Thursday, November 28, 2019

Earnings Differentials for Women by Full

Introduction In the last 50 decades, there has been a huge shift in the roles of men and women as was previously defined in the traditional societal structure. Initially, women were supposed to take care of children at home, and do other house hold chores. However, this changed drastically within this period, and with policies like the affirmative action, women have gained access to the corporate world.Advertising We will write a custom proposal sample on Earnings Differentials for Women by Full-Time or Part-Time Work specifically for you for only $16.05 $11/page Learn More Currently, women can do virtually anything that men do and they earn just as much as men. The stigmatization has completely died down and the society has come to accept this new role of women. Although some societies, majorly in the Muslim world are yet to give women full liberation, many countries have liberated their women to go after their dreams to the highest limits possible. One such country is United Kingdom, which had even had a woman as their head of state. This was a sign that the limits that were put for women were completely brought down. In their different professions, women earn differently based on a number of factors. Holbrook (2003, p. 45), in his work titled allure of 100 hours a week, says that there is a new crop of women coming up with new zeal to their different professions. When women decided to storm into what was initially a preserve for men, men felt threatened and thought that they would be displaced by these women who, by look of things, were as good in performing their duties as men, but look a little more determined than men. They therefore thought that the only way to beat women in this was to work for an extended period after the normal period in order to be at the top when the pay day comes. This was done bearing in mind that women would be forced to leave for home by five in the evening, specifically because of the need to take care of the children who were left at home. However, this new crop of women has proven beyond reasonable doubt that they are willing to do anything just to ensure that they earn good money.Advertising Looking for proposal on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More This paper seeks to analyze earning differentials for women by full time or part time work. Rationale For a long time, the issue of earnings has raised a lot of heat among different individuals in different places. Labor laws have been developed as a way of regulating they pay of employees to ensure that they do not demand for too much than they can be given by their employers, and that the employers do not give too minimal salaries than should be expected. This ensures a tradeoff between the two. However, because some employees work on full time, while others work on part time basis, there results in earning differentials between the two groups. This st udy seeks to analyze this difference to ascertain the reason behind this and which of the two groups earn better. This study would therefore help explain the reason why many female workers are currently going for part time jobs and not full time. It would help bring out the reasons behind the current popularity of part timers at many of the firms within various cities in the United Kingdom and other developed countries. It would also help explain who stands to benefit between the employer and the employee in the two outfits. Research questions and hypothesis Flint, Woodruff, and Fisher (2002, p. 67) say that a good research should be pegged on one or two specific questions that the researcher seeks to find their answers. This scholar says that research is like a sea of knowledge which is as interesting as they are useful. Getting into a research process without a clear research question would be very dangerous because the researcher would meet many interesting information, most of w hich are irrelevant to the research but appear important all the same. In such a case, the researcher may be tempted to explore such irrelevant information, making him or her drift away from the main focus of the research. In this study, the researcher developed some questions that would help in maintaining the focus of this research.Advertising We will write a custom proposal sample on Earnings Differentials for Women by Full-Time or Part-Time Work specifically for you for only $16.05 $11/page Learn More How much, on average, do a full time female worker earn in United Kingdom? How much, on average, do a part time female worker earn in United Kingdom? Which of the two groups earn higher and why? The above questions would lead us to three hypotheses that the researcher would be confirming or rejecting in the dissertation of this proposal. The hypotheses are as below: H10. Full time female workers do not earn more than part time female workers in Unite d Kingdom H1a. Full time female workers earn more than part time female workers in United Kingdom. H20. There is no comparable difference in earnings of female full time and part time workers in the United Kingdom H2a. There is comparable difference in earnings of female full time and part time workers in the United Kingdom The above hypothesis would help reach out for the desired conclusion in the research dissertation. Scope The purpose of a research is always to help further information available in a given field. A research would always be useful to various individuals in various categories.Advertising Looking for proposal on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More In every research, it would therefore be appropriate that the researcher categorically states the scope of his work in order to help guide users of the paper (Kotler, Keller, Brady, Goodman, Hansen 2009, p. 78). The scope would help such users determine relevance of the paper to his or her field or scenario. This research would be conducted in various cities in United Kingdom. Therefore, it would only be applicable to this setting or a setting in any other nation with a setting that bears resemblance to that of United Kingdom. Our scope was also limited to women, and therefore it may not be appropriate for use in case the other gender in involved Literature Review Issues concerning pay have elicited debate from various quarters. Many scholars have therefore come forth to research on various pay related issues in order to ascertain factors that play off in the process of compensation of workers for their labor input. As Cunningham (2000, p. 36) reports, the cost of living has skyroc keted over the few past years. United Kingdom is one of the nations with the highest cost of living in the world. Because of this, employees have had to demand for a higher pay in order to cater for the extended cost of living. Because many firms may not be able to compensate for the amount of money that an employee would demand, there has been a new trend of workers who prefer working in multiple places in order to earn livelihood. This has seen the number of part time workers increase (Gilbert 2001, p.75). As this scholar notes, in such cases, an employee would be in position to work in more than one place. Cohen, Minion and Morrison (2000, p. 92) agree with this scholar. He says that currently, many employees prefer to work on a part time basis. This would allow them to work in two or more different places, hence earn enough money to cater for increased expenses. The category of workers who prefer these part time jobs are relatively younger. Briggs (1986, p. 94), referring to thi s group as the young and the restless, says that part time jobs offer them job satisfaction. According to him, these youngsters cannot withstand the idea of having to work at the same place over the years. They prefer to move from one job to other always meeting new challenges in their various assignments. According to Bailey (1996, p. 71) the older generation differs from this younger one in various aspects. The older generation looks for assurance. They want to be assured that their work is secure and that under no circumstance would they be laid off unless they are compensated for this. They therefore go for permanent and pensionable jobs under full time basis. The two groups differ in what they are looking for in life. According to Adam and Healy (2000, 58), as the older generation look for job assurance, the younger individuals want fun and challenges in their duties. Because of this, they would prefer different job settings. Ahmed and Rafiq (2002, 19) say that the two groups w ould earn differently based on different parameters. An employee who works on a full time basis is likely to get promotions at a faster rate than the one on a part time basis. These promotions come with increased allowances and the basic pay. As such, an employee who is on a full time basis would earn more than a fellow employee who is working under part time basis in the same firm. However, a full time employee would be tied to the job the whole day and may not be in a position to work in other places. On the contrary, an employee who is on a part time basis can work in to or more other places. Such an employee may end up carrying a larger amount of money home, because from each employer, there is the least amount stated by the law that he or she must get. Andreson, Narus, and Rossum (2010, p. 104) however, do not agree with this notion. They say that an employee who works full time has a better chance of raising the firm leadership ladder hence advancing the career. As such, their earning would be way beyond part time worker, even if such a worker were to get more than two employers. As Atkinson (1990, p. 59) says, because the society has changed and women are determined to be their families breadwinners, they find themselves in the above two categories. This scholar says that younger women would prefer part time jobs as opposed to full time jobs. They have their families to take care of and other obligations. As such, they need jobs that would earn them as much money as would be possible yet gives them time to meet other obligations.. Research Methods This chapter focuses on various aspects of research development. It includes methods of data collection, analysis and presentation. Every research project applies a certain research method to achieve its objectives depending on its goals. The methods used to conduct research in this project compared closely with the methods proposed in the project proposal (Barnes, Blake, Pinder 2009, p. 78) In research, desi gn deals primarily with aims, uses, purposes, intentions, and plans within the practical constraints of time, location, money, and availability of staff (Best 2009, p. 57). In this study, respondents will be briefed in advance. The officials of various identified firms will be given relevant notice by the researcher. The study population will also be amicably informed in order to get prepared for the study. Briefing is important because it would enhance reliability of the study. It is also ethical to inform people before researching on them. The findings would also made public to the researched as one way of ensuring morality in the study. Furthermore, the researcher will observe researcher-researcher ethics by keeping away from criticism. The response rate is expected to be high because the researcher will insist that the study is meant for purely academic purposes. This is expected to encourage many of the respondents to fill in their questionnairs. Research Model This research wo uld utilize quantitative research methods in conducting the study and collecting data (Frankfort-Nachmias Nachmias 1992, p. 70). Quantitative research will be used althrough because it aims at summarizing data mathematically. In this regard, the research took the form of a survey, whereby the researcher identified some individuals and posted questionnaires to them. The sampled population was selected randomly in order to eliminate biases. The researcher made follow-ups by conducting respondents on phone. Interviewing is another method of data collection that was used in this research. The researcher extracted more information from respondents by calling them. Sampling Methods The most applicable sampling method for this exercise was random sampling. Considering that the targeted population consisted of staff in the housekeeping section, there was no much risk of having biased data. If the survey needed to cover the entire staff of the identified firms, systematic sampling coupled w ith stratified sampling would be ideal to ensure cross-departmental representation. However, this survey targeted a section of the staff hence random sampling proved sufficient to collect required data. Secondary Data Used Secondary data for analysis in this project came from various publications. These included reports, journal articles and research publications. Most of it related to the work that other researchers in the field of motivation undertook. The other areas where the literature review covered include theories of motivation and the application of performance pay in various institutions. The nature of material used varied. Journals dealing with specific aspects of motivation provided specific information on specific research elements investigated by researchers. Some reports from intergovernmental organizations proved useful in providing information on the application of performance related pay (Cukor-Avila 2000, p. 39). From these sources, several findings came to the fo re. Primary Data The online questionnaire provided the means of collecting primary data for this project. The survey would cover 15 employees working across various shifts at the identified firms in various departments. This sample is representative of the entire study population. The choice of respondents was by random sampling based on the individual’s willingness to participate. The questionnaire had a mixture of open ended and closed ended questions (Fifield 2007, 50). This design enabled the study to provide as much detail as possible while eliminating the risk of high variance in responses. The administration of the questionnaires took place online because of varying working hours. In addition, it eased access to the questionnaire. After filing in the soft copy, respondents sent it to a designated email address. This measure resulted to reduced costs transport and accommodation. The expenses could be occasioned by physical administration of questionnaires. Moreover, it saved research time because it was easy to transfer the information from a soft copy to the analysis software because the findings were analyzed using a software referred to as SPSS. Finally, it did not generate any paper waste hence contributing to environmental conservation. Validity and Reliability Reliability means appropriateness, applicability and truthfulness of a study. It is the ability of research instruments to produce results that are in agreement with theoretical and conceptual values. In this study, internal validity was ensured through checking the represenativeness of the sample. The researcher ensured that the sample used captured all important characters in the entire stdudy population (Dubois, Jolibert, Muhlbacher 2007, p. 79). External validity was ensured through triangulation that is, the researcher used more than one technique in collecting data. External validity was also guaranteed by asking respondents to give their views. Reliability means that the study is consistent and lacks any ambiquity. It is related to the accuracy of instruments that is, how accurate the measuring device is in measuring what it claims to measure. In this study, it was achieved through increasing verifiability of the perspective. The researcher adopted the principles of coherence, opennes and discourse in order to guarantee reliability. Access The research would take place in three cities in United Kingdom: London, Manchester and Liverpool. The researcher intends to identify two firms in each city where our research would be based. In the identified firms, the researcher intends to have two groups of respondents who would be sampled for the research process. As Edkins and Maja (2009, p. 78) note, at times it may not be easy to reach out for the respondents that are required for a given research. They may be too busy to participate on the research or just unwilling to participate in it for one reason or the other. Having taken this in mind, the researcher ensu red that all the participants that were needed for this research were appropriately involved to ensure reliability. The researcher would seek permission from the identified firms’ authorities and then approach the respondents as individuals. As explained above, the researcher intends to explain to them the purpose of this study and assure them confidentiality in their work (Eggert Ulaga 2002, p. 83). Through this, the researcher aims to gain access to all participants that would be needed in this research. This would help in ensuring that the data collected would be a representation of the entire population. List of References Adam, F Healy, M 2000, A Practical Guide to Postgraduate Research. Blackhall Publishing, Dublin. Ahmed, K Rafiq, M 2002, Internal Marketing tools and concepts for customer-focused management, Butterworth Heinemann Elsevier, Oxford. Andreson, JC, Narus, AJ Rossum, W 2010, â€Å"Customer Value Propositions in Business Markets†, Harvard Business Review, Vol. 1, no. 3, pp 91-99. Atkinson, P 1990, The Ethnographic Imagination: Textual Constructions of Reality Routledge, London. Bailey, A 1996, A Guide to Field Research, California, Forge Press, Pine. Balnaves, M Caputi, P 2001, Introduction to Quantitative Research Methods: An Investigative Approach, Sage Publications, London. Barnes, C, Blake, H Pinder, D 2009, Creating Delivering your Value Proposition, Kogan Page, London. Best, RJ 2009, Market-Based Management Strategies for Growing Customer value and Profitability, New Jersey, Pearson. Briggs, C 1986, Learning How to Ask: A Sociolinguistic Appraisal of the Role of the Interview in Social Science Research, CUP, Cambridge. Bryman, A 2001,Social Research Methods, OUP, Oxford. Cohen, L Minion, L Morrison, K 2000, Research Methods in Education (5th Edition) GB, Routledge, Falmer. Cukor-Avila, P 2000, Rethinking the Observer’s Paradox, American Speech, 75/3, 253-4. Cunningham, B 2000, The stress management sourceboo k, Free Press, Los Angeles. Dubois, P, Jolibert, A Muhlbacher, H, 2007, Marketing Management A Value-Creation Process, Basingstoke, Palgrave Macmillan. Edkins, J Maja, Z 2009, Global Politics: a New Introduction Routledge London. Eggert, A Ulaga, W 2002, â€Å"Customer-perceived value: a substitute for satisfaction in business markets?† Journal of Business Industrial Marketing, Vol. 17, no. 2, pp 107-125. Fifield, P 2007, Marketing Strategy: The Difference between Marketing and Markets, Elsevier Butterworth Heinemann, Oxford. Flint, DJ, Woodruff, RB Fisher, GS, 2002, â€Å"Exploring the phenomenon of customers’ desired value change in a business-to-business context†, Journal of Marketing, Vol. 66 no. 4, pp 102-117. Frankfort-Nachmias, C Nachmias, D 1992, Research Methods in the Social Sciences, Edward Arnold, London. Gilbert, N 2001, Researching Social Life, Sage, London. Holbrook, MB 2003, Customer value and auto ethnography: subjective personal introspec tion and the meanings of a photograph collection, Journal of Business Research, Vol. 58, no. 1, pp 45 – 61. Kotler, P, Keller, KL, Brady, M, Goodman, M Hansen, T 2009, Marketing Management, Prentice Hall, Harlow. This proposal on Earnings Differentials for Women by Full-Time or Part-Time Work was written and submitted by user Emelia H. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Free Essays on Chinese Women

How has the issue of gender superiority evolved in China? The existence of women throughout China’s history was that of total inferiority. As the Chinese society developed women became subordinate to men. Even when death comes, this lesser position was brought out in the discoveries of ancient graves. They showed the wife’s corpse in a bowing position towards her husband. However, the social stature of women in China has grown tremendously compared to 20,000 years ago. In 1949, the Communist government took over China. One of the Communist party’s principles was that of equality for women. This was a big change for the women of China. For the most part, women are given equal rights with men. Especially in large cities. However, this doesn’t apply to 100% of Chinese women. In many areas in China, women are still looked upon as inferior to men. Therefore, the struggle for equality and the end to sex discrimination continues. Since the year 221 BC, the philosophy of China has always been male dominance over women. In the 5th century BC, Chinese philosopher Confucius set three rules for women to follow. The first was â€Å"obedience to the father before marriage, obedience to the husband after marriage, and obedience to the son after the death of the husband.† (Tan p. 11) Chinese history has been traced as far back as 500,000 years ago. However, China has a 4,000 year recorded history. The Chinese lived along the Yellow River 7,000 years ago. They were hunter-gatherers and evidence shows that the society was matriarchal. â€Å"Decent was traced through the women and men lived in the homes of their wives.† (Tan p. 12) Women were respected and all of the children took their mothers’ maiden name. When the Xin dynasty began (2100-1600 BC), attitudes towards women started to change. As society became more stable, the ill treatment of women increased. Men started to take control of the family instead of the women... Free Essays on Chinese Women Free Essays on Chinese Women How has the issue of gender superiority evolved in China? The existence of women throughout China’s history was that of total inferiority. As the Chinese society developed women became subordinate to men. Even when death comes, this lesser position was brought out in the discoveries of ancient graves. They showed the wife’s corpse in a bowing position towards her husband. However, the social stature of women in China has grown tremendously compared to 20,000 years ago. In 1949, the Communist government took over China. One of the Communist party’s principles was that of equality for women. This was a big change for the women of China. For the most part, women are given equal rights with men. Especially in large cities. However, this doesn’t apply to 100% of Chinese women. In many areas in China, women are still looked upon as inferior to men. Therefore, the struggle for equality and the end to sex discrimination continues. Since the year 221 BC, the philosophy of China has always been male dominance over women. In the 5th century BC, Chinese philosopher Confucius set three rules for women to follow. The first was â€Å"obedience to the father before marriage, obedience to the husband after marriage, and obedience to the son after the death of the husband.† (Tan p. 11) Chinese history has been traced as far back as 500,000 years ago. However, China has a 4,000 year recorded history. The Chinese lived along the Yellow River 7,000 years ago. They were hunter-gatherers and evidence shows that the society was matriarchal. â€Å"Decent was traced through the women and men lived in the homes of their wives.† (Tan p. 12) Women were respected and all of the children took their mothers’ maiden name. When the Xin dynasty began (2100-1600 BC), attitudes towards women started to change. As society became more stable, the ill treatment of women increased. Men started to take control of the family instead of the women...

Thursday, November 21, 2019

Homeland Security Preparedness Model Research Paper

Homeland Security Preparedness Model - Research Paper Example Homeland Security Preparedness Model The Steering Committee including the Managing Director, the Chief Security Officer and the Chief HSE Officer will design and lay down the plan. And will review the plan and its implementation annually so as to identify any weaknesses in the plan, or control weaknesses in the implementation of the plan and take immediate steps to change them. The Safety Officer will, on a random basis, quiz staff members concerning the Emergency Preparedness Plan and their roles in any drill. This process serves as a source of feedback, which the Safety Officer can use for evaluation of the overall effectiveness of the program. First and the foremost step of the prepared plan are to conduct a Hazard Vulnerability Analysis. Evaluate every possible event in each of the three categories of probability, risk, and preparedness. Add additional events as necessary. A Hazards Vulnerability Analysis can be conducted on need to need basis, and by the committee made for this purpose by the steering committee. Th e report and findings of the analysis shall be submitted to and discussed with the steering committee on monthly basis, until the analysis is final and final report is presented to the steering committee. The Hazards Vulnerability Analysis assists the organization in determining to which hazards it is most vulnerable and to which it is least vulnerable.The inventories prone to catching fire shall be kept in the room where fire detection, protection and extinguishing controls are the most effective and efficient. Communication Channels: Following are the ways in which the employees will be warned and communicated of the hazards or emergency situations: 1. Alarms: The alarm will ring continuously for 2 minutes and then with varying pitch for 5 more minutes. 2. Loud Speakers: Announcements to be made in the speaking language of the employees as well as in the local language so as to facilitate the non-executive staff. Staff Trainings : Employees must know what to do at the time of emer gency, to ensure that this happens, following trainings must be conducted: a. The general overview of the plan, so that the employees know what is in the plan, what actually is a disaster / emergency and how to proceed step by step at the time of a disaster or emergency. Must be conduct once annually and can be conducted half yearly too. b. The training to understand the evacuation and drills,

Wednesday, November 20, 2019

Reward schemes tend to be the most effective way of promoting and Essay

Reward schemes tend to be the most effective way of promoting and achieving the aims of Ecotourism, Discuss - Essay Example Consequently, it is fundamental to agree on the most suitable ecotourism strategies and approaches. Ecotourism Ecotourism involves visiting pristine, fragile and natural areas that are not distorted by humans. Ecotourism is small scale and has low environmental impacts compared to mainstream commercial tourism. It also involves responsible travelling to natural sites with an aim of preserving the surroundings and improving the welfare of the local people residing in such areas. The main purposes of ecotourism in to volunteer, learn and personal growth of the participants (United Nations Environmental Program 2011, p. 1). Additionally, it minimises the negative environmental impacts that mainstream tourism causes. It also promotes the cultural integrity of the local people. The participants in the ecotourism industry participate in recycling, conserving water, saving energy besides creating economic opportunities for the local people (Kotas 2009, p. 53). Ecotourism existed because of the prevailing problems in the tourism industry. The interest in ecotourism is the need to conserve wildlife facing extinction. There have been increased cases of invasion of natural habitats for agricultural purposes, fishing, logging and hunting. Although many countries have officially reserved areas for conservation, they lack enough funds for protecting and managing them. Consequently, several destructive activities are happening in these areas. Consequently, ecotourism is interested in restoring the values and the genetic reservoirs of vital biological resources (Buhalis 2002, p. 1). Reward scheme A reward scheme is an arrangement that an organisation provides to clients and other stakeholders in its industry aimed at encouraging them to appreciate and take part in activities that improves their welfare and community members. The focus of any reward scheme is to prioritise initiatives for customer care, initiate corporate social responsibility and strengthen communication strat egies. Principles of reward schemes A reward scheme is hard to design and run because of the many challenges that characterise its execution. The challenges include the difficulty in getting tourists to sign up and join the scheme. It is also not easy to change the behavior of tourists towards this scheme because they focus on pleasure. However, it is necessary that an organisation follow several principles to ensure the creation of a comprehensive reward scheme. Organisations reward their clients differently based on the nature of clients and the organisation (Barbera & Dutta, 2008, p. 59). The initial standard is to ensure that the rewards currency is relevant to the organisation. An organisation must ensure that the rewards are directly linked to products and services. The perspective of the tourists must be the key driving force in such a situation. The second principle is to communicate the burn instead of the earned. One of the objectives of a reward scheme is to ensure that t ourists acquire points as they purchase the products and enjoy the services of their host organisation. These points are exchanged with rewards. Most tourists are not always aware of the exact worthiness the points earned. They are only concerned with the benefits from the points. This means that communication plays a fundamental role when distinguishing and empowering the tourists (Fennel2007, p. 93). An organisation can achieve

Monday, November 18, 2019

Report on TETRA Technology in 5 Questions Essay

Report on TETRA Technology in 5 Questions - Essay Example (Dunlop, Girma and Irvine, 1999; ET Industries, n.d.) â€Å"TETRA offers the automatic operation and frequency efficiency of trunking combined with the terminal autonomy of a conventional PMR1. TETRA has a multi-mode capability by combining these two modes, trunking and direct (conventional), into a single terminal equipment, and it also provides the standardised way of inter-working between these two modes.† (Net Resources International, 2011) TETRA is thus designed to provide bandwidth-on-demand by which a variable quantity of bandwidth can be allocated for the call duration as per the application conditions set. TETRA functions through reference points and functional configurations, and flexibility of standards is maintained inside the network environment. (Dunlop, Girma and Irvine, 1999) TETRA has wide spectrum utilities and it is perhaps best suited to establish critical mobile radio networks capable to handle emergencies. Who use it and why is it used? The technical spec ifications provided by TETRA are actually guided by a comprehensive set of end user necessities. As a result â€Å"most of the potential user groups of this network technology have been identified from the inception of the standard. Communication features such as group call, Direct Mode Operation, and numerous emergency-oriented supplementary services are all driven by end user demands during the standardisation process.† (Dunlop, Girma and Irvine, 1999) In such a state of affair, TETRA has scope for both the individual users and a wide variety of user groups. TETRA user groups are described below: Table – 1: TETRA User Groups Source: Dunlop, Girma and Irvine, 1999, p. 162 Inclusion of so many user groups in the TETRA networking realm proves that TETRA is extremely useful, flexible and dynamic. The main reason of popularity and diverse usability of TETRA is its multiple application support. â€Å"TETRA supports point-to-point and point-to-multipoint communications bot h through the TETRA infrastructure and by use of direct mode without infrastructure.† (Net Resources International, 2011) To this extent TETRA can use applications like Voice over Internet Protocol (VoIP) too. For non-voice applications, the major application types of TETRA are video and multimedia application and data-oriented application. Moreover, it is interoperable with GSM, CDMA, UMTS, etc. network architectures. (Plans, Paradells and Gomez, 2006) What are the TETRA components systems? â€Å"Most system descriptions are based on a conceptual representation of functional configurations and reference points, which is a widely adopted methodology of describing the interconnections of components within a network system.† (Dunlop, Girma and Irvine, 1999, p. 161) Using this approach, it becomes essential to understand the interfaces in the TETRA standard. These interfaces through which TETRA components systems inter-communicate are described below: Figure – 1: In terfaces in the TETRA Standard Source: Bekkers, 2001, p. 382 Moreover, the standards for TETRA are related only with the peripheral environment of a TETRA system, referred to in the standardisation guide as Switching and Management Infrastructure (SwMI). Figure – 2: Functional Network Configuration of a TETRA SwMI Dunlop, Girma and Irvine, 1999, p. 164 With the help of the above network configuration diagram, we can find out six principle TETRA

Friday, November 15, 2019

Nano Reinforced Filaments for Additive Manufacturing

Nano Reinforced Filaments for Additive Manufacturing Nomenclature: Summary: Fused Deposition Modelling (FDM) is a popular technique for Additive Manufacturing (AM). FDM is used for fabrication of thermoplastic parts used for rapid prototyping with advantages like low cost and minimal material wastage. The objective of this project report is to understand different properties of reinforced extruded polymer filaments. The process includes the mixing of carbon nanotubes with polymer filament such as PLA and investigating different properties i.e. mechanical properties and use these new filaments for FDM (Fused Deposition Modelling) machines. CNT blended polymers are lighter but stronger materials then typical PLA. This new material has outstanding mechanical properties which includes extreme tensile strength and Youngs modulus. The blending of CNT with PLA is shown in this report through microscopy. The experiment includes PLA with different composition i.e. simple PLA,0.1% CNT,0.2% CNT,0.5%CNT and 1%CNT. The tables show the relationship between shear rate and shear viscosity of materials with different compositions achieved through rheology. The rheological behaviour of CNT composite melt was also examined at two different temperatures i.e. 190 °c and 195 °c. The graph represents the This report is going to present the results achieved by MFI (Melt Flow Index) and Rheology to see if the material is stronger than any typical polymer, so that it can be used for Additive Manufacturing. The technology of Additive Manufacturing (AM) is rapidly emerging as alternative to conventional manufacturing techniques. Industry is increasingly looking at it as a means of producing finished articles rather than simply for prototyping. One of the main AM techniques is Fused Deposition Modelling (FDM) in which a polymer filament is melted and progressively extruded to create a 3D plastic part. AT present a relatively small number of polymers may be successfully used with conventional FDM machines and this is limiting the ability of the process to expand into new markets. 1.1. Additive Manufacturing: Additive manufacturing (AM) is the name given to a group of emerging technologies that create objects from the bottom-up by adding material one cross-sectional layer at a time. [[i]] A three-dimensional solid object of virtually any shape can be manufactured from a digital model. The adaptation of such a technology will result in engineers having to invest less time dealing with manufacturing constrains and will give them almost unlimited design freedom. However, up to now, despite all positive aspects, no single 3D printer has been able to print using different materials. Additionally, while various materials can be used in AM, their material properties, such as strength, electrical conductivity and thermal conductivity typically have inferior properties compared with conventionally manufactured counterparts due to the anisotropy caused by the layer-by-layer approach. Many studies have reported on the incorporation of nanoparticles for the creation of new printing materials for AM. Metal nanoparticles [ii]], Nano-sized carbon black powder [iii]], carbon nanotubesand ceramic nanoparticles have been used in the past. Manufacturers across different industries are utilizing this digital manufacturing procedure to create a range of items, including: motor parts for car applications, impellers and blades for aviation use, design less sand moulds for pumps utilized as a part of the oil and energy industry, and medical prosthetics which require effectively versatile design adjustments. 1.2. Carbon Nano-Tubes: Carbon nanotubes (CNTs) take the form of tube shaped carbon atoms and have novel properties that make them potentially valuable in a wide variety of utilizations in nanotechnology, hardware, optics, and different fields of materials science. They show exceptional quality and one of a kind electrical properties, and are good conductors. Inorganic nanotubes have also been combined. Manufacturing a nanotube is subject to applied quantum science, particularly, orbital hybridization. Nanotubes are composed altogether out of sp2 bonds, like those of graphite. This holding structure, stronger than the sp3 bonds found in diamond, gives the atoms their exceptional quality. Nanotubes adjust themselves into ropes held together by Van der Waals forces. Under extreme pressure, nanotubes can combine, exchanging some sp2 bonds for sp3 bonds, giving incredible probability for creating solid, unlimited-length wires through high-weight nanotube association. [iv] Carbon nanotubes (CNTs) are allotropes of carbon with a tube-shaped nanostructure. Nanotubes have been developed with length-to-distance across proportion of up to 132,000,000:1, fundamentally bigger than for any other material. These round and hollow carbon atoms have abnormal properties, which are invaluable for nanotechnology, gadgets, optics and different fields of materials science and innovation. Specifically, owing to their unprecedented thermal conductivity and mechanical and electrical properties, carbon nanotubes find applications as added substances to various structural materials. For example, nanotubes form a tiny bit of the material(s) in a few (basically carbon fibre), golf clubs, or auto parts. [v] Nanotubes are classified as single-walled nanotubes (SWNTs) and multi-walled nanotubes (MWNTs). Singular nanotubes normally adjust themselves into ropes held together by van der Waals strengths, more particularly, pi-stacking. The theoretical concentration of carbon nanotubes required to reach the electrical percolation threshold for a CNT/Polymer composite can be obtained, as a first step, using the power law: where à Ã†â€™ is the electrical conductivity, à Ã¢â‚¬   is the MWCNT volume concentration in the nanocomposite, is the critical MWCNT volume concentration at electrical percolation, and ÃŽÂ ± is a critical exponent. [vi] The aim of this project is to investigate the use of carbon-nanotubes (CVTs) as a reinforcement in the extruded polymer filaments used in FDM. The intention is to create a new polymer nanocomposite blends that will enable parts produced by FDM to have wider ranges of properties. CNTs have the potential to significantly enhance mechanical properties without significantly increasing the viscosity of the polymer melt and the ease of production of filament and its performance in FDM. Objectives: The primary objective is to find the MFI (Melt Flow Index), the rheological properties of different CNT compositions. The MFI and Rheology tests should show the melt flow index, viscosity and shear rate. With the help of the these tests the viscoelastic properties can determine the mechanical performance of the final products. The results will show how adding carbon Nano-tubes in thermoplastics can change its mechanical properties like tensile strength, yield strength and youngs modulus. 3D printing or additive manufacturing (AM) is any of different processes for making a three-dimensional object of any shape from a 3D display or other electronic information source fundamentally through additive processes in which progressive layers of material are set down under PC control. Early AM hardware and materials were created in the 1980s. In 1984, a procedure created known as stereo lithography employing UV lasers to cure photopolymers by Chuck Hull of 3D Systems Corp. Hull created the STL file format, which is widely acknowledged by 3D printing programming. Metal sintering types of Additive Manufacturing were being created, (for example, specific laser sintering and coordinate metal laser sintering), although they were not yet called 3D printing during 1980s. In 1990, the plastic extrusion innovation most broadly connected with the expression 3D printing was marketed by Stratasys under the name Fused Deposition Modelling (FDM). [vii] Originally created at the Massachusetts Institute of Technology in 1993. 3D printing innovation frames the basis of Z Corporations prototyping procedure. 3D physical models are created by 3DP technology by setting layers of powder deposition utilizing a fluid binder. 3DP technology is versatile and fast processing geometry of extreme complexities in numerous applications, which support different types of material. Z Corp. pioneered the 3DP innovation creating 3D printers that manufacturers use to introduce early concept models and prototypes. Using 3DP innovation, Z Corp. has created 3D printers that work at extraordinary rates, amazingly low expenses, and inside an expansive scope of uses. Additive Manufacturing innovations discovered applications beginning in the 1980s in product improvement, information representation, manufacturing and rapid prototyping Their expansion into generation (job production, large scale manufacturing, and manufacturing) has been being worked on in the decades since. Modern production roles within the metalworking businesses accomplished noteworthy scale without precedent for the early 2010s. [viii] Besides all the advantages of Additive Manufacturing, it has also some disadvantages which includes its slow building rates as printers lay down material at speed of one to five cubic metre per second, parts can only be printed one at a time which can prevent economics of scale and higher production costs. [ix] Fused Deposition Modelling (FDM) is a technology which is based on layers of strands of semi molten thermoplastics placed on top of each other in a 3-dimentional shape. FDM is a developing technology which is currently used in rapid prototyping and manufacturing. FDM is commonly known as an additive process, which is made by expelling material into layers which are controlled by a PC to form the final shape. Some FDM machines permit the client to control different parts of the layering procedure, for example, layer thickness, air hole between extrusions, angles of contour, and extrusion width. These straightforwardly affect the last shapes mass, thickness, quality, solidness and penetrability. [x] AM is creating to meet the demands for sturdy new parts, which need to comply with specific mechanical and design requirement. Along thermal properties, new printing materials must have appropriate rheological and thermal properties to be ready to be extruded and solidify while keeping up the exactness of successive layers. The utilization of polymers in additive manufacturing are represented by the transition of glass temperature, malt viscosity, heat capacity and the shear stress of the material. Understanding the relationship between the basic properties will help in the improvement of advanced printing materials and filaments. The glass transition temperature (Tg) is the temperature beneath which the polymer gets to be weak and hard like glass. The glass transition temperature is not the melting point, that is characterized by the temperature at which crystalline or semi-crystalline polymers transform from its crystal structure to its liquid state. Poly-Lactic Acid (PLA) is a biodegradable and low toxicity thermoplastic which is made up of lactide or lactic acid monomers. Poly (vinyl acetate) PVA is also a biodegradable thermoplastic polymer which is synthesized by the hydrolysis poly vinyl acetate (PVAc) because of tits instability of vinyl alcohol monomer. Polycaprolactone (PCL) is polymerized from caprolactone monomer. PCL is hydrophobic in nature and is soluble in chloroform, which biodegrades in the presence of microorganisms. [xi] Figure 1: PLA, PVA and PCL [xii] 3DXTech is a company that provides filaments containing carbon nanotubes. Their 3DXNano  ESD ABS filaments (containing MWCNTs) are available with diameters of 1.75 mm and  2.85 mm. The filament is tailored toward applications that require electrostatic discharge  (ESD). The filament is produced using MG-94 Premium ABS and mixed with MWCNTs, and  process/dispersion modifiers. Nanocyl are one of the worldwide leading experts in CNT based materials, producing research  and industry grade carbon nanotubes. One of their product lines, PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢, is a collection  of carbon nanotubes, thermoplastic concentrates for applications requiring electrical conductivity  with good mechanical properties. Current Progress of their Polymer Composites and are available in a diverse range of thermoplastic resins, including PC, PP, PA, PET, HDPE, and others. Although these enhanced thermoplastics were not specifically aimed at the FDM sector, they have a formulation that makes them applicable, subject to the temperature range of the extruder. PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢ can be used in many applications and a surface resistivity range of 1-1012 ÃŽÂ ©, and the typical loading for static dissipative applications are around 2-3% of CNTs in the final compound. [xiii] A table shows some of the commercially available carbon nanotube based materials. Table 1: Companies that provide filaments and pellets containing carbon nanotubes. Company Product 3DXTech 3DXNanoà ¢Ã¢â‚¬Å¾Ã‚ ¢ ESD ABS + Carbon Nanotube Filament 3DXNanoà ¢Ã¢â‚¬Å¾Ã‚ ¢ ESD PETG + Carbon Nanotube Filament Functionalize F-Electric Functionalize F-Electric filament (PLA Carbon Nanotube) Filabot MWCNT1 Multi Walled Carbon Nanotube Pellets Cheap Tubes Inc. Carbon Nanotube Masterbatches CNT-ABS-10 Nanocyl PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢ ABS 1501* PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢ HIPS 1001 PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢ PC 1501 PLASTICYLà ¢Ã¢â‚¬Å¾Ã‚ ¢ PP 2001 Design of Experiment: As it can be understood, the strength of polymer composites is improved due to the amount of carbon nanotubes added in with PLA. For this research, different compositions of CNT polymer are tested at two temperatures i.e. 190 °C and 195 °C. The set of experiments decided for this research were MFI (Melt Flow Index), Rheology and Microscopy. MFI (Melt Flow Index): ISO 1133-1:2011 governs the procedure for the measurement of the melt flow rate. [xiv]] MFI (Melt Flow Index) is a measure of the ease of the melt flow of thermoplastic polymers. It is defined as mass of polymer, in grams, which is flowing through a tube of specific diameter and length by a pressure applied via specific weight. (A.V. Shenoy D, R. Saini 1986). It is an indirect method of measuring molecular weight, with respect to melt flow. MFI is inversely proportional to the viscosity of the melted polymer, [xv]] as the viscosity depends on the specific weight applied. In this test granules of the specimens are packed into a barrel at the bottom of which there is a 2.0955mm diameter 8mm long die. The polymer is heated for a specific period and then the amount, which flows through the die during a specifies time and under a specific mass, is measured. Melt Flow rate used for PLA and CNT are measured at 190 °C and 195 °C. MFI test is a single point test, which only show s a single value on shear rate vs. Viscosity graph. Rheology: The study of polymer rheology testing is to investigate how the stresses in polymers or the applied force is related to the deformation of polymer and its flow. The science of rheology itself is quite complex, however, the rheograms produced by this technique are useful in determining the effect on melt viscosity of temperature. Capillary rheometer consists of a barrel which is temperature controlled incorporating two bores of different diameters. During the polymer melt, the pressure applied through the dies is recorded. [xvi]] The understanding of polymer rheology through laboratory testing can help see the presence of liquid-like behaviour which depends on the applies load. The information collected through rheology can help optimise the material for FDM (Fused Deposition Modelling). As the melt flow depends on the viscosity of the material. The tests are performed when the polymer is going through melt phase. Microscopy: Microscopy is a field of using microscope which helps in viewing objects and areas which cannot be seen through naked eye. The analysis of microscopy provides a mean to study and characterize the micro and Nano-structural features of polymers. [xvii]] In this experiment, an optical microscope is used to observe the structure and chemical composition of CNT with PLA. Microscopy of CNT compositions are compared with simple PLA material. Because of the microscopy, the porosities and blending of polymers can be seen. The technique can be helpful in determination of the causes of failure. Methodology: Figure2: Twin Screw Haake Extruder [xviii] MFI (Melt Flow Index): After turning on the Kayeness Galaxy Melt Flow Indexer a die of 2.0955mm was dropped into the bottom of the barrel. A melt time was set up at 360 seconds and number of cuts as well. In this experiment the number of cuts were 3. Temperature was first set at 190 °C. Once the barrel reached the temperature, the granules of 0.1% CNT + PLA were poured into the barrel periodically packing with the tamping tool to remove the trapped air. Piston was placed into the barrel and a weight of 2160g was placed. In accordance with ASTM D1238-95. Note: Piston rod weighs 100g and this was taken into the account. After the program started the piston starts to drop. High polymers are required a plug to prevent run-out of the polymer during polymer melt period. After melting time was over, Run button was pressed and the extrudate was cut simultaneously across the orifice face. A timer counts the test time on the front panel; it will bleep when it is nearing the end of the melt time. As the number of cuts were 3, step 6 was repeated two more times. The extrudates obtained were then weighed and recorded for finding the value of MFI (Melt Flow Index). Once all the material was purged from the barrel, it was then cleaned with cotton swatches and bronze brush. To get the MFI value of 0.2%,0.5%,1% and 100% PLA, the procedure was repeated for every composition. Another set of values were also obtained at 195 °C by repeating the experiment. The MFI machine used for the experiment is shown below. Results: Table 1: Results from MFI (Melt Flow Index) at 190 °C Compositions Temperature ( °C) Specific Weight (g) Reading 1 (g) Reading 2 (g) Reading 3 (g) Average (g) MFI (g/10 min) [average*10] 100% PLA 190 2160 0.1163 0.1169 0.1185 0.1172 1.172 0.1% CNT+PLA 190 2160 0.1222 0.122 0.1219 0.122 1.22 0.2% CNT+PLA 190 2160 0.1196 0.123 0.1213 0.1213 1.21 0.5% CNT+PLA 190 2160 0.1181 0.1193 0.1161 0.1178 1.16 1% CNT+PLA 190 2160 0.1082 0.1082 0.109 0.1085 1.09 Table 2: Results from MFI (Melt Flow Index) at 195 °C Compositions Temperature ( °C) Specific Weight (g) Reading 1 (g) Reading 2 (g) Reading 3 (g) Average (g) MFI (g/10 min) [average*10] 0.1% CNT+PLA 195 2160 0.158 0.1622 0.1636 0.1612 1.613 0.2% CNT+PLA 195 2160 0.1708 0.167 0.1641 0.1673 1.673 0.5% CNT+PLA 195 2160 0.1534 0.1507 0.1628 0.1556 1.556 1% CNT+PLA 195 2160 0.132 0.1304 0.1322 0.1315 1.315 [i] Standard Terminology for Additive Manufacturing Technologies, 2010, ASTM International West Conshohocken,PA., Available at: (Accessed: 09/11/2016) [ii] Crane, N.B., Wilkes, J., Sachs, E. and Allen, S.M., Improving accuracy of powder-based SFF processes by metaldeposition from a nanoparticle dispersion, Rapid Prototyping J., 12, 266-274 , Available at: (Accessed: 09/11/2016). [iii] Athreya, S.R., Kalaitzidou, K. and Das, S., Processing and characterization of a carbon black-filled electricallyconductive nylon-12 nanocomposites produced by selective laser sintering. Material Science Engng. A, 527, 2637-2642, Available at: (Accessed: 09/11/2016). [iv] https://en.wikipedia.org/wiki/Carbon_nanotube, Available at: www.wikipedia.org(Accessed: 09/11/2016). [v] https://en.wikipedia.org/wiki/Carbon_nanotube, Available at: www.wikipedia.org(Accessed: 09/11/2016). [vi] http://www.intechopen.com/books/carbon-nanotubes-current-progress-of-their-polymer-composites, Available at: www.intechopen.com (Accessed: 09/11/2016). [vii] http://www.slideshare.net/arjunrtvm/seminar-fair-report?qid=309c4d95-7e77-4f42-bb10-b747514d9a15v=b=from_search=1, Available at: www.slideshare.net(Accessed: 09/11/2016). [viii] http://www.slideshare.net/arjunrtvm/seminar-fair-report?qid=309c4d95-7e77-4f42-bb10-b747514d9a15v=b=from_search=1, Available at: www.slideshare.net(Accessed: 09/11/2016). [ix] http://compositesmanufacturingmagazine.com/2014/10/pros-cons-additive-manufacturing/2/, Available at: (Accessed: 09/11/2016). [x] httpsetd.ohiolink.edu!etd.send_fileaccession=osu1396441215disposition=inline,Available at: (Accessed: 09/11/2016). [xi] http://www.intechopen.com/books/carbon-nanotubes-currentprogress- of-their-polymer-composites, Available at: www.intechopen.com (Accessed: 09/11/2016). [xii] http://www.google.com/patents/US20130210959 (Acessed: 09/10/2016). [xiii] http://www.intechopen.com/books/carbon-nanotubes-currentprogress- of-their-polymer-composites, Available at: www.intechopen.com (Accessed: 09/11/2016). [xiv] ISO Standard, Available at: https://www.iso.org/standard/44273.html (Accessed: 20/02/2017). [xv] MFI (Melt Flow Index), Available at: https://en.wikipedia.org/wiki/Melt_flow_index (Accessed: 20/02/2017) [xvi] Rheology, Available at: http://www.azom.com/article.aspx?ArticleID=2795 (Accessed: 20/02/2017). [xvii] Microscopy, Available at: http://www.intertek.com/polymers/microscopy/ (Accessed: 20/02/2017). [xviii] Extruder, Available at: http://www.rheologysolutions.com/wp-content/uploads/2011/05/ts_polylab_extruder_twin1.jpg (Accessed: 20/02/2017).

Wednesday, November 13, 2019

Essay on Shirley Jacksons The Lottery - Inhumanity Exposed

Inhumanity Exposed in The Lottery The story entitled "The Lottery," written by Shirley Jackson is an intriguing and shocking parable. "The Lottery" is set in a small village on a clear summer day. Written in objective third person point of view, "The Lottery" keeps the reader in suspense as the story progresses. The story begins June 27th on a "clear and sunnyfull-summer day." From the very beginning, irony occurs in the story. The author describes the day as "clear and sunny, with the fresh warmth of a full-summer day; the flowers were blossoming profusely and the grass was richly green." To describe such a beautiful day when the ending is so ill fated, is very ironic. The villagers, all three hundred of them, gather in the square. There is a feeling of excitement and relative normalcy as the people talk of their everyday happenings. The lottery is conducted by Mr. Summers, as he is the one that directs the "civic activities" of the town. The night before the lottery, all of the families have their names placed in a black box. The day of the lottery, Mr. Summers has each head of family draw a slip of paper from the box. When each family has selected a slip, they all open the papers together. The Hutchinson's are the "winners." The process then repeats but this time, ... ...lso to show the dark side of American society and what it is capable of. This is similar to other points in history, such as: slavery, the Salem witch trials, and the extermination of the American Indians. All three of those examples involve inhumanity without the usual American apathy. Though inhumanity does exist, it is usually without active support. However in the examples mentioned before, people acted on their ordinarily latent barbarity. The Holocaust is another parallel to "The Lottery." The senseless genocide of the Jewish populace is very much similar to the ridiculousness of the lottery. In essence, "The Lottery," is a mirror of the human subconscious.

Sunday, November 10, 2019

Hong Kong International Airport Is the Main Airport in Hong Kong

Kong International Airport (HKIA) is the main airport in Hong Kong; it is an important regional trans-shipment centre, passenger hub and gateway between the Mainland China and the rest of Asia. And HKIA is the primary hub for several domestic airlines, such as Cathay Pacific Airways, Dragonair, Hong Kong Express Airways, etc. Review the history, HKIA has won seven Skytrax World Airport Awards for customer satisfaction in just ten years (Skytrax, 2010), the second busiest airport in the world in terms of cargo traffic and the 13th busiest airport worldwide in terms of passenger throughput in 2009 (Airports Council International, 2010).This is the strong evidence to proof that HKIA was entering to the World-Class International Airport and we can estimate its development effectively. In this essay, I will go to evaluate the hub airport development of the Hong Kong International Airport, also try to analyze the overall performance and the relevant statistics with other major hub airport to make the comparison and some opinions. The passenger throughput and cargo traffic in HKIA is developed in  tremendous speed in past 10 years.In view of this, the Airport Authority Hong Kong was going to build up some supporting facilities to strengthen its competitiveness, such as Terminal 2, North Satellite Terminal, SkyPier and planning to construct the third runway, etc. This is a very active operation to maintain and develop the position as a hub airport while compare with other major hub airport around the world. There are several major hub airports in Southeast Asia, like the Singapore Changi Airport and the Beijing Capital International Airport, etc.No matter what the passenger and cargo throughput, facilities, connection architecture and awards; it is competed so intensively with the HKIA. First of all, I will go to analysis the development trend of passenger throughput in the HKIA. In the early of 2000’s, the operation of HKIA was back on the train after the tra nsition period from the Kai Tak Airport. Base on the statistics, the total passenger in 2001 was 32,546,029 and ranking 17 (Airports Council International, 2002). After one year, the throughput increase 4. 1% to 33,882,463 and the ranking climb to 15 (Airports Council International, 2003).But in 2003, the passenger drop about 20% to 27,092,290 since the influence of SARS (Airports Council International, 2004). The HKIA was suffered a huge loss in this year, such as the passenger, cargo and economic, etc. Luckily, the recession has to undergo only one year, and it rise up again in the next year. In 2004, the PAX increase 25. 5% to 36,711,920 (Airports Council International, 2005), and the trend continues to increase until 2009. The other statistics which in 2005 increase 9. 7% to 40,269,847 (Airports Council International, 2006), 2006 increase 8. % to 43,857,908 (Airports Council International, 2007), 2007 increase 7. 3% to 47,042,419 (Airports Council International, 2008), 2008 incr ease 1. 7% to 47,857,746 (Airports Council International, 2009). And the trend was adjust lightly in 2009, which is decrease 5% to 45,499,604 (Airports Council International, 2010). The phenomenon was anticipated since the outbreak of H1N1 influenza made the economic slowdown in whole world. Apart from these passenger throughput data, we can analysis the HKIA was very successful as a passenger hub airport, even in Asia.Since the passenger flow was increase equably in past 10 years. And its ranking is good enough which represent the Asia hub airport. And here is the diagram to compare the PAX throughput between HKIA and Changi Airport. [pic]The above diagram shows the passenger traffic comparison between two major hub airports in Asia. Both of them are keeping the ascending trend since 2002, and the top 30 ranking. As we know that, the Singapore Changi Airport had the long term history and winning over 340 awards in a 20-year period from 1987 to 2007.Also, with  80 airlines serving 200 cities in 60 countries, Changi Airport established itself as a major aviation hub in the Asia Pacific region (Changi Airport Group, 2009). But when we look back the passenger throughput in HKIA; it was higher than Singapore Changi Airport about 6,000,000 to 8,000,000 in the past 10 years averagely. The most important is the HKIA just go though the 10 year’s history. It can prove the development of HKIA is very high-speed and prosperity. [pic] Secondly, it is the cargo traffic comparison between the HKIA and Changi Airport. The diagram shows above is the total cargo statistics from 2009 to 2009.Base on the diagram, it is no doubt to prove that the HKIA is acting the leader position in Asia, even in the World since 2002. The cargo traffic was above 2,500,000 tones from 2002, and continued to rise above 3,000,000 from 2004 and until to 2009. And the HKIA keeps the second ranking in the World's busiest airports by cargo traffic since 2002, just behind the Memphis Internation al Airport (Airports Council International, 2003~2010). When compare the cargo traffic with the other busiest cargo airports in Asia – Changi Airport. We can clearly perceive the outcome and difference.Although the history of Changi Airport is longer then HKIA, and it introduced the Air Hub Development Fund in 2003 (Net Resources International, 2010) to attract the airlines and push up the cargo traffic. But the total cargo traffic in the past 8 years was still fall behind HKIA distantly, and the gap becomes has widened in these several years. This is the best statistics to verify that the HKIA is the successful hub airport in the cargo side. Moreover, it is the new development in HKIA. It officially launched two new facilities in January 2010, which are the SkyPier and the North Satellite Concourse.For the Skypier, the temporary SkyPier was made available in 2003. It assists the movement of passengers between HKIA and the Pearl River Delta (PRD) region. With an extensive air network of 150 destinations,  HKIA has also served well the air transportation needs of the PRD, meeting the economic development needs of Hong Kong and contributing to Mainland's economic growth over the past three decades (HKIA Press Releases, 2010). And the AA has invested over HK$1 billion in the construction of a new North Satellite Concourse (HKIA Press Releases, 2009).It is designed to serve more than five million passengers a year at the initial stage. And ensure the same level of service for the passengers who flying on smaller aircraft (HKIA Press Releases, 2009). Refer to the Executive Director in Airport Authority Hong Kong, said, â€Å"HKIA is dedicated to providing top-notch service and facilities to enhance its competitiveness as a regional and international aviation centre. With the new satellite concourse, less than 10 flights will need to be parked at remote bays every day compared to the current 40 to 50.This means more passengers can embark or disembark their aircraft in a pleasant, weatherproof environment, sparing them the inconvenience of being exposed to hot or rainy weather† (HKIA Press Releases, 2009). The director has briefly explained the objective and function of the North Satellite Concourse. Evidently, the growth project is using to enhance service levels, pave the way to meet future demand and strengthen the connection with the PRD network. Also deepen the role and position as a hub airport around the world.In conclusion, the passenger throughput, total cargo traffic and the facilities development in HKIA has expand quickly in the past ten years. And all the relevant statistics, ranking, awards and reputation has the sustainable increase. It is the positive outcome and result to evaluate the development of the HKIA as a hub airport, also HKIA is the famous, guarantee airport for all the local and foreigner.HKIA Opens New Passenger Concourse to Enhance Service. Retrieved 20 April, 2010, from http://www. hongkongairport. com/eng/media/press-releases/pr_981. html HKIA Press Releases (2010).Airport's New SkyPier and North Satellite Concourse Officially Opened. Retrieved 20 April, 2010, from http://www. hongkongairport. com/eng/media/press-releases/pr_983. html

Friday, November 8, 2019

Thesis and Outline of Final Paper By Shelly Garcia essayEssay Writing Service

Thesis and Outline of Final Paper By Shelly Garcia essayEssay Writing Service Thesis and Outline of Final Paper By Shelly Garcia essay Thesis and Outline of Final Paper By Shelly Garcia essayPublic policies are developed based on the issues that trouble the members of society to the point that there is a necessity to take an action. According to Larry N. Gerston (2010), â€Å"issues preceding those policies develop when individuals with similar problems are forced to cope, without solution, for an unacceptable period of time†(p. 22). Public policy problems can be solved by means of effective public policy making. Illegal immigration has become a public policy problem. The problem is becoming more and more acute because of indecisiveness on the part of policy-makers. Thesis statement: Illegal immigration has become a public policy problem, which requires the proper solutions by means of effective public policymaking process, supported by public and political awareness of the significance of the policy for economic, political and cultural development of the nation.Outline of the major points The scope and natur e of the public policy problemThe scope of the public policy problem like immigration or illegal immigration is large and expanding. According to James Hollifield and colleagues, â€Å"Illegal immigration also drew attention as a prominent public policy problem†(p.102). The statistical data shows that in 2008, there were about 11.9 million of illegal immigrants in the United States (Illegal Immigration Facts Statistics, 2014). According to the research conducted by the center of Immigration Studies, if immigration continues to grow at current levels, the population of the United States will increase â€Å"from 301 million today to 468 million in 2060 a 167 million, or 56% increase† (Illegal Immigration Facts Statistics, 2014). The nature of the public policy problem in concluded in the fact that illegal immigrants have no rights in the United States, but at the same time, they have negative impact on the development of the U.S. economy. Illegal immigration leads to increased unemployment. As a result, current immigration policy is ineffective.How the problem came to public and political awarenessThe problem of illegal immigration came to public and political awareness because of considerable changes in social, political and economic life of the country. Public awareness of the problem like illegal immigration is supported by certain concerns over national security. Ideological pressures influence public interpretation of current immigration laws (Koven Gà ¶tzke, 2010). Americans who oppose immigration policy explain their negative attitude to policy implementation by the threat to unemployment, the threat to cultural identity, and national security. Political awareness of the problem is caused by the functioning of interest groups, such as human rights groups and business groups. As the United States in the nation of immigrants, political parties are aware of the significance of the issue in the political development of the nation (Koven Gà ƒ ¶tzke, 2010).The evolution of the related public policyThe evolution of the related public policy is connected with considerable changes in decision making of policy-makers. The problem of illegal immigration begins as an individual issue, although it is closely connected with â€Å"the evolution of personal topics into widely shared aggravation that makes such dilemmas suddenly political and, therefore, candidates for public policy activity† (Gerston, 2010, p. 22).Level of government and the actors involvedThe level of government involved in public policy making to address the public policy problem of illegal immigration include central and district levels of government. Both central and district levels of government have opportunities for involvement in decision making regarding immigration issues. The actors involved in policy making process concerning illegal immigration include civil society, business community, public and private institutions. These actors have access to the resources that may affect the policy making process.The intergovernmental structure and political concernsThe intergovernmental structure plays an important role in policy making process in the United States. Certain political concerns regarding immigration policy should be taken into consideration by policy makers. According to researchers, â€Å"concerns about integration into a cohesive national identity have been enhanced by fears about Islamic fundamentalism following September 11, 2001 attacks†(Koven Gà ¶tzke, 2010, p.178). As the effectiveness of immigration policy depends on ideologies of immigrants, certain political concerns may be connected with the concept of citizenship or human rights issues.Conflicting public opinion and impact on policy solutionsThere are conflicting public opinions regarding immigration policy. The majority of American citizens have positive views on immigrants. They consider that â€Å"immigrant benefit the U.S. economically and c ulturally†. However, there are many Americans who state that â€Å"they are a net burden on the state† (Albertson Gadarian, 2013, p. 288). It is known that recent immigration policies were aimed at preventing the spread of clandestine immigration in the United States, as well as guaranteed a â€Å"minimum level of rights to immigrants, even to those without a residence permit† (De Montis et al., 2012, p. 1227). Nevertheless, many Americans opposed these policies, explaining the significant role of diversifications in human society, which lead to conflicts between cultures.The approaches to policy formulation, adoption, and evaluationThe approaches to policy formulation, adoption, and evaluation play an important role in policy making process. Policy formulation process requires high level of political diplomacy and effective negotiation as this process takes place within a large political arena. Policy approaches to address immigration issues require public invo lvement. The rational approach is the most appropriate for finding solutions to immigration policy problems as it reflect real-world goals. It is necessity to define the problem, social values and policy goals in order to explore the major policy alternative solutions. Policy adoption process is based on the awareness of the significance of the issue. Policy evaluation should be focused on design, explanation and testing of various methods to address policy evaluation issues, including case study evaluation, needs analysis, realistic analysis and other methods.The suggested policy direction (continuation, change or termination) and future impactThe brief overview of immigration public policy problem shows that illegal immigration influences practically every area of public concern. As a result, the suggested policy direction should be based on change of current public policy decisions. It is necessary to make certain changes in order to accelerate the economic development of the nat ion. Generally speaking, today’s immigration law in the United States requires reformation. According to Briggs, it is necessary to make â€Å"labor-market-oriented changes to immigration policy†, which could form a solid foundation for such reformation (qtd. in Peach, 2010, p. 111). Although changes in immigration law cannot have significant impact on the causes of illegal immigration, they may contribute to finding the ways to improve economic development.Conclusion Thus, it is necessary to conclude that the public policy problem like illegal immigration is really serious. As public policy problem affect public policy implementation, it is necessary to find the proper solutions to the problem of illegal immigration. The public response to existing problems and the solutions to these problems should be based on positive public experience.

Wednesday, November 6, 2019

Theodore Roosevelt Essay Example

Theodore Roosevelt Essay Example Theodore Roosevelt Essay Theodore Roosevelt Essay The actual cause of the battle was caused when one of the rendering Natives gun went Off resulting in the soldiers firing on the unarmed Natives. It was later called the Natives last stand. 3. Who were the cowboys? They were the heroes of American culture and stories. They were the cattle drivers who led individual lives and the ruthless lawmen who dulled criminals in the streets. 4. Who were the robber barons? These were very rich and powerful businessmen in 1 9th century America who used exploitive methods to gain wealth and influence over politics, the stock market and national resources. 5. Of what was William Tweed boss? William Tweed was the most notorious and powerful politician/businessman in the history of the nation. The infamous Tweed, better known as Boss Tweed or boss of Tammany Hall, acquired huge amounts of wealth through systematic corruption of various businesses and public offices in New York. He became chief of the Department of Public Works in N. Y. C. And leader of Tammany Hall, New Works City Democratic clubhouse. He would win scores of immigrant and disheveled workers votes keeping control of the legislature so that it passed bills that benefited Tweed and associates directly and indirectly. In the end it was estimated he had amassed over $30 million illegally. His associate Samuel Titled finally turned him in after being ridiculed and called out by cartoonist Thomas Nanas. 6. What happened at Homemaker Square? Strike at Homemaker Square or also massacre there was caused by police confusion and distress among the striking workers themselves. The day before there was a strike to rally for an eight-hour workday at the McCormick Reaper Company when during the strike workers attacked strikebreakers and the police fired on the crowd killing six and wounding many others. The next ay as thousands of people gathered in Homemaker Square a bomb was thrown into the polices midst killing seven policemen. This incited a panic across the nation, as it was believed anarchists had caused the attack. 7. Who were the populists? In the late 1 sass the farmers, poverty stricken whites, and even the blacks united to form the Peoples or Populist Party of America. The party formation was because the laborers were fed up with how the government was run and especially the people running the government. Their goals called for the national ownership of the railroads, telegraph lines, and telephone yester. . What was the Cross of Gold? The issue of utmost importance in the sass was over currency whether we should use gold or silver currency and this was the epicenter of all politics during the time. Populists rallied for the Free Silver idea returning to the both gold and silver standard. The party had so much power it provided as the perfect springboard for any politicia n if they took up the cry as well. As the Democrats lost prestige with Cleveland a young Democrat from Nebraska, William Jennings Bryan, decided to seize the opportunity. He spoke at the Democratic nominating convention in 1 896 delivering one of the most memorable speeches ever heard. He dramatically claimed, You shall not press down upon the brow of labor this crown of thorns. Then taking a position of crucifixion Bryan said, You shall not crucify mankind on a Cross of Gold. Although his electrifying speech secured him the ticket to the presidency the position was literally bought out by Mark Hanna and Republican William McKinley took office. 9. What did separate but equal mean? It meant that the government could legally segregate races in public remonstration, schools, and other public accommodations. In Please vs.. Ferguson the Supreme Court ruled this constitutional, totally ignoring the 14th Amendment. This led Governments mainly in the south to carry on separating public institutions on the basis that they were equal, but they never were equal. 10. Who was Jim Crow? Who was Uncle Tom? Just like the North used Uncle Tom as a symbol of their ideals Jim Crow was used in the South to represent and justify racist and segregation acts. He originated from a song written by Thomas Dartmouth Rice in the 1 sass and from theatre performances where he was depicted earning the offensive black face. 1. Who fought in the Spanish-American The war was not over any threats made against the U. S. But rather about showing strength and gaining very valuable and new markets for the rich and powerful in the government. President McKinley was surprisingly against the war, but he couldnt hold out against the powerful proponents for war in the government and outside. Henry Cabot Lodge a senator from Ma ssachusetts, Alfred Amman author of The Influence of Sea Power Upon History, and even future president Theodore Roosevelt called for war. Outside the government ricer were the newspaper giants William Randolph Hearst and Joseph Pulitzer who knew a war would push paper sales through the roof. These men orchestrated a plot to show Spain as the worst of the worst and have president McKinley stuck in a corner with no escape but war. 12. Milestones in the Spanish-American War: January 25- The U. S. Battleship Maine drops anchor in Havana. February 15- The battleship Maine mysteriously explodes resulting in the deaths of 250 creamers. April 22- Congress passes the Voluntary Army Act calling for a cavalry, Cowboy Cavalry. U. S. Ships blockade Cuba. April 23- McKinley calls for 125,000 recruits. April 24- Spain declares war on the U. S. April 25- The U. S. Declares war exited since April 21 . May 1- The U. S. Pacific forces attack and capture Manila Bay in the Philippines. June 10- The first troops, 647 marines, land on Accountant Bay. July 1 After suffering several causalities at San Juan Heights Colonel Roosevelt takes command and takes San Juan Heights suffering more than 1 500 troops to the smaller Spanish force, but achieves war hero status. July 3- Admiral is ordered to break the blockade and reluctantly tries and fails miserably. July 10- The U. S. Roofs face no resistance and take Santiago and raise the flag. July 26- Through France peace terms are proposed. August 9- Spain accepts McKinley terms. 13. What did America gain from the Spanish-American war? Well we lost much 5,462 troops died mainly from diseases such as yellow fever and malaria. We did gain much territory expected and unexpected. As expected the IS. S. Gai ned control of Cuba and Puerco Rich, but also they gained control of Guam, Wake Island, and the Philippines. Another gain from the war was Theodore Teddy Roosevelt, a war hero riding his fame into the office of the presidency. 14. Who built the Panama Canal? In the 1 8805 a French company begun construction on a canal through the isthmus of then Colombia, but abandoned the project after major setbacks, deaths, and rising expenses. Then after the Spanish War and seeing how long it took for the ships to arrive the U. S. Took up the project, first under McKinley who had the land surveyed then to the fired up Roosevelt. He wouldnt let anything stop him and even incited a rebellion and created the country Panama that they could control. He then ordered the construction of the anal to pick up where the French left off finishing under Woodrow Wilson. 15. What happened at Kitty Hawk? Although not significant to many in 1903 on December 17, 1903 the Wright brothers piloted the first ever flight of a heavier-than air aircraft. A historic achievement that went down in the record books. 16. What was big stick? President Roosevelt was a powerful man and he got his way, even through force. His favorite saying is Speak softly, and carry a big stick; you will go far. His big stick was the military one of the most powerful. When miners went f strike and the companies wouldnt budge on the demands Roosevelt threatened to have the military run the mines if the company didnt Start work somehow again. 7. Who were the muckrakers? This was another term made popular by president Roosevelt he used the term to refer to journalists who wouldnt budge on their paths to uncover corruption. He got the name from Banyans man with the Muck-Rake, this character would be to fed up with the crap at his feet rather than try to reach the celestial crown. Roosevelt aimed this at the journalist s such as Ida M. Darrell, Lincoln Stiffens, and Upton Sinclair. These writers would investigate, expose, and bring down corrupted businesses and government like the meat packing industry and Standard Oil. 18. Who were the Wobbliest? The Industrial Workers of the Worlds, a labor union created in 1905, members were called Wobbliest. 19. Who was W. E. B. Dais? William Edward Burghers Dubos was one of the co-founders of the N. AC. P. And also was socialist, historian, civil rights activist, Pan-Africans, author, and editor. He became famous after leading the Niagara Movement an African-American activist group that wanted equal rights for blacks. 20. What was the Bull Moose party? This was a party formed by Theodore Roosevelt after he split the Republican Party in the 191 2 presidential election. It was originally called the Progressive party but became the Bull Moose after reporters quoted Roosevelt as saying l feel like a bull moose. 21. Who was Poncho Villa? Jose Doter Orange Armful also known as Poncho Villa or Francisco Villa was a prominent Mexican Revolutionary General. He commanded the division of the north one of the larger Mexican states rich in resources. The Mexican people revered him as a hero as he would regularly raid trains, take over sciences, and distribute land to peasants and soldiers. 22. How did a dead archduke in Sarajevo start a world war? The assassination of Archduke Franz Ferdinand of Austria-Hungary happened not in a very friendly country and the Status-Hungarian government blaming Serbia declared war against them. This caused Australias allies Germany to declare war as well dragging in Serbians allies further escalating the conflict. 23. Who sank the Louisiana, and what difference did it make? The Louisiana was sunk by a German U-boat citing that it violated international trade laws by carrying illegal arms.

Monday, November 4, 2019

Sustainability Corporate Social Responsibility Report for a person who Assignment

Sustainability Corporate Social Responsibility Report for a person who wants to invest in a business - Assignment Example Large companies are dedicating real time and cash to programs geared towards environmental sustainability, alternative clean sources of energy and a variety of social welfare projects that benefit customers, employees and the community at large. The corporate social responsibility is a self-regulatory mechanism that has been incorporated in modern businesses. Critics suggest that corporate social responsibility diverts the attention of businesses from economic duty, while the proponents claim that companies benefit in terms of profit in the long run. However, research has indicated that corporate social responsibility has had a neutral effect on financial outcomes (Kao 2010). The management and coordination of social, environmental and financial obligations such that there is responsible, ethical and progressive success is referred to as corporate sustainability. Environmental, social and economic expectations are regarded as the major cornerstones of sustainability. Traditionally corporate cultures, social and environmental issues were considered to interfere with financial objectives. However, this has evolved over time and today there is harmony among the four. In order to invest wisely in a certain corporation, it is critical to analyze the corporate social responsibility and sustainability of the business (Kao 2010). Let us consider the case of a multi-national corporation known as Adidas. This corporation creates and produces sporting equipment’s like shoes and jerseys. It is the multinational for the Adidas Corporation and it is based in Bavaria, Germany. (Borowski 2013) By holding, it means the company owns other companies’ major stock and does not produce the goods or services, instead, its role is to own shares of other companies to form a group. The Adidas Group comprises of the following companies; Reebok sportswear, Adidas Golf that consists Ashworth, Rockport and a

Friday, November 1, 2019

Transformed Worldviews Research Paper Example | Topics and Well Written Essays - 3000 words

Transformed Worldviews - Research Paper Example These values had been instilled in one’s persona early during one’s stage of child development and growth. It was handed down from generation to generation as documented among the Ten Commandments: â€Å"Thou shalt not bear false witness against thy neighbour† (Holy Bible, New International Version, 2011). Thus, the verse stressed the importance of not telling lies and adherence to the truth. The modernist’s view is similar to one’s personal viewpoint. One actually gained knowledge of the truth from this view. In the reading entitled â€Å"Idolatry of Novelty† written by Lynn Gardner, the author emphasized that truth is actually anti-thetical with the acceptance of alleged false teaching: â€Å"'Doing truth' (or 'acting truly') is an Old Testament expression used especially when fidelity between two parties is the subject. Whether spoken or expressed in action, the truth is never to be dissociated from love." "Grace and truth" came through J esus Christ (John 1:14, 17)† (Gardner, n.d., pp. 15-16). Likewise, truth, as asserted here, reverts from the source in the Holy Bible: as emanating from Jesus Christ; and the teachings relayed, communicated, and documented through the Bible attests to the need to adhere to ethical, moral, and legal standards which conform to truth, based on facts and reality. In addition, Packer (1993) averred that truth in the Bible means â€Å"stability, reliability, firmness, trustworthiness, the quality of a person who is entirely self-consistent, sincere, realistic, undeceived. God is such a person: truth, in this sense, is his nature, and he has not got it in him to be anything else† (p. 127). Therefore, God is the perfect embodiment of truth because in His Divinity, He was noted not be have any ability to lie... Different people gain knowledge about God through diverse modes and medium. From the material from class texts and discussion, one acknowledges that people learn about God from stories, narrations and testimonies of family members and relatives; from theology or religion courses; through the scriptures, specifically through the teachings in the Holy Bible; through attendance of religious practices and obligations (masses for the Catholics); and through personal interests and intentional pursuits. Knowing about God comes from information gathered or collected from external sources or from the experiences of other people who shared the information to others. As emphasized, â€Å"â€Å"knowing† God is of necessity a more complex business than â€Å"knowing† another person, just as â€Å"knowing† my neighbor is a more complex business than â€Å"knowing† a house, or a book, or a language. The more complex the object, the more complex is the knowing of it†. The critical aspect of the knowing about God is the contention that â€Å"knowing them is more directly the result of their allowing us to know them than of our attempting to get to know them†.