Monday, January 27, 2020

Improving Performance of MANET under DSR Protocol

Improving Performance of MANET under DSR Protocol Improving Performance of MANET under DSR Protocol using Swarm Optimization to avoid redundancy CHAPTER 5 Implementation and Testing The implementation phase of any project development is the most important phase as it yields the final solution, which solves the problem at hand. The implementation phase involves actual materialization of the ideas, which are expressed in the analysis document and developed in design phase. Implementation of any software is always preceded by important decisions regarding selection of the platform, the language used, etc. These decisions are often influenced by several factors such as the real environment in which the system work, the speed that is required, the security concerns, other implementation specific details etc. Implementation should be perfect matching with the design document in order to achieve the necessary final product. For implementation of our system we use Network Simulator (NS) tool for simulation of the network and programming languages like Tool Command Language (TCL) and AWK are used for coding. 5.1 General Implementation Implementation and simulation under NS-2 consists of 3 steps: Simulation Design The first step in simulating a network is to design the simulation. In this step, the users should determine the simulation purposes, network configuration and assumptions, the performance measures, and the type of expected results Configuring and Running Simulation This step implements the design described in the first step. It consists of two phases: Network configuration phase: In this phase network components (e.g., node, mobile sink, base station TCP and UDP) are created and configured according to the simulation design. Also, the events such as data transfer are scheduled to start at a certain time. Simulation Phase: This phase starts the simulation which was configured in the Network Configuration Phase. It maintains the simulation clock and executes events chronologically. An algorithm is a procedure or formula for solving a problem. A computer program can be viewed as an elaborate algorithm. In mathematics and computer science, an algorithm usually means a small procedure that solves a recurrent problem. The algorithms used in the project to solve the problem. Evaluation of Fitness Function The fitness function F(x) is defined as follows: F(x) = PDR/k k*[NO + AD + PD] Where, NO = Normalized Overhead AD = Average End to End Delay PD = Number of Packet drop PDR = Packet Delivery Ratio k = Proportionality constant used for the optimization of fitness function. Value of k lies between 0 1 i.e. O 5.1.1 Proposed Algorithm 1) Genetic Algorithm Step 1. Simulate the network using the DSR protocol. Step 2. After the simulation, analyze the Trace file. This gives the number of different paths for the same source and destination pair. Step 3. Choose two paths PI P2 for the same source and destination pair with the equal number of nodes n. Step 4. Calculate the Routing Load (RL) MAC Load (ML),Packet Delivery Ratio ( PDR), End-to-End Delay (D), and number of packets dropped, for the selected path. Step 5. Apply fitness function on the path chosen in step 3. Step 6. Apply crossover on the path chosen in step 3 at random site. Step 7. Apply mutation after crossover on the path chosen in step 3 on the randomly chosen site. Step 8. Step 6 gives two new paths P1 P2 with one new node as compared to the old path. Let the new node in path PI be nl and in P2 be n2. Step 9. If n 1 belongs to network topology then apply the fitness function on the respective path otherwise discard the path. Step 10. Do the same for node n2 as in Step 9. Step 11. Consider the path with the highest fitness function value and:- { Respective path will be the optimal path for the given source and destination pair. The node replaced from the previous path is the misbehaving node. } 2) Ant Colony Optimization Step 1: Calculate the probability of selection of newly generated path that are obtain by applying genetic algorithm for the given source-destination pair. The path will be selected with the higher probability. P à °Ã‚ Ã…“‚ij= pheromone on the link. à °Ã‚ Ã…“‚ij visibility factor of the link. B k k is a constant used for optimization and lies between 0 and 1 à °Ã‚ Ã¢â‚¬ ºÃ‚ ¼, B are the constant aco optimization constant Step 2: The backward ant accumulates the pheromone and also the evaporation of pheromone take place, now we calculate the updated pheromone after the evaporation, à °Ã‚ Ã…“ ij= (i,j) accumulated pheromone on the link. FF Fitness Function k proposnality à °Ã‚ Ã…“ new=Ï *à °Ã‚ Ã…“ old+à °Ã‚ Ã…“  Step 3: The path with the higher path preference probability will be considered as the best path and the data transmission can be started along that path. Network Simulator2 (NS2) Network Simulator (Version 2), extensively recognized as NS2, is basically an event driven simulation tool that has established helpful in learning the dynamic environment of communication networks. Simulation of agitated as well as wireless network purposes and protocols for example, routing algorithms, TCP, and UDP can be completed using NS-2. In all-purpose, and then the NS-2 make available for the users by means of a way of identifying such network protocols and simulating their corresponding activities. NS-2 is written in C++, with an OTcl1 interpreter as a command and configuration interface. The C++ part, which is fast to run but slower to change, is used for detailed protocol implementation. The OTcl part, on the other hand, which runs much slower but can be changed very fast quickly, is used for simulation configuration. One of the advantages of this split language program approach is that it allows for fast generation of large scenarios. To simply use the simulator, it is sufficient to know OTcl. On the other hand, one disadvantage is that modifying and extending the simulator requires programming and debugging in both languages. NS-2 can simulate the following: Topology: Wired Wireless Transport Protocols: TCP, UDP Routing: Static and dynamic routing Application: FTP, HTTP, Telnet, Traffic generators 5.2.1 Basic Architecture of NS2 The basic architecture of NS2 is shown in the figure 5.1 below. NS2 provides users with executable command ns which take one input quarrel, the name of a Tcl simulation scripting file. Users are providing for the name of a Tcl simulation script as an input argument of anNS2 executable command that is ns. In the majority suitcases, a simulation trace file is shaped, and is second-hand to plot graph and/or to construct animation. NS-2 consists of two key languages: C++ and Object-oriented Tool Command Language (OTcl). While the C++ characterizes the internal apparatus of the simulation objects, the OTcl sets up simulation by pull together and configuring the substance as well as preparation discrete events. The C++ and the OTcl are linked collectively by means of TclCL. Mapped to a C++ object; variables in the OTcl sphere of influence are occasionally referred to as switches. Theoretically, a handle for example, n as a Node handle is just a string in the Otcl sphere of influence, and does not surround any functionality. Instead, the functionality for example, receiving a packet is distinct in the mapped C++ object examples are, of class Connector. In the OTcl province, a handle take steps as a frontend which interrelated with consumers and other Otcl objects. After simulation, NS-2 out puts moreover text-based or animation-based simulation consequences. Figure 5.1: Basic Architecture of NS2 To interpret these results graphically and interactively, tools such as NAM (Network Animator) and Xgraph are used. To investigate an exacting behavior of the network, clients can extract a relevant subset of text-based data and make over it to a more conceivable presentation Tcl and OTcl Programming Tcl (Tool Command Language) is used by millions of people in the world. It is a language with a very simple syntax and it allows a very easy integration with other languages. The characteristics of these languages are as follows: It allows a fast development It provide a graphic interface It is compatible with many platforms It is flexible for integration It is easy to use It is free Some of the basics of Tcl and Otcl programming are listed below. Assigning a value to a variable is done through the â€Å"set† command; for example: â€Å"set b 0†assigns the value 0 to b. When we want to use the value assigned to a variable, we should use a $ sign before the variable. For example, if we want to assign the value of the variable b, we should write â€Å"set x $a†. A mathematical operation is done using the expression command. For example, if we wish to assign the sum of values of variables a and b, we should write â€Å"set x [expr $a+$b]†. The sign # starts a commented line that is not part of the program, so the Tcl interpreter will not execute this line. Performance Analysis Module This module performs processing of output result set to compute the various performance metrics required to analyze the performance of flow slice based routing. This module includes following AWK scripts to compute various performance metrics. Plotting graphs for the performance metric to analyze the performance. The Fig 4.11 gives Flow chart for working of performance analysis module, Understanding the trace file format is essential for modeling performance metric computation. Manually interpretation of NS2 trace files for wireless simulation as follows ACTION:[s|r|D]: s sent, r received, D dropped WHEN:the time when the action happened WHERE:the node where the action happened LAYER:AGT application, RTR routing, LL link layer (ARP is done here), IFQ outgoing packet queue (between link and mac layer), MAC Mac, PHY physical SEQNO:the sequence number of the packet TYPE:The packet type cbr CBR data stream packet ftp – FTP data stream packet DSR DSR routing packet (control packet generated by routing) RTS RTS packet generated by MAC 802.11 ARP link layer ARP packet SIZE:the size of packet at current layer, when packet goes down, size increases, goes up size decreases [a b c d]:a The packet duration in Mac layer header b The mac address of destination c The mac address of source d The mac type of the packet body Figure 5.2: Flow chart for working of performance analysis module Initialization and Termination of NS2 An ns simulation starts with the command set ns [new Simulator] The first line in the tcl script. This declares a new variable NS using the set command. The code [new Simulator] is the instantiation of the class Simulator using the reserved word new.In order to have output files with data in the simulation (trace files) or files for visualization (nam files); we need to create the files using the â€Å"open† command as follows: #Open the Trace file set tracefile1 [open out.tr w] $ns trace-all $namfile #Open the NAM trace file Set namfile [open out.nam w] $ns namtrace-all $namfile The above procedures create a data trace file called â€Å"out.tr† and a nam visualization trace file called â€Å"out.nam†. The second lines open the file â€Å"out.tr† to be used for writing, declared with the letter â€Å"w†. The third line uses a simulator method called trace-all that have name of file as parameter where the traces will go. The termination of the program is done using a â€Å"finish† procedure. #Define a finish procedure proc finish {} { global ns tracefile1 namfile $ns flush–trace close $tracefile1 close $namfile execnamout.nam exit 0 } Plotting with X graph Xgraph is a plotting utility that is provided by ns. It allows to create postscript, Tgif files, and others, by clicking on the button â€Å"Hdcpy†. It can be invoked within the tcl command which results in an immediate display after the end of the simulation. The xgraph command expects one or more ASCII files as input containing each x-y data point pair perl line. Some of the options in xgraph are: Title: use –t â€Å"title†. Size: geometry xsize z ysize. Title for axis: -x â€Å"xtitle† (for the title of the x axis) and –y â€Å"ytitle† (for the title of the y axis) Color of text and grid: with the flag –v Command for the above options would be shown below Xgraph ov.xg in terms of load units for the† overhead†,Xgraph dl.xg in terms of microsec â€Å"delay†,Xgraph pdr.xg percentage of delivered data for† packet deliver ratio†. 5.3 Network Animator (NAM) When a simulation is finished, NS produces one or more text-based output files that contain detailed simulation data, if specified to do so in the input script. The data can be used for simulation analysis or as an input to a graphical simulation display tool called NAM. NAM has a nice graphical user interface. It can graphically present information such as throughput and number of packet drops at each link NAM is started with the command nam where is the name of a NAM trace file that was generated by NS, or it can execute it directly out of the TCL simulation script for the simulation to visualize. Figure 5.3: A Simple NAM Window 5.4 Test Setup The aim of testing stage is to discover defects/errors by testing individual program components. These components may be functions and the objects or modules. During system testing then these components are integrated to form the complete system. At this stage, of testing should focus on establishing that the system meets its functional requirements and does not behave in unexpected ways. Test data are inputs which have been devised to test the system whereas test cases are inputs to test the system and the outputs are predicted from these inputs if the system operates according to its specification the result of this is used to examine the behavior in a cohesive system. The test cases are selected to ensure that the system behavior can be examined in all possible combinations of conditions. Detecting all the different failure modes for software is generally infeasible. Software testing is used in association with verification and validation: Verification: Have built the software right (i.e., does it match the specification)? Validation: Have built the right software (i.e., is this what the customer wants)? Testing Process Testing is an integral part of software development. Testing process, in a way certifies, whether the product, that is developed, complies with the standards, that it was designed for Testing process involves building of test cases, against which, the product has to be tested. In some cases, test cases are done based on the system requirements specified for the product/software, which is to be developed. Testing Objectives These following objectives imply a dramatic change in view port the testing cannot show absence of defects, it can only show that software errors are present. Testing forms process of executing a program with the intent of finding an error. A good test case design is one that has a probability of finding an error yet undiscovered. A successful test will discovers all the bugs and user can undertake steps to rectify them. 5.4.1 Test Environment The software was tested on the following platform. Operating System – Ubuntu 11.10 Ns-allinone-2.35 DSR to find multiple paths using Genetic Algorithm 5.4.2 System testing Here the entire software system is tested and the reference document for this process is the requirements document the main goal is to see if the system meets its requirements. Each module and component of project was thoroughly tested to remove bugs through a system testing strategy. Test cases were generated for all possible input sequences and the output was verified for its correctness. Test cases for system testing are mentioned below. Software testing is the process used to help identify the correctness and completeness of developed system. Testing is a process of technical investigation that is intended to reveal if the system works in a way it is intended to operate. Testing furnishes a comparison that compares the state and behavior of the product against a specification. Software testing also provides an objective and the independent view of the software to allow the business to appreciate and understand the risks of software implementation. 5.4.3 Testing Artifacts Software testing development shown with many artifacts and they are: Test Plan: A test specification is normally known as test plan and the investigators are well conscious about what test plans determination is implemented and this information is made obtainable to administration and the developers. The manager or the foremost supervisory plan is to put together them more careful when increasing the code or construction additional revolutionizes. Traceability matrix: A traceability matrix is counters that draw a parallel necessity or propose for the documents to test documents and it is used to substantiate that the results are acceptable. Test case: The test case in general consists of a exclusive identifier and obligation references from a design specification then the preconditions along with the events a series of steps known as actions to follow the input output and expected result including the actual result. All these phases can be accumulated in a word central processing unit document, with the spreadsheet, and also the database, or other common repository. Test suite: The good number of frequent phrase for a collected works of test cases is a test suite. The test suite frequently also contains more comprehensive instructions or goals for each collected works of test cases. Test data: Numerous positions of standards or data are used to test the identical functionality of an exacting characteristic. It is also helpful to manufacture this data to the client and with the creation of or a project. Test harness: The software apparatus, illustration of information input and output, and arrangements are all referred to cooperatively as a test harness. Testing Methods The testing methods describe the approach that is used to test the working of the project. These approaches tests whether the functionality of the project address with the existing requirements. Overall functionality of the project is also tested. Types of test carried out are: Unit testing Integration testing Function testing Unit testing A unit test is a piece of code that invokes a unit of work and checks one specific end result of that unit of work. If the assumptions on the end result turn out to be wrong, the unit test has failed. In unit testing and black-box testing then the white-box testing are done to check the correctness of the existing functionality. Normal Manual testing has been done to check the correctness of the functionality of the project. Then the further results of each testing are depicted in the table the test case approach has been chosen out of the testing artifacts. Integration Testing Integration testing is any type of software testing that seeks to verify the interfaces between the components against a software design. Integration test may be performed all at once the top-down and bottom-up then significant piece first, some time integrating functional subsystems first and then integrating the subsystems in separate phases using any of the basic strategies. Usually larger the project, the more important the integration strategy will be to the project. Functional testing Functional testing is the generation of test cases from specifications is a valuable and flexible approach to software testing application from very early system specification right through module specification Functional testing deriving test cases from program specifications. Functional said to set of information used in test cases design not to what is tested also known as Specification based testing (from specifications) black-box testing (no view of the code)and the Functional and the specification description of intended program behavior either formal or informal.

Sunday, January 19, 2020

The Impact of Biodiesel on Automotive Catalyst Performance Essay

Stringent diesel emissions regulations around the world have put much pressure on the shoulders of manufactures to reduce the level of emissions entering the atmosphere from diesel engines. Much of the initial attempt to achieve this by the manufactures was by the substitution of biodiesel in place of the conventional petroleum diesel. In order to create a balance between the vehicle performance and the imposed emissions regulations, many manufacturers prefer to blend petroleum diesel with biodiesel in a proportion which is deemed suitable to run on their engines. In a statement from the diesel fuel injection systems manufacturer’s association, they suggested that diesel fuel specification should be updated on a regular basis, to allow for the gradually increasing percentage of biodiesel. By so doing injection components could be manufactured such that they are protected from the possible secondary effect of the fatty acid methylesthers, which includes filter plugging due to softening and corrosion of zinc or aluminium parts in the fuel injection system due to the presence of free menthol residues. Whilst biodiesel has been highlighted as a plausible substitute for petroleum diesel, great concerns still arise over the effects of its emissions on health and environment, considering the fact that only a few of its hydrocarbon emissions are yet known. Studies about the effects of increasing biodiesel blend ratio on the operation and emissions of diesel engines have been documented in a vast amount of published and unpublished literature since the 1980’s (1), (2), (3). A general trend of observation amongst most of the literatures reviewed is a reduction in CO and THC emissions with increasing biodiesel blend ratio, like wise incre... ...ation of after treatment systems have been proposed by some researches, as a viable solution in reducing CO, THC and NOx emissions to a non-harmful level. Some of these proposed after treatment systems include DPF (Diesel particulate filter) and DOC (Diesel Oxidation Catalyst). Amy et al’s (27) research in to effect of biodiesel emissions on the performance of a diesel particulate filter in a diesel engine, showed that increased biodiesel blend ratio produced less soot and thus required a lesser regenerative temperature, when compared to the conventional petroleum diesel. Their conclusions indicated the fact that with biodiesel fuels, the regeneration of particulate filters could be carried out without the fear of causing an over heat in the exhaust system. They applauded the reactive nature of the biodiesel soot, as a major contributor to this trend.

Saturday, January 11, 2020

Book Review: To Room Nineteen

In this way, Suntan's high and low points are drastically influenced by her social and physical situations. Suntan's life Is sprinkled with a series of high points all centered on her level of independence at that particular time. For example, her happiest moments In life transpire when she leads a semi-separate life from Mathew, she has a separate Job, friends, and apartment; her social and physical situations overlapped but were not dependent on Mathews at this time. Suntan's next moment of relief ensues when she comes across Mrs..Downtrend's motel, although the room itself was, â€Å"ordinary and anonymous† (Leasing 878) it's the social environment here that Susan craves; feeling detached from herself and almost reinvented gives her the temporary relief she needs to go home and be content with her life with Mathew and the children. Like a drug addict looking for her next fix Mrs.. Downtrend's motel will no longer feed Suntan's crave for solitude anymore, so she instead look s for a new relief and finds it in Fried's motel. Fried's motel is frequented by hookers and is a much worse establishment Han Mrs..Downtrend's, but here Fred lets her be and gives her the feeling that, â€Å"she was alone and no one knew where she was† (Leasing 883), which satisfies the social privacy she desires. Suntan's final moment of relief occurs when she decides to take her life away In Freed motel; In this way she leaves the world content with the relationships she's left behind including her husband and children, while ultimately entering a permanently new social and physical environment giving her the fresh start she was looking for.Although Susan had many high points that were influenced by her social and physical environments she also had many low moments that were influenced by the same factors. Susan experienced many low moments; all of these unfortunate events were in some way influenced by her social and physical environments at that time. The first low point Susan faces occurs after she becomes Mrs.. Railings and they start a family. After having children Susan quits her Job and transitions into becoming fully dependent on Mathew, this change In social and physical atmosphere coupled withMathews Infidelity causes the first crack In Suntan's character. Subsequently, years later Suntan's next low experience occurs when the twins go to school, instead of on her, this change in the social situation drives her to a new low mood. The next low point strikes when Susan finds out that Mathew knows about Fried's Motel, as it is no longer hers, â€Å"The peace in the room had gone. She was constantly trying to revive it, trying to let go into the dark creative trance (or whatever it was) that she found here. (Leasing 886); her last area of peace has been found causing the final break in her character. In conclusion, Susan Railings death can be seen as the fate of a women who couldn't handle the life of a housewife and loses her sense of self onl y to find it in death, which acts as the ultimate change of social and physical environment. To conclude with a quick recap, â€Å"To Room Nineteen† by Doris Leasing is a story of the events leading to a woman's death due to post marital depression.

Friday, January 3, 2020

Essay Cosmetic Surgery - No Longer Only For the Rich and...

Cosmetic surgery companies offer many options in which to finance cosmetic procedures for individual of all income levels. There were over 10 million surgical and nonsurgical cosmetic procedures performed in the United States in 2008, as reported by the American Society for Aesthetic Plastic Surgery (ASAPS). (Surgery, 2009) The statistic mentioned, clearly shows how many of us now would be willing to undergo cosmetic surgery. But, have you asked why? In today’s society, plastic surgery is the number one chosen alternative decision for the augmentation of physical appearance, scar repair and for the repair of a deformity, whether it be a birth defect or disfigurement from an accident. Millions of people, if not all of us are not†¦show more content†¦In addition to aesthetic reasons for desiring to change one’s physical appearance, there are also many psychological issues that contribute to this growing trend of â€Å"quick fixes† (Choosing Cosmetic Surgery, 2010). Aside from overexposure to seemingly impossible to achieve standards of beauty for the ordinary person, people are driven to cosmetic surgery because they suffer from low self-esteem, unhappiness with their own body images and too much insecurity. People who have been called â€Å"fat† or â€Å"ugly† suffer from emotional trauma that lead to a sense of desperation. We are so influenced by the beautiful faces and bodies flashed on the screens of our television, that we try to copy and reinvent ourselves in an attempt to somehow complete the missing part some of us have. Another prevalent reason for plastic surgery is the removal or the lessening of unsightly scars. First, by understanding what scars are and the varying types and degrees of them, we may be able to gain a better understanding as to why so many more people are turning to plastic surgery to repair them. Our skin is a seamless organ that protects our body from infection. Throughout our lives we injure our skin, leaving behind scars. How you scar depends on several factors such as; the depth and size of the injury, your age, heredity and your sex and ethnicity (Scars, 2010). There are 4 types of scars. The first is called a discoloration/surface irregularity or, more commonlyShow MoreRelatedCosmetic Surgery : The Cosmetic World1064 Words   |  5 PagesKosmiah Paige Andrea Hudson-Tomblin English 1101 4 April 2016 The Cosmetic World Many men and women all over the world feel pressured to have the appearance of the â€Å"ideal† beauty, whatever that seems to be. Unfortunately, people cannot change their genetic traits that have made them into whom they have become both physically and mentally. Genetics are a factor in why most individuals choose to get cosmetic surgery done, simply because they are not pleased with what they see in the mirror. Of courseRead MoreMedias Destructive Influence on Women Essay1215 Words   |  5 Pagesideal. This can lead to body dissatisfaction. The second theory is called Gerbner’s cultivation theory. This theory implies that the more television a person watches, the more that person is going to believe what they watch is real life. So if the only image the media is portraying is thin, then woman will believe thin is ideal and realistic. The third and last theory is called Bandura’s social cognitive theory. This theory assumes that people model and learn from t he behaviors of attractive individualsRead MoreCosmetic Surgery And Its Effect On Society1950 Words   |  8 PagesCosmetic surgery is a high in-demand, popular medical procedure that can improve your physical appearance. It can be features on the face or body. This is the general idea behind what we as individuals believe it will do. We believe that surgery will improve how look better, help build higher self-esteem, feel better about ourselves, and grab people’s attention. However, what is the motivation behind why people want to improve their appearance? The influence that society and media have on the populationRead MoreThe Unfortunate Prevalence of Cosmetic Surgery1960 Words   |  8 PagesCosmetic Surgery Today Flipping through the pages of Vogues latest edition, 23 year-old Susan seems quite upset. She struggles with the thought of lacking the perfect body and delicate features in order to be considered attractive. Surprisingly, Susan is not alone in this kind of an internal struggle. In contemporary society, every other woman aspires to have the lips of Angelina Jolie and the perfect jaw line of Keira Knightley. Society today looks down upon individuals that do not fit in, whetherRead MoreCosmetic Surgery for Middle-Aged Women Essay example2262 Words   |  10 Pagestowards cosmetic surgery women. The key question which I will be analyzing will be on (why do early middle age women go though cosmetic surgery?). I will use the current issues in cultural consumer and historic affect on cosmetic surgery for early middle age women. I will be using recent theories and literature on identifying the key elements such as, (body image, aging anxiety, being overweight, media exposure, body dissati sfaction, also a feminist and post feminist perspective of cosmetic surgeryRead MoreCosmetic Enhancement Of The Body And Identity Essay2413 Words   |  10 PagesCosmetic enhancement is the use of medical intervention to achieve a goal that is either socially created, or personally created (Adams, J., 2010). These body improvements are often done to improve one’s self-esteem, romantic life, or to fit within a social or cultural criteria (Adams, 2010). Cosmetic enhancement of the body and identity has always been a luxury in which only the rich and famous could afford, but within our forever developing consumerist society it is becoming more rapidly availableRead MoreCauses of Plastic Surgery Mishaps1658 Words   |  7 Pages1 Causes of Plastic Surgery Mishaps Jill Ayala Eng 101 May 29, 2011 Linda O’Connor 2 Plastic surgery has become an obsession in the United States in the past 10 years. More than 13.1 million procedures were performed in 2010 in the United States, up 2% from 2009 (American Society of Plastic Surgeons, 2010). Today’s society places a great deal of emphasis on physical appearance and people are striving to change their appearance, no matter what the cost. More and more people areRead MorePlastic Surgery : A Image Of A Woman s Appearance3314 Words   |  14 Pagesto make the actress or actor more appealing. Women often try to model themselves after their good looks by buying the same beauty products, getting the same haircut, or even going to the extreme of getting plastic surgery that can cause serious complications or even death. Plastic surgery procedures are painful and gruesome, no woman should be have to feel the pressure to succumb to these monstrous procedure to achieve beauty. What these women don’t know is that all of the images that they have beenRead MoreKylie Kristen Jenner : An Olympic Gold Medalist For Running Track2745 Words   |  11 Pagesgot remarried to Bruce. Bruce Jenner was an Olympic gold medalist for running track. In 2015 Bruce decided that he no longer wanted to pursue the life on a man anymore. He then changed his name to Caitlyn and started off his new life as a 67-year-old transgender. This gender changed caused Kris and now Caitlyn Jenner to get a divorce. Kris and Bruce/Caitlyn had Kylie, and Kylies only biological sister Kendall. Now all the sisters did live togeather in the house with their parents Kris and Bruce. TheyRead MoreHugo Boss Marketing7038 Words   |  29 Pagesarea: Europe 1 °) Hugo Boss Analysis COMPANY In 1837, there was first a partnership between William Procter and James Gamble, in 1937 PG celebrates its 100th anniversary. Sales are up to 230 million dollars. In 1954, PG jumped into the cosmetics and perfumes world with the acquisition of Noxell and its products : Cover Girl, Noxzema and Clarion. In 1993, the sells are up to 30 billion dollars and for the first time more than half of the turnover is realized by international activities.