Tuesday, August 25, 2020

The wall Essay Example

The divider Essay The short story, The Wall, by Jean-Paul Sartre, is a story told infirst individual continuous flow. The fundamental character in the story , is a political detainee. The characters name is Pablo, and he is being held, alongside three different detainees, during the Spanish Civil War. The detainees are detained in a medical clinic that is being utilized by the Spanish Fascists.The story is a refection of, Jean-Paul Sartres philosophical convictions in existentialism. Proof ofSartres, convictions can be found in his utilization of: setting, character, topic, abstract gadgets. Sartre was an example of skeptical existentialism: Existence is preceding quintessence. Man is nothing during childbirth and for an amazing duration he is close to the aggregate of hispast duties. To trust in anything outside his own will is to be blameworthy of dishonesty. Existentialist despondency and anguish is the affirmation that man is sentenced to opportunity. There is no God, so man must depend upon his o wn error prone will and moral understanding. He can't circumvent picking. The setting in the story is a jail cell containing two other men, Tom and Juan. The cell is a dull virus place. Actually, our cell was one of the medical clinic basements. It was marvelously cold there due to the drafts. We shuddered the entire night and it wasnt much better during the day;There was a seat in the basement and four mats. At the point when they took us back we sat and held up Page 2 in silence.;The setting is critical to the existentialist view, since Sartre accepted that people were ;sentenced to opportunity;, and by utilizing a cell, Sartre could be speaking to the world, in which he, accepts is reality . The possibility of jail is frequently connected to being a position of control, and to be detained is to be bolted away from opportunity. Based o

Saturday, August 22, 2020

De-Scalers Essay

At the point when water is warmed limescale stores can frame, particularly in machines, for example, completely programmed espresso creators, coffee machines and all high temp water units. In this setting you regularly find out about hard and delicate water. The hardness of the water shows the extent of limescale. Your water gracefully organization will give more data about hardness of your water. On the off chance that your groundwater courses through calcareous stone layers, dissolved magnesium and calcium carbonate will cause limescale stores in your water. For what reason do I have to expel limescale? Notwithstanding loss of espresso flavor limescale stores can seriously harm your machine and abbreviate its life expectancy altogether. Limescale stores in your machine lead to: Longer burning time with higher power charges Lower water temperatures causing substandard espresso flavor Blocked machines pipe Corrosion of metal parts and fixing gaskets Expensive fixes Only normal and ideal descaling with a great descaler, for example, ceragol ultra Premium Descaler, guarantees a long life expectancy and ideal espresso flavor. Your espresso producer is an innovative machine which needs standard, delicate consideration. What do you anticipate from your descaler? Limescale stores are expelled by acids in the descaler. Just the correct blend of viable acids and delicate added substances for the metal parts and fixing gaskets takes into account ideal outcomes during descaling. The fast response time and quick reusability of the machine in the wake of washing are fundamental requests on a premium descaler. Why amidosulfonic corrosive? Descaling with citrus or acidic acids The large issue while descaling with citrus or acidic acids are the discharged flavor added substances which cause a prominent smell during descaling. The plastic pieces of your completely mechanized espresso producer tend to taken on these scents and impact the smell and taste of your espresso contrarily. Plastic parts and fixing gaskets of your unit can be assaulted by the vinegar or acidic corrosive. Citrus extract will in general chip during descaling. This can obstruct the valves and water channels and lead to high fix charges. An extra issue is that the limescale is really fixed in by a constant layer which happens more than once when utilizing descalers dependent on citrus extracts. Descaling with vinegar, acidic corrosive or citrus extract takes altogether longer than descaling with ceragol ultra Premium Descaler. Descaling with amidosulfonic corrosive Descaling with amidosulfonic corrosive, the dynamic element of our ceragol ultra Premium Descaler, doesn't require any response time. During the descaling program the limescale is broken down and flushed away. This procedure is totally scentless and nonpartisan in taste. After intensive flushing your machine is by and by food-safe. The added substances in ceragol ultra Premium Descaler monitor and secure the metal and plastic segments of your completely programmed espresso producer. The opportune chance to descale Automatic espresso machine w. auto descaling marker Please get some information about the hardness of your water and set the water hardness as per the working directions of your maker. Your machine will demonstrate when descaling is required. Programmed espresso machine w/o descaling marker Descaling gets vital when you notice a postponement in activity or abnormalities during espresso arrangement. Another indication is the decrease of the measure of froth delivered on the espresso. The machine must be descaled occasionally and in due time.

An analysis of Information Security Governance in the Universities in Zimbabwe Essay Example for Free

An examination of Information Security Governance in the Universities in Zimbabwe Essay Conceptual The multifaceted nature and criticality of data security and its administration request that it be raised to the most elevated hierarchical levels. Inside a college arrangement, data resources incorporate understudy and work force records, wellbeing and budgetary data, explore information, educating and learning materials and all confined and unhindered electronic library materials. Security of these data resources is among the most elevated needs as far as hazard and liabilities, business coherence, and assurance of college notorieties. As a basic asset, data must be dealt with like some other resource basic to the endurance and achievement of the association. In this paper the essayist will talk about the requirement for actualizing Information Security Governance inside establishments of advanced education. Farther than that, a conversation on the best way to best practice Information Security administration inside the colleges in Zimbabwe followed by an evaluation on how far the Zimbabwean colleges have actualized Information Security Governance. A blend of polls and meetings will be utilized as an instrument to assemble information and a few suggestions are expressed towards the finish of the paper. Presentation Administration, as characterized by the IT Governance Institute (2003), is the â€Å"set of duties and practices practiced by the board and official administration with the objective of giving vital course, guaranteeing that destinations are accomplished, discovering that dangers are overseen suitably and confirming that the enterprise’s assets are utilized responsibly.† Information security administration is the framework by which an association coordinates and controls data security (adjusted from ISO 38500). It indicates the responsibility structure and gives oversight to guarantee that dangers are enough alleviated just as guaranteeing that security methodologies are lined up with business and predictable with guidelines. To practice powerful venture and data security administration, sheets and senior officials must have an away from of what's in store from their enterprise’s data security program. They have to know how to directâ the usage of a data security program, how to assess their own status as to a current security program and how to choose the procedure and destinations of a powerful security program (IT Governance Institute, 2006). Partners are turning out to be increasingly more worried about the data security as updates on hacking, information robbery and different assaults happen more much of the time than any time in recent memory longed for. Official administration has been showered with the obligation of guaranteeing an association furnishes clients with secure data frameworks condition. Data security isn't just a specialized issue, however a business and administration challenge that includes satisfactory hazard the board, revealing and responsibility. Successful security requires the dynamic contribution of officials to survey rising dangers and the organization’s reaction to them (Corporate Governance Task Force, 2004). Moreover the associations need to ensure themselves against the dangers inborn in the utilization of data frameworks while all the while perceiving the advantages that can gather from having secure data frameworks. Diminish Drucker (1993) expressed: â€Å"The dispersion of innovation and the commodification of data changes the job of data into an asset equivalent in significance to the generally significant assets of land, work and capital.† Accordingly as reliance on data framework expands, the criticality of data security carries with it the requirement for viable data security administration. Requirement for Information Security Governance inside colleges. A key objective of data security is to lessen unfriendly effects on the association to a satisfactory degree of hazard. Data security ensures data resources against the danger of misfortune, operational brokenness, abuse, unapproved divulgence, detachment and harm. It likewise secures against the ever-expanding potential for common or lawful obligation that associations face because of data error and misfortune, or the nonattendance of due consideration in its assurance. Data security covers all data forms, physical and electronic, in any case whether they include individuals and innovation or associations with exchanging accomplices, clients and outsiders. Data security tends to data insurance, secrecy, accessibility and trustworthiness for the duration of the existence pattern of the data and its utilization inside the association. John P. Pironti (2006) recommended that among numerous explanations behind data securityâ governance, the most significant one is the one worried about the lawful obligation, insurance of the organization’s notoriety and administrative consistence. With the college arrangement, all individuals from the college network are committed to regard and, by and large, to secure secret information. Clinical records, understudy records, certain business related records, library use records, lawyer customer interchanges, and certain exploration and other licensed innovation related records are, subject to constrained special cases, classified as an issue of law. Numerous different classifications of records, including workforce and other faculty records, and records identifying with the universitys business and funds are, as an issue of college approach, treated as secret. Frameworks (equipment and programming) structured basically to store secret records, (for example, the Financial Information System and Student Information System and every single clinical record frameworks) require upgraded security insurances and are controlled (key) frameworks to which access is firmly checked. Systems give association with records, data, and different systems and furthermore require security assurances. The utilization of college data innovation resources in other than a way and with the end goal of which they were proposed speaks to a misallocation of assets and, conceivably, an infringement of law. To accomplish this in today’s unpredictable, interconnected world, data security must be tended to at the most significant levels of the association, not viewed as a specialized claim to fame consigned to the IT office. Data security is a top-down procedure requiring a complete security methodology that is unequivocally connected to the organization’s business procedures and system. Security must address whole organization’s forms, both physical and specialized, from start to finish. Thus, Information security administration requires senior administration duty, a security-mindful culture, advancement of good security practices and consistence with strategy. It is simpler to purchase an answer than to change a culture, yet even the most secure framework won't accomplish a critical level of security whenever utilized by poorly educated, undeveloped, imprudent or unconcerned faculty (IT Governance Institute, 2006). In a meeting the official executive and data security master on IT Governance and digital security with the IT Governance and Cyber Security Institute of sub-Saharan Africa, Dr Richard Gwashy Young has this to state â€Å"†¦remember in Zimbabwe security is viewed as a cost not an investment† (Rutsito, 2012). Advantages of Information Security Governance Great data security administration produces noteworthy advantages, including: The Board of executives assuming full liability for Information security activities Increased consistency and diminished vulnerability of business tasks by bringing data security-related dangers down to quantifiable and adequate levels Protection from the expanding potential for common or legitimate obligation because of data incorrectness or the nonappearance of due consideration. The structure and system to streamline assignment of restricted security assets Assurance of powerful data security strategy and approach consistence A firm establishment for proficient and compelling danger the executives, process improvement, and quick occurrence reaction identified with making sure about data A degree of confirmation that basic choices are not founded on broken data Accountability for defending data during basic business exercises. Compliances with neighborhood and global guidelines will be simpler Improved asset the executives, streamlining information, data security and data innovation framework The advantages increase the value of the association by: Improving trust in client/customer connections Ensuring the organization’s notoriety Diminishing probability of infringement of security Furnishing more noteworthy certainty while collaborating with exchanging accomplices Enabling new and better approaches to process electronic exchanges like distributing results on the web and online enlistment. Decreasing operational expenses by giving unsurprising outcomesâ€mitigating hazard factors that may interfere with the procedure The advantages of good data security are not only a decrease in chance or a decrease in the effect should something turn out badly. Great security can improve notoriety, certainty and trust from others with whom business is led, and can even improve productivity by keeping away from sat around and exertion recuperating from a security occurrence (IT Governance Institute, 2004). Data Security Governance Outcomes Five fundamental results can be required to come about because of building up a compelling administration way to deal with data security: Strategic arrangement of data security with institutional targets Reduction of hazard and potential business effects on an adequate level Value conveyance through the advancement of security speculations with institutional goals Efficient usage of security investm

Friday, August 21, 2020

Inattentiveness in School Research Paper Example | Topics and Well Written Essays - 1000 words

Heedlessness in School - Research Paper Example The youngsters going to class are the most influenced by heedlessness particularly in situations where they have no alternative however to strain so as to meet the school necessities as far as execution. They show up not to respond at all to any circumstance they experience. They are probably going to encounter issues when finishing assignments (World Health Organization 19). It is obvious that such issue may not effectively be seen until in a later phase of life. The issue if unattended to influences the general execution and social characteristics of a person. They wind up lacking non-verbal relational abilities as they are not mindful to issues in class from which they are relied upon to figure out how to communicate. This issue has made a large portion of the understudies to set aside a more drawn out effort to figure out how to communicate them as they wind up having low confidence. Truly, they seem ungainly and less intuitive among their friends. Their mod of cooperation has al l the earmarks of being an odd one that is seen where they portray explicit conduct that has all the earmarks of being confined to them. Carelessness is brought about by an assortment of components and it ought not be accepted that it starts in class since there is a likelihood that it starts outside the class and just stretched out to the study hall setting. For example, when kids are taken to the kindergarten, they are exceptionally anxious to learn just to learn on data they are now mindful of. This causes them to learn quicker than the normal student who needs to rehash a few times so as to comprehend. With time the fast students become less mindful to what they definitely know overlooking the new data that is probably going to be inferred. He normal students, then again, see this as requesting and cerebrum desensitizing and with time they likewise become inattentive.â

Thursday, August 6, 2020

The Day My Dad Didnt Make it Home from Work - by Marianne Worley, Business Writing Consultant at The Essay Expert

The Day My Dad Didnt Make it Home from Work - by Marianne Worley, Business Writing Consultant at The Essay Expert [Reposted with the permission of the very talented business/marketing writer Marianne Worley, consultant at The Essay Expert. This poignant story was originally posted on her blog, Marketing Matters and Other Stories. I didnt even have to think before asking her if I could post it to The Essay Experts blog on Memorial Day.] The day was Monday, April 21, 2008. My phone rang just after 9pm. I checked the caller IDâ€"it was my brother Nolan. Instinctively, I knew something was wrong, very wrong. My Dad had been in an accident and was being taken to a hospital about 20 miles north of my house. We didn’t know anything more. I quickly got dressed, jumped in my car, and hit the gas pedal. About 5 minutes later, my brother called again. Now Dad was being transported by helicopter to the much larger hospital just a few miles from my house. I got off the freeway and drove back the other way. My brother, sister-in-law, and I arrived at the hospital around the same time. The helicopter was still in flight, so we staked out seats in the busy emergency room to wait, still perplexed about what had happened to our Dad. After my stepmom and sister rushed in, we learned the whole story. My Dad usually came home from work around 5 or 6, so when it started to get dark and he still wasn’t home, my stepmom picked up the phone to make some increasingly frantic calls. My Dad was notorious for sporadically answering cell calls. As a contractor, he was constantly breaking and losing mobile phones. She wasn’t surprised when he didn’t answer, so she dialed his friends and clients. He had left the job site hours earlier, but no one knew where he was. My stepmom and sister decided to drive to the job site to look for him. They found his empty work truck on the side of the road with the driver’s side door open. They called 911 and nearby friends who could help with the search. There was a small creek parallel to the road with a steep bank covered in thick, muddy vegetation. My athletic sister charged down the hill and found him lying unconscious in the creek, pale and covered with dirt. The paramedics pulled him up on a rescue stretcher and loaded him into the helicopter. This process doesn’t take a few minutes, like it does on TV and in the movies. The rescue actually took more than an hour. The helicopter finally arrived, but still we knew nothing about his condition. We assumed it was a stroke, or something similar. When they finally let us in to see him, we discovered that he had suffered some sort of episode, possibly a seizure, and was experiencing pronounced weakness on one side of his body. It looked like a stroke, but he was stable. So they admitted him and scheduled an MRI for the next morning. The following day, the doctors confirmed that the MRI results showed that it looked like a stroke. We felt relieved. We knew a brain tumor would be a much more deadly diagnosis. But they still wanted to get a new MRI, with contrast, the next day to be sure. On Wednesday, April 23, 2008, our lives changed forever. The new MRI showed that it wasn’t a strokeâ€"it was a brain tumor. They called in a neurosurgeon for a consultation. My education in neurology commenced that day. I carried a notebook at all times. I scribbled down details from the doctors during the day and did online research at night. Over the next 7 months, my Dad had a biopsy and was diagnosed with glioblastoma multiforme, the most aggressive form of brain cancer. Our doctor decided to treat with radiation and chemotherapy, not surgery. I knew that without surgery, the 6-month survival rate was almost zero. When I pressed him, he said he could do the surgery if we got a second opinion from one of the neurosurgeons he recommended. After many phone calls, I got an appointment with one of the top experts in the country at Cedars-Sinai in Los Angeles. The neurosurgeon just needed to see my Dad’s (now enormous) medical file, along with all of his MRI results. We got his opinion, and my Dad had surgery to remove the tumor. Although the surgery was successful, he still needed radiation and chemo to stave off regrowth, which is incredibly common. I researched clinical trials and spoke to doctors at UCLA and UC San Francisco. My Dad didn’t qualify for any trials and his prognosis was grave. By September, the tumor was back, bigger than before. We tried some experimental chemo drugs, but nothing helped. My Dad wasted away before our eyes, until we finally called in hospice care in November. On December 3rd, the hospice nurse told us that the end was near, so we gathered together to say goodbye. We stayed up pretty late, but finally succumbed to our own fatigue and reluctantly went to bed. Just before 4:30am, I awoke suddenly and sat bolt upright. I went downstairs and the nurse told me she had just checked on my Dadâ€"he was still hanging in there. When I went to his bedside, I touched his hands and face. I didn’t think he was breathing, so I woke up my stepmom, who had decided to take a quick nap just minutes before. He was gone. We all gathered around his bed and cried again. A week or so later, my sister Whitney and I, always the Daddy’s-Little-Girl types, decided to get tattoos to celebrate our Dad’s life. She got an elegant “W” and I got an infinity sign with a “W” in the middle. Worley forever. My Dad was never called to battle in Vietnam, but that doesn’t mean he didn’t fight a war. So on this Memorial Day, I remember all who have fallen in war, including the continuing war on cancer. ____________________ I haven’t met anyone who hasn’t been touched in some way by cancer. The next time you’re thinking about making a cash donation to a charity, please consider one of the organizations in the fight against cancer, including the American Brain Tumor Association. Thanks for reading this very personal story. I’m sharing it because it shaped who I am today. Many thanks to my fellow blogger The JackBâ€"his post from yesterday inspired me to write this. I haven’t met anyone who hasn’t been touched in some way by cancer. The next time you’re thinking about making a cash donation to a charity, please consider one of the organizations in the fight against cancer, including the American Brain Tumor Association.

Sunday, June 28, 2020

The use of Mean Variance Analysis in the economy - Free Essay Example

It is a very important for an investor to analyse the decision of selecting the investment options before actually executing the choice. Also, it is even more imperative to follow the right approach to reach the correct investment option. Harry Markowitz in 1952 introduced the notion of mean variance analysis to quantify the risk before effectively deciding on the portfolio. Again, the idea was to look for the maximum return corresponding to the minimum risk (Markowitz et. al., 2000). This essay focuses on the importance of mean variance analysis while selecting the individual assets for the portfolio. In addition, it will traverse through different aspects of the same. The primary objective of the essay is to understand its importance in the portfolio selection. Also, it will focus on critical issue involved with the analysis in different background. Moreover, it will highlight the limitations and advantages of its use complemented with the brief discussion on the technical issue in between. The essay will start with general discussion describing the asset and its classes and then, will introduce the points for the necessity for its use. It will also highlight the importance of extraordinary events in between along with the small but, critical issues like currency fluctuation. Finally, it will put some light on the advancement in the same area and try to critically analyse the weakness of the mean variance framework in the real world. GENERAL DISCUSSION For the investors in the developed markets the broadly observed investment are classified as: (1) Stocks/Equity (2) Bonds (debt) (3) cash or cash equivalents and (4) Property/Real Estate. This can be further extended into subcategories depending on the specific needs of particular investor (Fabozzi, F., J., 2009:4-6). Similarly, the assets can be categorised in risky and Risk free assets. For example, stock of a company in the equity market is a risky asset while, 1 year bond of US government is risk free because it is almost sure that the returns on the bond will be materialised in future to a very good certainty (Fabozzi, F., 2009: 15-18). APPLICATION OF MEAN VARIANCE ANALYSIS The importance of financial scrutiny of investment options is clear from the fact that, it is an essential part of the investment process to choose the most appropriate from a variety of options. Whether, it is a small scale investment by an investor via any broker in the US equity market or a large scale investment by the large investors in infrastructure bonds of Australia (Brown, C., 2005: 431-438). The investigative approaches used for minimising the financial risk while, choosing the portfolio encourages the analysts to look for the proper economic agents for sharing the risk. Taking mean variance as the bases for studying the portfolio risk and return for the US investors Liu (2010) pointed to the gains made by them while holding the foreign corporate bonds. As the economies are transforming into more globalised ones, the application of such methods is becoming more important. In the light of financial meltdown during the year 2008, the significance of diversifying the por tfolio again got highlighted. In brief, pooling of assets from different background is widely practiced approach and so is the utilization of data for the analysis of variety of assets. While studying the US Stock and bond market Chordia et. al. (2005: 92-93) mentioned that returns in assets are affected by lot of factors. The complexities of analysing the return are clear from the details in his work. For Example, time of investment corresponding to the specific circumstances of economic cycle such as recession or boom. Again, aspect of investment like economic vulnerabilities of the potential investment opportunity, external vulnerabilities such as Russian default crises in 1998 especially, when the examined seek after asset is exposed to such external factors determines the final realised return. For this reason, the analysis of returns is requires good amount of statistical and fundamental analysis. Consequently, risk and return is now considered to be a specialised area of w ork for the finance professionals. Going into more detailed examination of the Mean Variance Analysis for portfolio selection Campbell et. al. (2004:1-3) found that, predictability of return with respect to the time is complex; nonetheless, the shift over a period of time is supposed to be fairly estimated within a band of uncertainty. Though, the exercise of statistical or fundamental testing heavily relies on certain assumptions. For instance, data for the past will almost reflect the same proposition for the future analysis, the probability of unexpected events like collapse of Lehman brothers is rare phenomenon and so on. Despite, all the ambiguity in the analytical work researchers like Samuelson (1969:50-55) argued that, the empirical analysis gives fair degree of plan to the investors while considering the long term or short term investment strategies. As pointed above, the analysis can also be applied in cross country analysis to achieve greater information lead before investing. Following the same CAPM model and optimizing the mean-variance relationship Fidora et.al. (2006:4-10) concluded that, there is significant degree of home biasness occurs in the investment decisions. The currency fluctuation adds additional risk while choosing the foreign assets unless the real foreign currency exchange rate is negatively correlated to the realised returns on foreign assets. This suggests that the risk return analysis points towards greater home biasness for higher degree of volatility in a currency and vice versa. This is endorsed by the study by French et. al. (1991:222-226). They had found that, almost 98 percent of holdings in Japan was by domestic investors similarly, the figure stands at 94 and 82 percent for the US and UK market. Diversification of Portfolio and Important Issues According to Martellini et. al. (2007:3-4) standard mean variance technique suffers from several limitations such as, parameter uncertainty and non-normal asset distribution. Hence, the more robust techniques are needed for taking advantage of the diversification. While arguing on the case of mixing the hedge fund with the traditional investment opportunities Terhaar et. al. (2003) shown that volatility or in other words risk get decreased for a particular level of return. Furthermore, the hedge funds found to have low correlation with traditional investment opportunities. Alternatively, going into the technicality of the mean variance practice if, the volatility is minimised in the statistical model then, it is accompanied by a significant amount of increase in extreme risk with fatter tails (Sornette et. al., 2000). Accordingly, in the case of fat tailed return functions, the usability of the mean variance technique does not seems to be optimal solution and consequently leadin g to significant loss of its utility (Cremers et. al., 2004:1-4,18-19). Furthermore, a number of times it is quite difficult for the researcher to collect the appropriate data for the study. Parameter estimation is tedious task in the absence of data for required period of time. In addition, the difficulty in finding the relevant data for the relevant regularity also adds to the uncertainty in the parameter estimation. This suggests that it is quite difficult to estimate the expected return within a reasonable estimation error in the real world of scarce data (Fung et.al., 1997:375-302). Nonetheless, progress by Black and Litterman (1991:7-18) in the static mean variance setting, to estimate the uncertainty on the return in terms of deviation while analysing the investment opportunities optimized the scrutiny process to an extent. To put it more simply they had simply added the parameter for psychological side of the trading namely, the inclusion of confidence level and individua l beliefs on the prior distribution and estimating the joint distribution in the model. The simplicity of his approach has been widely acknowledged and has been used by analysts to decide on the assets while deciding for the portfolio. Idzorek (Jul, 2004: 1-3, 27) confirmed the same in his research and stated that the psychological part in the active asset allocation should weigh significantly. In other words the study summarized the fact that, all the new work on the mean variance framework has fixed the weaknesses like negligence of intuitiveness, unintended portfolio concentration and error estimation. Extending the Discussion (Parallel Issues) Taking the conversation to the another plane, many of the quantitative analysts and researchers in finance pointed to the facts that, the accuracy of the mean variance result depends notably on the factors like interest rates and dividend yields (Breen et. al., 1990: 1177-1189). But, the complications of the real world are very difficult to elucidate in simple mean variance practice. There are many issues like currency, tax and transaction which can make the mean variance analysis merely a statistical exercise for active portfolio allocation (Harvey et. al., 1992). Keeping the above points in mind Leon (2008:272) conveyed the similar point in the context of selected emerging market including Greece, Korea, Thailand, Indonesia, Argentina and Brazil. Interestingly, he deducted a very puzzling point that, in these markets the relationship between the future return and dividend is systematically negative. Whereas, the prior studies by Fama et. al. (Nov, 1989:23-49) and others has sh own that dividend return is natural variable for predicting the expected return. That implies a direct relationship between the two. On the contrary, Leon (2008:277-278) explained his finding by explaining the reinvestment of the dividend as the main reason; reinvestment of the sizeable amount of dividend reduces the return over the period. Besides this, they had found that, except Thailand the significance of risk focused investment strategies is minimal. Despite this, the timing of decision with respect to the volatility cannot be ruled as irrelevant in the same way. In summary, he inferred that conditional mean based strategies provide better return than conditional variance based ones in case of the emerging markets after leaving the exception of Thailand. As the mean variance framework is incorporated by many of the statistical financial models for example the Capital Asset pricing model and Arbitrage Pricing Theory therefore, examining its effectiveness is a curious case of study. To test the efficiency of the mean variance analysis Kandel et. al. (1986: 61) used a framework involving the correlation between the originally intended portfolio and the proxy portfolio. While going through the tests they concluded that efficiency of the mean variance method can be rejected if the efficiency of any other portfolio containing the subset of the original portfolio is rejected. As a result it can be said that, it is important part of portfolio selection but, its use might not give perfect answer to an investors about the portfolio selection Kandel et. al. (1986:87-88). Conclusion The mean variance framework is widely used for making the investment decisions. With the advancement in the theoretical and practical understanding its relevance in the modern day analysis still holds great importance. However, many assumptions have to be made before applying it to find the optimized portfolio; moreover, the difficulty in finding the appropriate data often constraint its use. Many small but significant issues affect the efficiency of obtained result but, it gives fair amount of planning power to the investor. Despite its weaknesses, its importance as a chief risk return analysis tool made many researchers to work on it and to find the solution for the weaknesses. With the advancements in the framework, it is widely used as a statistical basis for making the optimized investment decisions. Refrences: Black, F., Litterman, R., (Sep, 1991),Asset Allocation: Combining Investor Views with Marketing Equilibrium, Journal of fixed income, Vol 1, No. 2, pp 7-18 [Online Available] https://www.iijournals.com/doi/pdfplus/10.3905/jfi.1991.408013 Accessed on 30-03-2011 Breen, W., Glosten, L. R., Jaganathan, R., (Dec, 1989), Economic Significance of Predictable Variations in Stock Index Returns Journal of Finance, Vol. 44, No. 5, pp 1177-1189 [Online Available] https://www.jstor.org/stable/2328638 Accessed on 30-03-2011 Brown, C., (Dec 2005), Financing Transport Infrastructure: For whom the road tolls Vol 38, Issue 4, pp 431-438 [Online Availabe] https://onlinelibrary.wiley.com/doi/10.1111/j.1467-8462.2005.00386.x/pdf Accessed on 25-03-2011 Campbell, J. Y., Viceira, L. M., (2004), Lond-Horizon Mean Variance Analysis: A User Guide, Global Risk Guard, pp 1-3 [Online Available] https://www.globalriskguard.com/resources/assetman/assetall_0015.pdf Accessed on 21-03-2011 Chordia, T., S arkat, A., Subramanyan, A., (2005), An empirical analysis of stock and Bond Market Liquidity, The Review of Financial Studies, Vol 18, No. 1, Oxford University press, pp 92-93 [Online Available] https://www.jstor.org/stable/3598068?origin=JSTOR-pdf Accessed on 21-03-2011 Cremers, J., H., Krizman, M., Page, S., (Sep, 2004), Optimal Hedge fund allocations: Do Higher Moments Matter?, Revere Street Working paper street, Financial Economics 272-13, pp 1-4,18-19 [Online Available] https://ssrn.com/abstract=587384 Accessed on 30-03-2011 Fabozzi, F, J., (2009), Institutional Investment Management: Equity and Bond Portfolio Strategies and Applications, Vol 177, Frank J. Fabozzi Series, John Willey and Sons, pp 4-6, [Online Available] https://books.google.co.uk/books?id=GrbnPFmoWAYCHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseprintsec=frontcoverHYPERLI NK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsedq=mean+variance+analysis+in+equity+and+bond+marketHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsesource=blHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseots=fcQtrZFw2LHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsesig=3_i87Rs7BlNdVU81j4KFvc5qx3QHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20ma rketf=falsehl=enHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseei=1b2HTfeDN9C7hAe6t9y1BAHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsesa=XHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseoi=book_resultHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsect=resultHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseresnum=3HYPERLINK # v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseved=0CCsQ6AEwAg#v=onepageHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falseHYPERLINK #v=onepageq=mean%20variance%20analysis%20in%20equity%20and%20bond%20marketf=falsef=false Accessed on 21-03-2011 Fama, E. F., French, K. R., (Nov, 1989), Business Conditions and Expected returns on stocks and bonds, Vol 25, Issue 1, pp 23-49 [Online Available] https://www.sciencedirect.com/science?_ob=ArticleURLHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gatewa y_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_udi=B6VBX-45NHW7H-HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a4HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gatew ay_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_user=10HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=g ateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_coverDate=11%2F30%2F1989HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_rdoc=1HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gat eway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_fmt=highHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origi n=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_orig=gatewayHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_origin=gatewayHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gate way_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_sort=dHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=g ateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_docanchor=HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aview=cHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gat eway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_searchStrId=1701407420HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin =gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_rerunOrigin=scholar.googleHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_acct=C000050221HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt= high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_version=1HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig =gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_urlVersion=0HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=a_userid=10HYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_ orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=amd5=3c01deb1a9027017042cb7e6341fe74aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989_rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=aHYPERLINK https://www.sciencedirect.com/science?_ob=ArticleURL_udi=B6VBX-45NHW7H-4_user=10_coverDate=11/30/1989 _rdoc=1_fmt=high_orig=gateway_origin=gateway_sort=d_docanchor=view=c_searchStrId=1701407420_rerunOrigin=scholar.google_acct=C000050221_version=1_urlVersion=0_userid=10md5=3c01deb1a9027017042cb7e6341fe74asearchtype=asearchtype=a Accessed on 28-03-2011 Fidora, M., Fratzscher, M., Thimann, C., (Oct, 2006), Home Bias in Global Bond and Equity Markets The Role of Real exchange rate volatility European Central Bank, Working Paper No 685 pp 5-10 [Online Available] https://www.ecb.int/pub/pdf/scpwps/ecbwp685.pdf Accessed on 21-03-2011 French, K. R., Poterba, J. M., 1991, Investor Diversification and International Equity Markets, American Economic Review, No 81(2), pp 222-226 [Online Available] https://www.nber.org/papers/w3609.pdf Accessed on 25-03-2011 Fung, W., Hsieh, DA., (1997), Empirical characteristics of dynamic trading strategies: the case of hedge funds, Rev Finance Stud, Oxford University Press, Vol 10, No. 2, pp 275-302 [Online Available] https://rfs.oxfordjournals.org/ content/10/2/275.full.pdf+html Accessed on 30-03-2011 Harvey, C. R., Whaley, R. E., (Aug 1990), Market Volatility Prediction and the efficiency of the SP 100 Index Option Market, Journal of Financial Economics 31, pp 43-74 [Online Available] https://faculty.fuqua.duke.edu/~charvey/Research/Published_Papers/P16_Market_volatility_prediction.pdf Accessed on 29-03-2011 Idzorek, T., M., (Jul, 2004), A Step-by-step guide to the Black-Litterman Model, Zephyr Working Document, pp 1-3, 27 [Online Availble] https://www.indiceperu.com/lecturas/paper13.pdf Accessed on 30-03-2011 Kandel, S., Stambaugh, R. F., (May, 1986), On Correlations and Inferences about mean-variance efficiency, Journal of Financial Economics 18, Issue 1, pp 61, 87-88 [Online Available] https://www.sciencedirect.com/science?_ob=MImgHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=d GLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_imagekey=B6VBX-45R2HV6-6-1HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_cdi=5938HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_co verDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_user=899436HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_pii=0304405X87900614HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=89943 6_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_origin=gatewayHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_coverDate=03%2F31%2F1987HYPERLINK https://www.sciencedirect.com/science?_ob=MImg _imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdf_sk=999819998HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfview=cHYPERLINK https://www.scienced irect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfwchp=dGLzVlb-zSkzVHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfmd5=c 94a78e9c3c562f44fd66f5f88dbf3e5HYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfHYPERLINK https://www.sciencedirect.com/science?_ob=MImg_imagekey=B6VBX-45R2HV6-6-1_cdi=5938_user=899436_pii=0304405X87900614_origin=gateway_coverDate=03/31/1987_sk=999819998view=cwchp=dGLzVlb-zSkzVmd5=c94a78e9c3c562f44fd66f5f88dbf3e5ie=/sdarticle.pdfie=/sdarticle.pdf Accessed on 30-03-2011 Leon, N. K., (2008), Mean Variance Predictability and Economic Value in Emerging Equity Markets, International Research Journal of Finance and Economics, Issue 14, pp 272, 277-278 [Online Available] https://www.eurojournals.com/irjfe%2014%20leon2.pdf Accessed on 21-0-2011 Liu, E, X., (2010), Essays on International Finance and Risk Sharing, University of Pennsylvania, Publicly accessible Penn Dissertations, Paper 206, pp [Online Available] https://repository.upenn.edu/edissertations/206/ Accessed on 25-03-2011 Martellini, L., Ziemann, V., (2007), Extending Black-Litterman Analysis beyond the mean-variance Framework, EDHEC Risk and Asset Management Research Centre, pp 3-4 [Online Available] https://www.edhec-risk.com/edhec_publications/all_publications/RISKReview.2008-01-22.3332/attachments/EDHEC%20Working%20Paper%20Extending%20Black-Litterman%20Analysis.pdf Accessed on 21-03-2011 Markowitz, H., Todd, G., P., Sharpe, W., F., (2000), Mean Variance analysis in portfolio choice and capital markets, Vol. 66, Frank J. Fabozzi Series, John Willey and Sons [Online Available] https://books.google.co.uk/books?hl=enHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falselr=HYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falseid=eJ8QUsgfZ8wCHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falseoi=fndHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falsepg=PR9HYPERLINK #v=onepageqf=falseHYPE RLINK #v=onepageqf=falsedq=mean+variance+analysis+in+equity+and+bond+marketHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falseots=t3pVVd9pkDHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falsesig=twrWn39x8M5ytqXKhZlLCO9SNDo#v=onepageHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falseqHYPERLINK #v=onepageqf=falseHYPERLINK #v=onepageqf=falsef=false Accessed on 21-03-2011 Samuelson, P. A., (1969), Lifetime portfolio selection by dynamic stochastic programming, Review of Economics and Statistics 50-55 [Online Availabe] https://www.jstor.org/stable/1926559 Accessed on 28-03-2011 Sornette, D., Anderson, J., V., Simonetti, P., (2000), Portfolio theory for fat tails', International Journal of Theoretical and Applied Finance, Vol 3, Issue 3, pp 523-535, [Online Available] https://www.worldscinet.com/ijtaf/03/preserved-docs/0303/S0219024900000504.pdf Accessed on 29-03-2011 Terhaar, K., Staub, R., Singer, B. D., (2003), Appropriate policy allocation for alternative inves ments, Journal of portfolio management, Vol 29, No 3, pp 101-110 [Online Available] https://www.iijournals.com/doi/abs/10.3905/jpm.2003.319888 Accessed on 29-03-2011

Saturday, May 23, 2020

The Yellow Wallpaper by Charlotte Perkins - 653 Words

â€Å"The Yellow Wall Paper† is the story about a journey of a woman who is suffering from a nervous breakdown, descending into madness through her â€Å"rest cure† treatment. The woman is not allowed to read, write or to see her newborn baby. Charlotte Perkins Gilman captures the essence of this journey into madness by using the first person narration. The story plot’s is by taking the reader through the horrors of one woman’s neurosis to make strong statements about the oppression faced by women in their marriage roles. The narrator’s mental condition is characterized by her meeting with the wallpaper in her room. In addition to the story’s plot, the use of symbolism and irony throughout her story also show how males dominate during her time. From â€Å"Literature: The Human Experience† written by Abcarian and Klotz, â€Å"Irony is figurative language in which the intended meaning differs from the literal meaning† (1615). There is more than one level of irony at work in this story. Dramatic irony occurs when a reader or audience know things a character does not and, consequently, sees things differently (Abcarian Klotz 1615). Gilman uses dramatic irony when the narrator states, â€Å"I’m feeling so much better† (Gilman 1005) as if the narrator believe that she is normal, but when she states, â€Å"I think that woman gets out in the daytime! And I’ll tell you why-privately- I’ve seen her!† (Gilman 1006), the reader knows that she is actually going in sane. It is dramatic irony because the reader‘sShow MoreRelatedThe Yellow Wallpaper By Charlotte Perkins937 Words   |  4 PagesIn January of 1982 Charlotte Perkins published â€Å"The Yellow Wallpaper†. This sto ry was written based mainly on feminism, and how men controlled women during that time. Perkins was very active in women’s rights. In her story she is telling us the story of her real life, and it is based off of the events that happened to her throughout her marriage and the depression she suffered. Perkins was put on a â€Å"rest cure† for her depression where she was to stay in bed until she was better, but as she went throughRead MoreThe Yellow Wallpaper By Charlotte Perkins1189 Words   |  5 PagesAubi-Ann Genus Ms.Vedula 4 December 2015 â€Å"The Yellow Wallpaper† a Feminist Story â€Å"The Yellow Wallpaper† by Charlotte Perkins Gillman focuses on the oppression of women in the 19th century. The story introduces us into the awareness of a woman who is slowly going insane over the course of the summer. She recently just gave birth to a baby and is most likely suffering from some type of depression. Analyzing this story, we see the frustrations of women during The Victorian era. Women were manipulatedRead MoreThe Yellow Wallpaper by Charlotte Perkins1162 Words   |  5 PagesA New Beginning In The Yellow Wallpaper, Charlotte Perkins Gilman discusses the oppression men have towards women through the story of a nameless narrator during the 19th century. In the story, the unknown narrator, a woman, is telling her struggle for freedom and her fight to escape from the subordination in her marriage with a physician. In the story, the narrator suffers an illness that prevents her from doing things she likes such as writing. Throughout her illness, the narrator slowly becomesRead MoreThe Yellow Wallpaper by Charlotte Perkins722 Words   |  3 PagesIn this short story â€Å"The Yellow Wallpaper† Charlotte Perkins uses the story to describe statements about feminism and individuality. He does so by putting the reader through the horrific terrors the woman was going through neurosis, as her mental thoughts with the wallpaper in the room. Gilman tries instead to show a message of individual expression and he achieves it perfectly by recoding the progress of the illness she had, through the state of the wall paper. It is obvious in this story thatRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman846 Words   |  4 PagesHumans are flawed individuals. Although flaws can be bad, people learn and grow from the mistakes made. Charlotte Perkins Gilman’s short story, â€Å"The Yellow Wallpaper†, gives one a true look at using flaws to help one grow. Gilman gives her reader’s a glimpse into what her life would have consisted of for a period of time in her life. Women were of little importance other than to clean the house and to reproduce. This story intertwines the reality of what the lives of woman who were considered toRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman885 Words   |  4 Pagesbeen a stigma around mental illness and feminism. â€Å"The Yellow Wallpaper† was written by Charlotte Perkins Gilman in the 1900’s. â€Å"The Yellow Wallpaper† has many hidden truths within the story. The story was an embellished version her own strug gle with what was most likely post-partum depression. As the story progresses, one can see that she is not receiving proper treatment for her depression and thus it is getting worse. Gilman uses the wallpaper and what she sees in it to symbolize her desire to escapeRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman1547 Words   |  7 PagesCharlotte Perkins Gilman s career as a leading feminists and social activist translated into her writing as did her personal life. Gilman s treatment for her severe depression and feelings of confinement in her marriage were paralleled by the narrator in her shorty story, The Yellow Wallpaper. Charlotte Perkins Gilman was born in 1860 in Hartford, Connecticut. Her parents, Mary Fitch Perkins and Fredrick Beecher Perkins, divorced in 1869. Her dad, a distinguished librarian and magazine editorRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman1362 Words   |  6 Pagesas freaks. In the short story â€Å"The Yellow Wallpaper† by Charlotte Perkins Gilman, both of these elements are present. Gilman did a wonderful job portraying how women are not taken seriously and how lightly mental illnesses are taken. Gilman had, too, had firsthand experience with the physician in the story. Charlotte Perkins Gilman s believes that there really was no difference in means of way of thinking between men or women is strongly. â€Å"The Yellow Wallpaper† is a short story about a woman whoRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman999 Words   |  4 Pages â€Å"The Yellow Wallpaper† is a story of a woman s psychological breakdown, which is shown through an imaginative conversation with the wallpaper. The relationship between the female narrator and the wallpaper reveals the inner condition of the narrator and also symbolically shows how women are oppressed in society. The story, read through a feminist lens, reflects a woman s struggle against the patriarchal power structure. In the â€Å"The Yellow Wallpaper†, Charlotte Perkins Gilman uses the wallpaperRead MoreThe Yellow Wallpaper By Charlotte Perkins Gilman Essay1208 Words   |  5 Pagesthat wallpaper as I did?† the woman behind the pattern was an image of herself. She has been the one â€Å"stooping and creeping.† The Yellow Wallpaper was written by Charlotte Perkins Gilman. In the story, three characters are introduced, Jane (the narrator), John, and Jennie. The Yellow Wallpaper is an ironic story that takes us inside the mind and emotions of a woma n suffering a slow mental breakdown. The narrator begins to think that another woman is creeping around the room behind the wallpaper, attempting