Thursday, November 28, 2019

Rising Sun Essays - Neo-noir, Rising Sun, Michael Crichton

Rising Sun I read the novel Rising Sun by Michael Crichton. The story is about the grand opening of the Nakamoto Tower in Los Angeles, the new American headquarters of a Japanese corporation. On the night of the opening a young girl was killed on the forty-sixth floor, one story above the floor of the party. The Japanese liaison, Lieutenant Peter James Smith, was called to help the investigation begin, as the Japanese businessmen tried to stall the police. Though the story is about a homicide investigation, the underlying theme is one of business deals, both corrupt and proper. Throughout the book the reader is taken though the way of Japanese business, and quickly learns the differences between American companies and the Japanese even today. Rising Sun shows examples of the Japanese persuasion in almost all aspects of typical American life. The Japanese motto ?Business is war? comes into affect throughout the story, and is shown in their maneuvers to outwit the police. The businessmen of Nakamoto Tower know that the murder was recorded on their surveillance cameras, so they switch the tapes before the police have an opportunity to look at them themselves. Then, with technology years ahead of the Americans, they alter the video to transform the identity of the murderer. They care not for the truth to be found, and they only work to hide the murder from the public. The fear of a scandal that would topple the Nakamoto Corporation is enough to make the Japanese do whatever it takes to prevent the public from knowing of the murder. The book also discusses the loss of basic industries to Japan. The decline of American business became apparent even to Congress, who would move to stop the sale of business to the Japanese. The American approach to business is entirely different than the Japanese approach. American companies are compelled to show profits every few months, while the Japanese don't care for the short-term business at all. Often, they create their products and sell them below cost, a practice known as ?dumping?. While dumping is illegal under American and international law, the Japanese continue to do it, but only in America. They might lose money at first, but after a few years, they can refine their products and actually make them at a lower cost. By then the Japanese businesses have taken control of the market, without fear of American retaliation for their unlawful tactics. American government has provided an open market in its business. We have laws that prevent monopolies by American owners, but we welcome foreign investors without much worry. Other countries, which Americans do business with, have provided open markets, including the Japanese. But while the Japanese claim to have an open market, they play by their own rules. They don't sell their companies to Americans, but continue to buy ours. They force Americans to license their technology to Japanese companies before they can sell in their country. Japan takes eight years to give Americans a patent, and in the meantime the Japanese create a superior version of the same product after scrutinizing and perfecting our would-be-patented inventions. While other European countries play with a tit-for-tat strategy, Americans do nothing to prevent the Japanese from making use of their same illicit approaches over and over. America is afraid to upset the Japanese because we want to keep them as an ally of ours against Russia. At this point, two economies are too tightly intertwined for America and Japan to not come together in business. All this is proven through the telling of the story by the author. He talks of the loss of American business to the Japanese as almost tragic. The author, Michael Crichton, makes the point that it is time for Americans to take hold of their businesses in the industries we can still control. We need to realize that if we sell all of our companies to one nation, soon that nation will be able to control our control at will. If they are the sole creator of certain items, we will most certainly become dependant on them. He suggests that the Japanese ware good at what they do, but do not care to be fair. Crichton explains

Sunday, November 24, 2019

Controversy Surrounding Animal Testing in the Cosmetic Industry The WritePass Journal

Controversy Surrounding Animal Testing in the Cosmetic Industry Abstract Controversy Surrounding Animal Testing in the Cosmetic Industry , pp. 1) utilizes the qualitative post positivism approach in order to evaluate a large number of subjects to the Draize eye test.   This form of analysis employed a large number of animals in the quest to determine the influence of external irritants on the eye. The utilization of qualitative data and surveys enabled a quality assessment of conditions that illustrates the full range of potential. The need to expose a large number of subjects to chemicals in order to achieve credible results was rewarded with substantial steps forward in the industry (Loprieno1992, pp. 809).   The utilization of the scientific method, in close proximity with the subjects, in order to create empirical evidence, coupled with experience is a viable practice when facing large numbers of potential subjects. The area of animal testing, in every form, is credited with allowing major advances in the production of medicines and cosmetics (Marzulli and Maibach 1983, pp. 281).   With a proven value that enables the ability to combat skin disease in both the human and animal kingdom, the justification for the methodology is argued to lie in the medical advances. Further supporting the benefits of the practice of quantitative studies, Bronaugh and Maibach (1999, pp. 167) point to the demonstrative aspects of the results which assist in determining the end parameters of the research. The converse ethical argument points to the unreliability of many of the test results to the large difference between species (PETA 2013, pp. 2). Both the qualitative and the quantitative approach have been utilized in an applicable manner, yet, the most relevant form for a well-balanced study of the animal testing in the cosmetic industry would be found in the qualitative mixed Post Positivist approach, as employed by Wilhemus (2013, pp. 1) and Degrazia (1996, pp. 72).   This method allows the production of empirical data via the questionnaires, alongside the addition of personal experience which will be essential in the study of the animal testing in cosmetics industry. The potential for large sample groups during the examination will be addressed in the approach, thereby adding to the value and potential of the application. Research Strategy In order to achieve the goal of this study and develop a fundamental understanding of the role of the controversy that surrounds animal testing in the cosmetic industry, a qualitative approach utilizing a questionnaire structure together with industry review was determined to be appropriate (Yin 2003, pp. 16). Yin (2003, pp. 16) argues that the use reliable elements in any given analysis adds to the overall substance of the results.   This approach will provide the foundation for an inclusive well rounded study. Studies that utilize empirical research advance due to theory and logical inquiry that are developed alongside each another (Yin 2003, pp. 15). Data Collection Data for this study will be collected the through questionaries’ and case studies in a qualitative approach we (Yin 2003, pp. 16). This method allows for a perception of balance in the results. Data Analysis It is vital to efficiently decode, interpret and examine qualitative research findings (Pope, Ziebland and Mays 2000, pp. 20). Reliability, Validity, and Generalizability Reliability and validity are argued to be one of the most critical aspects of data analysis and collection during research (Miles and Huberman 1994, pp. 23). The credibility of quantitative results is in the associated reliability of the data and methods as well as the underlying findings. Silverman (2006, pp. 21) illustrates that reliability can be created when respondents fully understand the question. This must be present in order so that the responses can be coded correctly. Codification is achieved by formulating questions as directly as possible, avoiding any obvious forms of ambiguity (Silverman, 2006, pp. 23). Before starting each questionnaire a brief explanation of the research as well as its themes are given to the interviewees. This facet enables interviewees to understand the exact meaning of the questions which were asked.   In each instance the subjects should be informed with the same information and starting point for the discussion, this serves to putting each person at ease (Silverman 2006, pp. 24). The potential method in which to achieve validity is through the comparison of different kinds of data, this is referred to as triangulation (Silverman 2006, pp. 25). This approach illustrates that the results have demonstrated that triangulation helps to assure the truth status of each person. The truth status was further cemented by assuring that the personal information, alongside information about the interviewees firm would be treated confidentially. Finally, the findings are promised to be reported anonymously. This anonymous strategy was applied because anonymity is presumed to improve the content of truth of the interviewees’ responses (Silverman 2006, pp. 25). Ethical Issues Ethical issues should be clearly and directly addressed in order to alleviate potential issues (Yin 2003, pp. 17). Research Limitations The primary limitation to this study stems from the methodology utilized.   Qualtitative studies often are subject to a large amount of variables that have the potential to alter the results (Creswell 2003, pp. 53). The answers to the questionaries’ are often dependent of the background of the person being interviewed (Creswell 2003, pp. 51). This fact tempers the final results of the study. References Anderson, M. 2006.  Tasks and techniques. New York: Nova Science Publishers. Bronaugh, R. and Maibach, H. 1999.  Percutaneous absorption. New York: Dekker. Creswell, J. 2003.  Research design. Thousand Oaks, Calif.: Sage Publications. Degrazia, D. 1996.  Taking animals seriously. Cambridge: Cambridge University Press. Ec.europa.eu. 2013.  Ban on animal testing European Commission. [online] Available at: http://ec.europa.eu/consumers/sectors/cosmetics/animal-testing/ [Accessed: 8 Aug 2013]. Kimmel, A. 2007.  Ethical issues in behavioral research. Malden, MA: Blackwell Pub.. King, G., Keohane, R. and Verba, S. 1994.  Designing social inquiry. Princeton, N.J.: Princeton University Press. Marzulli, F. and Maibach, H. 1983.  Dermatotoxicology. Washington: Hemisphere Pub. Corp.. Miles, M., Huberman, A., Hlady Rispal, M. and Bonniol, J. 2003.  Analyse des donnà ©es qualitatives. Bruxelles: De Boeck università ©. Miller, N. 1985. The value of Behavioral Research on Animals.  Teh Rockefeller University, 40 (4), pp. 423-440. PETA.org. 2013..  Cosmetics and Household-Product Animal Testing. [online] Available at: peta.org/issues/animals-used-for-experimentation/cosmetic-household-products-animal-testing.aspx [Accessed: 8 Aug 2013]. Pope, C., Ziebland, S., Mays, N. 2000. Analysing qualitative data. BMJ, 320(7227), 114-116. doi: 10.1136/bmj.320.7227.114 Silverman, D. 2006. Interpreting Qualitative Data (3 ed.). Oxford: The Alden Press. Yin, R. 2003.  Case study research. Thousand Oaks, Calif.: Sage Publications. Questionnaire: Controversy around animal testing and experimentation in the cosmetics industry Is animal testing in the field of cosmetics beneficial? Should animals be subject to death in order to determine the level of toxicity in proposed cosmetics product? Yes No. Should skin irritation testing be tested on mice if the animal in question will not feel any ill effects? Yes. No. Would you employ alternative methods over live animals in the cosmetics industry? Yes. No. Should the test animal be restrained during a testing? Yes. No. Is it allowable for a product to not be tested prior to market entry? Yes. No. If a test on a non-animal subject is considered inconclusive, should a live animal test be utilized? Yes. No. Is the European ban on animal testing a positive step? Yes. No. Should international companies that utilize animal testing be able to sell products in markets that ban the practice? Yes. No. Given the long history of animal testing, do you think that the practice has served to keep the general public safe? Yes. No. Is the potential for medical advances a good enough reason to use animals in testing? Yes. No. Does the prospect of an animal’s death stop you from allowing it to be used in the cosmetic industry? Yes. No. Can advances in technology fully replace the animal in the laboratory? Yes. No. Given the lack of similarity between subjects do you believe the results of animal testing are worth the process? Yes. No. What is your ethical and moral position on the practice of animal testing in the cosmetic industry? What are the primary benefits that are attributed to the practice of animal testing in the cosmetics industry? What are the primary detriments to the practice of animal testing in the cosmetic industry? What do you believe the future holds for the practice of animal testing in the cosmetics industry? Do you believe that animal testing has been beneficial for the animals standard of life? Is the practice of animal testing weakening the ability of the animal to survive?

Thursday, November 21, 2019

Conflict Escalation Essay Example | Topics and Well Written Essays - 2500 words

Conflict Escalation - Essay Example 152). Escalation may take place for other raison d'tres too. In accordance with the "conflict spiral model" (Rubin et al, 1994) escalation takes place when all sides reply to the other's endeavors. A conflict initiated with an easygoing approach by one party, pursued by equivalent plans by the other party. These plans sequentially create increasingly more violent plans by the prior party, which then stir up an equivalent reaction by the adversary. A number of studies corroborate that people respond obnoxious behavior in public communications (Burgoon, Le Poire, and Rosenshal, 1995) and get trapped in "joint controversial interactions" in discussions (Brett, Shapiro, and Lytle, 1998). When fights escalate, other people are vulnerable to be concerned. Organizations start to makepressure and inflict insensitive negative sanctions. Fighting may establish, or if violent behavior has already cropped up it may turn out to be harsher and/or prevalent as several opponents implicated in the conflict raises, with lots of people vigorously employ in conflict (Kriesberg, 1998, pg. 152). 'Escalation Conflict' can be considered as a realism of organization and organizational behavior (OB). Nearly every one will comprehend what is generally meant by "organizational conflict" and be familiar with its continuation and results. We can perceive conflict as an organizational behavior projected to impede the success of someone else's personal or organizational objectives. Conflict is anchored in the inappropriateness of aims and stems from differing organizational behaviors. In this paper, we shall discuss them briefly, and discuss how 'escalation of conflict' will be observed at the individuals' behavior, group dynamics or organizational processes and organizational structural levels. Individuals' Behavior There are countless researches that people usually are liable to assess behaviors, involvements, and results in provisos approving to the self (Dreu, Carsten et al. 1995). Conflict is menacing and brings about nervousness to an individual experiencing the conflicted behavior, whether it comes by a person or persons or is heading for other individuals working in an organization. People have distinct or opposite reflective processes and attitudes. They have dissimilar likes and dislikes, different viewpoints and dissimilar spiritual values. Individuals have dissimilar thoughts about the correct and incorrect way to execute things or about correct and incorrect as a general rule. All of these combined facets of the individual behavior can result in conflict when groups or a group of individuals worked together (Dreu, Carsten et al. 1995). Group Dynamics Central adjustments or changes that groups of individuals experience during escalation take account of not only the socio-psychological adjustments, but also alterations at the grouping or combined level. Dynamics at individualistic level are time and again emphasized by combined conversation and are likely to become group rules. Combined objectives of beating the opponent expand, in addition to enhanced group interrelatedness (Rubin et al. pg. 90). Once individuals comprehend that others share their visions and pay attention to new judgment supportive of them, their personal insights are legalized and resistant. Group debate can thus bring about individual associate to turn out to be more severe in their aggressive behaviours. Many rational

Wednesday, November 20, 2019

Strategic business analysis Essay Example | Topics and Well Written Essays - 5000 words

Strategic business analysis - Essay Example Moreover, the improvements in infrastructures and technology contributed to the development of several motorcycles producing firms. In India, Hero-Honda is a household name when it comes to motorcycles. Obviously, the name suggests that the company was once composed of two independent motorcycle manufacturers. Gradually, the economic situation and several aspects paved for the merger. At present, the company occupies the top spot in terms of market share. Although it appears that the decision to merge was strategic in nature, some observers consider other reasons for the decisions. The complexities of strategic cooperation and collaboration make the situation an interesting point of analysis. The discussion will concentrate on the nature of the Hero-Honda partnership and its perceived benefits and drawbacks. This is determined through the comparison with Hero-Honda and among its competitors. The financial position of the company will serve as evidence of the success that has become the prime motivation of Hero-Honda to pursue higher goals. Honda traces its roots from Japan, which houses the likes of Kawasaki, Suzuki, and Toyota. These companies are world-class automotive manufacturers and embraced by majority of the automotive consumers. Honda is recognised as one of the leaders in the motorcycle industry. Its operations expand worldwide and have 437 subsidiaries scattered across the globe. The branch located in India is one of the largest. From its humble beginnings, Honda quickly made a huge impact with its cutting edge technological advancements and top notch motorcycles. Also, Honda's concern to the environment and the society where it operates is being admired. The product line of Honda ranges from small scoters to massive vehicles. For years, the development strength of Honda has made the company upbeat with the changes in the industry. Surprisingly, its unconventional approach in dealing with its clients has provided the company with increased benefits. The goal of Honda is to produce with unparalleled quality and to continue its improvement in the future. Honda aims to thrive in a society where the customers demand its existence. Honda revolves around the notion of respect to individuals and the promotion of three joys: buying, selling, and creating. The management principle seeks to maintain global viewpoint and the assurance that only the best products will be provided to customers. More important, the prices of Honda merchandises are lower than the competition and provide the highest level of customer satisfaction. 1.2. Hero Cycles Hero is centred in the philosophy of commitment, teamwork, and foresight. Even before India's independence of United Kingdom, Hero was already starting to make a name. The initial step was to sell bicycle parts and the plan expanded after a few years of operations. Unfortunately economic stagnation paralysed the progress of the company. Since the plan was to expand, Hero started moving in different areas and began the process of manufacturing bicycle parts. Then, Hero proceeded with the production of bicycles. The Guinness Book of Records certified Hero Cycles as the largest producer of bicycle in the world. The company controlled 48% of the market in India and Hero continued to hold the lead in the industry. The managers of Hero are known for their meticulous planning. The strategy of Hero was to focus on the strength and prevent the weaknesses from making strong impacts. The simple

Monday, November 18, 2019

The US Dollar will Lose its Status as the Worlds Reserve Currency Term Paper

The US Dollar will Lose its Status as the Worlds Reserve Currency within the Foreseeable Future - Term Paper Example According to the study euro had been getting closer to the US Dollars in terms of bank note circulation. Since its inception during the latter years of 1990s, the currency is found to be soaring high in terms of popularity especially among the Asian nations where almost two-thirds of total Euro bank notes in circulation are concentrated. The table alongside displays ample information to establish Euro is fast surpassing Dollars in terms of its circulation. To emphasise, stock of Euro has increased by 7 percent between 1999 and 2003 while that of Dollars has receded by 6.7 percent between 2001 and 2006. The diagram alongside shows the extents to which different foreign reserves are found to be growing over the years. Growth in Euro is witnessed as reaching a peak during 2002 and exceeding the corresponding rate for US Dollars. â€Å"With the creation of the euro in 1999, and the growth of the US external debt and current account deficits since then, the economic appeal of the dollar as an international currency has become less distinctive†. In fact, during the post Euro era, the position of US dollar has been fast depreciating owing to the fall in its store of value and liquidity. A downfall in the degree of liquidity of the currency accounts for the huge sums of US Dollar reserves that East Asian nations reserve had been maintaining in their reserves; this specifically is the reason behind a fall in the US Dollar circulation. Prior to the introduction of Euro, US Dollars assumed the topmost position in the international arena.  

Friday, November 15, 2019

Deconstruction And Methods Of Demolition Construction Essay

Deconstruction And Methods Of Demolition Construction Essay There are many advantages of deconstruction over standard demolition. These advantages include (1) conservation of landfill space; (2) makes recycling easier; (3) potential building materials available for reuse; (4) preserves natural resources that would otherwise have to be used. In order to minimise the amount of natural resources being used and the energy involved in manufacturing these materials, a cautious approach to the disposal of CD waste needs to considered. Reusing materials prevents the use of embodied energy. This is the energy that goes into the production and manufacturing of a new product. Reducing the amount of energy required in manufacturing, producing and transporting new products leads to a reduction in damage to the environment. The figure below shows a system which could be implemented in order to limit the number of materials being disposed of on construction sites. Waste Management Hierarchy for construction and demolition operations Challenges facing deconstruction There are a number of challenges which face deconstruction including (1) tools needed for deconstruction do not always exist; (2) disposal costs of CD waste is relatively low; (3) deconstruction takes up more time than conventional demolition; (4) building and design codes do not always cover the reuse of building materials; (5) buildings are not designed to be dismantled; (6) the environmental and economic advantages of deconstruction are not recognized. Deconstruction around the world Australia Volume of waste produced The total volume of waste produced in Australia almost doubled between 1997 and 2007. In 1997, the total volume of waste produced in Australia stood at 22.7 million tonnes while in 2007, the total volume of waste shot up to 43.8 million tonnes. While 29% of the total waste produced was directly from household waste, the CD sector accounted for almost 40%. (ABS, 2010) Demolition Procedure The Netherlands Waste Tax Waste taxes are placed on waste brought to the landfill or to the incinerator. The rate of tax can vary depending on the type of waste. In 1995, the Netherlands imposed a tax on the disposal of waste. The reason for this tax was to make other forms of waste treatment more appealing. Since the introduction of the tax the total volume of waste sent to landfills has decreased by a significant amount. The figure below shows how the huge decline in waste sent to landfills since the tax was imposed in 1995. (Oosterhuis et al, 2009) This landfill tax is always on the increase in the Netherlands. In 2009, the landfill tax was à ¢Ãƒ ¢Ã¢â€š ¬Ã… ¡Ã‚ ¬90 per toone. This is one of the highest landfill tax rates in the European Union. (defra.gov.uk, 2010) Waste production and treatment in the Netherlands Landfill Waste Ban Along with imposing waste taxes, the Netherlands also implemented bans on sending recyclable and combustible waste to the landfill. This came into operation in 1997. This included separated CD waste. The reason for this ban was to limit the amount of waste going to landfills which is seen as the least favoured method of disposal. The responsibility for implementing the ban lies with the landfill operators who are inspected regularly by the governmentà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s waste management agency, SenterNovern. The introduction of the ban in the Netherlands proved to be a success in cutting down the amount of CD waste sent to landfill. In 2009, 97% of CD waste in the Netherlands is recovered. (defra.gov.uk) Deconstruction Procedure Step 1 The first step in dismantling a building is to check to see if the building contains any hazardous substances. One of the main hazardous wastes which cause concern in Ireland is asbestos. This is a natural mineral which is used in many buildings for fire proofing or thermal insulation. The danger with asbestos is that if it breaks up, the fibres which make up asbestos may then be inhaled into the lungs as dust. This increases the risk of lung cancer and causes lung tissue scarring. Under EU legislation it is no longer allowable to re-use asbestos or to even buy products containing asbestos in Ireland. This means that asbestos cannot be recycled; it must be disposed of after it has been removed from the building. (citizensinformation.ie) Step 2 After a specialist contractor strips the building of all hazardous materials it is time to investigate the building and salvage any objects that can be reused as they are. This may include marble fireplaces, timber floors, radiators, doors, sinks and central heating boilers. Step 3 The building is categorised under one of the following three headings: Brickwork or block work buildings with timber floors and timber roof structure with roof tiles. Concrete frame buildings with prestressed concrete components. Steel frame buildings. Step 4: For all three categories above, the next step is to remove the flooring, tiles, plaster from the walls and ceiling. Windows are removed along with services installations (e.g. wall plugs, light switches). Metals are then removed and piping is also removed before the proper demoltion of the building starts. Step 5: There are a number of different types of waste that arise from stripping the building. These should be then split up into burnable and non-burnable materials. The burnable components brought to be incinerated while the non-burnables brought to the landfill. Step 6: Demolition: Brickwork or block work buildings with timber floors and timber roof structure with roof tiles. When every component of the building has been removed with the exception of the masonry works and the floors it is time to start taking the building apart floor by floor. Floor joists and timber floors are removed using a crane. These timber joists and flooring can then be reused. The advantage to using these second hand joists and flooring is that they are fully seasoned meaning they will not shrink. After the timber has been removed, the masonry blockwork is cut into sections and transported to be crushed. It may also be the case that the blockwork may be needed by the owner of the building in a new construction project. In this case the blocks are pulled down one by one and the mortar removed. Concrete frame buildings with prestressed concrete components. Prestressed concrete components in a building cause problems when it comes to disassembly because most of the time it is not known that the elements are actually prestressed. If prestessed concrete is cut up it may cause a structural element in the buiding to collapse. Steel frame buildings. The beams are dismantled one by one working from the top down. If the steel beams cannot be reused then they are cut and to be melted and remouilded. From time to time, steel structures like bridges are only partially taken apart and shipped overseas where the exact bridge is reused in another location. Step 7: The foundations of the building are th final step in the deconstruction of a building. Like the other elements of the structure the foundation is separated, broken up and transported to the crusher. In the case of concrete piles, they are removed by vibrating and pulling. If it is the case that wooden piles have been used as the foundation then it may be more difficult to remove as it will tend to break into pieves when being pulled from the ground. Demolition Techniques Balling This is the demolition technique where a heavy cast iron or steel ball is used to knock a building. The ball usually weighs between 500 to 5000kg. The balling technique can be used to demolish concrete, reinforced conrete and masonry. It has become less popular due to the level of disturbance which arises on site including vibrations, noise and dust.The ball can come into contact with the building in two ways (1) free fall (2) swinging. In the free fall process the demolition ball is lifted up into the air by a large magnet and then it is dropped onto the building which is to be demolished. In the swinging process the demolition ball is attached to a steel line which is attached to a machine with a rotating frame. Demolition Ball at work Demolition Breakers There are two types of breakers used in demolition (1) pneumatic (2) hydraulic. The difference between the two is pneumatic breakers are run using compressed air while hydraulic breakers use compressed oil. These type of breakers are used on concrete, brickwork and stone. Both types of breakers are mainly associated with minor demolition works, however they can also be attached to excavators for major demolition works. Pneumatic Breaker Hydraulic Shears Hydraulic shears are attached to excavators. They can be used in the demolition of any size structures and a wide range of materials like steel, concrete and timber. The two shears have toothed shears which slide past eachother to break up the selected material. Hydraulic Shears cutting steel Thermal Cutting Thermal cutting is used to cut steel and iron. Cutting torches are used for this process. There are three types of cutting torches (1) fuel/oxygen (2) powder (3) plasma. The fuel/oxygen cutting torches are run on a combination of oxegen and fuels such as natural gas, propane and acetylene which cuts at a maximum temperature of 3200 degrees Celsius. The choice of the fuel depends on the thickness of the metal. If the metal is too thick for a regular cutting torch then a powder cutting torch can be used. These can reach a maximum temperature of 4500 degrees Celsius. The powder cutting torch is more expensive than the regular cutting torches because there is an extra fed in the torch which allows aluminium and iron powder to be supplied. This is what increases the temperature of the flame. The plasma cutting is run by supplying electrical energy to gases such as helium and argon. These are used to cut alloyed steel which can be a slow process using the other two methods. Plasma cutting torches can cut up to four time faster than powder cuttinf torches. Explosives Explosives can be used in the demolition of buildings. Explosives can be set of using a wide variety of detonators which allows different detonation speeds. Explosions can be set off immediately or can be delayed by milliseconds if required. By blasting certain components of the building before others, it will allow the collapse of the structure to be carried out in a controlled manner. Even though this may help in accurately collapsing the building, there are still numerous examples of demolitions that have gone wrong when explosives have been used. This is why a large area must be cordoned off around the demolition site before blasting takes place. Crushing Separating CD Waste Immediately after a structure has been demolished it is transported a treatment plant where crushing and separating takes place. This enables new materials to be produced. The CD waste must go through a number of processes before it is recycled. It must get sieved, pre crushed to prevent the lager materials from damaging the main crusher and all material such as steel, glass, plastics and timber must be removed manually, by air separation or by washing. The materials must then be sieved at the end of the process in order to get the requied sizing for the new material. Jaw Crusher The jaw crusher is the machine use to pre-crush the CD waste. Large components such as reinforced concrete can be fed directly into the toggle crusher and are broken down into smaller piece by the moving jaw plate. Jaw Crusher Cone Breaker This type of machine cannot deal with large CD waste. After the waste has been pre-crushed the cone breaker is used as the main crusher. Inside this crushing machine is a cone that moves at high speed crushing waste material against fixed plates. Cone Breaker

Wednesday, November 13, 2019

Essay --

Pharmacokinetic (PK) modelling plays a critical role in drug discovery and clinical pharmacotherapy of several types of drugs. PK modelling and simulation approach have been widely use to explain and predict PK profile of a drug. Several PK simulations are employed to measure estimated therapeutic window, dose selection, and to identify mechanism of action of chemicals and their metabolites in various tissues throughout the body. This integral component of drugs development process can be employed to investigate hepatic deposition of substrates. The data generated from such trial may be used to predict substrate deposition in vivo or to extrapolate deposition from animal to humans. For instance, measurement of transhepatic extraction in the isolated perfused rat liver permits assessment of hepatic clearance in vivo as the product of extraction and hepatic blood flow, assuming the flow is known. Hepatic clearance can them be predicted across mammalian species through incorporation of extraction into physiologically based PK models (Dedrick, 1974). There are different approaches to ph...

Sunday, November 10, 2019

Bite Mark Analysis

Criminal cases many times call for the examination of evidence that can tie a suspect or victim to a crime scene or to one another. These physical traces frequently include blood and other bodily fluids, hair, fibers, and even bite marks. Here we will focus our attention to the latter and its accuracy, as it applies to the field of forensic science referred to forensic odontology or forensic dentistry. Forensic odontology is the field of forensic science dealing with the recognition of unique attributes present in each individual's dental composition. 1] This branch of forensics relies heavily on extensive and detailed knowledge of the teeth, jaws, and dental anatomy possessed by a dentist. In addition to this knowledge, the forensic dentist must be well-versed in the interpretations of radiographs, pathology, charting, and types of dental treatment. The forensic dentist is dutifully responsible for the proper handling, assessment, and evaluation of dental evidence in the name of jus tice. The dentist is the key to identification based upon the distinctive features present in the dental structures of each individual. Identification of deceased individuals who cannot be identified by other means, identification of human remains, identification of victims in mass fatalities, assessment of bite mark patterns, and age estimation using teeth are all part of the role of forensic odontologists as well. [2] Identification of an assailant by comparing a record of their dentition with a record of a bite mark left on a victim and the presentation of bite mark evidence in court as an expert witness are also done as part of the job. Bite mark comparison is one of the major and newer parts of this forensic discipline that has been evolving since the 1970s and has played a major role in many cases and the convictions of many criminal including the infamous Ted Bundy who was convicted solely on evidence of a bite mark analysis. However, recently, there has been a lot of debating around the accuracy of a bite mark comparisons and if it can truly assist in accurately identifying suspect as the biter in an attack. For example, in 1991 Ray Krone, a former letter carrier without a criminal record, honorably discharged from the U. S. Air Force was charged with taking the life of a Phoenix cocktail waitress, Kim Ancona. A body examination revealed that she had been stabbed eleven times and bitten on the left breast and on her neck. Forensic evidence, or lack of it, indicated that there were no fingerprints and other bodily fluids although there was indication that she had been sexually assaulted. There was little evidence that tied Krone to the crime except for evidence of the bite mark on the victim's breast, which a state forensic odontologist, Dr. Raymond Rawosn, said matched his very distinct teeth. The bite mark testimony of Dr. Rawson convinced the jury that Krone was guilty and he was convicted. [3] During the time of prosecution, forensic DNA technology was not generally available, but once it was, Ray Krone was proved innocent of the crime. A DNA test not only established that he was not involved in the fatal stabbing, but that also identified the true perpetrator – a person already incarcerated on another unrelated offense. After being cleared by DNA, Ray Krone walked out of the Arizona State Penitentiary at Yuma on April 8, 2002, a free man. 4] In another case, Ricky Amolsch, 38, ended up in jail for ten months over a mistake that a forensic dentist made. His girlfriend, Jane Marie Fray was gruesomely stabbed twenty-two times and an electrical cord was wrapped tightly around her neck. She was also bitten near her left ear. Amolsch was arrested, photographed and fingerprinted. The chief forensic odontologist for Wayne and Oakland Counties, Dr. Allan Warnick’s claims of a bite mark match persuaded the district judge to sign a capital warrant. The preliminary hearing relied on this evidence alone with the forensic dentist, Dr Warnick, giving a compelling testimony. Since Amolsch was not eligible for bond, he had to stay in jail until his trial, and during that time, he lost his home, his savings and his children. [5] After one of Warnick's other cases was challenged, officials re-examined Amolsch's case. Dr. John Kennedy, another forensic dentist, reviewed the case and gave a second opinion that it was someone else, not Amolsch, who had bitten Fray's face. Two other forensic dentists agreed and Amolsch was released from jail. It is true that a human bite mark inflicted by an attacker on the skin of a victim may leave a definitive identifiable pattern that can be identified as being made by a certain set of teeth. If a suspect is apprehended his teeth are reproduced by taking impressions of the teeth and pouring plaster into the impression, thus producing a plaster model. The plaster models of his or her teeth are then put on a scanner and scanned to make a digital image. A tracing of the biting edges of the teeth is then made either using the omputer or tracings from the printed image. This tracing is then superimposed on the bite mark photo, either manually or electronically using a scanned image of the bite mark, to determine if a match can be made. [6] Bite mark analysis is based on two postulates: a) the dental characteristics of anterior teeth involved in biting are unique amongst individuals, and b) this asserted uniqueness is transferred and recorded in the injury. [7] However, some bites are force ful enough to leave a good impression, others are not. A bite might penetrate the skin, but often only leaves bruising—and sometimes the blood marks of a bruise are mistaken for the impression of a tooth. It also seems to be the case that skin gets distorted when bitten or the teeth slide during the act of biting. [8] Furthermore, the level of distortion tends to increase after the bite mark was made. A studies suggest that for the bite mark to be accurately analyzed, the body must be examined in exactly the same position it was in when the bite occurred which can be a difficult if not an impossible task to accomplish. In addition, bite mark analysis is also controversial because dental profiles are subject to change. The loss and/or chipping of teeth, or the alteration of arch configuration through a variety of procedures, such as the use of braces, is common in human populations. The onset of oral diseases such as dental caries has been shown to alter the arch and tooth configuration and must be taken into account when comparing a dental profile to the bite mark after a significant amount of time has passed since the mark was made. 9] All of these variables affect the validity of a bite mark analysis and trying to identify an biter through the uniqueness of his or her dentition. One particular case that highlighted the lack of uniqueness in bite marks involved two suspects accused of attacking a man that had sustained a bite mark injury. Two separate forensic dentists, one representing the prosecution and one the defense, were brought in to analyze the mark. They reported conflicting results. One found the mark to come from suspect A and the other said it was from suspect B. This disagreement resulted from the fact that even though the two suspects had dental features making them unique, the bite mark itself was not detailed enough to reflect them. Therefore, the mark could have reasonably come from either of the men[10]. The equivocal outcome demonstrated in the case emphasizes the difficulty in proving uniqueness. In conclusion, not all bite marks have the level of forensic value necessary to identify just one individual. Now, individual characteristic within a bite mark or in a person's dentition is a distinguishing feature, trait, or pattern. Individual dental characteristics are reported to be features that are unique to an individual variation within a defined group. The presence of worn, fractured or restored teeth is valued as unique features. If a bite mark possesses the reflection of such a feature(s), the degree of confidence in a match increases. It is actually counter-intuitive to assume enamel chips, fractures, and dental restorations are always inherently unique. The shape of human teeth is quite constant in nature and their changes over time are based on common events.

Friday, November 8, 2019

Analysis Of President Bushs Post-Cold War Interve Essays

Analysis Of President Bush's Post-Cold War Interve Essays Analysis Of President Bush's Post-Cold War Intervention Policy Analysis of President Bush's post-cold war intervention policy What Leads to Intervention?: A Case Study of Intervention During the Bush Administration As Commander-in-Chief of the most powerful armed force in a world plagued by small military crises, the question ultimately becomes: when does a crisis call for intervention? From 1988 to 1992, this was President George Bushs dilemma. The days of the United States fearing embroilment in international affairs due to the towering menace of the USSR and global destruction ended at about the same time as Bush ascended the Presidency. However, with the threat of the USSR gone, the importance of small scale conflicts had taken priority in maintaining world peace. Further, the fall of communism had left the United States with a leading role in world politics. In that position, with a powerful armed force behind it, the United States carried the heavy responsibility of how and why to use its new found eminence. That responsibility fell onto the shoulders of Mr. George Bush as the first American President to sit in that exalted position. His actions would determine the United States place in the new world order and set the path that future Presidents would have to carefully tread. The world order that President Bush inherited was of a vastly different character then that of all his predecessors. The Cold War environment that the world had just left behind had provided a clear framework for national security policy and the use of the US military. The environment that Bush walked into was an environment filled with disagreement and confusion over the new framework with which the US should operate. It was also an environment with which the role of Congress was almost eliminated as President Bush continually authorized military operations without the full consent of Congress. It was an environment where the executive held the power to use the military based on his own intent. During his term in the Presidency, George Bush was confronted with many opportunities to demonstrate his intent for the US military. The four years while Bush was President saw crisis situations occur with alarming frequency. In each of these crisis areas, gross human rights violations were committed. In some cases he reacted with swift military action, in the name of humanitarianism, while in other cases he allowed sanctions to do the job. The crisis situations where he advocated a military intervention and the situations where he did not both tell the whole story. In analyzing these actions, it can be ascertained which variables promoted a military intervention and which did not. The Variables There are many variables that could influence the United States decision to send a military intervention, however very few are relevant, quantifiable or could possibly have a strong influence over such an important decision. Therefore, based on published literature and observation there appear to be five compelling variables which would have

Wednesday, November 6, 2019

Free Essays on History Of The Internet

In 1964, the RAND proposal was put forward. Written by Paul Baran, this proposal stated the principles of a new network which was to be built for maximum strength and flexibility. This new network would have no central authority. The principles of this network were that all the nodes would be equal in status and each could send and receive messages. All the messages would be sent in packets, each with its own address. These packets would be sent at one node and would arrive at another one. This may seem rather obvious, but what was new was that the way the packets went through the net was not important. That means that if one node was destroyed, the rest of the nodes would still be able to communicate. This is of course was inefficient and rather slow, but extremely reliable. The Internet still uses this method nowadays, and there has been only one collective crash so far. The Pentagon's Advanced Research Projects Agency (ARPA) wanted to install an advanced network based on the principles in the US. The network was called ARPANET and consisted of four high speed computers (nodes). In 1969, the first node was installed in UCLA. By 1971 there were 23 nodes on ARPANET. In 1972 the first e-mail program was created by Ray Tomlinson of BBN. He chose the @ symbol to link the username to the address. Telnet protocol allowed logging on to a distant computer. It was published as Request for Comments (RFC). These were means of sharing developmental work throughout the network community. Instead of using the ARPANET for long distance computing, the scientists used it for communicating with each other. Each user had his/her own e-mail address. In 1973, â€Å"Development began on the protocol later to be called TCP/IP, it was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA. This new protocol was to allow diverse computer networks to interconnect and communicate with each other (Kristula 1974-1983).†... Free Essays on History Of The Internet Free Essays on History Of The Internet In 1964, the RAND proposal was put forward. Written by Paul Baran, this proposal stated the principles of a new network which was to be built for maximum strength and flexibility. This new network would have no central authority. The principles of this network were that all the nodes would be equal in status and each could send and receive messages. All the messages would be sent in packets, each with its own address. These packets would be sent at one node and would arrive at another one. This may seem rather obvious, but what was new was that the way the packets went through the net was not important. That means that if one node was destroyed, the rest of the nodes would still be able to communicate. This is of course was inefficient and rather slow, but extremely reliable. The Internet still uses this method nowadays, and there has been only one collective crash so far. The Pentagon's Advanced Research Projects Agency (ARPA) wanted to install an advanced network based on the principles in the US. The network was called ARPANET and consisted of four high speed computers (nodes). In 1969, the first node was installed in UCLA. By 1971 there were 23 nodes on ARPANET. In 1972 the first e-mail program was created by Ray Tomlinson of BBN. He chose the @ symbol to link the username to the address. Telnet protocol allowed logging on to a distant computer. It was published as Request for Comments (RFC). These were means of sharing developmental work throughout the network community. Instead of using the ARPANET for long distance computing, the scientists used it for communicating with each other. Each user had his/her own e-mail address. In 1973, â€Å"Development began on the protocol later to be called TCP/IP, it was developed by a group headed by Vinton Cerf from Stanford and Bob Kahn from DARPA. This new protocol was to allow diverse computer networks to interconnect and communicate with each other (Kristula 1974-1983).†...

Monday, November 4, 2019

A Lifestyle by Fernando Sorrentino Essay Example | Topics and Well Written Essays - 250 words

A Lifestyle by Fernando Sorrentino - Essay Example This change in his outlook and lifestyle did not happen voluntarily but was forced upon him by circumstances. While the story may sound far-fetched, the character underlines human capacity to adjust to circumstances and more importantly, to remain â€Å"relatively happy† in the end without the usual trappings. Conflict Both internal and external conflicts exist in this story (Garp, online). The inner conflict is the narrator’s physical, social and psychological struggle with the circumstances that he faced. This internal conflict makes him wonder how to cope with a difficult situation and survive. His external conflict is with the society, of which he was a part not so long ago and leading a normal life, unaware of the ridiculous extent to which urban life and social relations have descended to. (your last name) 2 Theme and central idea Thematically it is a humorous story. Humor is noted throughout the story’s incidents like the pompous declaration of a locksmith about his association’s Magna Carta and the ethics of and restrictions on its members, the vicarious pleasure of the janitor/girl-friend/colleagues at the bank at his discomfiture, and his gradual adjustment from dependence to independence.

Friday, November 1, 2019

Business Ethics Term Paper Example | Topics and Well Written Essays - 1250 words

Business Ethics - Term Paper Example 1.c Oligopoly In an oligopoly market, the number of firms or sellers is few, and the entry of the other party is restricted, though more than one seller is allowed to enter in oligopoly market (Velasquez, G.M., â€Å"Business Ethics: Concepts and Cases†: 167). 1.d Monopolistic Competition In a monopolistic competition, the number of buyers is many and the entry of the sellers is free like perfect competition (Velasquez, G.M., â€Å"Business Ethics: Concepts and Cases†: 167). Type of Market Factors Monopoly Oligopoly Perfect Competition Monopolistic Competition Number of sellers One seller Few seller Large number of sellers Several/ many Entry to the market Restricted/ completely blocked Restricted Unrestricted/free Unrestricted/free Nature of product Unique Differentiated /undifferentiated Homogeneous Differentiated Demand curve Downward sloping, more inelastic Downward sloping, relatively inelastic Horizontal Downward sloping, relatively elastic Examples Local water su pply Cars, electronics, Cement Carrots, Cabbage, Potato Restaurants, Builders Source: (Velasquez, G.M., â€Å"Business Ethics: Concepts and Cases†: 167). Question 2 2. ... He also added that the personal right to liberty or property is valid but the right to a pollution free society and living is more important than the property right. Every individual has their own property and liberty to use that property according to their wish but they should keep in mind that the nature is interconnected, once an individual pollute their property the others’ property also gets affected. When a person poisons his or her land or well, the other lands and wells also get poisoned, which harms the ecology and the environment. Every other person is responsible towards the environment and its good health. There are many Anti Pollution Acts to save the environment and the people of the society should abide by those laws to enjoy as well as to give others a standard living. Though the view point of Blackstone does not solve the issue permanently, still there are few questions on the pollution and its acts such as, how much pollution to control, how much property rig hts to be limited for the environment and its health. In relation to the above discussion, it can be acknowledged that both the rights are important for the society, without the right to property and liberty the society would have huge problems regarding the ownership of the property and the day-to-day activities. The farmers and fishermen are dependent on the environment, land and water. Without the right to property and right to liberty they would have real problem, but at the same time they are responsible to pollute the society as less as they can, which would maintain a balance between the people and the nature (Velasquez, M. G., â€Å"Business Ethics: Concepts and Cases†). Question 3 Firm’s