Thursday, November 28, 2019

Beauty Is in the Soul Essays

Beauty Is in the Soul Essays Beauty Is in the Soul Essay Beauty Is in the Soul Essay Beauty is in the soul A beautiful heart is better than a beautiful face. The phrase you hear all the time while you’re growing up, especially if you’re a girl. Audrey Hepburn said â€Å"The beauty of a woman is not in a facial mole, but true beauty in a Woman is reflected in her soul. † That is the theme I see in both â€Å"Snow White and the Seven Dwarfs† and â€Å"Cinderella†. In both poems the person that had a beautiful heart always prevailed. These two poems and this theme basically reiterate what people have been saying for years. Through the use of fairytales and satirical ideas, Sexton demonstrates that beauty is internal not physical. Snow white is beautiful and the stepmother is also beautiful but her stepmother cannot bear someone to be more beautiful than she is â€Å"Suddenly, the mirror replied, Queen, you are full fair, ‘tis true, but Snow White is fairer than you†¦So she condemned Snow White to be hacked to death†. The queens Jealousy and narcissistic ways drive her to attempt to kill her stepdaughter. The queen attempts to kill her on several occasions, first asking the hunter to bring her Snow Whites heart so that she could eat it, showing how serious she was. The mirror told her that Snow White was still the prettiest, this time she came to the dwarf house and wrapped her up and left her there, the dwarfs saved her and the mirror told again. Even after the dwarfs warned her that the queen was trying to kill her Snow White still had the heart to open the door for her stepmother, this time she put scorpion in her hair. The dwarfs saved her and warned her again but Snow White still opened the door, the last time the queen fed her a poisonous apple. But because Snow White had a beautiful heart, when the prince carried the coffin they dropped it and the apple chunk flew out of her mouth and she lived. The queen had a horrible heart and in the end she dies a horrible death and Snow White ends up with the prince. Just like in â€Å"Snow White†, In â€Å"Cinderella†, Cinderella is beautiful and has a beautiful heart but her Stepsisters, Stepmother and father treat her horribly. Sexton says â€Å"the man took another wife who had two daughters, pretty enough but with hearts like black jacks. Cinderella was their maid. † When it came time for the Royal Ball and the prince was looking for someone to marry, Cinderella was dying to go. She did everything they asked to do before going and even after completing those tasks the stepmother and stepsisters found a reason she could not go. She had nothing to wear and she couldn’t dance. Cinderella went to the tree at her mother’s grave and cried and begged for her to be able to go to the ball, she received a dress and slippers. When she arrived at the ball no one recognized her and the prince was in love with her. After dancing all night with the prince and him walking her home, she went back to her old life. Three days later the prince came looking for her, the stepmother cut off her big toe to fit into the slipper. The stepsister cut off her heel to fit into the slipper, the prince was ready to give up but then he found Cinderella, whos foot fit into the slipper, as sexton says â€Å" like a love letter, fit into its envelope. At their wedding the sister came and a dove pecked their eyes out, the prince and Cinderella lived happily ever after. In both poems two beautiful women with beautiful hearts were treated poorly for simply being beautiful. This reflects off of real life because every day there is a girl treated badly simply because she is beautiful. I believe Sexton is showing the real life aspect of these two traditional fairytales. She is also showing the idea that a beautiful face is not nearly worth as much as a beautiful heart and that the person with a beautiful heart will always prevail in the end.

Monday, November 25, 2019

Chinese Customs essays

Chinese Customs essays China is a land with unique traditional customs. Through the late early twentieth century China was fairly isolated which hindered cultural diffusion from the rest of the world. This meant that its culture was very distinct. Chinas distinct traditional customs included birth and birthday, wedding, and death customs. Birth traditions played an important role in Chinese life. When a child turned one month old, his or her parents would notify the gods. It was also though of that the birth of a girl was unlucky while the birth of a boy was lucky. The Chinese also celebrated birthdays with special customs. The birthdays that they thought were important were twenty-one, thirty-one, fifty-one, sixty-one, seventy-one, and ninety-one. At the age of fifty-one, it is a tradition for a person to receive, from his children, a multipaneled wood screen decorated with symbols of longevity. At the age of sixty-one, a person was to receive the prized gift of a coffin, from his children. When a person reached the age of seventy-one, he was permitted to wear an official robe and cap affixed with a copper button. At this age they are also allowed to use a special walking cane featuring a dove or pigeon carved into its jade handle. When a person turned eighty-one, which was very rare, the village elder notified th e emperor, who ordered the construction of a memorial arch in the honor of the person. An even rarer occasion was the reaching the age of ninety-one, when a person was honored with greetings four times a year by the district magistrate (Traditional). Marriages were arranged by a persons family, usually before they reach the age to marry. The families arranged the marriages with the matchmaker through negotiation, exchanging birth information in the process. The father of the groom wrote a formal proposal of marriage to the father of the bride, which the matchmaker delivered, along with gifts and things such as cakes....

Thursday, November 21, 2019

Critical Assessments of Two Archaeology Articles Essay

Critical Assessments of Two Archaeology Articles - Essay Example The study that Churchill makes on the adaptive possibilities is intended to narrow the many theories that exist on discovering why there is an equafinality of agents that might be given value for the production of adapted traits within Neanderthals. The argument within the paper contends that without discovering ways in which to evaluate the various hypotheses there is nothing preventing the equal consideration of those hypotheses that are ‘untenable’. In other words, some hypotheses are so ridiculous that there must be a way to dispute them, but without a methodology for verifying hypotheses that have some validity, there is no recourse to dispute any hypothesis. Therefore, it appears that the main focus of the paper is to find a way to evaluate hypotheses on agents of traits through exploration of one specific trait. Churchill (2008) suggests that â€Å"The study of the flow of energy through the Neanderthal’s world holds the promise of a solution to some of th e conundrums that exist in functional morphology or adaptive studies of these archaic humans† (p. 115). ... However, through further exploration, the idea was refuted, thus providing for an assessment that suggested that perhaps Neanderthals had less of a capacity to tolerate cold temperatures than did humans. In addition, the nature of the energy required to heat the bodies that they had developed was such that the high levels of calories were needed to make it function properly and that during the time of year when food was most difficult to obtain, higher levels of calories would be needed in order to supported additional efficiency in maintaining body temperature. The primary purpose of the paper was to find and use methods of research that could verify suppositions about the adaptive agents that provided for the development of traits in Neanderthals. In working with multiple levels of biologically sound and rational discovery, Churchill manages to make a reasonable discussion about the topic, even if a firm conclusion was not possible. The problem that exists within this concept is th at another researcher may find ways in which to manipulate data to support his or her hypothesis while ignoring the variations that would refute it. The purpose of the paper brings to light the problem without genuinely discovering a responsive solution. Works Cited Churchill, S. E. Bioenergetic Perspectives on Neanderthal Thermoregulatory and Activity Budget: A Review. pp. 113–134. Found in K. Harvati and T. Harrison (eds.), Neanderthals Revisited: New Approaches and Perspectives. New York: Springer, 2008. Print. Clients Name Name of Professor Name of Class Date Skin Deep: A Critical Assessment Nina G. Jablonski and George Chaplin discuss the development

Wednesday, November 20, 2019

Population Growth Case Study Example | Topics and Well Written Essays - 750 words

Population Growth - Case Study Example It is also important in that it helps determine the dependency ratio. High population growth rate is usually a problem especially with limited resources in a society whereas low population growth rate is a problem in the society given that the society may face workforce shortages in the future. The paper discusses the population size of all US citizens as depicted by data from 1900 to 2000 census. Data used in this paper was retrieved from the US census database. The reason for selecting this data was because of availability of data online, the convenience of the data source and to show how a developed country manages its population size through its policies and also to determine the expected population size in the next census. US Census data was retrieved for the year 1900 to 2000 from the US census website. The following is an analysis of the data. From the year 1900 to 2000 the population increased by 205,628 thousand, the mean increase in population is for the ten year period from 1900 to 2000 is 20,563 thousand, the standard deviation of this increase in population 7064.3. We, therefore, expect that the population size will increase by 20563 thousand in 2010. The composition of the population is an important measure in a society given that it helps determine the dependency ratio. The following chart shows the composition of the population as at the 1990 census From the above chart, it is evident that the majority of individuals during the 1990 census were aged 15 to 34 years while only 21.06% were aged 55 years and above. Total workforce, therefore, was 57.4% and this means that approximately 42.6% of the population was dependent on the workforce. From the above chart, it is evident that the majority of the individuals in this year were aged between 35 and 54 years and only 21.06% were aged above 55 years.

Monday, November 18, 2019

Advanced Manufacturing Processes I( Laser Manufacturing ) Assignment

Advanced Manufacturing Processes I( Laser Manufacturing ) - Assignment Example This is in the aim of supporting the dental prosthesis i.e. denture, bridge, crown, or facial prosthesis in addition to acting as an orthodontic anchor (Graf, 2014). Usually made of titanium, these are implanted through the biological process of osseointegration, aiding in the formation of an intimate bond to the bone. In general, such a biomedical implant usually comprises of a metal base structure, and a deposit (comprising of a first metal and an anti-microbial material) formed onto a metal base structure wherein the formed deposit is not derived by either electro-plating or anodization. Apart from titanium, the metallic dental prostheses are also made of platinum, stainless steel, gold, tantalum and cobalt-chrome amongst other alloys (Pompa, et.al 2015:1). Typically, implants and dental prostheses consist of a titanium (tooth-root resemblance) screw, having either a smooth or a roughened surface. Notably, most of the dental implants used are manufactured using commercially unalloyed titanium that is available in four different grades. The grades are differentiated by the amount of iron, oxygen, nitrogen and carbon contained. The cold work toughened CP4, containing maximum impurity levels of 0.50% of Fe (Iron), 0.40% Oxygen, 0.015% Hydrogen, 0.10% Carbon, and 0.05% Nitrogen, is the most widely utilized titanium for various bio-medical implants. An auxiliary component such as the Grade 5 Titanium (6AL-4V), which is a bit harder than the CP4; contains 4% vanadium alloy and 6% aluminium. It is mainly utilized in the manufacture of abutments and abutment screws that aid in the implantation process, as well as holding the prostheses in place. The importance of Titanium in bio-medical dental prostheses amongst other functionalities is influenced by core characteristics, which make it highly durable (Gu, Meiners,

Friday, November 15, 2019

Quantitative Determination of Atrazine

Quantitative Determination of Atrazine The objective of this study is to develop a simple and economic spectrophotometric method for the quantitative determination of atrazine. This method is based on the complexation of atrazine derivatization (dechlorinated atrazine [DA]) with a mixture of formaldehyde and ketone compound, as described by Mannich reaction. The complex was determined by UV-Vis absorption measurement and the ketone compound used was the uranine due to its high coefficient absorption. The UV spectrum of the complex shows maxima of absorption at 207 nm and at 227 nm. An internal standard was used to quantify the atrazine. There is a good linearity between the absorbance and the concentration in the range of 0.1 10 ÃŽ ¼g.mL-1 of atrazine. The recovery value was 97 % and the limit of detection was 0.01 µg.mL-1. Real samples collected from irrigation local area were analyzed using this method and the estimated concentration of atrazine found in the mentioned river is 0.29  ± 0.011 ÃŽ ¼g.mL-1. Keywords: Atrazine, dechlorination by zero valent iron, Mannich reaction, Spectrophotometer, quantification, internal standard, real samples measurements. Introduction Atrazine are widely used in agriculture, and their heavy use has resulted in the environmental pollution. Their persistent presence had been a serious problem, especially in surface and ground water systems. Atrazine herbicides were often used especially in Europe and the United States (1, 2), as important atrazine and simazine have been greatly used in maize cultivation and forestry. Their solubility in soil is low, and then can migrate along the food chains, and their intense use and presence in the environment have created a health threat to human beings. Recently, they have been considered as a group to be endocrine disrupting chemicals (3). The European Union Drinking Water Directive sets official regulations on the maximum admissible concentrations in drinking water as 0.1 mg.L-1 for an individual herbicide and 0.5 mg L-1 for total pesticides (4) whereas in surface water the alert and alarm threshold values are typically 1 and 3 mg.L-1 (5). Hence, the development of sensitive a nd economic analytical methods is very crucial for screening the presence and amounts of atrazine and preventing toxicological risks. In general, gas chromatography (GC) and high performance liquid chromatography (HPLC) are the techniques popularly used for the determination of atrazine and simazine (6-9). Gas chromatography-mass spectrometry (GC-MS), amperometric immunosensor, and adsorptive stripping voltammetric determination were developed for the analysis of atrazine and simazine, (10-13). In general, these techniques are expensive and involve time-consuming separation steps. These methods are unsuitable for field testing, for continuous monitoring or for screening high numbers of samples as required in mapping pesticide pollution in time and space. The objective of this work is to analyse the atrazine by a economic and rapid method. The proposed method in this work is based on the dechlorination of atrazine [DA] by zero valent iron powder (ZVIP), according to the reference fourteen (14) and using the [ DA] obtained in the Mannich reaction in order to give rise a by product having an extinction coefficient absorption more intense than atrazine compound. Materials and methods Chemicals and reagents All chemicals and solvents used were of analytical grade or of a higher grade when available. Formaldehyde, hydrochloric acid were purchased from Fisher, (MA, USA). Atrazine was purchased from Rodel-dehein, zero valent iron powder (350 mesh) was purchased from Sigma Aldrich Ultra pure water was prepared using a multi-Q filter system (Millipore, MA, USA). Instruments The UV absorption measurements were performed on a Shimadzu UV- 1650 PC. With 10 mm quartz cells were used for spectrophotometric measurements. The pH values are measured using METTLER TOLEDO pH-meter. Standard Solutions Stock solution of atrazine was prepared into a volumetric flask at a concentration of 10 ÃŽ ¼g.mL-1, 10 mL of this solution were mixed with 20 mL of acidified di-ionized water (pH = 4) and transferred into a flask of 100 mL. 2.5 g of zero valent iron powder were also added into the flask and shacked for 15 minutes. A complete dechlorinatation of atrazine must be achieved according to the previous work (14). This solution was in the Mannich reaction. Calibration Curves Samples for analysis were prepared by mixing uranine , formaldehyde and dechlorinated atrazine solutions. De-ionized water was transferred into each sample to reach a final volume of 10 mL. Calibration curves were built for quantitative measurements using the samples prepared according the table 1. Composition of samples used to build regression curve of the absorbance of the complex obtained by Mannich reaction and atrazine dechlorinated [DA] Internal standard curve addition and Recovery Atrazine dechlorinated was added as an internal standard for the calibration of the measurement, according to the method described in (Muel and Lacroix, 1960; Rima, Lamotte and Joussot-Dubien, 1982) (16, 17). Determination of the pH was done using a Mettler Toledo (OH, USA) pH-meter. Samples for analysis were prepared by mixing 0.5 ml of uranine (10 ÃŽ ¼g.mL-1), 1mL of pure formaldehyde and different volumes of dechlorinated atrazine stock solutions diluted to [0.75 ÃŽ ¼g.mL-1] (1-1.5 -2- 2.5 and 3 mL). De-ionized water was transferred to each sample to reach a final volume of 5 mL. Table 2 describes the preparation of the standard curve. Recovery experiments were performed by standard addition method: 0.15 ÃŽ ¼g.mL-1 of Atrazine dechlorinated was added to samples and percentage of recovery (R%) was calculated as follows: R% = [(Cr-Cf)/Cr] 100 Cr = Real concentration of atrazine in the fortified samples Cf = Concentration of atrazine obtained by the internal standard addition curve River water analysis The water analyzed was collected from River in the north of Lebanon.[agricultural area] 100mL of the polluted water were treated by zero valent iron powder according to the protocol mentioned above. The samples were fortified by solutions of dechlorinated atrazine having an initial concentration of 0.75 ÃŽ ¼g.ml-1 in order to build the internal standard curve. Table 3 summarizes the volumes of different solutions used in the mixtures. Results and Discussion Mechanism of the dechlorination of atrazine Most halogenated hydrocarbons, RX, can be reduced by iron metal. The overall reaction (Equation 1) results in dehalogenation of RX. Three general pathways by which this process may occur have been proposed (Matheson and tratnyek,) (18). The first involves direct reaction of the metal surface, in which case equation (A) alone adequately represents the pathway of reduction. The other two possible pathways do not involve the metal surface directly. Instead, Fe2+ and H2, which are products of corrosion by water, serve as the reductants that are directly responsible for dehalogenation of RX equation B and C. Fe0 + RX + H+ ↔ Fe2+ + RH + X- A 2Fe2+ + RX + H+ ↔ 2Fe3+ + RH + X- B H2 + RX ↔ RH + H+ + X- C More specifically the atrazine can be written as RX ( X = Cl ). With zero valent iron powder in the acidic aqueous solution the chlorine can be replaced by the hydrogen. According the following reaction: Effect of the dechlorination of atrazine on its extinction coefficient absorption. UV absorption spectra of atrazine in aqueous solution (1.5ÃŽ ¼g.mL-1) were recorded and compared to the spectra of the by-product obtained by the treatment of atrazine as shown in figure 1. Atrazine was dechlorination by zero valent iron powder according to the method described by Matheson, L.J et al (18). The extinction coefficient of the atrazine at the 220 nm (maximum of absorption) was estimated the value of 35200 M-1.L; whereas the extinction coefficient of the dechlorinated atrazine which give a maximum at 210 nm was found equal to 169000 M-1.L. Figure 1. The experimental observations revealed that by the removal of the chlorine atoms an hyperchromic and hypsochromic effects were observed. An increasing of the extinction coefficient and a blue shift from 220 nm to 210 nm of the maximum of absorption were detected. According to the table 4 , the proton that accompanies the formation of the free amine in Equilibrium 1 is available to protonate other reactants in the solution (Equilibria 2 and 3). Addition of the free amine to a protonated molecule of formaldehyde leads to the formation of the iminium ion shown at the right of (Equilibria 4). The enol of acetone then adds to the carbon atom of the iminium ion in (Equilibrium 5). In the equilibrium 1 as shown in the table 1, the nitrogen is enriched by electrons of the CH3 group and this nitrogen will react with H+ as base/acid reaction. However, when the electrons of the nitrogen, are deprived under the influence of the electron affinity of chlorine, this nitrogen will lose its basic character, then the à ©quilibre1 should be disturbed .In the other hand the nitrogen of the Equilibrium 4 play a nucleophilic role and ,if this nitrogen is disadvantaged by a chlorine attractive effect; it will lose the nucleophilic characteristics and the reaction with the carbon of the aldehyde in the Equilibrium 4. cannot be obtained In the case of atrazine it well known that the chlorine plays the role of the electrons donor to the nitrogen of the cycle and the electrons attractive of the aliphatic nitrogen. Since the Mannich reaction must take place at the aliphatic nitrogen not at the aromatic nitrogen and when the chlorine was removed by dechlorination process, the electrons at the aliphatic nitrogen become more dense and then it will be more able to play the role of nucleophilic atoms as mentioned in Mannich reation. In conclusion when the chlorine is removed from atrazine, the Mannich reaction can be observed as we demonstrated experimentally. Identification of the complex obtained in the mixture atrazine dechlorinated-formaldehyd and uranine The Mannich reaction is an organic reaction which consists of an amino alkylation of an acidic proton placed next to a carbonyl functional group with formaldehyde and ammonia or any primary or secondary amine. The final product is a ÃŽ ²-amino-carbonyl compound also known as a Mannich base. Reactions between aldimines and ÃŽ ±-methylene carbonyls are also considered Mannich reactions because these imines form between amines and aldehydes. Equation D (15). We hypothesized that the reaction between uranine, formaldehyde and dechlorinated atrazine must be similar to reaction E. The mechanism of the reaction is the following: Equation E Atrazine compound presents a UV spectrum with a maximum absorbance at 220 nm whereas dechlorinated atrazine presents a maximum of absorption at 210 nm Spectra of atrazine and dechlorinated atrazine are presented in Figure 1. The mixture of dechlorinated atrazine, formaldehyde and uranine give rise to the formation of a complex described by the Mannich reaction. It is obviously that formaldehyde does not have any UV spectrum. The UV spectra of the complex give rise to a spectrum with two maxima at at 207 nm and 227 nm respectively. Figure 2 presents the spectra of atrazine. dechlorinted atrazine and the complex obtained by Mannich reaction. Atrazine 2 ÃŽ ¼g.ml-1 (A) (DA  : dechlorinated atrazine by zero valent iron powder), (DA+ H2CO : dechlorinated atrazine by zero valent iron powder with formaldehyde) (DA+ H2CO + uranine : : dechlorinated atrazine by zero valent iron powder with formaldehyde) Regression curve between the complex formation A calibration curve of the complex was built to examine the linearity of the complex absorbance and atrazine concentrations. The least square method was used to calculate the regression equation. A strong linear correlation was obtained between the absorbance of the complex and the concentrations of atrazine. Figure 4 shows the regression curve of complex absorbance in function of atrazine concentrations. Correlation coefficients were higher than 0.99 in a concentration range of 0.15 ÃŽ ¼g.mL-1 to 0.75ÃŽ ¼g.mL-1.The precision of the method was evaluated with relative standard deviations (RSD) of atrazine determination in five samples. RSD was 3 %. The limit of detection of the method was 0.01 µg.mL-1 as defined by a signal-to-noise ration of 3:1 (19). Spectrophotometric method for quantification of atrazine e using the internal standard addition model A spectrophotometric method using the internal standard addition was examined to quantitatively determine melamine concentrations in samples. A calibration curve was described by the following equation: A*= aC + b, which is equivalent to A* = (A0* /C0) x Cadd + A0*, with A* = (A/ A0) normalized absorbance intensity (arbitrary values), is equal to the ratio of the absorbance intensity after adding the internal standard A to the absorbance intensity before adding the internal standard (A0) C0: solute concentration to be estimated. C0 is determined by the negative intercept of the curve with the abscissa axis (16, 17). A0*: normalized absorbance intensity of the starting solution Cadd: known added concentrations. The plot of A* vs. Cadd is shown in Figure 5. The internal standard used in this method was the atrazine that we would like to determine (C0). To this initial solution, different known concentrations (Cadd) were added. The average recovery for five samples spiked with melamine as described above in Table 1 was estimated to be 97%  ± 3. Table 5 summarizes the validation parameters of this method. Spectrophotometric method for the quantification of atrazine in a sample taken from an agricultural zone, using the internal standard method. Samples taken from a water source contaminated with atrazine, are processed by zero valent iron powder for the dechlorination of atrazine molecules. A definite volume of this solution is mixed with the same concentrations of formaldehyde and uranine. Different volumes of standard solution of dechlorinated atrazine were added to the solutions to be analyzed. The composition of these solutions are summarized in Table 3. The UV-Vis spectra of the solutions were recorded to follow the evolution of the complex obtained after the mixture called Mannich mixture. Using the evolution of UV-Vis spectra, an internal standard curve could be constructed and the intersection of this curve with the axis of abscises gives the concentration of atrazine in the waters of Agriculture . The concentration of atrazine in these waters is estimated at 0.29 ± 0.011 ÃŽ ¼g.mL-1 (n = 5). Conclusion The spectrophotometric method used to analyse the atrazine in agriculture water was based on Mannich reaction .This new method is a specific and simple method for the quantitative determination of atrazine in the contaminated water. Often the determination of atrazine is measured by sophisticated and expensive methods like HPLC, GC/MS. However the proposed method is easy to use, rapid and economic and it showed high accuracy, but it was restricted by the potentiality of the spectrophotometer which reaches a limit of detection of 0.01 ÃŽ ¼g.mL-1 as described in the manuscript.

Wednesday, November 13, 2019

Definition of Command Economy :: essays research papers

THE COMMAND ECONOMY A command economy is one in which a central authority has control of the resources of the economy and makes most of the economic decisions. TODAY : DICTATORSHIPS OR CUBA OR CHINA IN THE PAST: NEW FRANCE & THE WARTIME ECONOMY OF THE 1940'S NEW FRANCE New France was discovered by accident while explorers were searching for shorter trade routes to India and China, where they hoped to find rich sources of gold and spices. By accidentally discovering central and South America they did discover gold and silver produced by the Aztec civilization. In Canada the first resources to be exploited were - FISH & FURS. New France, as a colony, was to serve 2 purposes. 1. a source of NATURAL RESOURCES for the people of France. 2. A place where the FINISHED MANUFACTURED GOODS could be sold. The King had ABSOLUTE POWER until 1663, then he appointed officials. The main one was the INTENDANT, who ran the economy of the colony the way the King wanted it. The industry was AGRICULTURE & FUR TRADING. Furs, fish and other raw materials were sent back to France. In New France, LAND = WEALTH. Land was given to the Lords (Seigneurs) of the King in return for Taxes and a promise to settle the land. The Lords got farmers (habitants) who paid the Lord taxes and if the farmer didn't pay the taxes the Lord would take his land. GOODS PRODUCED = WHEAT, TOBACCO, OATS, HEMP (a plant used for making sails). THE BRITISH COLONIES OF THE TIME WERE RUN IN MUCH THE SAME MANNER. WHAT WAS THIS TYPE OF ECONOMIC ACTIVITY CALLED? CANADA'S WARTIME ECONOMY OF THE 1940's. The entire economy of Canada was involved in the WAR EFFORT. North America became a very important resource area for the Allies. 1941 - The WARTIME PRICES AND TRADE BOARD set maximum prices that goods could be sold for in Canada. 1942 - Goods were rationed such as food and fuel. THE GOVERNMENT HAD ABSOLUTE POWER There was an increased demand for resources to supply the war effort such as materials for PLANES, SHIPS, TANKS, BOMBS. The war was destroying economic resources in Europe. 1. soldiers, as well as others were killed 2. factories, roads and rail lines were being destroyed 3. dams and oil tanks were bombed 4. bridges were destroyed 5. land and crops were burnt or otherwise destroyed

Monday, November 11, 2019

Network Security Analysis Essay

This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters â€Å"cloud security† center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer’s network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the network’s openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet ‘hackers’ and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organization’s Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the ‘back door’ has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted website’s own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.

Friday, November 8, 2019

Free Essays on The Book Of Job

â€Å"Naked I came from my mother’s womb, and naked I will depart. The Lord gave and the Lord has taken away; may the name of the Lord be praised† (Job 1:21). The book of Job is significant to both secular and non-secular groups as a pillar for many fundamental truths. The story of Job’s extensive amount of torment he faced, and persevered through, serves as a prime example for many to follow. Although the book is chiefly considered a model for Christian ethics, it has been explored by both secular and non-secular groups. Contrary to popular belief, the book of Job is not only about the Lord’s servant and the many ways he suffered. This essay will identify why many believe that this book is only concerned with Job’s sufferings, and in contradiction show that there is an abundance of issues within, with many lessons to be learned. Job was a man with what the public viewed as a perfect life. He had a wife, seven sons, and three daughters. In addition to having a well rounded family, his wealth continued in his possessions that included seven thousand sheep, three thousand camels, one thousand oxen, and five hundred donkeys. While Job was a family man, he was also known very well in his community, and sometimes even considered the greatest man of the East. More important than all of this, Job feared God and shunned evil. The Lord said to Satan in chapter one, â€Å"Have you considered my servant Job? There is no one on earth like him; he is blameless and upright, a man who fears God and shuns evil.† Satan was sure that no matter how much Job loved the Lord, if Job were to lose everything he had, surely he would curse the name of the Lord. The Lord proceeded to tell Satan that everything Job has is in his hands, but he was not aloud to touch the man himself. Satan proceeded in attempting to destroy Job, allowing his oxen and donkeys to be stolen, burning his sheep and servants, having his camels carried away, kill... Free Essays on The Book Of Job Free Essays on The Book Of Job â€Å"Naked I came from my mother’s womb, and naked I will depart. The Lord gave and the Lord has taken away; may the name of the Lord be praised† (Job 1:21). The book of Job is significant to both secular and non-secular groups as a pillar for many fundamental truths. The story of Job’s extensive amount of torment he faced, and persevered through, serves as a prime example for many to follow. Although the book is chiefly considered a model for Christian ethics, it has been explored by both secular and non-secular groups. Contrary to popular belief, the book of Job is not only about the Lord’s servant and the many ways he suffered. This essay will identify why many believe that this book is only concerned with Job’s sufferings, and in contradiction show that there is an abundance of issues within, with many lessons to be learned. Job was a man with what the public viewed as a perfect life. He had a wife, seven sons, and three daughters. In addition to having a well rounded family, his wealth continued in his possessions that included seven thousand sheep, three thousand camels, one thousand oxen, and five hundred donkeys. While Job was a family man, he was also known very well in his community, and sometimes even considered the greatest man of the East. More important than all of this, Job feared God and shunned evil. The Lord said to Satan in chapter one, â€Å"Have you considered my servant Job? There is no one on earth like him; he is blameless and upright, a man who fears God and shuns evil.† Satan was sure that no matter how much Job loved the Lord, if Job were to lose everything he had, surely he would curse the name of the Lord. The Lord proceeded to tell Satan that everything Job has is in his hands, but he was not aloud to touch the man himself. Satan proceeded in attempting to destroy Job, allowing his oxen and donkeys to be stolen, burning his sheep and servants, having his camels carried away, kill...

Wednesday, November 6, 2019

Isochoric Process Definition and Use

Isochoric Process Definition and Use An isochoric process is a thermodynamic process in which the volume remains constant. Since the volume is constant, the system does no work and W 0. (W is the abbreviation for work.) This is perhaps the easiest of the thermodynamic variables to control since it can be obtained by placing the system in a sealed container which neither expands nor contracts. First Law of Thermodynamics To understand the isochoric process, you need to understand the first law of thermodynamics, which states: The change in a systems internal energy is equal to the difference between heat added to the system from its surroundings and work done by the system on its surroundings. Applying the first law of thermodynamics to this situation, you find that: delta-Since delta-U is the change in internal energy and Q is the heat transfer into or out of the system, you see that all of the heat either comes from internal energy or goes into increasing the internal energy. Constant Volume It is possible to do work on a system without changing the volume, as in the case of stirring a liquid. Some sources use isochoric in these cases to mean zero-work regardless of whether there is a change in volume or not. In most straightforward applications, however, this nuance will not need to be considered- if the volume remains constant throughout the process, it is an isochoric process. Example Calculation The website  Nuclear Power, a free, nonprofit online site built and maintained by engineers, gives an example of a calculation involving the isochoric process. Assume an  isochoric heat addition  in an ideal gas. In an  ideal gas, molecules have no volume and do not interact. According to the  ideal gas law,  pressure  varies linearly with  temperature  and quantity, and inversely with  volume. The basic formula would be: pV nRT where: p  is the absolute pressure of the gasn  is the amount of substanceT  is the absolute temperatureV  is the volumeR  Ã‚  is the ideal, or universal, gas constant equal to the product of the Boltzmann constant  and the Avogadro constantK is the scientific abbreviation for  Kelvin In this equation the symbol R is a constant called the  universal  gas constant  that has the same value for all gases- namely, R   8.31  Joule/mole  K. The isochoric process can be expressed with the ideal gas law as: p/T constant Since the process is  isochoric,  dV   0, the  pressure-volume work is equal to zero. According to the  ideal gas model, the internal energy can be calculated by: ∆U m cv  Ã¢Ë†â€ T where the property  cv  (J/mole K)  is referred to as  specific heat  (or  heat capacity) at a constant volume because under certain special conditions (constant volume) it relates the temperature change of a system to the amount of energy added by heat transfer. Since there is no work done by or on the system, the  first law of thermodynamics  dictates  Ã¢Ë†â€ U ∆Q.  Therefore: Q   m cv  Ã¢Ë†â€ T

Monday, November 4, 2019

Human cloning and animal cloning Essay Example | Topics and Well Written Essays - 750 words

Human cloning and animal cloning - Essay Example Haugen (2007) asserts that, though human cloning has not been extensively expounded on like the animal cloning, it has been researched that it is going to have a number of benefits to human: To start with, human cloning eliminates defective genes. Today genetic illness is not a number one killer disease but this could be in the near future. As humans frequently reproduce, damage to their genes goes high. This creates mutations and malfunctioning of the genes. Down’s syndrome that affects women can be avoided by cloning. Tay-Sachs disease which is an autosomal recessive genetic disorder could be prevented through cloning.Therefore; elimination of these problems could only be done by cloning of healthy human cells. Secondly, cloning enhances faster recovery from traumatic injury. Accidents sometimes, cause a lot of pain and injury to humans. For instance an athlete who gets injured and the recovery process is slow, true healing could only be done by cloning of their own cells to help a faster recovery process. Thirdly, it helps in solving out infertility problems. A lot of couples now days go through difficult times trying to solve out their infertility issues. Without successfully having children, the couples run out of time and money. Human cloning has made it achievable for these couples to have children. In addition, human cloning reverses heart attacks- Heart disease is a number one killer in the U.S and other industrialized countries. Scientists believe that heart attack victims can be treated by cloning their healthy heart cells and injecting them into the areas of the heart that have been damaged. Plastic, reconstructive and cosmetic surgery is another advantage. Human cloning has made it possible for breast implants and other cosmetic procedures to be a success. With the new technology of human cloning doctors are able to manufacture fat, bone, connective tissue or cartilages

Friday, November 1, 2019

Ladership in customer service Article Example | Topics and Well Written Essays - 750 words - 1

Ladership in customer service - Article Example Leaders are flexible and adaptable unlike rules that are fixed and stiff. Leadership allows employees to be leaders for their customers in terms of decision making skills that makes customer feel more comfortable that benefits both customers and the company. Within the context of this paper is the role of leadership in customer service industry. What is takes to be a good leader and how it can benefit every stakeholder in return (Harris, 2002, p. 122). Leadership begins in oneself, to be an effective leader is to recognize oneself as a leader. A leader must be aware of own strength and weaknesses to be able to use these strengths as starting points and to overcome weaknesses. Identifying self strengths and weaknesses can provide a person self knowledge of leadership skills. A good leader is a change agent that entails changes that starts from oneself (Harris, 2002, p. 123). Also a good leader is confident and is open for criticism. Criticisms are analysed to change and become stronger as a leader (Harris, 2002, p. 124). There are several types of leaders. Formal leaders have the official authority of the position chosen by organization. Formal leaders may be formed through special trainings and have high accountability due to specific and defined responsibilities tasked upon the position. On the other hand informal leaders are an assumed role and have no official authority but have the ability to influence others. Informal leadership can affect formal leadership in an organization due to influence over people that can generate support or resistance within an organization. Both formal and informal leaders are essential in the success of customer service. Formal leaders can create a culture that empowers employees to serve as positive examples in the company performance. Informal leaders on the same context can create customer friendly culture, motivate co-workers, boost morale and can relate to co-workers in areas that a formal leader may