Thursday, December 26, 2019

The Tit-for-Tat Strategy in the Context of Game Theory

In the context of game theory,  tit-for-tat is a strategy in a repeated game (or a series of similar games). Procedurally, the tit-for-tat strategy is to choose the cooperate action in the first round and, in subsequent rounds of play, choose the action that the other player chose in the previous round. This strategy generally results in a situation where cooperation is sustained once it begins, but noncooperative behavior is punished by a lack of cooperation in the next round of play.

Tuesday, December 17, 2019

Symptoms And Treatment Of 911 - 702 Words

A 55-year-old mother of 3three is brought to the emergency department shortly after being found lying on her bed by her neighbor. They usually have coffee in the afternoon and when her friend did not answer the door, her neighbor let herself in. Upon finding the patient, the neighbor called 911. First responders reported numerous bottles of medications next to the patient’s bed, but mistakenly did not grab them. In the emergency department, the patient is is lethargic and disoriented to person, place, and time. Her husband and three children have not arrived and a clear past and present medical history cannot be taken. The patient begins to become restless and mumble incoherently and intermittently loses consciousness. Physical Examination: Vital signs: Blood Ppressure: 120/78 mmHg, Hheart Rrate: 92 beats/min, Rrespirations: rate 15 breaths/min, O2 Soxygen saturation: 97% on room air General: not Not oriented to person, place, and time, acute distress secondary to intoxication Head: nNormocephalic, atraumatic Eyes: Pupils equal, dilated, and reactive, sclera anicteric Mouth: mMucosa dry, no exudate, erythema, lesions, thrush, or jaundice Cardiac: rRegular rate and rhythm, no murmurs, rubs, or gallops; no JVD, thrills, or heaves; PMI non-displaced at 5th intercostal space Respiratory: nNormal breath sounds present in all lung fields; no wheezing, rattles, crackles, or rhonchi Gastrointestinal: soft, non-tender, non-distended; bowel sounds present in all four quadrantsShow MoreRelatedHeart Attacks : A Heart Attack1468 Words   |  6 PagesCoronary Thrombosis, and even Coronary Occlusion. People who may be at risk are people who have smoked cigarettes, have high blood pressure, have high blood cholesterol, obesity, and also lack of physical activity. If you know someone that had these symptoms than they may be at risk for a heart attack. Here are some more some more facts about heart attacks. Causes Most heart attacks happen due to Coronary Heart Disease (CHD). Coronary Heart Disease occurs when plaque starts to build up and get stuckRead MorePreventing Diabetes Essay714 Words   |  3 Pagesare sick, check your ketones every 4 to 6 hours. ââ€"‹ If you develop symptoms of DKA, check your ketones. †¢ If you have ketones in your urine: ââ€"‹ Contact your health care provider right away. ââ€"‹ Do not exercise. †¢ If you have ketones in your urine, high blood glucose, and symptoms of DKA, get help right away. Call your local emergency services (911 in the U.S.). †¢ Know the symptoms of DKA so that you can get treatment as soon as possible. †¢ Make sure that people at work, home, and schoolRead MoreCauses And Symptoms Of Cerebral Vascular Accidents1109 Words   |  5 PagesCerebral vascular accidents are also known as strokes. Strokes can cause minimal to severe brain damage which can affect a person’s quality of life. This paper covers the definition, signs and symptoms, treatments, causes, prevention and what a nursing assistant can do to help someone recovering from a stroke. Definition: According to our American Red Cross Nursing Assistant text a cerebral vascular accident, C.V.A., or stroke occurs when blood ï ¬â€šow to a part of the brain is interrupted. The lossRead MoreA Child with Bipolar Disorder Makes Parenting Difficult Essays666 Words   |  3 Pagesdisorder should not to be mistaken with the occasional ups or downs many people go through. The National Institute of Mental Health’s website provides parents valuable information of the disorder’s symptoms and treatments, as well as information on how to live with a child with bipolar disorder. Symptoms of bipolar disorder often appear in the person’s late teens or early adult. However, some signs are developed during childhood. Children with bipolar disorder often experience periods of intense emotionalRead MoreWhy Sane Individuals Can Be Distinguished From Insane Individuals1340 Words   |  6 Pagesreceive treatment they do not need, and possibly not receive the treatment that they do need. This causes countless problems for the patient, including difficulty acquiring a job, legal, personal, and social stigmas. Worse yet, Rosenhan (1973) said, â€Å"Having once been labeled schizophrenic there is nothing the pseudopatient [patient] can do to overcome the tag†. Ronson pointed out in his video that there is a fine line between sane and insane. Many people may have some of the symptoms of a psychopathRead MoreThe American Heart Associations Website: Credibility Assessment738 Words   |  3 Pagesnutrition and other heart-related health care matters. Information Reported as the most popular articles published online the American Heart Association website are those addressing such as: (1) blood pressure readings; (2) heart attack symptoms in women; (3) the symptoms of high blood pressure; (4) low blood pressure; and (5) cholesterol levels. Objectivity Research findings are presented objectively by the American Heart Association website which reports the findings from many various types of studiesRead MoreAsthma And Its Effects On Asthma1066 Words   |  5 Pagesthe airways even more. This is a chain reaction that can result in asthma symptoms. The symptoms of asthma can happen each time the airways are inflamed. The symptoms can be mild and go away on their own, or after minimal treatment with asthma medication. If the symptoms get worse or more intense and get worse you are having an asthma attack. Asthma attacks are also called flare ups or exacerbations. The signs and symptoms of asthma: Coughing is often worse at night or early morning, making it hardRead MoreBipolar Disorder ( Bipolar )700 Words   |  3 Pagesbipolar II. Bipolar II isn’t as severe but it’s a pattern in which there are no full blown mania phases. The third type is bipolar disorder not otherwise specified. This is when you are told you have a bi polar disorder but you don’t show any of the symptoms for bipolar I or II. The last is cyclothymic. Cyclothymic is a very minimum form of bipolar. People with cyclothymia have episodes of hypomania as well as mild depression for at least 2 years (Bipolar Disorder in Adults. (2012, January 1)). ThisRead MoreA Psychology For My Behavioral Forensics Certificate899 Words   |  4 Pagesthings were. I left extremely stressful job as a 911 dispatcher and decided to go back to school. The symptoms I was having were increasing in intensity. I had tremors that rendered me unable to write or do the lab work f or my original major, Forensic Science. So I changed major to Criminal Justice and set my new goals for law school. However, last semester as my health grew increasingly worse, I was finally able to link all of the symptoms together to discover the problem was not a mental disorderRead MoreDiabetes: Diabetic Emergencies1060 Words   |  5 Pagesand carry it to your body cells where it can be used for energy. There are two types of diabetes; Type I (insulin dependent) and Type II (non-insulin dependent). Both types can cause a diabetic emergency. Both types require medical intervention/treatment. So what is a diabetic emergency? A diabetic emergency occurs when there is a severe imbalance between the amount of insulin and sugar in the body. There are two conditions that may result in a diabetic emergency. 1. Not enough insulin. This

Monday, December 9, 2019

Telecommunication And Networks Samples †MyAssignmenthelp.com

Question: Discuss about the Telecommunication And Networks. Answer: Introduction The shire city council is responsible for managing and maintenance of road. The organization mainly focuses on smart city development. The organization mainly focuses on maintenance of road in suburban and semirural areas (Nakamura and Chow-White, 2013). As a result of development on continuous level shire is focused to provide maintenance and is looking for certain number of ways which can be monitoring and maintenance of road. The organization mainly focuses on the systematical collection of data of all roads with in the state. It focuses on the ability to determine the state of road from the available data prior to repairing. In coming pages of the report a comparison has been provided between two technologies for the council area of shire city (Robbins and Judge 2012). The report also addresses on current area of council and prediction of future needs of this Shire city. In the discussion portion various parameters like infrastructure that is internet connection and wireless technologies has been discussed. A brief idea has been provided regarding the existing wireless technologies like LoRaWAN and OpenIoT. After that an idea has been provided regarding the data storage and its use along with various kinds of processing facilities. Infrastructure This particular organization that is The shire city council focus on planning of smart city. The organization focus on maintenance of road for thousands of kilometers of road throughout the urban area both in suburban and semi-rural areas or zones (Usman and Miranda-Moreno, 2012). So various kinds of technologies have suggested for proper management and monitoring of road maintenance with The Shire. It mainly focuses on systematical collection of data of various kinds of roads with the city. This mainly checks the ability for analyzing the data of road from various kinds of maintenance. Internet connection Internet connection can be easily used for proper maintenance of traffic with the help of various kinds of sensor devices, RFID tags, global positioning system (GPS). IOT mainly helps in analyzing collection of information and integration of information based on traffic and analysis of information of traffic in a large area automatically and intelligent way (Gao and Zhang, 2013). Traffic generally require certain number of information about traffic and logistic which is generally available on road. With the help of internet system can easily become more reliable and intelligent. With a large number of WSN and sensor based communication an IOT based on traffic data will be easily generated. This particular type of traffic monitoring application need to be protected so that various kinds of security attacks can be prevented in various urban cities. The enabling technologies mainly focusses on building blocks for sensing communication technologies in various kinds of IOT like Wireless S ensor Networks (WSN) and various kinds of RFID based networks. Wireless technologies RFID is generally considered to be leading technologies because of its low cost, strong kind of support from various kinds of business communities (Denisov, Kamaev, and Kizim, 2013). With the help of RFID technology every object can be easily transformed into a smart object. Sensors networks generally integrate various kinds of technologies like sensors, distributed information processing, embedded computing and various kinds of wireless communication. Sensor and RFID plays a significant role in the building of various kinds of IOT based products. Various RFID and sensor with the power of communication and computing are connected to wireless networks (Sultana, Rahman and Chowdhury, 2013). They generally cooperate with each other for the collection of information with the physical world to accomplishing of various kinds of task. Other required components are mainly inclusive of cloud, storing, processing and various kinds of communication technologies (Huidrom, Das and Sud, 2013). The major kind of wireless technology which can be used for building wireless sensors are WPAN (Wireless Personal area network) and Wireless local area Network (Wi-Fi), wireless wide area network. A typical structure which is based on RFID generally consist of low end RFID networks which generated data and high end RFID sensors nodes which is used for low nodes. In this technology data is collected by various kinds of high nodes are sent to various kinds of mobile static nodes. Reader generally transmit data which is transmitted to various kinds of wireless devices (Frow et al., 2015). This device generally provides certain amount of processing of data and after that it is sent to various kinds computational server with the help of internet. Existing Technology solution:Open IOT Incorporation of various kinds of roadways into IOT network can be considered to one of the difficult thing when people start to easily think of smart road (Thompson and Visser, 2013). This mainly result due to current roadways which do not know the way of using internet of things. Roadways which does not have any kind of connection to various kinds of network devices. At present various kinds of various kinds of systems are there which can easily incorporate various kinds of IOT devices. Lora WAN LoRaWAN is nothing but a medium access control (MAC) protocol which is in various kinds of wide area networks. It is designed in such a way that it can easily provide communication with various kinds of Internet connected or device over a long range of wireless communication (Thompson et al., 2014). It is generally mapped into second and third kind of layer which is based on OSI models. It is used in road technology because it can easily provide communication over a large distance. Data storage and processing facilities: Data centers A data center is nothing but a facility which generally consist of various kinds of network computers and storage which can be easily used for organizing, processing and storing of large value or amount of data (Haiduzzaman et al., 2014). Datacenters are considered to be an important tool which can be used for maintenance of various roads. It can easily store data related to various kinds of information of roads very easily. Cloud computing Cloud computing enables various kinds of organization to easily consume a computable amount of resources (Botta et al., 2014). There are certain number of benefits of cloud computing like provisioning of self-services, elasticity, easy migration of facility. There are large number of benefits for using cloud computing that are reduction in the implementation and cost of maintenance with is generally involved in it. It can easily increase the mobility for various kinds of global workforce. Contrast and Comparison WAN that is wide area network can be easily used in a network which generally exist over a large area. This technology generally exists over in managing and monitoring of various kinds of roads. A WAN is a useful technology for connecting various kinds of smaller networks which is inclusive of LAN (Local Area Network) and MAN (Metro Area Network). A WAN is generally used for connecting more than one LAN over a large geographical area. WAN services are considered to be much cheaper in comparison so other kinds of services (Rittinghouse and Ransome, 2016). Whenever there is issue of security like troubleshooting. It mainly addresses or focusses on various kinds of anti-malware protection, proxy servers and prevention of any kind of intrusion. Apart from elimination of need for ISDN, WAN services will help in reduction of cost and increasing the profits in large number of ways. Radio frequency identification (RFID) is known to be an emerging technology which makes of radio frequency waves for transferring of data between reader and movable item which is generally tagged. This again used for identification and tracking of it. RFID can be easily used act like a transponder in the registration of various kinds of vehicle (Jamil and Zaki, 2016). RFID tag and sensor can be used so that individual car can easily get data if needed from the spot and can be delivered to assigned destination. The RIFDtag can easily store information on vehicle and its owner which consist of number plate and type of vehicle, speed and time when the particular reaches the point. It can be used for estimation of number of vehicle in the road and average speed of vehicle. The data containing information from each vehicle is generally captured with the help of RFID reader and the information of vehicle can be easily transmitted over central server unit. As soon as the system is connected to internet then all the information of vehicle on the various kinds of road segment is saved in the database which can again be utilized for any purpose or application. This particular node sends for provides data which can be easily send to the cluster head note (Xia et al., 2012). At the same time a GPS receiver which is installed on the monitoring station which can easily communicate with the various kinds of GPS satellite which is used for obtaining of obtaining the information of positioning which is generally considered as the position parameter of the vehicle (Wortmann and Flchter, 2015). After that the data is transmitted by making use of GPRS scheme which is generally based on real time central kind of database and it creates a platform where data can be easily updated on a regular basis. RFID are generally of two types namely active RFID and passive RFID. RFID readers can easily cost between 1250 dollars to 20000 dollars while on the contrary passive reader cost between 3000 dollars to 20000 dollars (Ruiz et al., 2012). Security issue in RFID can be easily classified into types namely violation of privacy and violation of security. In case of privacy violation attackers mainly tries to harvest information from the provided object by analyzing the communication between object and reader by proper tracking of it. In case of security violation an adversary generally checks the behavior of tag or reader by providing undesirable kind of communication (Dupont et al., 2012). This type of security attacks generally damages the various kinds of physical tag and the communication which lies between tag and reader or the application of system which generally requires various kinds of RFID technology. RFID tag are very easy to use as it contains information from the tags which i s transferred through radio waves and unlike bar codes a line of sight between the reader and tag is not required in general (Streimikiene, BaleÃ… ¾entis and BaleÃ… ¾entien?, 2013). Various kinds of RFID tags can be easily used in short time which does not require any kind of handling. Conclusion From the above discussion it can be easily concluded that this report is all about suggesting new ways which can be used for management and monitoring of road. This organization that is shire is focused for maintenance of road in various kilometers of road in urban and semirural areas of the smart city. Every year the organization focuses on repairing of road not only because of torrential rain but also because of general type of wear and tear. The shire needs infrastructure which can be used for collection of data in a systematic way of all the road within the smart city. The infrastructure focuses on determination of data from all kinds of roads and providing an information for work orders for various kinds of crew members. After that crew can easily get information regarding maintenance and reports on progress unless and until proper information has been provided. Two kinds of infrastructure have been compared and discussion has been provided related to it. An analysis has been pr ovided on the existing wireless technology that is LoRaWAN and OpenIoT. While suggesting various kinds of parameters have been checked that is storage, cost, privacy, ease of use and accessibility. References Botta, A., De Donato, W., Persico, V. and Pescap, A., 2014, August. On the integration of cloud computing and internet of things. InFuture internet of things and cloud (FiCloud), 2014 international conference on(pp. 23-30). IEEE. Denisov, M.V., Kamaev, V.A. and Kizim, A.V., 2013. Organization of the repair and maintenance in road sector with ontologies and multi-agent systems.Procedia Technology,9, pp.819-825. Dupont, C., Schulze, T., Giuliani, G., Somov, A. and Hermenier, F., 2012, May. An energy aware framework for virtual machine placement in cloud federated data centres. InFuture Energy Systems: Where Energy, Computing and Communication Meet (e-Energy), 2012 Third International Conference on(pp. 1-10). IEEE. Frow, P., Nenonen, S., Payne, A. and Storbacka, K., 2015. Managing co?creation design: A strategic approach to innovation.British Journal of Management,26(3), pp.463-483. Gao, H. and Zhang, X., 2013. A Markov?Based Road Maintenance Optimization Model Considering User Costs.Computer?Aided Civil and Infrastructure Engineering,28(6), pp.451-464. Huidrom, L., Das, L.K. and Sud, S.K., 2013. Method for automated assessment of potholes, cracks and patches from road surface video clips.Procedia-Social and Behavioral Sciences,104, pp.312-321. Jamil, D. and Zaki, H., 2016. Security issues in cloud computing and countermeasures.International Journal of Engineering Science and Technology (IJEST),3(4), pp.2672-2676. Nakamura, L. and Chow-White, P. eds., 2013.Race after the Internet. Routledge. Rittinghouse, J.W. and Ransome, J.F., 2016.Cloud computing: implementation, management, and security. CRC press. Robbins, S.P. and Judge, T., 2012. Essentials of organizational behavior. Ruiz, A.R.J., Granja, F.S., Honorato, J.C.P. and Rosas, J.I.G., 2012. Accurate pedestrian indoor navigation by tightly coupling foot-mounted IMU and RFID measurements.IEEE Transactions on Instrumentation and measurement,61(1), pp.178-189. Streimikiene, D., BaleÃ… ¾entis, T. and BaleÃ… ¾entien?, L., 2013. Comparative assessment of road transport technologies.Renewable and sustainable energy reviews,20, pp.611-618 Sultana, M., Rahman, A. and Chowdhury, S., 2013. A review of performance based maintenance of road infrastructure by contracting.International Journal of Productivity and Performance Management,62(3), pp.276-292. Thompson, R., Visser, A., Miller, R. and Lowe, T., 2014. Development of real-time mine road maintenance management system using haul truck and road vibration signature analysis.Transportation Research Record: Journal of the Transportation Research Board, (1819), pp.305-312. Thompson, R.J. and Visser, A.T., 2013. Mine haul road maintenance management systems.Journal of the South African Institute of Mining and Metallurgy,103(5), pp.303-312. Usman, T., Fu, L. and Miranda-Moreno, L.F., 2012. A disaggregate model for quantifying the safety effects of winter road maintenance activities at an operational level.Accident Analysis Prevention,48, pp.368-378. Whaiduzzaman, M., Sookhak, M., Gani, A. and Buyya, R., 2014. A survey on vehicular cloud computing.Journal of Network and Computer Applications,40, pp.325-344. Wortmann, F. and Flchter, K., 2015. Internet of things.Business Information Systems Engineering,57(3), pp.221-224. Xia, F., Yang, L.T., Wang, L. and Vinel, A., 2012. Internet of things.International Journal of Communication Systems,25(9), p.1101.

Monday, December 2, 2019

The play Macbeth Essay Example

The play Macbeth Essay The play Macbeth, by William Shakespeare, tells the story of a brave man, called Macbeth, who killed his way to the throne. In doing so, he brings about his own downfall. The description of Macbeth from â€Å"brave, valiant cousin and worthy gentleman† and that of his wife â€Å"honoured hostess† changes to â€Å"dead butcher and his fiend like queen†. This change is due to the receiving of prophecies, ambition and greed and desire. The play explores themes, including power, ambition and guilt.In the beginning of the play Macbeth is a â€Å"brave, valiant cousin and worthy gentleman†, near the end of the play he turns into a â€Å"dead butcher†. This is a result of receiving three prophecies from a group of witches, who give him these prophecies in order to play and toy with him. â€Å"All hail Macbeth, hail to thee, Thane of Glamis†, â€Å"All hail Macbeth, hail to thee, Thane of Cawdor†, All hail Macbeth, that shalt be king hereafter †. These prophecies, given to Macbeth by the witches address the theme of fate as they tell the audience what is going to happen to Macbeth in the course of the play.A technique used in this moment is foreshadowing. This is the scene in the play that informs the audience what the play is going to be about and what is going to happen. It also displays repetition as the prophecies all start with â€Å"All hail Macbeth†. These prophecies show the beginning of the downfall of Macbeth and Lady Macbeth towards becoming â€Å"dead butcher and his fiend like queen†, because without the prophecies Macbeth would’ve never killed King Duncan to become King.Macbeth and Lady Macbeth’s spiral towards becoming tragic heroes involves them changing from â€Å"brave valiant cousin and worthy gentlemen† and â€Å"honoured hostess† to â€Å"dead butcher and his fiend like queen†. The moment when Macbeth and Lady Macbeth plan to kill Duncan is a pivo tal part of the play. â€Å"We will proceed no further in this business†. This shows how honourable Macbeth was at the start of the play and how much he changed throughout the play. â€Å"Valuating ambition which o’erleaps itself†.This quote displays how Lady Macbeth and Macbeth were overcome with a sense of ambition and greed. The audience can start to see how Macbeth is changing and how Lady Macbeth is the stronger one in the relationship at that point. Macbeth is hesitant but through Macbeth’s manipulation they come up with a plan to murder the King. Personification is used to describe a feeling of ambition come over both of them. Ambition is the main theme used here because it marks the first time the audience sees the ambition in the characters and their view on them definitely changes here.Betrayal versus trust is another theme used in this moment as Macbeth and Duncan are vey close and are cousins and he is planning to murder him and betray the tru st between them. Here, the audience sees the shift in their characters from â€Å"brave, valiant cousin and worthy gentleman† and â€Å"honoured hostess†, towards â€Å"dead butcher and his fiend like queen†. Near the end of the play, before the battle where Macbeth is killed, Lady Macbeth commits suicide as a result of the guilt that has accumulated from causing so many deaths.Before this, she starts sleepwalking; sleep talking and writing murder confessions. â€Å"Out, damned spot! Out, I say! † At this moment the audience can get a real insight into the change of Lady Macbeth due to her guilty conscience. The use of repetition suggests that all she is thinking about all the blood she has caused and is continually trying to get rid of it. The power struggle of Macbeth and Lady Macbeth is conveyed here because it shows how they could not handle the power knowing how they gained it in the first place.Guilt is very prevalent in this moment and is the main reason for Macbeth and Lady Macbeth becoming a â€Å"dead butcher and his fiend like queen†. It is evident from the above discussion that throughout the play Macbeth by William Shakespeare Macbeth and Lady Macbeth’s descriptions of â€Å"brave, valiant cousin and worthy gentleman† and â€Å"honoured hostess† change and become â€Å"dead butcher and his fiend like queen† due to the ambition and greed that they possess. These themes of ambition and greed influences them to kill their way to the throne, which results in the guilt eating them up and leads to their downfall.