Monday, September 30, 2019

Brainwashing in America

Television, religion, school system, politics, child rearing. Advertisement and media President Bush on October 7, 2002 at Cincinnati Museum Center – Cincinnati Union Terminal, Cincinnati, Ohio, The threat comes from Iraq. It arises directly from the Iraqi regime's own actions — its history of aggression, and its drive toward an arsenal of terror (WHPR1, 2002). Months before on February 13, 2002 during a Press Conference with President Musharraf of Pakistan, Mr. Bush declared: And I think that statement was clear enough for Iraq to hear me.And I will reserve whatever options I have, I'll keep them close to my vest. President — or Saddam Hussein needs to understand I'm serious about defending our country (WHPR2, 2002). And During his speech at the Virginia Military Institute on April 17, 2002, Mr. Bush made these claims: And, finally, the civilized world faces a grave threat from weapons of mass destruction. A small number of outlaw regimes today possess and are d eveloping chemical and biological and nuclear weapons. They're building missiles to deliver them, and at the same time cultivating ties to terrorist groups.In their threat to peace, in their mad ambitions, in their destructive potential and in the repression of their own people, these regimes constitute an axis of evil and the world must confront them (WHPR3, 2002). With all these statements made in the presence of media persons and the way it had been made that a major part of America and the world really believed that Saddam Hussein and the Iraq is the real threat to the civilized society. Despite the presence of law which prohibits the Bush administration from disseminating government propaganda at home.But in an age of global communications, there is nothing to stop it from planting a phony pro-war story overseas — knowing with certainty that it will reach American citizens almost instantly. This is the power of media and especially electronic media. It has the capability to make any one believe in what it wants to convey. The beautiful newsreader on a TV channel giving us the news. After that the news analysis program is aired. The program brings a battery of analysts to our bedrooms, drawing rooms or shops.These serious looking intelligent faces sitting in front of camera with a list of burning issues are giving their view on the issues. Their facial expression and smartness over words, language and the contents can make anyone feel ill informed. This makes us glued to the television screen. And once the program gets finished we have an unusual feeling that now we have gained great information on issues about which we were quiet ignorant few minutes or hours before. A single program made some change in our self and our personal database of information.This is the actual effect of one of the most popular form of media called the electronic media. But the point of concern is not its power or ability of influencing human psyche. The actual issue whic h has been raised this time is the way it makes an impact on our world views. The authenticity of the content which is aired is now being discussed. The focus is shifting towards the way it influences religion, culture and social belief. After all the US govt. , with all its efforts didn’t found a single weapon of mass destruction.The Saddam Hussein’s regime in Iraq was defeated by the combined US and UK army. But the main issue that led to the war was the weapons of mass destruction which Saddam Hussein regime was allegedly possessing, was nowhere present. This means what the US govt. and its allies were telling the whole world was actually a farce. It was nothing more than a propaganda war against a nation which was adamant to pursue those policies which were not influenced by US. Things mentioned above are some of the many effects caused through electronic media.Moving on to its actual definition, electronic media are those communications mediums which are based on electronic or electromechanical means of production and most often distinguished from print media. The primary electronic media sources familiar to the general public worldwide include — radio, sound recordings, television, video recording, and streaming internet content. And this electric communication technology goes further than any of the previous products of man's skill. Earlier technologies extended the power of man's limbs, and with the invention of writing, man's memory in a sense could be placed outside of himself.Present communication technologies supplant man's external senses, and more recently, the internal senses of imagination and the most important, the central or common sense, which brings the various data of the external senses together into a cohesive unity (McDonald). The world of information, however conceived, may appear to exist in its own right by means of electronics, and the human user becomes a mere participant in that world. Let’s take the c ase of a farmer in South Western America. He was very happy with the money he was earning and was comfortably taking care of his family.The main worry for that man was nothing but the stem rust disease which causes great loss in wheat farming. But when he comes under the influence of electronic media, he sees that the condition is not as good as it appears and his problem is actually not a problem. The actual problem the country is facing is that of possible terrorist attacks and its war on terror in Afghanistan and Iraq. The news of slowdown in world economy and the rising of Asian economy giants like India and China and the job outsourcing makes the same guy more frightened.He feels threatened. And this perceived threat results in a physical reaction as much as actual physical injury. The same person in a large crowd sees perhaps twenty people around him, but a camera above the crowd reveals a crowd incomprehensible to human imagination. The widespread anxiety among people in the first world about there being too many people is an effect of them seeing thousands of faces on television, whereas someone may walk for hours on the streets of the suburbs without seeing a single person (McDonald).The reality is that the information beaming capability of the electronic media upsets normal community and family relations based on physical contact and proximity, leading to an ersatz community where people have the illusion of being angels. People in their relations are reduced to being pieces of disembodied information without context or substance. The level of sensation present in our lives affects our intellectual judgment. It’s not only that individuals re getting affected but whole social order is getting influenced by this stream of information supplied continuously through electronic media.If we talk about law and justice, information acts as lifeblood to it and media of communication are the veins and arteries that move the information through the system . And the same usually works not by exercise of force but by information transfer, by communication of what's expected, what forbidden, and what allowable, what are the consequences of acting in certain ways (Katsh, 1999). That is, law entails information about what the rules are, how they are applied, with what costs, consequences, etc.The changes in the means used to communicate information are important to law because law has come to rely upon the transmission of information in a particular form. The effectiveness and operation of law depends on controlling access to some information and highlighting or directing attention to other information. The electronic media are not to be considered merely as more powerful versions of print. They have different mechanisms for transmitting and processing information, some of which will pressure the law to change course and become a different and not simply a more efficient institution (Katsh, 1999).It’s not only the grownups who are actually getting influenced but also children as young as five years old. According to report, it has been found that there has been an explosion in recent years in electronic media marketed directly at the very youngest children in our society: A booming market of videotapes and DVDs aimed at infants one to 18 months, the launching of the first TV show specifically targeting children as young as 12 months, and a multi-million dollar industry selling computer games and even special keyboard toppers for children as young as nine months old.Their homes are packed with media options, including TVs, computers, DVD players and video game consoles. Nearly all children (99%) live in a home with a TV set, half (50%) have three or more TVs, and one-third (36%) have a TV in their bedroom. Nearly three out of four (73%) have a computer at home, and about half (49%) have a video game player. In some ways, new media is trumping old: nearly twice as many children in this age group live in a home with Internet access (63%) as with a newspaper subscription (34%).Nearly all of them (97%) have products—clothes, toys, and the like—based on characters from TV shows or movies (Rideout, 2003). But the point of concern is that this rapid changes in our media environment have not been accompanied by a similar growth in our knowledge of how new media may impact children’s cognitive, social, emotional or physical development. These issues are of deep concern not only to parents, but also to educators, health providers, policymakers and advocates.Many experts have argued that it is especially critical to understand media use by the youngest children, noting that because social and intellectual development are more malleable in these early years, media use at this age could have an especially significant impact. According to Valdemar W. Setzer (1993), some children addicted to electronic games spoke too fast with limited sense, feeling or contents in their speech. Th is suggests that those children spoke with a speed compared to the use they make of their fingers when playing the games.There is a correlation between speaking and gesturing, which may be explained by the close proximity of the motor and speech neurological centers in the brain. The fact that children do not have the fully developed, active thinking and consciousness characteristic of adults means they don't have to make any effort to â€Å"switch off† these inner activities when playing electronic games and are not â€Å"sidetracked† by outside influences that can act as a buffer to overdevelopment of or addiction to an undesirable trait.Finally, we can say that though our ability to gather information is enhanced by technology, we are placed under greater stress, and to maintain equilibrium we must find strategies to cope with it. One strategy is to withdraw from the flood of information and go for selected and conscious input. It is one of the ways but there is a n eed of finding more. References The White House Press Release, http://www. whitehouse. gov/news/releases/2002/10/20021007-8. html The White House Press Release, http://www. whitehouse. gov/news/releases/2002/02/20020213-3. html The White House Press Release, http://www. whitehouse.gov/news/releases/2002/04/20020417-1. html McDonald, H. Asceticism and the Electronic Media: Technophilia and Technophobia in the Perspective of Christian Philosophy, www. rcp. net. pe/IAL/vm/bec/etexts/macdoeng. htm, 3. Katsh, E. (1989). The Electronic Media and the Transformation of Law, Oxford University Press. Rideout, V. J. & Vandewater, E. A. & Wartella, E. A. (2003). Zero to Six : Electronic Media in the Lives of Infants, Toddlers and Preschoolers. , A Kaiser Family Foundation Report. Setzer, V. W. & Duckett, G. E. (1993). The Risks to Children Using Electronic Games, http://www. ime. usp. br/~vwsetzer/video-g-risks. html

Sunday, September 29, 2019

Essentials of a Valid Contract Essay

To be enforceable by law an agreement must possess the essential elements of a valid contract as laid down by Sec. 10 of Contract Act in the following terms; ‘All agreements are contracts if they are made by the free consent of parties competent to contract, for a lawful consideration and with a lawful object, and are not hereby expressly declared to be void. ’ Following are the conditions for validity of the contract in detail. 1. Offer and Acceptance: There must be an agreement based on a lawful offer made by one party and a lawful acceptance of that offer from the other party. The adjective lawful implies that the offer and acceptance must satisfy the requirements of the Contract Act in relation thereto. 2. Legal Relationship: The parties must have intended their agreement to have legal consequences and legal obligations. Agreements of a social or domestic nature do not contemplate legal relations, and as such they do not give rise to a contract. 3. Lawful Consideration: Consideration means something in return (quid pro quo). For a valid contract both parties must have provided consideration, i. e. each side must promise to give or do something for other. However, it must be legal, real, harmless and not immoral. 4. Competent Parties: The parties to an agreement must be competent to contract. The contracting parties must be of the age of majority and of sound mind and must not be disqualified by any law to which they are subject. (Section 11) 5. Free Consent: Free consent of all parties is another essential element. Consent means that the parties must have agreed upon same things in the same sense. Consent is said to be free if it is not obtained by coercion, undue influence, fraud, misrepresentation or mistake. (Section 14) 6. Lawful Object: Object means ‘the purpose of entering into a contract’. For the formation of a valid contract it is also necessary that the parties to an agreement must agree for a lawful object. According to Sec. 23 the object of an agreement is lawful, if it is Not forbidden by law; Not fraudulent; or Not involves or implies injury to the person or property of another Not regarded immoral by the Court Not opposed to public policy. Not immoral. 7. Not Expressly Declared Void: The agreement must not have been expressly declared to be void under the Act. Sec. 24-30 and Sec56 specifies certain types of expressly declared void agreements: Agreement in restrain of marriage, trade, or legal proceedings. (sec. 26,27,27) Agreement by way of wager. (sec. 30) Agreement to do impossible acts. (sec. 56) Agreement the meaning of which is not certain. (sec. 29) 8. Writing and Registration: The prescribed legal formalities of writing, registration, etc. necessary for the agreement to be enforceable by law must have been observed. It must be in writing, properly attested by witnesses and registered if so required by law. The absence of any of the essentials explained above will not result in a valid contract but a void contract.

Saturday, September 28, 2019

Canine First Aid

Canine First Aid Essay FIRST AID FOR DOGSThe aims and rules of first aidFirst Aid treatment is based on three aims and four rules. Aims1. To preserve life2. To prevent suffering3. To prevent the situation from deterioratingRules1. Dont panic2. Maintain airway3. Control haemorrhage4. Contact a vetThe limitations of first aidThe goal of first aid is to help the patient as best as you can no more than that. First aid should only be used to preserve life until a veterinarian can be found. It must be remembered that not all patients can be saved: some will die. The following is a guide for basic first aid in various situations involving dogs. PoisoningMany items found in the home and garden can be poisonous to animals and it is vital that you know what to do if you suspect the dog has been poisoned. There are three ways for dogs to get poisons into their system:,h Ingestion,h Inhalation,h AbsorptionIt is important to bring the following to the vet if you suspect a dog has been poisoned:,h Packaging,h Note of approximate amount taken,h Time takenThis will help to speed up the process of treating your dog. Ingestion (non-corrosive)If the dog has ingested a non-corrosive poison vomiting should be induced. There are various ways to induce vomiting, these include:,h Salted water,h Mustard and water,h Washing soda,h Rompun injection (by veterinarian),h Wash out stomach (by veterinarian)Ingestion (corrosive)If a corrosive poison has been ingested it is vital that it is given a substance to either dilute or demulcent. To dilute:,h WaterTo demulcent:,h Milk,h Olive oilInhalationIf the dog has inhaled a poisonous substance you should do the following:,h Get into fresh air,h Keep warmWhen the dog gets to the vet they should have oxygen therapy. AbsorptionIf the dog has absorbed poison (such as from chemicals on the fur) the following action should be taken:,h Wash the dog, making sure to wear protective clothing,h Stop the animal from licking itselfIt is important to not use any chemicals when washing substances from the dogs coat. If you are unsure if your dog has been poisonedIf you are unsure if your dog has been poisoned, look out for the following symptoms:,h Breathing difficulty,h Unusual actions,h Digestive upset,h Irregular heart, rapid, or weak,h Shivering,h Convulsions,h SalivationThere are many different types of poisoning; each will affect your dog differently. Many do not produce immediate symptoms. Do not make the dog vomit if it is a corrosive poison or you do not know what kind of poison the dog has consumed. Consult a veterinarian for further instructions. Snake BitesIn the UK there are only two main native species of snake V the non-venomous grass snake and the venomous adder. However, with exotic pets becoming increasingly popular a lot of pet snakes escape from their owners houses V increasing the chance of dogs being bitten. Thankfully, many of these exotic species are non-venomous. Symptoms of snake bites:,h Pain,h Lethargy,h Vomiting,h Diarrhoea,h Salivation, thirsty,h Swelling at the area of the bite,h ShockIf a dog has been bitten by a snake seek immediate veterinary attention. While transporting, immobilise the part of the animal that has been bitten, keeping below the heart level. A constricting band may be used, with caution, to impede the spread of the venom. Keep the animal calm and confined during the transport. If possible try to identify the snake species, as it may be helpful in treatment. Wasp and Bee StingsDuring their life most dogs will be stung by either a bee or a wasp. The following will explain what to do if this happens. READ: Video Games As Art EssayBee StingsBees will only sting once and will leave their stinger in the dogs skin. It looks like a small black hair and if you can find it you should remove it with tweezers. Bee stings are acidic so the sting area should be bathed with a mild alkaline solution such as bicarbonate of soda. Wasp StingsIn most cases wasps will remove the stinger after stinging. The sting is alkaline so the area should be bathed in a mild acidic solution such a vinegar. In all stings a soft, painful swelling will appear. If this occurs in the mouth or trachea a cold compress should be used (e.g.: a bag of frozen peas) and the animal should be taken to the

Friday, September 27, 2019

Funding report Essay Example | Topics and Well Written Essays - 1500 words

Funding report - Essay Example Funding for music comes in various shades and forms. It could be in the form of grants, education scholarships, competitions, free music promotion, recording contracts, and instrument and equipment funding. We could categorise the different types of music business funding based on by source of funds, geographical region where fund can be used and so on. In this paper we shall restrict the discussion to the different sources of funding for music businesses available to persons living within the UK. Towards the end of the paper we shall place an emphasis on funding for pop and rock music. Starting with sources of public funding, there are three main government funded bodies that offer funding for music in England. These are the Arts Council England, the British Council and UK Trade and Investment (UKTI). Local counties also offer funding in form of small grants to artists who reside within those counties. With internationalism and globalisation being the drivers of modern economy the three bodies have also taken steps to strengthen the British music brand internationally. Arts Council England provides grants to a diverse genre of music therefore competition is definitely high and success is generally determined by the artistic quality of the applicant’s work (Artistic Assessment n.d.). The Arts Council’s Grants for the Arts is open to any UK citizen or EU citizen so long as the majority of the funded activity takes place within England. However, up to 15% of any grant given could be spent on activities outside England (Artistic Assessment n.d.). The Arts Council also has an investment portfolio for music that includes more than 134 regularly funded organisations. The total financial support given to these organisations in 2008/09 was  £98 million, an amount that was to rise to  £104 million by 2010/11. This portfolio

Thursday, September 26, 2019

DLP TV Series 6 650 Samsung (marketing strategy) Essay

DLP TV Series 6 650 Samsung (marketing strategy) - Essay Example They also have online service request, tracking and feed back options for the customers. Samsung has established it self well in the global market. They have a strong customer base through out the world. As the electronics industry is huge and attractive, it has the risk of very high competition. Fu Jiaozhi, an official from the China Household Electric Appliance Commercial Association, said the high-end TV sets market will be the focus for competition between rival manufacturers. (â€Å"China Daily, 2003). The global slow down has not affected the cash flow of Samsung; it still has been investing in producing new products. The DLP TV Series 6 650 Samsung is a new product in the market. People are shifting from the normal television sets to the LCDs and are willing to invest good amount for the televisions. DLP TV Series 6 650 offers a good alternative to consumers, worth, good novelty and product design within the DLP HDTV category. It has a good picture quality and performance. They have very good speakers and also option for 3D facilities. They also look good as the y have a slim finish and can be connected to any home theatre equipment. The facility to connect thumb drives, digital camera and media players are their advantages. There are a lot of major players like Sony, LG, Panasonic etc who give a close competition to their products and services. It is a high end television with various upgraded and inbuilt facilities. The target customers are the urban population who are willing to spend good amount of money for the home entertainment systems. Markets like India, China etc are all the consumer markets, and a good market penetration will increase the sales of his organization. DLP TV Series 6 650 Samsung is a new arrival in the market. The products of Samsung are produced at a low cost as the cost of labors in China is comparatively very low. But still Samsung must

Operations Decision Paper Research Example | Topics and Well Written Essays - 1000 words

Operations Decision - Research Paper Example The managers need to develop the skills of handling all the operational problems that arise during the course of decision making. It is important that all the environmental factors are taken into account so that the managers have all the information about the internal and external factors important for the organization’s improved performance and make effective decisions with utmost ease. In order to achieve the maximum level of operational efficiency, the managers need to make sure that they allocate the resources appropriately and utilize them in the best possible manner; the decision for resource allocation is very crucial and it is important that all the factors are properly taken into account. In case of small companies, the environment tends to be less competitive and the decisions can be made on the basis of intuition that require minimum quantitative analysis; while, in the case of large organizations that are operating in a huge market, the managers need to use both qu alitative and quantitative methods so that economical decisions are taken (Matasniemi, 2008). ... y in the case is the Operational Research method as it is the most scientific method of identifying the problems that arise in the management of operations of the business that comprise of employees, machines, material, resources along with macro environment factors such as government, defense, business and industry (Banarjee, 2012). Inline Skating Industry The company â€Å"Skating International† has its own market and currently, there are few competitors that are making foils and sails that are used by few skaters. The brand name is â€Å"Achievers† and it will be the only brand that will provide superb quality skating shoes at reasonable prices. The main aim of the company is to provide the customers with skating accessories that will help them in fulfilling their desire of having exceptional sensation towards enjoying skating. Research has shown that the companies that are manufacturing these accessories don’t use the sails that must be designed for skating; in fact, the sails are suitable for skateboards and windsurfing. Although there are many manufacturers of skates but still there is no single company that is manufacturing the skates’ accessories. The products that are being offered by the company will be Skate Sails, Blade Boots and Skate Aid. All of these products will be made from superb quality raw materials so that they are durable and the customers get their value for money. Competitor Analysis In order to survive in the dynamic environment in which changes are taking place at an accelerating rate, it is important that the companies do their environmental analysis on an ongoing basis. The skate sales have increased drastically in the last couple of years and the distribution within and outside the country has doubled as well. Although Skating

Wednesday, September 25, 2019

Web Content Outlier Mining Through Using Web Datasets Research Paper

Web Content Outlier Mining Through Using Web Datasets - Research Paper Example The amount of knowledge sought by an individual is always very specific. Search of specific knowledge from the huge databases and data warehouses has become an essential need. Knowledge seekers while surfing web content on internet, come across large amount of information which is irrelevant to the subject of search and it is generally referred as web content outlier. This research investigates different methods of extracting outliers from web contents. Using web contents as data sets, it is aimed to find an algorithm which extract and mine varying contents of web documents of same category. Structure of HTML is used in this paper with various available techniques to model for mining web content outliers. Web content outlier’s mining using web datasets and finding outlier in them. In this modern time, the information is overloaded with huge databases, data warehouses and websites. The growth of internet and uploading and storing of information in bulk on websites is exponentia l. Accessibility of information is also made very easy for common man through internet and web-browser technology. The structure of web is global, dynamic, and enormous which has made it necessary to have tools for automated tracking and efficient analyzing of web data. This necessity of automated tools has started the development of systems for mining web contents. Extracting data is also referred as knowledge discovery in datasets. The process of discovering patterns which are interesting and useful and the procedures for analyzing and establishing their relationships are described as data mining. Most of the algorithms used today in data mining technology find patterns that are frequent and eliminate those which are rare. These rare patterns are described as noise, nuisance or outliers. (Data mining, 2011) The process of mining data involves three key steps of computation. First step is the process of model-learning. Second step is the model evaluation and the third step is the u se of the model. To clearly understand this division, it is necessary to classify data. (Data mining, 2011) The first step in data mining is the model learning. It is the process in which unique attributes are found about a group of data. The attributes classify the group and based on it an algorithm is built which defines the class of the group and establishes its relationship. Dataset with their attributes known are used to test this algorithm, generally called classifier. Results produced by the classifier assist in determining minimum requirements for accepting data of the known class. It gives the amount of accuracy of the model and if the accuracy is acceptable, the model is used to determine the similarity of each document or data in a dataset. (Data mining, 2011) The second step in data mining is the model evaluation. Techniques used for evaluating the model depend largely on the known attributes of data and knowledge types. The objectives of data users determine the tasks f or data mining and types of analysis. These tasks include Exploratory Data Analysis (EDA), Descriptive Modeling, Predictive Modeling, Discovering Patterns and Rules, and Retrieval by Content. Outliers are generally found through anomaly detection, which is to find instances of data that are unusual and unfit to the established pattern. (Data mining, 2011) Exploratory Data Analysis (EDA) show small data sets interactively and visually in the form of a pie chart or coxcomb plot. Descriptive Modeling is the technique that shows overall data distribution such as density estimation, cluster analysis and segmentation, and dependency modeling. Predictive Modeling uses variables having known values to predict the value of a single unknown variable. Classification

Tuesday, September 24, 2019

Assault weapons gun ban Essay Example | Topics and Well Written Essays - 750 words

Assault weapons gun ban - Essay Example The reason for which Jimmy Carter, along with George W. Bush and Bill Clinton, supported this law has to be analyzed. This law got passed in 1994 and expired in ten years. When the law was approaching expiration date various police organizations, including police chiefs and sheriffs, have demanded for its renewal. They called on the President of that time to renew and strengthen the law. But with a sparkle from the White House, protestors demand prevailed and the ban was terminated. Carter personally owned a lot of different types of gun which includes â€Å"two handguns, four shotguns and three rifles, two with scopes† (Carter, n.p.). He and his other friends cherished the ownership of the guns. He used these guns for the purpose of hunting in his family woods and field and occasionally he also took his family along with his friends for hunting. He and his friend used to cultivate innovate ideas to do various things on the gun. He even used to display many of them in the whit e house. According to Carter, in case of hunting if one maintains safety there should not be any problem. But neither Carter nor his friends wanted to posses such an assault gun. Since they believed that the assault guns were used to either kill policemen or any other civilian. He believed that White House should not have given up trying to reinforce the law, even if there were lots of political difficulties. A lot of emotions were also attached with the ban of the Assault Weapons. The N.R.A. leaders were highly influenced by the firearm industry and they started believing that the firearms were being snatched away from them and the house owners were deprived of ways to protect themselves. He argues that the fire industry and other governing authorities should reassess the safety and accountability and should enact the ban again. And if the politicians fear the disapproval of N.R.A during election then it was not at all a solid reason (Carter, n.p.). The view of Wheeler should also be assessed in order to have clear understanding of the law. Wheeler has pointed some predictions by studying the psychology of the criminals. He argues that assault guns were not used by the criminals because they were difficult to hide. The data of National Institute of Justice says that â€Å"Assault Weapons were used in fewer than eight percent of gun crimes even before the ban† (Wheeler, n.p.). Moreover the criminals were more inclined to use high quality hand gun. â€Å"Handgun Epidemic Lowering Plan (HELP Network)† (Wheeler, n.p.) says that the end of the ban over the assault gun would lead to a wave of increase crime. And that the root of all evils was the gun. But this belief had no basis. As the panic of the assault gun faded, the activists try to discover a new type of gun. â€Å"California Gov. Arnold Schwarzenegger’s desk lies a bill to ban .50 caliber rifles† (Wheeler, n.p.). That has resulted into the myth that the terrorists used .50-calib er rifles and assault rifles were used by the criminals. But the reports actually suggested that .50 caliber was used by the criminals also. Wheeler also argues that Assault Weapon was deliberately misrepresented by the anti gunners as machine guns. In the year 2003 CNN showed a video of machine gun and

Sunday, September 22, 2019

Contemporary Marketing Essay Example | Topics and Well Written Essays - 3000 words

Contemporary Marketing - Essay Example The company was formed in 1998, by two Stanford University students Larry Page and Sergey Brin (Hamen, 2011). The company has grown extensively over the years and has in many ways surpassed the basic objective of accumulating all information and providing easier accessibility across the globe. As explained in the website, â€Å"From offering search in a single language we now offer dozens of products and services—including various forms of advertising and web applications for all kinds of tasks—in scores of languages. And starting from two computer science students in a university dorm room, we now have thousands of employees and offices around the world† (Google, 2011). The company now has a wide range of products and services and several different options which help make it easier for the world to share the information. For instance the company has developed several applications like Gmail, Google Calendar, Google Docs and many others which help in better acces sibility to data and information. The further sections will deal with the impact of technology on several aspects of marketing of Google (Hamen, 2011). Marketing communication is a major part of every business and in some ways can be considered to be a subset of marketing itself. The marketing of a company is based on the marketing mix (4 Ps in the case of products and 7 Ps in the case of services), and marketing communication is a means of promoting the marketing mix of a company. Technology and marketing go hand in hand and with the ever changing technology, the options for marketing communication have also increased to a great extent (Jobber, 2009). Marketing communication within a company needs to be integrated as it helps keep the customers aware of the brand name and image. Advancing technology is definitely not a trend and this has a number of

Saturday, September 21, 2019

Describe 3 of the deaths in Hamlet Essay Example for Free

Describe 3 of the deaths in Hamlet Essay Hamlet is a revenge tragedy play, which was a very popular theme at the time Shakespeare was writing. Hamlet was written at the time Shakespeare was writing at his very best. Hamlet was written over 400 years ago and has outlived most other revenge plays but still continues to hold great appeal due to the effect it has on all those who see and hear it As Hamlet is self-titled we know Hamlet will die and this event will bring a close to the play. Because we know how the play will end Shakespeare entices the audience by keeping us on the edge about when, where, how and why it will happen. In this essay I have chosen to write about the death of Gertrude, Claudius and Hamlet. All three characters die in the last Act, Act 5. Hamlet is a play set in Denmark. His father at the start of the play has already been brutally murdered by his (Hamlets) Uncle Claudius. brother to the deceased king. The ghost of his father appears to him and reveals how Claudius so cunningly murdered him, and begs Hamlet to avenge his death. Ghost: Revenge his foul and most unnatural murther Hamlet is already furious with Claudius for marrying his mother within such a short time of his fathers death. Hamlet: for look how cheerful my mother looks, and my father died withins two hours. This causes him to wonder if his mother had had any part in his fathers murder also. Hamlet within him vows to obey the ghost of his father. While all this is happening Fortinbras of Norway is invading Denmark with the aim of avenging his fathers death that was taken by the late king of Denmark, Hamlets father. Hamlet decides to have the players play a play similar to the death of his father to see the reaction of Claudius. Hamlet: Ill have these Players, Play something like the murder of my father, Before mine uncle. Ill observe his looks, He wants to be sure that the ghost was not evil and telling the truth. The play is a success and Hamlet can now be sure that Claudius is responsible for the death of his father. Gertrude, Hamlets mother along with everyone else are outraged by Hamlets change in character. Polonius, Lord Chamberlain, a good friend to the king believes Hamlet is mad as a result of his daughter Ophelia rejecting Hamlets love as he had ordered her too. Gertrude asks for her son to visit her in her bedroom. Here Hamlet mistakenly stabs Polonius who is hiding behind the curtains when he heard Hamlets footsteps approaching after having been talking to the queen. Queen: O what a rash and bloody deed this this! Polonius children now change in character. Ophelia turns mad and drowns herself, while Laertes returns from studying in France and is also driven to avenge his fathers death. Hamlets madness causes Claudius to send Hamlet to England. However, Hamlet who seems always to be one step ahead of the king knows Claudius has sent a letter requesting Hamlets death and switches the note with his own for Rosencrantz and Guildenstern, once friends of Hamlets, before they decided to betray him by becoming Claudius informants and so they are killed. Hamlet: Why do you think I am easier to be played on, than a pipe? Later Hamlet returns to Denmark, to much surprise of the king to see Ophelias burial. Throughout the play the audience are kept in suspense about as to when Hamlet will strike Claudius. Hamlet can be seen as a hero or villain. Shakespeare makes the audience see Hamlet as a hero. Through Hamlets soliloquies the audience feel as though they come to know Hamlet. In this they experience what he is going through and feel his hurt and pain, which is not enough to justify his killing on Claudius but to understand why he feels he must. Act 5 begins with the burial of Ophelia and shows the first confrontation between Laertes and Hamlet. Here Shakespeare allows the audience to acknowledge that both Laertes and Hamlet are suffering in the same way; although Laertes has lost both a father and sister, as Ophelias death was a result of her fathers. However, Shakespeare causes the audience to excuse Hamlets wrong deed and side with him. Scene two from this Act is the last in the play. Claudius falsely welcomes Hamlet home. However, Claudius and Laertes see Hamlets return as a suggestion to all their troubles, to kill Hamlet once and for all. They cunningly plan a duel between Laertes the best fighter and Hamlet. What they do not know is that Hamlet has been practicing during his time in England. Hamlet: since I went into France, I have been in continual practice; The fact that this is secretly revealed by Hamlet to Horatio, Hamlets good friend, reveals also a secret to the audience. At this point the audience cannot be sure if Hamlet will die, as the title suggests. The audience are at this point plagued with the fact that Laertes, Claudius and Fortinbras are all awaiting the day that Hamlet will die. During the wager Hamlet is the first to make a hit. Laertes and Hamlet soon scuffle and wound each other. However, Laertes sword has poison on so that when he hits Hamlet he will die. This was the plan of the king and Laertes. The king who also put a poison pearl into the win glass If Hamlet give the first, or second hit,.. is horrified when Gertrude drinks from the cup in honour of Hamlet giving the first hit. Gertrude soon dies. Queen: The drink, the drink, I am poisond. The fact that we never truly knew until this point that Gertrude was an innocent party in her husbands murder causes us to feel pity for her. We also pity her as Claudius tried to have her son executed and pretended to love her in order to keep the thrown. The audience can now see that Gertrude was tricked from the beginning by Claudius, as well as he taking her husbands life he has also taking her own. This shoes that Claudius was only looking after himself. We pity her because Claudius could never have loved her especially not as her husband did as he was the cause of her death. The way in which she was killed causes the audience to experience horror because we did not expect Gertrude to drink the wine. Also because it was her husband that allows her to die. Although he tries to stop her he does not try hard enough. King: Gertrude, do not drink. It horrifies us that Claudius was so eager to get rid of Hamlet that he even had two plans and so we fear what will happen next. Claudius is already aware that it will only be a matter of time before Hamlet will die as before Laertes did he had cut Hamlet. We also fear what Claudius has become and if he will stop at anything. Hamlet has now lost a mother and a father at the hands of Claudius. The audience are now fearful of the amount of hatred Hamlet must have for Claudius and fear how he will react. The sudden death of Hamlets father and Gertrude leaves the audience disturbed as both had no time to repent their sins and we fear if Gertrude will become Doomd for a certain term to walk the night: The plot of Hamlet thickens more and the audience at this point are left to wonder if Claudius will get away with his terrible deeds. However, during the scuffe hamlet picked up Laertes sword when it the scuffle it had been knocked forom his hand and Hamlet had wounded Laertes At this moment Laertes exchange forgiveness with Hamlet and his last few words ensure that the king, He is justly served. Laertes: the King, the Kings to blame. When Hamlet is sure that it was Treason he stabs the king and he is only then justly killd with mine own treachery. The king is now dead. At this point it is hard to pity Claudius because he has been the cause of so many lives being taken away. In spite of this we pity him because he is human and he did attempt to stop Gertrude which he did not have to do. We can also pity him because Hamlet and his parents had a good family and wealth and friends all of which Claudius did not. The audience have been forced from the start of the play to believe that there is an after life and world, heaven and hell. We therefore pity what will become of Claudius because he has been so bad. Ghost: My hour is almost come, When sulphurous and tormenting flames This shows that the ghost of Hamlets father is going to hell, so we pity Claudius as we assume he will be here also. On the other hand we cannot forget what Claudius has done and are horrified by his actions. The numerous ways he has tried to kill Hamlet on several occasions and stopping at nothing, no matter who he hurt in order to achieve his aim. We are again horrified by Claudius allowing his wife Gertrude to die. At this point it looks as though everyone with a path to the throne is dead. We now fear for the people of Denmark about who will save them from Fortinbras. Hamlet who was stabbed by Laertes with the poisonous sword is now feeling the effect of the poison and can feel it taking over him. Hamlet departs this life. Hamlet: I am dead, Shakespeare causes the audience to pity Hamlet because he has lost both his mother and father and lover. Claudius had been attempting to kill Hamlet for ages and because he kept failing the audience feel as though hamlet has outwitted Claudius until now and so maybe he would live. The audience have become attached to Hamlet and it hurts them to see him die. We pity Hamlet because he may also go to hell when he was only trying to get even with Claudius the way he thought was right. The audience also pity Hamlet as if Claudius had let his father be, then the ghost would not have told him the truth and he would still be alive. Nevertheless, we fear for Hamlet in the next life, and are horrified that Hamlet dies and Fortinbras is left to take the throne without opposition. Hamlet is very much a revenge tragedy. The first murder of his father led to a string of killings after it. In stating this it shows that certain deaths had to come first in order for others to occur. I think Shakespeares Hamlet has been such a success due to the truthful implications it deals with. Revenge is thought to be wrong, immoral, but in Hamlet Shakespeare expresses revenge as the natural human impulse that lies within us all. Hamlet is only acting out of the love he has for his father, which is undoubtedly the reaction each and every one of us would take. Although revenge was a popular theme during the time Hamlet was acted, Shakespeare takes it that great leap further which no author had began or even thought about doing. Instead of hating the avenger and wanting him to die we appreciate his aim and hence feel sorry for him at his death. Shakespeare forces us to perceive Hamlet for the person he is and not for the vile act he commits. The concept of Claudius having destroyed his family as well as his life remains at the forefront of our minds whilst watching the play and causes us to feel immense pity towards Hamlet and we the audience can therefore not loathe him. What makes Hamlet all the more fascinating is that we are kept in suspense as to if Gertrude had a part in the murder of her Husband. Throughout the play Shakespeare causes the audience to experience horror, pity and fear by making the next stage in the play all the more unpredictable. Just when we think we know what will happen due to what has been revealed to us through conversation and especially soliloquies does Shakespeare prove us wrong by adding an unexpected twist. I think Hamlet has also been such a success because it shows how life in this world is so short and puts fear into us about life in the next. It also shows how one incident can affect so many lives so much. The fact that Hamlet is betrayal within a family causes the audience to feel that little bit more afraid. When the tight unity between families is broken then respect for anyone can hardly be possible, as the ability to trust and love another must be hard. Even so Hamlet did and still does love Ophelia. Hamlet: I lovd Ophelia; forty thousand brothers Could not (with all their quantities of love) Make up my sum. What wilt thou do for her? Shakespeare causes even more pity towards Hamlet, as through this quote it is inevitable that Laertes loss was also a loss of Hamlets.

Friday, September 20, 2019

Examining Revenue Management In The Hospitality Industry Tourism Essay

Examining Revenue Management In The Hospitality Industry Tourism Essay Revenue is dependent on capacity, market segment, duration, supply and demand. To manage revenue means to manage the source of income, by doing which can maximize the profit. Furthermore, the purpose of revenue management is to provide right products to right customers at right time at right price. The illustration below showed the concept of revenue manager: In this article there will be four areas of revenue management being discussed: restaurant, function room, hotel room and golf course. After reading this article, you will understand how revenue management can be applied to these areas, and what it will affect. Restaurant is a perfect candidate for applying Revenue Management because of its five elements: fixed capacity, demand inventory, time-variable demand, appropriate cost structure and segmentable customers. There are two traditional ways to manage revenue in restaurants: duration control and pricing strategy. Duration control helps to maximize the revenue, it consists uncertainty of meal durations and arrivals. In order to analyze and forecast meal durations, history data should be collected from reservations and POS system. Observing the guests during different meal periods will help to have more accurate information. After analyzing and forecasting meal duration, some strategies can be applied to control it. Those strategies include menu design, service process, staffing, improving communication, external approaches and reduce change over time. In addition, arrivals also needed to be controlled because of inconstant customer behavior. Some arrival-related problems may occur for example no shows, short shows and late shows. These can be prevented or avoided by overbooking, applying maximum hold time, taking deposits and forecasting. Reservation strategies and seating methods can help controlling duration. For example, no reservations available for peak hours can prevent having empty tabl es; call-ahead seating during busy times can avoid having empty seats. Pricing strategy could be based on different elements. Common strategies include cost based pricing, competitive pricing and demand based pricing. Cost based pricing is setting the sale price based on cost, for instance sale price equals three times of cost. Competitive pricing is considering the prices of competitors products when setting a price. Demand based pricing means when demand goes up, the price goes up as well, for example higher dinner prices for weekends. Rate Fences are always being used when a restaurant apply demand pricing strategy. A rate fence simply means a certain price provides to a certain people. There are many ways to introduce rate fences to a restaurant for instance buy one get one free, happy hour, coupon, higher price for window seats and so on. While setting a price of a product, business ethics should always be considered. A fair price makes customers happy. Here is a way to make sure the price is fair: compare the price with competitors but not fixing it with them or go much higher than their price. The best way to practice Revenue Management in restaurants is RevPASH, which stands for Revenue per Available Seat-Hour. It gives a clear picture of revenue made by the covers, and combines with the two methods mentioned above. Simply three ways to increase RevPASH: sell more covers, increase average check and increase seat occupancy. There are five steps to develop Revenue Management in restaurants: establish baseline, understand the causes, develop strategy, implement strategy and monitor results. To establish a baseline means to collect information on arrival patterns, RevPASH patterns, unconstrained demand, meal duration, customer preferences, seat occupancy, table occupancy, and so on. Some tools can help to understand the causes of those data, like fishbone diagram and bottleneck analysis. Strategies that have been mentioned above could be applied to a restaurant according to its specific problems or needs. When implementing the strategies, it is important to communicate with employees, to let everyone understand the strategies in order to enhance the productivity, efficiency and as well as ensuring the outcome. After implementing the strategies, the outcome should be monitored consistently. It helps to determine whether the strategies are useful or not and if there is anything that can be improved, monitori ng RevPash performance, dining time, and compare to baseline performance help to measure the results. Revenue management in room: In hotels, the goal of Revenue Management is to sell the right room (types of rooms such as standard, luxury or sea-view, etc.) to the right customers (from a particular segment) at the right time (depending on demand) and for the right price (when customer wants room). The necessary attributes of hotel revenue management include segmented market which hotel bases on to manage the tradeoffs between a higher room rate for business customers, and a lower room rate for leisure customers. Business customers are willing to pay a higher price holding a flexible room which can be book at last minute and leisure customers are willing to give up in exchange for a cheaper room. Fixed capacity means the number of rooms in hotels is impossible to increase or decrease. The appropriate cost structure means the fixed cost is higher than the variable cost. Perishable inventory means rooms cant be stored, and can lose its value forever for that night if it is unoccupied. Demand fluctuation which accords with seasons and day of the week, which affect the room pricing process, for example, in peak season, the hotel can increase its room rate to maximize revenue, while during valley season, reducing rate is the best way to increase utilization. (Admin, 2010) Revenue management is introduced in room as RevPar, which stands for revenue per available room. It is a measure of how the how the hotel has been able to fill room during low season and high season with appropriate for rates to maximize the profit. To achieve the most effectivity of RevPar, revenue manager need collect historical data from hotel and consider another hotels to implement it. There are two factors that need to be controlled carefully, including duration control and demand based pricing. For duration control, revenue manager can reduce arrival uncertainty by credit card guarantee, calling customers the day before to confirm the guest reservation and arrival time; overbook rooms to maximize occupancy in order to fill up the no shows, and if there is no show, the revenue manager will have penalties for guest like charging the first night room rate; call the night before to in-house guests to verify their departure time. Besides, there is a money penalty to the guest if they depart earlier. Otherwise, to minimize the duration uncertainty, revenue manager should forecast demand accurately based on historical data. For the pricing, most hotels have the categories of pricing which determine how much customer are going to be charged and who are willing to pay that price. Price are determined by the following three ways: Competitive pricing which the price is esta blish based on comparing with competitors; reference pricing which the price is lower than the hotels main competing brand; and demand based pricing, which price is set up depending on season, or guests demand such as view of room, length of stay. Those prices which decided who are willing to pay are introduced in revenue management as rate fences. Actually, rate fence is a condition somebody has to meet to get a particular price; on the other hand, its also a tool to maximize revenue for hotel, because the hotel takes the ultimate advantage of the rooms condition. In general, revenue manager classify rate fences into physical and logical fences correlating the different market segment, and the condition as well, as shown in the table below: Nowadays, customers consider that hotels set the room rate based on market segment is unfair, such as charging different prices for the same room with different types of customer. Mindshare is one of the biggest challenges for revenue manager and mindshare means that customers are more knowledgeable in the way that hotel set the room rate. Therefore, they examine rate fences as logical, transparent, clear communicated and fixed to generate short-term profits, and create long-term customer loyalty. Revenue management in Golf course: In the golf industry, it is also suitable for practicing revenue management because the condition of fixed capacity, predictable demand and perishable inventory. The land, equipment and facility are fixed capacity; the investment on land, facility and maintenance are incredibly high. The demand can be segment by different season and time. It could be forecast by using historical data, customer profile and arrival pattern. The tee times are perishable inventory. Once the product is not sold, we cannot recall the losses that made from that period. The main sources of revenue come from club membership fees, golf lessons, golf clubs, cart fees and green fees. To practice revenue management in their business, they would need to have different strategies to increase revenue. For example, Duration and arrival control, Discount allocation, Marshalls, Peer pressuring by posting playing time and Different pricing. To restrict the arrival, the company can set up arrival policies to minimize the risks of no show, late show and short show. To control duration, they can use Marshalls and Posting Playing time as strategies to pressure or remind the guest how long they have been playing. The other strategy is having different prices in different times and course. The company can provide Time of the day based pricing according to the Hot and Cold time during a day and provide Membership fees and senior prices to the customer. Discounts can offer to big party, ages and the time of reservation. The discount rate can apply based on reservation time and location. Disney Golf in Orlando applied revenue management to its golf club. First, they have segmented the market to manage the availability of tee times by the party size, business people, and different group for example, locals, foreign. They provide discount and packages to the groups, members of the club and employees. They even provide discount to beginning level golfer. When they forecast the high-demand day comes, they will close lower revenue buckets for all or part of that day and selected profitable course or customer to reach the highest profitable customers and use up-selling to motivate consumer to spend more money. The company said it is so important to know 6W, who, what, where, when, why and how. They use a very attractive way to collect the customer data. The customers who give their personal data and opinion will receive discount where appropriate. By using this strategy, they increased the customer loyalty. Since Disney Golf implemented revenue management in 2001, it is a great success to the company. Lastly, when company set up a price, it has to be logical, transparent and fix. Consumers have an acceptable price to most products in their minds. Company should always communicate and maintain relationship with the consumer. It is an easy way to know their opinion. Do not against the law by fixing the price with the competition and price gouging which setting up the price higher than the fair price. Revenue management in function space: Firstly, the function space cant be extended so that the maximum capacity is fixed. However, the function space can be adjusted since hotels apply air wall which can separate a function room to be 2 or more meeting rooms. Secondly, same as rooms, restaurant, and golf course, if the function room doesnt sell out it means the hotel loses the chance of making revenue- perishable product. Third, there is variable and uncertain demand. Even though customer pays the deposit, they might break the contract. Furthermore, the price sensitive varies from people to people. Lastly, function room pricing structure are setting higher than it should be in case customer demands to cut down the price or a special package. Thus, hotel will not lose money in business. Hotel will send contract which includes time of duration, price, quantity of customers and related agreements after guests confirm with sales to ensure both parties right. There are 2 rights of decisions that hotel hold on hand- price and duration. Pricing a function space need to consider the rooms sales and FB sales. Same as rooms and restaurant revenue management, hotel apply rate fence by physical and non-physical reasons. Physical rate fence can work by facilities and equipment, location and ceiling height. For example, price will be set higher in the high technical function room compare with the others. Non-physical rate fences will determine by booking pace, transaction characteristics, frequency of reservation and timing. Hotels mostly offer special meeting package with two different prices in a day and different price between weekday and weekend since price based on demand. Generally, there is higher demand in the evening day part then afternoon section. However, customers might think it is unfair to get higher price because of different day part. The second element that hotel doing good at control is duration. The duration can be predicted by customer history in Delphi. Hotel normally asks guests refundable deposit and prepayment in order to prevent no-show or cancellation since the duration uncertainty. Furthermore, if guests hold the function room longer then the agreement time, they might have to pay extra fees since hotel need more people to turn down the room. In order to apply revenue management in function space, hotel need to set up the baseline and understand the drivers of performance which needs to consider customer profile, revenue contribution, seasonal demand history, ConPAST, current market environment, and demand behavior of segments. The next step is to develop strategy like pricing, special package and so on. Following the point mentioned above hotel need to implement the strategy properly and also monitor the outcome. According to hotels forecasting, hotel will keep the function room for the most profitable customers for each function room in high demand period. However, hotel wont say obviously that you need to pay higher amount of money in order to get this function room. Actually, people feel it is unethical to reject customers if you are waiting for higher contribution customers. Nowadays, hotel sets the minimum charge for each function room. As long as both party make agreement and sign the contract, hotel dont have rights to sale the reserved function room to other people. Conclusion Revenue Management is a perfect tool to maximize profit in any organizations. Restaurant, Golf, Function Space and Hotel rooms, they all have the same condition of fixed capacity, predictable demand and perishable inventory, they all can implement revenue management to maximize profit in their way. In order to achieve the goal and objective, the strategies have to be logical, circumspect with every single historical data and decision making from your experience.

Thursday, September 19, 2019

Finding Hope in Failure Essay -- Personal Narrative, essay about mysel

It was a cold, dark morning when the phone rang. It was boisterously loud and the clock read six o'clock. The deafening noise jolted us again, and there was only one way to make it stop. Chris picked up the phone and in a tired, drowsy voice, answered, "Hello." "Wake up call," I could hear Coach on the other end of the line. "Wake everyone else up in the room and the bus will leave at seven." "Okay," and with that, Chris hung up the telephone. I could hear him bury his head back into his pillow to try and get just a few more minutes of sleep before the big day. "C'mon, Chris, you get in the shower first," Taylor ordered from the other bed. "You're already up." Chris conceded and worked his way to the shower. Everyone in the room knew it too, due to his grunting and whining under his breath. Soon enough he was out of the shower and so were Taylor, Anders, and I. We ate breakfast with the rest of the team downstairs in the hotel in silence. It was too early to talk or chat. Everyone knew that one thing was going to be on their minds: winning. It was not worth discussing, either. Everyone knew that our varsity eight was possibly the strongest that McCallie had ever had, and that we had a good chance of winning some gold medals that day, if not a great chance. We loaded on the bus like ants, noiselessly flowing into one little opening. The bus ride was silent all of the way over as well. Everyone's heads, looking intently forward, were slightly jostling along with the bumps in the road. Some tried to sleep, but the tension and excitement was to o much for most of them to be successful. Eventually, we arrived at the race course. Stepping off of the bus, the exhilaration was uplifting as we looked across the sunrise ... ...re are fifty boats in our race, and we got third, now that's not too bad for a busted fin." This did not seem to help, however, as there was no apparent response. "I don't know about you all, but after this, it just makes me want to bust by butt during the off-season to come back here in the Spring and kill them all!" Slowly, but surely, everyone's heads raised. I realized that this was not the end at all. We made a pact to work our hardest to come back in the Spring and win out as much as possible. As the commotion settled, Chris quieted us down, "Okay, come on guys." He put his hand in the middle of the circle. We all followed his lead. "We will not let an unfortunate accident get in our way! We will not settle for third place!" With that we all threw our hands up into the air. I looked around and smelled the breeze. Suddenly it was the best feeling in the world.

Wednesday, September 18, 2019

A Comparison of One Flew Over the Cuckoos Nest and Dead Poets Society

One Flew Over the Cuckoo's Nest Vs. Dead Poets Society      Ã‚   "Two roads diverged in a wood, and I-I took the one less traveled by, and that has made all the difference." (Robert Frost) In today's world there is no tolerance for the individual thinker. It is not acceptable to modify or bend the rules of society. Society is civilized, and to be civilized there must be rules, regulations and policies that prevent. Individuality leads to a mess of chaos. To prevent disorder, institutions in society keep these rules strongly enforced. Man creates these institutions in order to provide convenience and stability in everyday life. Then instead of man running these institutions, the institutions begin to reverse the role of power and the institutions are running man. He is rendered helpless to what he has created. With the institution in power it has become smarter and stronger than man, working to destroy individuality with the invisible machine running smoothly. Positions of power and authority are given to some. The power chang es those who it into an unfeeling, ruthless, cold machine. Also they become part of the institution, forgetting the real purpose of their jobs. Institutions force individuals to bend and mold the standard and give up freedom and individuality. Some individuals are unable to conform when their will to remain creative and self-reliant is too strong; they fight against the current that society and its institutions create. Beating the system is another thing; those who attempt to beat the system are often referred to as romantics because they do not focus on the reality of situations. The system cannot be beat. If one official of an intuition is taken down there will be a many more waiting i... ...de. Those who face their weaknesses and accept themselves are successful in the manner that they obtain complete control of their lives instead of letting society influence their decisions. Rebelliousness of this force results in complications and dissatisfaction of those who uphold its values. A choice must be made whether to walk in that straight line of society or branch out to the new world.    Work Cited 1.Chapman, Jeff and John D. Jorgenson, eds. "Kesey, Ken." Contemporary   Authors Vol.54. Detroit: Gale, 1997.    2.Frost, Robert. Selected Poems by Robert Frost, New York: Barnes and Noble, 2001    3.Graham, Judith, ed. Current Biography Yearbook Vol. 1962, New York: The H.W Wilson Company, 1993    4.Kesey, Ken. One Flew Over the Cuckoo's Nest, New York: Penguin Group, 1962    5.Weir, Peter. Dead Poets Society, 1989 A Comparison of One Flew Over the Cuckoo's Nest and Dead Poets Society One Flew Over the Cuckoo's Nest Vs. Dead Poets Society      Ã‚   "Two roads diverged in a wood, and I-I took the one less traveled by, and that has made all the difference." (Robert Frost) In today's world there is no tolerance for the individual thinker. It is not acceptable to modify or bend the rules of society. Society is civilized, and to be civilized there must be rules, regulations and policies that prevent. Individuality leads to a mess of chaos. To prevent disorder, institutions in society keep these rules strongly enforced. Man creates these institutions in order to provide convenience and stability in everyday life. Then instead of man running these institutions, the institutions begin to reverse the role of power and the institutions are running man. He is rendered helpless to what he has created. With the institution in power it has become smarter and stronger than man, working to destroy individuality with the invisible machine running smoothly. Positions of power and authority are given to some. The power chang es those who it into an unfeeling, ruthless, cold machine. Also they become part of the institution, forgetting the real purpose of their jobs. Institutions force individuals to bend and mold the standard and give up freedom and individuality. Some individuals are unable to conform when their will to remain creative and self-reliant is too strong; they fight against the current that society and its institutions create. Beating the system is another thing; those who attempt to beat the system are often referred to as romantics because they do not focus on the reality of situations. The system cannot be beat. If one official of an intuition is taken down there will be a many more waiting i... ...de. Those who face their weaknesses and accept themselves are successful in the manner that they obtain complete control of their lives instead of letting society influence their decisions. Rebelliousness of this force results in complications and dissatisfaction of those who uphold its values. A choice must be made whether to walk in that straight line of society or branch out to the new world.    Work Cited 1.Chapman, Jeff and John D. Jorgenson, eds. "Kesey, Ken." Contemporary   Authors Vol.54. Detroit: Gale, 1997.    2.Frost, Robert. Selected Poems by Robert Frost, New York: Barnes and Noble, 2001    3.Graham, Judith, ed. Current Biography Yearbook Vol. 1962, New York: The H.W Wilson Company, 1993    4.Kesey, Ken. One Flew Over the Cuckoo's Nest, New York: Penguin Group, 1962    5.Weir, Peter. Dead Poets Society, 1989

Albert Camus the Plague :: essays research papers

Albert Camus' "The Plague" The novel that I chose to do this report on was, "The Plague", by Albert Camus. It is about a plague that hit the European countries in the middle ages. I chose to describe the literary term of parallelism. Here are some following facts about the story's plot that involve parallelism through the novel. The novel begins at Oran where the plague becomes known. The main character, Dr. Gernard Rieux, is a doctor. In the beginning of the story he finds a dead rat on the floor. Even in those times rats were not found dead on the middle of the floor. This was unusual, but he threw out the rat and forgot about it. Eventually the dead rats began to pile into large masses and burned. Soon after there were some people that got very sick, which made Mr. Rieux very curious. These reports of these ill people and the death of the rats were the beginning of the parallelism for this story. Since Bernard was a doctor he was the first to actually attempt to help one of these sick people. Michael was his first patient in this matter. He was the sickest person that the doctor had ever seen. Michael was pale white and vomited often, he hurt so much from the vomiting that he seemed paralyzed. Mr. Rieux tried to help the man the best that he could, but he ended up dying. Michael was the first person to die of this illness. After his death, many cases of this illness were reported widespread. Again more details of sickness and death, this is the parallelism for this novel. As the reports of sickness and death came to inform Dr. Rieux, he tried to comfort and cure the plagued patients. About ninety percent of the people infected had died. He wanted a stop to this plague. Quickly he linked the rats with the people. He knew that the rats began to get sick before the people did. At this time many people had the plague, except for the Chinese visitors. They never were infected. As the plot moves on death, sickness and the plague are still relevant. He studied their behaviors and everyday tasks and learned that they do something that was never often done in these middle ages. Not many people in these days bathed. The doctor began to notice that the people that bathed never

Tuesday, September 17, 2019

Solutions Hmwk

ISDS-361AExercises 1. Mean, Median, Mode, Range, Variance & SD Panayiotis Skordi 1. A basketball player has the following points for seven games: 20, 25, 32, 18, 19, 22, 30 Compute the following measures of central location: a. mean b. median c. mode Answers a. Mean[pic] b. Median[pic] c. Mode There is no mode. 2. Consider the following population of measurements: 162, 152, 177, 157, 184, 176, 165, 181, 170, 163 a. compute the mean b. compute the median Answers a. Mean[pic] b. Median [pic] [pic] 3. The following data represent the number of children in a sample of 10 families from a certain community: , 2, 1, 1, 5, 3, 0, 1, 0, 2 a. compute the range b. compute the variance c. compute the standard deviation Answers a. Range [pic] b. Variance[pic] Remember that [pic] [pic][pic][pic][pic] 14 2. 14. 41 22 0. 10. 01 31-0. 90. 81 41-0. 90. 81 55 3. 19. 61 63 1. 11. 21 70-1. 93. 61 81-0. 90. 81 90-1. 93. 61 102 0. 10. 01 Total1924. 9 [pic] Method 2[pic] [pic][pic][pic] 1416 224 311 411 5525 639 700 811 900 1024 Total1961 [pic] This is the same answer – as we would expect. c. The standard deviation is [pic] 4. Consider the following population of measurements: 162, 152, 177, 157, 184, 176, 165, 181, 170, 163 a. ompute the standard deviation Answer [pic] Remember that [pic] [pic][pic][pic][pic] |1 |162 | |-6. 70 | |44. 89 | |2 |152 | |-16. 70 | |278. 89 | |3 |177 | |8. 30 | |68. 89 | |4 |157 | |-11. 70 | |136. 89 | |5 |184 | |15. 30 | |234. 09 | |6 |176 | |7. 30 | |53. 29 | |7 |165 | |-3. 0 | |13. 69 | |8 |181 | |12. 30 | |151. 29 | |9 |170 | |1. 30 | |1. 69 | |10 |163 | |-5. 70 | |32. 49 | | | | | | | | | | | | | | | |Total |1687. 0 | | | |1016. 10 | [pic] The standard deviation is the square root of the variance [pic] Method 2[pic] pic][pic][pic] |1 |162 | |26244 | |2 |152 | |23104 | |3 |177 | |31329 | |4 |157 | |24649 | |5 |184 | |33856 | |6 |176 | |30976 | |7 |165 | |27225 | |8 |181 | |32761 | |9 |170 | |28900 | |10 |163 | |26569 | | | | | | | | | | | | |1687 | |285613 | [pic] As before, the standard deviation is the square root of the variance pic] 5. Monthly rent data in dollars for a sample of one-bedroom apartments in a small town in Iowa are as follows: 220, 216, 220, 205, 210, 240, 195, 235, 204 and 205. a. compute the sample monthly average rent. b. compute the sample median. c. what is the mode? Answers a. Average [pic] [pic][pic] |1 |220 | |2 |216 | |3 |220 | |4 |205 | |5 |210 | |6 |240 | |7 |195 | |8 |235 | |9 |204 | |10 |205 | | | | | |2,150 | | | [pic] b. MEDIAN 195 204 205 205 210 216 220 220 235 240 [pic] c. MODE205 and 220 (bimodal) 6. A sample of 25 families was asked how many pets they owned. Their responses were summarized in the following table: |Number of Pets |0 |1 |2 |3 |4 |5 | |Number of Families |3 |10 |5 |4 |2 |1 | Determine the mean, median and the mode of the number of pets owned per family. ANSWERS a. MEAN[pic] [pic][pic][pic][pic] 0 |3 |0 | |1 |10 |10 | |2 |5 |10 | |3 |4 |12 | |4 |2 |8 | |5 |1 |5 | | | | | | |25 |45 | [pic] b. MEDIAN1 median is 13th observation. c. MODE 1 most families have 1 pet. 7.The following data represent the ages in years of a sample of 25 employees from a government department: 31,43,56,23,49,42,33,61,44,28,48,38,44,35,40,64,52,42,47,39,53,27,36,35 and 20. Construct a relative frequency distribution for the data, using five class intervals and the value 20 as the lower limit of the first class. |20 | | | |23 | | | |27 | | | |28 | |4 | |31 | | | |33 | | | |35 | | | 35 | | | |36 | | | |38 | | | |39 | |7 | |40 | | | |42 | | | |42 | | | |43 | | | |44 | | | |44 | | | |47 | | | |48 | | | |49 | |9 | |52 | | | 53 | | | |56 | |3 | |61 | | | |64 | |2 | |Class Limits |Frequency |Relative Frequency | | | | | |20 upto 30 |4 |0. 16 | |30 upto 40 |7 |0. 28 | |40 upto 50 |9 |0. 36 | |50 upto 60 |3 |0. 12 | |60 upto 70 |2 |0. 8 | | | | | | |25 |1. 00 | 8. How many hours a day do college students spend studying? That question was asked to 100 college students, and the data are p resented in the table below. Hours per DayFrequency 0-225 2-448 4-615 6-89 8-103 a. compute the range b. compute the average hours per day spent studying. c. compute the variance of the number of hours per day spent studying d. find the median e. find the mode Answers a. The range is 10-0 = 10 b. Average[pic] [pic][pic][pic][pic][pic] 1 |0-2 |25 |1 |25 | |2 |2-4 |48 |3 |144 | |3 |4-6 |15 |5 |75 | |4 |6-8 |9 |7 |63 | |5 |8-10 |3 |9 |27 | | | | | | | | | |100 | |334 | [pic] c. compute the variance of the number of hours per day spent studying [pic] note that [pic] [pic][pic][pic][pic][pic][pic][pic] |1 |0-2 |25 |1 |-2. 34 |5. 4756 |136. 89 | |2 |2-4 |48 |3 |-0. 34 |0. 1156 |5. 488 | |3 |4-6 |15 |5 |1. 66 |2. 7556 |41. 334 | |4 |6-8 |9 |7 |3. 66 |13. 3956 |120. 5604 | |5 |8-10 |3 |9 |5. 66 |32. 0356 |96. 1068 | | | | | | | | | | | |100 | | |53. 7780 |400. 4400 | [pic] Method 2 [pic] [pic][pic][pic][pic][pic][pic] 1 |0-2 |25 |1 |25 |25 | |2 |2-4 |48 |3 |144 |432 | |3 |4-6 |15 |5 |75 |37 5 | |4 |6-8 |9 |7 |63 |441 | |5 |8-10 |3 |9 |27 |243 | | | | | | | | | | |100 | |334 |1516 | [pic] d. Find the MEDIAN3 e. Find the MODE3 9. The following data is for the daily room rate in $, for staying at various hotels in downtown LA Hotels Offering RateDaily room rate 130 50 1470 690 3110 4130 1150 1170a. Compute the range b. Compute the average daily room rate. c. Compute the variance of the room rate. d. Find the median. e. Find the mode. Answers a. Range 170-30 =140 b. Average[pic]where [pic] [pic][pic][pic][pic] | 1 |1 |30 |30 | |2 |7 |50 |350 | |3 |14 |70 |980 | |4 |6 |90 |540 | |5 |3 |110 |330 | |6 |4 |130 |520 | |7 |1 |150 |150 | 8 |1 |170 |170 | | | | | | | |37 | |3070 | [pic] c. Variance of the room rate [pic] [pic][pic][pic][pic][pic][pic] |1 |1 |30 |-52. 9730 |2806. 1359 |2806. 1359 | |2 |7 |50 |-32. 9730 |1087. 2169 |7610. 5186 | |3 |14 |70 |-12. 9730 |168. 2980 |2356. 1724 | |4 |6 |90 |7. 0270 |49. 3791 |296. 747 | |5 |3 |110 |27. 0270 |730. 4602 |2191. 3806 | |6 |4 |130 |47. 0270 |2211. 5413 |8846. 1651 | |7 |1 |150 |67. 0270 |4492. 6224 |4492. 6224 | |8 |1 |170 |87. 0270 |7573. 7034 |7573. 7034 | | | | | | | | | |37 | |136. 2162 | |36172. 9730 | [pic]Method 2 [pic] [pic][pic][pic][pic][pic] |1 |1 |30 |30 |900 | |2 |7 |50 |350 |17500 | |3 |14 |70 |980 |68600 | |4 |6 |90 |540 |48600 | |5 |3 |110 |330 |36300 | |6 |4 |130 |520 |67600 | |7 |1 |150 |150 |22500 | |8 |1 |170 |170 |28900 | | | | | | | | |37 | |3,070 |290,900 | [pic] d. Find the MEDIAN70 e. Find the mode70 Solutions Hmwk ISDS-361AExercises 1. Mean, Median, Mode, Range, Variance & SD Panayiotis Skordi 1. A basketball player has the following points for seven games: 20, 25, 32, 18, 19, 22, 30 Compute the following measures of central location: a. mean b. median c. mode Answers a. Mean[pic] b. Median[pic] c. Mode There is no mode. 2. Consider the following population of measurements: 162, 152, 177, 157, 184, 176, 165, 181, 170, 163 a. compute the mean b. compute the median Answers a. Mean[pic] b. Median [pic] [pic] 3. The following data represent the number of children in a sample of 10 families from a certain community: , 2, 1, 1, 5, 3, 0, 1, 0, 2 a. compute the range b. compute the variance c. compute the standard deviation Answers a. Range [pic] b. Variance[pic] Remember that [pic] [pic][pic][pic][pic] 14 2. 14. 41 22 0. 10. 01 31-0. 90. 81 41-0. 90. 81 55 3. 19. 61 63 1. 11. 21 70-1. 93. 61 81-0. 90. 81 90-1. 93. 61 102 0. 10. 01 Total1924. 9 [pic] Method 2[pic] [pic][pic][pic] 1416 224 311 411 5525 639 700 811 900 1024 Total1961 [pic] This is the same answer – as we would expect. c. The standard deviation is [pic] 4. Consider the following population of measurements: 162, 152, 177, 157, 184, 176, 165, 181, 170, 163 a. ompute the standard deviation Answer [pic] Remember that [pic] [pic][pic][pic][pic] |1 |162 | |-6. 70 | |44. 89 | |2 |152 | |-16. 70 | |278. 89 | |3 |177 | |8. 30 | |68. 89 | |4 |157 | |-11. 70 | |136. 89 | |5 |184 | |15. 30 | |234. 09 | |6 |176 | |7. 30 | |53. 29 | |7 |165 | |-3. 0 | |13. 69 | |8 |181 | |12. 30 | |151. 29 | |9 |170 | |1. 30 | |1. 69 | |10 |163 | |-5. 70 | |32. 49 | | | | | | | | | | | | | | | |Total |1687. 0 | | | |1016. 10 | [pic] The standard deviation is the square root of the variance [pic] Method 2[pic] pic][pic][pic] |1 |162 | |26244 | |2 |152 | |23104 | |3 |177 | |31329 | |4 |157 | |24649 | |5 |184 | |33856 | |6 |176 | |30976 | |7 |165 | |27225 | |8 |181 | |32761 | |9 |170 | |28900 | |10 |163 | |26569 | | | | | | | | | | | | |1687 | |285613 | [pic] As before, the standard deviation is the square root of the variance pic] 5. Monthly rent data in dollars for a sample of one-bedroom apartments in a small town in Iowa are as follows: 220, 216, 220, 205, 210, 240, 195, 235, 204 and 205. a. compute the sample monthly average rent. b. compute the sample median. c. what is the mode? Answers a. Average [pic] [pic][pic] |1 |220 | |2 |216 | |3 |220 | |4 |205 | |5 |210 | |6 |240 | |7 |195 | |8 |235 | |9 |204 | |10 |205 | | | | | |2,150 | | | [pic] b. MEDIAN 195 204 205 205 210 216 220 220 235 240 [pic] c. MODE205 and 220 (bimodal) 6. A sample of 25 families was asked how many pets they owned. Their responses were summarized in the following table: |Number of Pets |0 |1 |2 |3 |4 |5 | |Number of Families |3 |10 |5 |4 |2 |1 | Determine the mean, median and the mode of the number of pets owned per family. ANSWERS a. MEAN[pic] [pic][pic][pic][pic] 0 |3 |0 | |1 |10 |10 | |2 |5 |10 | |3 |4 |12 | |4 |2 |8 | |5 |1 |5 | | | | | | |25 |45 | [pic] b. MEDIAN1 median is 13th observation. c. MODE 1 most families have 1 pet. 7.The following data represent the ages in years of a sample of 25 employees from a government department: 31,43,56,23,49,42,33,61,44,28,48,38,44,35,40,64,52,42,47,39,53,27,36,35 and 20. Construct a relative frequency distribution for the data, using five class intervals and the value 20 as the lower limit of the first class. |20 | | | |23 | | | |27 | | | |28 | |4 | |31 | | | |33 | | | |35 | | | 35 | | | |36 | | | |38 | | | |39 | |7 | |40 | | | |42 | | | |42 | | | |43 | | | |44 | | | |44 | | | |47 | | | |48 | | | |49 | |9 | |52 | | | 53 | | | |56 | |3 | |61 | | | |64 | |2 | |Class Limits |Frequency |Relative Frequency | | | | | |20 upto 30 |4 |0. 16 | |30 upto 40 |7 |0. 28 | |40 upto 50 |9 |0. 36 | |50 upto 60 |3 |0. 12 | |60 upto 70 |2 |0. 8 | | | | | | |25 |1. 00 | 8. How many hours a day do college students spend studying? That question was asked to 100 college students, and the data are p resented in the table below. Hours per DayFrequency 0-225 2-448 4-615 6-89 8-103 a. compute the range b. compute the average hours per day spent studying. c. compute the variance of the number of hours per day spent studying d. find the median e. find the mode Answers a. The range is 10-0 = 10 b. Average[pic] [pic][pic][pic][pic][pic] 1 |0-2 |25 |1 |25 | |2 |2-4 |48 |3 |144 | |3 |4-6 |15 |5 |75 | |4 |6-8 |9 |7 |63 | |5 |8-10 |3 |9 |27 | | | | | | | | | |100 | |334 | [pic] c. compute the variance of the number of hours per day spent studying [pic] note that [pic] [pic][pic][pic][pic][pic][pic][pic] |1 |0-2 |25 |1 |-2. 34 |5. 4756 |136. 89 | |2 |2-4 |48 |3 |-0. 34 |0. 1156 |5. 488 | |3 |4-6 |15 |5 |1. 66 |2. 7556 |41. 334 | |4 |6-8 |9 |7 |3. 66 |13. 3956 |120. 5604 | |5 |8-10 |3 |9 |5. 66 |32. 0356 |96. 1068 | | | | | | | | | | | |100 | | |53. 7780 |400. 4400 | [pic] Method 2 [pic] [pic][pic][pic][pic][pic][pic] 1 |0-2 |25 |1 |25 |25 | |2 |2-4 |48 |3 |144 |432 | |3 |4-6 |15 |5 |75 |37 5 | |4 |6-8 |9 |7 |63 |441 | |5 |8-10 |3 |9 |27 |243 | | | | | | | | | | |100 | |334 |1516 | [pic] d. Find the MEDIAN3 e. Find the MODE3 9. The following data is for the daily room rate in $, for staying at various hotels in downtown LA Hotels Offering RateDaily room rate 130 50 1470 690 3110 4130 1150 1170a. Compute the range b. Compute the average daily room rate. c. Compute the variance of the room rate. d. Find the median. e. Find the mode. Answers a. Range 170-30 =140 b. Average[pic]where [pic] [pic][pic][pic][pic] | 1 |1 |30 |30 | |2 |7 |50 |350 | |3 |14 |70 |980 | |4 |6 |90 |540 | |5 |3 |110 |330 | |6 |4 |130 |520 | |7 |1 |150 |150 | 8 |1 |170 |170 | | | | | | | |37 | |3070 | [pic] c. Variance of the room rate [pic] [pic][pic][pic][pic][pic][pic] |1 |1 |30 |-52. 9730 |2806. 1359 |2806. 1359 | |2 |7 |50 |-32. 9730 |1087. 2169 |7610. 5186 | |3 |14 |70 |-12. 9730 |168. 2980 |2356. 1724 | |4 |6 |90 |7. 0270 |49. 3791 |296. 747 | |5 |3 |110 |27. 0270 |730. 4602 |2191. 3806 | |6 |4 |130 |47. 0270 |2211. 5413 |8846. 1651 | |7 |1 |150 |67. 0270 |4492. 6224 |4492. 6224 | |8 |1 |170 |87. 0270 |7573. 7034 |7573. 7034 | | | | | | | | | |37 | |136. 2162 | |36172. 9730 | [pic]Method 2 [pic] [pic][pic][pic][pic][pic] |1 |1 |30 |30 |900 | |2 |7 |50 |350 |17500 | |3 |14 |70 |980 |68600 | |4 |6 |90 |540 |48600 | |5 |3 |110 |330 |36300 | |6 |4 |130 |520 |67600 | |7 |1 |150 |150 |22500 | |8 |1 |170 |170 |28900 | | | | | | | | |37 | |3,070 |290,900 | [pic] d. Find the MEDIAN70 e. Find the mode70

Monday, September 16, 2019

A Suitable Base Material for Composite Resin Restorations

Food and Chemical Toxicology 45 (2007) 1650–1661 www. elsevier. com/locate/foodchemtox A comparison of chemical, antioxidant and antimicrobial studies of cinnamon leaf and bark volatile oils, oleoresins and their constituents q Gurdip Singh b a,* , Sumitra Maurya a,1 , M. P. deLampasona b, Cesar A. N. Catalan b a Chemistry Department, DDU Gorakhpur University, Gorakhpur 273 009, India Instituto de Quimica Organica, Universidad Nacional de Tucuman, Ayacucho 471, S. M. de Tucuman 4000, Argentina Received 31 August 2005; accepted 22 February 2007Abstract The antioxidant, antifungal and antibacterial potentials of volatile oils and oleoresin of Cinnamomum zeylanicum Blume (leaf and bark) were investigated in the present study. The oleoresins have shown excellent activity for the inhibition of primary and secondary oxidation products in mustard oil added at the concentration of 0. 02% which were evaluated using peroxide, thiobarbituric acid, p-anisidine and carbonyl values. Moreove r, it was further supported by other complementary antioxidant assays such as ferric thiocyanate method in linoleic acid system, reducing power, chelating and scavenging e? cts on 1,1 0 -diphenyl-2-picrylhydrazyl (DPPH) and hydroxyl radicals. In antimicrobial investigations, using inverted petriplate and food poison techniques, the leaf and bark volatile oils has been found to be highly e? ective against all the tested fungi except Aspergillus ochraceus. However, leaf oleoresin has shown inhibition only for Penicillium citrinum whereas bark oleoresin has caused complete mycelial zone inhibition for Aspergillus ? avus and A. ochraceus along with Aspergillus niger, Aspergillus terreus, P. citrinum and Penicillium viridicatum at 6 lL. Using agar well di? sion method, leaf volatile oil and oleoresin have shown better results in comparison with bark volatile oil, oleoresin and commercial bactericide, i. e. , ampicillin. Gas chromatographic–mass spectroscopy studies on leaf volatil e oil and oleoresin resulted in the identi? cation of 19 and 25 components, which accounts for the 99. 4% and 97. 1%, respectively of the total amount and the major component was eugenol with 87. 3% and 87. 2%, respectively. The analysis of cinnamon bark volatile oil showed the presence of 13 components accounting for 100% of the total amount. E)-cinnamaldehyde was found as the major component along with d-cadinene (0. 9%), whereas its bark oleoresin showed the presence of 17 components accounting for 92. 3% of the total amount. The major components were (E)-cinnamaldehyde (49. 9%), along with several other components. O 2007 Elsevier Ltd. All rights reserved. Keywords: Cinnamomum zeylanicum Blume; Eugenol; Cinnamaldehyde; Antioxidant assay 1. Introduction Free radical reactions occur in human body and food systems. Free radicals, in the form of reactive oxygen and Part 57.Corresponding author. Tel. : +91 551 2200745 (R)/2202856 (O); fax: +91 551 2340459. E-mail address: [email  p rotected] com (G. Singh). 1 Present address: Agarkar Research Institute, Pune 411 004, India. * q nitrogen species, are an integral part of normal physiology. An over production of these reactive species can occur, due to oxidative stress brought about by the imbalance of bodily antioxidant defence system and free radical formation. These reactive species can react with biomolecules, causing cellular injury and death.This may lead to the development of chronic diseases such as cancers and those that involve the cardio- and cerebrovascular systems. The consumption of fruits and vegetables (Peschel et al. , 2006) containing antioxidants has been found to o? er protection 0278-6915/$ – see front matter O 2007 Elsevier Ltd. All rights reserved. doi:10. 1016/j. fct. 2007. 02. 031 G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 1651 against these diseases. Dietary antioxidants can augment cellular defences and help to prevent oxidative damage to cellular c omponents (Halliwell, 1989).Besides playing an important role in physiological systems, antioxidants have been used in food industry to prolong the shelf life of foods, especially those rich in polyunsaturated fats. These components in food are readily oxidized by molecular oxygen and are major cause of oxidative deterioration, nutritional losses, o? ?avour development and discoloration. The addition of synthetic antioxidants, such as propyl gallate, butylated hydroxylanisole (BHA), butylated hydroxyltoluene (BHT) and tertiary butylhydroquinone has been widely used industrially to control lipid oxidation in foods.However, the use of these synthetic antioxidants has been questioned due to their potential health risks and toxicity (Kahl and Kappus, 1993). The search for antioxidants from natural sources has received much attention and e? orts have been put in to identify compounds that can act as suitable antioxidants to replace synthetic ones. In addition, these naturally occurring a ntioxidants can be formulated as functional foods and nutraceuticals that can help to prevent oxidative damage from occurring in the body.Plants contain a variety of substances called ‘‘Phytochemicals’’ (Pratt, 1992), that owe to naturally occurring components present in plants (Caragay, 1992). The phytochemical preparations with dual functionalities in preventing lipid oxidation and antimicrobial properties have tremendous potential for extending shelf life of food products. Several research groups around the world have succeeded in ? nding and identifying natural antioxidants from herbs and spices using di? erent model systems.The antioxidant activity of Labiatae herbs such as rosemary, sage, summer savory and borage are also well documented (Bandoniene et al. , 2002; Djarmati et al. , 1991; Ho et al. , 2000; Aruoma et al. , 1996; Cuvelier et al. , 1994; Wong et al. , 1995; Chang et al. , 1997; Madsen et al. , 1996; Gordon and Weng, 1992; Takacsova et al. , 1995). However, the aromatic spicy and medicinal plants from Laureceae family are less extensively studied. Cinnamon (Cinnamomum zeylanicum Blume, syn C. verum, family Laureceae) is a widely used spice and have many applications in perfumery, ? voring and pharmaceutical industries. Although, the chemical constituents of leaf and bark essential oils of cinnamon have been studied (Raina et al. , 2001; ? Simic et al. , 2004; Jayaprakash et al. , 1997), the potential antioxidant properties have yet not been studied and it seems that investigation on oleoresins are scarce. Hence, in the present work, attempt has been made to explore the possible antioxidant and antimicrobial properties by di? erent methods which can give more comprehensive information especially when the e? ectiveness of multi component natural oleoresins is investigated.The objective of present investigation is to compare the chemical composition of leaf and bark essential oils and oleoresins as well as demonstrate t he possibility of protecting the stored food materials against micro-organism and antioxidative behaviour on mustard oil using as additive by various methods. 2. Materials and methods 2. 1. Chemicals Thiobarbituric acid, pure components eugenol and cinnamaldehyde were received form Merck, Germany. Diphenylpicrylhydrazyl (DPPH), carbendazim were procured from Sigma (Sigma–Aldrich GmbH, Sternheim, Germany) and linoleic acid from Across (New Jersey, USA).BHT, BHA, and 2,4-dinitrophenylhydrazine were purchased from s. d ? ne-chem Ltd, Mumbai, India. Ampicillin was purchased from Ranbaxy Fine chemicals Ltd. , New Delhi, India. Crude mustard oil was purchased from local oil mill, Gorakhpur, India. All solvents used were of analytical grade. 2. 2. Sample extraction Cinnamon leaves and barks were purchased from local market of Gorakhpur, Uttar Pradesh, during January 2004 and voucher specimens were kept at the Herbarium of the Science faculty, DDU Gorakhpur University, Gorakhpur.Cinn amon leaves (250 g) and barks (50 mesh particle size) were hydrodistilled using Clevenger’s apparatus to yield essential oils (3. 1% and 2. 5%, respectively). Oleoresins were obtained by extracting 25 g of powdered spice with 250 mL of acetone for 2 h in a Soxhlet extractor. The solvent was evaporated by placing the sample in a vacuum drier under reduced pressure. The viscous oleoresins for leaves and barks, with yield 6. 9% and 9. 7%, respectively, were obtained. Both essential oils and oleoresins were stored in cold condition and until further use. 2. 3. Chemical characterization 2. . 1. Gas chromatography (GC) A Hewlett Packard 6890 (Analytical Technologies SA, Buenos Aires, Argentina) gas chromatograph equipped with column HP-5 (5% phenyl methylsiloxane, length 30 m  · inner diameter 0. 25 mm  · ? lm thickness 0. 25 lm) was used for the analysis whose injector and detector temperatures were maintained at 240 and 250  °C, respectively. The amount of the samples injec ted was 0. 1 lL in split mode (80:1). Carrier gas used was helium with a ? ow rate of 1. 0 mL minA1. The oven temperature for essential oils were programmed linearly as follows: 60  °C (1 min), 60– 185  °C (1.  °C minA1), 185  °C (1 min), 185–275  °C (9  °C minA1 ), 275  °C (5 min) whereas for oleoresins it was as follows: 70  °C (1 min), 70–170  °C (1. 5  °C minA1), 170  °C (1 min), 170–180  °C (9  °C minA1), 280  °C (5 min). 2. 3. 2. Gas chromatography–mass spectrometry (GC–MS) Analysis of volatile oils and oleoresins were run on a Hewlett Packard (6890) GC–MS system (Analytical Technologies SA, Buenos Aires, Argentina) coupled to a quadrupole mass spectrometer (model HP 5973) with a capillary column of HP-5MS (5% phenyl methylsiloxane, length = 30 m, inner diameter = 0. 25 mm and ? lm thickness = 0. 5 lm). The injector, GC–MS interface, ion source and selective mass detector temperatures were main tained at 280, 280, 230 and 150  °C respectively. The oven temperature programmed for the volatile oils were same as provided for GC whereas for oleoresins, it was programmed linearly as follows: 60– 185  °C (1. 5  °C minA1), 185  °C (1 min), 185–275  °C (9  °C minA1), 275  °C (2 min). The extract was held at 70  °C (5 min), 70–220  °C (3  °C minA1), 220–280  °C (5  °C minA1) and held at 280  °C for 5 min. 2. 3. 3. Components identi? cation The components of essential oil and oleoresins were identi? d on the basis of comparison of their retention indices and mass spectra with published data (Adams, 2001; Massda, 1976) and computer matching with WILEY 275 and National Institute of Standards and Technology (NIST 3. 0) libraries provided with computer controlling the GC–MS system. The results were also con? rmed by the comparison of the compounds elution order with their relative retention indices on non-polar phase 1652 G. S ingh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 2. 4. 2. DPPH and hydroxyl radical scavenging e? ects The DPPH assay was carried out as described by Brand-Williams and his co-workers (1995). , 10, 15, 20, 25 lL of the sample were added to 5 mL of 0. 004% methanol solution of DPPH. After a 30 min incubation period at room temperature, the absorbance was read against a blank at 515 nm. The assay was carried out in triplicate and analyses of all samples were run in duplicate and results are averaged. This test was adopted from a method described by Halliwell et al. (1987). Solutions of the reagents were always prepared freshly. The reaction mixture contained in a ? nal volume of 1. 0 mL, 100 lL of 2-deoxy-2ribose (28 mM in KH2PO4–K2HPO4 bu? er, pH 7. ), 500 lL of various concentrations of the tested oils or the pure compounds in bu? er, 200 lL of 1. 04 mM EDTA and 200 lM FeCl3 (1:1 v/v), 100 lL of 1. 0 mM H2O2 and 100 lL of 1. 0 mM ascorbic acid. Test sampl es were kept at 37  °C for 1 h. The free radical damage imposed on the substrate, deoxyribose, was measured using the thiobarbituric acid test (Ohkawa et al. , 1979; Shimada et al. , 1992). 1. 0 mL of TBA (1%), and 1. 0 mL tricholoroacetic acid (2. 8%) were added to the test tubes and were incubated at 100  °C for 20 min. After cooling, absorbance was measured at 532 nm against a blank containing deoxyribose and bu? r. Reactions were carried out in triplicate. Inhibition (I) of deoxyribose degradation in percent was calculated in the following way: I? %? ? 100X ? A0 A A1 =A0 ? where A0 is the absorbance of the control reaction, and A1 is the absorbance of the test compound. 2. 4. 3. Chelating e? ect and reducing power Chelating e? ect was determined according to the method of Shimada et al. (1992). To 2 mL of the mixture, consisting of 30 mM hexamine, 30 mM potassium chloride and 9 mM ferrous sulphate were added to 5, 10, 15, 20, 25 lL of essential oil or oleoresin in methanol ( 5 mL) and 200 lL of 1 mM tetramethyl murexide.After 3 min at room temperature, the absorbance of the mixture was determined at 485 nm. A lower absorbance indicates a higher chelating power. EDTA was used as a positive control. The reducing power was carried out as described before (Oyaizu, 1986). Various amount (5, 10,15, 20 lL) of essential oil or oleoresin (dissolved in 2. 5 mL of methanol) mixed with 2. 5 mL of 200 mM phosphate bu? er (pH = 6. 6) and 2. 5 mL of 1% potassium ferricyanide, and the mixture was incubated at 50  °C for 20 min. After adding 2. 5 mL of 10% trichloroacetic acid, the mixture was centrifuged at 200 g for 10 min in Sigma 3K30 model centrifuger.The organic layer (5 mL) was mixed with 5 mL of deionised water and 1 mL of 0. 1% ferric chloride and the absorbance read at 700 nm in a UV–visible spectrophotometer. reported in the literature (Adams, 2001). The retention indices were calculated for all volatile constituents using a homologous series of n-al kanes C8–C16. 2. 3. 4. Antioxidative assays in mustard oil Oxidative deterioration was monitored under modi? ed Shaal Oven test (Economou et al. , 1991). Leaf and bark essential oils and oleoresins along with synthetic antioxidants and major components were added individually to unre? ned mustard oil at levels of 0. 2% (v/v). The initial PV value of oil is 1. 7 meq of O2/kg. Oxidative deterioration was periodically assessed by measuring the antioxidant parameters such as peroxide (PV), thiobarbituric acid (TBA), p-anisidine (p-An) and total carbonyl (TC) values. 2. 3. 5. PV and TBA values The rate of oil oxidation was monitored by the increase of peroxide values. About 3 g of each oil sample was weighed and subjected to iodimetric determination (AOCS, 1990). TBA values were evaluated according to the methods previously stated by some authors (Sidwell et al. , 1954) with small changes. To 10 g of oil sample, 0. 7% aq. thiobarbituric acid (20 mL) and benzene (25 mL) solution we re added. This mixture was shaken continuously for 2 h using mechanical shaker. After 2 h, supernatant was taken and placed in boiling water-bath for 1 h. After cooling, absorbance of supernatant was measured at 540 nm with Hitachi-U-2000 spectrophotometer. 2. 3. 6. p-Anisidine value The test was performed according to the methods (AOCS, 1998,) previously stated by earlier workers (Ottolenghi, 1959; Kikuzaki and Nakatani, 1993). In a 50 mL volumetric ? ask, 0. 6 g of oil sample was taken and volume was made using isoctane solution.From this solution, 5 mL was treated with 1 mL of 0. 25% of p-anisidine reagent and kept in dark for 10 min and absorbance was measured at 350 nm using a UV–VIS spectrophotometer. 2. 3. 7. Total carbonyl value Carbonyl value was evaluated according to the methods as reported earlier (Frankel, 1998). About 4 g of sample was taken in a 50 mL volumetric ? ask and the volume was made up using carbonyl free benzene. Out of this, 5 mL was pippeted out and mixed with 3 mL of 4. 3% trichloroacetic acid and 5 mL of 2,4-dinitrophenyl hydrazine (0. 05% in benzene) in 50 mL volumetric ? asks.The mixture was incubated at 60  °C for half an hour to convert free carbonyls into hydrazones. After cooling, 10 mL of KOH solution (4% in ethanol) was added and the volume was made with ethanol. After 10 min, absorbance was measured at 480 nm using UV–VIS spectrophotometer. Blank was prepared in the same manner substituting 5 mL of benzene instead of sample. A standard curve was drawn using valeraldehyde (50–250 lg) in 5 mL of benzene instead of sample. The total carbonyl was calculated with the help of the standard curve and expressed as mg of valeraldehyde per 100 g of sample. 2. 5. Antimicrobial activity 2. 5. . Antifungal investigations In order to determine the antifungal e? cacy of the volatile oil and its oleoresin, the pathogenic fungus Aspergillus niger, Aspergillus ? avus, Aspergillus ochraceus, Aspergillus terreus, Fusariu m moniliforme, Fusarium graminearum, Penicillium citrinum and Penicillium viridicatum were undertaken. These fungi were isolated from food materials such as onion, vegetable waste, wheat straw, fruits of Musa species, sweet potato, decaying vegetation and vegetable, respectively and were procured from Microbial Type Culture Collection (MTCC), Institute of Microbial Technology, Chandigarh, India.The MTCC code No. of these strains are 2479, 1884, 1810, 3374, 1893, 2088, 2553 and 2007, respectively. Cultures of each of the fungi were maintained on Czapek (DOX) agar media with adjusting pH 6. 0–6. 5 and slants were stored at 4  °C. The antifungal activity of the volatile oil and oleoresin against fungi were undertaken using inverted petriplate (Ramdas et al. , 1998) and poison food techniques (Amvam Zolla et al. , 1998). In inverted petriplate method, the required dose (2, 4 and 6 lL) of undiluted sample were soaked on a small piece (diameter 12 mm) of Whatmann No. 1 ? ter pape r and it was kept on the lid of petriplate which is in inverted position whereas in poison food 2. 4. Complementary antioxidant assays 2. 4. 1. Antioxidant activity in linoleic acid system Antioxidant activity was carried out using the method proposed by Osawa and Namaki (1983) with small changes. Samples (1 mL) in ethanol were mixed with 2. 5% linoleic acid in ethanol (4. 1 mL), 0. 05 M phosphate bu? er (pH = 7, 8 mL) and distilled water (3. 9 mL) and kept in screw cap containers under dark condition at 40  °C. This solution (0. 1 mL) was added to the solution of 9. 7 mL of 75% ethanol and 0. mL of 30% ammonium thiocyanate. After 3 min, 0. 1 mL of 0. 02 M ferrous chloride in 3. 5% hydrochloric acid was added to the reaction mixture, the absorbance of red color was measured at 500 nm in the spectrophotometer, for every two days. The control and standards were subjected to the same procedure except for the control, where there was no addition of sample and for the standard 1 mL of sample was replaced with 1 mg of BHA and BHT. G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 technique, the required dose (2, 4 and 6 lL) of the undiluted sample were mixed with the 20 mL of culture medium.Each test was replicated for three times and fungi toxicity was measured after 6 days in terms of percent mycelial zone inhibition. 2. 5. 2. Antibacterial investigations Six pathogenic bacteria Bacillus cereus (430), Bacillus subtilis (1790), Staphylococcus aureus (3103) (gram-positive), Escherichia coli (1672), Salmonella typhi (733), Pseudomonas aeruginosa (1942) (gram-negative) were selected for present study. All the bacterial strains were procured from Microbial Type Culture Collection (MTCC), Institute of Microbial Technology, Chandigarh, India. They were sub cultured on nutrient agar broth (Hi-media) and stored at 4  °C.Active cultures for experiments were prepared by transferring one loopful of cells from stock cultures to ? ask of nutrient aga r broth, which were incubated without agitation for 24 h at 37  °C. In order to determine the antibacterial activity of the essential oils and oleoresins, agar well di? usion method was followed. 0. 1 mL of 101 time diluted bacterial strain in ringers solution were ? ood inoculated on to the surface of well settled sterilized culture medium. The wells (10 mm diameter) were cut from agar, and 0. 2 mL of sample (2, 4 and 6 lL of essential oil or oleoresin diluted in 1 mL of DMSO) was delivered into them.For standard, 0. 2 mL of aqueous solution of ampicillin (1 mg mLA1) was used. After incubation for 24 h at 37  °C, all plates were examined for any zones of growth inhibition according to method developed by Davidson and Parish (1989). All the plates were replicated twice and the results were averaged. 2. 5. 3. Statistical analysis For the oil or oleoresin, three samples were prepared for each experiment. The data were presented as mean  ± standard deviation of three determinatio ns (data were not shown). The quantitative data of major components of oil and oleoresin were statistically examined by analysis of variance (Sokal, 1973) and signi? ant di? erences among several groups of data were examined by Ducan’s multiple range test. A probability value of p < 0. 05 was considered signi? cant. Table 1 Chemical composition of cinnamon leaf volatile oil and oleoresin Compound Volatile oil MS % a-Thujene a -Pinene b-Pinene Myrcene a-Phellandrene p-Mentha-1(7),8-diene p-Cymene 1,8-Cineole Terpinolene a-Terpineol a-Cubebene Eugenol b-Caryophyllene Aromadendrene a-Amorphene Germacrene-D Bicyclogermacrene d-Cadinene Spathulenol Sabinene c-Terpinene Terpinen-4-ol d-Elemene Viridi? orol Methoxy-eugenol Isospathulenol Neophytadiene Docosane Nonacosane Vitamin-E Total 0. 1 0. tr tr 1. 9 tr 0. 7 0. 7 tr tr tr 87. 3 1. 9 1. 1 tr 0. 6 3. 6 0. 4 0. 5 – – – – – – – – – – – 99. 4% a 1653 Oleore sin KI 931 941 980 993 1007 1011 1026 1033 1088 1191 1350 1358 1420 1441 1490 1490 1496 1527 1576 – – – – – – – – – – – MSa % – – – – 0. 3 – tr – – tr – 87. 2 1. 4 0. 8 0. 4 0. 2 1. 7 0. 6 1. 7 tr tr tr 1. 0 0. 3 0. 1 0. 3 0. 3 0. 1 0. 1 0. 2 97. 1% KI – – – – 1007 – 1026 – – 1191 – 1358 1420 1441 1490 1490 1496 1527 1576 975 1064 1177 1340 1594 – – – – – – 3. Results and discussion 3. 1. Chemical analysis GC and GC–MS analysis of cinnamon leaf volatile oil showed the presence of 19 components accounting for 99. % of the total amount (Table 1). The major component was eugenol (87. 3%) followed by bicyclogermacrene (3. 6%), a-phellanderene (1. 9%), b-carryophyllene (1. 9%), aromadendrene (1. 1%), p-cymene (0. 7%) and 1,8-cineole (0. 7%). Moreover, it s oleoresin showed the presence of 25 components accounting for 97. 1% of the total amount (Table 1). The major components accounting were eugenol (87. 2%), spathulenol (1. 7%), bicyclogermacrene (1. 7%), b-caryophyllene (1. 4%) and d-elemene (1. 0%). The analysis of cinnamon bark volatile oil showed the presence of 13 components accounting for 100% of the total amount (Table 2). E)-cinnamaldehyde was found as the major component along with d-cadinene (0. 9%), a-copaene (0. 8%) and a-amorphene (0. 5%), whereas its bark oleoresin showed the presence of 17 components accounting for 92. 3% of the total amount (Table 2). The major components were (E)-cinnamaldehyde (49. 9%), coumarin (16. 6%), d-cadinene (7. 8%), a-copaene (4. 6%), (Z)-cinnamaldehyde (1. 5%), ortho-methoxy cinnamaldehyde (1. 5%) and b-bisabolene (1. 4%) along with several other compo- Percentages are the mean of three runs and were obtained from electronic integration measurements using selective mass detector tr < 0. 1 . a nents. Recently, Raina et al. (2001) reported eugenol (76. 6%), linalool (8. 5%) and pipertone (3. 31%) as major components from its leaf oil grown in little Andman whereas the steam distilled volatile oil of cinnamon fruit ? grown at Karnataka and Kerala consists (Simic et al. , 2004; Jayaprakash et al. , 1997) of hydrocarbons (32. 8% and 20. 8%) and oxygenated compounds (63. 7% and 73. 4%) and trans-cinnamyl acetate and b-caryophyllene were found to be major component. 3. 2. Antioxidative assays in mustard oil The changes of PV in mustard oil of all investigated samples are presented in Fig. 1.The rate of oxidative reactions in mustard oil with additives was almost similar to that of the blank sample. The stability of the mustard oil samples to the formation of peroxides can be ranked in the following descending order: Leaf oleoresin > BHT > PG % eugenol > Bark oleoresin % BHA > Leafoil > cinnamaldehyde > bark oil 1654 G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1 650–1661 Table 2 Chemical composition of cinnamon bark volatile oil and extract Compound Volatile oil MS % a-Pinene Camphene Sabinene b-Pinene Limonene 1,8-Cineole Camphor Z-cinnamaldhyde E-cinnamaldhyde a-Copaene a-Amorphene -Cadinene Terpinen-4-ol b-Caryophyllene Coumarin a-Muurolene b-Bisabolene Cadina-1(2), 4-diene Ortho-methoxy cinnamadehyde Cubenol 1-Heptadecene 1-Nonadecene Tetracosane Octacosane Nonacosane Total a a Oleoresin KI 941 953 975 980 1031 1035 1144 1225 1279 1379 1490 1527 – – – – – – – – – – – – – MSa % – – – – – – – 1. 5 50. 0 4. 6 – 7. 8 0. 1 1. 0 16. 6 4. 4 1. 4 1. 8 1. 5 0. 5 0. 2 0. 4 0. 1 0. 1 0. 2 92. 3% KI – – – – – – – 1225 1279 1379 – 1527 1177 1420 1436 1500 1506 1530 1532 – – – – – – tr tr tr tr tr tr tr tr 97. 7 0. 8 0. 5 0. 9 – – – – – – – – – – – – – 100% ays. The e? ects of volatile oils and oleoresins on malonaldehyde formation for mustard oil in terms of incubation time versus TBA value at 60  °C are shown in Fig. 2. The malondehyde formation of all the additives increases with storage time. The oil showed a moderate inhibition at 0. 02% concentration, and was comparable to BHA and PG but much lower than BHT. These results were well correlated with p-anisidine and total carbonyl values (Fig. 4). However, the sequence is slightly di? erent as compared with the one obtained during measurements of peroxide values.For instance, bark oleoresin had a little greater activity for preventing the formation of secondary oxidation products than primary ones. On contrary, volatile oils were slightly less e? ective in preventing the formation of secondary oxidation products than primary ones. From the above results, it should be said that the formation of the primary oxidation species, peroxides, were also quite similar with the secondary oxidation products, and the changes of both oxidation characteristics are in a good correlation. Hence, the inhibition activity of leaf and bark oleoresins were excellent among all the additives and there was a signi? ant di? erence between the blank and antioxidants at the P < 0. 05 level. 3. 3. Antioxidant activity in linoleic acid system To evaluate the antioxidant potential of volatile oils and oleoresins of leaf and bark, their lipid inhibitory activities were compared with selected antioxidants and their major components by using ferric thiocyanate method of measuring the amounts of peroxides formed in emulsion during incubation. High absorbance is an indication of a high concentration of formed peroxides. The absorbance values of volatile oils and oleoresins of cinnamon along with synthetic antioxidants are shown in Fig. . The absorba nce Percentages are the mean of three runs and were obtained from electronic integration measurements using selective mass detector tr < 0. 01. Simultaneously with the measurements of peroxide value, the changes the secondary oxidation products such as malonaldehyde and 2-alkenals, which are measured by thiobarbituric (Fig. 2), p-anisidine (Fig. 3) and total carbonyl values (Fig. 4), were also determined after every 7 120 Control BHT C. L. Oil C. L. Oleoresin eugenol BHA PG C. B. Oil C. B. Oleoresin E-cinnamaldehyde 100 Peroxide value (meq/kg) 80 60 40 20 0 0 7 14 21 28Incubation time (days) Fig. 1. Inhibitory e? ect of volatile oil and oleoresin of cinnamon leaf and bark on the primary oxidation of mustard oil measured using peroxide value method. G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 1655 6 5 Control BHT Leaf oil Leaf oleoresin Eugenol BHA PG Bark oil Bark oleoresin E-cinnamaldehyde TBA value (meq/g) 4 3 2 1 0 0 7 14 21 28 Incubation time (days) Fig. 2. Inhibitory e? ect of volatile oil and oleoresin of cinnamon leaf and bark on the malonaldehyde formation in mustard oil measured using TBA value method. 7 6 Control BHT C. L. Oil C. L.Oleoresin eugenol BHA PG C. B. Oil C. B. Oleoresin E-cinnamaldehyde p-anisidine value 5 4 3 2 1 0 0 7 14 21 28 Incubation time (days) Fig. 3. Inhibitory e? ect of volatile oil and oleoresin of cinnamon leaf and bark on the formation of 2-alkenals in mustard oil measured using p-anisidine method. 16 14 Carbonyl value (mg) 12 10 8 6 4 2 0 7 Control BHT C. L. Oil C. L. Oleoresin Eugenol BHA PG C. B. Oil C. B. Oleoresin E-cinnamaldehyde 14 21 28 Incubation time (days) Fig. 4. Inhibitory e? ect volatile oil and oleoresin of cinnamon leaf and bark on the total carbonyls present in mustard oil. 1656 G. Singh et al. Food and Chemical Toxicology 45 (2007) 1650–1661 1. 9 1. 7 Absorbance at 500 nm 1. 5 1. 3 1. 1 0. 9 0. 7 0. 5 0 Control BHT Leaf oleoresin Bark oleoresin Cinnamaldehyde BHA Leaf oil bark oil eugenol 25 50 75 100 125 150 175 200 Incubation time (h) Fig. 5. Inhibitory e? ect of volatile oil and oleoresin of cinnamon leaf and bark on the primary oxidation of linoleic acid system measured using ferric thiocyanate method. of linoleic acid emulsion without additive increased rapidly, and there was a signi? cant di? erence between blank and antioxidants at the P < 0. 05 level. As can be seen in this ? , bark oleoresin was most e? ective among all the additives followed by leaf oleoresin. However, there are no signi? cant (p < 0. 05%) di? erences between antioxidative activities of oleoresins, oils, BHA, BHT and PG. 3. 4. DPPH and hydroxyl radical scavenging e? ects Table 6 shows the DPPH and hydroxyl radical scavenging activity of leaf and bark volatile oils and oleoresins with various concentrations. As positive control, BHA and BHT were also examined. Bark oleoresin showed the best result through all concentrations for DPPH assay. The volatile oils have shown almos t equal and moderate radical scavenging activity.At a concentration of 5 lL, signi? cant di? erences in DPPH scavenging activities was observed between BHA (78. 4%), BHT (81. 2%) and oleoresins of both leaf (51. 3%) and bark (75. 6%). However, as concentration increased, the di? erences in scavenging activities between BHA, BHT and oleoresins become less signi? cant. For hydroxyl radical scavenging test AOH radicals were generated by reaction of ferric-EDTA together with H2O2 and ascorbic acid to attack the substrate deoxyribose. The resulting products of the radical attack form a pink chromogen when heated with TBA in acid solution (Ohkawa et al. , 1979; Shimada et al. 1992). When the oils or oleoresins were incubated with this reaction mixture they were able to interfere with free radical reaction and could prevent damage to the sugar. The results are shown in Table 6. At 5 lL, scavenging e? ects on hydroxyl radicals were 31. 2%, 51. 2%, 43. 6% and 57. 6% for leaf and bark volatil e oils and oleoresin. However, at 25 lL BHA and BHT exhibited scavenging activities of 84. 9% and 83. 2%, respectively. There was a little change in the order of DPPH and hydroxyl radical scavenging activity of leaf oleoresin (86. 1%), bark volatile oil (79. 6%) and bark oleoresin (78. 6%).A close to linear correlation between radical scavenging activity and concentration of polyphenolic compounds in various vegetable and fruits have been reported (Pyo et al. , 2004; Robards et al. , 1999). These reports indicated that the radical scavenging activity of oleoresins might be mostly a? ected by position of the phenolic hydroxyl group which is present in eugenol. Yepez et al. (2001) used eugenol as standard which removed 95% of the initial DPPH free radical. 3. 5. Chelating e? ect and reducing power Chelating e? ects of the leaf and bark oleoresins on ferrous ions increased from 20. 5% at 5 lL to 24. % at 10 lL and maintained a plateau of 28. 2–35. 5% at 15– 25lL (Fig. 6). The bark oleoresin showed a better chelating e? ect than those leaf oleoresin and both volatile oils. In addition, chelating e? ects of oleoresins were relatively parallel and increased from 20. 5–23. 6% at 5 lL to 38. 5– 42% at 25 lL. However, at 5 lL, the chelating ability of EDTA was 90. 4%. Apparently, the cinnamon leaf and bark oleoresins could chelate ferrous ions but were not as e? ective chelators as EDTA. Reducing powers of leaf and bark oleoresins of cinnamon were excellent and were in the range 56. 0–58. 4, comparable with that of BHA (63. ) and BHT (65. 2) at 5 lL (Fig. 7). However, at 25 lL, the reducing power of the leaf and bark oleoresins, BHA and BHT were comparable (78. 5–87. 9). The reducing powers of the oleoresins might be due to the hydrogen donating abilities (Shimada et al. , 1992). 3. 6. Antimicrobial studies The results of volatile oils and oleoresins of cinnamon leaf and bark by inverted petriplate and poison food tech- G. Sing h et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 1657 100 90 Chelating effect (%) 80 70 60 50 40 30 20 10 0 0 EDTA Leaf oleoresin Bark oleoresin E-Cinnamaldehyde Leaf oil Bark oil Eugenol 10 15 20 25 30 Concentration ( L) Fig. 6. Chelating e? ect of volatile oil and oleoresin of cinnamon leaf and bark along with synthetic antioxidants. 100 Reducing power (%) 80 BHA Leaf oil Bark oil Eugenol BHT Leaf oleoresin Bark oleoresin Cinnamaldehyde 60 40 20 0 5 10 15 20 25 30 Concentration ( L) Fig. 7. Reducing power of volatile oil and oleoresin of cinnamon leaf and bark along with synthetic antioxidants. niques are reported in Tables 3 and 4, respectively. Using inverted petriplate method (Table 3), the leaf volatile oil was found to be 100% antifungal against all the tested fungi except A. chraceus and A. terreus at 6 lL. It was interesting to note that complete inhibition against A. ?avus was obtained only at 2 lL. However, leaf oleoresin has shown complete mycelial zone inhibition only for P. citrinum. More than 75% activity was obtained for P. veridicatum, F. moniliforme and A. ?avus. Bark volatile oil has shown complete inhibition against the fungi such as F. gramenearum, F. moniliforme, P. citrinum, P. viridicatum and A. terreus at 6 lL. Using poison food technique (Table 4), leaf volatile has caused complete inhibition against all the tested fungi except P. itrinum whereas oleoresin has caused complete inhibition only against P. citrinum. Bark volatile oil has shown complete inhibition against almost all the tested fungi except for A. ?avus, A. ochraceus whereas its oleoresin has caused complete inhibition for A. ?avus and A. ochraceus along with A. niger, A. terreus, P. citrinum and P. viridicatum at 6 lL. Using agar well di? usion method (Table 5), leaf volatile oil has shown better results in comparison with oleoresin and commercial bactericide, i. e. , ampicillin. Complete mycelial zone inhibition was obtained using leaf volatile oil again st P. eruginosa and B. cereus. However, it has moderate inhibitory e? ect on B. subtilis and S. aureus whereas its oleoresin has shown almost 100% activities against S. typhi and B. cereus. Bark volatile oil has been found to be better than bark oleoresin as it has caused more than 50% inhibition against all the tested fungi. There are several reports (Singh et al. , 1995; Hili et al. , 1997) stating that C. zeylanicum Blume exhibit antimicrobial activity. Their results demonstrate that the leaf oil completely inhibit the growth of E. coli, S. aureus and P. aeruginosa at the 1658 G. Singh et al. Food and Chemical Toxicology 45 (2007) 1650–1661 Table 3 Antifungal activity of volatile oils and oleoresins of cinnamon leaf and bark by inverted petriplate method Test Dose (lL) Percent mycelial inhibition zonea AN Leaf volatile oil 2 4 6 2 4 6 2 4 6 2 4 6 2 4 6 2 4 6 91. 5 100 100 25. 0 50. 0 58. 7 85. 3 93. 1 100 6. 3 38. 7 87. 2 62. 5 100 100 6. 3 35. 1 78. 3 AF 100 100 100 45. 6 76. 3 89. 3 100 100 100 6. 3 8. 8 13. 8 81. 2 100 100 65. 3 93. 2 100 AO 18. 7 56. 3 87. 5 46. 3 56. 3 68. 7 15. 6 52. 8 85. 3 12. 5 25. 0 37. 5 54. 3 78. 7 100 12. 5 25. 0 30. 8 FG 50. 0 52. 5 100 37. 5 50. 56. 3 36. 3 45. 8 95. 2 87. 5 87. 5 100 25. 0 50. 0 58. 7 75. 0 87. 5 100 FM 50. 0 52. 5 100 57. 5 80. 0 92. 5 31. 2 43. 2 83. 6 75. 0 87. 5 100 58. 6 79. 5 83. 3 58. 7 75. 3 83. 8 PC 37. 5 56. 3 100 67. 8 93. 3 100 25. 5 45. 8 86. 3 100 100 100 100 100 100 100 100 100 PV 37. 5 56. 3 100 38. 9 65. 5 87. 5 28. 5 47. 3 93. 7 100 100 100 76. 5 87. 5 100 85. 5 91. 5 100 AT 18. 7 36. 5 75. 0 46. 3 56. 3 68. 7 41. 3 53. 2 69. 1 37. 5 56. 3 100 87. 5 94. 1 100 56. 3 85. 6 100 Leaf oleoresin Eugenol Bark volatile oil Bark oleoresin E-cinnamaldehyde AN = Aspergillus niger; AF = Aspergillus ? vus; AO = Aspergillus ochraceus; FG = Fusarium graminearum; FM = Fusarium moniliforme; PC = Penicillium citrinum; PV = Penicillium viridicatum; AT = Aspergillus terreus. a Average of three replicate s. Table 4 Antifungal activity of volatile oils and oleoresins of cinnamon leaf and bark by food poisoned method Test Dose (ppm)a Percent mycelial inhibition zonea AN Leaf volatile oil 2 4 6 2 4 6 2 4 6 2 4 6 2 4 6 2 4 6 1000 2000 3000 100 100 100 62. 5 77. 5 87. 5 100 100 100 73. 5 100 100 48. 9 65. 3 83. 6 52. 3 68. 7 72. 3 78. 2 82. 2 96. 3 AF 31. 3 87. 5 100 18. 8 50. 0 100 15. 6 63. 2 95. 6 (–) 51. 3 87. 5 88. 7 91. 3 100 52. 87. 6 91. 2 85. 3 91. 2 96. 2 AO 50. 0 100 100 35. 0 82. 5 97. 5 45. 6 95. 6 100 75. 0 81. 2 100 100 100 100 100 100 100 84. 2 91. 2 98. 4 FG 75. 0 100 100 62. 5 77. 5 87. 5 63. 5 82. 1 93. 8 50. 0 75. 0 87. 5 65. 3 83. 2 100 47. 2 67. 8 85. 3 90. 2 96. 3 94. 5 FM 100 100 100 38. 7 46. 3 78. 7 45. 6 53. 6 78. 3 75. 0 83. 2 100 48. 7 56. 3 78. 7 63. 2 65. 8 87. 1 97. 2 100 100 PC 50. 0 75. 0 87. 5 35. 0 62. 5 97. 5 48. 6 73. 1 82. 6 43. 7 51. 3 65. 0 100 100 100 85. 2 89. 7 91. 2 100 100 100 PV 87. 5 100 100 50. 0 65. 5 70. 0 73. 2 85. 6 93. 6 50. 0 75. 0 87. 5 60. 0 85. 3 100 55. 3 63. 1 91. 2 100 100 100 AT 18. 7 50. 0 56. (–) 50. 0 100 15. 5 50. 0 75. 2 32. 5 45. 0 76. 3 35. 0 76. 2 83. 7 42. 3 45. 6 89. 3 98. 5 100 100 Leaf oleoresin Eugenol Bark volatile oil Bark oleoresin E-cinnamaldehyde Carbendazimb AN = Aspergillus niger; AF = Aspergillus ? avus; AO = Aspergillus ochraceus; FG = Fusarium graminearum; FM = Fusarium moniliforme; PC = Penicillium citrinum; PV = Penicillium viridicatum; AT = Aspergillus terreus. a Average of three replicates. b Aqueous solution was used. G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 Table 5 Antibacterial activity of volatile oils and oleoresins of cinnamon leaf and bark by agar well di? sion method Test Concentration (ppm) Inhibition zone (mm)a Gram (+) bacteria Bs Leaf volatile oil 1000 2000 3000 1000 2000 3000 1000 2000 3000 1000 2000 3000 1000 2000 3000 1000 2000 3000 1000 2000 3000 17. 1  ± 0. 4 20. 0  ± 0. 6 32. 6  ± 1. 2 14. 6  ± 1. 2 19. 0  ± 0. 2 25. 4  ± 0. 8 14. 3  ± 0. 6 17. 0  ± 0. 3 29. 6  ± 1. 2 14. 2  ± 0. 5 18. 3  ± 0. 3 26. 7  ± 0. 7 16. 2  ± 1. 3 20. 2  ± 1. 1 25. 3  ± 0. 3 12. 3  ± 0. 1 17. 3  ± 0. 5 23. 7  ± 0. 6 32. 5  ± 1. 2 34. 3  ± 0. 3 41. 2  ± 0. 2 Sa 26. 1  ± 1. 5 34. 9  ± 1. 3 48. 7  ± 0. 5 27. 1  ± 0. 1 38. 9  ± 0. 2 49. 3  ± 2. 2 23. 1  ± 1. 1 26. 9  ± 1. 3 38. 7  ± 0. 3 27. 0  ± 0. 9 44. 6  ± 0. 56. 7  ± 0. 1 23. 1  ± 0. 4 28. 7  ± 0. 2 33. 6  ± 0. 3 23. 0  ± 0. 7 41. 6  ± 0. 8 53. 7  ± 0. 1 29. 5  ± 0. 6 32. 6  ± 1. 6 37. 5  ± 0. 2 Bc 43. 3  ± 1. 7 58. 0  ± 0. 6 + 64. 5  ± 0. 6 80. 4  ± 1. 1 + 33. 3  ± 1. 5 56. 0  ± 0. 8 72. 3  ± 0. 2 41. 3  ± 1. 7 52. 6  ± 1. 2 56. 3  ± 0. 5 38. 6  ± 0. 2 41. 3  ± 0. 4 45. 6  ± 0. 7 31. 3  ± 1. 2 48. 6  ± 0. 2 52. 3  ± 0. 3 31. 4  ± 0. 2 34. 6  ± 0. 1 38. 2  ± 0. 3 Gram (A) bacteria Ec 13. 0  ± 0. 2 18. 2  ± 1. 1 25. 8  ± 0. 5 11. 4  ± 0. 6 13. 1  ± 0. 7 18. 5  ± 1. 1 11. 3  ± 0. 1 17. 2  ± 1. 6 21. 8  ± 0. 3 28. 1  ± 0. 2 33. 2  ± 1. 3 35. 1  ± 0. 3 33. 4  ± 0. 5 35. 4  ± 0. 3 37. 1  ± 0. 3 26. 1  ± 0. 5 33.  ± 1. 8 34. 1  ± 0. 2 33. 6  ± 0. 8 37. 8  ± 1. 4 39. 5  ± 0. 6 St 12. 5  ± 0. 8 14. 6  ± 1. 1 17. 9  ± 0. 2 53. 6  ± 1. 3 73. 8  ± 0. 5 78. 1  ± 0. 8 12. 5  ± 0. 8 14. 6  ± 1. 1 17. 9  ± 0. 2 20. 6  ± 1. 8 32. 7  ± 2. 0 41. 3  ± 0. 3 17. 2  ± 0. 1 18. 6  ± 0. 7 19. 3  ± 0. 5 18. 6  ± 1. 4 31. 7  ± 1. 0 40. 3  ± 0. 3 21. 9  ± 0. 5 25. 6  ± 0. 7 28. 9  ± 1. 3 Pa 1659 25. 7  ± 0. 6 + + 20. 5  ± 0. 1 21. 4  ± 0. 8 25. 8  ± 0. 1 26. 7  ± 0. 5 + + 50. 2  ± 1. 2 56. 5  ± 0. 8 60. 2  ± 0. 3 40. 6  ± 0. 4 45. 3  ± 0. 8 56. 2  ± 0. 7 30. 2  ± 1. 1 48. 5  ± 0. 6 59. 2  ± 0. 1 24. 3  ± 0. 4 26. 3  ± 1. 5 27. 3  ± 1. 1 Leaf oleoresin Eugenol Bark volatile oilBark oleoresin E-cinnamaldehyde Ampicillin Bs = Bacillus s ubtilis; Sa = Staphylococcus aureus; Bc = Bacillus cereus ; Ec = Escherichia coli ; St = Salmonella typhi; Pa = Pseudomonas aeruginosa. (+) indicates complete inhibition. a Average of three replicates. level of 500 lg mLA1. Another report (Smith-Palmer et al. , 1998) found the MICs of C. zeylanicum against E. coli and S. aureus were 0. 05% and 0. 04%, respectively. To con? rm the relationship of the constituents in cinnamon leaf and bark and antimicrobial activity, the major components were tested for antimicrobial activity. The results are shown in Tables 3–5.Among both constituents, E-cinnamaldehyde possessed better activity and these ? ndings are quite similar with the results of Chang et al. (2001). However, eugenol, in spite of being phenolic compound, failed to inhibit the fungal growth by inverted petriplate method but when it was added directly to the growth media in higher concentrations, it appeared to inhibit completely the microbial growth. Nevertheless, it is wor th noting that essential oils and oleoresins are very heterogeneous mixtures of a single substances, biological actions are primarily due to these components in a very complicated concert of synergistic or antagonistic e? cts. Table 6 Comparison of scavenging e? ects of cinnamon leaf and bark volatile oils and oleoresins against DPPH and hydroxyl radicals Sample Radical scavenging activitya (%) DPPH radical 5 lL Leaf oil Leaf oleoresin Eugenol Bark oil Bark oleoresin E-cinnamaldehyde BHA BHT a Hydroxyl radical 15 lL 69. 9 74. 1 65. 2 76. 2 89. 3 72. 3 92. 1 89. 2 20 lL 72. 1 76. 7 71. 3 82. 1 91. 2 75. 1 94. 7 91. 7 25 lL 73. 9 91. 2 92. 9 83. 6 95. 3 78. 3 96. 4 94. 9 5 lL 31. 2 43. 6 39. 4 51. 2 57. 6 49. 8 71. 3 66. 2 10 lL 55. 7 57. 1 45. 1 57. 6 62. 3 53. 6 75. 1 72. 1 15 lL 63. 5 70. 4 54. 3 73. 1 68. 9 57. 1 78. 75. 3 20 lL 68. 1 73. 6 61. 5 76. 9 71. 2 65. 2 81. 7 77. 5 25 lL 72. 2 86. 1 68. 2 79. 6 78. 6 68. 3 84. 9 83. 2 10 lL 58. 7 58. 9 56. 8 73. 5 87. 5 68. 1 89. 3 85. 1 45. 2 51. 3 41. 3 71. 1 75. 6 65. 3 78. 4 81. 2 Average of three replicates. 1660 G. Singh et al. / Food and Chemical Toxicology 45 (2007) 1650–1661 Chang, S. T. , Chen, P. F. , Chang, S. C. , 2001. Antibacterial activity of leaf essential oils and their constituents from Cinnamon osmophloeum. Journal of Ethanopharmacology 77, 123–127. Cuvelier, M. E. , Berset, H. , Richard, H. , 1994. Antioxidant constituents in sage (Salvia o? cinalis).Journal of Agriculture and Food Chemistry 42, 665–669. Davidson, P. M. , Parish, M. E. , 1989. Methods for testing the e? cacy of food antimicrobials. Food Technology 43, 148–155. Djarmati, Z. , Jankov, R. M. , Schwirtlich, E. , Djulinac, B. , Djoedjevic, A. , 1991. High antioxidant activity of oleoresins obtained from sage by supercritical CO2 extraction. Journal of American Oil Chemical Society 68, 731–734. Economou, K. D. , Oreopoulou, V. , Thomopoulos, 1991. Antioxidant activity of some plant oleoresins of th e family Labiatae. Journal of American Oil Chemical Society 68, 109–115. Frankel, E. N. 1998. Lipid Oxidation. The Oily Press, Dundee, UK, 301 pp. Gordon, M. H. , Weng, C. X. , 1992. Antioxidant properties of oleoresins from tanshen (Salvia miltiorrhiza Bunge). Food Chemistry 44, 119– 122. Halliwell, B. , 1989. Protection against tissue damage in vivo by Desferrioxamine: what is its mechanism of action? Free Radical Biology and Medicine 7, 645–651. Halliwell, B. , Gutteridge, J. M. C. , Aruoma, O. I. , 1987. The deoxyribose method a simple test tube assay for the determination of rate constants for reaction of hydroxyl radicals. Analytical Biochemistry 165, 215– 219. Hili, P. , Evans, C.S. , Veness, R. G. , 1997. Antimicrobial action of essential oils: the e? ect of dimethylsulphoxide on the activity of cinnamon oil. Applied and Environmental Microbiology 24, 269–275. Ho, C. T. , Huang, M. T. , Lou, Y. R. , Ma, W. , Shao, Y. , Wei, G. J. , Wang, M. , Chin, C. K. , 2000. Antioxidant and antitumor activity of rosemary leaves. In: Shahidi, F. , Ho, C. T. (Eds. ), Phytochemicals and Phytopharmaceuticals. Champaign, Illinois, USA, pp. 296–308. Jayaprakash, G. K. , Rao, L. J. , Sakariah, K. K. , 1997. Chemical composition of the volatiles from oil from the fruits of Cinnamon zeylinicum Blume.Flavour Fragrance Journal 12, 331. Kahl, R. , Kappus, H. , 1993. Toxicity of synthetic antioxidants BHA and BHT in comparison with natural antioxidants vitamin E. Zeitschrift fur Lebensmittel-Untersuchung und –Forschung 196, 329–338. Kikuzaki, H. , Nakatani, N. , 1993. Antioxidant e? ect of some ginger constituents. Journal of Food Science 58, 1407–1410. Madsen, H. L. , Andersen, L. , Christiansen, L. , Brockho? , P. , Bertelsen, G. , 1996. Antioxidative activity of summer savory (Satureja hortensis L. ) and rosemary (Rosmarinus o? cinalis L. ) in minced cooked pork meat. Z. Lebensm.Unters Forsch. 203, 333–338 . Massda, Y. , 1976. Analysis of essential oils by Gas Chromatography and Mass Spectrometry. Halsted/Wiley, New York. Ohkawa, H. , Ohishi, N. , Yagi, K. , 1979. Assay for lipid peroxides in animal tissues by thiobarbituric acid reaction. Analytical Biochemistry 95, 351–358. Osawa, T. , Namaki, M. , 1983. A novel type antioxidant isolated from leaf wax of Eucalyptus leaves. Agricultural and Biological Chemistry 45, 735–739. Ottolenghi, A. , 1959. Interaction of ascorbic acid and mitochondrial lipids. Archives of Biochemistry and Biophysics 79, 355–358. Oyaizu, M. , 1986.Studies on products of browning reactions: antioxidative activities of products of browning reactions prepared from glucosamine. Japanese Journal of Nutrition 44, 307–315. Peschel, W. , Sanchez-Rabaneda, F. , Dickmann, W. , Plesehen, A. , Gartiza, I. , Jimenez, D. , Lamuela-Raventos, R. , Buxaderas, S. , Codina, C. , 2006. An Industrial approach in the search of natural antioxidants from ve getables and fruit wastes. Food Chemistry 97, 137– 150. Pratt, D. E. , 1992. Natural antioxidants from plant materials. In: Huang, I. M. T. , Ho, C. T. , Lee, C. Y. (Eds. ), Phenolic Compounds in Food and Their E? ects on Health.American Chemical Society, New York, pp. 54–72. 4. Conclusion The present study provided the potential antimicrobial and antioxidant properties of the volatile oils and oleoresins of cinnamon leaf and bark. The oleoresins have shown better e? ect on primary and secondary oxidation products in mustard oil. The radical scavenging activity and other complementary assays are also in good correlation. Moreover, the potency of the constituents such as eugenol and cinnamaldehyde could provide a chemical basis for some of the health bene? ts claimed for cinnamon and warrant further studies to assess their potential as e? ctive natural remedies. Acknowledgements We are thankful to Head, Chemistry Department, DDU Gorakhpur University, Gorakhpur for provi ding laboratory facilities. Prof. K. D. S. Yadav of our department is also thanked for providing spectral facility. Life Sciences Research Board, DRDO, New Delhi and CONICET and Consejo de Investigaciones de la Universidad Nacional de Tucuman (CIUNT) Argentina are also thanked for ? nancial assistance. References Adams, R. P. , 2001. Identi? cation of Essential Oils Compounds by Gas Chromatography/Quadrupole Mass Spectrometry. Allured Publishing Corporation, Carol Stream, IL, USA.Amvam Zolla, P. H. , Biyiti, L. , Tchoumbougnang, F. , Menut, C. , Lamaty, G. , Bouchet, P. , 1998. Aromatic plant of tropical Central Africa. Part XXXIII, Chemical composition and antifungal activity of thirteen essential oils from aromatic plants of Cameroon. Flavour and Fragrance Journal 13, 107–114. AOCS. 1990. O? cial methods and recommended practices of the American Oil Chemists Society Method cd-83 and method cd-1890, fourth ed. , American Oil Chemists Society, Champaign. AOCS. 1998. O? cial m ethods: peroxide value. In: O? cial Methods and Recommended Practices of the American Oil Chemist’s Society, ? fth ed. AOCS Press: Illinois, USA. cd 8-53. AOCS o? cial Methods: p-anisidine value, 1998. In: O? cial Methods and Recommended Practices of the American Oil Chemist’s Society, ? fth ed. , AOCS Press: Illinois, cd 18-90. Aruoma, O. I. , Spencer, J. P. E. , Rossi, R. , Aeschbach, R. , Khan, A. , Mahmood, N. , Munoz, A. , Murcia, A. , Butler, J. , Halliwell, B. , 1996. An evaluation of the antioxidant and antiviral action of oleoresins of rosemary and provencal herbs. Journal of Food and Chemical Toxicology 34, 449–456. Bandoniene, D. , Venskutonis, P. R. , Gruzdiene, D. , Murkovic, M. , 2002. Antioxidant activity of Sage (Salvia o? inalis L. ), Savory (Satureja hortensis L. ) and Borage (Borago o? cinalis L. ) oleoresins in rapeseed oil. European Journal of Lipid Science and Technology 104, 286– 292. Brand-Williams, W. , Cuvelier, M. E. , Berset, C . , 1995. Use of a free radical method to evaluate antioxidant activity. Lebensmittl-Wissenschaft und Technologic 28, 25–30. Caragay, A. B. , 1992. Cancer preventive foods and ingredients. Food Technology 46, 65–69. Chang, S. S. , Ostric-Matijasevic, Hsien O. A. L. , Huang, C. L. , 1997. Natural antioxidants from rosemary and sage. Journal of Food Science 42, 1102–1106. G. Singh et al. Food and Chemical Toxicology 45 (2007) 1650–1661 Pyo, Y. H. , Lee, T. C. , Longedra, L. , Rosen, R. T. , 2004. Antioxidant activity and phenolic compounds of Swiss chard (Beta vulgaris subspecies cycla) oleoresins. Food Chemistry 85, 19–26. Raina, V. K. , Srivastava, S. K. , Aggrawal, K. K. , Ramesh, S. , Kumar, Shushil, 2001. Essential oil composition of Cinnamon zeylinicum Blume leaves from little Andaman, India. Flavour Fragrance Journal 16, 374. Ramdas, K. , Suresh, G. , Janardhanan, N. , Masilamani, S. , 1998. Antifungal activity of 1,3-disubstituted symmetrical and unsymmetrical thioureas.Pesticidal Science 52, 145–151. Robards, K. , Prenzeler, P. D. , Tucker, G. , Swatsitang, P. , Glover, W. , 1999. Phenolic compounds and their role in oxidative process in fruits. Food Chemistry 66, 401–436. Shimada, K. , Fujikawa, K. , Yahara, K. , Nakamura, T. , 1992. Antioxidative properties of xanthan on autooxidation of soybean oil in cyclodextrin emulsion. Journal of Agriculture and Food Chemistry 40, 945–948. Sidwell, C. G. , Salwin, H. , Benca, M. , Mitchell, J. H. , 1954. The use of thiobarbituric acid as a measure of fat oxidation. Journal of American Oil Chemical Society 31, 603. ? ? ? ? ? ? Simic, A. Sokovic, M. D. , Ristic, M. , Grujic -Jovanovic, S. , Vukojevic, J. , Marin, P. D. , 2004. The chemical composition of some Lauraceae 1661 essential oils and their antifungal activities. Phytotherapy Research 18, 713–717. Singh, N. B. , Srivastava, M. , Singh, A. B. , Srivastava, A. K. , 1995. Cinnamon bark oil, a pote nt fungi toxic against fungi causing respiratory tract mycoses. Allergy 50, 995–999. Smith-Palmer, A. , Stewart, J. , Fyfe, L. , 1998. Antimicrobial properties of plant essential oils and essences against ? ve important food-borne pathogens. Letters in Applied Microbiology 26, 118–122. Sokal, R. R. 1973. Introduction to Biostatistics. WH Freeman and company, San Francisco, pp. 164–185. Takacsova, M. , Pribela, A. , Faktorova, M. , 1995. Study of the antioxidative e? ects of thyme, sage, juniper and oregano. Nahrung/Food 39, 241–243. Wong, J. W. , Hashimoto, K. , Shibamoto, T. , 1995. Antioxidant activities of rosemary and sage oleoresins and vitamin E in a model meat system. Journal of Agriculture and Food Chemistry 45, 2707– 2712. Yepez, B. , Espinosa, M. , Lopez, S. , Bolanos, G. , 2001. Producing antioxidant fractions from herbaceous matrices by supercritical ? uid extraction. Fluid Phase Equilibria 4887, 1–6.