Thursday, October 31, 2019

Bank financial management Essay Example | Topics and Well Written Essays - 1500 words

Bank financial management - Essay Example While some considers the commodities and equity market as one of the riskiest assets for an investor to put his or her money, the riskiness of a bank is defined differently. The financial statement of a bank reflects the true picture of its assets and liabilities at a particular point of time for a particular period. The balance sheet of a bank shows the total assets owned by the bank and the total liabilities owed by the bank, on a given date. Different countries have different capital adequacy ratio and guidelines that help the banks to maintain adequate capital to protect the bank from defaulting. The global financial crisis that affected almost all the economies, directly or indirectly, changed the perception of risk in the multinational banks all over the world. The Basal committee on banking supervision which was established by the central bank authorities of ten countries encourages common standard and common capital adequacy requirements for its members to ensure investor protection of funds. Assessing the Financial Position of European & US Banks during the Period 2002-07 A bank is considered as one of the safest place for putting money when compared to other investments instruments like equities or corporate debt instruments, derivatives, hybrid instruments, etc. However, the perception of many people around the world has changed with time. If banks has inadequate capital base, it will need third party assistance to infuse capital which will increase borrowing cost and risk. Consider an example, and investor has the option to invest in Bank A, operating in US, or in Bank B, operating in Germany. Moreover, the rate of return from both the bank is same, say 5%. So, in this case, how does an investor decide in which bank he or she should park money? One way to answer this question is to ascertain the risk of default for both the banks, since the given expected return is same. To determine the riskiness of default, an individual or corporate need to assess the financial statement of both the banks. Key variables like the total assets, loans, deposits and short term funding, equity, net interest margin, liquidity, profit before tax, operating income, fee and commissions, loans to total asset ratio, interest coverage ratio, profitability ratio, etc. are used to evaluate the financial health of the banks (Selvavinayagam, 1995, pp.11-32). From the given data, if we analyse the performance of the European banks with US banks on the basis of Net Interest Margin, their efficiency can be assessed. To analyse the given data, we first concentrate on the NIM of commercial banks from the year 2002 to 2007. The net interest margin or NIM is defined as the difference between the interest income and the interest paid by the banks relative to other assets. This is similar to the gross profit margin of the non-financial institutions (Maudos & Guevara, 2002, pp.18-19). Higher values mean that the banks are earning higher spread between the interest receivable on loans given out and the interest payable on the loans taken. The average Net Interest Ma rgin for the U.S. from 2002-07 is above 3.00% compared to the European bank of is 2.9931%. Thus, keeping other things constant, on the basis of NIM, the US banks are marginally more efficient compared to the E

Monday, October 28, 2019

The foghorn and the sea Raiders Essay Example for Free

The foghorn and the sea Raiders Essay Thought (Hugin) and Memory (Munin) were the two ravens that went unto the world to observe and return to tell of what all men do, Driven by further search for knowledge, Odin begged Mimir, the wise, to allow him to drink from the well of wisdom, for this he consented to lose an eye. Wounded I hung on wind swept gallows For nine long nights, Pierced by a spear, pledged to Odin, Offered myself to myself: The wisest know not from whence spring The roots of that ancient rood. They gave me no bread, they gave me no mead: I looked down; with a loud cry I took up the runes and I fell. (The Elder Edda 56) Here we find Odin once more sacrificing himself for knowledge, In The Ultimate Encyclopedia of Mythology it is said that Odin actually died on the gallows of Yggdrasil, that he traversed Nifleheim, or Hel in order to obtain the nine sacred runes, that seem to be extremely powerful as described in The Elder Edda. The Ultimate Encyclopedia of Mythology adds yet another theory to Odin hanging himself, The parallel between Odins voluntary death on Yggdrasil and the crucifixion remains striking. Odin was pierced with a spear and like Christ, cried out before he died there is little doubt that his hanging on the cosmic tree had pre-Christian origins and derived from ancient pagan worship. Odin had long been the god of the spear, the god of the hanged. This could definitely be determined as less than speculation, seeing as we must rely on our sources and to this point one could say that this is a very valid and well thought out work. Regardless of minor differences in text again we must as they did default ourselves to the larger span of information. There were two different groups of gods in Scandinavian Mythology, The Aesir and the Vanir. Each having their own respective dwelling place, Asgard for the Aesir, and Vanaheim for the Vanir. Of the two, The Vanir have been said to be the older. Unlike the warrior Aesir, the Vanir were a race of gods associated with fertility, wealth, and good weather. (The Ultimate Encyclopedia of Mythology 500) Among the Vanir were, Njord, the sea and fortune god, Skadi, the god of destruction, Freyja, the goddess of love, and Freyr the god of Fertility. Among the Aesir were, Odin, Balder, Bragi, Forseti Heimdall, Hodr, Thor, Tyr, Vili, Ve, Vidar, Frigg, Sif, and Idun. At one point in time there was a great war between these two branches of gods, yet both the Aesir, and the Vanir came to terms by exchanging several prominent gods of each side. The Vanir sent Njord, Freyr, Freyja, and Kvasir, while the Aesir sent Mimir, and Honir. The Vanir soon found that they got the bad end of the deal due to the fact that Mimir was the only one who knew what he was talking about, and that in his absence Honir, wasnt really that bright. The Vanir then sliced of Mimirs head and sent it back to Asgard, where Odin used Powerful magic to allow Mimirs head to speak. Little else is known of the Vanir, they seemed to lose importance quickly after it was concluded that the war was resolved however it was noted that Vanaheim, was potentially unaffected by Ragnarok. This shows evidence of two religions colliding with Scandinavian and Germanic mythology. Revealing to us that Scandinavian mythology has most definately influenced by other ancient tales and stories. (Cherry, Vanaheim) Scandinavian mythology might have been the inspiration to several works of modern day literature. It is Nicole Cherrys opinion that Tolkien was very well acquainted with the northern mythos, as can be seen by the use of it in his books. The name of one of his main characters, Gandalf, is found in The Poetic Edda. Gandalf is, in some ways, reminiscent of Odin, the leader of the Norse pantheon. Even the name Middle-earth, the setting for Tolkiens The Lord of the Rings, comes from Norse mythology. There are several other modern day works of literature based on or derived from Scandinavian mythology as well, such as, The Ring of the Nibelung and The Nibelungenlied. These works, may well show the effect and legacy of Scandinavian Mythology in the World. Another notable element of Tolkeins Lord of The Rings was his use of the ring itself to the Viings the ring meant wealth honor fame and destiny. It was in fact a tradition to give rings to neighboring countries, bringing to notice the ever prominent focal point of the Lord of the Rings. (Day 29) There is no Heaven or Hell in Scandinavian mythology, the only hope is to be brought up to Asgard by a Valkyrie or Battle Maiden. Even then those chosen or the Einherjar (The Heroic dead) faced defeat at Ragnarok in the Final Battle on the Vigrid Plain. This may be unlike any other focal point of religion known. It reasons in many ways that the only way to gain honor is to die in battle unfaltering. Scandinavian Mythology, although comparable to other religions or other pagan beliefs is an original and unique work of the Norwegians, Swedish, Icelandic, and Danish peoples of Europe. Hamilton describes it justly by saying, Asgard, the home of the gods, is unlike any other heaven men have dreamed of. No radiancy or joy is in it, no assurance of bliss, it is a grave and solemn place, over which hangs the threat of inevitable doom the same is true for humanity this conception of life which underlies Norse religion, as somber a conception the human mind has ever given birth to A heroic death is not a defeat, but a triumph. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE JRR Tolkien section.

Saturday, October 26, 2019

Computer Ethics And Impact Of Society Information Technology Essay

Computer Ethics And Impact Of Society Information Technology Essay This report is a study of computer ethics and its relevance to todays society .We live in the age of super computers where everything comes to us in our finger tips. Children get exposure to Internet much before they start their formal education. Computers are electronics devices invented by humans for the convenience and welfare of themselves which does not have any kind of thought process internally about the ethical behaviours. The dos and donts in the information technology and Internet are unknown to many computer users. As new evolving technologies come in and these technologies pays way to create challenges in the areas of privacy and security of people around the world. Ethics refers to code of principles by which people live .Computer Ethics is the branch of information technology which deals with the nature and computer technology and the end users and their varying characters. It sets a certain standards or rules for the will be smooth sailing. Some common computer ethics are intellectual property rights copyrighted electronic content, privacy concerns, by which how computers affect society. It involves social issues, such as access rights, working place monitoring, censorship and junk mail; professional issues such as professional responsibility and code of conduct; legal issues such as legal obligations, data protection, and computer misuse and software piracy. The computer ethics field consists of the problems with computer software and hardware malfunctions by the misuse by humans. Our society depends on the computer and its network to leverage the business and social life, hence both social and personal ethicals issues exists . Without computers and its networks most of the industries will not survive in todays work and will come to a halt. Most of the electronic communications do not guarantee any security and privacy. This report is a journey through the history of computer ethics the pioneers and their perceptions and slants on computer ethic s. Later on walks through the influence of computer ethics at work and the various factors that affects to determine the ethical behaviours. (Bynum, 2008) 2. HISTORY OF COMPUTER ETHICS 1940s As the technology evolves, the studies related to this field evolved as well. The introduction of computer ethics as a study came in the year 1940. Norbert Weiner was known as the father of computer ethics. In 1940s, Norbert Weiner who was an American mathematician and professor of Massachusetts Institute of Technology created the Cybernetics during Second World War. 1950s In 1950 Weiner publishes his second book The Human Use of Human Beings [Page 16 of second edition of 1954] When I communicate with a person, I impart a message to him and when he communicates back with me he returns a related message which contains information primarily accessible to him and not to me. When I control the action of another person I communicate a message to him and although this message is in the imperative mood, the technique of communication does not differ from that of a message of fact It is the thesis of this book that society can only be understood through a study of the messages and the communication facilities which belong to it; and that in the future development of these messages and communication facilities, messages between man and machines, between machines and man, and between machine and machine, are destined to play an ever increasing part. 1960s Later in 1960 Don B. Parker, an Information Security Researcher and Consultant -associated with the ACM(Association of computer machinery) started watching the unethical usage of computer and information technology by computer professionals (Parker, 1999) (Bowling Green State University., 2001) In 1966 a professor from MIT Joseph Weizenbaum wrote ELIZA A Computer Program for the Study of Natural Language Communication between Man and Machine. The first computer crime was in the year 1966 in the United States, a computer engineer manipulated the programs of a banks computer system to prevent the banking account being used flag as overdrawn. In 1966 the Freedom of information Act (FOIA) was the first computer law legal right to access the governments information 1970s 1970s were the time period where the computers revolutionized and Walter Manner who is a Professor of Computer Science and Director of the Artificial Intelligence Project at Bowling Green State University in Bowling Green, Ohio introduced the term Computer Ethics . Manner offered the university students a course on an experimental Course on the subject at Old Dominion University. During the late 1970s through the mid of 1980s, being a lecturer Mr,Maner was much interest in university-level Computer ethics courses. He offered a variety of workshops and lectures at Computer science conferences and philosophy conferences across America. In 1978 he also self-published and disseminated his Starter Kit in Computer Ethics, Which contained curriculum materials and pedagogical advice for university? Teachers to develop computer ethics courses. In 1976 Joseph Weizenbaum published a 300 page book, Computer Power and Human Reason which set the benchmark in computer ethics as a field and is still considered as the classic in computer ethics In 1976: Abbe Mowshowitz published an article, titled: On approaches to the study of social issues in computing. It identifies and analyzes technical and non-technical biases in research on social issues in computing. Five positions-technicism, progressive individualism, elitism, pluralism, and radical criticism-which reflect major streams of contemporary social thought are examined- The ACM digital library, volume 24, issues 3, March 1981 In 1979 Terrell Ward Bynum s Professor of Philosophy at Southern Connecticut State University 1980s In 1985 James H Moor who is a professor of Dartmouth College in Intellectual and Moral Philosophy published an influential article entitled What is computer ethics. In the same year followed by moor, Deborah Johnson of Rensselaer Polytechnic Institute published Computer Ethics This is referred as the first textbook on computer ethics. The Electronic Communications Privacy Act ECPA of 1986 which prohibits the lawful access and disclosure of the law prevents government entities from requiring disclosure of electronic communications from a provider without proper procedure. (AOL Legal Department, 2003) 1990s Donald William gotterbarn in 1991 his paper work Computer Ethics: Responsibility Regained. explained computer ethics as a branch of professional ethics concerned with standards of good practice (Gotterbarn) (computerethics.org, 2000) In October 1992 the executive council of Association for Computing Machinery (ACM) voted to adopt the revised the ACM Code. It is also called Software Engineering Code of Ethics and Professional Practice ACM code of Ethics and Professional Conduct consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment [http://wiki.answers.com/Q/What_is_ACM_code] In 1995, Dr,Simon Rogerson professor of computing at De Montfort University in Leicester, UK created the Centre for Computing and Social Responsibility (CCSR) to organize the first computer ethics conference in Europe, which was named as ETHICOMP95.lateron Rogerson added computer ethics to the curriculum of De Montfort. In 1995 Gordian Kocikowska, predicted on computer ethics giving a statement computer ethics eventually will evolve into global ethics in her article The computer revolution and the problem of global ethics In 1999 Deborah Johnson stood opposite to the statements of Gorniak and told computer ethics will not revolution rather than ethical thinking and analysis, computer ethics is the same ethics with a twist in the flavour. (Comphist, 2004) (Bynum, 2008) VIEWS OF PIONEERS Norbert Wiener Norbert Weiner in his book Cybernetics or control and communication in the animal and the machine in 1948, Cybernetics is formally defined as the science of control and communication in animals, men and machines. It extracts, from whatever context, that which is concerned with information processing and control. His essential goal of cybernetics is to understand and define the functions and processes of systems that have goals. Weiner said that the human nervous system can be compared to It is enough to say here that when we desire a motion to follow a given pattern the difference between this pattern and the actually performed motion is used as a new input to cause the part regulated in such a way to bring its in a state of what is known as ataxia.An ataxia of this type is familiar in the form of syphilis of the central nervous system known ad tabes dorsalis where the kinetic sense conveyed by the spinal nerves is more or less destroyed [page 7 and 8]. Amount of information in a sy stem is the measure of its degree of organization, so entropy of s system is a measure of its degree of disorganization. And one is simply negative the other.study of Maxwell demon [Page 11]. Donn B Parker In an interview with Donn told that he has interviewed more than 200 cyber criminals to understand the motive to get into computer crimes which shows the evidences of common behavioural psychological patterns. Computer criminals universally fear unpredictable circumstances, environments and events that could cause their crime to fail. Unpredictable systems would create an atmosphere of uncertainty (Bowling Green State University., 2001) Parker describes the scenario methodology in computer ethics, a need to identify the participant in the scenario. Sorting the act and non-act classifying as ethical or non-ethical or not in the category Deborah Johnson Deborah has a different view on computer ethics. She said pose new versions of standard moral problems and moral dilemmas, exacerbating the old problems, and forcing us to apply ordinary moral norms in uncharted realms, even though she do not agree with computer creating new moral problems James H Moor As per Moor in his article What is computer ethics ? defined ethics due to policy vacuum and conceptual muddles with regards to social and ethical use of computers and technology. Computers provide new capabilities and new choices for action. His advices to analyse the framework which results in policy for that action. He also added that computers are logically malleable which can be moulded to do any kind of activities Donald Gotterbarn According to Gotterbarn computer ethics should be considered as branch of professional ethics with focus on standards of good practices for computer professionals whom all are engaged in the design and development of in the everyday activities will add value to their professional value. Co-ordinating with ACM he released code of ethics for computer professionals. (Gotterbarn) (Bynum, 2008) 4. COMPUTER ETHICS IN SOCIETY Computers and human life are inter-related , we relish it in many areas of our day to day life in traffic signals, banking system, tax, and police. People blame on computers for cash machine crashes traffic signal failures where human designed these softwares and networks. the dilemma are the blunders associated with computers like ozone layer remained undetected due to programming error Y2K problem was not detected till we approached 2000.If we dig into the actual history of the computer ethics it started with the use of first computer. Computer and information technology is not limited as it is spreads with branches like a banyan tree; information technology has its branches in all the fields of Industry medical, automotive like that the list is not closed. Internet which is a by-product of ICT is revolutionary link to all these branches. We connect officially as corporate, be in touch with our loved ones, search engines, mail, instant messengers. As a medium of storage of critical to personal data, everything are on fingertip irrespective of the physical location as we can say the information technology moves with us and is available in the same or expected form on the web. (Herold, 2006) (Bynum, 2008) 4.1 COMPUTER CRIMES Most of the cyber criminals are anti-social element who gets motivated by the prior worst personal experience resulting in the crimes. Computer crimes can result in financial loss, information loss. Some major computer crimes in info space and as listed below which affects both work and personal life. (Herold, 2006) Hacking Virus Fraud Identity theft Denial Of Services DoS Child pornography IRC crime Software piracy Hacking Computer hacking has become a status among many youngster.. Hackers are tend to have better understanding of coding and break into computers and are aware of bypassing the security or can remain undiscovered in the network for a certain time without leaving footprints for the forensics by wiping out the log files. When we talk about the evil we should see the other side of the coin the virtuous which is ethical hacking .Ethical hacking is meant for attacking the computer system or network with the full permission of the sole. The most common ethical hacking technique is penetration test by inducing the code to the system and to be aware of the vulnerabilities by negligence as the hackers look for loop holes and create back door. Many corporate create their own IT security policies to secure their network. Virus Computer viruses are in the top most list of threat faced by the Information world. Computer program created to do nasty works inside which enters into a computer by mean of downloading softwares or mp3 files which calls them as Free softwares. Worm is much similar to the virus which gets replicated by human intervention; until and unless provoked remain quiet in the corner of the system. Trojan horses are interested in creating a back-door for the intruders in a compromised machine. Deploying a powerful anti-virus with the latest released virus definitions can help us in leading a peaceful life (Williams, 2003) Identity theft Financial identity theft is the widely asserted crime happening in the Internet. These intruders get into the system pretending the account holder of the bank by inputting false identity. A criminal identity thief uses the personal information including the national insurance number and social security number to do crime and leave it as the proof of identity. Medical identity theft is done by using another persons identity to obtain medical care or drugs where law restricts to purchase drugs. Computer security is the ultimate solution for identity theft by sanitizing the obsolete data in system and spam mails by installing anti-virus software which has powerful tools to protect online transactions. Most of the nations have law in place against these kind of identity thefts which includes heavy financial fine and imprisonment Denial of Services-DoS Denial of service wont affect neither the system security or destruct information loss any files make financial theft but can affect the targeted business by putting on fire ranging from second to days by making unavailability of a critical server, email or website which provides service as business . A buffer overflow with a prior assumption that of the weakness of programming or architecture of the applications used are the famous denial of service attacks that bench marked the history so far. Disabling the ICMP traffic in the firewall can prevent the ping of death. Implementing strong encryption techniques and deploying domain naming service. To overcome DoS attacks are by knowing the infrastructure and regular testing for complexity, keeping spam filters will limit mailbox getting flooded, if the business demands buying a space in the cloud or by keeping dramatically huge processor power and server volume will help to prevent such kind of issues. Pornography Pornography refers to any kind of image displaying a person who is being engaged in explicit sexual activity. In countries like Spain child pornography is a criminal offense if conventional pornography was in the paper based hard copy or video tape as technology advanced the Internet based pornography is image files or video files and on-line buffering. Severely punishing these criminals and these punishments to be brought to the notice of general public for their awareness that it will their experience if they do so. Association of sites advocating child protection ASACP was found in 1996 is meant for reporting child abuses in the society anonymously aiming to catch hold of the pornographers, they have a fully functional hot line and website asacp.org where people are report the crime . The RTA certificate helps children from accessing pornographic websites which is available Internet wide free of cost. (Barrons Educational Series, Inc, 1999) IRC Crimes Many people lose their privacy when then enter the IRC (Internet Relay Chat) rooms. The chat rooms become the playground of cyber criminals, hackers and terrorists. Verbal IRC crimes are where people get abused verbally in the chat rooms. The second category is clone attack where randomly synchronized codes are generated on behalf of usernames by robots to generate a random character which gets multiplied by the per-written code result in flooding and the chat server gets freezes due to Denial of service. Criminals use Cyber stalking to harass women and celebrities. IRC crimes can be stopped by simply ignoring or banning the user id which almost all chat sites allow. Salami Attack All these times we were talking about a crime which is relevant only to single attack , now lets talk about a series of tiny attacks which is categorized as salami slicing in computer cyber terms. The attacker steals a comparatively small amount of money from the account and the actual account holder will assume that it might be a service charge of any bank transactions or transaction which they might have done during shopping and wont be bothered to scrutinise the actual fact. such attacks will be done will multiple users which is like an atomic reaction. Botnet A bot is defined as zombie army which is an interconnected network of computers on the Internet with malicious infected software robots. The zombies army can be controlled only by the owner of the respective program. Botnet which is a malware can result in Denial of service attack. Criminals use this technique to utilize the shared processing power and memory Gradually the users system will face slow down .The solution to overcome the botnet is to install antivirus which can detect the malwares .(Parker, 1999) 4.2 INTELLECTUAL PROPERTY Intellectual property commonly referred as IP in short is associated with creativity of an artistic work, or invention of technologies. Computer professionals and students are committed not to copy other works to part of their work without their consent. Taking the credit of innovative work might not be technically a crime under law but it is unethical. According to Richard stallman the founder and pioneer of Free software , software it should not lie with certain limited people . His version is no one has the monopoly to own, it should be open to all it being claimed as information. The statement of Deborah Johnson is that softwares and applications are the outcomes of a group of professionals effort leveraged by their skill set. I would stand aside Johnson as this an industry which is the bread giving one, but outdated softwares can be release for public use and for students and financially backward people where the light of information world dint fall. Intellectual property is cat egorized into two by world intellectual property society as copyright and patent 4.2.1 Piracy Software piracy is the most controversial talk in the information space, if we never pay for free-ware used, the sharewares has to be payed depending on the usage entitled by the owner. Piracy lies somewhere in the middle where the customer need to be pay relatively small amount which is common in Asian countries. Piracy has spread to video industry as well by where the storage discs of newly released albums and movies are available in market for cheaper price .(Williams, 2003) 4.2.2 Open-source Vs Closed-source. Open-source applications are those applications available free of cost Closed-source applications are available in the market like windows operating system. Open-source softwares can be downloaded free of cost and can be manipulated using the source code. As the word refers closed source softwares are closed in many ways, so we can expect more security from them. It will not be easier for a hacker to create a threat in closed source. For an open source application the source is readily available to the end user, he can experiment the possible vulnerabilities and can create a threat from that. 4.2.3 Plagiarism Students are liable to stick on to plagiarism. Copying a colleagues crucial information is equivalent to theft. Plagiarism is a kind of cheating, school going kids do it by literally downloading and later amend it by changing the overall look by adding font colours. Arranging the referred website and book in a systematic way will help the student falling into plagiarism. Consolidating this data into bibliography will help the student in the safer side. (Bynum, 2008) (Williams, 2003) 4.3 PRIVACY AND ANONYMITY Spoofing Spoofing is the process of doing any kind of on-line data transfer where the origin of the data will be IP- spoofing and email spoofing the subcategories of spoofing . IP-Spoofing is the technique used to hide ones ip address and leverage other persons ip address to do some malpractices. In email spoofing the usually terrorists use this to send threatening email to home affairs department. Man in the middle attack is the by-product of spoofing where a person does the crime pretending the online transaction is done by the poor chap who owns the on-line account by network address translation on a cloud computing . Many corporate have security policies implemented to defend against these attacks Phishing Phishing is the tactics of sending fake emails giving an impression to the end user who receives the email mentioning he is receiving it on behalf of a well reputed organization most of the times from the billing or financial department claiming asking for the credit card details .Phishing sets either an upsetting message or an offer message which enables a psychological reaction in human Phishing scams are dramatically increasing now a day. To overcome in case of any discrepancies the link needs to be avoided and intimating the concerned person may be a good approach. Password protection Passwords are the keys to get into our privacy .Every individual have a bunch of passwords and most of them are identical for our own convenience. .If we are in a business critical position of a corporate or reputed brand. We should adhere to not sharing the passwords even with our friends; need to keep the passwords changed in a time interval of three months .need to make sure we are using complex passwords which contains alphanumeric characters as well. (Bynum, 2008) SOCIAL NETWORKING AND BLOGS Social networking in a spanning innovation of the present world. It is one among the innovations of the decade which if used in a supposed manner common population can make use of it .The advantage of social networking is wherever we go around the world we can be in touch with our loved ones and friends. Social networking can let a business man know the response of his products instantly from the blogs. As mentioned early when new invention is born with twin brother which is a crime . He looks identical twin until being as a crime. Social networking is an unavoidable part of our social life. We are kept updated by the blogs and status updates which is advantageous in many ways for a person who dont look at newspaper , improving his vocabulary, culture and will let him know what is happening around and most of them comes free of cost. An individual can upload a fake profile which can misguide many youngsters. Most of the social networking websites are privately owned and they dont rea lly look into the verification of the information provided in the user profile which might result in the misuse of profile for anti-social activities which can a celebrity or a religiously known influential person. (Barrons Educational Series, Inc, 1999) 5. COMPUTER ETHICS AND PROFESSIONAL RESPONSIBILITY Computer professionals work on many technologies in different domains. They work on different programming languages and evolving technology platforms. They are spread around the world contributing their inventions. The computer professionals are not limited to computer scientists or software engineers. The chain will be incomplete without system analysts, warehouse professionals hardware designers, networking professionals, database administrators and IT managers. The basics of ethics should start from each computer professional .there would not be no one to monitor at work. Computer ethics should be self driven. The computer professionals should voluntary test and validate the errors without leaving any loopholes when the applications are build. There is a saying Engineers build the world where the same engineers destruct the world too. This is complementary as the engineers invented concrete mixing machines and cranes whereas the same engineers invented the bulldozer. It is the sam e case of computer industry where the softwares engineers develop softwares and the same software engineers create viruses. Usage of computer or network without the owners permission physically or virtually and damaging data is unethical and is certainly a crime. This crime can be monitored upto an extend by intrusion detection systems IDS. IDS is capable of monitoring the computers and its network in an organization. The IDSs are configured in such a way that whenever a deviation from standard policies it will trigger an alert to the system administrator. The computer professionals are obliged to certain responsibility, a software developer who develops is responsible to point out the drawbacks to the society during the primitive stage of the development. The professional should we educated towards the legal responsibilities of the applications as it could become a harm to the evolving technologies . According to me the legal and moral responsibility is mutual and the professional should look into the future inflictions. This lies on the shoulder of every member in the team. The members should report any kind of issues to their supervisors. Few disasters in the past which reminds us about the importance of ethics ; 1985 Therac- 25 radiation machine fail 1983 World war 3 Due to bug the soviet intelligence applications 1987 Wall street crash known as Black Monday 1990 ATT network collapse 1995 Airane explosion 1999 Siemens passport bug 2000 I love you virus, 2004 UK child support agency bug These events in the past reminds us the importance of the software testers were morally liable to the fix could have away because of negligence. Assuming the context of software development for a medical ACM Code The association for computing machinery ACM released the code of ethics and professional conduct which is set as a benchmark for computer ethics so far. It is a 24 which talks about the contributing to the society without harming giving credit to intellectual property with respect to privacy and honours confidentiality. Professional responsibilities striving to achieve quality and dignity in work and product. Maintaining competence with respect to the law pertaining professional work. Providing professional review and comprehensive evaluation. We should honour the contract and responsibilities assigned to us. Should improve public understanding. One should access the computer resource when they are supposed to do so. In 1992 Dr.Ramon C Barquin discussed the role of computer ethics through Computer ethics institute and is being used by reputed institutions and organisation which is quoted as below: 5.1 Ten Commandments of Computer Ethics 1. THOU SHALT NOT USE A COMPUTER TO HARM OTHER PEOPLE. 2. THOU SHALT NOT INTERFERE WITH OTHER PEOPLES COMPUTER WORK. 3. THOU SHALT NOT SNOOP AROUND IN OTHER PEOPLES COMPUTER FILES. 4. THOU SHALT NOT USE A COMPUTER TO STEAL. 5. THOU SHALT NOT USE A COMPUTER TO BEAR FALSE WITNESS. 6. THOU SHALT NOT COPY OR USE PROPRIETARY SOFTWARE FOR WHICH YOU HAVE NOT PAID. 7. THOU SHALT NOT USE OTHER PEOPLES COMPUTER RESOURCES WITHOUT AUTHORIZATION OR PROPER COMPENSATION. 8. THOU SHALT NOT APPROPRIATE OTHER PEOPLES INTELLECTUAL OUTPUT. 9. THOU SHALT THINK ABOUT THE SOCIAL CONSEQUENCES OF THE PROGRAM YOU ARE WRITING OR THE SYSTEM YOU ARE DESIGNING. 10. THOU SHALT ALWAYS USE A COMPUTER IN WAYS THAT INSURE CONSIDERATION AND RESPECT FOR YOUR FELLOW HUMANS. (Herold, 2006) 6. CONCLUSION Most of the crimes are happening due to underlying vulnerabilities in the system which remains undetected due to ignorance. All the computer relevant evils cannot be sanitized. By applying hot fixes and patches these security concerns could be covered .Privacy can be recalled by adhering by not sharing passwords with friends .A sophisticated intrusion prevention system in place will hinder many intruders and safeguards the system and network. A frequent auditing in the IT infrastructure and review can help in planning and implementing security systems. According to me the best thing is to be in touch with computer professionals and joining their communities and having an eye on the blogs can help us to get rid of the computer. Individuals are the basic building blocks of the society. So the decision making factor should start from the soul of each and every computer user. A focus on the information system failure and research on them could lime light on the computer ethics. Computer ethics need to be a part of the curriculum for students as they get exposure to information world and might get misleaded without guidance. If the communities are doing good it will for sure make a good impact in the progress of a good nation and in turn a good world. To attain this we should respect others privacy, the use of any software should not harm anyone else and end-users should be willing to pay closed source applications and contribute for sharewares .If we come across any discrepancies use our internal sense to relish need to keep the legal people informed about the issue. Employees should adhere to the organizations policies. Honesty and Integrity can strive to ethics. (Tom Forester, 2001) (Stamatellos)

Thursday, October 24, 2019

The Impression of Life on the Western Front in the Blackadder Goes Fort

To what extent does the 'Blackadder Goes Forth' series give an accurate impression of life on the western front? In this essay I will be writing about life on the western front and the trenches in The First World War and how accurately the 'Blackadder Goes Forth' series portrays it. The First World War started on 4th August 1914 because the Archduke of Austro-Hungary, Franz Ferdinand got shot by a Bosnian named Gavrillo Princip. Austro-Hungary declared war on Bosnia and all the allies got involved and it turned into a huge World War which lasted longer than expected. The war then finished in 1918. Blackadder goes Forth was written by Richard Curtis and Ben Elton in 1989. Both of them have historical backgrounds. Blackadder is a BBC comedy series set in the trenches of the Western Front in The First World War. It starred Rowan Atkinson, Hugh Laurie, Tony Robinson and Stephen Fry. It was filmed in a studio in front of an audience. It was intended for an adult-thinking audience. It was made to entertain and also give the audience some historical knowledge about the trenches. I will be evaluating the last episode ?Goodbyeee? to see how it compares to real life on the western front. On the western front the soldiers had to build trenches to provide defence for the army and hold their position to show their opponents they weren?t going anywhere. The trenches were built in a crocked line next to each other because if the line was straight and a shell landed on it the explosion would kill and injure much more people then if it was straight. They had barbed wire and Sandbags at the top of trench to protect them from enemies coming in and attacking them. The trench had many layers and at the bottom there were dug outs were the sold... ...ries. There was lots of useful information to a historian about recruitment, the tactics and if they were changed the casualty rate could have decreased, and that there was a huge presence of death in the trenches. There was also some information about the weather and the trenches but it didn?t seem too wet and cold in the dug outs, which it would have been because of the awful weather at that time. Some things were imprecise about the trenches like there wouldn?t have been a sink, the dug out was too big and it looked too warm in there. The inaccuracy is because of the filming conditions and they wouldn?t have been able to fit a camera crew and the actors into a smaller dug out and they couldn?t have made it too wet as they were filming in a studio. I would still rely on the episode ?goodbyeee? to tell me what life was like in the trenches and on the western front.

Wednesday, October 23, 2019

Machinery Of The Fume Scrubber Engineering Essay

The geographic expedition in this undertaking evolves about the designing of the components in the machinery of the FUME SCRUBBER in the present twenty-four hours universe. Furthermore, the principal characteristics besides include significance of fume scrubber and its applications in the modern epoch. At the same minute is besides reveals about the facts of distinct parts of the machine and the operation of the machine. Following, it besides explores the design computations in order for the successful completion of the undertaking. It besides does include information about the basic survey of the Fume Scrubber that how it is created. The research besides reveals about the distinguishable types of smoke scrubbers available in today ‘s period. Consequently, it besides comprises of the CAD Model of the needed Fume Scrubber via utilizing PRO-E. In add-on, the theoretical account was re-done in order to obtain the Computation Fluid Dynamic Analysis for the flow of fluids inside the Fume Scrubber. As a consequence, of the applications, as elaborated in the undermentioned study the FINITE ELEMENT ANALYSIS has besides been justified. Therefore, the undertaking FUME SCRUBBER is illustrated in this study with the easiness of CAD Model. Introduction In the modern universe today, promotion in engineering via industries is at its highs. This sweetening of universe has its ain advantages and disadvantages. The advantages consider the amenitiess of the world and the possible disadvantage is menace to conventional environment conditions. Therefore, the endurance of world is influenced by the environment and hence, protection of the environment is of extreme importance in today ‘s epoch. As a effect, FUME SCRUBBER has been introduced to protect the nature from the harmful milieus created due to human activities ( e.g. mineral extraction, metal processing etc ) Mounting pollution of the environment from industries has anticipated to the speedy augment in environmental wellness and authorities ordinances, the milieus are really parlous for the species on Earth to digest, hence to heighten the environmental conditions the subsequent smoke scrubber were utilised. Scrubbers are intended to proficiently extravagancy and extinguish toxic exhausts from the concern bring forthing toxic gases which bring about decrease in ozone bed and green-house consequence. Scrubbers are miniature in volume and can be positioned where appropriate. Making usage of a typical tubing surrounded by a tubing propose, it has been built from plastic acid and base immune stuff that permits it denominate expeditiously indulged and extinguish up to 95 % of fumes gases. The specifications of the fume scrubber discussed in this study comprise of: – Large figure of holes for spraying the liquid 289cm tallness of the scrubber 143litres/min scouring liquid flow 5.08cm tubing OD Scrubbers are significantly utilized in industrial furnaces, hotel, chemicals procedure works, fabric Millss, boilers, metalworks and cement workss. In add-on, they are operated in air pollution monitoring equipments, allied industries and vacuity wadding. Scrubbers have apparent advantages which consist of: – Low force per unit area depletion and least energy necessity Easy flexibleness and high turn down Maintenance free and noiseless operation No adult male power required Therefore, the undermentioned study would find the operations of the fume scrubber, ways of bettering its design in an effectual method and depicts the efficient disposal of the undertaking. The study will show the design process followed in planing the FUME SCRUBBER and it will demo the consequences of CFD analysis and FEA analysis every bit good as discoursing ways of bettering the public presentation. Besides, its constituents aid in adept apprehension of the operation and applications of the fume scrubber. Therefore, the undermentioned study makes possible in emerging out the successful completion of the marks.Aims/objectivesThe main purpose of the undertaking ( FUME SRUBBER ) is to plan the constituents that exist in the machinery of Fume Scrubber. In add-on, analyzing the importance of Fume Scrubber and its applications in the existent universe are besides the chief characteristics of the undertaking. The undertaking design can be achieved via design computations which can fart her be accomplished after the research about the machinery is carried out. Therefore, the research work involves the survey of distinct parts of the machine and the operation of the machinery. Consequently, the design computation leads to the preparation of the needed CAD theoretical account of the machine. Furthermore, enhanced analysis is carried out via executing the Finite Element Analysis of the system as the effects of lading are studied on the components of the setup. As a concluding point, the Computational Fluid Dynamics is besides involved to analyze the consequence of air flow in the Fume Scrubber. Last, the applications of the fume scrubber are to be elaborate via explicating the advantages of FUME SCRUBBERS in the industry.Design and Application of Fume ScrubberThere are assorted types of designs available in the industry for different applications. The primary aim of the fume scrubber is to undertake the caustic exhausts, moist gases and air flows with dust nowadays in an industrial environment. There are three chief types of designs that have been developed in order to undertake the issue of remotion of contaminated air by purification procedure utilizing the appropriate fume scrubber. These are as listed below: Impingement Plate Scrubbers Packed bed Scrubbers Venturi Scrubbers Impingement Plate scrubbers are the scrubbers in which gas is passed vertically through all right perforations in a home base and is collided on marks and contacted with H2O or any other liquid fluxing horizontally across the home base. Pressure bead is one of the premier factors that determine the pick of scrubber. The figure and types of phases in home base scrubbers are specially designed to the conditions ; nevertheless these can be modified depending on alteration in the conditions or demands. Packed bed scrubbers are designed in such a manner that flow of gas rises, counter current to the flow of the scouring liquid through a jammed tower type construction, in which the taint or purification procedure takes topographic point. These types of scrubbers are besides designed in a horizontal alliance. The horizontal designed is used where multiple phase scouring is required or besides used in countries with less ceiling tallness. Venturi Scrubbers consists of an external venture subdivision which is designed to increase the speed of the incoming air before the air is combined with the scouring liquid and centrifuge where the remotion of contaminations take topographic point and hence sublimating the air. This type of scrubber is applied in procedures where condensation of liquid is present or metallic bluess are present or in the presence of chemical reaction which subsequently consequences in production of toxic exhausts for illustration ammonium chloride. Particle aggregation chiefly takes topographic point due to impaction as the fumes gas which is exhausted from the procedure and base on ballss through spray. The turbulency happening due to this causes the atoms to come in contact with the wet droplets and hence get collected. The efficiency of aggregation of atom additions with the nozzle force per unit area increasing which gives rise to an addition in liquid to gas ratio. This will besides ensue in an addition in force per unit area bead, which once more causes a rise to coerce bead. This type of scouring system has some restrictions every bit good such as care job. Venturi scrubbers are subjected scratch job in the high-speed countries such as the recess and mercantile establishment.3.1 Advantages and Disadvantages of ScrubberIn order to compare the scrubber in footings of working phenomena, the device is usually compared and evaluated with fabric filters and Electrostatic precipitators. The advantages of the scrubber over this device are as listed in the tabular array on the following page:AdvantageDisadvantagesCan work at high temperatures, high humidness Gas StreamsProne to corrosionMinimal exposure to fire and explosive jeopardiesRequires High PowerCan roll up both gases and particulate affairWater disposal jobsNo Secondary dust beginningDifficult merchandise recovery.Requires minimal infinite compared to other control devicesVertical clip demands height clearanceTable Advantages and Disadvantages of Fume Scrubber3.2 Construction MaterialsAs corrosion is one of the major job that could impact the systems behavior, the building of the scrubber is done chiefly in many different stuffs runing from Fibre reinforced plastic, PVC, CPVC, Polypropylene, Polyethylene, Mild steel, Stainless Steel, FRP-lined mild steel, nickel metals and aluminum. The building stuff choice procedure is based on the demands and design footing provided by the client.3.3 Suitable ApplicationsScrubbers can put to death the riddance of acidic, alkalic, soluble organic gasses, bluess, and odours get downing a gas watercourse. The jammed bed engineering scouring comprises the widest array of vapor and gas scouring maps. When fabrication of smoke scrubbers, it permit to choose the finest stuffs of production, in add-on to choose the finest wadding for the intent. Fume scrubber designed for the subsequent intents: Metal Pickling Lines Chemical Cleaning/Milling Lines Acid Etching Lines Acid /Chemical Bulk Storage Solvent Bulk Storage Metal Finishing Lines Metal Plating Lines Chemical Mixing Operations Chemical Processing Equipment Food Processing Pharmaceutical Blending Pharmaceutical Production3.4 EfficiencyScrubbers include a acute measure of vigorous surface country with arbitrary dumped packing. The packing stuff elected is sourced on the maps ; attesting that it rupture the liquid watercourse into legion, smooth surface movies that generate in-depth gas/liquid familiarity at a low force per unit area diminution. In the class of procedure, gas watercourses rises by agencies of a jammed bed although scouring liquid class down ( by gravitation ) over the packing stuff. The counter-flow lineations standard beliefs most favorable mass transportation.3.5 Benefits of Fume Scrubbers:Very Small Footprint Ease of Installation Variable Packing Height Local or Remote Blower Local or remote control panel Multiple Phases Height & A ; Width FlexibilitySignificance of fume scrubberIt is an air pollution control device that utilizes an inordinate energy liquid spray in order to eliminate aerosol and gaseous pollutants get downing an air watercourse. However, the gases are removed in two ways which are: – By soaking up Chemical reaction Gass are discharge from the burning procedure is conceded by agencies of armored combat vehicle enveloping a lime substance acknowledged as limestone slurry which can restrict and antagonize the S dioxide. Engineers concept and saddle horse high competency, depleted continuance smoke exhaust systems proposed to extinguish H2O soluble contaminations through gas soaking up and mechanical encroachment. These units can be standard-sized or usage built with the purpose of correspond to infinite and height boundaries or outline disposition. Appropriate smokes control setup in add-on necessitates the appropriate mechanism and system incorporation to be the chiefly efficient. In add-on to it, declaration to fume and wash up jobs by agencies of: Entire system design and integrating Automated pH control Performance information for air licenses Professional installing by experient applied scientists Extensive experience in system design Choice of proper stuffs of building Utilize high public presentation Lamtec wadding Flexibility in taking constituents for best public presentation Fume Scrubbers propose: Translating elements in gas watercourse into more effectual substances Geting rid of atoms from gas watercourses A choice of sizes, with the criterion sizes being: 24 † , 30 † , 36 † , 48 † and 60 † diameter scrubbers. Fabrication of both perpendicular and horizontal scrubbers harmonizing to your demands. Materials of creative activity utilised fluctuate depending on the chemical and procedure environments necessitated Fume scrubbers assembled are individually fabricated to extinguish mist, entrained liquid atoms, noxious caustic gases and bluess from the exhaust air watercourse. A jammed bed utilizing Lintec wadding is the bosom of the scrubber. Pollutant gases can normally be eliminated to any needed soaking up to convene confined air pollution ordinances. The pollutants are eliminated by agencies of the followers: Gas Absorption – toxic or otherwise unwanted gasses are captivated into the liquid section. Impingement – Particulate affair is eliminated by agencies of encroachment in the map of it is foremost forced by agencies of a moist packed bed and so by agencies of a stripe blade or mesh tablet filters subdivision.Equations used in fume scouring:The gases normally scrubbed include HCl produced from metal pickling. This is removed by a neutralization reaction with sodium hydrated oxide. The reaction is shown below: Another common smoke gas is azotic oxide every bit good as other N oxides. These will usually respond with the O in the air and the H2O vapor to organize azotic acid. Since it is acidic, azotic acid can be scrubbed by utilizing base. Nitrogen oxides tend to be produced from burning reactions. The reaction for this is: The merchandises of the scouring are so dissolved in the H2O and taken off from the air. Another common pollutant is sulphur dioxide. This is a gas that is produced by assorted industrial procedures such as doing semiconducting materials, batteries, and burning of sulfur incorporating fossil fuels. This gas, like N oxides, dissolves in H2O to organize sulfuric acid which is scrubbed with the usage of base. The undermentioned chemical reactions are known to take topographic point. A closely related pollutant is hydrogen sulphide gas. This is treated in a similar manner to sulfur dioxide. The chemical reactions speaking topographic point in the fume scrubber are: The salt merchandise of the reaction is taken off with the H2O therefore liberating the air from the H sulfide gas. One common gas is carbon dioxide gas. This is produced chiefly by burning and when heating carbonates. It is responsible for planetary heating and can be removed by change overing it into a carbonate that can be dissolved off from the air by the H2O. The chemical used is sodium hydrated oxide and the merchandise of the reaction is baking sodium carbonate, Na carbonate. The reaction is: Unburned hydrocarbons are besides an issue. These are dealt with by oxidizing them utilizing hydrogen peroxide or carboxylic acids. The merchandises are carbon dioxide and H2O. These can be farther scrubbed to bring forth carbonates to acquire rid of the C dioxide. The equations are: AndType of scrubberWet scrubberA development of pollution manipulates engineering. The chief principal of operation of the moisture fume scrubber is the usage of liquids in wetting the air fluxing indoors. The contaminations will fade out into the liquid thereby traveling from the gas stage to the liquid stage. The air that leaves the scrubber is well cleaner than that air which entered it. The wet fume scrubber is able to command the flow of many pollutants including acids and the acidic gases e.g. HCl, SO2 etc that are produced from the assorted industrial procedures when handling metals. Wet scrubber is operated to scour assorted pollutants for case air and dust atoms. The operation of wet scouring involves contact of particulate affair along with the scouring solution for case H2O, complex solutions of reagents that peculiarly aim for house compounds. In add-on to this, the efficiency of the fume scrubber must be high to take all or bulk of the pollutants. In order for this to be achieved, the following techniques could be implemented: Increasing abode clip in the scrubber Increasing the surface country of the scrubber ‘s solution utilizing spray nose, packed towers. Bettering the soaking up of contaminations by taking an appropriate liquid There are two chief types of moisture smoke scrubbers. The first 1 is the venture nozzle type and the 2nd 1 is the jammed bed fume scrubber. An illustration of a wet fume scrubber is shown in figure 1 below. Mention: – Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Wet Scrubber. USA: Human Press IncFigure 1, an illustration of a wet fume scrubber [ 1 ]The venture type moisture fume scrubber uses a individual nose to spray the liquid at really high force per unit area into the reaction chamber. The high force per unit area flow is aimed at the bottleneck of the chamber which is the venture subdivision. An of import and desirable effect of this manner of operation is that the venture wet fume scrubber does non necessitate the usage of a fan or a blower to travel and go around the air in the system as the force per unit area distribution creates the forces necessary for this to go on. Because of this, the venture type moisture fume scrubber is besides called ouster venture scrubber. Another of import facet of the operation is that this type of wet fume scrubber can non straight take contaminations and exhausts with a tom sizes less than a micrometer. Since the ouster venture wet fume scrubber relies on the force per unit area and turbulency to blend the air and the liquid together, so an addition in force per unit area which leads to an addition in turbulency will maximize the commixture of the two flows ( the contaminated air and the liquid ) therefore taking to an addition in efficiency. The 2nd type of wet fume scrubber is known as the jammed bed moisture fume scrubber. Here a blower is used to coerce the air with contaminations to travel to the commixture chamber where the pollutants are removed. This type of wet smoke scrubbers requires less energy to run. However, it can non take atoms less than 5 microns in size. [ 2 ] [ 3 ]Dry scrubberDry scrubbers comprises of a chemical interpolation zone followed by manner of a reaction zone where the pollutant in the gas kernel treated counters with the base. Dry scouring involves two criterion procedures which are at present utilised in industries. First, a dry soaking up which introduces powered alkali soaking up agent addicted to foul gas watercourse. Second, semidry ; this instills resolute slurry into the contaminated gas watercourse and eliminates the liquid by agencies of vaporization, separating the vigorous, dry base soaking up agent. Both the procedures mentioned above eradicate base agent with an electrostatic pr ecipitator. [ 4 ] Mention: – Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Dry Scrubber. USA: Human Press IncStructures of smoke scrubbersVertical smoke scrubberThe perpendicular assembly is a counter-flow type with contaminated gas traveling upwards and reticulating liquid spraying downward into the mixing country. Gaseous contaminations are absorbed by the liquid due to solubility degrees or by chemical reaction. Counter-flow scrubbers can hold higher remotion efficiency than a Horizontal Packed Bed Scrubber. The perpendicular counter-flow design typically provides the best scrubbing efficiency of bluess and is the most common design found in most industries. Figure 2 below shows an illustration.Figure 2 a perpendicular packed bed fume scrubberHorizontal smoke scrubberThis is a cross-flow design where the scouring liquid flows vertically downwards while the gas passes horizontally through the wadding commixture subdivision. A Horizontal Packed Bed Scrubber is used when limited headway is an issue at a installation or when low profile is desired for roof-top applications. Multiple phases can be easy provided in one lodging with separate sumps and pumps if required. The cross-flow design is less susceptible to bed fouling for airstreams that may incorporate solid particulate.Figure 3 A horizontal packed bed fume scrubberComponent of fume scrubberRECIRCULATING Tank CONVERGENT TOP CONE Scrub Tank MIST ELIMINATOR RECIRCULATING Pump Motor WITH BLOWER NOZZLE PIPE HOOD / DUCTFunction of constituentRECIRCULATING Tank: –Bacillus AFigure Water armored combat vehicle in a fume scrubberIt comprises of combination of legion chemical intents for scouring process and H2O provender in the function of put in for the unneeded elements to repair downwards which has been set away through mercantile establishment port. It is utilised to allow efficient use of the trustee. In this undertaking H2O is utilized in such a manner that it will blend with the dust atoms coming from the recess and will settle at the underside of the armored combat vehicle. The armored combat vehicle has a drainage mercantile establishment which will be used when the armored combat vehicle requires emptying and cleaning procedure. This is denoted by missive A in the above figure Letter B denotes at the mercantile establishment of the H2O armored combat vehicle, which is connected to the recirculating pump. This so drives the H2O upward which will be sprinkled in the scouring armored combat vehicle as explained subsequently.Convergent Top cone: –Figure Convergent Top ConeThe above figure is of a convergent cone which is comprises of the top subdivision of the fume scrubber tower. The portion is designed in such a manner that it provides a meeting way to the fluid to flux out of the fume scrubber. The convergent form allows the fluid flow to be extracted at a higher speed ensuing in a lessening in a force per unit area. This is supported by Bernoulli ‘s equation. On the top face of the convergent cone an extractor goon is placed which will make a force per unit area differential resulting in the suction of the pure air.Scrubing armored combat vehicle: –Calciferol C Bacillus AFigure Scrubbing TankThe inner of the armored combat vehicle is enveloped in the thick of acerb cogent evidence for case acid brick and it is a location where scouring development takes topographic point. Scrubing armored combat vehicle interruptions free toxic stuff and gases from air, which so gets assorted with the H2O and is deposited in the H2O armored combat vehicle as mentioned earlier. The armored combat vehicle has three recesss and one mercantile establishment. Letters a‚? , B and C are recesss and Letter is Outlet. Inlet A is the chief recess to the scouring armored combat vehicle this is from where the air enters the scouring armored combat vehicle. The air come ining the scouring armored combat vehicle is a assorted air i.e. with drosss. The elaborate dimensions of all the parts can be found in the undertaking logbook. Inlet B is the recess from which the H2O is sprinkled in to the scouring armored combat vehicle. This sprinkled H2O is will so unite with the drosss or dust and will therefore settle in the H2O armored combat vehicle at the underside of the construction. The sprinkled H2O enters the scouring armored combat vehicle by agencies of the recirculating pump connected externally. Inlet C and Outlet D are the countries where a wadding medium is placed. The ground behind the fond regard of the wadding media is to supply a maximal surface contact between the gas and the scouring liquid by easing uninterrupted formation of droplets throughout the jammed bed. This will ensue in addition in efficiency of a scrubber. The efficiency is besides depended on the tallness of the packing stuff. This maintains a unvarying volume and flow. Besides provides a high liquid to gas ratio.Moisture Eliminator: –Figure Mist EliminatorMist Eliminator is a device that is placed in order to maintain the liquid in the vas. The ground behind add-on of this characteristic is that without this characteristic the droplets become airborne and are carried out of the vas by traveling fluid which causes job as liquid gets collected in the part where it is non meant to be present. This device is besides referred to as Moisture Eliminator or Moisture centrifuges. The image below describes a general procedure of how a wet eliminator works.Figure Working process of a Mist Eliminator [ 5 ]As it can be seen from figure 5 Mist eliminator captures the liquid drains. Mist is carried by vapor. The overhead vapor shown in the figure is free of all the drosss that are being suctioned by the goon.RECIRCULATING Pump: –Figure Recirculation PumpThe chief map of the recirculation pump is to supply H2O to the scouring armored combat vehicle. The pump is driven by the motor which is fixed to the land. The motor provides a impulsive force for the H2O to be pushed into the scouring armored combat vehicle. The H2O from the H2O armored combat vehicle is suctioned by this pump. One of the positive facets of the motor design is that it will non be affected even in the instance of a presence of chemical in the H2O.Blower is a constituent that will force the air to the ambiance. The blower consists of usher vanes that direct the air flow out of the system.Motor with BlowerFigure Moto r with BlowerNozzle Pipe: –Figure Pipe with NozzleThe above diagram is of a pipe holding little pores in it. These pores allow the scattering of H2O which is coming from the recirculating pump. The working of this constituent is in the same mode as that of the sprinkler. The efficiency of this portion will hold an consequence on the efficiency of the fume scrubber. This is because the sum of H2O sprinkled from this pipe will ensue in the sum of dust being collected.Hood: –ABacillusFigure HoodThe goon is a pipe linking the fume scrubber with the blower. Inlet A is connected to the top of the convergent top cone subdivision of the fume scrubber. Mercantile establishment B is connected to the blower which will so steer the air flow out of the system as explained earlier. The decompression sicknesss in the goon will do a difference in the force per unit area and this force per unit area should be overcome by the blower in order for the system to run successfully.615852347O peration of fume scrubber12111491610131Figure Fume Scrubber Set upFigure 10 shows a complete installing set up of the fume scrubber with each of the constituents separately labelled by different Numberss. The maps of each constituent are as explained earlier, but the following description will sketch the working of the fume scrubber in an industrial environment. First, the installing is done either in a perpendicular or horizontal orientation depending on the design specification. The design selected in this scenario is of perpendicular orientation. In this peculiar type of fume scrubber assorted air enters the recess at point 1 from the room, chamber, etc. at a specified value of the volume flow rate. Item 15 are the recesss and mercantile establishments of the packing media. The map of the wadding media is to cut down the speed of the air which is coming from the recess ( item 1 ) . This will blockade the assorted air. The air is so in the assorted province inside the point 2 ( sc ouring armored combat vehicle ) . At this point, the recirculation pump ( item 13 ) is started which will so pull the H2O from the mercantile establishment in H2O armored combat vehicle ( item 10 ) into the recirculation pump and is so discharged into the pipe ( item 6 ) and from this point onward the H2O so enters the scouring armored combat vehicle by agencies of sprinkler ( item 5 ) . The H2O is so assorted with the impure air. The dust atoms in the air so combines with the H2O doing it heavier and therefore deposited at the underside of the H2O armored combat vehicle. Item 3 is the wet eliminator which collects the H2O droplets and eliminates it from the vapor. This will forestall the H2O or wet from traveling into the goon via the top conelike subdivision ( item 4 ) of the scrubber. The pure air is drawn into the goon ( item 7 ) . This suction procedure is done with the assistance of the blower ( item 14 ) . The outlet terminal of the goon is connected to a subdivision of canal which consists of usher vanes ( point 9 ) , set up in such a manner that air is directed in the upward way towards the perpendicular canal ( item 8 ) which so discharges the pure air to the ambiance. The H2O from the H2O armored combat vehicle can be extracted manually detecting the H2O quality through a crystalline screen. After the armored combat vehicle is to the full emptied the H2O can be refilled into the armored combat vehicle by an extra recess which is located at the back terminal of the H2O armored combat vehicle every bit shown as figure 16 in the figure 10. The chief characteristic of the full procedure is the proper recirculation of H2O in the system, which mixes with the impure air to cut down the pollution degrees of the incoming gaseous mixture, therefore supplying a more purified and uncontaminated air to the ambiance leting a control in the air pollution and therefore lending to the decrease in the production of green house gases ensuing in the planetary heating.Cad theoretical account of fume scrubberFigure Isometric ViewThe CAD theoretical account was made of a jammed bed fume scrubber utilizing pro applied scientist. The fume scrubber was designed by piecing together different parts. The parts of the fume scrubber were modelled separately and so assembled together. The diagram above shows a fume scrubber with all parts assembled together. The bluish chamber has been made transparent to enable the reader to see the internal parts of the fume scrubber. The parts were explained separately in a old subdivision. The assembly was made by stipulating the restraints for each portion. For illustration, the bluish chamber is to be steadfastly attached to the ruddy base. Therefore, the restraints were specified that at the junction between the bluish chamber and the ruddy base, an Ten way and Y way restraint was applied. Another illustration is the long ruddy connection tubing that joins the bluish chamber at the top. In that instance, the restraints are that the axes go throughing through the Centres of each must be coinciding i.e. the cross subdivisions of the two tubings must be homocentric. The same can be applied to all the other parts in the assembly. After the basic construction of the fume scrubber has been made by piecing the single parts, the moving parts and the mechanisms had to be specified. The chief moving machine is the blower which made of the fan and the motor. First, the mechanism was specified. The mechanism used was a rotating articulation applied to the shaft of the fan and the blower. Then, the way of rotary motion of the mechanism was specified. Finally, the interaction with other parts of the assembly was specified. This is fundamentally to guarantee that no struggle occurs when the joint rotates e.g. such as the fan clashing with the base or with the ruddy goon. This was a really basic description of the methodological analysis employed in piecing the fume scrubber and making the gesture simulation. The figure 12 on the following page shows the front position of the fume scrubber for better apprehension of the system and besides the construction.Figure Fume ScrubberCFD of fume scrubberThe CFD ( Comp utational Fluid Dynamics ) analysis theoretical accounts the flow of the air through the fume scrubber. This gives a basic thought of the flight of the airstream and helps the interior decorators to modify the construction consequently. The CFD simulates how the watercourse behaves from entry to go out, and bespeaking the countries where the flow looses energy. The airstream used here is simulated at a volume flow rate of 10m3/s fluxing in from the chief recess country. Plots below are of the speed contour secret plans and of Velocity and Velocity in the y-direction.Figure: speed contour secret planFigure: Y – speed counter secret planThe graph shows the speed of the airstream at different countries of the flow inside the chief vas. As can be observed, the speed is the highest at the top of the fume scrubber, bespeaking that the air moves at a high velocity at the top. Areas at a low speed have dveloped whirls, which result due to air at opposite speeds fluxing adjacently, doing the speeds to call off out. Looking at the Y – speed secret plan, it can be seen that some portion of the recess air flow moves upwards straight, while another volume of air moves downwardly. This portion so bounces back in to the upwards traveling air and merges with the flow.Figure: Flow Trajectory of airstreamThe above secret plan gives a clear simulation of the flow forms of the air flow inside the construction signifier recess to outlet. As can be seen, th is trajectory representation mirrors the speed contour secret plans. Air moves from the recess in both the upwards and the downwards way. Upwards speed reaches its upper limit at the top of the mercantile establishment cone, while the other portion of the air flows back from the bottom towards the top. In the diagram, it can be seen that the air from the underside of the fume scrubber merges with the upwards fluxing air, which accelerates it further and tends to travel it towards the top mercantile establishment. The air flow simulated here is wholly disruptive. This means that the streamlines are non laminal and be given to travel in different waies once they exit the controlled infinite of the recess pipe. This pattern is true in the sense that a true complete laminar flow does non be in the existent universe, and to pattern the flight of the air as a turbulent fluid flow will give more accurate readings, which will be helpful in usage for farther computations which can be taken o ut for different parametric quantities.FEA of fume scrubberWhen planing a portion or constituent, it is necessary to analyze the elements and understand the forces impacting the operation of the system, and to set the construction consequently to obtain a successful theoretical account of the concluding merchandise. Transporting out the FEA ( Finite Element Analysis ) of a construction reveals the emphasis degrees, strain undertaken, and the supplanting of the construction under the applied force. There are assorted forces moving on the fume scrubber, nevertheless, the chief forces which apply a important consequence of the construction are the weight of the construction itself, the weight of the H2O in the H2O armored combat vehicle, and the force exerted by the inflowing airstream. However, sing the stuff selected for the fume scrubber, which is unstained steel 304, the initial premise is that the construction will hold a high value of the factor of safety, which is an optimal factor used to depict the dependability and sustainability of the fume scrubber.13.1 CalculationsSee Appendix for measure by measure computation carried out to cipher the weight of the construction. Besides the computation for the Head losingss in the recirculation pump can be found in the Appendix.13.2 AnalysisThe FEA analysis of the fume scrubber is evaluated by sing it being fixed at the base of the theoretical account. This ensures that the fume scrubber does non skid from its base. However some scrubbers might be intended to hold a sliding base, they have different specifications to go to to.Figure: fixture of the base of the H2O armored combat vehicleThe forces being applied on the construction are the weight and the force per unit area due to the H2O and air. However, the air is fluxing at a comparatively low velocity and due to its low denseness, it does non impact a force sufficient plenty to associate to the weight and H2O force per unit area, therefore it is omitted from the computations for the simplification of the modeling. Transporting out engagement of the chief construction, it provides with the values of the emphasis distribution, supplanting and the factor of safety of the construction. These belongingss are really utile when depicting the sum of force that the stuff can defy. It besides suffices as to how much excess burden above the design emphasis can be undertaken by the construction if needed.Figure: emphasis distributionThe figure shows the emphasis distribution across the construction due to the weight of the construction and the force per unit area on the H2O armored combat vehicle due to the H2O contained in it. As can be seen, the maximal emphasis occurs at the Centre of the H2O armored combat vehicle, which is about 39.2 MPa. This occurs because the centreline of the H2O armored combat vehicle experiences weight of the construction from the top and the reaction of the base from the underside, which tends to make a high emphasis at the center of the armored combat vehicle.Figure: supplant ing secret planThe supplanting secret plan mirrors the emphasis secret plan in footings of the critical countries where the supplanting is at a upper limit. Although the supplanting is higher on the armored combat vehicle than at the other countries, the value is comparatively low, approximately 0.09034mm and does non impact the armored combat vehicle in any physical position.Figure: factor of safety secret planAs represented by the factor of safety secret plan, the minimal factor of safety is about 5.27, which occurs at the H2O armored combat vehicle. This means that the construction can at least prolong about more than 5 times the emphasis that it was designed to achieve. This reflects the dependability and sustainability of the construction, which is really important to any company willing to put in it. This besides represents a step of the life-time of the fume scrubber, detailing how long the system will work expeditiously until it is sent to be scrapped.DiscussionThe usage of fume scrubbers in industry is increasing and is being incorporated in different procedures such as metal intervention, metal pickling, and machining. The efficiency of fume scrubbers available today can near 99.9 % . The procedure of smoke scouring is of import for the protection of the environment and for wash uping the gases and contaminated air produced or used by the assorted industrial procedures described above. The design of fume scrubbers is a long and iterative procedure. The demands for fume scrubbers are that they must be able to scour exhausts with atoms that can be less than five micrometers in size. The operation of the fume scrubber will differ harmonizing to the rule employed. These different rules of operation have been discussed in this study in item. Furthermore, a moisture packed bed perpendicular smoke scrubber has been described in inside informations in this study with the design procedure outlined and the analysis of the scrubber. The analysis included transp orting out a CFD analysis to see the public presentation of the scrubber in footings of decelerating down the air and supplying the force per unit area needed for the disruptive commixture of the smoke atoms and gases with the cleansing liquid ( which efficaciously works by fade outing the gases and atoms in the exhausts ) . In this peculiar design although is non shown here, many jobs were encountered in the design of this scrubber to enable the efficient commixture to take topographic point. So, the system was modified several times to make the coveted public presentation. In the CFD analysis, as discussed in the CFD subdivision it is noted that the velocity at the recess to the scrubber of the spray ( the cleansing liquid spray ) was reduced as the country of the cross-section of the fume scrubber increased. This created some jobs in the initial design as it led to †uncontrolled † flow of the liquid spray significance that it is disruptive but, it does non follow the way intended for it to travel through. This job was solved by the aid of CFD analysis together with the fluid kineticss knowledge base. The force per unit area inside the fume scrubber is non high ( at least in this instance as the type used was packed bed type ) . If the design made were a venturi type smoke scrubber, so the force per unit area used will hold to be considered since it can be rather high. However, in the instance of the design presented here the force per unit area was non high and so it was ignored when a emphasis analysis was carried out. There are grounds for this. First, the force per unit area is really little and handling the fume scrubber as a force per unit area vas, it is seen by transporting out a simple computation that the emphasis in the walls, which will be maximal as a hoop emphasis, will non be high to be of importance. However, the perpendicular smoke scrubber besides acts a column or a prance and is subjected to a burden due to its ain weight that acts as a compaction burden ( ideally ) which can do buckling of the scrubber. Buckling is an utmost instance as the wall thickness has to be really little and the tallness of the fume scrubber really big or the stuff from which it is made is holding a low snap modulus. The FEA showed that no buckling was at that place and so the compaction strength of the scrubber was equal. There is a safety factor for the scrubber and this besides takes into history the little force per unit area rise inside the scrubber. Again, the emphasiss in the walls due to the internal force per unit area have been ignored because these are little plenty to be neglected but for a venture type, these would hold been basically included in the emphasis analysis of the scrubber.DecisionThe decision from the above is that the usage of fume scrubber is a really cost effectual method of cleaning procedure air from the exhausts and suspended atoms in the air. The concern director or the mill which wishes to use fum e scrubbers in its operations will be benefit from improved pureness of the fumes gases and better working environment in welding and metal machining premises. The clean air is an indispensable legal demand today and the usage of fume scrubbers helps make the set aims. Furthermore, the fume scrubber reduces environmental pollution that arises due to the particulates every bit good as the acidic and caustic gases produced in the exhausts. The chief issues to see are the type of fume scrubber to use, the constellation, and the cost of the scrubber. The type will be dictated by the energy supply available to run the scrubber as the venture type scrubbers need to bring forth a high force per unit area spray which requires a big energy input. The jammed bed type has lower energy demands. The constellation to utilize i.e. horizontal or perpendicular will be dictated by the infinite available in the premises where the fume scrubber will be installed. The concluding factor is the cost of th e scrubber which can be justified by transporting a cost analysis to compare the different types of the scrubbers to utilize.Mentions: –Kingston University, ( Internet ) Available at & lt ; & lt ; hypertext transfer protocol: //www.monroeenvironmental.com/air-scrubber-venturi.htm accessed 18/04/2010 & gt ; & gt ; Kingston University, ( Internet ) Available at hypertext transfer protocol: //en.wikipedia.org/wiki/Ejector_venturi_scrubber accessed on 18/04/2010 Kingston University, ( Internet ) available at hypertext transfer protocol: //en.wikipedia.org/wiki/Packed_bed accessed on 18/04/2010 Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Dry Scrubber. USA: Human Press Inc Kingston University, ( Internet ) Available at hypertext transfer protocol: //www.amistco.com/PRODUCTS/ELIMINATORS/index.html accessed on 19/04/2010. Kingston University, ( cyberspace ) Available at & lt ; & lt ; hypertext transfer protocol: //www.engineeringtoolbox.com/reynold-number-water-flow-pipes-d_574.html accessed on 21/04/2010 & gt ; & gt ; Kingston University, ( cyberspace ) available at & lt ; & lt ; hypertext transfer protocol: //www.pipeflow.co.uk/public/articles/Darcy_Weisbach_Formula.pdf accessed on 22/04/2010 & gt ; & gt ; Kingston University, ( Internet ) available at hypertext transfer protocol: //opencourseware.kfupm.edu.sa/colleges/ces/che/che309/files % 5C2-Experiments_Losses_in_Pipe_systems.pdf accessed on 22/04/2010. Kingston University, ( Internet ) available at hypertext transfer protocol: //www.thermexcel.com/english/ressourc/pdclocal.htm Kingston University, hypertext transfer protocol: //mysite.du.edu/~jcalvert/tech/fluids/orifice.htm hypertext transfer protocol: //www.surechem.com.my/download/eijkelkamp/P2/P2-25e.pdf www.pipeflow.co.uk/public/articles/Darcy_Weisbach_formula.pdf Mention: -Kingston University ( Internet ) , available at: hypertext transfer protocol: //process-equipment.globalspec.com/learnMore/Manufaturing_Process_Equipment/Air_Quality/ScrubbersBibliography

Tuesday, October 22, 2019

The Greatness of Corporate Soul Essays - Virtue, Nicomachean Ethics

The Greatness of Corporate Soul Essays - Virtue, Nicomachean Ethics Bus 102 Sec 022 The Greatness of Corporate Soul In the article The Greatness of Corporate Soul, the author suggests that business enterprises are looking for a paradigm of the market economy that both achieve intellectual and practical authenticity of the corporation's purpose. In order to understand greatness of soul, we should first understand Aristotles conception of virtue itself. According to Aristotle, there are two classes of virtues. There are intellectual and character virtues. It is certain that Aristotles virtues was widely recognized by the people from Aristotles period to present. A companys greatness can be both financially or philosophically or both. This essay includes essential informations that reveals how greatness driven by superior expertise can help households, small businesses, and multinational corporations to exceed their potentials and lead to success. If an employee in the company can make commitment to hard work and have perpetual endurance for his/her tasks, the likelihood of them succeeding in the co mpany is very high. Not only does these ingredients move cooperations toward greatness, but also help to promote a healthier environment for the society. The idea of greatness requires discipline of perseverance. The foundation of business are closely related to social,behavioral and management science. According to Aristotles Nicomachean Ethics, the standards for corporation to success are not fully based on building prestige and honor but rather to have a strong integrity of character of management decisions in order to perpetual vitality of the firm. This kind of standard is the paradigm of a successful management and should be adopt by all corporations. In essay one, the author suggests that the political and economic system that support the idea of greatness is capitalism. However, capitalism is not simply just the definition of wealth and resources but is infused deeply within the social contract. The social contract is a theory addresses the questions of the origin of our soc iety and authority of the state over the individual. Today in our society, there are many mechanisms available to managers to maintain their high ethicality in their organization. examples can be ethics-oriented management and ethics training. We can make use of such mechanisms to make corporation stronger both financially and ethically. Greatness of soul is a type of virtue of character which requires the owner to have intellectual virtue. Greatness of soul is closely related to generosity. Since the great souled person has the correct view of value, external goods are often seem to be not the first priority when they think about management. External goods without virtue is not acceptable because those goods are not earned based on ethics guideline. Only the good person deserves glory and honor. Also, the great-souled person does not really care about everything. A person with greatness of soul will not even care even for honor because the desire for external good is weak and thus he will not have the motivation to perform despicable actions. Overall, the greatness of soul make the virtues greater. The author believes that all virtues are closely related to each other, there are always connections amongst any virtues. This is because things will not occur in isolation with other things. Aristotles purpose of showing the idea of the greatness of soul is to teach us how to distinguish the promise of human. There are many great companies around the globe who already have adopted the idea of corporate soul. Understand greatness is the key for a company to establish effective management systems that can utilize their resources to fairly serve the society. In order to understand greatness of soul, we should first understand Aristotles conception of virtue itself. The idea of greatness requires discipline of perseverance. Not only does these ingredients move cooperations toward greatness, but also help to promote a healthier environment for the society. Understand greatness is the key for a company to establish effective management systems that can utilize their resources to fairly serve the society.