Monday, September 30, 2019

Piracy in Somalia and Its International Implications

PIRACY IN SOMALIA AND ITS INTERNATIONAL IMPLICATIONS In the past few years, pirate attacks off the coast of Somalia have received a great deal of public attention. According to the London-based International Maritime Bureau, there has been an â€Å"unprecedented increase† in Somali pirate activity in the first 9 months of 2009. Until September this year 147 incidents were reported off the Somali coast and in the Gulf of Aden (separating Somalia and Yemen), compared with 63 for the same period last year. A total of 533 crew members have been taken hostage in 2009, out of which about 200 hostages are still being held by Somali pirates. I have chosen the topic of piracy for my essay as I think that in the context of the present world economy crisis it is a current problem which might affect all the participants of the global economy and it needs an urgent solution. In the first part of my essay I am going to present some data to demonstrate the importance of the problem, then I will focus on the background of the issue and present the different factors which have led to the appearance of piracy. After a detailed description of the pirates and their way of operation I will move on to presenting of the interests of the international community and the policies, strategies and instruments they have used to deal with the issue. At the end of my paper I will draw some conclusions and make a few suggestions for the future. Piracy has been a problem in Somali waters for at least ten years. However, the number of attempted and successful attacks has risen over the last three years. As the hijackings have increased in number, they have also become more sophisticated. The pirates are now able to capture larger targets as well. On September 25 2008, Somali pirates captured the MV Faina, a Ukrainian ship transporting weapons to Kenya. This was followed one month later by the hijacking of the MV Sirius Star, the largest ship ever captured by pirates. The Saudi-owned supertanker was carrying about 2 billion barrels of crude oil, worth about $100 million. The ship was finally released on January 9 for a $3 million ransom. The series of hijackings has continued in 2009 too. It seems that this year the pirates have shifted from the Gulf of Aden, where dozens of ships were attacked in 2008 but which is now heavily patrolled, to the ocean between the African mainland and the Seychelles islands. In October 2009 Somali pirates captured a Chinese bulk carrier, carrying 25 Chinese crew members. In November they have seized a US tanker carrying $20 million of crude oil, which is considered the second-largest ship ever hijacked by pirates. The tankers 30-member crew was also kidnapped. In the same month, 9 pirates hijacked the Greek-owned tanker Maran Centaurus carrying 275,000 metric tons of Saudi Arabian crude oil and have taken it to a pirate port along the coast, where they typically hold the boats for ransom. The 300,000-tonne ship was hijacked about 1,300 km from the coast of Somalia and there were 28 crew members on board which are all held hostages. According to the IBM, in October and November alone, 38 ships have been attacked and 10 hijacked. There are several factors which have made Somalia the perfect environment for piracy, which I am going to present below. First of all, if we want understand why piracy works in Somalia, we have to know something about the geography and history of the country. Officially called the Republic of Somalia, Somalia is a country situated in the Horn of Africa, bordered by  Djibouti  to the northwest,  Kenya  to the southwest, the  Gulf of Aden  with  Yemen  to the north, the  Indian Ocean  to the east, and Ethiopia  to the west. Due to its strategic location, in the past the country was an important centre of commerce. Even today, about 16,000 ships pass through the Gulf of Aden each year, carrying oil from the Middle East and goods from Asia to Europe and North America, so we can say that one of the most important trade routes of the world can be found in this area. In addition, the long, isolated, sandy beaches of the country are also advantageous for pirates to operate. Another factor which helps piracy to flourish is the political anarchy which still rules in Somalia. For almost 20 years, the country has endured political chaos and bloodshed. The  Somali Civil, which began in 1991 as a revolution against the repressive regime of Siad Barre, has caused instability throughout the country. The northern parts of the country declared their independence, although it was neither recognized by the central government, nor by the United Nations. Subsequent fighting among rival warlords resulted in the killing, dislocation, and starvation of thousands of Somalis. Since 1991, 350,000-1,000,000 Somalis have died because of the conflict. Hatred and lack of trust among the landlords and their clans has prevented the organisation of a functioning central government. From  2006-2009 Ethiopia  was also involved in the conflict. In January 2009, Ethiopian soldiers withdrew from Somalia, leaving behind an  African Union  contingent of peacekeepers to help the fragile coalition government and its troops enforce their authority. Following Ethiopia's withdrawal from Somalia, the southern half of the country fell into the hands of radical Islamist   rebels, who still control a big part of the country. The political situation is still chaotic in Somalia. The present government, led by Sheikh Sharif Sheikh Ahmed is the 16th administration to „govern† the country since the collapse of the Barre regime. Order still hasn’t been restored, Somalia is governed by anarchy. Because of the lack of an effective central government and national economy, Somalia is still one of the world’s poorest countries, where the estimated GDP is around $600 per year. According to the World Bank, in 2008 73% of the country’s population lived on a daily income below $2. The country’s 10 million people are starving, and they would hardly survive without the food aid provided by the developed countries. In a country where survival is at stake, it is no surprise that piracy has become a fast and easy way to make money and it could develop into a frightening business. To sum up, we can say that Somalia’s chaotic political situation, the lack of an effective central government, the poor state of the economy and poverty have all created an environment which was perfect for piracy to appear. But who are these â€Å"heroes† and how do they operate? In most people’s minds, the image of piracy is associated with characters like Jack Sparrow or Captain Cook. Pirates are often seen as rebellious young men who are victims of the society, but have the courage to stand up for themselves and create a different way of working on the seas. Actually, there is some truth in this kind of perception. According to Eric Hobsbawm, a British historian, â€Å"social bandits† are â€Å"outlaws, drawing on community support, using criminal methods to challenge the present hierarchy of power and wealth. † Most of the Somali pirates are 20-35 years old and come from the region of Puntland, a semi-autonomous region in northeastern Somalia. It is estimated that there are at least five pirate gangs and more thousands armed men. A BBC report divided them into three main categories: local Somali fishermen (the â€Å"brains† of the operations because of their skills and knowledge of the sea); ex-militiamen (used as the â€Å"muscle†) and technical experts who are able to use electrical equipment, such as GPS devices at a professional level. It is a fact that since the country’s collapse in 1991, there has been a great amount of illegal fishing practised by a lot of countries along the Somali coast. During the regime of Siad Barre (1986-1992) Somalia received aid from several countries to develop its fishing industry. Local fishermen had fixed prices for their catch and the fish was exported because of low demand for seafood in Somalia. However, after the fall of the Barre regime, due to the Somali Civil War the income from fishing decreased. Traditional coastal fishing became difficult, because foreign trawlers started fishing illegally along the Somali coast and depleted the fish stocks. Local fishermen became desperate. They started to band together and were determined to protect their resources. They started attacking foreign trawlers, the crew of which soon fought back with heavy weapons. As a result, fishermen turned to other types of commercial ships and soon discovered that piracy was an easy way to make money. At the moment, piracy is Somalia’s most â€Å"lucrative business†: ship owners are willing to pay huge amounts of money for the release of their hijacked vessels. In addition to this, starting with the early 1990s, Somalia’s long, remote coastline has been used as a dump site for dangerous toxic waste from a lot of European and Asian companies. The European Green party presented before the press and the European Parliament copies of contracts signed by two European companies – an Italian-Swiss and an Italian firm – and representatives of warlords, to accept 10 million tones of toxic waste in exchange for $80 million. For European companies this is a very cheap way of getting rid of their waste: while waste disposal costs in Europe are about $1,000 a tonne, this way it only costs them $2,50 a tonne. The effects of this dumping are already visible in Somalia. According to a report by the UN Environment Programme, there is an extremely high number of cases of respiratory infections, mouth ulcers and bleeding and unusual skin infections among the inhabitants of the area – diseases related to radiation sickness. It is clear that this situation represents a very serious environmental risk not only to Somalia, but to the whole eastern Africa region. Many of the pirates call themselves the Somali â€Å"coast guard†, claiming that their aim is to defend their communities from overfishing and to protect the coastline from toxic dumping of nuclear waste by foreign ships. In an interview one of the pirate leaders explained: â€Å"We don’t consider ourselves sea bandits. We consider sea bandits those who illegally fish and dump in our seas†. The problem of overfishing is still a very serious problem is Somalia. It is estimated that Europeans and Asians poach around $300 million worth fish from Somali waters. On the other hand, Somali pirates collect about $100 million yearly from ransoms. This, according to Peter Lehr, a Somalia piracy expert, can be seen as a â€Å"resource swap†. Of course, a great number of pirates are only taking part in these operations for the money, and their families which they can feed this way. As one of them, nicknamed Milk Sucker says: â€Å"Sometimes doing a bad thing is the only way to improve the situation for yourself and the people you love†. Some of the pirates can’t even swim, their only task is to shoot straight. A lot of young Somalis take part only in a couple of operations, hoping to make enough money to move to the West or maybe to persuade an ethnic Somali woman with a EU passport to marry them and move to the UK. As for the techniques used by the pirates, we can notice that they are getting more sophisticated and more effective. They are using the latest high-tech equipment, like GPS, MANPADS (Man Portable Air Defence Systems), RPGs and satellite phones and they are well-armed with rocket-propelled grenades and AK-47s. They usually operate using small skiffs with powerful outboard engines, but now they regularly use â€Å"mother ships† to increase their range. These â€Å"mother ships† take them into the shipping lanes, several hundred miles offshore. Then they launch small speedboats to haul themselves up onto the deck of a ship. They can often seize a ship without firing a shot. After capturing it, they sail the hijacked ship to the Somali pirate hub town, Eyl and take the hostages ashore where they are well-looked after until ransom is paid. It is reported that the pirates never harm their prisoners; they behave like â€Å"perfect gentlemen† with them. They even hire caterers on the Somali coast to cook pasta, grilled fish and roasted meat, which western hostages might like. Once ransom is paid, they release ships good humour. According to the Kenyan foreign minister, in 2008 pirates have received about $150 million in ransom, which is used to fund future operations. In a recent startling Reuters report we can read that the pirates have started to make the money to work for them, setting up a stock exchange â€Å"that has drawn financiers from the Somali Diaspora and other nations. † The bandits' bourse is a small building in the once-small fishing village of Haradheere, about 250 miles northeast of Mogadishu, which has developed into a luxury town by now. As a former pirate named Mohammed puts it, â€Å"The shares are open to all and everybody can take part, whether personally at sea or on land by providing cash, weapons or useful materials †¦ we've made piracy a community activity. â€Å" Unfortunately, it has become clear that the activity of pirates is linked to warlords on shore. After seeing the profitability of the business, these leaders started to facilitate pirate activities, sharing the profit with the pirates. These â€Å"Godfathers† and clan leaders are closely related to Somalia’s president in Mogadishu, Abdullahi Yusuf, who also originates from Puntland. Estimates are that at least six ministers in the Puntland government are involved with the pirates. The only group which is publicly against piracy is the militant Al-Shabaab, a Salafist group founded this decade as a militia attached to the Islamic Court. They say that such crimes are forbidden under the Islamic law. However, according some reports, militant Islamist groups also get their share of the profit. The pirates involvement with these organisations is making the situation even more alarming, because all the financial help given by the West to the Somali authorities to put an end to piracy might just help it to flourish. All in all, it is clear that piracy is not a problem that the fragile Somali government can solve alone and international help is needed. How does all this affect the international community? Besides enforcing international law, there are several other reasons to stop pirate activities. The first is Somalia itself. The country needs about 200 tonnes of food aid a year which is mostly delivered by sea. Without the naval escorts and the regular delivery of aid, Somalia’s food stocks are seriously threatened, so ensuring the safe delivery of food aid should be a number one priority for the international community. Stopping piracy may also reduce the money available for weapons, so indirectly it can lead to the end of the internal war. Piracy has a very distressing effect on international trade as well. In addition to the growing ransom, companies whose cargos do not reach their destinations, lose money. As a result, there is a growth of insurance for all ships which need to pass through the Gulf of Aden. The constant danger of pirate attacks has already made some shipping companies to choose a longer, but safer route, around the Cape of Good Hope, as it happened in the case of AP Moller-Maersk, one of Europe’s largest shipping companies after the hijacking of Sirius Star. The extra weeks of travel and fuel can lead to the cost of transporting goods, which is a really serious concern now, at the time of a global economic crisis. Another reason is related to the environment. Pirate attacks can cause major oil spills in a very sensitive ecosystem. As pirates become bolder and use more powerful weapons, tankers could be set on fire or sunk, which can result in an environmental catastrophe, destroying marine and bird life for many years to come. Last, but not least, there is a risk that the pirates themselves can become agents of terrorism. There are assumptions according to which pirates are connected to the Al-Shabaab movement, which is believed to have links to Al-Qa’eda. According to some reports, Al-Qa’eda militants from Iraq have chosen Somalia as a new base from which to launch attacks. Terrorism at sea can take many forms, for example direct attacks on ships, hostage dramas, but also hijacked ships used as potential weapons. Terrorist networks can use the financial funds from piracy to fund their operations worldwide. It is obvious, that even if there is little chance for the worst scenario, it is best to prevent it while we can. The international community has recognized that enhanced international efforts are necessary in order to reduce the number of attacks. The growing cases of piracy have focused the world's attention on Somalia and have shown that the crisis going on in a fragmented state is spilling out of its borders. The military response to piracy has shown that countries which haven’t been able to cooperate with each other can unite their forces for a common cause. A maritime conference was also held in Mombassa, where they discussed the problem of piracy and tried to give regional and world governments recommendations to deal with the danger. In January 2009, an important regional agreement was adopted in Djibouti by States in the region, at a meeting organised by IMO. The Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden recognized the extent of the problem of piracy and armed robbery against ships in the region and the states signing it declared their intention to co-operate, in a way consistent with international law, in the repression of piracy and armed robbery against ships. Most countries have preferred prevention: various navies have sent war-ships into the area to escort commercial vessels. At the beginning, this way of defense was more individual than collective, but the persistence of the attacks has led to the development of a collective security system. NATO got the task of escorting convoys transporting the humanitarian aid of the World Food Programme towards Somalia. Once they were in the Gulf of Aden, they also protected other merchants ships, by their presence. Later NATO handed the job to Operation Atlanta, the first common maritime mission by the European Union. Military counter-piracy operations are performed by vessels from the Combined Task Force 150, a multinational coalition  naval  task force   in charge of monitoring and inspecting a range of security issues, such as drug smuggling and weapons trafficking, as well as piracy. Several countries, including India, Russia, China, Norway, Australia, France, Greece, Turkey, Portugal, Denmark, the Netherlands, South Korea, Malaysia and even Japan chose to join the coalition and send warships to the Gulf of Aden. In January 2009 the US navy established a new multi-national naval force to confront piracy off the Somali coast. The new unit was called Combined Task Force 151and it was a spinoff of the existing Task Force 150 in the region. This section of the coalition forces was aimed at focusing exclusively on pirate groups (leaving Combined Task Force 150 to focus on other destabilizing activities, such as drug smuggling and weapons trafficking). It was hoped that by designating a new unit to combating piracy in Somalia, anti-piracy efforts would be more successful. Unfortunately, this effort is having only a limited impact. Although some pirates are scared off by the sight of military ships and helicopters, coalition warships are often in the wrong place at the wrong time. In addition, pirates are flexible and change their tactics easily: data from the Maritime Bureau shows that at present they are conducting their operations further out in the Indian Ocean. Besides, this is a very costly solution which is difficult to support in the long term. After the hijacking of an Egyptian ship and a huge Saudi supertanker, the Arab League organized a summit for countries overlooking the Red Sea, with the participation of Egypt, Saudi Arabia, Sudan, Somalia, Jordan, Djibouti and Yemen. At the summit the participant states discussed several solutions for the problem of piracy, suggesting different routes and looking for a safer passageway for ships. They might also assist the current NATO anti-piracy efforts together with other nations. However, we shouldn’t forget that the Arab League has long tried to draw Somalia more closely to the Arab world. It has made a financial support for the Transitional Federal Government, conditional on its entering negotiations with Al-Shabaab, intending to spread Islamist influence in the area. In June 2008 the United Nations Security Council passed a declaration authorizing nations that have the agreement of the Transitional Federal Government to enter Somali territorial waters to hunt pirates. In 2008 the Security Council adopted two resolutions, 1846 and 1851 allowing for the first time international land and sea occupations of Somali territories in the pursuit of pirates. These resolutions extended the power of the states and lead to greater coordination of their efforts. After the Council resolution 1851, the Contact Group on Piracy off the Coast of Somalia was established on 14 January 2009 to facilitate and coordinate actions among states and organizations to deal with piracy. At the moment 46 States and seven international organizations take part in the Contact Group. Through its four working groups, the Contact Group addresses specific issues related to military and operational coordination, legal issues, shipping industry awareness and public and diplomatic information. UNODC (the United Nations Office on Drugs and Crime) participates in the Contact Group and its Working Group on Military and Operational Coordination, Information Sharing and Capability-Building. UNODC acts as secretariat to Working Group on Judicial Issues, to which it has provided various forms of support. UNODC has prepared an analysis of the legal and practical challenges involved in prosecuting suspected pirates and is gathering nformation on relevant national legal systems, including those of coastal States. In spite of the fact that laws to combat piracy at sea exist, a lot of states do not seem to use them in practice. Only France has chosen to combat piracy directly. The first case was the seizing of a yacht in April 2008, which started with negotiations for the release of 30 hostages and followed by the capture of six pirates in Somali territory. The second case took place in September 2008 to free a couple taken hostages. This action also led to the arrest of six pirates, who are awaiting trial before a French court. Britain and some other countries have found a superficial and convenient way of treating the pirates: they have negotiated a treaty with Kenya, according to which all those suspected of piracy are handed over to that country. A few months later other countries followed Britain’s example, negotiating similar agreements. These agreements are a useful step, but they do not solve the problem. The Kenyan prison system is in terrible condition, corruption is high, there are strong delays in the call of trials and legal aid is very limited. It is a paradox indeed that states which are entitled to prosecute the arrested pirates delegate this right to a country which is unable to assure a fair trial to these criminals. In spite of the united efforts of different nations, it has become clear that the piracy problem cannot be solved at sea, because it is rooted on the shore, in the ongoing conflict and political instability of the country. As Ban Ki-Moon, the Secretary General of the United Nations expressed at an international donors’ conference: â€Å"Piracy is a symptom of anarchy and insecurity on the ground. (†¦) More security on the ground will make less piracy on the seas† Any lasting solution to the problem has to involve ensuring stability, development and an effective criminal justice system in Somalia. If the states had invested the time and resources they now spend to stop piracy in reconstructing the Somali society and economy, they probably wouldn’t have to cope with these problems. However, there are always new opportunities that shouldn’t be wasted. Martin Murphy in his article â€Å"Somali Piracy: not just a Naval Problem† claims that the highest costs of piracy to Somalia and the international community are not economic, but political. As I mentioned earlier, it seems that almost all layers of political life in Somalia are involved in piracy, including the Islamist groups. Islamism is getting stronger and stronger in Somalia and it can soon get hold of the entire country. The Al-Shabaab movement has a clear intention to use Somalia as a base for spreading Islamist influence in the region. If this tendency continues, a worst possible outcome would be an Islamist government, which is strong enough to control piracy, but also strong enough to make Somalia safe for violent Islamist groups. So, what can be done to stop, or at least to decrease piracy in the Horn of Africa? Somalia is a clan-based society. Therefore, a possible solution would be to deal with the sub-state entities in order to create a unitary state in the future. In these negotiations the coalition should clearly commit itself to repress piracy in return for allied political and economic support. This way it would be possible to cut off all the political players in Somalia from their external sources of weapons and thus pirates would be trapped between more effective land-base policy by the Somalis and maritime policy by coalition member navies and soon they would have no place to hide. Recent efforts have shown that there is a will to act together. We can only hope that the states will find a way to deal effectively with the problem before it is too late. Links, references: Roger Middleton: Piracy in Somalia. Africa Programme, October 2008 http://www. chathamhouse. org. uk/files/12203_1008piracysomalia. df Marina Chiarugi  and  Daniele Archibugi: Piracy challenges global governance. Open Democracy,  9 April 2009 http://www. opendemocracy. net/article/piracy-challenges-global-governance George Grant: Somali pirates can't be beaten at sea. The Guardian, 18 November 2009 http://www. guardian. co. uk/commentisfree/2009/nov/18/somali-pirates-ransom-puntland Galrahn: Somalia Piracy – A Backgrounder April 8, 2009 http://www. informationdissemination. net/2009/04/somalia-piracy-backgrounder. html Rubrick Biegon: Somali Piracy and the International Response. FPIF (Foreign Policy in Focus) January 29, 2009 http://www. pif. org/fpiftxt/5827 Georg-Sebastian Holzer: Somalia: piracy and politics. Open Democracy, 24 November 2008 http://www. opendemocracy. net/article/somalia-piracy-and-politics Johann Hari: You Are Being Lied to About Pirates. The Huffington Post, December 2009 http://www. huffingtonpost. com/johann-hari/you-are-being-lied-to-abo_b_155147. html Can Somali pirates be defeated? BBC News, 20 November 2009 http://news. bbc. co. uk/2/hi/8371139. stm Sam Gustin: Bandit Bourse? Somali pirates hijack oil tanker, organize ‘stock market' Daily Finance, December 1 2009 http://www. dailyfinance. om/2009/12/01/bandit-bourse-somali-pirates-hijack-oil-tanker-organize-stock/ Martin Murphy: Somali Piracy : not just a naval problem . Centre for Str ategic and Bugetary Assessments, April 16, 2009 http://www. csbaonline. org/4Publications/PubLibrary/B. 20090417. Somali_Piracy/B. 20090417. Somali_Piracy. pdf Piracy in Somalia: Wikipedia, the Free Encyclopedia http://en. wikipedia. org/wiki/Piracy_in_Somalia Aiden Hartley: What I learned from the  Somali pirates. The Spectator, 6 December 2008 http://www. spectator. co. uk/essays/all/3061246/what-i-learned-from-the-somali-pirates. thtml

Sunday, September 29, 2019

Distribution and constiuents of fluids Essay

Constituents of body fluid – The human body consists mostly of water, and is a major constituent to the human body and vital organs; of this 90% include blood plasma, lymph, urine, saliva, digestive juices, bile, cerebrospinal fluid and tissue fluid. Water enables substances to be transported throughout the body, red blood cells for example, as wells as supplying the medium required for metabolic reaction to take place (respiration). Without water the progression of these fluids would not be possible. Water is constantly being transported between the fluid compartments of the body. Water has five main functions in the body, of which includes: ‘Cell life – distribute nutrients to cells i.e. vitamins, minerals and glucose Chemical and metabolic reactions – removal of waste products (toxins) from the organs Transport of nutrients – participates in the breakdown of food Body temperature regulation – water has a large heat capacity that allows it to help limit any changes to an individual’s body temperature in a certain environment. For example the release of heat when the surrounding temperature is higher than body temperature Elimination of waste’ Urea – Urea is an organic molecule made up of carbon, nitrogen, oxygen, and hydrogen. Urea is a common constituent of blood and other various bodily fluids, and is formed from ammonia in the kidney and liver. Ammonia is produced through the breakdown of proteins during tissue metabolism. Metabolic reactions that take place within the body can produce a surplus of amino acids of which can be converted into the waste product otherwise known  as urea through the process of deamination in the liver. Proteins obtained through an individual’s diet are broken down into amino acids. The excess amino acids made during this process are unable to be stored in the body as they can become toxic; therefore they would then have to be converted into a less toxic urea before ultimately being removed as a component of urine. Acids, bases and salt – Acids are a substance that has a pH less than 7. There are two different types of acid: Weak acid – An organic compound with a minimal amount of dissociated molecules Strong acid – An organic compound with a large amount of dissociated molecules Acids are a corrosive substance with a pH less than 7. Acidity is caused by a high concentration of hydrogen ions. Bases are a substance with a pH higher than 7, and have a high concentration of hydroxyl ions. Bases can react with acids in order to neutralise them in order to form salt and water. Bases are normally metal oxides or metal hydroxides. Sodium hydroxide for example is a base. Acids react with reactive metals in order to make a salt. Salts are a compound formed by the neutralisation of an acid by a base, for example metal oxide. This is a result of hydrogen atoms in an acid being replaced by positive ions. Bases that have are able to dissolve into water are known as alkalis. Sodium hydroxide is an alkali as it dissolves in water, copper oxide cannot dissolve water therefore is not an alkali. Hydrochloric acid is produced in the stomach, consisting of chloride and hydrogen. Carbonic acid is produced in red blood cells consisting of carbon dioxide and water, of which is why demanding exercise can lead to the  increase in the acidity of the individual’s blood. Control of osmosis – Salts are a major constituent of blood, and the levels both inside and outside of the cell, of which can be controlled by ATP. The sodium salts and chloride ions are continuously pumped back out of the cell each time they enter a cell, whereas potassium are pumped back into the cell as they leave a cell. The movement of salts enable the individual in assisting osmosis through the cell membrane. Isotonic Osmotic pressure outside the cell is equal to that inside of the cell. Water moving into and out of the cell is the same. Hypotonic Osmotic pressure is lower. Water moving into the cell is greater than that of which is moving out of the cell. Hypertonic Osmotic pressure is higher. Water moving out of the cell is greater than that of which is moving into the cell. Role of electrolytes – Electrolytes are compounds that dissociate into ions when they are dissolved in water, thereby causing them to become electrically charged particles, meaning that they have the ability to conduct electrical impulses. The electrical impulses created are what the body needs in order to make muscle cells contract. Electrolytes can become either cations (positively charged) or anions (negatively charged). Essential minerals – Some electrolytes are considered essential minerals, meaning that they are unable to be made within the body and are an essential part of health. The major constituent for a cell is potassium The components of amino acids and proteins Chloride is needed in order to produce hydrochloric acid in the stomach Magnesium of which can be found in bone and teeth, plays a key role in the contraction of muscles as well as an activator for various enzymes. Another component of bone and teeth is phosphorous and calcium, with calcium being required for blood clotting along with aiding in the contraction of muscles. There are trace elements present in the body. These essential minerals are required in only small amounts. The food and fluids consumed by an individual contain mineral salts, which are used to form electrolytes which dissolve in the fluids of the body. Electrolytes can be found in blood, urine, in the fluid contained in the body’s cells, and in the fluid surround the cells. Sodium, calcium, chloride, magnesium, potassium are the most commonly found electrolytes within the body. Electrolytes play a key role in helping the heart, nerves, and muscles to function. They also play role in keeping fluid levels normal in different body compartments. Levels of electrolytes in the body’s fluid compartments are controlled through the movement of electrolytes moving into/ out of the compartments. The kidneys have a hand in filtering electrolytes from the blood in order to keep the levels constant. Hormones such as the antidiuretic hormone and parathyroid hormone for example, help to regulate electrolyte balance. Acid-base balance – In order to function properly the blood needs the right balance between acid and basic (alkaline) compounds. This is known as acid-base balance. The kidneys and lungs within the body work in order to maintain acid-base balance; the slightest of variations from its normal range can have detrimental effects to the body’s vital organs. Acid and alkaline levels are measured on a pH scale. Increase in acidity can  cause pH levels to fall, whereas an increase in alkaline levels causes pH levels to rise. pH – pH measures the amount of hydrogen ions that are in a given solution. The pH scale ranges from the values of 1 to 14. Number 7 in the scale is known as neutral, water for example is a neutral substance. From 1 to 7, the lower the number on the scale the stronger the acid; whereas from 7 to 14 the higher the number the stronger the base. Importance of maintaining hydrogen concentration in body fluid – Hydrogen ion concentration is important to the structure and function of living systems. Slight changes can cause changes in ‘larger molecules and molecular complexes composing organisms.’ Buffer systems are put in place in order to maintain and stabilise the pH of body fluids. Phosphate buffers – These chemical buffers are essential in order to maintain normal hydrogen concentration in intracellular fluids, as their concentration inside the cells are many times greater than the concentration of the bicarbonate buffers. Metabolic activities are controlled by enzymes, of which can also be known as organic catalysts. Protein buffers – Are similar to the composition of phosphate buffers, as they include haemoglobin, are especially important within the cells. Chemical buffers of the body fluids are the first line of defence to prevent any changes in hydrogen ion concentration; any acid/base added to the body fluids immediately react with the buffers in order to prevent any changes in acid-base balance. Buffer systems – Chemical buffers are in place in order to resist changes in pH levels, and are the body’s first line of defence. A buffer solution is a mixture of a weak acid and its conjugate base or a weak base and its conjugate acid; and is used to stabilize the pH of a liquid. The ability of an acid-base mixture  resist sudden changes in pH is known as buffer action. Tissue cells and vital organs of the body are sensitive to the slightest of changes in the pH environment; and in high concentrations, acids and bases can be highly damaging to living cells. Buffer solutions are put in place as a means of keeping pH at a nearly constant level in various chemical applications. One such buffer solution can be found in the blood. Several buffering agents bind hydrogen ions in order to stop any change in pH. Extracellular buffers include bicarbonate and ammonia, and intracellular buffers include proteins and phosphates. Buffers are in place in order to work against sudden and large changes in the pH of body fluids by Releasing hydrogen ions when the pH increases (acids) Binding hydrogen ions when the pH decreases (bases) There are three main chemical buffer systems in the body: Carbonic acid-bicarbonate buffer system Phosphate buffer system Protein buffer system Solutes – Materials can be transported between the cytoplasm and the outside of the cell; this is known as the active transport process (ATP), whereas the movement of other molecules is known as passive transport which does not require energy. Active transport can be used in order to get the molecules to go against the concentration gradient; this can be done by either facilitated diffusion or osmosis. Passive transport of molecule depends on its ability to be able to pass through the cell membrane, as well as that of the concentration gradient which allows molecules to diffuse from an area of high concentration to an  area of low concentration. Molecules such as gases, lipids and water have the ability to pass through the cell membrane fairly easily. However other molecules such as glucose, amino acids, and ions do not have the same ability. Some of these molecules can enter and leave the cell through the use of facilitated transport, where the molecules can move down the concentration gradient through protein channels in the membrane. This process does not require any form of energy. Role of water in relation to properties – Specific heat capacity – Water has a large heat capacity which aids in limiting any changes in an individual’s body temperature in a warm or cold environment. As a result of the high specific heat capacity of water, its role in temperature regulation is very important. Water enables the body to release heat when the ambient temperature is higher than that of the individual’s body temperature. The body starts to sweat, and the evaporation of water from the skins surface occurs, in order to cool the body down. Surface tension – ‘Surface tension is a contractive tendency of the surface of a liquid that allows it to resist an external force. ‘For example the floating of some objects on the surface of water, even though they are denser than water, some insects however have the ability to run on the water’s surface. The cohesive forces of liquid molecules are responsible for surface tension, and are responsible for many of the behaviours of liquids. In addition, water has adhesive properties, so that the pleural fluid which covers the membrane of the lungs stops them from sticking to the inside of the ribcage. Distribution of water – There are two main fluid compartments in the human body: Intracellular fluid (ICF) Extracellular fluid (ECF) Water is the major solvent of all body fluid compartments. Total body water averages around 60% body weight in young males and 50% of body weight in young adult females. The percentage of body weight that water occupies depends on the amount of adipose tissue (fat) an individual has. The overall water in the body involves water inside of the cells known as intracellular fluid (ICF compartment), found inside the bilayered cell plasma membrane which is around 28 litres, which makes up around 60% to 67% of body water; and the extracellular water located outside of the cells which is around 14 litres makes up the other 33% to 40%. Tissue fluid also known as the intracellular and the interstitial fluid have the majority of the component of the extracellular fluid as it has 11 litres compared to 3 litres of plasma. The lymph has 10% of the tissue fluid that form in the remainders of the plasma. ECF is composed of fluid outside of the cells and consists of three subdivisions: Interstitial compartment Plasma compartment Third space (transcellular fluid) The interstitial compartment is the fluid space which surrounds the cells of a given tissue, and is filled with interstitial fluid. Interstitial fluid allows for the movement of ions, proteins, and nutrients across the cell membrane. The fluid is continuously recollected by the lymphatic channels. Excess fluid in the interstitial compartment causes oedema to develop. Intravascular plasma can be found within the vascular system and makes up a fourth of ECF. The third space is part of the ECF compartment and is otherwise known as transcellular fluid. Examples of third space include: Peritoneal fluid Pleural fluid Cerebrospinal fluid Synovial fluid Renal tubular fluid Intercellular fluid is the main component of extracellular fluid; ‘other components include plasma and transcellular fluid. Intercellular fluid surrounds the body’s cells, and provides a way for delivering materials to the cells, intercellular communication, and removal of metabolic waste. The fluid found in the intercellular spaces are made up of water, amino acids, sugars, fatty acids, coenzymes, hormones, neurotransmitters, salts and cellular products. ‘ Plasma makes up approximately 25% of the body’s total extracellular fluid. Plasma proteins serve several functions, of which include maintaining the proper distribution of water between the blood and tissues; transportation of nutrients, metabolites, and hormones throughout the body, defending against infection etc. Diseases can alter the amount of plasma proteins that are produced and their concentration in the blood. Role of intercellular fluid in homeostasis – In homeostasis, intercellular fluid also known as interstitial and tissue fluid, plays a vital role as the fluid is pushed out of the arterial end of the capillary by the blood pressure, after the blood has been pushed out through the muscular arterioles and capillaries. During this stage carbon dioxide is low. Tissue fluid flows around the cells and in between giving out raw materials through the use of osmosis, facilitated diffusion and diffusion etc. The metabolic waste is passed in the opposite direction to the cells and into the tissue fluid. However if the waste materials were allowed to accumulate, this could ultimately cause disruption and lead to the cells dying before death occurring. References http://www.nestle-waters.com, (2014). Functions of water in human body. [online] Available at: http://www.nestle-waters.com/healthy-hydration/water-fonctions-in-human-body [Accessed 13 Oct. 2014]. Bbc.co.uk, (2014). BBC – GCSE Bitesize: Acids and bases. [online] Available at: http://www.bbc.co.uk/schools/gcsebitesize/science/add_aqa/acids/acidsbasesrev1.shtml [Accessed 13 Oct. 2014]. Biology-online.org, (2014). Intercellular fluid – definition from Biology-Online.org. [online] Available at: http://www.biology-online.org/dictionary/Intercellular_fluid [Accessed 13 Oct. 2014]. Chemical Buffer Systems- Acid-Base Balance. (2014). Boundless. [online] Available at: https://www.boundless.com/physiology/textbooks/boundless-anatomy-and-physiology-textbook/fluids-and-acid-base-balance-26/acid-base-balance-248/chemical-buffer-systems-1217-4810/ [Accessed 13 Oct. 2014]. Healthline.com, (2014). Acid-Base Balance | Definition and Patient Education. [online] Available at: http://www.healthline.com/health/acid-base-balance#Overview1 [Accessed 13 Oct. 2014]. Inkling.com, (2014). Inkling. [online] Available at: https://www.inkling.com/read/medical-physiology-rodney-rhoades-david-bell-4th/chapter-23/fluid-compartments-of-the-body [Accessed 22 Oct. 2014]. Inkling.com, (2014). Inkling. [online] Available at: https://www.inkling.com/read/marks-medical-biochemistry-lieberman-marks-4th/chapter-45/i–plasma-proteins-maintain [Accessed 13 Oct. 2014]. Media.lanecc.edu, (2014). Chemical Buffer Systems and Acid-Base Balance. [online] Available at: http://media.lanecc.edu/users/driscolln/RT127/Softchalk/Acid_Base_Lesson/Acid_Base_Lesson4.html [Accessed 13 Oct. 2014]. Research.vet.upenn.edu, (2014). Milk Urea Nitrogen. [online] Available at: http://research.vet.upenn.edu/DairyPoultrySwine/DairyCattle/MUN/MilkUreaNitrogen/tabid/1596/Default.aspx [Accessed 13 Oct. 2014]. Ensminger, M. and Ensminger, A. (1993). Foods & Nutrition Encyclopedia, Two Volume Set. 2nd ed. CRC Press, 1993, p.4. Cnx.org, (2014). OpenStax CNX. [online] Available at: http://cnx.org/contents/75987407-1137-404b-9a3c-00d115b2dff9@3/Body_Fluids_and_Fluid_Compartm [Accessed 13 Oct. 2014]. Fastbleep.com, (2014). Chemical principles: Properties of water – Biochemistry | Fastbleep. [online] Available at: http://www.fastbleep.com/biology-notes/40/116/1166 [Accessed 13 Oct. 2014]. Howard Perlman, U. (2014). Surface Tension (Water Properties), USGS Water Science School. [online] Water.usgs.gov. Available at: http://water.usgs.gov/edu/surface-tension.html [Accessed 13 Oct. 2014].

Saturday, September 28, 2019

A Problem Of Child Abuse

A Problem Of Child Abuse Children Being Abused Unfortunately child abuse happens to be very common throughout the world. There are many different types of child abuse, and many different reasons for the ongoing abuse. â€Å"Since 1999, the majority of children confirmed to be victims of child maltreatment experienced neglect being at 62.8%, Physical abuse 16.6%, Sexual abuse 9.3%, Emotional/psychological abuse 7.1% , Medical neglect 2.0%, and Other at 14.3%† (Child Abuse and Neglect Statistics). Whether the abuse is mild or severe, it is all abuse and can affect how a person thinks and feels. Many people looks at a family and assume since the family looks kind and put-together, no abuse happens in it. This is very stereotypical. Child abuse can happen in family, whether they look like a â€Å"perfect† family or not. A perfect family is typically looked at a lot differently than a â€Å"bad† family. People associate poor, non-wealthy neighborhoods with crime and child abuse. Well unfortunately, Child abuse is all over the country and not just in poor neighborhoods and families. It is not only based on the particular race, cultural or economic group. Many families hide what is really going on and try to appear as normal as possible. Embarrassment, shame, and pity are very fearful and are commonly used.. Many mistake child abuse as only kidnapping and strangers. In reality, anyone can be a child abuser: Strangers, family, caregivers, family friends, babysitters, etc. Abusers are commonly thought of having been abused during their childhood as well. which can potentially influence them to become abusers when they have children. However there are many adult survivors that want to change and stand for what has happened to th em by using a child who is being abused by protecting them. They know what it is like to have gone through the abuse at such a young age and they sympathize with them. They are usually motivated to help them and typically go into a career path doing so, whether its teaching, therapist, doctors, etc. There is not one single age, race, or gender that associates abuse. â€Å"The victimization rate for girls was 9.7 per 1,000 girls younger than age 18, and the rate for boys was 8.7 per 1,000 boys younger than age 18.† According to the same source, â€Å"In 2010, most victims of child maltreatment were white (44.8%), followed by black (21.9%) and Hispanic (21.4%). Children of multiple races (3.5%), American Indian/Alaska Natives (1.1%), and Asian/Pacific Islanders (1.1%) accounted for a substantially smaller proportion of victims† (Juvenile Offenders and Victims: 2014 National Report). This shows that child abuse is never targeted, sexist, or consistent, it is completely r andom and can happen to anyone. Child abuse is a continuing problem and is impossible to stop throughout the all of the countries. Child abuse comes in many forms; physical maltreatment, sexual molestation or mental abuse. Physical child abuse is a form of non-accidental trauma caused by the perpetrator. Some traumas include, â€Å"punching, beating, kicking, biting, burning or otherwise harming a child† (Child Physical Abuse). This type of maltreatment is the most noticeable form, unlike children being sexually abused. Sexual child abuse may not be as detectable as physical child abuse. When a child is being abused sexually, it is when the abuser touches the children in their private places . Children look up to their adult figures to be trustworthy and role models; this is why kids usually end up following through with the abuse. Another form of child abuse that isnt easily detectable to emotional child abuse. â€Å"Child emotional/psychological abuse is defined as behaviors, speech, and actions of parent s or other caregivers that have a negative mental impact on children† (Child Emotional/Psychological Abuse). You never know what is being said behind closed doors. Child abuse is not just about the broken bones, bruises, cuts, or the physical appearance that is made. Being emotionally abused and neglected is just as dangerous and harmful. It scars the children, but in an abstract way instead of a concrete way. â€Å"The U.S. has one of the worst records among industrialized nations, losing on average between four and seven children every day to child abuse and neglect†(Child Abuse, Domestic Violence Month noted). Emotional abuse is very deep and may affect a child more in the long run, maybe becoming depressed, anti-social, or losing trust in everyone.Mentally and emotionally abused children take a lot of time and help to recover, depending on the degree of abuse they’ve gone through and who that person is individually. â€Å"More than three million reports of child abuse are made in the United States that involve over six million children a year. Nearly 70% of children who die from the abuse are four year or younger. More than 90% of the juvenile sexual victims know their perpetrator in some way†(Child Abuse Statistics). Children who experience child abuse and neglect are more likely to become violent and interact with criminal activities. Child abuse happens because people often tend to believe that abuse is only physically leaving marks, scars, or â€Å"proof† of physical abuse left behind. People are less likely to intervene in more subtle child abuse cases because no physical mark is left. Often more than not, people classify abusers as bad people. Therefore â€Å"only bad people abuse their children†, but that is not always the case. Some abusers are not intentionally harming their children. Some abusers sometimes may think that what they are doing right, because that is the way they were taught, raised how to be and act properly. That is all they know about parenting, because that i what happened to them. Some may just have some mental issues, causing problems for them to be coherent, and initiating a lack of knowledge for parenting. Substance using people can be a problem of causing each form of child abuse. People are taught how to be parents, how to raise a child and how like a role model for the m. Everyone was taught, raised, and have learned differently. Learning how to take care of a child and provide for one is more tedious than learning how to do a household chore such as cleaning the dishes. Child abuse investigations, each year are reported to the Child Abuse Central Index, also known as CACl. These reports are submitted by county welfare and probation departments. The CACI was created by the Legislature in 1965. This was to protect the health and safety of children, mainly for california. Child abuse has many causes including, as a childhood symptom of mental illness in parents, as the culmination of a lifelong experience of violation towards the caregiver, of environmental and social stresses on the family, and the society’s acceptance and promotion of physical violence. In order to select which factors to study, researchers must exclude other factors. Clinicians, facing a variety of distinctive life events, personal characteristics, and unique circumstances of the families and children they serve, not always content with the explanations of the origin or child abuse found in the research literature. Child abuse and child neglect involve a variety of childhood injuries that are believed to be derived from parental acts of omission or commision. Although the prevalence of child abuse is unknown, the concern regarding the consequences of abuse is, for individual and for our society, is universal. A Problem Of Child Abuse A Problem Of Child Abuse Public schools across the Unites States do not know the challenges students face on a daily bases. Most of the conflict between teenagers and their peers are left oblivious. Everyday one point two million students at public schools go home without admitting their problems, caused by bullies, to their parents. Half of these students’ parents are later surprised to find their child deceased by the following week. Bullying is a tremendous problem that definitely needs more attention and public schools are not providing enough of it. In my own opinion, all schools should enforce bullying awareness programs to prevent from suicides, fights, and an uncomfortable environment. To start with, suicides are increasingly becoming more relevant for bullied victims. Majority of those who actually commit suicide did not pursue any help from their school faculty members. Two years ago in my own community Amber Markly took her life due to bullies. From my understanding, reports have said that she was being bullied by the same crowd of people daily. Through the last traumatizing months of her life only two faculty members took mild precautions to control the situation. The lack of awareness with Amber’s problem lead her parents to find their daughter deceased on a nuisance in her closet. Amber would not have taken her own life if greater bullying awareness was practice in schools. It would have taught the faculty and students to become more involved in situations like Ambers in preventing them from worsening. In additions, there are lots of raging fights due to bullying in schools. Fights are progressively acquiring online, through texting and even by physical contact. Having an awareness program will coach students on how to solve their problems without the need to fight. They can seek help from a teacher who can lead them into the right path of controlling a situation. The bullying awareness program can even include peer counselors. These are student counselors that are trained to help other students through their problems. Peer counseling is apart of the awareness program and can decrease the amount of fights taken place at schools substantially. Furthermore, school is becoming a place students are not comfortable with. All students should feel safe and worry free at school by their fellow peers. If schools enforced the bullying awareness program they can create a welcoming place for their students by practicing different activities. One popular activities done at my high school was mix it up day. This was an activity practiced at lunch in which students sat with people they normally would not be seated with. Doing small fun things such as that create an environment where students become comfortable. Soon it can eliminate bullies by creating a school of students that are familiar with each other in a positive manner and not by gossip spread from one person to another. As one can see, enforcing bullying awareness is a key factor to keeping a bully free school ground. Suicides will decrease as educators increase their knowledge of helping learners in need. Fights can be prevented through coaching students on how to control their actions before someone gets hurt. Practicing fun activities creates a place that makes students feel comfortable in their environment. If one school can give it a chance it could be the chain reaction of tomorrow.

Friday, September 27, 2019

The Abolition of Man Essay Example | Topics and Well Written Essays - 500 words - 1

The Abolition of Man - Essay Example 3. The other reason supporting Lewis argument is the fact that most judgment made by humans are built on false assumptions which come from the confusion of thought (Smilde 5). To supplement on this, there is debunk of the human sense of value in which it is highly inconvenient and incurable when engaged in decision making. This is simply because morality is human and humanity is nature and that nature is a thing to rule not to be ruled by (Smilde 5). This means humanity rules over judgment and decision making and not by the truth of the situation. 1. Treat others as you would want them to treat you. This law is meant to promote generalized harmony and safe stay among people within the society. If everybody in the society follows this law cases of discrimination and other crimes would not happen (Stanford 3). The legality of the law is the fact that it allows tit for tat policy where people would fear ill-treating others for them they wouldn’t want to be ill-treated. 2. Do not kill is another law which is ethically and morally appealing to the human race. The value of human life is very important and everybody has to protect and preserve life (Stanford 5). When this law is implemented and followed by everybody, the moral campaign within the society will see unethical characters like murder, abortion and self-death will cease as everybody will value life (Stanford 3). Adultery and prostitution illegality. This is another law that is based on promoting socially ethical character among people in the community. When adultery and prostitution are illegal, then people will have to be faithful to their wives. When this law is implemented, there will be a reduction in domestic cases of cheating husbands and wives which are very dangerous and can result in murder (Stanford 6). Moreover, cases of sexually transmitted infections will also reduce as everybody will have one intimate partner. Freedom of worship. This is another law that aims to promote harmony by respecting every culture, traditions and religious beliefs of human races (Stanford 10). It should be noted that human culture, traditions, and religion is dynamic and it varies depending on the community. When this law is implemented, a God-fearing society shall be created and peaceful living promoted. This is because most religions preach peace and love.

Thursday, September 26, 2019

Supply chain management of Cadburys Milk Chocolate Assignment

Supply chain management of Cadburys Milk Chocolate - Assignment Example Behind every one of these products is a Supply Chain, sometimes highly complex with flow of materials across numerous continents and some relatively simple. Besides, the divine Chocolate was set up by cocoa farmers with the aim of improving their sustainability and equity in the chocolate supply chain. In the process of production, the company invests in farmers is miniature compared to big players. Nonetheless, all the investments are substantial as part of its chocolate sales. This paper undertakes to provide an analysis of the of the end to end supply chain of Cadbury milk chocolate. This is done through highlighting on numerous issues such as the role of logistics, supply chain management, among others. Slack (2009, pp. 57) asserts that it is important to note that in answering to public call; most chocolate firms have decided to work on developing their supply through joining initiatives that insists on addressing several social issues. Some of the issues that such companies mus t address are under development, poverty, among others. These are some of the issues that push for the perpetuation of child labor in the supply chain of cocoa (Booth, 2010, pp. 23). The companies have also decided to focus on developing a more suitable, sustainable and equitable cocoa supply chain. The best supply chain will ensure that all the issues both for small and big players are solved through integration of a multi-stakeholder stratagem to address both social and environmental issues. Ideally, a sustainable cocoa supply chain will ensure that the partakers are treated with utmost respect and remunerated with better income. The partakers include those taking part in cultivation, harvesting, and processing of cocoa in the companies. The reasons why they must be given something they will support their livelihood is because it will aid in avoiding cases of child labor in the supply chain management. Logistics and Supply Chain According to Murphy and Wood (2010, pp.56) every org anization is always faced with the duty of moving materials. In the chain, there are manufacturers who their companies engage in the process of collection of raw materials. The raw materials come from the suppliers and delivered as finished goods to the consumers. Retails shops get the goods they sell from wholesalers. This can be compared to the television news service that collects reports from all over the globe and delivers them to their viewers. Most people stay in towns without knowing the process that food industries go through before they deliver a finished product to the consumers. It is important to note that at times, goods may go through a broader chain of supply before it reaches its destiny. This kind of movement is facilitated through logistics. In that regard, it is noteworthy that logistics facilitates all the aspects of movement and storage of materials on their journey from original supplier finally to the consumers (Christopher, 2010: 23). On an international sca le, an enormous effort is required for logistics. For instance countries like China

Solar energy and environmental impacts Research Paper

Solar energy and environmental impacts - Research Paper Example Solar energy is copious in the earth and it suggests important potential for the alleviation of climate change; therefore, it is desirable due to its inherently small burden on the environment and has opportunities for positive social impacts. This is further helped by the fact that the cost of solar technologies has been reduced to significant proportions and technical advances coupled with favorable public policies that has resulted into reduction of costs. The use of solar technologies has the advantage of having low lifecycle greenhouse gas emissions when compared to other forms of fossil fuels. This is because the production of solar energy through the photovoltaics (PV) emits no pollution nor does it emit greenhouse gases (Fell, 2012). Moreover, it has the effect of improving the health and livelihood of most of the world’s poorest neighborhoods as it addresses the gaps that is not filled by the available modern energy services (IEA, 2010). Environmental Impacts A report by The Wall Street Journal stated that the development of solar on lands that are deemed desert by disturbing the caliche deposits found underground leading to the release of carbon dioxide in the atmosphere. A similar study has equally found that the development of a solar plant could cause emission of about 6000 metric tons of carbon each year from the disturbance caused by the plant (Wall Street, 2010). Forests play a crucial role in the life of both plants and animals and hence any form of deforestation hinders the proper functioning of these species thus damaging the atmosphere. The role played by forests in human life cannot be gain said and therefore when they are cut to create room for solar plants, the absorption of carbon dioxide ceases or the carbon stored in the trees is released into the atmosphere when the tree is left to rot or is burnt. This has the overall effect of occasioning carbon dioxide build-up in the atmosphere that eventually leads to climate change. This is what happens during the installation of large-scale solar-power projects as ecosystems are interfered with when huge tracts of land are put in use. Forests have to be cleared to prevent shading of solar panels and allow for easy installation of solar posts. The removal of the forests thereafter leads to a change in the natural carbon sequestration rate that thereafter affects the amount of carbon dioxide emitted in the atmosphere. It is important to note that land use will ultimately affect the climate of a place including the local climate, microclimate and the temperature of the surface of land. Therefore, when solar panels which usually have low reflectivity and utilizes or converts large amounts of solar insulation into heat, there is the likelihood it may affect the global climate or the climate of a particular place. To minimize the effects that come about because of land use, it is important that when a solar installation is to be put in place by any stakeholder, the land selected should be in areas with low population density that translates into a low environmental sensitivity. Solar Energy and Climate Change The use of solar energy has an advantage in the sense that carbon savings derived from the use of solar energy outweighs the development of this form of energy. This means that a solar plant can save nearly 560, 000 metric tons of carbon per year (Wall Street, 2010). There is therefore a need to expand the solar power potential in order to meet the climate

Wednesday, September 25, 2019

Research paper on OSTEOPETROSIS Example | Topics and Well Written Essays - 500 words

On OSTEOPETROSIS - Research Paper Example Mortality associated with infantile osteopetrosis is high. Those with adult osteopetrosis have longterm survival chances. In this research essay, the pathophysiology, clinical presentation, investigations, treatment and prevention will be discussed. Purpose The main purpose of the paper is to present an overview of osteopetrosis. Pathophysiology The main defect in osteopetrosis is in osteoclast which belongs to monocyte-macrophage lineage and genetic defects leads to abnormal osteoclasts (Tolar et al, 2004). Osteoclasts are very important in the modelling and remodeling of the tissue of the bone and defective osteoclasts fail to model and remodel the bone appropriately, resulting in abnormal encroachment and deposition of bone tissue (Teitelbaum, 2000). The abnormal bone tissue is susceptible to fractures and can encroach into the bone marrow leading to bone marrow failure. it can also encroach around the nerves causing nerve entrapment syndrome. When blood vessels are affected, isch emia, especially of the bones like mandible can occur. Eventually, the patient develops multiple fractures, anemia, bleeding disorders and sepsis (Bhargava, and Griffing, 2009). Clinical presentation The clinical presentation depends on the type of osteopetrosis.

Tuesday, September 24, 2019

Rime of the Ancient Mariner Essay Example | Topics and Well Written Essays - 750 words

Rime of the Ancient Mariner - Essay Example In this poem, the supernatural world plays a role of punishing mariner as a result of his misdeed of killing albatross. Mariner did not have enough respect for the supernatural world when he killed the albatross thus the supernatural decision to punish him in combination with the natural world. As he is subjected to the rigors of the dehydration and hunger he is also revealed dreams of the natural world touched with the supernatural as the ocean turns to sickening and rotting as well as spirits weaves through his vision. There is an interaction of the natural world which are the poem characters and supernatural world. For the natural world, the Ancient Mariner, who is regarded as a kind of mysterious figure, the poem, The Rime of the Ancient Mariners, deals with two distinct times. The time of voyage and the time of Mariner are retelling. The interaction of the natural and supernatural world that exists here is that at the time of voyage, the Mariner uses a crossbow instead of firearm and that his ship is said to be the first to sail into the Pacific Ocean. It is clear that Mariners fate is decided by a vehicle of random chance and not just any kind of divine judgment. The Mariner acts this way in order to bring it out clear that he is more than just a natural world, thus kind of trying to compete with the supernatural worlds. For the spirits who comprised of the mysterious pole, spirits have some interaction with the natural world. The spirits resemble angles whereby in being wholly immaterial though have no regular place in Christian cosmology. These spirits are said to be the invisible being that are referred to as the epigraph to the poem. When mariner killed the albatross, he was punished by these spirits in essence that he failed to respect the supernatural world. These spirits in the poem act this way to demonstrate that, however, much one may come to know about the physical world, the spiritual one is far much ahead and different

Monday, September 23, 2019

Information Systems (Word Processing Assignment) Essay

Information Systems (Word Processing Assignment) - Essay Example Served with potato chips or substitute Safari fries for $1.49 Add a House salad or cup of soup for $4.99 - $10.99 Blue Mountain Chicken Sandwich - Tender grilled chicken breast, Cajun seasoned and topped with bacon, Swiss cheese, roasted red peppers and leaf lettuce. Served on a toasted bun with spicy Safari sauce and coleslaw. Add a House Salad or cup of soup for $4.99. - $12.99 Buffalo Fried Chicken Salad - Golden fried chicken tenders atop crisp greens, red cabbage, tomatoes, and carrots, in a chunky Blue cheese dressing. Garnished with crumbled Blue cheese and Buffalo sauce. - $13.99 Caribbean Coconut Shrimp - Tender shrimp rolled in fresh coconut and fried to a golden brown, served with sweet mango sauce, Caribbean rice and Napa veggies. Add a House salad or cup of soup for $4.99 - $18.99 Chicken Fried Chicken - Breaded chicken breast, lightly fried golden brown topped with country gravy and Napa vegetables. Served with red-skinned garlic mashed potatoes and Napa vegetables. Add a House salad or cup of soup for $4.99 - $16.99 Sparkling Volcano - Enough for 2 or more people! Giant rich chocolate brownie cake stacked up high, served warm with vanilla ice cream, fresh whipped cream, and topped with caramel and chocolate sauces. - $14.99 Selection of Beverages - Coke, Diet Coke, Cherry Coke, Sprite, Root Beer, Raspberry Iced Tea, Iced Tea, Hot Tea, Milk, Coffee, Natural Still or Sparkling Water, Lemonade, and Cranberry, Pineapple, or Orange juice. Prices

Sunday, September 22, 2019

Indian Burying Grond Essay Example for Free

Indian Burying Grond Essay The Indian Burying Ground In Freneaus poem The Indian Burying Ground, the reader is presented with the two different views on life after death. One of the perspectives is from the Christian religion. The other is from the perspective of an Indian religion. The Christian religion thinks that just because you are buried lying down that you will be in an eternal sleep. The Indian religion is just the opposite of this. The religion believes that when you die your soul still lives on and you are reunited with all things that have passed on before you. Through many poetic devices, Freneau contrasts the Indian religion view of life after death and his own. The Indian religion, mentioned in the poem The Indian Burying Ground, and the Christian religion are very different in the belief of an afterlife. The following is from the perspective of Freneau. The lines in the first stanza The posture that we give the dead, points out the souls eternal sleep. tells that the lying down posture that Christians are buried in suggests that they will be in an eternal sleep. The Indian religion in the poem says that your soul lives on forever after you die. The second stanza talks about when a person dies he is once again seated with his friends and joins them in a feast. The following quotes from the third stanza nature of the soul and knows no rest suggests that when a person dies the soul of that person doesnt die with him, but just moves on to another form. In the fourth stanza the quotes life is spent and not the old ideas gone suggests that after you have died your ideas and you as a person are not forgotten but remembered forever. There is a place where all the souls gather and sit. In the fifth stanza there is talk of a stranger observing the place where all the souls have come to sit. This person is obviously influenced by the Christian view of life after death. The person is shown that the souls are not all lying down like he has though but all are in the sitting position. An Indian is showing this person around the place where all the souls have gathered, showing him that people live on after life. One of the things the person is showed is a  tree with kids playing in its shade. Another thing he is shown is an ancient Indian queen. There are many other things that man sees to make him believe that what he is seeing is real. People in the world are too closed minded and only put things into reason. It is hard for people to actually believe in what the Indian religion says about life after death because it is too complicated for them to believe in such a thing. When a person is showed to the actual gathering of souls and participating in a feast it is hard for him to deny what is actually happening. A person has no choice but to believe in what is actually occurring. Although the Christian view of an after life differs from the Indian view, the many poetic devices in the poem helps the readers understand the two different perspectives even if they are not normal.

Friday, September 20, 2019

Quantative analysis of caffeine content

Quantative analysis of caffeine content Caffeine was extracted from decaffeinated coffee and normal tea using DCM as the solvent and compared with prepared solutions of caffeine using reverse phase HPLC. The experimentally determined result was a caffeine concentration of 7.598?g/ml for decaffeinated coffee compared with 5.9?g/ml reference and 0.4049mg/ml for tea against 0.26mg/ml[1]*. Introduction Caffeine (1) is the most commonly consumed non-prescription stimulant. It is a member of the xanthine (2) family[1] and is structurally related to other plant alkaloids such as theobromine (3), commonly found in cocoa beans and chocolate. The average person in the UK drinks over thee cups of tea a day,[2] and so quantatively knowing the amount of caffeine that is contained in a cup of tea is particularly important. Caffeine acts on certain adenosine receptors in the brain[3], although there is evidence that action on these specific receptors may stimulate others such as dopamine receptors, commonly associated with reward[4]. More chronic effects of caffeine consumption include irritability, impaired concentration, muscle-aches, nausea, vomiting and blurred vision[5]. HPLC denotes high pressure liquid chromatography. In this experiment, reverse phase HPLC was used, meaning that partially polar organic solvents were used as a mobile phase against a non-polar stationary phase, in this case, octadecyl silane chains[6]. HPLC is a useful tool in analysing quickly and accurately relative abundances of various chemicals contained within a sample. The experiment was undertaken to evaluate the caffeine content in an average cup of tea and an average cup of decaffeinated coffee. Experimental The experiment was carried out according to the University of Bristol Second Year Laboratory Manual. Results were analysed by reverse HPLC using an isocratic solvent system consisting of 10 mM ammonium acetate, methanol and tetrahydrofuran at a ratio of 90:8.5:1.5. The non-polar phase featured octadecyl silane chains at a particle size of 5 ?m. The injection volume was 10 ?l, flow rate was 1.5ml min-1 with UV monitoring at 273nm. Preparation of Tea One tea bag was added to 200ml of boiling deionised water and boiled (ca. 10 minutes) with occasional agitation. Tea bag was removed and solution allowed to cool to room temperature. Sodium chloride (5g, 0.856moles) added with calcium hydroxide (1g, 0.0135moles) twice filtered by Bà ¼chner filtration. 20ml transferred to extraction funnel, extracted with DCM (20ml) three times. Magnesium sulphate added to dry DCM thoroughly of all water. Evaporated to dryness via rotary evaporation. Remaining solid dissolved in DCM and made up to 20ml. Preparation of Decaffeinated Coffee 1.50g of Decaffeinated Coffee granules was added to 200ml of boiling water and allowed to cool to room temperature. Calcium hydroxide added (1g, 0.0135moles) to decaffeinated coffee solution. Solution twice filtered via Bà ¼chner filtration. 20ml of solution transferred to extraction funnel and extracted with three equivalents of DCM (20ml). Magnesium sulphate added to dry the DCM, Bà ¼chner filtered and evaporated to dryness via rotary evaporation. Remaining solid dissolved in DCM and made up to 20ml. Results and Discussion The tea solution was originally brown and transparent, and the coffee was black. Addition of calcium hydroxide changed the colour of both solutions to an opaque dark brown. Tannins are precipitated by lime water, and so this is likely to be what precipitated out in the tea and coffee solution.[7] This precipitate was then removed by Buchner filtration. It was also found that both solutions, coffee especially, readily formed emulsions and bubbles in the extraction funnel, and so a large quantity of magnesium sulphate was needed to remove all water from the extractions. This may have interfered with the full extraction of the caffeine. The absorption intensity for Tea was 7108493 units. Substituting this into equation 1 allows us to calculate the caffeine concentration in Tea. The solved concentration is 0.4049mg/ml. The absorption intensity for Decaffeinated Coffee was 79233 units. Substituting into equation 1 allows us to calculate the caffeine concentration in decaffeinated coffee. The solved concentration is 0.007598mg/ml. Errors in solution concentration The error for the balance used to measure out the caffeine powder for the standard solutions was  ±0.00005g. The error for the 20ml volumetric flasks used was  ±0.1ml. Substituting these to find maximum and minimum values into the moles equation allows for accurate error analysis. Substituting these values into the data and plotting onto a graph grants the ability to draw the same graph above with error boxes. It also allows for maximum and minimum gradients to be drawn with the maximum and minimum values. From this information precise errors in the concentration of tea and decaffeinated coffee can be calculated. Substituting maximum values into a graph enables the gradient and intercept to be calculated, and hence the positive error in caffeine concentration of the tea and decaffeinated coffee solutions. The same can be done with minimum values. Substituting in values of absorbance for tea gives a maximum value of 0.4069mg/ml and minimum value of 0.4029mg/ml. For decaffeinated coffee the maximum value of 7.639?g/ml and minimum value of 7.558?g/ml. Literature values for the caffeine content of decaffeinated coffee are in the region of 0.5-1.5mg per 177.44ml1, which is between 0.0003-0.009mg/ml. This is close to the recorded value of 7.598?g/ml  ± . The literature values for the caffeine content in tea are 15-75mg/ml per 177.44ml, which is between 0.088-0.440mg/ml. This is close to the recorded value of 0.4049mg/ml  ± . Both of the obtained values are within the range given in reference; however both results are in the upper end of values that should be obtained. This could be due to poor measurement of either the reference caffeine peaks or instant coffee measurement. Conclusion The isolation of caffeine from tea and instant coffee was successful and the values obtained from the quantative analysis of a sample by reverse HPLC compared favourably to reference values. More accurate values for caffeine content could be obtained by larger quantities of instant coffee samples and by repetition of assays involving caffeine extraction from tea. The importance of defining the quantity of caffeine in decaffeinated coffee is important since the concentration must remain low. Acknowledgements I would like to thank my demonstrators Jack Davidson and Chun Zhu for helping me with the experiment and my lab partner Ben Gough. References B. A. Weinberg,B. K. Bealer, The world of caffeine: the science and culture of the worlds most popular drug, Routledge (2001) pp. 216. G. A. Spiller, Caffeine, CRC Press, (1998) pp. 38. U. Gupta, Caffeine and behavior: current views and research trends, CRC Press (1999) pp. 1. R. S. J. Frackowiak, Human brain function, Academic Press (2004) pp. 446. B. A. Weinberg, B. K. Bealer, The world of caffeine: the science and culture of the worlds most popular drug, Routledge (2001) pp. 304. University of Bristol, School of Chemistry, Level 2 Teaching Laboratory Manual 2009/2010. P. J. Van Soest, Nutritional ecology of the ruminant, Cornell University Press (1994) pp. 204-205.

An Overview of the Rare Disease Known as Kabuki Syndrome Essay

An Overview of the Rare Disease Known as Kabuki Syndrome As I look to graduate, I become increasingly aware that I have my entire life to look forward to. Even though I will have struggles throughout my life, I still have my well being to fall back on. When all else fails, I am and hopefully always will be self-assured that I am here, healthy and able to bring myself through the worst of circumstances. This realization and knowledge has presented itself in the most realistic way just within the past three years, while I continually helped disabled children learn various life skills. In these three years, my attention was unforgivably snagged by one child, Damion, who seemed to have an unfathomable web of trials and difficulties in his fragile little life. On an undying attempt to learn more about this child, I started working with him one-on-one and with his therapists and teachers. I soon came to realize that Damion had moderate to severe learning disabilities, speech impediments, fine (small muscles) and gross (large muscles) motor problems and sensory difficulties. His previous doctors considered Kabuki Syndrome, an extremely rare disease that is terribly difficult to diagnose, as a possible diagnosis. Even though Damion doesn't posses most of the characteristics accompanying Kabuki Syndrome, he may still have it. What would it take to diagnose him with the rare disease? Could Damion even be considered a Kabuki patient with only minor implications? Through this paper, answers to these pending questions will be portrayed, and the reader will gain a real understanding of what is currently known about Kabuki Syndrome. Two doctors from Japan, Dr. Niikawa and Dr. Kuroki first discovered Kabuki Syndrome in 1980 ("Kabuk... .... MedicineNet. Retrieved March 25, 2002 from the World Wide Web: http://medicinenet.com/script/main/AlphaIdx.asp?li=MNI&p=A_DICT Mhanni, A., & Chudley, A. (1999) . Genetic landmarks through philately &endash; Kabuki theater and Kabuki syndrome. In A. Chudley (Ed.) , Clinical Genetics (pp. 116-117) . Ireland: Munksgaard. Mhanni, A., Cross, H., & Chudley, A. (1999) . Kabuki syndrome: description of dental findings in 8 patients. Clinical Genetics (pp. 154-157) . Ireland: Munksgaard. Olney, A., Schaefer, G., & Kolodziej, P. (1998, September) . Kabuki syndrome. Ear, Nose and Throat Journal. Retrieved March 15, 2002 from the World Wide Web: http:/www.entjournal.com/html/september_98_syndrome.html An overview of kabuki syndrome. Geocities. Retrieved March 15, 2002 from the World Wide Web: http://www.geocities.com/Heartland/Fields/2978/kabuki.html An Overview of the Rare Disease Known as Kabuki Syndrome Essay An Overview of the Rare Disease Known as Kabuki Syndrome As I look to graduate, I become increasingly aware that I have my entire life to look forward to. Even though I will have struggles throughout my life, I still have my well being to fall back on. When all else fails, I am and hopefully always will be self-assured that I am here, healthy and able to bring myself through the worst of circumstances. This realization and knowledge has presented itself in the most realistic way just within the past three years, while I continually helped disabled children learn various life skills. In these three years, my attention was unforgivably snagged by one child, Damion, who seemed to have an unfathomable web of trials and difficulties in his fragile little life. On an undying attempt to learn more about this child, I started working with him one-on-one and with his therapists and teachers. I soon came to realize that Damion had moderate to severe learning disabilities, speech impediments, fine (small muscles) and gross (large muscles) motor problems and sensory difficulties. His previous doctors considered Kabuki Syndrome, an extremely rare disease that is terribly difficult to diagnose, as a possible diagnosis. Even though Damion doesn't posses most of the characteristics accompanying Kabuki Syndrome, he may still have it. What would it take to diagnose him with the rare disease? Could Damion even be considered a Kabuki patient with only minor implications? Through this paper, answers to these pending questions will be portrayed, and the reader will gain a real understanding of what is currently known about Kabuki Syndrome. Two doctors from Japan, Dr. Niikawa and Dr. Kuroki first discovered Kabuki Syndrome in 1980 ("Kabuk... .... MedicineNet. Retrieved March 25, 2002 from the World Wide Web: http://medicinenet.com/script/main/AlphaIdx.asp?li=MNI&p=A_DICT Mhanni, A., & Chudley, A. (1999) . Genetic landmarks through philately &endash; Kabuki theater and Kabuki syndrome. In A. Chudley (Ed.) , Clinical Genetics (pp. 116-117) . Ireland: Munksgaard. Mhanni, A., Cross, H., & Chudley, A. (1999) . Kabuki syndrome: description of dental findings in 8 patients. Clinical Genetics (pp. 154-157) . Ireland: Munksgaard. Olney, A., Schaefer, G., & Kolodziej, P. (1998, September) . Kabuki syndrome. Ear, Nose and Throat Journal. Retrieved March 15, 2002 from the World Wide Web: http:/www.entjournal.com/html/september_98_syndrome.html An overview of kabuki syndrome. Geocities. Retrieved March 15, 2002 from the World Wide Web: http://www.geocities.com/Heartland/Fields/2978/kabuki.html

Thursday, September 19, 2019

Sexual Harassment in America :: Sexual Harassment Essays

Individual rights are being infringed on all the time in this country. The common law in this country protects against sexual assault and battery, but not sexual harassment. The 1994 Violence Against Women Act has issued guidelines for sexual harassment by the federal agencies but has not set laws to be enforced. These guidelines are supposed to be followed by men and women around our country. People living in the United States should feel safe and comfortable walking down the streets, in the office or in their schools, and that's the bottom line. This essay will inform and relay information about sexual harassment. The issue that is facing this country is recognizing what sexual harassment is and how to combat it. Personally, I think it comes down to an issue of awareness. If everyone knew what sexual harassment was and how to deal with it in a mature manner, we would be able to control this growing problem. We will talk about what to do if you are put in a harassing situation, why this happens and how do deal with it on a personal level. There are several types of sexual harassment, just as there are forms or harassment too. The two most common forms are described as "Quid pro quo," and "hostile environment sexual harassment. "Quid pro quo," is a Latin word for something for something. This is when someone asks directly or indirectly for sexual advances in exchange for something powerful. Only people in power can commit this type of sexual harassment, but still lives in the power verses weak relationship. Good examples of this situation happen in the work force but are also seen in schools. When a teacher threatens to fail a student unless the student agrees to date the teacher, that is quid pro quo(OCR). It does not matter if the student refuses the teachers demands, and suffers the harm of the grade. The harassment is illegal. The other common type of sexual harassment is based upon the idea of comments indirectly or directly said in a hostile environment. This is called hostile environment harassment. This occurs when harassing conduct is so severe or persuasive that it affects the persons ability to be an individual. Regardless what type of harassment that occurs, you must take immediate action or measures to stop this violence.

Wednesday, September 18, 2019

World War II Essay -- History, War, Normandy Beaches

Starting with the hedgerows of the Normandy Beaches to the Bulge to the Surrender of Germany on June 7, 1944 to May 7, 1945 Ambrose tells an authentic story of World War II from the point of view of the men who battled in the war. The author explains the narrative of the â€Å"GIs, junior officers and enlisted men â€Å" (Ambrose 14), proved Hitler wrong by driving his Wehrmacht back from the beached of Normandy back to Germany. One of the greatest lessons that the reader can learn from reading the book, Citizen Soldiers is that the success of war is heavily relied upon by the junior officers and non-commissioned officers on the front lines. As the title suggests, Citizen Soldiers is not so much a study on tactical moves as it is on the citizen soldier from all parts of the United States. The book concentrates on the American GI Joe and not the Allies as a whole. The Gis were all American boys who believed in their cause, they drafted or had enlisted voluntarily, but only a few wanted to be at war, and Ambrose stated, Citizen Soldiers is not about â€Å"the generals, it’s about the junior officers and enlisted men of ETO---who they were, how they fought, why they fought, what they endured, [and] how they triumphed† (Ambrose 13). The epic drama of the European Theater of Operation (ETO) is told by Ambrose by following, almost step by step, various individuals and outfits among the tens of thousands of young Allied soldiers who broke away from the deadly beaches of Normandy and swept across France to Ardennes, fought the Battle of the Bulge, captured the bridge at Remagen, and crossed the Rhine to final victo ry in Europe. Ambrose notices that the U.S. ruined the Nazi war machine with considerable aerial bombing, artillery, and the great mob... ...that Germany was on the defensive side of the Western Front, reinforcements became ever more important. Yet as Ambrose explains the Germans could just not tactically keep the Allies in check with reinforcements. Resulting into withdrawal after withdrawal, which lead into another German tactic. The German technique of departure was that of being unhurried and expensive. They left little to the Allies and damaged everything in their withdraw trail. They also used malicious methods to dismember Allied troops such as mines and other nasty surprises. By portraying several German surrenders, Ambrose paints the picture that Germany had lost its compassion and need for traditional warfare. In since they had had enough and as Ambrose tells they were quick in many circumstances even humorous to some extent, to surrender, which would ultimately be Germany's last war tactic.

Tuesday, September 17, 2019

?Hong Kong Media Good

Although the rank of freedom of Hong Kong media is much higher than that of China, there are some exceptions to the general rule which states Hong Kong media are free whereas the mainland media are not free. On 6 June 12, a Attainment Square dissident, IL Wangling was found to commit suicide by hanging himself in the Human hospital without leaving any note. The suspect of Lie's death evokes all Hong Kong media to report the news at length, and hence the reporter of South China Morning Post Alex Price ran a full story about Lie's death.However, Wang Examining, the newly appointed editor-in-chief of SCAMP, reduced it into a brief Just before the issue of newspaper without informing him. Price wondered the reason and emailed Wang, but Wang didn't give any reasonable response and said Price knows what to do if he doesn't like this. It is believed that self-censorship was practiced because Wang is mainland born, and is a member of the Jill Provincial CAP. Beijing has influence on the issu e, and hence it makes people suspect the neutrality of SCAMP.Another example to show Begging's influence over the Hong Kong media is that a Shanghai column about the selection of Hong Kong Chief Executive was edited to totally different point of view from the columnist in order to show support to one of the candidates, Lung Chunk Yin, who regards as Pro-China candidate. The column was actually written by the columnist Luau You-sis whose column titled originally ‘Neither of them is the best candidate for the post of Chief Executive' but then was changed to ‘Lung is better than Tong.The original conclusion of the column is, it is no worth to support both of them, the fight between them doesn't help their rule of Hong Kong but worsen and this only makes people getting bad feeling on politics. However, it was edited to the version that, it is no worth to support Tong; Lung is the one who can do better so look forward to his future. Although Shanghai repost the original one n ext day, the explanation of doing such thing as was unacceptable.The last owner of Shanghai also has China background and hence it is believed that there is Begging's influence to affect the freedom of media in Hong Kong. Comparing to Hong Kong, the situation in China may be worse that mainland media are mostly controlled by authority; however, some exceptions also exist and those costly happen on the media Internet. GHz Riffing, the founder of the website People's Supervision which allows entities to expose the corruption of the authority, had uploaded a video of Lei Chemung, a Cocooning official, who was having sex with an 18-year-old lady and secretly recorded.The official then lost his Job due to the muck-raking. Although the website had been once blocked and was unable to be searched via mainland website Baud, GHz believes it was because the website had suffer pressure from Lei personal instead of from authority as KHz's website is now operate normally and GHz is still fee. Des pite of the exposure of the corruption of the authority, KHz's website and his account on social media Webb still working normally and are not controlled by the authority.Another example is about Shah Habit, member of the Communist Party of China Committee of Lubing City's Public Security Bureau, was accused of having amassed 192 houses in Hough and holding a false identity card by a local businessman Hung Junky. The documents about Chaos's double IDs are also exposed on the Internet which evokes not only the citizens but also the authority to investigate the issue. Shah has been sacked after this exposure and the authorities had decided to investigate comprehensively the problems exposed on the Internet.Same as the former example, although it exposes the corruption of authorities, the media haven't been control by authorities to cover the exposure. Overall, I think the freedom for media of both Hong Kong and mainland starts shifting. It is a good beginning for authorities to loosen the control on mainland media, but to Hong Kong media, over-practicing self- censorship only makes Hong Kong citizens revolted to mainland authorities.

Monday, September 16, 2019

Pizza Lovers Essay

Have you ever wanted pizza but were too lazy to order one? Well that will change when I explain how to order a pizza. First you decide what pizza company you want to order from. Second is calling and placing your order. Third you call and order and then the waiting begins. When you have a craving for pizza you have to decide on the many different pizza companies and the different types of pizzas that they make. Some of the more popular pizza companies include Papa John’s, Dominos, Pizza Hut, Angie’s, East of Chicago, and many more. After you finally decide on the pizza company you go to the yellow pages of the phone book and look up pizza and search alphabetically for the company that you want. Once you find the phone number, you pick up the phone, dial the number and speak to an employee of the pizza place, they will ask to verify your phone number and ask the type of pizza and the toppings that you would like to order. They will then tell you how long it will be before you can pick up your pizza or how long it will be before it will be delivered, and how much that the pizza will cost. Waiting can be such a drag but you can try to get your mind off of it by watching TV and hopefully you won’t see a pizza commercial or taking a short nap. All it know is that when you are hungry a 40-minute wait can seem like a lifetime. Ordering pizza is not rocket science but now it is explained a lot easier. So now that you are educated in the fine art of ordering a pizza put it to use. If you are ever in a dilemma and don’t remember how to order a pizza just think of the three easy steps. Craving a pizza, ordering your pizza, and finally waiting for the pizza.

Sunday, September 15, 2019

Social Media and Network Technology

Colleges will need to embrace these new communities in order to keep up with recruitment of the younger generations, student to student interaction, student to professor interaction. Backbone and Linked are some of the internet communities that we will need to embrace to encourage our recruitment and student interaction. Backbone has been around since 2004 and is still growing in popularity. Backbone gives you the availability to send an instant message, an email, post discussions, provide media, and provide detail information.Colleges that have a Backbone page and interact with Backbone has the ability to recruit sophomores and Juniors in high schools not only in the surrounding areas but relied. This ability provides an advantage to have a more diverse student body. For young college students Backbone is a mean they utilize to communicate with other students about the activities going on in the campus. They also use this communication tool to converse about class assignments, organ ization functions, sports, and daily activities.Students who do not live on campus, Backbone allows them to still experience college life and the inclusion of student activities. College professors can also utilize this communication tool to correspond and interact with al students, including students who participate at satellite campuses. The surrounding community will also have the availability to interact with the students because they will be able to show the students the history of the area, and support the college with financial scholarships and the sports arenas.Most of the surrounding community makes up the professors, educators, the educator families and friends. Professors will have the accessibility to be active not only with the students but with the students families as well. As a parent of a college student, I enjoy being able to see what the students are doing, what classes are troublesome, the activities the students are participating in, and when parents can interac t with the student at school.The disadvantages of Backbone include accessibility, lack of personable interaction, lack of social interaction, non-clarifying answers, misunderstandings of context of messages and pictures, invasion of privacy, and possible compromise of security information. Yet, these disadvantages can be kept down to a minimum by the college handbook and the student conduct codes by the dents themselves. Most college's network security will keep secure information safe from any breaches or hacking. Linked will be very beneficial for our graduating students, faculty and local business.This social network will allow for the local and national business to see the types of students we are producing in the workforce. Linked will allow the students to make contacts with others in the corporate field of their choice and possibly encourage the company to reach an agreement with the college on training of their current staff. Our faculty will be able o utilize this social ne twork by seeing what the other colleges are teaching and producing in the coming work force and learn what skills the companies are looking for, and provide those skills to our students.The only down side to Linked will be headhunters from other colleges recruiting our faculty to come and work for them. But we can counter offer our faculty, pay retainer fees, and sign binding contracts with the faculty to keep them from leaving our facility. We will be using the waterfall model for the implementation of a Backbone page and Linked page. The system velveteen life cycle for this process we will need to make sure that all students will have access to the college Wi-If on campus, which we currently have in place all over the campus.Our second phase will include making sure that students and faculty will have accessibility to a computer, which currently we already have in place in the library and common areas. Our third phase of the process will require the college to set up a Backbone an d Linked account and have our IT department to maintain the accounts. Fourth phase of the process will require the college to get the rod out to the students about both pages on the internet and require all of our faculty to friend us on each site.The final phase will be having our IT department to hire someone to maintain both pages for content on the page, the context of the messages on the page and be a monitor for any violation of student conduct codes. The only disadvantage for using these websites, we will not be able to modify the systems. The advantages outweigh the disadvantage immensely because startup cost will be at a bare minimum, and we will still be able to get an idea of how many of our dents are using to communicate with one another by the amount of friend request we receive and the amount of conversation context on the page.