Saturday, November 30, 2019

THE SHIPS OF WWII Essays - Philippines, Battleship, Light Cruiser

THE SHIPS OF WWII World War II was the largest naval war in history. It was also the largest air war in history, but that's another story...Ships that fought in the second world war established technology, and patterns that would be used throughout the 20th century. thousands of ideas that would have never been tried on ships during peace time were applied in the then emergency state of the world. Different color writing than black indicates a link, click on it to learn more about. see picture of that topic. . Battleships. Well into the twentieth century Battleships were the most feared vessel in the sea. They were by those days standards very large, weighing in at a minimum of 20,000tons. Their armor was enormous in some cases 12 inch thick belts of steel along their sides! They were armed with 8 to 12 of the heaviest caliber cannon possible the largest of these were18.1 inchers that shot shells that weighed 3,200 lbs. To counter the threat of surface attack from light and extremely fast torpedoe boats was countered with a secondary armament, the mini gun. Which today has evolved into the phalanx gun system, which is a last resort point-defense weapon. There are three main types of battleships. The lightest of these being the battlecruiser. These were usually very light and therebye very fast. To obtain this maneuverability, they gave up a lot of armor, although they still had a deadly armament. These forms of battleships proved very unaffective. They were too light to do battle with a true battleship. and their speed mattered not against aircraft. Plus they were very expensive because of the engines, and light weight material they used. Thus, making them not only an east target, but a good one too. By the end of the war, only 1 of the 40 or so of these ships that were built was still in service. Next up from these we have the battleship battleships. These were the regular old descendents of the ship of the line, back from the day of Admiral Nelson, and John Paul Jones. They usuall weighed from 17,000 tons to 21,000. They were of medium armor, medium speed, and medium armament. But one must keep in mind that they were anything but a medium/normal ship. These ships were before the age of the carrier, the second most feared ship on the seas, as they carried roughly a dozen 12 inchers, and 1/2 a dozen 5 inchers. One step above this, and the king of all kings was the battlewagons. These were the equivelant of the 19th century Flag Ship. They were expensive, big, and could take an unbelievable amount of damage without going down. The two/three most famous of these were the USS Iowa, and the JIN(Japanese Imperial Navy)Yamato. 4 Yamato class battleships were scheduled to be made, but only 2 were, before the japanes realized that for the same price they could have 3 Shimanto class carriers including planes. The Yamato was 244 (800ft, 2 1/2)football fields meters long, had 9 18.1 inch guns! 12 6.1 inchers, for use against smaller, quicker ships, and 12 5 inchers, foruse as an Anti Aircraft, or Surface gun. Its crew was 2,500 strong. And it had 16.1 inch thick armor belting around its waterline. The Yamato class battleships are the biggest ever made. But they were not the best. The best was the USS Iowa. which was the last battleship ever to fire a shot in time of war. Doing so in the Persian Gulf as a part of Operation Desert Storm. The Uss Iowa was longer than the Yamato, went 7 knots faster (32 knots) and at the same time had roughly the same armament, and armor(a little smaller in both categories...9 16inchers, 13 inch belt). Cruisers Cruisers were and are the descendant of frigayes from the navies of past. Cruisers were much smaller than Battleships, but at the same time 2 or 3 times larger than a destroyer. Cruisers more than anything were to show the flag in places where locals needed to be impressed, as they otherwise did not have near as well defined role as the battleships, or destroyers. Their only real

Tuesday, November 26, 2019

Gender Role in Afghanistan

Gender Role in Afghanistan Introduction Culture entails defined norms and values of a particular community and serves as the foundation of many issues that constitute the structure of society. Different studies have been conducted by scholars with aim of identifying more variables that are related to culture. Ethnographers learn other people’s cultures by accurate identification of knowledge, behavior and artifacts.Advertising We will write a custom essay sample on Gender Role in Afghanistan specifically for you for only $16.05 $11/page Learn More The paper will discuss three aspects that are necessary in learning different cultures. Role of men and women in Afghanistan under Taliban rule will be well outlined in relation to Omidian’s ethnology. Omidian is an anthropologist who was hired to work in Afghanistan as a social worker and trainer. On the other hand, Spradley argues that anthropologists should not be community trainers but instead should learn from the people. Case Study The title ‘When Bamboo Bloom’ is symbolic as Taliban rule in Afghanistan oppressed the society as reported by Omidian who worked there from 1997 to 2007. Despite the oppression, citizens hoped that one day they would be liberated. 19th century was characterized by efforts to ensure gender equity, but were halted in 1994 when Taliban annexed Kabul. Women were not supposed to work away from home or wear white clothes. The Islamic law on Hijab ensured that women covered all parts of their bodies. Later there were increased cases of kidnaps, forced marriages that involved women. Women were supposed to be accompanied when leaving their houses and were not to interact freely with men. Health access was limited and poverty stroke households that lost their breadwinner who was supposed to be a man (Omidian 117). Notably, the role of women in Afghanistan is derived from the interpretation of Sharia in the Quran that forbids women from working away from home. According to Taliban, Sharia bans women from free interaction with men and are to be accompanied by male relatives any time they are not at home. Men were expected to work and provide for their women and children. The role of men rendered them prone to maltreatment in many ways. Many men were detained, tortured and killed in prisons under Taliban rule in Afghanistan (Omidian 120).Advertising Looking for essay on gender studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More Men were ordered to wear beards of certain length and severely punished if they did not. Punishments like stoning and amputation were employed when torturing prisoners so as to get them to confess. The idea of Omidian was to empower citizens with knowledge that would help them overcome the cruelty of Taliban rule in Afghanistan. Culture knowledge For ethnographers to be able to understand culture and norms of a given community, they must first identify what the people kn ow. According to Spradley people can only share common culture if they share similar knowledge. For example, there is a scenario of people in a train who were engaged in a common behavior of reading. Reading was a behavior that was common to all people in the train. For behavior to be shared all people had to be aware of what was involved in reading. People knew how to act when reading jokes, tickets and schoolbooks. For example, there was a man who underlined important points when reading a lecture book. A man reading a newspaper knew how to flap pages so as to get more information. A lady reading a paperback knew how to move her eyes so as to read. The only reason why a man reading a newspaper would understand the message by the author is if he knew the language used (Spradley and Mccurdy 9). In the case study, both men and women knew what was expected of them by the Taliban rule. Whether they felt oppressed or not, they obeyed the instructions given because they were aware of pun ishments for non compliance. For example, women did not go to work outside home because they knew they would be punished if they did. Consequently, the women could not go to work because they knew it was wrong according to Taliban rule. Taliban rule was aware of the Islamic law in regard to modest dressing and ordered all women to cover their body parts (Omidian 121). Culture behavior Spradley further postulates that for ethnographers to be able to learn different cultures, they must identify what people do. Cultures do not dictate but rather influence behavior. Activities are not dependent on culture but are influenced by its interpretation. Absolute learning of culture behavior can only occur if interpretation is similar. Spradley gives an example of a scenario involving police, crowd and a woman who had a heart attack.Advertising We will write a custom essay sample on Gender Role in Afghanistan specifically for you for only $16.05 $11/page Learn More Sin ce the police were aware of first aid that should be given to the condition, they started performing heart massage to the woman so as to save her life. However, a crowd nearby mistook the actions by policemen and thought they were killing the woman so they attacked them. The woman died before she was taken to the hospital. Notably, both the crowd and police had a common mission which failed due to misinterpretation of the activities (Spradley and Mccurdy 11). In the case study, Omidian argues that Taliban rule in Afghanistan is oppressive as both genders are maltreated. Ethnographers should be neutral but in the case of Omidian she sides with the society and is against Taliban rule. The situation is similar to that of the crowd that interpreted the activities of the police to be cruel to the woman. Cultural behavior in Afghanistan is manifested by what people do and how they react to activities by Taliban rule. For example, severe punishments like amputation of men who were seen as criminals were conducted publicly. Women and children cried and pleaded with Taliban officials because they were not happy with such actions. There are postulations that Omidian tries to liberate people of Afghanistan by ensuring that they are empowered and influenced by the western culture. According to other scholars all the efforts by humanitarian action and foreign policy have hidden agenda of replacing Afghanistan culture with western culture (Lassiter, 296). Culture artifacts Ethnography entails identifying what people use so as to be able to know and behave in a certain way. Spradley argues that for the ethnographers to be able to learn culture they must know what is involved in cognitive and behavioral development of the people involved (Kottak and Conrad 33). For example, a person reading a newspaper must be aware of grammar and style used so as to be able to understand the message. Further, police used oxygen mask and called on ambulance in attempt to save life of the woma n who had heart attack.Advertising Looking for essay on gender studies? Let's see if we can help you! Get your first paper with 15% OFF Learn More In the case study, Taliban used Quran statements and Sharia to set and define behavior of the two genders. Stones and other tools used in punishing people who defied the set laws are culture artifacts. Painted windows that were used in the women apartments are also culture artifacts. Artifacts, knowledge and behavior are cultural aspects that are essential in the learning process of norms of a certain community. Further, culture can be defined by symbolism theory under three components in relation to explicit and tacit knowledge. Explicit knowledge is commonly known by people with common culture while tacit refers to unknown aspects. The first component postulates that cultural behavior is influenced by the meaning attached to the activities involved. For example, the pain expressed by the prisoners who were being stoned or amputated in Afghanistan made women and children cry. The second component postulates that behavior is dependent on the social interaction. Omidian’s idea of empowering citizens of Afghanistan by encouraging them to overcome intimidation by Taliban rule was based on the interaction with men and women. Thirdly, cultural symbols provide ethnographers with hints that are supposed to be modified in different ways before actions (Erickson and Liam 21). Conclusion Culture is an integrated topic that involves intensive scrutiny of various issues for learning process to be effective. Ethnographers aim at learning from the community and not educating them. Empowering the Afghanistan citizens will be a way of changing their cultural perspective and not learning from them. Culture behavior is essential in learning process as ethnographers get to know what people do in different situations. Ethnographers go an extra mile by trying to understand the reason behind any behavior. Culture artifacts are also important as ethnographers learn what is used in acquiring knowledge and behavior. Culture knowledge is broader than both artifacts and behavior as it defines all aspects known to the people. Consequently, culture knowledge influences the behavior and things that will be involved in maintenance of cultural identity. Erickson, Paul, and Murphy Liam. A History of Anthropological Theory, Toronto: Broadview Press, 2008. Print. Kottak, Peter and Philip Conrad. Window on Humanity: A Concise Introduction to General Anthropology, New York: McGraw Hill press, 2005. Print. Lassiter, Luke. â€Å"Toward a Collaborative and Reciprocal Ethnography.† Journal of Anthropological Research 5.2 (2001): 137-149. Print. Omidian, Patricia. When Bamboo Bloom, An anthropologist in Talibans Afghanistan, Sydney: Academy of Sciences publishers, 2011. Print. Spradley, James, and David Mccurdy. Conformity and Conflict: Readings In Cultural Anthropology, New York: Pearson Education press, 2009. Print.

Friday, November 22, 2019

Bloody Sunday 1972

Bloody Sunday 1972 On the afternoon of Sunday the 30th of January 1972 soldiers from the British Parachute Regiment, one of the fearsome UK militia units fighting the battle in the north of Ireland, attacked a civil rights march in the town of Derry, killing or fatally wounding fourteen civilians and injuring two dozen more in an event the international press quickly to be known as â€Å"Bloody Sunday Massacre†. That same group of soldiers had carried out similar murder spree just months earlier in Belfast, shooting dead eleven people in cold blood, including a local catholic priest, in a two day reign of terror known as the â€Å"Ballymurphy Massacre† of August 1971. Praised by their officers and British politicians for their work in the previous massacre much the same was expected of them in the western Town of Derry and sure enough they delivered on those expectations. However as in Belfast, the war crimes of the Parachute Regiment simply served to increase local support for armed resi stance to Britain’s continued presence in particular for the still Provisional Irish Republican Army,[I.R.A] contributing to making a temporary conflict all but permanent. Bloody Sunday was one of the most Brutal events of the Troubles because a large number of catholic citizens were killed, by forces of the British army, in full view of the public and the press. It was the highest number of people killed in a single shooting during the troubles in Northern Ireland. Bloody Sunday increased Catholic and republican nationalist hostility towards the British Army and increased the conflict. Support for the Provisional Irish Republican Army (IRA) rose and there was a surge of recruitment into the organisation, especially in Derry and Belfast. At 4:07pm, the soldiers were ordered to go through the barriers and arrest the republican protesters. The soldiers, on foot and in armoured vehicles, chased people down Rossville Street and into the Bogside. Two people were hit by the armoured British vehicles. Brigadier MacLellan had ordered that only one set of soldiers be sent through the barriers, on foot, and that they should not chase people down Rossville Street. Colonel Wilford disobeyed this order, which meant there was no separation between republican rioters and marchers. The soldiers disembarked and began arresting people. There were many claims of soldiers beating people, hitting them with rifle butts, firing rubber bullets at them from close range, making threats to kill, and shouting abuse. The Saville Report agreed that soldiers used excessive force when arresting people as well as seriously assaulting them for no good reason while in their custody. A large group of people were chased into the car park of Rossville Flats. This area was like a courtyard, surrounded on three sides by high-rise flats. The soldiers opened fire, killing one civilian and wounding six others. This fatality, Jackie Duddy, was running alongside a priest, Father Edward Daly, when he was shot in the back. Some of those shot were given first aid by civilian volunteers, either on the scene or after being carried into nearby homes. They were then driven to the hospital, either in civilian cars or in ambulances. The first ambulances arrived at 4:28pm. The three boys killed at the rubble barricade were driven to hospital by the British soldiers. Witnesses said paratroopers lifted the bodies by the hands and feet and dumped them in the back of their armoured vehicles, as if they were pieces of meat. The Saville Report agreed that this is an accurate description of what happened. It says the paratroopers might well have felt themselves at risk, but in our view this does not excuse them. In all, 26 people were shot by the British soldiers; 13 died on the day and another died four months later. Most of them were killed in four main areas: the rubble across Rossville Street, the car park of Rossville Flats (on the north side of the flats), the courtyard car park of Glenfada Park, and the forecourt of Rossville Flats (on the south side of the flats). All of the soldiers responsible insisted that they had shot at, and hit, gunmen or bomb-throwers. The Saville Report insisted that all of those shot were unarmed and that none were posing a serious threat. It also concluded that none of the soldiers fired in response to attacks, or threatened attacks, by gunmen or bomb-throwers. Thirteen people were shot and killed, with another man later dying of his wounds. The official army position, backed by the British Home Secretary the next day in the House of Commons, was that the soldiers had reacted to gun and nail bomb attacks from suspected IRA members. Apart from the soldiers, all eyewitnesses including marchers, local residents, and British and Irish journalists present maintain that soldiers fired into an unarmed crowd, or were aiming at fleeing people and those tending the wounded, whereas the soldiers themselves were not fired upon. No British soldier was wounded by gunfire or reported any injuries, nor were any bullets or nail bombs recovered to back up their claims. Although there were many IRA men both Official and Provisional at the protest, it is claimed they were all unarmed, apparently because it was anticipated that the British soldiers would attempt to draw them out. March organiser and MP Ivan Cooper had been promised beforehand that no armed IRA men would be near the march. One soldier who gave evidence at the tribunal testified that they were told by an officer to expect a gunfight and We want some kills. In the event, one man was witnessed by Father Edward Daly and others haphazardly firing a revolver in the direction of the paratroopers. Later identified as a member of the Official IRA, this man was also photographed in the act of drawing his weapon, but was apparently not seen or targeted by the soldiers. Various other claims have been made to the Saville Inquiry about gunmen on the day. This Sunday became known as Bloody Sunday and bloody it was. It was quite unnecessary. It strikes me that the Army ran amok that day and shot without thinking what they were doing. They were shooting innocent people. These people may have been taking part in a march that was banned but that does not justify the troops coming in and firing live rounds indiscriminately. I would say without hesitation that it was sheer, unadulterated murder. It was murder.

Wednesday, November 20, 2019

The Military Use of Drones by the US- a Risky and Wrong Choice Research Paper

The Military Use of Drones by the US- a Risky and Wrong Choice - Research Paper Example It is time when the policy and strategy groups and institutions ought to reconsider the success and importance of drones as the military weapons of choice. Indeed, pursuing warfare by means of drones is certainly not a good idea if one takes into consideration the harmful ramifications of this novel military strategy. Instead of furthering the US interests and aiding the nation’s strategic agenda, the military use of drones by the US has indeed curtailed the reputation of the US forces and accrued much negative publicity for the nation. It goes without saying that the US exploitation of drones as a military weapon is not a sane strategic option if one considers the civilian causalities it involves, the incumbent political outcomes, the dilution of the army’s moral and situational awareness and the inability of the drones to effectively curb and dilute international terrorism. It is a fact that if the drone warfare or the military usage of drones by the US forces is not backed by accurate and verified intelligence inputs, it could lead to much collateral damage. Experience has established beyond doubt that the instances when drones were used by the US as a weapon against the targeted enemies, they led to multiple civilian causalities (Whitlock 1).and it is only when one digs deeper that one is able to recognize the havoc drones wreck on the civilians that live near or in the vicinity of the targeted individual or group. Though the exact figures are not verified by the US military, as per the recent news reports, the use of drones as a weapon has led to the killing of a number of civilians in the tribal regions of Pakistan (Whitlock 1). If on the one side the killing of civilians in the drone attacks amounts to crimes against humanity, on the other side this trend is fraught with much serious consequences, as far as the reputation of the United States of America as a world power is concerned (Brunstetter & Braun 339).

Tuesday, November 19, 2019

Tenerife Airport Disaster Case Study Example | Topics and Well Written Essays - 2500 words

Tenerife Airport Disaster - Case Study Example Air travel is undoubtedly the safest way to travel. This claim is best expressed by a statement of an aviation researcher at the University of Miami, Earl Wiener who stated that in USA alone "There are 15,000 to 20,000 takeoffs a day. Half a billion passengers a year, in a hostile environment, get to their destination safely and quickly" (Chandler, 1996,p.52). While we encounter almost daily news about land transportation mishaps and regularly hear news of ships, large or small, sinking in seas, air transportation mishaps come far and in between. Thus, it is the best preferred means to travel, especially involving long distances. Because of such growing transport demand, the number of aircraft in operation is constantly on the rise while bigger, behemoth aircrafts which are capable of transporting a large number of people are being built. Thus, when air accidents occur, we hear of many people perishing in such accidents. Despite the fact that modern airplanes are now designed to be as safe as possible and are now built with stronger materials with more powerful engines and at faster speeds and are much bigger and heavier and with improvement in its equipment and its operation that practically ensures safety, yet airplane crashes still occur (Grolier, 1994). In January 2010 alone, 2 airplanes crashed i.e. one involving the Ethiopian Airlines that crashed in Beirut, Lebanon and killing all 90 people on board (Walker, 2010) and the other one involving the Alaska CentralAir Disaster 3 Express cargo airplane that crashed off Sand Point, Alaska and snuffing the lives of the 2 pilots aboard (Anchorage Daily News, 2010). It seems that airplane mishaps is inevitable and that people concerned have no option but prepare a good emergency response plan and management to mitigate the disaster and rescue whatever can be rescued. Statistics show that from 1954 to 2004, 1402 crashes had occurred and that 25,664 lives had perished in the process (1001crash.com). It is also a known fact that more than 50% of all accidents occur during the final approach and landing stages. But what is considered more dangerous is the climbing stage of the aircraft, where fatal accidents may occur. It is possible that airplane defects may go undetected as the plane leaves the gate but such defect will become apparent when the plane takes off the ground and begins climbing. When the pilots realize that such defect exists, they

Saturday, November 16, 2019

Biometrics Voting System Essay Example for Free

Biometrics Voting System Essay Biometrics is the term given to the use of biological traits or behavioral characteristics to identify an individual. The traits may be fingerprints, hand geometry, facial geometry, retina patterns, voice recognition, and handwriting recognition. In this paper we have used thumb impression for the purpose of voter identification or authentication. As the thumb impression of every individual is unique, it helps in maximizing the accuracy. A database is created containing the thumb impressions of all the voters in the constituency. Illegal votes and repetition of votes is checked for in this system. Hence if this system is employed the elections would be fair and free from rigging. Thanks to this system that conducting elections would no longer be a tedious and expensive job. DESIGN The design of the system consists of the following important parameters. 1. Scanning- using DSP Processor 2. Searching- based on the principle of GOOGLE SEARCH 3. Networking- all the election booths are connected in a network 4. Data transfer– using telephone lines.. The only pre-requisite for the use of this finger print scanner is a personal identification card. We hope that this system proves to be efficient and enables the people to be smarter in choosing their leaders. SUMMARY OF DESIGN The main aim in designing this product is to provide the concept of the personal identity for each individual. This is extended to a special case of electronic voting machine concept. The summary of the design can be briefly explained diagrammatically as follows. Fig-1. 1 : Block Diagram of Design As initially at time of distributing voting cards. At the time of voting, the option of the voter is taken along with the finger print. The finger print taken by the scanner is sent to the DSP chip through an in-built A/D converter. The processed image is transferred to hard disk with biasing of SDRAM. The option entered by the voter is transferred to chip through DEMUX and is stored in the memory. If the transferred image is matched with any of the records in the data base, then the interrupt is given by the HARD DISK to DSP chip. Then the option is considered in the count. After the acquisition of the count this is transmitted to the HOST computer or central server using telephone lines. As the count of each party is transmitted to the HOST from all the VOTING MACHINES present in the constituency, the HOST will add parallel count of particular party and makes the final count of each party in ascending order. The final count is transferred to the main HOST (head quarters) using either telephone lines or radio waves. DESCRIPTION OF THE VOTING MACHINE Fig:1. 2- Description of voting machine BLOCK DIAGRAM FOR THE WHOLE PROCESS IN BRIEF Fig:1. 3-Block diagram of the process. VOTING SYSTEM The detailed description of each and every internal unit in the VOTING SYSTEM is given below. It can be divided in to the following main categories. FINGER PRINT SCANNER The finger print scanner consists of the following parts: 1. FINGER PRINT SENSOR: This is used to scan the thumb impression. The data obtained from this is analog in nature. This is transferred to the A/D converter for further processing. 2. A/D CONVERTER: This is used to convert the analog data from the SENSOR into the digital data and transfer it to the processor. 3. FLASH ROM: This is for the storage of the data temporarily in the DSP processor. This will work until the data is transferred to the main memory of the HOST. 4. DSP CHIP: This is used to receive the data and process it. This is connected to the USB port for further transfer of the data. 5. USB PORT: The sole purpose of the USB port is to establish a communication link between the DSP processor and the MEMORY (DATABASE). Fig:2. 1-Scanning Process EXTRACTION OF THUMB IMPRESSION Fig:2. 2-Extraction of thumb impression The next step in the process is the extraction of the thumb impression from the memory. The features of the finger print are stored in the form of pixels. This is further sent for pattern matching where the finger print is then compared with the records in the database. If the pattern matches with any one of he records then the vote is accepted. If the feature doesn’t match with any one of the finger prints stored in the data base then the vote is rejected. Fig:2. 3- Storage of Database FEATURE EXTRACTION AND COMPARISON SCANNING AND PROCESSING The biometric sensor scans the image. This so scanned data is in the analog form. This is converted into digital form by using an A/D converter. Since the image is to be transferred quickly to the converter, it is interfaced in parallel with the DSP chip. The data received from the parallel in ports is further processed in the chip. Parallel interfacing is done to have a quick performance. TRANSFER OF PROCESSED DATA TO THE HARD DISK The data which is processed in the DSP chip (finger print) is transferred in parallel to the HARD DISK for searching process. The BIOS language of the HARD DISK is stored in SDRAM which is also interfaced in parallel with the chip. This helps the chip to transfer the image to the HARD DISK for further process. The image transferred to the HARD DISK is compared with that of the DATA BASE. The circuit connections for the process explained are as shown below. A DE-MULTIPLEXER is connected to the inputs in parallel to the chip. The option which is given is transferred to the chip in binary form. Fig:2. 4-DE-MUX used in the process. E. g. : 1. Party one, 2. Party two, 3. Party three, 4. Party four. Suppose if the option is two then the binary data transfer to the ports is 0010. DE-MULTIPLEXER is designed according to the number of parties present in the constituency. The transferred data is stored in a 16-bit register according to their option. After counting takes place the count of each party is transferred to the transmitter. A transmitter is interfaced serially to the DSP chip. The transmitter data is transferred through the telephone lines to the HOST. The counts of similar parties are added at the host and the data is transferred to the STATE HEAD QUARTERS (main HOST) to display the result of the particular constituency. VERIFICATION VERIFICATION OF VOTERS Fig:3. 1-Verification of Voters Here the identity of a person is checked whether heshe belongs to the particular constituency or not. The machine which takes the finger print of the person checks it with the data base already stored in it. If the finger print matches it will give access to the person to cast his vote and if it doesn’t match any of the finger prints stored in the data base then it will reject the voter. Thus his method will enable the members of that particular constituency only to vote. This can be taken as the first step to avoid rigging. To have a faster performance the searching technique is implemented on the basis of GOOGLE SEARCH. The process in the form of a flow chart is as given below. PROCESSING AND COUNTING Fig:3. 2-Counting Process. After the person gets the PROCEED symbol from the voting machine, there appears a screen on which all the parties names along with the symbols are present. The person should select any one of the party by giving the number allotted to that particular party as input through the keypad. After the option is selected the voter is prompted for a confirmation. In case the voter enters an invalid number, the screen reappears and heshe is prompted to cast the vote again. Then according to the option selected, the vote count of the particular party gets incremented by one. Finally, at the end of the day, the position of the parties in terms of the total votes cast can be known. A very simple flow chart for the above process is as shown below: REJECTION OF VOTER REPETITION Fig:3. 3-Rejection block diagram After we have emerged out with a solution to check voter’s identity in a constituency, our next task is to see that a particular person cannot vote more than once i. e. to avoid multiple votes. This task can be accomplished by simple software technique employed. It consists of two folders namely searched and unsearched. Initially the searched folder consists of no images. The thumb impression images of all the voters of a constituency will be present in the unsearched folder. As and when a vote is cast, the image of the particular voter gets transferred to the searched folder. The searched folder is programmed such that an image cannot be present more than once in this folder. So when a voter casts multiple votes the exception is generated and an alarm is raised and even the police can be informed about the identity of the intruder indulging in this illegal activity. This is shown in the block diagram given belowThe scanned vote is first checked with he acceptability of the voter as explained in the first flow chart. If the finger print is accessible then the data of the specified person is taken into account. The voter’s thumb impression is verified with the previously cast votes. If there is no match then the vote is accepted and the count is increased by one. If the vote matches with any of the previous votes then the vote is rejected and th e person’s identity is stored and it is given to the police for further enquiry. There is a flash ROM in which these details can be stored. NETWORK FORMATION OF THE NETWORK The voting machines present in a town are interlinked in the form of a highly secure LAN. This network is formed with the help of the telephone lines. All the data collected in the voting system is first stored in the voting machine itself. Then it is sent to the HOST which will be located at headquarters of the town. All the data is collected there and it is transferred to the main HOST. The purpose of saving the data in the voting machine at first is that even if there is loss of data by some means then it can be easily retrieved from the machine again. In this way all the things are bought into a network. Fig:4. 1-Formation of the network These hosts are again grouped into network through radio waves or again telephone lines. Host is a device which consists of a PROCESSOR and a RAM. It will accept the data from all the voting machines through telephone lines and it will store the data in RAM (count of all parties). Then it will add the count of similar parties and store the count in ascending or descending order and display the result whenever it is necessary. Thus all the voting machines in the state can be formed into a network. The network can make use of RADIO waves or TELEPHONE lines for the data transfer. CONCLUSION ADVANTAGES 1. The system is highly reliable and secure. 2. In the long run the maintenance cost is very less when compared to the present systems. 3. Illegal practices like rigging in elections can be checked for. 4. It is possible to get instantaneous results and with high accuracy. CONCLUSION Thus the advent of this biometric thumb impression voting system would enable hosting of fair elections in India. This will preclude the illegal practices like rigging. The citizens can be sure that they alone can choose their leaders, thus exercising their right in the democracy.

Thursday, November 14, 2019

East Asian Economic Crisis :: essays papers

East Asian Economic Crisis A large economic downturn in East Asia threatens to end its nearly 30 year run of high growth rates. The crisis has caused Asian currencies to fall 50-60%, stock markets to decline 40%, banks to close, and property values to drop. The crisis was brought on by currency devaluations, bad banking practices, high foreign debt,loose government regulation, and corruption. Due to East Asia's large impact on the world economy, the panic in Thailand, Indonesia, Korea, and other Asian countries has prompted other countries to worry about the affect on their own economies and offer aid to the financially troubled nations (Sanger 1). The East Asian crisis has affected almost all of the Asian nations, but the three hardest hit countries are Thailand, Indonesia, and South Korea. The panic began in Thailand in May of 1997 when speculators, worried about Thailand's slowing economy, exces sive debt, and political instability devalued the baht as they fled for market-driven currencies like the American dollar. Indonesia's economy soon fell soon after when the rupiah hit a record low against the U.S. dollar. Indonesia is plagued by more than $70 billion worth of bad debts and a corrupt and inefficient government. Thailand and Indonesia also suffer from being overbuilt during real estate booms that Reven2 were the result of huge influxes of cash by optimistic foreign investors. South Korea faltered under the weight of its huge foreign debt, decreasing exports, and weakening currency (Lochhead 4-5). Other major countries touched by the crisis are Japan, China, Malaysia, and the Philippines. Japan's economy is burdened by $300 billion in bad bank loans and a recession. Chinese banks may carry bad banks loans of up to $1 trillion. The banks lend 66% of China's investment capital to state-run industries that only produce 12% of China's industrial output (Manning 2). Malaysia and the Philippines are both faced with devalued currencies and lowered stock markets (Lochhead 5). The implications of the Asian financial crisis are many. A declining Asian economy will reduce demand for U.S. and other countries' exports. The devalued currencies of East Asia will make Asian imports seen cheap and will lead to increased American imports, thus increasing our trade deficit (Lochhead 2). A worldwide banking emergency could result if the embattled Asian economies failed to pay back their loans to the U.S. and other countries (Duffy 2). If the Asian economies fall further, in a desire to raise cash, they might sell the hundreds of billion dollars of U.S. treasuries they now own, leading to higher interest rates and an American recession (Lacayo 2).

Monday, November 11, 2019

Economic Practice Coursework Essay

My choice of article is the one relating to the oil crisis in Libya, and how it affects the economy of other countries. The article discusses the impacts of the oil cut of Libya, supplying it no more. It starts off by talking about the impact on shares and the price of oil barrels, which is the fastest and direct impact of the oil cut. As supply from Libya territory stops, supply to the entire world is crippled, as Libya is one of the countries that supply most worldwide used oil. As it stops supplying, it shifts the supply and demand graphs completely. In a short term, supply shifts to the left, as it is less. In doing so, for the same amount of oil, the price has gone to a higher figure. By doing that, the shares index of the western countries, such as European countries and the US have dropped, because of the adjustment via disposable income. That happens because of the effects of the shifting of the supply curve. As the price goes higher, the general public have less money to spend on the economy and firms, decreasing the firm’s profit, damaging that countries’ economy. That’s the reason for the index to go down, and that’s an example of mid-term effects of the oil crisis. In the midterm effect, the demand for oil will decrease, as people will cut back on the oil, and look for alternative routes. On the long term, the demand for the cars will decrease, as people will not want to buy cars, and try to sell their cars. This will affect the economy drastically, as the car companies are a big part of that countries’ economy. The general public will search for alternative routes to travel, as oil prices are higher. The car companies will have to spend much more money on researching alternatives such as hybrids and electric cars which are starting to appear. The public transport system will benefit from this situation, as more people would want to travel via train or bus, as it is much cheaper and faster. The government would get more money from this, so it would improve as much. The oil companies would want to drill and search for oil in more remote areas, causing more deforestation, and much more money spending by the companies and time. Thus some small oil companies will be closed down due to the high demand of oil, as they can’t compete with the oil monopolies. The oil monopolies will also be affected, as some major companies’ oil supply relies a lot on Libya’s supply. Regarding the oil companies, they had to pull out staff from troubled countries, not only Libya, but other countries that are getting affected by that state, and are choosing to cut off supply as well, such as Saudi Arabia and Kuwait. As they do this, the productivity drops to zero in those countries, and there is a high chance of the companies losing contact with their oil. The unrest in Libya may affect the Saudi Arabia, and that concern is affecting a huge majority of stock holders and companies, specified before, changing the stock markets, especially the European and Asia. Relating to airlines, as the supply and demand graphs change, the oil supply for airplanes gets crippled, so more money has to be spent to get the same amount of oil, making the costs bigger, resulting in a bigger price for the customer for the same flight compared to before the whole situation. There is also a chance of investors backing out from the airline business, resulting in smaller profits for the companies and much more monetary issues.

Saturday, November 9, 2019

Gross Indecency: The Three Trials of Oscar Wilde Essay

Oscar Wilde and his trials, both literal and figurative, has been the subject of quite a few films and plays apart from the considerable mass of writing that exist on this subject. This is because Oscar Wilde, as a metaphorical figure has never failed to capture the public imagination as the veritable revolutionary against society’s delimiting and deterministic conventions and a crippling value system. And yet, Moises Kauffman’s latest play Gross Indecency: The Three Trials of Oscar Wilde manages to turn the relatively familiar material – the trials and indictment of the legendary Wilde on charges of sodomy and pederasty – into a riveting and powerful document against social determinism. The theme of Kauffman’s play is the ever-continuing conflict between art and morality and of course with such a theme, Wilde, the martyr to nineteenth century morality, with his assertion that there are no immoral books, only badly written ones is the perfect hero. Drawing from a huge variety of sources that includes trial transcripts, journalistic articles, contemporary autobiographies (including the one by Wilde’s lover, Lord Alfred Douglas) and later biographies, Kauffman in the play successfully brings alive the past in a way that Wilde himself would have approved of. The play breaks all generic boundaries and has the elements of a historical drama, a docudrama, a courtroom drama, a social commentary, tragedy and comedy all rolled into one. The oft-repeated tale of Wilde’s fall from fame and fortune is by no means old wine in new bottle, primarily because the playwright’s in-depth research brings in new life into the tale by documenting new perspectives and exploring newer avenues and thereby problematizing the positions of victim and victimizer, secondarily because Kauffman concentrates in showing history in its own context and does not overtly attempt to make it contemporary, and finally because by showing Wilde’s plight in his confrontation with a world that found him fundamentally subversive to the interests of the society the playwright strikes an universal chord. Wilde’s passionate attempt to live a life on his own terms is superbly dramatized in the play. Most riveting are the dramatizations of those moments that change the life of the author for once and all. Such a fateful moment comes when Wilde denies kissing a young man with a witty putdown of his looks instead of a straightforward ‘no’. In the first of the three trials and in a climactic moment Wilde is asked by the prosecuting attorney Edward Carson, if he had ever kissed one of the young working class men with whom he was known to keep company. Wilde, with his suave and polished wit replies: â€Å"Oh, dear, no, He was a peculiarly plain boy. † Carson leaps victoriously at the implication of such a comment, that Wilde would have kissed the boy if he was a little more attractive and the author’s fate is sealed. From this moment onwards the play takes on a destructive momentum as Wilde’s entire life spirals out of control betrayed by his own wit. Never again is he able to gain control of his life. Through the presentation of Wilde, with support from his extensive research, Kauffman manages to subtly problematize the positions of victimizer and victim in the play. For as we find in the play, even before he stabs himself with his own clever tongue Wilde frittered away his prodigious talents by surrounding himself â€Å"with the smaller natures and the meaner minds. As he quotes from â€Å"De Profundis† towards the end of the play â€Å" I became the spendthrift of my own genius, and to waste an eternal youth gave me a curious joy. † Still, the intrinsic irony of the fact that it is his suavity, wit and incomparable craft with words that would bring his downfall is also highly symbolic as far as the theme of the play is concerned, for the play, among other things, engages with the typical Victorian debate over morality and art. Wilde refused to side with the dominant discourse of compartmentalizing his personal erotic longings and keeping it separate from the aesthetic side of his life. And the fact that he raised his personal sense of morality to the level of an art turned out to be the ultimate source of his tragedy in an age which preferred to look at art as a mode moral dispensation for social welfare. Apart from tracing the tragic downfall of this hero with a sincerity and passion that raises Wilde’s conviction and his untimely death to the level of a crucifixion so that the protagonist becomes a patron saint for all those whose life has been crippled by the narrow moralities of a compulsively prohibitionist society, the play also successfully and subtly presents a multilevel study in public perceptions of class, art and sexuality and this is what makes Kauffman’s themes universal. The playwright uses a chorus of actors, who appear both on stage and in front of it posing as the investigators in a hearing, almost classical in its simplicity. This modern chorus continuously reads, quotes or acts out from a huge variety of sources – fruits of the playwright’s research on his subject – establishing an ever-shifting mosaic of perspectives. This chorus takes up several convincing and often hilarious figurative perspectives. The multiple roles bring to the table the likes of Queen Victoria (the author of the Gross Indecency Law), and G. B. Shaw to name a few. The chorus quotes from the memoirs of Wilde and his lover, the accounts of Sir Edward Clarke and the editor Frank Harris. A particularly inspired scene is the one when a later day academic is brought into the play to deconstruct Wilde’s performance in court with insights that are nonetheless valid for being presented satirically. However the most hilarious of all these is probably the scene where the chorus dons long white underwear to display how Wilde procured his ‘gross indecencies’. The greatest success of Kauffman’s use of the chorus lies in the fact that by means of it, very subtly but surely, he manages to communicate a rather unsettling idea to the readers of the play: that even in our age of individual freedom, we are not very far from the social Puritanism that crippled Wilde during his lifetime.

Thursday, November 7, 2019

Gastrointestinal Notes Essay

Gastrointestinal Notes Essay Gastrointestinal Notes Essay GI System/GERD/Gastritis Class Notes –Tuesday April 22nd, 2014 GASTROINTESTINAL SYSTEM Gastrointestinal System Notes: Think about â€Å"what is going on with that particular system?† GI System digests food and excretes it. With GI issues, always look to prevent peritonitis, which is where intestinal fluids leak out into the perineal cavity causing bacterial sepsis and hypovolemic shock. Assess temperature as the priority! The type or characteristics of the blood in the stool tells you where the bleeding is occurring, i.e. Lower GI, Upper GI or Hemorrhage. RED Blood: Bleeding is in the lower GI area. DARK Blood: Bleeding is in the upper GI area. The AMOUNT of Blood: Determines if hemorrhaging is occurring. Nursing Assessment Data for Assessment of the GI System Weight changes Bowel habits Psychosocial or Stress (stress contributes to causing GI problems) What causes GI problems or what makes the symptoms better or worse? Past exposure to toxic substances in the workplace Diet/Caffeine Drugs/Medications that contribute to GI problems Smoking/Alcohol use (Alcohol thins the blood and increases risk for bleeding) Hydration status and habits/Fluid I/O Sleep habits/quality Timing and location of pain NSAID/Aspirin use (NSAID and Aspirin use causes bleeding) Stool characteristics/Blood color in stool Social economic status and changes contribute to ability to get treatment EGD (Esophagogastroduodenoscopy) is a visual examination of the esophagus, stomach, and duodenum. Assess for bleeding in the GI (see stool characteristics above) You must obtain a consent form from the patient before this procedure can occur! Preoperative and Postoperative Patient Management: Give NPO 6 to 8 hours before the procedure Avoid anticoagulants, aspirin, and NSAIDS for several days post procedure. (Anticoagulants increase risk for excessive bleeding) Hold all medications except cardiac medications. (call Dx for permission to hold or give meds) After surgery, place patient in the left side-lying position with a towel or basin at their mouth to catch excretions. Assess Vital Signs every 30 minutes postop until sedation wears off. Raise side rails for patient safety. Give NPO after surgery until patients gag-reflex returns (may take up to 2 hours to return). The #1 Nursing Priority is to Prevent Aspiration! Have respiratory support on standby. Laboratory Tests ordered for GI Assessments (Page 1186, Chart 55-3) Other Diagnostic Tests that may be ordered: Endoscopy ERCP (Endoscope Retrograde Cholangiopancreatography) †¦not tested on this. Small Bowel Capsule Endoscopy Colonoscopy Virtual Colonoscopy Sigmoidoscopy Gastric Analysis Ultrasonography (Possibly an MRI/CAT Scan) You must obtain a consent form from the patient before any of these procedures can occur! GERD (Gastroesophageal Disease) GERD is the result of the backward flow (reflux) of the gastrointestinal contents into the esophagus. The sphincter tone of the *lower esophageal sphincter (LES) is decreased, or it in inappropriately relaxed. Excessive relaxation of the LES is the most common cause of GERD. Chronic inflammation leads to hyperemia and erosion (ulcers). Priorities: elevate HOB to avoid aspiration, take V/S, and have Oxygen and Suction available. Assessment Questions: 24 hour ambulatory esophageal pH monitoring is the most accurate method of diagnosing GERD. Have you been newly diagnosed with asthma? (There is a correlation between asthma and GERD) Have any medications caused GI upset? Have you taken medications for GERD in your past? How long have you been experiencing the symptoms of GERD? Have you recently traveled out of the country? (Easy to contract bacteria/bugs in foreign countries) Common Symptoms of GERD: (Heart issues are often mistaken for GERD. Conversely, common symptoms of GERD could be a heart issue.) The 2 main symptoms are heartburn and regurgitation. Heartburn or esophageal pain Atypical

Monday, November 4, 2019

Manager and Leader Research Paper Example | Topics and Well Written Essays - 250 words

Manager and Leader - Research Paper Example They are likable due to their genuine interest in others more than in outcomes (DuBrin, 2010). Managers like doing things right whereas leaders like doing the right things. Managers are competent in following company protocol, enforcing rules, and ensuring employee performance owing to their position in the company. In contrast, leaders lack formal authority. However, their power comes from the natural desire of people to follow them (Ruiz, Ruiz, & Martà ­nez, 2010). Being a good manager is not necessarily being a good leader and likewise, being a good leader is not necessarily being a good manager. Nevertheless, there exists an overlap between leadership and management skills. Best managers can decide to become more than administrators and become leaders. Similarly, best leaders can decide to become more than visionaries and become managers. Based on the characteristics of a good leader and manager outlined above, I consider myself a good leader and less of a manager. I have a strong conviction of realigning my thought and decisions along the needs and attributes of the people around me. I find my orientation towards paying keen attention to what is done other that how it is as a big feature distinguishing myself as a leader. Nevertheless, the leadership position cannot be complete without management roles. Therefore, it is not possible separate the two aspects since a leader must be good at management as well because appropriate decision affecting people must be founded on the right things as stipulated by established

Saturday, November 2, 2019

In what ways would understanding the causes of crime aid offenders in Research Paper

In what ways would understanding the causes of crime aid offenders in the restorative-justice process - Research Paper Example includes: priority should be given to victim needs either through financial, material, emotional or social means; to avoid re-offending by re-integrating the offenders into the community; to make offenders accept their responsibility for their actions; and rehabilitation of offenders and victims by recreating the working community in order to avoid crime and to avoid the long process of the justice system and the related costs and delays. (Marshall, 1991). The Restorative Justice process is based upon the following assumptions: the root cause of a crime could be social conditions, the responsibility has to be shared by the local government and communities because they are also responsible for such social conditions, and in order to rectify it they have to accept some responsibility; collaboration of all parties in order to solve the problems present and to achieve resolution, along with including the collaboration among victims, offenders and community are essential factors that lead toward effectiveness and efficiency; The conditions of the legal outcome should be flexible enough in order to take proactive actions in any case; and lastly, justice is meant to represent balance between both the parties and no single justification will be allowed to dominate other. (Marshall, 1991). The process of victim-offender mediation provides the victims and offenders a safe and secure place with the purpose of holding the offender accountable for their misconduct. It is a platform provided to the victims where they can, with the help of a mediator, let the offender know how much they have been affected by the crime, to receive compensation and to get some answers to their questions. Victims can be a part of the restitution plan and may claim their losses directly. Therefore, the offender has to accept their responsibility for their behavior and assist within the process to develop a plan that provides compensation for the victim. It is through this stage that the