Friday, November 29, 2019

Symbolism in The Glass Menegerie Essay Example For Students

Symbolism in The Glass Menegerie Essay Symbolism in The Glass MenagerieFrom the beginning, the figure of the narrator shows that Williams play will not follow the conventions of realistic theater. The narrator breaks the conceptual fourth wall of naturalistic drama by addressing the audience directly. Tom also tells us that he is going to give the audience truth disguised as illusion, making the audience conscious of the illusory quality of theater. By playing with the theme of memory and its distortions, Williams is free to use music, monologues, and projected images to haunting effect. Tom, as narrator, tells the audience that the gentleman caller is a real personmore real, in many ways, than any other characterbut he also tells the audience that the gentleman is a symbol for the expected something that we live for, the thing for which we are always waiting and hoping. This naming of a character as both real entity and symbol is characteristic of Williams work; both of these aspects of the gentleman caller are important to the overall impact of the Play. The allusion to Guernica and the turmoil in Spain, juxtaposed to the uneasy peace in America, establishes a tense atmosphere as the plays background. There is symmetry between the uneasy peace of the time period and the uneasy peace in the Wingfield house. Just as America stirs restlessly with the uneasy peace before the Second World War, Tom seethes with the need to escape his home and set out into the worldas his father did before him. The fire escape, a visually prominent part of the set, is an important symbol for the imprisonment that Tom feels and the possibility of a way out. In his stage directions, Williams characteristically imbues the fire escape with symbolic weight, saying that the buildings are burning with the implacable fires of human desperation. Tom addresses the audience from the fire escape, and his positioning there, standing alone between the outside world and the space of the apartment, points to the painful choice he makes later in the play. In order to escape, he must escape alone and leave his mother and sister behind. This is the first scene where the audience sees Laura taking care of her glass menagerie. The glass menagerie is the most important symbol for Laura and her fragility. Her engagement with the tiny animals reveals how painfully afraid she is of interaction with other humans. The qualities of glass parallel Lauras characteristics: like the tiny glass animals, she is delicate, beautiful in her oddness, terribly fragile. The little collection, like Laura, in an entity that is locked completely in the realm of the home. The animals must be kept on a little shelf and polished; there is only one place where they belong. In a similar way, Laura is kept and cared for, dependent on her mother and brother for financial support. The Blue Roses are another important symbol of Laura. The image of blue roses is a beautiful oneand it is the image that is on the screen at the start of Scene Two. But b lue roses are also pure fantasy, non-existent in the real world. Laura, like a blue rose, is special, unique even, but she is also cut off from real life. When Tom accidentally breaks some of the pieces in the glass menagerie, the incident foreshadows Lauras heartbreak later on in the play. The event emphasizes the collections fragility, and so metaphorically we are reminded of Lauras fragility. Tom is the one responsible, and the pain of his position is made clear. As much as he would like to live his own life, his actions have a great effect on the well-being and security of his mother and sister. By being reckless, he destroys the pretend-world of his sister. Later on, he chooses to live his own life rather than live up to his responsibility for her security. One of the plays important themes is the conflict between the desire to live ones own life and the responsibility for ones family. Toms wages pay the bills, but Amanda continues to treat him as a child. She confiscates and r eturns his books, and during their argument she attempts to control their discussion as an adult controls an argument with a little boy. Toms fascination with the movies and the magician shows his need for fantasy and escapism. Tom is always dreaming of fantastic places far from St. Louis, and for now he escapes through the illusions offered by the movie house and the stage magician. He dreams of leaving home, but his responsibilities for his sister and his mother have so far kept him in the Wingfield apartment. What he sees at the magic show is directly connected to the theme of conflict between Toms responsibility for his family and his need to live his own life. The magicians most impressive trick becomes a symbol for what Tom wishes he could do to make a clean, easy escape, without destroying the coffin or removing any nails. The use of the coffin as a symbol for Toms predicament shows the depth of his unhappiness.The magician is able to escape the coffin without the messiness o f having to remove nails, which would damage the coffin. Tom can escape, but only at great cost. Metaphorically, he would have to remove nails, causing great damagehe would have to abandon his sister and mother and leave them to an uncertain fate. Lauras vulnerability is emphasized in that symbolic space most closely linked to Tom, the fire escape. Tom will later climb down the fire escape one final time, leaving the apartment forever. Laura stumbles on the fire escape, and the fall symbolizes her inability to fend for herself in the outside world. Amanda is still fixating on the idea of the gentleman caller. She proposes a swap; Toms freedom in exchange for a husband for Laura. Amanda is still putting her security into the hands of men; perhaps she sees no alternative. Although her old husbands irresponsibility and Toms increasing restlessness would seem to argue against the reliability of male providers, Amanda is still hoping to find an ideal husband for her daughter. This hope w ill prove to be misplaced. Even the gentleman caller, when he finally comes, will be careless with Laura.In Toms speech from the fire escape, the symbolic name of Paradise Dance Hall can be read in a number of ways. Paradise is an allusion to the lost Garden of Eden, and here the allusion paints the American thirties as a period of innocence before the turmoil of World War II. The dance hall, because it is being described as a memory, creates a sense of loss due to the passage of time. Tom makes yet another allusion to the carnage of Guernica, which has by now become a symbol for the violence in which the entire world will soon be enmeshed. On a personal level, Paradise Dance Hall might symbolize more specific loss that Tom has experienced. For the older Tom narrating the play, the fragile world of his family is lost forever. But for the characters living through the action of the play, the Paradise Dance Hall symbolizes hope. The glass unicorn becomes a symbol for Laura. She, like the unicorn, is odd and unique. Both Laura and the unicorn are fragile: Jim breaks both of them. Lauras gift of the broken unicorn shows the extent of her affection for him. For Jim, the evening has been insignificant. But Laura has harbored a girlish crush on him for many yearsshe even saved the program of the play in which he starredand the gift of the unicorn, an item that is a symbol of herself, shows how much she still likes him. For a brief moment, the Wingfield apartment was a place of dreams. Amanda experienced a return to her girlhood, Laura was able to show someone her glass menagerie, and the place was full of the music from Paradise Dance Hall. But the unicorn is broken, the music of Paradise gives way to the sad sounds of the Victrola, and even Amanda is left without defenses against reality. For the first time, she refers to Laura as crippled, breaking her own rule, and she seems to acknowledge that Tom will soon leave them. This scene has its share of rose imagery. Th e new floor lamp has a rose-colored shade; Laura herself is Blue Roses. The rose-colored light makes Laura look beautiful; she is bathed in rose-colored light, she is Blue Roses, and she is also, in many ways, the surrogate for Williams sisterwhose name was Rose. Williams uses the rose as a motif for Laura to emphasize her delicateness and her beauty, as well as her worth. The fantastic blue color of the flower shows, however, that Laura is not a being of this worldToms closing speech is a great moment. The descending fourth wall puts a powerful but permeable barrier between Tom and his family. They are behind him, behind him in time and in the physical space of the stage, and they are inaudible. Yet he cannot seem to shake the memory of them, and they are clearly visible to the audience. Although he has never explicitly spoken of one of the plays most important themesthe conflict between responsibility and the need to live his own lifeit is clear that he has not been able to fully shake the guilt from the decision that he made. The cost of escape has been the burden of memory. For Tom and the audience, it is difficult to forget the final image of frail Laura, illuminated by candlelight on a darkened stage, while the world outside of the apartment faces the beginnings of a great storm. .u2b03fada2fae1478879998a3ad00e1de , .u2b03fada2fae1478879998a3ad00e1de .postImageUrl , .u2b03fada2fae1478879998a3ad00e1de .centered-text-area { min-height: 80px; position: relative; } .u2b03fada2fae1478879998a3ad00e1de , .u2b03fada2fae1478879998a3ad00e1de:hover , .u2b03fada2fae1478879998a3ad00e1de:visited , .u2b03fada2fae1478879998a3ad00e1de:active { border:0!important; } .u2b03fada2fae1478879998a3ad00e1de .clearfix:after { content: ""; display: table; clear: both; } .u2b03fada2fae1478879998a3ad00e1de { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u2b03fada2fae1478879998a3ad00e1de:active , .u2b03fada2fae1478879998a3ad00e1de:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u2b03fada2fae1478879998a3ad00e1de .centered-text-area { width: 100%; position: relative ; } .u2b03fada2fae1478879998a3ad00e1de .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u2b03fada2fae1478879998a3ad00e1de .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u2b03fada2fae1478879998a3ad00e1de .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u2b03fada2fae1478879998a3ad00e1de:hover .ctaButton { background-color: #34495E!important; } .u2b03fada2fae1478879998a3ad00e1de .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u2b03fada2fae1478879998a3ad00e1de .u2b03fada2fae1478879998a3ad00e1de-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u2b03fada2fae1478879998a3ad00e1de:after { content: ""; display: block; clear: both; } READ: Eva Smith's Essay We will write a custom essay on Symbolism in The Glass Menegerie specifically for you for only $16.38 $13.9/page Order now

Monday, November 25, 2019

The Digby Mary Magdalene essays

The Digby Mary Magdalene essays Like most morality plays, The Digby Mary Magdalene, uses allegorical exemplum form to relate moral material to the audience. The usual plot of morality plays is an allegorical challenge for the spiritual good of the mankind figure. Susan Haskins, in her book Mary Magdalene, Myth and Metaphor, states that the medieval period saw Mary Magdalene as a metaphorical Everywoman (Pg. 134). The play dramatizes the life of Mary Magdalene as it is told in The Golden Legend by Jacobus de Voraigne. With such a long cast list and such numerous scene changes which include a desert, a sea, a tavern and a burning temple, Coldewey says It is no exaggeration to say that the Digby Mary Magdalene is the most extravagant play in the whole of Early English Drama (Coldewey, Pg. 186). The Digby Mary Magdalene was written specifically with a Catholic audience in mind although it has been proven that most religions studied in western cultures have their own versions of the Magdalene persona. There can be no doubt that Mary Magdalene is an important figure in cultural, and more specifically religious, histories. More notably, she is an important female in this realm of history. Different cultural histories have provided themselves with their own mythologies and legends according to their particular religious frameworks. Among Christian documents, Mary Magdalene is introduced in the New Testament, as Thompson confirms in her book Mary of Magdala, Apostle and Leader, It is impossible to trace a straight line of decent from the gospel portrait of Mary, through the extravagant portrayals of her in the middle ages...It is impossible to trace it in a straight because there are so many element involved in the history of each age, in the making and transmitting of myths through different historical epochs...(Pg.3). Christians religions agree that she had a family, specifically a brother and sister. Stories different from the...

Friday, November 22, 2019

The biological theories, which may explain Schizophrenia Essay

The biological theories, which may explain Schizophrenia - Essay Example These concern genetics, neurochemistry, brain structure and evolution. Biological factors of Schizophrenia can be explained using studies on twins and studies on family history. With twin studies, researchers want to establish the degree of concordance. This is the likelihood that if one twin has the disorder, the other twin will also have it. Gottesman (2000) summarised 40 twin studies and found that the concordance rate for MZ twins was 48% and the concordance rate for DZ twins was about 17%. Concordance rates were also studied by Cardano et al. (2001) using the Maudsley twin registers. They found concordance rates to be 40% for MZ twins and 17% for DZ twins. Although this is strong evidence for biological factors in Schizophrenia, concordance rates are not 100% and therefore there must be some environmental input. Loehlin and Nichols (2002) argued that the reason for the higher concordance rates in MZ rather than DZ twins was due to MZ twins being treated more similarly so producing a greater environmental similarity. However, there are two arguments against this view. MZ twins may produce more similar treatment from their parents than do DZ twins (Lytton, 2000). This therefore suggests that the higher biological similarity of MZ twins may be the cause, rather than the effect, of their more similar parental treatment. In addition, the Schizophrenia concordance rates for MZ twins who are brought up apart are similar to those of MZ twins who are brought up together (Sheilds, 2003). So presumably the high concordance rates of MZ's brought up apart is not due to environmental similarity. However, it has been suggested that some of the twins who had been brought up separately in Sheilds study had not always spent their whole childhood apart and some were raised by relatives and even went to the same school (e.g. Kamin, 2001). Family studies also aid to explain how biological factors influence Schizophrenia. Gottesman (2000) found that if you have a sibling with the disorder you have an 8% chance of being Schizophrenic, if you have one parent with the disorder you have a 16% chance of being Schizophrenic and if you have two parents with the disorder you have a 46% chance of being Schizophrenic. These concordance rates should all be compared to the 1% chance that a person randomly selected from the population would be Schizophrenic. Gottesman and Bertelsen (2001) also reported some convincing findings on the importance of genetics. The found that participants had a 17% chance of being Schizophrenic if they had a parent who was an identical twin and who had Schizophrenia. This could be due to heredity or environment. They also found that participants had a 17% chance of being Schizophrenic if they had a parent who was an identical twin and did not have Schizophrenia, but whose identical twin did. This therefore shows that the most important factor is genetics. The evidence reported by Gottesman is criticised because although it indicates that Schizophrenia runs in families and that concordance rates are much higher between relatives who have higher biological similarity, it does not account for the fact that family members who are more biologically similar are likely to spend more time together. This means that environmental factors are also indicated in this

Wednesday, November 20, 2019

Use of Derivatives in Risk Management Research Paper

Use of Derivatives in Risk Management - Research Paper Example The global economic environment and the financial market have evolved drastically over the past decade. With the advent of information technology at a rapid pace, the financial markets of the world are now closely integrated. Due to this phenomenon of the world being a global village, a turbulence originated in a far distant financial market can have eventual consequences all across the globe. With the revolution in the communication technology, the access to information is instantaneous and thus the subsequent market reactions. It is of prime importance to understand the concept that how does financial risk arises in order to safeguard’s one asset from deteriorating while being exposed to such risks. For any organization or a company, the financial risk arises by entering into a financial transaction such as sales, purchase, investing into securities and bonds, sanctioning of loan and advances, mergers and acquisition transactions, debt financing etc. Financial risk is directly co-related to the prevailing financial prices in the markets, as the fluctuation in these prices causes an increase in the cost to the companies, reduction in the revenues and thus adverse impact on the profitability of the company. These underlying financial prices can be anything ranging from the market interest rates, exchange rates and commodity prices. Other aspects which yield financial risk in the transactions are dealing in derivatives and internal failures of the process and people of any organization. The financial r isk management process mainly copes with the uncertainties resulting from the financial market. The first and foremost step in this process is to identify the current exposure of the company and devise strategies accordingly keeping into consideration the priorities of the company. It depends upon the proactive decision making and the decisiveness of the company on how to cope with the current exposure of the company. In general, companies do realize that avoiding all risk is not possible in order to operate and thus they end up accepting a considerable amount of risk. Risk management is considered to be an ongoing process as the strategies needs to be updated and refined keeping into consideration the market norms and requirements. These changes are primarily brought about by the changes in the expectation about the market rates, business norms and practices and the international financial scenario. The most common strategy practiced by the companies all across the global financial market is to curtail their exposure to risk through the use of derivatives. Risk Management Process Risk management process is a continuous and iterative process which requires analysis of both internal and external risk factors. The

Monday, November 18, 2019

SWOT &TWOS analysis of QATAR NATIONAL BANK and MASHREQ bank Essay

SWOT &TWOS analysis of QATAR NATIONAL BANK and MASHREQ bank - Essay Example The Qatar National Bank is one of the most secure banks in the world. The number of recorded cases of fraud and theft in Qatar national Bank is recorded to be at the minimum. This is mainly because of the sharia laws that they uphold and their tight security when it comes to safeguarding their assets. Although it is the most dominant bank in the middles east and North Africa, it has not exploited the western and westernized countries whose main religion is Christianity such as Americas, Europe and southern parts of Africa. Since it is an Arabic/Islamic Bank, most western investors and would-be clients in countries such as Germany, The USA and Europe, are resilient to bank with them due to the notion that they might be supporting terrorists or due to their strong diplomatic loyalty to their country. Most African countries have a high number of Muslims and Arabs. Due to this the Qatar National Bank has a high opportunity to expand in these areas through acquisitions and promoting more people to join Islamic banking. (Hossain & Leo, 2009) Over the years there has been an increase in the demand for bond market in the Middle East, most Islamic states and Qatar in general. This is a great opportunity for Qatar National Bank to expand as the actions propel the growth of banks There is a great opportunity to exploit the western countries. This can be done through campaigns to discourage acts of terrorism and campaigns to unite the eastern and western countries together to eradicate the fear that western clients might have. Due to the recent introduction of more banks who are offering services at a lower price, their might be a decrease in foreign investments in the Middle East and Qatar which will in the long run affect the bank (Mostafa 2009) Mashreq bank is globally known and is one of the most productive and effective banks in the United Arab Emirates UAE. It has also achieved recognition by the

Saturday, November 16, 2019

Synthesis Techniques for Fabrication of Nanofibers

Synthesis Techniques for Fabrication of Nanofibers Chapter # 02 Synthesis Techniques Introduction The different synthesis techniques for fabrication of nanofibers and nanoparticles will be discussed briefly in this chapter. The selected techniques and the experimental procedure for the synthesis of the nanoparticles and composite nanofibers will be discussed in detail. Synthesis Techniques for Nanoparticles Synthesis method being used for the preparation of nanomaterials is one of the most important factors that affect the different properties of the nanomaterials. There are two major classes of synthesis techniques used for preparation of nanoparticles Bottom-up approach Top-down approach Bottom-up Approach Bottom-up approach refers to the synthesis techniques in which nanoparticles are created from atomic scale to nanoscale. There are different techniques which refer to bottom-up approach Co-precipitation technique Sol-gel technique Wet-Chemical Methods In these methods the precursor solutions with appropriate stoichiometric ratios are mixed together and processed through heating resulting in the desired product. Wet chemical methods are advantageous because the particle size and shape is controllable and also the homogeneity in particle size distribution can be achieved by these methods [ref]. these factors play a vital role in enhancing the different properties of the material such as structural properties, thermal properties, electrical properties etc. The given examples of the bottom-up method are categorized as wet-chemical techniques. In co-precipitation method, the precursor solutions are mixed together and are heated at an appropriately selected temperature. The nucleation occurs precipitates are formed. The by by-products are washed away and the resulted powder is further processed for the different desired characterizations. Both the methods are advantageous in their own ways but sol-gel method is more convenient and efficient method for the preparation of nanomaterials at appropriately selected conditions. Also the major drawback of co-precipitation method is the non-uniformity of particles due to the intense agglomeration during the synthesis [ref] Top-down Approach In top-down approach, the material is processed from bulk state to nano regime by a number of methods. Solid state reaction method is one of top-down methods. Solid-state Reaction Method In solid state reaction method the precursors are directly mixed and ground into fine powder. The powder is further processed through hydraulic press and is pelletized for high heat treatment generally said to be sintering. The sintered pellet is characterized to check the desired properties of the sample. The process occurs at the interface of the solids (precursors) at higher temperature. The appropriate processing temperature and reaction time is selected particularly for the precursors used. At higher temperature, the diffusion of reactants starts causing the reaction to begin. For faster reaction, high surface contact area of the solids and small diffusion distance for the reactant is required which is attained by the well-mixing of the precursors [ref]. Although this is a low-cost method but the major drawback of this method is the non-homogeneity in particle distribution and size. Impurity in desired phase is also introduced during the grinding procedure of the precursors. The desired nanostructure is also not easy to achieve by this process [ref 54]. Sol-gel Synthesis Technique for NaxLi1-xCoO2 (x=0.0,0.5,1.0) Sol-gel method is one of the wet-chemical methods for the preparation of the various nanostructures. The variety of nanostructures can be produced by controlling the various parameters of sol-gel process such as the type of precursors, solvent type, processing temperature etc. the major advantage of the sol-gel process over other methods is the phase purity of the product as well as the homogeneity in the particle size and particle size distribution. This process involves two major steps Hydrolysis Condensation Hydrolysis of the selected metal oxide precursor occurs forming the particular hydroxides. The condensation occurs to form a network of linked hydroxides in the form of dense porous gel. In sol-gel process the precursor solutions are mixed together with a suitable gelling agent in appropriately selected ratio. The solution is then mixed homogeneously and heated until the gel is formed. The temperature is further raise to burn the gel which results in powder formation. The powder is heat treated and characterized to study the desired properties. Experimental Procedure Sol-gel method is used for the preparation of composition NaxLi1-xCoO2 (x=0.0,0.5,1.0). the precursors used are: Li2SO4.H2O (99.99% purity), Cu(NO3)2.6H2O (99.99% purity) and NaNO3 (99.99% purity). The selected precursors were added in appropriate stoichiometric amounts into ethylene glycol. Ethylene glycol was used as gelling agent. The molar ratio between the total mass of precursors to the volume of the gelling agent was kept 1:14 to achieve the homogeneity. The solution was initially magnetically stirred at room temperature to get the homogeneous solution. The solution was then heated at 100Â ±2Â ºC until the formation of the gel. The temperature of the gel was further increased upto 150Â ±2Â ºC which caused the gel to burn. The resulted powder was hen processed through hydraulic press to prepare pellets of dimensions 13mm x 3mm. the sintering of the pellets was done at 550 Â ºC for two hours to achieve high phase purity. The flow diagram of the experimental procedure is given in figure 2.1 Synthesis Techniques for Nanofibers There are a number of techniques used to fabricate nanofibers, some of them are mentioned Drawing Template Synthesis Phase Separation Self-Assembly Electrospinning Brief detail of all these techniques is given below Drawing Drawing is the techniqus to fabricate long single nanofiber one-by-one from the droplet of polymer. Following steps are involved in this technique a substrate material is applied a millimeter drop of polymer solution a micropipette is moved towards the drop. When micropipette comes in contact with the drop, it is pulled back with a certain rate. which depends upon the nature of the polymer solution. A long nanofiber is drawn from the liquid. The diameter of the resultant nanofiber depends on the type of the polymer, its composition, drawing velocity and speed of evaporation of the solvent. The major drawback of this technique is that only a strong viscoelastic material that can undergo strong deformation during this process when stress is applied while pulling the nanofiber, can be used in this process. So, choice of material is limited in this process. Template Synthesis In template synthesis, a metal oxide membrane having pores of nanoscale diameter is used. The metal oxide membrane is placed over a solidifying solution. Polymer solution is extruded by the membrane by applying high water pressure over it. Polymer solution after passing through the membrane comes in contact with solidifying solution which converts the polymer solution into nanofibers. The diameter of the nanofibers depends on the diameter of the pores of membrane. Fig. 2.2 show the different steps involved in this process. Phase separation In this mechanism, separation of phases is involved due to the physical incompatibility. Following are the steps involved A polymer is mixed with a suitable solvent Gelation occurs in this mixture The final step involves the separation of phases. One of the phases-which is that of the solvent- is extracted leaving behind the other remaining phase. The remaining phase is the nanofibrous structure. Self-Assembly Self-assembly processing involves the smaller molecules as basic building blocks to build-up the nanofibers. Molecules are spontaneously organized into an individual and stable structure with preprogrammed non covalent bonds. Nanofibers of very thin diameter can be fabricated using this process but it requires very complicated procedures. The low productivity is another limitation of this method. Electrospinning This is the selected synthesis technique for the current research work. Electrospinning is the most efficient and simple technique to produce ultra-thin nanofibers. There are different components of the electrospinning setup which include High voltage source Syringe Needle Metal Collector Schematic of electrospinning process High voltage source is used in this procedure. The positive end of the source is connected with the needle while the metal collector is grounded by connecting it with the negative end of the voltage source. This creates the potential difference between the two ends which accelerates the polymer solution from the needle towards the collector in the form of solution jet. Before the solution jet reaches the collector surface, the solvent of the solution is evaporated and is collected as an interconnected web of the fibers. The polymer solution in the needle is held due to its surface tension, which induces a charge on the solution surface. The charge repulsion and contraction among the surface charge and its counter electrode causes a force that is directly opposite to the surface tension. As the intensity of the electric field increases, the hemispherical surface of the solution at the tip of the needle elongates to form a conical shape called Taylor cone. As the electric field is further increased, the repulsive electrostatic force overcomes the surface tension of the solution and jet of the solution is ejected from the Taylor cone. The ejected polymer solution undergoes instability and elongation process which allows the jet to become very long and thin. Meanwhile the solvent is evaporated from the polymer solution, leaving behind a charged polymer fiber. In electrospinning technique there are different processing parameters which affect the diameter of the nanofibers. These parameters include voltage, needle tip to collector distance, feed rate and the concentration. This method is advantageous over other methods due to its versatility, cost effectiveness and also by controlling the different processing parameters; the dimensions of the nanofibers can be controlled. Sol-gel Combined Electrospinning Technique Combining sol-gel method with electrospinning is the most convenient technique to prepare composite nanofibers.the different precursors involved in the sol-gel technique have different hydrolysis rate which leads to the in homogeneity of sol. To avoid such probles, electrospinning is combined with the sol-gel process. The problem is solved by electrospinning procedure due to the confinement of the different sol-gel reaction stages (hydrolysis, condensation and gelation) withing extremetly small space i-e the spinning jet and the final nanofiber [ref]. Experimental Procedure: Sol-gel combined electrospinning technique is used for the preparation of composite nanofibers with NaxLi1-xCoO2 (x=0.0,0.5,1.0). The precursors used are: Li2SO4.H2O (99.99% purity), Cu(NO3)2.6H2O (99.99% purity) and NaNO3 (99.99% purity). The polymers selected for this purpose were Poly vinyl Pyrrolidone (PVP) with a molecular weight of 40,000 g/mol and Poly vinyl alcohol (PVA) having a molecular weight of 89,000 g/mol. Polymer Solution Preparation Polymer solution was prepared by firstly selecting the appropriate solvents for the selected polymers. The solvent used for the PVP polymer was Ethanol and that for PVA polymwer was DI water. The molarity of PVP and PVA polymer solution were calibrated as 0.008M and 0.0006M respectively. Both polymers were separately added to their respective solvents and the solutions were magnetically stirred for 1 hour at room temperature. After acquiring the homogeneity, both solutions were mixed together and stirred at room temperature for 1 hour. Precursors Solution Preparation The precursors solution was separately prepared. The precursors were added to their respective solvents separately and magnetically stirred at room temperature. DI water was used as a solvent for Li2SO4.H2O while ethanol was used for Cu(NO3)2.6H2O and NaNO3. 0.2M solutions were prepared for each precursor separately. After acquiring the homogeneous solutions, all three solutions were mixed together and magnetically stirred for 45 min. After achieving a homogeneous precursors solution, the polymer solution was added to it. the final solution was heated and stirred at 100Â ±5Â ºC for 1 hour. The resultant solution was then loaded to the syringe and was further processed through electrospinning. The figure shows the flow diagram of the discussed method

Thursday, November 14, 2019

Invisible Man :: Essays Papers

Invisible Man In the novel, The Invisible Man by Ralph Ellison, the narrator of the story, like Siddhartha and Antonius Blok, is on a journey, but he is searching to find himself. This is interesting because the narrator is looking for himself and is not given a name in the book. Like many black people, the narrator of the story faces persecution because of the color of his skin. The journey that the narrator takes has him as a college student as well as a part of the Brotherhood in Harlem. By the end of the book, the narrator decides to hide himself in a cellar, thinking of ways he can get back at the white people. However, in the novel, the man learns that education is very important, he realizes the meaning of his grandfather’s advice, and he sees the importance of his â€Å"invisibility.† Through this knowledge that he gains, the narrator gains more of an identity. The narrator of the story knows that education is important, however in the novel he learns just how important it is. The first thing his education brings him is a briefcase made of calfskin, which was given to him by the superintendent for the achievements he had accomplished. Because of this, the briefcase becomes very important to the narrator and he hangs on to it for the whole book, and it is the only thing that he brings with him when he retreats to the cellar to plot against the whites. In the briefcase is a scholarship which was awarded to the narrator to an all black college, which he attends. The scholarship made the narrator very happy because he now had the opportunity to continue his education in an institute of higher learning. Many of the blacks at the time were not well educated and he wanted to do all that he could to not be included in this bunch. Because of his furthered education, he can now be placed a bit higher in the pecking order of society, above the other stereotypical blacks who lacked education due to a small amount of funding, or because of anything else. The narrator knew the importance of education and wanted to do all that he could to get everything possible. Another realization that helps the narrator gain more of an identity is the realization of his grandfather’s advice.

Monday, November 11, 2019

National Crime & Criminal Information System

Preliminary Project Plan For the National Crime Information System Project Group Members Asebe Jeware Bereka Yesuf Betreab Solomon Fantaye Kumssa Hijira Seid Tadesse Aregawi Tilaye Teshome Table of Contents 1Executive Summary3 2Project Scope6 3Expected Benefits8 4Preliminary Project Timeline9 5Preliminary Staffing Requirements10 6Preliminary Risk Assessment11 7Preliminary Assumptions12 8Preliminary Budget13 9This Project And Its Impact On Or By Other Projects14 10This Project And Its Impact On Or By Existing Systems15 11This Project And Its Impact On Or By Existing Infrastructure16 12Recommendations / Next Steps17 13Appendices18Executive Summary The  National Crime Information System (NCIS)  will be the country’s central  database for tracking crime-related information. The project would act as a computerized index of crime and criminal justice information (i. e. – criminal record history information, fugitives, stolen properties, wanted and missing persons) and w ill be available to Federal Police, Regional state Police commissions, Federal Ministry of Justice, Federal Ethics and Anti-Corruption Commission, Federal Prison Administration, Authorized law enforcement agencies and other criminal justice organizations and it will be operational 24 hours a day.The purpose for maintaining the NCIS is to provide a computerized database for ready access by the Federal Police making an inquiry and for prompt disclosure of information in the system from other criminal justice agencies about crimes and criminals. This information assists authorized agencies in criminal justice and related law enforcement objectives, such as apprehending fugitives, locating missing persons, locating and returning stolen property, generating statistical data on crimes and criminals as well as in the protection of the law enforcement officers encountering the individuals described in the system.The project would be involved in eliciting the requirements from Federal Police , Regional State Polices, Ministry of Justice and Other Stakeholders, understanding those requirements and developing a prototype of the application that we have planned to build. The NCIS project will be completed in two years. We plan to achieve maximum automation of crime Investigation process and try to minimize the manual intervention. The system will have a common database in which authorized officers can easily find crime and criminal information anywhere in the country. BackgroundEthiopia has an administrative structure of federal system in which states forming the federation govern themselves through their own legislative, judiciary and executive organs. There are nine regional states and two city administrative councils that form the Government. This necessitates a high degree of coordination among the Federal Government, states and other institutions towards achieving national objectives. The Federal Police which is one of the major law enforcement bodies is expected to p lay a pivotal role in the administration of Crime Prevention and Investigation.However, the absence of a well organized National Crime Information system has remained a major challenge to the Organizations in Criminal Justice to carryout their duties and responsibilities successfully. This reality makes it mandatory to create and develop a well defined and systematized crime data collection method and the establishment of a sustainable Crime Information System that would be used as inexhaustible source of data/information for purposes of crime prevention, criminal investigation, policy formulation etc. Scope (X months or years in duration)The Project will introduce a new Information System; with the following features: †¢ It records and manages the national crimes and criminals information. †¢ Manages and Records missing, wanted persons and fugitives. †¢ Locating stolen properties and missing persons. †¢ Searching and generating statistical report on crimes and c riminals. †¢ Providing information on missing persons and stolen properties for further investigation. Outcomes / Expected Benefits †¢ The NCIS will make available a variety of records to be used for law enforcement and security purposes.These records are made up of a variety of forms of personal and property records. †¢ The information in the NCIS assists authorized agencies in criminal justice objectives, such as apprehending fugitives, locating missing persons, locating and returning stolen property, as well as in the protection of the law enforcement officers encountering the individuals described in the system. †¢ The system will have crime database information which will be centrally available and shared among stakeholders. Make available statistical data on crimes and criminals that would help in providing education to the public on major crimes †¢ Researchers and study centers will have access to the database information relevant for their purpose. à ¢â‚¬ ¢ Make available Statistical data on crimes that would help in revising existing laws and crime prevention directions †¢ Easily allocate data on criminals, missing persons, and lost properties.†¢ Formulates means and methods of criminal statistical data collection, organization , analysis and interpretation necessary to study the causes of crimes and design methods of crime prevention Project Scope Project Name: National Crime Information System (NCIS) | |Project Sponsor(s): |Project Manager: | |Federal Police |Fantaye | |Project Start Date: |Project End Date: | |October 2010 |October 2012 | |Goals / Objectives | |The business goals and objectives for this project will focus on implementing an Information System that: | |Facilitates coordination and information sharing between the major law enforcement and crime prevention organizations of the country | |Facilitates coordinated crime prevention and reduction. |Provides high levels of data security. | |Facilitates the electronic capture of data at its source. | |Eliminate redundant data entry throughout the organization. | |provide a computerized data base for ready access by a criminal justice Organs | | | |Project goals and objectives: | | | |Ensure that end users have input into the design process. |Accomplish project business goals and objectives within defined budget and time parameters. | |Minimize impact to standard business operations within the affected units. | |Craft a favorable and secure agreement between the Department and the selected vendor. | |Background / Narrative | |The absence of a centrally shared information system on crimes and criminals is a major problem for all criminal justices bodies of the country | |to easily allocate wanted persons, locate missing properties and have a realistic statistical data on major crimes.This reality makes it | |mandatory to create and develop a well defined and systematized crime data collection method and the establishment of a sustainable Crime | |Information System that would be used as inexhaustible source of data/information for purposes of crime prevention, criminal investigation, | |policy formulation etc. | |Project Deliverables | |The following are the tangible deliverables for this project: | |Preliminary Project Plan |Requirements Elicitation | |Requirements Analysis | |Architectural Design | |Object/Component Design | |Coding | |Testing | |Final version of all documents | | | |Intangible deliverables | |Security | |Performance | |Availability | |Accuracy | |Completeness | |Project Boundaries | |The project is limited to handle crime and criminal related information.

Saturday, November 9, 2019

John’s Descriptions

Jon’s descriptions may be defined as the only Revelation that describes Antichrist. It is known that this word is not used in other Revelations. Religious communities are interested in revealing who Antichrist is and what influence he has had on religious development and bible compilation. However, Apostle John is the only person who pays attention to Antichrist. John writes that Antichrist is coming: â€Å"Little children, it is the last hour; and as you have heard that the Antichrist is coming, even now many antichrists have come, by which we know that it is the last hour. They went out from us, but they were not of us; for if they had been of us, they would have continued with us; but they went out that they might be made manifest, that none of them were of us†. (1 John 2:18, 19) When John was writing the movement was already present and, therefore, John uses present to prove that the last hour has come. John defines ‘antichrists’ as ex-church member who has abandoned their faith. It means that Antichrist was a Christian, but it was no single individual. Antichrist is liar who denies Jesus the Christ, as well as Father and the Son. John writes that he is not pleased with such people as they have betrayed the real faith. The God can’t be a spirit that denies Jesus Christ. Such spirit is Antichrist and he is present in the world: â€Å"For many deceivers have gone out into the world who do not confess Jesus Christ as coming in the flesh. This is a deceiver and an antichrist†. (2 John 1:7) The teachings of Antichrist aimed at showing that Jesus had not come in the flesh. Many people believed that Christ was divine, but erroneous belief that flesh was evil prevented them from faith expansion. John argues that humanity and divinity of Jesus Christ are central to Christian faith.

Thursday, November 7, 2019

Literature Review Example

Literature Review Example Literature Review – Coursework Example Problem ment Problem ment The problem is that performance evaluations for educators do not always adequately reflect the true effectiveness of the teachers themselves. In an era of increasing scrutiny facing America’s educational system, it is not surprising to know that educators themselves are finding that they are held to a higher standard than in the past. At the same time, there are a variety of external factors that have contributed to the rapid decline in quality of that nation’s school system, and not all of these can be seen as a direct reflection of the quality of teaching and the instructional methodologies implemented into the classroom. As such, there is a growing concern that the performance evaluations being used today are outdated and to not reflect the true nature of the profession. Evaluations are certainly used in nearly every professional occupation as a measure of an employees effectiveness on the job. Teaching, however, is a unique profession wher e employees are expected, to some degree, to be individualistic in their approach to the job in order to bring out their own unique skills and abilities. As such, one evaluation to fit every educator is no longer suitable in an era of increased accountability being faced at all levels. In addition, many evaluations are tied to student performance, both in and out of the classroom, yet such situations are often outside of the control of most teachers. To directly link a teacher’s effectiveness with the ability of their students is creating problems that might be best addressed by evaluating the very educator evaluation system currently in place. ReferencesBoehm, V. (1980). Research in the real world: A conceptual model. Personnel Psychology, 33(3), 495-503.

Monday, November 4, 2019

Mechanism of Black Holes Research Paper Example | Topics and Well Written Essays - 2250 words

Mechanism of Black Holes - Research Paper Example the term â€Å"black hole† refers to a region of space-time from which the gravitational pull is so strong that it does not allow anything, including light, to escape (Begelman, 2003), which implies that black holes cannot be observed. This essay will explore the concept of black holes, that is, all that is currently known about this phenomenon, how they are formed, and what can be learnt from them; similarly, this essay will also highlight how black holes are detected and how they are made. The appearance of an event horizon, the boundary in space-time through which matter and light are attracted inwards towards the mass of the black hole becoming trapped permanently, is the most distinguishable feature of a black hole. As noted earlier, not even light can escape from a black hole since anything that draws nearer and crosses the event horizon boundary is trapped due to the strong gravitational pull that defines black holes (Kormendy, Bender & Cornell, 2011); an event horizon is thus called since if an event occurs within the boundary, this information is never known to an outside observer. Einstein’s theory of relativity argues that the presence of mass distorts spacetime thereby causing the paths taken by particles to bend towards the mass and given that this deformation is so strong at the event horizon, no paths can lead away from the black hole because all matter is trapped inside, including light (Hooft, 2009). Precisely, an object falling into a black hole appears to slow down as it draws nearer to the event horizon but never really reaches it, due to the gravitational time dilation effect (Nrumiano, n.d). Similarly, an outside observer will experience all processes on an object nearing the event horizon as slowed down, and the emitted light will appear dimmer and redder due to the gravitational redshift effect; as soon as the falling object reaches the event horizon, it becomes so dim that it can never be seen. Black holes often form at the ends of the

Saturday, November 2, 2019

Bullying in schools Research Paper Example | Topics and Well Written Essays - 1000 words

Bullying in schools - Research Paper Example Some well-meaning ‘experts’ believe bullying is a normal part of social development and actually aids children in coping with overbearing, dominating types throughout their lives. I believe that bullying is a serious problem and not one to be tolerated. The outcomes of bullying can be very severe; from depression to suicide regardless of which role was played. Thankfully, because bullying behavior typically occurs on a recurrent basis, it can also often be identified and prevented easier and earlier than more deviant behavior in later years, perhaps with the result of a reduction in criminal behavior among adults. Studies looking into the naturalistic behavior of children on the playground indicate that those children who experience low acceptance levels among their peers tend to become bullies. Therefore, it becomes important for teachers to recognize the social structures developing in their classroom to be in better position to head off any dangerous behavior before i t gets out of hand. Intervention strategies can then be used to assist at risk children in learning how best to handle difficult social situations. Field studies have identified several groups with higher risk of bullying behavior as either the aggressor or the victim, which can help teachers in determining when and what form of intervention is appropriate. Barbarin, Oscar A. (November-December 1999). â€Å"Social Risks and Psychological Adjustment: A Comparison of African American and South African Children.† Child Development. Vol. 70, N. 6, pp. 1348-1359. Oscar A. Barbarin, PhD earned his degree in clinical psychology at Rutgers University and finished post-doctoral work in social psychology at Stanford. He is President of the American Orthopsychiatric Association, a Fellow in the American Psychological Association, a Senior Investigator for the Frank Porter Graham Child Development Center at the University of North Carolina and was named the L. Richardson and Emily Preyer