Saturday, August 31, 2019

Iris Van Herpen Exhibition Utrecht

The New Craftsmanship Iris van Herpen? and her Inspiration â€Å"With my work I intend to show that fashion can certainly have an added value to the world† In the Centraal Museum of Utrecht, Netherlands, renowned fashion designer/artist Iris van Herpen (1984) exhibits a highly personal side of her work for the public from 29 June until 9 October 2011. By contrasting her designs with what worked as the inspiration behind them, van Herpen’s futuristic approach to fashion is displayed with art dating back to the sixteenth to the nineteenth century creating an unusual opposition in the general mood of the show.In addition to a contrast between old and new, one will also find work by other contemporary artists that have inspired van Herpen or collaborated with her. These include artists such as American-born sculptor Kris Kuksi; Dutch choreographer Nanine Linning; hat designers Stephen Jones and Irene Bussemaker; Dutch artist Bart Hess who shares van Herpen’s futurist ic approach in his work; and architect Daniel Widrig whose main influence in the show was with 3D printing. Upon entering the exhibition one enters a calm space with soft music playing in the background.Looking up towards the high raised ceiling you can see Nanine Linning’s opera inspired performance piece with van Herpen’s extravagant costumes and haute couture creations in larger than life projections on the bare white walls. Below these displays one would find the original costumes as seen in the performance. Referring back to the contrast between old and new, or rather ancient and innovative, it was interesting to note which of van Herpen’s designs were paired up with what ancient artefact and why.Leaving the theatricality of Linning behind, the show carries you away from the modernity of projectors through to a series of antique items including a bookshelf, chairs and tables as well as paintings by the popular Parisian painter Pierre Joseph Sauvage and an e xpensive silk wall panel from Lyon in France. These were shown next to one of van Herpen’s more ‘wearable’ garments, a dress, which could be assumed to be made of fabric containing metal threads, having been concentinaed to create a voluminous shape reminiscent of coral reefs. Similar to the layout of the exhibition, VanHerpen’s approach to fashion stems from the interaction between handmade, an old-fashioned method of construction, and innovation, through constant pursuit of new techniques and materials. One of van Herpen’s most recently discovered techniques is a form of rapid prototyping called 3D printing. This technology came into use in 2003 mainly for duplicating valuable artefacts for museums. Cleverly, through collaboration with architect Daniel Widrig, van Herpen uses this technology to create what looks like sculpted dresses or headgear, once again reminiscent of the shape of coral reefs or some sorts of skeletal forms.This side of van He rpen’s collection was shown alongside work of goldsmiths form the seventeenth-century. This juxtapose truly emphasized the origins of the inspiration for her designs. There was an apparent connection between the auricular styled crockery, plates, crowns etc. and her laser sintering technique. With further regard to the 3D printing technique, the designer herself believes, â€Å"it is a matter a time before we can print the clothing we wear today†.It is truly inspiring to see an artist of such a young age produce something that has the prospects of having a massive impact on the industry itself and, well, everything really. If we can produce our clothing with 3D printing technology, maybe we can also produce furniture through the same process, or even houses, maybe even bridges and buildings. Just imagine! As for the overall impression of the exhibition itself; the concept and story behind it was thoughtful and interesting, the layout was appealing, and the work itself was beautiful and innovative.

Friday, August 30, 2019

Different kinds of short story Essay

As there are varieties of subjects, themes and art, there are various types of a short story. Some of the types are ancient tales, humor, satire, fantasy, biography, education, local color, and history. Lets us have a glimpse on each one of them in this article. 1. Ancient Tales It is the power of the utilization of the ancient form of the tale in the modern short story. Italian writer Giovanni Verga’s The She-Wolf (1880), and Chinese writer Yeh Shao-Chun’s Mrs. Li’s Hair are remarkable examples. 2. Fantasy Fantasy stories are nothing but the fair combination of the old tales tradition and the supernatural details. The fine examples of such stories are British writer John Collier’s horror fantasy Bottle Party (1939), Irish author Elizabeth Bowen’s The Demon Lover (1941), and British author Saki’s Tobermory (1911). 3. Humor These types of stories are meant for producing surprise and delight. You will see that the most famous humorous tales and fables were written by the Americans. Mark Twain’s The Celebrated Jumping Frog of Calaveras County (1865), and Joel Chandler Harris’s The Wonderful Tar-Baby Story (1894) are remarkable. There is serious humor in the works of Americans like Eudora Welty’s Petrified Man (1939) and Dorothy Parker’s The Custard Heart (1939). 4. Satire The main purpose of satire is to attack the evils of society. There are writers who wrote stories of sober satire. Austrian author Arthur Schnitzler’s Fate of the Baron (1923), and American Mary McCarthy’s The Man in the Brooks Brothers Shirt (1941) are known for their somber satire. 5. Education Story Such stories revolve around the education of the main character. The good example is American educator Lionel Trilling’s Of This Time, of That Place (1944). 6. History History types deal with a life story or historical event. Welty’s A Still Moment (a 1943 story about naturalist John James Audubon) is fine example of story dealing with history event. 7. Local Color These types of stories deal with the customs and traditions of rural and small-town life. You can enjoy the local color in the stories of George Washington Cable, Maria Edgeworth, Sarah Orne Jewett, and Mary Wilkins Freeman. These are some of the types you may find in sort story genre. In recent times, stories have more local color, diversities in the representations, making use of dialects, and vernacular impressions. The story writes have been taking somewhat flexibility in writing stories as they wish.

Thursday, August 29, 2019

Estimating multiple regression model; GCC countries Statistics Project

Estimating multiple regression model; GCC countries - Statistics Project Example The assignment will conduct a multiple regression analysis using the data from observations for a period from 1999 – 2012. The multiple regression analysis is a technique of statistics that is used to develop a linear model for predicting the unknown value of a variable from known or assumed values of independent variables. In this case, the model Y = ∠« (Xa, Xb); where Y = GDP per capita, Xa = FDI, and Xb = Export is represented by the equation Y = b0 + b1Xa + b2Xb. The task of the multiple regression analysis is to determine the values of parameters a, b1, and b2. In order to it, the assignment collected data for Xa, Xb, and Y for years from 1999 – 2002. Table 1 presents data set; values will be used for regression analysis. The sample data of table 1 is collected from the annual reports published by the Qatar Central Bank (â€Å"Annual Reports†, n.d.) and Index Mundi (â€Å"GDP†, n.d,; â€Å"Exports†, n.d)). The set represent values of three variables collected from 14 observations. These values will be used to find a regression line that best fits the data illustrated in Table 1. The regression coefficients of variables as well the intercept of the regression equation are calculated using Excel functions. The parameter calculation method does not consider the noise in regression analysis. This study does not conduct sample data distribution phenomenon; however, it does conduct a study of Goodness of fit of the model. The given data are used to conduct descriptive and inferential analyses. Descriptive coefficients characterizes the data set; the concept represents the central tendency and dispersion of data taken from observations. Inferential analysis, in this case, describes the behavior and authentication of the model through hypothesis testing of regression parameters. Descriptive statistics of all three variable are evaluated using Excel built in function; they are presented in Table 2.

Wednesday, August 28, 2019

Diffrent options Essay Example | Topics and Well Written Essays - 1500 words

Diffrent options - Essay Example In his opinion, firm strategy, structure and rivalry, factor conditions, demand conditions, related and supporting industries are the factors governments should control in order to manage the competitive power of nations. The following illustration provides a brief idea about the factors which affect the competitive power of nations. (Vision on Innovation: 2. Models on the dynamics of innovation, 2009). Michael Porter while teaching in Harvard University in the 70’s and 80’s has made lot of researches with the help of his associates formulated a frame work to assess the competitive advantages of nations which is illustrated above. Porter has introduced parameters such as clusters of companies, suppliers, related industries and institutions in particular locations as the factors which affect the competitive power of a nation in international market. This framework is known as Porter’s ‘diamond’ of National Competitive Advantage. This paper analyses th e competitive power of nations with the help of Michel Porter’s diamond model The competitive advantage of nations According to Porter (1990), â€Å"A nation’s competitiveness depends on the capacity of its industry to innovate and upgrade. Companies gain advantage against the world’s best competitors because of pressure and challenge. They benefit from having strong domestic rivals, aggressive home-based suppliers, and demanding local customers† (Porter, 1990). It is difficult for firms to survive in the market without innovation. The market is changing rapidly because of the advancements in science and technology and the arrival of new products. Competition or rivalry in the market always forces nations and firms to innovate new products. Until the beginning of 2000, Nokia was the leader in the mobile phone industry. However, Apple Inc introduced the touchscreen mobile phones at the beginning of 2000 and the leadership of Nokia in the mobile phone indus try is slowly diminishing now. Apple controlled the mobile phone industry until recently. However, Samsung captured the leadership of this industry from APPLE at present with the help of innovative smartphones such as Galaxy S2, S3 etc. In short, rivalry and ability to innovate new products determine the success and failures of companies in the market at present. No organization or country can take the leadership for granted. For example the technological dominance of America is currently challenged strongly by Asian countries such as China, Korea and India. America maintained leadership in the technology market until recent times; however, their supremacy seems to be challenged by many other countries at present. The following table provides the strengths and weakness of America as a country at present in the global market. Strategic Issues For the United States Strengths Weaknesses Innovation Science, technology, R&D Entrepreneurship Free and open competition Capital markets (curr ent uncertainty) Economic decentralization Human resources challenges Need to restructure public education Access to higher education Training Americans vs. low skilled immigration Falling U.S. leadership in international economic development U.S. influence, authority, and focus has diminished Weak transitional â€Å"Security Blanket† Retraining system Pension security Health insurance access and mobility Unnecessary cost of doing business. Burdensome regulations Litigation costs High-cost / high complexity tax system Energy inefficiency High healthcare

Tuesday, August 27, 2019

Allstate Insurance Company Social Responsibility Essay

Allstate Insurance Company Social Responsibility - Essay Example In general, the company and all its managerial including all its employees, families, and agency owners are enthusiastically involved in enhancing and bettering the living state of communities across the country. Allstate insurance’s main concern is to protect the people and be at the forefront in helping to put the people’s lives back together. In many cases, the Allstate Company runs cleanup campaigns, lends a hand to the needs of established youth groups in the country, aids in raising funds for various needy organizations, seeks to create links with other organizations, and creates awareness for valuable issues of all kinds. In the recent past for instance, the company committed itself to build yet another playground in the city of Chicago, raised funds for the Museum of Science and Industry exhibits, funded the Chicago Children’s Museum, and supported a reading program in the city. Further, Allstate Insurance is committed to sponsor other organizations where such as the Goodman Theatre, the Mexican Museum, and the Chicago Urban League among a host of other responsibilities. In pursuit to achieve its priorities of serving the community in the most and efficient way possible, Allstate Insurance Company has developed a credible criterion of investing in communities. This involves three well established and enforced ways: I. Financial Resources – this has been the key drive for Allstate Insurance Company. It involves being useful and depended on by other organization and groups. It structures itself in a way that other organization and small group can look unto the company whenever need arises. The company raises funds generously to the organizations and groups that are truly in need. It does this in the form of grants emanating from â€Å"The Allstate Foundation†, donations, and contributions from various corporate. II. Time – Allstate Insurance has put into consideration the value of time and has implemented a way of utilizing every single minute in the most effective and efficient way. They achieve this by ensuring that all employees participate actively in all activities undertaken in the company. It also makes sure that all its officers and agency owners are actively involved in all community programs, nonprofit boards, and community event such as creating relevant awareness. III. Leadership – Allstate Insurance Company has taken a step further to enhance its leadership. In doing this, the company commits itself to create a mutual relationship with other organization and joining them to address critical issues affecting the communities they serve. By so doing, the company remains up to date of even issues that could otherwise go unnoticed in the community. This also involves funding and providing support where necessary to enhance the activities. Further, Allstate has divided the communities into three groups just to enhance timely and effective operations: i. Local communities â€⠀œ this is where the company’s clients and agency owners reside and work. Moreover, agency owners and the clients invest their time and funds in the local communities as they are well protected and offer certainty. ii. Chicago Metro Area – this is due to the fact that Chicago is the hometown of Allstate Company and therefore access is almost perfect and management is enhanced. iii. National –

Monday, August 26, 2019

Popular Conceptualization of African-Americans in Sitcoms Essay

Popular Conceptualization of African-Americans in Sitcoms - Essay Example Series’ like this one show that change has to come from within the African American community before it can occur elsewhere because the community is actually damaging itself with shows like this one. This sitcom was based on Jamie King, who was a musician from Texas who moved to Los Angeles to follow his dream of becoming a musician. This basic premise was actually pretty good, as it could have been used to present King as a hardworking individual who wanted to follow his dreams. In addition, the fact that he went to work at his aunt and uncle’s hotel is a positive statement, since it shows African American business owners succeeding in life. That is where the positive interactions stop, however, as King’s interactions with Fancy are very stereotypical in a negative sense. King comes off as a womanizer who believes that treating a woman like an object is acceptable, although he does begin to realize the error of his ways as the seasons progress. Another negative stereotype that is shown in this series is the Braxton P. Hartnabrig character, who is constantly chastised for the way he acts in relation to Jamie. This is a problem because it portrays acting as a womanizing clown as being cool, while acting in a more serious manner and taking an interest in moving forward in life is seen as being uncool. Also, the fact that Jamie is attempting to break into the music industry, rather than something that calls for a higher intellect, is disturbing because it portrays the stereotype that African Americans can only be successful through music or athletics. This series also featured countless black related jokes that are meant to achieve cheap laughs while furthering certain stereotypes, which definitely could have been changed into something more positive. â€Å"The Parkers† is another show that exploits certain stereotypes in the African American community through its characters. For starters, Nikki Parker is a single mother, which perpetuates the absentee father

Sunday, August 25, 2019

Olmstead vs. United States Term Paper Example | Topics and Well Written Essays - 1000 words

Olmstead vs. United States - Term Paper Example As the conversation obtained from such wiretaps was the evidence to decide this case and other similar cases like Green, Mcinnis and several others vs. United States, individually. All convicts were convicted on the same charges based on wiretap-recorded conversation. Based on this, the defendants were charged for violating National Prohibition Act by selling or importing as well as processing illegal liquors. However, as there was no approval for the installation of wiretaps in any of such cases, the evidence based on obtaining record of conversation from such illegally installed wiretaps was debatable and under question.........................(1) Evidence was obtained from the use of private telephone conversation as disclosed by the wiretaps, illegally installed. The question was put before the court if the use of such conversation as any evidence violates the recorded party’s rights under the Fourth and Fifth amendments of the constitution. While the court had a clear answer to the above question as a plain â€Å"NO†; it laid importance on the nature of conversation and not how it was obtained. The court further ruled that since none of the defendants was illegally forced to conduct those conversations. Therefore, the court upheld that there can be no evidence of any violation of their Fifth Amendment protection against self incrimination, while maintaining that the conversations were made voluntarily throughout. Whereby the Fourth Amendment meaning refers to the search and seizure or arrest without warrant, the court ruled that in these cases no such action was present. Therefore, the court upheld that none of the evidences presented violated any rights of the defendants under the fourth amendment, as well. Moreover, there was no physical examination of any papers, any substantial, material effects or the home searches etc., involved in any of these cases. The

Scientific method experiment Essay Example | Topics and Well Written Essays - 250 words

Scientific method experiment - Essay Example 56) To establish this, the experimentalist used four samples of five gases namely; Oxygen, Hydrogen, Carbon Dioxide and Sulfur Hexafluoride. He used other tools such as four testing tubes, a top- loading balance and a syringe. The experimentalist measured a volume of 50ml of each of the gas samples. By using the syringe and the balance, the experimentalist calculated the weights of each of the 50ml-sample. He observed that although the samples were of the same size, they weighed different. The vacuum weighed 0.00g Oxygen 0.54g, Hydrogen 0.11gm , Carbon Dioxide .088g and Sulfur Hexafluoride 0 .263g (Pandey et al. 56) The explanation behind this is that heavier gas samples have larger weight than the lighter ones. The gas sample cannot have more weight in this experiment as a result of change in the volume of the samples. Therefore, the change must be linked to the mass of the particles of the gas. On plotting the molecular weights against the experimental weights, the experimentalist found out that it was a straight line. This is as a result of the correlation between the mass of the constant samples and the molecular mass. Therefore, this leads to the accepting the hypothesis that it is possible to determine the molecular mass of a sample of gas simply by measuring the constant quantity against an already determined linear relationship Pandey et al.

Saturday, August 24, 2019

Use your critical thinking skills to evaluate the article Why Does Our Essay

Use your critical thinking skills to evaluate the article Why Does Our Collective Empathy So Often Fail to Manifest in Our Treatment of Refugees by Shami Chakrabarti - Essay Example The Council for At-Risk Academics (CARA) created to deal with academic related violence and persecution has dealt with numerous cases involving refugees. CARA has had to help a physics teacher of Iraqi origin who used to receive death threats after she had dared to challenge the in place religious beliefs. Another incident dealt with by CARA, which shows that people do not care about the refugees, is the case of a human rights lecture from Zimbabwe whom the state police thoroughly beat due to his so-called political activism. Chakrabarti does not understand why people treat refugees with much contempt and ignorance even when they are aware of their sad struggle stories. One of the likely reasons suggested by Chakrabarti as to why people forget these sad refugee stories is due to the emotional distance that exists between refugees and people of the country, and this makes people forget these sad refugee stories. Chakrabarti in the article suggests that the government has let these refugees down, and the work of taking care of refugees has been left to organizations such as CARA. According to Chakrabarti, the government’s main task is to enforce grinding poverty to refugees, which has been possible because people allow them. The government’s reluctance and bad policies intended to help refugees can be best illustrated by the case of a Pakistani woman who fled to the United Kingdom after been physically attacked by her husband for the mere wish of wanting to finish her Ph.D. On arriving in the UK, the woman did not have a home or something to eat until CARA came to her rescue. Due to CARA’s limited resources that they have, the issue of dealing with refugees is overwhelming them. It is up to people of goodwill who appreciate the vital and useful work CARA does take up the responsibility of supporting the

Friday, August 23, 2019

Haitian revolution Essay Example | Topics and Well Written Essays - 250 words

Haitian revolution - Essay Example This meant more slave labor among the Africans who made up the majority of the population. Later, in 1971, the mixed-race group planned a huge revolution demanding for their civil rights, whereas, the whites divided into royalists building tension between these groups. The violent revolution was aimed at achieving racial equality, slavery end, and nation’s independence. I agree with the fact that the Haitian revolution was far more revolutionary than the American because despite horrible human, financial and social expenditures, the Haitian revolution was successful in instilling the concepts of democracy and equality far beyond the levels achieved by the American Revolution. In addition, the Haitians were focused in eliminating slavery as one of their political objectives. This was achieved because it later became an independent country with same racial rights and no slavery, whereas, the United States of America only had a representative administration, where only the minori ty male population were allowed to vote and slavery was still practiced. Although the Haitian economy, social and political status faced destruction, it finally achieved its political

Thursday, August 22, 2019

Miss Essay Example for Free

Miss Essay Evaluate United’s response to Dave Carroll’s music video. Did the airline handle the incident well? 3. In general, how should firms prepare for the challenges posed by user-generated content and social media? The â€Å"United breaks guitars† video went viral and has had over 7,000,000 views to date. Dave Carroll came up with his protest songs, he said, thinking what Michael Moore would have done, that is, create an instrument able to assemble the angry ones. A wonderful tool for consumer advocacy is a viral video because as said, chances are youre not the only one who is upset. After Dave Carrolls videos, United Airlines was inundated with additional complaints, so it happened that a traumatic experience for one flyer becomes a public relations disaster for United Airlines. United lately responded to Youtube videos, suffering the consequences of a stock price felt of 10%, costing stockholders about $180 million. When social media are involved the best response is the quickest response. United Airlines neglection in reacting caused an out of control media diffusion. United Airlines major error was not to pay attention to the previous incidents of people using social media to voice their frustration. Companies should understand the power of social media for customer interactions and monitor social media sites as part of their social media customer outreach and marketing efforts. A positive reaction of United would have been to use the incident as a positive PR opportunity to show off how they work positively with customers to solve problems. The lesson for any firms is.

Wednesday, August 21, 2019

Role Of Extra Regional Powers In The Indian Ocean Region

Role Of Extra Regional Powers In The Indian Ocean Region Zone of Peace. There have been numerous attempts to declare IOR as a Zone of Peace dating back to 1971. Various meetings to work out the modalities have been fruitless. Former United States, Secretary of State, Madeline Albright had said that the efforts to make the Indian Ocean Region a Zone of Peace should be disbanded because the region has too many states whose interests are far too varied and the IOR states maintain more important relations with foreign states than within themselves  [1]  . 2. Having seen the strategic relevance of IOR in Chapter 2, let us now analyse the role and interest of a few important extra-regional powers. USA 3. Genesis of Americas Role. The US strategic presence in the Indian Ocean Region grew with the process of decolonisation in IOR. The 1973 Arab-Israel war and the subsequent oil embargo resulted in strong efforts being made ensure oil traffic and price security. In his State of the Union Address on 23 Jan 1980, President Carter asserted that, Any attempt by an outside force to gain control of the Persian Gulf will be regarded as an assault on the vital interests of the USA, and such an assault will be repelled by any means necessary, including military force  [2]  . 4. US Naval Presence. The US Navy maintains a permanent presence of between 15 to 35 warships in the Indian Ocean at any given time. The US Fifth Fleet is based at Bahrain. Besides, the Fifth Fleet, the Sixth Fleet of the USCENTCOM and the Seventh Fleet of the USPACCOM are readily available to augment forces in the Indian Ocean  [3]  . US Pacific and Central Command 5. Interests. US role and policy in the IOR depends on fulfilling the following self-interests:- (a) Energy Security. (b) Economic Security. (c) Restrict Chinas influence in IOR. (d) Support/Basing facilities for War against Terror. (e) Strategic Partnership with India. United Kingdom 6. British Territory. In 1965, the British Indian Ocean Territory (BIOT) was formed out of individual groups of islands in the Western and Central Indian Ocean. In 1966, Diego Garcia was leased to US  [4]  . The British Royal Navy however maintains a permanent presence in the Persian Gulf in the form of multinational forces, UN Peace-keeping duties, and a Naval and Marine detachment at Diego Garcia. 7. Interests. Economically, the region is vital to UK being the source of about 40% of its oil supplies and an important supplier of non-ferrous metal imports. However there is no intention to maintain naval presence in the region though it is militarily supporting US policies in the region  [5]  . France 8. French Indian Ocean Territories. France possesses a large number of strategically located islands in the Western Indian Ocean, the largest of these being Le Reunion and Mayotte islands. France maintains a sizeable force in the IOR, comprising of about 10,000 men and 20 warships. Additionally, Djibouti is a major logistics base for French naval forces deployed from the Atlantic and Mediterranean commands. Owing to the islands, France considers herself to be a regional power in the Indian Ocean, rather than an extra -regional one. Consequently, France is a member of the Indian Ocean Commission (IOC), an organisation for regional cooperation, which includes Mauritius, Seychelles, Madagascar and Comoros. Frances deep involvement in the Indian Ocean is also evident from her defence agreements with Djibouti, Comoros, Saudi Arabia, Qatar, Madagascar and Mauritius  [6]  . Reunion Headquarters of French Forces in the Indian Ocean 9. French Interests. The French EEZ in the Indian Ocean amounts to a approximately 2  ½ million square kilometres, which is more than a quarter of the total French EEZ. Consequently, French naval activity in the waters of the Indian Ocean represents about 30 percent of the total French maritime activity. The French Indian Ocean territories are of strategic significance as they are on the cross roads of major commercial maritime traffic. There is extensive fishing, meteorological and geophysical research activity being undertaken by the French in these regions. France depends on West Asian oil and has trade interests with various littorals  [7]  . Japan 10. Japans proactive role in IOR is pre-requisite to Japan not only for its global status but also vital for its economic interests, especially since the sub-region is the source and transit for its energy lifeline. It is also wary of Chinas domination in South China Sea. 11. JMSDF is a large force which enforces a maritime control zone up to 1000 nm, thereby adequately addressing its security concerns and ensuring the protection of its EEZ assets. However, due to the constraint posed by the Japanese Constitution, it has been unable to assist the sub-region to secure the sea-lines against non- traditional threats. Japans commitment to Southeast Asia has thus been limited to financial and technological assistance for navigational safety and prevention of pollution  [8]  . 12. However, Japan is now actively considering a Constitutional review to break free from the legal handicap, including in terms of collective-security. This would make Japan more militarily assertive and enable it to safeguard its vital security interests in Southeast Asia  [9]  . Japan also recognises Indias strategic location in IOR and understands the vital role that India can play in securing its SLOCs. Russia 13. During Cold war, erstwhile USSR succeeded in gaining access to several bases in the IOR for forward basing and gathering intelligence. Infact, the number of Soviet bases and ships often exceeded those of US. Although it did have a lull period post 1992-1993, she still enjoys diplomatic relations with most of the littorals in IOR. These relations have great potential for cooperation in high technology, oil and gas pipelines. 14. Interests. The Indian Ocean Region is a vital link for Russia because it provides an all weather route for Russia between her Eastern and Western provinces. Besides Russia has security and trading interests in the northern reaches of the Indian Ocean. It also wants to maintain bases in the IOR to be able to influence world opinion in its favour. China 15. Chinese Influences. Over the years China has been widening her influence in the region. Today, China imports 32 percent of its oil needs, 58 % of which comes from Middle East. This figure is expected to double by 2012 with almost 70% oil requirement being met from Middle East  [10]  . Chinese state owned oil corporations are acquiring oil assets in Australia, Indonesia, Central Asia and Africa. The relationship between China and Myanmar (Communication facilities at Coco Islands, Sittwe Naval base), Bangladesh (Modernisation of Chittaong harbour), Sri Lanka (Construction of Hambantota harbour), Maldives (Submarine base) and Pakistan (Deep Sea port at Gwadar) have a strategic intention to strategically encircle India through String of Pearl  [11]  . The establishment of a free trade area with ASEAN countries is another important consideration. 16. Chinese Interests. Chinese interests in the IOR are growing and can be summarised as follows  [12]  :- (a) Containment of India. The efforts to contain India both economically and geopolitically, because it is the only regional nation that can pose a threat to its expansionist tendency in future. (b) Second Strike Capability. To maintain a second strike capability in the Indian Ocean. (c) Counter US Threat. To monitor activities in the Indian Ocean and counter increased US presence in the region. (d) Secured Oil Supply. Chinas energy needs are being fulfilled by import from Persian Gulf. Hence it is significant for China to safeguard these supply lines. Prognosis of Extra-Regional Influences 17. Indian Ocean region is potentially the most volatile and significant area, where the interests of the world powers are merging. All extra-regional powers have concerns over their energy security coming from Persian Gulf and through various choke points. The security of sea lanes against the threat of piracy and maritime terrorism is another threat. Additionally, these powers do not want the others to grow powerful by influencing the littorals in the IOR. And a few, such as France also need to maintain territorial integrity of their interests in IOR. 18. India has a geographically advantageous position in the IOR and finds herself in a position where she has to perform a balancing act to protect her interests in the region, which are vital to her progress and deal with the presence of extra regional powers. End Notes

Tuesday, August 20, 2019

Franchising In Hospitality Industry Commerce Essay

Franchising In Hospitality Industry Commerce Essay The following paper deals with a recent type of management entitled franchising. In the hospitality industry and currently within Accor, the franchise has become a real stake and strategy to continue to perform. Accor Hospitality is an international player which has decided to turn its strategy into a franchise system that combines company owned hotels and franchisees. Nevertheless, such a network has to be livened up and controlled in order to perpetuate the reputation and then the business. Therefore the case study sustained by qualitative research aims at suggests recommendation to the company, but key issues need to be viewed and overcome first. Foreword This report is to summarize the experience of a six-month internship within the Business Intelligence department of Accor Hospitalitys headquarter, as well as to demonstrate my personal understanding of the changing of strategy, by confronting and comparing theory with practice, identifying its pros cons as well as its key factors of success in the hospitality industry. For my third and final year of business studies at INSEEC, I chose to major in International Business Strategy. This is a Master of Business qualification run in partnership with the SRH Hochschule in Berlin. The two main reasons for this choice were due to my strong interest in discovering many cultures and ways of conducting business and strategies. On the one hand, my strong interest in acquiring skills in business analysis in the hospitality industry, combined with the importance of the hospitality industry worldwide, oriented my applications to Business Analysis positions within this sector. On the other hand, my personal motivation for discovering new cultures, coupled with my academic qualifications and my language skills also encouraged me to apply in International companies where I could speak as much English as possible. As a French student extremely interested in working in a multicultural environment, the ACCOR group seemed to be a fantastic opportunity. As a Business Analyst I was part of the Business Intelligence team and reported directly to the Director of Strategy and Business Performance. I had to have full experience of distribution, and work on the different aspects of analyzing the business that such a position commands. My personal mission within the team has been to provide support to the two Business Analysts, and help them make reports related to the Distribution strategies. As a team, we were accountable to understand the needs of the various brands and teams, then to create tools to provide accurate information (project managers) and finally to analyze the data (business analysts). Therefore, in my position, I was in charge of carrying out three main functions: Updating the Distribution Monthly Report for the Top Management for both Direct and Indirect Sales Analyzing the hotels performance worlwide Answering to Adhoc demands in order to measure the impact of promotional offers. This report, however, has its limits. A valid quantitative study for example, would have allowed me to support and corroborate my findings with the franchisees satisfaction and suggestions regarding their links with the franchisor. As well, it would be promising to investigate some topics as for example the behavioural customer evolution regarding the hospitality industry or develop further some of the challenges the hospitality industry is facing applying Dynamic Pricing, as they could easily be the subjects of a study on their own. Finally, both on a personal and professional level, my experience within Accor Hospitality headquarter in Evry has been a real success. All I can believe for the future is to have a chance to further develop my analysis skills in similar conditions: team spirit, communication and trust. Acknowledgements Firstly, I am extremely grateful to Pierrick Le Masne for giving me the chance of being parts of the Strategy and Business performance department within the ACCORs headquarter in Paris. I would like to express many thanks to Alison Broussy for welcoming me in her Business Intelligence team and sharing her expertise, training and giving me the opportunity to further develop my business analysis skills over the last six months. I would like to add special thanks to Nicolas Leseurre, Fara Rabesoa, for sharing their experience and knowledge with me. I am also thankful to Isabelle Duflot and Olivier Poujol for sharing their thoughts and opinions regarding Project Management. Finally, I would like to thank the overall team for the warm welcome and team spirit I have received since being part of this company these past few months. Table of Content Introduction 1 Tapez le titre du chapitre (niveau  2) 2 Tapez le titre du chapitre (niveau  3) 3 Tapez le titre du chapitre (niveau  1) 4 Tapez le titre du chapitre (niveau  2) 5 Tapez le titre du chapitre (niveau  3) 6 Introduction Franchising is an ancient type of network that is simple, formalized in its organization and in its functioning (Anderson and Coughlan, 2002; Blair and Lafontaine 2005). However, literature on the control of the franchising network are seldom particularly in France, whereas it is a rich and interesting lead of research (Elango and Fried, 1997). Franchising is a way of doing business that has grown fast, and more particularly in Europe. The reason can be found in the will for the franchisor to develop its network quickly and for the franchisee to benefit from an expertise in a specific field. France is the European leader and has seen its franchising network doubled within the last ten years and acknowledges a constant growth between 8% and 11% for 5 years. Even in a crisis period, franchising has continued to grow thanks to the support and training provided by the franchisor. All sectors taken together, France owns 1,234 networks  [2]  of franchisor and 49,094 franchisee, and realizes a turnover of about 47.7 billion Euros in 2008. Franchising has been defined as a system of marketing goods and/or services and/or technology, which is based upon a close and ongoing collaboration between legally and financially separate and independent undertakings, the Franchisor and its individual Franchisees, whereby the Franchisor grants its individual Franchisee the right, and imposes the obligation, to conduct a business in accordance with the Franchisors concept.  [3]   In other word, the definition underlines that a franchising network is a complex organization where the relationship and trust between the franchisor and franchisees are essential. When a company decides to develop its know-how into franchising it is because the company has gained a certain maturity and expertise in its activity and then will be able to convey the operational management to its franchisees. Within the Hospitality Industry, it exists different ways of managing a hotel. Indeed, a hotel can be a subsidiary as an entire part of the corporate company, a managed hotel or a franchisee. ACCOR is a company that has been created in 1967 with the first opening of a Novotel. Then, step by step the company has opened several hotels in France and in Europe and further worldwide. Owning many hotels the company has known how to become a leader in that field. Today, leader in France and in Europe, the company wants to become more present worldwide and has recently decided to change its business model. This changing of strategy called asset right is a real stake because it is going to disrupt an organization which relies on a family mind, history and way of running the business. As a part of the Accor team, this research would like to expose the changing of the Accor strategy from an hotels owner to a franchisor. The case study would outlines how the company can optimize the relationship between itself and its franchisees within a mixed network. Chapter One: Theory on franchising The first part deals with the analysis of the franchising system in its complex form. The key concepts to understand the overall functioning of the franchise are developed. 1.1 History of franchising The franchise business model was born in the United States of America, especially encouraged by the antitrust laws. This solution can be explained by the size and the importance of the American market that forced the societies to turn into a system enabling the increase of the market shares without huge investments. Nowadays, the number of franchisees reaches 760,000 in the United States spread out 1500 networks that represent a turnover of more than 1500 billion dollars and employs 9.7 million people in 2004.  [4]   In France, the first franchised network appeared around 1930 a little time after the creation of the wool producer in Roubaix. The phenomenon of franchise has been developed further, at the beginning of the seventies, in order to modernize the convenience trade and create a real competition to the Big boxes. Today France is the leader of franchising in Europe and concerns various types of activity such as fast food industry, bakers, apparel and hospitality industry. 1.2 Concepts and definition In a franchising system, the franchisor grants its knowhow and its trademark to franchisees, which are independent and have the contractual obligation to exercise the activity described into the respect of rules and procedures defined by the franchisor. The latter must follow the concepts exploitation and provide support to its franchisees. The franchisor is paid by an entrance fee at the signature of the contract and also by regular royalties based on the franchisees turnover. The contract of franchise has a variable length often comprised between five and ten years. Thus, the franchise includes a key firm, the franchisor, and multiple satellites firms, legally and financially independent called the franchisees. Usually, the franchisor brings intangible assets (products, services to develop, know how or trademark), whereas the franchisee provides financial and human assets. The purpose of the agreement is the exploitation of the concept developed by the franchisor. The franchise seems to be a special type of network where there is an inter-organizational division of the work. The franchisor is in charge of the strategic activity whereas franchisees work more on operational activities (Frà ©ry, 1996). Skills and resources mobilization within a franchising system are more carried out in logic of exploitation rather than propriety (Frà ©ry, 1995) because associates are independent. Therefore there is coexistence of economic dependence and legal independence between partners of the franchise. Sometimes the franchise network is described as unstable because the key firm could try to own the most performing units.  [5]   Many franchising network are mixed because they combine company owned units and independent franchisees. This is the case for instance in Hospitality industry. This specific kind of network enables to mix the experience effect from company owned units with the human and financial power of the franchisees. Indeed, information available from company owned units are used to negotiate and attract new franchisees. The franchising network enables a mutual process of learning that can lead to trust relationship between the franchisor and franchisees. To sum up, a franchise system is composed of: A purpose: repetition of a commercial success Supplementary resources from both sides Favourable institutional framework Interactive relationship between players. A purpose  due to a commercial success Franchising system Supplementary recources Interactive relationship between players A favourable institutional framework Figure 1 The franchising system 1.3 Purpose of the franchise system Each side of the franchise system finds an advantage of coming into this specific type of network. The franchisor hopes to develop its network as quick as possible in a part to compete with others chains and then to obtain geographically the best places. Entrance fees and royalties ensure a permanent payment. However the franchisor must control the concepts development and has to be sure that the offer is as consistent and homogeneous as possible. Regarding the franchisee, he develops the commercial offers in being supported by the franchisor in terms of training, advisory, innovation. The franchising system enables to get an access to information from people who are in direct relation with the client and particularly in a mixed network (Perdreau, Le Nadant and Cliquet, 2007). Because of the information sharing, new franchisees know a failure rate under the average failure rate of any new created enterprise.  [6]   1.4 The legal framework of a franchise system The basis of the franchise can be found in the legal contract and the code of practice that both parties have to sign in order to create right and duties to respect. The franchise contract, one of the foundations of the franchise system is a contract in which the owner of a distinctive sign, generally registers the brand name (the franchisor) and grant it to an independent storekeeper (the franchisee). The owner holds an advisory and commercial assistance role whereas the franchisee has to pay to enter into the franchise and a fee based on the turnover of the shop. Sometimes the contract can also commit the franchisee to buy equipements and furnitures to the franchisor and to respect standards and certifications in the management of the units.  [7]   The franchise contract must be in compliance with the national law, European law and the code of practices. It describes the interests of members of the franchise network in protecting the franchisors patent rights and in maintaining the common identity of the franchise system. The key points of the contract are the following: The franchisor and franchisees rights and duties Goods or services provided to franchisees The length of the contract The payment terms for the franchisee Renewal terms Termination contract clause, clause of non competition Franchisors duties Franchisees duties Definition of the concept/ innovation regarding the concept to stay competitive/ Ensure a stability in the network Financial duties: entrance fee/ marketing and advertising fees/ Royalties Development of the brands/ of the trade name Respect of the global concept, respect of the trade name, respect of the clauses of the contract, return of all documents and tools at the end of the contract, Convey a knowhow, tools, support Sometimes, exclusivity of supply Table 1 Focus on the basic duties for both parties in the franchise contract Nevertheless, the partners motivations are quite different and can lead to an opportunistic behavior from both parties. Conflict of interests can appear when there is an alignment of interests and behaviors of the franchisor and franchisees (Dant and Nasr, 1998). Indeed, the franchisor is concerned by the profitability of the network and the strengthening of the reputation of the brand (long and middle term objectives) while franchisees seeking short term profitability sometimes in not taking care of the brand image. In the theory of contracts and franchise network (Penard et al., 2004), it has been pointed out that the franchisor can miss to its duties of support, but he can also prevent the franchisee to manage freely its unit or impose a price of sale. The franchisor should have in that field a role of adviser because according to the European law  [8]  , he cannot take an active part in the management of the franchisees unit. In a franchising system, even if it is against the law, the franchisor could give more importance to its company owned units instead of being neutral. However the franchisees can sometimes fail in its duties as well when he does not respect its commitment regarding the commercial standards of the franchisor, some delays in the payment of fees or a lack of cooperation in the data transfer when the franchisor is auditing the unit. 1.5 The relationship between the franchisor and the franchisees The franchise system does not include only two players (the franchisor and the franchisees) but four players according to the French Franchise Federation (2004): The franchisor, an independent contractor that can be a corporate body or a natural person. The franchisee, an independent contractor, corporate body or natural person that has been selected by the franchisor. The network, made up of the franchisor and franchisees. They all work under the same trade name which is a symbol of identity and makes the reputation of the network. The customer who buys for himself products or services and who does not want to know if behind there is a franchisee or a company owned unit. He only seeks a certain quality that makes the brand that known. Figure 2 The conceptual Framework Will to start a business Business ownership Business site Knowledge of the local market Access to the customer Surety of satisfaction/loyalty Know-how Marketing success Distinctive concept Strong brand Surety of turnover Surety of efficiency Franchisors resources Franchisees resources In order to make the franchising concept works efficiently, both side have to work together. To help and protect them, it exists a legislation framework. The contract has to be balanced in order to satisfy both parties. The turnover has to be shared according to the agreement the parties agreed upon. Three decisive factors make a franchising system (Jauffrit and Sie, 2010) efficient. First of all, the quality of the business model and the conditions to test it at the beginning of its creation are essential. The strength of the resources available is also important: financial, technical and above all the human resources from both sides and the quality of the cooperation. Moreover the network should be developed as quickly as possible in order to reach the critical size and make economies of scales. The latter enables to develop the brand, to stretch over the territory, to pay the common equipment, and benefit from purchasing cots more interesting. All these factors permit the access of a well ranked position and gain a competitive advantage.  [9]   1.6 Different ways of controlling in a franchise system In the hospitality industry it exists four categories to control a network (Baglin and Malleret, 1995). The legal control is essential in a integrated network where it exists a capital-intensive link between the company and its manager, but has a less importance in a franchise system. The control on the product or service enables to keep a certain level of standardization defined in the contract and can be completed by the visit of mysterious client or a network coordinator. The respect of the norms is essential in an international network where the brand offers a standardized product or services. It enables to keep a certain consistence in a brand within peoples mind. The control of the financial management, based on the reporting and budget, are partially practiced in a franchise network. The key performance indicators are centralized within a detailed reporting as the fees and royalties are usually calculated on. Regarding the specific performance of a franchisee, the methods are generally advised and supervised but seldom imposed because the law restricts the franchisor to manage and handle the franchisees business. The franchisor has a role of advisor and assistance. Finally the control of human is applied during the recruitment, training and payment. The payment of the franchisee depends on the profit of its business after having paid the franchisor royalties and fees. The franchisor uses its control only when he recruits a new franchisee and when he liven the network up. Controls in a franchise system seem to be rather technical because the franchisor has to be sure that the franchisee respects the offer and the level of standards. 1.7 Focus on the technical control One of the most important difficulties in a franchise system concerns the asymmetry in the information exchange. The franchisor can visit the franchisee, can employ a mysterious visitor to control and can measure the retro claims regarding a specific franchisee. Nevertheless, the dissatisfaction of customers is measured in a satisfaction survey conducted when the malfunctioning has already been realized. However the franchisor can today use new information system tools. He can follow in real time the activity of a franchisee, for instance through an Enterprise Running Planner, and ensure a good visibility. The gathering of data and information can thus be done without supplementary costs and at anytime (Boulay and Kalika, 2007). In addition to the real advantage of such tools, it has an effect on the franchisees behavior and enables to exercise a constant control in the network operations. Chapter Two: Theory on franchising Le desinvestissement par la franchise

Monday, August 19, 2019

Georgia O’Keeffe Essays -- Historiography

Georgia O’Keeffe is one of the most famous and controversial painters known to America. According to art critic Lisa Mintz Messinger, â€Å"She [Georgia O’Keeffe] left behind a rich legacy of American images that were tied to the land. These images and her own pioneering spirit, established an illustrious reputation in America very early on in her career† (Messinger 17). O’Keeffe is best known for her large paintings of flowers, the New York skyline and scenes from New Mexico. Ever since Georgia O’Keeffe began showing her work in 1916, critics have had different opinions on what her paintings represented. One of the biggest debates regarding her paintings has been whether or not her paintings were erotic. Some of the biggest critics of her works are Robert Hughes, Lisa Mintz Messinger, Katherine Hoffman and Georgia O’Keeffe herself. All four of these people have helped shape O’Keeffe into an iconic figure of sexually charged pai ntings. Georgia O’Keeffe first came into the lime light after her friend Anita Pollitzer submitted some of O’Keeffe’s works to the famous Alfred Stieglitz (Hoffman 5). Even from these first charcoal drawings, critics noticed the eroticism in her works of art. One of the biggest critics of her work is the noted Robert Hughes. In his book, American Visions: The Epic History of Art in America, Hughes explores American artists’ works, including O’Keeffe. According to Hughes, â€Å"Much ink has been spilled on the topic of whether O’Keeffe ever set out to use specifically genital images; she herself indignantly denied it, and especially refused to countenance any sexual interpretation of the large close-ups of flowers she painted in the twenties. To deny the sexuality of a painting like Black Iris III, 1926,... ...a Bricker. â€Å"Review: Stieglitz.† Stieglitz 55.2 (1996): 105-106. Web. 23 October 2009. Cowart, Jack, et al. Georgia O'Keeffe: Art and Letters. Washington; Boston: National Gallery of Art; New York Graphic Society Books, 1987. Print. Hoffman, Katherine, and Georgia O'Keeffe. An Enduring Spirit: The Art of Georgia O'Keeffe. Metuchen: Scarecrow Press, Inc., 1984. Print. Hughes, Robert. American Visions: The Epic History of Art in America. 1st ed. New York: Alfred A. Knopf, Inc., 1997. Print. Messinger, Lisa Mintz, Metropolitan Museum of Art, and Georgia O'Keeffe. Georgia O'Keeffe. New York: Thames and Hudson Inc.; Metropolitan Museum of Art, 2001. Print. Middleton, Ken.â€Å"1920’s: American Women through Time.†www.frankmtsu.edu. N.d. Web. 25 Sep. 2009. â€Å"Introduction to Modern Art.† metmuseum.org. The Metropolitan Museum of Art. 18 June 2009. Web. 25 Sep. 2009.

Brave New World7 :: Essays Papers

Brave New World7 From my readings in Aldous Huxley's Brave New World I have noticed most of the World State citizens remain in a childish state of mind all of their entire lives from playing games all day to having instant gatification from their problems. This bothers me very much because in the real world people must work for what they want. Instead the citizens of this deranged culture are taken care of for their whole lives like children. In Brave New World the citizens of the World State take soma for instant gratification from everything much like kids today smoke marijuana to get away from their problems. For example when Bernard finds out that he is being sent to Iceland he takes some soma to relieve himself from his problem. After finding out that he was being sent to Iceland, "Lenina pursuaded him to swallow four tablets of soma. Five minutes later roots and fruits were abolished; the flower of the present rosily blossomed." (104) The soma Bernard took was because he wanted his problem to go away and hoped someone other then himself would fix it. The next example of the citizens being taken care of like children, was that they were taught by hypnopedia what to think and believe and to stick by it like a stubborn child. An example of this is when Bernard wants to think on his own, which is very unsual for these people, and Lenina repeats phrases she heard during hypnopedia to get him to take some soma to get rid of those thoughts: " A gramme in time saves nine, she says blindly" and "One cubic centimetre cures ten gloomy sentiments."(89) Bernard is frustrated by her inability to think but Lenina then finally nags him to the point that he takes the soma to make her stop. By doing this Lenina proves she can't think independently like a stubborn child would try to get its way. The last example of these citizens acting much like children is that all day they play elaborate games like elevator squash and obstacle golf. You never find out if they have any real responsibilitys at all but they play games during the day. At one point Bernard bemoans Lenina's tendencies: "...wretched that she should have thought it was a perfect afternoon for obstacle golf...." (64) You must wonder how they could play this in the afternoon if they have any responsibilitys at all.

Sunday, August 18, 2019

Problems Of Modernization In Developing Nations Essays -- essays resea

Problems of Modernization in Developing Nations The economic situation which exists in the developing world today, is the result of the relationship between the modern, and developing nations of the world. Modernized nations benefited from this relationship because it gave them access to natural resources. However, because of this relationship, many developing nations now suffer from severe problems. These nations are attempting to change the situation in which they struggle. A political cartoon I have recently seen illustrated the economic relationship between the industrialized world and the developing world. It shows that the industrial nations, The United States and Europe, are located in the northern hemisphere. On the other hand most of the developing world, Central and South America and Africa, are found in the southern hemisphere. The "well fed", well dressed individual holding the industrialized world indicates that the modernized nations of the world are prosperous, and have a high standard of living. The skinny, poorly dressed individual holding the developing world indicates that the developing nations of the world are not prosperous, and have a lower standard of living than do industrialized nations. Both individuals are supporting each other in such a way that if one is removed, the other will fall. Without resources to use, industry would not be able to maintain its existence. Likewise, without a market for their resources, or the products of indus...

Saturday, August 17, 2019

A Growing “Threat” to Society Essay

The Internet is one of the most powerful sources of information today. Thus, it has the capacity to enlighten, as well as to mislead. This double-edged potential has turned the Internet into the latest avenue for terrorism. Terrorists are now harnessing the power of the Internet to wreak havoc among the public (Conway, 2002). Terrorists use the Internet mainly as a propaganda tool – it is a venue wherein they publicize their cause or explain their ideological justification without misinterpretation or censorship. As of 2002, a majority of the 33 groups deemed foreign terrorist organizations by the United States State Department had their own web sites. There are also many other websites, that, despite not being related to any terrorist group, provide information on how to commit terrorist activities such as bomb-making. The latter often escape criminal prosecution due to the First Amendment, which guarantees freedom of speech to the general populace (Conway, 2002). The very idea of cyber-terrorism, however, is not without contention. For one, it is still not clear as to what differentiates cyber-terrorism from freedom of expression. Also, there are certain Internet-related crimes that cannot be considered as cyber-terrorism, although they inflict damage upon the public. Indeed, terrorism in itself is already a notoriously difficult concept to define. The addition of computers to it further complicates the idea (Conway, 2002). The Internet: A New Weapon The Internet was originally intended as a means of resuming contact in the event of a nuclear attack. But due to its speed and convenience, it is currently a major venue for information, communication and commerce. As of September 2006, there were more than 1 billion Internet users worldwide (Vatis, 2006). With just one click of a mouse, an entrepreneur in Germany can deposit funds to a bank account in Switzerland and talk to a London-based cousin face to face through a web camera. A student in California, meanwhile, can learn everything about the Great Wall of China with merely a few keystrokes. After 9/11 It was only after 9/11 that the very concept of cyber-terrorism was actually developed. Before 9/11, Internet-related crimes were usually in the form of sending pornographic email to minors, defacing web pages, stealing credit card information and launching computer viruses (Conway, 2002). After 9/11, however, US officials realized that terrorist organizations could use the Internet to generate more bloodshed (Weimann, 2004). Al-Qaeda, for instance, could launch missiles or biological weapons to the US by simply pressing the â€Å"Enter† button of a laptop (Stohl, 2006). To a certain extent, the fears of the US were well-founded. In November 2000, an electronic attack was carried out from Pakistan against the Washington-based pro-Israeli lobbying group American Israel Public Affairs Committee (AIPAC). Aside from defacing AIPAC’s site with anti-Israeli commentaries, the attacker likewise stole some 3,500 email addresses and 700 credit card numbers, sent anti-Israeli diatribes to the addresses and published the credit card data on the Internet. The Pakistani hacker, known by the alias â€Å"Dr. Nuker,† claimed responsibility for the incident. It turned out that â€Å"Dr. Hacker† was a founder of the Pakistani Hackerz Club, an organization whose objective was to â€Å"hack for the injustice going around the globe, especially with (sic) Muslims† (Conway, 2002). The aforementioned cyber assault was not without precedent. The Lebanese Shiite Islamic group Hezbollah established its collection of web sites in 1995. At present, the group has three websites that can be viewed in either English or Arabic – one for its press office, another to describe its attacks on Israeli targets (http://www. moqawama. tv) and a third, Al-Manar TV, for news and information (http://www. manartv. com). These websites regularly provide the latest information about Hezbollah, including press statements, political declarations, photos, video and audio clips. An email address is also provided as contact information (Conway, 2002). After 9/11, as a result, federal agents issued subpoenas and search warrants to almost every major Internet-based company, including America Online, MSN, Yahoo! and Google. In addition, many web sites were subjected to official closure by the Federal Bureau of Investigation (FBI). Included among those that were closed down were radical Internet radio shows such as â€Å"IRA Radio,† â€Å"Al Lewis Live† and â€Å"Our Americas. † The â€Å"jihad web ring,† a collection of 55 jihad-related websites, lost dozens of its sites due to pullouts by Yahoo! Lycos Europe, meanwhile, created a 20-person team to filter its websites for illegal activity and terrorist-related content (Conway, 2002). Cyber-terrorism: Is There Really Such Thing? One of the most common arguments against cyber-terrorism is that it is an imaginary threat (Lacey, 2007). Contrary to popular perception, there is a minimal chance that cyber-terrorists would exact harm on innocent people by attacking corporate and governmental computer networks. As of this moment, terrorist organizations use the Internet only for fundraising, communications and propaganda. There is the possibility that terrorists might use computers as weaponry to a significant degree, but this will â€Å"probably happen in the (distant) future† (Conway, 2002). At present, terrorists would draw more attention to their cause by setting off bombs instead of hacking bytes (Conway, 2002). Instead of getting extremely paranoid about cyber-terrorism, the government should instead focus on eliminating cyber attacks against companies. As of July 2002, hackers had successfully launched at least 180,000 Internet attacks against more than 400 public, private, governmental and non-profit organizations. The brunt of these attacks fell on the power and energy industries, as well as on the technology and financial services. If left unchecked, these cyber attacks would be very detrimental to consumers – in order to make up for their losses to hackers, owners of the above-mentioned industries will have to raise the prices of their products and services (Fishman, Jospehberg, Linn, Pollack, Victoriano, 2002). Conclusion Paranoia over cyber-terrorism is very dangerous. Aside from diverting attention from more serious crimes such as cyber attacks, it violates civil rights and liberties. Under the guise of â€Å"fighting terrorism,† even websites whose only crime was to express radical ideas were closed down. While it is the duty of the state to safeguard its constituents from danger, doing so should not infringe their inalienable rights. It is true that terrorism might turn to cyberspace in the future in order to spread even more fear and bloodshed. But before the government rushes out to eliminate â€Å"cyber-terrorists,† it must first have a clear-cut concept of what constitutes cyber-terrorism and what makes a cyber-terrorist. Otherwise, the government will end up worse than the terrorists that it aims to get rid of. References Conway, M. (2002). What is Cyberterrorism? Current History, 101, 436-442. Retrieved October 17, 2008 from Academic Research Library. Fishman, R. M. , Josephberg, K. , Linn, J. , Pollack, J. , & Victoriano, J. (2002). Threat of International Cyberterrorism on the Rise. Intellectual Property & Technology Law Journal, 14, 23. Retrieved October 17, 2008, from ABI/INFORM Global. Lacey, D. ComputerWeekly. com. (2007, April 29). How Real is the Threat of Cyber Terrorism? Retrieved October 17, 2008, from http://www. computerweekly. com/blogs/david_lacey/2007/04/ how_real_is_the_threat_of_cybe. html Stohl, M. (2006). Cyber Terrorism: A Clear and Present Danger, the Sum of All Fears, Breaking Point or Patriot Games? Crime Law Soc Change, 46, 223-238. Retrieved October 17, 2008 from SpringerLink. Vatis, M. (2006). The Next Battlefield: The Reality of Virtual Threats. Harvard International Review, 28, 56-61. Retrieved October 17, 2008 from ABI/INFORM Global. Weimann, G. United States Institute of Peace. (2004, December). Cyberterrorism: How Real Is the Threat? Retrieved October 17, 2008, from http://www. usip. org/pubs/specialreports/sr119. html#threat

Friday, August 16, 2019

Jig and Fixture Design

Abstract This paper proposes a design of jigs and fixtures for the mass production manufacturing of Sportsman Race Series aluminum slipper pistons (Probe Industries) that are used in the Chevrolet LS Series V8 engines. The designs of two sets of jig and fixture designs are proposed. The first set (two vee-blocks and a drill bushing) is designed for the process of drilling the wrist pin holes in the piston. The second design (two vee-blocks and a pin locator) is used in the milling of the skirts and lower form of the piston.The designs use principles of manufacturing facilities design, research on manufacturing practices and 3D modeling software (Catia) in order to optimize quality (accuracy), costs and productivity in the manufacture of such pistons. 1. Introduction 1. 1 The Piston An important mechanical component of an internal combustion engine, the piston is basically a solid part in an airtight cylinder that moves under the pressure of a fluid and transfers the force of the expa nding gas to a crankshaft through a connecting rod (The American Heritage, 2005). Pistons typically consist of a few main features.Pistons are cylindrical. The top part of the piston that comes into contact with the expanding gas is the crown. All pistons have a wrist pin hole to contain a steel wrist pin that attaches the piston to a rod that is connected to the crankshaft. The skirt of the piston is the end opposite the crown and is often milled in the sides to reduce weight. 1. 2 Selected Component (Chevrolet LS Series V8 Piston) The specific component chosen for the design project is the Sportsman Race Series aluminum slipper piston (Probe Industries) used in the Chevrolet LS Series V8 engine.The high-speed nature of a V8 engine requires pistons to have reduced weight to improve engine balancing. Unlike older pistons that were made with cast iron, this piston is made with forged aluminum alloy to reduce its weight as well as improve fatigue life. Furthermore, this specific pisto n is a slipper piston with a length of only half its diameter and has some parts milled off in order to reduce size and weight dramatically. 1. 3 Objectives, Scope, and Assumptions The aim of this design project is to design jigs and fixtures for the mass production of the aluminum slipper piston used in the Chevrolet LS Series V8 engine.The scope of the design project is limited to designing jigs and fixtures for the only two processes in the manufacture of such pistons that require jigs and fixtures, specifically the drilling of the wrist pin holes and the milling of the skirts and lower form of the piston. The design project does not account for the exact design, accuracy or efficiency of the drilling and milling machines. The strength and hardness of the materials are not considered. The time and motion in between the processes are not measured for optimization. 2. Manufacturing the Component 2. 1 Component DesignThe exact specifications and design of the piston for the Chevrole t LS Series V8 engine were taken from a manufacturer of such pistons, Probe Industries. The bore (diameter) of the piston is 4 inches and the height is 2 inches. The wrist pin hole is 0. 927 inches in diameter and centered at 1. 155 inches below the crown. The wrist pin length is 2. 5 inches, meaning that the skirt below the oil grooves is milled at each end of the wrist pin hole up to 1. 25 inches away from the center of the cylinder (Probe Industries, 2012). These dimensions are important in the milling and drilling processes in the manufacture of the piston.The image below shows the rest of the dimensions and the tolerances (calculations shown later). 2. 2 Machining Processes in Manufacture of Component After forging a solid aluminum slug into the basic shape of the piston with the desired strength and stability, the component undergoes several machining processes. The first machining process involves using a lathe or a CNC turning machine to make the base, cut out oil rings or g rooves, and drill oil holes. The second process is to drill a large hole on one side of the piston through to the other. This (wrist pin hole) is where the wrist pin is placed to attach the piston to the connecting rod.The third process is to use a milling machine to shave off material at the sides where the wrist pin hole was drilled in order to reduce the weight of the piston. The fourth machining process involves finishing with a lathe machine, wherein the crown is made into its final shape, the bottom edges of the skirt are shaped, and slots/engravings are made. 3. 3 Machining Processes Requiring Jigs and Fixtures The only processes that require jigs and fixtures are the second and third machining processes, the drilling process and milling process. The first and the fourth process use CNC turning/lathe machines and they require no jigs or fixtures.The process of drilling the wrist pin hole however requires a bushing to locate the point in the cylinder that needs to be drilled a s well as a lower vee-block (with a locator at on end) and an upper vee-block (with the bushing and a pin/screw connecting to the lower vee-block) to hold the cylinder. The process of milling requires a lower vee-block as well but with a pin that goes through the wrist pin hole to hold the piston in place in the vee-block. A second, upper vee-block is used to guide the milling machine. The upper and the lower vee-block are referenced to each other with pins. 3.Functional Analysis of Jigs and Fixtures 3. 1 Drilling Process For the drilling process, a vee-block fixture is required to hold and support the cylindrical component. The design of the vee-block includes a locator at the end of the cylinder to keep the piece from moving and to help put the cylinder/piston in the right position. To drill the hole, a bushing is required to guide the drilling machine. The bushing goes through an upside-down vee-block that is put in location by pins connecting it to the lower vee-block. Bushing f or Jig Assembly: Vee-Block for Jig Assembly: Drilling Jig Assembly:Drilling Fixture Assembly (Vee-Block): Drilling Process Jig and Fixture Assembly: 3. 2 Milling Process For the milling process, the piston must be held in the right position and orientation. A vee-block is again used to support the cylindrical piston. And a locating pin is placed in the center of the vee-block at an exact location along it in order to put the piston in the right position along the vee-block and at the right orientation (hole facing upwards) for the milling to be correct (since only the sides with the holes must be milled and only exactly below the oil rings).A thin upside-down vee-block is strapped on to the top of the cylinder and connected to the lower vee-block at an exact location (using pins or screws) in order to hold the piston in place and to keep the milling machine from milling into the oil rings. To mill the other side, the piston is simply turned over and fitted into the locator from the newly milled side. Milling Process Jig (Vee-Block): Milling Process Fixture (Vee-Block and Locating Pin): Milling Process Jig and Fixture Assembly: 4. Tolerance Calculation 4. 1 Tolerance Calculation of Jig and Fixture for Drilling Process To compute or the tolerance of the upper jig of the drilling process, the tolerances of the left and right locating pins and pin holes are computed first. The tolerances and the clearances must be just enough so that both locating pins can fit in the pin holes (in all cases including largest and smallest size of one or both pins and of one or both holes). It should be noted that the worst possible scenario is that on one side of the jig, the hole is the maximum size and the pin is the minimum size while on the other side, the hole is the minimum size and the pin is the maximum size. Given that the diameter of each pin hole in the jig is 12. mm (or 0. 5 inches); the tolerance chosen for this is plus/minus 0. 01 mm (leading to a range of 12. 69-12. 71 mm for the diameter of the hole). A clearance of 0. 05 mm is chosen, causing the largest diameter for the locating pin to be 12. 64 mm. The tolerance chosen for the locating pin is plus/minus 0. 005 mm (leading to a range of 12. 635-12. 645 mm for the diameter of the pin). In the worst case scenario, on one side, the maximum hole size would be 12. 71 mm while the minimum pin size would be 12. 635 mm (leading to a potential gap of 0. 075 mm and a left or right shift of 0. 0375 mm).In the worst case scenario for locating pins where one side has a maximum hole of 12. 71 mm and a minimum pin of 12. 635 mm and the other side of the jig has a minimum hole of 12. 69 mm and a maximum pin of 12. 645 mm, the maximum shift of 0. 0375 mm on either side would still allow the larger pin to fit in the smaller hole since there would still be a gap of 0. 0075 mm (12. 69 – 0. 0375 – 12. 645 = 0. 0075). Since the bushing is screwed on tight into the jig, there is no clearance between the bushing and the jig and thus no need to differentiate between the two pieces in terms of tolerance.The tolerances of the pins and pin holes would cause variation in the position of the drill. The worst case scenario would be if on any side, the pin hole is of maximum size (12. 71 mm) and the locating pin is of minimum diameter (12. 635 mm) leading to a potential gap of 0. 075 mm and a left or right shift of 0. 0375 mm. This shift would cause the drill (center of bushing hole) to move 0. 0375 mm in any direction from the center of the jig, and thus the final wrist pin hole would be plus/minus 0. 0375 mm from the center of the final product (50. 7625 – 50. 8375 mm from the side of the piston and 29. 025 – 29. 3775 mm from the top of the piston). This is within the product specification wherein the tolerance is plus/minus 0. 05 mm (50. 75 – 50. 85 mm from the side of the piston and 29. 29 – 29. 39 mm from the top of the piston). The positions of the loca ting pins and pin holes for the upper and lower vee-block have a tolerance of 0. 005 mm on any direction and thus cause the position of the drilled hole to be between 29. 335-29. 345 mm from the top of the piston and between 50. 795-50. 805 mm from the side of the piston (still within product specifications).The locator on the lower fixture as well as the back plate each has a tolerance of 0. 005 mm combining into a worst case shift of 0. 01 mm and would cause the position of the drill to be between 29. 33-29. 35 mm from the top of the piston (still within product specifications). All the other tolerances of the drilling assembly have no effect. 4. 2 Tolerance Calculation of Jig and Fixture for Milling Process For the milling process, the holes in the upper and lower vee-blocks for the pins that locate the upper vee-block are exactly the same as in the upper jig for the drilling process.Thus the tolerances are the same (0. 01 mm hole tolerance, 0. 05 mm clearance, and 0. 005 mm loca ting pin tolerance) and so is the worst case scenario (shift of 0. 0375 mm). Since the upper vee-block guides the milling machine with a feeler gauge of 0. 01 mm, the worst case scenario would mean that the milled section is either 0. 0375 mm too high or too low on the piston (16. 7625 – 16. 8375 mm from the top of the piston). This is within the product specification wherein the tolerance is plus/minus 0. 05 mm (16. 75 – 16. 85 mm from the top of the piston).As of the lower fixture for the milling process, the symmetrical vee-block allows the cylindrical component to remain centered without rolling even when the size of the component or the fixture varies, thus eliminating the need to set tolerances. However, the tolerance must be calculated for the locating pin that goes through the wrist pin hole since a gap here would cause milling area to move up or down from the top of the piston. The hole that was previously drilled with a diameter of 23. 55 mm is assumed to hav e a tolerance of 0. 01 mm from the drilling process.A clearance of 0. 05 mm is chosen. And the locating pin has a tolerance of 0. 005 mm, thus ranging in size from 23. 49 – 23. 5 mm. In the worst case scenario of a hole with a maximum of 23. 56 mm and a locating pin with a minimum of 23. 49 mm, the potential gap would be 0. 07 mm or a shift of 0. 035 mm up or down the cylinder. This would lead the milling machine to start milling at a point between 16. 765 – 16. 835 mm from the top of the piston. This is within product specification wherein the tolerance is plus/minus 0. 05 mm (16. 75 – 16. 85 mm from the top of the piston).The locations of all the holes and locating pins should have a tolerance of 0. 005 on any direction in order to keep within product specifications. 5. Clamp Selection and Force Calculation For the drilling process, strap clamps are applied on the fixture by using a pair of socket head cap screws on the two sides of the upside-down vee-block. The two socket head cap screws locate the upper vee-block and clamp it to the lower vee-block when holding the work piece piston in place. The diameter of the holes on lower vee-block for screw is 12. 7 mm, thus M12 size socket head cap screws are selected for clamping.The tool force direction of drilling is downward and it has a tool rotation. The strap clamps fasten the upside-down vee-block and the lower vee-block preventing the cylinder from rotational motion and horizontal motion. The tool force can be taken advantage of clamping down the work piece cylinder. According to Spaenaur (2012), the tightening torque of a screw is the product of torque-friction coefficient, nominal screw diameter, and clamping load (T = KDP). The Table 1 has shown that the M12 socket head cap screw has a minimum tensile strength of 160000 pound per inch, and its material is High Carbon Quenched Tempered.In addition, it has a production torque of 125 pound. feet.. Then search this torque data in the re lated Table 2, the clamping force is approximately 13395 pound. For the milling process, the strap clamps are applied by a pair of socket set screws on the two sides of the thin upside-down vee-block. The two socket set screws locate the upper vee-block and clamp it to the lower vee-block when holding the work piece piston in place. The diameter of the holes on lower vee-block for screw is 12. 7 mm, thus M12 size socket set screws are selected for clamping.The table 1 has shown that M12 socket set screw has a minimum tensile strength of 212000 pound per inch, and its material is also High Carbon Quenched Tempered. It has a production torque of 43 pound. feet.. It can be seen in the related table, the clamping force is approximately 4286 pound. For a drilling machine, Pirtini and Lazoglu (2005) has proved that the pressure over the work piece as the cutter moving down into the work piece with same federate remains a constant value, and additional tests have been suggested that the co nstant pressure P(f) (MPa) can be described as a function of feed rate (f) (mm/min).P (f) = 1. 5364f – 103. 06. If the feed rate of the drilling machine is 198 mm/min, then the pressure is 201. 14 MPa. The equation to calculating cutting force is F= P * A. where F is the net force between the measured force and predicted thrust force due to cutting in the thrust direction and A is the contacting area of the cutter at an instant. The force is about 87 kN with the 23. 55 mm diameter drilling hole. For milling machine, we take the piston as an example: Width of cut = 79. 3mm = 3. 122 inch Depth of cut = 19 mm = 0. 748 inch Feed rate = 19. 5 inch/min K† factor =1. 56 MRR = depth of cut x width of cut x feed rate MRR = 3. 122 x 0. 748 x 19. 5 = 45. 54 inch? /min A formula for calculating horsepower (HPC) of the milling cutter is HPC = MRR/K HPC = 45. 54 / 1. 56 = 29. 19 hp The formulas above are from the article ‘A New Milling 101: Milling Forces and Formulas’ ( Brian Hamil, 2011). One metric horsepower can be defined as the power to raise a mass of 75 kilograms against the earth's gravitational force over a distance of one meter in one second. It can be calculated that the tool force is about 21 kN. . Cost Calculation Operation| Part| Rough Volume (m? )| Drilling| Lower vee-block| 0. 00095| | Upper upside-down vee-block| 0. 00051| Milling| Lower vee-block| 0. 00082| | Thin upside-down vee-block| 0. 00023| Total Volume| | 0. 00251| Density = 7225 kg/m? Mass = 18. 13 kg = 39. 97 pound Iron Materials| Casting process| Cast iron cost (USD/lb) without machining| Machining cost(USD/lb)| Gray iron| Green sand| 0. 58 to 0. 61| 0. 07 to 0. 14| | Resin sand| 0. 65 to 0. 69| 0. 07 to 0. 14| | Shell molding| 0. 72 to 0. 76| 0. 07 to 0. 14|Ductile iron| Green sand| 0. 64 to 0. 67| 0. 07 to 0. 14| | Resin sand| 0. 71 to 0. 74| 0. 07 to 0. 14| | Shell molding| 0. 75 to 0. 79| 0. 07 to 0. 14| Gray iron with shell molding machining process is selected for the fixture. Then the total cost for the 4 vee-blocks can be calculated: (0. 74 + 0. 10) x 39. 97 = 35. 57 USD = 32. 81 AUD Items| Description| Quantity| Total Cost (AUD)| Vee-block| –| 4| 32. 81| Socket head cap screw| M12 x 60 High Tensile| 2| 5. 49| Socket set screw| M12 X 60 Grade 14. 9| 2| 3. 13| Bushing| 79 Honda CBX Bronze Swing Arm| 1| 22. 4| Locating pin| 23. 5 mm diameter| 1| 18. 87| Total Cost| | | 83. 24| Thus the total cost for our design is approximately 83. 24 AUD. It should be noted that the selling price of the final product ranges between 100-200 AUD. 7. Conclusion It can thus be concluded that in the manufacture of Sportsman Race Series aluminum slipper pistons (Probe Industries) for Chevrolet LS Series V8 engines, jig and fixture assemblies can be used for the two machining processes (drilling the wrist pin hole and milling the bottom form of the piston).The jigs and fixtures designed were basically assemblies of Vee-Blocks with a bushing for the drilling process and another assembly with a locating pin through the wrist pin hole for the milling process. The tolerances were designed in order to not exceed the tolerances in the product specifications. The clamp forces were found to be sufficient and the cost of the jig and fixture is very small compared to the profit made from the final product. The design furthermore is very simple and is thus easily modified to be integrated in a fast-moving assembly line. Therefore it can be concluded that the jig and fixture designs are appropriate. . References Hamil, B. (2011) ‘A New Milling 101: Milling Forces and Formulas’ http://www. mmsonline. com/articles/a-new-milling-101-milling-forces-and-formulas. Pirtini, M. & Lazoglu, I. (2005) Forces and hole quality in drilling International Journal of Machine Tools & Manufacture 45 (2005) 1271–1281. Spaenaur (2012) ‘Suggested Tightening Torque1 Values to Produce Corresponding Bolt Clamping Loads’. http://www. spaena ur. com/pdf/sectionD/D48. pdf 9. Appendix Table 1 http://www. torqwrench. com/Info/fasteners. php Table 2 http://www. torqwrench. com/Info/fasteners. php

Thursday, August 15, 2019

Plate Tectonics Theory Essay

‘Evaluate how plate tectonics theory helps our understanding of the distribution of seismic and volcanic events’ In 1912, Alfred Wegener published his theory that a single super continent named Pangaea once existed about 300 million years ago. He proposed that Pangaea then later split into two continents of Laurasia in the north and Gondwanaland in the south and that today’s continents were the result of further splitting of these two land masses. Where the plates split are known as plate boundaries. Wegener’s theory of continental drift was supported by both geological and biological evidence that these areas were once joined. The geological evidence included the rock sequences in Northern Scotland closely agreeing with those found in East Canada, indicating that they were laid down under the same conditions in one location as well as the obvious jig saw fitting appearance of today’s continents, in particular, the bulge of south America fitting into the indent below west Africa. The biological evidence comprised of fossil findings linking different continents. Fossil brachiopods found in Indian limestones were comparable with similar fossils in Australia and the fossil remains of Mesosaurus’ were found in both South America and southern Africa. It is unlikely that the same reptile could have developed in both areas or that it could have migrated across the Atlantic. Despite the evidence, Wegener’s theory was unable to explain how continental movement had occurred. However from the 1940’s additional evidence accumulated after the discovery of the mid-Atlantic ridge and huge oceanic trenches. Examination of the ocean crust either side of the mid-Atlantic ridge suggested that sea-floor spreading was occurring. Magnetic surveys of the ocean floor in the 1950’s, showed regular patterns of paleomagnetic striping surrounding the ridges. It was discovered that when lava erupts on the ocean floor, magnetic domains within iron rich minerals in the lava are aligned with the magnetic field of the earth. This fixes as the lava cools and records the earths polarity at the time of their cooling. As the polarity of the earth reverses every 400,000 years, bands of normal and reversed polarity rocks are mirrored on either side of the mid ocean ridges, suggesting that new rocks are being added equally on either side. Surveys also established the age of the rocks and found young ages for places on or near the ridges and much older ages for rock nearer to the continental masses, demonstrating that older crust is continually being pushed aside by  new crust. The discovery of sea floor spreading led to the assumption that the earth must be getting bigger however this was not the case and the discovery of oceanic trenches allowed for the conclusion that plates must be being destroyed at different boundaries to accommodate the increase in their size at mid-oceanic ridges. Hot spots around the core of the earth generate thermal convection currents within the mantle which cause magma to rise towards the crust and then spread before cooling and sinking. This circulation of magma is the driving force of plate movement. This movement has an effect on all the plates determining their type of boundary each with their own features and resulting volcanic and seismic events. Divergent boundaries occur along spreading centers where plates are moving apart and new crust is created by magma pushing up from the mantle resulting in oceanic ridges and rift valleys. Where two oceanic plates are moving apart they produce mid oceanic ridges with their form influenced by the rate at which the plates separate. Volcanic activity occurs along the ridge forming submarine volcanoes which sometimes rise above sea level accommodating fairly gentle sides and frequently gentle eruptions. An example of this is located in Surtsey, to the south of Iceland, and Iceland itself. As new crust forms and spreads, transform faults occur at right angles to the plate boundary due to shearing pressure. The parts of the spreading plates on either side of these fault lines may move at different rates causing shallow focus earthquakes. Where two continental plates are spreading they produce rift valleys. The brittle crust fractures at sections as it moves apart causing a normal fault where hanging wall falls down relative to the foot wall due to tensional stress. A feature of a rift valley is known as a ‘graben’ which forms when a block of rock falls between two faults and creates the valley floor and also a ‘horst’ which is formed when a block of rock is pushed up between two faults. This area is associated with volcanic activity as the crust is much thinner than in neighbouring areas. Convergent plate boundaries occur when two plates are moving towards each other. Where oceanic and continental crusts meet, the denser oceanic crust is forced under the lighter continental plate known as subduction. The down warping of the oceanic plate forms a very deep ocean trench and the continental plate edge is affected by the reverse fault lines that cause folding of the plate to produce uplifted rock that forms Fold Mountains. As  the oceanic crust descends, the inc rease in pressure can trigger major earthquakes along the line of the sub ducting plate. As it descends further the surroundings become hotter and additional heat from the friction causes the rock to melt in the benioff zone which begins to rise as plutons of magma. When they reach the surface they form composite explosive volcanoes. Eruptions can also occur offshore producing volcanic islands referred to as island arcs. Where two types of the same plate meet they create collision zones by which the compression of the two plates results in the folding of the plate to form Fold Mountains. As there is little subduction, there is no volcanic activity however the movement of plates can trigger shallow-focus earthquakes. Conservative plate boundaries occur when two crustal plates slide past each other and the movement of the plates is parallel to the plate boundary. The movement of the plates creates stresses between the plate edges and as they rub past each other the release of friction triggers shallow focus earthquakes. However as there is no subduction, there is no volcanic activity. The best known example of a conservative boundary is the San Andreas Fault in California, where the pacific and North American plates move parallel to each other. Volcanic activity that does not occur along any plate boundary can be the result of many a fault lines and hot spots beneath the crust. Alfred Wegener’s theory allowed us to gain insight into the potential creation of our tectonic plates and their boundaries. The evidence provided by wegener’s theory and the record of paleo-magnetism upon the ocean floor supported the idea that the tectonic plates are moving. Supported by the theory of convection currents, the movement of these plates helps our understanding of the distribution of seismic and volcanic events by allowing us to identify varying plate boundaries that create different features and as a result cause these events. This explains their distribution, as events such as these are located in areas above plate boundaries, apart from the odd one which can occur above many a fault lines or hot spots caused by the movement of plates.

Wednesday, August 14, 2019

Generational Poverty

Generational poverty is an unfortunate issue which affects individuals, families, and cultures all over the world. Generational poverty is considered a very complex problem due to the length of time and ways it affects certain families as an entirety. The severity of this issue makes it extremely difficult to find any resolutions in improving this epidemic. If a family is experiencing generational poverty, they have had to live in poverty for a minimum of two generations.According to Cleveland, â€Å"It is important to recognize this time factor to be able to separate it from â€Å"situational poverty,† characteristically understood as a lack of resources due to particular sets of events, i. e. a death, chronic illness, divorce, etc. ,† (n. d. ). Almost every family and individual decision is made for the present. Individuals are not taught to think ahead and plan for their future. This is a trending factor in the difficulty in overcoming generational poverty.Members wh om belong to generational poverty have a sense of entitlement from society. Individuals have a constant defense mechanism to society as a whole. The most significant aspect to families suffering from generational poverty is that the â€Å"momma† is the central figure and focus to the family. The mom is what feels safe to the family. She is the ultimate caregiver to individuals in her family and to her house. Even after her children have grown into adults, both the mother and children have a difficult time with the child becoming independent.Love is the center of â€Å"momma’s† home. The male figure in generational poverty is responsible for the manual labor and will fight for their family. Although they display a rough outer layer, they still show a great love for the members in their family. Even though there is a constant, huge amount of love, most communication within the family maintains in a nonverbal form. Overcoming generational poverty can be a challengi ng task. There are several key factors when considering on improving the poverty status.Some of these factors include: Education is key in getting out and staying out of generational poverty, being in poverty is rarely about a lack of intelligence or ability, individuals stay in poverty because they do not see â€Å"choice†, or if they do, they do not know how to access proper resources or people to get them to the point of actually â€Å"choosing† to organize themselves, complete assignments, behave respectfully, plan for the future, and communicate in conventional register (Cleveland, n.d. ).Once a child is born into generational poverty, schools are one of the few places where they are exposed to certain choices and rules of how a higher class lives. This also allows the child access to resources and people who want to assist in the child rising from poverty. There are specific characteristics displayed in those suffering from generational poverty, which contribute to the difficulty in overcoming it. One of these characteristics is the â€Å"working memory†.â€Å"Neuroscientists discovered that the working memories of children raised in poverty are much smaller compared to those in middle-class,† (Pinoy, 2009). An individual’s brain capacity is a crucial part of their development. If a child is raised in a stressful household, the stress causes a limited supply of new nerve cells in the brain and memory. This can make it very difficult for the child to solve problems, read and properly communicate. The most effective way to begin overcoming generational poverty is for society to have a clear understanding of the complexity of this issue.Women face many unique challenges in the different stages of poverty life. Although, many issues that trap women and girls in generational poverty can be alleviated by a good education. Job prospects multiply with every level of school completed; better jobs bring more income and, consequen tly, more options for housing, transportation, child-care and healthcare. But, it is challenging for a woman to secure a good education due to the several setbacks. A woman in poverty does to have the ability or access to pay for necessary education for either her or her child(ren).A woman in poverty is consumed with the hours she spends working to care for the home and kids and feels this is the number one priority. It is also normal for the women to not have access to reliable transportation. According to Knight, â€Å"For a girl who seems to be making her way up the ladder out of generational poverty, pregnancy can be an enormous setback,† (2012). Mental health is even more likely to be neglected. The research shows that starting early by teaching girls life skills, such as financial  planning and goal setting, can reduce stress and increase self-esteem.Girls who live with hope and support are more likely to feel that they have inherent value and don’t have to dep end on others – including boys – for validation. In order to improve the challenges that women in poverty face, it is imperative for society to offer programs and convenience to teach these women on how to improve their life quality. Mentors should be available to provide services on sharing examples and how positive goals can be accomplished by taking the necessary steps.I have learned a great deal of information after viewing the informational videos and reading all the material on generational poverty. It has definitely changed my perspective on how I approach this special population. As most of the general population, stereotyping is a part of my daily life. I never truly understood the depth of the generational poverty issues that are present. I have learned that not only is there a lack of school environment education, but individuals suffering from generational poverty need educated on how to â€Å"properly† live life each day in order to obtain goals.I h ave also learned these families can love more than your average family. They have a very strong bond between the members within their family. While love is important and necessary, they also have a misperception of life goals. The implications of this destructive cycle are the reasons generational poverty continues to be an issue. It not only affects individuals, it affects the family structure for many generations. Society as a whole needs to determine more effective ways to break it.