Wednesday, October 30, 2019

Interview Article Example | Topics and Well Written Essays - 250 words

Interview - Article Example She said completing a project like educating others about engineering is a source of outreach and it helps to engage the community about issues or problems in engineering. Maya does say that it is very complicated to work within a school setting but that the outcomes are very rewarding. Maya will fix an engineering problem by using educational strategies. Additionally, in educational research, experimentation is a way to gain insight into methods of instruction. Even though teaching is context-specific, results can provide a starting point for further research. Working on research not only helps to solve existing problems, but it also is challenging. For Maya, educational research primarily focuses on experimentation to gain awareness on a specific topic. Although teaching an engineering class encompasses working with specifics, research is often a preliminary stage for further study. She will go on to build new methods in research as she learns by dealing with students. She recognizes that completing research is necessary in order to solve a specific problem and may often receive attention from a large audience and additionally may often require urgent results depending on the

Monday, October 28, 2019

Is Social Networking an Effective Marketing Tool Essay Example for Free

Is Social Networking an Effective Marketing Tool Essay Marketing Strategies Many businesses have started to incorporate market strategies as a way of increasing profitability. Small business can create market strategies to target their market more effectively and have a competitive edge over competition. Lyndon Simkin, (2000) stated â€Å"If the â€Å"right† opportunities are pursued, customers are properly probed, the â€Å"right† customers targeted with a marketing proposition designed to give a business an edge over its rivals, it is highly likely that customers will be satisfied, market share will rise in core target markets and profitability will accordingly support a viable future. † Having a strategy in place will allow you to set objectives such as increasing your share of the market that your business currently is in. Market strategies for small businesses are to develop the growth of the company. Analysing you target market and introducing a way in which you can target this market. The following are how marketing strategy allows business to set objectives Current product/current market Market penetration is a strategy of increasing your share of existing markets. You might achieve this by raising customers awareness of your products and services or finding new customers. Current product/new market Market development is a strategy of finding and entering new markets with your current product or service range. The new market could be a new region, a new country or a new segment of the market. New product/current market Product development is a strategy for enhancing benefits you deliver to customers by improving your existing products and services or developing new ones. New product/new market Diversification is a strategy that usually carries high costs and high risks. It often requires firms to adopt new ways of doing business and so has consequences far beyond simply offering new products/services in a new market. It is therefore usually a strategy to be adopted when other options are not feasible. http://www.is4profit.com/business-advice/sales-marketing/marketing-strategy.html Marketing Tools Online There are many marketing tools available for businesses to use and utilising the best one to fully create brand awareness for your product is vital. Geoffrey J. Simmons, (2007) realises â€Å"Companies are finding that they are having to redefine their marketing and branding strategies due to the unique characteristics of the internet and its capacity to change old rules.†. Due to the growth of users using internet, marketing tools have been developed so that businesses can market their products online. Marketing online has been as an important way for business to create brand awareness and target customers effectively. Online advertisement is now seen as the most effective way of marketing therefore many different ways have been introduced to advertise on the internet. Amalesh Sharma, (2011) stated â€Å"The development of data intensive instruments, transformation of societal and relationship management, optimization of Search engine marketing, exclusive networking and other online resources are eliminating the traditional form of marketing.† Search Engine Optimization Marketing Search engines are seen as essential way of companies to be seen by potential customers. Kristin Kennedy, Bonnie Brayton Kennedy, (2008) stated â€Å"The key to being found by the right people at the right time lies with search engines. There are essentially two ways a customer will find a business site via a search engine, through an organic or a pay-per-click (PPC) listing.† Using a search engine you are allowing yourself to be found new customers but search engines don’t offer differentiation so many of your competitors can be listed alongside you therefore not giving your business the competitive edge. Search engine optimization can be a less effective way for small business as it is marketed alongside big companies which was found out by Kristin Kennedy, Bonnie Brayton Kennedy, (2008) they stated a â€Å"small manufacturer of gold jewelry will probably not get top billing over Tiffanys on the organic list, unless they spend a significant amount of time and money o n developing their web site design and advertising.† E-mail Marketing Small businesses have been using email marketing as a way of marketing their products and reaching out to the target market. Anita Jackson, Ray DeCormier,stated â€Å"E-mail offers a promising tool to enhance brand loyalty as it helps marketers keep in touch with their customers on a regular basis at low cost.† Small businesses are using this method to create and reach out to their target market. Using this mthod to market their business and product to create more brand awareness. http://www.emeraldinsight.com/journals.htm?issn=0263-4503volume=17issue=3articleid=854456show=html http://www.emeraldinsight.com/journals.htm?issn=1061-0421volume=13issue=7articleid=857868show=html http://www.emeraldinsight.com/journals.htm?issn=1751-5637volume=12issue=4articleid=1937676show=html Do you feel other ways of online marketing would benefit your company more? http://www.emeraldinsight.com/journals.htm?issn=0263-4503volume=18issue=3articleid=854495show=html ) Lyndon Simkin, (2000) (http://www.emeraldinsight.com/journals.htm?issn=0263-4503volume=25issue=6articleid=1628110show=html#idb72) Geoffrey J. Simmons, (2007) .†( http://www.emeraldinsight.com/journals.htm?issn=1751-5637volume=12issue=4articleid=1937676show=html ). Amalesh Sharma, (2011) Kristin Kennedy, Bonnie Brayton Kennedy, (2008) (http://www.emeraldinsight.com/journals.htm?issn=0140-9174volume=31issue=10articleid=1746719show=html)

Saturday, October 26, 2019

? TERROR-ISM ? :: essays research papers

A difference of ideas, opinions is opposition. When attempted to thwart the opposite opinion, and disappointed by existing set up opposition seeks public support as no objective of fight back is achieved without mass support. Normally In order to achieve public support two different types of methods are adopted. 1.  Ã‚  Ã‚  Ã‚  Ã‚  This method generally a fight for the society’s causes that is unrecognized by existing set up. In order to get the causes recognized peaceful disobedience is observed. Best example, Mahatma Gandhi and Nelson Mandela took a step, which was positive revolution, though, uncomfortable for then British regime. Most of their life made jails as their homes self-persecution and sacrifice but momentum of society support was immense as cause was for major percentage of society that created one of the highest revolutions. This method is weapon of word and disobedience though is slow yet very effective to interact with masses, inspires masses to support revolt. I call positive revolution. 2.  Ã‚  Ã‚  Ã‚  Ã‚  On the other hand negative methods are used to terrorize society in order to gain support are for causes which opposition feels is cause that society should accept and follow. This type of revolt comes into existence when both category accepter and non-accepters comprise the society. Rather support from limited members, which are to be forced on society to follow. Certain sections they choose by inspiring them to join by their teaching and other incentives, this section is normally poor and uneducated class. Terrorizing methods are used to make non-accepters to agree if not die or leave. In this case major percentage of non-accepters leave the society in fear of terror and opposition gets full support from remaining members of society. Sacrificing and persecuting others achieve this objective. To my opinion this is TERROR-ISM and negative revolution. Who create to achieve objective and gather mass support by terror are terrorists. Intensity of terrorisms and their activities succeed in the countries, which have high rate of poverty, high percentage of illiteracy and unemployment. Poor needs food and clothing, illiterate and unemployed needs source of income and terrorisms need support from deprived mass and people for sourcing income (through illegal sources as legal source is not open for them) to spread campaign. For an unemployed poor legal or illegal employment is no issue his/her issue is food and life. These illegal activities give birth to criminal objects and corruption in the countries. Nearly 60% or more poor live in human world and Asia dominates in this most.

Thursday, October 24, 2019

Girl Number 20

The 19th century witnessed the beginning of queen Victoria’s reign, the industrial revolution, realism as literary movement and realistic novels among other. When we refer to realistic novels, we are not talking about novels being a â€Å"reality† but instead we refer to the creation of fictional stories and characters that are very much like real life people and situations. In other words, authors wrote their novels to critize social unfairness, poverty, struggles, health issues and so forth, as a way to reflect the â€Å"truth† just as it was, and it all was possible because their stories and characters were believable.Charles Dickens was one of the most influential writers of the time, his novel â€Å"Hard Times†, as the rest of his works, is vivid examples of what realistic novels would be like. He portrays his judgement towards society in a very comprehensible and even entertaining way, providing the reader an idea of the time and era he was living in . Furthermore, he lets readers identify with the situation and characters of the story, reflecting through the narrator his social perspectives of the time.Regarding the novel Hard Times, there are several issues and characters we could point out, such as progress, social limitations, poverty, development, educational patterns of the time, Mr. Bounderby, Mr. Gradgrind, Louisa, Tom, Cecilia Jupe (Sissy), Mr. Harthouse, Stephen Blackpool among others. However, the one we identified the most with, was â€Å"Girl Number 20† or Cecilia Jupe (Sissy). Through out the whole story, Dickens shows her as an innocent, unprotected an abandoned child, but at the same time she becomes one of the most important and influential characters of the story.In addition, the author redefines, in a way, the role women had at the time, by giving Sissy the power to be herself and the power to do whatever she thought was right. In order to present Cecilia Jupe as the heroine of the story, we will have t o consider her background, being it, the cornerstone of the principles she will use for the rest of her life. Having mentioned this, we will begin by referring to the way Dickens gave form to Sissy’s childhood. A motherless child, who was raised by her loving and strange father. Even though her ather was a sad and a depressed man, Sissy discovered how to please him by being more than a daughter, a caring friend; the author showed it in this quote: And you were his comfort through everything? ’She nodded, with the tears rolling down her face. ‘I hope so, and father said I was. It was because he grew so scared and trembling, and because he felt himself to be a poor, weak, ignorant, helpless man (those used to be his words), that he wanted me so much to know a great deal and be different from him. I used to read to him to cheer his courage, and he was very fond of that. p. 51) This is one of the reasons for us to give Sissy the heroical part in the story, though she made simple gestures, she made her father happy no matter what situation he was going through. It is easy to understand Sissy’s fairytale life, due to all the elements that surrounded her during her childhood: Her mother a dancer, her father a clown, her readings, most of them fantastic, but nourishing at the same time for both of them, here is one of the moments where she expressed her testimony: â€Å"Your mother? ’ ‘Father says she was quite a scholar. She died when I was born.She was;’ Sissy made the terrible communication nervously; ‘she was a dancer†¦ †Father’s a;’ Sissy whispered the awful word; ‘a clown. ’ ‘To make the people laugh? ’ said Louisa, with a nod of intelligence. ‘Yes. But they wouldn’t laugh sometimes, and then father cried†Ã¢â‚¬ ¦Ã¢â‚¬  I used to read to him to cheer his courage, and he was very fond of that. They were wrong books- I am never to speak of th em here- but we didn’t know there was any harm in them. ’ ‘And he liked them? ’ said Louisa, with her searching gaze on Sissy all this time. ‘O very much! They kept him, many times, from what did him real harm.And often and often of a night, he used to forget all his troubles in wondering whether the Sultan would let the lady go on with the story, or would have her head cut off before it was finished. † (Pp. 50-51) Nevertheless, all the elements shown above were used by Dickens as tools in order for us to understand even more Sissy’s personality and character, highlighting her creativity and optimism when facing difficult times. Dickens shows us that her creative, optimistic and attentive attitude was not only present when she was around her father but also through out the rest of her life, even so, most people did not see it as a rilliant attitude; instead they labeled her as an uneducated, an abstract and an unintelligent person. Howev er, the author uses this attitude to demonstrate that life is not only made out of facts but also of reality, logic and common sense. This situation is well illustrated in the following quote: ‘Girl number twenty,’ said the gentleman, smiling in the calm strength of knowledge. Sissy blushed, and stood up. ‘So you would carpet your room- or your husband’s room, if you were a grown woman, and had a husband- with representations of flowers, would you,’ said the gentleman. Why would you? ’ ‘If you please, sir, I am very fond of flowers,’ returned the girl. ‘And is that why you would put tables and chairs upon them, and have people walking over them with heavy boots? ’ ‘It wouldn’t hurt them, sir. They wouldn’t crush and wither if you please, sir.They would be the pictures of what was very pretty and pleasant, and I would fancy-’ ‘Ay, ay, ay! But you mustn’t fancy,’ cried the gentleman, quite elated by coming so happily to his point. ‘That’s it! You are never to fancy. ’ ‘You are not, Cecilia Jupe,’ Thomas Gradgrind solemnly repeated, ‘to do anything of that kind. ‘Fact, fact, fact! ’ said the gentleman. And ‘Fact, fact, fact! ’ repeated Thomas Gradgrind. ‘You are to be in all things regulated and governed,’ said the gentleman, ‘by fact. † (p. 10) Through this lines Dickens was trying to show how reasonable Sissy was in comparison to other characters, she knew that flowers were just an image that people could delight in and not just a simple definition. In addition, there is another important aspect of Sissy’s life which we find interesting to note: her social awareness. A good example to prove this is the following quote: â€Å"†¦ But today, for instance, Mr M’Choakumchild was explaining to us about Natural Prosperity. ’ ‘National, I think it must have been,’ observed Louisa. ‘Yes, it was. – But isn’t it the same? ’ she timidly asked. ‘You had better say, National, as he said so,’ returned Louisa, with her dry reserve. ‘National Prosperity. And he said, Now, this schoolroom is a Nation. And in this nation, there are fifty millions of money. Isn’t this a prosperous nation? Girl number twenty, isn’t this a prosperous nation, and a’n’t you in a thriving state? ’ ‘What did you say? ’ asked Louisa. ‘Miss Louisa, I said I didn’t know.I thought I couldn’t know whether it was a prosperous nation or not, and whether I was in a thriving state or not, unless I knew who had got the money, and whether any of it was mine. But that had nothing to do with it. It was not in the figures at all,’ said Sissy, wiping her eyes†¦. † (p. 48) Through this quote, Dickens gave us a fantastic explanat ion of his thoughts on the economy of the time through Sissy’s opinion; in other words, he was emphasizing his ideal economical pattern for society: everyone having an equal amount of richness in order to be a prosperous nation.One of the remarkable things about Sissy is that throughout the whole story, Dickens presents her as a unique girl with many exceptional traits, for instance, her loyalty and perseverance towards her father’s return, her compassion and attentive spirit towards the Gradgrind family, her respect for others’ opinions and the one thing that make her the heroine of the story: her outstanding personality. Nevertheless, there are several times when the author mentions that just like any human being, Sissy doubted herself and at the same time wished to be someone else (Louisa).Dickens expressed it clearly on this extract: ‘It would be a fine thing to be you, Miss Louisa! ’ she said, one night, when Louisa had endeavored to make her p erplexities for next day something clearer to her. ‘Do you think so? ’ ‘I should know so much, Miss Louisa. All that is difficult to me now, would be so easy then’†Ã¢â‚¬ ¦ ‘Have I always hated you so much? ’ ‘I hope not, for I have always loved you, and have always wished that you should know it. But you changed to me a little, shortly before you left home.Not that I wondered at it. You knew so much, and I knew so little, and it was so natural in many ways, going as you were among other friends, that I had nothing to complain of, and was not at all hurt. † (Pp. 48, 182-183) At the same time, letting aside her desires to be like someone else, Cecilia did not let such a thing bring her down, instead she stood up and defended her territory and her â€Å"own†, becoming courageous enough to confront and to send away Louisa’s suitor who stood against everything that was right.The following quote reflects it: ‘Mr Harthouse,’ returned Sissy, with a blending of gentleness and steadiness that quite defeated him, and with a simple confidence in his being bound to do what she required, that held him at a singular disadvantage, ‘the only reparation that remains with you, is to leave here immediately and finally. I am quite sure that you can mitigate in no other way the wrong and harm you have done.I am quite sure that it is the only compensation you have left it in your power to make. I do not say that it is much, or that it is enough; but it is something, and it is necessary. Therefore, though without any other authority than I have given you, and even without the knowledge of any other person than yourself and myself, I ask you to depart from this place tonight, under an obligation never to return to it. † (Pp. 188-189).Nonetheless, this was not the only an unselfish and brave act she performed; the previous action triggered the beginning of Sissy Jupe as the care-taker and th e protector of the Gradgrind family that even the father came to a place where he recognized Cecilia’s help, not only towards him but also towards his wife and son; he finally accepted the fact that without Sissy’s presence they would have succumbed. In the following quote Dickens proves that at last â€Å"Girl Number 20†, the least expected to have the solution to all of the Gradgrind’s problems, became the moral and the grand victor of the story after all. Sissy has effected it, father. ’ He raised his eyes to where she stood, like a good fairy in his house, and said in a tone of softened gratitude and grateful kindness, ‘It is always you, my child! † (p. 222) Lastly, as the story ends our heroine is all we expected her to be, starting by being a great and faithful daughter, a help in time of need for those who surrounded her, and last but not least a good wife, a happy mother and a wonderful friend to her â€Å"humbler fellow-creatu res†.But, happy Sissy’s happy children loving her; all children loving her; she, grown learned in childish lore; thinking no innocent and pretty fancy ever to be despised; trying hard to know her humbler fellow-creatures, and to beautify their lives of machinery and reality with those imaginative graces and delights, without which the heart of infancy will wither up, the sturdiest physical manhood will be morally stark death, and the plainest national prosperity figures can show, will be the Writing on the Wall,- she holding this course as part of no fantastic vow, or bond, or brotherhood, or sisterhood, or pledge, or covenant, or fancy dress, or fancy fair; but simply as a duty to be done,- did Louisa see these things of herself? † (p. 238) As a conclusion, we dare to say that Dickens was the realist novelist far excellence; throughout the whole novel he expressed his criticism in a very audible voice, illustrating his thoughts and opinions on several social conc erns of his time. Additionally, he created a story and characters that were believable due to their resemblance with the real world; he made the reader understand that he was not making the situations up, but he was showing real common life.Nevertheless, it seems as if Dickens broke the pattern with Cecilia Jupe, when giving her the heroic part of the story and at the same time made her as an example of genuineness, boldness and bravery, even when her humble background, her eccentric education and all those things made her the contrary of what a Victorian Lady should be like. All situations she went through were against the idea of her being the heroine of the story, but ironically, Dickens chose her as if taking her from another world and inserting her into Victorian times, in order to make his point clear, which was: the role of the woman in a society like his. References: Dickens, C. (1854). Hard Times. London, England: Editorial Matter.

Wednesday, October 23, 2019

How Has Computer Hacking Interfered Modern Society Essay

How has computing machine choping inferred modern society? In this transition I will be speaking briefly about the basicss of computing machine choping from the yesteryear to the present. Computer hacking has changed more over clip ensuing in computing machine outgrowths to corporate system closures. This research paper will be speaking about three major parts of computing machine hacking. The first construct of hacking is the beginning of creative activity. The following portion will be how hacking has affect on the contemporary society. Finally. the last piece of information will be traveling over the hereafter of system choping. What is a drudge you may inquire your ego but non hold an reply or one word phrase for the term? A drudge has ever been a sort of cutoff or alteration. a manner to short-circuit or make over the standard operation of an object or system. The first computing machine hackers emerge at MIT. They borrow their name from a term to depict members of a theoretical account train group at the school who hack the electric trains. paths. and switches to do them execute faster and otherwise. A few of the members transfer their wonder and set uping accomplishments to the new mainframe calculating systems being studied and developed on campus. Choping groups begin to organize. Among the first are Legion of Doom in the United States. and Chaos Computer Club in Germany. The film â€Å"War Games† introduces the populace to choping. A computing machine hacker intends to destroy concerns executing an act much more unprincipled than an enthusiastic life scientist ‘hacking’ off at work or theory. The truth is that computing machine hacking is in fact easy in the general sense. but more consideration must be given. Some facets of choping are used in mundane life and you may non cognize that accessing wireless cyberspace from another person’s history is considered wireless choping even though your adoption there connexion. During the 1970’s. a different sort of hacker appeared: the phreaks or phone hackers. They learned ways to chop the telephonic system and do phone calls for free. Within these group of people. a phreaker became celebrated because a simple find. John Draper. besides known as Captain Crunch. found that he could do long distance calls with a whistling. He built a blue box that could make this and the Esquire magazine published an article on how to construct them. Fascinated by this find. two childs. Steve Wozniak and Steve Jobs. decided to sell these bluish boxes. get downing a concern friendly relationship which resulted in the initiation of Apple. By the 1980’s. phreaks started to migrate to computing machines. and the first Bulletin Board Systems ( BBS ) appeared. BBS are like the yokel groups of today. were people posted messages on any sort of subject. The BBS used by hackers specialized in tips on how to interrupt into computing machines. how to utilize stolen recognition card Numberss and portion stolen computing machine watchwords. It wasn’t until 1986 that the U. S. authorities realized the danger that hackers represented to the national security. As a manner to antagonize this threat. the Congress passed the Computer Fraud and Abuse Act. doing computing machine interrupting a offense across the state. During the 1990’s. when the usage of the cyberspace became widespread around the universe. hackers multiplied. but it wasn’t until the terminal of the decennary that system’s security became mainstream among the populace. Today. we are accustomed to hackers. crackers. viruses. Trojans. worms and all of the techniques we need to follow to battle them. Hackers were classified into three unusual types the first class is called In-house hacker. In-house hacker is an employee who is responsible for operating and keeping the system. who interacts instantly with the system as a coder or informations entry employee and is cognizant of all the system security capablenesss and spreads. He and should be the guard of the system but for different motives he hacks the system and gets what he needs bewraying all the trust given to him. The 2nd type is called ace hacker who doesn’t interact with the system but at the same clip proctors the system on day-to-day footing and has an oculus on what is traveling on and what type of informations is entered at what clip so depending on the entries he decides the minute he should acquire these information and recover them for personal motives while the 3rd type is called professional hacker and this hacker is really strong and capable of acquiring any type of informations. he has the ability of carrying the user or the operator to supply him with the needed information by programming fast ones or user friendly screens and this sort of hackers frequently gets alone preparation specially when being used in military undertakings as what happened in the cold war. Thesiss are merely brief ways hackers have impacted the modern universe we all live in. Within the past twelvemonth at that place have been two major instances right in the country. Both involve extended harm. and both are presently in tribunal. The closest instance is that of Thomas Crandall. otherwise known as St. Elmo’s Fire. Crandall is accused of estroying attending and subject records in a computing machine at Central Technical and Vocational Center. Police charge that Crandall used a personal computing machine at his place to entree the computing machine. He is besides accused of making $ 25. 000 in harm to files at Waste Management Inc. of Oakbrook. Ill. Crandall’s lawyer claims that many other pupils besides had entree to the computing machine. and that to individual out Crandall in unjust. Hackers are responsible of the immense development in computing machine and cyberspace engineering. but these yearss we consider them as stealers and interlopers who penetra ted our ain privateness and used the accomplishments they were buttockss for their ain benefit. Hackers have different sentiments and motives. However. they all portion the spirit of challenge and ever seeking to turn out their capablenesss of making what all believe is impossible possibly because they were mistreated. or uncertainties surrounded their abilities and past accomplishments. Hackers believe that information should be shared and they fight against information owning. Effectss that choping caused and still doing to the society can’t be ignored. Hacking nowadays is taking new stages and the danger is increasing because we are now populating in a society that runs by ICT. and any onslaught to the ICT particularly in advanced states will do critical effects. ICT still lacks a powerful security tools that are capable of tracking. catching hackers. and protecting computing machine systems from their onslaughts. My ain position is that the best manner to protect ICT from hackers is to analyze their psychological science and seek to understand their manner of thought. because hackers are human existences. who have two sides ; evil and good. and they used to demo their good side but all of a sudden they turned to be evil. The grounds which caused the transmutation from good to evil persons should be studied and given the highest precedence in the war against hackers because since we put our custodies on the cause. we can repair it to make for better effects. Peoples can grocery store. earn grades. receive bank statements and pay measures from their laptop or Personal computer. The possibilities are endless when it comes to simplifying life with the aid of the World Wide Web. but at the same clip possibilities are eternal hackers to perplex your life with cyber offenses. The Merriam-Webster Dictionary defines a hacker as both â€Å"an expert at programming and work outing jobs with a computer† and â€Å"a individual who illicitly additions entree to and sometimes tamping bars with information in a computing machine system. † Those three grounds I have stated above were the hackings past present and future. Until engineering Michigans turning the possibility of hackers is limited less.

Tuesday, October 22, 2019

Viewpoints of Horatio and Claudius essays

Viewpoints of Horatio and Claudius essays At the end of Hamlet, Horatio is asked to tell Hamlets story to the world. This purpose of this study is to explore the topic of viewpoint in literature. There are two sides to every story. Horatio is Hamlets friend and Claudius is Hamlets mortal enemy. The following will explore the differences and similarities in viewpoint between Horatio and Claudius in the retelling of the events that took place in Hamlet. Horatio is a faithful friend of Hamlet. There is only one time when Horatio questions Hamlets judgment, when Hamlet confides in the fates of Rosencrantz and Guildenstern. Horatio supports Hamlets rash decisions throughout the play. Therefore, Horatios story would undoubtedly be one of exaltation and praise. It would highlight the good qualities and may intentionally, or unintentionally leave out the less savory aspects of Hamlets life. His story of Hamlet would portray him as a hero and victim of an evil plot. On the other hand, the story of Claudius could be considered to the be exact opposite. Claudius would be likely to portray Hamlet as a sinister villain. He would be likely to downplay the good points and to highlight the bad points. Both Claudius and Horatio would be likely to present an account that is similar to their own views of Hamlet. Horatios loyalties to Hamlet undermine his own sense of self. In the end, Horatio would rather impale himself on his own sword than to live on after Hamlets death. Horatio would not be able to see Claudius as anything but a villain. Horatio would never believe Claudius account and would be likely to be angered by it. Claudius would see Horatios account as jaded. Claudius would dismiss Horatios story as not seeing the situation in its entirety. Horatios account would have no credibility for Claudius. Claudius is more socially adept than Horatio. He has a genuine charm that tends to overshadow ...

Monday, October 21, 2019

Parthenon in Athens

Parthenon in Athens Parthenon was an ancient place of worship that was built in 438BCE on the acropolis of Athens by Phidias, who was a renowned sculpture. It was built as a dwelling place for the goddess known as Athena who was perceived to be the administrator of Athens.Advertising We will write a custom essay sample on Parthenon in Athens specifically for you for only $16.05 $11/page Learn More Although the state of its structure has deteriorated there are still remains of what it used to be such as columns and roofing. It is easy to spot the temple in acropolis because it was built on a higher ground. The temple was later damaged during the battles that took place between Greece and her enemies. Whitley explains that the temple was used as a place of worship by ancient inhabitants of Athens. This was evidenced by the marbles that were collected from the temple soon after the battles were over (35). Among the most important artifacts of the temple included the sculpture of t he goddess Athena which had a very unique finish because it was composed of ivory. The statue was later stolen by a roman emperor who took it with him to modern Istanbul but after a few years it was damaged during numerous battles that were experienced between the Roman Empire and her enemies that were aimed at forcing her neighbors to convert to Christianity. In the years that followed acropolis was invaded by Ottoman who later used the temple as an Islamic place of worship and also as a store for keeping weapons. In September 1687 a shell busted which made the entire roof to cave in .The intensity of its smash up was so deep such that it could not be rebuilt. The damage of the temple made some people to steal the artifacts that used to be housed in the temple. The early visitors to Athens included the ambassador of Britain who requested the Athens authorities to allow him to gather the artifacts of the temple. The ambassador assembled artifacts from the scene of the temple’ s destruction and also bought some from the locals of Athens and later moved them to his country where they were and still are exhibited in the museum of London. To this date Greece still insists that those artifacts should be returned to her but this has not gone down well with London because it does not wish to comply with the orders from Greece. The art in this temple reflects on the culture of Greece which is based on conflicting ideologies that are presented evenly. They include principles of light and darkness among many others.Advertising Looking for essay on art and design? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Neils, the columns of the temple appear to be bending at the middle perhaps due to the stress exerted by the roof. They are well spaced from each other to allow the light to penetrate (63). Different points of view illustrate the evenness between light and darkness. There are no straight lines i n the structure of the temple because the entire lines look distorted. The temple is used to display the skills of ancient artists in the ancient days. The finishing of the temple is rough because one can still see the marks that the masons chisel made as he tried to dress the stones to create a uniform shape. The temple could have lasted longer were it not for the battles and the changes in climate that has led to erosion of its surface. The walls of this temple look so bare but one can not tell whether its plaster was eroded by weather or was simply was not there. The columns of this temple appear to have been erected on the stylobate. The columns are of the same length and they tend to protrude outwards to shield the verandah from rain water. The construction of Parthenon is said to have taken the longest duration due to the time taken to avail the building materials because they were not within close proximity to the temple hence more time was spent in ferrying the materials. Ac tually the decorations that are seen on its walls were done much later after the construction of the temple had been fully completed The panes of this temple were chiseled in high relief which was common in a majority of such buildings during ancient days. They were perfectly mounted onto the outside of the walls and they were used as decorations as well as mediums of illustrating the confrontations that took place among the gods. The temple also served as a bank because there was a designated room that was meant for storing money. Frieze was used to decorate the exterior walls of the temple and also illustrate the rituals that were practiced by the ancient inhabitants of Greece. The east panel employs sculptures that illustrate how the goddess of Athens came into existence. The panels indicate that Athena was fathered by another god called Zeus. Athena is said to have been conceived in the head of his father Zeus and when his time was due for delivery he experienced a sharp headach e on his head. He therefore instructed other gods to hit his head which caused his head to disintegrate and Athena was extracted from his head during this process.Advertising We will write a custom essay sample on Parthenon in Athens specifically for you for only $16.05 $11/page Learn More The western panels illustrate the struggle for supremacy that revolved around Athena and Poseidon because each of them wanted to be recognized. The panels are no longer present because they were eroded by weather. Neils, Jennifer. The Parthenon: From Antiquity to the Present. Ed. Cambridge: Cambridge University Press, 2005. Print. Whitley, James. â€Å"The Archaeology of Democracy: Classical Athens.† The Archaeological of Ancient Greece. Cambridge: Cambridge University Press, 2001. Print.

Sunday, October 20, 2019

Words Drawn from Trahere

Words Drawn from Trahere Words Drawn from â€Å"Trahere† Words Drawn from â€Å"Trahere† By Mark Nichol The Latin verb trahere is the source of an assortment of words pertaining to drawing or to drawing or pulling out. This post lists and defines the English descendant tract and terms formed from that root word; a follow-up post will discuss trahere’s disguised offspring. Most words in the trahere family are based on tract, which itself refers to an area of land (hence â€Å"tract home† to refer to a dwelling that is part of a housing development) or to a bundle of related nerve fibers or an anatomical system, as well as, less commonly, a period of time. (Tract also refers to a political or religious pamphlet.) A tractor is a vehicle that pulls. (A tractor that pulls cargo containers is sometimes called a semitractor, or a semi.) Traction is the act of, or the force exerted in, pulling, or a force that causes a moving object to resist movement, or, figuratively, support necessary to achieve progress. Words that combine a prefix with tract include abstract (literally, â€Å"draw from), which as an adjective means â€Å"disassociated,† â€Å"formal,† â€Å"impersonal† or â€Å"theoretical† and as a noun means â€Å"summary of a document.† Abstraction is the quality of exhibiting one of these states, or the act or state of summarization. Meanwhile, to attract is to literally or figurative draw toward; attraction is the associated force or quality, and something that attracts is an attractor. Contract (literally, â€Å"draw with†) means â€Å"enter into an agreement†; â€Å"be affected by† or â€Å"incur†; or â€Å"physically shorten,† â€Å"restrict,† or â€Å"wrinkle.† (Contraction is the act or condition of being restricted or shortened.) As an adjective, the word pertains to being hired for a task rather than as an employee; one who works under these conditions is a contractor (not a contractee), and a contractor may hire assistants or specialists as subcontractors. The adjective contractual refers to an agreement, but something that can be contracted is contractible, and the capacity to be contracted is contractability. In the euphemistic slang of organized crime, to put out a contract on someone is to hire someone to kill someone else. One who detracts takes away, and the act is detraction. That word generally refers to an instance of belittling or disparagement, and the actor is a detractor. Distrahere, meaning â€Å"draw in different directions,† is the parent word of the verb distract and the noun distraction, as well as distraught, an adjective originally meaning â€Å"deranged† or â€Å"mad† but now most often pertaining to emotional distress. Extract means to take out, and an extract is something taken out; such an action is an extraction. To protract (â€Å"draw forward†) is to continue or extend; the word is not employed as a noun, but a protractor is one who protracts or a muscle that does so, as well as a mathematical tool for drawing and measuring angles. (Protracted serves as an adjective.) To retract, by contrast, is to draw back in, or to disavow or withdraw a claim or other statement, including an offer or a promise. An act of retracting is a retraction. Meanwhile, to subtract is to take away, especially in the mathematical sense, and subtraction is the act of taking away. A subtrahend is a number subtracted by another. (The other is called a minuend; that word, related to minor and minute, is from the Latin verb minuere, meaning â€Å"lessen.†) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Vocabulary category, check our popular posts, or choose a related post below:Comparative Forms of Adjectives"Replacement for" and "replacement of"10 Tips to Improve Your Writing Skills

Saturday, October 19, 2019

American History - 11 Essay Example | Topics and Well Written Essays - 1750 words

American History - 11 - Essay Example †¢ Served as the secretary of the Montgomery chapter of the NAACP. †¢ On 1st December, 1955, Parks, seated in the ‘black section’ at the back of the bus, refused to give up her seat to a white person †¢ Arrested by the police and fined for violating the segregation law. †¢ Volunteered to let the NAACP use her as a test case to oppose segregation on buses. †¢ Was immediately sacked from her tailoring job with Montgomery Fair. †¢ Became the symbol of the successful Montgomery Bus Boycott and the Civil Rights Movement. †¢ Founded the  Rosa and Raymond Parks Institute for Self-Development in 1987. †¢ Died on 24th October, 2005. 2. ____Martin Luther King, Jr.______ †¢   Baptist minister, preeminent civil-rights activist and orator par excellence. †¢ Born on January 15, 1929 in Atlanta, Georgia. †¢ Married Coretta Scott in June 1953 and had four children, Yolanda, Martin Luther King III, Dexter Scott, and Bernice. â₠¬ ¢ Elected to lead the successful Montgomery bus boycott in December 1955. †¢ Co-founded the Southern Christian Leadership Conference in January 1957 †¢ Inspired by Mahatma Gandhi, led several non-violent protests to promote civil rights reform. †¢ Led the 1960 â€Å"sit-in† movement in Greensboro and the1963 demonstration in downtown Birmingham. †¢ Led the historic March on Washington on August 28, 1963, which drew more than 200,000 people to the Lincoln Memorial and made his famous â€Å"I Have a Dream† speech. †¢ Instrumental in the passage of the Civil Rights Act of 1964 and the Voting Rights Act of 1965. Received the Nobel Peace Prize for 1964. Assassinated by  James Earl Ray in Memphis on April 4, 1968 3. ____Malcolm X_____ †¢ Civil Rights Activist,  nationalist leader and charismatic spokesman for the Nation of Islam †¢ Born Malcolm Little in May 19, 1925 in Omaha, Nebraska.   †¢ Father’s civil rights activis m led to his harassment and murder by white supremacists. †¢ Dropped out of school at 15 and turned to crime and drugs to finance his extravagant lifestyle †¢ Arrested on charges of larceny and sentenced to ten years in jail in 1946 †¢ Converted to the Nation of Islam and changed his surname to â€Å"X† – a tribute to the unknown name of his African ancestors. †¢ Urged any means, including violence, to fight racism and establish an independent state for black Americans †¢ Married Betty Sanders, a fellow member of the Nation of Islam, in 1958. †¢ Broke away from the Nation of Islam in 1964, converted to traditional Islam, changed name to El-Hajj Malik El-Shabazz and considered prospects for peaceful resolution to racism. †¢ Assassinated on February 21, 1965, in Manhattan, at the age of 39,  by members of the Nation of Islam.   4. __The Fair Deal________ †¢ Name given to Truman’s domestic program set out in his 1949 Stat e of the Union speech. †¢ Proposed federal initiatives to solve economic and social problems in post-war America. †¢ Envisaged the redistribution of income among all classes. †¢ New civil rights legislation †¢ Federal housing programs †¢ Unemployment insurance benefits †¢ New tax cuts for the poor †¢ Federal funding for education †¢ A federal health care and health insurance program. †¢ Failed as it was blocked by the conservative political coalition   5. ___ Brown vs Board of Education of Topeka ____ †¢ Acknowledged to be one of the greatest US Supreme Court decisions of the 20th century. †¢ Plessy v. Ferguson  (1896) legalized separate but equal school systems for blacks and whites. †¢

Legal implications of adverse utilization review determinations by Essay

Legal implications of adverse utilization review determinations by health insurance companies - Essay Example Adverse utilization review determination is an important consideration in health related issues for the people of the United States of America.Health insurance companies of America deal this issue and help people obtaining their health insurance benefits..It is necessary to add that adverse determination of medical necessity is experimental or investigational in nature. The necessity of health insurance companies as well as the adverse utilization review by them is getting momentum position in the recent days."The Department of Insurance (Department) is required to establish and maintain a process for annual certification of independent review organizations and to maintain a list of certified independent review organizations to be used by HMOs.""The insurance department has certified a number of Independent Review Organizations to conduct the reviews. Again, the department has also filed a proposed interim rule regarding external review which was supposed to be effective immediately (Rogers, 2000)ii".States have undertaken efforts to frame legislative instruments and give them into effect with a view to affording people the benefits of health insurance. The state of Indiana has established and long been maintaining an external grievance procedure for resolving the resolution of grievances regarding adverse utilization review determinations. In 2000, the New Hampshire legislature passed a legislation empowering the establishment of an independent external consumer appeal process to review adverse utilization review determinations which are supposed to.... are needed to be clarified. It will also help in drawing a better assessment on this intended paper. Final adverse determination indicates the meaning that an adverse determination has been upheld by a utilization review agent in regard to the issue of a health care service following a standard appeal, or corresponds to a matter where section 4904 of the insurance law is applicable. More categorically speaking, Adverse determination means a sort of determination by health carrier or its designee utilization review entity which meant a requested admission, availability of care, continuous stay or other health care service, as well as supply of drugs which is covered under the terms of the covered person's health benefit plan. Utilization review includes a set of formal techniques designed to monitor the use of or evaluate the clinical necessity, its effectiveness, health care services, health care procedures etc. Material affiliation means where there is a substantial relationship bet ween physician-patient relationships, partnership relationship or employment relationship. Clinical peer reviewer includes the persons who have deserving competences to conduct their activities in medical profession or equal to those of carriers of health care services. Retrospective adverse utilization means the consideration of the claim of health service when the medical treatment has already been taken and whether the treatment should be on continuous stay. Medical Necessity Undeniably, as the companies as well as the HMOs pay claims based upon the concept of The insurance companies consider the claims if people attempt to get pre-certification where a proposed health treatment is to be taken by the patients or insurer of

Friday, October 18, 2019

Breast cancer Term Paper Example | Topics and Well Written Essays - 1250 words

Breast cancer - Term Paper Example luding family history, genetics, age of menstruation, and other  factors that have not yet been identified.  Though much less common, breast cancer also occurs in men.   Breast cancer patients usually experience a lot of stress and frustration due to reasons like the unpredictability of the disease, uncertainty of the future and financial difficulties (Lynn & Charles, 25). It is even more difficult for patients who have to go out of remission and face the medical complications over and over again. I know this because my mom had had cancer about 12 years ago and when she recently heard the news about her cancer’s return, she was hurt, tensed and devastated about it. Other effects of breast cancer include troubled sleep, body aches, headaches, pain, fatigue and anxiety. Moreover, many cancer patients including my mom worry about their physical appearance after extensive treatment procedures like chemotherapy, mastectomy and skin changes from radiation therapy and find it extremely difficult to make public experiences (Lynn & Charles, 25). But that certainly does not mean that patients cannot deal with it. By taking one step at a time and by the support of her friends and family, my mother is trying to deal with her situation. She prefers to keep herself still busy in work so that her mind remains occupied and tension – free. Almost 200,000 women suffer from the disease each year. Although there are many external factors contributing towards the spread of breast cancer, current investigations have revealed that genetic inheritance has a major part to play in almost five to ten percent of these cases (Lynch, 91-98). This knowledge, an ingenious finding by Mary-Claire King in 1990, linked breast cancer to the long-arm of chromosome 17 (Biesecker, 22-27). Since the discovery of possible genetic linkage, doctors have been able to delineate those individuals who are most prone to the disorder, and immediately, these women begin to act in accordance with doctor’s

Cost Reduction and Management of an Organization Essay

Cost Reduction and Management of an Organization - Essay Example Today, cost reduction as well as management happens to be the most essential thing for any organization. An organized endeavor which is intended to analyze the systems, practices, procedures, products and specifications for satisfaction of necessary functions at lowest possible cost of ownership is to be designed. This integrated effort is to be taken keeping the expected performance, quality, reliability as well as maintainability is mind. Cost reduction is not only essential, but also possible. Organizations increasingly are focusing on having models that can enable them to achieve this target. There are also software vendors who have understood the importance of this and have designed solutions catering to this need of companies looking at cost reduction by several techniques like Activity based costing and application of value analysis and value engineering. A case in point is the product of IBM, which is industry leading solution called Telecom Pass 4.0 for telecommunication industry featuring cost management and cost reduction techniques Value analysis is a tool for improvement of cost as well as processes making an use of information about the processes of business and based on examination of different attributes of the processes for identifying areas of improvement. This is an organized method which focuses on the function of each process, service or material that adds value to the organization and there by attempts to define the correct cost, quality and parameters of acceptance in the determination of value so as to be able to redesign or reengineer a particular function. It is a structured and critical analytical process which determines the value of each rupee spent by finding out which are the most essential functions at the most economic cost thereby bringing out the value for money. Value analysis (alternately called as value engineering) happens to be a cost validation exercise that identifies required processes without affecting the quality of output resulting in lower costs. The application of value engineering comprises of the following activities: Identifying the existing activities and processes Finding out activities that can be eliminated Analyzing the cost. Performing a cost benefits analysis. Making a forecast of expenditure flows. Evaluation of alternative designs. Redesigning the process Maintaining quality Undertaking feasibility Studies. Giving an advise on cost planning Giving an advice on cost limits and preparing budgets. Advising on cash flow forecasting. Activity Based Costing (ABC) It is a methodology applied for calculation of cost of the business by having a focus on the actual cost of the activities carried out for having an estimate of the actual cost of service or the product. It takes into consideration the conversion of cash based accounting system into accrual systems, defining the cost centers as well as cost allocation. Cost centers include products and services. Apart from this it also includes particular and detailed tasks in under each broad activity. Defining of cost centers varies with different kinds of businesses, but what is essential is that each and every activity and resources is identified. After identification of cost centers, the study of activities of each cost centre as

Thursday, October 17, 2019

The Crusades and their effect on Europe specifically England Research Paper

The Crusades and their effect on Europe specifically England - Research Paper Example In this crusade, Christian warriors were urged to move into Palestine and free Jerusalem from Muslims Turks (Hallam 17-19; Crawford 1). The attack against the Muslim caliphates of the Near East was successful, and marked the onset of other subsequent crusades. However, for the subsequent crusades were not all victorious. Some ended up in defeats while others ended in compromises (The Christian Broadcasting Network 1) The Crusaders, who settled first in Palestine, underwent numerous challenges. They were in hostile territory i.e. surrounded by unified Islamic forces that were constantly seeking means of eliminating them. They lacked proper means of nominating or electing a widely accepted leader, and had no clear guidance on how to coexist after the victory. Thus, they lived in small factions rather than a unified entity (Butler 1). Most of the Christian crusades were as consequence of joint operation under the popes’ instruction. Even though in Europe most of the crusaders were mainly from England France and Germany, other European Christian localities also availed crusaders whenever the pope gave a directive for a crusade (World History Center 1). As consequence, the crusades’ effects were nearly uniform across ‘Christian Europe’. Crusades and visits to Palestine, Egypt and the Arab world was not just a mere expedition in which people went and fought but where people learnt various aspects of the Islamic World and incorporated them in their culture The crusaders in Palestine had adopted the locals’ way of dressing and housing architecture(Crawford 1). The dressing style and housing structures were the same as those of the Muslims. It was common to find â€Å"harems with veiled women wearing makeup† and Muslims neighbors praying in Christian chapels (Dutch 1). As consequence, there was a huge cultural gap between the crusaders in the holy land and those who lived

Reflective for personal worldview Assignment Example | Topics and Well Written Essays - 250 words

Reflective for personal worldview - Assignment Example The world remains subjective to human beings, hence, the need for human to always have an objective in life. It is also evident that human beings are controlled by what most of them consider being inexorable laws. This keeps humans on toes to always know that each of their deeds have an effect which could be either ruin or make them. This can easily be related to the Biblical views of many individuals in the world. Yes, I am able to perceive different world views in family, friends, acquaintances and most importantly, fellow students both in my country and Canada. All these different individuals have different views on the seven basic questions that Sire uses to explore his views on the book, The Universe Next Door. Sire’s categories fit especially into my personal experiences and critically others individuals too. The world view attempts to infiltrate the main Christian beliefs and even go to the extent of opposing Biblical worldview. This has continuously created war between the hearts and minds of the humans. Lack of self awareness of the media, friends and family has contributed greatly to the different

Wednesday, October 16, 2019

The Crusades and their effect on Europe specifically England Research Paper

The Crusades and their effect on Europe specifically England - Research Paper Example In this crusade, Christian warriors were urged to move into Palestine and free Jerusalem from Muslims Turks (Hallam 17-19; Crawford 1). The attack against the Muslim caliphates of the Near East was successful, and marked the onset of other subsequent crusades. However, for the subsequent crusades were not all victorious. Some ended up in defeats while others ended in compromises (The Christian Broadcasting Network 1) The Crusaders, who settled first in Palestine, underwent numerous challenges. They were in hostile territory i.e. surrounded by unified Islamic forces that were constantly seeking means of eliminating them. They lacked proper means of nominating or electing a widely accepted leader, and had no clear guidance on how to coexist after the victory. Thus, they lived in small factions rather than a unified entity (Butler 1). Most of the Christian crusades were as consequence of joint operation under the popes’ instruction. Even though in Europe most of the crusaders were mainly from England France and Germany, other European Christian localities also availed crusaders whenever the pope gave a directive for a crusade (World History Center 1). As consequence, the crusades’ effects were nearly uniform across ‘Christian Europe’. Crusades and visits to Palestine, Egypt and the Arab world was not just a mere expedition in which people went and fought but where people learnt various aspects of the Islamic World and incorporated them in their culture The crusaders in Palestine had adopted the locals’ way of dressing and housing architecture(Crawford 1). The dressing style and housing structures were the same as those of the Muslims. It was common to find â€Å"harems with veiled women wearing makeup† and Muslims neighbors praying in Christian chapels (Dutch 1). As consequence, there was a huge cultural gap between the crusaders in the holy land and those who lived

Tuesday, October 15, 2019

The Voting Rights Act of 1965 Essay Example | Topics and Well Written Essays - 1250 words

The Voting Rights Act of 1965 - Essay Example The National Voting Rights Act of 1965 outlawed the would - be voters in the United States take literacy tests to qualify to register to vote, and it provided for to vote, and it provided for federal registration of voters in areas that had less than 50% of eligible minority voters registered. The Act also provided for Department of Justice oversight to registration, and the Department's approval for any change in voting law in districts that had used as a "device" to limit voting and in which less than 50% of the population was registered to vote in 1964. It was signed in 1965, and signed for a 25 year extension by George W. Bush on July, 2006. National Association for the Advancement of Colored people (NAACP) was founded in New York in 1909 for the purpose to improve the living condition of Black Americans at that time. Although their conditions improved enormously, many differences existed in the rights of United States citizens because of ethnic origin; The NAACP continued to seek a single class of citizenship for every American. W.E.B. Du Bois an American writer in 1895 argued that "blacks should accept their social status and work to improve their lives through economic means". The association also secured the elimination of the so- called "grandfather clause", a clause in the voting laws of certain Southern States that permitted only those people to vote whose grandfathers had voted. Because the grandfathers of blacks had been slaves so could not vote, this clause effectively denied enfranchisement to blacks. With the help of organized labour and by various minority groups, civic, and fraternal organizations, the NAACP went on to lead the efforts that resulted in the enactment of the Civil Rights of 1957 and 1964, the voting Rights Act of 1965, and Fair Housing Act of 1968. W.E. Bois says in his magazine, "to stand for the rights of men, irrespective of colour or race, for the highest ideals of American democracy, and for reasonable but earnest and persistent attempts to gain these rights and realize these ideals."* *The Crisis, a magazine founded in 1910 by the American writer and sociologist W.E. Du Bois In 1948 Gerald R. Ford was elected to the US House of Representatives. During his tenure he favored increasing the defense budget, and he usually voted for civil rights legislation. In 1965 he was elected minority leader of the House of Representatives. Among the practices that have been the objects of electoral reforms are actual or threatened physical violence; concealed pressures such as those exercised by some

Monday, October 14, 2019

Geomorphological processes in Kuwait Essay Example for Free

Geomorphological processes in Kuwait Essay The basic question of geomorphology is â€Å"why do landscapes look the way they do? † As a study of landforms, geomorphology seeks to understand the history and dynamics of landforms development. The landforms change constantly due to physical and chemic interaction between the Earth’s surface and the environment, including influences by geological processes, climate, vegetation, atmospheric processes, erosion by sea waves. In recent years the activities of man took a place of one of the basic factors influencing geomorphology. In this paper some of the geomorphological processes shall be studied using an example of Kuwait. The final purpose of the paper is to gain general understanding of geomorphological processes taking place in Kuwait and thusly obtain knowledge about the nature of geomorphological processes as they are. First and foremost it is necessary to give a definition of geomorphological process and provide their classification in order to understand what should be considered to be a geomorphological process, and what should not. Rhodes Fabridge in his â€Å"Encyclopedia of Geomorphology† speaks of it as of a science of a scenery and describes geomorphological process as processes contributing to geomorphological changes. They are classified into: 1. Erosional processes, causing erosion of earth materials, including deflation, karst, piping and washing; 2. Fluvial processes caused by behavior of rivers, including braiding and channel processes; 3. Mass movement processes – a movement of surface materials due to gravity, including snow avalanches, slow mass movement and rapid mass movement ; Periglacial and deglacial processes are also part of natural geomorphological processes, but they shall not be described, because neither of them takes place in Kuwait. However, there is another important group of processes affecting geomorphology – processes caused by human activity. They can result from willful desire to change the landscape, such as drifting or dismantling hills, building dams and artificial islands and they can be accessory result of some other activity, which is often undesirable and harmful. After a brief overview of geomorphologhical processes, we shall now apply this knowledge to Kuwait. In terms of geomorphology the territory of Kuwait is a flat sandy desert gradually slopping to the sea, with the lowest point of zero above the sea level and the highest point of 306 above the sea level (the location is unnamed) . This landscape is broken by the ridge at Jal Al-Zor – a series of low hills and shallow depressions. The highest point of the ridge is 145 meters above the sea level. The ridge is cut into two by Umm Al-Ramam Wadi. The southern part of Kuwait is flat with exception of Ahmadi hill (137 m) . Eolian processes in Kuwait Eolian processes are those geomorphological processes, which are caused by wind, including some types of erosional processes. For a desert country the eolian processes are most natural. They can be observed throughout the desert, especially on the south of Kuwait, where winds and sandstorms form the so-called sabkhas – irregular closed lowland areas. Two different types of Sabkhas are recognized: costal sabkhas and inland sabkhas. The costal ones are situated mostly in the Al-Jailaiaha and Al-Khiran areas, being extended along a costal depression. Inland sabkhas are situated in the desert areas of Al-Maqwa, Urafjan, and Al-Gurain. On the Kuwait’s west both types of sabkhas are subjected to erosional changes after sandstorms when they may be entirely filled with sand and disappear, and new sabkhas may appear. Often sabkhas are movable and change their location after storms . Sabkhas in Kuwait are often surrounded by dunes – another geomorphological form created by eolian processes. Dunes appear when wind transports sand to a particular spot of the landscape, carving out sand from the sabkhas. By their nature dunes are depositional landforms up to 25 meters high. There exist two types of dunes in Kuwait – desert dunes and costal dunes. Desert dunes are in turn classified into: 1. Barchans crescent-shaped dunes enlonged in the wind-direction with points (wings) curved downwind creating a slip-face; 2. Barchanoid Ridges – several barchans tied together similarly to a mountain ridge; 3. Transverses – long irregular dunes that form right angles to wind direction and have long slip-face; 4. Parabolic dunes crescent-shaped dunes with long axis repeating a dominant wind direction 5. Star Dunes – a large mount of sand with several sinuously radiating ridges from a central peak of sand; 6. Dome – round or elliptic dune with no slip-faces. Coastal dunes are similar to desert ones, but they are formed by strong winds blowing from the sea, often covered with vegetation. The rocky ridges in the deserts of Kuwait are also subjected to another type of eolian processes, namely wind erosion. Winds blowing over the rocks create areas of desert pavements around them – places covered with fragments of rock left after the wind has blown away the fine particles. On the top those areas are covered with desert varnish exposing to the surface. By blowing away soft rock fragment wind forms deflation basins, or minor depressions on the rocky surface. Where the rocks consisted of soft formations with dikes composed of hard rocks the wind blows the soft rocks away leaving freakish sculptured landforms called yardangs . Yardangs are not numerous in Kuwait and exist mostly in a form of low irregular pillars or peaked low crests . Additionally, rocks are affected by temperature extremes, which can be pretty high – a temperature can change for up to 30o C in one day and up to 50o C within a year. Combined with rains such extremes gradually ruin even the firmest grounds. Coastal processes in Kuwait Kuwait is washed by waters of Persian Gulf. In the centre of the country it’s coast bends forming the Gulf of Kuwait, where the capital of the country lays. The The coast of Kuwait is divided into nine geomorphological potions, out of which four are lie along the northern muddy shoreline and five in the southern sandy area. The northern part includes large portions of bays, which are filled with water during high tides and for most of the time they are areas of muddy ground. They are limited by costal sabkhas or sandy drifts. Intertidal channels form sandbars near the waterlines . At the coast the geomorphologic processes are represented by a combination of wind and waves influences. Washing processes result lead to formation of low sandy barriers along coasts, which mark the breaker line. Those barriers are made of sand partials brought by waves and are additionally affected by wind. In the northern portion of Kuwait’s shores piping processes lead to washing away soft rocks and formation of intertidal channels, tying together the sea and large portions of bays, which are filled with water during high tides and being muddy ground of the timed . In contrast to this, due to a different character of grounds, the southern portion of Kuwait’s coat is known with steep sandy beaches, narrowed by wide rocky intertidal platforms, covered with sand and other sediments, washed ashore by waves. In many places those rocky surfaces are dissected by intertidal channels and shallow gulleys. The low water line is marked by numerous sandbars. Sometimes they are formed in berms by waves . Costal dunes are often covered with vegetation binding sand together and preventing dunes from distruction. Karst processes in Kuwait Depths of Kuwait are characterized by intensive karst processes. Limestone geological formations, especially in the places where they lay close to surface, collect water from rains and other sediments like dew and this water erodes limestone forming cavities and pore spaces filled with water. Such processes are vital for Kuwait’s economy, because the country depends on them for water. In 1960 a large aquifer has been discovered in the western portion of Ar Rawdatayn geological formation, which is now used for distilled water production, covering most of the country’s needs. On the south from the city of Kuwait another water field has been discovered in the top of the limestone of the Ash Shuaybah. The water here is salty, so it is used mostly for agricultural and commercial needs. . Unfortunately, the Gulf war caused notable harm to Kuwaiti water supplies in the limestone depths. Exploding almost 700 oil wells caused oil to spill over the desert and in the rocks creating lakes of oil, which were estimated to contain 15 times more oil, than it has been spilled to the Gulf. Large amounts of oil particles are still detected in the sandy and rocky soils of Kuwait . Another effect of the war was partial destruction of the shoreline by oily spots and burning oil. The vegetation in the coastal areas suffered greatly, and this resulted in ruination of costal dunes and sabkhas. Some of the intertidal channels, especially in the northern part of the country, were littered with oil partials and do not let water pass any longer, causing drying up of minor costal bays and lakes . Works cited: 1. Rhodes Whitmore Fairbridge. Encyclopedia of Geomorphology, New York: Van Nostrand Reinhold, 1968 2. A. Al-Hurban , and I.Gharib, â€Å"Geomorphological and sedimentological characteristics of coastal and inland sabkhas, Southern Kuwait†, Journal of Arid Environments Volume 58, Issue 1, July 2004, Pages 59-85 3. Selby, M. J. Earths Changing Surface. Oxford: Oxford University Press, 1995 4. Mohamed I. El-Sayed and Dhia Al-Bakri, â€Å"Geomorphology and sedimentary/biosedimentary structures of the intertidal environment along the coast of Kuwait, north-western Arabian Gulf†. International Journal of Earth Sciences. Volume 83, Number 2 / July, 1994 5. Francesca Davis Dipiazza. Kuwait in Pictures, Twenty-First Century Books, 2006 6. J. Al-Sulaimi , M. N. Viswanathan and F. Szekely. â€Å"Effect of oil pollution on fresh groundwater in Kuwait†. Environmental Geology, Volume 22, Number 3 / November, 1993, p. -246-256 7. 2007 CIA WORLD FACTBOOK. Kuwait (CD-ROM), Progressive Management, 2006 8. Geomorphological processes. Published by Ministry of Environment of British Columbia. Available at: http://ilmbwww. gov. bc. ca/risc/pubs/teecolo/terclass/geo. htm#anchor800962 (October 19, 2007) 9. The Environment and the 1991 Persian Gulf War available at: http://countrystudies. us/saudi-arabia/17. htm (October 19, 2007)

Sunday, October 13, 2019

Prevalence of Hepatitis B Among Medical Students

Prevalence of Hepatitis B Among Medical Students The prevalence of Hepatitis B among `medical students, Majmaah University, Kingdom of Saudi Arabia ABSTRACT Background: Medical students in the course of their clinical work are at risk of acquiring hepatitis B virus (HBV) infection or transmitting it to their patients. HBV immunization for medical students in Saudi Arabia is recommended but not strictly enforced. It is important to assess the prevalence of HBV infection in medical students in order to direct interventions and inform policy. The objectives of this study were to determine the prevalence of hepatitis B among the medical students of Majmaah University; secondly to determine the relation of hepatitis B and the social factors; and thirdly to compare the relation of hepatitis B in different collages. Methods: This was a cross-sectional study carried out in 478 students of medical, dentistry and applied medical students in Majmaah University. Total enumeration of all students was done. A structured questionnaire was used to collect demographic data. The selected students underwent a blood test to detect HBsAg. SPSS version 20 was applied for data analysis for (frequency, mean and stan ­dard deviation). Comparisons between groups were made using the Fisher Exact test. P Results: The results showed that out of the 478 students tested, two were positive for HBsAg, giving an overall prevalence rate of 0.41%. The prevalence of hepatitis B among males and females was o.6% and 0.0% respectively. It was shown that one of the positive cases was in the college of Medicine and the other was in the college of Medical laboratories. Conclusion: The prevalence of hepatitis B among medical students of Majmaah University is low. The disease, which was reported among the males only, was found in the colleges of Medicine and Medical Laboratories. INTRODUCTION Approximately 350 million people are infected by Hepatitis B virus (HBV) globally. A large number become positive for hepatitis B surface antigen (HBsà ¢Ã¢â€š ¬Ã¢â‚¬  Ag) but they remain asymptomatic. They are known as silent carriers of HBV [1, 2] and may act as a source of transmission of hepatitis B. In high and moderate prevalence zones of HBV, like South Asia and the Middle East, many silent carriers are young people [3, 4]. The prevalence of HBV has declined considerably in Saudi Arabia since the introduction of immunization in 1989. According to one study, it fell from 7% in 1989 to 0.3% in 1997 [4]. A study 8 years after the introduction of hepatitis B vaccination reported seroconversion of 77% in children vaccinated at birth and 71% in those vaccinated at school entry [5]. Jaber reported in 2006 [6] that 98% of schoolchildren in Jeddah, Saudi Arabia were covered by HBV vaccination; however 14% of students tested negative for anti-HBs antibodies, suggesting that the efficacy of HBV vaccination is diminishing with increasing age [6]. It has been reported that the prevalence of HBV among blood donors in Saudi Arabia decreased from 2.7% in 1993 to 0.28% in 2003 [5,6,7]. HBV immunization is now part of the national routine immunization program for children in Saudi Arabia. HBV immunization in medical students and health workers in Saudi Arabia is recommended but not strictly enforced. As a result, individuals at high risk like healthcare workers and medical students have low immunization rates. Therefore, HBV remains an occupational risk to which healthcare workers and medical students are exposed while at work [8]. Determining the prevalence of HBV infection in the medical, dentistry and applied medical students is important in planning for any intervention to control this infection among them. Furthermore, the information obtained may be used in a wider sense to create awareness among all categories of healthcare workers about the magnitude of the risk of contracting or transmitting HBV in the workplace. The objectives of this study were to determine the prevalence of hepatitis B among the medical, dentistry and applied medical students of Majmaah University and to compare the prevalence rates of hepatitis B between the students in the different collages and social factors. METHODS: This was a cross-sectional study carried out among medical, dentistry and applied medical students in Majmaah University over a period of 16 months (from May 2013 to August 2014). The study population was the students of Majmaah University from collage of Medicine, Dentistry, Nursing and Medical Laboratories. Students from all levels and both sexes were enrolled in this study. Total enumeration of 478 students was done. A structured questionnaire was used to collect demographic data. The selected students underwent a blood test to detect HBsAg. The test was conducted in King Khaled Hospital in Majmaah. The assay used is a one-step enzyme immunoassay based on the principle of the sandwich type using monoclonal antibodies and polyclonal antibodies selected for their ability to bind themselves to the various subtypes of HBs Ag, recognized by the WHO and the most part of variant HBV strains. SPSS version 20 was applied for data analysis for (frequency, mean and stan ­dard deviation). Comparisons between groups were made using the Fisher Exact. P Participation was completely voluntary and students who tested positive for HBsAg were counseled in the counseling center, King Khaled Hospital. Measures to prevent exposure and the need to get vaccinated against Hepatitis B as soon as possible was explained to them. RESULTS: There were 150 females and 328 males, giving a female to male ratio of 1:1.4. Out of the 478 students tested, 2.0 were positive for HBsAg, giving an overall prevalence rate of 0.41% as shown intable (1). Regarding age of the students the range was similar ranging from 18 to 20 years. Table (2) shows the prevalence of hepatitis B among students of different collages. It was shown that the two positive cases were in the college of Medicine and the college of Medical laboratories. Table (1) Relation between hepatitis B and gender Table (2) Hepatitis B among students of different collages Discussion: The prevalence rate of hepatitis B among the students, shown as positive HBsAg was 0.41%. Lule found the HBsAg carrier rate of 18% among medical students in Kenyatta National Hospital[9]. In Nigeria, Olubuyide found the hepatitis B as 39.0% among doctors and dentists compared to the national average of 20.0% [10]. There was no significant difference in the HBsAg carrier rates between pre-clinical and clinical students and yet the latter were more exposed to hepatitis B. Similar findings were observed by Khurana. in Maulana Azad Medical College-New Delhi, India[11]. It is possible that most of the clinical students were healthy and fought off the hepatitis B infection despite being more exposed. It is known that spontaneous recovery after acute infection with HBV occurs in 95–99% of previously healthy adults [12].It is also possible that some students might have got occult HBV infection. This could only be revealed by performing highly sensitive molecular techniques which would show persistence of HBV genomes in HBsAg negative individuals[13]. The magnitude of occult HBV infection was not assessed in the study. This rate was also lower compared with the prevalence of 1% found in less than 20 years old persons after 10 years of introduction of extended program of immunization in Saudi Ara bia [14]. The rate of hepatitis B was also higher than the prevalence among male medical students of 0.17% and higher than the prevalence among the females (0.78%) in the same study which was conducted among students of health colleges in different part of Saudi Arabia[1]. The findings of this study were within the range of prevalence from 0.03% to 0.72% among the general public in different parts of the kingdom [15]. The findings of this study showed that the two positive cases of hepatitis B were males, no positivity among females. In comparing hepatitis B with gender by applying the Fisher Exact test, the relation is not significant (p= 1.00). When seroprevalence rates of hepatitis B was compared between students from different collages in the university by applying the Fisher Exact test, the difference was not statistically significant ( p=0,340). CONCLUSION The prevalence of hepatitis B among medical, dentistry and applied medical students of Majmaah University is low. The prevalence was low among the males and not reported among the females. The disease was observed among the male students of the college of Medicine and the college of Medical Lavatories. ACKNOWLEDGEMENT The authors are very grateful to the Dean of college of Medicine, dean of college of dentistry and the dean of Applied Medical Sciences for permission and support to carry out this study. We would also like to thank the administration of Medical Services of Majmaah University and the administration of King Khalid General Hospital in Majmaah for their support. Our thanks extend to the students who kindly accepted to participate in the study. REFERENCES Al-Ajlan A. Riyadh College of Health Sciences (Men), King saud University EMHJ. 2011; 17(9): 759-762. Tong S et al. Hepatitis B virus antigen variants. International Journal of Medical Sciences. 2005; 2:2–7. Chaudhuri SK. HBsAg positivity rate among voluntary replacement donors in the IRCS blood bank. Indian Journal of Gastroenterology, 1999, 18:S21 [abstract]. FitzSimons D et al. Hepatitis B virus, hepatitis C virus and other blood-borne infections in healthcare workers: guidelines for prevention and management in industrialized countries. Occupational and Environmental Medicine. 2008; 65:446–451. Al-Faleh FZ. Changing pattern of hepatitis viral infection in Saudi Arabia in the last two decades. Annals of Saudi Medicine. 2003; 23:367–371. Shatoor AS, Zafer MH. Hepatitis B virus markers in male blood donors. Bahrain Medical Bulletin. 2002; 24:1–6. El-Hazmi MM. Prevalence of HBV, HCV, HIV-1, 2 and HTLV-I/II infections among blood donors in a teaching hospital in the Central region of Saudi Arabia. Saudi Medical Journal. 2004; 25:26–33. Prevalence of hepatitis B virus (HBV) infection among Makerere University medical students, Afr Health Sci. Jun 2005; 5(2): 93–98. Lule G N, Okoth F, Ogutu E O, Mwai S J. HBV markers (HBsAg, anti-HBc, anti-HBs) among 160 medical students at Kenyatta National Hospital.East Afr Med J.1989; 66(5):315–318.[PubMed] Olubuyide I O, Ola S O, Aliyu B, Dosumu O O, Arotiba J T, Olaleye O A, et al. Prevalence and epidemiological characteristics of hepatitis B and C infections among doctors and dentists in Nigeria.East Afr Med J.1997;74:357–361.[PubMed] Khurana V, Kar P, Mansharamani N, Jain V, Kanodia A. Differences in hepatitis B markers between clinical and pre-clinical healthcare personnel.Trop Gastroenterol.1997;18(2):69–71.[PubMed] Heathcote J, Elawaut A, Fedail S, et al., editors.Management of Acute viral hepatitis:http//www.omge.org.2003. Dec, OMGE Practice guidelines. Raimondo G, Pollicino J, Squadrito G. What is the clinical impact of occult hepatitis B virus infection?Lancet.2005;365:638–639.[PubMed] F. Aba Al-khail. Hepatitis B Al Riyadh newspaper December 2012. 155508 From: www.alriyadh.com/2010/12/09/article583595.html Madani TA. Trend in incidence of hepatitis B virus infection during a decade of universal childhood hepatitis B vaccination in Saudi Arabia.Trans R Soc Trop Med Hyg.2007;101:278–83.[PubMed]

Saturday, October 12, 2019

Japanese Americans :: essays papers

JapaneseAmericans In the early 1940’s, there was evidence of Japanese-American loyalty and innocence, but the information was not always well known. This, coupled with the factors of war hysteria led to the legal upholding of concentration camps in Korematsu v. U.S. (1944). The injustice was clouded, most immediately by the war, and indirectly by racism at home. The sneak attack on Pearl Harbor left a permanent indent on the way Americans viewed the Japanese. Indeed, it was this one act which thrust the isolationist U.S. into the middle of the world’s biggest war. The brutal attack, so close to home, was viewed as sneaky and underhanded. This, added to the fact that the Japanese were rumored to have an amazingly effective spy system on Hawaii and the West Coast, led the Japanese-Americans to become highly suspected individuals. They were even a more immediate threat than communists, since they required an eventual takeover, and Germans, since they were preoccupied by numerous enemies. In addition, the Japanese-Americans were concentrated on the Western Coast and could thus organize better. There is also the chasm of culture; ignorance is the key to racism, and the average American knew very little of the lifestyle and customs of the Far East. Thi s led to more suspicion. There were also facts going against the Japanese-Americans. According to the Munson Report, 98% of Japanese-Americans were loyal to the U.S. This is an impressive number; however, in times of war, 2% sabotaging on mainland America was a major threat. A more startling fact that tarnished the Japanese-American reputation was the fact that Japan was rumored to have an extremely effective spy system on the West Coast. There were even some conspiracy theorists that rationalized that the sneaky Japanese were merely waiting for the right time to strike, as they did at Pearl Harbor. The people were scared of the Japanese, and in a democracy, the people have a voice. The Japanese-Americans also had a decent reputation in general, but people were too occupied with the war to worry about it. 112,000 Japanese-Americans—60% of which were U.S. citizens born on U.S. soil—were sent off to concentration camps. There were Japanese loyally fighting in the American army. They even went quietly to the concentration camps, having faith in the American system. But, who cared about the numbers then? We were at war with the Japanese, and the Japanese-Americans were a threat. Japanese Americans :: essays papers JapaneseAmericans In the early 1940’s, there was evidence of Japanese-American loyalty and innocence, but the information was not always well known. This, coupled with the factors of war hysteria led to the legal upholding of concentration camps in Korematsu v. U.S. (1944). The injustice was clouded, most immediately by the war, and indirectly by racism at home. The sneak attack on Pearl Harbor left a permanent indent on the way Americans viewed the Japanese. Indeed, it was this one act which thrust the isolationist U.S. into the middle of the world’s biggest war. The brutal attack, so close to home, was viewed as sneaky and underhanded. This, added to the fact that the Japanese were rumored to have an amazingly effective spy system on Hawaii and the West Coast, led the Japanese-Americans to become highly suspected individuals. They were even a more immediate threat than communists, since they required an eventual takeover, and Germans, since they were preoccupied by numerous enemies. In addition, the Japanese-Americans were concentrated on the Western Coast and could thus organize better. There is also the chasm of culture; ignorance is the key to racism, and the average American knew very little of the lifestyle and customs of the Far East. Thi s led to more suspicion. There were also facts going against the Japanese-Americans. According to the Munson Report, 98% of Japanese-Americans were loyal to the U.S. This is an impressive number; however, in times of war, 2% sabotaging on mainland America was a major threat. A more startling fact that tarnished the Japanese-American reputation was the fact that Japan was rumored to have an extremely effective spy system on the West Coast. There were even some conspiracy theorists that rationalized that the sneaky Japanese were merely waiting for the right time to strike, as they did at Pearl Harbor. The people were scared of the Japanese, and in a democracy, the people have a voice. The Japanese-Americans also had a decent reputation in general, but people were too occupied with the war to worry about it. 112,000 Japanese-Americans—60% of which were U.S. citizens born on U.S. soil—were sent off to concentration camps. There were Japanese loyally fighting in the American army. They even went quietly to the concentration camps, having faith in the American system. But, who cared about the numbers then? We were at war with the Japanese, and the Japanese-Americans were a threat.

Friday, October 11, 2019

Water Supply Project Brief

Contents Table of Contents†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 1 Task†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 2 List of Abbreviations†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢ € ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 3 TASK2 1. 1Project Title4 1. 2Introduction4 1. 3Project Location Map5 1. Terms of Reference6 1. 4. 1Project Details6 1. 4. 2Reporting Structure6 1. 4. 3Personnel Duties7 1. 5Schematic Layout7 2. 1DELIVERABLES8 2. 1. 1Dam8 2. 1. 2Water Treatment Works9 2. 1. 3Elevated Steel Tank10 2. 1. 4Water Transmission10 2. 1. 5Metering11 3. 1Project Management Process12 3. 1. 1Initiating12 3. 1. 2Planning12 3. 1. 3Executing13 3. 1. 4Controlling14 3. 1. 5Closing14 List of references†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 16 List of AnnexureAnnexure 1 – Project Budget Annexure 2 – Work Breakdown Structure Annexure 3 – Project Network Diagram Annexure 4 – Project Gantt Chart Annexure 5 – Project Summary TASK You are a consultant of a firm that has won a tender to develop a turnkey water project in Kajiado County. Using necessary tools including Ms Project prepare a WBS, and do a schedule of project tasks, their resources and assume a tracking of the project progress. Hence do a status report in a PDF file. The completed work should not exceed 20. LIST OF ABBREVIATIONS WBS- Work Breakdown StructureWARMA – Water Resource Management Authority NEMA – National Environmental Management Authority ToR – Terms of Reference GI – Galvanized Iron RCC – Reinforced Cement Concrete 1. 1Project Title Proposed Water Supply Project in Kajiado Town 1. 2Introduction A project is one-time, multitask job with a definite starting point, definite ending point, clearly defined scope of work, a budget and usually a temporary team. A project is therefore a series of activities which are meant to achieve particular goals or objectives using specifi ed resources and in a specified period of time.A turnkey project refers to a project that is built and handed over ready for use. The proposed water project in Kajiado County being a turnkey project will entail the consultant to take up construction from the initial stages of the project and hand it over when water has been connected to individual residents and/or users. Kajiado town lies at the intersection of the Nairobi – Kajiado road along the A 104 highway, and the railway line that serves Magadi Soda Company in Magadi. The town is situated 80 KM South of Nairobi. It is the administration centre for Kajiado County.Kajiado Town has a mean annual rainfall ranging from 450mm to 900mm. The major rivers found in Kajiado are among others Athi River, Ewaso Ngiro South River, Olekejuado River, Nool-Turesh River, Esokota River. The project involves construction of a dam along Olekejuado River, a water treatment plant, an elevated tank, a generator room, water transmission and dis tribution lines and water meter chambers. The presenter intends to use tools of Project Management Information Systems including MS Project 2010 software in achieving the implementation framework.The paper will be guided by Project Management processes of Initiating, Planning, Executing, Controlling and Closing to achieve set deliverables of the proposed project. 1. 3Project Location Map Figure1 – Map of Kajiado County 1. 4Terms of Reference This contractual document outlines the terms and conditions for the contracted project team. The process of initiating a project starts when the Client contacts the Contractor either with an already drawn ‘Terms of Reference' or with intent for a joint process in drawing the Terms of Reference. 1. 4. 1Project DetailsEmployerMinistry of Water and Irrigation Funding agencyGovernment of Kenya (Development Vote) EngineerGeneral Manager (Design & Construction) ConsultantsKiama Consortium Limited Contract No. MOWI/001/2011-2012 Contract A rea20 Square Kilometres Water Meters2000 Residents Contract Value (USD)USD 2,000,000 Capacity Required2,000,000 Litres/day ContractorPentacon Limited Award Date2 December 2012 Commencement Date1 January 2013 Completion Date4 October 2015 Project Duration2 Years 1. 4. 2Reporting Structure 1. 4. 3Personnel Duties The following will be the Key personnel for the project: Project Manager – Overall supervision of the project ?Financial Controller – Financial supervision ?Human Resource Officer – staff recruitment ?Procurement Officer – acquisition of resources (material) Monthly and Quarterly reports will be submitted to the client. The monthly report shall be submitted by the 5th of every month while quarterly report shall be submitted after every three months of the project duration. 1. 5Schematic Layout 2. 1DELIVERABLES Deliverables are the end results or outputs of undertaking a project. They may include reports, manuals, actual working systems or actual pr oducts.In this project deliverables include a dam, a water treatment plant, an elevated water tank, water distribution mains and water meters. 2. 1. 1 Dam ?Diversion of River The dam is designed to hold 10,000, 000 liters of water at its full capacity. The dimensions shall be 100m x 100m x 2m. During the construction of the dam, River Olkejuado will be temporarily blocked up stream and water diverted until the dam construction is completed. ?Intake Chamber The intake will be constructed and an allowance velocity of 0. 45m/s will be provided that will direct water to the pumping station. ?Spill WayThe spill way will allow water to overflow in case the dam fills up excessively. ?Embankment An embankment will also be constructed to safeguard the walls of the dam from failing. Reinforced Cement Concrete retaining wall works will be done as an embankment to safeguard and strengthen the dam walls. ?Pump House A pump house shall be constructed to provide for a stand by generator to cater f or 50% of the maximum pumping capacity and incase of power failure. It should also be noted that a generator can work for a maximum of 16 hours a day, therefore that should be considered in case of a total power failure in case of electrical faults. . 1. 2Water Treatment Works The assumption is, the water being harvested contains 50 – 50, 000 coli form count, a figure that requires water to undergo full treatment before consumption. ?Coagulation Tank This is the first tank, where water is chemically coagulated by adding alum and soda ash. The tank contains flocculation chambers. The water passes through baffles so that it can mix up well with the chemicals. ?Sedimentation Tank The sedimentation process will be aided by addition of alum in the coagulation tank. The baffles help the formation and in turn settle finer particles such as silt and colloids.The sedimentation tanks designed as upward hydraulic velocity and downward settling velocity enable sludge concentration. The d esign flow rate is proposed at 222m3/hr and the surface loading rate velocity is proposed at 1. 5m3/m2/hr. The allowed detention time is 3 – 4 hours. ?Rapid Sand Filter The proposed rapid gravity filters are back washed with air and water. The design flow rate is recommended at 222m3/hr and a filtration rate of 5m3/m2/hr. The storage time is about 10 – 20 minutes. ?Disinfection Tank pH correction will be done by adding soda ash.It could be due to dissolved carbon dioxide (CO2) or excess amount of alum was added into the water during the coagulation process. Disinfection of the water will be necessary to lower health risk and infection with water borne diseases. In that case, Calcium Hypochlorite will be added to the water as per the calculated quantity depending on the volume. ? Reinforced concrete storage tank After water has been successfully disinfected, it will be pumped to the storage tank and allowed for chemical reaction for about 30 minutes before it is pumped to the elevated water tank ready for distribution. . 1. 3Elevated Steel Tank The elevated water tank is dependent on the highest level in the region. This also allows for water flow by gravity therefore, there will savings of electricity and fuel cost that might have been used for pumping water. 2. 1. 4 Water Transmission ?Transmission Main Galvanized iron (GI) pipes of 250mm diameter are preferred since they withstand high water pressures. The pipe velocity is set at 2. 0 m/s and set at a depth n. e. 1000mm deep below the ground level. Reflux valves are allowed at a distance of 3-4 km spacing to ease repair and maintenance. ?Distribution MainThe minimum diameter of pipes recommended is 100mm diameter. uPVC pipes shall be used and the maximum 60m and minimum pressure of 10m. The pipe velocity is set at 06 – 1. 0 m/s, and service valves are set every 1km for ease of inspection, repair and maintenance. 2. 1. 5Metering Meters are installed in all 2000 houses or users to monitor water consumption. This will also helps in billing as per the actual amount of water consumed. The Meters will assist in curbing vandalism of water. 3. 1Project Management Process Project management is the process of initiating, planning, executing, controlling and closing a project.The project goal is the desired outcome it should be short and simple yet clearly communicate scope, time frame and budget. To achieve the goal of supplying water to 2000 users in Kajiado county, the management process outlined above will be adhered to. 3. 1. 1 Initiating It involves recognizing that a project should begin and committing to do it. Feasibility concerning technical, financial, operational, legal, environmental and social aspects of the project shall be carried out. Using MS Project 2010 the project start and finish date were identified. Legal issues such as NEMA and WARMA licensing were identified and dealt with accordingly.Approval of the project by the County council was also sought. The start date was 1st January 2013 while the expected completion date is 4th October 2013. The budget for the project was also drawn; it is envisaged that the project will cost Ksh. 179,445,100 (USD 2,000,000) This is shown in annexure 1 of this paper. 3. 1. 2Planning Initially, the project scope was defined and the appropriate methods for completing the project were determined. Following this step, the durations for the various tasks necessary to complete the work were listed and grouped into a work breakdown structure; this is attached in annexure 2.The logical dependencies between tasks were defined using an activity network diagram as shown in annexture 3 that enables identification of the critical path. Float or slack time in the schedule can be calculated. Then the necessary resources were estimated and costs for each activity allocated to each resource, giving the total project cost. At this stage, the project schedule was optimized to achieve the appropriate balance between re source usage and project duration to comply with the project objectives. Once established and agreed, the project schedule became the baseline schedule.Progress will be measured against the baseline schedule throughout the life of the project. Planning Involves devising a workable scheme of a schedule of tasks and resources. In the planning process, the project activities were identified and entered in the Gantt Chart. Timelines for the activities were drawn and subdivisions identified, milestones were also noted. Restrictions and relationships of predecessor and successor activities were also considered. Resources were then assigned to the tasks identified. The Gantt chart is shown in annexure 4 of this paper. ?AssumptionsWhen planning for this project, a few assumptions were made. They include the following: i. Land for the development of the dam and excavation of trenches for pipes’ distribution is already procured by the Olkejuado County Council. ii. River Olkejuado is a temporary river and the dam is being excavated during the dry season. The river does not, therefor, need diversion but, only blocking. iii. The electrical work cater for all the structures iv. Each tank will have a booster pump. v. All hired machines and equipment comes fully with operators vi. The shilling is exchanging at the dollar rate of 90 Ksh. ii. The dollar sign in the budget represents Kenya Shillings. 3. 1. 3Executing This phase will involve carrying out the scheduled plan while coordinating the people and resources to achieve the project goal. It will also involve reporting on a monthly and quarterly basis as stated in the ToR. Reporting will involve progress, resource usage, achieved milestones and challenges encountered if any. Milestones and Critical Path are shown in annexure 5. Creating project records and presentations will also be done at this stage. Adherence to the drawn out plan will be key to achieve the desired results. henever necessary, changes will be reque sted and improvements recommended. 3. 1. 4Controlling It ensures that the project remains within the objectives, tracking performance and taking necessary corrective measures. During this phase, achieved progress is compared to the scheduled progress and any slippage is noted. Tracking for activities especially at the preliminary stage of the project has been assumed. The tracking Gantt Chart has been observed to give progress in percentage. Corrective measure suggested in case of slippage is crashing of the project activities.Crashing will involve identifying activities with float and slack times and interrogating the resource allocation and dependencies therein. (24 hour days in shifts) Though it may imply increase in project cost, it may be the only way to ensure timely finishing of the project. Ensuring timely procurement of materials and hiring of equipment whenever required is also key in controlling the project. Effects of weather changes will also need to be taken into consi deration. 3. 1. 5Closing It involves formalizing the acceptance of the project and bringing it to an orderly end.Users are trained and handover of the project is conducted together with necessary documentation which aid in support and maintenance in future. The project audit and commissioning has been scheduled for the last month of the project duration as indicated on the Gantt chart shown in annexure 4. This being a turnkey project, cut-off handover is proposed. List of References www. imestopedia. com/terms/r/risk. asp en. wikipedia. org/wiki/Risk breakdown – freecover. blogpost. com www. mastery-project-management. com/project closure,html Uher, T. (2003) Programming and Scheduling Techniques, UNSW Press, Sydney