Thursday, September 3, 2020

Hidden Violence Essay

The word group everybody recognizes what it implies or a big motivator for it. Obviously when youngsters get to the furthest limit of their basic years they’ve knew about know posses, for example, the Cribs, Bloods, Latin Kings, Vatos Locos, however none of those names cause as much dread and fear as the pack called La Mara Salvatrucha otherwise known as MS-13. La Mara known for their maniacal strategies for murdering and running their turf, no other pack verges on causing a similar dread as La Mara Salvatrucha (ms-13gang.com). Compelled to relinquish their country because of the common war in El Salvador, the experience to the U.S. was acceptable toward the beginning yet soon the chances betrayed them. In this manner for their assurance they had to begin was today is known as the most perilous posse of the world La Mara Salvatrucha (National Geographic). A straightforward go head to head between El Salvador’s government and guerrilla bunches started the common war of 1980 in El Salvador. The common war executed 75,000 individuals and left 8,000 absent and another million or so destitute. The war was known for the government’s slaughters and its Death Squad’s executing of regular citizens, nuns and clerics (bookrag.com). This drove numerous Salvadorians to scan for a superior life, a considerable lot of whom came to America for their crisp start. A gathering of displaced people in Pico Union, California needed to become acclimated to their new home, not realizing that by getting away from the war in El Salvador they had quite recently bounced directly into another one against the LA road groups. Move guardians working perpetual filters giving no parental management; youthful Salvadorian youngsters were being raised by the lanes of LA. In the wake of being beaten, cut, and badgering by the remainder of the LA road packs, a gathering of exiles chose to frame a solid hold or as it is brought in Salvador, a Mara. They stated, â€Å"If these folks need savagery we’ll show them violence† remember that these evacuees had a decent information on what brutality was just as having past military preparing (ms-13gang.com). At that point came the day when they said nothing more will be tolerated the time has come to stand firm, and the notorious MS-13 was shaped. Conceived in LA in the 1980’s, growing to parts of Canada, Spain, England, and Germany expanding and hazardous step by step. La Mara would now be able to be found in Washington D.C, Oregon, Alaska, Arkansas, Texas, Nevada, Utah, Oklahoma, Illinois, Michigan, New York, Maryland, Virginia, Georgia, and Florida only alone in the United States. In Central America they can be found in El Salvador, Mexico, Guatemala and a few other Latin nations. MS-13 is viewed as one of the most hazardous and composed on the planet (altereddimensions.net).There are two different ways to get into the pack. For guys one is to get bounced in, which implies the newcomer is encompass by various individuals and beaten for in any event 13 seconds. The other path is by slaughtering either an adversary group part or only a straightforward executing. For females there is a third alternative which is to get having sex with a few MS individuals or as they call it posse slammed. MS-13 has numerous comparable criminal attributes as other group, for example, pirating medications, individuals, and weapons. The greatest contrast with MS-13 is the readiness to utilize mercilessness in the entirety of their exercises (keysaferschools.com). The entirety of the MS-13 exercises were stayed under the radar well overall. Not at all like many group which us firearms, blades, and ropes to hang their casualties, La Mara Salvatrucha utilizes cleavers, which have become their weapon of decision (ms-13gang.com). From the beginning group individuals just sported white, dark, and blue hues for the most part hues token from El Salvador’s banner. Utilizing a weapon, for example, the blade is really crazy right? Well they went all out with this weapon cutting n dicing every one of their foes as well as just by smacking their cerebrums out with the blades. Let’s get to the group signs they hurl while speaking to their hood. Utilizing one hand where they stick out the pinky finger just as the forefinger letting the thumb traverse the other two fingers that are relieved into the palm. Another pack sign is utilizing two hands having both pointers and thumbs out, broadening the two fingers between the list and the pinky mostl y out still restored likewise on two hands which leaves the pinky covered up as an afterthought last thing is to combine the pinky knuckles additionally having the ring fingers contact. This ground-breaking imagery a dreading sight to encounters, both speaking to villain horns are one more insight why these folks are viewed as, if not the most, in any event one of the top risky posses on the planet (mahalo.com). Speaking to their hood is so critical to them that they utilize their own countenances to rep their hood. MS individuals inking them-self everywhere throughout the body particularly on the face, with signs, for example, MS-13, 666, and X III in huge letters and textual styles as well. Every one of their tattoos are gothic which basically implies something exceptionally dim energetic, individuals will most ordinarily have 666 tatted on their body (ms-13gang.com). Stacking, some consider it a kind of move to posses it is simply one more sort of language used to tell different packs they are MS-13 and this is their turf. In addition to the fact that they claim their domain and rep their hood, yet in addition around non-individuals, police, and adversary groups stacking is utilized as their mystery code language. The explanation that a few people consider stacking being a sort of move is on the grounds that fundamentally it utilizes the entire body moving in a recover following behind hand movements. Beginning in California, not long after their individuals were being expelled back to their nations of origin directly after El Salvador’s common war finished (altereddimensions.com). Police power in their local nation not being fit to go head to head against MS-13’s degree of fierceness had no real way to control or limit them, and MS-13 started to develop amazingly all over El Salvador. Not having any desire to pull in an excessive amount of police consideration they choose to move to their neighboring nation, Honduras. Honduras a noteworthy demonstration of the MS-13’s rule of dread alongside a period loaded up with dread and uneasiness for Hondurans. The Gang Slaughter of La Mara Salvatrucha on a transport with six youngsters and twenty-two grown-ups left an enormous effe ct according to many. Suspected group individuals equipped with ambush rifles brutally showered a transport full with occasion customers in the city of San Pedro Sula in Honduras. One of the speculated posse individuals was captured in a similar zone only hours after the terrible activity found with two attack rifles, two guns, and ammo in his vehicle. Another two where discovered only 10 miles from San Pedro Sula two days after (altereddimensions.net). Just these three captured suspects were connected to MS-13. With respect to the remainder of the pitiful individuals who participated in this evil demonstration are accepted that they were experiencing inanition for La Mara Salvatrucha. Once more MS-13 drawing in much consideration from the Honduran specialists, they chose to move again yet this time they don’t move together they spread like insane (ms-13gang.com). At that point the overall spread began starting here on, relocating back to the United States to rejoin their fighters deserted, and spreading over Central America just as in parts of Europe and Asia. Up until 2002 no police division had any strong data on La Mara Salvatrucha. That’s un til a courageous youngster Brenda Paz stood in opposition to the scandalous MS-13 on a quest for another beginning (mahalo.com). At just 16 years old Brenda needed to stand firm and attempt to stop what today is delegated a composed wrongdoing. At the time Brenda had quite recently got paginate by the pioneer in her general vicinity which he knew nothing about. For very nearly a half year she was under assurance given by the administration yet because of her pregnancy she left the territory to get some air and have open space. Only not long after in 2003 she was discovered dead in Virginia-she was a half year pregnant. Her body was found under an extension in Shenandoah County. Wounded multiple times everywhere throughout the body this is simply one more demonstration of La Mara Salvatrucha to show they are no doubt (altereddimensions.net). A few MS-13 individuals have been blamed for the slaughtering, Brenda who was helping specialists from in any event six states research the group was an extraordinary lost for the police power also. In most case MS-13 individuals feel incredible pride when completing rough activities on the grounds that to them it’s the crazier, generally vicious, and initially that gets them more regard with the group, positioning up at the end of the day. Envision a little snow ball, what befalls the small thing when moved around a couple of times? It becomes colossally right, definitely precisely right. The increasingly more you move it the greater it gets. That’s how La Mara Salvatrucha began as a basic little snow ball and take a gander at it currently, appears to me that it hasn’t quit rolling yet and never will. Their first foe 18 road a Mexican group in Cali, the LAPD, the FBI and a lot more couldn’t stop them, what makes you figure anybody can! Individuals simply avoid the roads abstain from intersection with packs and If you know about MS-13 close to you simply remain inside. MS-13 has no regard to anybody other than their own and will let their full rage out on any individual who crosses in their manner. N.p.: n.p., 1999. Web. 20 Apr. 2011. . N.p.: SparTech Software, 1998-2011. Web. 20 Apr. 2011. . Logan, Samuel. N.p.: n.p., n.d. Web. 20 Apr. 2011. . N.p.: n.p., n.d. Web. 20 Apr. 2011. . N.p.:  © National Geographic Channel, 2009. Web. 20 Apr. 2011. .

Saturday, August 22, 2020

Intellectual Capital Comparison Paper free essay sample

Paper Intellectual capital is the joined information on representatives inside an association (Intellectual, 2013). This information is to enhance the association in manners, for example, increment benefits, give items or administrations to clients, increase upper hand, improve forms, or different sorts of capital. This paper will show five unique kinds of scholarly capital that increases the value of an association. It will give instances of every intelligent capital, regardless of whether that capital is recognizable or unidentifiable as a benefit, and how each offers some benefit to the association. The main scholarly funding to examine is client capital. Client capital is the relationship the association constructs and keeps up with its clients (Customer, 2013). The client capital connections mirrors the customer’s dependability to the associations items or administrations it gives. For instance, as most CPG (Consumer Packaged Goods) organizations, toilette paper has frail brand devotion that reflects in lower client capital (Stealings, 2010). This is on the grounds that the principle showcase pioneers in toilette paper guarantee and give client a similar measure of delicateness, limits, and coupons, which prompts brand exchanging. We will compose a custom paper test on Scholarly Capital Comparison Paper or on the other hand any comparable theme explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page Client capital isn't a recognizable resource in an associations monetary record or other fiscal reports. The potential estimation of client cash-flow to an association is that with increment brand faithfulness, there is increment in volume deals and income. The second savvy money to examine is human capital. Human capital is the consolidated information, encounters, and abilities of the associations representatives (Human, 2013). Associations depend on its human capital not exclusively to complete the work yet in addition to add to the associations development through innovativeness and advancement inside a serious market. For instance, Apple is known for recruiting skilled and imaginative individuals, for example, Steve Jobs, for with his vision and insight launches Apple into one of the biggest purchaser gadgets organization on the planet (Jobs, 2013). Albeit human capital is unidentifiable as an advantage, associations realize it is one of the most significant scholarly capitals to oversee in light of the fact that it doesn't straightforwardly have a place with the association and can be lost when a representative leave’s an association. The estimation of human capital might be difficult to gauge, yet having the perfect individuals cooperating can enable an association to meet its vision and objectives. The third educated cash-flow to examine is auxiliary capital. Basic capital backings human capital in an association through such things as data frameworks, arrangements, procedures, licenses, and other auxiliary capital (Structural, 2013). For instance, numerous associations have licenses on items to shield its capital from different associations from utilizing its item structures or innovation to make its very own benefit. For instance, as per a New York Times article by Jad Mouawad (2012) that Marvell Technology Group was found â€Å"guilty for encroaching on a couple of licenses from Carnegie Mellon University that builds the precision of hard drive circuits to peruse information on fast attractive disks† paying $1. 17 billion dollars for the wrongdoing. Some basic capital can be recognizable, for example, frameworks and licenses on the grounds that these kinds of basic capital are offered to other people, hence acquiring income and tractable in financials. Basic capital holds an incentive to associations capacity to create and improve items and administrations for its clients, and in this manner expanding its income. The fourth savvy money to examine is licensed innovation. Licensed innovation is the information, innovativeness, and thoughts of representatives who have benefit making esteem that has defends through copyrights, trademarks, licenses, and other protectable (Intellectual Property, 2013). Instances of protected innovation are equations, receipts, creations, programming, and brand names. For instance, a mystery receipt is entirely important to an association since it is an outline for an item it offers to its clients. The business for Bushes Baked Beans speaks legitimately about how significant its mystery receipt is to its item and in this way its business. Some protected innovation can be recognizable, for example, mystery receipts since it very well may be sold for cash and tractable in business financials as income. Protected innovation is entirely significant to associations for its capability to make new items and gain income and volume development. The last scholarly funding to talk about is innovative work. Innovative work consolidates both essential and applied research to grow new items, improve administrations, find new arrangements (RD, 2013). Regions that speak to innovative work are analysts, researchers, and data innovation authorities (Berry, 2004). Innovative work are not recognizable in light of the fact that there is no market esteem and can't be sold. It is significant in today’s associations since it drives new inventive thoughts that can enable a rganization to improve its upper hand and produce income development enhancing the association. End With the information, experience, ability, connections, procedures, innovation, and other expert aptitudes that scholarly capital gives, it is unquestionable that scholarly capital is important advantages for any association. Subsequently, associations are starting to characterize scholarly capital into its capital expenses as a result of the extra venture it are ma king into scholarly capital. Scholarly, 2013) The test is the way associations today measure, decipher, oversee, and create scholarly capital. ? References Berry, John. (2004). Substantial Strategies for Intangible Assets: Managing and Measuring Your Most Important Sources of Value. The McGraw? Slope Companies Customer. (2013). Business Dictionary: Consumer Capital. Recovered on May 20, 2013 from http://www. businessdictionary. com/definition/client capital Human. (2013). Business Dictionary: Human Capital. Recovered on May 20, 2013 from http://www. usinessdictionary. com/definition/human-capital Intellectual Property. (2013). Business Dictionary: Intellectual Property. Recovered on May 20, 2013 from http://www. businessdictionary. com/definition/protected innovation Intellectual. (2013). Business Dictionary: Intellectual Capital. Recovered on May 20, 2013 from http://www. businessdictionary. com/definition/scholarly capital Jobs. (2013). About Steve Jobs: Bio. Recovered on May 20, 2013 from http://allaboutstevejobs. com/bio/shortbio. php Mouawad, Jad. 2012, December 26). New York Times: Jury Awards $1. 17 Billion in Patent Suit. Recovered on May 20, 2013 from http://www. nytimes. com/2012/12/27/innovation/marvell-requested to-pay-1-17-billion-in-patent-case. html RD. (2013). Business Dictionary: Research and Development. Recovered on May 20, 2013 from http://www. businessdictionary. com/definition/innovative work Stealings. (2010). An exhaustive investigation of purchaser bundled products marking. Recovered on May 20, 2013 from http://www. stealingshare. com/pages/

Friday, August 21, 2020

Definition and Examples of Alliteration in English

Definition and Examples of Alliteration in English Similar sounding word usage (otherwise called head rhyme, beginning rhyme, or front rhyme) is a gadget in composed and communicated in dialects in which a series of words and expressions rehashes a similar letter or letter mixes. A lot of childrens verse utilizes similar sounding word usage: Peter Piper picked a peck of salted peppers is a paramount tongue-twister instructed to English-talking youngsters. It is at first alliterative on the letter p-and inside redundant on the letters p and ck. However, it isnt the particular letter that makes an expression alliterative, it is the sound: so you could state that the alliterative capacity of Peter and his peppers incorporates the p_k and p_p sounds. Which means in Poetry Similar sounding word usage is presumably regularly utilized for amusing reasons, to inspire a snicker in kids, however in gifted hands, it can mean a lot more. In The Bells American writer Edgar Allan Poe notably utilized it to represent the passionate intensity of various kinds of chimes: Hear the sledges with their chimes Silver bells!What a universe of happiness their song foretells!Hear the noisy alarum ringers Brazen bells!What story of fear, presently, their turbulency tells! Lyricist Stephen Stills utilized a blend of hard and softâ c sounds and l sounds to outline the passionate disorder of a couple of darlings cutting off their association in Heartlessly Hoping. Notice that the c sounds are the tangled storyteller, and the l sound is that of his woman. Remain by the flight of stairs youll see something sure to tell youConfusion has its costLove isnt lying its free in a woman who lingersSaying she is lostAnd gagging on hi In Hamilton, Lin-Manuel Mirandas visit de-power Broadway melodic, Aaron Burr sings: Continually befuddling, frustrating the British henchmen  Everyone surrender it for America’s most loved battling Frenchman! In any case, it tends to be a significant unobtrusive instrument too. In the model underneath, artist Robert Frost utilizes w as a delicate memory of calm winter days in Stopping by the Woods on a Snowy Evening: He won't see me halting hereto watch his woods top off with day off The Science of Alliteration The rehashing examples of sound including similar sounding word usage have been attached to the maintenance of data, as a memory helper that assists individuals with reviewing an expression and its importance. In an examination directed by etymologists Frank Boers and Seth Lindstromberg, individuals who were learning English as a subsequent language thought that it was simpler to hold the significance of colloquial expressions that included similar sounding word usage, for example, from column to post and duplicates and sparkling clean. Psycholinguistics studies, for example, that by P.E. Bryant and associates proposes that kids with an affectability to rhyme and similar sounding word usage figure out how to understand sooner and more quickly than the individuals who dont, considerably more than those deliberate against IQ or instructive foundation. Latin and Other Languages Similar sounding word usage is utilized by journalists of most Indo-European dialects, including English, Old English, Anglo-Saxon, Irish, Sanskrit, and Icelandic. Similar sounding word usage was utilized by old style Roman exposition journalists, and once in a while in verse. Most expounding regarding the matter by the Roman themselves depicts the utilization of similar sounding word usage in exposition writings, particularly in strict and lawful recipes. There are a few special cases, for example, the Roman writer Gnaeus Naevius:â libera lingua loquemur ludis LiberalibusWe will talk with a free tongue at the celebration of Liber. Also, Lucretius in De Rerum Natura utilizes it to full impact, with a rehashed p sound that emulates the sound of mightyâ ker-plunking sprinkles made by monsters crossing huge seas: Denique mutt homines tantos natura pararenon potuit, pedibus qui pontum per vada possenteAnd why can’t nature make men so largethat they cross the profundities of the ocean with their feet Sources Blake, N.F. Rhythmical Alliteration. Present day Philology 67.2 (1969): 118-24. Print.Boers, Frank, and Seth Lindstromberg. Discovering Ways to Make Phrase-Learning Feasible: The Mnemonic Effect of Alliteration. Framework 33.2 (2005): 225-38. Print.Bryant, P.E., et al. Rhyme and Alliteration, Phoneme Detection, and Learning to Read Developmental Psychology 26.3 (1990): 429-38. Print.Clarke, W. M. Purposeful Alliteration in Vergil and Ovid. Latomus 35.2 (1976): 276-300. Print.Duncan, Edwin. Metrical and Alliterative Relationships in Old English and Old Saxon Verse. Studies in Philology 91.1 (1994): 1-12. PrintLanger, Kenneth. Some Suggestive Uses of Alliteration in Sanskrit Court Poetry. Diary of the American Oriental Society 98.4 (1978): 438-45. Print.Lea, R. Brooke, et al. Sweet Silent Thought: Alliteration and Resonance in Poetry Comprehension. Mental Science 19.7 (2008): 709-16. Print.

Friday, June 12, 2020

Nondeterministic X-Machine - Free Essay Example

CHAPTER 5 Formal Modeling 5.1 Overview To achieve the maximum benefits from formal techniques, integration of approaches is required. In this chapter we present the integration of X-machine models and Z notation. The X-machine models sued to give the relationship between Z and X-machine are: (a) nondeterministic X-machine, (b) deterministic X-machine, (c) nondeterministic stream X-machine, (d) deterministic stream X-machine, (e) communicating stream X-machine, and (f) communicating stream X-machine system. The informal definitions of all these machines are taken from [1], [2], [3]. 5.2 Design of Nondeterministic X-Machine A Nondeterministic X-Machine is 10-tuple NXM = (X, Y, Z, , , Q, , F, I, T) where: 1. X is a fundamental dataset on that the machine operates. 2. Y is a finite set of input alphabets. 3. Z is a finite set of output alphabets. 4. and are input and output partial functions, used to convert the input into the output sets from the fundamental sets, i. e., : Y X and : X Z. 5. Q is a finite nonempty set of states. 6. is type of M, a set of relations on X, i. e., : P (X X). The notation (XX) denotes a set of all possible partial functions from X to X. 7. F is a next state partial function, a transition function, i. e., F: Q x P Q, which takes a state a partial function and produces a new set of states. 8. I is a set of initial states, a subset of Q, and T is a set of terminal states, a subset of Q. NXM state: Q alphaIn: SigmaIn alphaOut: SigmaOut memory: Memory alpha: (SigmaIn Memory) beta: (SigmaOut Memory) function: Memory Memory trans: Q Memory Memory Q I: Q T: Q state I state T state q, q1: Q; m, m1: Memory; i: SigmaIn; o: SigmaOut q state q1 state m memory m1 memory i alphaIn o alphaOut m m1 function i m alpha o m1 beta s, s1: Q s state s1 state q m m1 s trans q1 m m1 s1 trans q m m1 = q1 m m1 s = s1 Invariants: a) The set of states states is a nonempty set. b) The set of initial states I is a subset of states. c) The set of final states T is a subset of states. d) For each input alphabet i and states q and q1, o an output alphabet, (i, m) belongs to elpha, (o, m1) belongs to beta (m, m1) belongs to set of partial functions trans ((q, (m, m1)), s) where transaction function acting on q and partial function gives a set of states. And the trans ((q1,( m, m1)), s1) gives a set of states. In the formal specification of NXM, Memory, SigmaIn, SigmaOut and Q are defined as abstract data types over which we cannot define any operation. To specify the NXM, we introduced a variable states to define the set of states of the NXM. Each element q in set states is of type Q therefore states is a type of power set of Q. To describe the sets of input and output alphabets, variables alphaIn and alphaOut of type of power set of SigmaIn and SigmaOut are defined respectively. Similarly, for memory the variable memory is of type of power set of Memory is introduced. Moreover, alpha and beta are the power set of partial functions of type (SigmaIn Memory) and (SigmaOut Memory) respectively, which converts an input alphabet s into an output alphabet g, by altering the memory. The variable function of type power set of (Memory Memory) is introduced to describe the set of all possible partial functions from Memory to Memory. The transition function trans of type (Q function) PQ is intr oduced to describe the transitions of the machine for each input (q, function), where q is a state and function is a partial function from memory to memory there must be a unique output q1 of type power set of Q. The set of initial states I is of type power set of Q and the set of final states T is of type PQ. 5.3 Design of Deterministic X-Machine A Deterministic X-Machine is 10-tuple DXM = (X, Y, Z, , , Q, , F, I, T) where: 1. X is a fundamental dataset on that the machine operates. 2. Y is a finite set of input alphabets. 3. Z is a finite set of output alphabets. 4. and are the input and output partial functions, used to convert the input into the output sets from the fundamental sets, i. e., : Y X and : X Z. 5. Q is a finite nonempty set of states. 6. is type of M, a set of relations on X, i. e., : P (X X). The notation (XX) denotes the set of all possible partial functions from X to X. 7. F is next state partial function, a transition function, i. e., F: Q x Q. It takes a state a partial function and deterministically produces a new state or the same state. 8. q0 is an initial state and T is a set of terminal states, a subset of Q. The above definition describes the deterministic X-machine because for each state q and for every partial function, there is a state q, i. e., F (q, ) = q. DXM states: Q alphaIn: SigmaIn alphaOut: SigmaOut memory: Memory alpha: SigmaIn Memory beta: SigmaOut Memory function: Memory Memory trans: Q Memory Memory Q q0: Q T: Q states q0 states T states q, q1: Q; m: Memory; i: SigmaIn; o: SigmaOut q states q1 states m memory i m alpha o m beta m m function trans q m m = q1 Invariants: a) The set states is a nonempty set. b) The q0 is an initial state. c) The set of final states T is a subset of states. d) For each input alphabet i and states q and q1, o is an output alphabet, (m, m1) is a relation on X to X, where (i, m) belongs to elpha, (o, m1) belongs to beta and (m m1) belongs to . The trans ((q, function), q1) describes the transaction function acting on q and the partial function giving the state q1. In the schema DXM the abstract data types, X, Y, Z and Q are denoted by Memory, SigmaIn, SigmaOut and Q respectively. In this schema we introduced variable states to define the set of states of the DXM. Each element q in set states is of type Q therefore states is a type of power set of Q. To describe the sets of input and output alphabets, variables alphaIn and alphaOut of type of power set of SigmaIn and SigmaOut are defined respectively. Similarly, for memory the variable memory of type of power set of Memory is introduced. Moreover, alpha and beta are the power set of partial functions of type (SigmaIn Memory) and (SigmaOut Memory) respectively, which converts an input alphabet s into an output alphabet g by altering the memory. The variable function of type power set of (Memory Memory) is introduced to describe the set of all possible partial functions from Memory to Memory. The transition function trans of type (Q function) PQ is introduced to describe the transitions of t he machine for each input (q, function), where q is a state and function is a partial function from memory to memory there must be a unique output q1 of type Q. The initial state q0 is of type Q and the set of final states T of type power set of Q. 5.4 Behavior of X-Machine To check the behavior of the machine, we get a sequence of input alphabets and checks that there exists a successful path for that particular sequence of inputs. This behavior checker accepts a deterministic X-machine a sequence of input alphabets and returns a sequence of output alphabets. Let DXM = (X, Y, Z, , , Q, , F, I, T) is a deterministic X-machine and a sequence of input alphabets seq Yi = y1, y2, , yn, where i = 1, 2,, n we say that there exist a sequence of partial function i = 1, 2, , n, where i = 1, 2,, n. Then we can say that DXM accepts the inputs when there exist a sequence of states si = s1, s2 sn, where i = 1, 2. . . n. In schema BDXM the variable stringIn? belongs to strings. The variable stringOut! belongs to messages. The length of input alphabets and output alphabets are equal. For all i belonging to the elements of cardinality of stringIn?, when the value of i is equal to 1 then there exists q, q1 states and m, m1 are memory states, q is the initial state, m1 b elongs to memory, for i-th element of stringIn? and m belongs to alpha there is a message of type SigmaOut which is the i-th element of stringOut!, and the transition function trans acting on state and and partial function (m, m1) gives a new state q1. It repeatedly reads the input from stringIn? and writes the messages on stringOut! by altering the memory until the final state is not reached or the there is no element in stringIn?. If the last state of the sequence of visited states is a final state then the whole string is accepted otherwise rejected. BDXM DDXM stringIn?: seq SigmaIn stringOut!: seq SigmaOut strings: seq SigmaIn messages: seq SigmaOut stringIn? strings stringOut! messages # stringIn? = # stringOut! i: i 1 .. # stringIn? i = 1 q, q1: Q; m, m1: Memory q = q0 q1 states m memory m1 memory stringIn? i m alpha stringOut! i m1 beta q m m1 dom trans q1 ran trans 1 i # stringIn? q, q1: Q; m, m1: Memory q states q1 states m memory m1 memory stringIn? i m alpha stringOut! i m1 beta q m m1 dom trans q1 ran trans i = # stringIn? q, q1: Q; m, m1 : Memory q = q0 q1 T m memory m1 memory stringIn? i m alpha stringOut! i m1 beta q m m1 q1 trans 5.5 Design of Nondeterministic Stream X-Machine A particular class of X-machine is Stream X-Machine which is defined as 8-tuple NSXM = (, , Q, M, , F, q0, m0), where: 1. is a finite set of input alphabets. 2. is a finite set of output alphabets. 3. Q is a finite nonempty set of states. 4. M is possibly finite set of memory on which the machine operates. 5. is a finite set of partial functions that map an input and a memory state to an output and a new memory state, i. e., : x M x M. 6. F is next state partial function that gives a state and a function from the type , P Q denotes the set of next states. F is often described as a transition state diagram, i. e., F: Q x PQ. For each state q and for every partial function , there is a power set of states P Q such that F (q1, ) = P Q. 7. The q0 is an initial state. 8. The m0 is an initial memory. NSXM states: Q alphaIn: SigmaIn alphaOut: SigmaOut memory: Memory function: SigmaIn Memory SigmaOut Memory trans: Q SigmaIn Memory SigmaOut Memory Q q0: Q m0: Memory states q0 states m0 memory q, q1: Q; m, m1: Memory; i: SigmaIn; o: SigmaOut q states q1 states m memory m1 memory i alphaIn o alphaOut i m dom function o m1 ran function s, s1: Q s states s1 states q function s trans q1 function s1 trans q function = q1 function s = s1 Invariants: a) The set states is a nonempty set. b) The state q0 is an initial memory. c) The memory element m0 is the initial memory. d) For each partial function ((i, m), (o, m1)) where i belongs to input alphabet, o belong to output alphabet, m and m1 of type memory, there exists a transition function trans ((q, function), s) acts on q and a partial function and return a set of states. In the formal specification of nondeterministic stream X-machine the description of the variables states, alphaIn, alphaOut, memory and q0 is same as previously defined in section 5.2. The variable function of type (SigmaIn Memory SigmaOut Memory) is introduced to describe the set of all possible partial functions from (SigmaIn Memory) to (SigmaOut Memory), which receives an input alphabet of type SigmaIn and returns an output alphabet of type SigmaOut by altering the memory. The transition function trans of type (Q function) PQ) is introduced to describe the transitions of the machine for each input (q, function), where q is a state and function is a partial function from (SigmaIn Memory) to (SigmaOut Memory), there must be a unique output q1 of type Q. The initial state q0 is of type Q and m0 is an initial memory of type Memory. 5.6 Design of Stream X-machine A particular class of X-machine is Stream X-Machine which is defined as 9-tuple SXM = (, , Q, M, , F, start, finals, m0) where: 1. is a finite set of input alphabets. 2. is a finite set of output alphabets. 3. Q is a finite nonempty set of states. 4. M is a possibly finite set of memory on which the machine operates. 5. a finite set of partial functions that map an input and a memory state to an output and a new memory state, i. e., : x M x M. 6. F is next state partial function that takes a state and a function from the type and gives next state. F is often described as a transition state diagram, i. e., F: Q x Q. For each state q1 and for every partial function , there is a new state q such that F (q1, ) = q. 7. The start is initial state and m0 is an initial memory. The symbols Q, Memory, SigmaIn and SigmaOut are the fundamental data types respectively. All the 9 tuples of stream X-machine are defined as: states of type Q, alphaIn of type SigmaIn is a set of input alphabets alphaOut of type SigmaOut is a set of possible messages that a machine can send, memory of type Memory which is possibly finite set of memory elements which can be a stack, queue, register, RAM or any type of memory. Set of partial functions is defined as function of type (SigmaIn Memory SigmaOut Memory), each element of function takes an input and memory element and returns a new memory state and message. The trans is the set of transitions of SXM of type (Q function) PQ which takes a function and state, returns a new state and message. The start is the initial state of type Q, and m0 is the initial memory of type Memory. The formal specification of stream X-machine in Z is given below. SXM states: Q alphaIn: SigmaIn alphaOut: SigmaOut memory: Memory function: SigmaIn Memory SigmaOut Memory trans: Q SigmaIn Memory SigmaOut Memory Q q0: Q m0: Memory states q0 states m0 memory q, q1: Q; d, d1: Memory; i: SigmaIn; o: SigmaOut q states q1 states d memory d1 memory i alphaIn o alphaOut i d dom function o d ran function q function dom trans q1 ran trans Invariants: a) The set of states is a nonempty set. b) The q0 is in set states. c) The memory element m0 is in set memory. d) For each partial function ((i, m), (o, m1)) where i belongs to input alphabet, o belongs to output alphabet and m, m1 of type memory there exists a transition function trans ((q, ((i, m), (o, m))), q1) where trans acts on q and partial function ((i, m), (o, m1)) returns a new state q1. 5.7 Design of Path of Stream X-machine A path is a connected sequence of arcs through the machine starting from one state and ending at another, possibly the same one. A successful path is one in which first state is the start state and last state belongs to final states. The behavior of X-machine is defined as the union of all the successful paths. To specify the PATH we declare XSXM which indicates that this is an operation in which the state does not change the values of states, alphaIn, alphaOut, memory, function, transition, q0 and m0 variables respectively. The variable arc of type of power set of (Q Q) is defined to denote the edge from q to q of type Q, and path is introduced to define the sequence of states from q0 to q where q is a final state. PATH XSXM arc: Q Q path: seq Q q, q1: Q q states q1 states sf: seq function; i: i # sf i 1 .. # path i + 1 # path path i states i dom path q function q1 trans q q1 arc path i path i + 1 arc sf i function Invariants: a) If q, q1 belong to states, belongs to and (q1, (q, )) belongs to trans, we say that function is the arc from q to q1, represented function: q q1. If q, q1 belong to Q such that there exist q1,, qn-1 in Q and 1,, n belonging to with 1: q q1, 2: q1 q2,, n:qn-1 q1 we say that we have a path p = 1 n from q to q1 and write p : q q1. 5.8 Design of Stream X-machine Computation The computation of stream X-machine is defined as stream X-machine and paths are accessed as read only which are defined in section 5.5 and 5.6. The input and output streams are defined as streamIn and streamOut of type sequence of SigmaIn and sequence of SigmaOut respectively. The variable epsiI is a nil input alphabet of type SigmaIn and epsiO nil output alphabet of type SigmaOut. SXM_Computation XSXM XPATH streamIn: seq SigmaIn streamOut: seq SigmaOut epsiI: SigmaIn epsiO: SigmaOut epsiI ran streamIn streamIn epsiO ran streamOut ran streamIn alphaIn ran streamOut alphaOut q: Q; m: Memory q states m memory epsiI m epsiO m function q function q trans q: Q; m, m1: Memory; g: SigmaOut; i: 1 i # streamIn i # path i + 1 # path q states m memory m1 memory g alphaOut i = 1 q = q0 q1: Q q1 states q0 q1 arc path i = q0 path i + 1 = q1 streamIn i m g m function q0 function q1 trans streamOut = streamOut g 1 i # streamIn q1: Q q1 states q q1 arc path i = q path i + 1 = q1 streamIn i m g m function q function q1 trans streamOut = streamOut g i = # streamIn q T q1: Q q1 states q q1 arc path i = q path i + 1 = q1 streamIn i m g m function q0 function q trans streamOut = streamOut g Invariants: a) The symbols streamIn and streamOut are the sequences of input and out respectively. b) The symbols epsiI and epsiO are the nil input and output alphabets respectively. c) Each element of input sequence belongs to the set of input alphabets of SXM and each element of output sequence must be from the set of output alphabets of SXM. d) The transition function for each state have the initial value as ((q, epsiI, m), (epsiO, m, q)) which shows it takes no input and gives no output. e) For each state q and q1 which belongs to arc there exists a path from q to q1 which give rise to a new function. f) Each element s of input sequence streamIn acting on memory m will give a new memory m1 and a new output element g which is concatenated with streamOut sequence (streamOut ^ g) at each iteration. In computation of stream X-machine the inputs and outputs are the streams of input and output alphabets. At each state a function is applied, the selection of next state depends upon the first input symbol, memory status and current state. The function computes the new memory state by updating the memory and produces output message which is concatenated at the tail of output stream. The first input alphabet is removed from the head of the input stream. This process continues in this way, while traversing the path and generating the output stream until the input stream is empty and a final state is reached. 5.9 X-Machine Model of an Ant Here we take the biological inspired intelligent agent as case study. The stream X-machine model of ant agent is given in Fig 5.1. The goal of the agent is to find food and carry it to their nest. This goal can be achieved by searching for food at random or follow the pheromone trails. When food is found it should leave pheromone trail moving back to its nest, when nest is found again it drops the food [16]. 1. Input alphabet is defined as ({space, nest} U FOOD) x COORD x COORD). 2. The set of outputs is defined as set of messages {moving_freely, moving_to_nest, dropping_food }. 3. The set of states Q in which agent can be are {At Nest, Moving Freely, At Food, Going Back to Nest, Looking for Food}. 4. Memory M of the agent is (FOOD U {none}) x (COORD x COORD) x sequence (COORD x COORD). 5. Initial memory m0 is defined as (none, (0, 0), nil). 6. Start state q0 is At Nest, (0, 0) is assumed the position of the nest. 7. The type is a set of functions of the form function_name (input_tuple, memory_tuple) (output, memory_tuple). [FOOD] Q ::At_Nest Moving_Freely At_Food Back_to_Nest Looking_for_Food SigmaOut ::moving_freely moving_to_nest moving_to_food lifting_food more_food dropping_food found_nest_again got_lost ignoring_food staying_at_nest FOOD is a basic type, Q is a set of states of an Ant and SigmaOut is a set of messages that an ant can send. Instruction: FOOD Instruction LOC: a, b: 0 a 0 b a b LOC SigmaIn: Instruction LOC SigmaIn LOC is a set of two dimensional locations, and SigmaIn is of type input alphabet which contains instruction and location. The Instruction is the set of all the possible instructions to the agent, which is either the name of a food item, belongs to FOOD or Space. The Space indicates that currently agent have no information about any food item or it have to stay at nest or ignore the food. The second element of each order pair is the location where the agent should have to move. CARRY: FOOD CARRY Memory: CARRY LOC seq LOC Memory Memory is the memory of agent where CARRY shows what the agent is carrying, LOC is the current location of the agent and seq LOC is the list of food items locations. Function: SigmaIn Memory SigmaOut Memory Function is the axiomatic definition of partial function which it gets an input alphabet and a memory element and returns a message as output alphabet and a new memory state by altering the memory. The Function is defined as an abstract data type to define all the possible operations that an Ant can perform. ANT DSXM none: FOOD nest: FOOD space: FOOD lift_food: Function move: Function move_to_food: Function move_to_nest: Function find_food: Function drop_food: Function find_nest: Function gotlost: Function ignore_food: Function stay_at_nest: Function m0 = none 0 0 q0 = At_Nest function = lift_food move move_to_nest move_to_food move_to_nest find_fooddrop_food find_nest gotlost ignore_food stay_at_nest i: Instruction; a, b, x, y: ; c: CARRY; list: seq LOC; o: SigmaOut; in: SigmaIn; m, m1: Memory; fpx, fpy: ; f: FOOD o alphaOut m memory m1 memory in = space x y o = moving_freely m = none a b m1 = none x y in m o m1 = move in = space x y o = moving_to_food m = none a b list m1 = none x y list fpx fpy in m o m1 = move_to_food in = space x y o = moving_to_nest m = f a b list m1 = f x y list in m o m1 = move_to_nest in = f x y o = lifting_food m = none a b list m1 = f x y list m1 = f x y list x y in m o m1 = lift_food in = f fpx fpy o = more_food m = f x y list m1 = f x y list x y in m o m1 = find_food in = nest 0 0 o = dropping_food m = f x y list m1 = none 0 0 list in m o m1 = drop_food in = nest 0 0 o = found_nest_again m = none x y list m1 = none 0 0 list in m o m1 = find_nest in = nest fpx fpy o = got_lost m = none x y fpx fpy m1 = m0 in m o m1 = gotlost in = f 0 0 o = ignoring_food m = none 0 0 list m1 = m in m o m1 = ignore_food in = nest 0 0 o = staying_at_nest m = none 0 0 list m1 = none 0 0 list in m o m1 = stay_at_nest q: Q; f: Function f function q states q = At_Nest f = ignore_food q f q trans q = At_Nest f = stay_at_nest q f q trans q = At_Nest f = move At_Nest f Moving_Freely trans q = At_Nest f = move_to_food q f Looking_for_Food trans q = Moving_Freely f = move q f q trans q = Moving_Freely f = find_nest q f At_Nest trans q = Moving_Freely f = lift_food q f At_Food trans q = Looking_for_Food f = gotlost q f Moving_Freely trans q = Looking_for_Food f = lift_food q f At_Food trans q = Looking_for_Food f = find_nest q f At_Nest trans q = Looking_for_Food f = move_to_food q f q trans q = At_Food f = move_to_nest q f Back_to_Nest trans q = Back_to_Nest f = find_food q f q trans q = Back_to_Nest f = move_to_nest q f q trans q = Back_to_Nest f = drop_food q f At_Nest trans Invariants: a) lift_food, move, move_to_food, move_to_nest, find_food, drop_food, find_nest, gotlost, ignore_food, stay_at_nest are the functions of an Ant. All the functions have the same type as the function of SXM. Each function is an element of function. b) The memory element m0 is an initial memory state which shows that agent carrying nothing currently, its current location is At_Nest and the list of food elements is empty. c) The state q0 is an initial state which is At_Nest. d) The function is the new state of function of SXM which is the set of all the possible actions that an ant can perform. e) All the possible operations an agent can perform are defined as functions in which it takes an input of type Instruction, LOC and a MEMOEY element of type FOOD U {none}, current location of the agent and list of food items, and generates a new memory status by altering the current memory and returns a message. f) For each input in of type (Instruction LOC) in the set of alphaIn of SXM a memory element m in memory of SXM, m1 in new state of memory memory and output alphabet o in set of SigmaOut, there exist a partial function of type Function in function where (in, m) in set domain of function and (o, m1) is in set range of function. g) For each partial function f in function where in is input alphabet, o is output alphabet and m, m1 of type memory, and q, q1 of type Q in set states of an Ant, there exists a transition function trans ((q, f), q1) where trans acts on q and partial function f and returns a new state q1. The SXM imposed all the general constraints that an Ant should posses, but the specific data types and functions of an Ant are different from a general SXM. Therefore there is a need to define all the functions and other required data types which are used in an Ant specification. By using the we can reuse the SXM schema in ANT schema. Further there is no need to redefine all the SXM data types. We only define the following abstract data types SigmaIn, SigmaOut, Memory, Q and functions. The variable none of type FOOD describes that currently the agent is carrying nothing, nest and space of type FOOD indicate where the agent have to move, i. e., either stay at nest of moving freely. All the operations that an agent can perform are define as lift_food, move, move_to_nest, move_to_food, find_food, drop_food, find_nest, goltlost, ingnore_food and stay_ at_nest are of type Function. The formal specification of agent Ant is given below. 5.10 Design of Communicating Stream X-Machine A communicating stream machine is a stream X-machine with the following four different types of functions of type, i: (s, m) = (m, g), where s i, g i, m, m Mi. a). Functions that read the input from the standard input stream and write their output to the standard output stream, i. e., i: (s, m) = (m, g). b). Functions that read the input from a communication input stream and write their output to the standard output stream, i. e., i: (sj, m) = (m, g). c). Functions that read the input from the standard input stream and write their output to a communication output stream, i. e., i: (s, m) = (m, gk). d). Functions that read the input from a communication input stream and write their output to a communication output stream, i. e., i: (sj, m) = (m, gk). These functions are named as SISO, ISSO, SIOS and ISOS which are defined below. SISO: SI is the standard input stream and SO is the standard output stream. The function SISO read the input from the standard input stream and write their output to the standard output stream, i. e., SISO: ((s, m) = (m, g). ISSO: IS is the input stream of another machine j and SO is the standard output stream. The function ISSO read the input from a communication input stream and write their output to the standard output stream, i. e., ISSO: (sj, m) = (m, g). SIOS: SI is the standard input stream and OS is the communicating output stream. The function SIOS read the input from standard input stream and write their output to communicating output stream k, i. e., SIOS: (s, m) = (m, gk). ISOS: IS is the communicating input stream and OS is the communicating output stream. The function ISOS read the input from communicating input stream j and write their output to communicating output stream k, i. e., ISOS: (sj, m) = (m, gk). The formal specification of communicating stream X-machine is described in schema CSXM. CSXM DSXM SISO: SigmaIn Memory SigmaOut Memory SIOS: SigmaIn Memory SigmaOut Memory ISSO: SigmaIn Memory SigmaOut Memory ISOS: SigmaIn Memory SigmaOut Memory ist: seq SigmaIn ost: seq SigmaOut is: seq seq SigmaIn os: seq seq SigmaOut ist ran is ost ran os function = SISO SIOS ISSO ISOS i: ; isq: seq SigmaIn i 1 i isq is j: 1 j j # isq isq j alphaIn i: ; osq: seq SigmaOut i 1 i osq os j: 1 j j # osq osq j alphaOut i, j, k: 1 i i # ist 1 j j # ost 1 k k j m, m1: Memory; sq: seq SigmaIn; gq: seq SigmaOut m memory m1 memory sq ran is sq = ist gq ran os gq = ost # sq I # gq i sq i m dom SISO gq i m1 ran SISO m, m1: Memory; sq: seq SigmaIn; gq: seq SigmaOut m memory m1 memory sq ran is sq = ist gq ran os # sq I # gq k sq i m dom SIOS gq k m1 ran SIOS m, m1: Memory; sq: seq SigmaIn; gq: seq SigmaOut m memory m1 memory sq ran is gq ran os gq = ost # sq j # gq i sq j m dom ISSO gq i m1 ran ISSO m, m1: Memory; sq: seq SigmaIn; gq: seq SigmaOut m memory m1 memory sq ran is gq ran os # sq j # gq k sq j m dom ISOS gq k m1 ran ISOS Invariants: a) The ist belongs to the range of is. b) The ost belongs to the range of os. c) The function is the new state of set of functions which is the union of the above mentioned four types of functions. d) Each element of each communicating input stream is in the set of input alphabets alphaIn. e) Each element of each communicating output stream belongs to the set of output alphabets alphaOut. f) For each input and output there exist m belongs to memory and m1 belongs to new state of memory memory. For each i, j and k are integers from 1 to the length of input sequence, there exists m and m memory elements and if gq and sq belong to standard output and input streams then (sq i, m) belongs to domain of SISO and (gq i, m1) belongs to range of SISO. If gq belongs to communicating output stream k then (sq i, m) belongs to domain of SIOS and (gq k, m1) belongs to range of SIOS. Whenever sq belongs to communicating input stream j then (sq j, m) belongs to domain of ISSO and (gq i, m1) belongs to range of ISSO, further when sq and gq are communicating input and output streams j and k respectively then (sq j, m) belongs to domain of ISOS and (gq k , m1) belongs to range of it. The formal specification of communicating stream X-machine is same as stream X-machine except these four functions. So, we reuse the specification of SXM and define these four functions and relationship between communicating functions and SXM which becomes a CSXM. Data and communication are modeled separately, data is modeled in SXM and communication is modeled in CSXM which provide the benefit of reusability of SXM models. The variables SISO, SIOS, ISSO and ISOS of (SigmaIn Memory) (SigmaOut Memory) are defined to describe the four different combinations of input and output streams. The ist and ost are the standard input and out streams of type sequence of SigmaIn and sequence of SigmaOut respectively. The variable is is introduced to define the sequence of input streams of type sequence of SigmaIn and os is defined to describe the sequence of output streams of type sequence of SigmaOut. 5.11 Design of Communicating Stream X-machine System A communicating X-machine system consists of a number of X-machines that can exchange messages with each other. A CSXMS is defined as Z= ((Ci)i=1,, n, CR) where: 1. Ci is a i-th communicating X-machine component. 2. CR is a relation which defines the communication between the communicating X-machine components, i. e., CR C C and C = {C1, , Cn}. A tuple (Ci, Ck) CR denotes that the X-machine component Ci can output a message to a corresponding input stream of the X-machine component Ck for any i, k {1, . . . , n}, i k. Z C: CSXM CR: CSXM CSXM c, c1: CSXM c C c1 C c c1 CR c c1 m, m1: c . memory; s: SigmaIn; g: SigmaOut s ran c . ist g ran c . ost s m dom c . SISO g m1 ran c . SISO m, m1: c . memory; s: SigmaIn; g: SigmaOut s ran c . ist g ran c1 . ost s m dom c . SIOS g m1 ran c . SIOS m, m1: c . memory; s: SigmaIn; g: SigmaOut s ran c1 . ist g ran c . ost s m dom c . ISSO g m1 ran c . ISSO m, m1: c . memory; s: SigmaIn; g: SigmaOut s ran c1 . ist g ran c1 . ost s m dom c . SIOS g m1 ran c . SIOS Invariants: For each c and c1 of type CSXM where (c, c1) is in relation CR, there exists m, m1 of type memory of machine c. Input and output alphabets s and g are of type SigmaIn and SigmaOut respectively. If s belongs to the range of standard input stream ist of machine c and g belongs to the range of standard output streams ost of machine c then the partial function (s, m), (g, m1) belongs to function SISO. Further if g belongs to the output stream of machine c1 then the partial function (s, m), (g, m1) belongs to SIOS. Similarly, if s belongs to the input stream of machine c1 then the partial function (s, m),(g, m1) belongs to ISSO, otherwise the partial function (s, m), (g, m1) belongs to ISOS. The formal specification of CSXMS is described in schema CSXM where we introduced a variable C of type power set of CSXM to define a set of communicating stream X-machines. CR is a relation of type power set of (CSXM CSXM), where c and c1 are communicating stream X-machines which can communicate with each other. 5.12 Traffic Control System We take the case study of traffic control system to use the complete proposed formal modeling technique on an agent-based system. The case study is selected to demonstrate the applicability of the integrated formal modeling approach. This is accomplished by using the traffic control system which is derived from an original text written in [4]. The traffic control system is composed of the following components, queue of cars, traffic signal lights and controller as illustrated in Fig 5.1. The scenario of the problem is as follows: a) To make sure the safe depart of the cars that arrive at the traffic junction. b) The cars are waiting in the queue to depart. If the signal is red then cars wait until the signal becomes green. c) When a new car arrives it is added at the tail of the queue and when a car leaves it leaves from the front of the queue. 5.12.1 Components of the System The traffic control system is composed of the following components called agents. a) Traffic queue agent b) Traffic signal agent and c) Controller agent. 5.12.2 Traffic Queue Agent The traffic queue agent is characterized by following elements. a) A queue of traffic holds the sequence of cars arrived at the junction. b) Traffic arrived at queue are added at the tail of the queue. c) Traffic leaves the queue when signal is green. d) Make sure the safe depart of traffic at the junction. The X-machine model of traffic queue is illustrated in Fig. 5.2, where the input set of X-machine is: = {arrive, leave}. The input alphabet is a composite type that contains an input and a car. The output of the system consists of a set of messages that may displayed on the screen = {FirstArrived, NextArrived, CarLeft, LastCarLeft, NoCarInQueue}. The set of states is: Q= {empty, queuing}. The machines memory M is a sequence of cars. The set of function is {first_arrives, arrives, leaves, last_leaves, reject}. TrafficQueue DSXM first_arrives: FUNCTION arrives: FUNCTION leaves: FUNCTION last_leaves: FUNCTION reject: FUNCTION q0 = empty m0 = function = first_arrives arrives leaves last_leaves reject i: Input; c: CAR; g: SigmaOut; s: SigmaIn; m, m1: Memory i c SigmaIn s SigmaIn m memory m1 memory s = arrive c m = m0 m1 = c s m FirstArrived m1 = first_arrives s = arrive c m m0 m1 = m c s m NextArrived m1 = arrives s = arrive head m m m0 m1 = tail m s m CarLeft m1 = leaves s = arrive head m m m0 m1 = m0 s m LastCarLeft m1 = last_leaves s = arrive c m = m0 m1 = m0 s m NoCarInQueue m1 = reject q: Q; f: FUNCTION q states f function q = empty f = first_arrives q f queuing trans q = queuing f = arrives q f queuing trans q = queuing f = leaves q f queuing trans q = queuing f = last_leaves q f empty trans q = empty f = reject q f empty trans Invariants: a) The state Empty is the start state. b) Initial memory is an empty sequence of cars. c) The function is the new state of functions of queue. d) All the functions of X-machine take an input alphabet and memory element and return a message by altering the memory value. e) All the transitions of the machine take a state and a function and return a new state by altering the memory, read the input and return a message. [CAR] Q ::empty queuing Input ::arrive leave SigmaOut ::FirstArrived NextArrived CarLeft LastCarLeft NoCarInQueue Memory: seq CAR SigmaIn: Input CAR Function: SigmaIn Memory SigmaOut Memory CAR is a fundamental data type and Input is of type instruction. Memory is a set of sequences of cars. SigmaIn of type power set of (Input CAR), which contains an instruction and a car. Function is an abstract type of function which is defined to describe the functions of the queue. To define all the tuples of queue we reuse the general specification of stream X-machine SXM as defined in section 5.5. The formal specification of X-machine of a queue is presented above using Z notation. The function of the machine takes an input alphabet and a memory element, and returns output alphabet and new memory state. In the formal specification of traffic queue agent, we write SXM to denote the schema SXM that defines all the tuples of the general stream X-machine. The variables first_arrives, arrives, leaves, last_leaves and reject are the functions of type Function which traffic queue agent can perform. 5.12.3 Communicating Traffic Queue Agent The previously defined X-machine of a queue of cars can communicate with signal light in such a way: when the traffic light becomes green, the queue is notified to leave a car, and cars can depart one by one until there is least one car in the queue. More cars can arrive to the queue, waiting for a signal to depart. Whenever there is a green signal from the traffic light but there is no car in the queue the machine ignores the signal. Functionality of the communicating X-machine is defined as: The first_arrives and arrives functions read from standard input stream and write on standard output streams. The functions leaves, last_leaves and reject read from the communication stream of signal light instead of standard input stream and write the output to the standard output stream of TrafficcQueue. In this way every car leaves the queue whenever thers is a message from the signal light to leave that makes sure the safe depart of the car from junction. It may also write to a communicating input stream of another X-machine. The normal output of the functions is not affected. The definition of function in TrafficQueue changes from that in the definition of CommTrafficQueue. To specify the communicating traffic queue agent we reused the specification of TrafficQueue and CSXM schema. There is only need to define the communicating functions of the machine through which it can communicate with other agents of the system. CommTrafficQueue XTrafficQueue DCSXM SISO = first_arrives arrives SIOS = SIOS ISSO = leaves last_leaves reject ISOS = ISOS is = is os = os Invariants: a) In communicating X-machine of traffic queue, the definition of functions first_arrives and arrives remain same. The set of function SISO which read from and write on standard input and output streams respectively. It becomes SISO which contains two functions first_arrives and arrives. b) The definition of functions leaves, last_leaves and reject are changed as it reads from communication input stream and writes on standard output stream. The set of functions ISSO contains three function leaves, last_leaves and reject. c) The set of functions SIOS and ISOS remains same as SIOS and ISOS. d) The standard input and output streams is and os remains unchanged as is and os. 5.12.4 Traffic Light Agent A traffic light agent is characterized by the following elements: a) Two light signals red and green, b) Holds the total number of ticks elapsed since the last change of signal, c) Holds the number of ticks that a signal should be displayed, d) Holds the number of ticks before start the working and e) Switch between the signals. All the tuples of X-machine of traffic light agent are defined as: a) Set of input alphabets is a set of time unit called ticks. b) A set of output alphets = {Red, Green, Statrup}. c) The memory of the agent is defined as: (timeelapsed, delay, DurGreen, DurRed), where timeelpased shows the number of ticks elapsed since last signal changed, delay defines the times required to start, and DurGreen and DurRed are used to define the period of a signal to be displayed respectively. d) The set of functions of the agent are defined as: function = {delay, change_green, keep_green, change_red, keep_red}. The functions are activated by reading the input of type TICK. e) The transition functions of the agent are illustrated in Fig 5.4. f) The set of states is defined as = {red, green}. g) The state red is an initial state and m0 is the initial memory of agent. Q ::red green SigmaOut ::RedColour GreenColour StartUp Memory: i, j, k, l: 0 i 0 j 1 k 1 l i j k l Memory SigmaIn: TICK TICK is the abstract data type which is introduced to define the set of input alphabet SigmaIn of type power set of TICK. A TICK indicates a clock tick. Q is the set states of the agent. Memory is a set of possible memory elements of the agent which is defined as a power set of type (Z Z Z Z), where Z is a non negative integer value. To formally specify the traffic light agent we reuse the specification of SXM which defines all the tuples of the agent. Here we only define the particular functions of the agent which are delay, change_green, change_red, keep_green and keep_red of type Function. TrafficLight DSXM delay: Function change_green: Function change_red: Function keep_green: Function keep_red: Function q0 = red m0 = 0 20 60 40 function = delay change_green change_red keep_green keep_red g: SigmaOut; s: SigmaIn; m, m1: Memory; w, x, y, z: s alphaIn g alphaOut m memory m1 memory 0 w 0 x 1 y 1 z w x y z Memory m = m0 x 0 x = x 1 m1 = w x y z s m StartUp m1 = delay w z w = w + 1 m1 = w x y z s m RedColour m1 = keep_red w y w = w + 1 m1 = w x y z s m GreenColour m1 = keep_green w = z m1 = 0 0 y z s m GreenColour m1 = change_green w = y w = w + 1 m1 = 0 0 y z s m RedColour m1 = change_red q: Q; f: Function q states f function q = red f = keep_red q f red trans q = red f = change_green q f green trans q = red f = delay q f red trans q = green f = keep_green q f green trans q = green f = change_red q f red trans q = green f = delay q f green trans Invariants: a) The state red is the start state. b) Memory is initialized as (0, 20, 60, 40). c) The function is the new state of functions of traffic light. d) All the functions of x-machine are defined as: it takes an input alphabet and memory element and returns a message by altering the memory value. The transition of the machine takes a state and a function and returns a new state by altering the memory, read an input and write an output. 5.12.5 Communicating Traffic Light Agent A communicating traffic light agent communicates with traffic queue agent and controller agent. It sends a message to traffic queue agent which will be an input to the agent. It receives messages from controller agent to switch the signal as illustrated in Fig 5.5. The change_green function receives a message from controller and changes the signal from read to green and send a message to traffic queue agent to allow the cars to leave the queue one by one. It is assumed that one car leaves the queue in one tick. The change_red function receives a message from the controller agent and writes on its standard output stream. In formal specification of communicating traffic light agent the specification of stand alone light agent is reused to define the communicating agent. Further predefined specification of abstract communicating stream X-machine is also reused which defines the communicating functions of the agent. The formal specification of communicating traffic light agent is given below. CommTrafficLight XTrafficLight DCSXM SISO = delay keep_red SIOS = keep_green ISSO = change_red ISOS = change_green is = is os = os Invariants: a) In communicating X-machine of traffic light, the definition of functions delay and keep_red remain same. The set of functions SISO which reads and writes on standard input and output streams respectively becomes SISO that contains two functions delay and keep_red. b) The definition of functions keep_green is changed as it reads from standard input stream and writes on communication output stream. The set of functions SIOS contains a function keep_green. c) The set of functions ISSO and ISOS contains function change_red and change_green respectively. d) The standard input and output streams is and os remain unchanged as is and os. 5.12.6 Controller Agent The controller agent is used to control a number of traffic light agents. In our case study we assume that there are four traffic light agents with their corresponding traffic queue agent and hence there must be a need of controller that controls the light agents. The controller agent controls the multiple light agents by scheduling on the basis of round robin scheduling technique as illustrated in Fig 5.6. The controller is also responsible for the synchronization and allocation of time share to traffic lights. Q ::schedule_light1 schedule_light2 schedule_light3 schedule_light4 Memory: SigmaOut: SigmaIn ::clock_pulse switch_device Q is the set of states which contains schedule_light1, schedule_light2, schedule_light3 and schedule_light4. Memory and SigmaOut are of type power set of natural numbers. SigmaIn is a set of input alphabets which contains clock_pulse and switch_device. Controller DSXM operate: FUNCTION switch: FUNCTION q0 = schedule_light1 m0 = 0 function = operate switch g: SigmaOut; s: SigmaIn; m, m1: Memory s alphaIn g alphaOut m memory m1 memory s = clock_pulse g = m + 1 m1 = m + 1 s m g m1 = operate s = switch_device g = m m1 = m s m g m1 = switch q: Q; f: FUNCTION q states f function q = schedule_light1 q operate schedule_light1 trans q = schedule_light1 q switch schedule_light2 trans q = schedule_light2 q operate schedule_light2 trans q = schedule_light2 q switch schedule_light3 trans q = schedule_light3 q operate schedule_light3 trans q = schedule_light3 q switch schedule_light4 trans q = schedule_light4 q operate schedule_light4 trans q = schedule_light4 q switch schedule_light1 trans Invariants: a) The state schedule_light1 is the start state. b) Memory is initialized as (0). c) The variable function is the new state of functions of controller agent. d) All the functions of x-machine are defined as: it takes an input alphabet and memory element and returns a message by altering the memory value. All the transitions of the machine take a state and a function and return a new state by altering the memory, read an input and write an output. The formal definition of controller agent is defined as: The set of input alphabets = {clock_pulse, switch_light}. The output alphets are defined as a set of natural numbers. The memory of the agent is defined as a set of natural numbers. The set of functions of the agent are defined as: function = {operate, switch}. The transition functions of the agent are illustrated in Fig 5.4. The set of states is defined as {S1, S2, S3, S4}, where S1, S2, S3 and S4 are the instances of the traffic light agent. S1is the initial state and (0) is the initial memory of agent. 5.12.7 Communicating Controller Agent The communicating controller agent communicates with traffic lights to change the signal. It sends message tick to light agent and receives the message switch_device from the traffic light agent which provides a synchronization mechanism. In formal specification of communicating controller agent, the predefined stand alone controller agents specification is reused to define the communicating controller agent. Further predefined specification of abstract communicating stream X-machine is also reused which defines the communicating functions of the controller agent. The formal specification of communicating traffic light agent is given below. ComController XController DCSXM SISO = operate SIOS = SIOS ISSO = ISSO ISOS = switch is = is os = os Invariants: a) In communicating X-machine of controller agent the function operate remains same as defined in CSXM. The set of functions SISO which read from and write on standard input and output streams respectively becomes SISO that contain a function operate. b) The definition of function switch is changed as it reads from standard input stream and writes on communication output stream. The function ISOS contain a function switch. c) The set of functions SIOS and ISSO remain unchanged. d) The standard input and output streams is and os remain unchanged as is and os. 5.11.8 Agent based Traffic Control System The agent-based traffic control system (ABTCS) consists at a controller agent and four traffic light agents with corresponding traffic queue agents. The controller agent switches the signals of the traffic light agents. The traffic light agent communicates with controller agent and also with its corresponding traffic queue agent. The traffic queue agent only communicates with a single traffic light agent. To formally specify the ABSTCS we redefine the communicating stream X-machine system because there are three types of agents which communicate with each other. Therefore the existing definition cannot be used to define the ABTCS. In schema TrafficControlSystem the variables C1 of type power set of CommTrafficQueue is introduced to define the set of communicating traffic queue agents, C2 of type power set of CommTrafficLight to describe the set of communicating traffic light agents and C3 of type ComController to introduce the communicating controller agent. The variable CR is defined as a relation of type (CommTrafficQueue CommTrafficLight ComController) which defines a relationship between traffic queue agent, light agent and controller agent and provides a mechanism in which they can exchange messages. TrafficControlSystem C1: CommTrafficQueue C2: CommTrafficLight C3: ComController CR: CommTrafficQueue CommTrafficLight ComController cq: CommTrafficQueue; cl: CommTrafficLight; cc: ComController cq C1 cl C2 cc C3 cq cl cc CR In the above specification the invariant is defined as for all cq of type CommTrafficQueue, cl of type CommTrafficLight and cc of type ComController such that cq belongs to C1, cl belongs to C2 and cc belongs to C3 which holds that (cq,cl, cc) belongs to relation CR which indicates that these three agents can communicate with each other. To specify the ABTCS we introduced the variables queue1, queue2, queue3 and queue4 to define the four queue agent of type communicating queue agents. Similarly, light1, light2, light3 and light4 are introduced to describe the four traffic light agents which can communicate with other agents of the system. The controller agent is defined as controller. The variables nilq, nils and nilc are introduced to define the null value of sets C1, C2 and C3. This specification shows that we are not defining all the agents from scratch we just specify a single agent of one type and then we can create instance of these agent with different initial memory values an d start state according to the requirements. AgentBasedTrafficControlSystem DTrafficControlSystem queue1, queue2, queue3, queue4, nilq: CommTrafficQueue light1, light2, light3, light4, nils: CommTrafficLight controller, nilc: ComController queue1 . q0 = empty queue2 . q0 = empty queue3 . q0 = empty queue4 . q0 = empty light1 . q0 = green light2 . q0 = red light3 . q0 = red light4 . q0 = red light1 . m0 = (0, 0, 20, 60) light2 . m0 = (0, 20, 20, 60) light3 . m0 = (0, 20, 20, 60) light4 . m0 = (0, 20, 20, 60) queue1 . m0 = queue1 . m0 = queue1 . m0 = queue1 . m0 = C1 = {queue1, queue2, queue3, queue4, nilq} C2 = {light1, light2, light3, light4, nils} C3 = {controller, nilc} Invariants: a) In this specification we define the four instance of traffic queue agent. The initial state q0 and initial memory m0 of all the traffic queue agent is initialized by empty and empty sequence respectively. b) The initial state q0 of traffic light agent light1 is initialized by green which means that when the system starts the signal of traffic light1 must be green and the signal of the remaining light agent light2, light3 and light 4 must be read. c) The initial memory m0 of traffic light agent 1 is set to (0,0,20,60) which shows that at the startup it immediately starts working without waiting a single tick, it must remains green and red till 20 and 60 ticks respectively. d) The traffic light agents light2, light3 and light4 are defined with initial memory (0, 20, 20, 60). e) The set of communicating traffic queue agents is changed from C1 to C1 and consists of queue1, queue2, queue3 and queue4 agents. f) The set of communicating traffic light agents is changed from C2 to C2 and consists of queue1, queue2, queue3 and queue4 agents g) C3 the set of controller agents contains a single agent controller.

Sunday, May 17, 2020

The Threat Of Cyber Attacks - 943 Words

Cyber-attacks are constantly becoming a critical issue for government systems and for businesses around the world. In fact, the cyber challenges that we see today play a huge political factor for government sectors. The U.S is constantly facing these cyber security threats that jeopardize America’s critical infrastructure and the freedoms that many Americans express online (Bucci, S., Rosenzweig, P., Inserra, D. 2013). These challenges that are taking a political factor can also be seen in other countries as well and governments need to cooperate together to mitigate these challenges. In addition, cybersecurity challenges can also play a social factor as well for the world. With the increasing amount of devices connecting to the internet, cyber criminals are able to cause massive harm to users around the world. In fact, â€Å"21% of internet users have had an email or social networking account compromised or taken over by someone else without permission† (Ranine, L., K iesler, S., Kang, R., Madden, M. 2013). It is important for people to cooperate with each other by being more aware and enforce good security practices when they are on the web. There is also one more cybersecurity challenge that plays an economical factor in today’s world. In fact, the average total cost of a data breach increased by 23% with a total of $3.93 million (Ponemon, L. 2015). It is important to have a global cooperation about these cyber challenges so that we can address these challenges in a smartShow MoreRelatedCyber Threats And Cyber Attacks Essay946 Words   |  4 PagesAccording to the U.S. Department of Homeland Security in the article Cyber Threats to Mobile Phones, phones are now sharing hardware and software similar to a PC and becoming each time more like a PC. Therefore, the risks of being hacked are increasing, allowing hackers to attack mobile devices the same way as if they were doing it with a regular PC. Personal and professional information are more often stored on mobile devices therefore it is imperative to have our data secure. Security solutionsRead MoreThe Threat Of Cyber Attacks1127 Words   |  5 PagesIn respect of the threat of further cyber-attacks, the organisation could apply software patches as and when they become available, rather than periodically. One consequence of this action could be increased downtime to clinical systems whilst patches are applied, which could affect patient care. The organisation could also look to provide staff training on IT security risks. Subsequently this could increase staff awareness and equip them with the relevant knowledge to deal with such issues. FinallyRead MoreThreats of a Cyber Attack811 Words   |  3 PagesIntroduction Cyber threats are currently of large enough significance to enough to constitute a full blown national security priority in the West and the United States. In fact, we may be at zero hour. In order to better understand the challenges that cyber infrastructures are facing, it is necessary to understand the level of the threat that is posed, where the potential threats may emanate from, the techniques which help in identifying emerging cyber security threats posed by those who perpetrateRead MoreCyber Attacks : The Threat Of Cyberterrorism2809 Words   |  12 PagesHacking to Peace: The Threat of Cyberterrorism Computer systems have become essential to the way of life that exists in the United States and other Western nations. However, America’s dependency on computers results in the nation being vulnerable to cyber-attacks. This paper will discuss cyber threats to American security as they pertain to the nation’s government, military, businesses, and infrastructure. Such threats include possible acts of cyber terrorism, as well as espionage and informationRead MoreCyber Attack And Cyber Attacks Essay1656 Words   |  7 Pagestoday fear terror attacks that include bombing use of reinforcements like machines guns and other firearms. This is because terror attacks most of the times leave many people dead and others disabled while others are left without families. However, there is another attack today in many nations that can be destructive like a terror attack and this is the cyber-attack and threats. Cyber-attacks can be responsible for large mass destructions by making all s ystems connected to cyber networks fail to workRead MoreCyber Terrorism1716 Words   |  7 Pagesbombing of a Chinese embassy in Belgrade. During this attack, government sites were hijacked and some sites suffered a denial of service attack. Most recently, it was suspected that Bank of America was the victim of a cyber terrorism attack; although no definitive evidence is available to substantiate that claim.   Cyber terror attacks pose a threat against the national security of the United States. In order to fully comprehend the threat that cyber terrorism poses, it is essential to understand theRead MoreInformation Is A Source Of Power In International Relations.967 Words   |  4 Pagesany state places enough importance on a resource of power, that resource becomes a target. An attack on informational structures of a state are cyber-attacks or â€Å"the use of computational technologies in cyberspace for malevolent and destructive purposes in order to impact, change, or modify diplomatic and military interactions between entities† Cyber-attacks are increasingly becoming daily security threats in both private and public sectors of a state. In 2016, 64% of Americans stated they have anRead MoreCyber Security Is A Growing Concern For Governments Around The World1296 Words   |  6 PagesGlobal Cooperation for Cyber Security Cyber Security is a growing concern for governments around the world. Cyber-attacks pose a direct threat to the security of the nations’ critical infrastructures and Information Technologies (IT) as a low-cost asymmetric warfare element. Most of these nations are aware of the vulnerability of the information technologies and the significance of protecting critical infrastructures. To counteract the threat of potentially disastrous cyber-attacks, nations’ policy makersRead MoreAmerica And Its Homeland Security Online Essay1587 Words   |  7 Pagesperson over the internet. People’s identities are being stole to help carry out these terrorist acts and this is just the being of it. The United States created the Department of Homeland Security as a result of the 9/11 attacks. This was an effort to prevent future terrorist attacks on our nation. Along with that department, laws have been enacted, such as the USA PATRIOT Act. This law was introduced and passed to pro vide Federal, State, and local law enforcement agencies with better resources toRead MoreNuclear Facilities Are Among The Most Highly Secured Infrastructure1592 Words   |  7 Pagesnew digital systems throughout different facilities. In order to lower the risks of physical and cyber-attacks, nuclear facilities are adopting strict protection policy and practices. Despite the implementation of these safety measures, digital instruments and computer-based systems associated with physical protection system and control system inside the facilities can still be exposed to more cyber vulnerabilities. The dependency on digital system can endanger cybersecurity and the physical security

Wednesday, May 6, 2020

State University s Concrete Canoe Team - 1475 Words

During my first semester of college, I learned a lot of information, including the existence of Fairmont State University’s Concrete Canoe Team. The first time I heard about it was during my freshman course, Light Construction. Light Construction’s Professor’s, Tabitha Lafferre, first discussion included discussing how important extracurricular activities are and recommended any Civil Engineering Technology majors to look into Fairmont State’s Concrete Canoe Team due to their many accomplishments and successful reputation. Professor Lafferre held a class meeting where members of the Concrete Canoe Team came and spoke to us about the organization. There are currently twenty-one students on the team, only four of which are girls. Even†¦show more content†¦The most recent article I found was published on Wednesday, June 15, 2016, titled â€Å"FSU Concrete Canoe Team Places 12th in the Nation†. Just seeing the title peaked my interest and afte r reading the article I learned that during the team’s thirteenth trip to the ASCE National Concrete Canoe Competition on June 11, 2016, (at the University of Texas in Tyler, Texas) they tied their best ranking of twelfth in the nation. They also placed ninth in the women’s sprints which broke a record for their best placement in the competition. After further investigation, I learned that the ASCE organization and Concrete Canoe Team’s current goal is to break the longest overall consecutive national appearances record ever held by a team. The current record is fifteen consecutive appearances. Fairmont State University’s Concrete Canoe Team placed eighth overall for final product and display, tenth for their oral presentation, fourteenth for their technical paper, ninth for the women’s sprint, as mentioned earlier, and eighth for the men’s sprint. The Fairmont State University student ASCE chapter was also the runner up for the Ridgeway Awa rd, the top student chapter international award. Professor Como, former president of Fairmont State University’s ASCE student chapter, stated in the article â€Å"Fairmont State University remains the only college or university in the state to qualify for the national competition. OurShow MoreRelatedHistory of Educational Technology2929 Words   |  12 Pageslearners could explore and build), simulations (computer environments where learner can play with parameters of dynamic systems) and hypertext. Digitized communication and networking in education started in the mid 80s and became popular by the mid-90s, in particular through the World-Wide Web (WWW), eMail and Forums. There is a difference between two major forms of online learning. The earlier type, based on either Computer Based Training (CBT) or Computer-based learning (CBL), focused on the interactionRead MoreHistory of Educational Technology2941 Words   |  12 Pageslearners could explore and build), simulations (computer environments where learner can play with parameters of dynamic systems) and hypertext. Digitized communication and networking in education started in the mid 80s and became popular by the mid-90s, in particular through the World-Wide Web (WWW), eMail and Forums. There is a difference between two major forms of online learning. The earlier type, based on either Computer Based Training (CBT) or Computer-based learning (CBL), focused on the interactionRead MoreBig five Personality Traits7561 Words   |  31 Pagestraits in personality without overlapping. During studies, the Big Five personality traits show consistency in interviews, self-descriptions, and when observed.[2]  Acronyms commonly used to refer to the five traits collectively are OCEAN, NEOAC, or CANOE. Beneath each factor, a cluster of correlated specific traits is found; for example, extraversion includes such related qualities as gregariousness, assertiveness, excitement seeking, warmth, activity, and positive emotions.[3] Contents  Ã‚  [hide]

Importance of CSR to AVEO Free Samples †MyAssignmenthelp.com

Question: Discuss about the Importance of CSR to AVEO. Answer: Introduction The goal of this paper is to bring to light the ramifications of their financial decisions, the corporate goals and recommendations. The purpose of this paper is to find out the importance of CSR to AVEO and why its share price has been fluctuating for the last two years (Allouche, 2006). The sources used in this paper are the companys website, newspaper articles relating to the company and books that give insight to the topic. The conclusion suggests that the company share price has been fluctuating as a result of bad public image. It is also important to that the company engaged in CSR activities (Berk and DeMarzo, n.d.). We start from the conviction that the activity of the company must not only serve its own profitability objectives, but must also consider the impact of its activities in the environmental and social environment, supply chain, distribution, communities , etc. The company is a social agent that plays a relevant role in the environment where it operates. The strategy of a company that wants to be sustainable seeks lasting relationships of trust and reciprocal commitment to the agents involved in its activity or affected by it-stakeholders or not-and it does not only pursue economic and financial profitability - fulfill the expectations of the investors or shareholders (Cassedy, 2004). Confidence between managers, shareholders, employees, customers and suppliers is an intangible asset that generates positive synergies and adds value to the company. This is in line with other ethical principles guiding the business such as Trustworthiness, respect, fairness, caring and citizen ship. Social responsibility must be an integral part of a company's business strategy; so that it is not reduced to isolated actions of different departments but, based on the conviction of management, permeate the culture of the entire organization and integrate into different strategies, practices and management systems. It must have tools to assess the level of compliance with sustainability commitments and must report on the results of its internal and external management - transparency. Internal communication and dialogue with stakeholders will help redefine sustainability objectives and foster innovation and continuous improvement (Corporate Social Responsibility, Corporate Restructuring and Firm's Performance, 2010). impact of financial decisions on sustainability and social responsibility Aveos organizational goals are as follows; One, is profitability, the company seeks to increase its profitability. Second, is to increase its market share, third, is to improve its productivity and lastly is to be socially responsible. Aveo should invest in mending the relationships with its customers, in addition to pursuing profitability and applying the traditional investment criteria, meet environmental, social and good governance criteria, to improve sustainability (Dalton, 2013). They are the ethical funds-investment in companies that fulfill requirements related to corporate social responsibility- and solidary investment funds -funding of social or development projects and microcredit. However, it is not right the company treats the vulnerable in a wrong manner and expect the profits to rise. Its products are not conditioned solely by criteria of speculation in the financial markets, nor do they seek only the maximum profit (Shaw, 2017). Business Ethics Transparency is also a fundamental tool to maintain credibility and trust in ethical business. In fact, they offer broad access to information on beneficiary projects. The shareholder activism or active participation in the meetings of shareholders of companies, to maintain a dialogue with the management team in order to improve the ethical practices of the company. Corporate Social Responsibility When we talk about Corporate Social Responsibility (CSR ) and Socially Responsible Investment (SRI), why not also talk about Financial Social Responsibility (RSF)?Financial Social Responsibility (RSF) refers to the financial activity carried out by the company. This have an effect on the financial position of the company. The strict regulation and supervision that the company has is a normative institutionalization of the interests of two essential groups: the clients and the society. Despite this, there have been failures that have led to the crisis of the sector along with its current process of restructuring, adding the challenge of developing a satisfactory CSR. Given this situation arise the following research questions: what is understood in companies by CSR? Is it necessary, in the opinion of the participants, for business success? Are your companies socially responsible? What CSR actions do they carry out? Do companies get benefits for being socially responsible? Does your situation improve a company that adopts practices and actions of CSR? The objectives of the present work are to identify if the managers of the companies recognize the necessity of the CSR; verify what they understand by this concept and whether they are aware of the importance of incorporating CSR actions in their organizations and the benefits that can bring them. It was also investigated whether the interviewees know companies that are, in their opinion, successful and socially responsible at the same time. Besides the financial management and the fulfillment of its own objectives of financial profitability -expectations of the shareholders- and of solvency - closing the outstanding debts -, take into account the impact of their activities, in this case financial, in the short and long term, in the social environment, in the supply chain. The company as a social agent also seeks lasting relationships of trust and reciprocal commitment with the agents affected by its financial activity: managers, shareholders, employees, clients, suppliers, financing entities or companies, etc. With respect to the environmental impact, Aveo can consider as an expense the liability requirements in this regard. However, they have to see that responsible environmental management can bring opportunities to generate value, such as greater ease in finding financing. Aveo as an investment. Considerations and recommendations Aveo as an investment is a highly profitable business and has shares that are worth a lot. As a pharmaceutical company, the share price has taken in a hit after it was accused of ripping of off their customers. Most of their customers are the elderly and the vulnerable and so the public has lost confidence due to the perceived evidence of rip off.An Aveo investment is running down the drain. This is because people are not willing to invest in the share anymore. Sometimes corporate governance dictates that the investor will always refrain from investing in a company that has malpractices and treats its customers unfairly. In June 2014, the introduction of the share trades at between $1.99 and $2.3o. it however fluctuates between the two price figures. It has the highest trading price of $3.65 between April and November 2016. Recommendations It is recommended that for the share price to be at its best or trade at its highest, Aveo must act at its best. The corporate management practice must be withheld to the latter and all rules, principles and practices of good corporate governance must be affected (Financial performance, 2013). This is only for ensuring that the investors have maximum confidence in the management, board and running of day to day activities of the company. It is true to say that any negative practice will affect the companys share negatively. The Aveo share will fluctuate depending on the type of information that is released out there in the market. It may either affect the companys share positively or negatively (Gitman and Zutter, 2015).As in many cases, addressing the negative definition of CSR helps to better understand the true meaning of the concept and avoid terminological confusion that is common in CSR of the company.With this aim, we will briefly comment on some concepts that are related to C SR but which are not CSR.Social action is a complement to CSR practices and can never replace them. A company can be socially responsible without doing social action and can be irresponsible even if it allocates large amounts of money to social action (Haerens and Zott, 2014). Social action is, the icing on the cake, the culmination of a whole series of good business practices. Sustainable development. Idea born at the Rio summit in 1992 and that advocates harmonious development in the economic, social and environmental fields so that current development does not limit the development possibilities of future generations. The Club of Excellence in Sustainability defines sustainable development as one that, based on continued economic growth, contributes to social development and the proper use of the natural environment, making it possible to increase the value of companies for all interested parties. spectacular development of CSR, the growing interest in these issues and the imp lementation of sustainable management in companies originates in a series of causes that have driven this phenomenon (MORRISON, 2016). Some of the main reasons that strengthen the development of CSR are: The ethical origin of the RSCT has traditionally been thought that the world of the company was independent of the moral sphere and that the economic rules were different from the moral ones: "businesses are business". However, the stakeholders of the company have broken with this dissociation and require the company to make the economic benefits compatible with conduct based on strong ethical values (Financial management, 2014). Share price history for the past 2 years In June 2014, the introduction of the share trades at between $1.99 and $2.3o. it however fluctuates between the two price figures. It has the highest trading price of $3.65 between April and November 2016 (Manos and Derori, 2016). This may be because the company share has just been introduced for trading and its still weak before it can become better. In August 2015, the company share price was valued at slightly above $2.8 as it continues to strengthen. In April 2016, the companys share continues to trade in a bullish way at $ 3.2 which is a good sign for investor confidence in the company (MORRISON, 2016). Between this period and November 2016, the company trades at its highest recording an incredible $3.65 but starts to plummet after that. By June 16th 2017, the companys share has plummeted to a low of $ 2.8 and its still plummeting. This is because of the news that the company is treating its customers with contempt and neglecting the vulnerable. Causes of fluctuations in the share price and the volumes traded The effect of changes in share prices on investment project decisions in terms of delays, cancellations and successful terms is analyzed. In particular, legit and duration models are used to study a database of investment projects classified by economic sectors (Financial performance, 2013). The analysis framework is the model of real options where commodity prices are used as a variable associated with future income while price volatility is associated with uncertainty about such income (Penning, 2012). Share fluctuates due to market forces, political environment, competing shares in the same industry and internal operations of the company.The series of scandals derived from bad business practices that have jumped public opinion and caused great losses to small investors have been a trigger to require companies to conduct appropriate behavior to regain confidence in them and in the rules of the market.A clear example of stakeholder pressure is the activism of shareholders or the dem ands of employees (Perrini, Pogutz and Tencati, 2006). Increasingly, shareholders make their decisions taking into account, in addition to the financial results of companies, their performance in the social and environmental fields. In addition, this trend is strengthened by the leading role these issues are having in the General Shareholders Meetings. Conclusions Aveo has to make its internal business ethics and practices very open and transparent in order to regain the customers confidence (Perrini, Pogutz and Tencati, 2006).Ethics does not question profitability but how companies earn their profits . In short, also in the world of business, the principle "the end does not justify the means" applies. This growing ethical reflection on the performance of companies and their management has strongly fueled CSR (Schreck, 2009).Investors have preferred to leave their assets quiet and wait for the days of crisis to pass. This can be evidenced in the decrease in the volume of trading in the market. It is only good ethics and corporate social responsibility that can positively affect the companys performance in terms of share prices and possibly its profitability. References Allouche, J. (2006).Corporate social responsibility. Basingstoke [England]: Palgrave Macmillan. Cassedy, P. (2004). Finance. San Diego, Calif.: Lucent Books. Corporate Social Responsibility, Corporate Restructuring and Firm's Performance. (2010). Gardners Books. Dalton, H. (2013).Principles of Public Finance. Hoboken: Taylor and Francis. Financial management. (2014). London: BPP Learning Media Ltd. Financial performance. (2013). Que?bec, Que?bec: Investissement Que?bec. Gitman, L. and Zutter, C. (2015).Principles of managerial finance. Boston: Pearson. Haerens, M. and Zott, L. (2014).Corporate social responsibility. Detroit: Greenhaven Press. Manos, R. and Derori, I. (2016).Corporate responsibility. Basingstoke, Hampshire: Palgrave Macmillan. MORRISON, M. (2016).PRINCIPLES OF PROJECT FINANCE. [Place of publication not identified]: ROUTLEDGE. Pandey, I. (2015).Financial management. New Delhi: Vikas Publishing House PVT LTD. Penning, A. (2010).Financial performance workbook. Worcester: Osborne Books. Perrini, F., Pogutz, S. and Tencati, A. (2006).Developing corporate social responsibility. Cheltenham, England: Edward Elgar. Schreck, P. (2009).The business case for corporate social responsibility. Heidelberg: Physica-Verlag. Shaw, W. (2017).Business ethics. Boston, MA: Cengage Learning.