Wednesday, July 31, 2019

Counter Terrorism

The dawn of the 21st century have enormously occupied fear and uncertainty as it may seem to pass by time of the dark ages where barbarian swordsmen annihilate the villagers and sorcerers put into spell the weaklings.The aftermath of the terrorists attack to the US on September 11th year 2001, known as the 9/11 tragedy, have resulted strong beliefs that a powerful nation like the US is vulnerable to such cowardice and barbaric acts, much more vulnerable are the rests of the US allied countries particularly those belonging from the third world that are potential targets of terrorists. Countries around the world and most especially the member states of the United Nations have called for the massive execution of strategies to counter terrorism.As cited from the US National Counterterrorism Center (US-NCC) document on April 30th 2007, with its Report on Terrorist Incidents of 2006, accounted that: approximately 14,000 terrorist attacks occurred in various countries during 2006, resulting in over 20,000 deaths, as compared in 2005, attacks in 2006 rose by 3,000 (a 25% increase) while death rose by 5,800 (a 40% increase), as was the case last year, by far the largest number of terrorist incidents and deaths occurred in the near East and South Asia.The document further cited that: â€Å"the two regions (East and South Asia) were the locations for 90% of the nearly 300 high-casualty attacks in 2006 that killed ten or more people, only a total of five high-casualty attacks in Europe-Eurasia, East Asia-Pacific and the Western Hemisphere†. A Brief Historical Background The overthrowing of the Soviet army by the military force of Afghan Muslim guerrilla warriors or commonly called as â€Å"mujahideen† in the early 1980’s has gave birth to al-Qaeda and began its operation in Afghanistan and Pakistan.An excerpt from the research paper of Rohan Gunaratna, an Associate Professor at Nanyang Technological University in Singapore and Director of the Internati onal Centre for Political Violence and Terrorism Research, narrated that al Qaeda enhanced its capabilities for a global networking throughout the 1990’s from its base in Asia and Sudan. Accordingly, â€Å"al-Qaeda effectively armed, trained, financed and theologically indoctrinated three-dozen Islamic groups in Asia, Africa, the Middle East and Caucasus†.Further cited from Rohan Gunaratna research paper, â€Å"specifically, over the course of the 1990’s, al-Qaeda and Taliban camps in Afghanistan trained between 70,000 and 120,000 Muslim youth to fight in the Philippines (Mindanao), Indonesia (Maluku and Poso), Myanmar, China (Xinjiang), Kashmir, Bosnia, Kosovo, Chechnya, Dagestan, Nagorno-Karabakh, Algeria, Egypt, Jordan, Yemen and elsewhere†.It can be realized that the global network of the al-Qaeda is far reaching the targets as its Muslim brethren can be easily persuaded by its diverse capabilities, as the World Islamic Front imminently wage its holy war or Jihad. Response of Nations The Report of the US-NCC have found to be undiscerning and does not cause alarm to its allied countries but discloses the fatal blow of terror in order for nations to respond with cautious certainty. The certainty of response is to ascertain acts that shall be preemptive, preventive, and combative to the dreadful characters of the terrorists.As a result of the extreme importance and immediate need, the United Nations Security Council have passed and approved Resolution 1373 of 2001 creating the Counter-Terrorism Committee â€Å"that shall continue to monitor Member States’ implementation of resolution 1373 of 2001, guided by its principles of cooperation, transparency, equal treatment and consistency in approach†¦Ã¢â‚¬  (Letter of Ricardo Alberto Arias, Chairman, Security Council Committee, United Nations, 20 November 2007). As also cited in the letter, under par.13 (facilitating assistance to states), that â€Å"the committee will co nduct thematic discussions on strengthening efforts to limit terrorists’ mobility with the participations of experts from all of the relevant technical international organizations†¦Ã¢â‚¬  Confronted with the challenges to overcome chaos, the Member States to the United Nations, particularly the third world countries, are resolute to collaborative efforts as embodied in their respective economic, political, socio-cultural framework of governance.Like in the United Kingdom (UK), who has long been plagued by domestic terrorism as a result of its domestic strife with Northern Ireland, the passing to parliament of the UK Strategy in Countering Terrorism of 2006, accordingly â€Å"has had a long-term strategy for countering terrorism, known within UK government as CONTEST, aims to reduce the risk from international terrorism so that the people can go about their daily lives freely and with confidence.The strategy is divided into four principal strands: (1) prevent; tackling the radicalization of individuals, (2) pursue; reducing the terrorist threat to UK and to UK interests overseas by disrupting terrorists and their operations, (3) protect; reducing the vulnerability of the UK and the interests overseas† (HM Government, Countering International Terrorism: The United Kingdom’s Strategy, July 2006).In the US where immediately responding at the 9/11 tragedy, the Director for the National Intelligence (DNI) outlined the 100 Day Plan program accordingly with its goal â€Å"to demonstrate short term progress and build momentum for integration and transformation across the community†.Cited from its 100 Day Plan program, â€Å"it has been aligned to six integration and transformation focus areas which covers: (1) create a culture of collaboration, (2) foster collection and analytic transformation, (3) build acquisition excellence and technology leadership, (4) modernize business practices, (5) accelerate information sharing, and (6) clar ify and align DNI’s authorities† (United States Intelligence Community, 100 Day Plan for Integration and Collaboration, Washington DC 20511).Most recently on January 8th 2008, DNI published its program framework entitled as â€Å"Procuring the Future: 21st Century IC Acquisition†. Accordingly, the purpose is â€Å"to avert conflict and preserve peace†¦Ã¢â‚¬  with multiple areas of concern on: â€Å"(1) military, (2) proliferation, (3) foreign policy, (4) economics, (5) terrorism/narcotics/international organized crimes, (6) technology, and (7) regional conflict†. The program thrust support the enactment of US Foreign Intelligence Surveillance Act of 2007 as amended with modernization provisions for Fiscal Year 2008.In sum, it comprises and outlines the US Counterintelligence Strategy of 2007 which adheres to empowering its homeland security. Meanwhile in South East Asia, the ten member countries of the Association of Southeast Asian Nations (ASEAN), namely: (1) Brunei Darussalam, (2) Cambodia, (3) Indonesia, (4) People’s Democratic Republic of Lao, (5) Malaysia, (6) Myanmar, (7) Philippines, (8) Republic of Singapore, (9) Thailand, and (10) Socialist Republic of Viet Nam, continuously affirm its economic, political and cultural ties.The international diplomatic ties among the ASEAN Nations are a linking arm or reinforcement as it is one of the vital targets of terrorist attacks in the South East Asia. The ASEAN Convention on Counter Terrorism held in Cebu, Philippines on January 13th 2007, have renewed and reaffirmed the commitment to countering international terrorism through adopting strategic framework in law enforcement, economic and political programs and upholding the rule of law with relevance to protecting and preserving the human rights.Thus, laying down the global agenda brought about by the emerging response of the UN and various enactments of strategic policies in the fight against terrorism, the remaining c ountries that propel terrorism are at large exploring its own identity—the entanglement from its traditional culture and race, the decadence of religious belief and blinded by remorse from first world dominion. Counter Terrorism: In Perspective The work of every Nation to war on terrorism is widened at the global perspective.The global populace understood that terrorism is characterized by barbaric acts. Social scientists considerably view that in the case of the holy war or jihad, the Islamic secessionist group emulates Osama bin Laden as a Messiah (in which a messianic complex is attributed) to the fundamentalist rulers in Afghanistan that propagates Islamic terrorism against US and its allies. However, Muslim scholars literally view the jihad as being utilized or used into conflict of interest and a clamor for Islam.According to the published article of Laura Mansfield on her interview to Shaykh Ayman al-Zawahari, â€Å"today in Palestine, conspiracies to abort the Jihad and surround the Mujahideen are being hatched by the same forces which created Israel and with the cooperation of their agents among our people. I repeat to you, my brothers, that we must be conscious of the legal and factual realities of this conflict, lest the treacherous leadership deceives us and we get lost in the market of political bargaining† (Laura Mansfield, Realities of the Conflict – Between Islam and Unbelief, Full Transcript of Zawahiri Tape December 20, 2006).The minds of the Afghan supporters to Islamic secessionist have long been entangled to its religious beliefs on the destiny of the jihad. More so have been ideologically instilled with anguish against the Westerners, particularly the US and UK, as it condoned the Jews who accordingly took the Muslim lands. The ancestral war reached its adverse conflict until the 21st century wherein the cobweb of hostile Afghan forces goes out of control. It cannot be said today to part ways with the alliance of US a nd the UK so that reducing risk of terrorist attacks.Development of preemptive measures or effective strategies to preventing terrorist attacks is outlined in the US and the UK economic, political, cultural platform of governance. These super power nations, including other countries of the European community, further collaborate with favorable international policies amongst countries that resist and abhor the Islamic terrorism. At this instance, the strategic stance of war on terrorism may have isolated, identified and singled out the terrorist block. Cushion A BlowAs the global alliances of Nations continue its fight against terrorism, respective countries of the world cushion a blow but with much strategic defense by empowering governance through economic development, political reforms and democratization. Somehow the militaristic approach to combating terrorism inflicts human error resulting casualties are but a little wound on the flesh of Nation that fight the real enemies of p eace and democracy. Some reported human errors, as likewise in pursuit of enforcement, become affliction to human rights.These flaws posit to be immediately addressed at a global scene. Assessing on the impact of the counter terrorism measures, the UK Office of the Secretary of State for Foreign and Commonwealth Affairs proposed a survey of selected countries of Australia, in Asia, Western Europe and Northern America. The survey called for a consultative process on the legal means and further legislation of the counter terrorism measures that each country is implementing.It cited its consideration that: â€Å"different countries, with differing political and legal traditions and systems, recognizing the particular threat posed by terrorism, have enacted a variety of measures to counter that threat. Approaches have varied and evolved over time in the face of a changing threat and changing terrorist tactics† (Counter Terrorism Legislation and Practice: A Survey of Selected Coun tries, October 2005). In similar development, a briefing paper from the Human Rights Watch organization in New York was submitted to the 59th session of the United Nations Commission on Human Rights (UNCHR) on March 23rd 2005.The briefing paper emphasizes that accordingly: â€Å"in fighting terrorism, however, governments must also ensure they meet their other obligations to their people by ensuring that counter-terrorist measures respect and do not violate international human rights, humanitarian, and refugee law† (In the Name of Counter-Terrorism: Human Rights Abuses Worldwide, Human Rights Watch). Likewise, a Handbook on Counter-Terrorism Measures has been produced by various organizations like the Independent Sector (IS), Inter Action (American Council for Voluntary International Action), Council on Foundations and Day, Berry and Howard Foundation.Apprehensions on the potential effect to human rights by committing human errors that may inflict abuse have drawn major impor tance in assessing the so-called winnings of war on terrorism. The incessant lobbying of human rights advocates to the peripheries of government corridors can be perceived as a positive-reactive-constructive attitude of the civilian populace in general. But somehow cushioning the blow to terrorist groups and its cohorts may be unfavorable to the strategic momentum, as the terrorist employs protracted tactics and has diverse capabilities.In this respect, the government effort to isolating risk and vulnerability of terrorist threats continuously and effectively launched civic actions, socio-economic-cultural activities in partnership with various sectors of society. A more consultative framework composing with the civil society rekindles collaborative efforts. References Report on Terrorist Incidents-2006, US National Counterterrorism Center, 30 April 2007; Terrorism in Southeast Asia: Threat and Response, Rohan Gunaratna, Hudson Institute, Center for Eurasian Policy Occassional Resea rch Paper, Series II (Islamism in Southeast Asia), No.1; Letter of Ricardo Alberto Arias, Chairman, Security Council Committee, United Nations, 20 November 2007; HM Government, Countering International Terrorism: The United Kingdom’s Strategy, July 2006; United States Intelligence Community, 100 Day Plan for Integration and Collaboration, Washington DC 20511; Procuring the Future 21st Century IC Acquisition, Terri Everett, DNI Senior Procurement Executive, Office of the Director of National Intelligence, January 8, 2008; ASEAN Convention on Counter Terrorism, document, Cebu, Philippines, January 13th 2007;Realities of the Conflict – Between Islam and Unbelief, Laura Mansfield, Full Transcript of Zawahiri Tape, December 20, 2006; Counter Terrorism Legislation and Practice: A Survey of Selected Countries, October 2005, www. fco. gov. uk; In the Name of Counter-Terrorism: Human Rights Abuses Worldwide, Human Rights Watch, www. hrw. org/un/chr59; Handbook on Counter-Terror ism Measures: What U. S. and Nonprofits and Grantmakers Need To Know, 15 March 2004, www. dbhfoundation. org.

Tuesday, July 30, 2019

An Overview of Representative Problems

Krarup & Pruzan [27] have reviewed research on traditional facility location models that aim to minimize the sum of the fixed facility location and transportation costs by choosing the optimal facility locations among given probable sites to serve a set of customers. The objective function and constraints of these models are linear, but the resulting problems are NP-complete. Melo, Nickel and Saldahna [25] have reviewed facility location models in supply Chain and they focused more on integration of location decision along with other decision variables in the supply chain design. They noted that the role of facility location is decisive in supply chain network planning and this role is becoming more important with the increasing need for more comprehensive models that capture the real life constraint scenarios in detail. Leyla, Mark & Collette [29] in their recent publication claimed first work in the logistics literature that analyzes the potential savings that can be achieved by allowing a retailer to be sourced by more than one warehouse. They have proposed to leverage information technology to maximize the potential benefits. Huang et al. [30] paid attention to the opportunity of getting lower supplier prices by locating the warehouse correctly. In that theory, the optimal locations gravitate towards locations of the suppliers offering lower prices. However, if the price variability is high, the optimal location moves towards the demand's center of gravity. In those cases, it is beneficial for the organization to keep the location near that center of gravity and pay less attention to the supplier prices and supplier locations. The Research Problem: Many business managers are intending to answer following questions in the Post GST Scenario: â€Å"Will GST implementation enable supply chain network redesigning and Warehouse consolidation? Is it possible to create economic value and competitive advantage by altering the existing network to the more efficient one?† This project aims to study possible benefits of restructuring the warehouse network for a Food product company for their North India region in post GST set up.

Monday, July 29, 2019

Power, Authority, And Influence in BrandMaker Company Essay

Power, Authority, And Influence in BrandMaker Company - Essay Example The internal challenges Tom Moris encountered ranges from the power vacuum created by John Goodwin retirement. John Goodwin main responsibility was to take care of the CIM.a When he retired no plan was in place for a suitable candidate to came and where his shoes. The vacuum created by John Goodwin retirement created doubt by employers and no employer was willing to take decision and challenges related to CIM. Due to their lack of experience the employer had varied opinions. The other challenging decision faced by BrandMaker CEO is how to introduce the temporary head of division. Cramer basically took advantage of his power of transition by proposing an integration of the two companies i.e. the BrandMaker and the EAD mainly for the purpose of minimizing costs. The organizational structure between these two companies greatly varies and this brought a clear difference of the CIM and EAD. BrandMaker mainly focused on innovation and creativity that creates a unique measure for the market knowledge. EAD was a European business and it included several departments. It was independent in nature and so it was not a brand name like the BrandMaker. The CEO of BrandMaker Tom Moris was in a limbo on which side he was. Carlos Cramer who worked with a company who were competitors with BrandMaker took over and he tried to blend the CIM and EAD. This caused mistrust amongst employee. His move to integrate CIM and EAD caused turmoil and varied reactions amongst the Brandmaker employees.

Sunday, July 28, 2019

Outline The Aims Of The United Irishmen, 1791-1794 Essay

Outline The Aims Of The United Irishmen, 1791-1794 - Essay Example The first organizations were begun in Dublin and Belfast in 1791. The reasons behind the formation of the United Irish Society included frustration with the Whig Clubs lack of interest in parliamentary reform, and inspiration from events in France (Dickson 182). Complete and radical reform of parliament was one early United Irish goal. Although the original militant republican aims that the United Irishmen held accepted monarchy, the United Irishmen would later become anti-English as well as an anti-monarchical republican movement. The original republican aims also included to: "curb powers of central government; to preserve fundamental liberties; and to secure religious toleration" (Elliott xiii). It was only after their original aims were frustrated that the United Irishmen became anti-monarchical and began to consider armed insurrection, with the aid of the French, as a means of liberating Ireland. The United Irishmen were political reformers, but not social reformers (Elliott xvii). Their aim was not to return land back to the Catholics that the English protestants had confiscated. The United Irishmen sought national self-determination for all religions within Ireland. Their main aim later in the 1790s was an Irish revolution. The United Irishmen movement consisted of roughly equal numbers of Catholics and Protestants; however, the leaders of the movement were mainly Protestants (Elliott xiii). It is through this later aim for revolution that the United Irishmen formed an alliance with the Defenders, a Catholic lower class secret society. Unlike the United Irishmen, the Defenders did support land being returned to the original Catholic owners. But the Protestant leaders within the United Irishmen were not interested in this type of social reform. In fact, the leaders of the United Irishmen feared that the lower class Catholics would retaliate against the Protestants and attempt land reversal

Saturday, July 27, 2019

Psychological criticism used towards the story The Strange Case of Dr Term Paper

Psychological criticism used towards the story The Strange Case of Dr. Jeckyl and Mr. Hyde - Term Paper Example In her book Routledge Critical Thinkers: Sigmund Freud, Pamela Thurschwell dwells more deeply on the conception of the human psyche, that is, Freud’s iceberg metaphor. She explains the struggle between the Id, Ego and Superego in the following manner: a. Id: Basic needs - it is all about me. Not reality based. b. Ego: Reality based or alters reality to justify his actions. c. Superego: Social programming - what is acceptable for the character - morality and conscience. (81-83) This particular piece of fiction by Stevenson is most commonly associated with the rare mental condition often referred to as â€Å"split personality† disorder, where there exist two distinct personalities within the same person. This notion is also connected to the so called â€Å"doppelganger† motif, which represents a tangible double of a living person that typically represents evil, a notion which predates Freud’s concept of the repressed, unconscious alter ego. The doppelganger represents the narrator’s attempt to project an inner evil into the outside world, which is exactly the case with Jekyll. This idea has been widely used in literature, ranging from authors and works like Oscar Wilde’s The Picture of Dorian Gray, Edgar Allan Poe’s â€Å"William Wilson,† Fyodor Dostoyevsky’s â€Å"The Double† and many others, whose protagonists find their identical nemesis in a psychological self-splitting process. This notion centers on the conception of humanity as dual in nature, even though the readers become fully aware of this in the last chapter, when the true story of Jekyll and Hyde emerges before them. Until the very end of the novella, these two characters seem nothing alike, and one can by no means make the connection between the well liked, respectable doctor Jekyll and the indescribably hideous and disfigured appearance of Hyde: â€Å"He is not easy to describe. There is something wrong with  his appearance; s omething displeasing, something downright detestable. I never saw a man I so disliked, and yet I scarce know why. He must be deformed somewhere; he gives a strong feeling of deformity, although I couldn’t specify the point. He’s an extraordinary-looking man, and yet I really can name nothing out of the way. No, sir; I can make no hand of it; I can’t describe him. And it’s not want of memory; for I declare I can see him this moment.† (Stevenson 12) When Enfield relates to Utterson how he watched Hyde trample a little girl underfoot. Utterson asks his friend to describe Hyde’s appearance, but Enfield, as the quote indicates, proves unable to formulate a clear portrait.  This lack of eloquence does not mean that he did not see him clearly. Quite the contrary, the image of Hyde is branded into his mind as he speaks, yet he fails to articulate Hyde’s ugliness and deformity. This creates the impression of Hyde as being almost intangible, m ysterious, beyond words, just as he is beyond morality and conscience. Viewed as an almost supernatural creation, he is not of this world, and correspondingly, he manages to evade the comprehensive faculties of human beings. He represents the evil

Friday, July 26, 2019

My Writing Process Essay Example | Topics and Well Written Essays - 250 words

My Writing Process - Essay Example My Writing ProcessMy writing process reflects in the picture in the Slide # 6. For me, writing is a medium of expression of feelings, desires, thoughts, emotions, and unsaid words. It is an infinite field where I can play. I generally remain very calm and peaceful but deep inside my mind and heart, there are several not-so-peaceful things going on all at the same time. Crime, violence, and lack of justice make me upset. The sad feelings keep intensifying inside my heart and when there is no more capacity, they start coming out of my pen over the paper like the gas escapes a pressure cooker. I can relate my writing process to the picture in the Slide # 6 as there is gas leaving the fissures with tremendous pressure while the rocks are sitting in the water that symbolizes my calm mood and peaceful nature. It seems like my self-has been translated in terms of the various features in the picture. The feature that specifically translates my thoughts is the steam escaping from the rock fis sures. I let my thoughts out while I am writing. I am a very careless and irresponsible writer generally. One after the other, all my thoughts, emotions, and messages keep emerging on the paper in ink in a disorganized fashion. Once I am done, I review the whole paper to draw conjunctions between different words, sentences and paragraphs so that the final piece of writing conforms to the rules and principles of standard writing.

Ost benefit framework to analysis cloud computing Essay

Ost benefit framework to analysis cloud computing - Essay Example This research will begin with the statement that Higher Education Institutes around the world have the necessity of having information technology in their institutions. The various institutions have a transition and now moving to cloud computing technologies, which is critical in shifting the cost of operation. The improvement on cost is coming from the fact that the services are no longer â€Å"locally hosted† but are now in a â€Å"rental model†. Apart from cost-benefit, cloud computing has the advantage of being available and resilient. There is an analysis of the benefits of cloud computing. The outcomes of the researchers demonstrate that there is an open door for both institutions of higher learning and Cloud suppliers to team up keeping in mind the end goal to upgrade the nature of administrations and decrease costs. There is an ambitious plan by the government of India to raise the enrollment of students in higher education from the current 16 million to 42 mill ion by the year 2020. There is also a plan interconnect the universities and colleges and offer e-learning in the process. All these plans will be made possible and cheaper through cloud computing. The system of education that has its basis on cloud computing provides efficiency where the construction and sometimes maintenance is by the cloud computing suppliers. Many organizations apart from the educational institutions are adapting to the Cloud computing services as it has a higher return on investment

Thursday, July 25, 2019

Why did Slavery Come to be the Dominant Labor System in the Southern Essay

Why did Slavery Come to be the Dominant Labor System in the Southern Colonies - Essay Example The workforce in the agricultural sector in the southern colonies was mainly comprised of Europeans servants who worked on indenture basis. Although the Europeans still offered labor, African slaves were the better choice for planters because they were cheap to maintain and more productive. By mid 17th century there was a massive shift towards slave labor in the south since demand for food was rising with expanding markets. At this time Africans had started to be shipped and be sold as slaves to Americans. The climate and soil in the south were more favorable for agriculture than those of the north. This made the sound to be heavily dependent on labor for development of plantations. The south as stated above was an ideal region for agriculture all year round and crops like tobacco and rice thrived well. These crops are labor intensive and the lands were quite vast. Therefore, a huge potential of the southern lands remained untapped considering that there were many waterways where cro ps could be transported to overseas markets. As these farms grew labor shortages became intense and by the end of the 17th century more than 500 Africans had been bought as slaves to meet the demand (Schneider and Schneider 48). This trend was soon followed by withdrawal of indentured European servants since many had saved enough to buy their own land and start farming. America was quite big and unexploited by then and the Europeans found no reason not to venture into far away lands. The Bacon’s Rebellion also saw many planters release white servants as they proved to be a danger to political stability. In this regards an alternative had to be sought to counter the exodus of the white servants. By mid 18th century a total of 235,000 Africans were in America and 85% of them worked in the southern colonies of Virginia, Georgia, North and South Carolina (73). African slaves however came to be fully exploited after failed trials were made on Native Americans (Rodriguez 106). Many of them died from European diseases while many others ran away since they knew the land better than the Europeans. This left the planters no choice but to take in African slaves. This followed a massive expansion of plantations in Georgia and South Carolina which translated to increased production levels of rice and tobacco. These slaves did a great deal of work which the white servants had refused to do for example draining of swamps. West Africans came in handy especially in rice growing plantations since they were familiar with the kind of work required as their mother lands grew rice. Slaves worked for 15 hours on a daily basis especially during the harvest season (Norton and Sheriff 27). One overseer was required to supervise a minimum of 20 slaves doing back-breaking work and when a slave lazed around, the overseer was supposed to whip them. The fact that slaves were cheap to buy and maintain saw planters buy them in masses so as to plant and cultivate more. As earlier indica ted slaves used to work for many hours per day which translated to bumper harvests and therefore booming plantation business. Many plantation owners like the Byrd family from Virginia turned to be quite wealthy (58). Such families came together to form elite classes of planters in the southern states who ensured that slave trade remained because it was a lifeline to their wealth. Southern colonies had vast fertile lands for agriculture where Europeans worked as servants on indenture basis. The vastness and the need to grow crops on large scale raised the need to have more workers. Slave trade was on the rise by mid 17th century and it saw many planters buy African slaves to work in

Wednesday, July 24, 2019

Pragmatism and Feminist Epistemology Essay Example | Topics and Well Written Essays - 750 words

Pragmatism and Feminist Epistemology - Essay Example In ordinary terms, pragmatism is known as a method of putting aside an ideal temporarily, to work towards achieving a more simple and achievable goal. It has greatly helped to clarify intractable metaphysical and epistemological disputes (McDermid, "Pragmatism," par.14). The simplest way of solving a dispute has been put forward by suggesting that arguing metaphysicians should ask themselves if any solid practical difference will be made as a result of their argument being proved right. If no such difference is made, practically there should be no disagreement and hence, no problem. Theories and models are gauged solely on their effects and benefits and not on ancestral data or facts. Dewey emphasized that the use of a theory is judged by its problem-solving power and not by qualitative standards for example, the consolation and subjective comfort it gives (McDermid, "Pragmatism," par. 16). It must be used if it's proven reliable over the times but to the extent till which it is givi ng practical solutions. The idea is that eventually, a theory must be replaced by another theory which works better for that time. In short, it emphasizes that what might be true at one point in time or in one context may differ if judged at a different point in time or in a context different to the first. James mentioned in his lecture that he gave in 1946 that it is astounding when one sees how many philosophical clashes and disputes fall into insignificance when they are put to the test of extracting a concrete consequence out of it ("What Pragmatism means," par.9). Feminist epistemology and its philosophy analyses the way in which the difference in gender does and ought to influence our understandings of knowledge, the knowing subject and practices of inquiry and justification (Anderson, "Feminist Epistemology and Philosophy of Science," par.1). It is a loosely organized approach to epistemology rather than being a significantly different theory. There is emphasis on the epistemic significance of gender and the use of it as a separate analytical category in debates, criticisms and reconstructions of epistemic practices, trends and ideals (Janack, "Feminist Epistemology," par.1). The feminist approach has its sources from various sections of thoughts including feminist science studies, naturalistic epistemologies, Marxist feminism, object-relations theory, development psychology and postmodernism etcetera. It generally looks at ways in which dominant conceptions through various platforms, disadvantages women and other subordinate groups systematically. It then works towards reforming such trends to help the aggrieved groups. Feminist philosophers investigate how gender situates knowing subjects; they have divided this quest into 3 categories: Feminist stand-point theory, feminist postmodernism and feminist empiricism (Anderson, "Feminist Epistemology and Philosophy of Science," par.1). Some feminists regard development psychology and object-relations theory to be troublesome as it assumes some specific commonalities in child-rearing that goes beyond the class and race differences. Also the claim that woman tend to reason differently than men, regardless of th e source of that difference, is thought to be wrong and politically

Tuesday, July 23, 2019

Education level vs. GDP per capital (Analysis) Essay

Education level vs. GDP per capital (Analysis) - Essay Example From the table above, there is less than 5 years of elementary school and the GDP are perfectly negatively correlated. There is a relatively strong correlation between 4 or more years of college and GDP per capita than there is between high school completion or higher and the GDP per capita. This means that those who have less than 5 years elementary education contribute less to the country’s GDP per capita as compared to high school completion and 4 or more years of college. The longer one takes in learning, the higher they contribute to the GDP per capita. From the regression analysis output above, the equation of the model is y = -1129498.874 +583.606*Year. This is to show that there is a significant relationship between the GDP and the education level as years spent in school is part of the model formula. Based on the four years moving average of the country’s gdp above, it is healthy to assume that the country’s GDP is improving exponentially over the years with the forecasted GDP almost meeting the actual GDP (Corder, &, Foreman, 35) Even though the data provides that there is a strong correlation between education level and the gdp, IT is imperative to note that the GDP as it is, is a wide econometric term used to refer to a number of variables. Therefore, the relationship between the educational levels and the GDP may be assumed correct in the light of the data but not in real life scenarios. One is likely to realize that the GDP alone to be strongly correlated to the other macroeconomic factors than just educational level. It is therefore important to conduct anon parametric analysis on the other variable before making a concrete conclusion (Spearman,

Monday, July 22, 2019

A Study Of Anatomy And Psychology Essay Example for Free

A Study Of Anatomy And Psychology Essay The procedure in lifting the leg to climb a stair is a complex one which involves a huge amount of technology inter-transfer between the brain and the eventual skeletal muscle. There is initiation of the movement at the brain which is transmitted via specialized white fibre tracts to the hip flexors via the intermediate spinal cord, involving a very complex mechanism at the cellular level   The initiation of the   process is at the motor cortex (Ms I) of the brain. The primary motor area is located at the precentral gyrus of the frontal lobe. The area controlling the motion of the lower limbs lies towards the superior surface of the brain. Within this area lies the cell body of the primary neuron. These neurons are known as upper motor neurons (UMN). These UMNs receive modulating impulse from the inputs from the cerebellum and the basal ganglia via the extrapyramidal pathways. These tracts modulate the gross movement initiated at the frontal cortex. In turn these areas are modulated by afferent signals from ascending spino cerebellar, and spino-thalamic pathways. The complex the signal initiated at the nucleus of the cell body is transmitted electronically via the axon of the myelinated neuron via the mode of salutatory conduction. The myelin sheath which surrounds the axon of nerves that involve fast transport, breaks at intermediate regions known as Nodes of Ranvier. The electrical impulse moves in   a jumping manner at these nodes nerve transmission as a neural impulse, generated by the formation of a nerve action potential. Like all excitable tissue, nerves maintain a resting membrane potential that is the difference of voltage across the membrane of the neuron. In neurons this value is   70 mV. This voltage difference is maintained by the Na/K pump on the membranes. This impulse generated at the axon hillock is transmitted via the depolarizing phase which allows sodium ions ingress into cells via opening of the Na channels. This entry of Na in one portion allows activation of other Na channels, causing depolarization of the adjacent region of the neuron. Subsequently repolarization occurs via the opening of K channels, which restores the membrane potential. Thus this process continues which allows the transmission of impulse. Many such nerves together descend as the descending cortico spinal tract in the pyramidal system, which travels through the midbrain into the spinal cord, decussating at the level of midbrain( 90% of the fibres decussating and forming the lateral spinothalamic tract) and again at the level of spinal cord ( the other 10%, forming the anterior spinothalamic tract) . It is the former which is responsible for the lower limb movements. The cortico-spinal tract travels in the anterior horn cell of the spinal cord till the lumbar level where they synapse with the spinal ventral root neuron (lower motor neuron). A single post-synaptic neuron receives signals from many neurons. At the axon terminal, the propagation of impulses leads to release of neurotransmitters, which are stored in specialized vesicles. The released Ach diffuses into the synaptic cleft and binds with receptors on the post synaptic membrane to produce excitatory post synaptic potentials. This leads to generation and propagation of impulse in nerves which are destined to innervate the neuro-muscular junction. At the neuro-muscular junction, Ach is released, which diffuses into the synovial cleft and binds to receptors in the motor end plate, and triggers a muscle action potential. The released Ach is destroyed by the acetylcholinestrase. At the level of the sarcolemma of the muscles, the muscle AP travels along T-tubules, opening Ca release channels in the sarcoplasmic reticulum. Ca binds to troponin-tropomysin complex, which releases the myosin heads, these then bind to the actin thin filaments, and draws them closer to the M line. Meanwhile bringing the Z disc closer. This leads to muscle fibre contraction. This is a self propagating sequence eventually leading to the contraction of ilio-psoas muscle, which causes the flexion of thigh on the pelvis. Each nerve fibre innervates many musle fibres ( about 150). This is   the motor unit. The greater the number of motor units recruited by the nerve action potential, the greater the force of contraction of the muscles. In the spinal cord, nerve impulse travels along the lumbar plexus (L1-L5) to innervate the iliopsoas ( hip flexion- ilio-inguinal nerve), biceps femors, semitendinosus and semimembranosus ( knee flexion – sciatic nerve), ankle flexors ( EHl, EDL, TA – tibial nerve), leading to the person climbing the step. This excitatory impulse is also associated with the production of inhibitory action potential ( hyperpolarizing impulse) in the antagonists (eg the glutei, which must relax to allow flexors to act. In the event of raising of the upper limb above the head, to lift a book, the impulse travels along the cortico spinal tract till the level of the cervical cord to synapse with the lower motor neurons of the brachial plexus ( C3-T1). From here the nerve impulses travel to shoulder elevators ( supraspinatus, deltoid, trapezius, and latissimus dorsi)- posterior cord ), elbow extensor ( triceps and anconeus – radial nerve) wrist extensor ( ECRL, ECRB – radial nerve), finger flexors ( FDS, FDP – median nerve and the ulnar nerve)   and the intrinsics – ulnar nerve and the median nerve)

Hyper reality and Celebrity culture Essay Example for Free

Hyper reality and Celebrity culture Essay Nowadays media and technology are growing as hard to predict. Affected to the social behavior, Human cant recognize the truth; we confused by the hyper reality, we involuntarily to follow the system in our life. Hong Kong is a tiny city with flourishing information. The life style is the faster the better, it develop a lot of a copy action in different business, especially in wedding industry, meanwhile Hong Kong peoples are highly depend on Internet, the city haven’t realize its lead by celebrity culture and media. In this past five-year in Hong Kong had created a new way to represent news call â€Å"action news† they use 3D animation represent the whole happened in internet, but Is it the visual in the animation is real? People in Hong Kong emphasize wedding customs and traditions. It usually takes more time in Hong Kong than in United States to prepare a wedding. Comparing to the casual wedding in United States, wedding in Hong Kong are more complex, In fact wedding it can just like Las Vegas, spend $25 and have a simple marriage. This process takes less than 2 hours. Because of the celebrity culture and hyper reality changes Hong Kong wedding more in last ten year. In Hong Kong wedding like a system or a show, the bride and groom will take photo in royal family style then print like an oil painting with the frame. The banquet will have backdrop for the guest-taking photo with the bride and groom, and the backdrop will have the designed logo for the newly wed. They will have an emcee for the banquet; they will play the game, sing etc. R. Penfold-Mounce(2009:12) believes â€Å"Celebrities in society influencing fashion, how we furnish our home, and even the food and drink we consume. The reason to have all these action are not traditional behavior, It all just come out by the Royal wedding and Celebrity. Royal wedding has affected the standard how about wedding should be. Media showing the Royal or Celebrity wedding over the world by television. The audience will try to follow or copy the wedding in the design, dress, picture angle and style. You can compare the different of photography royal family with Hong Kong people. (picture 1-2) S. Holmes and S. Redmond (2006:60) agree, â€Å"Adulation, identification and emulation are key motifs in the study of celebrity culture. The desire for fame, stardom, or celebrification stems from a need to be wanted in a society where being famous appears t offer enormous material, economic, social and physic rewards† Some wedding they will design a souvenir, it based on royal wedding souvenir, they are giving a cup, a little decorative items. (pictures 3-5). Those item were made without any purpose, there has not use value. It was created by â€Å"emulation†, If we see clearly about need is a concept without desire or personal require. It just system twisted desire to be rationalize and abstract. J. Baudrillard, (1988: 161). The new wedding behaviors have no meaning, but it getting to change be traditional behaviors, People getting to believe the new wedding behaviors are important in wedding. Media, Photo, Video, Facebook help wedding behavior explode to everyone, then people try to duplicate their wedding same as what they saw, after 100 times duplicate, people think new wedding behaviors are inevitable and right. Facebook network bring the wedding to a half public space, people post photo, in addition everyone got camera, it make wedding can’t escape to be public. In this status the bride and groom will change to be well know in their area. It is the reason to reinforce they have new wedding behaviors, because the wedding is in the public space, masses will know how’s the wedding look like, masses will discuss about, wedding transform to be a issue. The great amount of representation, people gradually lose the reassessment on new wedding behavior. According to C. Mclninch(2008) â€Å"Assimilation being further affirmation of the individual’s mastery of an idea and of the individual’s place in the world in reference to that idea. In view of new wedding behaviour related to culture industry, in that case they are unity, repeat, deception, falsehood, operation and forcibly. Hyper- reality or media accelerate new wedding behaviour to intrude our mind and it permeates our mental. J. Baudrillard(1988:98) said â€Å"as a sort of historical attraction to the second degree, a simulacrum to the second power. † The new wedding behaviours are deception and falsehood; the wedding photography companies build up a hyper reality land for the bride and groom to takes photos. There normally like a Destiny land or cinema studio, people can easy to cross around the world, they imitate Beijing the Forbidden City, Europe church, USA Main Street and something you can expects (picture 6-11). Because of the high emulation building complex, Human the examination will get weak. At the same time there is not original emulation, consequently human will forget how is the real Forbidden City look like, human impress is the emulation of Forbidden City, Reality will cover by Simulation. J.  Baudrillard(1988:113) believe â€Å"The Disneyland imaginary is neither true nor false: it is a deterrence machine set up in order to rejuvenate in reverse the fiction of the real. Whence the debility, the infantile degeneration of this imaginary. It’s meant to be an infantile world, in order to make us believe that the adults are elsewhere, in the â€Å"real† world, and to conceal the fact†¦Ã¢â‚¬  The Disneyland is really similar the wedding company’s studio, they smash down â€Å"I believe what I see†, because mess media cover us with simulation. With presentations â€Å"The medium is the message. This is merely to say that the personal and social consequences of any medium that is, of any extension of ourselves result from the new scale that is introduced into our affairs by each extension of ourselves, or by any new technology. † M. Mcluhan(1964:124) Nowadays Hong Kong people highly depend on Internet, News geometry level to spread out. In an hour we can’t imagine how many viewer in one title of news. But we never perform an in-depth investigation on the news viewpoint, The director of â€Å"Simone† Andrew Niccol(2002) said† It’s easier to make 100,000 people believe than just one. Media really understand Niccol speech; Media selective represent the true in the society, Media will try to test the masses, find out which part of true the masses will accept, afterward media will simulacra then keep representing. Different news media represent news in different way, even in same issue, base on reporter viewing point, the news head tittle and visual representation are influence the masses how understanding the message. For example in Protest at Dolce and Gabbana store in Hong Kong follows alleged ban on photography. To analyze the tittle, picture, editing and emulate. It all started when a local tabloid newspaper reported that security guards stopped people from snapping pictures outside its flagship Hong Kong store in Canton Road. What really incensed local sensibilities was that one of the doormen apparently told a local man that the photo ban was not extended to Mainland Chinese tourists. That prompted a barrage of online comments on Hong Kong web sites accusing DG of blatant â€Å"racism† and claims that international brands have, in general, become too dominant on Hong Kong streets. Hong Kong has 54 different Daily newspapers but in this news just only reported by one daily newspaper name Apple daily. Apple daily represents the DG news in front page more then 3 days, and every day up loads a video on youtube. Let it explode by the Internet, the title of the first day is â€Å"Evil tyrant DG said don’t take photo with our window display. † In the begin the tittle haven’t mention any about â€Å"racism†, in the first day video chorus mention Mainland Chinese people allow to take photo, Hong Kong people Go away! , But in that 2:00 video they mention reporter had testing twice to take photo in font of the shop, it will mess up the original happen, because the second time is a truth effect or reality effect. In the video never showing any people who represent DG say any about â€Å"racism†, The only said â€Å"racism† was the chorus. Previously had been mention when human facing great amount of representation, people gradually lose the reassessment, public haven’t ask for the video clip with the actual DG staff to said about â€Å"racism†. The Second day, other daily newspaper start to mix into this hyper reality project, but they all just present on a tiny space of a whole page, the video just report how masses feel about DG with the no snapping issue. On another hand April daily used the tone on the presentation was totally different, they keep used the front page on DG issue, Video-showing peoples taking photo in font of the DG store with a tittle †DG very obstinate, everybody snap a shot!. † The intention is obvious; they try to encourage people to take a photo in font of DG store. They find out the masses most interesting in freedom and racism problem on the DG issue form all those comments about the first video they post on youtube. Then third day apple daily got a celebrity take picture in font of the store, and report facebook had a group, hadn’t mention who create the group, just mention who many people â€Å"likes†. You can see how media step by step building a simulation. â€Å"Once upon a time there were mass media, and they were wicked, of course, and there was a guilty party. Then there were the viruous voices that accused the criminals. And Art (ah, what luck! ) offered alternatives, for those who were not prisoners to the mass media. †U. Econ(1990:153) , The masses haven’t to seek for What is the reason apple daily need taking photo in font of DG store, Where is the video clip about DG said about â€Å"racism†, Who create the facebook page to against DG Hong Kong store. The masses totally get in to fascination by media. J. Baudrillard(1995:85) think fascination is append on the happen is fading away, when the happen is disappear, people just only facing fascination. He also agree Media is a place of disappearance, because Media is a place to eliminate meaning, message and symbol. The third day on DG store issue, Apple daily present more then10000 protesters in font of the DG store, other daily newspaper had different number on the protester result around 10000, a lot of protesters, It really confuse us to know how many protesters in the actual situation. But the DG protest explodes to different media, TV, radio, Internet. The frequency of representation to increase many times over, the focus point form masses is shift to Are we need to attend the DG protest? The masses totally forget why apple daily need to take photo in font of DG store. Since the frequency of representation the second day of the protester had redoubled. Apple daily the tittle for fourth day was† When DG will apologize. †, media to drive masses request DG apologize, DG have no alternatively to provided press release about apologize for specific staff indiscretion. In that short-term Apple daily create an untrue speech to be a speech had more then 40000 people believed. Everything just a media using information technology create a simulation, simulation dominate our world, the between representation and objective, notion and object there has no any distinction. â€Å"We live in a world where there is more and more information, and less and less meaning. † J. Baudrillard(1995:98) proved Media montage numerous similar massages, a lot of them are without meaning, and media is leads masses to a lost area. Truth sneak into different shooting angle or retouching it will change to â€Å"effect† base on technology create a â€Å"truth effect†, media exploit these â€Å"effect† to attract masses or try to affect their judgment, Media is mislead the public with prevarication and deliberate falsehoods. â€Å"Seeing is believing† is can’t apply on nowadays news anymore. Besides they can pretense that turns into reality, Apple daily also is the first daily newspaper using 3d animation to represent news; They start it from the 3d pictures (picture x), in this few years they develop to 3d animation. They call that 3d animation news in â€Å"action news†. â€Å"Action news† that animations story are composite with different people information about the news, plus editor arrange and computer graphics try to fitting in with the story, to build up a lively and realistic way to present the â€Å"truth† they consider as, let the public can more understand to discuss about the topic. Even apple daily everyday will produce 10 to 15 news to â€Å"action news† but not every single news will adding with animations, normally they base on text characterization, then adding some information are hard to distinguish real from imitation. For example on â€Å"one action news† from 3/4/2010, compares the text version and the animation version, there had add many extra parts in the case like Beach dating, the defendant had take off victim’s clothes, the victim crying in font her mother and how the situation and expression when policemen search the defendant flat, those plot in text version haven’t any mention about, but they are the news plot form â€Å"action news†. (Reference 2) In fact, a lot information form the case haven’t explain really detail like background, but in â€Å"action news† had been explain really clear, How does the flat look like of the victim and the defendant, even floor and furniture in the flat, â€Å"action news† they present it all to the masses, compare other news daily information about the same news, had not mentioned any information about their flat. How apple daily know how their flat look like? How they know the victim must cry when she express to her mum. Obviously, â€Å"action news† had push picture represent news to an other level, It help media easier to arouse masses emotion, to cause masse consume, base on J. Baudrillard (1995:129)â€Å"†¦the original and the distinction between reality and representation vanishes. There is only the simulacrum, and originality becomes a totally meaningless concept. † Since original had be represent that is not truth any more, is just a concept. Now â€Å"action new† steps in to another level, using simulations to show â€Å"real†, Through our common sense to create the â€Å"real† they though, that is â€Å"hyper reality â€Å" They are deliberately to copy same as â€Å"real†, naturally masses start believe â€Å"hyper reality†, gradually masses forgot the truth. Along with media science and technology rapid development, nowadays media has different way to copy â€Å"real† or simulacra, like building, video, retouching and 3d animation. It increase human or media the confidence and ability to control â€Å"real†. Media and consume society operate our behaviour, When we look back at history, we just find out many no meaning behaviour or simulacra, we never find individual idea and original. Technology brings out human the power and desire control â€Å"real†. We step by step fall into hyper reality. In addition different government, structure and organization they got their own reason to hide the â€Å"truth† to the public. Now even a ordinary people represent him / her self in facebook. How many facebook user equal or more then how many simulacra, News and wedding are just only part of our life, but we are trapped beyond hope of rescue.

Sunday, July 21, 2019

Using Thin Layer Chromatography To Monitor Reactions Environmental Sciences Essay

Using Thin Layer Chromatography To Monitor Reactions Environmental Sciences Essay Thin layer chromatography (TLC) is a very useful technique for monitoring reactions. It can also be used to determine the proper solvent system for performing separations using column chromatography. TLC stationary phases are usually alumina or silica. They are polar for standard experiments or non-polar for reverse phase chromatography. The mobile phase is a solvent whose polarity is chosen by the person conducting the experiment. In most laboratory work standard phase silica plates are used. Different compounds will travel different distances up the plate depending on the polarity of the components of the mixture. The more polar compounds will be more attracted to the polar silica gel and travel shorter distances on the plate. Mon-polar substances will spend more time in the mobile phase and as a result will travel larger distances on the plate. The measure of the distance a compound travels is called the retention factor (Rf ) value. The retention factor, or Rf, is defined as the distance traveled by the compound divided by the distance traveled by the solvent. For example, if a compound travels 2.1 cm and the solvent front travels 2.8 cm, the Rf is 0.75: The Rf for a compound is a constant from one experiment to the next only if the chromatography conditions below are also constant: solvent system adsorbent thickness of the adsorbent amount of material spotted temperature Since these factors are difficult to keep constant from experiment to experiment, relative Rf values are generally considered. Relative Rf means that the values are reported relative to a standard, or it means that you compare the Rf values of compounds run on the same plate at the same time. 1.1 Thin Layer Chromatography There have been a numbered of important milestones in the evolution of chromatography in the last 100 years. Each of these milestones has signalled the start of an important branch of chromatography. Some examples of these are; partition chromatography (1941), gas chromatography (1951-1952), high performance liquid chromatography (mid- 1960s), capillary electrophoresis (1980) and capillary electrochromatography (past decade). In all the chromatographic techniques mentioned, separation is carried out in a column. However, it is also possible to carry out separations on a planar surface. Two examples of this are paper chromatography (1944) and thin-layer chromatography (1937-1938). Thin-layer chromatography (TLC) replaced paper chromatography as the most popular, routine chromatographic technique. TLC was first used in 1937 to 1938 by Nikolai A. Izmailov and Maria S. Shraiber at the Institute of Experimental Pharmacy of the State University of Kharkov. At the time Izmailov was the head of the institute and Shraiber was his graduate student. They were searching for a method for the rapid analysis of galenic pharmaceutical preparations (plant extracts). As classical column chromatography would have taken too much time they felt that if the absorbent would be prepared in the form of a thin-layer on a glass plate. They believed that it would behave like a column but the characterization time would be much shorter. They coated microscope slides with a suspension of various adsorbents (calcium, magnesium and aluminium oxides). They deposited one drop of the sample solution on this layer and added one drop of the same solvent used in a column to develop separation. The test was a success as the separated sample components appeared as concentric rings that fluoresced in various colour s under a UV lamp. They showed that the sequence of the concentric multicoloured rings on the plate would have been identical to the sequence of coloured rings obtained on a normal chromatographic column. They called this technique spot chromatography and the result on the microscope slides ultrachromatograms. The paper on this experiment was published in a Russian pharmaceutical journal that was practically unknown outside the then Soviet Union. Its abstract was included in a Russian review journal and through it in chemical Abstracts. It was then read by M. OL. Crowe of the New York State Department of Health. He then adapted the technique for his own use. Crowe prepared the adsorbent layer in a Petri dish, added a drop of the sample solution in the centre and then added the developing solvent dropwise until sufficient separation was obtained. In 1947 T.I. Williams described a further improvement of the method of Izmailov and Shraiber in his textbook on chromatography. He prepared the adsorbent-coated glass plates in the form of a sandwich. The adsorbent layer was covered by 2 glass plates and had a small hole which the sample drops could be applied through. Meinhard and Hall made the next major step in the development of TLC at the University of Wisconsin. They used corn starch, which acted as a binder, to hold the coating on the glass plate and added a small amount of Celite powder to the adsorbent particles to improve the consistency of the layer. They called this surface chromatography. They used it to separate inorganic ions. Modern TLC started 50 years ago with the work Department of Agriculture Fruit and Vegetable laboratory in Southern California. He investigated the flavour components of the juices of citrus fruits. However, he stated that very large volumes had to be processed because the amount of flavour material was extremely small. Another problem was in finding an analytical method for the investigation of the juice concentrate composition. He followed the method of Meinhard and Hall that he read in Chemical Abstracts. However, instead of adding just a drop of the developing solvent he developed the plates as in paper chromatography. The plates were developed in a closed chamber and one side was dipped into the solvent. The solvent then ascended through the plate by capillary action. It carried with it the sample components and they were separated as a result. The experiments carried out were published and are considered the start of modern TLC. Egon Stahl was responsible for TLC becoming a universally accepted technique. He was also the first to use the term thin-layer chromatography to characterize the technique. This choice of name was almost immediately accepted. Stahl investigated various essential oils and obtained good results using adsorbent-coated glass plates. However, neither the method nor the adsorbent to be used had been optimized. Also, the adsorbents had to be modified and treated before they could be used for the coating of plates. Stahl started investigating the operational parameters and the adsorbent preparations. In the spring of 1958 his efforts were fulfilled as the necessary basic instrumentation, made by Desaga and silica gel G according to Stahl for TLC, made by E. Merck were both introduced at the international Achema exhibition of chemical equipment in Frankfurt. Stahl also published an article outlining the use of the system and a wide range of applications. Because of this standardized method TLC became a widely used laboratory technique. He also went on to publish a TLC handbook in 1962. Although TLC had a wide application it was still thought to be a qualitative technique for the analysis of simple mixtures. As a result advances were directed toward improving the technique. Instrumentation which permitted more precise spotting of the sample onto the plates and the quantitative evaluation of the separated spots was developed. Faster analysis and higher separation power was also achieved. As a result of the higher performance ability the name was change to high-performance TLC (HPTLC) by R.E. Kaiser, who was instrumental in its development. The particle size and range of the adsorbent was the main difference between TLC and HPTLC. The silica gel for TLC had broad particle sizes of 10-60 µm with an average of 20 µm whereas HPTLC has an average of only 5 µm. the HPTLC plates were also smaller in comparison with TLC plates, 10 x 10cm and 20 x 20cm respectively. The improved method and design allowed reduction in the diameter of the starting spots. These improvements lowered the analysis time and increased the efficiency. Problems arose with flow rate which Kaiser overcame by applying pressure to the TLC plate. This in turn led to forced-flow TLC. Due to the constant condensation-evaporation process associated with developing TLC plates in developing chambers problems can be encountered because of the changing velocity of the mobile phase. To overcome this forced-flow TLC (FFTLC) was developed by Tyihà ¡k, Mincsovics and Kalà ¡sz. In this method the spotted plates (dry) are placed into a pressurized development chamber. The stationary-phase layer is tightly covered and sealed on its side by an elastic membrane and pressurized by an inert gas or water filling up the cushion above the layer. The mobile phase is delivered via a pump at a constant velocity through a slit in the membrane to the stationary phase. There are various configurations which can be handled using this method. TLC is a very simple technique. As a result very little instrumentation is needed. Application of samples to the stationary-phase is carried out using a micropipette or syringe. The developing chambers are simple glass structures. Detection is carried out by visual inspection or made visible by spraying the plate with reagent. Also, a wide variety of precoated plates are available so coating equipment isnt needed. In more advanced systems the samples may be spotted by automated loading devices (dosimeters). This allows the application of small and uniform sample spots. More sophisticated developing chambers are also available (FFTLC). The plates can be scanned by densitometers and quantitatively analysed using absorbance or fluorescence measurements. Chromatograms with peaks of the individual separated spots recorded against the length of the plate are produced with such analyses. Their area is also a proportion to the amount present. More complex systems can also be created by combining TLC systems with other systems such as mass spectrometry and Fourier transform infrared. 1.2 Ink Analysis Ink analysis is a very important forensic procedure. It can reveal useful information about questioned document. Modern inks contain many substances which are aimed at improving the ink. The most important component of the ink is the colouring material. It comes in the form of a dye, pigment or a combination of both. Dyes are soluble in the liquid body of the ink, also known as the vehicle. Pigments are finely ground multi-molecular granules that are insoluble in the vehicle. The vehicles composition affects the flowing and drying characteristics of the ink and can consist of oils, solvents and resins. 1.3 Chromatography Studies Djozan et al developed a new and fast method for the differentiation of inks on a questioned document. They designed specific image analysis software for evaluating thin layer chromatograms. They sampled forty-one blue ballpoint pens which were purchased from their local markets in Iran (Table 1). They first wrote a circle of diameter 5 mm uniformly by pen on a paper. One fourth of this was then punched out for extraction. They carried out extraction in 1 ml glass tubes and added 0.1 ml of methanol. This was then vigorously shaken for 1 min. the ink component was then fully dissolved in methanol. The supernatant methanoic solutions were then used to spot the TLC plates. A blank sample of paper with equal dimensions was also treated in the same way. Table 1. List of blue ballpoint pens studied List of blue ballpoint pens studied 1 Cello pyramid 0.7 mm fine TC ball 2 OBA 3 AIHAO 4 Bic 01 5 Cenator 6 PARKER 7 A.T.CROSS FINE 8 Pelikan STICK 918 9 Marvy SB-10 1.0 mm 10 Bic 02 11 PIANO crystal 12 My pen 2001 PENS High Quality Bluce CE 13 AIBA 14 STAEDTLER Stick 430M A IRAN 15 Reynolds Medium 048 France 16 EIFEL Elegance 17 CASPIAN STICK 2001 M 18 STABILO liner 308 19 FABER-CASTELL 1.0 mm Medium (transparent) 20 BIC 08 21 Bocheng A-100 22 SCHNEIDER TOPS 505 M Germany 23 FIBER-CASTELL 1.0 mm Medium 24 MILAN PI 1 mm 25 Reform 26 PAPER = MATE FLEXGRIP ultra MED 27 PARKER UK 28 CANDID-DINI 2853 29 STABILO-galaxy 818 M 30 No name 31 No name 32 Zebra Rubber 101 33 SANFORD SAGA 34 Bensia 35 Girls 36 EUROPEN 37 PARS swiss Refill 606 38 STAEDTLER stick 430 M TBRITAIN 39 Lus HF 500 40 No name 41 STABILO bill 508 TLC analysis was carried out on Merck (Darmstadt, Germany) 20 cm x 20 cm silica gel 60 TLC plates without fluorescent indicator. The plates were activated at 60  °C for 20 min and immediately spotted after cooling in a desiccator. The plates were developed in a developing chamber. The mobile phase used was: ethyl acetate/ absolute ethanol/ distilled water (70:35:30, v/v/v). Chromatographic development of the plates was carried out at room temperature for 40 min. All mobile phases were prepared daily with analytical grade chemicals. Enough was prepared to supply the tank for each run. The plates were air-dried after development. The separated compounds were visible on the plate by their natural colour and the plates were scanned into a computer using an office scanner. An IBM compatible PC (Pentium IV) with a 2.6 GHz microprocessor, 256 MB random access memory (RAM) and a hard disk with 40 GB capacity for external storage was used for processing the colour images. The computer was equipped with an on-board graphic card (NviDiA Geforce 7300LE) and a scanner (CanoScan 4200F) was connected to the computer for scanning (300 dpi) TLC plates as digital images. The images were saved as bmp files. Matlab (Version 6.5, The Math Works, Inc.) was used to write a new program to process the previously saved images. Previous studies indicated that Pyridine is the solvent used with ballpoint pen inks. Djozan et al preformed extraction with different solvents using various extraction modes. These modes were immersion of paper into solvent and simple agitation for 1 min, ultra-sound assisted extraction and micro-wave assistance extraction. The results showed that the immersion of paper into methanol or pyridine and simple agitation resulted in complete extraction of the inks from paper (Table 2). Table 2. List of solvents used for extraction of ink components from paper Solvent Solubility of ink colours Ethyl acetate Ethanol Acetic acid Acetone Butanol 1,2-Dichloroethane Butyl acetate Tetrachloroethane Acetyl acetate Cyclohexane Methanol Pyridine Slightly Slightly Slightly Slightly Slightly Slightly Slightly Slightly Slightly Slightly Soluble Soluble No improvement was found using ultra-sound or micro-wave assisted extraction. Methanol was chosen as the extraction solvent due to the safety of the solvent. The selection of the plate was down to the fact that silica gel plates provided the best resolution of dye spots. They selected five mobile phases (Table 3) and found that ethyl acetate/ absolute ethanol/ distilled water (70:35:30, v/v/v) was effective in separating nearly all the dye mixtures. The spot capacity obtained was more than 15. Table 3. Different solvent systems used to develop plate Solvent System Ratio Spot capacity Butanol:ethanol:H2O Ethyl acetate:cyclohexane:methanol:NH3 Ethyl acetate:Butanol:NH3 Ethyl acetate:ethanol:H2O Toluene:acetone:ethanol:NH3 50:15:10 70:15:10:5 60:35:5 70:35:30 30:60:7:2 9 5 10 15 5 Fig. 1. Typical TLC results of 10 different ink samples (Djozan et al, 2008) Fig. 1. shows a typical chromatogram that they achieved in their experiment. To confirm complete separation of all components in the studied sample, two-dimensional (2D) TLC was carried out using various solvent systems. The results proved that the one-dimensional (1D) TLC is able to provide sufficient separation. The first stage carried out was colour image normalization. A function of the input images was computed that is invariant to confounding scene properties but was discriminative with respect to desired scene information. The calculation is as follows: Stage 2 is to compute a colour image profile. The intensity profile of an image is the set intensity values taken from regularly spaced points along a line segment in an image the intensity values are interpolated for points that dont fall on the centre pixel they computed an intensity profile for r, g and b images along the line passing through the centre of the image on the chromatographic development straight of each ink spot. Fig. 2. RGB characteristic of an ink after TLC (Djozan et al, 2008) In stage 3 the colour image profiles were correlated. The intensity profiles were considered as sequences and the normalized cross-correlation of sequences were computed. Cross-correlation is a measure of similarity of two signals. It is used to find features in an unknown signal and compared to a known signal. It is calculated as follows for discrete functions: Eq. (1) For image-processing applications in which the brightness of the images can be due to lighting and exposure conditions, the images can be first normalized. It is calculated as follows: Eq. (2) Stage 4 involved computing image similarity. The weighted mean of and were computed as follows: Eq. (3) The ability of the method to differentiate between various blue ballpoint pens was evaluated by comparing the similarity of different inks according to Eq. (3). Fig. 3. Screen shot of Matlab software running (Djozan et al, 2008) Fig. 4. All possible combination of comparing inks with TLC-IA (Djozan et al, 2008) In 2006 Liu et al published a paper on the classification of black gel pen inks by ion-pairing high-performance liquid chromatography. They stated that black gel inks usually contain several dye components. These components all have different colours and are mixed together proportionally to give the black colour. They used reverse-phase ion-pairing high performance chromatography (RP-IP-HPLC). It was done in such a manner as the dyes couldnt be reversed on the C18 column due to their high polarities. The maximum UV absorption bands of the black gel pen inks obtained were between 500 and 700 nm. The wavelength of the detector was set to 580 nm as most of the dyes had a maximum UV adsorption near 580 nm. They investigated the influence of both volatile and non-volatile ion-pairing reagents on the HPLC analysis of black gel pen ink dyes. All the reagents had different alkyl chain, ammonium acetate, triethylamine (TEA), tributylamine (TBA), dihexylamine (DHA) and tetrabutylammonium bromide (TBABr). The results revealed that the dyes were nearly not retained using ammonium acetate or TEA as the ion-pairing reagent. Using TBABr, TBA and DHA as the ion-pairing reagent, individually, the dyes were separated. TBABr was selected as the ion-pairing reagent as the retention times were shorter than the others and sharper peaks were obtained. They also investigated the buffer solution concentrations and the effect of pH on the separation. The optimum result was: 40 mmol/L TBABr buffer solution (pH 7) with acetonitrile as the organic modifier for IP-HPLC analysis and an identical proportion of the buffer and acetonitrile (v/v = 40:60) at a flow rate of 1.0 mL/min. these optimum conditions were used to separate 50 dye-based black gel pen inks by IP-HPLC. Liu et al carried out another study on ion-pairing HPLC in 2006. This time, however, they studied the degradation of blue gel pen dyes and also used electrospray tandem mass spectrometry. They used ion-pairing reversed phase liquid chromatography as the inorganic compounds they were analysing have weak retention on the ordinary reversed stationary phases when separating on HPLC. This is due to their high polarities. The UV detector was set at 580 nm for the analysis as most dyes have a normal maximum absorption near 580 nm. The UV absorptions of the fluorescence whitening reagents in paper are usually below 500 nm and they had no interference for the detection of the gel pen dyes at 580 nm. Fig. 5. Chromatograms of blue gel pen inks using different ion pairing reagents (Liu et al, 2006) The tested various mobile phases: eluent A: eluent B (acetonitrile) = 50:50 (v/v); eluent A was the buffer of ion pairing reagent with concentration of 40 mmol Là ¢Ã‹â€ Ã¢â‚¬â„¢1 (pH 7.0), and the ion pairing reagent was (a) ammonium acetate, (b) TEA acetate, (d) TBA acetate, (e) DHA acetate and (f) TBABr, respectively. (c) Ammonium carbonate as eluent A (40 mmol Là ¢Ã‹â€ Ã¢â‚¬â„¢1, pH 9.5) and eluent A:eluent B (acetonitrile) = 50:50 (v/v). they found that 10 mmol-1 TBA acetate (pH 7.0) was suitable ion-pairing agent for the purpose and ink samples stored in different conditions were analyzed by IP-HPLC. Significant changes of ink composition were observed. The noticed that the natural aged inks had the similar but weaker degradation trend than the light aged inks. They used HPLC-MS/MS with ammonium carbonate as ion-pairing reagent to obtain the information of the light aged inks and their photodegradation mechanism. In 1994, Varshney et al analysed ink from typed script of electronic typewriters by HPTLC. They used script from seven electronic typewriters. They used the resultant Rf values and in-situ visible spectra of each resolved band of all the chromatograms indicated that the same chemical composition is being used in six typewriter ribbon inks. However, the seventh one is completely different. Fig. 6. Wavelength maxima values of in-situ visible spectrum bands of electronic typewriter scripts (Varshney et al, 1994) Fig. 6. shows the densitograms obtained after scanning and integration of the chromatograms of tracks of individual typewriters and blank paper. The seven electronic typewriter inks could be categorised into two groups after analysis. The first group resolved the sample to four bands including the base. The second group did not resolve the samples at all with the solvent systems used. Several varieties of blue ballpoint pen inks were analysed by HPLC and IR spectroscopy by Kher et al in 2006. The chromatographic data extracted at four wavelengths (254, 279, 370 and 400 nm) was analyzed individually and at a combination of these wavelengths by the soft independent modeling of class analogies (SIMCA) technique. They used principal components analysis (PCA) to estimate the separation between the pen samples. Linear discriminant analysis (LDA) measured the probability with which an observation could be assigned to a pen class. The best resolution was obtained by HPLC using data from all four wavelengths together, differentiating 96.4% pen pairs successfully using PCA and 97.9% pen samples by LDA. PCA separated 60.7% of the pen pairs and LDA provided a correct classification of 62.5% of the pens analyzed by IR. They stated that HPLC coupled with chemometrics provided a better discrimination of ballpoint pen inks compared to IR. Kher et al effectively combined LDA and PCA to classify the HPLC and IR data. PCA gives a general idea of how different a given pair of pens is, whereas LDA can quantify the predictive ability of a generated classification model. The two techniques of PCA and LDA were shown to be complimentary to each other. The PCA and LDA results indicated that although IR cannot differentiate between all classes of pen inks, it can still provide a reasonable discrimination, which can be enhanced further by improving the quality of the spectra. The analysis of such an enhanced IR data with chemometric analyses would provide a valuable non-destructive tool for forensic analyses. Raman Spectroscopy Studies Mazzella and Buzini used Raman spectroscopy to analyse blue gel pen inks in 2004. They sampled 55 blue gel pens. They first separated them into two groups using a preliminary solubility test in methanol. They discovered that 36 were pigmented inks, which arent soluble in methanol, and 19 were dye-based inks, which are soluble in methanol. They applied Raman spectroscopy to the 36 pigmented blue gel inks. Raman spectroscopy is a non-destructive technique. Spectra were first obtained using the 514.5 nm argon ion laser which proved the observation of 4 different groups. They then used the 830 nm NIR diode laser and divided the inks into three groups. They then combined the two lasers and a separation into 5 groups was obtained. They then attempted to identify the pigments contained in the gel by comparison to standard pigments. Two main pigments were detected in the analysed samples: PB15 and PV23. PB 15 is pigment blue 15 and belongs to the class of phthalocyanines. PV23 is the pigment violet 23 and belongs to the class oxazines. The argon laser allowed the detection of a mixture of PB 15 and PV 23. This was a better result than using the NIR diode laser. The results showed that the same gel pen ink (same model and brand) from different geographical locations showed the same Raman spectra. However, it was stated that the Raman technique obtained low discriminating values. 2. Materials and Method 2.1 Materials: Blue ballpoint pens Merck silica gel 60 TLC plates (20 cm x 20 cm) Methanol Ethyl acetate Ethanol (absolute) Paper Dessicator Developing chamber Puncher Glass tubes (0.1 ml) Capillary tubes 2.2 Experimental 13 blue ball-point pens (Table 1) were bought from a number of different shops in the town. A circle with a diameter of 5mm was written by the pen on paper. One fourth of it was punched out for extraction. The samples are placed in 1 ml glass tubes. 0.1ml of methanol was added and vigorously shaken for 1 min. The ink component was fully dissolved in methanol. The supernatant methanoic solutions were used for spot application on TLC plate. A blank of paper only is also treated as was a control which was a permanent marker. TLC analyses were preformed using Alugram 20 cm x 10 cm silica gel/UV plates (Macherey-Nagel). The plates were activated at 60 °C for 20 min and immediately after, cooled in a desiccator, and spotted. The plates were developed in a horizontal developing chamber. The solvent system included: ethyl acetate/absolute ethanol/ distilled water (70:35:30, v/v/v). Development was preformed at room temperature for 40 min. All mobile phases were prepared daily. After develo pment the plates were air-dried. All 13 different pens were tested in triplicate. Retention factors were calculated using the results from the plates and photographs taken using a digital camera were loaded onto the computer and analysed using image analysis software. Table 1: List of pens analysed Number Description 1 No Brand (blue) 2 Pilot G-207 3 BIC ReAction 4 BIC Medium (Bought in Tesco) 5 BIC Medium (Bought in Dunnes) 6 No Brand (Purple) 7 Staedtler Stick 430M 8 Roller Pen 9 Papermate 1.2M 10 Scripto Stick Pen 11 Papermate Write Bros. 12 Comfort Touch 13 No Brand (Tesco Click Pen) 3. Results and Discussion Before carrying out the experiment it needed to be researched. This research pointed out the importance of the correct solvent to remove the ink from the document. Djozan et al used methanol as their choice of solvent after considering other solvents (Table 2). They stated that Pyridine was the reported solvent used with ball-point pen inks. However, they carried out extractions with different solvents using various extraction modes. They realised that immersion of the paper into methanol with agitation resulted in complete extraction of the inks from the paper. Methanol was also chosen because of its safety. Table 2: List of solvents used for the extraction of ink components from paper Solvent Solubility of ink colours Ethyl acetate Slightly Ethanol Slightly Acetic Acid Slightly Acetone Slightly Butanol Slightly 1,2-Dichloroethane Slightly Butyl acetate Slightly Tetrachloroethane Slightly Acethyl acetate Slightly Cyclohexan Slightly Methanol Soluble Oyridine Soluble Different concentrations of the solvent system (Table 3) were analysed to see which gave the greater separation. It was found that the concentration given by Djozan et al, (ethyl acetate, ethanol, and water (70:35:30, v/v/v)) gave the best results. The Alugram silica Gell/UV plates were also found to work better than the suggested, Merck silica gel 60, plates without fluorescent indicator. Table 3: Concentrations of solvent system investigated Number Solvent system 1 ethyl acetate, ethanol, water (70:35:30, v/v/v) 2 ethyl acetate, ethanol, water (70:30:35, v/v/v) 3 ethyl acetate, ethanol, water (70:25:40, v/v/v) 4 ethyl acetate, ethanol, water (70:40:25, v/v/v) Table 4: Retention factors for all separated components pen spot 1 spot 2 spot 3 spot 4 spot 5 Solvent RF1 RF2 RF3 RF4 RF5 1.1 70 73 0.958904 1.2 70 73 0.958904 1.2 70 73 0.958904 2.1 62 69 73 0.849315 81.24194 2.2 62 69 73 0.849315 81.24194 2.3 62 69 73 0.849315 81.24194 3.1 57 60 62 70 0.814286

Saturday, July 20, 2019

Gertrude as an Innocent Victim or a Sexually and Morally Corrupt Woman

Gertrude as an Innocent Victim or a Sexually and Morally Corrupt Woman in Hamlet Shakespeare’s character Gertrude is one of much mystery; in relation to this there are many questions that need to be answered to establish Gertrude’s innocence through out the play. Some examples of these questions are, was Gertrude in some kind of relationship with Claudius before the murder of her late Husband and did she know about the murder before or after it was committed? Does she love Claudius or is it just her status that she is protecting? And did she ever love the late King Hamlet? At the beginning of the play when we learn about the late King Hamlet’s death and Gertrude’s hasty marriage to his brother Claudius, we are faced with a question on the audience’s awareness. It can be assumed that the marriage to her brother- in-law is purely because of Gertrude’s weak personality, resulting in a dependency on men and the means of protecting her status and her power. We also question the love between the Gertrude and Claudius; this is because there is no suggestion of a resemblance between the late King and his brother. The description that we are given about late King Hamlet maybe slightly distorted, as it is Hamlet who tells us this, and he is noticeably loyal to his father. It is also possible to argue that the love that the late King and Gertrude shared was not that strong as the only evidence to suggest this has been told to us by Hamlet and he maybe slightly bias. First we notice that Gertrude does not display her grief for her dead husband, and suspicions mount when she also tells Hamlet that he should stop his mourning as well.... ...unishment upon death. She does not show any untoward hatred towards Claudius showing that she may not be aware of his cruel deed. In the end Gertrude drinks the poison which can suggest many things; that she has no knowledge of the poison or that she feels guilty of her late husband’s death, and cannot carry on with the corrupt behaviour between her husband and her son, or that she is protecting her son and saving his life. When she attempts to consume the drink she is stopped suddenly by Claudius, but she replies â€Å"I will my lord, I pray you pardon me†, is this the request of someone who is guilty, someone who is tired of the fighting between her two dearest or of someone with no awareness of what was going to happen? This for many readers is the critical part of the play in determining her innocence or guilt.

Friday, July 19, 2019

Audit Engagement Essay examples -- essays research papers

Subject: Assessment of Exton Industries, Inc. Dear Ms. Johnson:   Ã‚  Ã‚  Ã‚  Ã‚  I have recently reviewed the Control Environment Questionnaire for Exton Industries, Inc. After evaluating the evidence collected by our staff member, I have come up with an assessment of the fraud risks. From the evidence gathered, I have concluded that Exton Industries has a weak control environment. Overall, it will not do an effective job of preventing fraudulent activities.   Ã‚  Ã‚  Ã‚  Ã‚  While evaluating Exton Industries, I had to consider how the control environment would prevent misstatements arising from misappropriation of assets and fraudulent financial reporting.   Ã‚  Ã‚  Ã‚  Ã‚  The controller, CFO, and CEO review all financial reports before releasing them. Another area to consider was the assignment of authority and responsibility. Because three different people review the financial reports, it’s easier to identify any mistakes that may have been made which in turn reduces the chances of misappropriation in fraudulent reporting. Through conversation with employees it was noted that proper responsibility and delegation of authority were assigned and the proper information appeared to be considered in developing responsibilities. Written job descriptions and standards also exist. Since proper responsibility and delegation of authority and written job descriptions and standards exist the, the chances of fraudulent activities are reduced. Other issues to consider were management’s commitment to competence and human resource policies and procedures. During the hiring process, management makes sure the potential employee possesses the proper knowledge and skills to carry out the job adequately. Upon hiring, the new employee is made aware of his or her responsibilities and management’s expectations of them. In addition supervisors conduct annual reviews. The company’s previous success also shows that employees have the required skills and knowledge. Discussions with employees indicated that they are made aware of the consequences if they perform ineffectively and/or do not fulfill their responsibilities. Exton Industries has effective controls in their commitment to competence and human resource department’s hiring and review process. Overall, the control environment of the board of directors and audit committee will p... ...ast year several employees have left on short notice and there has been difficulty in retaining key personnel. The new management team is probably worried about getting profits up and by using an aggressive approach there may be more errors because financial statements may not checked as thoroughly. The cause of the high turnover rate should be investigated, employees may be leaving because others are committing fraudulent behavior and they do not want to get involved. Management may be encouraging this or may not see it because they are too worried about making the company look profitable. Lastly, there were failures to protect valuable assets, which could lead to misappropriation of assets. In conclusion, I found that Exton Industries has some internal controls that will prevent fraudulent financial reporting and misappropriation of assets however, they are lacking effective internal controls as well. As a result of Exton Industries having weak internal controls, control risk is increased and the audit team will need to choose higher control risk strategies. If controls in the areas lacking are not improved the control environment will fail to protect future fraudulent acts.

Essay --

‘Uribe opositor’ La imagen â€Å"Uribe opositor† se compone de varias metà ¡foras como lo son â€Å"Uribe profeta†, â€Å"Uribe pez de leà ³n†, â€Å"Uribe lengua venenosa†, todas ellas apuntan a ratificar la oposicià ³n de Uribe al gobierno de Santos, a deslegitimizar su periodo presidencial y a daà ±ar la imagen del presidente actual. Por eso, durante las marchas del â€Å"paro agrario† salieron a relucir caricaturas donde Uribe es representado como un â€Å"campesino† que apoya las manifestaciones, por ejemplo. Ahora bien, dichas metà ¡foras que legitiman la oposicià ³n de Uribe al gobierno de Santos, tienen como base la estrategia de representar a Uribe (y a Santos) de manera ‘zoomà ³rfica’. Este, se constituye como un recurso que agrega rasgos propios de los animales a la representacià ³n visual (la imagen) del actor representado. Figura 1. ‘Ataque del pez leà ³n’, 19 de septiembre. En ese sentido, en la figura 1, se puede apreciar cà ³mo se construye la metà ¡fora â€Å"Uribe pez leà ³n† a travà ©s de la transicià ³n del dominio origen (pez leà ³n) al dominio destino â€Å"Uribe opositor†, sin duda es un opositor de cuidado, puesto que los rasgos que se toman del domino origen son los de â€Å"depredador†, y con à ©l otros como â€Å"amenaza†, â€Å"plaga†, â€Å"de mordida venenosa†, entre otros. En contraste, a Santos se le representa como un pez â€Å"normal†, un tanto confiado, cuya ruta o meta propuesta son las elecciones del prà ³ximo aà ±o (2014). De hecho, parece ser una competencia para ver quià ©n saca partido en las prà ³ximas elecciones. El trasfondo polà ­tico de esta caricatura versa en las constantes apariciones del ex presidente en los medios masivos de comunicacià ³n, en los cuales tiende a criticar el gobierno de Santos, adjudicà ¡ndole todas las irregularidades y las acciones que afectan a... ...dominio origen de la adiccià ³n a las drogas al domino de llegada de una â€Å"adiccià ³n al poder†, entendido este à ºltimo aspecto como una â€Å"obsesià ³n†, â€Å"una necesidad de† ocupar un cargo pà ºblico dentro del Congreso de la Repà ºblica. Figura 4. ‘Recaà ­da de un adicto†¦ al poder’, 24 de septiembre De tal forma que la imagen de Uribe se configura como un ser obsesionado, aspecto que llega a tratarse como un trastorno, por querer aspirar cargos polà ­ticos en el paà ­s. Es un personaje vigente â€Å"que utiliza su jeringa para darse una dosis de CONGRESO†. En à ºltimas, ratifica que està ¡ dispuesto a hacer lo que sea necesario (â€Å"el fin justifica los medios†) para ocupar dicho cargo. Cabe resaltar el fondo de la imagen, una pared sin repellar, y la iluminacià ³n que engloba al ex presidente, aspectos que dan la nocià ³n de â€Å"juzgamiento†, de â€Å"encarcelamiento†, y en à ºltimas, de â€Å"corrupcià ³n†.

Thursday, July 18, 2019

Terry V. Ohio

Terry v. Ohio Case Project| | | | | Victoria Swannegan| 12/2/2010| | In 1968 a case called Terry v. Ohio took place. This case made a big impact on the police departments of the United States by giving officers more reasons to make an arrest. A â€Å"Terry Stop† is a stop of a person by law enforcement officers based upon reasonable suspicion that a person may have been engaged in criminal activity, whereas an arrest requires probable cause that a suspect committed a criminal offense.A Cleveland detective (McFadden), on a downtown beat which he had been patrolling for many years, observed two stranger on a street corner. He saw them proceed alternately back and forth along an identical route, pausing to stare in the same store window, which they did for a total of about 24 times. Each completion of the route was followed by a conference between the two on a corner, at one of which they were joined by a third man who left swiftly.Suspecting the two men of â€Å"casing a job, a stick-up,† the officer followed them and saw them rejoin the third man a couple of blocks away in front of a store. The officer approached the three, identified himself as a policeman, and asked their names. The men â€Å"mumbled something,† whereupon McFadden spun petitioner around, patted down his outside clothing, and found in his overcoat pocket, but was unable to remove, a pistol. The officer ordered the three into the store.He removed petitioner's overcoat, took out a revolver, and ordered the three to face the wall with their hands raised. He patted down the outer clothing of Chilton and Katz and seized a revolver from Chilton's outside overcoat pocket. He did not put his hands under the outer garments of Katz (since he discovered nothing in his pat-down which might have been a weapon), or under petitioner's or Chilton's outer garments until he felt the guns. The three were taken to the police station. Petitioner and Chilton were charged with carrying concealed weapons.The defense moved to suppress the weapons. Though the trial court rejected the prosecution theory that the guns had been seized during a search incident to a lawful arrest, the court denied the motion to suppress and admitted the weapons into evidence on the ground that the officer had cause to believe that petitioner and Chilton were acting suspiciously, that their interrogation was warranted, and that the officer, for his own protection, had the right to pat down their outer clothing having reasonable cause to believe that they might be armed.The court distinguished between an investigatory â€Å"stop† and an arrest, and between a â€Å"frisk† of the outer clothing for weapons and a full-blown search for evidence of crime. Petitioner and Chilton were found guilty, an intermediate appellate court affirmed, and the State Supreme Court dismissed the appeal on the ground that â€Å"no substantial constitutional question† was involved. Terry was protected b y â€Å"The Fourth Amendment† but the officer had a probable cause. The Fourth Amendment to the U. S.Constitution protects personal privacy, and every citizen's right to be free from unreasonable government intrusion into their persons, homes, businesses, and property, whether through police stops of citizens on the street, arrests, or searches of homes and businesses. The Fourth Amendment provides safeguards to individuals during searches and detentions, and prevents unlawfully seized items from being used as evidence in criminal cases. The degree of protection available in a particular case depends on the nature of the detention or arrest, the characteristics of the place searched, and the circumstances under which the search takes place.In the case, they used a term called â€Å"Stop and Frisk†. This is a situation in which a police officer who is suspicious of an individual detains the person and runs his hands lightly over the suspect's outer garments to determine if the person is carrying a concealed weapon. Unlike a full search, a frisk is generally limited to a patting down of the outer clothing. If the officer feels what seems to be a weapon, the officer may then reach inside the person's clothing.If no weapon is felt, the search may not intrude further than the outer clothing. A full search is called â€Å"Search and Seizure†. It is the legal term used to describe a law enforcement agent’s examination of a person’s home, vehicle, or business to find evidence that a crime has been committed. If evidence is found, the agent may then â€Å"seize† it. Search and seizure also includes placing an individual under arrest. The Terry v. Ohio case made a phenomenal change. It made a difference in which people can be searched arrested.