Friday, August 21, 2020

Solving the Redundancy Allocation Problem using Tabu Search

Taking care of the Redundancy Allocation Problem utilizing Tabu Search Productively Solving the Redundancy Allocation Problem utilizing Tabu Search Unique The repetition portion issue is a typical and widely considered program including framework structure, unwavering quality building and activities inquire about. There is a regularly expanding need to discover proficient answers for this unwavering quality enhancement issue in light of the fact that numerous broadcast communications (and other) frameworks are getting progressively perplexing while the advancement plans are constrained. To give answers for this, an unthinkable inquiry meta-heuristic has been created and effectively. Forbidden pursuit is an ideal answer for this issue as it has a great deal of preferences contrasted with elective techniques. Forbidden quest can be utilized for increasingly complex issue area contrasted with the numerical programming strategies. Forbidden pursuit is more productive than the populace based inquiry procedures, for example, hereditary calculations. In this paper, Tabu inquiry is utilized on three unique issues in contrast with the whole num ber programming and hereditary calculation arrangements and the outcomes show that forbidden hunt has more advantages while tackling these issues. Presentation of Articles Excess designation problem(RAP) is a well known and a mind boggling dependability plan issue. The issue has been settled utilizing diverse improvement draws near. Unthinkable search(TS) has more points of interest over different methodologies yet has not been tried for its adequacy. In this paper a TS is utilized to take care of an issue, called TSRAP, and the outcomes are contrasted with different methodologies. The RAP is utilized for plans that have huge congregations and are fabricated utilizing off-the rack parts and furthermore have high unwavering quality necessities. Answers for the RAP issue has the ideal blend of part choices. Numerical programming methods have demonstrated to be fruitful in discovering answers for these issues. Lamentably, these issues have a few requirements which are essential for the enhancement procedure however not for the real building structure process. Hereditary Algorithms have demonstrated to be a superior option in contrast to the numerical programming method and has given great outcomes. Regardless of this, hereditary calculations is a populace based inquiry requiring the assessment of numerous forthcoming arrangements on account of which a progressively effective way to deal with this issue is wanted. TS is an option in contrast to these streamlining techniques that has been enhanced by GA. Its a basic arrangement procedure that returns through progressive cycles by thinking about neighboring moves. In this paper the TS strategy is utilized on three distinct issues and the outcomes are contrasted and the other improvement techniques. TS isn't care for GA, which is populace based, rather it progressively moves from answer for arrangement. This helps increment the effectiveness of the technique. The most regularly read structure design for RAP is the arrangement equal issue. The case of the structure is demonstrated as follows. Classification R(t, x) = framework unwavering quality at time t, contingent upon x; xij = amount of the jth accessible segment utilized in subsystem I; mi = number of accessible segments for subsystem I; s = number of subsystems; nmax,i = ni à ¢Ã¢â‚¬ °Ã¢ ¤ nmax,i㠢ë†â‚ ¬i; C(x) = framework cost as a component of x; W(x) = framework weight as a component of x; C, W, R = framework level imperative cutoff points for cost,weight, furthermore, unwavering quality; k = least number of working segments required for subsystem; Þâ »ij = parameter for exponential dissemination, fij(t) = Þâ »ij exp(㠢ë†â€™ãžâ »ijt); Fj = practical arrangements contained on the unthinkable rundown; Tj = all out number of arrangements on the unthinkable rundown; à Ã¢ j = plausibility proportion, à Ã¢ j = Fj/Tj . Clarification of the work introduced in diary articles The RAP capacity can be figured with framework dependability as the target work or in the requirement set. Problem(p1) boosts the framework unwavering quality and problem(p2) augments the framework cost. The TS requires assurance of a forbidden rundown of inaccessible moves as it progressively continues starting with one stage then onto the next. For the arrangement equal framework, the encoding is a stage code of size à ¢Ã«â€ Ã¢â‚¬Ëœi=1 s nmax, I speaking to the rundown of parts in every subsystem including nonused segments. The unthinkable rundown length is reset each 20 cycles to a whole number worth circulated consistently between [s, 3s] and [14s,18s] for Problems (P1) (s = 14) and (P2) (s = 2), separately. TSRAP is done through four stages. The initial step includes producing a doable arbitrary beginning arrangement. S whole numbers are looked over the discrete uniform dispersion, speaking to the quantity of parts in equal for every subsystem. Utilizing this system, an answer is delivered with a normal number of segments per subsystem. It turns into the underlying arrangement if practical, else the entire procedure is rehashed. The subsequent advance checks for conceivable characterized moves for every subsystem in the area. The TSRAP that permits segment blending inside the subsystem takes into consideration its first move to change the quantity of a specific segment type by including or taking away one. The TSRAP that doesn't permit part blending includes changing the quantity of segments by including or deducting one for every single individual subsystem. These moves are invaluable as they don't require re-figuring of the whole framework unwavering quality. The best among the two kinds of moves that are performed freely are chosen. The chose move is the best move accessible, thus it is called best move. In the event that the arrangement is TABU and the arrangement isn't better than the best so far arrangement then it is prohibited and stage 1 is rehashed, else it is acknowledged. The third step includes refreshing the Tabu rundown. To check for the possibility of a section in the Tabu rundown, the framework cost and weight are put away with the subsystem structure associated with the move inside the forbidden rundown. The fourth and the last advance is checking for the halting model. It is the most extreme number of emphasess without finding an improvement in the best achievable up until now. When reached at an answer, the pursuit is finished and the best possible so far is the will be the TSRAP suggested arrangement. A versatile punishment strategy has been produced for issues settled by TS as they demonstrate to give better arrangements. The target work for the infeasible arrangement is punished by utilizing subtractive or added substance punishment work. A light punishment is forced on the infeasible arrangements inside the NFT locale( Near Feasible Treshold) and vigorously punished past it. The punished target work depends on the unpenalized target work, the level of infeasibility and data from the TS present moment and long haul memory. The target work is for issue 1: Rp(to;x) is the punished target work. The un punished framework unwavering quality of the best arrangement so far is spoken to by Rall and Rfeas speaks to the framework dependability of the best plausible arrangement found up until this point. On the off chance that Rall and Rfeas are equivalent or near one another in esteem then the pursuit proceeds, else in the event that Rall is more prominent, at that point Rfeas, there is a trouble in finding the doable arrangements and the punishment is made bigger to channel the hunt into the plausible locale. So also, the target work for issue 2 is: Cp(x) is the punished target work. Call is the unpenalized (plausible or infeasible) framework cost of the best arrangement found up until this point, and Cfeas is the framework cost of the best attainable arrangement found up until now. Conversation of Contributions The most significant commitment is that because of this paper it is currently demonstrated that the Tabu hunt is a progressively proficient strategy that the scientific programming method and the hereditary calculations. The punishment strategy was utilized which demonstrated to give better outcomes as well. Because of this paper, complex issue areas would now be able to be streamlined better utilizing the Tabu hunt. Because of this paper, weve come to understand that TSRAP is better in execution and results in more noteworthy proficiency than GA despite the fact that they are practically comparative in systems. Because of the short calendars to locate the ideal answer for complex excess distribution issues, Tabu pursuit is seen as the most proficient methodology. Conversation of Dificiency and Potential Improvements Albeit an unexploited way to deal with locate the ideal arrangement has been attempted and tried to be productive, there is potential for future degree. In this paper , the TS approach utilized is fairly straightforward such that couple of variables that could have been were not consolidated. Highlights that are typically utilized, for example, applicant records and long haul memory systems which end up being increasingly viable were not utilized. The utilization of these highlights can end up being progressively productive in complex issues. There are open doors for improved adequacy and proficiency by considering the expansion of these highlights to the TS devisedâ here. Outline TS has recently been shown to be an effective advancement approach for some various issue areas. Along these lines, TS approach , because of this paper has been attempted and tried to be increasingly productive way to deal with the intricate issues area of the excess designation issue. The utilization of punishment work in this examination has advanced the inquiry in the infeasible district by changing the NFT. In this paper, TS has been tried in three distinct issues and has given more effective outcomes than the other elective techniques. When looked at, the TS delivers preferred outcomes over the hereditary calculation strategy. Notwithstanding this, the utilization of highlights, for example, up-and-comer records and long haul memory systems could have been to be increasingly successful in complex issue spaces. References Bellman, R.E. furthermore, Dreyfus, E. (1962) Applied Dynamic Programming, Princeton University Press, Princeton, NJ. Flat, J.A. (1998a) Memory-based method for ideal

Sunday, July 12, 2020

Learning From Research Papers

Learning From Research PapersAt times, a list of research papers that can be used is considered to be just one of the needs of the school or college. However, sometimes it does not help much. Students who have problems in doing the required research papers may go into racking their brains to find papers for their classes.The era of information overload has increased the need for students to do so much research to get through the class. However, this has also increased the stress level of the students in class. The homework assignments will also be taken up by students who do not have the time to do the research. This has resulted in increased workload for teachers and with it, increased workload for the students.A number of high school students have learned to cope with these hectic situations. They have the answer: research papers. They know the importance of this task because these papers prove the topic of the class which they are teaching. These papers give details about what is discussed in the course. Furthermore, they will be able to control their time as well as prevent them from getting too distracted from the subjects.However, there are many schools and colleges that do not have enough resources to allow their students to utilize research papers. For this reason, they have stopped making use of them. Due to the scarce resources of these schools, they do not want to invest more in resources so that they can ensure that their students have the right knowledge about the subject matter.However, today's schools and colleges are more open to help their students become better at their field. One way of doing this is through projects. The student can set up a project and work on it for as long as he wants. It is a win-win situation for both the school and the student.In today's students, a number of free online assignments are available that will help them learn what they need to know. There are even tutorials that help them to improve their projects. These p rojects not only teach them, but they also help them enhance their writing skills.Before students start working on a research paper, they should be aware of its importance. If they know what they need to research, they can avoid the problems that they might face while doing so. They will be able to ask the right questions and analyze the research properly. Another good thing about using research papers is that it allows the students to test their skills and knowledge about the field of study. This will help them learn and understand if they really need to take up a research paper.Another aspect of research papers is that they can prove helpful in clearing the minds of the students. By exploring different areas of their field, they will be able to differentiate between various ideas and topics and will be able to find out what they need to do next in their course. In doing so, they will be able to clear their heads and proceed with their studies accordingly. Lastly, students can choo se the subject of research papers based on the subject that is being taught in their course.

Wednesday, May 20, 2020

Learn the Conjugations of Pluerer (to Cry) in French

The French verb  pluerer  means to cry. When you want to say he is crying in the present tense or we cried in the past tense, the verb must be conjugated. A quick lesson will introduce you to the simplest forms of  pluerer, which you can study and memorize for use in your conversations. The Basic Conjugations of  Pleurer French verb conjugations may not be most French students favorite things to learn, but when you have a verb like pleurer, it is just a little easier. Thats because this is a regular -er verb, meaning it uses a very common conjugation pattern. If you have studied other verbs such as  quitter  (to leave) or  prà ©parer  (to prepare), you can use what you learned for those and apply it here. The key is to find the verb stem (or radical), which is  pleur-. To that, you will add different endings to form each conjugation. The endings you need are found in the chart. All you have to do is pair the appropriate subject pronoun to the tense of your subject. For example, I am crying is  je pleure  and we cried is  nous pleurions. Present Future Imperfect je pleure pleurerai pleurais tu pleures pleureras pleurais il pleure pleurera pleurait nous pleurons pleurerons pleurions vous pleurez pleurerez pleuriez ils pleurent pleureront pleuraient The Present Participle of  Pleurer As with most regular verbs, the  present participle  of  pleurer  is formed with an -ant  ending. This forms the word  pleurant. Pleurer  in the Compound Past Tense The  passà © composà ©Ã‚  is a compound past tense that is very common in French. To form it, you will need to conjugate avoir  (an auxiliary verb) into the present tense. The past tense is implied by the  past participle  pleurà ©, which is attached to the end. For example, I cried is  jai pleurà ©Ã‚  and we cried is  nous avons pleurà ©. More Simple Conjugations of  Pleurer Among the other simple conjugations you may need are the subjunctive and the conditional. The former draws into question the act of crying. The latter says that someone will only cry if something else happens. If you read or write much French, you may also need  the passà © simple  and  the imperfect subjunctive. These are literary tenses and most often used in formal writing. Subjunctive Conditional Passà © Simple Imperfect Subjunctive je pleure pleurerais pleurai pleurasse tu pleures pleurerais pleuras pleurasses il pleure pleurerait pleura pleurà ¢t nous pleurions pleurerions pleurà ¢mes pleurassions vous pleuriez pleureriez pleurà ¢tes pleurassiez ils pleurent pleureraient pleurà ¨rent pleurassent When you want to say Cry! in French, or some other short, really direct phrase, use  the imperative form.  All formality is lost here, so theres no need to include the subject pronoun. Simply say, Pleure! Imperative (tu) pleure (nous) pleurons (vous) pleurez

Wednesday, May 6, 2020

Game over the Effects of Violent Video Games on Children...

Game Over: The effects of Violent Video Games on Children Seven hours. That is the amount of hours a day the average American child plays a video games (Anderson 354), and with technology advancing and games becoming more graphic, the concern over a violent game’s effect over a child’s development is growing. What does playing video games for seven hours do to a child’s development? Violent, role-playing video games adversely affects a child’s development and causes aggression in children and adolescents; these games desensitize players, reward hurt and destruction, and glorify dangerous weapons. For some clarification, violent video games are defined as any game where the objective is to cruelly hurt or kill another character.†¦show more content†¦In addition to desensitizing children, violent video games reward hurt and destruction. For example, the objective of the very popular Doom is to shoot as many of the game’s â€Å"demons† as possible. In the game, or any given game, the more hurt , the more points a player receives and the higher up in the levels they move. Children are particularly susceptible to this kind of reinforcement because of their age. In the same way a parent teaches their child with punishment when they have done something bad and rewards when they have done something bad. A video game operates on the same basic principal. This is the use of positive reinforcement, on a negative action. The â€Å"fighting solves everything† policy is continually emphasized at an age when children are still modeling after what they see around them. The games subconsciously enforce the belief that violence is good. Video games promote dangerous weapons and make them seem exciting, as opposed to hazardous and life-threatening. The same way the media made smoking seem â€Å"cool,† violent video games make weapons seem â€Å"cool.† Near San Francisco, a young boy broke into his parent’s bedroom and took his father’s gun, and accidentally killed his friend (Levine 51-52). The idea that wielding a gun will make one â€Å"tough† is one that is repeatedly highlighted in video games today. MostShow MoreRelatedThe Effects of Violent Video Games on the Young1575 Words   |  6 Pagesroll music could have on their children. Much like the bad reputation rock and roll music received in the 1950’s, violent video games have been questioned and looked down upon as a newer form of influential media. Violent video games have been blamed for bullying, school shootings, increasing rape, and increasing the amount of women being abused. Despite the popular belief that v ideo games can be very harmful to a child’s mind and cause violent behavior, video games don’t cause as much psychologicalRead MoreEffects of Violent Video Games on Children Essay1660 Words   |  7 PagesEffects of Violent Video Games on Children The use of video games has become tremendously popular among children and adolescents in the past decade. In fact, â€Å"Sixty-eight percent of U.S. households play computer or video games.† (David Jenkins, 2009) This statistic reveals how important it is to understand the effects that these games can have on individuals and more specifically, children. Over the years, numerous studies have been conducted investigating whether video games have positiveRead MoreIs Video Game Violence the Cause of Juvenile Delinquency? Essay1683 Words   |  7 PagesInteractive video games and the Internet have become the entertainment of choice for Americas adolescents. Nearly seven in ten homes with children now have a personal computer (68.2%), and 41% of homes with children have access to the Internet. Annual video game revenues in the United States exceed $10 billion, nearly double the amount of money Americans spend going to the movies. On average, American children who have home video g ame machines play with them about 90 minutes a day. The impactRead MoreVideo Game : Video Games1658 Words   |  7 PagesVideo games first entered into the world around the 1970s, while the violence started occurring in the games about 20 years later (Anderson and Bushman 354). Some of the first violent video games included â€Å"Mortal Kombat, Street Fighter, and Wolfenstein 3D† which had amazing effects that were top notch at the time (Anderson and Bushman 354). Wolfenstein 3D was the first big video game that gave gamers the opportunity to shoot in the first person point of view (Anderson, Buckley, and Gentile 5). OverRead MoreBanning Violent Video Games On Children1545 Words   |  7 Pages Banning Violent Video Games A child is killing police officers. A teenager is hiring prostitutes to potentially kill them. He is using weapons such as guns, chainsaws, and knives to kill and commit horrible crimes. Thousands of children and teens participate in these actions daily. How? Violent Video games such as Doom, Call of Duty, and Grand Theft Auto are just a few of the games that are full of these awful actions. The Harvard Mental Health Letter states, â€Å"The Pew Research Center reportedRead MoreThe True Cause Of Violent Behaviors1613 Words   |  7 PagesThe True Cause of Violent Behaviors in Today s Society There are volumes of media that are starting to harm the world in which we live. They have been linked to fourteen mass murders (Fletcher). Nine out of the top ten selling games have been labeled as violent and 42% of adolescents play them (â€Å"Children and Video Games†). These violent video games are a major problem in the United States and across the globe. Violent video games have a direct correlation with negative behaviors because they increaseRead MoreAdolescent Aggression Based on Violent Videogames1645 Words   |  7 PagesAdolescent Aggression Based on Violent Videogames Violent video games played by millions of people every day results in animated characters having hearts ripped out, heads decapitated, and blood squirting across the screen as their mutilated bodies are erased from the screen. Most players play these games to pass the time, increase hand eye coordination, and create harmless competitions amongst those playing. However, some who play these games are entranced by the violent aggressive behaviors demonstratedRead MoreThe Negative Effects of Video Games Essay1337 Words   |  6 PagesVideo games began in the late 1960s. It is highly interactive but also a distinct simulation of the real world and the world of thinking. In recent years, Video games have been gaining its popularity at an amazing rate and have developed into a common form of entertainment in peoples lives. According to a survey, the researcher found that in 1992, approximately ninety-two percent of U.S. kids between 2 and 17 years of age play video games, and their pare nts bought 225 million of them last year toRead MoreHow Does One Define Violence?1595 Words   |  7 Pages the word violent is described as when someone or something is acting with or  characterized  by  uncontrolled, strong,  rough  force. When looking at this definition, what how do you define rough? Violence is one of those things that can be seen in many different ways. Although is this true, people should all be able to agree on that we see it in our everyday lives. It is seen on the news with the latest headlines. It is seen in movies and TV shows. It is also seen in our children’s games, specificallyRead More The Debate Over Video Game Violence Essay1734 Words   |  7 Pagespeople all over the world to debate certain topics that they deem to have a correct understanding of. Unsurprisingly, the effect of video games on the human brain has been a controversy since video games were first released decades ago. Video games involve the use of body and mind, wh ich causes the player to be inside of the game, and they can see the world through the eyes of the character of which they play. Some psychologists and other scientists suggest that violent video games can cause psychological

Euthyphro free essay sample

Typhoon rise to define piety to Socrates through different definitions ranging from beloved actions to the Justice but neither could satisfy him. Socrates When this written piece is read carefully one can get much knowledge about holiness or It may help to clarify little confusion about the concept of piety and holiness. Socrates argues with Typhoon to get a satisfactory definition of piety or holiness. In response to those arguments my paper concludes that the definitions given by the Typhoon and the arguments posed by Socrates ultimately increase the knowledge of an individual regarding different conditions of piety. His arguments truly clarify many doubts related to the piety. Discussion Argument #1 Typhoon advocates that piety Is persecuting spiritual lawbreaker. Socrates argues that there are various holy actions besides persecuting. My Conclusion One might think that piety is about confronting wrong doers or offenders. But this is not the whole concept of piousness because it is not necessary that something offending must also be felonious for other people. We will write a custom essay sample on Euthyphro or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page It is still not certain that what may lease God or what not and it is only God who knows real intentions behind any action.That is why this definition of Typhoon regarding piety did not satisfy Socrates and he asked for another explanation of piety. Argument # 2 According to Typhoon, piousness Is what Is dear to Gods and rests of the actions are considered to be Impious. On the other hand Socrates argued that It Is never clear that which action is precious to Gods and it becomes more difficult when there My conclusion This argument also enhances the knowledge about piousness because many people believe their own action dear to God while reject others as being controversial.No one can truly define the characteristics of beloved action to Gods. Those who consider certain actions to be a sign of piety must give a though over it. Argument # 3 The next argument that pious is everything loved by God or beloved things of God is pious may seems perplexing but it may also explain confusions about piety. Many of us believe certain particular actions to be pious before God; though this is not the whole truth. Sometimes the smallest actions of a person may lead him to piety. In the same way every apparent pious action may not be a sign of piety for God for he knows the real essence and reason behind it. Further definitions of piety by Typhoon lead to the argument that it Justice may not be piety because it is subjective. A Just action for one may not hold same ground for others. More Arguments Other arguments also declares that it piety is not a result of trading between God and men as God is above everything and it is man who is dependent.

Thursday, April 23, 2020

The Cystic Fibrosis Gene Essays (2506 words) - Cystic Fibrosis

The Cystic Fibrosis Gene Introduction: Cystic fibrosis is an inherited autosomal recessive disease that exerts its main effects on the digestive system and the lungs. This disease is the most common genetic disorder amongst Caucasians. Cystic fibrosis affects about one in 2,500 people, with one in twenty five being a heterozygote. With the use of antibiotics, the life span of a person afflicted with CF can be extended up to thirty years however, most die before the age of thirteen.1 Since so many people are affected by this disease, it's no wonder that CF was the first human genetic disease to be cloned by geneticists. In this paper, I will be focusing on how the cystic fibrosis gene was discovered while at the same time, discussing the protein defect in the CF gene, the bio-chemical defect associated with CF, and possible treatments of the disease. Finding the Cystic Fibrosis Gene: The classical genetic approach to finding the gene that is responsible for causing a genetic disease has been to first characterize the bio-chemical defect within the gene, then to identify the mutated protein in the gene of interest, and finally to locate the actual gene. However, this classical approach proved to be impractical when searching for the CF gene. To find the gene responsible for CF, the principle of "reverse genetics" was applied. Scientists accomplished this by linking the disease to a specific chromosome. After this linkage, they isolated the gene of interest on the chromosome and then tested its product.2 Before the disease could be linked to a specific chromosome, a marker needed to be found that would always travel with the disease. This marker is known as a Restriction Fragment Length Polymorphism or RFLP for short. RFLP's are varying base sequences of DNA in different individuals which are known to travel with genetic disorders.3 The RFLP for cystic fibrosis was discovered through the techniques of Somatic Cell Hybridization and through Southern Blot Electrophoresis (gel separation of DNA). By using these techniques, three RFLP's were discovered for CF; Doc RI, J3.11, and Met. Utilizing in situ hybridization, scientists discovered the CF gene to be located on the long arm of chromosome number seven. Soon after identifying these markers, another marker was discovered that segregated more frequently with CF than the other markers. This meant the new marker was closer to the CF gene. At this time, two scientists named Lap-Chu Tsui and Francis Collins were able to isolate probes from the CF interval. They were now able to utilize to powerful technique of chromosome jumping to speed up the time required to isolate the CF gene much faster than if they were to use conventional genetic techniques.3 In order to determine the exact location of the CF gene, probes were taken from the nucleotide sequence obtained from chromosome jumping. To get these probes, DNA from a horse, a cow, a chicken, and a mouse were separated using Southern Blot electrophoresis. Four probes were found to bind to all of the vertebrate's DNA. This meant that the base pairs within the probes discovered contained important information, possibly even the gene. Two of the four probes were ruled out as possibilities because they did not contain open reading frames which are segments of DNA that produce the mRNA responsible for genes. The Northern Blot electrophoresis technique was then used to distinguish between the two probes still remaining in order to find out which one actually contained the CF gene. This could be accomplished because Northern Blot electrophoresis utilizes RNA instead of DNA. The RNA of cell types affected with CF, along with the RNA of unaffected cell types were placed on a gel. Probe number two bound to the RNA of affected cell types in the pancreas, colon, and nose, but did not bind to the RNA from non-affected cell types like those of the brain and heart. Probe number one did not bind exclusively to cell types from CF affected areas like probe number two did. From this evidence, it was determined that probe number two contained the CF gene. While isolating the CF gene and screening the genetic library made from mRNA (cDNA library), it was discovered that probe number two

Tuesday, March 17, 2020

Learn About the Associative Property in Math

Learn About the Associative Property in Math According to the associative property, the addition or multiplication of a set of numbers is the same regardless of how the numbers are grouped. The associative property will involve 3 or more numbers. The parenthesis indicates the terms that are considered one unit. The groupings (Associative Property) are within the parenthesis. Hence, the numbers are associated together. In multiplication, the product is always the same regardless of their grouping. The Associative Property is pretty basic to computational strategies. Remember, the groupings in the brackets are always done first, this is part of the order of operations. Addition Example of the Associative Property When we change the groupings of addends, the sum does not change:(2 5) 4 11 or 2 (5 4) 11(9 3) 4 16 or 9 (3 4) 16Just remember that when the grouping of addends changes, the sum remains the same. Multiplication Example of the Associative Property When we change the groupings of factors, the product does not change:(3 x 2) x 4 24 or 3 x (2 x 4) 24.Just remember that when the grouping of factors changes, the product remains the same. Think Grouping! Changing the grouping of addends does not change the sum, changing the groupings of factors, does not change the product. Simply put, regardless of whether you show 3 x 4 or 4 x 3, the final result is the same. In addition, 4 3 or 3 4, you know that the outcome is the same, the answer remains the same. However, this is NOT the case in subtraction or division so when you think of the associative property, remember that the final result or answer remains the same or its not the associative property. The understanding of the concept of associative property is much more important that the actual term associative property. Titles often confuse students and youll discover that youll ask what the associative property is, only to be returned with a blank look. However, if you say to a child something like If I change the numbers in my addition sentence, does it matter? In other words, can I say 5 3 and 3 5, will the child that understands say yes because its the same? When you ask if you can do this with subtraction, theyll laugh or tell you that you cant do that. So in essence, a child knows about the associative property which is really all that matters even though you may stump them when you ask for a definition of the associative property. Do I care that the definition escapes them? Not at all, if they indeed know the concept. Lets not trip our students up with labels and definitions when concept understanding is the key ingredient in math.

Sunday, March 1, 2020

The Real Marketing Value of a Professional Book Cover

The Real Marketing Value of a Professional Book Cover Revealed: The Real Marketing Value of a Professional Book Cover Most self-published authors already understand the importance of great cover design. When it comes to marketing their book, the cover design is their primary sales tool, the face of their project, and the thing that can elevate them to a professional standard in the eyes of readers. But, if authors know this, why do so many still create their own book covers?Most often, it comes down to resources. Professionally designed book covers cost money (but not as much as you might think), and often, authors end up asking themselves: does a professional book cover actually get you more clicks and sales? The Professional Cover TestTo answer this question once and for all, we recently ran an experiment, in which self-published authors were invited to get their book covers re-designed by an experienced professional on Reedsy.Four titles from a range of genres were selected and entered into an A/B test: over the period of a week, we ran two Facebook ads for each book. Both ads were identical in every way - except for the cover image - and exposed to approximately 1,000 users from the same audience set. That way, we would discover how much the re-designed cover impacts the click-rate rate of an advert.On average, we saw a 35% increase in the marketability of books with professional covers.What does this mean? For each test, the professionally designed cover had a click-through rate that was 12.5–50% higher than their non-professional counterparts. Let’s take a quick look at each of the redesigns and let our designers explain their approaches.Once a Bridesmaid -   48% mo re clicksBuy The Fire Within on AmazonWhy do professional covers matter?An effective cover will get relevant readers responding to your ads and heading to your Amazon page. Once there, the design will communicate the tone and content of your book and get more (of the right) readers to buy or download it. This, in turn, improves your chances of positive reviews and ratings, which will send you up Amazon’s rankings, giving your book greater visibility, leading to even more downloads. More so than in most markets, self-publishing benefits heavily from the snowball effect.And we haven’t even touched on how your cover can be used for reader magnets  and crowdfunding campaigns!To see about maximize your book’s marketing potential, head over to the Reedsy Marketplace and request free quotes from over 200 experienced book designers with experience in almost every imaginable genre.Sign up for our free online marketing course and learn how to use Facebook advertising to market your own books.If you've had a re-design of your book cover - or if you've considered getting a professional cover but decided not to - share your thoughts in the comments below.

Thursday, February 13, 2020

International business management Essay Example | Topics and Well Written Essays - 2500 words

International business management - Essay Example . For executives and entrepreneurs, the significance appears remarkably apparent: markets are rapidly being borderless; schemes that fail to recognize the integration of the global market place are shortsighted and misguided (Root, 1994, p. 27). Firms that maneuver in international marketplaces require to come up with the most critical resolutions while selecting the most appropriate method of entrance into a country. Arguably, Westhead et al (2002, p. 123) notes that organizations must decide on the most fitting entry strategy in order to optimize on resources. Globalization, as described by Wood and Robertson (2004, p. 143), facilitates and necessitates businesses to move to other international markets. However, before deciding on the entry mode, it is essential to understand the country’s economic, social and political institutions. ... 24-26). There exist diverse strategies of entry into an overseas market. Every strategy has its own disadvantages and advantages. Nonetheless, each company and organization selects a suitable mode of entry depending on the company background, temperament of the company, tactical aims over and above the resources available. In numerous instances, while deciding on the appropriate mode of entry a company experiences many problems and challenges such as environmental, safety, packaging, patents, labeling, copyrights and trademarks (Cateora & Graham, 2002, p. 124). This paper delineates the most appropriate foreign entry strategy for Coffee product. In addition, it attempts to clarify issues arising in the international market selection for the product. Entry Mode Root (1994) describes a market entry strategy as the planned method of delivering and distributing goods and services to a target market (p. 24). A market entry strategy maps out how an organization sells, delivers and distribu te its products in a foreign country. Westhead et al (2002, p. 65) notes that when an organization chooses to explore an international market, the selection of the most appropriate strategy is resolved by the company’s development stratagem. The chief objective of each firm is to institute itself in the international marketplace (Cateora & Graham, 2002, p. 134). For this reason, Westhead et al (2002, p. 145) notes that the procedure of deciding on the most appropriate entry mode necessitates instituting an effectual international promotion stratagem to point out the international chances, discover reserves and potentialities and make use of nucleus capabilities to adopt the international stratagems. The resolution on how to penetrate an overseas market has momentous effect on

Saturday, February 1, 2020

Retail Industry in the UK for the Last Quarter of 2011 Essay

Retail Industry in the UK for the Last Quarter of 2011 - Essay Example The UK retail sector contributes 8% towards the country’s GDP which includes the UK retailers going overseas and expansion of e-commerce beyond the borders of the United Kingdom (Farfan, 2011). However, retailers in the UK face a huge challenge as they struggle to cope with the sudden deterioration in consumer demand and willingness to purchase. This report presents an in-depth analysis of the key factors that influence the development of the retail sector while evaluating which sectors offer the most potential. 2. Overview of the retail sector 2.1 Top retailers - UK The top four retailers in the UK include Tesco, Asda, Morrisons and Sainsbury and together they account for about 80% of the retail food sales in the UK (Farfan, 2011). Even though recession impacted the individual retail chains, there were not many substantial changes in the largest retail UK chains. The largest retail chains held their ranking order because there were no changes observed. Two major changes that occurred in 2011 in the UK retailing industry were that the apparel retailer Arcadia group and department store Debenhams lost their spots in the World’s largest retailing list completely. ... 2.2 Causes of decline in consumer shopping The retail sector witnessed a healthy start to 2011 as figures showed that sales on high street were up 9% year-on-year which provided a new boost to the British mid-market retailers (Sillitoe, 2011). Fashion sales, non-fashion trading and homeware sales had all witnessed growth in sales. However, the economic and survey data suggest a slowdown in activity, which poses a challenge for the UK retail sector. Following the recession the economic growth has been slow which reflects the weak consumer sector and the rising unemployment. The economy is expected to grow by 2.0% in 2012 but the retail sector continues to be grim (Retail Economics, 2011). Consumer spending had fallen for four consecutive quarters before September 2011. Consumer spending in the second quarter of 2011 declined by 1.7% compared with the same period last year. Real disposable incomes have been affected due to high levels of inflation and low earnings growth. Besides, taxe s have been imposed and benefits cut, which further affects the household disposable income. Fears about job security and personal finances have contributed to low consumer spending. The consumer spending is expected to slow down further as consumer debt rises, assisted by rising interest rates and inflation (Prospects, 2012) and stagnant wage growth and rising unemployment (Leach, 2011). House prices and job security also affect how people shop. Consumer confidence has waned because people will shop only if they feel optimistic about the situation. When they lack confidence in their own financial security, naturally the spending will be reduced. There has been a slow growth in the retail sector as the operating costs and the cost of credit have risen. The

Friday, January 24, 2020

Free Essay on Euthanasia and Physician-Assisted Suicide - Mother Teresa :: Euthanasia Physician Assisted Suicide

Mother Teresa's Little Sisters and Euthanasia In this essay we see Mother Teresa of Calcutta's Little Sisters of the Poor responding to the Europena Parliament's pro-euthanasia measure. In their response is found an insight into death which the Western world lacks. The Little Sisters are knowledgeable from personal experience with the many whom they have seen die. They are also firmly rooted in a strong religious tradition. Both of these considerations make their advice the very best one can hear in the euthanasia debate. "How can the Little Sisters of the Poor, in the service of the elderly, not be concerned about the passing of the principle of euthanasia by a Commission in the European Parliament? We feel that the confusion caused by the text pertaining to the use of extraordinary means to prolong life, palliative care and euthanasia can easily mislead an uninformed public. Yet behind these extremely complicated phrases, the thought is clear: to give doctors the right to satisfy the request for euthanasia, that is to say, to take a person's life. Human dignity does not consist in being able to choose the time of one's death, but in being aware of the fact that one's basic right is the right of respect for life, of respect for human dignity"(Little) The Little Sisters have 150 years of experience in accompanying the elderly up until the end of their lives, and by this experience they are authorized to make known to the public what they have seen and learned. Since their foundation, 17,080 Little Sisters have lived with the dying, and today they are in 30 countries on six continents, with 74 homes in France and Belgium, First World nations. So the dear sisters have expertise with the dying of both the Third World and our world. Making the elderly happy, that is what counts!" Mother Teresa used to say, encouraging the Little Sisters to attain this goal by employing means adapted to each person, to his/her possibilities, tastes, past life, health, etc. Making the elderly happy means believing in the value of their life, and the Little Sisters are witnesses of the extraordinary resources of the elderly. Having a center of interest, doing something they like to do, feeling useful, being able to take initiatives, to communicate, to form friendships, maintaining a facilitated relationship with the family, having contacts with youth: these are factors which provide joy and happiness.

Thursday, January 16, 2020

Cognitive Theory Detailed Outline

* Cognitive Theory Outline I. Theory: Cognitive Theory (CT) a. Key Concepts: i. The way a person’s mind collects and categorizes information is built into schemas. Those schemas help build associations with future thoughts, emotions and behaviors, as they determine how we categorize an experience. Schemas influence our recall of an experience (good or bad), our emotion (positive or negative), and our behavior (acceptance or avoidance), and how we relate it mentally to similar new situations that we encounter.If the schemas that are built within are faulty, they can cause a domino effect of inappropriate thoughts, emotions and behaviors until the faulty view is challenged and the old schema is replaced with a new one. ii. The most primitive schema houses our automatic thoughts. iii. Automatic thought can be visual or verbal. Other characteristics of the three types of automatic thought show that it; (1)is distorted, yet occurs although no evidence exists to support the distorte d thought (ex.Telling yourself you are the worst person in the world and believing it); (2) is a correct automatic thought, but the conclusion the patient draws isn’t (ex: I failed the test, so that means I’m stupid); or (3) is an accurate thought, but still dysfunctional (It will take me all night to finish his project! The behaviors associated with this thought becoming overwhelming and cause anxiety, which lessens the concentration and work output) (Murdock, 2009, p. 318). iv.Automatic thoughts are coexistent with our deeper thinking thoughts, as they are quick snapshots of thought that come about spontaneously without any reflective thought (Murdock, 2009, p. 318). v. CT Theory doesn’t believe that humans are innately good or bad, but rather neutral, whereby humans are seen as â€Å"organisms adapting to the environment† (Murdock, 2009, p. 319). vi. â€Å"CT assumes both an external, objective reality and a personal, subjective, phenomenological oneà ¢â‚¬  (Murdock, 2009, p. 319). vii. CT is most a â€Å"theory of psychological dysfunction† (Murdock, 2009, p. 319). viii.Murdock (2009) provides that Clark and Beck concluded that â€Å"cognitive processes evolved to enhance adaptation to the environment, and hence, survival (p. 319). ix. In CT, the â€Å"basic needs of humans are thought to be preservation, reproduction, dominance, and sociability’ (Murdock, 2009, p. 320). x. The cognitive model says that perception determines emotions and behavior. xi. Three types of cognitive processes that individuals have are; automatic (can be innate- suited to preservation and survival); conscious (the actual act of thinking), and metacognitive (an examination of how we think). ii. â€Å"Two kinds of cognitions are important in CT: core beliefs and assumptions, roles and attitudes† (Murdock, 2009, p. 323). xiii. CT theory asserts that human functioning is a product of what you learn and genetics. xiv. Recently, two ty pes of temperaments have been presented within the theory- autonomy and sociotrophy. Autonomous people strive towards mastery and control and rated self-worth and achievement without regard to others, while sociotrophic people rank themselves against others in terms of worth.These types approach thinking, and life differently based on their perspectives, therefore they feel and react differently. xv. CT recognizes that people can be illogically functional, meaning that you can function even if you have illogical beliefs, i. e. , someone who is functionally depressed. xvi. Issues are born in how an individual constructs his or her reality, which is based on â€Å"innate, biological, developmental, and environmental† factors (Murdock, 2009, p. 327). b. Key Theorists: xvii. Aaron Beck is the key theorist for Cognitive Theory.He also recognizes other cognitive theorists as influences, including Magna Arnold, George Kelly, and Albert Bandana. c. Appropriate Populations for the The ory: xviii. Appropriate populations for this theory may be those that need anger management, are suffering from depression, bipolar disease, manic depressives, substance abuse disorder, panic disorder, anxiety disorder, eating disorders, schizophrenics, personality disorders, and social phobias; Western populations, Chinese and other Asian populations . Inappropriate Populations for the Theory (Explain why. ) xix. Possibly some non-Western cultures, Latinos, Asians, American Indians, those that are highly spiritual, Indian populations, and those who are gay, lesbian, bisexual or transgendered may experience challenges with regard to this therapeutic approach. e. Therapist’s Role: xx.The therapist is to assess the client’s thoughts, get a full psychological evaluation, examine client cognition to bring awareness to client as a means for improving cognitive thinking (by asking questions that lead the client to arrive at a counselor predetermined destination, thus giving them ownership and responsibility), help the client make specific goals, analyze those goals from a CT prospective, develop a cognitive plan for clients, and teach the CT model. f.Client’s Role: xxi. The client is to establish goals for therapy, remain independent throughout the process, learn and implement the CT model and remain active and engaged in the therapeutic services. xxii. The client is a student who collaborates with the therapist, and eventually, leads therapy as sessions show proof of the client’s growth. g. Theory Strengths: xxiii. This theory’s roots â€Å"lie in both behavioral and psychoanalytic approaches† (Murdock, 2009, p. 319). xiv. CT is â€Å"structured active, collaborative, and psychoeducational† and â€Å"emphasizes a scientific approach† (Murdock, 2009, p. 332). xxv. â€Å"The goals of CT are to identify and change faulty information processing and to modify beliefs that support psychological dysfunction to ones that are more adaptive† (Murdock, 2009, p. 333). Rebuilding or rewiring thought processes as they relate to primal schemas should allow the individual to present with more adaptive behavior. xvi. Cognitive and behavioral techniques are used in CT. Some of those techniques include; questioning (socratic, or leading questions), downward arrow (diagram of thoughts, starting with those close to the surface and moving down to the core), thought recording (journal worksheet), behavioral environments (choosing behaviors that challenge faulty beliefs- ex: if you say I never have fun, choose to start oing things that you think would be fun), activity scheduling (build a calendar that keeps client engaged in life), graded tasks (breaking bigger tasks into smaller ones as to not be overwhelmed), problem solving, imagery (replacing negative images, or turning them off by interrupting the associated thought), role-playing (or behavior reversal). h. Theory Limitations: xxvii. The length of time can be considered a limitation of CT, as it is typically a short term intervention (Murdock, 2009, p. 332). xxviii.Change in schemas may need more time to occur than suggested in CT, specifically if the dysfunction resides in a core schema structure. xxix. The theory is difficult to use, as it may be harder to locate the root issues built within the deeper schemas. xxx. CT ignores the client’s emotion and history in favor of his thinking (Murdock, 2009, p. 343). i. Key Terms (Write a short definition for each. ): xxxi. Cognitive Therapy describes systems that highlight awareness and understanding of dysfunctions to bring about interventions and changes in the way people think, react, feel and behave. xxii. â€Å"Schemas are cognitive structures that organize the barrage of information with which we are constantly confronted† (Murdock, 2009, p. 320) xxxiii. Stereotype threat is â€Å"the anxiety aroused by the prospective risk of believing and confirming a negativ e stereotype about yourself because you belong to a group that has been negatively stereotyped â€Å"(ex: poor people are uneducated) (Murdock, 2009, p. 322). xxxiv. Core beliefs are stored within our schemas, and contain our most basic, fundamental beliefs, and are therefore the hardest to modify. xxv. Immediate beliefs are â€Å"assumptions, rules and attitudes† about what â€Å"should† and â€Å"must† be (Murdock, 2009, p. 323). xxxvi. Simple schemas involve â€Å"physical objects or very distinct, simple, ideas, such as dogs, books, computers and so forth† (Murdock, 2009, p. 323). xxxvii. Automatic thoughts are spontaneous assessments or pictures that exist along with our more conscious, deeper thoughts (Murdock, 2009, p. 323). xxxviii. The mode is defined as â€Å"networks of cognitive, affective, motivational, and ehavioral schemas that compose personality and interpret ongoing situations† (Murdock, 2009, p. 324). xxxix. The conscious contro l system is responsible for metacognition and intentional behavior, such as that based on personal goals and values (Murdock, 2009, p. 324). xl. Primal modes promote preservation, survival, reproduction, and sociability. (Murdock, 2009, p. 324). 1. There are four types are primal modes; threat, loss, victim (evolved to protect and preserve survival) and self-enhancement (helps the person adapt) (Murdock, 2009, p. 24). xli. Primary modes that are dysfunctional are caused by changes in environmental factors. Those changes caused a reaction in the individual which may present as a person with dysfunctional thinking. xlii. Constructive modes help you build through the experiences you encounter as you live. â€Å"They are associated with positive emotions and adaptive characteristics and include (a) the capacity for intimacy, (b) personal mastery, (c) creativity, and (d) independence† (Murdock, 2009, p. 25). xliii. Minor modes are conscious and narrowly â€Å"focused on everyday life situations, such as reading, writing, social interaction, athletic activities† (Murdock, 2009, p. 325). xliv. Photoschemas are â€Å"inmate patterns that interact with experience to develop the modes†, as the modal theory explains (Murdock, 2009, p. 326). xlv. Health is â€Å"information processing that allows the individual to meet his goals of survival, reproduction, and sociability† (Murdock, 2009, p. 327). xlvi.Cognitive triad is the â€Å"depressive’s negative views towards the self, the world, and the future† (ex: I’m a bad person, the world caused me to be this way, and we’re all going to hell. ) (Murdock, 2009, p. 328). j. Is this theory research based? Evidenced based? (Justify your rationale. ) xlvii. This theory is research based, as Murdock shares that â€Å"Cognitive Therapy is perhaps that most well-researched counseling approach in existence, with an overwhelming amount of empirical support for its effectiveness wi th a variety of client problems. She also notes that the â€Å"evidence for the theoretical assumptions and structure is less impressive† (Murdock, 2009, p. 344). k. Special training requirements: xlviii. This therapy requires the therapist to be culturally aware and sensitive the client’s needs. Reference Murdock, N. L. (2009). Theories of counseling and psychotherapy: a case approach (2nd Ed. ). Upper Saddle River, NJ: Pearson Education.

Wednesday, January 8, 2020

USS Bunker Hill (CV-17) in World War II

An Essex-class aircraft carrier, USS Bunker Hill (CV-17) entered service in 1943. Joining the US Pacific Fleet, it supported Allied efforts during the island-hopping campaign across the Pacific. On May 11, 1945, Bunker Hill was severely damaged by two kamikazes while operating off Okinawa. Returning to the United States for repairs, the carrier would largely be inactive for the remainder of its career. A New Design Conceived in the 1920s and early 1930s, the US Navys Lexington- and Yorktown-class aircraft carriers were designed to conform to the restrictions set forth by the Washington Naval Treaty. This pact placed limitations on the tonnage of various types of warships as well as capped each signatorys overall tonnage. These types of restrictions were affirmed through the 1930 London Naval Treaty. As global tensions escalated, Japan and Italy left the treaty structure in 1936. With the failure of the treaty system, the US Navy began creating a design for a new, larger class of aircraft carrier and one which used the experience gained from the Yorktown-class. The resulting vessel was wider and longer as well as incorporated a deck-edge elevator system. This had been employed earlier on USS Wasp (CV-7). The new class would typically carry an air group of 36 fighters, 36 dive bombers, and 18 torpedo planes. This included the F6F Hellcats, SB2C Helldivers, and TBF Avengers. In addition to possessing a larger air group, the class featured a greatly enhanced anti-aircraft armament. Construction Designated the Essex-class, the lead ship, USS Essex (CV-9), was laid down in April 1941. This was followed by several additional carriers including USS Bunker Hill (CV-17) which was laid down at the Fore River Shipyard in Quincy, MA on September 15, 1941 and named for the Battle of Bunker Hill fought during the American Revolution. Work on Bunker Hills hull continued into 1942 following the United States entry into World War II. Bunker Hill slid down the ways on December 7 of that year, on the anniversary of the attack on Pearl Harbor. Mrs. Donald Boynton served as sponsor. Pressing to complete the carrier, Fore River finished the vessel in the spring of 1943. Commissioned on May 24, Bunker Hill entered service with Captain J.J. Ballentine in command. After concluding trials and shakedown cruises, the carrier departed for Pearl Harbor where it joined Admiral Chester W. Nimitzs US Pacific Fleet. Sent west, it was assigned to Rear Admiral Alfred Montgomerys Task Force 50.3. USS Bunker Hill (CV-17) - Overview Nation: United StatesType: Aircraft CarrierShipyard: Bethlehem Steel Company, Quincy, MALaid Down: September 15, 1941Launched: December 7, 1942Commissioned: May 24, 1943Fate: Scrapped Specifications Displacement: 27,100 tonsLength: 872 ft.Beam: 147 ft., 6 in.Draft: 28 ft., 5 in.Propulsion: 8 Ãâ€" boilers, 4 Ãâ€" Westinghouse geared steam turbines, 4 Ãâ€" shaftsSpeed: 33 knotsRange: 20,000 nautical miles at 15 knotsComplement: 2,600 men Armament 4 Ãâ€" twin 5 inch 38 caliber guns4 Ãâ€" single 5 inch 38 caliber guns8 Ãâ€" quadruple 40 mm 56 caliber guns46 Ãâ€" single 20 mm 78 caliber guns Aircraft 90-100 aircraft In the Pacific On November 11, Admiral William Bull Halsey directed TF 50.3 to join with Task Force 38 for a combined strike on the Japanese base at Rabaul. Launching from the Solomon Sea, aircraft from Bunker Hill, Essex, and USS Independence (CVL-22) hit their targets and defeated a Japanese counterattack which resulted in the loss 35 enemy aircraft. With the conclusion of operations against Rabaul, Bunker Hill steamed to the Gilbert Islands to provide cover for the invasion of Tarawa. As Allied forces began moving against the Bismarcks, the carrier shifted to that area and conducted strikes against Kavieng on New Ireland. Bunker Hill followed these efforts with attacks in the Marshall Islands to support the invasion of Kwajalein in January-February 1944. With the capture of the island, the ship joined with other American carriers for a massive raid on Truk in late February. Overseen by Rear Admiral Marc Mitscher, the attack resulted in the sinking of seven Japanese warships as well as several other vessels. Serving in Mitschers Fast Carrier Task Force, Bunker Hill next conducted attacks on Guam, Tinian, and Saipan in the Marianas before hitting targets in the Palau Islands on March 31 and April 1. Battle of the Philippine Sea After providing cover for General Douglas MacArthurs landings at Hollandia, New Guinea in late April, Bunker Hills aircraft conducted a series of raids in the Caroline Islands. Steaming north, the Fast Carrier Task Force began attacks in support of the Allied invasion of Saipan. Operating near the Marianas, Bunker Hill took part in the Battle of the Philippine Sea on June 19-20. On the first day of the fighting, the carrier was struck by a Japanese bomb which killed two and wounded eighty. Remaining operational, Bunker Hills aircraft contributed to the Allied victory which saw the Japanese lose three carriers and around 600 aircraft. Later Operations In September 1944, Bunker Hill struck targets in the Western Carolines before mounting a series of attacks on Luzon, Formosa, and Okinawa. With the conclusion of these operations, the carrier received orders to depart the war zone for an overhaul at Bremerton Naval Shipyard. Reaching Washington, Bunker Hill entered the yard and underwent routine maintenance as well as had its anti-aircraft defenses enhanced. Departing on January 24, 1945, it steamed west and rejoined Mitschers forces for operations in the Western Pacific. After covering the landings on Iwo Jima in February, Bunker Hill took part in raids against the Japanese home islands. In March, the carrier and its consorts shifted southwest to aid in the Battle of Okinawa. Steaming off the island on April 7, Bunker Hills aircraft took part in defeating Operation Ten-Go and aided in sinking the battleship Yamato. While cruising near Okinawa on May 11, Bunker Hill was hit by a pair of A6M Zero kamikazes. These caused several explosions and gasoline fires which began to consume the ship and killed 346 sailors. Working valiantly, Bunker Hills damage control parties were able to bring the fires under control and save the ship. Badly crippled, the carrier departed Okinawa and returned to Bremerton for repairs. Arriving, Bunker Hill was still in the yard when the war ended in August. Final Years Putting to sea in September, Bunker Hill served in Operation Magic Carpet which worked to return American servicemen home from overseas. Deactivated in January 1946, the carrier remained at Bremerton and was decommissioned on January 9, 1947. Though reclassified several times over the next two decades, Bunker Hill was kept in reserve. Removed from the Naval Vessel Register in November 1966, the carrier saw use as a stationary electronics test platform at Naval Air Station North Island, San Diego until being sold for scrap in 1973. Along with USS Franklin (CV-13), which was also badly damaged late in the war, Bunker Hill was one of two Essex-class carriers that saw no active service with the postwar US Navy.