Thursday, November 28, 2019

Women’s History an Example of the Topic History Essays by

Women’s History Women faced two national crises the Great depression and the World War Two. In the world War Two over seventy million people were killed this included civilians. Both men and women were impacted by these two crises. This discussion will compare and contrast the impact of the two crises on women. Consider gains or losses encountered by women and the extent to which each crisis challenged or reinforced traditional gender ideology. Need essay sample on "Womens History" topic? We will write a custom essay sample specifically for you Proceed The Great Depression saw many women adjust to face the economic crisis that was facing the country. The married women gave birth to fewer children. Some postponed having babies or marriage. Eleanor Roosevelt 1933 Its up to the women summarizes the great role the American women had in helping manage life through the current economic crisis. They looked for employment when some of their husbands lost their jobs or had pay cuts to keep their jobs (McGeehan, Gall, & Streitwieser, 2008). Men who had been socialized as the providers for the families were depressed when they lost their job. They felt like failures who could not provide for their families. On the contrary women took this chance to help their families by juggling home chores and employment. Through the gender roles set by traditions women were supposed to be provided for by males, yet this was not always the reality on the ground. We had households headed by women who had been divorced, windowed or deserted by their husbands. They had to fend for their families yet it was difficult. Women who went for relief or sought employment were scorned for trying to take jobs from men who deserved them more. The number of women working rose and few suggested that they should be fired to create opportunities for men. They had to contend with discrimination in work places according to gender (McGeehan et al, 2008). Women struggled for equality in federal programs. The National Recovery Administration had different minimal wages for similar jobs fro men and women. Some agencies for example Civilian Conservation Corps only offered employment to men. Social Security structured around a model of male providers thus failed to recognize women workers. Women elected to leadership positions sought to challenge these arrangement and Eleanor Roosevelt help a lot in her position as the first lady. The traditional gender ideologies were reinforced during this time. The World War Two impacted the women in a number of ways. There was a crisis for employment in the war time. More women were encouraged to join the work force unlike in the depression. For instance in 1941 classes were offered for women to train in chemical laboratory in the University of Alabama. They were encouraged to take these opportunities to replace men who were joining the combat work. This enabled the women financially and they also had a chance to serve the nation. There was discrimination in wages for men and women during this time. Even where the army offered high pay for jobs considered risky they still paid women less for the same jobs. Just like in the Great depression few urged the women to maintain their role by taking up jobs that were considered womanly like sewing. Some companies opposed hiring more female employees. They claimed they diluted the quality of work as the qualified ones had been employed initially. In both crises men and women were paid different wages for the same jobs. However, the labor board came up with a policy of uniform pay for similar jobs. This encouraged more women to venture in fields formerly dominated by women. More black women were hired while initially they could only be hired after the white women were exhausted (McGeehan et al, 2008). The contrast between the motive behind women looking for employment in the World War Two and the Great Depression is that in the later they did so purely to improve their financial status whereas in the former they had a desire to be part of the people who fought for the nation. There were gains encountered in both crises. Women were able to work and help support themselves and their families. They also got a chance to render their services to the nation. Through these crises women got an opportunity to fight for equality and remove shame of women seeking paid employment. The two crises helped to reinforce traditional gender roles by drawing a distinction between work for men and women. Women were expected to stick to roles associated with women while the men could handle the roles considered masculine. Though both men and women were working women were still expected to take care of their homes, their children and their husbands. This often led to absenteeism hence lower inputs and trouble at work places (McGeehan et al, 2008). The hardest hit fields were the manufacturing and the heavy industries dominated by men. Fields dominated by women like sales were less affected and women had an upper hand here. Unfortunately this helped to reinforce the traditional stereotypes of womens work. The number of women working for pay increased to 25.4% in 1940 from 24.3% in 1930 (McGeehan et al, 2008). The crises also challenged the gender ideology that men were the sole breadwinners. This was seen when women were forced by circumstances to look for work and substitute the family income. Those without the male care had to support their families. The contribution of men and women in running families and the country at large is very important. They should be given equal opportunities in the work place. Bibliography McGeehan, J. Gall, M. s Educational Series

Sunday, November 24, 2019

Number system is used in IT applications Essays

Number system is used in IT applications Essays Number system is used in IT applications Essay Number system is used in IT applications Essay In this certification I have discussed of how the application of figure system is used in IT applications in both hardware and applications, runing system and in programming linguistic communication. I have discussed about the usage of base 2 in the 8 spot bytes form usage with the operation for subnet. The usage of hexadecimal signifier turn toing memory and classless inter Domain Routing. There are figure of different enumeration system which is in usage for the alone ability to stand for different Numberss. Binary, Octal, Denary and Hexadecimal are figure systems that are used in different facets Denary figure is the most normally used figure system which is often used in day-to-day life. Nevertheless each figure system has associated benefits which are the ground that different figure systems are used in different countries. Each of the figure system has a fix figure of representation of Numberss which are used to stand for the Numberss like, say for illustration Binary Numberss are represented by either one or zero, Octal Numberss are represented by Numberss from 0, 1, 2, 3, 4, 5, 6, 7 whereas Denary and Hexadecimal Numberss are represented by the figure of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and 0, 1,2. 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F, severally. Binary Numbers Binary Numberss are largely used when there are merely two options available so if one is false so the other is true. Examples of binary system can be their use to stand for spots in a computing machine which can hold merely 0 or 1 value a switch in a electric circuit which can be either on ( 1 ) or off ( 0 ) . Binary system is widely used to stand for state of affairss in mundane normal life every bit good for illustration for electronic Gatess in electricity circuits, false or true statements can besides be displaced in footings of binary figures where 0 represents false and 1 represents true provinces. Tenfold Numbers Tenfold Numberss are often used in mundane life in accounting, calendar systems, fiscal systems or day-to-day everyday numeration. The chief benefits of Denary figure system is that they are easier to utilize as compared to other figure systems and have more figure to show different state of affairss though Hexadecimal figure system has more representations but that representation can include characters in them as good which makes them more hard to understand and utilize as comparison to tenfold system. Tenfold figure systems are so often used that a individual even do non necessitate to hold a formal instruction to cognize or utilize them. One of the grounds can be that it is often use in day-to-day life accounting. Other figure systems are used in more specified Fieldss such as calculating and therefore would necessitate to be learned. Octal Numbers Octal Numberss are non that normally used as compared to other Numberss and are largely used in calculating artworks, text and celebrated runing system such as UNIX besides uses octal Numberss for their file protection system. Octal Numberss have sum of 8 alone representations which can be combined together to do more octal figure representations. Octal Numberss are hard to understand for a normal individual who has limited figure of understanding about the figure system. As after 7 different Numberss are used to stand for Numberss from 7 onwards and hence they seem physically bit hard to grok. The figure system needs to utilize a inferior of 8 with is figure to represented they are non Denary but octal figure otherwise confusion can easy happen. Hexadecimal Number System Hexadecimal figure are used where there are more options which needs to be represented off and are largely normally used in calculating to stand for different memory locations. Since double star, octal and hexadecimal have representations which are powers of 2 ( power of 0 in binary, 3 in octal and 4 in hexadecimal ) hence that makes them more suited to different state of affairss, which require different figure representations. They are positively lending to the day-to-day life and to the engineering and logical universe as good and needs to be understood decently if one needs to take advantage of such engineering. Whilst the above gives utilizations of the double star, octal and hex figure systems in different countries of IT and while some illustration are given the director encourages you to research a broad scope of illustrations for him to look at. Binary Number System used in ASCII tabular array and IP AddressA Binary figure system are besides used in the ASCII tabular array to stand for different codifications for different characters which so can be used into calculating every bit good. ASCII figure is more like a combination of binary Numberss. Binary Numberss are besides used in IP turn toing system once more which is a combination of Binary figure and are used in calculating field. These IP references are of two different versions now one is known as IP 4 and other one is known as IP 6. These IP references are farther bomber divided into different categories such as category A, B and C where each category has a different figure of hosts and web reference. The ASCII character set, each binary value between 0 and 127 is given a specific character. Most computing machines extend the ASCII characters set to utilize the full scope of 256 characters available in a byte. The upper 128 characters handle particular things like tonic characters from common foreign linguistic communications. In ASCII character set, each character is represented by 7 spots when stored in the computing machine and in an drawn-out ASCII character set, each character is represented by 8 spots. Say for illustration: American standard code for information interchange 0000000 represents Nothing Similar the word HELLO if converted into binary utilizing the ASCII to binary conversation could be represented as follows. 01001000 01000101 01001100 01001100 01001111 ( in decimalA 72 69 76 79 ) Please refer an ASCII character tabular array for farther apprehension of this transition. Octal enumeration system for file protection in UNIX Every file or booklet in UNIX has entree permission. There are three types of permissions ( what allowed to make with a file ) : Read Access Write Access Execute Access Permissions are defined for three types of users: The proprietor of the file The group that the proprietor belongs to Other users Therefore, UNIX file permission are nine spots of information ( 3 types x 3 type of users ) , each of them may hold merely one of two values: allowed or denied. Simply put, for each file it can be specified who can read or compose from/to the file. For plans or books it besides can be set if they are allowed to be executed. Textual representation like -rwxr-r- It is used in UNIX long directory listings. It consists of 10 characters. The first character shows the file type. Following 9 characters are permissions, dwelling of three groups: proprietor, groups, others. Each group consists of three symbols: rwx ( in this order ) , if some permission is denied, so a elan -is used alternatively. For illustration -rrwxr r- 0123456789 Symbol in the place 0 ( - ) is the type of the file. It is either d if the point is a directory or l if it is a nexus, or if the point is a regular file. Symbols in places 1 to 3 ( rwx ) are permissions for the proprietor of the file. Symbols in places 4 to 6 ( R ) are permissions for the group. Symbols in places 7 to 9 ( R ) are permissions for others. R Read entree is allowed tungsten Write entree is allowed ten Execute entree is allowed Replaces R , tungsten or ten if harmonizing entree type is denied Numeric ( octal ) representation like 664 If a numeral representation is used ( like in chmod: 0644 . Here the 2nd figure ( 6 in the illustration ) stands for rights of the proprietor, the 3rd figure ( 4 in the illustration ) stands for rights of the group, the 4th figure ( 4 in the illustration ) stands for rights of others. The below tales show what numeral values mean: Octal figure Text equivalent Binary value Meaning 0 000 All types of entree are denied 1 ten 001 Execute entree is allowed merely 2 -w- 010 Write entree is allowed merely 3 -wx 011 Write and execute entree are allowed 4 R 100 Read entree is allowed merely 5 r-x 101 Read and execute entree are allowed 6 rw- 110 Read and write entree are allowed 7 rwx 111 Everything is allowed Harmonizing to the above tabular array we can see that 1 stands for execute merely, 2 stands for write merely, 4stands for read merely. To unite the permission you can merely add 1, 2 and 4 to acquire a needful combination. For case, to acquire read and write permission, you add 4 ( read ) and 2 ( write ) , therefore acquiring 6 ( read and write ) . To acquire read and execute permissions, you add 4 ( read ) and 1 ( execute ) , this acquiring 5 ( read and execute ) . Examples: 755 on a file would intend rwx r-x r-w permission on the file. Simply convert the octal figure to the binary equivalent and enable the permission where the spots are 1. 755 would intend 111 101 101 In add-on there is one more eight stand foring the Set user ID, set group ID, gluey spot which works in a similar manner. Octal figure Binary value Meaning 0 000 setuid, setgid, gluey spots are cleared 1 001 gluey spot is set 2 010 setgid spot is set 3 011 setgid and gluey spots are set 4 100 setuid spot is set 5 101 setuid and gluey spots are set 6 110 setuid and setgid spots are set 7 111 setuid, setgid, gluey spots are set Explain the usage of double star in IP turn toing for both V4 and V6? Use of double star in IP turn toing for V4: Each IP in a V4 IP turn toing consists of 32 spots. These 32 spots are divided into 4 eights of 8 spots each. An IP reference is represented like this: 172.12.12.46. A computing machine can understand merely binary values and hence each IP is stored in double star. Each eight is represented as follows. For illustration if the value of the first eight is 128, it would be represented as follows: 128 64 32 16 8 4 2 1 1 0 0 0 0 0 0 0 Therefore an IP 128.128.128.128 would be stored as follows: 10000000 10000000 10000000 10000000 Use of double star in IP turn toing for V6: While IPv4 allows 32 spots for an Internet Protocol reference, and can therefore support 232 ( 4,294,967,296 ) references, IPv6 uses 128-bit references, so the new reference infinite supports 2128 ( 3.4 x 1038 ) references. This enlargement allows for many more devices and user on the cyberspace every bit good as excess flexibleness in apportioning references and efficiency for routing traffic. The IPv6 128-bit reference is divided along 16-bit boundaries. Each 16-but block is so converted to a 4-digit hexadecimal figure, separated by colons. The ensuing representation is called colon-hexadecimal. This is in contrast to the 32-bit IPv4 reference represented in dotted-decimal format, divided along 8-bit boundaries, and so converted to its denary equivalent, separated by periods. The undermentioned illustration shows a 128-bit IPv6 reference in binary signifier: 0010000111011010000000001101001100000000000000000010111100111011 0000001010101010000000001111111111111110001010001001110001011010 The undermentioned illustration shows this same reference divided along 16-bit boundaries: 0010000111011010A A 0000000011010011A A 0000000000000000A A 00101111001110110000001010101010A A 0000000011111111A A 1111111000101000A A 1001110001011010 The undermentioned illustration shows each 16-bit block in the reference converted to hexadecimal and delimited with colons. 21DA:00D3:0000:2F3B:02AA:00FF: FE28:9C5A IPv6 representation can be farther simplified by taking the taking nothing within each 16-bit block. However, each block must hold at least a individual figure. The undermentioned illustration shows the reference without the taking nothing: Javascript: CodeSnippet_CopyCode ( CodeSnippetContainerCode3 ) ; 21DA: D3:0:2F3B:2AA: FF: FE28:9C5A Binary in depicting category A, B and C IP references The category of the reference determines which portion belongs to the web reference and which portion belongs to the node reference. All nodes on a given web portion the same web prefix but must hold a alone host figure. Class A Network binary address start with 0, hence the denary figure can be anyplace from 1 to 126. The first 8 spots ( the first eight ) place the web and the staying 24 spots indicate the host within the web. An illustration of a Class A IP reference is 102.168.212.226, where 102 identifies the web and 168.212.226 identifies the host on that web. Class B Network binary references start with 10, hence the denary figure can be anyplace from 128 to 191. ( The figure 127 is reserved for loopback and is used for internal testing on the local machine. ) The first 16 spots ( the first two eights ) identify the web and the staying 16 spots indicate the host within the web. An illustration of a Class B IP reference is 168.212.226.204 where 168.212 identifies the web and 226.204 identifies the host on that web. Class C Network binary references start with 110, hence the denary figure can be anyplace from 192 to 223. The first 24 spots ( the first three eights ) identify the web and the staying 8 spots indicate the host within the web. An illustration of a Class C IP reference is 200.168.212.226 where 200.168.212 identifies the web and 226 identifies the host on that web. Hexadecimal for turn toing memory Memory references are displayed as two jinx Numberss. An illustration is C800:5.A The portion to the left of the colon ( C800 ) is called the section reference, and the portion to the right of the colon ( 5 ) is called the beginning. The beginning value can hold every bit many as four jinx figures. The existent memory reference is calculated by adding a nothing to the right of the section reference and adding the beginning value, like this: C800:5 = C8000 + 5 = C8005 C8005A is called as the absolute or additive reference of the memory. Similarly F000: FFFD can be computed to acquire the undermentioned memory reference. F0000 + FFFD FFFFDA orA 1,048,573 ( decimal ) The Section: Offset addressing was introduced at a clip when the largest registry in a CPU was merely 16-bitslong which meant it could turn to merely 65,536 bytes ( 64 KB ) of memory, straight. But everyone was hungry for a manner to run much larger plans! Rather than make a CPU with larger registry sizes ( as some CPU makers had done ) , the interior decorators at Intel decided to maintain the 16-bit registries for their new 8086 CPU and added a different manner to entree more memory: They expanded the direction set, so plans could state the CPU to grouptwo 16-bit registries together whenever they needed to mention to an Absolute memory location beyond 64 KB. Classless Inter Domain Routing Classless Inter Domain Routing. CIDR was invented several old ages ago to maintain the cyberspace from running out of IP references. The classful system of apportioning IP references is really uneconomical. Anyone who could reasonably demo a demand for more that 254 host references was given a Class B reference block of 65533 host references. Even more uneconomical were companies and administrations that were allocated Class A reference blocks, which contain over 16 Million host references! Merely a bantam per centum of the allocated Class A and Class B reference infinite has of all time been really assigned to a host computing machine on the Internet. CIDR specifies an IP reference scope utilizing a combination of an IP reference and its associated web mask. CIDR notation uses the undermentioned format xxx.xxx.xxx.xxx/n where N is the figure of ( leftmost ) 1 spots in the mask. For illustration, 192.168.12.0/23 applies the web mask 255.255.254.0 to the 192.168 web, get downing at 192.168.12.0. This notation represents the reference scope 192.168.12.0 192.168.13.255. Compared to traditional class-based networking, 192.168.12.0/23 represents ancollectionof the two Class C subnets 192.168.12.0 and 192.168.13.0 each holding a subnet mask of 255.255.255.0. In other words, 192.168.12.0/23 = 192.168.12.0/24 + 192.168.13.0/24

Thursday, November 21, 2019

Didnt choose one yet , need the writors help choosing it for me Research Paper

Didnt choose one yet , need the writors help choosing it for me - Research Paper Example Fanatic missionaries like Sheikh Youssef al-Qaradawi provoke the hatred of the Qatari people of the support the Qatari government gives to American policy and involvement in Israel.2 Banished Saudi Salafist associated with the Qatari elites were accommodated in Qatar and accepted into religious organizations and the Interior Ministry after the raid on Mecca’s Grand Mosque in 1979. Sheikh Abdallah bin Khalifa al-Thani, the previous Interior Minister, was assigned from the Wahhabi group inside the Qatari institution.3 Even though Sheikh Abdallah was removed from his post, this group is still rooted among Qatari security officers. Salafists are being removed from the Interior Ministry or are being weakened by newly formed security organizations like the Internal Security Forces and the State Security Agency.4 As this effort continues, these organizations may become effective in fighting terrorism activities. The major sources of terrorism in Qatar are not likely to weaken in the near future, or after economic and political liberalization, implying that oppressive policing strategies will be the primary method used to stop terrorism. With the Interior Ministry ruled by Sheik Abdallah bin Nasser bin-Khalifa al-Thani, one of the supporters of the emir, and the Internal Security Forces and the State Security Agency directly under the emir, Qatar’s internal security is expected to be sufficiently supported and funded in the near future.5 The intelligence agency of Qatar is fast restructuring to fight terrorism, reporting satisfactory effectiveness in the investigation and prosecution of two Russians suspected of killing Yandarbiyev. Qatar will get substantial security support from Western countries if the new security agencies successfully accomplish their readjustment effort.6 Still, threat of terrorism continues to be a major problem. Al-Qaeda has terrorized Western people in Qatar. The Australian government’s Department of Foreign Affairs and Tr ade (DFAT) even warned tourists â€Å"to exercise a high degree of caution in Qatar†7 because of serious terrorist threats. The DFAT said they were informed of plans to terrorize several individuals and groups in Qatar. On the 19th of March 2005, a suicide car bombing in Doha took the life of a British individual and wounded several other individuals.8 On the 17th of March 2005, the Saudi leader of Al-Qaeda, Saleh al-Oufi, declared a war on terrorists in Qatar and in other nations like Oman and Bahrain. However, the March 19 incident was not surprising. More terrorist attacks are likely to occur and concentrated on easy targets like emigrants.9 The Al-Qaeda in the Arab region is definitely trying to terrorize the Gulf States. The United States is still trying to improve counterterrorism collaboration with the government of Qatar. Working with U.S. officials on counterterrorism is still in progress, and Qatar approved firm counterterrorist finance (CTF) policy.10 However, Qata ri attempts to fight terrorism, especially terrorist financing, beyond its boundaries by charitable groups and private organizations were generally unsuccessful in terms of established global criteria. Qatar’

Wednesday, November 20, 2019

Introduction to the internet and E- Business Essay

Introduction to the internet and E- Business - Essay Example They prepared all the food by themselves without outsourcing. They always welcome the new ideas to promote their quality of services and menus. The company is currently operating in two areas i.e. Cheshire and Manchester. Currently offering catering services to other local restaurants as well as private events and has gained a very prestigious in the area. The company has great quality of foods and services, but unfortunately they are not as good in their e-business segment. The company has beautifully designed website which clearly explains their expertise and taste but don’t have online support system or order booking system. This makes it very difficult to process online orders and queries, as it will delay their response to the customers. The importance and scope of E-Business needed to be elaborated to the company. It looks they are unaware about the technology, if proper demonstration is conducted to explain the possibilities, and benefits associated with it. The company should be educated about different e-business models and their acceptance & success in Catering industry. It can be said that the Information and Communication Technologies (ICTs), for conducting or supporting are used to improve the business activities and processes, including development and research, design and development, procurement, operation, marketing, manufacturing, and sales, human resources management, logistics, value chain integration and finance. The evolution of e-business became more popular with the introduction of Internet, especially, the www (World Wide Web) or web, revolution. The history of e-business is not longer than 15 years. However, its enhancements and developments, i.e. Electronic Data Interchange (EDI), Material Requirements Planning (ERP) and Enterprise Resource Planning (ERP), have the history of more than forty years. EDI is an electronic communication of commercial transactions, such as placements of orders, consignment

Monday, November 18, 2019

Registered Nurse who is being interviewed by magazine about roles and Research Paper

Registered Nurse who is being interviewed by magazine about roles and responsibilities - Research Paper Example To a professional nurse, it this would call for an understanding of the theories and principles upon which nursing practice bases. Therefore, a professional nurse essentially needs to exhibit social perceptiveness, active listening, critical thinking and effective communication skills. Nursing profession has greatly been stereotyped. Some of these stereotypes include nursing as a profession for kind but dumb women, widely perceived to be doctors’ handsmaidens. Timby (2009) blame the media for propagating these stereotypes. Nurses are in reality highly intelligent, required to have a Bachelor of Science degree in Nursing before practicing, of which one requires to have had a diploma in nursing or passed high school proficiency examination before enrolment. Moreover, men increasingly choose nursing as a career and do well in specialties such as operating room, emergency and intensive care nursing. What the public does not know is that nurses’ roles include being a clinica l specialist and practitioner. For example, a clinical nurse expert in cardiac disease would provide expertise care to cardiac disease patients and nurse practitioners have been providing primary care health services in health institutions, especially in rural areas. Virginia Henderson, a theorist in the nature of nursing, is my role model theorist. This is because she appreciates the basic role of a nurse as assisting persons, both the sick and the healthy, gain independence, by putting oneself in the patient’s position. Nurses do not have it easy as it seems. Despite the limited room for conscientious objection to doctor’s orders, perceived as a challenge to doctor’s clinical judgment and psychiatry ethos, nurses do not just follow orders since they become morally culpable for every action they take. Thede (2012) cites the notion of moral agency that presumes every rational being as having the ability to reason morally hence responsible for their actions. As s uch, just following orders would be insufficient. Nurses require scientific knowledge to be able to decide the appropriate course of action despite having orders from doctors. The public could not be aware of the nurses’ responsibility of commitment to patient and informatics. Hence, for example, nurses have to ensure that patients sleep on pressure-relieving bedding materials so as to keep them safe from pressure ulcers. The informatics responsibility requires them, say, to use advanced computer and information technology to record patients’ notes faster and sooner than the traditional handwritten notes. There are values that are foundational in nursing career to ensure wellness outcome and optimal health in patients. Three of these that are core to keep during my nursing career include altruism, human dignity and autonomy. Altruism will see to it that I am concerned for the well-being and welfare of others as noted by AACN (2008). This would be reflected by my advoca cy and concern for the welfare of not only patients, but also nurses and other healthcare givers. The value of human dignity which entails respecting the inherent uniqueness and worth of populations and individuals will be reflected through respecting and valuing all colleagues and patients. Finally, autonomy which refers to the right to self determination will be

Friday, November 15, 2019

Hydrostatic Pressure Vessel

Hydrostatic Pressure Vessel Nomenclature = radial stress = Hoop stress = axial stress Pi = internal pressure Po = external pressure ri = internal radius ro = external radius r = radius at point of interest (usually ri or ro) Delta L = Elongation = Deformation ID = inner dimeter of o-ring Gd = groove diameter Srec = stretch recommended Bd = Bore diameter GW = Groove width CS = cross section diameter C = recommended maximum compression (static)   Summary    A design of a thick vessel is created to measure the effects of hydrostatic pressure when operated in them. The methodology of calculating the stresses on thick walled cylinders is illustrated. A study of the radial and hoop stresses is progressed to find the required sizes of the vessel to operate without a failure under 30 MPa pressure. The bolts are designed to handle the load on the vessel to keep the vessel in one place without moving. The force in the vessel is measured to find the correct bolts that will keep the vessel fixed and safe. A sealing technology study is described to understand how to measure the correct dimension of the o-ring to process the test without air leakage from the entry of vessel. The groove in the vessel was measured to stretch the o-ring designed in a correct manner so the pressure hand move in and out sealed. The calculations in this report are tested mathematically in an academic manner for the design to be brought to life with high efficiency. Introduction In the field of science experimenting, it is necessary to test the efficiency of a specific design, because all products of same function have different specifications and differ in quality. At the same time the true specification of a design can alter its efficiency. Therefore, the best product must be created with real specific measurements that lead to its perfection. It is found that there are three important features of the pressure vessel. Firstly, the shape of the vessel which presents the equations used to study the impact of pressure in them. Secondly, the material used must be chosen correctly to prevent any danger if vessel fails. Finally, the safety is the most important feature in a pressure vessel hence it is important to choose the correct bolts that will keep the vessel fixed at a point. In addition to designing the desired sealing technology of the vessel to keep the air pressure tight in the vessel without any leakage. Companies, industries and labs usually use hydrostatic pressure on a specimen to figure out it properties which allow us to understand the standards of the material. Using hydrostatic pressure is a safe and effective process which helps us to understand more about failure of objects under pressure and the effect of hydrostatic pressure. There are a few different techniques used to measure the failure of a test, for ex ample, when a hydrostatic test is proceeding it is known that if air starts leaking from the vessel, this would be considered as a failed test. Thick walled cylinders nature is that they handle more pressure. Under high pressure, the wall might explode and cause failure thus is it important to dimension right size for the thickness of the cylinder before manufacturing the cylinder for hydrostatic testing. Measuring variables such as, hoop, radial, and axial stresses will be discussed and progressed for the vessel designed in this report. The bolts used are entitled to a high load of pressure which is possible to cause a failure if there was no study taken before using these specific bolts that have this mechanical specification. A study on the strength of the bolt is being used and will be illustrated later in the report. Basically, this report will show a study on how to design the required cylinder and bolts to process a safe hydrostatic test. As the design of the vessel will be illustrated to understand the image of the design and its dimensions. Which will lead to an understanding on how to design a specified thick cylin der to process an internal pressure and a hydraulic press to test a specimen hydrostatically. Aim of the Project The project aim to design a device to measure the effects of hydrostatic pressure on the fracture toughness of the device. It is found that the device required must handle conditions of 30 MPa pressure thus thick walled cylinder is needed. The importunacy of this project is to create a design that meets the required conditions for it to function plus applying correct methods and calculations for it to function. Hydrostatic pressure Hydrostatic pressure test is latest style of testing the ability of fracture toughness of a vessel without causing harm. Hydrostatic test of vessels requires gas or water filled into the vessel if the fracture toughness of vessel is about to crack, the resistance of air reduces the explosion as they resist the inner pressure that causes the failure. Less energy is released when fracture is about to take place LT (2016). Air is a fair medium that is used for a hydrostatic test. Air is less expensive than oil and it has an easier method than water for a test. The sample will not get harmed after the test. When a failure occurs, it means that the vessel does not meet the standard and this failure can be shown when the durability fails and air begins to leak. It is important to assure the leak prevention, reliability, and safety of the pressure test. There are two methods of testing hydrostatic and pneumatic. Air is used as a medium of the hydrostatic test Arshad Mahmud (2012). The hydrostatic test measures the elastic deformation of a metal and its ability to get back to it is formal shape. Air is a safe medium as it is can compressed like water. When a cylinder blows out, air will leak which is safer than using other material due its possibility to be highly explosive. Pressure vessel Pressure Vessel is a tank that is designed to contain gases or liquids at different pressure limits. The pressure or temperature drops can be dangerous; this can cause an explosion which can injure anyone near the vessel. Thus, when designing a pressure vessel legal commands must be taken to create a vessel that is safe to perform its task. History of pressure vessels started in 1495 when Leonardo Da Vinci designed a vessel. The major problems that occurred were mainly explosions because of leakage of compressed gas or liquid, and if a fire was burning near. Engineers created safety factors as measurements of safety of pressure vessels LT (2016). Pressure vessels are used in many applications, for example, in compressed air receivers, hot water storage tank, compression chambers, mining operations and nuclear reactor vessels. A cylinder is the usual shape that is used for hydrostatic testing. It has good maintenance because it is checked every five years for public safety. When the device gets cold when in storage, fatigue might occur hence the importance of the maintenances. However, hard steel responds to it properties to handle in high pressures. Steel also provides controlled and safe environment to prevent any explosion that is possible to harm people. Shape of the vessel Cylinders have an ideal shape because it is easy to analyze when in operation and are easily made. This makes cylindrical vessels the cheapest in cost and most effective. Even though the cylinder is the ideal shape for the vessel, it comes with a few disadvantages, for example, the bigger the diameter, the more expensive the construction of the cylinder would be. The ideal size for a cylindrical vessel is 8cm, this is to avoid inspections and testing issues RR (2012). In this case, the maximum internal pressure chosen is 30MPa which allow us to design a thick-walled cylinder. Equation, and variables of thick walled cylinder will be illustrated in this report, based on them a design of a vessel will be created for hydrostatic testing. Thick Walled Cylinders There are a lot of examples for thick cylinder such as, guns, hydrostatic testing device, and high pressure hydraulic pipes. Thick cylinders are entitled to internal and external pressure. The wall thickness is large and the stress across the thickness is notable. Stresses in this case are solved by using specific boundary conditions, compatibility, and equilibrium. The problem of thick walled cylinders is that they are entitled to high pressure and temperature which is possible at constant or changing duration. The usual problem is ductile fracture of the material which is because of the geometry or the properties of the material. The real analysis of a thick cylinder is dependent on the radial and hoop stress caused by the internal pressure which stand up to the yield strength of the material. Equilibrium equation is important because we need it to relate stresses to strains and strains to displacement d(sr) / dr + sr sh / r = 0. Compatibility equations; Thick walled cylinders have three main mechanical stresses. To design a thick, cylinder the thickness of the wall should be more than 1/10 of the greatest diameter of the cylinder: 1-Hoop Stress 2-Radial Stress 3-Axial Stress (2017) Thick walled cylinder The boundary conditions of a thick-walled cylinder are: Thin surface is, at and outer surface is, at Thus -pi = A (B / ri^2) and -po = A (B / ro^2) Variables can be seen in figure 1.1, Figure 1.1 shows location of the variables (2017) Thick walled cylinder A and B in the simultaneous equations above when applied to the boundary conditions above, two constant equations for A and B will be concluded; Now, to find the final general equation, Lames equation is included thus the hoop stress and radial stress will be; (2017) Thick walled cylinder the axial stress on the case of the cylinder designed bellow which a closed end is calculated by means of equilibrium which is reduced to as shown above. Maximum shear stress follow that stresses on the cylinder at any point on the wall are principal stresses. Thus, the maximum shear stress at any point will be given by the equation of Tresca theory, Giuseppe Catalanotti (2017) Material of the vessel Pressure vessel are mainly made from steel. Rolling or forging is used to make out the shape out of the vessel. Current standards use steel to impact resistance which increases the mechanical strength. Steel is the most important material for engineering and construction in the world. Steel has a great resistance to corrosion because of its formability and durability, high tensile and yield strength and is very effective for thermal conductivity. Stiffness, ductility and yield strength are measured using tensile stress test. Impact test used to figure out the toughness and hardness of surface resistance Total Material (2016). -Yield strength of steel is 260MPa -Young modulus is between 210 GPa (Stiffness better three times than aluminum) -density of 7.7/8.1(kg/dm3) -Poissons ratio 0.30 -Thermal conductivity 11.2/48.3(W/mK) -Thermal expansion 9/27(10-6/K) Total Material (2016). Safe tank to perform a hydrostatic test must remain sealed. Lip seal technology is used in this system. O-ring were created to prevent any leakage when hydraulic hand is inserted into the chamber. A hydrostatic test should meet these requirements of the vessel to remain testing of pressure safe. Calculations Results: First, the maximum pressure that will cause yield at the internal surface of the vessel will be calculated, using the hoop and radial stresses to find the maximum shear strength and the yield strength. The equations will be used are explained in thick-walled cylinder section which are the hoop and radial stresses. In addition to the maximum shear strength equation and yield equation which will be mentioned in the following; Giuseppe Catalanotti (2017) Secondly, the elongation equation will be used to determine the size of the deformation; Delta(L) = deformation(z) * L (L) is the height of the internal cut which has a height of 0.210m Deformation(z) v = passions ratio E = the young modulus k is the ratio of external diameter on the internal diameter ro/ri First the hoop and radial stresses must be calculated hence the hoop stress equation is pi = 30MParo = 0.210m k = 2.625ri = 0.08m hoop stress is = 145.67MPausing hoop stress equation above. pi = 30MParo = 0.210m k = 2.625ri = 0.08mk = ro / ri The radial stress is = -(108.75 MPa)but r = -piusing radial stress equation above. The yield equation is pi = 30*10^6 k = 2.625using the yield equation above. = 70.18 MPa Since the yield strength of the steel is 260Mpa and it is greater than the yield at 70.18MPa pressure then the measurements of the vessel appear to be able to handle an extra 190MPa on the system before it begins to fail. The maximum shear strength Tresca is      = Since hoop and radial stresses are found, maximum shear stress can be calculated. = 145.67MPa = 108.75MPa= 70.18MPa Giuseppe Catalanotti (2017) Now finding the Elongation which has the equation Delta(L) =* L = (1 2v) * pi / E (k^2 1) = (1 2 * 0.3) * 30*10^6 / 210*10^9 * (2.625^2 1) = 9.7*10^-6 v = passions ratio of steel pi = internal pressure E = the young modulus of steel k is the ratio of external diameter on the internal diameter ro/ri Deformation= 9.7 *10^-6m Since, Delta(L) = defamation(z) * L Then, L = Length of the cylinder which is = 0.21m. See figure (3). Elongation is 9.7 * ^-6 * 0.21 = 2.037 *10^-6m from Elongation equation above Giuseppe Catalanotti (2017) Bill of Materials (6) (4) (1) (3) (5) (2) Item Number Description quantity Material (1) Vessel 1 Steel (2) O-Ring 1 Rubber (3) M14 Bolts 6 Steel (4) M12 Bolts 4 Steel (5) Pressure hand 1 Steel (6) Holding Stick 1 Steel The Design and assembly procedure A hydrostatic pressure device was designed to measure the pressure. This tank is to be attached to the hydraulic machine. Measurement of the machine were taken to design the vessel. The purpose of this device in figure (1) is to ensure that pressure tests are maintained safely and properly. This design is measured to handle pressure between 0MPa to 70MPa. The test will be progressed at 30 MPa. The material used is steel. The design contains six different main parts as shown in figure (1). This section will provide dimension and function of each part. Figure (1) Vessel Components (Exploded View) The size and the thickness are very important factors when designing a safe vessel. Figure (2) shows the circular diameter of the head of the vessel which is 21cm and that it was extruded to 34cm. Figure (2) is also a cross sectional view of the final shape of the vessel.The thichness of the wall surrounding the chamber is 6.5cm and the bottom has a thickness of 7cm. Figure (3) shows the dimsion of the chamber which is a cylinder of 8cm diameter and length of 21cm. This area is where it is expected to place the specimen. The specimen size is measured to be 20*50*4mm Figure (2) Dimension (1)Figure (3)Chamber dimensions The mechanism that will hold the vessel is smart. Figure (4) shows a diameter of a cut of 5.1 cm and 6.5 high. This area is meant to be placed into the bottom holding hand of the hydraulic machine in the Ashby building. Where the vessel has an extrusion of 27cm and height of 5cm and was created as a base of vessel as shown in figure (5). Figure (4) Bottom hand holder Figure (5) shows the base diameter and height Figure (6) shows that the base cylinder has 6 holes of M14 size. These holes were created to be tighten up with bolts of M14 shown in figure (7) on the table of the hydraulic machine. Six bolts are created and can be seen in figure (6). Figure-(6) M14 holes x6 Specification of the Bolts (F = P x A),which means that the force is equal to the pressure multiplied by the area. Figure (3) shows the internal diameter of the vessel which is 0.08m. (a = pi x (d)^2 / 4) is used to calculate the area of a cylinder, which means that (pi x (0.08m)^2 / 4) = (50.03*10^-3 m^2). The maximum pressure will be tested is 30 MPa. Since pressure is 30MPa and area is (5.03*10^-3 mm^2). then as they multiplied to bring a force of 150 kN. This means that thetotal force in the cylinder is equal to 150 kN. The question here is that will the bolts in figure (7) and (8) M14, M12 handle 150 kN of force. The research on the metric bolts shows the ability of each size of the bolts. It was shown that M14 bolt has a load proof of 66.7 kN. Figure (6) shows that there are 6 bolts of M14 is used. Now, the total force applied is divided by the number of the bolts to show the required ability of the bolts. (150 kN / 6 = 25 kN) which means that the system requires six bolts that each of them can handle 25 kN of force Metric Bolts (2016). Above it is mentioned that the load proof of each of the M14 bolts is 66.7 kN which means that a total of six M14 bolts will provide an ability of 400 kN, 400 kN of force can handle 150 kN of applied force. In brief, the bolts used in the system in figure (11) meet the requirement of the study which is 30 MPa. To ensure the safety of fixing the vessel to the machine, four M12 bolts were added. M12 bolt figure (8) has a load proof of 48.9 kN, Total load proof of four bolts is equal to 195.6 kN which has a good impact on keeping the vessel safe from any danger of being rapidly moved away from it fixed point. Eventually, the total ability of the bolts is equal to 595.6 kN which are designed to prevent the vessel from any possible danger of a maximum pressure load of 150 kNMetric Bolts (2016). Figure (7) M14 Bolt x6 Figure (1) shows 4 holes created on top of the vessel. They are M12 holes created to increase stability of the vessel and more safety in case of the vessel left it place. Bolts of M12 were created to have a length of 39cm as shown figure (8). Calculations above are measurements of parts in figure (1) . Ten bolts, 4 of M12 and 6 of M14 are attached to the base of hydraulic machine. Finally, a hydrostatic test can be done safely.   Figure (8) Long M12 bolts x4 Sealing Technology O-ring is a mechanical gasket in a shape of loop with a diameter that is made of rubber. It is designed to be fitted at circler cut which means that an o-ring will be compressed during work. It is expected to seal a joint of two parts. One mechanical benefit of the o-rings is to seal a moving hand through a vessel without an air leakage. Thus, a specific design of an o-ring will be designed to be fitted at the entry gate of the vessel for the hand to enter the vessel without air leaking (efunda) 2017. Figure (5) shows the place of the o-ring. The thickness of the o-ring is calculated to be 0.84 mm and the inner diameter of the o-ring is measured to be 79.46 mm. The o-ring designed can be seen in figure (10). Figure (9) shows the grave and the dimension of the O-ring. An o-ring is meant to be attached in this system. The groove was measured to be 4 cm away from the top of the vessel in the chamber section. The groove diameter was calculated to be 8.1 cm and the width of the groove is 1.15 mm. As hydraulic hand enters the chamber, it will pass through three rubber bands that reduces the area of the chamber making it tighter for the hand to be inserted without any leakage outside the system PS (2016). The design of the grave and the o-ring must be studied before they are designed. To design a sealing technology there are a few variables to know to create it. These variables are the bore dimeter of the outside radius, the groove diameter of the inside radius and the groove width of the axial length. The maximum stretch of the 0-ring should not be more than 5% of the grove size (efunda) 2017. Calculations of the O-ring and Results ID is the inner diameterof the o-ring and can be found if Srec the recommended stretchischosen and the groove diameter Gd the groove diameter can also be found when this equation is used; Srec = 2% ID = Gd * (1 Srec) then, ID = Gd * (0.98). The stretch of the o-ring is to make the o-ringstay at the groove tightly without falling out (efunda). ID = (39.94 * 2) 0.42 = 79.46 mm ID = 79.46mm Gd = ID / 0.98 Gd = 79.46 / 0.98 = 81mm Gd = 81mm Cross sectional Diameter (CS) of the o-ring: O-ring will be compressed in radial direction when it is attached to the groove. As the cross section of the ring is compressed between groove and bore diameter then the cross-sectional diameter must be more the depth of the groove. Which means that CS > Gd ID / 2 (efunda) 2017. CS = Gd ID / 2 = 81mm- 79.46mm / 2 = 0.77mm As CS must be > than 0.77mm then CS = 1mm C is the recommended maximum compression is 40% and must be for the ring to be compressed. The recommendation of C depended on the seal kind. Static seals do not require an axial movement in the bore(efunda) 2017. Groove Width in the Vessel (GW) = When the ring is compressed horizontally it will expand vertically. The material of the ring will be helpful to be compressed effectively. However, the groove width should be about 1.5 by the cross sectional of the o-ring diameter and this to stretch the ring vertically (efunda) 2017. GW = CS * (1.5) = 1mm * 1.5mm = 1.5mm. Figure (9) Section Cut shows the position and size of the Groove width and diameter Figure (10) O-ring CS dimeter and radius (r) Figure (11) Final Product (Thick walled Vessel) Discussion Thick Walled cylinders handle high pressures with least effects on the vessel and remain safe for future use. The deformation possible in the vessel is calculated to find the amount of elongation (the change in formation or length in an object). The elongation value is 0.002mm which is proper. The maximum pressure in the vessel is 30MPa hence finding the hoop and radial stresses to find the shear stress of the vessel and compare it with the yield strength of the vessels material and it dimensions. Therefore, the stresses applied at different sections in the chamber are calculated above and hoop stress is found to be 145.67MPa and radial stress is 108.7MPa. The maximum shear stressin the vessel is calculated from the hoop and radialstresses and it is found to be 70.18 MPa. Based on Total Material (2016) the yield strength of steel is 260 MPa. Giuseppe Catalanotti (2017) have stated that if yield strength of material is bigger than the shear stress calculated in the vessel then the vessel is safe when pressure applied. The Bolts are designed to handle keep the vessel fixed on the ground of the hydraulic machine. The total force initiated in the vessel is calculated and found to be 150kN thus the required bolts are must have a higher force than 150kN. The six M14 bolts used can handle force of 400kN and this enough for the vessel to function safely. Finally, the sealing technology, the o- ­ring is designed to keep the vessel sealed when it is preforming. (efunda) 2017 stated that the maximum recommended stretch of an o- ­ring is 5% and the designed o- ­ring has a stretch of 2%. The groove width is 8.1cm, cal culated using 2% max. stretch and an inner diameter of 7.94cm. The CS diameter o- ­ring is 1mm, which must be higher than the calculatedCS diameter which is 0.77mm. Hence, the

Wednesday, November 13, 2019

Better Living Through Chemicals :: Environmental Pollution Essays

Better Living Through Chemicals Few things are more important than the air we breathe. From a factual and biological standpoint, there is nothing more important. Before I begin this inquiry, I must disclose that I am not an environmentalist. This is not something I am proud of by any stretch of the imagination. I admire those people who climb old growth trees and reside in the branches for days on end. They do this to save these wonders of nature from developers and road crews. I acknowledge that some of my decisions may appear to be similar to those of an environmentalist but actually, my decisions have often been based on financial concerns. For example, my husband and I have shared one car for the last nine years. I used to let people infer that it was because we did not want to pollute and use up valuable resources. More than anything, I was simply impressed with myself that I could arrange a schedule that worked for two working people. We were working and going to school while relying on one car. O f course, occasionally we relied on public transportation. It wasn’t easy; I used to have to arrive at school at 6:30 am on Fridays for a class that started at 4:00 pm. I made the best of it by using that time to study. A couple of weeks ago we bought a second car. Looking back, I do not know how we managed with just one car for so long. It is easy to forget, and even easier to get used to immediate convenience. There are costs and pay offs in life, always I have been thinking a lot lately about human nature, our environment, what we accept and what we choose to believe. I say ‘choose’ because, if we listen to many scientists, they tell us we are changing our environment, and not for the better. Global warming and greenhouse gasses are a debatable topic. Does this dire situation exist or does it not? Are the icecaps melting, or are they not? It depends on who you talk to. I find this aspect very interesting. According to the Bush administration, we need more study on the issue. I suggest we read and respond to the studies already conducted.

Sunday, November 10, 2019

Plantation Society and Creolization Essay

The ‘self-image is the key to human personality and human behaviour. Change the self image and you change the personality and the behaviour. (Maxwell Maltz) Sociology is a systematic way of studying the social world. It seeks to discover the causes and effects of intercommunication and interaction that in social relation. While the functionalist provided a static view of society. Functionalism views society like a biological organism. The parts or institutions of the organism or society function appropriately to ensure the whole structure works efficiently and effectively. They believe that the whole has greater power than the individual parts. The three main aims and objectives of functionalism are to maintain order, stability and equilibrium in society. (Functionalist and Marxist Perspective) Max Weber (1864-1920), a German sociologist and a contemporary of Durkheim’s, also became a professor in the new academic discipline of sociology. Weber also believed in social actions as an action responsible by the individual. He believed that the individual need to take account for his own actions to be considered social. Weber defined social action as an action that an individual takes and attaches meaning and is conscious of the action. The individual must also take into consideration how others react to their actions. If the individual is not conscious of their action then it cannot be termed as social action and if they do not pay attention to the reaction of others for their action then it’s not social. On the stand point of the socialist, they need to find out the meaning of the action of the individual. From this, Weber took on the realization of social actions into social interactions – the interaction of individuals. He did not take into account religion, family, work or school. Marx, on the other hand believed that social actions leaned heavily on economic structures, but Weber did not agree because he believed they influenced the response of the action. Weber also had his views on religion as an influence on social action. He believed that religion stemmed what is called the spirit of capitalism or protestant ethic. Religion once believed that since they were the only true religion that they had no worries and will always be saved. Protestants came in with the idea opposite to this belief and then changed people’s perception of being saved. They then believed that financial success is a blessing from God and so began living frugal lives, investing money to make more money. Hence this brought about the view of capitalism. On the other hand, Weber however had a different view on social actions as to functionalism. Functionalism believed that society is a whole unit made up of interrelated parts that work together. Functionalism believed that for a society to work in harmony they must work together as a whole. Durkheim believes that society is composed of many parts, each with its own function. When all the parts of society fill in their function, it’s a normal state. If they do not then it’s abnormal or pathological. This major difference of these perspectives of society is their level of analysis which is micro-sociological and macro-sociological. Micro-sociological examines small scale patterns of social interaction which is the view of interactionism, whereas macro sociological examines large scale patterns of society which is the view of functionalism. The micro-sociological aspect of society, like Weber, believes in the individuals and what influences or causes their actions and the reactions of others based on the actions. The macro-sociological aspect, like Marx, believes in the larger picture of society as a whole with each part working together to achieve a function. Both functionalism and social interactionism has their varied views of gangs in society. Functionalism does not support gangs because it makes society unstable. Functionalism believes in society as a whole which makes it stable. Functionalism looks at gangs and how they contribute to or detract from society. Gangs contribute to society since they classify people into different identifiable groups, provide an example of defiance, and inspire the development of institutions of social control and total institutions. They detract from society in that they separate individuals from the main stream of society and there is a lack of social integration. Socialists like Weber, would look deeper into the reason behind gangs. Gangs, although part of society, but not considered a part of society since it has no function which shapes a stable society. Gangs are made up of small groups of people as little and three individuals. According to The Oxford Study Dictionary, â€Å"A gang is a number of workmen working together or a band of people going about together or working together, especially for some criminal purpose. † They form a gang for a reason and act upon it. Their action is as a result of their beliefs and they are accountable for their actions. It becomes a social action as the reaction of gangs form a negative part of society as determined by many. The social action, as Weber describes, gives a better understanding of gangs, since functionalism looks at gangs as a negative part of society. Social interactionism views gangs as a means to society achieving a goal, whether negative or positive. They look deeper into the individuals who make up the gang and the purpose of the gang. People in our poor urban Caribbean centers will be encouraged to join gangs because they are unable to achieve socially accepted goals through legitimate means. Gangs could be seen as innovators or achieving social goals through an illegitimate process. Individuals in the Caribbean join gangs for a variety of reasons, example for identity recognition that is achieving a level of status that cannot be achieved within the society; for protection because gang members protect their members; fellowship or brotherhood since gangs serves as an extension of the family where the members are called their brother; intimidation and peer pressure as being forced to join a gang to prove a point; the fact that gangs causes the individual to feel important especially if this is lacking at home; where they actually join a gang to perform criminal acts since they are assured protection and profits of the group. Because of the vast reasons for joining a gang, it is to be considered mainly by the socialism since they look into the reasons or underlying meaning behind the action of the individual. In the Caribbean people join gangs for many reasons and since Weber look at the action behind the individual for their action I think he best explain a better understanding of why people in the Caribbean join gangs. According to The Jamaican Gleaner people join gangs for a sense of purpose, belonging and value, hence the individual reasoning behind it all. We all face the ills of society yet only a few join gangs yet the majority does not. We are all a byproduct of our environment; however we do have an individual choice of conformity. So, what makes a few join and the majorities abstain. It boils down to the individual’s reaction to the situation that propels them to join a gang. Weber’s social action theory of one’s own individual conscious choice of joining a group is the driving force here. True, society does affect one’s actions to act in a certain way but if this provides a better understanding of why people in the Caribbean join a gang why not the majority join a gang? Why only a few join gangs in the Caribbean? I believe that it is the individual own personal conscious decision to join a gang provides a better understanding. Weber looks deeper into why the individual join a gang. If it is the society then according to Durkheim our society should be in a pathological state since the majority does not join a gang. The problem in the family is the one major driving force behind young people joining gangs. They do so for a sense of belonging according to the Jamaican Gleaner. The individual own conscious decision come to play here as to why they join a gang. They do so in an effort to fill in the void. The gang provides them with a new family and brotherhood. Peers pressure people to conform to a certain way of life and a gang is no different. One’s peers are part of the people whom they associate with because they are at school or workplace and so forth. Peers tend to have a great influence on the individual decision they are face with on a daily basis, so they have to make that choice of succumbing to the pressure or overpowering it. They must each make that conscious choice in accord with Weber theory of social action. As mentioned in the introduction, Greg is an example of why people join a gang for protection. Greg was well on his way of making a conscious decision to join a gang; again leading to the point that people make an individual reason for joining gangs in the Caribbean. In conclusion, It is my belief that both the functionalist who believes that society should work as a whole, one unit and the sociologists who states that its all about the action of the individual both contribute to the way people behaviour and the impact each theory has on society.

Friday, November 8, 2019

Free Essays on Physhology

Psychology is the very important perspective for human nature. It is very much important for the individual environment. â€Å"Psychology is very much a product of the Western tradition. Whereas a new psychology of the year 2000 contains both the eastern as well as the Western tradition†(Frey,04/06). Psychologists call a person’s self concepts it includes what a person perceives from the person’s self-concept attitudes. It’s related to Psyche means the integrate part of human mind motion connected to those with bodily concepts. â€Å"It however reflects true relationship with the mind-body concept. ATTITUDES AND SOCIAL COGNITION addresses those domains of social behavior in which cognition plays a major role, including the interface of cognition with overt behavior, affect, and motivation.†(Primis,119). Major perspectives in psychology at this point includes psychoanalysis, humanism and sociobiology. Now, what’s the concept of psychoanalysis is also a very important perspective. â€Å"As a therapy, psychoanalysis is based on observation that individuals are often unaware of many of the factors that determine their emotions and behavior.†(Frey,04/06). â€Å"It is, in addition, a method for learning about the mind, and also a theory, a way of understanding the processes of normal everyday mental functioning and the stages of normal development from infancy to old age.†(psychology.com). â€Å"Furthermore, since psychoanalysis seeks to explain how the human mind works, it contributes insight into whatever the human mind produces.†(apa.org) Sigmund Freud was the first psychoanalyst.†Many of his insights into the human mind, which seemed so revolutionary at the turn of the century, are now widely accepted by most schools of psychological thought. Although others before and during his time had begun to recognize the role of unconscious mental activity, †Freud was the preeminent pioneer in understanding its importance. Although his i... Free Essays on Physhology Free Essays on Physhology Psychology is the very important perspective for human nature. It is very much important for the individual environment. â€Å"Psychology is very much a product of the Western tradition. Whereas a new psychology of the year 2000 contains both the eastern as well as the Western tradition†(Frey,04/06). Psychologists call a person’s self concepts it includes what a person perceives from the person’s self-concept attitudes. It’s related to Psyche means the integrate part of human mind motion connected to those with bodily concepts. â€Å"It however reflects true relationship with the mind-body concept. ATTITUDES AND SOCIAL COGNITION addresses those domains of social behavior in which cognition plays a major role, including the interface of cognition with overt behavior, affect, and motivation.†(Primis,119). Major perspectives in psychology at this point includes psychoanalysis, humanism and sociobiology. Now, what’s the concept of psychoanalysis is also a very important perspective. â€Å"As a therapy, psychoanalysis is based on observation that individuals are often unaware of many of the factors that determine their emotions and behavior.†(Frey,04/06). â€Å"It is, in addition, a method for learning about the mind, and also a theory, a way of understanding the processes of normal everyday mental functioning and the stages of normal development from infancy to old age.†(psychology.com). â€Å"Furthermore, since psychoanalysis seeks to explain how the human mind works, it contributes insight into whatever the human mind produces.†(apa.org) Sigmund Freud was the first psychoanalyst.†Many of his insights into the human mind, which seemed so revolutionary at the turn of the century, are now widely accepted by most schools of psychological thought. Although others before and during his time had begun to recognize the role of unconscious mental activity, †Freud was the preeminent pioneer in understanding its importance. Although his i...

Wednesday, November 6, 2019

Journal Week 1 Essays - English-language Films, Free Essays

Journal Week 1 Essays - English-language Films, Free Essays I can relate to Eddie. When I was in my previous college I didnt know what I was doing for a while. I was trying to figure out what was going on in the class room when we were learning a new technique learning a new formula in math. I had just changed my medications and I didnt know what was going on. Everything was difficult for me at that point. I wanted to give up. When it came to not being successful at not getting the formula I wasnt fully understanding what was going on. I didnt know if I wasnt doing one of the steps right. I couldnt figure out if I was not fully grasping the concept of the formula. When it came down to it I was having so much difficulty. When I am looking back at the situation I see that I could have taken a step back from the formula and really tried to break it down and asked for helped to see if that would have reduced my frustration. I know that when I did ask someone for help I had a better success with the formula and that was a good thing. It became all about how I decided to use my mind and not allow myself to break down or shut off when I felt defeated would have reduced my frustration and would have majorly increased my chances of success. When it came to this experience I have learned so many things. I have learned that I cannot always do things on my own and its ok to ask for help. I have also learned that when it comes to things that I dont always fully grasp that when I take a step back or look at the problem from a different point of view I will get a better picture of what the teacher was asking for and will be able to do the problem.

Monday, November 4, 2019

Anthropological perspectives on Peace and Conflict Studies Research Paper

Anthropological perspectives on Peace and Conflict Studies - Research Paper Example It explores how people of diverse appearance, different cultures and mutually incomprehensible languages live together peacefully. This paper will give an analysis of the possible causes of the Israeli/Palestinian conflict as well as solutions for the conflict from anthropological point of view. Introduction The conflict between Palestinians and Israelis is a struggle that has been going on since the mid of the 20th century. Within both Palestinian and Israeli societies, this conflict has generated a wide range of opinions and views. This underscores the deep divisions existing between Palestinians and Israelis and also within either society. This conflict has caused a high level of violence for almost the whole duration. Paramilitary groups, regular armies, terror cells and individuals have been conducting fights. Besides the military, casualties have also come from civilian population with a lot of fatalities on both sides. It has been noted that prominent global actors have engage d themselves in the conflict (Gelvin 15). Anthropology gives a scientific basis for handling crucial dilemma in today’s world. It explores how people of diverse appearance, different cultures and mutually incomprehensible languages live together peacefully. Anthropology calls for no naturalization of all human constructions and recognition of culture’s arbitrariness including arbitrariness of power (Lewellen 17). This paper will give an analysis of the possible causes of the Israeli/Palestinian conflict as well as solutions for the conflict from anthropological point of view. Causes of Israeli-Palestinian Conflict It has often been said that the conflict between Palestinians and Israelis is about land. This claim is designed to counter the usual misconception suggesting that the Israelis and Palestinians have a historical clash that dates back to hundreds of years as a result of inherent cultural and religious contempt for each other. The lands claims play a vital role in both sides of animosities, but it fails to give the full story (Harms 60). The more complex and more accurate explanation for this conflict is that it is about the emerging relationship between two groups of people living in the same area, particularly regarding the emergence of firstly, Jewish nationalism (Zionism) and secondly, Palestinian nationalism, which occurred between the late 19th century and early 20th century. The definitions and development of both nationalisms are the basis of the conflict. The emergence of Zionism was not in reaction to Muslims, Palestinians or Arabs, but in response to perceived and real anti-Semitism in Europe and Russia. Although the decision to make Israel a Zionist state location was founded on religious factors, this was largely untrue regarding the decision to establish a Zionist state. When Zionists came to Israel, they did not intend to evict the native population although they were oblivious to it to a great extent. The Zionist movement encouraged immigration to Israel using the slogan, "A land without a people for a people without a land." On reaching Israel, they sought land and believed this maxim, and in this way, they had already sowed the seed of the conflict. Mostly, Zionist settlers showed no animosity against the indigenous population. They never removed Palestinians from their land using force, but they had a simple economic strategy of purchasing land from Arab tribes that represented the indigenous Palestinian inhabitants. This resulted into the Palestinians identifying

Friday, November 1, 2019

Starbucks External and Internal Environment Essay

Starbucks External and Internal Environment - Essay Example Business of Starbucks is complemented by three operating segments such as International division, United States division and Global Consumer Products division. The study has selected UK in order to analyze critical success factor and resource capability of Starbucks. Impact of external environment on business policy of Starbucks will be measured by using PESTLE and Porter’s Five Force analysis. SWOT, value chain analysis and VRIO framework will be used to understand internal strength of Starbucks. Critical success factor (CSF) analysis will be important part of the study. Starbucks Corporation was established by Jerry Baldwin, Gordon Bowker and Zev Siegl in the year 1971. In the initial years Starbucks operated business with single store located in Pike Place Market of Seattle. The company is headquartered at Seattle, Washington, U.S. Distribution network of the company is complemented by 6700 owned stores and 4080 licensed stores in USA. Starbucks has established their presence in more than sixty countries with the help of 20,000 stores. The company offers hot drinks, food items, various coffee drinks and other retail merchandise. As of 2011, market capitalization of the company is US$37.84 billion while sales revenue was more than US$ 13 billion. The company is facing competitions from various big players such as Dunkin' Brands, Nestle, McDonalds, and Wendy's International, Inc. Strategic Group map for Coffee industry can be explained in the following manner: (Source: Brown, 2011) Task A (1) Analysis of Starbucks External Environment Macro Environme nt Analysis PESTLE will be used to analyze macro environment condition of UK. Political UK is one of the most influential countries in the world and plays crucial role on deciding business policy in North Atlantic Treaty Organization. Government in the country has taken stern steps such as 24% budget cut for department of media, sports and culture in order to reduce overall financial deficit in the country. Government in the country has planned to reduce corporate tax by 22% within next two years and raise income tax bar ?8,200 to ?9,205. Economic Economic recession has contracted GDP growth by 0.2% while industry growth rate of the country has slumped to 0.8% last year. Economists forecasted unemployment of UK will touch 8.4% by the end of 2012 and more than 2.5 million people will get unemployed within next one year Social Budget deficit of Government has created challenge for people of the country to maintain standard living style while "managed migration" police government has f urther deteriorated the situation. Working age population in the country is growing at a rate of 7.7% for last two years. Technology Retailers are using latest technologies such as RFID, ERP and