Monday, September 30, 2019

Political parties and Voting Behavior Essay

Thesis: What are the predominant political factors that affect the voting behavior of a population ? Hypothesis : Pluralism, ideology, religion and social factors are the predominant political factors that affect the voting behavior of the population. Introduction : Pluralism in voting population is a natural phenomena in European and American cosmopolitan societies . Elsewhere, in Asia and far- East ethnic diversity too exists. A consequence of this pluralism is multi-party political system .Interests of different segregated sections of society based on issues, ethnicity, public policy, loyalties etc. are represented by different political parties. This should ideally and practically lead to a multi-party system . This system is obviously more democratic. The voters choice is increased . The political parties thus become more competitive against each other. This makes the political parties more accountable to the people in order to win their ‘trust and confidence’. This pluralism affects voting behavior and has serious impacts on national politics. Voters choices are often prejudiced and biased. This is quite reasonable as we are living in an imperfect society. The American Elections : Voting behavior in Democrat and Republican elections ‘A loss of American voter’s faith in Democracy.’ The American voters today don’t identify themselves with either Democrats or Republicans according to many surveys and statistical studies. The Presidential elections have seen a decline in the participation of eligible voters , as observed since the 1950s and 1960s. The eligible voting population has increased in America but the number of registered voters is decreasing. Dissatisfied by the Democrats and Republicans not bringing effective reforms the voters have lost interest in politics as a consequence of politicians. â€Å"Does this phenomena indicate the American citizens disillusionment with a predominantly much polarized American two-party democracy?† According to political scientists the political non-participation of Americans is a matter of concern for the health of American political system. The Americans are now cynical and distrustful of politics, politicians and the Government. Experts believe such a trend could lead to the breakdown of American political system. Contrary to the belief of these experts many Democrat and Republican partisan parties claim they have the ability to draw supporters for their parties. They argue that the American’s have thus not lost faith in Democracy. Viewpoints. Voting Behavior. Introduction. ‘The ‘God-gap’ difference between the Republicans and the democrats’ The Republicans are known for their conservative ideology and policies whereas the democrats are known for their liberal ones. It is a well established public opinion that the more religiously an American is inclined the more likely he is to vote for the Republicans and the other way round for the Democrats. Karlyn Bowman a public relations expert raised a question in this context at a conference for media men. This ‘God-gap’ had overshadowed many other issues and changed the voting patterns in the November, 2006 Presidential elections. Thus the ‘God-gap’ has begun to play an important role in the American public life. Since 1992, this gap , between the frequent and the not so frequent worshipers, regardless of their religious background has become prominent. Conservative leaders were the first to guess this voter behavior and to capitalize on it. The talk became all the more popular with the Pundits, intellectuals, liberal strategists and academics – the chattering class ! They added fuel to the fire.9/11 and it’s aftermath established the God- gap as a decisive public opinion maker. Thus, the public power of religion got firmly established in the American society. In the elections to come neither the Conservatives nor the Democrats can afford to underplay it. The November 2006 Presidential elections shall be followed with contests between the Republicans and Democrats to woo a sizeable vote-bank ; the one created by the ‘God-gap’. In Politics, the ‘God-gap’ Overshadows Other Differences New York Times. By Peter Steinfels. Published December 9, 2006. ‘The Religious vote base’ The Republicans have often used their religion conservative base to win votes. Consequently Mr. George Bush won his second term in the office. This has concerned the democrats and they have lately been working on the religious vote. White evangelical and the born-again Christians again voted for the Republican candidate in the last two elections. Nationwide exit polls show that nothing has changed in favor of the Democrats. Around 70-72 percent of the evangelical and the born again Christians voted for the Republican Presidential candidate in the last two elections. Deliberate call for a religious vote by some Democratic senate candidates did win them a significant proportion of Roman Catholics and white mainline Protestants votes in states like Ohio and Pennsylvania. However trends are changing, say, in many states like Colorado. Most American’s Bobby Clark, Deputy Director of a liberal group in Colorado says,† Most Americans are now a pretty moderate people.† The Rev. Troy Newman called the election day ‘a bloody Tuesday’. His anti-abortion Operation Rescue lost favor with American’s in South Dakota and California. The Democratic parties liberal anti-abortion policies were endorsed by the people. Religious Voting Data Show Some Shift, Observers Say. New York Times. By Laurie Goodstein. Published November 9, 2006. ‘Cashing on the African-American vote-bank’ African-American’s constitute nearly half the votes in South Carolina. A remarkable portion ! This phenomena of the African-American vote-bank is now well recognized both by the Republicans and the Democrats. The racial divide still exists and is well exploited. The candidates have no compunctions visiting black churches accepting their endorsements before the elections. They even don’t hesitate in identifying with king Martin Luther! Empirical data suggests that the African –American vote has been with the Democrats who have more actively fought for their cause. The Conservatives are taking no chances now . The situation in South Carolina mirrors the entire America. The African-American voters can no longer be taken for granted. They are now armed with education and leaders. They have made significant contributions to all spheres of American life- Arts, science, literature, Sports etc. In a nut-shell they are now enlightened about their rights and privileges. Black and Bruised. The New York Times, Monday, December, 24, 2007.by Joann Wypijewski. Published February 1, 2004. ‘The Feminist ideology ’ John Kerry actively involved himself in a campaign – the Women vote bank. He was establishing his credentials presiding over women audiences. His enthusiastic drive to win over the much contested vote-bank – Women. This bastion, the Democrats claimed rightly belonged to them Mr. Bush in his campaign had projected himself as the best candidate to protect the Americans against the terrorists. The 9/11 scare was worst to affect the women. Mr. Bush’s campaign as the best candidate to protect the American’s against the terrorists caught favor with women. According to New York Times/ CBS Polls Democrats polled less, loosing ground with Democratic parties most secure women-votes. Their has been a remarkable change in the trend. To quote statistics in 2000, 54 percent of women voted for Al Gore while only 43 percent voted for Mr. George Bush, the republican candidate. The news of the 9/11 terrorist attack and the unacceptable terrorist attack against children in Russia, used provocatively by the Republicans created a considerable challenge for Mr. John Kerry and the Democrats. Mr. Bush gave a fight to the Democrats on their own strong hold-the women-vote. Mr. Bush used his success in toppling the Afghan’s in yet another novel way. He projected the new found freedom of the Afghan women to woo feminist sentiments. Statistics show that the voter turnout of women has increased over the last Presidential elections. The two parties are working on the idea to polarize the feminist activism in their favor. On the other front they are drawing more and more women to the ballot box. More and more women candidates are being fielded in elections for public offices. Hillary Rodham Clinton , the wife of former President Mr. Bill Clinton is contesting in the next Presidential elections. She is being viewed as a strong contender for the position. This scenario echoes the general mood of the American people. Thus the feminist ideology holds ground affecting elections and political parties. The New York Times, Kerry in a Struggle for a Democratic Base: Women, by Katherine Q.Seelye. Published September 2, 2004. Conclusion : We can thus conclude that Pluralism, ideology, Religion and social factors are the predominant factors affecting voter behavior. Pluralism exists across European and American politics and even in Asia and the far- East. The concept of pluralism elucidates that a multi-party system has both positive and negative impacts on voters behavior. The voter has the right to choose the party he trusts. Although he might be biased and prejudiced in his attitudes. Neither the Democrats nor the Republicans are now able to associate themselves with the common American. The decline in participation of eligible voters population in America since the 1950s and 960s suggest that the American voter has lost faith in the political system- politics, politicians and the Government. Since 1992, the ‘God-gap’ factor has begun to play an important role in American elections. Both the Democrats and Republicans are creating and fuelling this gap to cash on votes. The Democrats and Republicans are playing their Religious cards. The electorate is swinging between the Democrats and Republicans. The last two Presidential elections saw 70-72 percent Christian hardliners voting for the conservative Republicans. The situation is changing in favor of the Democrats with the American people becoming more moderate in their values. The African-American voter is now valued due to his predominance in states like South Carolina. The women voters actively participated in the last few Presidential elections according to statistics. 9/11 and it’s aftermath left a deeper influence on women voters.

Sunday, September 29, 2019

Advantages of Geothermal Power Plants

Advantages of Geothermal Power PlantsGeothermal power plants are used for production of electricity from geothermal energy. The traditional thermal power plants need fuel for generating electricity while geothermal powre plants don't need fuel. Here are some of the advantages of generating electricity from geothermal energy. Advantages of using Geothermal Energy for Producing PowerGeothermal energy is the energy stored below the earth’s crust. Due to heat below the earth’s crust water gets heated and also sometimes gets converted into steam. This hot water and steam can be used for generating electricity. Here are the advantages of using geothermal energy for producing electricity: 1) No fuel is required: The thermal and nuclear power plants use fossil and nuclear fuels respectively to heat water and generate steam for production of electricity.The geothermal power plants use the readily available hot water from the geothermal reservoir so no fuel is required. 2) Clean source of power: The fuels used in conventional thermal power plants produce lots of toxic gases and particulate matter polluting the surrounding atmosphere. Electricity can be produced from geothermal reservoir without creating any air-pollution. 3) Less area is required: The land required for the geothermal power plant per megawatt of power produced is much lesser than that required for the other types of power plants. 4) Unhindered production of power: The energy from geothermal reservoir is available 24 hours a day and all the days of the year without any breakage or change during varying seasons, natural disaster and political turmoil. Thus geothermal energy is the reliable source for producing electricity continuously without any hindrance.Parts of a Geothermal Power PlantGeothermal Vents The geothermal vent is the first component of a geothermal plant. A geothermal vent is a deep well drilled into the Earth that the power plant uses to tap into the Earth's heat. A geothermal plant may have two goals for its vent; most current geothermal plants draw superheated, pressurized water  upward; these are called flash steam plants. Geothermal plants may also simply dig far enough underground, as many as three kilometers, to reach a point where the Earth is warm enough to boil water, these are called dry steam vents. Steam GeneratorAnother key component of a geothermal plant is the steam production unit, which can take multiple forms. In a flash steam vent, superheated pressurized water is drawn from its place underground to low-pressure tanks. The pressure of the Earth kept the water in liquid form despite its high temperature, and by removing that pressure the hot water instantly turns to steam, hence the term flash steam. In a dry steam plant, the plant technicians pump water to the bottom of the vent where the Earth's heat boils the water and turns it into steam.TurbineRegardless of the plant type, both flash steam and dry steam plants pump the steam from the geothermal vent to a large turbine. The steam passes this turbine, turning it in the process. This turbine is attached to an electric generator, and as the turbine turns the generator turns the mechanical energy into electric energy, thus converting the heat from the Earth into usable electricity.CondenserAfter the steam passes through the turbine, it continues to a condenser chamber. This chamber condenses the steam back into liquid water by cooling it. The excess heat lost as the steam turns to liquid water may be used for other applications, such as heating or greenhouse farming. The cooled liquid water is then typically pumped back into the ground to either restart the boiling process for dry steam or to replenish the natural heated aquifer for flash steam plants.Disadvantages of Geothermal EnergyGeothermal energy is a key contender for future electricity production in various countries across the globe. This however, doesn't mean that geothermal energy comes without its dis advantages, many of which are explained below.The Disadvantages AvailabilityThe availability of geothermal energy that is capable of feeding geothermal power stations is limited. This intense energy source is often only available in countries where geothermal activity is at its peak, mainly tectonic/volcanic regions such as Iceland. Significant Investment Required – A significant investment is often required prior to building a geothermal power station. Geological surveys have to be undertaken to ensure the location is suitable for geothermal electricity production before any potential installation work can go ahead. It's often costly to transport any required materials to remote locations where there is sufficient geothermal activity.Harmful Gas Potential – Geothermal power stations have the potential to release harmful gases into the air. Toxic gases exist deep beneath the ground in various regions and can sometimes be released via the infrastructure used by geotherm al power stations. Most modern geothermal power plants have systems and procedures in places to deal with these harmful gases. Localised Supply – As geothermal is trapped beneath our feet, we cannot extract, store and transport this energy source to other countries as we do with fossil fuels such as oil, coal and gas. Geothermal energy has to be used at source to generate electricity, thus providing a supply of electricity for the electrical grid system of only the source country.The Steam Can Stop – Geothermal power stations have the potential to cool the rocks beneath them buried deep under the ground. If the rocks are cooled via too much water flowing into the well, they will no longer be able to produce the steam required to turn a generator, thus rendering a site useless and resulting in significant losses for any company making use of geothermal energy at that location. Visual Pollution – Geothermal power stations, as with many other power station designs can be unsightly and provide visual pollution. Networks of pipe systems have to be utilised for production purposes and many people are opposed to the sight of these. –Advantages of Geothermal Energy Geothermal energy is widely considered as a key contender for future electricity production in various corners of the earth. Countries including Iceland, the USA and New Zealand already make use of this renewable energy source to provide electricity on a significant scale. There are many advantages relating to the use of geothermal energy and these are described  below. The AdvantagesEnvironmentally Friendly – Geothermal energy is a renewable energy source that's highly environmentally friendly. Little disruption is made to the environment as a result of the various processes that are used to harness this energy source in order to provide electricity. Few chemicals and pollutants feature in geothermal electricity production. Highly Efficient – Geothermal energy is highly efficient and can be used to provide electricity in select areas or even to provide heating for our homes and business on a much wider scale via the use of ground source heat pumps.Cost Effective – As geothermal power stations are relatively small and less complex than large fossil fuel alternatives, they are highly cost effective, especially when they are placed in areas of high geological/tectonic activity where magma is closer to the earth's crust when compared with other locations. Job Creation – The introduction of geothermal energy systems on both an industrial and domestic scale has helped to boost jobs in many different countries. This is a key advantage for areas that may have already been experiencing job shortages. Land Value – Another advantage of geothermal energy and tied into the cost effectiveness of this energy source is land value.Geothermal power stations are often placed in areas of high geological activity where land values may be lo w due to obvious reasons. This helps to provide cost savings for energy companies that wish to make use of geothermal activity. Almost Infinite – Although geothermal activity in a particular area is actually finite, this is likely to be available for anywhere between 5,000 and 1,000,000 years. This huge time scale means geothermal energy is almost infinite and will be able to long live out many fossil fuel alternatives. Always On – As long as geothermal activity is present in a particular region, this energy source will always be on and will be fairly constant.This means that unlike solar, wind, wave and tidal alternatives, geothermal energy can provide continuous electricity production whatever the weather. Very Quiet – Another significant advantage of geothermal energy is how quiet it can be. Geothermal energy is the electric car of power stations and is likely to provide little noise pollution to nearby residents. –Geothermal Power PlantA geothermal po wer plant uses its geothermal activity to generate power. This type of natural energy production is extremely environmentally friendly and used in many geothermal hot spots around the globe. To harness the energy, deep holes are drilled into the earth (much like when drilling for oil) until a significant geothermal hot spot is found. When the heat source has been discovered, a pipe is attached deep down inside the hole which allows hot steam from deep within the earths crust to rise up to the surface. The pressurized steam is then channeled into a turbine which begins to turn under the large force of the steam. This turbine is linked to the generator and so the generator also begins to turn, generating electricity.We then pump cold water down a new pipe which is heated by the earth and then sent back up the first pipe to repeat the process. The main problems with geothermal energy is that firstly, you must not pump too much cold water into the earth, as this could could cool the roc ks too much, resulting in your geothermal heat source cooling down. secondly, geothermal power plants must be careful of escaping gases from deep within the earth. We suggest if you would like to learn more on this topic, you take a look at our advantages of geothermal energy, and our disadvantages of geothermal energy articles.A very good way of thinking about geothermal energy is remembering that all our continents lie on molten rock deep within the earth, this rock produces tremendous levels of heat that we are able to extract, just think of your nation lying on a bed of fire. Geothermal power is one of the most renewable energy sources that exists on our planet today, the earth will contain this heat for our lifetime. If this heat disappears, our planet will become too cold to survive on.You can purchase small scale geothermal equipment for your home yet this works in a different manner to geothermal power stations. The power stations extract the heat directly from deep within t he earth, whereas home geothermal hot water equipment absorbs heat over a lengthy period of time from a few meters beneath your feet.Main parts of the plant are1. Coal conveyor 2. Stoker 3. Pulverizer 4. Boiler 5. Coal ash 6. Air preheater 7. Electrostatic precipitator 8. Smoke stack 9. Turbine 10. Condenser 11. Transformers 12. Cooling towers 13. Generator 14. High – votge power linesBasic Operation :A thermal power plant basically works onRankine cycle. Coal conveyor : This is a belt type of arrangement.With this coal is transported from coal storage place in power plant to the place near by boiler. Stoker : The coal which is brought near by boiler has to put in boiler furnance for combustion.This stoker is a mechanical device for feeding coal to a furnace.Pulverizer : The coal is put in the boiler after pulverization.For this pulverizer is used.A pulverizer is a device for grinding coal for combustion in a furnace in a power plant.Types of Pulverizers Ball and Tube Mill Ba ll mill is a pulverizer that consists of a horizontal rotating cylinder, up to three diameters in length, containing a charge of tumbling or cascading steel balls, pebbles, or rods. Tube mill is a revolving cylinder of up to five diameters in length used for fine pulverization of ore, rock, and other such materials; the material, mixed with water, is fed into the chamber from one end, and passes out the other end as slime. Ring and BallThis type consists of two rings separated by a series of large balls. The lower ring rotates, while the upper ring presses down on the balls via a set of spring and adjuster assemblies. Coal is introduced into the center or side of the pulverizer (depending on the design) and is ground as the lower ring rotates causing the balls to orbit between the upper and lower rings. The coal is carried out of the mill by the flow of air moving through it. The size of the coal particals released from the grinding section of the mill is determined by a classifer s eparator. These mills are typically produced by B&W (Babcock and Wilcox).Boiler : Now that pulverized coal is put in boiler furnance.Boiler is an enclosed vessel in which water is heated and circulated until the water is turned in to steam at the required pressure.Coal is burned inside the combustion chamber of boiler.The products of combustion are nothing but gases.These gases which are at high temperature vaporize the water inside the boiler to steam.Some times this steam is further heated in a superheateras higher the steam pressure and temperature the greater efficiency the engine will have in converting the heat in steam in to mechanical work. This steam at high pressure and tempeture is used directly as a heating medium, or as the working fluid in a prime mover to convert thermal energy to mechanical work, which in turn may be converted to electrical energy. Although other fluids are sometimes used for these purposes, water is by far the most common because of its economy and suitable thermodynamic characteristics.Classification of Boilers Bolilers are classified asFire tube boilers : In fire tube boilers hot gases are passed through the tubes and water surrounds these tubes. These are  simple,compact and rugged in construction.Depending on whether the tubes are vertical or horizontal these are further classified as vertical and horizontal tube boilers.In this since the water volume is more,circulation will be poor.So they can't meet quickly the changes in steam demand.High pressures of steam are not possible,maximum pressure that can be attained is about 17.5kg/sq cm.Due to large quantity of water in the drain it requires more time for steam raising.The steam attained is generally wet,economical for low pressures.The outut of the boiler is also limited.Water tube boilers : In these boilers water is inside the tubes and hot gases are outside the tubes.They consists of drums and tubes. .They may contain any number of drums (you can see 2 drums in fig).F eed water enters the boiler to one drum (here it is drum below the boiler).This water circulates through the tubes connected external to drums.Hot gases which surrounds these tubes wil convert the water in tubes in to steam.This steam is passed through tubes and collected at the top of the drum since it is of light weight.So the drums store steam and water (upper drum).The entire  steam is collected in one drum and it is taken out from there (see in laout fig).As the movement of water in the water tubes is high, so rate of heat transfer also becomes high resulting in greater efficiency.They produce high pressure , easily accessible and can respond quickly to changes in steam demand.These are also classified as vertical,horizontal and inclined tube depending on the arrangement of the tubes.These are of less weight and less liable to explosion.Large heating surfaces can be obtained by use of large number of tubes.We can attain pressure as high as 125 kg/sq cm and temperatures from 3 15 to 575 centigrade.Superheater : Most of the modern boliers are having superheater and reheater arrangement. Superheater is a component of a steam-generating unit in which steam, after it has left the boiler drum, is heated above its saturation temperature. The amount of superheat added to the steam is influenced by the location, arrangement, and amount of superheater surface installed, as well as the rating of the boiler. The superheater may consist of one or more stages of tube banks arranged to effectively transfer heat from the products of combustion.Superheaters are classified as convection , radiant or combination of these.Reheater : Some of the heat of superheated steam is used to rotate the turbine where it loses some of its energy.Reheater is also steam boiler component in which heat is added to this intermediate-pressure steam, which has given up some of its energy in expansion through the high-pressure turbine. The steam after reheating is used to rotate the second stea m turbine (see Layout fig) where the heat is converted to mechanical energy.This mechanical energy is used to run the alternator, which is coupled to turbine , there by generating elecrical energy.Condenser : Steam after rotating staem turbine comes to condenser.Condenser refers here to the shell and tube heat exchanger (or surface condenser) installed at the outlet of every steam turbine in Thermal power stations of utility companies generally. These condensers are heat exchangers which convert steam from its gaseous to its liquid state, also known as phase transition. In so doing, the latent heat of steam is given out inside the  condenser. Where water is in short supply an air cooled condenser is often used. An air cooled condenser is however significantly more expensive and cannot achieve as low a steam turbine backpressure (and therefore less efficient) as a surface condenser.The purpose is to condense the outlet (or exhaust) steam from steam turbine to obtain maximum efficie ncy and also to get the condensed steam in the form of pure water, otherwise known as condensate, back to steam generator or (boiler) as boiler feed water.Why it is required ?The steam turbine itself is a device to convert the heat in steam to mechanical power. The difference between the heat of steam per unit weight at the inlet to turbine and the heat of steam per unit weight at the outlet to turbine represents the heat given out (or heat drop) in the steam turbine which is converted to mechanical power. The heat drop per unit weight of steam is also measured by the word enthalpy drop. Therefore the more the conversion of heat per pound (or kilogram) of steam to mechanical power in the turbine, the better is its performance or otherwise known as efficiency.By condensing the exhaust steam of turbine, the exhaust pressure is brought down below atmospheric pressure from above atmospheric pressure, increasing the steam pressure drop between inlet and exhaust of steam turbine. This fur ther reduction in exhaust pressure gives out more heat per unit weight of steam input to the steam turbine, for conversion to mechanical power. Most of the heat liberated due to condensing, i.e., latent heat of steam, is carried away by the cooling medium. (water inside tubes in a surface condenser, or droplets in a spray condenser (Heller system) or air around tubes in an air-cooled condenser).Condensers are classified as (i) Jet condensers or contact condensers (ii) Surface condensers. In jet condensers the steam to be condensed mixes with the cooling water and the temperature of the condensate and the cooling water is same when leaving the condenser; and the condensate can't be recovered for use as feed water to the boiler; heat transfer is by direct conduction.In surface condensers there is no direct contact between the steam to be condensed and the circulating cooling water. There is a wall interposed between them through heat must be convectively transferred.The temperature of the condensate may be higher than the temperature of the cooling water at outlet and the condnsate is recovered as feed water to the boiler.Both the cooling water and the condensate are separetely with drawn.Because of this advantage surface condensers are used in thermal power plants.Final output of condenser is water at low temperature is passed to high pressure feed water heater,it is heated and again passed as feed water to the boiler.Since we are passing water at high temperature as feed water the temperature inside the boiler does not dcrease and boiler efficincy also maintained.Cooling Towers :The condensate (water) formed in the condeser after condensation is initially at high temperature.This hot water is passed to cooling towers.It is a tower- or building-like device in which atmospheric air (the heat receiver) circulates in direct or indirect contact with warmer water (the heat source) and the water is thereby cooled (see illustration). A cooling tower may serve as the h eat sink in a conventional thermodynamic process, such as refrigeration or steam power generation, and when it is convenient or desirable to make final heat rejection to atmospheric air. Water, acting as the heat-transfer fluid, gives up heat to atmospheric air, and thus cooled, is recirculated through the system, affording economical operation of the process.Two basic types of cooling towers are commonly used. One transfers the heat from warmer water to cooler air mainly by an evaporation heat-transfer process and is known as theevaporative or wet cooling tower.Evaporative cooling towers are classified according to the means employed for producing air circulation through them:atmospheric, natural draft, and mechanical draft. The other transfers the heat from warmer water to cooler air by a sensible heat-transfer process and is known as the nonevaporative or dry cooling tower.Nonevaporative cooling towers are classified as air-cooled condensers and as air-cooled heat exchangers, and are further classified by the means used for producing air circulation through them. These two basic types are sometimes combined, with the two cooling processes generally used in parallel or separately, and are then known as wet-dry cooling towers.Evaluation of cooling tower performance is based on cooling of a specified quantity of water through a given range and to a specified temperature approach to the wet-bulb or dry-bulb temperature for which the tower is designed. Because exact design conditions are rarely experienced in operation, estimated performance curves are frequently prepared for a specific installation, and provide a means for comparing the measured performance with design conditions.Economiser : Flue gases coming out of the boiler carry lot of heat.Function of economiser is to recover some of the heat from the heat carried away in the flue gases up the chimney and utilize for heating the feed water to the boiler.It is placed in the passage of flue gases in between the exit from the boiler and the entry to the chimney.The use of economiser results in saving in coal consumption , increase in steaming rate and high boiler efficiency but needs extra investment and increase in maintenance costs and floor area required for the plant.This is used in all modern plants.In this a large number of small diameter thin walled tubes are placed between two headers.Feed water enters the tube through one header and leaves through the other.The flue gases flow out side the tubes usually in counter flow.Air preheater : The remaining heat of flue gases is utilised by air preheater.It is a device used in steam boilers to transfer heat from the flue gases to the combustion air before the air enters the furnace. Also known as air heater; air-heating system. It is not shown in the lay out.But it is kept at a place near by where the air enters in to the boiler. The purpose of the air preheater is to recover the heat from the flue gas from the boiler to improve boiler efficiency by burning warm air which increases combustion efficiency, and reducing useful heat lost from the flue.As a consequence, the gases are also sent to the chimney or stack at a lower  temperature, allowing simplified design of the ducting and stack. It also allows control over the temperature of gases leaving the stack (to meet emissions regulations, for example).After extracting heat flue gases are passed to elctrostatic precipitator. Electrostatic precipitator : It is a device which removes dust or other finely divided particles from flue gases by charging the particles inductively with an electric field, then attracting them to highly charged collector plates. Also known as precipitator. The process depends on two steps.In the first step the suspension passes through an electric discharge (corona discharge) area where ionization of the gas occurs. The ions produced collide with the suspended particles and confer on them an electric charge. The charged particles drift t oward an electrode of opposite sign and are deposited on the electrode where their electric charge is neutralized. The phenomenon would be more correctly designated as electrodeposition from the gas phase. The use of electrostatic precipitators has become common in numerous industrial applications.Among the advantages of the electrostatic precipitator are its ability to handle large volumes of gas, at elevated temperatures if necessary, with a reasonably small pressure drop, and the removal of particles in the micrometer range. Some of the usual applications are: (1) removal of dirt from flue gases in steam plants; (2) cleaning of air to remove fungi and bacteria in establishments producing antibiotics and other drugs, and in operating rooms; (3) cleaning of air in ventilation and air conditioning systems; (4) removal of oil mists in machine shops and acid mists in chemical process plants; (5) cleaning of blast furnace gases; (6) recovery of valuable materials such as oxides of copp er, lead, and tin; and (7) separation of rutile from zirconium sand. Smoke stack :A chimney is a system for venting hot flue gasesor smoke from a boiler, stove, furnace or fireplace to the outsideatmosphere.They are typically almost vertical to ensure that the hot gases flow smoothly, drawing air into the combustion through the chimney effect (also known as the stack effect). The space inside a chimney is called a flue. Chimneys may be found in buildings, steam locomotives and ships. In the US, the termsmokestack (colloquially, stack) is also used when referring to locomotive chimneys. The term funnel is generally used for ship chimneys and sometimes used to refer to locomotive chimneys.Chimneys are tall to increase their draw of air for combustion and  to disperse pollutants in the flue gases over a greater area so as to reduce the pollutant concentrations in compliance with regulatory or other limits. Generator : An alternator is an electromechanical device that converts mechani cal energy to alternating current electrical energy. Most alternators use a rotating magnetic field. Different geometries – such as a linear alternator for use with stirling engines – are also occasionally used. In principle, any AC generator can be called an alternator, but usually the word refers to small rotating machines driven by automotive and other internal combustion engines.Transformers :It is a device that transfers electric energy from one alternating-current circuit to one or more other circuits, either increasing (stepping up) or reducing (stepping down) the voltage. Uses for transformers include reducing the line voltage to operate low-voltage devices (doorbells or toy electric trains) and raising the voltage from electric generators so that electric power can be transmitted over long distances. Transformers act through electromagnetic induction; current in the primary coil induces current in the secondary coil. The secondary voltage is calculated by mult iplying the primary voltage by the ratio of the number of turns in the secondary coil to that in the primary. To see the complete operation of the plant in flash player Click here

Saturday, September 28, 2019

Immigration and employment in Ontario Essay Example | Topics and Well Written Essays - 1000 words

Immigration and employment in Ontario - Essay Example series of relevant legislative texts has been developed in any modern state which provides the requirements needed for the relevant procedure to be completed. These requirements are usually common among all countries around the world with only certain points of differentiation. It has been noticed that in countries with a high rate of development the relevant requirements tend to be stricter comparing the ones applied in the less developed countries. However, this assumption is not absolute and there are cases where the above requirements are equally formulated in both developed and developing countries. This paper examines the current conditions regarding the immigration policy applied in Canada and specifically the area of Ontario (with a special reference to the city of Toronto). The specific area has been a place that attracted a significant number of immigrants mostly in the past. Today also it seems that the rate of growth in the immigrants entering the country and the specific area continues to increase. This phenomenon although positive in certain aspects for the local economy it has been proved to have certain negative influences particularly in the financial area. The role of immigrants and their interaction with the local society is being examined in order for specific points of common to be found and for certain policies to be examined as of their suitability regarding their reason of existence. The presentation of statistical data combined with the findings of the literature has been considered as an effective method of exploring the above problem to the best possible level. Immigration in Canada has a long history. In fact, it has been found (Coyne, 1996) that in the 128 years since confederation, some 14 million immigrants came to Canada, almost a third before the First World War as Canadian immigration policy was essentially an open door. In this context, between 1867 and 1899, Canada absorbed 1.6 million immigrants into a population at

Friday, September 27, 2019

Describe major aspects of British colonialism in India and its Essay

Describe major aspects of British colonialism in India and its influence on the Indian population - Essay Example New inventions of the 18th century gave rise to a new production process in the Great Britain – called factory production. It was the beginning of Industrial Revolution in Europe. Industrial revolution (â€Å"The origins of Industrial Revolution in England†) created a need for new markets for sales of the finished product and search for raw material. British quest for a new market was the primary reason for colonizing India. In 1600, a trading company, by the name East India Company (â€Å"South Asian History – Colonial India†) was formed in London with the blessing of Queen Elizabeth I. East India Company’s main activity was trading with India. East India Company made twelve voyages (â€Å"South Asian History – Colonial India†) to India in the year of 1601 – 1613. By that time, other traders from Europe, Dutch, French, Portuguese, were also present in India. Until 1614, the Company was struggling to get the right to trade in In dia along with other European countries. In 1614 (â€Å"Indian History†) British envoy secured approval for trading from the Moghul Emperor Jahangir. Unlike traders from other countries, East India Company was able to penetrate (â€Å"Indian History†) deep inside the India. East India Company set up factories (â€Å"Indian History†) in different cities of India including in Bengal. English settlement rose in Bengal. Later East India Company made Calcutta in Bengal its trading center. During the year 1740 and later, hostility between England and France was on pick. British government heavily backed arming of East India Company. The Company fought several battles with France in those years to establish dominance over Hydrabad and Carnatic regions of India. By mid 18th century, the Company had his own army consisting of British and local people. East India Company fought the first battle in 1757 against the Ruler of Bengal (â€Å"Indian History†) and won the battle. This was the beginning of fall of India under

Thursday, September 26, 2019

Social Inclusion (SWFS5004) Foundation Degree Assignment

Social Inclusion (SWFS5004) Foundation Degree - Assignment Example More recent scholarly studies reveal that social exclusion is multi-faceted in character. Levitas (1998) thus sees it as a multidimensional concept, dependent on the position of a person or a group of persons in the society. He further notes that every form of societal marginalization can cause social exclusion. Social exclusion is conceptualized via various social processes and aspects of daily life such as economical, cultural, disability, political and organizational just to name a few. In the views of Levitas (1998), social exclusion is the product of an intricate process and definitely not as a result of economical disadvantage alone. Hence, the concept of social exclusion should be thought in the framework of a social organization in which four subsystems namely politics, economics, social/community and family systems are at play (Phillipson et al, 2003). Even though social exclusion is seen as multi-facial, it nevertheless still poses constant problems. Cushing (2003) further observes that the concept of social exclusion is not only multi-faceted in the sense that it is controlled by various social processes, but the idea is also relational. ... Phillipson et al (2003) also observe that exclusion and inclusion form a dynamic phenomenon. This is because within a given society, an individual can be socially excluded or included over a given period of time. For this reason, it is not wise to give all inclusive definition of social exclusion but to employ an approach that identifies deprivation factors (Pierson, 2001). A good example is deprivation of employment. In this approach, social inclusion originates from synergies between various players in local government and services as well as social partners via participation, associations and networking (Silver, 1994). Levitas (1998) observes that exclusion depends on system failures only. Within this viewpoint, social exclusion is viewed on the basis of the hetero-designation of particular groups which are termed as the excluded. Other studies neglect the human potential to build inclusion within one or several everyday spheres according to Massey & Jess (1995). A number of conce rns have been raised regarding self-designation processes, the effects of identity on inclusion as well as exclusion boundaries which may mediate in the said identities. Hence, social exclusion may depend on the role of a person who is socially excluded when he or she can offer nothing to the society in exchange for what society can give back (Phillipson et al, 2003). Moreover, individuals, groups of people and societies can lock themselves off, creating ever higher boundaries by asserting their norms in a strict and rigid style which may, as a result exclude others who do not agree with them or who are not recognized by them (Castles, 2000). There are a number of cases in which religious, political and ethnic causes have resulted

Homeland Security for the Port of Baltimore Essay

Homeland Security for the Port of Baltimore - Essay Example With so much at stake, it is no doubt crucial to consider all possible threats a place like Port Baltimore may be vulnerable to and be prepared with measures to ensure the safety of the city, the people involved, the property and the security of the whole country. Ports are crucial for both, the security of a country and its trade and economy, as they serve as terminals with access across its boundaries. This opens possibilities for infiltration of illegal activities and products along with the usual trade. Thus ports pose a great threat of certain hazards or sources of possible disaster to the city and the country if left improvised. Of the many threats that enable U.S agencies to take effective measures for the protection of the country’s resources and vulnerable assets, the threat of terrorism has the greatest power, especially in the post 9/11 era. The possibilities of terrorist attacks via shipping ports are innumerable. With only six percent of the nine million container s entering the U.S, (Medalia 2) and fourteen percent of the 140,000 containers at Baltimore being examined for explosives, (Davis and GormanSun), it is evident that these portals to the United States are pretty much available to terrorists wanting to strike. It would be fairly easy to hide explosives in the eight to nine feet high and twenty to forty feet long containers that are used to carry the cargo transported between ports. (Medalia 2) Apart from being easy and susceptible targets, they are also fairly attractive in terms of results for such terrorist groups as well. With inflammable material that can cause a minor explosion to spread over miles, even a ten to twenty kiloton bomb could cause a loss of more than $1.2 trillion from direct and indirect costs resulting from the damage of property and disruption of trade activity. (Medalia 2). The destruction could extend to a radius of one or two miles, thus affecting the city the port is in, resulting in a comprehensive disaster. (Medalia 3). Another equally hazardous threat to the U.S port is Drug smuggling, which was the number one priority before September 11, 2001. The failure in the prohibition of drugs infiltrating the country may result in indirect facilitation of terrorist activities and a larger impact on the society by fuelling crime and disease. (Loy 156). According to statistics provided by Interagency Assessment of Cocaine Movement, most of the transportation of illegal drugs is carried out through the sea. (Loy 157) The third effective threat to U.S coasts and ports is the possibility of damage and injury caused by the mishandling of hazardous materials that have the ability to contaminate and destroy not only cargo and property, but marine life and the environment. All this can inadvertently affect the economy by interference in trade and recreation activities around the water front as well as health of the citizens of the port city. Provided that the forces threatening the security of port t oday are much better equipped than they were a decade ago, it is necessary to maintain the efficiency of security systems in the context of developing technology and update methodologies to keep up with the unpredictable and surreptitious approach of the possible enemies of the state. (Pike) Coast guard and customs and Border protection are federal agencies with the strongest presence in seaports. After 9/11 coast guard has created the largest port

Wednesday, September 25, 2019

Behavior and manners Essay Example | Topics and Well Written Essays - 750 words

Behavior and manners - Essay Example These events leave a strong impression upon one’s mind, which cannot be forgotten easily. Although I have proven to be a very good boy throughout my life, yet there is a regretful experience when I punched a person who was misbehaving with me. I ended up at police station. This experience is important for me as I learnt a very good lesson which benefitted me many a times after that. I was driving with my dad to the beach on a hot summer day when our car got stuck in traffic. It was a holiday and, thus, most of the people were out. Our car was at a signal. On green light, the driver in front of our car did not move. My dad has always been against rudeness but, still, he kept his nerves. We got out of the car, and went to the driver. I saw that he was trying to grab his cell phone from the back seat that his kid had thrown there. â€Å"Excuse me! The signal is green from ages. Will you mind moving? The whole traffic is waiting for you to move on, and you seem like not caring at all,† I asked him. â€Å"Yes, I will mind moving until I grab my phone. You’d better stay back,† he replied with much arrogance. â€Å"How rude that is!† I exclaimed, â€Å"Don’t you know you are bugging others in the line?† ... Move your car right now. I’m getting late.† Everyone was giving horns and shouting at us to move. I could see all other drivers staring at us. The man had found his phone by then. He grabbed the phone while still shouting at his kids. He gave us a wave with his hand with a look as if trying to tell us to shut up. I heard him say, â€Å"Piss off, you son-of-a-bitch!† â€Å"What did you just say?† I was infuriated like hell. â€Å"You would know if you were travelling with little kids in the car, you rascal!† shouted the man while trying to concentrate upon his keys. That enraged me even more. My dad held my arm and told me not to indulge in quarrel. But I would not get convinced after the man called me names. When he turned his ignition on, I jumped at him, and punched him hard on his face. He came out of the car fuming with anger; but till then, a couple of passengers had come between us. Two policemen arrived at the scene. I was not expecting such a big scene. All that happened within fifteen minutes. However, I landed at the police station, where my dad tried to argue with the policemen. Eventually, I was fined. The worst thing is that I had disappointed my dad very much. I regretted behaving so uncivil to hit a man. I knew that mom was going to be furious at me. When I came home, mom got angry when she came to know. Both dad and mom had a hard talk with me, and dad said that he would not let me drive a car ever again if I continued to be that uncivil. He had forgotten how that driver had behaved with me, but he remembered my incivility. That was the moment I got familiar with regret. I had never regretted anything in my life. It was the first instance that invoked regret in me. But, here’s the good part. I

Tuesday, September 24, 2019

Managing Human Error in Aviation Article Example | Topics and Well Written Essays - 500 words

Managing Human Error in Aviation - Article Example A co-pilot who always cedes to the judgment of the pilot hurts the team because no redundancy checks exist. The author attempts to review these errors which lead to disasters and create solutions to the problems. The article cites the 1978 United Airlines crash where the pilot focused on the landing gear warning light and not the low fuel indicator. Although the co-pilot warned of the fuel problem, he was not emphatic enough. The jet crashed, not because of a faulty warning light, but because the two pilots failed to act as an effective team. As a team, they stayed focused on the imagined landing gear problem. The second citation is the 1982 Air Florida crash in Washington, DC. Again, the copilot was uncomfortable with the aircraft’s performance, in this case, airspeed indicators; but again, the co-pilot failed to adequately state his concern. The jetliner crashed into the Potomac River. This crash pointed to the importance of collaboration rather than a chain of command.   One suggested a technological solution is smart computers. When these devices were tried in the flight simulators, oftentimes the pilot would concentrate on programming the computer rather than fly the aircraft in crowded airspace. The better solution was to turn off the computer and fly â€Å"stick and rudder† so the attention was on the airspace and other traffic. Crew Resource Management (CRM) resolves these issues to some extent. CRM dissects the cultural, societal and company, psychological and social human factors in communications and decision making. A more collaborative management ensues from this training. All crew members can speak out on safety issues. One study showed an Asian based airline’s pilots considered the chain of command to take precedence over safety. The net result is training teams, rather than leaders and followers.

Sunday, September 22, 2019

Free Public Transportation Essay Example | Topics and Well Written Essays - 500 words

Free Public Transportation - Essay Example As a preliminary matter, the public is turning to public transportation as an alternative to private transportation. As noted by the American Public Transportation Organization, "Steady increases in transit investment have dramatically improved and expanded public transportation services, attracting record numbers of riders on state-of-the-art systems in metropolitan, small urban and rural areas alike" (2008: n.p.). These are fee-based public transportation systems, but the data demonstrates that extraordinarily large numbers of the public are choosing public transportation and that this trend applies equally in both heavily and less populated areas. The demand, in short, is both strong and demographically diverse. In addition, the data has linked a number of benefits to public transportation. For instance, there has been "improved mobility, safety, security, economic opportunity and environmental quality" where public transportation systems have been implemented (The Benefits of Public Transportation, 2008: n.p.). These benefits do not apply only to a narrow segment of the population; quite the contrary, they benefit individual workers, families, businesses, governmental units, and even national goals such as energy conservation and the health and security of citizens.

Saturday, September 21, 2019

The life of Garibaldi Essay Example for Free

The life of Garibaldi Essay Get the clamp ready and place the tile on the clamp, then place the conical flask on the tile. Rinse your burette with your diluted HCl to replace any previous liquids which may intervene in the results. Now secure the burette to the clamp making sure the nozzle is facing in the conical flask. You should now have your apparatus set-up like this: 30/5230/35230/image006. gif Funnel Burette filled with diluted HCl Conical Flask Clamp Tile Ca(OH) and Indicator i Now everything should be ready. From your volumetric flask, empty out the diluted HCl into a normal beaker. Using this beaker fill the burette up to the 0 mark with a funnel. i Start titrating slowly until the solution has totally reacted. Then record the results noting how much HCl you used. Record the results in a suitable format and repeat the experiment at least three more time for more accuracy. Finally record the average (mean) titre. i SAFTEY: this is extremely important as you are handling hydrochloric acid. Goggles must be worn at all times, hair must be tied back and bags must remain under the desk. If anything goes wrong, consult the teacher immediately. Always remember to work safely as HCl can be hazardous to your skin, the indicator may stain your clothing as well. (Accuracy): The pipette, burette and volumetric flask only have a percentage error of + or 0. 1%. This is a small error. That is why they are used in this experiment. Be sure to take precautions such as making sure that when you pour in the HCl or Ca(OH) you do not let it run down the sides because some will be left on the sides thus making an inaccuracy. As you can see above, the bold says10. 0cm3 of your Ca(OH), when instead it should have been 25. 0cm3. The reason for this is because there was not enough of the Ca(OH) to perform all the experiments. This is a limitation due to the fact that 25. 0cm3 would have been a more accurate measure because 10. 0cm3 may not be enough for a clear result. AnalysisJ Rough Accurate 1 Accurate 2 Accurate 3 Final burette reading cm3 37. 3 37. 2 37. 1 37. 3 Initial burette reading cm3 0 0 0 0 Volume used cm3 37. 3 37. 2 37. 1 37. 3 Mean titre cm3 37. 3 37. 2 37. 1 37. 3 This is the final part to the investigation. In this part of the investigation I aim to determine the final concentration of the limewater solution. I will go through my calculation step by step and explain what I am doing along the way. Starting off, lets look at what we have. The equation for the reaction is: 30/5230/35230/image001. gif Ca(OH)2(aq) + 2HCl(aq) CaCl(aq) + 2H2O(L). For the Ca(OH) we are trying to find the concentration in mol g dm-3. However we have the volume (10. 0cm3 is how much we er solution. This would change the colour of the solution to light orange which would change to pink by the end of the titration. 5. After that I will place the flask onto a white tile placed on a clamp stand. Then I will open the tap of the burette that is held in the clamp stand and let the acid neutralise the alkali. 6. By the end of titration the limewater solution turns pink which indicates that it has been neutralised. 7. I will repeat the experiment at least thrice to make it a fair test. Repeating the experiment will also ensure that the results that I get are accurate. The reaction that takes place can be described with the help of this balanced equation: Ca (OH)2 + 2HCl i CaCl2 + 2H2O In order to get reliable results from the exper at the end point would be reached before the equivalence. Variable Control You need t ensure that you take your chemicals from the same batch so as not to get two different concentrations each time you test them. Temperature and pressure should have no effect on the reaction Organisation Set up the equipment as shown in the diagram below, ensuring that the burette valve is closed. Run de-ionised water through the burette and wash all of the equipment with it First of all dilute the hydrochloric acid using by adding slowly 25ml of 2.00moldm-3 HCl to 475ml of de-ionised water in the 500ml beaker. Then, using a pipette, put 100ml of the HCl solution into the burette Put 50ml of limewater into a conical flask using the pipette then add 5 drops of methyl orange to the solution, this should turn the solution a pale orange Open the .. . molarity 1dm3 = 10x10x10cm3 = 1000cm3 1(Molarmass) = 8. 12gdm3 Evaluation My practical experiment went quite well and I got a variety of results, which were suitable for the task given. My results show that I got two identical results and one just 1. 1cm3 off. Which suggests that I have been accurate and precise during the experiment. By being accurate it came about by specific apparatus I used, which restricted errors. However during the experiment I came across an array o

Friday, September 20, 2019

Is Use Of Language Restricted To Humans English Language Essay

Is Use Of Language Restricted To Humans English Language Essay Chomsky (1968) claimed that language in specific to humans as only humans possess a language acquisition device to acquire language the universal grammar. It is a hard matter to define what language really is. According to the layman definition by Cambridge University Press (2008), language is a system of communication that consists of sounds, words and grammar. In the past literature, there have been claims that non-human primates like chimpanzees and bonobos are capable of comprehending human language (Benson et al., 2002; Brakke and Savagerumbaugh, 1995). However it is doubtful whether comprehension constitutes a comprehensive use of language. In this essay, we would discuss whether non-human animals are capable of commanding the comprehensive use of language by critically evaluating whether they show some of the design-features of human spoken language in their speech documented in Hockett (1960) and whether they are able to acquire syntax and morphology (Laidrem, 2008). The first design-feature is the vocal-auditory channel, where communication occurs whenever the producer speaks and the receiver hears (Harley, 2001). There are communication systems using other channels, for instance gestures, bee dancing (De Marco, Gurevitz and Menzel, 2008) or the courtship ritual of sticklebacks. Having a vocal-auditory channel enables primates to free up much of their bodies to carry out activities other than communicating language simultaneously. Primate calls and the singing of a western meadowlark possess this design-feature. The second one is arbitrariness, where abstract symbols do not necessarily resemble what they stand for, for instance salt may neither mean salty nor granular (Hockett, 1960; Harley, 2001), except a few onomatopoeic exceptions. It has a shortcoming of being arbitrary, but advantageous in the way that what can be communicated about is limitless. In a semantic communicative system, ties between meaningful message-elements and their meanings can either be arbitrary or non-arbitrary (e.g. salt would mean salt instead of sugar or pepper) there are relatively fixed associations between elements in messages, like words, and recurrent features of our world. The western meadowlark song holds semantic arbitrariness whereas gibbon calls hold a general arbitrariness design-feature. The third one is discreteness, where vocabulary comprises of discrete units and contrasts with the use of sound effects by the vocal gestural way (Harley, 2001). Human vocal organs produce an array of sounds, but in all languages only a relatively small set of ranges of sound is sound, and differences between these ranges are functionally absolute, e.g. pin and bin are different to the ear only at one point. The hearer can either compensate based on context, or fails to understand. However, in some systems there may be effectively continuous scale of degrees to which one may raise his voice as in anger or lower it to signal confidentiality bee-dancing is continuous rather than discrete. Grylliade (e.g. crickets) and tettigoniidae (e.g. bush-crickets) and primate calls carry discreteness. There are a dozen or so distinct gibbon calls, each appropriate vocal response, or vocal part of the whole response, to a recurrent and biologically important type of situation, for instance discove ry of food, detection of predator, etc. The fourth one displacement design-feature is very evident in humans, where we are able to talk about things remote spatially and temporally from where the conversation begins. It seems lacking in vocal signaling of primates, however it does occur in bee-dancing bee dances convey information about how far the food source is (De Marco, Gurevitz and Menzel, 2008). A parrot is unable to demonstrate displacement (Pepperberg, 1987). Monkeys are also limited to chattering and squeaking about immediate threats like snakes in the grass and eagles overhead (Muncer, Malone and Ettlinger, 1982), therefore they also fail the displacement criterion. Concerning traditional transmission design-feature, it refers to the fact language can be taught and learned. In humans, imitation and teaching occur together smoothly. A chimpanzee mother could not teach her infant anything because, although the infant watches her problem-solving skills intentionally, she never returns the infants observation. Similarly, if a vervet monkey gives a leopard call and its recipient, say its offspring, takes countermeasures for python, there is no evidence that monkeys correct errant listeners or that their communication is intentional (Premark, 2004). It was noted that Washoe, another chimpanzee, adopted a younger chimpanzee Loulis as his son. He spontaneously acquired signs from Washoe and was also seen to be taught by Washoe. Although this is a clear indication of what is known as cultural transmission, it is unclear whether it is a language that has been transmitted, or just a sophisticated communication system (Premark, 2004). At first sight Washoe appears to have acquired the use of words and their meanings, and at least some rudimentary syntax-that is, being sensitive to word order in both production and comprehension. However, Washoe did not show learning of functional words like prepositions and inflections, neither was he able to differentiate between different parts of speech like conjunctions, nouns and verbs. Productivity is one of the most important design-features of human spoken language, which refers to the capacity to say things that have never been said or heard before and yet to be understood by other speakers of the same language (Hockett, 1960). One would be able to coin new utterances by incorporating pieces familiar from old utterances and assembling them by patterns of arrangement also familiar in old utterances. In human speech where blending exists, a speaker would hesitate between two words or phrases, both reasonably appropriate to context, a combination of parts of each. It is also involved in slips of tongue which would assist infants in switching from a closed to an open system productivity also known as openness, the ability to invent new messages, where syntax, the grammatical arrangement of sentences, plays an enormous rule (Shostak, 2009). It can be demonstrated using syntax, where in humans, there is a finite number of grammatical rules and a finite number of word s, but humans are able to combine them to produce an infinite number of sentences once they associate the words with particular meanings or concepts, and put them into different orders (Chomsky, 1957; Marshall, 1970). Primate calls constitute a small finite repertory of familiar calls, therefore they are considered having a closed call system and do not demonstrate productivity. According to Hockett (1960), bee dancing shows productivity. However, this is questionable as types of dancing bees do may barely be repertoires. There is a belief that whales and dolphins possess language. However, there is no current evidence suggesting that dolphins employ sequences of sub-units conveying particular messages, which is in the same way we combine words to form sentences to convey messages (Pearce, 2008). In early research by Evans and Bastian (1969), dolphins carried on making sounds even when other dolphins were absent, where communication with each other in carrying out cooperative tasks to obtain fish seems to be explicable by conditioning (Holder, Herman and Kuczaj, 1989). There is no evidence that dolphins can produce even the simplest sentence in language (Pearce, 2008). By now, there is no animal communication system that can satisfy the four properties of syntax identified by Kako (1999) and iteration and recursion properties of language (Hauser et al., 2002). Herman, Richards, and Wolz (1984) taught two bottle-nosed dolphins, Phoenix and Akeakamai, artificial languages. One artificial language was visually based using gestures of the trainers arms and legs, and the other was acoustically based using computer-generated sounds transmitted through underwater speakers. However, this research tested only the animals comprehension of the artificial language, not their ability to produce it. From the point of view of answering our questions on language and animals, it is clearly important to examine both comprehension and production. Even just testing their comprehension, the dolphins syntactic ability was limited, and they showed no evidence of being able to use function words (Kako, 1999). Although others have claimed that chimpanzees could comprehend spoken English, they have failed to present adequate data to substantiate such assertions (Pearce, 2008). In repeated tests since 1977, Sherman and Austin, two chimpanzees, consistently failed comprehension tests of spoken English though they have constantly been exposed to it from infancy. Kanzi, however, was displaying a remarkable comprehension of spoken English, where Kanzi was not being reinforced nor trained to do the experimental task (E. Sue Savage-Rumbaugh, et al., 1985). Kanzi is a pygmy chimpanzee, and it is claimed he has made a vital step in spontaneously acquiring the understanding that symbols refer to things in the world. He first acquired symbols by observing the training of his mother on lexigrams devices that produce word sounds when pressed. He was sensitive to word order, and understood verb meanings- he could distinguish between get the rock and take the rock, and between put the hat on your ball and put the ball on your hat. He also formed spontaneous utterances. Petitto (1987, cited in Pearce, 2008) argued that Kanzis understanding of names is not like that of humans. Kako (1999) argued that Kanzi shows no signs of possessing any function words, nor any indication of being able to use morphology: he does not modify his language according to number, as we do when we form plurals. Pepperberg (1987) embarked on an elaborate formal programme of training of her African grey parrot called Alex. After 13 years of training, Alex developed a vocabulary of 80 words including object names, adjectives, and verbs. He could even produce and understand short sequences of words understand concepts of same and different. Alex showed evidence of being able to combine discrete categories and use syntactic categories appropriately, but was unable to relate objects to verbs, and knew very few function words (Kako, 1999). Therefore, Alex had limited linguistic abilities. The last design-feature to be mentioned, the duality of patterning, means that only combinations of meaningless units are meaningful, and this is applicable to both the sound and word level, and word and sentence level (Hockett, 1960). It provides much efficiency and flexibility to human language. When a vocal-auditory system carries a larger and larger number of distinct meaningful elements, they become more similar to one another in sound, where there is a limit for any species to how many distinct stimuli they are capable of distinguishing between, in particular they have to be made under noisy conditions. This design-feature is illustrated by English words tack, cat and act, which are composed of only three basic meaningless sounds in different permutations, yet totally distinct in meaning. Very few animal communicative systems share this design-feature of language none among other hominoids (e.g. apes, monkeys), or maybe humans are the only one (Harley, 2001). To conclude, none of the animals mentioned seemed to be capable of possessing the above mentioned design-features of human spoken language (Hockett, 1960). They were also unable to command the complicated syntax and lexical competences that humans possess. This may be due to humans having large and convoluted brains acting as better storage units for conventions of a complex communicative system as language (Pinker, 1994). Though many animals possess rich symbolic communication systems enabling them to convey messages to other members of the species which would influence behaviour and possess many of Hocketts (1960) design features, they all lack the richness of human language, which is manifested in our ability to limitlessly talk about anything and using syntax. The failure to teach apes to speak is partly due to the fact that their vocal tracts are incapable of producing all sounds of human speech, where according to Duchin (1990, cited in Pearce, 2008), a major constraint on the ability of the chimp to produce sounds of human speech is its tongue which is unable to move to correct positions for creating sounds that are necessary. It is possible that by reducing methodological flaws in language learning paradigms and more investigations of different animals, we would be more informed about whether animals are able to use language comprehensively in the humans do.

Thursday, September 19, 2019

The Dual Nature of Power Essay -- power, abuse, wars, crimes, properly

â€Å"With great power comes great responsibility.† This phrase correctly assesses that the more power a being has, the greater capacity they have for both good and evil; for the creation of beautiful things or the destruction of that which is lovely. The possession of power does not necessarily mean that the power will be used honorably. In the timeless Lord of the Rings saga, the two wizards, Saruman and Gandalf, were both imbued with great power. Their reaction to the power, however, was very different. On one hand, Gandalf had a healthy respect for the seductive properties of power and managed to resist using and abusing it for his own ends. Conversely, Saruman gave in and attempted to set himself as a dominant ruler; ultimately failing and creating a colossal amount of ruin in the process. They were both given power, one used it properly and achieved many great feats; the other abused the power and lost everything. This concept applies to the human race as well. Some look at the horrors committed by human being in the past and conclude that we have degenerated far below the common animal. Others point to the great achievements off science and art, along with the selfless aid granted to the helpless, from American ghettos to war-torn countries, and insist that we are progressing toward a perfect utopia. What they both fail to see is that this power can be used to accomplish wonderful deeds or destroy all that truly matters. The dark use of this power can be seen in all the wars, the crime, and the corruption that has plagued mankind since before recorded history. It can be seen in every Stalin, Capone, and Attila the Hun in history, who have not let the concept of morality to stand between them and supremacy. One parti... ...ar, facing disease and hardship or when a soldier throws himself on a grenade to save his comrades. The bad is evident in families torn apart by drug abuse and also in every shop clerk shot and killed during a holdup. This war’s outcome really depends on the individual and the choices they make; every decision will take them down one path or the other, often having greater consequences than they could ever imagine. The people who claim that humans have become less than animals, along with the optimists looking forward to a utopia, both fail to see the whole picture; they need to recognize the dual nature of the power humans in order to reach an accurate conclusion. When they only focus on one extreme, they gain a false worldview that will taint all of their assumptions. Power can be used for evil or good; the choice lies in the individual possessing it.

Wednesday, September 18, 2019

Redemption in A Christmas Carol by Charles Dickens Essay -- Christmas

Redemption in A Christmas Carol by Charles Dickens Introduction Charles Dickens wrote A Christmas carol reflecting on the society that he live in the Victoria Era. During the reign of Queen Victoria Britain became one of the most Industrialised countries in European. From Britain Factories, mills, shipyards came products ranging from steam locomotives, to textiles and ship, while coal miners toiled deep below the ground to produce the coal needed to power Britain expanding Industries. During Victorian times there was a serious gap between the rich and poor. Rich people were very wealthy and poor people were living outside on the payments in very poor weathering conditions, also poor people were in poverty. Soon industrialisation began factories started to open, and poor people began to work in factories. Many peasants were paid minimum wages. So many peasants were suffering hardship for example living condition. Living condition during the Victorian Era were very poor they used to work for a long working hour and not get any break or time off at any Time. And Long working hour made poor workers very tired. They would get straight to work as soon as they enter in. Later child labour began. Many children started working in factories. Most of the children were mainly boys rather then grails. Child labour in Victorian England was described as the children chained belted harnessed like dog, and also half naked. Diseases were caught quite a lot during the Victorian times by children who were working in factories and other sorts of places. Charles dickens decided to call his story a song because Christmas was associated with celebrating and singing carols. Everything that’s he wanted to bring ... ... everyone he meets. He visits Fred's house and has a wonderful time at the party. The next morning, Scrooge gets to work early. When Cratchit comes in late, Scrooge pretends to reprimand him, then gives him a raise. Scrooge continues his kindly ways, befriending everyone and becoming a second father to Tiny Tim, who does not die. He never sees the ghosts again, but he keeps the spirit of Christmas alive in his heart as well as anyone. The Conclusion is that scrooge is a miserable miser who cares nothing for other and does not known how to keep Christmas. Consider the matter more carefully, these fire well fed business men certainly know how models of conspicuous consumption. Their charity would reach a handful of people who got out of it a good meal for a day and nothing would alleviate the sources of their poverty and misery for the rest of the years.

Tuesday, September 17, 2019

Cats are Better Pets than Dogs :: Cat Feline Pet

"A dog is man's best friend." That common saying may contain some truth, but dogs are not the only animal friend whose companionship people enjoy. For many people, a cat is their best friend. Despite what dog lovers may believe, cats make excellent housepets. In the first place, people enjoy the companionship of cats. Many cats are affectionate. They will snuggle up and ask to be petted, or scratched under the chin. Who can resist a purring cat? If they're not feeling affectionate, cats are generally quite playful. They love to chase balls and feathers, or just about anything dangling from a string. They especially enjoy playing when their owners are participating in the game. Contrary to popular opinion, cats can be trained. Using rewards and punishments, just like with a dog, a cat can be trained to avoid unwanted behavior or perform tricks. Cats will even fetch! In the second place, cats are civilized members of the household. Unlike dogs, cats do not bark or make other loud noises. Most cats don't even meow very often. They generally lead a quiet existence. Cats also don't often have "accidents." Mother cats train their kittens to use the litter box, and most cats will use it without fail from that time on. Even stray cats usually understand the concept when shown the box and will use it regularly. Cats do have claws, and owners must make provision for this. A tall scratching post in a favorite cat area of the house will often keep the cat content to leave the furniture alone. As a last resort, of course, cats can be declawed. Lastly, one of the most attractive features of cats as housepets is their ease of care. Cats do not have to be walked. They get plenty of exercise in the house as they play, and they do their business in the litter box. Cleaning a litter box is a quick, painless procedure. Cats also take care of their own grooming. Bathing a cat is almost never necessary because under ordinary circumstances cats clean themselves. Cats are more particular about personal cleanliness than people are. In addition, cats can be left home alone for a few hours without fear. Cats are Better Pets than Dogs :: Cat Feline Pet "A dog is man's best friend." That common saying may contain some truth, but dogs are not the only animal friend whose companionship people enjoy. For many people, a cat is their best friend. Despite what dog lovers may believe, cats make excellent housepets. In the first place, people enjoy the companionship of cats. Many cats are affectionate. They will snuggle up and ask to be petted, or scratched under the chin. Who can resist a purring cat? If they're not feeling affectionate, cats are generally quite playful. They love to chase balls and feathers, or just about anything dangling from a string. They especially enjoy playing when their owners are participating in the game. Contrary to popular opinion, cats can be trained. Using rewards and punishments, just like with a dog, a cat can be trained to avoid unwanted behavior or perform tricks. Cats will even fetch! In the second place, cats are civilized members of the household. Unlike dogs, cats do not bark or make other loud noises. Most cats don't even meow very often. They generally lead a quiet existence. Cats also don't often have "accidents." Mother cats train their kittens to use the litter box, and most cats will use it without fail from that time on. Even stray cats usually understand the concept when shown the box and will use it regularly. Cats do have claws, and owners must make provision for this. A tall scratching post in a favorite cat area of the house will often keep the cat content to leave the furniture alone. As a last resort, of course, cats can be declawed. Lastly, one of the most attractive features of cats as housepets is their ease of care. Cats do not have to be walked. They get plenty of exercise in the house as they play, and they do their business in the litter box. Cleaning a litter box is a quick, painless procedure. Cats also take care of their own grooming. Bathing a cat is almost never necessary because under ordinary circumstances cats clean themselves. Cats are more particular about personal cleanliness than people are. In addition, cats can be left home alone for a few hours without fear.

Portrait of the Poet as Landscape Essay

The basic attribute that cane extracted from the persona of the character is his dilemmas in life. The vivid description of the surrounding community does not really have any sympathy to what a particular individual is going through as long as life goes on for each of people in the background. The terms â€Å"death† and â€Å"alive† do not really have much of an importance since the reference character does not really involve him to the actual events happening in the surroundings. The persona seems to be disgusted with how the world works and that finding a sense in living is futile.   Ã‚  Ã‚  Ã‚   The effects of terms â€Å"moods† and â€Å"remember† suggest that the persona may not actually be an entity at all. He is just like a ghost of his own dilemma wherein what he can only do is to cherish the life he once had. All the character can see is how busy the world is and that nothing really matters whether someone is in agony. It is only possible to create an illusion of change among the social structure but being a ghost himself cannot actually impart change. Everything is perceived by the persona to be temporary and materialistic.   Ã‚  Ã‚  Ã‚   It is apparent that the poem presents the disgust of the persona towards artificial power over tangible things which are directly insinuated by the phrase â€Å"Fame: the adrenalin†. It tells that having a name can be a great tool not for a beneficial imagination but for a destructive illusion. This is the same as â€Å"defying gravity† which can almost imply absurdity.   Ã‚  Ã‚  Ã‚   In the end, the poem presents that once a person achieves a kind of satisfying illusion, there is no other way to go but to go down. Otherwise, he would just look into matters beyond his illusion which can only cause unending search for perfection. The term â€Å"sixth sense† provides this incapacity of a person to achieve greater worth more than illusionary and artificial goals as these provide comfort in life (Bloland). Bushed   Ã‚  Ã‚  Ã‚   The poem Bushed is particularly concerned over how a man perceives his surroundings in the presence of wild life influences. Although the literary article provides some sort of descriptions about the natural entities in the background, there is a difficult identification whether the perceptions were actually happening or just a figment of the man’s imagination.   Ã‚  Ã‚  Ã‚   It is also evident that contrasting benefits and disadvantages are provided for the main character. He can basically utilize the natural resources around him while at the same time being threatened by the dangers lurking in the setting. Clear examples of advantages can be identified with the terms and phrases â€Å"building a shack†, â€Å"roasting porcupine† and â€Å"wearing quills†.   Ã‚  Ã‚  Ã‚   The term â€Å"dawn† played an important part by presenting the fact that the character was first lured by the beauty and benefits of the surroundings. However, a sudden change of the time frame would suggest that what the character was actually deceived for unanticipated danger lurks around him. The effect of the moon in the darkening of the atmosphere, the mocking of the owls and the seemingly fading away branches of the cedars impose loneliness.   Ã‚  Ã‚  Ã‚   The line which designates the â€Å"resting of the wind in the mountains† provide a clear glimpse of the dangers which are about to come. The term â€Å"arrowhead† is the most significant identification of the notion of danger. Although there is a complete time frame before it arrives to the persona, it is actually going to happen. As with the flints are expected to come which practically represent the slow influence of the coming dilemma. Works Cited Bloland, Sue Erikson. â€Å"Give the Atlantic.† The Atlantic Online. 1999. The Atlantic. 24 Jan 2008 .

Monday, September 16, 2019

A Room of One’s Own Critical Analysis

Many intelligent and creative women can make great contributions to the society if they are given space and time. However, for many years women have been viewed as less intelligent, merely mothers, and objects of ownership.In A Room of One’s Own, a novel by Virginia Woolf, the author argues that Shakespeare’s sister is as talented as her brother and that she can make great contributions to her society.In chapter, six Woolf clearly demonstrates her opinion and attitude towards patriarchal society. She portrays her judgment through use of language, narrative, style and other viewpoints about man, their dominance and female subservience.She uses sarcasm and irony combined with a lot humor to emphasize her argument as she contradicts the general opinions of men. She reminds women that what they want depends on them and that they should leave exhortations to men. She however criticizes women for lack of motivation and spirit by referring to them as â€Å"disgraceful ignoran t.†Through this the extract, the author gives hope to others but she is also realistic about the society developing a culture of equality. She tells women that it is very important to be their selves than to be anything else, a statement which contradicts men’s belief that women are objects of ownership and are merely mothers.Woolf seeks revenge against the society which is patriarchal through the characters of Mr. John Davies and Professor X. For example, Professor X is not given a name or identity (Davis).The author sarcastically calls men â€Å"great minds†¦Ã¢â‚¬ ¦.are androgynous,† meaning that the part of the male’s mind should work together with women to create something that is original (Davis). She tells the writers that they should not think about their sex but should focus on the story that they are about to write.In conclusion, it is ironic that, in this book she does not talk about a matriarchal society but only talks about the society whe re women and men are equal.Works CitedDavis, C.   A Room of One's Own: Critical Response.   July 9 2010.  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.dadooda.com/index.cfm/fa/library.detail/Library_ID/8016  

Sunday, September 15, 2019

Psychological Therapies For Depression Essay

PIT was first developed by Robert Hobson (1985) as an attempt to move away from the traditional psychoanalytic approach of a one-sided relationship between therapist and client. It was originally called the ‘conversational model’ to emphasise the fact that the mutual task of therapist and client was to engage in a therapeutic ‘conversation’. In this ‘conversation’ problems are not only talked about as past events, but are also actively relived in the present and resolved within the therapeutic relationship. Hobson believed that the symptoms of depression arise from disturbances in the interpersonal relationships. These disturbances can only be explored and modified effectively from within another relationship – the therapeutic one. The quality of the relationship is therefore crucial. Components of PIT- Exploratory rationale- interpersonal difficulties in the individual’s life are identified, and the therapist tries to find a rationale for the individual that links their current symptoms with these difficulties. Shared Understanding- the therapist tries to understand what the individual is really experiencing or feeling. Focus on difficult feelings- the individual may express an emotion (i.e. anger) of which they are unaware, or may not display appropriate emotion. Gaining insight- the therapist points out patterns in different types of relationship Sequencing of Interventions- different aspects of the model must be used in a coherent manner. Change- the therapist acknowledges and encourages changes made during therapy. Effectiveness of PIT Paley et al (2008) have shown that as a treatment for depression, outcomes for PIT are at least equivalent to those achieved with CBT. However, they acknowledge that changes in significant life-events were not monitored during the study, therefore any observable clinical gains (or lack of them) could not be attributed solely to the therapeutic intervention. NHSÂ  psychotherapy patients were randomly allocated to receive 12 weeks PIT or to remain as a waiting list controls for that period. 54 patients entered the study, of which 33 completed. Significant improvement was observed in patients that completed the therapy, suggesting that even a brief treatment by inexperienced therapists can be effective in alleviating the symptoms of depression. The Cognitive Behavioural Therapy CBT emphasises the role of maladaptive thoughts and beliefs in the origins and maintenance of depression. When people think negatively about themselves and their lives, they become depressed. The aim of CBT is to identify and alter these maladaptive cognitions as well as any dysfunctional behaviour that might be contributing to depression. CBT is intended to be relatively brief (16-20 sessions) and is focused on current problems and current dysfunctional thinking Thought Catching- individuals are taught how to see the link between their thoughts and the way they feel. By challenging these dysfunctional thoughts, and replacing them with more constructive ones, clients are trying out new ways of behaving. Behavioural Activation- this is based on the common sense idea that being active leads to rewards that act as an antidote to depression Effectiveness of PIT Robinson et al (1990) meta-analysis found that CBT was superior to no-treatment control groups. However, when these control groups were subdivided into waiting lists and placebo groups, CBT was not significantly more effective than the placebo condition. CBT appears to be less suitable for people who have high levels of dysfunctional beliefs that are both rigid and resistant to change.- (Elkin et al 1985)

Saturday, September 14, 2019

Health Insurance Portability and Accountability Act (HIPAA)

There are people all over the United States who are required to share their personal information with physicians and other medical professionals. Fortunately the health care environment guarantees patient confidentiality for all of their sensitive and health-related information. There are several acts that the United States Department of Health and Human Services (HHS) have developed in order to ensure all patients are given the proper medical confidentially that they deserve. One specific act is the Health Insurance Portability and Accountability Act of 1996 (HIPAA).This act required HHS to develop regulations that would protect the privacy and security of certain health information. In the end two separate rules were published: Standards for Privacy of Individually Identifiable Health Information and The Security Standards for the Protection of Electronic Protected Health Information. HIPAA is an important aspect of health care especially-when it comes to the safety of all patients (Andrews, 2010). Due to the strict privacy and security acts of this program, the consequences are extremely severe.One of the more important rules of HIPAA is the privacy rule, which â€Å"establishes national standards to protect individuals’ medical records and other personal health information† (Summary of The HIPAA Privacy Rule 2003). This aspect also applies to several health plans, health care clearinghouses, and other health care providers that perform electronic health care transactions. Due to the privacy rule, without proper patient authorization there are serious limits and safeguards that prevent anyone from sharing a patient’s medical information.Another crucial part of this rule is the fact that patients have the legal right to review and examine their health records, as well the authority to request any corrections they see necessary to repair. This becomes important when a patient finds incorrect information on their file that any of the medica l staff failed to recognize such as birthdate or a blood type. Having a patient review their file is a common way that mistakes are corrected. In order to protect and enforce the privacy of patient medical records, there are several comprehensive programs that are required through clinical information systems.There are three main clinical systems that were created to protect a patient’s privacy of their medical records. The first system-called patient care systems-â€Å"stores information about a patient’s medical history, diagnoses, and treatment plans† (Glandon & Smaltz, 2008). The organizations that choose to provide this care are also responsible for making sure that each patient’s medical information is available only to those who are authorized to view it. Another clinical system is called Public health information systems.These systems are in charge of supporting disease prevention and surveillance programs. Protecting public health is not a simple task; it requires knowing how to properly add and store health-related information about each individual. Without this system, any sort of leakage of sensitive information could lead to discrimination in employment or insurance eligibility. The final clinical information system, which is referred to as the medical research information system, is responsible for studying patterns of certain diseases in specific populations by using patient records.This act of studying common patterns is a way to prevent the reoccurrence of any fatal diseases and protect the health of others. Due to the fact that most of a patients’ data is accessible to many investigators, it is important that information security measures are taken to provide the necessary privacy. In order to establish this aspect of HIPAA, it is important for health care companies to appoint the responsibilities of enforcing the guidelines of HIPAA to the proper unit of the health care department. Some companies rely on co mpliance or specific privacy offices to ensure these obligations (Glandon & Smaltz, 2008).The fear of having no privacy can lead to individuals avoiding treatments or clinical tests because they feel their medical records are not protected properly. This fear puts the health of others in danger and can lead to bigger and more dangerous issues in the future. The other important aspect of the Health Insurance Portability and Accountability Act is the security rule, which â€Å"focuses on administrative, technical and physical safeguards specifically as they relate to electronic protected health information† (Yale University, 2013).With such critical information being stored electronically the security rule is also responsible for protecting the system against any sort of failure, including external tragic events that could take place randomly such as a fire or a power outage. These crucial files are usually copied to a removable disk to ensure that all files will not be lost. T his type of information can be stored in computer hard drives, memory cards, any kind of removable digital memory media or all transmission media that can be used to exchange information such as the internet (HIPAA, 2013).Preventing unauthorized viewing of electronic protected health information (ePHI) can become difficult due to the variety of ways information is stored. Overall the major goal of the Security rule is allow the development of new technologies that will help to improve the quality of care as well as protect all the sensitive health information that is shared and documented (Summary of The HIPAA Security Rule 2003). There are several measures that must be taken in order to secure all the different types of medical information.A proper security policy should include the three following elements: physical security, technical controls over access, and management policies (Glandon & Smaltz, 2008). These elements should be known by all staff and enforced by management. Whe n it comes to the proper amount of physical security there is no such thing as having too little or too much. The most common forms of physical security include hardware and data file security. Hardware securities defend computers from unauthorized access or viruses entering private files (Das, Kant, & Zhang, 2012).These are usually the first step of security that is taken in order to enforce the security portion of HIPAA throughout the medical records. Another element that helps secure private files is technical safeguards. Theses safeguards include ideas that are as simple as having a password that only authorized individuals are aware of or even creating a specific encryption that only the employees of a health care company are able to translate. Creating audit logs is great way to view who is logged into specific patients’ information and when they did so. This enables any supervisor to have superior knowledge of who accesses what information.The final element that a secu rity policy should provide is the enforcement of all management policies. These could include having written company security polices that are available for employees to review at any time. Making sure that all employees are aware of all security polices is important in order to ensure the safety of all medical records. These policies can be addressed in employee training, which is another important part of any management position. Employee training is where all questions should be answered and all policies should be understood.Employees also need to be informed of the disciplinary actions that will follow if any sort of the management policy is broken or disobeyed. There are always repercussions when it comes to breaking the rules; HIPAA has several consequences due to the disobedience of the people. There is a general penalty â€Å"for failure to comply with requirements and standards† (Penalties Under HIPAA, 2013). This is the more common penalty that occurs; it requires t he person who violated the rules to pay one hundred dollars for each violation and may not exceed $25,000 throughout a one year time frame.The other offense that includes any â€Å"wrongful disclosure of individual identifiable health information† (Penalties Under HIPAA, 2013) has a more in-depth punishment rate. This includes situations where an individual shares another individual’s health information to an unofficial person. Also, the obtainment of another individual’s medical information when it is not needed or asked for any specific medical reason is also included in this offense. The first penalty that is sentenced in this situation is that the violator will not be fined more than $50,000 and/or imprisoned up to one year.If the offense is committed under false pretenses the violator will not be fined any more than $100,000 and/or imprisoned for up to five years. The biggest penalty occurs if the offense is committed with the intention of selling an indivi dual’s medical record for certain advantages. In this case the violator will be fined no more than $250,000 and/or imprisoned for no more than ten years. Because the information protected under HIPAA laws is invaluable and incredibly sensitive, legislators made sure to implement punishments that will hopefully deter potential wrong doers from breaking the law.Unfortunately, the severe consequences that the Health Insurance Portability and Accountability Act endorses, does not intimidate everyone. The Health Insurance Portability and Accountability Act is still the most effective act and it helps to protect the privacy of individually identifiable health information, as well as secure the electronic protected health information. When the proper elements to both the privacy and security rules are followed, the more successful HIPAA will be.