowulf a deathly blow that eventually kills him. Hamlet also has a similar experience in that, while he is able to slay Claudius by the end of the play, he is caught with a poisoned sword and eventually expires after all his enemies have died. The two characters die by peripheral (yet fatal) blows given them during the melee. Both show bravery by continuing to fight even while they are mortally wounded. Eventually, both succumb to the serious wounds they have acquired, yet they die in the victory of knowing they have defeated their enemies. Beowulf and Hamlet also differ in many ways, one of which is the character that they show throughout the play. While Beowulf displays a warrior-like character, Hamlet shows himself to be fearful and awkward in acting out the desires of his heart. Beowulf is eager to come to the aid of the King of Denmark, and he pauses only to partake of the feast given in his honor before he sets out to kill Grendel. When he encounters the monster, he loses no time in indecision but immediately performs the actions necessary to kill the beast. In fact, Beowulf fights three ferocious beasts throughout the story with the same vivacity and fierceness. Hamlet differs from Beowulf in his character, and he displays the tendency to employ a much more subdued and stealthy course of action. Though he too determines to defend the honor of Denmark’s (former) king by killing his murderer, he demonstrates a greater portion of dalliance and indecision than does Beowulf. When he gets his first chance to kill Claudius, his idle thoughts concerning the condition of Claudius’ heart (while praying) leads him to forfeit that chance and allow Claudius to live. He fails in his pursuits far more than Beowulf does too, because in his second attempt to kill Claudius, he ends up killing Polonius instead. In these ways, Hamlet shows himself to lack self confidence in a manner that is vastly different from Beowulf the ready warrior. Beowulf and Hamlet show differences in the tenure of their lives and the fulfilment of their royal destinies. Hamlet, unlike Beowulf, fails to ascend to the throne to which he is heir. He dies before the throne falls vacant and also fails to prove King Claudius a usurper in any effort to gain his rightful place on the throne. Beowulf, on the other hand, is able to spend fifty years as ruler of his Geat kingdom. In addition to this, Beowulf differs from Hamlet in his ability to live out his live and to attain old age. He is able to demonstrate his strength as a ruler for many years and to gain the respect of his subjects. Hamlet, who dies young, is unable to do any of this. He is never able to command the subjects over whom he was destined to rule precisely because of the fact that his life ends tragically in his youth. Therefore, while both men perform in the role of princes during their youth, Beowulf becomes promoted to the level of king while Hamlet dies with all his potential. Works Cited Beowulf. The Harvard Classics, Volume 49. Frances B. Grummere (Trans. ) 1910. P. F. Collier Son, 1993. Shakespeare, William. Hamlet. London: Penguin, 1994.

Thursday, November 14, 2019

Report on PEP :: Business Objectives Management Essays

Report on PEP Task 1 Describe and explain PEP’s business objectives, using its mission statement and other information Evaluate and explain how successful PEP appear to be in meeting each of these objectives. A mission statement is a written statement setting out the general aims of a business. This is also known as a business objective. PEP is a business, which has been set up to produce good quality products and excellent customer service, as most businesses have aims and objectives. Examples below show some basic aims and objectives a business might have:  · Make a profit  · Provide goods and services for their customers  · Survive and expand the business  · Improve the quality of goods and services  · Compete against other businesses  · To be environmentally friendly PEP is a family business with a good history that provides good quality products to customers. PEP has issued a mission statement that shows what the business is aiming for. These are listed below,  · Preserve a good family atmosphere in keeping with our great tradition  · Achieve increasing profit to reward our shareholders and reinvest in our business  · Produce the best electrical appliances to the UK and export markets  · Provide excellent service to our customers PEP’s need to maintain a good family atmosphere to meet their objectives because†¦ if the business starts to disagree with their employees then the employee might decide to leave which could cause a disturbance in the business. If PEP begins to lose their employees, the business could risk failure. To prevent this from happening, the employees should communicate with each other either internally or externally and be friendly. People can communicate with each other in many ways e.g. internal or external meaning in or outside of the business, up, down and across the business hierarchy and formal or informal. Motivating the workforce can be a massive advantage for PEP because motivating by making them feel valued and part of a team means the employees the workforce can work better which means improved quality of product or service to customers and therefore improve results for PEP. All businesses need to make a profit or a surplus. Profit is the money left over after all the expenses has been paid. Profit provides money for further growth, investment and rewarding the owner(s) as well as their shareholders. PEP need to increase their sales and market shares in order to make a profit. Shareholders are people who have a share in the business, they have invested money into the business so if the business does not do well the shareholders lose out. Therefore, it is vital for the business to increase the profit.

Tuesday, November 12, 2019

How Does Junk Food Affect Developing Teenagers

The teen years are a time of rapid physical and emotional growth. The nutrients in food serve as the fuel for this development, making a nutritious diet vital for good health during the teen years. â€Å"Junk food† includes items like candy, chips and soda that are high in fat and calories but low in nutrients. Understanding the impact of junk food on developing teens helps highlight the importance of a healthy diet. Weight Gain Overweight and obesity are a threat posed by Junk-food consumption. More than Just a superficial issue, childhood obesity increases the risk for several serious diseases, ncluding heart disease and type 2 diabetes.According to the Centers for Disease Control and Prevention, 70 percent of obese kids observed in one study had at least one risk factor for cardiovascular disease, such as high blood pressure or cholesterol. Junk food causes weight gain by filling the diet with calories and fat rather than nutrients, while large portion sizes make it easy to overindulge in these foods. Sponsored Links Diabetes Penyakit Diabetes bisa dihindari, Hitung Skor Anda disini. www. meetdoctor. com Nutrient Deficiencies Junk food is a poor source of vitamins, minerals and other nutrients teens need for roper health.Filling up on the empty calories in Junk food makes it difficult to obtain nutrients from healthier foods like fruits and vegetables. The University of Minnesota School of Public Health reports that a person's nutrient needs are higher during their adolescent years than at any other time. Failure to consume adequate nutrients during this period can result in delayed physical growth and sexual maturation. Poor nutrition during the teenage years may also lead to increased risk for cancer, osteoporosis and other diseases later in adulthood. DepressionFor some kids, being overweight or obese can have a negative impact on self-esteem and well-being. But there is some evidence that Junk food itself can contribute to poor mental health. Prel iminary research suggests that an unhealthy diet may increase the likelihood of depression in some individuals, dietitian Katherine Zeratsky wrote for MayoClinic. com in 2010. While more studies are needed in this area, a diet rich in fresh fruits and vegetables, lean meats, whole grains and other nutrient-rich foods is a teenager's best bet for a healthy mood. Prevention/SolutionLimiting Junk food rather than avoiding it altogether is usually sufficient to prevent serious health consequences. When eating high-fat or high-sugar foods, limit the amount of calories and fat from other sources that day. Make fresh fruits and vegetables a staple in the diet and keep plenty of healthy snacks in the home to feed hungry teens. Replace soda with skim milk or water and choose whole-grain foods over refined products like cereal, bread and pasta. You and your teen should also discuss proper diet and nutrition with their doctor. How Does Junk Food Affect Developing Teenagers? By alipol

Saturday, November 9, 2019

Finding Nemo Essay

When fearing the unknown, one can only hide away from the world trusting no one but one’s self, but in order to overcome fear, on must learn to trust in themselves and those around them. In Disney’s Pixar film Finding Nemo, a clown fish named Marlin sets out on a journey to find his son Nemo who was captured. Through the journey, Marlin learns to trust in those around him instead of living in fear of the unknown. With overcoming obstacles and fighting the ocean, Marlin learns what it means to be a part of the world as an adult and as a father instead of fearing the world around him (North). In Finding Nemo, Marlin is ready for a wonderful life with his wife and their hundreds of children ready to be born. He had found the perfect home as it was like a Garden of Eden for him. But happiness did not last long. Tragedy hit Marlin as his entire family was killed as fast as Zeus’s striking bolt, yet a survivor had lived the attack. Little Nemo was born with a handicap of a smaller fin due to an injury from the tragic attack. Due to the terrible experience, Marlin became wary of the world, cautious of every corner at all times. He took precautions of every little thing. Being over protection of Nemo became an understatement. â€Å"Marlin doesn’t believe that Nemo can do much of his own because of his somewhat deformed fin† (reelclassrooms). Marlin seems to put his entire life around Nemo, protecting and every possible way as if he were a baby. Though Marlin’s actions are extreme, one can see that Marlin takes caution in order to keep his son safe and alive. Being traumatized and losing almost everything affected Marlin to not trust the things around him, and fear the unknown. It was through this tragic event that caused Marlin to hide in the shadows in fear. Out of defiance of his father, Nemo strays away from the reef and gets captured by a fisherman; eventually put into a tank with other fish at the diver’s dentist’s office† (reelclassrooms). With his taken son, Marlin sets out to cross the ocean in order to find Nemo. As his journey begins, Marlin meets Dory who suffers from short term memory loss. Through he becomes impatient with Dory; he learns to befriend her and to trust her. Through their journey together, they experience several obstacles in which tests Marlin’s fear of the unknown. When the two were faced between going through a dark trench and going up above, Marlin did not choose to trust Dory because of her memories and decides to follow his own way causing them to battle a field of jellyfish. When the two were swallowed by a whale that they had asked for directions to Sydney, Marlin believed they were going to be eating, fearing and not trusting the whale that was in fact helping them. When the whale had told them to go down his throat, Dory had trusted the whale. In this scene, Marlin questions her how she knew it was going to be okay and how does she know if nothing bad would happen? Dory replies with that she did not know (Finding Nemo). The scene signifies Marlin’s transition in character. Because of this incident, Marlin learns not only to trust Dory but also to trust more of those around him and to take chances, slowing breaking through the fear of the unknown. A significant scene in the film was Marlin’s encounter with Crush, a sea turtle who had rescued him and Dory who had fell unconscious from the jellyfish field. With his encounter with Crush, he learns that he needs to trust his son; to live life and to just experience what comes to him. He learns that baby turtles are left alone to come back to the sea and find their way home on their own and is shocked that Crush had no concern or fear for his son’s lonesome journey without protection, but Crush had trusted his son and but his faith on him. Marlin sees that they do not fear the world, but embrace it. It is with this encounter that Marlin grows to accept the world, and becomes more determined to find his son so that he can â€Å"mend their broken relationship† (reelsclassroom). When Marlin is finally reunited with his son Nemo, he faces an obstacle which tests his fear of losing his son again and urge in protecting him. Dory is caught in a fishing boat’s large net along with hundreds of other fish. Nemo, knowing in how to save Dory and the school of fish, swims into the net but is stopped by Marlin. Nemo tells his father to trust him. Through the experiences Marlin had faced during his journey, he finally learns to trust his son to go on his own for the first time. In this suspenseful, emotional scene, Marlin finally learns to trust his son and the world, to not live in fear and to face the unknown along side with his son Nemo and Dory.

Thursday, November 7, 2019

Texas Political Culture and Immigration essayEssay Writing Service

Texas Political Culture and Immigration essayEssay Writing Service Texas Political Culture and Immigration essay Texas Political Culture and Immigration essayPolitical culture has a considerable impact on the development of the nation as well as local communities. Texas is one of the states with a distinct political culture that has a considerable impact on the worldview of the local population and policies conducted in the state. In this regard, the current paper focuses on the study of Texas political culture to understand its key principles that uncovers policies and decisions taken by policy makers. Texas has a considerable impact on the national politics of the US because it is one of the main states that opens the way for local politicians to enter federal political elite. This is why the understanding of Texas political culture will help not only to understand better policies conducted in Texas but also the national politics as well.Political CultureElazar distinguishes three types of political culture: traditionalistic, individualistic and moralistic (Foner Garraty, 2011). The moralist ic political culture holds society to be more important than an individual. The moralistic political culture tends to develop a positive view on the government and states with this type of culture view the government as a positive force that often leads to the wider government interference into economy and wider government regulations concerning economic, social and other aspects of the state life (Foner Garraty, 2011). States with the moralistic political culture stand on the ground of serving the community as their priority even at expense of individual interests.On the contrary, the traditionalistic political culture stands on traditional political and cultural values and focuses on the minimal intervention of state into economic and social life (Foner Garraty, 2011). The traditionalistic political culture limits the role of the government to the role of the actor responsible for the maintenance of the existing social order, which helps communities to maintain their traditional social systems. This political culture adheres to conservatism as the core of its political philosophy.Finally, Elazar distinguishes the individualistic political culture, which prioritizes the individual initiative and put needs and interests of individuals above those of communities as long as they match principles and norms of basic human rights (Foner Garraty, 2011). The individualistic political culture restricts the role of the government to the role of facilitator of individual initiative and does not admit the extensive government regulation of social life, economy or regulations in private matters of individuals.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As politics and society are dynamic, the political culture of certain states, regions or nations can change that contributes to the shift from traditionalistic to moralistic culture, for example, or emergence of a blend of cultures, such as traditionalistic and individualistic ones. Therefore, in some states, it is poss ible to trace the blend of different political cultures, which though are closely integrated but may change in the course of time and dynamic development of the political life and social norms, values and beliefs. For example, the political culture may change under the impact of profound demographic changes, which may occur in case of the rapid and substantial increase of the immigrant population. As a result, such demographic changes can bring changes into the political life and change the political culture of the state but such changes take normally a long time to be fully completed.Texas political culture  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Traditionalistic aspects of Texas political cultureOne of the distinct features of the Texas political culture is the dominance of one political party. Within the last thirty years, the Republican Party, which is associated with traditionalist policies and conservative ideology, has held control over the state’s politics. At this point, it is possible to refer to table 1, which shows the results of Presidential elections in Texas with only two wins of the Democrats in nine cases of Presidential elections.Moreover, Texans have not elected Democrats to a statewide office since 1994, while Democrats can gain support from minority groups mainly in East Texas and South Texas and from some urban voters in Beaumont, El Paso, Austin, San Antonio, Dallas and Houston (Foner Garraty, 2011). The dominant position of the Republican Party is the distinct feature of the traditionalistic political culture and Texas maintains this trend for decades. This is why it is possible to estimate that Texas has a historical inclination to the traditionalistic political culture.In fact, a distinct feature of Texas political life is the low voter turnout that is a characteristic of the traditionalistic political culture according to Elazar (Foner Garraty, 2011). Voters turnout remains stable and, more important, voters tend to have the similar political preferences and do not change them much for decades. For example, Texans prefer voting for the Republicans and they vote for them over and over again, regardless of changes in policies and situation in the state.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Individualistic aspects of Texas’ political culture  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Texas politics tends to support private business with the minimal interference of the state government and authorities into the economic life of the state (Foner Garraty, 2011). The non-interference government stance is typical for the individualistic political culture. In the case of Texas, this trend is very strong since the state government traditionally avoids direct interventions into the economic life of the state. Instead, the government focuses on the stimulation of individual business initiative and eme rgence of small businesses. Texan legislation is favorable for business initiatives and current policies create favorable conditions for starting up a business in Texas (Foner Garraty, 2011).  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Texas turns out to be in the opposition to the political government and stands for the larger opportunity for exercising the principle of people sovereignty in Texas (Foner Garraty, 2011). Texans and local politicians stand on the ground of the supremacy of people sovereignty over the authority of the federal government. This is why they oppose to the increasing role of the federal government in the field of public education. Similarly, Texans have a strong opposition to current health care reform, which contradicts to their principles and beliefs.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Furthermore, Texas politicians and the public maintain a strong faith in individual initiative (Foner Garraty, 2011). They put it prior to the government regul ation. Instead, they believe that the government should just facilitate the individual initiative by means of non-interference and liberalization of the legislation to let individuals to implement their initiatives successfully. Such policy and political culture is traditional for Texas and these features are features of the individualistic political culture.Texas Political Culture and Immigration essay part 2

Tuesday, November 5, 2019

Share Your Writing Tips

Share Your Writing Tips Share Your Writing Tips Share Your Writing Tips By Sharon It was about time to get our wonderful readers involved with the blog. Instead of writing an article with one hand, therefore, lets group our knowledge and see what comes out of it. The topic I want to cover is Tips to Become a Better Writer. All you need to do is to send one tip that you used to become a better writer. You can do this either by posting a comment below or by sending me an email via the contact form. Next Monday I will publish all the tips in a single article, so that we can use it as reference. In order to kick start it below you will find my tip: Pay attention to punctuation; especially to the correct use of commas and periods. These two punctuation marks regulate the flow of your thoughts, and they can make your text confusing even if the words are clear. What methods have you used to improve your writing skills? What technique helped you to increase your vocabulary or correct your grammar? Dont be shy and share them with us! Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the General category, check our popular posts, or choose a related post below:Apply to, Apply for, and Apply with75 Idioms and Expressions That Include â€Å"Break†20 Slang Terms for Law Enforcement Personnel

Sunday, November 3, 2019

Discussion 1 Week 6 "Comparing First-movers in Technology" Assignment

Discussion 1 Week 6 "Comparing First-movers in Technology" - Assignment Example 244). From the videos, it was evident that Intel’s development of the first microprocessor (Intel Free Press, 2011); while Microsoft’s software design enabled them to pioneer in this endeavor and assume a proactive stance in related technological developments (Microsoft, 2012). Moreover, Intel and Microsoft capitalized and reaped the following advantages: (1) captured the opportunity to â€Å"exploit network effects and positive feedback loops, locking consumers into its technology† (Hill & Jones, 2012, p. 244); (2) enabled establishment of brand loyalty; (3) generated substantial sales volume which eventually enabled economies of scale and learning effects; (4) enabled offering pricing strategies (switching costs); and (5) gained advanced knowledge on the pioneering experience (Hill & Jones, 2012). 2. From the first and second e-Activities, compare Intel’s and Microsoft’s strategies in terms of their ability to profit from innovation. Next, analyze the manner in which shifts in new technologies revolutionized the structure of the industry, increasing profitability and growth through global expansion. Provide a rationale to support your response. Intel’s strategies, when compared to Microsoft’s strategies in terms of abilities to profit from innovation were virtually on the same field. Through pioneering efforts, both Intel and Microsoft gained substantial market shares within their respective fields of endeavors. As such, the developed core competencies established significant competitive advantage that enabled them to retain leadership in these discoveries. Moreover, the manner in which shifts in new technologies revolutionized the structure of the industry, increasing profitability and growth through global expansion – more commonly known as technological paradigm shifts, affect both Intel and Microsoft. For example, cloud computing, which

Thursday, October 31, 2019

Sociology SGY360 - Weekly answers (weeks 2 to 12), info ready and easy Essay

Sociology SGY360 - Weekly answers (weeks 2 to 12), info ready and easy to do - Essay Example cording to Beck and Beck-Gernsheim the daily life of parents is becoming instrumentalized as brining up a child is considered a science and every move of the parents even playing and cuddling are a part of learning. 2. Children are valued and loved and get a lot of affection from parents, however they create distress for parents as well, since usually children in a home increase economic pressure and, interfere with support between spouses and create marital tensions. 2. According to Loseke, the sociological perspective of domestic violence is less popular than the psychological view because the psychological view gives simple ideas to complicated situations. Also, according to Loseke psychological theories pertain only to people who are objects of extreme violence. Lastly, he believes that sociological theories are less popular than psychological theories because they do not challenge people to think of the relationship between violence and a social

Tuesday, October 29, 2019

Women Leadership in Africa Essay Example | Topics and Well Written Essays - 250 words

Women Leadership in Africa - Essay Example Competent women leaders are required for good functioning of African governments. For instance, the civil wars that have devastated the continent for decades are based on tribal rivalry. Most leaders in current African governments have been elected into power through such tribal associations. This makes them support ethnic divisions that have continued to trouble the continent. The African continent is also suffering from an unequal distribution of resources. Although the continent is endowed with resources such as oil and other precious minerals, the continent has not fully benefited from this resource. In addition, these resources have become a source of conflicts that have ruined most countries. Conflicts Liberia, Angola, Nigeria, and Congo are related to an availability of resources in these countries. These problems can be solved by increasing the number of female political leaders in African governments. Unlike men, women are against conflicts and they support equitable distribution of a country’s wealth. Thus, women leadership and competence are necessary for a well functioning political system in Africa. Women leaders are also likely to empower women through education and entrepreneurship and this will liberate Africans from poverty.

Sunday, October 27, 2019

Dennis Rader: The BTK Killer

Dennis Rader: The BTK Killer When you hear the words SERIAL KILLER, you instantly think about people like Jeffrey Dahmer, Ed Gein, Ted Bundy, or Charles Manson. You dont think about a family man with a wife and two children, county board member, President of the church congregation council, or a Cub Scout leader. Dennis Rader possessed all of these shining attributes. He also possessed a dark secret. This secret had festered in him from an early age and grew as he got older. Dennis Rader had fantasies about bondage, control, and torture which eventually led to murder. Raders reign of terror began in 1977 and ended with his capture in 2005; almost 30 years later. He labeled his victims as projects.3 He hunted his prey in stages he described as the trolling stage and stalking stage.3 He even called the tools used for his trade his hit kit.3 Dennis Rader was a stone cold killer who had no plans of stopping. The letters BTK stands for Bind, Torture and Kill, which was Raders mode of operation and a name he gave to himself. Throughout the years and in numerous communications with the police, he talked about his need for acknowledgment. In the 1990s BTK had disappeared from sight when, without explanation, he re-emerged in 2004. This re-emergence was more than likely due to his need for acknowledgment or public attention. In 2004, Rader started sending multiple letters, clues, and photos to the authorities that led to his capture and arrest in 2005. In the Beginning Dennis Rader was born on March 9, 1945. His parents were William and Dorothea Rader. His family moved to Wichita Kansas when Dennis was little. While growing up, Rader appeared to be a normal child. He was a member of the Boy Scouts and a church youth group member. He attended Riverview Elementary School1 and was described as a student with withdrawn tendencies.1 Rader later admitted that he developed fantasies about bondage, control and torture from an early age, while still in grade school.1 As he got older, he had fantasies about tying girls up and having his way with them.1 He also admitted to killing cats and dogs as a youth by hanging them.1 He began to perfect the art of hiding his dark secret from everyone at an early age. 1974-The Killing Begins It all started when a family of four, the Otero Family, was brutally and maliciously murdered in their home on January 15th, 1974. These four murders, along with six others, would leave the authorities, media, people of Wichita Kansas, and people around the world baffled and in fear for the next 30 years. A killer was on the loose and Bind, Torture, Kill was his mode of operation. Joseph Sr., Julie, Joseph II, and Josephine Otero were the BTK Killers first victims. Their family consisted of the husband, wife, and 5 children. Only two of the children were murdered and they were the children that were home on the day of the murders. These murders occurred in the early morning hours. Dennis Rader invaded their home at gunpoint and ordered everyone into a bedroom where he tied them up. He tried to kill Joseph Sr. first by putting a bag over his head and pulling tight, but somehow a hole was torn in the bag. He later went back and put another bag over Joseph Sr. head and strangling him with a cord. Julie Otero was the second victim to be killed by Rader. He tried to kill Julie with his hands at first but when that didnt work, he strangled her with a cord. Nine year old Joseph II was the third victim. Joseph was moved to another bedroom and suffocated with two bags placed on his head. The fourth and final victim, on this day, was Josephine Otero. She was eleven year s old. Rader took Josephine to the basement of their house and hung her from the drainage pipe. Rader admitted to having sexual fantasies after she was hung.3 He masturbated on her legs and a pipe near where she was hung. His DNA left at the scene was later matched to other killings. BTKs fifth victim was Katherine Bright. She was killed by Rader in April 1974; just four short months after the Oteros were murdered. She was 21 years old. Radar broke into her house and waited for her to come home but he didnt expect for her brother (Kevin Bright) to be with her. He made her brother tie her up first, and then he tied her brother up in another room in the house. Kathryn put up a fight for her life and was eventually stabbed several times by Rader. She later died in the hospital. Her brother escaped during Raders fight with Kathryn but was shot in the head while he fled. Kevin may be the only person to see the serial killer and live (although his description still didnt help the police capture BTK in the 70s). 1977-The Killing Continues It had been 3 years since the Otero family and Kathryn Bright was brutally murdered by the BTK Killer. His sixth victim was Shirley Vian Relford, 24. Rader admitted in court that Relfords murder was completely random.3 He actually planned on killing a particular person but when he went to knock on the door, no one answered. After continuing to troll the neighborhood, he knocked on one other door and got no response. He approached a little boy, watched what house the little boy went into and followed him. When he got inside the house, he put Shirleys three young children in the bathroom and then tied Shirley up and strangled her. He left his semen on some panties that were found next to her body. December 1977, BTK struck again. This time his victim was Nancy Fox, 25. She was victim number 7 and Rader labeled her as Project Fox Hunt5. He had apparently been watching Fox for a long time, stalking her. He would go by her house several times, rummage through her mailbox to find out what her name was, and stalked her at her job.3 On this night in December, he went by her house and knocked on her door but when no one answered, he broke in. He waited in her house in the kitchen and when she got home, he told her he was going to rape her and tied her to the bed. Afterwards, he strangled her. He left semen on a nightgown that was found next to her body. Rader later described Foxs murder as the perfect hit6(pp. 53) because he said that there was no interference in the killing. 1985-Eight Years Later Eight years after Nancy Fox was murdered, BTK was back on the scene and ready for his next victim. That victim was Marine Hedge, 53. Rader labeled her as Project Cookie.6(pp. 92) The sad part about this murder is that Hedge lived on the same street as Rader; only six doors down to be exact. He broke into her house and waited for her. When she came home, she was not alone. She had a male friend with her so Rader hid out in the house and waited for her male friend to leave. Once her male friend left, Rader strangled her in her bed with his bare hands. Hedge was the first victim where Rader moved the body from the house after killing them. He took her body to his churchs basement and posed it for photographs. Her body was later found in a ditch on the roadside. 1986-Victim #9 On September 16, 1986, Vicki Wegerle became BTKs ninth victim. She was 28 years old. Rader used trickery to get in to Wegerles house. He posed as a telephone repair man3 with a uniform and a hard hat. He called his outfit for this murder his hit clothes.3 When he got into her house, he pulled a gun on her and attacked her. She put up a fight for her life but he eventually overpowered her and strangled her with a nylon sock. He also posed her body for photographs as he had previously done to Hedge. It was later found out that Vicki was not dead when Rader left her house; he only thought she was dead. She later died when the paramedics couldnt revive her. 1991-Final Victim-5 years later BTKs last and final victim was Delores Davis, who was murdered on January 19, 1991. She was 62 years old. By this time, a decade had passed since BTK began his killing spree. Rader had previously cased the place before3 and this time she was in the house. It appears as though Rader had gotten lazy by the 10th murder because he threw a concrete cinder block through Daviss patio glass door and bombarded his way into her house. He made no attempt to conceal the noise that the shattering glass made. He pretended to be a wanted criminal and eventually strangled Davis. She was the second victim that Rader had moved from the location of the murder. Her body was dumped under a bridge. She too was posed and photographed after being killed. Raders mask was left by her face. The Investigation The BTK investigation began in the mid 1970s, spanned the length of 30 years, and concluded with the arrest and conviction of Dennis Rader in 2005. In the early 1980s, the Wichita Police Chief created a secret task force6(pp.86) of special investigators to work on the BTK case. They were the team that hunted BTK. This team was called the Ghostbusters.6(pp. 85) There were tons of calls and tips throughout the BTK investigation. Investigators came up with lists to eliminate and compare suspects. They put together a list with tens of thousands of names 6 (pp.88) This list included men who went to the local college, men who worked with any of the victims, men who were between 21 and 35 years of age in 1974 and lived in the county6(pp. 88), and mostly men with any kind of sex/torture/perverse/stalking behavior on their criminal record. Several of the detectives went door-to-door to most of these suspects houses and asked outright if they would submit to DNA testing. Suspects who were unwi llingly to be tested were placed under surveillance. In the Otero murders, police interviewed more than 1500 people6(pp. 31) to no avail. Police originally thought that organized crime families or drugs may have been involved in the family murders. Some police didnt want to accept the fact that a serial killer may have been on the loose or that there were similarities in the Otero and Bright killings. It wasnt until BTK starting sending the police clues about the murders that they put it all together and realized that a serial killer was on the loose. Three of the victims worked at the same location; Colemans. Even when Kathryns brother Kevin (who survived the attack) gave the police a description of his attacker, they never caught him. Even with all of the man hours and leg work put into the investigation, BTK was not caught back then. From 1991 until 2004, when BTK resumed communication with the police, the trail for the serial killer had gone completely cold. Search and Arrest Warrants and Subpoenas There were several search and arrest warrants issued in the BTK case in the later years. In the beginning, there was mostly list compiling and DNA tests done to eliminate suspects but no definite leads as to who BTK was. There were too many suspects and police kept hitting dead ends. In December 2004, the television station KSN reported that Roger Valadez had been arrested in connection with the BTK killings. The report was based on an anonymous tip that was inaccurate. Mr. Valadez was arrested early that morning on charges of criminal trespassing and housing code violations12 but it was somehow leaked that he was a suspect in the BTK murders. A search warrant was executed on his home. He was cleared by DNA tests of any criminal activity related to the BTK killer.6(pp. 227) Valadez later sued the television station and won. In 2005, police obtained a warrant for the medical records of Raders daughter (Kerri Rader) which was a familial match with semen collected at an earlier crime sc ene.13 His daughters DNA match and other evidence that police had accumulated while surveilling Rader gave them probable cause for a search warrant. Raders home, vehicle, church and office were also searched for evidence after the warrant was executed. Also, a search warrant for Raders DNA was executed after he was arrested. He was cheek swabbed while in police custody. Four swabs were taken; two were immediately sent to the county forensic lab and the other two went to the forensic lab in Topeka, Kansas. 6(pp. 269) Interviews Rader was interviewed by the police in 2005. He talked in the third person as though Dennis Rader was someone else. He ducked questions for many hours. Rader gave away nothing during his interview. He spoke to the detectives as equals, noting that he too was in law enforcement.6 Interrogations In September 1986, Bill Wegerle was interrogated by the police and suspected of killing his wife Vicki Wegerle. He was given two lie detector tests and he failed both.6(pp. 102) He was interrogated for hours and asked a lot of probing questions about his and his wifes relationship. Wegerle told the police that on his way home from work, he saw his own car ride right by him and he saw someone else driving it but he didnt think anything of it at the time.16 They mainly wondered how he sat in the house for forty-five minutes before he found her body.6(pp. 101) The police did not believe Bill initially but later contributed him failing both lie detector tests to the stress of a grieving husband. Dennis Rader was interrogated by FBI profiler Bob Morton and Wichita Police Lt. Ken Landwehr shortly after his arrest in 2005. He was arrested on February 25, 2005 as a suspect in the BTK killings. He was formally charged with the murders on February 28, 2005.9 It was during this interrogation that Dennis Rader confessed to being the BTK killer. His 16 hour confession was given in full and of his own free will and recorded on over 20 DVDs.9 Rader knew that he was going to kill again and he told the officers who interrogated him this. He was already in the process of stalking his next victim when he was arrested. Seizure and Analysis of Forensic Evidence There was a ton of evidence and more than enough to get a conviction once BTK was captured. Due to his sexual perversion, he left semen at most of the locations of his killings. Although BTK wasnt caught until 3 decades later, the case was never closed and police had evidence stored from all of the crime scenes. Rader stayed in contact with police through the years taunting them and sending them clues that would later be used to catch and convict him. For example, Rader was so pleased with himself after he killed Nancy Fox that he called the police the next morning to gloat about it. He spoke 15 words during a three-second span of a seven second recording. The audio quality of the call, taped at a slow speed, so was poor it was not released to the public until August 1979. The tape was sent to the Washington DC, FBI laboratory but it was too brief and distorted by background noise to make a comparison voiceprint.5 This tape was kept as evidence and more than likely presented during R aders trial. Semen was found on or near the bodies of his victims Josephine Otero, Shirley Vian and Nancy Fox; all of the semen was matched to Rader. Also, DNA obtained from fingernail scrapings of Vicki Wegerles left hand matched Raders DNA, eliminating any doubt that he was her murderer. High tech forensic computer detection was used to get evidence off of the disk Rader mailed to a Wichita television station in February 2005. This is how Rader was caught. Using this high tech computer, residual information left over on the disk identified the last person who had used the disk: someone named Dennis. It was also learned that the disk had been used on computers registered to two local organizations, Christ Lutheran Church and Park City Library. An internet search on the churchs name provided the name of the congregations president: Dennis Rader.14 Summary Its sad to say that if he had maintained his silence after his last murder in 1991, BTK would still be a free man today, writing citations and catching dogs for the city of Park City. He probably would have never been caught. But his ego was way too big for his own good, and he just had to let everyone know he was still at large. He wanted to taunt the police with the fact that BTK was still on the loose after 3 decades. His cockiness led to his downfall. Had these murders occurred today, I believe that he would have been caught before he got the chance to kill ten people. Today, we have much more advanced technologies than investigators had in the 70s and ways to gets results faster. Rader left entirely too many clues and had entirely way too much correspondence with the police over the years for them to not have caught him long ago. Some of his murders were way too sloppy and although he had a college education, he didnt appear to be intelligent enough to outsmart 3 decades worth o f police investigators. That is probably the reason why as soon as he re-emerged in 2004, he was caught. Although he planned to kill others, that same year, he never got the chance. Dennis Rader pled guilty to 10 counts of first degree murder and was found guilty and sentenced on August 18, 2005. He was sentenced to 10 consecutive life terms, which require a minimum of 175 years without a chance of parole. Because Kansas had no death penalty at the time the murders were committed, life imprisonment was the maximum penalty allowed by law. His earliest possible release date is February 26, 2180. Rader, 60, will spend the rest of his life at the maximum-security El Dorado Correctional Facility near Wichita. Other cold cases in Kansas were reopened to see if Raders DNA matched crime scenes, but Raders confession was limited to the 10 known victims and police and prosecutors do not believe there were any more victims because of the extensive records and memorabilia he kept on each of his victims.9 During Raders sentencing hearing, the families of the victims were given the chance to give victim impact statements describing how the murders have effected and continues to effect their lives. The families got a chance to speak on behalf of their loved ones who are no longer here because of BTK. C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study The C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study Mohammad Reza Zardoost a,*, Behnam Dehbandib , Marjan Dehbandib Abstract: Electronic structure properties including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, NMR parameters of the isotropic and anisotropic chemical shielding parameters for the sites of various atoms were calculated using density functional theory for C , Si , Ge doped (6,3) Chiral BNNTs. The calculations indicated that average bond lengths were as: Ge-N > Si-N > C-N and Ge-B > Si-B > C-B. The dipole moments for C, Si, and Ge doped (6, 3) Chiral BNNTs structures show fairly large changes with respect to the pristine model. Keywords: NMR, Nanotube, DFT, Dipole moment 1. Introduction Since the early times that carbon nanotube (CNT) was discovered by Iijima [1], the physical, chemical and structural properties and applications of this material have been investigated extensively [2–4]. The properties of CNTs are mostly dependent on the tubular diameter, doped atoms in the structure and chirality, which make their synthesis for the specific purposes difficult. A lot of studies have been done in the investigation of stable structures of non-carbon based nanotubes, among them boron-nitride nanotubes (BNNTs) have a great importance [5]. The stable tubular structure of BNNT was initially found by calculations [6] and later was successfully synthesized [7]. After this time, a large growing number of experimental and theoretical studies, specifically ab initio calculations on carbon-, silicon- and germanium substituted BN nanotubes have been performed on the electronic structures of the BNNTs [8–11]. The results show that C, Si and Ge replacements can induce spontaneous magnetization with different deformation in the nanotube [12]. At the present time, nuclear magnetic resonance (NMR) spectroscopy [13-14] is the best technique to study the electronic structure properties of materials. Doping of Chiral BNNTs by C, Si, Ge atoms changes their properties and so the interactions of the nanotube and foreign atoms or molecules. (see Fig. 1). In this work we studied the electronic structure properties, including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, and NMR parameters in the C, Si, Ge doped Chiral BNNTs structures. a b c d e f g 2. Computational methods All calculations were performed using Gaussian 98 computational package [15] with density functional theory (DFT) method using Becke’s three-parameter hybrid exchange functions with the correlation functions of Lee, Yang, Parr (B3LYP) [16,17] using 6-31G (d) basis set [18]. Previously it has been found that the calculated NMR parameters at the B3LYP and B3PW91 levels have a good agreement with the experiment [19]. It is shown that B3LYP gives reasonable and even accurate band gap values for nanotubes [19] so this function is chosen for band gap calculations. In the present study, we considered a pristine (6,3) chiral BNNTs of diameter 6.6 Ã… and 10.1 Ã… length. This BNNT model consists of 42 Boron, 42 Nitrogen and 18 hydrogens (B42N42H18) B and N sites of this BNNT are doped by C, Si, Ge (see Fig. 1). We have seven models, namely pristine (Fig. 1a), or with a B or N atom doped by C, i.e., the B-C-B or N-C-N model (Fig. 1b, c), doped by a Si atom, i.e., the B-Si-B or N-Si-N model (Fig. 1d, e), doped by a Ge atom, i.e., the B-Ge-B or N-Ge-N model (Fig. 1f, g). We investigated the influence of the C, Si, and Ge doping on the properties of the (6,3) Chiral BNNTs. The hydrogenated models of the pristine (6,3) Chiral BNNTs and the three atoms doped models of BNNTs consisted of 102 atoms with formulas of B42N42H18 (pristine), CB41N42H18 and CB42N41H18 (B-C-B or N-C-N model), SiB41N42H18 and SiB42N41H18 (B-Si-B or N-Si-N model), GeB41N42H18 and GeB42N41H18 (B-Ge-B or N-Ge-N model). The calculated CS tensors in the principal axis system (PAS) with the order of ÏÆ'33 > ÏÆ'22 > ÏÆ'11 [20] for C, Si, and Ge doping for the investigated models of the (6,3) Chiral BNNTs were converted into measurable NMR parameters (isotropic chemical shielding (CSI) and anisotropic chemical shielding (CSA) p arameters) using Eqs. (1) and (2) [23], summarized in Tables 3-6. CSI(ppm)= (ÏÆ'11+ ÏÆ'22+ ÏÆ'33) (1) CSA(ppm)= ÏÆ'33(ÏÆ'11+ ÏÆ'22) (2) For NQR parameters, computational calculations do not directly detect experimentally measurable NQR parameters, nuclear quadrupole coupling constant (CQ), and asymmetry parameter (). Therefore, Eqns. (3) and (4) are used to convert the calculated EFG (electric field gradient) tensors in the principal axis system (PAS) with the order of |qzz| > |qyy| > |qxx| to their proportional experimental parameters; CQ is the interaction energy of nuclear electric quadrupole moment () with the EFG tensors at the sites of quadrupole nuclei (Nuclei with nuclear spin angular momentum greater than >1/2), but the asymmetry parameter () is a measure of the EFG tensors, which describes the deviation from tubular symmetry at the sites of quadrupole nuclei. The standard Q value (Q (11B) = 40.59 mb) reported by Pyykkà ¶ [21] is used in Eq. (3). The NQR parameters of 11B nuclei for the investigated models of the (6,3) BNNTs are summarized in Table 7. (3) (4) 3. Results and discussion 3.1. Structures of the (6,3) Chiral BNNTs The structural properties consisting of the B-N bond lengths, bond angles, dipole moments ( µ), energies, and band gaps for the investigated models of the (6,3) Chiral BNNTs are given in Table 1 and Table 2. R1, R2, and R3 are B-X-B and N-X-N bond lengths (doped atom and its neighbors). ÃŽ ±, ÃŽ ², and ÃŽ ³ are B-X-B and N-X-N angles. There are Six forms of C, Si, Ge doped Chiral BNNTs for the (6,3) Chiral model. These calculations indicated that the average of the (X = C, Si, Ge) bond lengths of the B-X-B and N-X-N models is larger than those the pristine models. The reason seems to be increasing of atomic radius going from carbon to Ge. The bond angles produce some structural deformations that are responsible for deformation in structure by changing the doped atom size respect to carbon. For the B-X-B and N-X-N (X = C, Si, Ge) models, the diameter values are larger than those the pristine models. It has worth to be noted that the significant changes of geometries are just for those atoms placed in the nearest neighborhood of X atom and those of other atoms almost remained unchanged. 3.2. Energy band structure and density of states Table2. Energy, LUMO, HOMO, LUMO-HOMO gap, dipole moment ÃŽ ¼, and electronegativity (χ) of the studied structures at B3LYP/6-31G(d). The total densities of states (DOS) of these tubes are presented in Fig. 2. As can be seen from Fig. 2, the calculated HOMO-LUMO gap (band gap) of the (6,3) Chiral BNNTs is 6.2 (eV) and the calculated band gaps of the C , Si , Ge doped models molecular orbital’s are 3.5,5.8 , 5.0 , 5.0 , 5.5 and 5.0 (eV) respectively (See Table 2). Doping of C, Si, and Ge in these tubes causes significant changes in the gaps of the DOS plots. In comparison with the pristine model, the band gaps of these models are reduced that increase their electrical conductance. These results indicated that the doping of C, Si, Ge atom by B, N atoms B-X-B and N-X-N model (X=C, Si, Ge) has more influence on the band gap of the Chiral BNNTs (see Table 2). By increasing atomic number and size polarizability increases that enhances dipole moment. Dipole moments ( µ) of the C, Si, Ge doped Chiral BNNTs structures (Fig. 1) indicate slightly changes with respect to the pristine model. 3.3. NMR parameters of the (6,3) Chiral BNNTs The NMR parameters for the investigated models of the (6,3) Chiral BNNTs are tabulated in Table 3, 4, 5 and Table 6. In the pristine model of the (6,3) Chiral BNNTs, there are 42 B atoms and 42 N atoms in the considered model and the NMR parameters are separated into five layers and six Columns, which means that the CS parameters for the atoms of each layer and Column have equivalent chemical environment and electrostatic properties. In Fig. 1b,c,d,e ,f,g the B and N atoms has been replaced by the C, Si, Ge atoms. Table 3 Isotropic shielding parameters of the studied structures at B3LYP/6-31G(d) The calculated results in Table 3 indicate that doping C, Si, and Ge slightly changes the NMR parameters of the various B and N atoms in (Fig.1b–g) of the Si, Ge, C doped(6,3) Chiral SWBNNTs except for the N25 and N27 atoms for which the changes are significant. Because among the atoms of (Fig.1b–e) B–X model (X= C, Si, Ge), the N25 and N27 atoms are the nearest neighbors of the C, Si, and Ge atoms; hence, both the CSI and CSA parameters show the most significant changes due to the C, Si, Ge doping. Also, changes in the CSI parameters of the N10 and N12 atoms, which are the next nearest neighbors of the C, Si, Ge atoms, are also notable. There are differences between the properties of the electronic structures of C, Si, Ge atoms. Comparison of the calculated NMR parameters in (Fig. 1b–g) indicates that the properties of the electronic structure of the Ge doped (6,3) Chiral SWBNNTs are more influenced than those of the Si–N model, where the N atom is doped by the Si atom. We studied the electronic energies of the models. The changes in the NMR parameter due to the C, Si, and Ge doping are more significant for the N–Si, N–Ge, N-C models with the pristine model. 3.2. NQR parameters The 11B NQR parameters (ÃŽ ·Q and CQ) in the geometrically optimized SWBNNT models were calculated from the EFG tensors. The results are tabulated in Table 7. A quick look at the results reveals that the calculated NQR parameters are not similar for various nuclei; therefore, the electrostatic environment of BNNT is not equivalent in length in all BNNT models. Since, in contrast with CNTs, the ends of BNNTs are different, the NQR values decrease from each end to the opposite end of the chiral model. It was proved before that the end nuclei in the SW-BNNTs are crucial to their growth and also field emission properties [22, 23]. Since no experimental NQR data for BNNTs are available in the literature, the tables do not include any reference experimental data for the calculated results. B17 and B46 in all models have the largest CQ that states greater orientation of the EFG tensor eigenvalues along the z-axis of the electronic distribution at the sites of the 11B17 and 11B46 nuclei. The electrostatic environments of atom B17 and B46 are stronger than in the other layers along the length of the tube. The largest change in CQ is due to B46, located in the layer of doped atoms, because doping changes the geometrical parameters and hence the electronic behavior of atoms. Table 8 The 11B NQR parametersThe highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO) in the pristine, and C–X (X=B, N) models are plotted in Fig. 3. For the pristine model, HOMO and LUMO are uniformly distributed throughout the B–N bonds, whereas, in the C–X model (X=B, N) models, HOMO and LUMO are highly localized at the doped regions. (see Fig. 3) In comparison with the pristine model, band gaps of the C, Si, and Ge doped models increased their electrical conductance. Conclusion We studied the electronic structure properties including bond lengths, bond angles, dipole moments (ÃŽ ¼), energies, band gaps, the NMR parameter of the six C, Si, Ge doped SWBNNTs models by means of DFT calculations. The calculated results indicated that the average Ge-B bond lengths of the Ge-N model are larger than those the pristine and the C–B, C–N, Si–B, Si-N and Ge-B models: Ge–N>Si–N>Ge–B>Si–B>C–N>Pure>C-B. The values of dipole moments (ÃŽ ¼) of the six C, Si, Ge doped SWBNNTs are Ge–N> Si–N> Ge–B> C–N> Pure> Si–B > C-B. In comparison with the pristine model, the band gaps of the six C, Si, Ge doped models are reduced and their electrical conductance increased as: C–B > Si–B = Si–N = Ge–N > Ge–B > C-N. The NMR values for the B and N atoms directly bound to the C, Si, and Ge in the C, Si, and Ge doped models are significantly changed. Comparison of the calculated NMR parameters in the X–B and X-N (X=C, Si, Ge) models shows that the properties of the electronic structure of the X-B doped (6,3) Chiral SWBNNTs are more influenced than X–N model in Fig. 1b–g. The electronic sites of the B and N atoms in X-N model have greater effects than X-B model in Fig. 1 in the C, Ge, and Si doping processes. References [1]S. Iijima, Single-shell carbon nanotubes of 1-nm diameter, Nature 354 (1991) 56. [2]H. Terrones, F. Lopez-Urias, E. Muooz-Sandoval, J.A. Rodriguez-Manzo, A. Zamudio, A.L. Elias, M. Terrones, Magnetization of carbon-doped MgO nanotube, Solid State Sci. 8 (2006) 303. [3]F. Moreau, R. Langlet, P.h. Lambin, P.P. Kuzhir, D.S. Bychanok, S.A. Maksimenko, Dielectric properties of a novel high absorbing onion-like-carbon based polymer composite, Solid State Sci. 11 (2009) 1752. [4]R. Joshi, J. Engstler, P. Haridoss, J.J. Schneider, Formation of carbon nanotubes from a silicon carbide/carbon composite,Solid State Sci. 11 (2009) 422. [5]A. Loiseau, F. Willaime, N. Demoncy, N. Schramcheko, G. Hug, C. Colliex, H. Pascard, Mathematical modeling for the simulation of heavy metal ions, Carbon 36 (1998) 743. [6]X. Blase, A. Rubio, S.G. Louie, M.L. Cohen, Stability and band gap constancy of boron-nitride nanotubes, Eur. Phys. Lett. 28(1994) 335. [7]N.G. Chopra, R.J. Luyken, K. Cherrey, V.H. Crespi, M.L. Cohen, S.G. Louie, A. Zettl, Boron-nitride nanotubes, Science 269 (1995) 966. [8]L. Guo, R.N. Singh, Catalytic growth of boron nitride nanotubes using gas precursors, Physica E 41 (2009) 448. [9]B. Fakrach, A. Rahmani, H. Chadli, K. Sbai, J.-L. Sauvajol, Raman spectrum of single-walled boron nitride nanotube, Physica E 41 (2009) 1800. [10]M. Mirzaei, An electronic structure study of O-terminated zigzag BN nanotubes, Physica E 41 (2009) 883. [11]M. Giahi, M. Mirzaei, Computational NQR study of a boron nitride nanocone, Z. Naturforsch. A 64 (2009) 251. [12]J. Wu, W. Zhang, Chem. Phys. Lett. 457 (2008) 169. [13]R. R. Zope, B.I. Dunlap, Phys. Rev. B. 72 (2005) 45439-6. [14]F.A. Bovey, Nuclear Magnetic Resonance Spectroscopy, Academic Press, San Diego, 1988. [15]M.J. Frisch, G.W. Trucks, H.B. Schlegel, G.E. Scuseria, M.A. Robb, J.R. Cheese- man, V.G. Zakrzewski, J.A. Montgomery Jr., R.E. Stratmann, J.C. Burant, S. Dapprich, J.M. Millam, A.D. Daniels, K.N. Kudin, M.C. Strain, O. Farkas, J. Tomasi, V. Barone, M. Cossi, R. Cammi, B. Mennucci, C. Pomelli, C. Adamo, S. Clifford, J. Ochterski, G.A. Petersson, P.Y. Ayala, Q. Cui, K. Morokuma, D.K. Malick, A.D. Rabuck, K. Raghavachari, J.B. Foresman, J. Cioslowski, J.V. Ortiz, A.G. Baboul, B.B. Stefanov, G. Liu, A. Liashenko, P. Piskorz, I. Komaromi, R. Gomperts, R.L. Martin, D.J. Fox, T. Keith, M.A. Al-Laham, C.Y. Peng, A. Nanayakkara, C. Gonzalez, M. Challacombe, P.M.W. Gill, B. Johnson, W. Chen, M.W.Wong, J.L. Andres, C. Gonzalez, M. Head-Gordon, E.S. Replogle, J.A. Pople, GAUSSIAN 98, Gaussian, Inc., Pittsburgh, PA, 1998. [16]A.D. Becke, J. Chem. Phys. 98 (1993) 5648-5652. [17]C. Lee, W. Yang, R. G. Parr, Phys. Rev. B. 37 (1988) 785. [18]G. A. Petersson and M. A. Al-Laham, J. Chem. Phys. 94, 6081 (1991). [19]M. Mirzaei, N.L. Hadipour, J Phys Chem A. 110 (2006) 4833-4838. [20]Y. Matsuda, J. Tahir-Kheli and W. A. Goddard, The Journal of Physical Chemistry letters 1 (2010) 2946. [21]R.S.Drago,Physical Methods for Chemists,second ed. ,Saunders College, Florida, 1992. [21]P. Pyykkà ¶, Mol. Phys. 99 (2001) 1617. [22] S. Hou, Z. Shen, J. Zhang, X. Zhao, Z. Xue, Chem. Phys. Lett. 393 (2004) 179. [23] E. Bengu, L.D. Marks, Phys. Rev. Lett. 86 (2001) 2385.