Thursday, August 27, 2020

Child Trafficking Essays - Human Rights Abuses, Sex Crimes

Kid Trafficking What is youngster dealing? Youngster dealing is a wrongdoing including the development of kids with the end goal of their abuse. It is viewed as kid dealing if the casualty is younger than 18, else it is called human dealing, which is likewise illicit. The reason for kid dealing is for misuse, which incorporates abusing the prostitution of others, sexual abuse, constrained work, bondage or comparable practices and the evacuation of organs. Youngsters are likewise utilized in sedate exchanges all locales of the world. Kids are regularly dealt into misuse as either sedate dispatches or street pharmacists, and afterward they were paid in drugs, with the goal that they become dependent and further entangled. Because of the idea of medication dealing, kids who are caught are regularly rewarded as hoodlums, when in all actuality they are frequently the ones needing lawful help. There are numerous reasons why the casualties dont flee. They dont flee on the grounds that their dealers control them. For instance through obligation subjugation, a casualty is informed that the individual in question owes the dealer cash utilized for transportation, food and settlement. The obligation never diminishes and the casualty stays caught by the dealer. Different types of control incorporate taking and keeping a casualties character or travel reports, use as dangers to hurt the casualties family, bolting up the person in question, and constrained medication use. The casualties are totally controlled and frequently too reluctant to even consider trying to get away. Kid dealing has numerous impacts. Typically the casualties dont even have fundamental command over their every day choices, for example, when to rest, eat, or rest. Their lives are constrained by their dealers who continually misuse, torment, assault, constrained medication use, constrained premature births, and physiological control, The experience is horrendous and harms the physical, mental, and social prosperity of an individual. The dealers as a rule focus on powerless individuals, despite the fact that anybody can be dealt. Components that cause powerlessness incorporate absence of financial chances, neediness, joblessness, and abusive behavior at home. There are a couple of realities about youngster dealing. An oppressed youngster might be assaulted somewhere in the range of five and ten times each night. The exchange might be for as meager as $5 every night. Nonetheless, the first run through a youngster is sold, the cost may ascend as high as $200. All things considered, two youngsters are sold each moment. Around 75-80% of youngster dealing is for sex. The Indonesian government has completed a few endeavors to stop this issue, however it appears it didnt function admirably. The administration didn't show fiery endeavors to explore and criminally rebuff law requirement authorities associated with human dealing. We can help forestall youngster dealing by appropriating data to kids and their folks about the maltreatment on kids who are dealt and the hazard that kids who relocate or are sent away from home to work or win cash for other people, will be dealt. Different ways is that we can elect to do casualty effort or offer administrations to a nearby enemy of dealing association.

Saturday, August 22, 2020

Unbroken Essay Research Paper Unbroken I free essay sample

Solid Essay, Research Paper Solid I wouldn # 8217 ; t cognize how to delineate an image or a sonata, yet I can state individual how I feel, however they only occasionally comprehend what I mean. Wordss bomb me as often as possible, be that as it may, figure takes note. They aren # 8217 ; t tuning in at any rate. One individual knows me. At the point when I converse with him I feel like a blade in a cabinet, on the grounds that my words have power. The conceivable mischief would be hopeless. He and I resemble a house self-destructing. Our asphalt is amiss and our letter box is losing. It is painted pink and xanthous. We love it, it # 8217 ; s one of a kind. Last dim I stepped my pess through the planks of flooring since I needed to encounter my toes in the Earth. I pushed my authorities through the roof and kicked down the dividers. I cognize he asks why I do things like that. I just needed to permit some air in. We will compose a custom article test on Whole Essay Research Paper Unbroken I or on the other hand any comparable theme explicitly for you Don't WasteYour Time Recruit WRITER Just 13.90/page I stated, # 8220 ; Look hon, presently we can see the stars. # 8221 ; He got over the residue and set me to bed. He won # 8217 ; t kip this evening. His thoughts keep awake with the Moon looking to apply the fallen angels in his head. Excessively shrewd, too much strict for his ain harmony. A cleric specialist, unstuck in cut. An injection of brains and a smack even with this universe. Continuously anxious, looking for answers. Rash and motivated, creating down his thoughts. Entertaining stories about Elvis and his followings, the Elvi, or ruined poesy. Painting his dreams on sheets that swing from the overhang or painting me with hallucinogenic structures. It doesn # 8217 ; t issue which. Every last bit of it makes me want him more. A few things I state to him resemble malodorous notes played too much often. I # 8217 ; m out of tune. He ever chimes in. Our stroll in is superior to most, I assume. We cognize the stairss by chest. The universe moves quickly around us and our calm bibulous walk, yet we wear # 8217 ; t consideration. Our heads move quickly in spite of Thursdaies is world’s junior-grade interruptions. It # 8217 ; s us and them, and we # 8217 ; re the solitary two normal individuals left. He makes me apprehensive, still. His fantasies are greater than the two of us. When we express the words harvest time from my lips. They aren # 8217 ; t sufficient to elucidate who I need to be. I am so imperfect. He says, # 8220 ; Sometimes individuals have imperfectnesss that are meriting populating with. You # 8217 ; re a little odd. It # 8217 ; s part of your appeal. # 8221 ; This grown-up male knows me, and adores me at any rate. He is crazier than I am. Eight mature ages may each piece great be where we # 8217 ; rhenium concerned. History has roots that dive deep. They go to the focal point of the Earth and back and wrap around recollections that will neer pine away. Pictures of him consume into my head. Dreams of him cautiously try to equilibrate me on the tip of his finger, yet it # 8217 ; s too much unsteady and I ever fall. I snicker when I gaze toward him, appreciative to be sitting on the floor. I compose horrendous poesy all the clasp for him. I # 8217 ; m more grounded with a pen in my manus. My head turns with thoughts that resemble downpour, I can # 8217 ; t get them all. I wish I might, I be able to feel a drouth coming. I # 8217 ; ll filter out the muss along these lines. Right presently I have buckets to make full. Our rooftop is spilling, it # 8217 ; s so propping. You I dream a fantasy of better things furthermore, minutes yet to be. In my mind you wait. Keep my manus, move with me in the blossoms, they develop, so excellent, like us, so sensitive. They twist in the breeze, I curve my dorsum. Would you be able to encounter me? We associate in opportunity, acquiescence in adoration. Accompany me, in this life, in this fantasy. Murmur in the moonshine. Shout in obscurity. Move in my beat. Let me experience your music.

Friday, August 21, 2020

Creating an A+ in APA Research Paper PDF

Creating an A+ in APA Research Paper PDFAn A+ in APA research paper PDF? This will be easy to get. APA research paper PDFs can easily be found online at your university's website, and other reputable sources. These websites usually have pre-defined formats for the different types of research papers, which are helpful in creating an A+ in APA research paper PDF.In APA research paper PDF, the format for the main research paper and the supplementary information should be the same. However, there is no fixed set of norms for the document to follow. You will be able to choose the format that best suits you in order to create an A+ in APA research paper PDF.If you think about it, the PDF format is an acronym for Adobe Portable Document Format. This is used for the Adobe Acrobat, the open source software that has been designed to make data management and printing easy. As such, if you use the format as per the guidelines, it will also help you to create an A+ in APA research paper PDF.It is always a good idea to know how much space you have allotted for the APA research paper PDF. Even though this is a very powerful tool for the students to be able to create an A+ in APA research paper PDF, the better prepared you are with the required space, the better off you will be. However, it is important to note that the format and the size of the file do not really matter.If you can format the documents in the appropriate setting in the right way, it does not matter much how big or small the document is. What is important is that the formatting follows the norms and rules of the academic community. If you make mistakes while formatting the document, the format will not be a good one, and therefore will not be an A+ in APA research paper PDF.The most important thing is to ensure that the document looks like a paper and doesn't look as if it was copied from somewhere else. You can use software that can check the content of the document for errors or shortcoming. Many times, it h appens that the content of the document is very similar with other documents from the past, which means that it might have some copies of previous research papers that need correcting. This is where the APA research paper PDF can be very helpful.The format of the research paper PDF is the same as that of a paper, so it is quite important to see if the font style and the line spacing are appropriate. It is very important to check whether the formatting is correct. Also, it should be noted that APA research paper PDF is not for the sake of your homework. Instead, it should be used for your college or university work, as well as for professional use.A research paper PDF should contain an APA citation and the author's name and affiliation. Your university or college will be able to help you in choosing the best format for your purpose. There are many sites on the Internet that offer you this service for a fee.

Monday, May 25, 2020

Understanding Quantitative Analysis in Chemistry

Quantitative analysis refers to the determination of how much of a given component is present in a sample. The quantity may be expressed in terms of mass, concentration, or relative abundance of one or all components of a sample. Here are a few sample results of quantitative analysis: Ore contains 42.88% silver by mass.The chemical reaction yielded 3.22 moles of product.The solution is 0.102 M NaCl. Quantitative Versus Qualitative Analysis Qualitative analysis tells what is in a sample, while quantitative analysis is used to tell how much is in a sample. The two types of analysis are often used together and are considered examples of analytical chemistry. Methods Used in Quantitative Analysis Several methods are used to quantify a sample. These may be broadly classified as either physical  or chemical methods. Physical methods measure a physical property, such as adsorption of light, density, and magnetic susceptibility. Examples of physical methods include: Fourier Transform Infrared Spectroscopy (FTIR)Atomic Emission Spectroscopy (AES)Energy Dispersive X-ray Spectroscopy (EDS)trace element analysisx-ray fluorescence spectroscopyICP-AESICP-MS Chemical methods involve chemical reactions, such as oxidation, precipitation, or neutralization to form a new chemical compound. Examples of chemical methods include: Titration (volumetric analysis)Gravimetric analysisVarious wet chemistry testsCombustion analysisInert gas fusion Often physical and chemical methods overlap. In addition, mathematics is used in quantitative analysis. Statistics are particularly useful for analyzing data. The primary tool for quantitative analysis is the analytical balance or scale, which is used to measure mass precisely. Glassware, such as the volumetric flask, is also important. For analytical chemistry, a typical balance measures mass to 0.1 of a milligram. A sensitivity of about a thousand times is needed for microanalytical work. Why Quantitative Analysis Is Important Its important to know the quantity of all or part of a sample for several reasons. If youre performing a chemical reaction, quantitative analysis helps you predict how much product to expect and to determine your actual yield. Some reactions take place when the concentration of one component reaches a critical level. For example, an analysis of radioactive material might indicate there is enough of a key component for the specimen to undergo spontaneous fission! Quantitative analysis is crucial to the formulation and testing of food and drugs, as it is used to measure nutrient levels and provide an accurate accounting of dosage. It is also  critical in determining the level of contaminants or the impurity of a sample. While qualitative analysis might be able to determine the presence of lead in the paint on a toy, for example, quantitative analysis detects how much concentration exists. Medical tests rely on quantitative analysis for information about a patients health. For example, quantitative analysis techniques can determine blood cholesterol levels or the ratio of lipoproteins in plasma or the amount of protein excreted in urine. Here again, quantitative analysis complements qualitative analysis, since the latter identifies the nature of a chemical while the former tells you how much there is. Quantitative tests of a mineral may be used to determine whether its practical to mine it for a specific element or compound. Quantitative tests are used to verify that products meet manufacturer or regulatory specifications.

Friday, May 15, 2020

Marriot Corp Cost of Capital - 2528 Words

Introduction and background We are conducting an analysis of Marriott Corporation for calculating the hurdle rates at each of the firm s three divisions--lodging division, restaurant division and contract service division. Marriott uses Weighted Average Cost of Capital (WACC) as the hurdle rate, and use it to discount the appropriate cash flows when evaluate an investment project. Our goal is to determine the WACC at every division base on the information that the case has provided. First of all, we will determine the cost of debt, cost of equity and the capital structure for the whole company. Then we will compute for the tax rate, and calculate the WACC for the whole company. After this, we will determine the Risk-free Rates,†¦show more content†¦Strategy #2 conflicts with the company s objective because the company is using hurdle rate to discount cash flows and evaluate potential investments. If Re was higher, then WACC, which is the hurdle rate, would be higher as well. If this was the case, the company s growth would be reduced therefore failing the company s growth objective. If the company s objective is to keep growing by aggressively developing appropriate opportunities, it is best if they do not use their funds to buy back stock shares, even though these shares were undervalued. So strategy #4, which is to repurchase undervalued shares, conflicts with the company s objective. When the company intends to remain a premier growth company, it must aggressively invest in different profitable projects to generate more profit. If Marriott used their funds to buy back stock shares, the available funds for investment would be reduced. This will have a negative effect on the company s growth objective. 2.How does Marriot use its estimate of its cost of capital? Does this make sense? Marriot use cost of capital as the hurdle rate to discount future cash flows for the investment projects of the firm s three divisions. Hurdle rate is the minimum rate of return that is required in order for the company to accept the investment. Marriot use the hurdle rate to calculate the net presentShow MoreRelatedMarriot Corp Case: Cost of Capital1126 Words   |  5 Pagespresident of project finance at Marriott Corporation, prepares recommendations annually for the hurdle rates at each of the firm ¡Ã‚ ¯s three divisions. In this reflective case, the company ¡Ã‚ ¯s policies and strategies related with hurdle rates and cost of capital are discussed. In the above context, the company ¡Ã‚ ¯s policy of repurchasing its shares is also reviewed ; particularly, it focuses on the financial effects there may be if there is a 30% repurchase of the common stock. For practical purposesRead MoreMarriott Corporation Case Study: the Cost of Capital Essay656 Words   |  3 PagesFinancial Decision Analysis~Marriott Corporation Case Study Executive Summary – Q5 – Hurdle Rate Analysis Hurdle rates, the weighted cost of capital that projected cash flows must exceed for initiatives to be considered, vary within Marriott Corporations due to their unique industry risk levels and capital structures. They use this number to determine which projects to accept, to adjust the rate at which the firm grows and as a measure for compensation within each business area, and as incentiveRead MoreMarriott Corporation: the Cost of Capital2323 Words   |  10 PagesMarriott Corporation: The Cost of Capital (Abridged) Are the four components of Marriot s financial strategy consistent with its growth objective? Since its foundation in 1927 Marriott Corporation grew into one of the leading lodging and food services in the US. With three major business lines: lodging, contract services and related business, Marriott has the intention to remain a premier growth company. To achieve this goal the corporation’s strategy is to develop aggressively appropriate opportunitiesRead MoreMarriott Corporation Case2424 Words   |  10 PagesMarriott Corporation: The Cost of Capital (Abridged) 1. How does Marriott use its estimate of cost of capital? Does this make sense? Marriot use cost of capital as the hurdle rate (minimum rate of return required to accept the project) to discount future cash flows for the investment projects of the three lines of business (Lodging, Contract Services and Restaurants). They use this rate to calculate NPV and net present value over cost to decide for the profit rate. Since cost of the project staysRead MoreMarriott Case Notes2220 Words   |  9 PagesHow does Marriott use its estimate of its cost of capital? Does this make sense? c. What is the weighted average cost of capital for Marriott Corporation? †¢ What risk-free rate and risk premium did you use to calculate the cost of equity? †¢ How did you measure Marriott’s cost of debt? 1. Are the four components of Marriott s financial strategy consistent with its growth objective? 2. How does Marriott use its estimate of the cost of capital? Does this make sense? 3. Using the CAPMRead MoreMarriott Case Study2572 Words   |  11 Pagesas well be seen that this strategy may conflict with the objective, as the company uses the hurdle rate to evaluate potential investments where the cost of equity is higher, then the WACC would appear higher as well(hurdle rate)and distract the company to invest in some profitable ventures. c) The effort to optimize the use of debt in Marriott’s capital structure helps the company as it invests a lot in long term assets hence it is necessary for the company to maximize and optimize its debt. The companyRead MoreMarriott Corporation: the Cost of Capital2898 Words   |  12 PagesHBR Case #1 Marriott Corporation: The Cost of Capital Group 16—Tutorial Mon 11:30am Group members LIU Ying, Chloe | 1155019350 | LUO Yingying, Irika | 1155020931 | TIAN Tian, Sarah | 1155019114 | WU Jiajie, Jesse | 1155019061 | 17 September 2012 Executive Summary By 1987, Marriott Corporation had grown into a large multi-dimensional company with over $5 billion assets in lodging, contract services and restaurants. The company enjoyed fast growth in both sales and assets at aroundRead MoreAnalysis of Ioi Corporation Berhad Performance Based on 5 Years Financial Report4727 Words   |  19 Pagessustaining consistent long term growth in volume and profitability†. Today IOI Group comprises 2 listed entities on the main board of the â€Å"Bursa Malaysia†: IOI Corporation Berhad and IOI Properties Berhad. They also own 3 resort hotels under the name Marriot Putrajaya Hotel, Palm Garden Hotel and Casuarina Beach Resort. Among the company’s achievement and good works, it has won different awards and laurels from different well-recognized magazines and organizations around Asia such as; Finance Asia andRead MoreAnalysis of Capital Structure of Ihg5725 Words   |  23 PagesAnalysis of the Capital Structure of InterContinental Hot el Group (IHG) Company Student Numbers; 307473 307540 307576 308254 A dissertation in report form submitted in partial fulfillment of the requirements for Financial Management II of the Higher Diploma in Events, Hotel and Tourism Management IMI International Hotel Management Institute, Switzerland October 2010 Abstract: This report is illustrated about the capital structure ofRead MorePizza Hut Case Study3564 Words   |  15 Pageseven speaking to someone. Weaknesses However, the fact that Pizza Hut does have a restaurant to run is also a weakness. Pizza Hut has higher overhead costs, due to the restaurant that other competitors dont have to deal with. Another result of higher overhead costs is higher prices Pizza Hut must charge. Obviously, Pizza Hut is not the low cost producer. They rely on their quality pizza and good service to account for their higher prices. An indirect weakness that Pizza Hut has is that they have

Wednesday, May 6, 2020

The Industrial Revolutions Effect on The United States...

The Industrial Revolutions Effect on The United States and Russia *Works Cited Not Included Some people think that it is good to do bad things to achieve something good. Well, that seemed to be the case in Russia and the United States after the Industrial Revolution because in the United States and Russia problems led to solution .The Industrial Revolution caused many problems in both the United States and Russia. Even though the Industrial Revolution caused similar problems, the solutions and results were different. There were many problems in the United States due to the Industrial Revolution. First, some Americans attempted to form monopolies to take over a particular industry. For example, Rockefeller and†¦show more content†¦Overcrowding was a big problem in some areas. Many people that lived in cities had to live in tenements. The conditions there were not very good, and cities were getting dirtier and unhealthy. Diseases began to spread and people got sick and some died. The cities were getting worse and worse. Lastly, due to the diversity of people, and imm igration because of the Industrial Revolution, there were many prejudice people in the United States that discriminated against colored people just because of the color of their skin. They were powerless and were not listened to by people. These were just some of the problems in the United States after the Industrial Revolution. There were also many problems in Russia after they had an Industrial Revolution. Russia had many government problems. The Russian government was a type of government that did not listen to the people. The government did as it pleased without consent from the people. The people had no say in the governing process as in the United States. Due to this there were poor working and living conditions, overpopulation, poor sanitation, not many jobs and many people were starving. The majority of the people in Russia (about ninety percent) were poor and only about ten percent were rich and they controlled the nation. This meant the majority of the nation was not being listened to. There were also solutions to the problems in the United States. In order toShow MoreRelatedLenin‚Äà ²s October 1917 Revolution: limited accomplishments, yet a turning point in 20th century history2291 Words   |  10 PagesLenin‘s October 1917 Revolution: limited accomplishments, yet a turning point in 20th century history Abstract In 1917, Lenin led factory workers in St. Petersburg, Russia, in taking over the government, expecting to spark the rapidly spreading revolution to abolish capitalism predicted by Marx and Engels. Unexpected relationships among the nations impeded that spread,. Once having become the leader of the vast territories that had formed the Russian Empire and having created a constitutionRead MoreThe Essential Questions5521 Words   |  23 Pages and the man who regards it with contempt is really despising Gods creation. The Renaissance also had a number of serious negative effects. In particular, Schaeffer claims that in Aquinas the intellect of man was not seen as being affected by the fall (which is in fact not true), and the intellect of man was increasingly seen as autonomous. This has several effects. First, there is the development of natural theology, theology developed without reference to Scripture. In this version of the relationRead MoreUnique Characteristics of Soviet Montag e5818 Words   |  24 Pagessequence to condense space, time, and information, Soviet Montage on the other hand is a style of filmmaking that is evolved to immerse the audience in a story and disguise technique was turned upside down in order to create the opposite emotional effect to bring the audience to the edge of their seat, and in the case of the Odessa Steps sequence, to push the viewer towards a feeling of vertigo. In a simpler form, Soviet Montage  combination  series of short shots are edited into a sequence to create

Tuesday, May 5, 2020

Poetic analysis Essay Example For Students

Poetic analysis Essay To a Sad Daughter written by Michael Annotated, sends a powerful message regarding a fathers love, and his hockey dolling daughter. Through analysis it is clear that Annotated does not use many overt poetic devices, but his subtle figurative language and specific word choice makes for an extremely effective poem. His decision to use common language and keep it simple helps to relate and understand halls emotions for his daughter. In order to make the connection between he authors motive in the poem, and its effectiveness through analysis- one must first understand the context of the poem. The poem appears to be written by a single father, to his only child (daughter), in hopes to help you delicately step into the wild world (62-63). She is certainly not the most typical sixteen year old girl; she dollies a predominantly male sport and actually enjoys the aspect of cuts and wounds- all this pleases you (6-7). The father asks his daughter to be patient with him as he tries to open up and explain real life ND all its possibilities to her: old rather be your closest friend than your father, Im not good at advice you know that, but ride the ceremonies until they grow dark. (39-43). The father reveals his unconditional love for his daughter early in the poem, l like all your faults even your purple moods (15-16) and is clear that nothing means more to him than his daughter. Annotated describes these feelings as like instead of love for his daughter, only to avoid her from being embarrassment. Annotated later reestablishes his aspirations for his daughter to go fully through life ND Step delicately / into the wild world / and your real prize will be / the frantic search. / Want everything. If you break/ break going out not in. (65-70). He explains to his daughter that she must strive to reach her potential in life, and that it is better to go out after something and fall, than not trying at all. Annotated has clear originality in his work, but It can be most appreciated when connected with his subtle use of poetic devices, figurative language and style. To a Sad Daughter is a free verse poem written in first person narration from the ethers point of view; it has eight stanzas and does not follow any rhyme scheme. The poet has a difficult task of writing about a unique experience that only a father- daughter can share; It Is extremely effective being written In free verse because the Annotated establishes flow with sentence-like poetry and has good use of alliteration for smooth reading (Answers. Com): One day Ill come swimming / beside your ship or someone will / and if you hear the siren / listen to it. (26-29), and also in, One afternoon I stepped / into your room. You were sitting / at the desk where I now write this. / Forsythia outside with window / and sun spilled over you / like a thick yellow miracle (51-56). Nonnatives repetitive use of the consonance s is clearly alliteration at work, the short lines roll softly off the tongue. He uses the repetition of ah sounds in, When I thought of daughters I wasnt expecting this (12-13), this is the use of assonance to help again with flow and pace of reading (Answers. Com). Annotated captures intense emotion with the use of a hyperbole when the father states: Ill sell y arms for you (70). Another aspect of Nonnatives word choice in the poem is his various uses of imagery in the poem. Nonnatives first use of imagery is also in the same quotations as his first example of alliteration (26-29); sirens were mythical creatures that used their sweet song to lure sailors to their island eventually getting lodged on rocks near the shore (Answers. Com). The father gives untraditional advice to his daughter by telling her to head toward this. In the following lines he states, For if you close your ears / only nothing happens. You will never change. (29-30) explaining how change is necessary and essential for growing. .ude6989942d3bd0628f2d427bae76ab13 , .ude6989942d3bd0628f2d427bae76ab13 .postImageUrl , .ude6989942d3bd0628f2d427bae76ab13 .centered-text-area { min-height: 80px; position: relative; } .ude6989942d3bd0628f2d427bae76ab13 , .ude6989942d3bd0628f2d427bae76ab13:hover , .ude6989942d3bd0628f2d427bae76ab13:visited , .ude6989942d3bd0628f2d427bae76ab13:active { border:0!important; } .ude6989942d3bd0628f2d427bae76ab13 .clearfix:after { content: ""; display: table; clear: both; } .ude6989942d3bd0628f2d427bae76ab13 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ude6989942d3bd0628f2d427bae76ab13:active , .ude6989942d3bd0628f2d427bae76ab13:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ude6989942d3bd0628f2d427bae76ab13 .centered-text-area { width: 100%; position: relative ; } .ude6989942d3bd0628f2d427bae76ab13 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ude6989942d3bd0628f2d427bae76ab13 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ude6989942d3bd0628f2d427bae76ab13 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ude6989942d3bd0628f2d427bae76ab13:hover .ctaButton { background-color: #34495E!important; } .ude6989942d3bd0628f2d427bae76ab13 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ude6989942d3bd0628f2d427bae76ab13 .ude6989942d3bd0628f2d427bae76ab13-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ude6989942d3bd0628f2d427bae76ab13:after { content: ""; display: block; clear: both; } READ: Poetry Essay SummaryIn the last stanza the author combines a use of imagery and a metaphor when the father shifts conversation from the perspective of life, and attempts to explain death. If I speak of death / it is without answers (72, 74), Dont recall graves. / Memory is permanent. / Remember the afternoons / yellow suburban annunciation. / Your goalie / in his frightening mask / dreams perhaps / of gentleness. (78-85). The father tells his daughter that death is the end of everyones fife, he warns her to not get stuck in remembering graves of others that pass away, but for her to be strong and see the real images of life (Answers. Mom). This stanza paints a picture of people grieving over the loss of loved ones and how difficult it can be to stop remembering those vivid graves. Annotated, with his use of the more abstract poetic devices, has created a wonderful poem that is extremely effective. Although Michael Nonnatives poem, To a Sad Daughter at first may appear to lack the essential rhyme scheme and structure that so many poems follow, but through analysis Nonnatives originality and subtle use of poetic devices combined for very effective poem. His special attention to word choice and flow of sentences had a major impact on the quality of writing, and eventually its on influence the reader. The uniqueness between a father-daughter relationship, and also the unconditional love that Annotated has demonstrated in his poem through his writing, is truly something special. Works Cited Annotated, Michael. To a Sad Daughter analysis. Toronto: Thomson-Nelson, 2006.

Saturday, April 11, 2020

Fraud Detection in Banking Transactions free essay sample

The purpose of this document is to detail the description of the Real Time (Active) Fraud Detection in Banking Transactions (FDBT) Project. This document is a key project artifact and is used during the design, construction, and rollout phases. Scope The objective of this project report is to capture the functional and non-functional requirements for the Real Time FDBT project. This report lists out the complete system requirements and design architecture of the project. The requirements contained herein will include, but not be limited to: Capabilities or system functionality – What a system does, to include, but not be limited to: Interfaces (internal and external hardware) Business Rules Data source and destination Exact sequence of operations and the algorithms used in those operations Triggers or stimuli to initiate operations or to force a change in state Error handling, recovery and responses to abnormal situations Validity checks Input/output sequences and conversion algorithms Frequency of use and update Constraints- Limitation imposed on the solution by circumstance, force or compulsion to include, but not be limited to: Design constraints based on TrinucInc IT Standards Control and Governance constraints (internal and external) Non-functional requirements to include, but not be limited to: Performance Requirements, Usability Quality Requirements (audibility, reliability, maintainability, etc. We will write a custom essay sample on Fraud Detection in Banking Transactions or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page ) Business Continuity, Operational Support Security and Control and Training Introduction Background According to the National Check Fraud Center in Charleston, South Carolina, bank fraud alone is a $10 billion a year problem. This is nearly 15 times the $65 million taken in bank robberies annually. The Concise Oxford Dictionary defines fraud as ‘criminal deception; the use of false representations to gain an unjust advantage. Fraud is as old as humanity itself, and can take an unlimited variety of different forms. However, in recent years, the development of new technologies (which have made it easier for us to communicate and helped increase our spending power) has also provided yet further ways in which criminals may commit fraud. As fraud attempts grow in both number and variety, financial institutions are challenged with the need for comprehensive, yet cost effective, risk management solutions. It is our belief that these fraudulent or suspicious financial transactions can be identified, characterized and red-flagged in real-time providing vital information to reduce their occurrences. For e. g. a check deposit followed almost immediately by a cash withdrawal would be a suspicious activity and warrant a red flag to check the customer’s motives. Banking databases with all the transaction information is readily available. We use this information coupled with our business logic to detect fraud and to develop the real time fault detector. Types of bank/financial frauds Check fraud New Account fraud Identity fraud Credit/Debit card fraud ATM transaction fraud Wire fraud Loan fraud Research The research regarding the project was done two fold – Business Issues and Technical research. First step was to identify the various ways in which bank fraud occurs and come up with common sense solutions to them based on our technical knowledge base. Next was to come up with the software architecture with technical decisions on choice of RDBMS, ETL tool and OLAP tool. Business Issues Detailed list of ways fraud occurs and activities that could red flag the transaction as suspicious are (Note: Activities generally pertain to personal banking and not corporate accounts): If check deposit is closely followed by cash withdrawal within say 10 hrs. If transaction type is above a specified number in 48 hours. If active more than one session at the same time. If trying to withdraw more money than the limit in credit. If trying to withdraw more money than the amount in debit. If trying to log on for more than 3 times at once. If any transaction is more than 80% credit limit in 48 hours (one transaction or sum or transactions in the 48 hour period). Deposit activity out of the normal range for any account Invalid Routing Transit numbers Excessive numbers of deposited items Total deposit amounts greater than average Large deposited items masked by smaller deposit transactions The amount xceeds the historical average deposit amount by more than a specified percentage A duplicate deposit is detected Deposited checks contain invalid routing or transit numbers The level of risk can be managed based on the age of the account (closed account getting lot of transactions suddenly). The number of deposits exceed the normal activity by the customer Consider the proximity of the customer’s residence or place of business Wire transfers, letters o f credit, and non-customer transactions, such as funds transfers, should be compared with the OFAC lists before being conducted. A customer’s home/business telephone is disconnected. A customer makes frequent or large transactions and has no record of past or present employment experience. A customer uses the automated teller machine to make several bank deposits below a specified threshold. Wire transfer activity to/from a financial secrecy haven, or high-risk geographic location without an apparent business reason, or when it is inconsistent with the customer’s business or history. Many small, incoming wire transfers of funds received, or deposits made using checks and money orders. Almost immediately, all or most are wired to another city or country in a manner inconsistent with the customer’s business or history. Large incoming wire transfers on behalf of a foreign client with little or no explicit reason. Wire activity that is unexplained, repetitive, or shows unusual patterns. Payments or receipts with no apparent links to legitimate contracts, goods, or services. A customer who purchases a number of cashier’s checks, money orders, or traveler’s checks for large amounts under a specified threshold. Money orders deposited by mail, which are numbered sequentially or have unusual symbols or stamps on them. Suspicious movements of funds from one bank into another, then back into the first bank: 1) purchasing cashier’s checks from bank A; 2) opening up a checking account at bank B; 3) depositing the cashier’s checks into a checking account at bank B; and, 4) wire transferring the funds from the checking account at bank B into an account at bank A. A rapid increase in the size and frequency of cash deposits with no corresponding increase in non-cash deposits Significant turnover in large denomination bills that would appear uncharacteristic given the bank’s location Different banks take different actions when confronted by a fraudulent transaction. The following table describes some of the actions taken by the bank and an ID no. is assigned to each: Bank Action Identification Number Freeze Account – No future transactions 8 Deny transaction 7 Teller warning – confirmed fraud, call security e. g. blacklisted check 6 Teller warning – double check ID, customer has bad history 5 Teller warning – call person from whom check originated. (Large check amt. †¦) 4 Deny ATM/online banking access 3 Reduce line of credit 2 Report to collection agency 1 We further generate a table to assign risk ranks for the various fraud detection rules along with the various dependant transaction parameters: Fraud Activity Description Dependant Parameters Business/Detection Rule Activity scale No. If any transaction(s) is more than 80% credit limit in 48 hours Old amount, requested amount(sum of amounts) Requested amount ? 0. 8 old amount 4 If transaction type is more than †¦types in 48 hours Type of transaction Count of number of similar transaction in specified time span 4 If active more than one session at the same time Transaction time Same transaction times 6 If trying to withdraw more money than the limit in credit Line of credit, requested amount Difference of LOC – Requested amt ? 0 7 If trying to log on for more than 3 times at once. Transaction time Same transaction times 6 Check deposit closely followed by cash withdrawal Transaction time, transaction type Transaction times of deposit and withdrawal ? 10 hrs 6 . . . This transaction data provided by Teradata acts the input to Ab-Initio where we apply our business rules in the transformation stage and obtain our output, which here would be to red flag the fraudulent transactions. Technical Research Relational Data Base Management System TERADATA Teradata data warehouse brings together all of the obtained data into a single repository for a completely integrated, 360-degree view of the truth. The Teradata Warehouse is a powerful, complete solution that combines Teradatas high-performance parallel database technology, a full suite of data access and management tools, and robust data mining capabilities, world-class scalable hardware, and the most experienced data warehousing consultants. With the Teradata RDBMS, you can access, store, and operate on data using Teradata Structured Query Language (Teradata SQL). Teradata SQL is broadly compatible with IBM and ANSI SQL. The Teradata RDBMS provides†¦ Capacity to hold Terabytes of data. Parallel processing which makes it faster than other relational DB. Parallel Data Extensions (PDE) a software interface layer on top of the operating system that enables RDBMS to operate in parallel env) Single data store and can be accessed from anywhere else. Fault tolerance – automatically detects and corrects any hardware failures. Data integrity –completes the transaction or rolls back to a stable state if a fault occurs. The architecture includes both Symmetric Multi-Processing (SMP) and Massively Parallel Processing (MPP) systems. They communicate thru fast interconnect. BYNET for MPP systems and board less BYNET (Virtual ByNet) for SMP systems. Users of the client system send requests to the Teradata RDBMS through a choice of various supported utilities and interfaces, which are listed below: BTEQ, Teradata SQL Assistant, Teradata WinDDI, Teradata MultiTool, FastExport, FastLoad, MultiLoad, Tpump, Teradata Visual Explain. These benefits have resulted in many Oracle Customers shifting their data warehouses from Oracle to Teradata in the past 3 years. Added to this Teradata provides the ability to Establish a single, centralized data warehouse with direct access by hundreds or even thousands of users across the organization. Integrate data from multiple sources and functional areas using one data model. Handle large and growing data volumes, complexity and number of users without any restructuring and reorganizations. Allow ad hoc, complex queries at any time with no scheduling necessary. The technical prowess has won Teradata, a division of NCR, a customer list of about 650 large companies and government agencies, including Albertsons, FedEx, Ford, the U. S. Postal Service and Wal-Mart. Characteristics of Teradata RDBMS that endeared us to use it in our project are: Extensive customer references. Time to solution is enhanced by Teradata’s flexibility that can be used for rapid initial implementation and ongoing extensions. Teradata can significantly lower total cost of ownership. Teradata Database is supported by an infrastructure of support 24/7/365. As data volume grows so will the system, but the growth is relatively effortless from a hardware and software point of view. More and more users will need access to the data warehouse, but adding them will not impact performance. Teradata’s performance with complex and ad hoc queries is unequaled. Loading and reloading the database is fast and fail safe with Teradata. If the warehouse needs to interface with the mainframe, Teradata offers seamless interoperability. Teradata Database is a mature product first released in 1984 Extraction, Transformation and Loading tool Ab Initio software is an ETL tool for enterprise class, mission critical applications such as data warehousing, batch processing, data movement, data analysis and analytics. Ab Initio helps to build large-scale data processing applications and run them in parallel environments. Ab Initio software consists of two main programs: Co-Operating System, which the system administrator installs on a host UNIX or Windows NT Server, as well as on processing nodes. (The host is also referred to as the control node. ) Graphical Development Environment (GDE) uses graphical components to build applications that transform large amounts of data. Business rules are applied to the datasets in the data transformation step by using the filter by expression component. Characteristics of Ab Initio ETL tool needed for the project are: Parallel data cleansing and validation. Parallel data transformation and filtering. Real time, parallel data capture. High performance analytics. Integration with Teradata RDBMS Integration and parallel execution of fraud detection custom codes. Has volume of 30 terabytes of data. Online Application Processing Tool Erwin is used in the design, generation and maintenance of high-quality, high-performance databases, data warehouses and final reports and graphs. From a logical model of the information requirements and business rules that define the database to a physical model optimized for the specific characteristics of your target database, Erwin helps to visually determine the proper structure, key elements and optimal design for the database. Its breakthrough Complete-Compare technology allows iterative development—keeping the model synchronized with the database at all times. Erwin Data Modeler scales across the enterprise by seamlessly integrating with CA’s Model Manager. This powerful model management system provides an important solution to the security management requirement. By dividing, sharing and reusing designs across different development efforts, modeling productivity can be maximized and corporate standards can be easily established and enforced. System Design and Architecture The data warehouse functional architecture as well as the technical architecture serves as a blueprint for the data warehousing effort. Throughout the project along with the architectural details various issues of fraud detection and some solutions to them with technical details have been discussed. The functional requirements express how the system behaves, focusing on the inputs, outputs and processing details of the system. The technical architecture centralizes the information and proposes how to integrate it. The technical architecture model depicts the overall framework and displays physical and logical interconnections. The technical architecture plan provides further insight on details dictated by the model, some of which were not apparent during previous project phases. The plan shows not only what has to be done, but also gives some indication as to why by its placement in the overall architecture model. The technical architecture model and plan provide two key benefits to the data warehouse project: improved communications and enhanced adaptability. Furthermore, by keeping these documentation items synchronized with project modifications, one has a ready, reliable data warehouse reference source. The data obtained by different financial institutions may vary in their formats and information provided. For the sake of generality and flexibility we use data generated according to the official data architecture standards as presented in the Center for Information Management website. (www. cimu. gov. mt) We will start the description of system design by showing the steps involved in the creation of datasets in Teradata. In our project we use the 6. 1 demo version of Teradata. 1. Start the Teradata Instance from the Windows START menu and selecting the Teradata Service Control icon. Minimize the screen after it says â€Å" Teradata Running† 2. Now Start Teradata SQL Assistant also from the Windows START menu. The above screen pops up. It has Query and History windows that pop up by default. In Query Window, we can write all the queries that we want to run. History Window keeps track of all the queries that we run. 3. Click on the top left most Connect button to connect to an old or create a new database. Fig. 1 Selection of database menu. Here financial database is being selected. We can click on the new button and create a new database too. Fig. The above screen shot is an instance of retrieving the Teradata database. Database specifications are entered. It will then ask for the names of database to be filled and some fields where we can specify the username and password for that particular database that we are about to create. Thus a Teradata database is created. 4. The next step would be to create some tables into this database. We can write a query in the Query Window to create a table. Click on the execute button to run any query. Fig. 3 This screen shot shows how a test table is created with two columns. 5. To see the newly created table click on the top left disconnect button and click the connect button again. Similarly, data can be inserted into in using insert query. Note: If we do right click on the query window, we can see Query Builder. We can use the Query Builder to build all sorts of Queries. Query Builder can be used to extract information from the table. The tables created for this project. They are: customer (customer details) cc_acct (Credit Card Account Details) credit_tran (Credit Card Transaction Details) checking_acct (Checking’s Account Details) checking_tran (Checking’s Transaction Details) avings_acct (Savings Account Details) savings_tran (Savings Transaction Details) accts (Account Types) These tables with the columns are listed below: Fig. 4 Customer details table Fig. 5 Credit card account details table Fig. 6 Credit card transaction details table Fig. 7 Checking account details table Fig. 8 Checking account transaction details table Fig. 9 Savings account details table Fig. 10 Savings account transaction details table Fig. 11 Account details table . . Teradata is also used to further provide the following data (but we do not show their creation or use in this project report): Customer information such as full name, address, SSN, number and types of accounts, credit limit, contact phone numbers etc†¦ Bank information such as bank branches, branch locations, sales representatives etc†¦ 6. Our table creation process in Teradata is now over. We now use the ETL tool Ab-Initio to create the graph implementing our business rules. For the sake of presentation simplicity and project confidentiality, we concentrate only on the following fraud detection rules: Customer transaction is not part of the bank (fake transaction). Customer withdrawals are more than 80% of his balance in the span of 24 hrs. There are basically three components for the creation of graphs in Ab-Initio: Input Component Transform Component Output Component. The next step involves specifying the input component in Ab-Initio. We do this by double clicking the input component and entering the URL path of the input file location and also the record format of the file. Fig. 12 Screen shot of the input component step of the graph creation process. Fig. 13 Screen shot with the view of the record format step. The file what we have used in this example is of size 9,649 KB. 8. We can view the data of the input file by right clicking on the component and selecting the view data option. There are almost 112000 records in this file but for simplicity only 100 records are being viewed. Fig. 14 View of our inputted table 9. Now, we join the input port to the reformat component and the output port of the reformat component to the output port. We can now apply transform on the input file by either selecting the transform option in the parameters tab of the reformat component or by entering the record format in the output component. Fig. 15 Reformatting of input components Fig. 6 Applying transform option in the reformat component In this example the tran_time, channel, tran_code has not been provided to the output port. As a result, the output file won’t have these fields in it after the graph is executed. 10. The next step is to build the graph. Fig. 17 Screen shot of the graph building process 11. Upon successful completion of the graph building process, we can view our output file by opening it in any editor like the Note Pad. Fig. 18 The output file of the Ab-Initio Graph as viewed in Note Pad Fig. 19 Full view of all the datasets in the output file The output file is 8,650 KB. 2. Similarly, a Flat file (any database table) can be read and written or loaded into a Teradata table by following the above-mentioned steps. The config dbc file and the path of the output with the file name is specified. Fig. 20 Transforming of flat file data Thus, data can be loaded to any database table using Ab-Initio. 13. The next step would be to sort the data obtained in the order we want and according to the variable we want and storing them as flat files. This step is basic in most data warehousing steps. We then apply our business rules to the data and obtain our output, which here are the red flags. A detailed description of the steps involved is as follows: F E D C B A Fig. 14: This figure shows how a red flag can be triggered if any customer crosses 80% of its limit in any type of account. Ab-Initio Component to sort the input data on the basis of Cust_ID. This join component joins the sorted inputs of the customer details and it’s account types that he/she has according to the Cust_ID. The customer_details_summary is taken as the normal output from the output port and the unmatched_customer_details and the unmatched_customer_accounts are outputted from the first and second output port. This join function takes care of the business rule to check if the customer really exists or not. This join component has three input ports. The number of input ports can be specified in the count of the parameter tab in the join component. FD file used is a lookup file. IT has weight specified for fraud. With the help of this component, the customer_detailed_summary, unmatched_customer_accounts and the fd file are joined on the basis of Cust_ID. It is a reformat component, which is one of the forms of, transform component. The business rule of putting a red flag for the customers who have crossed their account limit with more than 80% is applied here in the transform function. In this example total of 16 records. The one with flagged is given a weight of 1 and the one without flag as 0. The details of the customers with the fraud detection. FD file is a lookup file that has a column with 1 and 0 which when combined with the customer_detailed_summary on the basis of cust_id helps flagging the customer who crosses more than 80% of their limit. 14. New graph with intention to apply a second business rule: 4 3 1 Fig. 15 This graph shows how the detailed checking transactions of a customer performed within 24 hours can be found out Ab-Initio Component to sort the input data on the basis of Cust_ID. The join component joins the sorted checking_account of customers with the sorted_checking_transactions on the basis of cust_id to get the checking_account_transactions in the normal output port, unused checking_ accounts in the first unused port and the unused_checking_transactions in the second unused port. This join function takes care of the business rule to check if the customer is valid or not. It sorts the output on the basis of the customer_id which is then, Rolled up on the basis of the day to get the transactions performed within 24hours. The reject_rollup_checking is also sent to a reject output port. Thus, all the checking transactions of a customer within 24 hours are calculated. Logical Model – 1 (Erwin) Conclusion In this project we have concentrated on the financial fraud detection in banking transactions. But the generic nature of the project architecture would enable us to use the same software with minor changes to input data, business rules etc. o satisfy the fraud detection in other areas such as company financial bookkeeping, telemarketing, pay-per-calls scam etc. Also in there is a wealth of information that can be inferred form the output of our project. The following are some points for the further scope of our project: How this architecture could be used not only to detect fraud but also to identify target customer groups for marketing. We can als o provide monthly or weekly reports of sensitive and high-risk customers and even ATM and banking locations, which are fraud prone. Improve the overall security standards of the company. Develop a progress report for individual bank branches and identify their individual areas of improvement. References Kimball, R. , Reeves, L. , Ross, M. and Thornthwaite, W. (1998). The Data Warehouse Lifecycle Toolkit, John Wiley Sons, Inc. Silverston, L. , Inmon, W. H. and Graziano, K. (1997). The Data Model Resource Book, John Wiley Sons, Inc. www. teradata. com www. abinitio. com www. ca. com/db www. fraud. org http://teradata. uark. edu/research/

Tuesday, March 10, 2020

Podium vs. Lectern

Podium vs. Lectern Podium vs. Lectern Podium vs. Lectern By Maeve Maddox A reader laments the confusion between these two words: Here in the United States anyway, people are constantly using the word â€Å"podium† (what you stand on) to refer to the â€Å"lectern† (what you stand behind). The reverse, not so much. Confusing these two words erodes the richness of the language. We’re on the verge of having two words for â€Å"lectern† and none for â€Å"podium.† The confusion must be widespread: the OED already notes the use of podium to denote a lectern as â€Å"North American extended use.† I’d call it â€Å"extended misuse.† And it’s not just the North Americans who confuse the words. I discovered this example in a British newspaper: Just days after Sarah Palin revealed she was â€Å"seriously interested† in running for president in 2016, she stood behind the podium at the Iowa Freedom Summit and delivered a bizarre and rambling speech to the audience.- The Independent The Associated Press Stylebook- an American publication- recognizes the difference: lectern, podium, pulpit, rostrum: A speaker stands behind a lectern, on a podium or rostrum, or in the pulpit. The word podium derives from the Latin word for foot. One stands on a podium for improved visibility. For example, a band director stands on a podium to conduct. The word lectern derives from the Latin verb legere, â€Å"to read.† Readers or speakers stand behind a lectern and rest their notes on its sloping surface. In looking for misuses of the words podium and lectern, I used variations of prepositional phrases beginning with behind and on. Note: It is possible to stand behind a podium. For example, athletes stand behind the podium until it is their turn to mount the podium and receive their awards. Standing on a lectern, on the other hand, would be a risky thing to do. Speakers usually stand at or behind a lectern. The following examples illustrate nonstandard uses of lectern and podium: Incorrect: Minutes later, he entered Room 5, stepped onto the lectern for the final time, and tried to summarize how it felt to be leaving a job and a school he felt blessed to have worked for. Correct: stepped behind the lectern Incorrect: Dr. Bryan used no electronic slides or projection system but simply  stood behind the podium and delivered  what was for me the most thought provoking lecture  of the week. Correct: stood behind the lectern or stood on the podium Incorrect: The lecturer stood high up behind a tall podium,  so you could just see the top  of his head. Correct: stood high up behind a tall lectern Incorrect: These people were obviously in full view  of Romney as he  stood  at the  podium  and spoke for more than an hour. Correct: as he stood on the podium Dictionaries notwithstanding, careful speakers will continue to observe the useful distinction between lectern and podium. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Misused Words category, check our popular posts, or choose a related post below:Avoid Beginning a Sentence with â€Å"With†5 Lessons for Mixing Past and Present Tense20 Criminal Terms You Should Know

Sunday, February 23, 2020

GDP - Gross Domestic Product Essay Example | Topics and Well Written Essays - 1500 words

GDP - Gross Domestic Product - Essay Example Nominal GDP is the GDP according to current year prices while real GDP accounts for the effect of inflation on prices and is therefore also known as inflation adjusted GDP. By the use of a base year and elimination of effects due to price changes, real GDP allows useful comparisons to be made regarding the production of goods and services in an economy. For instance if the economy were growing at the rate of 4% per year while the rate of inflation was 1% then only 3% of the growth would be due to an increase in the economic output while 1% would be only due to price changes. GDP per capita describes the average number of goods and services consumed per person in a country. The significance of GDP as an instrument for channeling of aid and investments into countries is highlighted by Canoy and Lerais in the research titled ‘Beyond GDP’ that was composed for the European Commission in which they say: ‘GDP is the best-recognized measure of economic performance in the world, often used as a generic indicator of well-being. GDP is used in a large variety of political and financial arenas. It serves as a criterion to decide who has access to funds at international organizations such as the EU, UN, IMF and World Bank, GDP plays an important part in the Stability and Growth Pact, and it is a lead indicator for forecasts of financial markets and banks, to mention just a few examples. It is also used for international comparison and rankings and plays a crucial role in political debates.’ (Canoy and Lerais, 2007) The GDP of any given country fails to adequately explain its overall economic well being since its calculation either excludes or overstates a number of crucial aspects that describe the standard of living of a population. The notion of ‘well being’ has been described as a multidimensional concept ‘with both an individual interpretation in the Aristotelian spirit and a collective one to capture the progress of a nation’ (Canoy and Lerais, 2007).   Although GDP per capita i.e. goods and services consumed by the average person measures the spending by an individual yet it does not accurately depict an individuals’ well being. Materialistic expenditure is not all that characterizes individual well being. Rather it is a much more comprehensive idea including psychological well being as well as happiness derived from non material sources. An individual’s health, diet, achievements, mobility and participation in society are all essential sources o f contentment that are not included in calculation of GDP.

Thursday, February 6, 2020

Why are the events surrounding the South Sea Company often described Essay

Why are the events surrounding the South Sea Company often described as a financial bubble Identify at least one other famous bubble and discuss what feat - Essay Example With desires to get rich quickly, ambitious investors hurriedly and haphazardly invested on stocks of a particular company without first assessing its real situation. The result is the vital drop not only of a single firm but also of the entire national economy. This is the predicament that the South Sea Company in England in the 18th century experienced. Considered as one of the worst financial disasters in a capitalistic society, the South Sea Bubble is a proof that avarice can lead a single person, firm or even an entire nation’s economy to collapse. In those days, the British Empire reigned over the entire world. It was a time of affluence and prosperity for British people enabling them to invest. The exuberance of investors to gain more out of the company’s monopoly of the South Seas compelled the company issued more stocks that were also sold out by greedy investors. The lavish and generously enamored company office ostentatiously displayed the opulence and success of Britain on its industrial revolution. With the notion spread by speculators that this company â€Å"could never fail,† its share price skyrocketed tenfold from its original value, making its investors rich overnight. It was at this point that the reality set in, bursting the bubble of the company’s overpriced share prices. South Sea Company’s heyday ended when its management realised that they failed to manage and operate the company properly. They realized that the company was not generating profit at all. The funds came basically from selling stocks and not from actual commerce. News that the company was actually profitless instigated panic stocks selling. Useless stocks were sold frantically leading to a stock market crash. Many British people lost their fortune because of this. From 950 pounds per 100 pound par value it slid down to 290 pounds in less than 4 months. The invention of the personal computer

Wednesday, January 29, 2020

International Joint venture Essay Example for Free

International Joint venture Essay International Joint Ventures (IJVs) are becoming increasingly popular in the business world as they aid companies to form strategic alliances. These strategic alliances allow companies to gain competitive advantage through access to a partner’s resources, including markets, technologies, capital and people. International Joint Ventures are viewed as a practical vehicle for knowledge transfer, such as technology transfer, from multinational expertise to local companies, and such knowledge transfer can contribute to the performance improvement of local companies. Within IJV’s one or more of the parties is located where the operations of the IJV take place and also involve a local and foreign company. Basic Elements of an IJV Contractual Agreement. IJVs are established by express contracts that consist of one or more agreements involving two or more individuals or organizations and that are entered into for a specific business purpose. Specific Limited Purpose and Duration. IJVs are formed for a specific business objective and can have a limited life span or be long-term. IJVs are frequently established for a limited duration because (a) the complementary activities involve a limited amount of assets; (b) the complementary assets have only a limited service life; and/or (c) the complementary production activities will be of only limited efficacy. Joint Property Interest. Each IJV participant contributes property, cash, or other assets and organizational capital for the pursuit of a common and specific business purpose. Thus, an IJV is not merely a contractual relationship, but rather the contributions are made to a newly formed business enterprise, usually a corporation, limited liability company, or partnership. As such, the participants acquire a joint property interest in the assets and subject matter of the IJV. Reasons for Forming a Joint Venture There are many motivations that lead to the formation of a JV. They include: Risk Sharing – Risk sharing is a common reason to form a JV, particularly, in highly capital intensive industries and in industries where the high costs of product development equal a high likelihood of failure of any particular product. Economies of Scale – If an industry has high fixed costs, a JV with a larger company can provide the economies of scale necessary to compete globally and can be an effective way by which two companies can pool resources and achieve critical mass. Market Access – For companies that lack a basic understanding of customers and the relationship/infrastructure to distribute their products to customers, forming a JV with the right partner can provide instant access to established, efficient and effective distribution channels and receptive customer bases. This is important to a company because creating new distribution channels and identifying new customer bases can be extremely difficult, time consuming and expensive activities. Geographical Constraints – When there is an attractive business opportunity in a foreign market, partnering with a local company is attractive to a foreign company because penetrating a foreign market can be difficult both because of a lack of experience in such market and local barriers to foreign-owned or foreign-controlled companies. Funding Constraints – When a company is confronted with high up-front development costs, finding the right JVP can provide necessary financing and credibility with third parties. Benefits Many of the benefits associated with International Joint Ventures are that they provide companies with the opportunity to obtain new capacity and expertise and they allow companies to enter into related business or new geographic markets or obtain new technological knowledge. Furthermore, International Joint Ventures are in most cases have a short life span, allowing companies to make short term commitments rather than long term commitments. Through International Joint Ventures, companies are given opportunities to increase profit margins, accelerate their revenue growth, produce new products, expand to new domestic markets, gain financial support, and share scientists or other professionals that have unique skills that will benefit the companies. Structure International Joint Ventures are developed when two companies work together to meet a specific goal. For example, Company A and Company B first begin by identifying and selecting an IJV partner. This process involves several steps such as market research, partner search, evaluating options, negotiations, business valuation, business planning, and due diligence. These steps are taken on by each company. There are also legal procedures involved such as IJV agreement, ancillary agreements, and regulatory approvals. Once this process is complete, the IJV Company is formed and during this final procedure the steps taken are formation and management. Management There are two types of International Joint Ventures: dominant parent and shared management. Within dominant parent IJV’s, all projects are managed by one parent who decides on all the functional managers for the venture. The board of directors, which is made up of executives from each parent, also plays a key role in managing the venture by making all the operating and strategic decisions. A dominant parent enterprise is beneficial where an International Joint Venture parent is selected for reasons outside of managerial input. Finance When two or more partners get together and form an International Joint Venture agreement, they must decide early on in regards to what the financial structure will entail as this will aid in management and control. Some of the steps include establishing the capital required to start the IJV, the impact of securing a strong strategic alliance partner, and financial reporting. Once an arrangement is made, a tax-planned joint venture will be created which will aid in maximizing the after-tax returns. Factors affecting IJV Economic Factors Poor formation and planning Problems that arise in joint ventures are usually as a result of poor planning or the parties involved being too hasty to set up shop. For example, a marketing strategy may fail if a product was inappropriate for the joint venture or if the parties involved failed to appropriately asses the factors involved . Parties must pay attention to several analysis both of the environment and customers they hope to operate in. Failure to do this sets off a bad tone for the venture, creating future problems. Unexpected poor financial performance One of the fastest ways for a joint venture is financial disputes between parties. This usually happens when the financial performance is poorer than expected either due to poor sales, cost overruns or others. Poor financial performance could also be as a result of poor planning by the parties before setting up a joint venture, failure to approach the market with sufficient management efficiency and unanticipated changes in the market situation. A good solution to this is to evaluate financial situations thorough before and during very step of the joint venture. Management problems One of the biggest problems of joint ventures is the ineffective blending of managers who are not used to working together of have entirely different ways of approaching issues affecting the organization. It is a well-known fact that many joint ventures come apart due to misunderstanding over leadership strategies. For a successful joint venture, there has be understanding and compromise between parties, respect and integration of the strengths of both sides to overcome the weaker points and make their alliance stronger. Inappropriate management structure In a bid to have equal rights in the venture, there could be a misfit of managers. As a result, there is a major slowdown of decision making processes. Daily operational decisions that are best made quickly for more efficiency of the business tends to be slowed down because there is now a ‘committee’ that is in place to make sure both parties support every little decision. This could distract from the bigger picture leading to major problems in the long run. Cultures Factors When a joint venture is formed, it is literarily an attempt at blending two or more cultures in the hope of leveraging on the strength of each party. Lack of understanding of the cultures of the individual parties poses a huge problem if not addressed. A common problem in these multi-cultural enterprises is that the culture is not considered in their initial formation. It is usually assumed that the cultural issues will be addressed later when the new unit has been created. Usually, compromises are reached and certain cultural from the parties are kept on while others are others are either out rightly discarded or modified. Pros and Cons for IJV The joint venture is becoming a popular way for companies that outsource their operations to retain a piece of the ownership pie. The creation of a new legal entity during the launch of a joint venture comes with its share of ups and downs. On the plus side: Joint ventures enable companies to share technology and complementary IP assets for the production and delivery of innovative goods and services. Joint ventures can be used to reduce political friction and improve local/national acceptability of the company. Joint ventures may provide specialist knowledge of local markets, entry to required channels of distribution, and access to supplies of raw materials, government contracts and local production facilities. In a growing number of countries, joint ventures with host governments have become increasingly important. These may be formed directly with State-owned enterprises or directed toward national champions. On the minus side: A major problem is that joint ventures are very difficult to integrate into a global strategy that involves substantial cross-border trading. In such circumstances, there are almost inevitably problems concerning inward and outward transfer pricing and the sourcing of exports, in particular, in favor of wholly owned subsidiaries in other countries. Problems occur with regard to management structures and staffing of joint ventures. Many joint ventures fail because of a conflict in tax interests between the partners. Disputes Agreements Disputes When two or more partners agree on an International Joint Venture, there are possibilities for disputes to arise. Particularly in IJV’s, there can be issues between the partners who are likely to want their home country’s governing law and jurisdiction to apply to any disputes that may come up; therefore, to avoid such a problem, a neutral governing law and jurisdiction is chosen in some cases. A popular dispute resolution technique used in IJV’s is arbitration; however, many times a court process is given priority as this system has more authority. Other dispute resolution strategies utilized are mediation and litigation. Agreements Entering into an International Joint Venture agreement begins with the selection of partners and then generally this process continues to a Memorandum of Understanding or a Letter of Intent is signed by both parties. The Memorandum of Understanding is a document describing an agreement between parties. On the other hand, a Letter of Intent is a document outlining an agreement between the parties before the agreement is finalized. Examples of successful IJV Sony-Ericsson is a joint venture by the Japanese consumer electronics company Sony Corporation and the Swedish telecommunications company Ericsson to make mobile phones. The stated reason for this venture is to combine Sonys consumer electronics expertise with Ericssons technological leadership in the communications sector. Both companies have stopped making their own mobile phones. Omega Navigation Enterprises Inc. is an international provider of marine transportation services focusing on seaborne transportation of refined petroleum products. One of the vessels, namely the Omega Duke, is owned through a 50% controlled joint venture with Topley Corporation, a wholly owned subsidiary of Glencore International AG (Glencore).They have also formed an equal partnership joint venture company with Topley Corporation, namely Megacore Shipping Ltd.

Monday, January 20, 2020

Comparing the Grandmother in The Necklace and A Good Man is Hard to Fin

The Grandmother in The Necklace and A Good Man is Hard to Find The main characters Mrs. Loisel in "The Necklace" and the grandmother in "A Good Man is Hard to Find" are very similar because both these characters refused to admit to a mistake that they had made. They both had the same motivation prior to the mistake and they also had the same reason as to why they wanted to keep quiet about it. Although Mrs. Lisle's and the grandmother's penalties were different, it is still fair to compare the two because either way, dead or alive, both their lives were ruined. Mrs. Loisel and the grandmother are very similar due to the fact that they both had the same motivation prior to their accident. It was a selfish motivation that cost them their lives. Mrs. Loisel's character was selfish in "The Necklace" because instead of wearing flowers like her husband suggested, she chose to borrow her friend's jewelry. "You can wear some natural flowers. At this season they look very chic. For ten francs you can have two or three magnificent roses. 'No, she replied, there is nothing more humiliating than to have a shabby air in the midst of rich women.'" (67) This is truly an act of selfishness on Mrs. Loisel's part. If she wouldn't have been so arrogant, she could have just worn the flowers to the party and it would have saved her a lot of trouble. The grandmother's character in "A Good Man is Hard to Find" is also very selfish in her motivations. She felt she had to lie to her son, daughter-in-law and her grandchildren in order for her to be able to see that nice house again. "'There was a secret panel in this house' she said craftily, not telling the truth but wishing that she were, 'and the story went that all the family sil... ... comparable because like I illustrated before, they were both selfish people. All in all, these two characters were very similar. They both had the same selfish motivations. They both wanted something, and they didn't care what they did to get it. They also had the same reasons for keeping their secrets quiet, they were afraid of embarrassment. And in the end they both ruined their lives. Mrs. Loisel had to be a hard working woman for 10 years, which really took a toll on her. The grandmother was killed, as well as the rest of her family. If Mrs. Loisel and the grandmother would have told the truth from the start none of this would have happened. But now, just like most everyone in life, they were forced to pay the consequences for doing something wrong. Even though they didn't deserve the punishment they got, I guess it was all in the "luck" of the draw.

Sunday, January 12, 2020

Nick Names Formation in Lendang Nangka Sasak Menu-Mene Varity and Arabic Languages

NICK NAMES FORMATION IN LENDANG NANGKA SASAK MENU-MENE VARITY AND ARABIC LANGUAGES A Research Writting An NT Language and Culture Final Assignment Lecturer : Dr. Kamaludin Yusra By Samsul Bahri/12J012060/A ENGLISH EDUCATION GRADUATE PROGRAM MATARAM UNIVERSITY 2013 Acknowledgement I would like to express my gratefull and appreciation to my honourable lecturer Dr. Kamaludin Yusra, who would like to wait patiently for months for a word from me, then respond sympatically and constsructively within days. This assigment is written to accomplish a final task for Nusa Tenggara Languages Culture and Contact.I am interested to focus my study on Sasak varity nicknames formation as I found them important points to discuss to defining how nicknames in Sasak varity language are formed. So far I found it is hard to do this as the previous research for this merely. I tried hard to focus this research because lack of academic writting background knowledge and references. These are my become obstacles to do this research writting. But this first experience I hope will be my best teacher to do better in the future. I am afraid there are some mistakes in this simple research proposal, I do hope there will be some suggestions to make it better.Samsul Bahri CONTENTS Acknoledgementi Contentsii A. Introduction1 B. Research Questions3 C. Review of Literarture3 D. Research Methodology10 * Population10 * Sample11 * Data Collection11 * Data Analysis11 E. Discussion 11 F. Conclussion55 References Nick Names Formation in Lendang Nangka Sasak Menu-mene Varity and Arabic Languages Abstract This research paper discussed about nicknames formation in LendangNangka Sasak meno-mene dialect and Arabic nicnames. Most of sasak names are influenced by Arabic names as Islam is predominantly religion for Lendang Nangka village inhabitats.As names is identity of a person its has very strategic role for human being. Naming custom varies greatly from people to people. Terms relates personal names such as p ersonal name, family names, given names and Nick name. The nicknames formation in some cases similar to Arabic language. In Lendang Nangka Sasak meno-mene language. The meaning of Nicknames also has it own place in the dialect. A nickname is usually familiar or humorous but sometimes pointed or cruel name given to a person or place . Nicknames formations in the dialect through process of truncation (shortened), phonological process(replacing a stressed vowel and a onsonant), psychical characteristic and attributes. Nicknames also related to close friend and social solidarity. While in Arabic nicknames formation has its own way to form it. This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic. The population of this research the inhabitants of Lendang Nangka village. This reserac h studies about the personal names and nicknames. There are 6357 names.The data are gained from primary and secondary sources. Keywords: Sasak varity, Arabic, Personal Names, Nicknames, formation, truncation, phonological, Physical Characteristic, Lendang Nangka, menu-mene dialect. A. Introduction A name is inseparable circumstance to human being, place or thing. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. A personal name identifies a specific unique and identifiable individual person. Though Indonesia is home to many diverse ethnic groups and languages.Those exaggerated the varies greatly between these groups in names. The dominant ethnic group is the Malay people (whose languages include Indonesian, Javanese). Generally, all Indonesians have one or more given names. Some ethnic groups also use a family name or clan name, other groups use a patronym. Some Indonesia ns have neither a family name nor a patronym. (Salahudin Ahmad,1999). Personal names are considered as important part for personal identity. Sasak people consider names has special meaning, and there is a special practise to do in naming new born baby as one of the life cycle in Sasak people.As predominantly religion, islamic naming system influences most of Sasak names. Islam is closely relate to arabic naming system although it is not totally influenced the Sasak names. Islamic naming system are used commonly in Sasak muslim good followers. Lendang Nangka village inhabitants are muslim. The inhabitants of Lendang Nangka village are consider as moderate muslim. This makes sense that naming system is not totally following Islamic naming system although many of the people in the villages use Arabic names such as Muhammad, Ahmad, Abdurrahman, Abdullah, Wahid, Syafi’i, Siti Aisah, Siti Hadijah, Mariam, etc. nd some others Arabic root terms such as Nurul Hayati, Nurul Aini, Laitu l Fitri which they considered as Islamic naming systems. On the other hand many personal names are influenced by non Arabic names, western, Hindus and Javanese, or by their own creation naming systems. And the last naming system is naming by local Sasak names (although there is no written rules about this but this is just based on the local story and information). Relate to the topic of this research a name in short form is called Nickname.According to Free Online Dictionary(2009): nickname is a descriptive name added to or replacing the actual name of a person, place, or thing. Where as The Wordsworth Concise English Dictionary(1988) defines Nickname as a name given in contempt or sportive familiarity. A nickname is â€Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or place† (Oxford Dictionary Online, 2012), as a supposedly appropriate replacement for or addition to the proper name†.Nicknames may based on a person's name or vari ous attributes such as (in majority the example taken from American names) : Tittle (â€Å"Bones† for a forensic scientist,†Doc† for a doctor ,†Sparky† for an electrician, Geek for a computer technician, â€Å"Sarge† for a military Sergeant, Moneybags for a wealthy person, Sir or Ma'am for a person of a higher rank); Physical characteristics (Weight: â€Å"Fatso† or â€Å"Slim† for a person who is overweight or thin, respectively. Height: â€Å"Beanpole† for a person who is tall, â€Å"Shortie† or â€Å"small-fry† for a short person. Haircolour: â€Å"Red†, â€Å"Ginger†, â€Å"Ranga†, or â€Å"Bluey† for a person with red hair. Blondie† a girl with blonde hair. Baldness: â€Å"Chrome dome† for a person whose scalp reflects the light. Complexion: â€Å"Pinky† for a person with Rosacea, â€Å"Zit† or â€Å"pizza-face† for severe acne, various racial s lurs for skin color. ; Personality (Talkative: â€Å"Motormouth†, â€Å"Chatterbox†, â€Å"Ratchet-Jaw†, â€Å"ChattyKathy† Cautious: â€Å"Nervous Nellie† Pessimistic: â€Å"Sad Sack† Negative: â€Å"Debbie Downer†, Glamorous: â€Å"Stunning Signe†, Boring: â€Å"Plain Jane†, Typical: â€Å"Average Joe†. This Research paper focuses on the analysis of nick names formation in Lendang Nangka Sasak meno-mene varity and Arabic languages.This topic is based on the personal names of Sasak and their relationship to Arabic personal names. As we know naming system in Sasak names are moslty influnce by religious aspects. So far I found that it an interesting topic to disscuss about nick names formation as it is merely found the academic writting of how the Sasak nick name are formed. I prefer to specify the Sasak menu mene varity as it is my origin language and it is interesting to relate the naming system with Arabic as bo th of them uses mostly use Arabic personal names as the inhabitants considered Islam belivers.B. Research Question * What are the naming systems in Sasak meno-mene varity and Arabic language? * What are the meaning of Lendang Nangka Sasak Meno-mene varity and Arabic personal names? * How are Arabic and Lendang Nangka Sasak meno-mene varity nicknames formed? * Does Arabic nicknames formations contribute to Lendang Nangka Sasak nicknames formations? C. Review of Literature According to Merriam-Webster (2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun – a person, place or thing. Naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited. Terms relates personal names such as personal name ,family names, given names and Nick name. In some cases they are ve ry simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese (Wikipedia, 2007).A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname. Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Wikipedia, 2007). The study of personal names has attracted a number of scholars over the years. There are many views regarding the way in which personal names are bestowed. This section aims to provide a overv iew of what previous scholars have found as far as personal naming is concerned. Scholars such as Koopman (1986; 1989), Thipa (1983; 1987), Herbert (1990; 1995), Saarelma-Maunumaa (1996; 1999), Stayt (1931), Monnig (1967), Mbiti (1969), Moyo (1996), Kimeyi (1989), Dickens (1985) and Bosch and De Klerk (1995) have based their discussions on some of the personal naming patterns.As far as African traditional culture is concerned, the selection of personal names is influenced by many factors. Most of these factors are diverse among cultures; nevertheless, there are some areas where they overlap. Jayaraman (2005: 176) provides the following explanation of the Hindu tradition of personal naming practices: a name not only reveals a person’s self-identity, but also his or her cultural, sectarian, varna, and caste identities. Further, it is believed to signal one’s spiritual worth not only in this world, but also in the next.In everyday life, Hindus give great significance to a personal name. As this study on Tshiven? a names will reveal, the naming ceremony of a child is an important event. It is also traditionally one of the major life circle rituals for a Hindu. In Southern India, it is usually performed on the twelfth day of a child’s life. Customarily, some Hindus, who believe that even days are lucky for girls and uneven ones lucky for boys, hold that a boy should be named on the eleventh day and a girl on the twelfth.When the ceremony is to occur, and mainly in the case of the first child, both the father’s and the mother’s relatives visit the house where the mother gave birth (usually her natal home). Here, the guests are entertained with traditional sweets specially prepared for the occasion. There are various considerations in the choice of a name. However, one essential element in the selection of a name in all parts of India is the birth star of a person. Most Hindus consult an astrologer to decide the appropriate name.In the south, as in other parts of India, names may tell of the joy and expectations of parents of newborn children. For example, if a child is born to a couple many years after marriage, he may be endearingly named after some precious metal or gem, such as Ratnam (diamond), Sona (gold), Banghru (gold) or Muthu (pearl). Naming may also be related to other family experiences. For example, in Tamilnadu, if a family has experienced high child mortality, a surviving child may be named Pichi (gift of god) if male, or Pichiamma if female. Elements of idiosyncrasy and creativity are also apparent in Indian naming customs.For example, an eminent professor of Telugu in Andhra Pradesh gave his daughter one of the longest names encountered: Sri Arunachala Kadambavana Sundari Prasunnamba Kanyaka (the blessed virgin who is beautiful and carries with her the radiance of sunshine, the fragrance of garden flowers, and the presence of God). Bean (1980:309), in his research on the bestowal of childrenâ €™s names, found that it is often the duty of the parents, but may also be the duty of a senior kinsman or of a ritual specialist, and the participation of members of a larger community is also required ( e. . Ga names are bestowed by the senior patriarchal relatives). Bean’s (1980) view that the role of the ritual forms part of a child’s acceptance into his family group, is in a way similar to views given by other scholars such as Mbiti (1967), Monnig (1967), Koopman (1989) and Stayt (1931) on the role of the rituals that accompany name-giving ceremonies. Andrei A. Avram paper looks into the structural properties of Japanese and English truncated names. Name truncation is considered to be a word-formation process and is analyzed from the perspective of Prosodic Morphology.Japanese and English truncated names are shown to be subject to strict prosodic requirements. Also discussed is the relation between name truncation and prosodic minimality in the two languages. Abigail study the ways in which truncation in Indonesian enriches our understanding of possible patterns of prosodic morphology and the nature of prosodic word requirements. The structure of the paper is first describe the patterns of truncation in Indonesian. He consider the question of word minimality and evidence for word minimality based on the stress facts of Indonesian.He describe and consider the implications of two classes of subminimal words in Indonesian, including a class of words containing schwa and the short forms of terms of address and personal names. Both of these classes of words highlight the fact that word well-formedness and word minimality may be violable properties. He return to the question of truncation as prosodic morphology and briefly consider the Indonesian facts in light of recent theoretical claims about the nature of truncation. Langendonck (2008) made a nice survey to prove the universality of sources of surnames.Accordingly, they are derived roughly from the same sources across linguistically and culturally unrelated languages. For instance, in the English speaking countries, most surnames of British origin fall into several types: occupations (eg Smith, Baker), personal characteristics (eg Short, Brown), geographical features (eg Hill, Lee) place names (eg Flint, Hamilton) patronymicsii(eg Richardson, Johnson) matronymics (eg Marriott from Mary) and paternal, from patronage (eg Hickman meaning Hick's man). In French, people are named, following the same traditions: Legrand( the tall), le Carpentier (carpenter), le Parisien(from Paris).The same sources of surnames are true of the Spanish-speaking countries: Delgado (thin), Molinero(miller), Aleman from (Germany). In Russian, one finds the same: Tolstoy (fat or stout), Portnov (tailor),Moskova (from Moscow). Romanians follow the same procedures in deriving their surnames: Barbu(bushy bearded), Fieraru(Smith), Munteanu(from the mountains) Moldoveanu(from Moldova). In Netherlands , the Dutch adopt the same path in forming theirs : De Groot(the great), Van Weert( of the city Weert) (ibid). During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names.Roughly, the same traditions have been followed in modern Arabic dialects. In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg :al a : thorny tree, hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour.For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: kalib, crow: Ghurab (Ibin Duraid, d. 321H ,nd:5f) (see also Altha’aliby, d. 430 H, 2007: 406f) Ibin Qutaybah( d. 276 H, 1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja6: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need e seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved. For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children.In surveying the traditions that Arabs followed in naming persons during the pre- and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. e. different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. ) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 below). Ulaiq (2001:12ff) further indicates that PNs in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; Crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Walyd; the alone, Rabia; the fourth). 3. Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (e. g Siina; Avicenna; Saladdiin, AbdulNasir). . Gran dfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied. Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland.Sasak is a Western Malayo-Polynesian language spoken on the island of Lombok, Nusa Tenggara Barat province in eastern Indonesia (Austin, 2000, 2001). It is closely related to Samawa (spoken on the western half of Sumbawa Island to the east of Lombok) and Balinese, and sub-groups with them as a member of the Western-Malayo-Polynesian branch of Austronesian . Relate to this research, the study of Sasak language has been done by many resear chers, but in the other hand the study about Sasak nicknames is very hard to find.Acoodring to Austin (2000, 2001) Sasak language shows a wide range of local dialect variation in lexicon and syntax, which is the topic of ongoing investigation. There is also sociolectal variation with high, middle and low speech styles (Nothofer, 2000). Data for this paper is drawn from the Central and Southern varieties identified by their speakers as Meno-Mene, Meriaq-Meriku and Menu-Meni Sasak. As predominantly Islam believer Sasak and Arab people they mostly based their naming system on Islamic principles.The fact that this is the right of the father is shown by the principle that the child is ascribed and attributed to the father, as Allaah says, â€Å"Call them (adopted sons) by (the names of) their fathers, that is more just in the Sight of Allaah†. It is also allowed for the parents to allow others to name the child, since our Prophet (SAW) used to name some of the children of his Comp anions. The name should carry a good and praiseworthy meaning as the Messenger (SAW) said, â€Å"On the Day of Resurrection, you will be called by your names and your fathers names, so make your names good. (Abu Dawood) It is recommended to call oneself a servant of Allaah (Abdullaah) or the servant of any of the names of Allaah. Then it is recommended to name a child after a prophet, due to the hadeeth, â€Å"call yourselves by the names of the Prophets† (Abu Dawood) and the hadeeth, â€Å"a son was born to me this night and I called him after my forefather Ibraaheem† (Muslim) Then it is recommended to name the child after any pious person in the hope that it will become like him/her. Then it is recommended to name by any name which has good meaning.It is forbidden to name a child with a name that denote servitude to other than Allaah, for example Abd an-Nabi, Abd ar-Rasool etc, just as it is forbidden to name them with names that are particular to the Unbelievers li ke George, Michael, Susan etc. The names of tyrants and evil personalities should be avoided such as Fir'awn, Qaroon, Abu Lahab etc.. Likewise it is disliked to name with the names of the Surahs of the Qur'aan like ‘Taa Haa' or ‘Yaa Seen' as is reported from Imaam Maalik and others. There is no authentic hadeeth which ascribes the above two as being names of the Prophet (SAW).As the influencing of globalization era, naming sytem also influences Lendang Nangka Sasak naming system. It is very common to find personal naming influnced by western names such, Heri from Harry, Linda, Tina, Sandi etc. More examples of differents names are presented in appendixes and in next discussion. D. Research Methodology This research uses descriptive research methodology. The method used in this research is descriptive method. The goal of this research is to describe the formation, structure and meaning of the names in Lendang Nangka Sasak meno-mene varity language and Arabic.A similar vi ew is expressed by Djaya Sudarma (2006:16). He said that this method is a descriptive overview of the characteristics of the data accurately in accordance with the nature of the data itself. The statement was supported by Sudaryanto Djayasudarma (1993:62) who argued that the descriptive method focused on giving a full overview on the actual state of the object under investigation. This study also used qualitative approach. this study is also related to research data that is not in the form of numbers, but in the form of words or phrases (Sudaryanto, 1993:62).Sudaryanto opinion is supported by Arikunto (1998:193) who states that qualitative research is a desecriptive research because this study attempted to describe the data with the words or phrases that are separated by categories to obtain conclusions. Based on the explanation above, the writer can say that the research is descriptive qualitative research means is intended to provide a clear picture of the process of the formation , structure and phrase user names Lendang Nangka Sasak menu- mene varity * Population The population of this research is the inhabitants of Lendang Nangka village.Relates to the topic of this research the total names of the subject are 6357 names of Lendang Nangka inhabitants personal names. * Sample From total 6357 names there one hundreds personal names are taken as sample. Those samples are catagorized as first 100 hundred the most popular names in Lendang Nangka village * Data Collection There are two sources of data collection : Primary and secondary data. The primary data are obtained directly from local people of Lendang Nangka village by questioning to the paticipants and observation. Secondary Data source are taken from monography of local village office.Data source are in the form list of names local inhabitants. The number of the is 6357 personal names in the village (appendix†¦ ). Those total names will be group into the group of similarities of each names(appendix †¦ ). * Data Analisys. After all data are obtained the next step is to analize the data. Analysis is an effort to study and process the data to find out the conclussion. Each group will be analized based on their formation and the form of the names, and their originals. All data are put into some cataogries: 1. Their similarities pharase and sylabble 2. Base 3.Ending word or prosodic 4. Meaning After all data are determined to their group. The next step is to analyse the process of each names become nicknames based on phenomena and observation. After all data collected , the next process is sorting names into their catagory using spread sheet Ms-Office Excell 2007 sorting system. For further analysis will be discussed in disscussion part . E. Disscussion The topic of this discussion will focus on the study of Lendang Nangka Sasak menu-mene varity names while on the other hand Arabic names disscus in not too deep discussion and analyis.The discussion will also be based on some t heories and names. 1. Names Generally a name is a label for a noun – a person, place or thing. More specifically a name is a label for a specific person, place or thing. These are sometimes called proper names. A name is a word or term used for identification. Names can identify a class or category of things, or a single thing, either uniquely, or within a given context. According to Merriam-Webster(2012) name is Word or phrase that constitutes the distinctive designation of a person or thing . By a name we can identify each other.In general term, a name is a label for a noun – a person, place or thing. : look at the following examples: | Person| * Heri * Megawati Sukarno Putri * Harun Al-Rasyid * Lalu Serinata * TGH. Muhammad Zainul Majdi| Name —– Noun| Thing| * Meja (Table) * Harimau (Tiger) * Lendang Nangka | | Place| * Hotel * Lombok Sumbawa * Lendang Nangka * Bima| 2. Personal names Relate to personal names, naming customs vary greatly from people to people. Some names carry information about our roots, such as family or clan names, which are generally inherited.Terms relates personal names such as personal name , family names, given names and Nick name. In some cases they are very simple, such as those of many Indonesians names who use just a single name. On the other hand, names could also be very complex such traditional Chinese(Wikipedia, 2007). A given name, in Western contexts often referred to as a first name, is a personal name that specifies and differentiates between members of a group of individuals, especially in a family, all of whose members usually share the same family name or surname.Arabic names were historically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names. This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Example Name Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni. Sasak people naming system is considered as simple naming system such Muhammmad Amin, Aminah, Hadijah, Amir Mas’ud, Samsul Bahri. The names mostly influences by Arabic names or words as most Sasak people are moslem.While in Greek using more complete name as follows: personal name(s) + patronymic + family name e. g. a son whose father’s name was Georgios might be called Spyros Georgiou Kyprianos same as in Bulgarian names: personal name(s) + patronymic + family. e. g. Emil Petrov Christov (Wikipedia, 2007). A modern Chinese usually has (1) a surname (â€Å"family name†) or xing and (2) a given name (â€Å"first name† or â€Å"Christian name†), or ming (or mingzi ), always in that order. Thus Deng Xiaoping is Mr. Deng with the personal name Xiaoping the same way John Jones is Mr.Jones with the personal name John. (Lelia, 1961). 3. Sasak language, personal names and origins a. Sasak language. The Sasak language is spoken on the island of Lombok (immediately east of Bali) by around 2. 5 million speakers (roughly 85% of the population of Lombok, which was recorded as 2,950,105 in 2005. It shows great internal variation, both geographical and social, with a complex linguistic ecology (Austin 2003) Sasak has traditionally been classified into five dialects: meno mene, ngeno-ngene, meriyaq-meriku, kuto-kute, and nggeto-nggete.However, this classification does not seem to accommodate the reality of the actual variation existing in Sasak, because there are also other dialects such as menu-meni and menung-mening. For instance, menu-meni speakers do not always agree to be in the category of meno-mene speakers, although the reason for this is hard to tell (Mahyuni, 2007). As Mahyuni stated that menu-meni speakers do not always agree to be in the category of ngeno-ngene speakers. I preassumed, The sasak language which the people in Lendang Nangka (Where I live) east Lombok may categorized as meno-meni speakers even t hough located in the region of ngeno-ngene dialect.Despite of category by A. Teeuw. In circumstance of geographic location, Lendang Nangka is surrounded by ngeno-ngene dialect speakers such, Jurit village in the east, Danger village in the south, Sangiang in the west and Borok Lelet in the north. Based on historical information, the inhabitants’ anchestor of Lendang Nangka were from the area of district Kopang Central Lombok (where as it is considered as menu-mene dialect speakers). b. Sasak personal Names In fact, Sasak do not generally use the Western naming practice of a given first name and a family last name nor arabic system which is consist of full chain of names.In general, the form Sasak personal names fall into the following categories: * A single name: Sahnep, Mahrap, Mahyan, Marep, Serinata, Sahnun, Sapnah, Riadah, Muhammad, Ahmad, Abdullah, Lasmi, Sintiawati, Kartika, Indra, Subawae, etc. * Two (or more) names without a family name: Muhammad Safi’i, Siti A minah, Safaril Ahyak, Yusran Ahmadi, Samsul Hadi, Laelatul Fitri. * Names for documentary system (marital certificate, passport, birth certificate): This category is based on Indonesian formal rule. A name following by father’s name: Sahudin bin Muhammad (M), Fitriah binti Sahidun (F). Names based on the first child ( After a spouse has their first child bornt). Amaq/mamiq Sahudin (First child name is Sahudin, while Amaq means father so meaning The father of Sahudin). While the wife could be Inaq/Meme Sahudin (Inaq means mother so meaning the mother of Sahudin. In fact the of the father has his own personal name Abdurrahman or the mother’s personal name Aminah. * Noble personal name Lalu is added before a male personal name, such as: Lalu Suparlan, Lalu Serinate. Baiq is added before female personal name, such as: Baiq Hikmah, Baiq Mustiare. c. Origin of Sasak names.There is not specific informations about the original Sasak Names in spite of the fact that some of Sasa k names are not found in other language names (Sahnep, Mahrep, Segep, Sinarep, Senep, Sahne, Amsiah, Rumlah, Sene, Selihan, Mahnan, Serinate (? ). The following description of the origin of Sasak names which are based on the language, culture and religious influences: * Arabic word derived names Since Islam is the main religion for Sasak people , it is veryobviously to find Arabic first names as personal names in Sasak names such as Abdullah, Abdurrahman, Siti Aminah, Siti Hadijah. * Sanskrit derived namesAs the influenced of former ruler of Balinese in Lombok we will find some similarities in Sasak and Balinese such as in language and culture. Sanskrit derived names-names that may sound Hindu-influenced such as Indra, Bayu, Surya, Wisnu, Rama, , Bima, Dewi, Sri, Laksmi, Saraswati, Sintawati, etc. * Popular and Honored person Names Sasak people also use personal names following popular names taken honored person such as names of former presidents (Sukarno, Suharto, Megawati, Habibi) , celebrity names (Desi Ratnasari, Rano Karno, Herman Felani, Anjasmara), sport champions names (Alan Budi kusuma, Verawaty, Rudi Hartono). Etc. * Western namesDue to the influence of Western popular culture and celebrities, many non- Sasaksalso have shortened Western names like Sandy, Ricky, Alan, Meri (Marry), Linda, Amanda, Cindy,Heri (Harry), Meri (Marry), Sintia (Chintia) etc. The names can be found through Sasak family in suburb even in rural community. * Parents own Creation names. Some parents created their child names with their own idea and meaning. Such as persons who were born in certain times . Juliawati for a person who was born in July, Agustina in August, Oktaviana in October, Ramadani in Ramadhan month, Laelatul Fitri in the night before Iedl Fitri day, Purnawati in full moon night. . Lendang Nangka Sasak Meno-mene varity 100 Top names. So far there is no specific rules in Sasak naming sytem. Since most of Sasak people are muslim naming system is much closely relate d to Arabic names, although it is not totally follow the personal naming system for Arab people. Sasak personal names are similar to most Indonesian moslem names although some names appear as they are influences by western and Hindus names. Some other names are created by parents own creation which they based on other peoples names, time, place, nature, plants or thing they considered good names.The top 100 hundred names of 6357 names mostly used in Lendang Nangka Sasak village as shown in the following table: Table. 1. Top 100 names in Lendang Nangka Sasak Meno-mene varity No. | NAMES| Total names| %| No. | NAMES| Total names| %| 1| SAMSUL (+ †¦. )| 37| 0. 58| 51| anti| 11| 0. 17| 2| Abdullah (+†¦ )| 34| 0. 53| 52| DIAN| 11| 0. 17| 3| SUMIATI| 29| 0. 46| 53| HAERIAH| 11| 0. 17| 4| JUMAKYAH| 27| 0. 42| 54| HARNI| 11| 0. 17| 5| JUNAIDI| 25| 0. 39| 55| LINA| 11| 0. 17| 6| MULIANI| 23| 0. 36| 56| MARIANI| 11| 0. 17| 7| SAPRI| 22| 0. 35| 57| NURUL AENI| 11| 0. 17| 8| Agus+| 20 | 0. 31| 58| RIPAAH| 11| 0. 7| 9| ahmad+| 20| 0. 31| 59| SAMSUDIN| 11| 0. 17| 10| ERNA( +)| 20| 0. 31| 60| SENIWATI| 11| 0. 17| 11| LIA| 20| 0. 31| 61| SUPRIADI| 11| 0. 17| 12| Aisah| 19| 0. 30| 62| ZAKIAH| 11| 0. 17| 13| RIZAL| 19| 0. 30| 63| Adi| 10| 0. 16| 14| SRI ASMAWATI+| 19| 0. 30| 64| ana| 10| 0. 16| 15| MULIADI| 18| 0. 28| 65| HAERUNI| 10| 0. 16| 16| NURHASANAH| 18| 0. 28| 66| HENDRI| 10| 0. 16| 17| HAMDIAH| 17| 0. 27| 67| HERI| 10| 0. 16| 18| IRWAN| 17| 0. 27| 68| HERIANTO| 10| 0. 16| 19| ROHANI| 17| 0. 27| 69| HERMAN| 10| 0. 16| 20| EKA| 16| 0. 25| 70| JULIANA| 10| 0. 16| 21| HAERANI| 16| 0. 25| 71| LIANA| 10| 0. 16| 2| NURHAYATI| 16| 0. 25| 72| MAHYUNI| 10| 0. 16| 23| ROZI| 16| 0. 25| 73| MAWARDI| 10| 0. 16| 24| Aminah| 15| 0. 24| 74| PAJRI| 10| 0. 16| 25| At| 15| 0. 24| 75| PATIMAH| 10| 0. 16| 326| IDA| 15| 0. 24| 76| RONI| 10| 0. 16| 27| MAHNUN| 15| 0. 24| 77| ROSIDI| 10| 0. 16| 28| NURUL +| 15| 0. 24| 78| SALMIAH| 10| 0. 16| 29| SAPIAH| 15| 0. 24| 79| SUHAILI| 10| 0. 16| 30| SURIANI| 15| 0. 24| 80| YANTI| 10| 0. 16| 31| Ani| 14| 0. 22| 81| YULIANI| 10| 0. 16| 32| NUR| 14| 0. 22| 82| ZAKRAH| 10| 0. 16| 33| NURAENI| 14| 0. 22| 83| Ahyar | 9| 0. 14| 34| YULIANA| 14| 0. 22| 84| andri+| 9| 0. 14| 35| Andi| 13| 0. 0| 85| ari| 9| 0. 14| 36| JUMARTI| 13| 0. 20| 86| DEDI| 9| 0. 14| 37| RINA| 13| 0. 20| 87| IWAN| 9| 0. 14| 38| Anah| 12| 0. 19| 88| MAHINUN| 9| 0. 14| 39| DEWI| 12| 0. 19| 89| NURUL| 9| 0. 14| 40| DIANA| 12| 0. 19| 90| PENDI| 9| 0. 14| 41| EDI| 12| 0. 19| 91| RIANAH| 9| 0. 14| 42| ELI| 12| 0. 19| 92| RIKA| 9| 0. 14| 43| HAMDI| 12| 0. 19| 93| SAHNUN| 9| 0. 14| 44| JOHAERIAH| 12| 0. 19| 94| SITI+| 9| 0. 14| 45| LINDA| 12| 0. 19| 95| SUMARNI| 9| 0. 14| 46| MARNI| 12| 0. 19| 96| SUPARDI| 9| 0. 14| 47| MULIANA| 12| 0. 19| 97| US| 9| 0. 14| 48| PADLI| 12| 0. 19| 98| anto| 8| 0. 13| 49| RENI| 12| 0. 19| 99| AYU| 8| 0. 3| 50| SAPRUDIN| 12| 0. 19| 100| HALIMAH| 8| 0. 13| |   |   |   |   | OTHERS|   | 79. 05| The following table data is to d escribe the use of Arabic names Abdullah which is popular as Arabic name, the total number of inhabitants using Abdullah first names is 36 people: e. Other popular form of Lendang Nangka Sasak Meno-mene varity. From the analysis of the data it is found that many of Sasak personal names characteristic has similar final sylables such as ,-udin, -ni, -di, -man, -ti, -ah, -na, -wan. The following are data show names with the characteristic above: * Names with final sylable u–din Names with final sylable di * Names with final sylable –man * Names with end sylable –na * Names with end sylable –run * Names with end sylable – wan * Names with end sylable -un * Names with end sylable –to and – no * Names with end sylable –ah By observing the data above mostly naming system in Sasak meno-mene are very simple and it is tend to have similar names by using similar final sylables. 4. Arabic names, meaning and origins Arabic names were histor ically based on a long naming system; most Arabs did not simply have given/middle/family names, but a full chain of names.This system was in use throughout the Arab world. The given name is always followed by the father's first name, then the father's family surname. Some surnames have a pre-fix of ibn- meaning son of (ould- in Mauritania) The surnames follow similar rules defining a relation to a clan, family, place etc. Some Arab countries have differences due to historic rule by the Ottoman Empire or due to being a different minority. For example : * Muhammad ibn Saeed ibn Abd al-Aziz al-Filasteeni Ism – Muhammad (Proper name). Muhammad: praised. Nasab – Saeed (Father's name). Saeed: happy Nasab – Abd al-Aziz (Grandfather's name).Abd al-Aziz: Servant of the Magnificient. Nisbah – al-Filasteenee (The Palestinian). Filasteen: Palestine. Muhammad Saeed, son of Abdul-Aziz, the Palestinian This person would simply be referred to as â€Å"Muhammad† or by relating him to his first-born son, e. g. :†Abu Kareem† (father of Kareem). To signify respect or to specify which Muhammad one is speaking about, the name could be lengthened to the extent necessary or desired. During the pre-Islamic period and onward, Arabs used to follow certain traditions in choosing their personal names. Roughly, the same traditions have been followed in modern Arabic dialects.In classical Arabiciv, some names were chosen by tribes for various reasons: (1) to threaten their enemies (eg Muqatil: fighter, Ghalib: winner, Asad: lion) (2) to express their optimism of their sons (eg Sa6yd: happy, Malik: owner, Najy: rescued) (3) to involve the sense of roughness of land or trees (eg ala : thorny tree,hajar: stone) or (4) the newly born child is named depending on what his father comes across while the child's mother is being in labour. For instance, if the father meets a fox, the child will be named accordingly: Thalaba. The same holds true of dog: k alib, crow: Ghurab (Ibin Duraid, d. 21H ,nd:5f) Ibin Qutaybah(d. 276 H,1999:67) adds that some people's names are taken from names of plants(eg alqamah: colocynth) others from people's characteristics or attributes(eg al-kareem: generous, al-shuja: brave). In the Arabian Peninsula, females were named as males. This is attributed to the fact that the tribal societies at that time need be seen greater in number by others so that they would think a lot before invading each other. After the rise of Islam, the tradition of naming persons by the use of plants' or animals' names went on; and other factors for naming had become involved.For instance, beautiful names were chosen (al-Rabii: Spring) and got widely spread due to the Prophet's position against the choice of ugly names. He (P. B. W. H) recommended that parents should select beautiful names that bring happiness and satisfaction to newly born children. In surveying the traditions that Arabs followed in naming persons during the pre - and post-Islamic period, one finds that the same traditions have been roughly adopted by modern Arabic native speakers (Murad, 1984:36, 46). Al-Samaray (1961:4) adheres to a rather distinct view in that classical Arabic is no longer the variety spoken all over the Arab homeland i. . different Arabic colloquial dialects are in use. This has had its impact on the way the PNs are used or chosen in every Arabic speaking country (see 2. 2. 1 below). However, Al-Samaray (p. 5) does not state that the traditional ways of naming became totally absent(see 2. 2. 2 10 below). Ulaiq (2001:12ff) further indicates that personal names in SA and modern Arabic dialects are attributed to: 1. Natural phenomena (eg Qamar; the moon, kawkab: planet, Hilal; crescent) 2. The sequential order of the newborn child which has sometimes a part to play in naming him or her(eg Faryd; the unique, Wayd; the alone, Rabia; the fourth). . Well-known or outstanding figures such as poets, heroes, wise men, presidents, artists or leaders (eg Siina; Avicenna; Saladdiin, AbdulNasir). 4. Grandfathers' or grandmothers' names to glorify them specially the eldest son. 5. Harmony of the names so as to be of the same musical tone of the family members (eg Ranny, Rajjy, Wally, Haddy). 6. Particular occasions or events(eg Ramadhan: the fasting month, Najjah; success, Zilzal: earthquake) 7. The fear of envy in that ugly names are attributed to infants (as some people believe) to keep them away from being envied.Nevertheless, this tradition has become of a very minor role to play due to the spread of education and knowledge in the Arab homeland. 5. Nicknames According to Oxford Dictionary A nickname is â€Å"a usually familiar or humorous but sometimes pointed or cruel name given to a person or place, as a supposedly appropriate replacement for or addition to the proper name, or a name similar in origin and pronunciation from the original name. A nickname is sometimes considered desirable, symbolising a for m of acceptance, but can often be a form of ridicule. Nicknames in Sasak language relates to definition above is quiet similar in function and meaning.The topic disscussion in this research relates to Nicknames formation in Lendang Nangka Sasak meno mene varity comparing to nick names formation in Arabic. This topic become the main discussion because most of Lendang Nangka inhabitants personal names are influenced by Arabic naming system. 5. 1. Nicknames formation. As the main focus on this response paper, nicknames formation is based on Lendang Nangka Sasak meno-mene varity. Nicknames formation in Sasak meno-mene varity in LendangNangka has some characteristics: 5. 2. Truncation the given names Truncation means to shorten by or as if by cutting off. The free dictionary online) 5. 2. 1. Truncate the base name by separate back part of base name as illustrated below: Base namenickname (truncated) – Gunilahilok – Haeriahiok – Sinarepayep – Sadahadok Nickname s (Truncated names) shows tendency to begin with a consonant and end with consonant, even their base starts with a consonant and end with a consonant. While the others following nicknames(truncated) names tend to begin with a consonant and ends with a consonant even the base names starts with a vowel and ends with a consonant: Base namenickname – Aminahminok – Andipendot – Aguscegos – Akramkeram – Amircemor – Amingemong Abdillahdilok – Ahmad gamek 5. 2. 2. Truncate the primary stressed syllable of the names as follows: Base namesNicknames (truncated names) – At’harhar – Rukiahkiah/kiok – Sakdahdah/dok – Samsulsul -SamsudinSam 5. 2. 3. Truncate the secondary stressed syllable of the names as in the following example: Base namesNicknames (truncated names) – Samsudinudin – Tarminimini – Hamdandan – Jumlahlah/lok 5. 2. 4. Truncate names on the segmental of onset consonants rep lace randomly: Base namesNicknames (truncated names) – SakdahCedok – MuhamadGamek – SirCing – HasimTacim – MahrepGayep 5. 2. 5. Phonological Process. Stressed vowels occasionally change /a:/ into /o/ as follows : Base namenickname -Abdillahdilok -Samsiahsiok -Aminahinok -Rukiahkiok * Changing stressed vowel /a:/ into // ? Base name Nicknames -SatriawanAwen -SuparmanMamen -JarkasiKejer -SunardiSuner -AhmadAmek -JumakyahJume’ * Changing stressed vowel /i/ into /o/ as follows: Base name Nicknames -Mulyandiendot – Mulianieno’ – Muliaticetot – Santisentot – Samsul Hadiedot * Consonants may also be subject to change. /s/ is replaced by /c/ in middle position: Base name nick name -NasirAcing -HasanAcan Muhasimacim -Muhsankucan -MuhsinKucin -LusianiUci -HasanahCanok -MahsunAcun * /r/ is replaced by /? / at the close position Base name Nicknames -Munirning -Tahira’ing -Zakiraking -JaharAhang -MunawarAweng * / r/ is replaced by /y/ in the mid position Base name Nicknames -Idrusyus -Zakrahayah/ayok -Mustarahgayek -Mahrupayup -Mahrapayap -Mehrameyam -Sahrumayum -Sahuriuyi * /k/ is replaced by /h/ at the close position Base name Nicknames -ZakrahAyok – Hasanahcanok – Riadahadok – Sakdahcedok – Ramdahmendok – Sakdiahdiok – Abdillahdilok – Darmilahilok Sapirahirok – Jumlahjlok * /b/ is replaced by /p/ at the close position Base namenickname -Zaenabjenap – Assegabsegep – Mustajabajap – Rajabajap – Habibabip * /z/ is replaced by /j/ at the onset position Base namenickname – ZaenabJenap – Zulkarnainkejung – Zaenuddinjen – Zarkasikejer – Zulkiplijul * /l/ is replaced by /ng/ at the close position Base name nickname -Samsulancung – Sulhiahcung – Mulianahmung – Yulianiyung * /f/ is replaced by /p/ at the random position Base name nickname – Gafarapar â₠¬â€œ Irfanipan – Sarifayip – Mussannifsanip – Halifalip 5. 2. 6.Nicknames also formed by dropping a consonant in random position, as described below: Base name nickname -Ehsanesan -Irfanipan -Ilhamiham -Ahsipasip -Mahsanasan 5. 2. 7. Nicknames formation also made by giving attributes to specific person such as following: – Kaktuan is for a person who has done hajj for example: Base namenicknames -Hajjah Kurniawatikak tuan kur -Haji Abdillahkak tuan dilok -Hajjah Samsiahkak tuan iok * Tuaq(uncle) and inaqrari (aunt) is to address someone feel close related to the speaker even he is not a relative of the speaker, as following example: Base namenicknames Salehtuaq aleh -Zaenuddintuaq jen -Syamsiahinaq rari iok -Rumlahinaq rari melok * Semeton/meton/ton (brother/sister) usually refers to male is to address between friends at same age and to show friendliness, even though they are not relatives in between and usually meton or ton is stand alone without nicknam es. * Arik/adik (younger brother/sister)usually refers to male is to address to younger person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. Kakak/akakArik/adik (older brother/sister) usually refers to male/female is to address to younger person and to show friendliness, even though they are not relatives in between and usually kakakor kak is stand alone without nicknames. * Amaq keke /bapak keke(father) usually refers to male is to address to elder married person and to show friendliness, even though they are not relatives in between and often amaq keke or bapak keke is stand alone without nicknames to show closer feeling. Inaq keke (mother) usually refers to address to elder married person and to show friendliness, even though they are not relatives in between and usually arik or adik is stand alone without nicknames. without to show closer feeling. 5. 2. 8. Nicknames also formed by physical chara cteristic and personality such as: -â€Å"Dakoh† for a person who is overweight -â€Å"keyek† for a person who is thin,. -â€Å"ranjo or belo† for a person who is tall, -â€Å"cendek or dendek/dandak† for short person. -â€Å"Bijang†, â€Å"ambok† for a person with blonde hair and grey hair respectively. â€Å"butak† for a person with bald head. -â€Å"melong† is for big eyes person. -â€Å"bireng† for a person with dark skin, -â€Å"bodak† for a person with white skin. ; Personality; -â€Å"nyerenceng† is for talkative person, -â€Å"beleke†, is for a person who laugh a lot -â€Å"kembo’†is for easy crying person – â€Å"bingis† for high tempered person. 6. Nick Names in Arabic. According to Zawaedah : Studying nicknames relates to Arab world is important for national security because they are used as aliases. Instead of using one’s real name, one may use a nicknam e to hide their identity.A term for such usage is â€Å"nom de guerre† (i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseudonyms to hide their identities and protect themselves and their families from harm. A nickname is a name that identifies a person, place, or event that is different from the formal given name of the referent. Nicknames are often not legally registered in one’s official documents. Examples: Muammar Qathafi: Al? Akh al? Aqid ‘Brother Colonel’ Amin al? qawmiyyah al? Arabiyyah: ‘Keeper of Arab Nationalism’ Sahib al? Kitab al? Akhdar : ‘Owner of the Green Book’Zuwaedah stated that Studying nicknames is important for national security because they are used as aliases. Instead of using one’s real name, one may use a nickname to hide their identity. A term for such usage is â€Å"nom de guerre† (i. e. war name). Resistance fighters, terrorists, and guerilla fighters use pseu donyms to hide their identities and protect themselves and their families from harm. Understanding the pseudonyms used by radical groups sheds light on their future intentions, perceptions, motivations, and connection to the cause. (Guidere, 2006).Abu Hamza al-Muhajir (Abu Ayyub Al-Misri) : chief of Al-Qaeda in Iraq. Hamza Ibn Abd Al? Muttalib: Prophet Mohammad’s uncle. One of the bravest protectors of Islam. Muhajir: he immigrated to Iraq to fight. Or it could refer to â€Å"hijra†of companions of Mohammad from Mecca to Medina. In Arab world nicknames are used for : * Friendly daily conversations (face to face, on the phone, letters, e- mails, etc). Used for endearment or respect. * Monarchs may be known by other nicknames. * ‘Nabaz’ nicknames used to insult others (ex. Enemies), or used in the formation of swear words. Concealing identity: * Computer users: Chartrooms, e? mails, blogs, used asâ€Å"usernames†. * Literary pen names –publishi ng authors. * Stage names (ism shuhra)? actors, singers, dancers, etc. * Criminals, terrorists, etc (takhallus) –especially the leaders have pseudonyms. 7. Types of Arabic nicknames 1. Asma’ Dal’ Hypocoristics 2. Kunya Abu X 3. Nasab Ibn X patronymics 4. Laqab description 5. Nisba origin of person 6. Nabaz insulting names 1. Asma’ Dal Hypocoristics Arabic hypocoristic formation is very generative. Generation is largely based on the root of the name (Zawaydeh and Davis, 1999). Khalid† has the following Jordanian and Egyptian nicknames: * Khalluuude * Khalkuleeh * Khaluudi * Khalluuude * Khukhu * Khalkhul * Dido * Khokha When a full name has an affixal consonant, be it a prefix, suffix, or infix, the affixal consonant does not appear in the hypocoristic. Hypocoristic contains only root consonants, regardless of what other consonants may be in the name. * MuhammadHammud * AhmadHammud * HamidHammud 2. Kunya In the Arab tradition, after a person gets mar ried and has a child, s/he is called by the name of his eldest son (or daughter). Abu Muhammad ‘father of Muhammad’ * Um Muhammad ‘mother of Muhammad’ Highly used in the Arab World, and Muslims in general (ex: Afghanistan, Pakistan). Some Kunyas are metaphorical. The second word uses a positive or negative attribute. * Abu Al? Khayr‘father of goodness’ * Abu Dhubab‘father of flies’ Not every Abu X is just a nickname. It could be also a surname. Ex. Palestinian surnames: * Abu Hadeeda‘father of iron’ * Abu Minshaar‘father of a saw’ * Abu Sham’a‘father of a candle’ Used daily as an honorific to show respect to elders. Used by young men to address each other, for fun.Even one who is not married, or doesn’t have a son may be called Abu X. As a â€Å"nom de guerre†. For example, â€Å"Abu† nicknames were popular among PLO leaders. * YasirArafat Abu Ammar * MahmoudAbbasAb u Mazen A terrorist may be known by a Kunya name. in India, the nickname â€Å"Abu Al? Qama†was used by a member of the terrorist group Lashkar? e? Taiba in the Mumbai terror attacks 3. Nasab Nasab is a patronymic or a metronymic name. The word â€Å"Ibn† or â€Å"bint† (i. e. son/ daughter of) followed by the father’s name. Was used more frequently as an alias in historic times.The person was known as â€Å"son of X† instead of his first name. A chain of names reflects one’s genealogical ancestors. Example: * Ibn Khaldoun —- : Abd ar? Rahmanibn Muhammad ibn Muhammad ibn Muhammad ibnal? Hasan ibn Muhammad ibn Jabir ibn Muhammad ibn Ibrahim ibn Abd ar? Rahman ibn Khaldun. Nasab .. current usage It is a standard way of reporting names in Saudi Arabia, and the Arabian Gulf. The head of the House of Saud:Muhammad bin Saud bin Muhammad bin Muqrinbin Murkhanbin Ibrahim bin Musa bin Rabi’abin Mani’bin Rabi’aal? MuraydiAl ? Dur’aal? banafiAl?Adnani Used online as alias names. Next word could be a colloquial or MSA adjective, a noun, a person’s name, or a place name. * Ibn Falastine‘son of Palestine’ * Ibn Hajar‘son of a stone’ 4. Laqab This is a description of the person, that could be considered a title of nobility. It is often a two-word phrase, which often indicates the person’s occupation, importance, or appearance. Originally, it was used as a nickname, and later adopted to be a title given to important people. * Sayfal? Din ‘The sword of the religion’ * Nasiral? Dawla‘the helper of the dynasty’ * Al? Jahiz‘the goggle? eyed’A physical or personal quality. The phrase could be metaphorical. These could also be used as surnames. Al? Tawil‘the tall one’(could be a surname) Al? Andalibal? Asmar‘the dark nightingale’(Singer Abd Al? HalimHafiz) * Expressing adoration or reliance on God, or li neage to the Prophet. Some use compound structures with words such as â€Å"Allah†, â€Å"Abd†, â€Å"al-Din†, â€Å"al-Islam†, â€Å"al-Dawlah†, or words used in titles: * Al? Ra’is Al? Mu’min‘the faithful president’Anwar Al? Sadat * Amir Al? Mu’minin‘prince of the believers’HusniMubarak * Sayfal? Islam‘sword of Islam’Osama Bin Laden 5. NisbaAn adjective derived from the place of origin, birth, residence, or occupation. It could be also a clan, tribe, or family. Formed by adding –iyy/-iy at the end of the word. Usually preceded by al- definite article. This form is also used for surnames. * Abu Ayyubal? Misri (from Egypt) * Salahal? Din Al? Ayyoubi (founder of Ayyoubi dynasty – conquered crusaders) * Al? Ansari: fighters born in Iraq (Ansaral? Sunna group) * This type of structure is used frequently to coin new surname aliases. 6. Nabaz Nabaz could be metaphors that are used to describe somebody that is disliked or considered to be an enemy. Jihadi style writings use such metaphors abundantly. Comparing the process of nicknames formation in Sasak meno-mene varity and Arabic, both process in nicknames formation in general it is quite different. The process of formation nicknames basis in Arabic is basis those six basis. This basis is not common in Sasak meno-mene varity. F. Conclussion From the discussion we can conclude as follows: * Personal names in Lendang Sasak meno-mene varity mostly influenced by Arabic word and names. * Arabic names and Sasak names has similarities relates to Islamic way system of naming based on the hadist. There is no special rules in Sasak meno-mene varity in forming nick names compare to Arabic nicknames which on those 6 basis. * Most of Sasak nicknames formation are not influenced by Arabic nicknames formation. Sasak Personal names * Muhammad (personal names) become Amek (Nickname) While in Arabic names: * Muhammad (persona l names) becaome Hammuud (Nickname). * The similarity in nicknames formation is in the Arab tradition, after a person gets married and has a child, s/he is called by the name of his eldest son (or daughter). * Abu Muhammad ‘father of Muhammad’ Um Muhammad ‘mother of Muhammad’ While in Sasak tradition after a person get married he / she is called by his ledest son (or daughter) * Amaq Udin â€Å"father of Udin† * Inaq Udin â€Å" mother of Udin† * Mamiq Bambang â€Å" father of Bambang† * Meme Santi â€Å" mother of Santi† * Based on my onservation and analysis I found that the nicknames formation in Lendang Nangka nicknames varity are based on Truncation of personal names, phonological changing process, physical characteristic, attributions in term of social solidarity, friendliness and intimate. BiblographyIbin Duraid(d. 321H,n. d)Al-Ishtiqaq(Derivation). Revised by AbdulSalam Harron. Cairo: Al-Khanachy Publishing House. Ibin Qu taybah (d. 267H. 1999) Adeb Al-Katib( The Writer's Literature). Beirut: Al-Resalah Publishers. Jaszezolt, K. M. (2002) Semantics and Pragmatics: Meaning in Language and Discourse. London: Longman. John and Levitt, J. (1975) â€Å"People Have Names† in Wallace, A. & Stageberg, N. (eds. ) Introductory Readings on Language. New York: Rinehart and Winston. pp146-154. Dictionary of Islamic Terms. Damascus: Dar Al-Yamamah. Langendock,V. 2008) Theory and Typology of Proper Names. http //www. degruyter. de/cont/. Retrived on 17th of January 2008. Murad, A. K. ( 1984) Asma? Al-Nass: Ma anyha wa ASbab Al-Tasmiah Biha( People's Names: Their Meanings and Reasons of Naming by them). Vol. I. Baghdad: Dar Al-Huriah for Printing. Nina(2008) A Survey of the History of English Place Names. http //www. sca. org. Retrieved on 19th of February 2008. Pollock,J. L. (1982) Language and Thought. New Jersey: Princeton University Press. Al-Samaray, I. (1961)†Al-alam†(Proper Names) in Journa l of Faculty of Arts Vol. III.Baghdad University. pp3 -18. AlTha aliby,A. A. (d. 430H. 2007)Fiqih Al-lUghah wa Sirru Al-rabiah(Language Philology and the Secret of Arabic). Beirut: DarAl-Ma’rifah. Ulaiq,B. M. (2001)Al-Wafy fi Al-asma? Al-arabiah wa Ma6anyha( The Complete Text in Arabic Personal Names and their Meanings). Beirut: Dar Al-amra?. Ullmann,S. (1962)Semantics: An Introduction to the Science of Meaning. Oxford. Basil Blackwell. http://en. wikipedia. org/wiki/Nickname. Accesed on :11/1/2012 7:25:30 PM http://oxforddictionaries. com/definition/english/nickname. 2012 Oxford University Press.