Thursday, November 28, 2019

Bonaparte Betrayed The Revolution Essays - Napoleon, French Emperors

Bonaparte Betrayed The Revolution Bonaparte betrayed the revolution. Do you agree with this statement? Justify your answer. Napoleon Bonapartes attitude towards the French Revolution is one that has often raised questions. That the revolution had an influence on Bonapartes regime cannot be denied but to what extent? When one looks at France after Napoleons reign it is clear that he had brought much longed for order and stability. He had also established institutions that embodied the main principles of the revolution. However, it is also evident that many of his policies directly contradict those same principles. Was Napoleon betraying the same revolution that gave him power, or was he merely a pragmatist, who recognised that to consolidate the achievements of the revolution he needed to sacrifice some of those principles? Firstly, in order to determine whether Bonaparte betrayed the revolution it is necessary to define what one means by the revolution. Clearly there never was just one French Revolution, but rather a series of revolutions. These occurred while the French struggled to create a new political and social system one that would follow principles radically different to that of the ancien regime. There were five regimes to French Revolution between 1787 and 1800. However, despite this fragmented revolution the same fundamental principles guided most of the revolutionaries involved. These principles included equality under law, centralisation of government, elimination of feudal rights, religious freedom and careers open to talent, not birth. In short, the three key principles were liberty, equality and fraternity. It is generally thought that Napoleon was a supporter of these principles. Historian Georges Lefebvre wrote that Bonaparte was . a pupil of the philosophies, he detested feudalism, civil inequality and religious intolerance. In order to determine the validity of such a statement, one needs to examine institutions founded by Napoleon and conclude if they contained elements of these principles. The most lasting and enduring of Napoleons achievements is the Code Napoleon. When he came to power, after the coup detat of 18 Brumaire, in 1899, France was administratively in chaos. It was lacking the foundation that was essential in order to institutionalise the triumphs of the revolution. That is until Napoleon drew up his own administrative framework. Initially known as the Civil Code it was promulgated between March 1803 and March 1804. As a set of laws it unified France legally. The submission of all members of society to a common scheme of justice recognised the demands of the revolutionary crowds. In the lists of grievances that had been handed to Louis XVI just prior to the revolution, many had asked that French Laws be uniform . Where Louis had failed to respond, Napoleon acted. Thus he can be seen as building upon the revolution. Equality, a key principle of the revolution was consistently enforced in the code. It guaranteed freedom of the person, freedom of religion and proclaimed freedom of work. The code also required equal inheritance by all male heirs . The manner in which Napoleon efficiently used The Civil Code to centralise power in France is proof that he was following the ideologies of those behind the revolution. In particular ideals of the 1793 revolutionaries, who were anxious for centralisation. Napoleon once declared that The revolution is frozen and the code was his way of preserving achievements brought about by the revolution. One of the main grievances of those involved in the revolution was lack of advancement within society. The Bourgeoisie in particular found it difficult to advance their careers due to birth status. Thus, a catch cry of the revolutionary crowds became Career Open to Talent. Napoleon, upon coming to power, enforced this revolutionary aim of the bourgeoisie. Careers were open to all those with ability, regardless of birth or social status. Napoleon proclaimed in 1816, Wherever I found talent and courage I rewarded it . He backed up this statement by establishing lyce?s. These were secondary schools for boys, where admission was based on ability. Like Napoleon in Animal Farm, education of the young was a priority in Bonapartes society. He created an upward ladder within society, opening an avenue of opportunity for the less wealthy in society by providing scholarships to those displaying ability. The

Monday, November 25, 2019

American Foreign Policy During the Cold War Essays - Free Essays

American Foreign Policy During the Cold War Essays - Free Essays American Foreign Policy During the Cold War Assess the impact of American foreign policy in bringing about the Cold War. Assess the impact of American foreign policy in bringing about the Cold War. The Cold War, distinct for its sustained military and political tensions, dominated global politics for over half a century; therefore, it is not surprising that its origins has been one of the most debated topics in not only the study of American diplomatic history but the world. The Cold War was more as a result of American foreign policy, as by establishing a policy that aimed to prevent the spread of communism it provoked Soviet aggression which as a result set the foundations of intensified tension among two of the world greatest superpowers. In this respect American foreign policy undeniably impacted on the Cold War; a view supported by historians such as William A.Williams. Alternatively, other historians have also increasingly come to a consensus that the Cold War was fundamentally a conflict of diverging ideologies as expressed by John Lewis Gaddis neither superpower can be held solely responsible for the ideological war. That said other factors such as the growing lack of t rust and post-war tension among both superpowers, emphasised in the post-revisionist theory, and the Soviet expansionist policies were also influential in bringing about the Cold War. Nonetheless the importance of American foreign policy in bringing about the Cold War cannot be undermined, as due to its fundamental shift from a long standing effort to reach agreements to a determination to limit Russias expansionism, it increased American involvement and as a result escalated tensions among both superpowers. In a letter from the then Secretary of Commerce, Henry A.Wallace urged Truman to build mutual trust and confidence in order to achieve an enduring international order. He also gave a speech which focused on the necessity of a political understanding with Russia, and that capitalist and communist systems should compete on a friendly basis and gradually become more alike. However the way in which Trumans administration reacted to Wallaces speech by dismissing him, symbolises the distance American foreign policy had moved since the close of World War II. This shift in dynamics of American foreign policy is marked by the use of policies such as the Marshall Plan but in particular the Truman Doctrine, which not only acted as an intrusive intervention into European affairs but also an indirect attack on the Soviet Union. Trumans motives could be numerous, as in addressing the Congress he may have exaggerated Soviet threat, in order to secure the funds. Nonetheless it did in fact have the desired effect as Truman managed to convince both the Congress and the American people, which were isolationist and averse to spending U.S. dollars on a remote region that did not seem to fit into U.S. strategic need. Therefore whilst Truman promised salvation to the world he intentionally took it upon the policy of the United States to support free peoples who are resisting attempted subjugation by armed minorities or outside pressures. That said, the official justification for the Truman Doctrine was to support Greece and Turkey with economic and military aid to prevent their falling into the Soviet sphere. However Stalin was not interested in aiding Greek communist cause as whilst Yugoslavia, Bulgaria, and Albania provided assistance to the Greek communist guerrillas Stalin wanted, in fact, to cap Titos ambitions. This shows how the belief of a Soviet threat that shaped the Truman Doctrine was based on false assumptions. Moreover the fact that the Soviet Union had been less aggressive in the months before the presidents announcement than any time in the post-war period strengthens the contradictory nature of the Truman doctrine. Consequently the impact of the Truman Doctrine exemplifies the significance of American foreign policy in bringing about the Cold War and also leading to a growth of U.S involvement in international relations, since the Doctrine was later used to justify American intervention in the affairs of other sovereign states. In a wider context the Doctrine symbolises the United States post-world war II global leadership role, as the drastic change in strategies translated into Americas foreign policy deepened tensio ns that ultimately brought about the Cold War. Conversely, the Soviet Union

Thursday, November 21, 2019

Global warming essay Example | Topics and Well Written Essays - 500 words

Global warming - Essay Example Since 1980, there has been a massive change in global average temperatures and this has certainly risen significantly within the last century. The core reason behind such indefinite rise in temperature has been caused due to the constant increase in greenhouse gas emissions which has been produced due to various human activities. As a matter of fact, most scientists have agreed on the fact that the atmosphere of the planet’s temperature has risen approximately by 0.7 degree Celsius since 1980 and it there is a threat that it may even continue to increase at this astounding rate in the near future. According to many scientists and researchers, 1990 has been recorded as the hottest ever year in the 20th century. Apart from that, the years 1991, 1983, 1985, 1986 and 1989 have been recorded as some of the warmest years in the 20th century. As a consequence, the constant rise in temperature has also been felt all across the globe. Reportedly, temperature of the earth may rise from a reported 1.6Â °C to 5.9Â °C within the next century (Hughes, pp. 56-61). A huge increase in the quantity of greenhouse gases definitely leads to an increase of global warming in the atmosphere. The increase in greenhouse gases leads to an increase in CO2 emission, which is proposed to be the single largest contributor for global warming because it has the largest share among green house gases within the atmosphere (Schneider, pp. 23-29). However, there are ways through which this issue can be mitigated. A good way to solve this problem is forestation. Plantation of trees can help in restoring the balance which was disturbed by greenhouse gases. The utilization of vehicles which are fuel-efficient and which have lower C02 emissions of dangerous gases can be used to control this global issue. There have been growing concerns regarding CO2 emissions and a massive increase in global temperatures have

Wednesday, November 20, 2019

Global Leader Carlos Slim Helu - Telecom Research Paper

Global Leader Carlos Slim Helu - Telecom - Research Paper Example How did such a young boy with no substantial wealth become the richest person in the whole world? Business men intend to be sharp and ruthless which he was but what made him so special that he remained the world’s richest person for three years even with the likes of Bill Gates breathing down his necks? Here we will try to analyze his approach to business and his worth ethics and strategies that have driven his tremendous success (forbes, n.p.). From an early age Carlos Slim showed exceptional ability in business related matters so his father who was an entrepreneur himself groomed him from an early stage. His father had fled Lebanon along with his brothers to make a living in Mexico and he survived the competitive streets while making a name in business. Carlos Slim was also raised to be in the same mould of competitive behavior and as time showed that appeared to be his main attribute in achieving success. At the tender age of 12, he was handed his father’s real estat e business which he co handed and did extraordinary work but his thoughts were focused on other things so he gained an engineering degree and became a stockbroker and worked his magic in the stock business for some while with huge profits so much that by the age of 26, his net worth was forty million dollars. But due to his nature, he never wanted to be in the stock business for good rather he wanted to become a real business man with permanent interests in the leading industries of the world. His phenomenal rise by trading stocks and later in all the leading businesses that he started commanding benefited from his outrageous talent of organizing and mastery of discrete mathematics. His level in the mastery of numbers and linear programming (even though it had tedious application back in the 1960s) was considered unparalleled and unique. It enabled him to understand the worth and the potential of several fields that were not so profitable in the early days of their conception like t he now trillion dollar industries of telecom, tobacco and oil. After doing considerable research and numerical study, he decided to buy the second largest tobacco company Cigatem in Mexico back in 1981 which made Marlboro brand of cigarettes (Rubin, 99). With expansion and modernization, he transformed the company into huge profits which he used to buy into more companies and gain control. Until now, Slim wasn’t in the elite circle of businessmen but from now onwards he began the real climb towards success. In 1982, the oil prices went downhill due to the expansion of the Middle East oil well business which affected the Mexican economy so the businesses began to tumble and he took advantage of the situation and made ridiculously good bargains. He also invested in the Mexican businesses in USA like Hershey Corporation and Reynolds Aluminum and earned mighty profits. He also invested in the Mexican financial services. He was a true ruthless businessman and from now onwards he s tarted making total monopolies and drove competitors away with relative ease. His monopoly of the communication industry is also evident of this fact with Telmex and Movil his primary concerns nowadays which he purchased dirt cheap and helped transform them into the largest telecom operators in the region just because of the insight he possessed. In the later part of eighties, he purchased more large companies that had major futures in Aluminum, copper and chemicals and expanded his business.

Monday, November 18, 2019

The Coffee Company Report Essay Example | Topics and Well Written Essays - 4000 words

The Coffee Company Report - Essay Example Out of the 5 running stores, two are not able to generate any profit and the managers believe that this is because of the locations of the stores. One of the partners suggested consulting a marketing research firm however, the other partners think of it as a costly endeavor. The concept of using GIS technology for combining the business information with the demographic data for assessing the proper location for the stores is also being considered by the business partners. However, balancing the financial issues with the strategic planning problem is a complex process for the firm which urged the partners to cancel the bespoke software development and other IT projects of The Coffee Company.  Ã‚   Based on the given case, the partners of The Coffee Company have selected two options for generating their profit earning process. The first option is to focus on the relocation of the two stores that are not operating in a profitable manner and the second option is to improve the customer service process of the concerned stores for increasing the volume of customer footfalls. In the words of Reid and Hinkley (2006), the location of a business house has a major influence on the operational and strategic decision-making process of a firm. Newby (2009) specified that factors such as consumer convenience, the presence of target consumers, market competition, transpiration for procurement of resources, demography and cultural background can the help the business in assessing the contribution of a location for business sustainability.  Changing the location of the stores for The Coffee Company has to be conducted based on proper information that would allow them to make quick decisions and implement them.  

Friday, November 15, 2019

Ship Machinery And Equipment Maintenance

Ship Machinery And Equipment Maintenance Ship machinery maintenance is of predominant importance for accurate operation of each ship. For this purpose, the ships machinery plant should be kept well maintained and clean at all times for assuring safe and smooth operation and functionality of the ship. Furthermore, it is most significant that ample new spare parts and equipments are carried on board in order to correctly accomplish maintenance in due time under the supervision of fully competent staff according to the manufacturers instructions. Moreover, Crankshaft deflections need to be taken frequently at regular intervals. Fuel oil and Lube oil must be analyzed in order to ensure that they do not contain any debris or contamination. Main as well as auxiliary engines result in a breakdown that cause severe damage like fire that may require the ship from terminating its services until lengthy and costly repairs and maintenance measures are accomplished. Experts acknowledge the fact that maintenance requirements are not standardized. However, these requirements will differ substantially from one ship to another. Some ship owners employ a fundamental preventative maintenance policy, while others operate more sophisticated systems based on condition monitoring. This is why machinery surveys are adopted in flexible basis so as to plan according to owners existing business processes and schedules. An approach that is based on operating at schedules intervals offers a manageable and controlled maintenance program. Although, it may not be most efficient, a maintenance program is tailored to operational performance trends, and manifested by individual elements of machinery. Furthermore, by evaluating the condition monitoring data, the extent to which machinery is opened for surveys is considerably reduced. This approach may be applied to a vast variety of reciprocating and rotating shipboard machinery. For instance, Tail-shafts can be contr olled and monitored on frequent basis, thereby allowing lengthy periods between withdrawals for accurate inspection. The time interval between raising main stream turbine casings may be extended in a similar fashion. As a result of this, unproductive repair as well as dry dock downtime may be kept to a minimum level. Interestingly, based on Reliability-centered maintenance (RCM), further optimization of the maintenance program can be obtained. This technique employs a structured assessment of functions for deriving the most efficient maintenance strategy. Also, operational performance can be improved by maintaining ship availability and keeping downtime minimal. For proper machinery maintenance and loss prevention, following measures must be undertaken: Lubricating Oil: Lubricating or lube oil sampling should be maintained at frequent levels and regularly recorded as a recommended practice. Also, lube oil purifiers must be operated continuously and adequately. The gravity disc should be chosen so as to achieve the desired oil-water interface at a maximal level of temperature nearing 90 deg C according to the specifications. Furthermore, the lube oil feed system applied to the purifiers must be evaluated for ensuring the optimum flow rate between the feed pump and the purifiers capacity. Old lube oil feed system designs utilize a direct drive pump that bears a large capacity as against the recommended flow through the purifiers. If the system contains heavy contamination of water, the lube oil in the sump tank should be transported to a settling tank, the sump tank must be cleaned, and new fresh oil must be filed to the minimum level as recommended by the engine manufacturer. Moreover, the contaminated lube oil is drained and circulated by the purifiers and after analysis, the future use if the oil is assessed. If solid particles are determined in the system, the piping system should be cleaned and the entire engine must be flushed. Crankshaft Safety: The engine should be stopped as soon as the oil mist detector alarm rings or overheating of engine is detected. To avoid further damage, the main cause of overheating of engine must be identified and correction measures must be taken before the engine is restarted. The lube oil must be kept clean as far as possible by continuously using the lube oil purifiers at the recommended temperature over 90 deg C. Also, lube oil filters must be maintained and placed in clean and suitable environment by frequent routines. Crankshaft deflections should be regularly taken in order to ensure that the operation of the engine is within the limit as permitted by the manufacturer. Bunkers: Bunkering processes that includes fuel-testing procedures must be carefully reviewed for ensuring accuracy in procedures while dealing with off-specification bunkers. Each precaution must taken to make sure that adequate amount of bunker supplies are made available in order to allow proper testing before any new bunkers are used. Furthermore, water, high ash and total sediment potential content also must be considered as well as high sodium and water content that indicates the presence of seawater within the bunkers. At sea, loss of structural integrity due to grounding and collision are the most significant contributors to accidental pollution. Hulls must be designed by considering two most important factors; (1) improvement in the hull strength as well as energy absorption, and (2) sufficient residual strength subsequent to damage for allowing salvage operations. So far, the major focus is on preventing pollution from tankers. Nevertheless, there is now greater concern related to the potential consequences of damage and accidents to bunker tanks and other types of ships, some which may be carrying thousand tones of fuel oil. Present R D, as far as improving hull strength and energy absorption is concerned, is focusing on the development and advancement of modified calculation methods that are to be used for measuring the ability of varying structural assemblies to withstand ground forces and collision. When the entire numerical simulations done by the finite element method is taken into accoun t, examining the experimental results have proven the significance of including the vertical motion of the ship especially for grounding simulations along with the motion of the struck object or striking ship to evaluate collision simulations. Moreover, significant amount of research has been dedicated to the evaluation of existing as well as proposed design solutions for improvement of collision and grounding strength. 2-D methods have been employed for evaluation of relatively simple post-accident strength for the anticipation of the collapse strength of a hull girder. By using these methods, the capability of the damaged ship to survive can be assessed by a skillful comparison between the measured strength and the environmental loads; the latter being calculated without considering the result of the accidental damage on the loads and motions acting on the ship. Therefore, research is on-going with the main objective on improvement of ship response calculation methods corresponding to the effects of damage for both mobile offshore units and the ships. The following are said to be the major R D requirements in these areas: Conceptions about ship subdivision in order to minimize the effect of impacts on the hull, as well as concepts for hull structure design for increasing the residual strength and the resistance to impact after damage. Particularly, further development and enhancement of energy absorbing side and double bottom shell designs and their evaluation through full-scale tests and models along with comprehensive numerical models. Integrating numerical models for external dynamics, i.e. ship motions, and internal mechanics. Developing ways of securing bunker tanks from grounding and collisions for new ship designs. Developing simplified calculation techniques and methods for prediction of energy absorption abilities of particular structural solutions. Developing design criteria for prevention of pollution as a result of collision and grounding Analysis of collected casualty information on grounding and collision with the main goal to develop environmental impact indexes and reference design scenarios able to talk for the energy absorption and varying structural configurations. Apart from grounding and collision, other major causes of loss of hull integrity are fatigue/fracture problems, excessive loading, and consequences of corrosion. Corrosion is reduced by supplying additional thickness to the plate at the design stage and employing corrosion protection systems, many of which are based on coatings requiring maintenance throughout the life of the ship. Also, corrosion problems can be dealt with by good detail design of the hull structure. A factor that provides potential is design for maintenance; for instance, by ensuring suitable access for inspecting local structures as well as for applying coatings. Thus, the main R D needs covering this area are concerned with the design and structuring of ship hulls for corrosion reduction/prevention and for easier inspection and maintenance. Planned maintenance system (PMS) deals with scheduling, planning and performance of each and every important machinery on board a ship. Furthermore, PMS software is deployed to every ship for carrying out the operations of the ship in an efficient manner. All the PMS functionalities are carried out according to their schedules. This not only ensures efficient working of the machinery but also help in avoiding any sort of mishap caused due to poor maintenance. To carry out all the maintenance works in a timely manner, PMS software is used. A PMS software is fabricated for a ship based on the type and number of machinery the ship possesses. A job card is assigned to every machine that consists of every detail about the machinery. Each job card has three main components. A PMS software gives an accurate estimation of the maintenance schedule overdue or nearing, and enables the user to plan and submit the completion report, by which the next maintenance date is automatically rescheduled (Hayman et al).

Wednesday, November 13, 2019

Philosophy of Classroom Discipline Essay -- essays research papers

Philosophy of Classroom Discipline â€Å"Power is exercised only over free subjects, and only insofar as they are free. By this we mean individual or collective subjects who are faced with a field of possibilities in which several ways of behaving, several reactions and diverse compartments may be realized.† (Foucault) Foucault and Heidegger, modern philosophers, both describe power in these terms, as the facility to manipulate an object without force. Understanding this point of view is important, not only for state institutions who attempt to exert power over citizens and deviants, but also for teachers as they try to use disciplinary power to control the events in their classroom. Unfortunately, the majority of status quo disciplinary systems are entrenched in the mindset that power can be exerted over individuals through the use of coercive punishments and threats, actions which usually have the complete opposite result, less control over the students. A system that more closely mirrors Thomas Gordon’s view of discipline as self-control would be a far superior disciplinary model because it recognizes the true nature of power. Thomas Gordon’s disciplinary model specifically critiques the use of coercion and intimidation to exert power and control over students. Coercion to Gordon only reinforces a notion that violence is an acceptable form of control. Additionally, coerced and intimidated students will often retaliate against authority figures who attempt to exert coerciv...

Monday, November 11, 2019

Culinary Arts: Garde Manger Essay

One of the major problems with cross-language translations involving those that are rarely used together (i. e. Finish Lithuanian) is that there are no dictionaries available or it is extremely difficult to find one. The main problem is that there are not enough people to create a market and no one would invest in creation of such kind of dictionaries. English-based dictionaries, however, is of abundance. This project tackled the above cited problem in Cross Language Translation using English as its base dictionary. Artificial intelligence through Neural Networks was used as it appeared well-suited to problems of this nature. For this reason, artificial intelligence through neural networks was investigated as a potential tool to improve translation accuracy but future implementation was left as a possibility. WordNet ® was also investigated as source of defining English words and possible tool to achieve greater accuracy in cross-language translations. ACKNOWLEDGMENTS I would like to take this opportunity to thank all those who have contributed in any way, shape or form to the completion of this project report, those at Zodynai. org and the Anglia Ruskin University for their advice and support. Thanks to my friends and family who (once again) tolerated my lack of time and sometimes grumpy demeanour. More thanks to friends at Anglia Ruskin University for their ideas and criticism. Your support (directly and indirectly) is greatly appreciated. T A B L E O F C O N T E N T S ABSTRACT Acknowledgements TABLE OF CONTENTS INTRODUCTION OBJECTIVES METHODOLOGIES DESIGN AND IMPLEMENTATION RESULTS AND DISCUSSION CONCLUSION AND EVALUATION BIBILIOGRAPHY APPENDICES A Project Specification B User/Software Installation Guide A C Software Installation Guide B D Poster and Visual Presentations E Source Code F Abbreviations and Acronyms INTRODUCTION The multilingual world and the barriers it entails. A large number of people across the world converse in English thus it serves as the primary lingua franca for developments in the research world. Most publications and journals are published in such language. This leaves publications in other languages inaccessible and apparently, information in English is withheld from those millions who do not speak English (Diekema 2003) Recent trends promote the construction of a far-reaching complex infrastructure for transporting information across boundaries. Apparently, language shares a vital portion in the hindrances presented by National borders. Whilst the fact is inevitable that English remains the most spoken language in the whole world and though, it is true that the spread of ‘World English’ can promote cooperation and equity, longstanding linguistic competition threatens to be even more divisive in a globalizing world. (Maurais et al n. d. ) A lot is currently going on to overcome these linguistic barriers. The most efficient approach to overcoming such is with cross-language translation and in this literature it will well be mostly in the web-based-online-dictionary aspect of such approach. English has always been the main focus of information retrieval, well, that is by tradition. Many of them retrieval algorithms and heuristics stem from English speaking countries and thus are based on the said language. Over the years, these retrieval methods have been adopted by other language communities, creating a wide selection of language-specific monolingual retrieval systems. However, to ensure complete information exchange, information retrieval systems need to be multilingual or cross-lingual. (Diekema 2003) There are a lot of ways to pin down the hindrance of being in this multi-lingual world, the barrier of being in a world divided by being in English- or Non-English-speaking territories. And, as presented, the most researched approach is through Cross-Language translation. OBJECTIVES Main problem that we are facing when translating with English based dictionary is connecting various language data bases. One of solutions for this program is to create a base dictionary (as seen in Figure 1). Figure 1 Other major problem is that performing translation a lot of noise is created. As seen in Figure 2. Figure 2 We can examine this in greater detail in Figure 3. Word Autobusas is translated from Lithuanian language to Russian based on English language. Two different possible translations occur (bus, omnibus) when translating Lithuanian -> English. First word â€Å"bus† translated from English to Russian has three meanings â€Å"Ð °Ã ²Ã'‚Ð ¾Ã ±Ã'Æ'Ã' Ã¢â‚¬  †Ã ¾Ã ¼Ã ½Ã ¸Ã ±Ã'Æ'Ã' Ã¢â‚¬  †Ã'ˆÐ ¸Ã ½Ã °Ã¢â‚¬  word translated. As first few are synonyms third one has totally different value and meant â€Å"Topology bus†. As you can see on reverse translations †Ã'ˆÐ ¸Ã ½Ã °Ã¢â‚¬  will going to give you four different meanings translated in Lithuanian language. Figure 3 We are going to investigate WordNet and Neural networks approach for possible solution of this problem. METHODOLOGIES Cross-Language Information Retrieval, its promise. Information retrieval entails an individual querying about something of interest to him. Inevitably, since we are life forms known to be ever inquisitive, we do Information Retrieval in every aspect of our living. This event so commonly happens in a lot of situation and may be best displayed in a Library when a student picks his book of choice. Formally, let us define Information Retrieval (IR) as the process in which users with information need query a collection of documents to find those documents that satisfy his need. (Diekema 2003) In the electronic realm, the user queries by typing in related words, the system then processes these keywords to create a representation understandable by the system. In the course of the procedure, the system usually strips off non-bearing fragments of the query keywords such as articles like determiners, prepositions, and pronouns. The document collection undergoes the same process resulting to a list of document representations or a catalogue. To find documents that are similar to the query, the ‘stripped off’ query representation is then matched against the catalogue. When a certain degree of similarity between the catalogue and the ‘stripped off’ query has been established, the documents with the uppermost similarity scores (depending on the settings, say top 10) are shown to the user as results. This occurs typically during browsing through the internet and Google. comTM best displays this example. A development of IR is CLIR – the Cross-Language Information Retrieval, which, as the name implies, is information retrieval in a multi-linguistic environment. Consequently, CLIR techniques simplify searching by multilingual users and allow monolingual searchers to judge relevance based on machine translated results and/or to allocate expensive translation resources to the most promising foreign language documents. (Diekema 2003) Simple IR systems only consist of a Query, an Input Cleanser, a Matcher, the Document database and the Output, in logical order. The addition of Language Translators would make this system a Cross-Language Information Retrieval system. Of course the Document database would now contain multi-lingual entries as well and the output is to be presented in the way the query has been placed in the input. Figure 4 would show the Cross-Language Information Retrieval system in schematics. The method Cross-language Retrieval Systems promises users to state their queries in their native language and retrieve documents in all the languages supported by the system. (Diekema 2003) Artificial Intelligence and Machine Learning. Artificial intelligence (AI) results to simulation of intellectual practice such as comprehension, rationalization and learning symbolic information in context. In AI, the automation or programming of all aspects of human cognition is considered from its foundations in cognitive science through approaches to symbolic and sub-symbolic AI, natural language processing, computer vision, and evolutionary or adaptive systems. (Neumann n. d. ) AI considered being an extremely intricate domain of problems which during preliminary stages in the problem-solving phase of this nature, the problem itself may be viewed poorly. A precise picture of the problem can only be seen upon interactive and incremental refinement of course, after you have taken the initial attempt to solve the mystery. AI always comes hand in hand with machine logistics. How else could mind act appropriately but with the body. In this case, a machine takes the part of the body. In a bit, this literature will be tackling about AI implemented through Neural Network. The author deems it necessary though to tackle Machine learning and thus the succeeding paragraphs. Machine Learning is primarily concerned with designing and developing algorithms and procedures that allow machines to â€Å"learn† – either inductive or deductive, which, in general, is its two types. At this point, we will be referring to machines as computers since in the world nowadays, the latter are the most widely used for control. Hence, we now hone our definition of Machine Learning as the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. (Dietterich n. d. ) Machine learning techniques are grouped into different categories basing on the expected outcome. Common types include Supervised, Unsupervised, Semi-supervised or Reinforcement learning. There is also the Transduction method and the ‘Learning to learn’ scheme. A section of theoretical computer science, Computational Learning Theory is the investigation on the computation of algorithms of Machine Learning including its efficiency. Researches on Machine Learning focuses mainly on the automatic extraction of information data, through computational and statistical methods. It is very much correlated not only to theoretical computer science as well as data mining and statistics. Supervised learning is the simplest learning task. It is an algorithm to which it is ruled by a function that automatically plots inputs to expected outputs. The task of supervised learning is to construct a classifier given a set of classified training examples (Dietterich n. d. ). The main challenge for supervised learning is that of generalization that a machine is expected in approximating the conduct that a function will exhibit which maps out a connection towards a number of classes through comparison of IO samples of the said function. When many plot-vector pairs are interrelated, a decision tree is derived which aids into viewing how the machine behaves with the function it currently holds. One advantage of decision trees is that, if they are not too large, they can be interpreted by humans. This can be useful both for gaining insight into the data and also for validating the reasonableness of the learned tree (Dietterich n. d. ). In unsupervised learning, manual matching of inputs is not utilized. Though, it is most often distinguished as supervised learning and it is one with an unknown output. This makes it very hard to decide what counts as success and suggests that the central problem is to find a suitable objective function that can replace the goal of agreeing with the teacher (Hinton & Sejnowski 1999). Simple classic examples of unsupervised learning include clustering and dimensionality reduction. (Ghahramani 2004) Semi-supervised learning entails learning situations where is an ample number of labelled data as compared to the unlabelled data. These are very natural situations, especially in domains where collecting data can be cheap (i. e. the internet) but labelling can be very expensive/time consuming. Many of the approaches to this problem attempt to infer a manifold, graph structure, or tree-structure from the unlabelled data and use spread in this structure to determine how labels will generalize to new unlabelled points. (Ghahramani 2004) Transduction is comparable to supervised learning in predicting new results with training inputs and outputs, as well as, test inputs – accessible during teaching, as basis, instead of behaving in accordance to some function. All these various types of Machine-Learning techniques can be used to fully implement Artificial Intelligence for a robust Cross-Language translation. One thing though, this literature is yet to discuss the planned process of machine learning this research shall employ, and that is by Neural Networks. There is yet to be a precise definition as to what Artificial Neural Network is, though many researchers would agree that it concerns a network of austere processing elements – otherwise known as the neurons, which presents complex behaviour established by the relationship amongst processing and parametrical elements. The main inspiration that lead to the development of this technique was from the investigation of, no lesser than, our Central Nervous System and the neurons (including their axons, dendrites and synapses) which make up its most important information processing elements. A neural network model would show us that simple nodes are connected forming a network of nodes — thus, its coining as â€Å"neural network. † A Neural Network functions in 2 different manners – learning and testing. The former would literally mean, the system learns the ways it is supposed to behave while the latter is when rigorous repetition of training would eventually result to a stable system, defined by its giving of constant satisfactory outputs. Most â€Å"abstract reasoning† of an Artificial Neural Networks are being implemented through three learning types – supervised, unsupervised and the reinforced learning, as has been introduced in the preceding paragraphs. Supervised learning entails a functional relationship between the input and the output. The system has to learn every possible IO pair that can be thought of. In case, there is a miss, all that has to be done is to input the said pair into the memory of the system hence when it resurfaces, the system knows how the handle it. Hence, basically, the goal is to ‘teach’ the network to identify the given input with the desired output. (Sordo 2002) This is usually best achieved when function f has already been derived to represent the behaviour of the Neural Network system. For unsupervised learning, we feed an input and a function to the system and record what behaviour the system outputs with such input and function. To begin with the learning process, there are no IO-pairs as opposed to supervised learning. Ultimately, the main goal of achieving the stable state will be attained through rigorous repetition of test with different sets of inputs. This type of systems – imploring unsupervised learning as its method of learning, are best displayed in statistical modelling, and the likes. Reinforcement learning stems its roots from the related psychological theory that has been conceived even before AI has been. Dynamically, in this type of learning, the machine interacts with its environment by producing actions a1, a2, †¦ These actions affect the state of the environment, which in turn results in the machine receiving some scalar rewards (or punishments) r1, r2, †¦ The goal of the machine is to learn to act in a way that maximizes the future rewards it receives (or minimises the punishments) over its lifetime. Reinforcement learning is closely related to the fields of decision theory (in statistics and management science), and control theory (in engineering). The fundamental problems studied in these fields are often formally equivalent, and the solutions are the same, although different aspects of problem and solution are usually emphasised. (Ghahramani 2004) Advantages of investing a system through Neural Networks. Neural networks with always have the outstanding characteristic of deriving intelligence from the usually complicated and, oftentimes, fuzzy data stored in the neurons. These systems, oftentimes, offer to be easy utilities to deduce patterns and perceive trends that are difficult to be noticed by either human observation or by our current computer intelligence. A trained neural network is regarded as an â€Å"expert† in the category of information it has been given to analyze. This expert can then be used to provide projections given new situations of interest and answer â€Å"what if† questions. (Chung et al 2007) It is used for adaptive learning on how to handle tasks based on the input provided for training or preliminary experience. It is a self-organizational tool that hones its own picture of the data it receives in as early as learning time. Neural networks another feature is that it is a real-time operation system where all calculation may be performed in parallel. Fault Tolerance via Redundant Information Coding is another aspect of the neural system where partial destruction of a network leads to the corresponding degradation of performance. However, some network capabilities may be retained even with major network damage. The platform to a successful implementation. Several environments can be used in totally implementing a Cross-Language Translator through with the various and fast developments in computer technology since its introduction. In the succeeding paragraphs we will be tackling some of those that has come the author’s A-list. Microsoft . NET Framework. This framework form part of Microsoft Windows operating systems, containing a vast number of pre-coded resolutions to general program requirements, and governing the performance of programs written particularly for the framework. This framework is a vital Microsoft contribution and is projected on being utilized by most applications created and to be created for Windows platform. Pre-coded solutions outlining the framework’s Base Class Library (third layer from Operating System in the . NET Framework) encompass a wide range of software requirements in areas including: cross language translation, user interface, database connectivity, cryptography, data access, web application growth, network communications, and numeric algorithms. This layer contains classes, value types, and interfaces that you will use often in your development process. Most notably within the . NET Framework Base Classes is ADO. NET, which provides access to and management of data. Supervising the software’s runtime requirements, this software is written for the . NET Framework implemented in an environment. This runtime environment, which is also a part of the . NET Framework, is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine, so that programmers need not consider the capabilities of the particular CPU that will implement the program. The CLR also provides other significant services such as security mechanisms, memory management, and exception handling. The class library and the CLR together compose the . NET Framework. The . NET Framework is included with Windows Server 2003, Windows Server 2008 and Windows Vista, and can be installed on some older versions of Windows. .NET Framework 1. 1 This is the first major . NET Framework upgrade that is accessible on its own as a redistributable package or in a software development kit since its publishing on April 3, 2003. It forms part of the second release of Microsoft Visual Studio . NET – the Visual Studio . NET 2003, and is the first version of the . NET Framework to be included as part of the Windows operating system, shipping with Windows Server 2003. 7 .NET Framework 3. 5 This version was authoritatively released to manufacturing (RTM) on November 19, 2007. As with . NET Framework 3. 0, this version applies the CLR of version 2. 0. It also installs . NET Framework 2. 0 SP1 adding some methods and properties to the BCL classes in version 2. 0 which are vital for version 3. 5 features such as Language Integrated Query (LINQ). These changes, however, do not involve applications written for version 2. 0 and a separately, new . NET Compact Framework 3. 5 was released in hand-in-hand with this revision to give support for additional features on Windows Mobile and Windows Embedded CE devices. The source code of the Base Class Library in this version has been partially released under Microsoft Reference License. 7 .NET Framework 3. 5 builds incrementally on the new features added in . NET Framework 3. 0 – for example, feature sets in Windows Workflow Foundation (WWF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF) and Windows CardSpace. This version also consists of a number of new features in several technology areas which have been added as new assemblies to avoid breaking changes. They are: (a) deep integration of Language Integrated Query (LINQ) and data awareness which will let to write code written in LINQ-enabled languages to filter, enumerate, and produce projections of several types of SQL data, collections, XML, and datasets by means of the same syntax; (b) ASP. NET AJAX 3. 5 lets you craft more resourceful, more interactive and highly-personalized Web experiences that work transversely with almost all the most popular browsers; (c) The New Web protocol sustain for building WCF services adding AJAX, JSON, REST, POX, RSS, ATOM, and several new WS-* standards; (d) Full tooling support in Visual Studio 2008 for WF, WCF, and WPF, including the new workflow-enabled services technology; and, (e) New classes in . NET Framework 3. 5 base class library (BCL) that address many common customer requests. Visual Studio 2008 and the . NET Framework 3. 5. The Microsoft Visual Studio development system is an appropriate development instrument devised to aid developers to tackle complex problems, thus create inventive resolutions. This system’s role is to improve the development process; hence, achieving breakthroughs would be easier and more satisfying. Using the Microsoft Visual Studio Development system will be very productive for this project since it would continually deliver better ways for cross language translations with less energy and with ease from other software. It has efficient form of code editors, IntelliSense, Wizards, and multiple coding languages in one integrated development environment (IDE) to high-tech applications in life- cycle management. New versions of Visual Studio keep bringing innovative tools to help developers focus on solving problems without wasting time. With this development system, software developers gain from an integrated product experience that spans tools, servers, and services. Visual Studio products work well together with other Microsoft software, such as Microsoft server products and the Microsoft Office system. Visual Studio offers a comprehensive choice of tools for all phases of software development, testing, deployment, integration, and management. Every kind of software developer, from novice to skilled professional, can use the Visual Studio because it is engineered to support the development across all types of devices such as PCs, servers, the Web, and mobile devices. Visual Studio is the most reliable tool that is engineered and tested to be always dependable, secure, interoperable, and compatible. Visual Studio offers an unparalleled combination of security features, scalability, and interoperability. Although Visual Studio always incorporates forward- thinking features, it is designed to ensure backward-compatibility everywhere possible. Being a set of technology capabilities, core products, and best practice guidance, the Microsoft Application Platform (MAP) focuses on aiding IT and development business partners to maximize opportunity. As one of its core products, Visual Studio has always and continues to help spearhead for the right customer links, business efficiencies, and value-added services through provision of a fully integrated and single development environment for all types of advances, including Microsoft Windows, Microsoft Office, Web, and mobile applications.

Friday, November 8, 2019

How does social pressures affect the family Essay Example

How does social pressures affect the family Essay Example How does social pressures affect the family Paper How does social pressures affect the family Paper There are many social pressures that affect todays family, not only in the Bahamas, but also all over the world. Some of these pressures are: unemployment, lack of finance, and alcoholism just to name a few. Social pressures such as domestic violence and substance abuse have resulted in an increased crime rate in the Bahamas. According to my research, money has been a primary source of survival for the family for a very long time. It is a fact that while there are some families that rake in a large amount of income there are those that have very little money. The most efficient way to obtain money is to get a job. However there are some people who want to work but cant find a job, thus resulting in the problem of unemployment. As you can imagine life is very difficult for the unemployed, especially if they have a family to take care of. Being an unemployed parent is even more difficult than being an unemployed person without a family. The parent is faced with the task of feeding, clothing, and sheltering his/her family. This can only be achieved by having money. They receive bills that they know they cant pay so they just let them pile up all the time promising to pay them. Finally it becomes so bad that the bank seizes everything that wasnt paid for out of pocket. That includes the house, furniture and car or cars. Thus the family is now on the streets with no means of transportation or income. In the case where both parents are working and one loses their job the working spouse is left with the responsibility of taking care of the family. What used to be handled by both finance wise is now only handled by one. Here again we see the problem of paying the bills. Believe it or not unemployment may also be a cause of divorce. Heres an example of how this can happen. The working spouse may come home after a long, hard day of work and meet the house filthy because the unemployed spouse did not care to clean or even straighten it up a little. After working so hard meeting the house in this state may easily anger the working spouse. Words exchanged between both spouses concerning this matter may lead to a fierce argument. Arguments like these can then force either spouse to file for a divorce. A social pressure can also take the form of Domestic Violence also known as spousal abuse. This is simply emotionally or physically harmful acts between people in an intimate relationship. Abuse between intimate partners can be physical, psychological, sexual and economical. Spousal abuse affects every member of the family. If the spouse that is being abused is abused physically they may obtain injuries so bad that it becomes virtually impossible to work without protesting in pain. Spousal abuse also affects the family financially seeing that more money would have to be used on medical bills than usual. The victim of spousal abuse may fall into a deep state of depression. So deep that all he/she can think about is death and committing suicide to escape the pain. They may become drug and alcohol dependant and thus slowly but surely waste away, not caring about anything . Not their appearance, attitude, children, nutritious needs or anything else. With their parent being in such a state the children may take advantage of it and do things they would not have normally done if their parent wasnt in that state. Another social pressure that affects the family greatly and is very common is alcoholism. Often the cause of alcohol abuse is stress. This stress could be brought on by overworking with little pay or abusive spouses. The actions of a person under the influence of alcohol can be terrifying and even fatal, if not to others, to himself. If the alcohol dependant person is the one handling all the financial papers in the house, the family would eventually find themselves in a state of debt, if another person doesnt take over that job, due to the alcoholic forgetting to pay the bills. An alcohol influenced person may become angry and violent towards his spouse and children for no apparent reason. Thus the children are afraid to even come home or speak to that parent. Eventually after the children are abused so many times they may feel a need to put some alcohol in their system to deal with the situation and here we see a pattern begin to form. An alcoholic child is just as bad as an alcoholic adult maybe even worse. Being so young they may have more unbelievable ideas then the adult. They may come up with things to do which they think is fun but in truth can prove to be fatal. The parent of this alcoholic has to deal with the shame and violent acts that are committed by the child. He/she will want to spend as much time helping the child as possible. This could cause the other siblings to feel neglected and unloved and they too can fall into a great depression. Every family member is faced with a social pressure at one point in time, but it is up to them as an individual to decide whether they would let the pressure affect them positively or negatively. If the family goes through the phase and comes out unharmed they will most likely become a stronger family.

Wednesday, November 6, 2019

Laetoli - 3.5 Million Year Old Hominin Footprints

Laetoli - 3.5 Million Year Old Hominin Footprints Laetoli is the name of an archaeological site in northern Tanzania, where the footprints of three homininsancient human ancestors and most likely Australopithecus afarensiswere preserved in the ash fall of a volcanic eruption some 3.63-3.85 million years ago. They represent the oldest hominin footprints yet discovered on the planet.   The Laetoli footprints were discovered in 1976, eroding out of a gully of the Nagarusi river, by team members from Mary Leakeys expedition to the main Laetoli site. Local Environment Laetoli lies in the eastern branch of the Great Rift Valley of eastern Africa, near the Serengeti Plain and not far from Olduvai Gorge. Three and a half million years ago, the region was a mosaic of different ecotones: montane forests, dry and moist woodlands, wooded and unwooded grasslands, all within about 50 km (31 miles) of the footprints. Most Australopithecine sites are located within such regionsplaces with a wide variety of plants and animals nearby. The ash was wet when the hominins walked through it, and their soft print impressions have given scholars in-depth information about the soft tissue and gait of Australopithecines not available from skeletal material. The hominin prints are not the only footprints preserved in the wet ashfall: animals walking through the wet ash included elephants, giraffes, rhinoceroses and a wide variety of extinct mammals. In all there are 16 sites with footprints in Laetoli, the largest of which has 18,000 footprints, representing 17 different families of animals within an area of about 800 square meters (8100 square feet). Laetoli Footprint Descriptions The Laetoli hominin footprints are arranged in two 27.5 meter (89 foot) long trails, created in moist volcanic ash which later hardened because of desiccation and chemical change. Three hominin individuals are represented, called G1, G2, and G3. Apparently, G1 and G2 walked side by side, and G3 followed along behind, stepping on some but not all of the 31 footprints of G2. Based on known ratios of the length of a bipedal foot versus hip height, G1, represented by 38 footprints, was the shortest individual of the three, estimated at 1.26 meters (4.1 feet) or less in height. Individuals G2 and G3 were largerG3 was estimated at 1.4 m (4.6 ft) tall. G2s steps were too obscured by G3s to estimate his/her height. Of the two tracks, G1s footprints are the best preserved; the track with footprints of both G2/G3 proved difficult to read, since they overlapped. A recent study (Bennett 2016) has allowed scholars to identify G3s steps apart from G2 more clearly, and reassess the hominin heightsG1 at 1.3 m (4.2 ft), G3 at 1.53 m (5 ft). Who Made Them? At least two sets of the footprints have been definitely linked to A. afarensis, because, like the fossils of afarensis, the Laetoli footprints do not indicate an opposable great toe. Further, the only hominin associated with Laetoli area at the time is A. afarensis. Some scholars have ventured to argue that the footprints are from an adult male and female (G2 and G3) and a child (G1); others say they were two males and a female. Three dimensional imaging of the tracks reported in 2016 (Bennett et al.) suggests that G1s foot had a different shape and depth of heel, a different hallux abduction and a different definition of the toes. They suggest three possible reasons; G1 is a different hominin from the other two; G1 walked at a different time from G2 and G3 when the ash was sufficiently different in texture, producing differently shaped impressions; or, the differences are a result of foot size / sexual dimorphism. In other words, G1 may have been, as others have argued, a child or a small woman of the same species. While there is some ongoing debate, most researchers believe that the Laetoli footprints show that our Australopithecine ancestors were fully bipedal, and walked in a modern manner, heel first, then toe. Although a recent study (Raichlen et al. 2008) suggests that the speed at which the footprints were made might affect the kind of gait required to make the marks; a later experimental study also led by Raichlen (2010) provides additional support for bipedalism at Laetoli. The Sadiman Volcano and Laetoli The volcanic tuff in which the footprints were made (called the Footprint Tuff or Tuff 7 at Laetoli) is a 12-15 centimeter (4.7-6 inches) thick layer of ash which fell on this region from the eruption of a nearby volcano. The hominins and a wide variety of other animals survived the eruptiontheir footprints in the muddy ash prove thatbut which volcano erupted has not been determined. Until relatively recently, the source of the volcanic tuff was thought to be the Sadiman volcano. Sadiman, located about 20 km (14.4 mi) southeast of Laetoli, is now dormant, but was active between 4.8 and 3.3 million years ago. A recent examination of outflows from Sadiman (Zaitsev et al 2011) showed that the geology of Sadiman does not fit perfectly with the tuff at Laetoli. In 2015, Zaitsev and colleagues confirmed that it was not Sadiman and suggested that the presence of nephelinite in Tuff 7 points to the nearby Mosonic volcano, but admit that there is not conclusive proof as of yet. Preservation Issues At the time of excavation, the footprints were buried between a few cm to 27 cm (11 in) deep. After excavation, they were reburied to preserve them, but the seeds of an acacia tree was buried within the soil and several acacias grew in the region to heights of over two meters before researchers noticed. Investigation showed that although those acacia roots did disturb some of the footprints, burying the footprints was overall a good strategy and did protect much of the trackway. A new conservation technique was begun in 1994 consisting of application of a herbicide to kill all the trees and brush, the placement of biobarrier mesh to inhibit root growth and then a layer of lava boulders. A monitoring trench was installed to keep an eye on the subsurface integrity. See Agnew and colleagues for additional information on the preservation activities. Sources This glossary entry is a part of the About.com guide to Lower Paleolithic, and the Dictionary of Archaeology. Agnew N, and Demas M. 1998. Preserving the Laetoli foodprints. Scientific American 279(44-55). Barboni D. 2014. Vegetation of Northern Tanzania during the Plio-Pleistocene: A synthesis of the paleobotanical evidences from Laetoli, Olduvai, and Peninj hominin sites. Quaternary International 322–323:264-276. Bennett MR, Harris JWK, Richmond BG, Braun DR, Mbua E, Kiura P, Olago D, Kibunjia M, Omuombo C, Behrensmeyer AK et al. 2009. Early Hominin Foot Morphology Based on 1.5-Million-Year-Old Footprints from Ileret, Kenya. Science 323:1197-1201. Bennett MR, Reynolds SC, Morse SA, and Budka M. 2016. Laetoli’s lost tracks: 3D generated mean shape and missing footprints. Scientific Reports 6:21916. Crompton RH, Pataky TC, Savage R, DAoà »t K, Bennett MR, Day MH, Bates K, Morse S, and Sellers WI. 2012. Human-like external function of the foot, and fully upright gait, confirmed in the 3.66 million year old Laetoli hominin footprints by topographic statistics, experimental footprint-formation and computer simulation. Journal of The Royal Society Interface 9(69):707-719. Feibel CS, Agnew N, Latimer B, Demas M, Marshall F, Waane SAC, and Schmid P. 1995. The Laetoli Hominid footprintsA preliminary report on the conservation and scientific restudy. Evolutionary Anthropology 4(5):149-154. Johanson DC, and White TD. 1979. A systematic assessment of early African hominids. Science 203(4378):321-330. Kimbel WH, Lockwood CA, Ward CV, Leakey MG, Rak Y, and Johanson DC. 2006. Was Australopithecus anamensis ancestral to A. afarensis? A case of anagenesis in the hominin fossil record. Journal of Human Evolution 51:134-152. Leakey MD, and Hay RL. 1979. Pliocene footprints in the Laetolil Beds at Laetoli, northern Tanzania. Nature 278(5702):317-323. Raichlen DA, Gordon AD, Harcourt-Smith WEH, Foster AD, and Haas WR, Jr. 2010. Laetoli Footprints Preserve Earliest Direct Evidence of Human-Like Bipedal Biomechanics. PLoS ONE 5(3):e9769. Raichlen DA, Pontzer H, and Sockol MD. 2008. The Laetoli footprints and early hominin locomotor kinematics. Journal of Human Evolution 54(1):112-117. Su DF, and Harrison T. 2015. The paleoecology of the Upper Laetolil Beds, Laetoli Tanzania: A review and synthesis. Journal of African Earth Sciences 101:405-419. Tuttle RH, Webb DM, and Baksh M. 1991. Laetoli toes and Australopithecus afarensis. Human Evolution 6(3):193-200. Zaitsev AN, Spratt J, Sharygin VV, Wenzel T, Zaitseva OA, and Markl G. 2015. Mineralogy of the Laetolil Footprint Tuff: A comparison with possible volcanic sources from the Crater Highlands and Gregory Rift. Journal of African Earth Sciences 111:214-221. Zaitsev AN, Wenzel T, Spratt J, Williams TC, Strekopytov S, Sharygin VV, Petrov SV, Golovina TA, Zaitseva EO, and Markl G. 2011. Was Sadiman volcano a source for the Laetoli Footprint Tuff? Journal of Human Evolution 61(1):121-124.

Monday, November 4, 2019

Drawing on observations from the Polish-German borderland, critically Essay

Drawing on observations from the Polish-German borderland, critically examine the effects which Europeanisation - or EU-isation - Essay Example Once this has been done, the impacts that Europeanisation has had upon the Polish-German borderland will then be highlighted and both the advantages and disadvantages of closed borders will be discussed. Applicable text books, journal articles and online databases will be accessed by conducting both a library and online search. Once the evaluation has been made, an appropriate conclusion will then be drawn, demonstrating that Europeanisation does significantly affect the borderness nature of Eastern Europe. Main Body Europeanisation is a process of change whereby a non-European subject adopts various European features. This has been defined as â€Å"a process involving; construction, diffusion and institutionalisation of formal and informal rules, procedures, policy paradigms and shared beliefs† (Cini, 2007: 407). The European features are initially defined and consolidated within the policy process of the EU and subsequently incorporated into domestic structures. This effecti vely creates a borderless world which was identified by Ohmae (1990: 172) when he stated that; â€Å"national borders have effectively disappeared and, along with them, the economic logic that made them useful lines of demarcation in the first place.† Despite this contention, borders are still greatly important in helping to develop regions that are divided by state boundaries and also for analysing modern geography relating to politics and economics (Nelles and Walther, 2011: 6). They also form part of an ideology and help to demonstrate the limits associated with territorial ownership and control (Herrschel, 2011: 173). They have a significance beyond economics, since borders in all areas of life affect the ways that people perceive themselves and their role in the world: â€Å"Borders are integral to human behaviour – they are a product of the need for order, control and protection in human life and they reflect our contending desires for sameness and difference, f or a marker between ‘us’ and ‘them’.† (O’Dowd, 2002: 14-15). Borders are therefore vital in helping to distinguish different identifies, and yet since the 1989 Revolutions; borders within the EU have undergone some important transformations. Both the re-bordering and de-bordering of the EU has taken place and these processes vastly complicate the ways that people view their own local, regional and national identities. Whilst this proliferation of identities may seem contradictory, greater flexibility now exists for people to step outside both the mental and physical limitations of previous decades. As the example of the Russian-Finnish border has shown, some dimensions of border transformation are relatively easy to implement, while others remain relatively impervious to new rulings, even at the national and international level. This is because â€Å"boundaries are understood as institutions and symbols that are produced and reproduced in soci al practices and discourses† (Paasi, 1999:669). It is this level of symbolic meanings, passed on from person to person through social interaction that is so vital for the successful advance of Europeanisation. Without this level of social engagement to aid with transformation of the deeper significance attached to the border location, any amount of administrative

Friday, November 1, 2019

Write a Critical Review paper on Students with disabilities enrolled Research

Write a Critical Review on Students with disabilities enrolled at educational institutions at all levels - Research Paper Example On top of that, the lawsuit also alleged that the state of New Jersey had violated its constitutional obligation to oversee the implementation of IDEA requirements at the grassroots; in defense, the state of New Jersey filed a motion to dismiss citing a constitutional challenge to the implementation of the IDEA. According to the state of New Jersey, it was immune to private lawsuits regarding enforcement of the IDEA under the provisions of the Eleventh Amendment but the section of parents were not convinced by this argument. In their earnest search for justice, the section went ahead to seek intervention in defending the constitutionality of IDEA, which was eventually granted to them; in their battle to defend the constitutionality of IDEA, the section fronted two strong arguments as the foundation of their case. In their first argument, the section proposed that the state of New Jersey had accepted the federal IDEA funds that were meant to meet the cost of educating students with disabilities consequently agreeing to act in accordance with the IDEA by relinquishing its sovereign immunity. In the second argument, the section contended that following the enactment of the Fourteenth Amendment, Congress had in fact genuinely repealed the state sovereign immunity, which the New Jersey was still claiming to have in its argument for a dismissal motion. In accordance with the Rules 12(b) (1) and (b)(6), of the Federal Rules of Civil Procedure, the NJDOE and the State officials filed a motion of dismissal of the complaint by arguing that they were immune to the suit under the provisions of the Eleventh Amendment. They also held that the plaintiff’s complaint should be dismissed for failure to exhaust administrative remedies and that given the state’s sovereign immunity, it was wrong for an injunctive relief to be entered against it, particularly because it was not the right subject of an order for the provision of free and appropriate public