Thursday, October 31, 2019

Legislative Issues Paper-reimbursement for Nurse Practitioners Research Paper

Legislative Issues -reimbursement for Nurse Practitioners - Research Paper Example According to Frakes and Evans (2006), in 2003, the federal government spent 13% of its budget on Medicare services. This means that the federal government spent as much as $271 billion on providing health care services to the needy citizens (Frakes and Evans, 2006). As a result of the increasing allocation on health care programs and policies, the federal government has put significant interest in managing and controlling its costs on implementing these health care programs. In doing so, the federal government has used the legislation to control health care costs by creating a regulatory structure that will regulate resultant costs and prevent fraud within the health industry (Frakes and Evans, 2006). Because of these regulatory policies and programs, health care providers in both patient care and practice are affected (Frakes and Evans, 2006). Of the health care providers that are very much affected of the regulatory efforts set by the federal government, the advanced practice nurse s (APN) are among them. Nurse practitioners (NPs) and clinical nurse specialists (CNSs) make up APNs (Frakes and Evans, 2006). According to (Hamric, Spross, and Hanson, 2009), the roles of APNs include nurse practitioners (NPs), certified registered nurse anesthetists (CRNAs), clinical nurse specialists (CNSs), and ), certified nurse-midwives (CNMs). ... uently, health providers such as physicians and registered nurses are reimbursed under the Current Procedural Terminology system which is created by the American Medical Association (Frakes and Evans, 2006). In this system, which was developed in 1966, reimbursements for a service are determined through the individual provider’s relative value scale (Frakes and Evans, 2006). Subsequently, the value scale, according to Richmond, Thompson, & Sullivan-Marx (2000), is thereby established based on the professional liability insurance cost, practice expense, and work done of the provider, and then multiplied by a geographic expense adjustment modifier. Incidentally, under the reimbursement system, APNs can receive reimbursements from the government’s Medicare and Medicaid programs, commercial insurers, self-insured institutions, and managed care organizations for the services they provide (Frakes and Evans, 2006). With the Omnibus Budget Reconciliation Acts of 1989 and 1990, APNs are able to receive reimbursements; however, Richmond, Thompson, & Sullivan-Marx (2000) maintain that the limitation of this Act is that reimbursements are confined to those who practice inside skilled nursing facilities and rural areas. Another restriction to the reimbursement rights of APNs is that APNS can reimburse only for services billed as â€Å"incident to† a physician’s care but requires that the APN be employed or contracted with the physician (Frakes and Evans, 2006). Through this set-up, physicians enjoy reimbursements at 100% of their rates. Clearly, the disparity between APNs and physicians is manifested through these reimbursement policies. In a study of Ruchlin, Levey, and Muller (1975), they define the function of reimbursement programs. In their study, they utilize the

Tuesday, October 29, 2019

Concert Critique Research Paper Example | Topics and Well Written Essays - 750 words

Concert Critique - Research Paper Example There was a small bar at the end of towards the wall. Many people were at the bar and it was nearly impossible to push one’s way through to use the bathroom on the exterior. At the back of the venue there was a variety of different lights that shined on the stage. Below these different lights was a sound system that was managed by an individual sitting behind it. This individual sitting behind the sound system did not move throughout the entire show and he was entirely focused on adjusting the music nobs to ensure that the concert was conducted effectively. In terms of crowd size, there were probably 200-300 people in attendance. The collection of these people increased in attendance from the beginning of the show and by the end of the show the numbers were around the 300 mark. Most of the people in attendance were the same age from their 20s to early 30s; however there were a handful of people in their late 30s that were in attendance. Many different ethnic groups were in att endance, although the main ethnic group in the audience was white Caucasians. The stage for the performance was not decorated for any of the bands that performed. However, there was lighting that occurred for each of the bands. When the final band came on stage, the lighting was coordinated with specific aspects of their performance such that the audience could see these different aspects during specific parts of songs. While the audience did not entirely sell-out, it was close to selling-out towards the end of the concert and there was virtually no room left for people to stand in the auditorium. The acoustics in the concert area depended largely on the band that was performing. In all instances, the sound was loud. However, the opening bands used guitars and the final band was more electronic based. These changes in instrumentation resulted in different levels of sound quality, with the greatest sound

Sunday, October 27, 2019

Advantages And Disadvantages Of Different OS Computer Science Essay

Advantages And Disadvantages Of Different OS Computer Science Essay An operating System is a program or you can say its software that manage and handles all the software and hardware resources of any computer. It controls our computer system. Operating system is the first software that loaded in a computer memory. Without an operating system user cant open the computer system that means he cant turn on his system. Actually an operating system is a program which design for only to run the other programs on a system. Operating system is the most important program for any computer system. The controls and memory of a computer depends upon the operating system. LINUX is also an operating system like Windows, Mac etc., which enables applications and users to access the device. It was created by the student at university of Helsinki, Finland. Its developed after UNIX. Linux is actually a developed form of UNIX operating system which behaves like UNIX. Linux was released around 1991. It is available in source code as well as in binary form. Linux have lots of standard UNIX features like networking, multitasking and multiuser. It became famous for mainly server. You can say it mainly use on server due to its high security. LINUX is actually technically advanced than other operating system. If we consider about its user interface then you can say its something difficult for the new users in comparison of windows and other operating system. Security is the one of the most best and important features of LINUX. Due to this reason it is widely use on server. Advantages of LINUX There are so many advantages of LINUX operating system. I am going to describe some important advantages or features: Cost: The one of the most important advantage of LINUX is its cost. User can obtain this without paying any fee. While Microsoft products are highly rated. Microsoft licences are generally allowed for a single computer while LINUX can be installed in so many computer systems without paying any amount. So obviously you can say LINUX is free of cost. Security: This is the greatest feature of this operating system. LINUX became most famous due to its high security. Due to this reason it mainly used on server. The one more thing is you dont need to spend so much money on antivirus for virus protection. LINUX is very secure in comparison of windows. It has so many features that protect our system to unauthorized users. That means you cant do anything without permission. No viruses can affect the LINUX. So you can say its virus free operating system. Hardware: LINUX operating system is very useful for those who have old computers. It can be installed in low configuration system and it will work really fine. Software: Some software like word, power point, excel DVD burner etc. are inbuilt in LINUX operating system. So you can say there are so many important features in LINUX operating system. Disadvantages of LINUX Understanding: The user interface of LINUX is difficult for the new users. That means you can say it is not familiar operating system like windows. If anybody want to use LINUX operating system then first of all ha has to learn about LINUX. While in windows you dont need to do that. So it will take some time to learn. Compatibility: The one of the main problem of LINUX is that is not compatible with all hardware. LINUX doesnt work very well with the new and latest hardware. So you cant try it with the latest hardware. Where is LINUX? Today LINUX be used in varieties of technical and electronic equipment. Dell Inspiron Mini 9 and 12 Garmin Nuvi 860, 880, and 5000 Google Android Dev Phone 1 HP Mini 1000 Lenovo IdeaPad S9 Motorola MotoRokr EM35 Phone One Laptop Per Child XO2 Sony Bravia Television Sony Reader TiVo Digital Video Recorder Yamaha Motif Keyboard These are the some examples where LINUX be using. So you can say LINUX be using worldwide. Apart from that LINUX be used in defence department of US. Even Google search also run on LINUX. LINUX VS Windows LINUX and Windows both are the successful operating system in worldwide. There are so many advantages and disadvantages in both operating systems. If we consider about cost then absolutely LINUX is totally free of cost for user but not windows. Windows operating systems are highly rated. Microsoft Windows are most popular than LINUX because its user interface is so friendly for user. If any new user wants to operate LINUX then first he will have to learn about it. LINUX dont need high configuration of computer. It will work very well with the old computer systems. The most important and the best thing about LINUX is security. Its security is so high. No viruses can affect the LINUX. Thats why it mainly used on server. LINUX has always been a very secure operating system. So if you are using LINUX then you dont need to spend so much money on anti-virus. You can say LINUX is virus free operating system. Windows is very friendly in compare of LINUX. In the whole world most of user use windows. LINUX has some useful inbuilt software like excel, power-point, word; CD/DVD burner etc. without permission unauthorized user cant use the LINUX operating system. So finally you can say LINUX and Microsoft Windows both have some own features and as well as disadvantages. LINUX Gaming LINUX Gaming means the games which develop for LINUX operating system. There are lots of games available in the market for LINUX operating system. This is fact that Windows have a very huge collection of games in comparison of LINUX operating system. Here I am going to describe some LINUX games: Neverball: Actually Neverball is a puzzle game with lots of fun. You have to use mouse or keyboard to move the ball and you have to collect coins. If you will not collect the coins then you can never go in the next level. So the main goal of the game is to collects the coins. The graphics quality of the game is so nice; especially the stage of the game seems very pretty. There are total 75 levels in the game. Its very tough to win in one sitting. This game is also available for windows. Frets on Fire: It is just like a Guitar Hero game. You can say it just a remake of this game. The best features of the game are that you can edit your own song and play the game. This game is totally based on the music flow and user can also download so many songs for this game. The game already comes with some preloaded tone. This is mainly single player game which is developed by Unreal Voodoo around August 2006. The game is developed on Python programing. It is also available for Microsoft Windows and Mac operating system. A Fret on Fire X is one of the famous versions of the game. If user wants to change his track then he can. The best part of the game is audio because its upon you. There are lots of modes of this game that you can download from net. You can change your gameplay and also overall looking of the game. FlightGear: This is one of the most popular games of LINUX operating system. FlightGear is a flight based game developed by the FlightGear project during 1997. The game is mostly written in c++ language. This game is available for Windows, LINUX and Mac. There are so many version of the game is available for user. The most recent version is 2.0.0 that came in 2010. The game has a large collection of aircraft and locations. The graphics of the game is not so well, but overall it seems good. Texture of the hills, clouds, runway, rivers, and road are pretty well. The game is all about flying. You can also add scenery in game from the net. Adding scenery and aircraft is very simple. The gameplay of the game is very realistic and interesting. The game provides so many options to the user, even you can also create a model and you can use that in the game. Americas Army: This is a multiplayer first person shooting game published by Ubisoft in 2002. The game is also available for Windows and Mac operating system. As the name, game is totally based on US military. Americas Army 3 is the latest version of the game. The game used Unreal Engine 3. The game looks very fantastic and realistic. All the characters, weapons, locations etc. seems very nice. The graphics and the sound quality of the game is really awesome. The sound effects of the weapons are very nicely done. The game starts from training session which takes a long time. After than you have to complete the mission one by one. You can say this game is the combination of teamwork, strategy and patience. The online play is more interesting and popular because it is so well done. The game has lots of challenging situations and you will enjoy.

Friday, October 25, 2019

HIV and AIDS: How Has It Developed? :: HIV AIDS Diseases Health Essays

How Has It Developed? Only within the last two decades have HIV and AIDS become largely visible in the United States and across the globe. It may appear that there is virtually a void in legislation dealing with HIV and AIDS because of the relatively recent increase in public awareness. Perhaps, though, this lack of legislation should not be surprising considering the fact that almost no other specific illnesses are the target of direct legislation. The rights of patients are often the topic of new laws; however, exact diseases or disorders are not usually expounded upon in these broader forms of legislation. The situation involving the possible transmission of HIV to Kimberly Bergalis from her dentist provoked many calls for specific legislation requiring medical professionals to be tested for HIV. Additionally, some suggest that if a health care provider tests HIV positive that he or she should be required to disclose this information to all involved patients. Since there is no preexisting legislation on mandated HIV testing for health care professionals, one must apply broader, more ambiguous interpretations of the Constitution in order to mount cases both for and against the implementation of required HIV testing [Notre Dame J. of Law]. The Amendments of the Constitution that are most applicable to the debate over required HIV testing are the Fifth and Fourteenth Amendments, which contain elements of the right to equal protection, and the fourth amendment, which contains elements of the right to privacy. The Fifth Amendment involves the role of the federal government, as opposed to th e Fourteenth Amendment which addresses the role of state governments [Notre Dame J. of Law]. An excerpt from the Fourteenth Amendment of the Constitution is given below: "†¦No state shall†¦deny to any person within its jurisdiction the equal protection of the laws." (The Constitution of the United States of America can be viewed in its entirety at http://www.publicadministration.net/resources/the-united-states-constitution/ ) The Fourteenth Amendment states rather clearly that citizens have the right to equal protection, but the Fifth Amendment does not express this right in such an explicit manner. However, Supreme Court rulings have cited the Fifth Amendment as a source of the right to equal protection through due process in various cases [Notre Dame J. of Law]. An American citizen's fundamental right to privacy is supplied by the Fourth Amendment. This amendment, as stated below, is traditionally known as the Search and Seizure Amendment. "The right of HIV and AIDS: How Has It Developed? :: HIV AIDS Diseases Health Essays How Has It Developed? Only within the last two decades have HIV and AIDS become largely visible in the United States and across the globe. It may appear that there is virtually a void in legislation dealing with HIV and AIDS because of the relatively recent increase in public awareness. Perhaps, though, this lack of legislation should not be surprising considering the fact that almost no other specific illnesses are the target of direct legislation. The rights of patients are often the topic of new laws; however, exact diseases or disorders are not usually expounded upon in these broader forms of legislation. The situation involving the possible transmission of HIV to Kimberly Bergalis from her dentist provoked many calls for specific legislation requiring medical professionals to be tested for HIV. Additionally, some suggest that if a health care provider tests HIV positive that he or she should be required to disclose this information to all involved patients. Since there is no preexisting legislation on mandated HIV testing for health care professionals, one must apply broader, more ambiguous interpretations of the Constitution in order to mount cases both for and against the implementation of required HIV testing [Notre Dame J. of Law]. The Amendments of the Constitution that are most applicable to the debate over required HIV testing are the Fifth and Fourteenth Amendments, which contain elements of the right to equal protection, and the fourth amendment, which contains elements of the right to privacy. The Fifth Amendment involves the role of the federal government, as opposed to th e Fourteenth Amendment which addresses the role of state governments [Notre Dame J. of Law]. An excerpt from the Fourteenth Amendment of the Constitution is given below: "†¦No state shall†¦deny to any person within its jurisdiction the equal protection of the laws." (The Constitution of the United States of America can be viewed in its entirety at http://www.publicadministration.net/resources/the-united-states-constitution/ ) The Fourteenth Amendment states rather clearly that citizens have the right to equal protection, but the Fifth Amendment does not express this right in such an explicit manner. However, Supreme Court rulings have cited the Fifth Amendment as a source of the right to equal protection through due process in various cases [Notre Dame J. of Law]. An American citizen's fundamental right to privacy is supplied by the Fourth Amendment. This amendment, as stated below, is traditionally known as the Search and Seizure Amendment. "The right of

Thursday, October 24, 2019

Increasingly multicultural Essay

Montreal is a vibrant cosmopolitan city that is becoming increasingly multicultural. although this is the case Quebec’s language laws have made it all but impossible to post outdoor signs in languages other than French. Other disadvantageous do not point just to those who do not speak French. Since Bill 101 was passed in 1977 many were skeptical over the change in the school system when it urged Quebec to change a law that requires most immigrant children to get their schooling in French. The law that now keeps most immigrant children out of English schools, Bill 101, was enacted 22 years ago under the authority of our good old friend Rene Levesque in response to nationalist fears that a pronounced tendency among Quebec allophones to choose an English education for their children – together with a low francophone birth rate – posed a long-term threat to the future of the French language, especially here in Montreal. Why couldn’t the city be left the way it was, the needless threat of all of Quebec’s language laws have posed a menace to society. The more laws that have been passed the more the French Majority have become involved resulting in a greater vigor to stay free from English. There have been in the past many riots and angered separatists willing to give their lives for the right to keep the French language intact. If the Government hadn’t been so enthusiastic over efforts to change the face of the province maybe the majority of the population would have left the issue of language alone and accepted the English for what they are. Many have grown through the upbringing of their parents to treat everybody the same, and also by the old saying. Don’t judge a book by its cover. It is a complete outrage for the Government to witness crimes of hate and to ignored them by making the problem worse by going ahead with their proposed we hate the English lets get them out of here law. That has definitely been the way that allophones have felt and they were never given a fair share of anything, not even a vote. After the referendum this had become the talk of the nation when rumors suggested that die-hard separatists had tampered with the votes after the 1994 referendum when Quebec narrowly escaped separation from Canada by just a hair’s breadth. But the havoc hadn’t only just begun, there were incidents in the past when Prime Minister Trudeau was in charge that literally tested the lives of allophones, closer to home over here in Westmount. Alleged obstinate separatists preformed acts of hate on Montreal’s well-known English community. Bombs were neatly placed in to mailboxes that were, appallingly, set to detonate once opened. This spelled danger to Montreal’s allophone community who flocked elsewhere to get away from the unbearable tensions that were built amongst them by these alleged terrorists. That is exactly why I disagree with Mordecai Richler’s opinion over Montreal’s status. He once said. â€Å"We Haven’t Lost our heads only our apostrophes†¦. Montreal however diminished is still to my mind the most agreeable city in Canada. And this is because the two cultures not only confront eachother but also continue to enrich eachother. † How could such a knowledgeable man ignore all the violence and the lack of equality. It has to be said that there has never been a time when it was liberated to say that we have grown to enrich each other because it quite simply isn’t true. Problems between the two vibrant cultures have not caused astronomical damage, but enough damage to believe that allophones are not wanted. Tensions for a while remained calm, but more recently the bombings that plagued some second Cup coffee shops, in a furious scuffle just to change the name to Deuxieme Tasse. Similar incidents include Jacques Villneuve’s opening of his bar called new town the translation of his last name. The successful Formula 1 hero was the target of many unpleased individuals over the name of his bar. Villneuve was later asked to reply and give his opinion to the miserable reaction over the name and quite simply stated that people in this city must become more open minded. Can’t really disagree there. It comes to show that times haven’t changed and that tensions are still sky high. That is exactly why I disagree with Mordecai Richler’s opinion over the Montreal’s status. He once said. â€Å"We Haven’t Lost our heads only our apostrophes†¦. Montreal however diminished is still to my mind the most agreeable city in Canada. And this is because the two cultures not only confront eachother but also continue to enrich eachother. â€Å"

Wednesday, October 23, 2019

“Nineteen Eighty-Four” by George Orwell Essay

Winstons statement is vague and must be properly addressed before we can access its validity. The word hope in itself is deliberately ambiguous as Winston fails to mention what this hope is for. Winston may be talking about hope of revolution and the overthrow of government as a horse shaking flies. For this there is ultimately almost no hope in the proles due to the futility expressed in the novels ending as even our socially aware narrator succumbs to the guile of Big Brother. However, much more than this Winston may be talking about hope for the future, hope for freedom from social oppression and the dictatorial regime of the Party, hope for the end goal of this revolution. Winston writes this statement having just described the way in which the Party has manipulated sex, one of the basest human instincts according to Freud, into a joyless act and attempts to eliminate the orgasm.The freedom from this sort of tyranny is far more within the reach, and to some extent is already available, to the proles. The proles, superficially, have far more tangible freedom than the party members since they are able to indulge in their own activities during free time which party members are not permitted. The proles are less vigorously monitored by the Thought Police or party officials and in theory are allowed to live as they please. However, in theory, the party members are too allowed to live as they please though the reality is very different as will be discussed later. It is questionable whether or not Winston himself holds any hope in the proles. Whilst traversing the prole districts of London he re-states and corrects his prior quote, this time saying if there was hope it lay in the proles. This suggests that he has come to the conclusion that there is actually no hope other than a theoretical one. The use of if and was shows that Winston is not so much expressing a hope but rather philosophising on abstract concepts, a palpable absurdity which he knows are out of reach in reality. These theoretical truths are expressed as important to Winstons psyche as he depends on them to stay sane, he writes the axiom Freedom is the freedom to say that two plus two make four. If that is granted, all else follows. His hope in the proles is part of the same concept. Winston needs to make sense of his world no matter how futile it might be, he needs to cling on to the prospect of hope despite its impossibility. The way in which the proles are portrayed shows how they are able to function within the world of Nineteen Eighty-Four and kept under control despite having certain levels of freedom. At the start of chapter seven we are presented with the power of the proles to such an extent that we are even given the statistics that it contains 85% of the population of Oceania. Though Winston constantly expresses their huge potential their futility is quickly made clear as their drive is siphoned into irrelevant directions. Winston confuses a squabble over saucepans for the start of a revolution. The juxtaposition of these two ideas serves to emphasise the anticlimactic outlets of the proles as the two are social polars, one a fundamental change in the very workings of society, the other a pointless feud over kitchen utensils. Another outlet for the proles is a large amount of focus centred around the lottery to such an extent that it becomes the principle if not the only reason for remaining alive. The fact that this lottery is largely imaginary shows the level of control that the party is still able to impose upon the proles, despite appearing to be a choice. The party is misdirecting their hope whilst apparently giving it in a controlled system. On the face of it, the way the proles live does not appear to be very different from real life in 1940s London. When Orwell provides us with a list of their activities the care of home and children, petty quarrels with neighbours, films, football, beer, and above all, gambling, fill dup the horizons of their minds it seems to be a bleak portrayal of London rather than a distant dystopian future. We are able to identify with Winstons thoughts and feelings but we are able to identify with the proles lifestyles. Considering Orwells bleak view and lack of faith in social systems and British life in general he is likely to attach a certain stigma and lack of faith in a lifestyle which mimics it. Winston talks extensively of the bland, neutral life which fails to live up to its own expectations the reality was decaying dingy cities where underfed people shuffled to and fro in leaky shoes. This again seems more like a general social commentary of the London of Orwells time rather than a warning of the future which  pervades the rest of the novel. Orwell is clearly disillusioned both in the real world and the world of Nineteen Eighty-Four. The proles, it seems, though possessing more evidential freedom are actually as enslaved by the party as the rest of Oceania. They are regarded as beneath suspicion showing them to be mentally inept and enslaved, perhaps making them greater casualties of Big Brothers regime. The proles are the ultimate party product, exhibiting no threat despite a lack of supervision via Thought Police or telescreens. They show no ambition, are able to employ doublethink and do not question the status quo unlike Winston and Julia, both party members. As Syme says the proles are not people, they have lost all concept of freedom or anything outside of the party without the need of newspeak to diminish these concepts for them. Winston states he knows HOW but I do not know WHY. His contrast with the proles demonstrates the Why. The very fact he thinks this statement and questions the party shows why the party has need of thought police to keep him under control. There is no need for this amongst the proles since they are not intelligent enough to rebel, but intelligent members of the party who can philosophise on concepts of freedom are far more dangerous to the party. It is necessary for them to be force-fed orthodoxy to keep them under control and weed out those who cannot be. Winston contains the fundamental mute protestation in the bones which simply is not present in the proles. There is no hope in the proles uprising since orthodox or not, they will never take the initiative to do so and all those who can invoke them are sought out by Thought Police. The proles are presented as, fundamentally, equally as oppressed as party member but just through different means. The party members are encouraged and required to use Newspeak so as to diminish the English language and the unorthodox concepts that go alongside it. Though proles, on the other hand, not only use Oldspeak but their own dialect of it and actively reduce the words themselves by omitting letters. The format via which Orwell presents this emphasises this point since he does not simply omit the letters but places a dash in their stead Ark at im! Calls isself a barman and dont know  what a pint is. The proles erode letters and grammar of their own accord, demonstrating the fact that they too will naturally move in the direction of the party. Similarly, the conversation of the proles, though they are permitted to argue without raising suspicion is ultimately as futile as those members of the party. The conversations are still not exchanges of views or ideas but the duckspeak of the Ministry of Truth cafeteria. The proles argue amongst one another whilst never actually stopping to hear each others input. We can see this both in the occasion when the men have a debate over the lottery and Winstons conversation with the old man in the pub. Conversations run in parallel with each other rather than meet and the sense of personal isolation of views remains. Since, as readers we know that there is no hope for Winston or the other party members, by seeing the similarities we are shown that there too is no hope for the proles. Ultimately the proles are no more capable of bringing about the revolutionary changes that Winston hopes for than the party members. They have a greater potential since, as the party slogan states, proles and animals are free. However, they are only free in the same way an animal is free. They are not truly free, as Winston would see it, to claim that two plus two equals four since they have no mental inclination to do so. The proles contain the hope of social freedom which Winston desires but are unable to utilise it since they are mentally enslaved without the need for Thought Police, ambitionless and ultimately hopeless. Bibliography: George Orwell – Nineteen Eighty-Four

Tuesday, October 22, 2019

The Crimes of Florida Death Row Inmate Tiffany Cole

The Crimes of Florida Death Row Inmate Tiffany Cole Tiffany Cole, along with three co-defendants, was convicted of the kidnapping and first-degree murder of a Florida couple, Carol and Reggie Sumner.   A Trusted Friend Tiffany Cole knew the Summers. They were a frail couple that had been her neighbors in South Carolina. She had also bought a car from them and had visited them in their home in Florida. It was during one of those visits that she learned that they had sold their South Carolina home and made a $99,000 profit. From that point on, Cole, Michael Jackson, Bruce Nixon, Jr., and Alan Wade  began plotting a way to rob the couple. They knew that gaining access to their home would be easy since the Summers knew and trusted Cole. The Robbery On July 8, 2005, Cole, Jackson, Nixon, Jr., and Alan Wade went to the Summers home with the intention of robbing and killing the couple. Once inside the home, the Summers were bound with duct tape while Nixon, Wade, and Jackson searched the home for valuables. They then forced the couple to their garage and into the trunk of their Lincoln Town Car Buried Alive Nixon and Wade drove the Lincoln Town Car, followed by Cole and Jackson who were in a Mazda that Cole had rented for the trip. They were headed to a spot located right across the Florida line in Georgia. They had already picked out the spot and prepared it by digging a large hole two days earlier.   When they arrived Jackson and Wade led the couple into the hole and buried them alive. At some point, Jackson had forced the couple to tell him their personal identification number for their ATM card. The group then abandoned the Lincoln and found a hotel room to stay in for the night. The next day they returned to the Summers home, wiped it down with Clorox, stole jewelry and a computer which Cole later pawned. Over the next few days, the group celebrated their crime by spending several thousand dollars that they got from the Summers ATM account. The Investigation On July 10, 2005, Mrs. Summers daughter, Rhonda Alford, called authorities and reported that her parents were missing.   Investigators went to the Summers home and discovered a bank statement which showed a large sum of money in it. The bank was contacted and it was learned that an excessive amount of money had been withdrawn from the account over the past few days. On July 12, Jackson and Cole, posing as the Summers, made a call to the Jacksonville Sheriffs Office. They told the detective that responded to the call that they had left town quickly due to a family emergency and they were having problems accessing their account. They were hoping that he could help. Suspecting that they were not really the Summers, the detective contacted the bank and asked them not to block any withdraws from the account so that he could continue his investigation. He was then able to track the cellular telephone that the callers used. It belonged to Michael Jackson and records showed the phone had been used near the Summers home at the time that they disappeared. There were also several calls made to a car rental company who was able to provide the detective with a description of the Mazda that Cole had rented and which was now overdue. By using the global tracking system in the car, it was determined that the Mazda had been within blocks of the Summers home on the night that they went missing. Busted On July 14, the entire group, with the exception of Cole, was caught at a Best Western Hotel in Charlestown, South Carolina. Police searched the two hotel rooms that were rented under Coles name and found personal property belonging to the Summers. They also found the Summers ATM card in Jacksons back pocket. Cole was caught at her home near Charlestown after police got here address through the car rental agency where she rented the Mazda. Confession Bruce Nixon was the first co-defendant that confessed to murdering the Summers. He provided the police with the details of the crimes that were committed, how the robbery and abduction were planned and the location of where the couple was buried. Dr. Anthony J. Clark, Medical Examiner for the Georgia Bureau of Investigation performed autopsies on the Summers and testified that they both died after being buried alive and their airways passages became blocked with dirt.   Cole Pleads Her Case Cole took the stand during her trial. She testified that she thought that the crime would be a simple theft and that she did not knowingly participate in the robberies, kidnappings, or murders. She also said that she was at first unaware that the Summers were in the trunk of their Lincoln and that they were being taken to the pre-dug gravesite. She then said the holes were dug in order to scare the Summers into giving up their ATM PIN numbers. Conviction and Sentencing On October 19, 2007, the jury deliberated for 90 minutes before finding Cole guilty of two counts of first-degree murder, on both premeditation and felony-murder theories, two counts of kidnapping, and two counts of robbery.Cole was sentenced to death for each murder, life imprisonment for each kidnapping, and fifteen years for each robbery.  She is currently on death row at the  Lowell Correctional Institution Annex Co-Defendants Wade and Jackson were also convicted and sentenced to two death sentences.  Nixon pleaded guilty to second-degree murder and was sentenced to 45 years in prison.

Monday, October 21, 2019

Private Limited Company Essays

Private Limited Company Essays Private Limited Company Paper Private Limited Company Paper Being a sole trader is the easiest and most common form of business to set up. If Donald Powell decided to operate as a sole trader, he would be the owner and manager of his own business. Being a sole trader has its advantages and disadvantages.  If Donald Powell were to become a sole trader, he would receive all of the profits his business has generated. Donald Powell, as a sole trader, would also be able to make all of the decisions in his business.  Privacy is also an advantage for Mr Powell as all business affairs would remain private.  As a sole trader, Donald Powell can quickly change trade if his previous one proves to be unsuccessful. This can happen overnight.  However, there are also some disadvantages to being a sole trader. Unlimited liability is one of them. Ultimate responsibility for any debts will lie solely with Donald Powell. This would have to be repaid by his wealth or personal possessions. Since it is very unlikely that any single individual will posses all the required qualifications and business acumen to a run a successful enterprise, Donald Powell may find it impossible to compete with traders employing people specialising in different aspects of the trade.  As a sole trader, Donald Powell may find the responsibility of owning, managing and working the business a heavy burden.  Working hours may also be a disadvantage as Donald Powell would be likely to have to work long hours. If Donald Powell was to become sick or was to die, the business may collapse.  The last disadvantage would be lack of growth. It would be difficult for Donald Powells business to grow, as the money invested in the business (capital) is likely to be very limited.  If Donald Powell was to operate as a sole trader, he would experience a lot of advantages such as receiving all of the profit, making all of the decisions e.t.c. He also has a lot of serious disadvantages such as not being able to advertise his shares, lacking business skills e.t.c. E.g. If Donald Powell lacked necessary business skills, he would find it very difficult to cope and be successful. This is why I have come to the conclusion that this type of business is unsuitable for Mr Powell. Forming a partnership with at least one person and a maximum of twenty can lessen some disadvantages experienced by a sole trader (Donald Powell). This is a popular type of business. This type of company has many advantages and disadvantages.  Each partner will invest capital into the business and this will increase Donald Powells business financial resource.  Partnerships can take advantages of larger scale businesses opportunities. This is a good advantage for Donald Powell  The responsibilities of the business would be shared between all of the owners known as partners. This would take a little weight off Mr Powells shoulders. In a partnership, business affairs would remain private between the partners. This could increase Donald Powells business awareness as well.  With several partners working within the business, each one can specialise in what they are best at e.g. accountancy e.t.c (Speacialition increases productivity) This could be very useful for Mr Powell as he may lack some business skills. Therefore, he can do what he is best at.  There are four main disadvantages to being in a partnership. The first one is unlimited liability. All partners are equally liable for any debts the business builds up. Therefore, Donald Powell can lose all of his personal wealth and possessions to repay debts. With shared decision-making, there is always a likelihood of Donald Powell or any of the other partners disagreeing to someones decision. However, this can be solved with a legal document called a Deed of Partnership. This outlines how decisions should be made, profits shared e.t.c  As the number of partners is limited, so is the capital. This can hinder the business growth. This is a disadvantage for Donald Powell. I think operating in a partnership would be quite a good choice of business for Mr Powell as it has many advantages such as specialisation, more capital e.t.c However, there are also a few disadvantages such as disagreements, unlimited liability e.t.c And although it seems that the advantages outweigh the disadvantages, I still think this is not the most suitable type of business for the needs of Donald Powell. If Donald Powell decided to operate as a plc, (public limited company), he would be the owner and manager of his business perhaps along with a few other people. Being an owner of a plc has its advantages and disadvantages.  The liability of the owners such as Donald Powell to pay the debts of the company is limited only to the money invested in shares. This would encourage share ownership, as Donald Powells personal wealth is kept secure, should the company fail. Shares can be advertised and sold through the stock exchange. The shares can be sold to any member of the public. This can allow Donald Powell to raise a vast amount of capital.  If Donald Powell made a mistake which proved to be very serious, his business would be sued, not Donald Powell himself.  As Donald Powells business becomes larger, there will be a lot more scope for specialisation. Specialist in different jobs could be employed. Employees will concentrate on only a few tasks they are good at. Not only will this allow Donald Powells business to run things much more efficiently, but also Mr Powell will not need to worry whether he lacks certain business skills. (Specialisation increases output). As Donald Powell will be running a larger business, banks will be more willing to lend larger business loans, as he will be likely to repay them on time. Loans with a lower rate of interest may be obtained. As Donald Powells business will be a lot larger, he will be more likely to buy things in bulk. Hence, the unit cost of production will fall. (Get cheaper).  Any owner that purchases more than 50% of the companys shares can be said to have taken over the business. This can happen anytime if shareholders (such as Donald Powell) are willing to sell their shares. E.g. BMW mounted a successful take over of Rover. Large businesses can be difficult for Donald Powell to control and manage leading to inefficiencies e.g. managers wasting money and leading to disagreements and industrial action. This can lead to rising unit costs in production known as diseconomies of scale.  Donald Powells interests e.g. growth, market share may differ from shareholders interests e.g. profit leading to higher dividends  The setting of a PLC is time consuming and costly.

Saturday, October 19, 2019

A Smart Action Plan

A Smart Action Plan After I had started my first year at University I realised that if I want to become a successful student it is crucial to develop time-management skills. It is based on identifying our goals, prioritising and listing them in order to help us achieve the best result. We also need to identify our strengths, look at our work and think how we could improve it to get a better result in the future. We can do so using a diary or personal organiser. Time-management skills are very important because if we know how to organize our time properly, we can carry out more and meet deadlines. It is important to start with setting our priorities because sometimes there is no time to complete all of them. We need to be aware that some of them might take longer than we expected so we should write somewhere what we want to do and when we want to do it. Resources: We should start with identifying our goals and priorities. When doing so, we need to be realistic and definite about them. We must precise wh at needs to be done, how and when. Then, it is recommended to start keeping an academic diary or a personal organizer where we can write in everything we do (such us important dates or study activities). It will help us to look at the way we work and identify where further improvements can be made. (Oxford Brookes University) To take the most out of the diary we should always carry it with us and keep it up to date. It is also recommended to check it many times a day and add new tasks straight into it. The last step is to identify how we spend the time in order to see if we use it productively. We need to list the work we have to do and precise the amount of time we want to spend on carrying out particular tasks. The most important things should be highlighted or stared that can be easily seen, where the least important ones should be written in a pencil so we can change or remove them easily. (Cottrell S., 2003) Reflective comment: The first thing I did in order to improve my time- management skills was doing some background reading. I used a chapter of a book recommended by my tutor as well as some online resources. It gave me understanding of which steps should be taken in order to became successful. I started with identifying my goal, which was preparing a good set of notes for my oncoming exam. Then I started writing in a diary activities I was planning to do. The most important ones I wrote in using a pen (such as searching for material for my notes) and less important in pencil (like going to the store or meeting someone). The following, I highlighted the most important one so every time I opened my diary it was the first thing I saw. It was a reminder of what is need to be done. Then I identified how much time I want to spend on these tasks.

Friday, October 18, 2019

A criminial case with relevant, reliable, and competent evidence Essay

A criminial case with relevant, reliable, and competent evidence - Essay Example This was emphasized in the Supreme Court’s ruling in Holbrook v Hymn. The Court held that in accordance with the provisions of the Sixth and Fourteenth Amendments to the Constitution, the guilt of the accused was to be determined exclusively on the basis of the evidence presented during trial. Furthermore, guilt could not be established on the basis of official suspicion, indictment, continued custody or other circumstances (Gardner & Anderson , 2009, p. 31). Evidence that is relevant, reliable and not otherwise inadmissible at trial is deemed to be competent evidence. The defendant in Holmes v South Carolina, endeavored to introduce evidence that the murder had been committed by a third party. In this effort the defendant offered witnesses who exhibited willingness to testify that the third party had committed the crime. This testimony was excluded by the trial court on the grounds that the case against the defendant was strong and that the evidence against the third party merely generated a bare suspicion. The defendant was convicted of murder, and this sentence was upheld by the Supreme Court of South Carolina (Gardner & Anderson , 2009, p. 32). In this case, the Supreme Court of South Carolina affirmed that any evidence of third party guilt had to generate a reasonable implication of innocence. In addition, such evidence had to be restricted to the facts that were not in conformity with the guilt of the defendant. The Court further clarified that the forensic evidence was almost conclusive in indicating the guilt of the defendant, and that the evidence against the third party was effective only to the extent of creating a bare suspicion. In such cases, the evidence against the third party was inadequate for producing a reasonable implication of innocence regarding the defendant (Holmes v. South Carolina). Thereafter, this case was put up for direct review in the US Supreme Court. In its unanimous decision this Court

Leadership Essay Example | Topics and Well Written Essays - 1250 words - 3

Leadership - Essay Example Thirdly, the leader should provide the knowledge and methods needed to realize the vision and influence others to buy into the idea. As passion is contagious, the leader must communicate in a passionate and clear way. Consequently, the leader should coordinate and balance the conflicting interests in stakeholders and be able to think and act creatively in difficult situations. There are traits that a leader should posses. Integrity, honest deals, controlled emotions with a predictable reaction to issues and an absence of harsh outbursts. Dedication is spending more time and energy to realize the vision by inspiring other members by example. Magnanimity is to give credit where it is due and be responsible for failures and humbleness to elevate everyone (Daft & Lane, 2011). A leader should have an open mind to listen to new ideas and suspend judgment while listening to others ideas, check the facts before passing judgment to gain trust and respect. Leaders are to be creative to think d ifferently and lead to new directions. Humor fosters good camaraderie. Humor is vital for a leader to relieve boredom, tensions and defuses hostility. This paper examines my leadership in terms of the participative theory and presents the plan of action to improve my motivation and leadership skills. Leadership theories, styles, and their influence on motivation The skills theory states that knowledge and abilities acquired by learning are significant factors for effective leadership. The argument in this theory is that skills and qualities learned, developed and acquired are keys to leadership performance. Skills are what leaders can accomplish, whereas traits are who leaders are (Northouse, 2009). Technical skills are knowledge, competency and proficiency in a specific work. For instance use of computer application software as MS office. Human skills assist us get along and communicate with people. Conceptual skills help leaders better decide and comprehend the actions and measure s for ideas and concepts. To some extent, the theory disavows a connection between the inherited characteristics and capacity to be an effective leader. However, it brings confusion when someone holds the skills and qualities but do not become a leader. This is one of the difficulties in using skills theory to explain leadership (Northouse, 2009). The situational theory, suggests that one needs to adjust and adapt to the circumstances in different situations to be an effective leader. The choice of action is based on situational variables. Factors to determine how to adapt are the competence and commitment of the stakeholders. Either aggressive decisions are made or there is room for negotiations (Ortimiere & Meese, 2010). In this theory, the leader may involve all members when making a critical decision and be task relevant. To determine the duties to assign, the leader should know the maturity level of followers in relation to a specific task. Therefore, situational leadership inf luences activities of individuals towards goal achievement in a given situation. According to the contingency theory, success depends on the leadership style, the qualities and traits of the followers and the aspect in which the situation is. It advocates for a positive approach towards unforeseen incidents. There should be a match between the leadership style and the unique situation or setting. It is different from the situational theory since, in situational the focus is on adapting to situations while in contingency effective leadership depends on the degree of fitness between a leaders qualities, style and that of a situation (Daft & Lane, 2011). The elements to be looked

Schizophrenia Essay Example | Topics and Well Written Essays - 750 words - 4

Schizophrenia - Essay Example Several people who suffer from schizophrenia are not always violent and they do not cause harm to others. The disease is not associated with childhood experiences or inadequate parental guidance and the signs and symptoms  differ  from one person  to another (Swerdlow, 2010). The primary cause of schizophrenia is not very precise, and multiple factors have been associated to predispose and cause the disease. Several scientists have associated schizophrenia with genetics as the main cause since it runs in the familial tree and that an individual inherits the disease. Similarly, schizophrenia has been identified to develop when an individual’s body undergoes several hormonal and physical changes, for example during puberty in adolescents. The disease may as well be triggered by some environmental factors such as infections by virus or when an individual is in a highly stressful situation. Chemical imbalance in the brain is another major cause of schizophrenia, whereby serotonin and dopamine fail to be in optimal levels. These chemicals (neurotransmitters) have a major function of allowing the nerve cells in the brain to send a signal to other parts. An imbalance of these neurotransmitters affects an individual’s brain reaction to stimuli. Thi s provides an explanation why an individual with schizophrenia occasionally gets overwhelmed by some sensory stimuli such as loud music or dazzling lights, which normal individuals easily handle (Roder & Medalia, 2010). There are no specific signs and symptoms of schizophrenia and they differ from one person to another. The symptoms  can  slowly develop  over an extended period, sometimes several months to years and occasionally they may abruptly appear. In some cases, the disease may be on and off or persist continuously. Some of the symptoms include: hallucinations; where an individual feel or see things that are not real, an individual feels that he/she is always being watched, strange speaking of words,

Thursday, October 17, 2019

Discussion Essay Example | Topics and Well Written Essays - 500 words - 1

Discussion - Essay Example Personality characteristics, such as shyness, or a reluctance to be frank with people not known on a personal level, also come into play. These barriers can be overcome by gathering regular feedback and arranging meetings in which the team members make physical contact and have an idea of whom they are working with. Technological training is essential for every member to be comfortable with the software used. When Virtual Communication is reinforced by written and spoken communication, the margin for error decreases. Communication Barriers are usually centered on different perceptions of work expectations and are often aggravated when the supervisor resorts to indirect channels such as e-mails, where the chances are high that the meaning of the message gets distorted. The employee may not be comfortable with the computer technology used. Even a telephone line with noise distortion can pose a barrier to communication. The employee, who differs culturally from the supervisor in terms of education, economic background, religious beliefs and other personal traits, may misinterpret the supervisors’ communication, particularly when a language barrier exists and the employee is not fluent in the language or the jargon of the work place. Emotional overtones also tend to confuse the receiver of the message. These barriers can be overcome by the supervisor having a clear idea of his expectations from the employee, communicating on a face to face basis, using gestures and other non-verbal clues to r einforce the message, using a noise free, relaxed environment, reducing the links in the channel of communication, gathering employee feedback and regularly monitoring performance. Corporate ethics can be subjected to various interpretations, particularly in the context of cultural differences. The Japanese business culture, in which expensive gifts are considered a symbol of the esteem in which the business is held, is opposed to our perception of gifts as bribes and

Corperate strategy of TCL Multimedia Assignment

Corperate strategy of TCL Multimedia - Assignment Example This company was founded in 1982. It started its business as an audiotape manufacturing company. Its co- founders, Li Dongsheng gradually moved this company forward in the business of consumer electronics product. TCL got good reputation by the production of handsets for fixed-line telephones. This product established a trust in consumers. In the next decade TCL started producing audio equipment made in a joint venture. TCL also invested in the research and development (R&D) and focused on new product development and efficient production. TCL also developed a distribution and marketing network across China. The management was quite progressive and they were not satisfied with the performance of the state owned distributors and private marketing organizations. The dynamic and rapidly growing Chinese economy greatly owe its rapid growth to the Chinese companies. These companies not only come in contact with foreigners as a source of technology or assets, but also as a market for there own products. They are quite ambitious also, many companies aim to build global brands. The leading Chinese electrical appliance company Haier has 13 sites overseas, including factories. TCL is considered China's second biggest television maker has also invested in television manufacture outside China. Various model and methods have been evolved by scholars of management and corporate field for analyzing the external and internal environment of the company. It seems quite appropriate to use the PEST and SWOT models for analyzing TCL external and internal environment. 2.1 PEST Analysis PEST Analysis is used for analyzing macro environment of company. Four factors Political , Economic , Social , Technological is considered during this type of analysis. Assessment of the impact of all these factors plays an important role in evaluating the environment of a company. Political Factors World is virtually being ruled by multi-nationals. These multi-nationals are powerful enough to influence the decision making process of world's leading powers directly or indirectly. These multi-nationals are getting bigger and bigger by mergers and acquisitions. In such scenario Chinese companies are also playing very effective role. They are very successfully competing with European companies and US. In past it Chinese economy was considered closed and state owned economy. But now it is gradually opening and private companies are playing their role in the changed political atmosphere. TCL is one of such companies that is expanding and has been successful in getting good market share in TV market. Economic Factors TCL 's results of 2004-2005 show that its position in the market is continuously improving. TCL is a leading consumer electronics manufacturer within China. The company has begun to enter in international television markets by using majority-owned joint ventures techniques.

Wednesday, October 16, 2019

Schizophrenia Essay Example | Topics and Well Written Essays - 750 words - 4

Schizophrenia - Essay Example Several people who suffer from schizophrenia are not always violent and they do not cause harm to others. The disease is not associated with childhood experiences or inadequate parental guidance and the signs and symptoms  differ  from one person  to another (Swerdlow, 2010). The primary cause of schizophrenia is not very precise, and multiple factors have been associated to predispose and cause the disease. Several scientists have associated schizophrenia with genetics as the main cause since it runs in the familial tree and that an individual inherits the disease. Similarly, schizophrenia has been identified to develop when an individual’s body undergoes several hormonal and physical changes, for example during puberty in adolescents. The disease may as well be triggered by some environmental factors such as infections by virus or when an individual is in a highly stressful situation. Chemical imbalance in the brain is another major cause of schizophrenia, whereby serotonin and dopamine fail to be in optimal levels. These chemicals (neurotransmitters) have a major function of allowing the nerve cells in the brain to send a signal to other parts. An imbalance of these neurotransmitters affects an individual’s brain reaction to stimuli. Thi s provides an explanation why an individual with schizophrenia occasionally gets overwhelmed by some sensory stimuli such as loud music or dazzling lights, which normal individuals easily handle (Roder & Medalia, 2010). There are no specific signs and symptoms of schizophrenia and they differ from one person to another. The symptoms  can  slowly develop  over an extended period, sometimes several months to years and occasionally they may abruptly appear. In some cases, the disease may be on and off or persist continuously. Some of the symptoms include: hallucinations; where an individual feel or see things that are not real, an individual feels that he/she is always being watched, strange speaking of words,

Corperate strategy of TCL Multimedia Assignment

Corperate strategy of TCL Multimedia - Assignment Example This company was founded in 1982. It started its business as an audiotape manufacturing company. Its co- founders, Li Dongsheng gradually moved this company forward in the business of consumer electronics product. TCL got good reputation by the production of handsets for fixed-line telephones. This product established a trust in consumers. In the next decade TCL started producing audio equipment made in a joint venture. TCL also invested in the research and development (R&D) and focused on new product development and efficient production. TCL also developed a distribution and marketing network across China. The management was quite progressive and they were not satisfied with the performance of the state owned distributors and private marketing organizations. The dynamic and rapidly growing Chinese economy greatly owe its rapid growth to the Chinese companies. These companies not only come in contact with foreigners as a source of technology or assets, but also as a market for there own products. They are quite ambitious also, many companies aim to build global brands. The leading Chinese electrical appliance company Haier has 13 sites overseas, including factories. TCL is considered China's second biggest television maker has also invested in television manufacture outside China. Various model and methods have been evolved by scholars of management and corporate field for analyzing the external and internal environment of the company. It seems quite appropriate to use the PEST and SWOT models for analyzing TCL external and internal environment. 2.1 PEST Analysis PEST Analysis is used for analyzing macro environment of company. Four factors Political , Economic , Social , Technological is considered during this type of analysis. Assessment of the impact of all these factors plays an important role in evaluating the environment of a company. Political Factors World is virtually being ruled by multi-nationals. These multi-nationals are powerful enough to influence the decision making process of world's leading powers directly or indirectly. These multi-nationals are getting bigger and bigger by mergers and acquisitions. In such scenario Chinese companies are also playing very effective role. They are very successfully competing with European companies and US. In past it Chinese economy was considered closed and state owned economy. But now it is gradually opening and private companies are playing their role in the changed political atmosphere. TCL is one of such companies that is expanding and has been successful in getting good market share in TV market. Economic Factors TCL 's results of 2004-2005 show that its position in the market is continuously improving. TCL is a leading consumer electronics manufacturer within China. The company has begun to enter in international television markets by using majority-owned joint ventures techniques.

Tuesday, October 15, 2019

The Current State Economy Essay Example for Free

The Current State Economy Essay It is known that the economy is intensively damaged and that it needs to be restructured. The current fiscal policy that are in place are good, but measures must be taken to avoid a crash of the market, get the unemployment rate down, and stimulate the economy in the hopes of increasing the gross domestic product and bringing about a surge in the aggregate demand. Although it may take some time for all of these events to take place, this is what needs to be done to get the economy to rise. The consumers and government must also do their parts in order for this economy to rise above the recession it is in now. The primary root cause of the current recession and economic crisis is largely in part due to the huge increase in the issuance of subprime adjustable-rate mortgages and the collateralized debt obligations that they made up. The amount of subprime mortgages issued in 2005 and 2006 increased drastically, while the issuance of prime mortgages actually decreased. Basically, banks loaned money to people who would obviously default on those loans. People bought houses with these loans expecting housing prices to increase, but that didn’t happen. Although, this was the route caused it is not the only reason we continue to be in a poor state. Below you will find the over view of our current economy. The current economy expanding or contracting is contracting. Our current prime rate is 3.25% The current interest rate on credit cards is 15.4% The current unemployment rate is 9% (2011 est.) and 9.6% in (2010 est.). The unemployment, youth age 15-24 total 17.6% that includes male 20.1% and female 14.9%(2009). The current inflation rate is CPI measures inflation rate 2%. The current Gross Domestic Product (GDP) are: GDP (purchasing power parity) $15.04 trillion (2011 est.), $14.82 trillion (2010 est.) $14.38(2009 est.). The data are in 2011 US dollars.

Monday, October 14, 2019

Dennis Rader: The BTK Killer

Dennis Rader: The BTK Killer When you hear the words SERIAL KILLER, you instantly think about people like Jeffrey Dahmer, Ed Gein, Ted Bundy, or Charles Manson. You dont think about a family man with a wife and two children, county board member, President of the church congregation council, or a Cub Scout leader. Dennis Rader possessed all of these shining attributes. He also possessed a dark secret. This secret had festered in him from an early age and grew as he got older. Dennis Rader had fantasies about bondage, control, and torture which eventually led to murder. Raders reign of terror began in 1977 and ended with his capture in 2005; almost 30 years later. He labeled his victims as projects.3 He hunted his prey in stages he described as the trolling stage and stalking stage.3 He even called the tools used for his trade his hit kit.3 Dennis Rader was a stone cold killer who had no plans of stopping. The letters BTK stands for Bind, Torture and Kill, which was Raders mode of operation and a name he gave to himself. Throughout the years and in numerous communications with the police, he talked about his need for acknowledgment. In the 1990s BTK had disappeared from sight when, without explanation, he re-emerged in 2004. This re-emergence was more than likely due to his need for acknowledgment or public attention. In 2004, Rader started sending multiple letters, clues, and photos to the authorities that led to his capture and arrest in 2005. In the Beginning Dennis Rader was born on March 9, 1945. His parents were William and Dorothea Rader. His family moved to Wichita Kansas when Dennis was little. While growing up, Rader appeared to be a normal child. He was a member of the Boy Scouts and a church youth group member. He attended Riverview Elementary School1 and was described as a student with withdrawn tendencies.1 Rader later admitted that he developed fantasies about bondage, control and torture from an early age, while still in grade school.1 As he got older, he had fantasies about tying girls up and having his way with them.1 He also admitted to killing cats and dogs as a youth by hanging them.1 He began to perfect the art of hiding his dark secret from everyone at an early age. 1974-The Killing Begins It all started when a family of four, the Otero Family, was brutally and maliciously murdered in their home on January 15th, 1974. These four murders, along with six others, would leave the authorities, media, people of Wichita Kansas, and people around the world baffled and in fear for the next 30 years. A killer was on the loose and Bind, Torture, Kill was his mode of operation. Joseph Sr., Julie, Joseph II, and Josephine Otero were the BTK Killers first victims. Their family consisted of the husband, wife, and 5 children. Only two of the children were murdered and they were the children that were home on the day of the murders. These murders occurred in the early morning hours. Dennis Rader invaded their home at gunpoint and ordered everyone into a bedroom where he tied them up. He tried to kill Joseph Sr. first by putting a bag over his head and pulling tight, but somehow a hole was torn in the bag. He later went back and put another bag over Joseph Sr. head and strangling him with a cord. Julie Otero was the second victim to be killed by Rader. He tried to kill Julie with his hands at first but when that didnt work, he strangled her with a cord. Nine year old Joseph II was the third victim. Joseph was moved to another bedroom and suffocated with two bags placed on his head. The fourth and final victim, on this day, was Josephine Otero. She was eleven year s old. Rader took Josephine to the basement of their house and hung her from the drainage pipe. Rader admitted to having sexual fantasies after she was hung.3 He masturbated on her legs and a pipe near where she was hung. His DNA left at the scene was later matched to other killings. BTKs fifth victim was Katherine Bright. She was killed by Rader in April 1974; just four short months after the Oteros were murdered. She was 21 years old. Radar broke into her house and waited for her to come home but he didnt expect for her brother (Kevin Bright) to be with her. He made her brother tie her up first, and then he tied her brother up in another room in the house. Kathryn put up a fight for her life and was eventually stabbed several times by Rader. She later died in the hospital. Her brother escaped during Raders fight with Kathryn but was shot in the head while he fled. Kevin may be the only person to see the serial killer and live (although his description still didnt help the police capture BTK in the 70s). 1977-The Killing Continues It had been 3 years since the Otero family and Kathryn Bright was brutally murdered by the BTK Killer. His sixth victim was Shirley Vian Relford, 24. Rader admitted in court that Relfords murder was completely random.3 He actually planned on killing a particular person but when he went to knock on the door, no one answered. After continuing to troll the neighborhood, he knocked on one other door and got no response. He approached a little boy, watched what house the little boy went into and followed him. When he got inside the house, he put Shirleys three young children in the bathroom and then tied Shirley up and strangled her. He left his semen on some panties that were found next to her body. December 1977, BTK struck again. This time his victim was Nancy Fox, 25. She was victim number 7 and Rader labeled her as Project Fox Hunt5. He had apparently been watching Fox for a long time, stalking her. He would go by her house several times, rummage through her mailbox to find out what her name was, and stalked her at her job.3 On this night in December, he went by her house and knocked on her door but when no one answered, he broke in. He waited in her house in the kitchen and when she got home, he told her he was going to rape her and tied her to the bed. Afterwards, he strangled her. He left semen on a nightgown that was found next to her body. Rader later described Foxs murder as the perfect hit6(pp. 53) because he said that there was no interference in the killing. 1985-Eight Years Later Eight years after Nancy Fox was murdered, BTK was back on the scene and ready for his next victim. That victim was Marine Hedge, 53. Rader labeled her as Project Cookie.6(pp. 92) The sad part about this murder is that Hedge lived on the same street as Rader; only six doors down to be exact. He broke into her house and waited for her. When she came home, she was not alone. She had a male friend with her so Rader hid out in the house and waited for her male friend to leave. Once her male friend left, Rader strangled her in her bed with his bare hands. Hedge was the first victim where Rader moved the body from the house after killing them. He took her body to his churchs basement and posed it for photographs. Her body was later found in a ditch on the roadside. 1986-Victim #9 On September 16, 1986, Vicki Wegerle became BTKs ninth victim. She was 28 years old. Rader used trickery to get in to Wegerles house. He posed as a telephone repair man3 with a uniform and a hard hat. He called his outfit for this murder his hit clothes.3 When he got into her house, he pulled a gun on her and attacked her. She put up a fight for her life but he eventually overpowered her and strangled her with a nylon sock. He also posed her body for photographs as he had previously done to Hedge. It was later found out that Vicki was not dead when Rader left her house; he only thought she was dead. She later died when the paramedics couldnt revive her. 1991-Final Victim-5 years later BTKs last and final victim was Delores Davis, who was murdered on January 19, 1991. She was 62 years old. By this time, a decade had passed since BTK began his killing spree. Rader had previously cased the place before3 and this time she was in the house. It appears as though Rader had gotten lazy by the 10th murder because he threw a concrete cinder block through Daviss patio glass door and bombarded his way into her house. He made no attempt to conceal the noise that the shattering glass made. He pretended to be a wanted criminal and eventually strangled Davis. She was the second victim that Rader had moved from the location of the murder. Her body was dumped under a bridge. She too was posed and photographed after being killed. Raders mask was left by her face. The Investigation The BTK investigation began in the mid 1970s, spanned the length of 30 years, and concluded with the arrest and conviction of Dennis Rader in 2005. In the early 1980s, the Wichita Police Chief created a secret task force6(pp.86) of special investigators to work on the BTK case. They were the team that hunted BTK. This team was called the Ghostbusters.6(pp. 85) There were tons of calls and tips throughout the BTK investigation. Investigators came up with lists to eliminate and compare suspects. They put together a list with tens of thousands of names 6 (pp.88) This list included men who went to the local college, men who worked with any of the victims, men who were between 21 and 35 years of age in 1974 and lived in the county6(pp. 88), and mostly men with any kind of sex/torture/perverse/stalking behavior on their criminal record. Several of the detectives went door-to-door to most of these suspects houses and asked outright if they would submit to DNA testing. Suspects who were unwi llingly to be tested were placed under surveillance. In the Otero murders, police interviewed more than 1500 people6(pp. 31) to no avail. Police originally thought that organized crime families or drugs may have been involved in the family murders. Some police didnt want to accept the fact that a serial killer may have been on the loose or that there were similarities in the Otero and Bright killings. It wasnt until BTK starting sending the police clues about the murders that they put it all together and realized that a serial killer was on the loose. Three of the victims worked at the same location; Colemans. Even when Kathryns brother Kevin (who survived the attack) gave the police a description of his attacker, they never caught him. Even with all of the man hours and leg work put into the investigation, BTK was not caught back then. From 1991 until 2004, when BTK resumed communication with the police, the trail for the serial killer had gone completely cold. Search and Arrest Warrants and Subpoenas There were several search and arrest warrants issued in the BTK case in the later years. In the beginning, there was mostly list compiling and DNA tests done to eliminate suspects but no definite leads as to who BTK was. There were too many suspects and police kept hitting dead ends. In December 2004, the television station KSN reported that Roger Valadez had been arrested in connection with the BTK killings. The report was based on an anonymous tip that was inaccurate. Mr. Valadez was arrested early that morning on charges of criminal trespassing and housing code violations12 but it was somehow leaked that he was a suspect in the BTK murders. A search warrant was executed on his home. He was cleared by DNA tests of any criminal activity related to the BTK killer.6(pp. 227) Valadez later sued the television station and won. In 2005, police obtained a warrant for the medical records of Raders daughter (Kerri Rader) which was a familial match with semen collected at an earlier crime sc ene.13 His daughters DNA match and other evidence that police had accumulated while surveilling Rader gave them probable cause for a search warrant. Raders home, vehicle, church and office were also searched for evidence after the warrant was executed. Also, a search warrant for Raders DNA was executed after he was arrested. He was cheek swabbed while in police custody. Four swabs were taken; two were immediately sent to the county forensic lab and the other two went to the forensic lab in Topeka, Kansas. 6(pp. 269) Interviews Rader was interviewed by the police in 2005. He talked in the third person as though Dennis Rader was someone else. He ducked questions for many hours. Rader gave away nothing during his interview. He spoke to the detectives as equals, noting that he too was in law enforcement.6 Interrogations In September 1986, Bill Wegerle was interrogated by the police and suspected of killing his wife Vicki Wegerle. He was given two lie detector tests and he failed both.6(pp. 102) He was interrogated for hours and asked a lot of probing questions about his and his wifes relationship. Wegerle told the police that on his way home from work, he saw his own car ride right by him and he saw someone else driving it but he didnt think anything of it at the time.16 They mainly wondered how he sat in the house for forty-five minutes before he found her body.6(pp. 101) The police did not believe Bill initially but later contributed him failing both lie detector tests to the stress of a grieving husband. Dennis Rader was interrogated by FBI profiler Bob Morton and Wichita Police Lt. Ken Landwehr shortly after his arrest in 2005. He was arrested on February 25, 2005 as a suspect in the BTK killings. He was formally charged with the murders on February 28, 2005.9 It was during this interrogation that Dennis Rader confessed to being the BTK killer. His 16 hour confession was given in full and of his own free will and recorded on over 20 DVDs.9 Rader knew that he was going to kill again and he told the officers who interrogated him this. He was already in the process of stalking his next victim when he was arrested. Seizure and Analysis of Forensic Evidence There was a ton of evidence and more than enough to get a conviction once BTK was captured. Due to his sexual perversion, he left semen at most of the locations of his killings. Although BTK wasnt caught until 3 decades later, the case was never closed and police had evidence stored from all of the crime scenes. Rader stayed in contact with police through the years taunting them and sending them clues that would later be used to catch and convict him. For example, Rader was so pleased with himself after he killed Nancy Fox that he called the police the next morning to gloat about it. He spoke 15 words during a three-second span of a seven second recording. The audio quality of the call, taped at a slow speed, so was poor it was not released to the public until August 1979. The tape was sent to the Washington DC, FBI laboratory but it was too brief and distorted by background noise to make a comparison voiceprint.5 This tape was kept as evidence and more than likely presented during R aders trial. Semen was found on or near the bodies of his victims Josephine Otero, Shirley Vian and Nancy Fox; all of the semen was matched to Rader. Also, DNA obtained from fingernail scrapings of Vicki Wegerles left hand matched Raders DNA, eliminating any doubt that he was her murderer. High tech forensic computer detection was used to get evidence off of the disk Rader mailed to a Wichita television station in February 2005. This is how Rader was caught. Using this high tech computer, residual information left over on the disk identified the last person who had used the disk: someone named Dennis. It was also learned that the disk had been used on computers registered to two local organizations, Christ Lutheran Church and Park City Library. An internet search on the churchs name provided the name of the congregations president: Dennis Rader.14 Summary Its sad to say that if he had maintained his silence after his last murder in 1991, BTK would still be a free man today, writing citations and catching dogs for the city of Park City. He probably would have never been caught. But his ego was way too big for his own good, and he just had to let everyone know he was still at large. He wanted to taunt the police with the fact that BTK was still on the loose after 3 decades. His cockiness led to his downfall. Had these murders occurred today, I believe that he would have been caught before he got the chance to kill ten people. Today, we have much more advanced technologies than investigators had in the 70s and ways to gets results faster. Rader left entirely too many clues and had entirely way too much correspondence with the police over the years for them to not have caught him long ago. Some of his murders were way too sloppy and although he had a college education, he didnt appear to be intelligent enough to outsmart 3 decades worth o f police investigators. That is probably the reason why as soon as he re-emerged in 2004, he was caught. Although he planned to kill others, that same year, he never got the chance. Dennis Rader pled guilty to 10 counts of first degree murder and was found guilty and sentenced on August 18, 2005. He was sentenced to 10 consecutive life terms, which require a minimum of 175 years without a chance of parole. Because Kansas had no death penalty at the time the murders were committed, life imprisonment was the maximum penalty allowed by law. His earliest possible release date is February 26, 2180. Rader, 60, will spend the rest of his life at the maximum-security El Dorado Correctional Facility near Wichita. Other cold cases in Kansas were reopened to see if Raders DNA matched crime scenes, but Raders confession was limited to the 10 known victims and police and prosecutors do not believe there were any more victims because of the extensive records and memorabilia he kept on each of his victims.9 During Raders sentencing hearing, the families of the victims were given the chance to give victim impact statements describing how the murders have effected and continues to effect their lives. The families got a chance to speak on behalf of their loved ones who are no longer here because of BTK. C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study The C, Si, Ge Doped (6,3) Chiral BNNTs: A Computational Study Mohammad Reza Zardoost a,*, Behnam Dehbandib , Marjan Dehbandib Abstract: Electronic structure properties including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, NMR parameters of the isotropic and anisotropic chemical shielding parameters for the sites of various atoms were calculated using density functional theory for C , Si , Ge doped (6,3) Chiral BNNTs. The calculations indicated that average bond lengths were as: Ge-N > Si-N > C-N and Ge-B > Si-B > C-B. The dipole moments for C, Si, and Ge doped (6, 3) Chiral BNNTs structures show fairly large changes with respect to the pristine model. Keywords: NMR, Nanotube, DFT, Dipole moment 1. Introduction Since the early times that carbon nanotube (CNT) was discovered by Iijima [1], the physical, chemical and structural properties and applications of this material have been investigated extensively [2–4]. The properties of CNTs are mostly dependent on the tubular diameter, doped atoms in the structure and chirality, which make their synthesis for the specific purposes difficult. A lot of studies have been done in the investigation of stable structures of non-carbon based nanotubes, among them boron-nitride nanotubes (BNNTs) have a great importance [5]. The stable tubular structure of BNNT was initially found by calculations [6] and later was successfully synthesized [7]. After this time, a large growing number of experimental and theoretical studies, specifically ab initio calculations on carbon-, silicon- and germanium substituted BN nanotubes have been performed on the electronic structures of the BNNTs [8–11]. The results show that C, Si and Ge replacements can induce spontaneous magnetization with different deformation in the nanotube [12]. At the present time, nuclear magnetic resonance (NMR) spectroscopy [13-14] is the best technique to study the electronic structure properties of materials. Doping of Chiral BNNTs by C, Si, Ge atoms changes their properties and so the interactions of the nanotube and foreign atoms or molecules. (see Fig. 1). In this work we studied the electronic structure properties, including bond lengths, bond angles, dipole moments ( µ), energies, band gaps, and NMR parameters in the C, Si, Ge doped Chiral BNNTs structures. a b c d e f g 2. Computational methods All calculations were performed using Gaussian 98 computational package [15] with density functional theory (DFT) method using Becke’s three-parameter hybrid exchange functions with the correlation functions of Lee, Yang, Parr (B3LYP) [16,17] using 6-31G (d) basis set [18]. Previously it has been found that the calculated NMR parameters at the B3LYP and B3PW91 levels have a good agreement with the experiment [19]. It is shown that B3LYP gives reasonable and even accurate band gap values for nanotubes [19] so this function is chosen for band gap calculations. In the present study, we considered a pristine (6,3) chiral BNNTs of diameter 6.6 Ã… and 10.1 Ã… length. This BNNT model consists of 42 Boron, 42 Nitrogen and 18 hydrogens (B42N42H18) B and N sites of this BNNT are doped by C, Si, Ge (see Fig. 1). We have seven models, namely pristine (Fig. 1a), or with a B or N atom doped by C, i.e., the B-C-B or N-C-N model (Fig. 1b, c), doped by a Si atom, i.e., the B-Si-B or N-Si-N model (Fig. 1d, e), doped by a Ge atom, i.e., the B-Ge-B or N-Ge-N model (Fig. 1f, g). We investigated the influence of the C, Si, and Ge doping on the properties of the (6,3) Chiral BNNTs. The hydrogenated models of the pristine (6,3) Chiral BNNTs and the three atoms doped models of BNNTs consisted of 102 atoms with formulas of B42N42H18 (pristine), CB41N42H18 and CB42N41H18 (B-C-B or N-C-N model), SiB41N42H18 and SiB42N41H18 (B-Si-B or N-Si-N model), GeB41N42H18 and GeB42N41H18 (B-Ge-B or N-Ge-N model). The calculated CS tensors in the principal axis system (PAS) with the order of ÏÆ'33 > ÏÆ'22 > ÏÆ'11 [20] for C, Si, and Ge doping for the investigated models of the (6,3) Chiral BNNTs were converted into measurable NMR parameters (isotropic chemical shielding (CSI) and anisotropic chemical shielding (CSA) p arameters) using Eqs. (1) and (2) [23], summarized in Tables 3-6. CSI(ppm)= (ÏÆ'11+ ÏÆ'22+ ÏÆ'33) (1) CSA(ppm)= ÏÆ'33(ÏÆ'11+ ÏÆ'22) (2) For NQR parameters, computational calculations do not directly detect experimentally measurable NQR parameters, nuclear quadrupole coupling constant (CQ), and asymmetry parameter (). Therefore, Eqns. (3) and (4) are used to convert the calculated EFG (electric field gradient) tensors in the principal axis system (PAS) with the order of |qzz| > |qyy| > |qxx| to their proportional experimental parameters; CQ is the interaction energy of nuclear electric quadrupole moment () with the EFG tensors at the sites of quadrupole nuclei (Nuclei with nuclear spin angular momentum greater than >1/2), but the asymmetry parameter () is a measure of the EFG tensors, which describes the deviation from tubular symmetry at the sites of quadrupole nuclei. The standard Q value (Q (11B) = 40.59 mb) reported by Pyykkà ¶ [21] is used in Eq. (3). The NQR parameters of 11B nuclei for the investigated models of the (6,3) BNNTs are summarized in Table 7. (3) (4) 3. Results and discussion 3.1. Structures of the (6,3) Chiral BNNTs The structural properties consisting of the B-N bond lengths, bond angles, dipole moments ( µ), energies, and band gaps for the investigated models of the (6,3) Chiral BNNTs are given in Table 1 and Table 2. R1, R2, and R3 are B-X-B and N-X-N bond lengths (doped atom and its neighbors). ÃŽ ±, ÃŽ ², and ÃŽ ³ are B-X-B and N-X-N angles. There are Six forms of C, Si, Ge doped Chiral BNNTs for the (6,3) Chiral model. These calculations indicated that the average of the (X = C, Si, Ge) bond lengths of the B-X-B and N-X-N models is larger than those the pristine models. The reason seems to be increasing of atomic radius going from carbon to Ge. The bond angles produce some structural deformations that are responsible for deformation in structure by changing the doped atom size respect to carbon. For the B-X-B and N-X-N (X = C, Si, Ge) models, the diameter values are larger than those the pristine models. It has worth to be noted that the significant changes of geometries are just for those atoms placed in the nearest neighborhood of X atom and those of other atoms almost remained unchanged. 3.2. Energy band structure and density of states Table2. Energy, LUMO, HOMO, LUMO-HOMO gap, dipole moment ÃŽ ¼, and electronegativity (χ) of the studied structures at B3LYP/6-31G(d). The total densities of states (DOS) of these tubes are presented in Fig. 2. As can be seen from Fig. 2, the calculated HOMO-LUMO gap (band gap) of the (6,3) Chiral BNNTs is 6.2 (eV) and the calculated band gaps of the C , Si , Ge doped models molecular orbital’s are 3.5,5.8 , 5.0 , 5.0 , 5.5 and 5.0 (eV) respectively (See Table 2). Doping of C, Si, and Ge in these tubes causes significant changes in the gaps of the DOS plots. In comparison with the pristine model, the band gaps of these models are reduced that increase their electrical conductance. These results indicated that the doping of C, Si, Ge atom by B, N atoms B-X-B and N-X-N model (X=C, Si, Ge) has more influence on the band gap of the Chiral BNNTs (see Table 2). By increasing atomic number and size polarizability increases that enhances dipole moment. Dipole moments ( µ) of the C, Si, Ge doped Chiral BNNTs structures (Fig. 1) indicate slightly changes with respect to the pristine model. 3.3. NMR parameters of the (6,3) Chiral BNNTs The NMR parameters for the investigated models of the (6,3) Chiral BNNTs are tabulated in Table 3, 4, 5 and Table 6. In the pristine model of the (6,3) Chiral BNNTs, there are 42 B atoms and 42 N atoms in the considered model and the NMR parameters are separated into five layers and six Columns, which means that the CS parameters for the atoms of each layer and Column have equivalent chemical environment and electrostatic properties. In Fig. 1b,c,d,e ,f,g the B and N atoms has been replaced by the C, Si, Ge atoms. Table 3 Isotropic shielding parameters of the studied structures at B3LYP/6-31G(d) The calculated results in Table 3 indicate that doping C, Si, and Ge slightly changes the NMR parameters of the various B and N atoms in (Fig.1b–g) of the Si, Ge, C doped(6,3) Chiral SWBNNTs except for the N25 and N27 atoms for which the changes are significant. Because among the atoms of (Fig.1b–e) B–X model (X= C, Si, Ge), the N25 and N27 atoms are the nearest neighbors of the C, Si, and Ge atoms; hence, both the CSI and CSA parameters show the most significant changes due to the C, Si, Ge doping. Also, changes in the CSI parameters of the N10 and N12 atoms, which are the next nearest neighbors of the C, Si, Ge atoms, are also notable. There are differences between the properties of the electronic structures of C, Si, Ge atoms. Comparison of the calculated NMR parameters in (Fig. 1b–g) indicates that the properties of the electronic structure of the Ge doped (6,3) Chiral SWBNNTs are more influenced than those of the Si–N model, where the N atom is doped by the Si atom. We studied the electronic energies of the models. The changes in the NMR parameter due to the C, Si, and Ge doping are more significant for the N–Si, N–Ge, N-C models with the pristine model. 3.2. NQR parameters The 11B NQR parameters (ÃŽ ·Q and CQ) in the geometrically optimized SWBNNT models were calculated from the EFG tensors. The results are tabulated in Table 7. A quick look at the results reveals that the calculated NQR parameters are not similar for various nuclei; therefore, the electrostatic environment of BNNT is not equivalent in length in all BNNT models. Since, in contrast with CNTs, the ends of BNNTs are different, the NQR values decrease from each end to the opposite end of the chiral model. It was proved before that the end nuclei in the SW-BNNTs are crucial to their growth and also field emission properties [22, 23]. Since no experimental NQR data for BNNTs are available in the literature, the tables do not include any reference experimental data for the calculated results. B17 and B46 in all models have the largest CQ that states greater orientation of the EFG tensor eigenvalues along the z-axis of the electronic distribution at the sites of the 11B17 and 11B46 nuclei. The electrostatic environments of atom B17 and B46 are stronger than in the other layers along the length of the tube. The largest change in CQ is due to B46, located in the layer of doped atoms, because doping changes the geometrical parameters and hence the electronic behavior of atoms. Table 8 The 11B NQR parametersThe highest occupied molecular orbital (HOMO) and the lowest unoccupied molecular orbital (LUMO) in the pristine, and C–X (X=B, N) models are plotted in Fig. 3. For the pristine model, HOMO and LUMO are uniformly distributed throughout the B–N bonds, whereas, in the C–X model (X=B, N) models, HOMO and LUMO are highly localized at the doped regions. (see Fig. 3) In comparison with the pristine model, band gaps of the C, Si, and Ge doped models increased their electrical conductance. Conclusion We studied the electronic structure properties including bond lengths, bond angles, dipole moments (ÃŽ ¼), energies, band gaps, the NMR parameter of the six C, Si, Ge doped SWBNNTs models by means of DFT calculations. The calculated results indicated that the average Ge-B bond lengths of the Ge-N model are larger than those the pristine and the C–B, C–N, Si–B, Si-N and Ge-B models: Ge–N>Si–N>Ge–B>Si–B>C–N>Pure>C-B. The values of dipole moments (ÃŽ ¼) of the six C, Si, Ge doped SWBNNTs are Ge–N> Si–N> Ge–B> C–N> Pure> Si–B > C-B. In comparison with the pristine model, the band gaps of the six C, Si, Ge doped models are reduced and their electrical conductance increased as: C–B > Si–B = Si–N = Ge–N > Ge–B > C-N. The NMR values for the B and N atoms directly bound to the C, Si, and Ge in the C, Si, and Ge doped models are significantly changed. Comparison of the calculated NMR parameters in the X–B and X-N (X=C, Si, Ge) models shows that the properties of the electronic structure of the X-B doped (6,3) Chiral SWBNNTs are more influenced than X–N model in Fig. 1b–g. The electronic sites of the B and N atoms in X-N model have greater effects than X-B model in Fig. 1 in the C, Ge, and Si doping processes. References [1]S. Iijima, Single-shell carbon nanotubes of 1-nm diameter, Nature 354 (1991) 56. [2]H. Terrones, F. Lopez-Urias, E. Muooz-Sandoval, J.A. Rodriguez-Manzo, A. Zamudio, A.L. Elias, M. Terrones, Magnetization of carbon-doped MgO nanotube, Solid State Sci. 8 (2006) 303. [3]F. Moreau, R. Langlet, P.h. Lambin, P.P. Kuzhir, D.S. Bychanok, S.A. Maksimenko, Dielectric properties of a novel high absorbing onion-like-carbon based polymer composite, Solid State Sci. 11 (2009) 1752. [4]R. Joshi, J. Engstler, P. Haridoss, J.J. Schneider, Formation of carbon nanotubes from a silicon carbide/carbon composite,Solid State Sci. 11 (2009) 422. [5]A. Loiseau, F. Willaime, N. Demoncy, N. Schramcheko, G. Hug, C. Colliex, H. Pascard, Mathematical modeling for the simulation of heavy metal ions, Carbon 36 (1998) 743. [6]X. Blase, A. Rubio, S.G. Louie, M.L. Cohen, Stability and band gap constancy of boron-nitride nanotubes, Eur. Phys. Lett. 28(1994) 335. [7]N.G. Chopra, R.J. Luyken, K. Cherrey, V.H. Crespi, M.L. Cohen, S.G. Louie, A. Zettl, Boron-nitride nanotubes, Science 269 (1995) 966. [8]L. Guo, R.N. Singh, Catalytic growth of boron nitride nanotubes using gas precursors, Physica E 41 (2009) 448. [9]B. Fakrach, A. Rahmani, H. Chadli, K. Sbai, J.-L. Sauvajol, Raman spectrum of single-walled boron nitride nanotube, Physica E 41 (2009) 1800. [10]M. Mirzaei, An electronic structure study of O-terminated zigzag BN nanotubes, Physica E 41 (2009) 883. [11]M. Giahi, M. Mirzaei, Computational NQR study of a boron nitride nanocone, Z. Naturforsch. A 64 (2009) 251. [12]J. Wu, W. Zhang, Chem. Phys. Lett. 457 (2008) 169. [13]R. R. Zope, B.I. Dunlap, Phys. Rev. B. 72 (2005) 45439-6. [14]F.A. Bovey, Nuclear Magnetic Resonance Spectroscopy, Academic Press, San Diego, 1988. [15]M.J. Frisch, G.W. Trucks, H.B. Schlegel, G.E. Scuseria, M.A. Robb, J.R. Cheese- man, V.G. Zakrzewski, J.A. Montgomery Jr., R.E. Stratmann, J.C. Burant, S. Dapprich, J.M. Millam, A.D. Daniels, K.N. Kudin, M.C. Strain, O. Farkas, J. Tomasi, V. Barone, M. Cossi, R. Cammi, B. Mennucci, C. Pomelli, C. Adamo, S. Clifford, J. Ochterski, G.A. Petersson, P.Y. Ayala, Q. Cui, K. Morokuma, D.K. Malick, A.D. Rabuck, K. Raghavachari, J.B. Foresman, J. Cioslowski, J.V. Ortiz, A.G. Baboul, B.B. Stefanov, G. Liu, A. Liashenko, P. Piskorz, I. Komaromi, R. Gomperts, R.L. Martin, D.J. Fox, T. Keith, M.A. Al-Laham, C.Y. Peng, A. Nanayakkara, C. Gonzalez, M. Challacombe, P.M.W. Gill, B. Johnson, W. Chen, M.W.Wong, J.L. Andres, C. Gonzalez, M. Head-Gordon, E.S. Replogle, J.A. Pople, GAUSSIAN 98, Gaussian, Inc., Pittsburgh, PA, 1998. [16]A.D. Becke, J. Chem. Phys. 98 (1993) 5648-5652. [17]C. Lee, W. Yang, R. G. Parr, Phys. Rev. B. 37 (1988) 785. [18]G. A. Petersson and M. A. Al-Laham, J. Chem. Phys. 94, 6081 (1991). [19]M. Mirzaei, N.L. Hadipour, J Phys Chem A. 110 (2006) 4833-4838. [20]Y. Matsuda, J. Tahir-Kheli and W. A. Goddard, The Journal of Physical Chemistry letters 1 (2010) 2946. [21]R.S.Drago,Physical Methods for Chemists,second ed. ,Saunders College, Florida, 1992. [21]P. Pyykkà ¶, Mol. Phys. 99 (2001) 1617. [22] S. Hou, Z. Shen, J. Zhang, X. Zhao, Z. Xue, Chem. Phys. Lett. 393 (2004) 179. [23] E. Bengu, L.D. Marks, Phys. Rev. Lett. 86 (2001) 2385.