Over the years, it has become normal for all types of engineers to use process simulation in performing different tasks. Among the tasks that engineers rely on simulation include calculating energy and mass balances in flow-sheets in predicting the performances of alternative processes that can save companies and governments millions of shillings. As such, engineers must define complex flow-sheets as well as process conditions before the simulation process formally begins. It should be noted that desktop computers currently allow sizing, optimization, dynamic calculations, and rating which previously tended to demand large mainframe computers to compute. Additionally, more experts were ...
Essays on Compute
74 samples on this topic
To many students, crafting Compute papers comes easy; others need the help of various kinds. The WowEssays.com collection includes expertly crafted sample essays on Compute and relevant issues. Most definitely, among all those Compute essay examples, you will find a piece that conforms with what you perceive as a decent paper. You can be sure that virtually every Compute work presented here can be used as a glowing example to follow in terms of general structure and composing different chapters of a paper – introduction, main body, or conclusion.
If, however, you have a hard time coming up with a decent Compute essay or don't have even a minute of extra time to explore our sample collection, our free essay writer company can still be of great assistance to you. The matter is, our experts can tailor a sample Compute paper to your individual needs and specific requirements within the defined timespan. Buy college essays today!
Abstract
Statistics involves the collection, analysis, interpretation, and presentation of data. The analysis, interpretation, and presentation techniques use the excel program. The excel features make it easy for statisticians to conduct researches as the program provides a convenient way to enter data into the program and run to determine the actual outcome of research. In particular, the excel program is applied in the statistical research in different forms. For example, it can be applied to a database which stores data to allow easy retrieval for references if need be. In addition, excel allows the calculation of simple and complex statistical ...
Financial management is effective management of monetary resources of the organization. It helps the organization to plan, organize, direct, monitor, and control the financial activities efficiently and run the operations smoothly. I have learned different concepts of financial management in the class. I have learned that financial ratios play are useful in accessing the business performance and provide information about the company’s financial situation. The application of financial ratios allows examining the financial structure of the organization and comparing it with other competitors. I have understood that it helps the financial analyst to implement different strategies and improve ...
Homework 5
When submitting this file, be sure the Be sure you have reviewed this module/week’s lesson and presentations along with the practice data analysis before proceeding to the homework exercises. Complete all analyses in SPSS, then copy and paste your output and graphs into your homework document file. Answer any written questions (such as the text-based questions or the APA Participants section) in the appropriate place within the same file. The data in the columns to the left represent IQ scores of a sample of 30 high school students. In the general population, IQ scores have a mean of ...
Introduction
As the business world of today is highly influenced and driven by globalization pressures, it is imperative that organizations should manage their financial and non-financial resources efficiently and effectively for gaining competitive edge in their respective marketplaces. Equally important is that organizations, particularly manufacturing businesses, should consume their resources and activities wisely so that the costs should be controlled and revenue could be generated. Therefore, the primary focus of this research is to make an important discussion about Activity-Based Costing (ABC) considering different dimensions. Not only is the concept of Activity-Based Costing (ABC) illustrated based on literature review (gained ...
Part 1:
1. Calculate the sample size needed given these factors:
The factors given for calculating the sample size are as follows:
one-tailed t-test with two independent groups of equal size small effect size = 0.2 alpha = 0.05 beta = 0.2 Power = 1 – beta = 1 – 0.2 = 0.8
Using the priori function:
Using the priori function on GPower, the sample size based on the factors above was determined. The results of the analysis are as shown below.
Results:
t tests - Means: Difference between two independent means (two groups)
Analysis: A priori: Compute required sample size
Input: Tail(s) = One Effect size d = 0.2 α err prob = 0.05 Power (1-β err prob) = 0.8 Allocation ratio N2/N1 = 1 Output: Noncentrality parameter δ = 2.4899799 Critical t = 1.6473230 Df = 618 Sample size ...
Part A: Multiple Choice Questions:
The seller must have market power, that is the seller must have some control over price The seller must be able to identify different customer groups with different demand elasticities The seller must be able to prevent arbitrage between the two groups All of the above You’ve just decided to add a new line to your manufacturing plant. Compute the expected loss/profit from the line addition if you estimate the following:
There is a 70% chance that profits will increase by $100,000.
There is a 20% chance that profits will remain the same. There is a 10% chance that profits will decrease by $15,000. Loss of $15,000 ...
Value-at-Risk
Introduction Risk assessment is essential in portfolio management. A portfolio manager has the duty of maximising returns of the portfolio of the assets for each level of risk. Alternatively, a portfolio manager should minimise the risk of the portfolio at any level of return of the portfolio. Several models are used in assessing the risk involved in a portfolio of investments. Value-at-risk is widely applied in determining portfolio risk. We explore the concept of value-at-risk and its usage in portfolio management.
It is a model that measures how much the value of a portfolio could fall over a specified ...
In this paper, we will discuss and describe the application of statistics and probability theory to a real world problem. The purpose of this essay is to demonstrate various statistical skills and retrieve clear and useful information from the Springdale Shopping Survey data. We are working only with variables from 18 to 25. These variables reflect the importance of eight attributes of the customers’ choice in the chosen shopping area. The following variables participate in our research:
Easy to return or exchange goods
High quality of goods Low prices of goods Good variety of sizes or styles The sales staff is helpful or friendly Convenient ...
Management of Information Techniques
Executive Summary E-business is the current normality in modern day business activities owing to advancements in technology. Firms have thus integrated their activities to the internet; the result has ignited competition in the various industries attributed by integration of ICT in business. E-commerce is currently ranked as among the most revenue generating sector. The aim of this report is to identify the role of using IT to generate competitive advantage of firms against one another. The report was drafted by using an example of the Amazon Company to identify the role of incorporating IT in the operations of a ...
Abstract
In the recent times, scientists in the discipline of artificial intelligence are confused which approach closely imitates the structure of a human brain. The best two approaches are bottom-up, or the top-down, and they comprise of both their advantages and disadvantages. The top-down approach has the capability to perform high-level tasks since it is programmed (Russell et.al 27). On the contrary, the bottom-up approach is capable of modeling the lower-level human functions such as motor control, image recognition, and learning capabilities. Each method operates perfectly where the other method is imperfect. Therefore, to establish the advantages and disadvantages of ...
Definition
Gross Domestic Product (GDP) is the sum total of the value of all the final goods and services produced in an economy in a given period of time . The accounting period of GDP is one fiscal year. That is, we account the goods and services produced in a year in our GDP calculations.
Real and Nominal GDP
We have stated GDP as the ‘value’ of goods and services. This value is the money value. That means we multiply each quantity with its price to get the GDP. This is done because all goods and services have different units of measurement. To compute them ...
Is Water Hard or Soft
Standardizing the approximately 0.01M EDTA requires one to pipet 50-mL portions of the Standard (CaCl2) calcium chloride solution to three 250 milliliter volumetric flasks. Afterwards append five droplets of Eriochrome Black T indicator solution, 5-mL of NH3-NH4Cl buffer solution followed by five droplets of magnesium-EDTA convoluted solution. This should then be accompanied by a titration with just about 0.01 molar of the EDTA solution. After doing so, calculate the molarity for EDTA from the data obtained for each titration. Work out the average of these values. Obtain a sample bottle of approximately 500-mL deionized water and pipet three portions of ...
In an Undercover Boss USA Program, the Subway’s Chief Development Officer Don Fertman was chosen to go undercover and perform several jobs in different franchises of the subway. This assignment will analyse the job of sandwich artist and a store manager. The Sandwich Artist, Jessi was observed in the store # 562 Orlando, FL. To analyse Jessi’s job, Don Fertman personally practiced the job of sandwich artist. Later, he interviewed Jessi regards her qualification, age, and background information. The other job analysed was of the store manager, Duane at store # 31255 Buffalo, NY. This store was in an unusual ...
Introduction
The entire concept of both of these things is vital for an organization and the importance of the same thing cannot be derailed from any standpoint. In finance, the name of Financial Modeling is one of them, which has its own significance and importance. Theoretically, financial modeling is basically a task of building an abstract of representation of a real world and financial institution. Financial Model is usually known as a mathematical model represents the asset class of a financial based asset or a portfolio of a business or an individual . The essence of financial modeling is increasing day by day in number of countries ...
Sampling refers to the research technique or method that involves selecting part of the population with a view of developing solutions or drawing conclusions on the entire population. It involves the selection of a portion of the total for investigative purposes. A sampling frame consists of a predetermined number of units from the total population (Burns & Bush, 2008). An ideal sampling frame is that which is able to identify a unit or an element of the population only once. Such a sampling frame is a rarity in practical research because of the existence of defects within the sampling frame. Some common defects within the ...
Question one: static, flexible and activity based budgeting
A flexible budget incorporates elements of change in the level of activities of the firm. The budget allows for its application even in the events the level of activity deviates substantially from the initial expected level of activity. On the other hand, the static budget is geared toward one level of activity. As such, the budget does not find application in scenarios where the activities deviate substantially from the expected level of activity. Activity based budgeting, on the other hand, employs the process of budgeting through the authorization of the activities which facilitate the attainment of the budgeted activities. ...
Abstract
A large amount of the existing research work that has been carried in mobile networking are mainly based on the assumption that there is an existence of a path between the sender and the receiver. Decentralized mobile systems are however exemplified by network partitions and this has been one of the main driving factors towards the study and implementation of the fully context-aware protocols. This protocol is mainly based on the fact that nodes can be exploited as carrier of messages in the network partitions in order to attain delivery of network components. The nodes in context aware protocol can ...
Question 1
Stock flipping refers to buying stocks during an initial public offer with the intention of reselling them immediately at a profit. It is a short term investment strategy that takes advantage of existence of liquid markets. Institutional investors engage more in stock flipping than individual investors since they have more shares availed to them at the offer price .
Investment banks encourage stock flipping for various reasons. If an IPO is allocated only to long term investors, there will be no trade in the secondary market. The stocks will be in the public but they will be illiquid since nobody is selling. ...
Introduction
The decisions that the management makes regarding capital investment and financial management determines the success of any corporation. In essence, the management should make the investment, financing, and dividend decisions carefully to facilitate the maximization of the shareholders’ wealth. Ideally, sound investment decisions ensure that the firm utilizes the existing investment opportunities well. Additionally, sound financing decisions make sure that the firm has necessary sources of fund to use in its investments. What is more, sound dividend decisions ensure that the company retains enough earnings to distribute to the shareholders or use in future investments. The decisions about the ...
Introduction 1
Company Background 1 Discussion Questions 2 1. The Various External Sources of Finance Available to the Company 2 a. Issuance of Common Shares 2 b. Corporate Bonds and Preferred Shares 3 c. Bank Loans 3 2. The Possible Considerations that may have been taken into account by the management when choosing the type of finance. All the relevant considerations explained and placed clearly in the context of the particular circumstances of the chosen quoted company. 4 3. The calculation of the Weighted Average Cost of Capital (WACC) appears to be straightforward in ...
The Dow Jones Industrial Average Yearly Return I have obtained from the following table:
http://www.1stock1.com/1stock1_139.htm
We use the last column.
The U.S. GDP growth rate is below:
We use third column.
- Compute the average, standard deviation and the coefficient of variation of each of the variables. In addition, graph the values of the DJIA on the percentage grow rate of the GDP. I use Minitab 16 statistical software to complete this question:
Descriptive Statistics: GDP per capita growth, %; Dow Jones Rate
Variable Mean StDev CoefVar GDP per capita growth, % 1,755 1,994 113,65 Dow Jones Rate 9,67 15,24 157,63 - Compute a 95% confidence interval for the population mean of each variable.
One-Sample T: GDP per capita growth, %; Dow Jones Rate
Variable N Mean StDev SE Mean 95% CI GDP ...
INTRODUCTION
One of the most fascinating aspects of cloud computing is the autonomy it offers. Though it has been with us, not for long, it is undisputable it has proven to be a vital commercial and SME success catalyst and hopefully will continue for the next decades. Clouds are of interest not only with expanding tendency to outsource IT to cut on management overheads but also to widen existing limited IT infrastructures. Even more notably, they reduce the entrance barrier for new players to deliver their respective goods and services to a wider market with minimal entry and exit costs and infrastructure. ...
Introduction
Throughout human history, there is an array of revolutionary technological innovations. One such innovation is cryptography that brought about a revolution in the society by facilitating privately encrypted messages. I got very much interested in this technology after learning that all the secured data transaction is encrypted. There are majorly two basic types of encryption used asymmetric and symmetric key encryption.
What is RSA encryption?
Symmetric key encryption has one weakness that its integrity is dependent on the exclusive sharing of its private keys. Here, different encryption scheme is needed that is asymmetric or public key encryption. Public key cryptography is a mathematical approach valuable ...
The time has come that the technical problems facing the old design of Airship with Helical Vertical Axis for Wind Turbine (Eagle 14) at High Altitude shall be replaced with a new one that meets engineering standards in order to work more efficiently. A team will handle the proposed project based on a research plan made by the members. The project is expected to produce good results because the team will assign a principal investigator or PI who has a wide experience and record of achievements in the fields of experimental and quantitative design of Airborne Wind Turbine at high altitude. This research ...
The Simple Pendulum
Lab Details (Here)
Lab Partner:
(Partner’s Name) The Simple Pendulum
Introduction
The aim of this experiment was to experimentally find the time period of a simple pendulum, and use to compute the local acceleration due to gravity. These values were compared with the theoretical predictions based on the equation, =2πLg , where T is the time period, L is the effective length of the simple pendulum (measured quantity) and g is the local acceleration due to gravity. In order to compute the total error between the predicted and actual values, the effects of all random errors in each measured quantity ...
Individual Income Tax (North Carolina)
Individual Income Tax (North Carolina) Personal income tax or individual income tax refers to the levied tax on personal income. Here, individual refers to a person, non-juristic body of person, an ordinary person or an individual estate. For an individual to be liable for personal income tax, one has to compute file tax returns, compute tax liability as well as pay the indicated tax as according to the calendar of the year. The individual tax income differs in different states with each state having its own rights of running the tax provided by its residents. This research would look ...
In this paper, various capital budgeting techniques are calculated from the given data which help the financial and project managers to analyze to whether pursue and accept any given project or not . In other words, these techniques depict the idea attempting to magnify the feasibility of any project to create value for the business . These Techniques are mentioned and calculated as follows using the MS-Excel spreadsheet the calculations of which are shown in the Appendix section: It is important to mention that to compute the internal rate of return (IRR), the net present value were computed using two ...
Abstract
The Cloud and Grid computation systems are different computation services or platforms that can help in different tasks. Cloud computing started in late 1990s. It is the form of TCP/IP (Transmission Control Protocol/Internet Protocol) based on advanced development and integration of computer technologies such as huge memory, fast microprocessor, reliable system architecture, and high-speed network. Cloud computing are helpful in solving Internet-level computation problems, which are somewhat different from those of Grid computing. On the other hand, Grids started working in the mid 1990s to compute the large-scale problems with the help of network based resource-sharing commodity machines. Such ...
STEP 1: Create variables
Run frequency tables for the new variables to check that they are accurate Run a frequency table of your dummy variable to check that it is accurate Run a reliability analysis using the following 10 variables: COMPUTE FEAR=q25afearmurder + q25bfearrape + q25cfearweapon + q25dfearhome + q25efearcar + q25ffearmugged + q25gvandal + q25hconned + q25ibeggar + q25jbeaten. EXECUTE. measures of central tendency and dispersion for this new variable o Dependent variable:
Punitive attitudes additive scale
Run a reliability analysis for the following 8 variables The alpha coefficient for the eight items is .832, suggesting that the items have relatively high internal consistency. Cronbach's alpha is a measure of internal consistency, that ...
Valuation Method: FCFF Model
In this section, we will now compute the intrinsic valuation of Air Canada using Discounted Cash Flow Valuation using FCFF method. Referring to the annual report of the company for the latest years, 2011, 2012 and 2013, we found that the company had never paid dividend, hence, it was clear that we cannot go ahead with dividend payments to value the firm. Moreover, FCFF valuation is suitable for firm-wide valuation which is the very essence of our report. Here are some of the rations as why we selected FCFF for valuation of the firm: - As discussed above, ...
Opening Word
It is possible to open Word in the following ways: - Through the start button - Click the Start button - If there has been previous opening of a word document lately, the Microsoft Word icon appears on the list of Start menu. Click on the Word icon to launch a Word document. - If there are no recent openings of word files, the Word icon might not appear. In such a case, click on All Programs, Navigate to Microsoft Office option and click on Microsoft Office Word 2007 from the list of Microsoft Office applications. - ...
Man created machine to semi, or fully, automate tasks that were otherwise resource hungry or redundant. Earlier, machines worked on a specific set of instructions that were hardwired into them. This limitation was outleaped when computer memory came into existence. Today, with the help of sophisticated hardware and advanced software instructions, we can instruct the machine to perform nearly anything. However, we did not stop here and attempted to provide a computer machine additional capabilities. We have managed to manufacture nearly every kind of machine sensor, for example, camera, gyroscope, speakers, microphone etc., which emulates the human sensory reception in a digital ...
All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030- 5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions.
Printed in the United States of America.
ISBN ...
All rights reserved.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, website www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030- 5774, (201)748-6011, fax (201)748-6008, website http://www.wiley.com/go/permissions.
Printed in the United States of America.
ISBN ...
Introduction
The various setbacks to developing and authenticating input distributions are well known in any institutions that deal with risk assessment and analysis. Due to all these, it has been given a considerable attention more recently. There are various strategies of estimating probability distribution from either empirical data or standard approaches, which are limit practical effectiveness especially whenever such data available are limited. Whenever such cases presents themselves, certain mechanisms and strategies are employed. Such include maximum entropy criteria which actually synthesizes distribution from priori constraints. The other mechanism is to employ the use of ‘default’ such include the triangle or ...
<Author’s Name> <Institutional Affiliation> Wolfram Alpha is modern powerful search engines that caters various fields of studies launched in May 2009. The design of these engines initially concentrates on formula and algorithm growth in Mathematics as a result of extensive and sustained data gathering conducted by the team . In the field of mathematics, it provides supports on specific categories of topics such as mathematical functions, algebra, computational sciences, probability and statistics, calculus and analysis, geometry as well as discrete mathematics. Beyond the common mathematical functions, the team of Wolfram recently added Bessel functions, zeta ...
Discussion and Conclusions of Analysis
Financial Ratios are often used to describe the different values of a stock. In the financial industry, there are different ratios that can be computed to determine how overvalued or undervalued a company presently is. One of the most commonly computed financial ratios is the P/E ratio (Price to Earnings). To compute for the P/E ratio, two variable values have to be available; the current and past share price (depends on the time horizon the analyst wants to compute for a particular stock), and the earnings per share . These two variable data can often be found on company disclosure websites and from ...
Solution to tutorial 1
Problem description Three problems that cannot be solved using traditional computing model but can be solved using neural computing include sensor processing, pattern recognition and speech and even text processing. It is because neural networks provide a different approach for data analysis and pattern recognition within the same data as compared to traditional computing approach. Text recognition, sensor processing, pattern recognition and speech recognition are all problems that cannot be well characterized. Therefore, traditional computing can only work well for problem that can be well described in terms of characteristics. These features include balancing checkbooks, keeping tabs of inventory, ...
Abstract
The word technology may be in the talk of time for most individuals, however, little do they know what impacts all this development. The existence of visual systems, audio systems and other complex equipment all give credit to the early discoveries. Discovery of atoms, ions and later electrons simplified everything. It is from theses that energy was developed. One of the most promising techniques used by scientists is the charge to mass ratio of electrons. It helped in observing the nature of materials. This lab report aims at analyzing the Sir J. Thompson`s experiment of evaluating charge to ...
COMPUTE mapproach=(MAppr1_1 + MAppr2_1 + MAppr3_1) / 3.
EXECUTE.
COMPUTE mavoid=(MAvoid1_1 + MAvoid2_1 + MAvoid3_1) / 3.
EXECUTE.
COMPUTE Papproach=(PAppr1_1 + PAppr2_1 + PAppr3_1) / 3. EXECUTE. COMPUTE Pavoid=(PAvoid1_1 + PAvoid2_1 + PAvoid3_1) / 3. EXECUTE. COMPUTE procrastination=(Procrast3_1 + Procrast4_1 + Procrast5_1) / 3. EXECUTE. DESCRIPTIVES VARIABLES=mapproach mavoid Papproach Pavoid procrastination )
Descriptives (Lab 8, 9. step 10)
EXAMINE VARIABLES=mapproach mavoid Papproach Pavoid procrastination /PLOT BOXPLOT STEMLEAF /COMPARE GROUPS /STATISTICS NONE /CINTERVAL 95 /MISSING LISTWISE /NOTOTAL.
Explore
mapproach mapproach Stem-and-Leaf Plot
Frequency Stem & Leaf
8.00 Extremes (=<2.7) 22.00 3 . 00000333333 20.00 3 . 666666666& 46.00 4 . 00000000000333333333333 47.00 4 . ...
SIMPLE VERSUS COMPOUND INTEREST
Difference between Simple and Compound Interest Setting aside security and safety, banks and other financial institutions offer a particular percentage on the amount of money, they borrow or invest. When a client invests his money, the bank pays him an interest. Conversely, when a client borrows money from the bank he earns an interest. In short, interest is charged as a cost of borrowing or it is received as an earning interest method and the other is compound interest that is the more commonly used method by financial institutions.
Computing for simple interest is basically simple. Earnings are computed based only on the
principal amount. The principal is the amount of ...
In 1991, The National Institute of Standards and Technology (NIST) developed Digital Signature Algorithm (DSA) and it was put forward for use in Digital Signature Standards (DSS). It is actually a Federal Information Processing Standard used in digital signatures. It was accepted as FPIS in 1993 and since then it has undergone several improvements with the latest FPIS 186-4 was done in 2013. DSA is used to create a 320 bit signature that contains 512-1024 bit security. Digital Algorithm Signature is advantageous over RSA since it faster and smaller as compared to RSA. It was approved by the government of United ...
{Author Name [first-name middle-name-initials last-name]} {Institution Affiliation [name of Author’s institute]}
Vendors Offering IaaS Public Cloud Services
The description of infrastructure as a service (IaaS) is straightforward. Cloud infrastructure such as storage, servers and networks are available on rent in a pay-as-you-use model. There are many players in this field of public cloud services and below is a classification and comparison of the three most dominant leaders of the industry in IaaS.
IBM SmartCloud
IBM provides cloud computing services called Blue Cloud that presents tools over IBM Cloud to manage large scale applications and database. IBM also offers consulting services to assimilate infrastructure into the cloud. IBM offers ...
Introduction
The field of finance is a broad one and it applies with different aspects in particular. It is required to apply numerous concepts that come under the ambit of financial management and accounting based stances. Among these concepts, the name of Cost of Capital is one of them Organizations use different analytical methods to analyze the cost of capital in particular and among these methods the name of Pure Play Method (PPM) is one of them, which has its own significance and importance lies in a broad nutshell. The main theme of this assignment is to analyze the Cost of ...
1. Capital budgeting utilizes various financial tools in evaluating investment options. Of important consideration in these decisions is the cost of capital, since it determines the returns that will accrue from the investment decision (Brealey, et al 2011) The cost of capital can be two fold, either the published interest rates by the financial institutions, or the average of all the sources of financing for the project, a method called the weighted average cost of capital. (Please see the attached excel workings for the company’s weighted average cost of capital) In determining the most appropriate cost of ...
How should Jonathan describe the rationale of the dividend discount model (DDM) and demonstrate its use in calculating the justifiable price of PCU share? Firstly, Jonathan should explain to Dwayne that there are different methods how a financial or a security analyst can analyze the fundamental and technical aspects of a security, which in this case is the PCU share, including its price, the forecasted growth rates, and a lot of other aspects. There is more than one way of predicting the future stock price of a company . A security analysis can focus on the fundamental aspects of the company such as the ...
Executive Summary
Recommendations made by Jerry on Core Computer Company are good; he can be described as a leader who has a big vision for the company. He has done it before and for Corecompute Company he is ready for the job. Upon his arrival, he has begun identifying issues which are hindering the growth for the company. He has quickly noticed that although the company has grown in terms of employee’s numbers, he is concern that there were no strategic plans to guide the company. Four mangers will be reporting to Jerry and Harry. This is an indication the even the ...
1. What are the main business activities of the selected company? Rosneft is the leader of the petroleum industry in Russia and is the world’s largest publicly traded oil company. Its worldwide business operations include upstream offshore projects, exploration and production of hydrocarbon, refining of crude oil and hydrocarbon, and gas and product marketing. 2. Examine its Balance Sheet. Make a list of different accounts of Assets, distinguishing between Current and Non-Current (Tangible and Intangible), and Liabilities, distinguishing between Current and Long-Term Liabilities. The current asset accounts of Rosneft include cash and cash equivalents, restricted cash, other ...
Validity and Scope of Approximate Methods of Integration
Introduction Addition of discrete numbers is pretty straightforward; more than 80% of the human population can make mental calculations instantly. So when integration was introduced as a kind of addition in a continuous domain, I was not very worried. However, it didn’t take me long to realize that understanding integration is more than solving a bunch of problems using well defined techniques. So in my pursuit to understand the topic well, I decided to research upon how some of these techniques (Trapezium Rule and Simpson’s Rule) came about, how they work, and what they really mean. With this intent, ...
Data compression algorithm for wireless sensor networks
Abstract There is an increased use of wireless networks in organizations. There also the use of Wireless Sensor Network (WSN) that is used for monitoring the environment. The two basic activities that are involved in WSN include data acquisition and data transmission. The problem with the process of transmitting and acquiring tasks is that there is high power consumption. This needs the use of data compression so that there is reduced consumption of power. This paper will analyze algorithms that are used in Wireless Sensor Networks to undertake data compression. In particular, there will be the analysis of ...
Balance sheet review
These companies disclose the several components in the stockholder’s equity. The first component disclosed by Merck & Co. Inc. is common stock. The second component is paid in capital for the company. The third component for Merck & Co. Inc. is retained earnings which are valued at $ 39,985,000. The first item for Novartis International AG is comprehensive income of $ 8,624,000. The other items are equity based compensation, dividends and changes in non-controlling interests (Walter, 2012). These companies have preferred stock. The special feature for Merck & Co. preferred stock is that it is convertible to ordinary stock. ...
Apache Hadoop software library is a framework that enables distributed processing of large data sets across clusters of computers. Hadoop can handle a single server and it can handle multiple machines. This means that scalability is not a problem. It is open source software that is reliable scalable and allows distributed computing. It is being used across enterprises in the storage of big data analytics and it also enables top managers in making business decisions.
Background
There has been a great need by the organizations to store and manage large amount of data referred as Big Data. There is a need to have the storage ...
Data compression algorithm for wireless sensor networks
Abstract There is an increased use of wireless networks in organizations. There also the use of Wireless Sensor Network (WSN) that is used for monitoring the environment. The two basic activities that are involved in WSN include data acquisition and data transmission. The problem with the process of transmitting and acquiring tasks is that there is high power consumption. This needs the use of data compression so that there is reduced consumption of power. This paper will analyze algorithms that are used in Wireless Sensor Networks to undertake data compression. In particular, there will be the analysis of ...
What is outage management planning?
An Outage is a period where there is unavailability of power maybe due to some operations or when the equipment that is supposed to complete the supply is closed down. Outages needs to be managed so that it should be effective during its execution. It will require conduction of a formal review of the former outage, identification of the lessons learned, Identify outage constrains, commit to detailed planning, schedule outage tasks or jobs, prepare matrix, conduct risk analysis, and then execute the outage (Lenahan and Lenahan).
Trans Power outage and the plan scope.
Transpower has a total capacity of 14500 MVA. Is a state owned firm that supply electricity in ...
Introduction
The Four Seasons Hotel management and staff have one golden rule, which is ‘do unto others, as you would have them do unto you’. This means that everyone is treated with dignity, respect and compassion; be it a client or an employee. In order to cultivate such a philosophy and culture in an organization, it is cardinal to have the right people to implement it. To achieve this objective, the Four Seasons Hotels human resource department has a comprehensive program for recruiting, selecting and hiring new employees. Opportunities are provided openly and fairly to all qualified candidates interested in working for the ...
Introduction
Neural Network, or most commonly known as “Artificial Neural Network” is an information processing pattern which are comprised of multiple processors and influenced by how the nervous system processes information. The processors or units, as many researchers would call them, are linked by communication channels and carry numeric data that are acquired by our brain and senses in many different ways. The units function only with the local data acquired and with the information that they have from the connection. It is said that a Neural Network (ANN) learns via examples, just like humans and is capable of handling processes ...
Introduction
Conceptualizing economic concepts is crucial to policy makers and other interested parties such as economics scholars. Ideally, policy makers should sufficiently understand macroeconomic issues such as gross domestic product (GDP), unemployment, inflation, balance of payment, and exchange rate. Although, all macroeconomic variables are equally significant, this paper will lay emphasis on gross domestic product.
Discussion
Despite the many definitions of GDP, Salvin (2010) provide two key definitions. First, GPD has been defined as the expenditure made by the country on the final goods and services that have been produced within the country during the year. Based on his definition, it ...
This report presents the static analysis of a beam that is going to be used for lifting equipment in a building. A commercial software package, SolidWorks, is used to perform a set of FEA simulations. Numerical results are compared with theoretical values of maximum stress and deflection for a cantilever beam. 1. Part A The first part of this report describes a cantilever beam with one end fully constrained and a point force of 5 kN applied at the opposite end. Three cross sections are considered, namely, a wide flange section (I-shape), a T section and a channel cross sections. The beam is made of Mild ...
John Q. Student
“Can machines think?” – Alan Turing, 1950
This is the one question humans have been asking for decades (even centuries) and it is a topic which has been widely explored until this very moment. This question was posed by Alan Turing in his essay way back in the 1950s. As we all know, one core function of computers nowadays is to enable a systematic automation of processes. These processes pertain to tasks that used to be performed by humans manually. However, computers (and machines) have always worked in a fashion where people command every single move it makes, and therefore the computing world is posed with the ...