Thursday, November 28, 2019

Beyond Petroleum Company Analysis

Beyond Petroleum Company Analysis BP, with a tagline â€Å"Beyond Petroleum†, is a company that centers its primary goals in terms of meeting the incessantly heightening demand for fossil fuels, product advancement and transitioning to a lower carbon future. BP learnt some indispensable lessons from the Gulf War when its expansive strategies were undermined.Advertising We will write a custom essay sample on Beyond Petroleum Company Analysis specifically for you for only $16.05 $11/page Learn More The lessons have since resulted into spectacular success through efficient investments, which have proved worthy, both in short and long term while also ensuring that the company has access to growth markets while being able to maximize value chains and reduce costs. In reference to cost cutting and efficient investment, BP in order to reduce costs which was greatly being incurred in wood burning and the use of electricity, BP has resorted to using solar power. Notably, it is always encourage d that financial leadership goals must be in line with company values which in this case are mutual advantage, environmental care and constructive engagement when a company wants to cut costs. In order to achieve these, long and short term goals such as maximization of value chains flexibility and judgments are essential as a result of imposed external events. BP is also in the process of developing a technology to capture and store carbon dioxide. The company officials believe that carbon capture and storage is an overly pertinent contribution in light of the growing need to tackle carbon emission.  Also notable is the BP’s 10 point plan which can be viewed as a unique aspect of the financial strategies used by BP. BP’s 10 point plan to increase value in transparency for its shareholders is in measure to its strengths which include gas value chains, technology, relationships, giant fields and deep water. The 10-point plan also strives to build a stronger and safer c ompany which will in turn guarantee a sustainable value for the company. These strategies measure active portfolio management of investors, they also give insight to whether there is strong balance sheet with gearing which refers to the groups net debt plus equity in the lower half of the 10-20% range, for re-investment purposes half of incremental operating cash to be used while the other half for other purposes, new upstream projects on-stream with unit operating cash margins double the 2011 average (constant oil price $100 per barrel) and lastly generate around 50% more annually in operating cash (Dudley 1).Advertising Looking for essay on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More Statements of directors responsibilities, consolidated financial statements and notes on the same, unaudited supplementary information on oil and natural gas, board performance reports whose primary focus is to provide guidanc e, resources and support required by the organization are all clear proofs that the company has been able to manage its finances effectively. Nonetheless, the annual reports on management, shareholders, directors and senior management as well as competent and skilled employees and management also prove this (BP 1). The proof can be further extracted from emphasis on creating value in a harsh environment which underlines all of BPs activities. However, there is a need for the company to make some adjustment to the statement of the directors’ responsibilities. It can be noted that the statements of the accounts which give an impartial view to state of affairs. In the same light, the relevant notes on accounts, independent auditors report which provides evidence against inadequate representation of fact through fraud or any other errors, adherence to accounting policies and standards and procedures (BP 1). References BP. Performance For All Our Futures. BP. n.d. Web. BP. BPs Bus iness Strategy. BP. n.d. Web. Dudley, B. â€Å"Refining Marketing: Delivering a world class downstream business†. Web.Advertising We will write a custom essay sample on Beyond Petroleum Company Analysis specifically for you for only $16.05 $11/page Learn More

Sunday, November 24, 2019

Criminal Prosecution Cleaning Up Corporate America essays

Criminal Prosecution Cleaning Up Corporate America essays The Enron scandal made news around the world and shocked many who used to believe that corporate heads could be trusted. While the Enron scandal was sensational it was not the first instance of corporate crime nor was it the last. For many years corporate crime has been considered a lesser offense than other crimes. It has been tagged white collar crime for several generations and the prisons which hold the rarely prosecuted offenders are more like country clubs than prisons. In more recent years, given the magnitude and far reaching affects of scandals like Enron the American public has demanded accountability, not only on the part of those who commit the crime but from those who make the decision whether or not to prosecute those involved. Given the current economic climate in the nation concern has grown regarding corporate crime. If Americans are going to see a reduction in crime at the corporate level, it will have to support criminal prosecution as the most common weapon against it. For the past several years the government has gotten more involved in President Bush has gone public with the belief that corporate criminals need to be sent to jail. In several speeches to America Bush has reminded laymen that every time a large scandal is uncovered it has a negative impact on the economy and in these struggling times Americans do not need avoidable negative elements within the system. According to Bush movers and shakers in the corporate world who knowingly falsify financial records of their company belong in prison(Gordon, 2002). Putting his money where his mouth is Bush has appointed a house committee to examine some of the more recent scandals, and one of those examinations resulted in subpoenas compelling testimony by top WorldCom officials in the "Bush made the remarks in a photo session with Russian President Vla ...

Thursday, November 21, 2019

Albert Einstein's Philadelphia Experiment Essay Example | Topics and Well Written Essays - 750 words

Albert Einstein's Philadelphia Experiment - Essay Example The Philadelphia experiment was done on a Navy destroyer escort, the USS Eldridge, which was fitted with required equipment and generators, began in the summers of 1943 and was initially a success to a limited degree. First, the experiment was conducted using domestic Animals on a ship; the animals were placed in metal cages on the USS Eldridge, the ship became invisible but when it materialized many of the animals were missing and some had radiation and burn marks on them, for the first time humans were not be tested. Yet the next time the Experiment was performed with a full crew aboard reportedly underwent the Philadelphia Experiment. The men on board did not know what was happening; they were only told that they were going to be made invisible with the ship. For the second time Eldridge being rendered almost completely invisible, with some eyewitnesses reporting a greenish fog; however, crew members complained of serious nausea afterward. At that time the experiment was altered b y the Navy, with the new goal being invisible to radar only. Equipments used were not recalibrated, and the Experiment was performed again with a new crew member and few scientists. This time, Eldridge not only actually became almost entirely invisible to the naked eye but actually vanished from the area entirely. Concurrent with the phenomenon, the U.S Naval base at Norfolk, Virginia, just over 375 miles away, reported sighting the Eldridge vanished again and reappeared in the Philadelphia, not only it was vanished and moved miles away but it was also years away. The effect of this experiment on the crew members was profound and almost all of the crew members were violently ill. Some suffered from mental illness because of the experience; behavior conforming to schizophrenia is described in some accounts. Some of the members were missing supposedly vanished and some were actually fused to the mental bulkhead. Some of the Survivors of the experiment said that they were horrified by the experiment and tried to jump out of the ship and went through a time travel, they were in the year 1983 and they met the scientist who was with them on the ship, they were very much scared and were asked to shut down the Machine on the ship and when they returned to the ship they switched off the machine, but it was too late. Some of the other sailor also went through time travel, they found themselves in a

Wednesday, November 20, 2019

Supply chain management Essay Example | Topics and Well Written Essays - 2500 words - 3

Supply chain management - Essay Example To achieve this objective, there is a need of an organization to have an efficient supply chain that will make it possible for the organization to supply their products without passing on the extra costs of supply to their customers. In achieving this objective, the organization under consideration will manage to obtain a competitive advantage over its competitors. However, this is not the case, and it is because there are a variety of factors that determine the supply chain of a product. Some of these factors are beyond the control of business organizations (Lee and Lee, 2007). This is because they are influenced by the environmental conditions. This research paper is an examination of the global supply chain of coffee. It is important to denote that coffee is an important product, that is traded worldwide, and the balance of trade in regard to coffee production and manufacturing, is in favor of the developed countries, as opposed to the developing countries (Lindgreen and Maon, 2013). Coffee is one of the major sources of revenue for less developed countries, and it is always grown on large scale, for purposes of exportation. On this basis, coffee is a very valuable crop in less developed countries, since it is a source of livelihood. In analyzing the global supply chain of coffee, this paper will identify the power in which different actors in this supply chain hold in the market. It is important to denote that most production of coffee emanates from the third world countries, while the manufacturers of this coffee, popularly referred to as roasters are found in the first world countries. Global trade in coffee has been made possible because of the international liberalization of trade. Liberalization of trade involves reducing international barriers to trade in services and goods (Sherer, 2005). This principle is based on the concept that a market works better and most efficiently when competition existing in it, is less regulated. It is important to

Monday, November 18, 2019

Economics assignment Example | Topics and Well Written Essays - 750 words

Economics - Assignment Example To avoid this situation particularly when it is occasioned by the fact that the involved firms receive inputs from input suppliers and are attempting to innovate to produce differentiated products and even seeking patent of those products, is by the firms involved getting integrated vertically so that they can reduce some of the dead weight losses. Sometimes it would be necessary that the firms involved within the particular supply chain get to mergers and acquisition. One of the ways in which double marginalization may be solved is by Suppressing the Double marginalization. This can be done by avoiding the firms involved in unnecessarily applying for mark-ups over the cost of their own outputs; rather, they should increase their overall profits through internal suppression of the double marginalization. This should be strategically done by ensuring that they transfer the intermediate costs of the products they have through the application of a single optimal mark-ups. The above solution coincides with the profit maximization solution of innovating and producing up to the point where marginal cost equal marginal revenue. Like any other good practice in profit maximization in business, overcoming double marginalization solves the problem of losses. in the case of application of the marginal cost equals to marginal cost revenue, a firm will attempt to produce that additional production which will assure it of additional revenue. At the point where the marginal cost rises to equal the marginal revenue, it can then be said that the firm is maximizing the profit. The rule usually demands that; in the event that the marginal cost gets greater than marginal revenue, the firm must cut down on its cost. This is why by avoiding the dead weight loss through the reduction of double marginalization; the firm automatically reduces on its cost. 2) Suppose firms A and B are going head to head developing new products

Friday, November 15, 2019

Privacy Preserving Data Mining in Partitioned Databases

Privacy Preserving Data Mining in Partitioned Databases A survey : Privacy preserving data mining in horizontally partitioned databases Komal Kapadia, Ms.Raksha Chauhan _______________________________________________________________________________________________________ Abstract – Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective information sharing between organizations becomes a vital requirement in today’s society. Privacy preserving data mining deals with hiding an individual’s sensitive identity without sacrificing the usability of data. Whenever we are concerning with data mining, Security is measure issue while extracting data. Privacy Preserving Data Mining concerns with the security of data and provide the data on demand as well as amount of data that is required. Index Terms – data mining, privacy preserving, ECC cryptography, randomized response technique. _______________________________________________________________________________________________ INTRODUCTION Data mining techniques have been widely used in many areas especially for strategic decision making. The main threat of data mining is to security and privacy of data residing in large data stores. Some of the information considered as private and secret can be bought out with advanced data mining tools. Different research efforts are under way to address this problem of privacy preserving and preserving security. The privacy term has wide range of different meanings. For example, in the context of the health insurance accountability and portability act privacy rule, privacy means the individual’s ability to control who has the access to personal health care information. In organization, privacy means that it involves the definition of policies stating which information is collected, how it is used, how customers are involved and informed in this process. We can considering privacy as â€Å"Individual’s desire and ability to keep certain information about themselves hi dden from others.† Privacy preserving data mining refers to the area of data mining that seeks to safeguard sensitive information from unsolicited disclosure. Historically, issues related to PPDM were first studied by the national statistical agencies interested in collecting private social and economical data, such as census and tax records, and making it available for analysis by public servants, companies, and researchers. Building accurate socio-economical models is vital for business planning and public policy. Yet, there is no way of knowing in advance what models may be needed, nor is it feasible for the statistical agency to perform all data processing for everyone, playing the role of a â€Å"trusted third party†. Instead, the agency provides the data in a sanitized form that allows statistical processing and protects the privacy of individual records, solving a problem known as privacy preserving data publishing. There are many methods for preserving the priva cy. In this surevey many methods try to compute the answer to the mining without revealing any additional information about user privacy. Progress in scientific research depends on the sharing and availability of information and ideas. But the researchers are mainly focusing on preserving the security or privacy of individuals. This issue leads to an emerging research area, privacy preserving data mining. For privacy preserving data mining, many authors proposed many technologies. The main aim of this paper is, to develop efficient methodology to find privacy preserving. LITERATURE SURVEY We have studied some of the related work for the privacy preserving in horizontally partitioned databases. Existing work for privacy preserving in horizonatally partitioned database has different types of techniques. TYPES OF PRIVACY PRESERVING TECHNIQUES Semi honest party Without trusted party With trusted party In without trusted party each party will calculate their own partial support and add their own random number and sends the result to the next party in the ring so that the other party will never know the result of others and in last the initiator party will disclose the result that is global support. In trusted party each party will calculate their partial support and send to the trusted party and add the own random number and send to the next coming site in the ring so that other party will never know the result of other parties after that trusted party will disclose the result and send to all sites that presents in the ring. Fig. 1 Framework of privacy preserving data mining[5] SECURE MULTIPARTY COMMUNICATION Approximately all Privacy Preserving data mining techniques rely on Secure multi party communication protocol. Secure multi party communication is defined as a computation protocol at the last part of which no party involved knows anything else except its own inputs the outcome, i.e. the view of each party during the execution can be effectively simulated by the input and output of the party. Secure multi party communication has commonly concentrated on two models of security. The semi-honest model assumes that every party follows the rule of the protocol, but is free to later use what it sees during execution of the protocol. The malicious model assumes that parties can arbitrarily cheat and such cheating will not compromise moreover security or the outcome, i.e. the results from the malicious party will be correct or the malicious party will be detected. Most of the Privacy Preserving data mining techniques assume an intermediate model, Preserving Privacy with non-colluding parties . A malicious party May dishonest the results, but will not be able to learn the private data of other parties without colluding with another party. (1)MHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE M. Hussein et al.’s Scheme (MHS) was introduced to improve privacy or security and try to reduce communication cost on increasing number of sites. Behind this main idea was to use effective cryptosystem and rearrange the communication path. For this, two sites were discovered. This algorithm works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites. This scenario was able to decrease communication time. Fig. shows MHS algorithm. The working of the algorithm is as follows: The initiator generates RSA public key and a private key. It sends the public key to combiner and all other client sites. 2. Each site, except initiator computes frequent itemset and local support for each frequent itemset using Local Data Mining . 3. All Client sites encrypt their computed data using public key and send it to the combiner. 4. The combiner merges the received data with its own encrypted data, encrypts it again and sends it to initiator to find global association rules. 5. Initiator decrypts the received data using the private key. Then it merges its own local data mining data and computes to find global results. 6. Finally, it finds global association rules and sends it to all other sites. Fig.2 MHS algorithm[11] (2) EMHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE Enhanced M. Hussein et al.’s Scheme (EMHS) was introduced to improve privacy and reduce communication cost on increasing number of sites. This algorithm also works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites . But this algorithm works on the concept of MFI (Maximal Frequent Itemset) instead of Frequent Itemset. a) MFI (Maximal Frequent Itemset): A Frequent Itemset which is not a subset of any other frequent itemset is called MFI. By using MFI, communication cost is reduced . b) RSA (Rivest, Shamir, Adleman) Algorithm: one of the widely used public key cryptosystem. It is based on keeping factoring product of two large prime numbers secret. Breaking RSA encryption is tough. (3)MODIFIED EMHS ALGORITHM FOR HORIZONTALLY PARTIOTION DATABASE In this technique, they used modified EMHS algorithm for improving its efficiency by using Elliptic curve cryptography. Here Elgamal cryptography technique is used which is of ECC for homomorphic encryption. ELLIPTIC CURVE CRYPTOGRAPHY Elliptic curve cryptography provides public cryptosystem based on the descrete logarithm problem over integer modulo a prime. Elliptic curve cryptosystem requires much shorter key length to provide a security level same as RSA with larger key length. In this elgamal cryptography is used. ELGAMAL CRYPTOGRAPHY a)A wishes to exchange message M with B[9]. b) B first chooses Prime Number p, Generator g and private key x. c)B computes its Public Key Y = gx mod p and sends it to A. d) Now A chooses a random number k. e) A calculates one time key K = Yk mod p. f) A calculates C1 = gk mod p and C2 = M*K mod p and sends (C1,C2) to B. g) B calculates K = C1x mod p h) B calculates K-1 = inverse of K mod p i)B recovers M = K-1 * C2 mod p j) Thus, Message M is exchanged between A and B securely. In this system, Elgamal cryptography paillier cryptosystem is used. Here, Elgamal cryptography is used for security purpose. Compared to EMHS algorithm here performance is better in terms of computation time. RANDOMIZED RESPONSE TECHNIQUE In this technique, here mainly focused on CK secure sum in randomized response technique for privacy preserving. Here, the multi party transaction data who discover frequent item sets with minimum support. In the randomized response technique, consider the data sets I = {I1, I2, I3†¦Ã¢â‚¬ ¦In} and the random number or noise part are denoted by R= {R1, R2, R3 †¦Rn}, the new set of records are denoted by I1+R1, I2+R2 †¦.In+Rn and after that take a partial support Pij = {Pi1, Pi2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Pin} so that partial support is P ij=I+R[10] I=Pij-R[10] In Randomized response secure sum technique, secure sum each site will determine their own data value and send to predecessor site that near to original site and this goes on till the original site collects all the value of data after that the parent site will determine the global support. CK SECURE SUM ALGORITHM[10] Step1:-Consider parties P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Pn. Step2:-Each party will generate their own random number R1, R2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.RN Step3:-Connect the parties in the ring (P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦PN) and let P1 is a protocol initiator. Step4:-Let RC=N, and Pij=0 (RC is round counter and Pij is partial support) Step5:-Partial support P1 site calculating by using following formula Psij = Xij.support – Min support * |DB| + RN1 – RNn Step6:-Site P2 computes the PSj for each item received the list using the List using the formula, PSij= PSij + Xij. Support – minimum support * |DB| +Rn1-Rn (i-1) Step7:-While RC! =0 begin for j=1 to N do begin for I=1 to N do Step8:-P1 exchange its position to P (j+1) mod N and RC=RC-1 end Step9:-Party P1 allowance the result Pij Step10:-End In ck secure sum technique, mainly focused on for computing global support within a scenario of homogeneous database and provides the high security to the database and hacking of data is zero. CONCLUSION In this paper we reviewed five privacy preserving technique in horizontally partitioned database. In MHS algorithm RSA cryptography is used. In EMHS algorithm, by using MFI approach accuracy is high compared to MHS. Modified EMHS algorithm used elgamal technique so privacy is high than EMHS technique. Randomized response technique provides high security to the database compared to other techniques. In future we can compute less number of rounds instead of n number of rounds. Here , we can use encryption technique for encrypting random number and sends it to the predecessor. REFERENCES [1] Neelamadhab Padhy, Dr. Pragnyaban Mishra Rasmita Panigrahi. â€Å"The Survey of Data Mining Applications and Feature Scope.† 2012 IJCSEIT. [2] Xinjun qi, Mingkui zong. â€Å"An overview of privacy preserving data mining.† 2011 ICESE. [3] Kishori pawar, Y.B. gurav. â€Å"Overview of privacy in horizontally distributed databases.† 2014 IJIRAE. [4] Manish Sharma, Atul chaudhary , Manish mathuria Shalini chaudhary. â€Å"A review study on the privacy preserving data mining techniques and approaches.†. 2013 IJCST. [5] Shweta taneja, shashank khanna, sugandha tilwalia, ankita. â€Å"A review on privacy preserving data mining: techniques and research challenges.† 2014 IJCSIT. [6] Jayanti dansana, Raghvendra kumar Jyotirmayee rautaray. â€Å"Techniques for privacy preserving association rule mining in distributed database.† 2012 IJCSITS. [7] Xuan canh nguyen, Tung anh cao. â€Å"An enhanced scheme for privacy preserving association rules minig on horizonatally distributed databases.† 2012 IEEE. [8] Manish Sharma, Atul chaudhary, Manish mathuria, Shalini chaudhary Santosh kumar. â€Å"An efficient approach for privacy preserving in data mining.† 2014 IEEE. [9] Rachit v. Adhvaryu, Nikunj h. Domadiya. â€Å"Privacy preserving in association rule mining on horizontally partitioned database.† 2014 IJARCET. [10] Jayanti Dansana , Raghvendra Kumar , Debadutta Dey. â€Å"Privacy preservation in horizontally partitioned databases using randomized response technique.† 2013 IEEE. [11] Rachit v. Adhvaryu, Nikunj h. Domadiya, â€Å"Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database†. 2014 IJEDR. [12] Agrawal D. Aggarwal C. C. On the Design and Quantification of Privacy-Preserving Data Mining Algorithms.ACM PODS Conference, 2002. [13] D.W.Cheung,etal.,Ecient Mining of Association Rules in Distributed Databases, IEEE Trans. Knowledge and Data Eng., vol. 8, no. 6, 1996,pp.911-922.

Wednesday, November 13, 2019

Depression Essay -- Depressed Illness Psychology Essays

â€Å"Mom is sad all the time. She cries a lot. Sometimes she doesn’t get up in the morning. She stays in bed until late in the afternoon with covers pulled up around her ears. At first I didn’t worry. She’d stay in bed for a day or two and then get up again, and I’d think she was better. But after a couple of weeks, she didn’t eat much any more, and she stayed in her room most of the time†Ã¢â‚¬ ¦Ã¢â‚¬ ¦ â€Å"She has something called depression† (DenBoer, Helen 1-2).   Ã‚  Ã‚  Ã‚  Ã‚  Most people today do not think that depression is an illness. In fact most people think that depression is a moral failure. â€Å"Some 400,000 patients are treated for depression in the United States annually, most as outpatients and most by non-psychiatric physicians† (Hollister, Leo E 80). In 1989, major depression cost the nation at least $27 billion in medical care, worker absenteeism, and related costs. In 2002, â€Å"as many as 14 million people in the United States had symptoms of depression, resulting in a prevalence rate of 3% to 7% of the general population. This led to a loss of approximately $40 billion dollars a year in productivity (Breen, Robert and McCormac, Rupert 1). Everyone at one time or another has felt depressed, sad, or blue. Being depressed is a normal reaction to loss, life's struggles, or an injured self-esteem. But sometimes the feeling of sadness becomes intense, lasting for long periods of time and preventing a person from leading a normal life. In fact depression is often considered a "female disease," since affected women reportedly outnumber men by four to one. Yet male depression may be more. â€Å"Many men try to hide their condition, thinking it unmanly to act moody. And it works: National studies suggest that doctors miss the diagnosis in men a full 70% of the time† (Real, Terrance 1). But male depression also stays hidden because men tend to express depression differently than women do. Depressed women are more likely to talk abut their problems and reach out for help, while depressed men will often turn to some action or substance for relief. Men often attempt to escape pain by overusing alcohol or drugs, working exces sively or seeking extramarital affairs. They go into isolation, withdrawing from loved ones, and they may lash out, becoming irritable or violent (Real, Terrance 1). The American National Institute of National health has defined depression as an illness that invo... ...,000 possible; many suicides are not reported† (Hollister 80). Suicide often isn’t listed as the cause of death, even if it suspected as it doesn’t reflect the number of people who commit suicide by not eating, by abusing alcohol and medications, or by simply losing the will to live. Because of the low energy levels and impeded thought process that accompany severe depression, a patient may be unable to act on their suicidal thoughts at first. Close monitoring in such cases is very important. Depression in all its forms affects a lot of people around the world. It is an illness that has gone untreated and unrecognized for a long time. Depression affects the lives of the people affected and puts a burden on the community and family members. It is important for everyone to recognize that depression is an illness that requires treatment and assistance. It is perhaps the most common medical condition seen by primary care physicians today, and rapidly evolving drug therapy present management challenges. However at least newer medications are good, helpful and carry fewer risks with small side effects. Accurate diagnosis still remains the main focus point for effective patient care.