Wednesday, July 31, 2019

Flame Detector

INFRA-RED FLAME DETECTION 123 S200+ SERIES TRIPLE IR FLAME DETECTORS USER MANUAL S200+ USER MANUAL INDEX PAGE A) INTRODUCTION 1 1. 1 Flame Detection Operation 1 3. B) Introduction 2. General Construction 4 PRODUCT APPLICATION 5 1. C) Application 5 2. Benefits of the S200+ Series 6 8 Introduction 8 2. Electrical Characteristics 8 3. Mechanical Characteristics 13 4. Environmental 16 5. Operation 17 6. Performance Characteristics 22 7. Design of System 30 8. D) SYSTEM DESIGN INFORMATION 1. Approvals and Compliance with Standards nd Patents 31 INSTALLATION 38 1. General 38 2. Mounting a Detector 38 3. E) Detector Wiring 40 4. Initial Wiring Check 55 57 1. System Checks 57 2. F) COMMISSIONING Connecting and Commissioning the Detectors 57 64 1. G) MAINTENANCE 64 General ORDERING INFORMATION APPENDIX 1 CONNECTING S241+ AS A CURRENT SOURCE DEVICE 66 67 SECTION A 1. INTRODUCTION INTRODUCTION The S200+ range of triple IR flame detectors comprises five flame detector variants. The detectors sha re the same flame detection circuitry, optics and main mechanical housing.Each variant is available as an Intrinsically Safe (i) or Flameproof (f) version except the S261+ which is available only in the Flameproof version. The five variants are: VARIANT Conventional 2-Wire Interface 4-20mA Current Loop Interface Analogue Addressable Loop Interface Relay Interface MX Digital Interface INTRINSICALLY SAFE S231i+ S241i+ S251i+ S271i+ FLAMEPROOF S231f+ S241f+ S251f+ S261f+ S271f+ The S200+ Advanced Flame Detector offers a major improvement in both flame detection capability and immunity to blackbody radiation.The S200+ is available in intrinsically safe and flameproof models except for the S261f+ which is available only as a flameproof version. In particular, the range incorporates models for conventional detection circuits (S231i+, S231f+), models for connection to 4-20 mA current loop (S241i+, S241f+), models for connection to Thorn Security Minerva analogue addressable systems (S251i+ , S251f+), a flameproof model with relay outputs (S261f+) and models for connection to Minerva MX Digital systems (S271i+, S271f+).The output of the S241+ provides a truly analogue current output and the S251+ and S271+ provide an additional level of signalling to indicate a pre-alarm condition. The detectors have been tested by LPCB to EN 54 : Part 10 and have been classified as Class 1 flame detectors on the 50m and 25m range settings and as Class 3 on the 12m range setting. For marine applications, the detectors have been tested to Lloyd’s Register Test Specification Number 1 (2002). Environmental Category ENV1, 2, 3 and 5 and to DNV Certification Notes No. 2. 4 (April 2001). 2.FLAME DETECTION OPERATION The S200+ detectors analyse radiant energy at three different wavelengths and as such offer the full benefits of the triple IR flame detector. The detector uses a well proven, flame detection technique. This is based on monitoring for modulated infra-red radiation in the 4. 3? m waveband corresponding to CO2 emission. It incorporates Thorn Security patented techniques for improved rejection of solar energy by using a combination of two 4. 3? m filters for Gaussian noise rejection by averaging the output signal of two separate sensor elements.Three different alarm delays of 3s, 6s and 12s are provided in all versions of the S200+. 2. 1 BLACKBODY REJECTION The S200+ implements a new concept for eliminating nuisance alarms from modulated blackbody sources. The new design incorporates a novel optical filter(1) which enables a single electronic infra-red sensor to measure the radiated energy present in two separate wavebands placed on either side of the flame detection waveband, at 3. 8? m and 4. 8? m respectively (see Fig A-1).The signal obtained from this ‘guard’ channel is cross-correlated with the signal from the flame detection channel to provide an accurate prediction of the non-flame energy present in the flame detection waveband. This prediction is independent of the temperature of the radiation source, allowing the S200+ to provide blackbody rejection over a wide range of source temperatures. (1) Patented (see Section C, 8. 4). 1 Fig. A-1 shows the amount of energy given by a ‘hot’ object (blackbody) as viewed in the electromagnetic spectrum. This curve has a peak which moves further to the left with higher temperature objects.The amount of energy seen between 3. 8? m and 4. 8? m can be approximated to a linear function. Thus, a measurement of the energy at these two wavelengths provides information to calculate with sufficient accuracy the level of blackbody radiation at the intermediate flame detection wavelength of 4. 3? m. The energy due to the emission from hot carbon dioxide given by a flame is superimposed on that from any blackbody in the detector field of view without adding any significant emissions at 3. 8? m or 4. 8? m, thus enabling proper segregation between non-flame signals and flame signals.Because a large fire will possibly produce a large amount of black smoke which will behave like a blackbody and may weaken the carbon dioxide peak, signals greater than a pre-determined upper limit will be classed as a fire. The use of an optical processing technique, as opposed to the use of two separate electronic sensors for the guard channel, improves the overall reliability of the detector by reducing the number of components and eliminating the need for complex calibration procedures during manufacture. TEMPERATURE MOVEMENT FLAME ENERGY HOT BLACKBODYCOLD BLACKBODY 3. 8? m 4. 3? m 4. 8? m WAVELENGTH Fig. A-1 Radiation from Objects 2. 2 DETECTION RANGE The S200+ range can detect on axis a fully developed 0. 1m2 n-heptane or petrol pan fire at up to 50m and the same fire up to 25m on the 25m setting. A 12m setting is also available. 2 2. 3 DETECTION OF FLAME IN THE PRESENCE OF BLACKBODY RADIATION The ability of the detector to determine accurately the amount of non-flame radiation received at any one time by the flame detection channel allows a variable alarm threshold to be determined (see Fig. A-2).This threshold is positioned so as to minimise the possibility of a false alarm due to the presence of modulated blackbody sources of different temperature and intensity. FLAME ENERGY ALARM THRESHOLD FLAME SIGNALS BLACKBODY SIGNALS CROSS-CORRELATED ENERGY Fig. A-2 2. 4 Signal Processing DETECTOR CONDITION SIGNALLING The S200+ incorporates two different colour light emitting diodes, red for Alarm and yellow for Fault. By using different flashing rates for the yellow (Fault) LED, separate indication of detector (electronic) fault and ‘dirty’ window (optical integrity monitoring) is provided.The yellow LED is not fitted to the S251+ and S271+ detectors. The S241+ provides an analogue output current, in the range 4-20mA, proportional to the flame detection signal. The S251+ provides two pre-set current values to signal alarm and pre-alarm cond itions. Pre-set currents, in the range 0-4mA, are used to separately signal detector (electronic) fault and ‘dirty' window for both detector types. The S271+ shows the same signalling conditions as the S251+ but instead of the units being in mA, they are signalled digitally using the MX protocol. 3 3. GENERAL CONSTRUCTION Fig. A-3 shows a general view of a complete detector.Fig. A-3 S200+ Detector – General View The detector is of robust construction to allow its use in harsh environments. The detector comprises a two-part stainless steel enclosure. The front section of the enclosure contains the encapsulated electro-optical assembly which is connected to the terminal board on the rear section by a small cableform. A sapphire window is fitted in the front of the housing. The window allows infra-red radiation to fall on the sensors, the LED alarm and fault indicators are visible through the window. The front section of the enclosure is attached to the rear section by fou r captive screws.A seal provided between the front and rear sections ensures protection to IP66 and IP67. Two 20mm cable entries are provided at the bottom. All electrical connections are made to three 4-way terminal blocks (four 4-way terminal blocks for the S261f+). The detector may be fitted directly to a suitable surface or an optional adjustable mounting bracket may be used. A stainless steel guard is fitted to the ‘flameproof’ versions to protect the integrity of the window (shown in Fig. A-3). Until the end of 2004, the detectors had two cable entries at the bottom and one at the top.The detector design has been changed to remove the top cable entry due to problems with water ingress where the top cable entry has not been sealed properly during installation. 4 SECTION B – PRODUCT APPLICATION 1. APPLICATION 1. 1 GENERAL The detectors are intended for the protection of high-risk areas in which accidental fires are likely to result in flaming combustion with the production of carbon dioxide. Typical materials in this type of risk are: a) Flammable liquids, including petroleum products, alcohol, and glycol etc. b) Flammable gases including methane. c) Paper, wood and packing materials. ) Coal. e) Plastics. These substances ignite readily and burn rapidly, producing flame, often accompanied by large volumes of dark smoke. Note: The detectors are not designed to respond to flames emanating from fuels which do not contain carbon eg, hydrogen, ammonia, metals, and should not be used for such risks without satisfactory fire testing. The S200+ series, by virtue of their construction and rejection of spurious radiation, are suitable for use both indoors or outdoors in a wide range of applications. Note: 1. 2 The detectors must be mounted to a rigid support which will not move in windy conditions.This is to avoid false alarms due to detector movement modulating radiation from hot bodies at the edge of the field of view. Avoid mounting detectors where they are subject to high levels of vibration. USE IN HAZARDOUS ATMOSPHERES The S200i+ series detectors are ATEX/IECEx certified intrinsically safe, and are classified E Ex/ Ex ia IIC T5 or T4 (-40 °C ? Ta ? +80 °C). In an intrinsically safe system the detectors are suitable for use in hazardous zones 0, 1 and 2 where group IIC gases and vapours are present in explosive concentrations. See Section 8. 1 for full details. The S200f+ series detectors are ATEX certified ‘flameproof’.They are classified E Ex d IIC T6 or T5 (-20 °C ? Ta ? +80 °C) and are suitable for use in hazardous areas zones 1 and 2. The S200f+ detectors are also IECEx certified flameproof. They are classified Ex d IIC T6 or T5 (-20? C ? Ta ? +60? C) and are certified for use in hazardous areas zone 1 and zone 2. See Section 8. 2. 5 1. 3 USE IN NON-HAZARDOUS AREAS In non hazardous ares it is recommended the following detectors are fitted: S231i+, S241i+ and S251i+ without a barrier. These det ectors are electrically the same as the f+ versions. They are less expensive and have a wider field of view as they do not require the window guard.S261f+ (has no intrinsically safe version available). S271f+ Do not fit the S271i+ as for this detector the MX communications is optimised for use with an IS barrier. Its performance without a barrier is not characterised. Note: 1. 4 The S271i+ will not communicate without the EXI800 and barrier fitted. FEATURES †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ †¢ 2. A self-test facility is incorporated to test a number of characteristics, including the cleanliness of the window. The self-test may be initiated remotely. Switch selectable range settings. Switch selectable time to alarm settings.Operational range up to 50m, fuel dependent. Remote control of range. S271+ has fast detection using MX interrupt facility. Remote control of delay, range and remote test on S271+. Completely solar blind. Very low quiescent power consumption. High sensitivity to hydrocarbon fire in oily environments. Rugged stainless steel 316 housing and mounting bracket. Flexible mounting and angular adjustment. Ease of installation. Connection for remote LED. Selectable latching/non-latching alarm output (not S251+/S271+). Selectable latching/non-latching fault output (not S251+/S271+). BENEFITS OF THE S200+ SERIESInfra-red flame detectors offer certain benefits over detectors working in the visible or ultra-violet regions of the spectrum. For example they are: †¢ †¢ 6 Highly sensitive to flame thus increasing probability of early detection of hydrocarbon fires. Not greatly affected by window contamination by dirt and oil deposits thus decreasing maintenance frequency leading to operating cost reduction. †¢ †¢ Able to see flames through smoke, and able to see flames through high densities of solvent vapours thus increasing the probability of earl y detection of hydrocarbon fires over other (ultra-violet) detectors in the same conditions.Several detectors on a single 2-wire conventional or analog addressable circuit. The S200+ series have all the above benefits and additionally are: †¢ †¢ †¢ †¢ Completely â€Å"solar-blind† in normal conditions, thus, eliminating false alarms due to direct or indirect sunlight. Insensitive to electric arcs thus eliminating false alarms from welding operations. Insensitive to artificial light sources. See Section C (6. 4) for more details on false alarm performance. Sealed to IP66 and IP67 (when suitable cable glands and sealant are used) ensuring long term reliability in harsh environments. 7SECTION C – SYSTEM DESIGN INFORMATION 1. INTRODUCTION The electrical, mechanical, environmental characteristics and the performance of the S200+ series flame detectors, must be taken into account when designing a system which uses these detectors. This information is give n below, together with guidance on detector siting. 2. ELECTRICAL CHARACTERISTICS 2. 1 S231i+/S231f+ The S231i+/231f+ detectors are two-wire devices, designed to operate on any typical conventional fire detection control equipment providing a regulated 20V dc current monitoring loop, including controllers manufactured by Thorn Security.Compatibility should be assessed using the technical data below and it is recommended that evaluation tests are carried out prior to siting and installation. The quiescent current drain is very small and the alarm condition is signalled by a large increase in current demand. Resetting is achieved by removing the supply voltage for a period greater than 0. 5 seconds. 2. 1. 1 COMPATIBILITY WITH OTHER THORN SECURITY CONVENTIONAL DETECTORS The connection of Thorn Security’s plug-in conventional detectors, ie M300 and M600 ranges, in the same circuit as S231+ flame detectors is not generally recommended.S231+ flame detectors may be connected in the same circuit as S131/S161 type detectors. The number of S231+ detectors per zone should be assessed taking account of good engineering principles, controller characteristics and cable parameters. As a guide, most controllers will permit 4 S231+ units per zone. We do no recommend exceeding 6 x s231+ units per zone. Note: 1) S161 flame detectors may be connected in flameproof circuits and can, therefore, be connected with S231f+ flame detectors. 2) If detectors are mixed, then an S231+ detector must be the last detector n the zone or a fault condition on an S231+ detector will not be signalled to the controller. 2. 1. 2 TECHNICAL DATA Supply Voltage: Quiescent Current: Alarm Current: Alarm Output Mode: Reset Time/Voltage: 8 15V to 28V. (Voltage at the detector when not in alarm). 350? A (typical). 33mA (typical) at 24V source, supplied via 330 ohms. 38mA (typical) with remote LED fitted. 18mA (typical) with MTL 5061 barrier fitted. See Fig. C-1. Operation must be restricted to the saf e area shown by use of external resistance if necessary. Supply must be reduced to less than 2V for greater than 0. 5 seconds. Stabilisation time after eset/ power up: Equivalent Inductance: Equivalent Capacitance: 60 seconds (typical) to 90 seconds (maximum). 0mH. 1. 5nF. Note: 1) The maximum number of detectors that may be connected to a zone circuit is 6 (see 2. 1. 1). 2) The alarm currents shown above include current through a 4k7 end-of-line resistor. 3) In general, it is not possible to use a remote indicator on detectors which are supplied via a shunt barrier safety diode or galvanic isolator. 4) Where a remote LED is used, a 33 ohm resistor should be fitted in series with it to limit the current through the LED to approximately 30mA. 80REMOTE LED FITTED WITH SERIES 33OHM RESISTOR TOTAL CURRENT IN ALARM (mA) 70 60 50 40 SAFE OPERATING AREA 30 NO REMOTE LED 20 10 0 2 4 6 8 10 12 14 16 18 20 22 24 VOLTAGE AT DETECTOR (V) NOTE: 4k7 END-OF-LINE RESISTOR FITTED Fig. C-1 2. 2 Load Characteristics in Alarm S241i+/S241f+ The S241i+/S241f+ detectors provide a 4-20mA current sink output, suitable for standard programmable logic controllers. 2. 2. 1 TECHNICAL DATA Supply Voltage: 15V to 28V (Voltage at the detector). Quiescent Current: 350? A (typical), excluding signalling current. 9 Supply Current in Alarm: 12mA (typical), at 24V supply. 0mA (typical), with remote LED fitted. 10mA (typical), with 600 ohm barrier. 12mA (typical), with 600 ohm barrier + remote LED. Alarm Output Mode: 4-20mA CURRENT SINK. (See Appendix 1 for S241+ wired as a current source output). Signalling Currents: DISCRETE SIGNALLING (OLD SYSTEM) CONDITION AFD CURRENT TYP. (mA) Fault Normal Alarm 1. 5 4. 5 17. 0 Table 1: S241+ Discrete Signalling (Old System) CONTINUOUSLY VARIABLE SIGNALLING (NEW SYSTEM) CONDITION AFD CURRENT TYP. (mA) Non Window Fault Window Fault Normal Flame Sensing 0. 0 2. 0 4. 0 5. 7 to 17. 0* Table 2: S241+ Continuously Variable Signalling (New System) * See Para 5. for Sensitivity (Range) Selection Note: The signalling mode is selected by means of a DIL switch, see section E 2. 1. In both discrete and continuously variable signalling the alarm LED will come on when a 4-20mA output exceeds 17. 0mA. Reset Time/Voltage: Supply must be reduced to less than 2V for greater than 0. 5 seconds. Stabilisation Time after reset /power up: 60 seconds (typical) to 90 seconds (maximum). Equivalent Inductance: 0mH. Equivalent Capacitance: 1. 5nF. Note: An external 33 ohm resistor should be fitted in series with a remote LED. S241+ is designed with a 4-20mA current sink output.However, it can be wired as a current source device with limitations. See Appendix 1 for details. 10 2. 3 S251i+/S251f+ The S251i+/251f+ detectors are analogue addressable devices which are designed to operate with the Minerva range of analogue addressable fire control equipment currently manufactured by Thorn Security Limited. 2. 3. 1 TECHNICAL DATA The maximum number of detectors that may be connected to a Minerva system loop is 50. The maximum number of detectors that may be connected to each barrier in a Hazardous Area circuit is 10. Average current consumption: 350? A Stabilisation Time after eset /power up: 60 seconds (typical) to 90 seconds (maximum). S251+ analogue addressable signalling currents: DISCRETE SIGNALLING (OLD SYSTEM) CONDITION AFD CURRENT TYP. (mA) MINERVA MEASUREMENT (mA) MINERVA LIMITS (mA) Fault Normal Alarm 0. 75 2. 25 9. 0 1. 5 4. 5 18. 0 0 to 3. 0 3. 0 to 10. 4 16. 2 minimum Table 3: S251+ Discrete Signalling (Old System) ENHANCED SIGNALLING MODE CONDITION AFD CURRENT TYP. (mA) MINERVA MEASUREMENT (mA) MINERVA LIMITS (mA) Non Window Fault Window Fault Normal Pre-Alarm Alarm 0 1. 5 3. 0 7. 0 9. 0 0 3. 0 6. 0 14. 0 18. 0 0 to 2. 0 2. 0 to 4. 0 4. 0 to 12. 12. 0 to 16. 0 16. 0 minimum Table 4: S251+ Enhanced Signalling (New System) Note: 1) The signalling mode is selected by means of a DIL switch, see Section E 2. 1, Table 3. 2) ‘Remote Ra nge’ and ‘Self Test’ selection is not available for the S251i+ when used with a shunt diode safety barrier. CAUTION: IF USING AN S251+ WORKING IN THE ENHANCED SIGNALLING MODE TO REPLACE AN S251, THE S251+ MUST BE CONFIGURED IN ‘CONSYS’ VERSION 12. 0 OR LATER. 11 2. 4 S261f+ The S261+ is only provided in a ‘flameproof’ version. The S261f+ provides a relay interface for alarm and fault conditions. 2. 4. 1TECHNICAL DATA Supply Voltage: Fault relay: Alarm relay: Quiescent Current: Alarm Current: Fault Current: Reset Time/Voltage: Stabilisation Time after reset /power up: 15V to 28V. (Voltage at the detector). Normally closed, opens under fault conditions. Normally open, closes under alarm conditions. 11mA. (typical) at 28V supply. 30mA. (typical) at 28V supply. 37mA. (typical) at 28V supply with remote LED fitted. 350? A. (typical). Supply must be reduced to less than 2V for greater than 0. 5 seconds. 60 seconds (typical) to 90 seconds (maxi mum). Note: 1) The relay contacts are rated 2A at 28V dc. ) An external 33 ohm resistor should be fitted in series with the remote LED. 2. 5 S271i+/S271f+ The S271+ is designed to operate with the Minerva MX range of digital addressable fire control equipment currently manufactured by Thorn Security Limited. 2. 5. 1 TECHNICAL DATA For the Maximum number of S271i+ detectors and maximum cable length connected to the MX Intrinsically Safe loop, refer to document 17A-02-ISLOOP MX Intrinsically Safe System – Loop Loading Calculation. Stabilisation Time after reset /power up: 60 seconds (typical) to 90 seconds (maximum). The average current consumption is 500?A. The S271+ digital signalling: CONDITION Non-Window Fault Window Fault Pre-Alarm Alarm Normal DELTA OUTPUT (Bits) ?10 ?51 and ? 11 ?153 ?190 ?68 Table 5: 12 3. MECHANICAL CHARACTERISTICS 3. 6 TECHNICAL DATA Dimensions (see Fig. C-2) Height: 167mm Width: 167mm Depth: 89. 5mm max (maximum depth with flameproof guard fitted 94m m) Weight: 3. 8kg Mounting Bracket Weight: 1. 1kg Materials Enclosure: Stainless steel 316L, ANC4BFCLC to BS3146 Part 2 Window: Sapphire Mounting Bracket: Stainless steel to BS1449 Part 2 316 S16 Screws etc. exposed to the elements: Bright stainless steel 316 Electronic Module:Encapsulated. Electrical Access: Standard M20 gland holes (two) 13 3 X FLAMEPROOF GUARD MOUNTING POSTS 4 x M8 SURFACE MOUNTING HOLES OPTICAL MONITORING REFLECTOR SAPPHIRE WINDOW 167 100 149. 3 167 76. 5 TAG LABEL 52. 5 2 X 20mm GLAND HOLES NOTE: MAXIMUM HEIGHT WITH FLAMEPROOF GUARD FITTED (94mm) Fig. C-2 S200+ Series – Overall Dimensions 14 89. 5 max ‘SEE NOTE' 0 50 ADJUSTMENT 68. 5 RAD 4 x M8 SURFACE MOUNTING HOLES 100 22 0 149. 3 SURFACE MOUNTING DIMENSIONS 45 0 200mm CLEARANCE REQUIRED FOR FULL ADJUSTMENT Fig. C-3 Adjustable Mounting Bracket and Surface Mounting Dimensions 15 4. 4. 1 ENVIRONMENTAL GENERALThe design and construction of the S200+ series detectors are such that they may be used ov er a wide range of environmental conditions. Relevant limits are given in Para 4. 2. 4. 2 4. 2. 1 TECHNICAL DATA TEMPERATURE, HUMIDITY, PROTECTION AND PRESSURE Operating temperature range For non hazardous installations: For hazardous installations using flameproof S200f+ detectors in ATEX certified applications: For hazardous installations using flameproof S200f+ detectors in IECEx applications: For hazardous installations using intrinsically safe S200i+ detectors in ATEX or IECEx applications: Storage temperature range:Relative humidity: Enclosure protection: Normal operating atmospheric pressure: Heat radiation from sun: -40 °C to +80 °C (110 °C for short durations) -20 °C to 80 °C -20 °C to 60 °C -40 °C to 80 °C -40 °C to +80 °C Up to 95% RH (non-condensing) Tested to IP66 and IP67* 910mbar to 1055mbar 0 to 1000Wm2 typical * Cable gland entries must be suitably sealed to achieve the required IP rating (see 3. 4 Section D). 4. 2. 2 VIBRATION AND SHOCK The S2 00+ series detectors are designed and tested for vibration and shock to EN54-10 (the Standard for flame detection components of automatic fire detection systems).For marine applications, the detectors have been tested to Lloyd’s Register Test Specification Number 1 (1996) Vibration Test 1 and to DNV Certification Notes No2. 4 (May 1995) Class A. 4. 2. 3 ELECTROMAGNETIC INTERFERENCE The detector is insensitive to radio frequency interference. It has been designed and tested to the requirements of EN54-10 (the Standard for flame detection components of automatic fire detection systems) and BS EN 61000-6-3 Generic Emissions Residential Commercial and Light Industry and EN 50130-4, the generic standard for electromagnetic immunity within the European Union.The detectors have been tested to the product family standard for fire alarm systems, EN50130-4. Tests have proved the operation in field strengths of 10V/m at frequencies from 150kHz to 2000MHz with amplitude and pulse modulat ion, when installed in accordance with this manual. For Marine applications the detectors, have been tested to Lloyd’s Register Test Specification Number 1 (1996) E. M. I. Immunity for Electronic products and to DNV Certification Notes No. 2. 4 (May 1995) Electromagnetic Compatibility Tests. To comply with the above standards, ferrite tubes must be fitted to the detector base as shown in Fig. D3, Page 40. 16 4. 2. 4IONISING RADIATION The S200+ series, like other infra-red detectors, is insensitive to X-rays and gamma radiation as used in non-destructive testing. The detector will operate normally and will not false alarm when exposed to this type of radiation although long term exposure to high radiation levels may lead to permanent damage. 4. 2. 5 CORROSION The detector is able to withstand the effects of corrosion conditioning with sulphur dioxide (SO2) concentration as specified in EN54-10. For Marine applications the detectors have been tested to Lloyd’s Register T est Specification Number 1 (1996) Salt Mist test and to DNV Certification Notes No. . 4 (May 1995) Salt Mist Test. 5. OPERATION 5. 1 ALARM INDICATION A red LED is visible through the front window which gives the same indication for the S231+, S241+ and S261+ variants. Illumination indicates an alarm. The S251+ (analogue addressable variant) and the S271+ (digital addressable variant) indicate in the same manner as the other variants, but the LED is driven by the controller. In normal conditions the LED is pulsed at two second intervals for the S251+ and 5 seconds for the S271+. Continuous illumination indicates an alarm under control of the Minerva controller. 5. 2 ALARM SIGNALLINGThe detectors signal an alarm condition as follows: †¢ †¢ †¢ †¢ †¢ S231+ – Increase in current drawn from supply, see Fig. C-1. S241+ – Current drawn on the loop will be between 5. 7-17. 0mA. (A single value between 16. 0-19. 0mA is drawn for the S241 compatible mode) . S251+ – Returned current will be between 8. 3 and 9. 7mA. A pre-alarm function is also available which returns a current value between 6. 5 and 7. 5mA. The latter is not available for the S251 compatible mode. S261+ – Alarm relay will close. S271+ – Returned values will be ? 190 bits. A Pre-alarm function is also available which returns values of ? 153 bits.The S231+, S241+ and S261+ may be set as alarm latching or non-latching. When the S241+ is operated in the Continuously Variable Signalling mode, the alarm latching function is inoperative. The S251+/S271+ have only the non-latching mode. In the non-latching mode, if the alarm source is removed for greater than 5 seconds, then the detector will stop indicating an alarm. In the latching mode the controller must be reset to remove the alarm condition. Note: The use of an S231i+ in a non-latching mode is generally possible when the detector is connected after a shunt diode safety barrier but evaluation tests a re recommended. 7 5. 3 FAULT INDICATION For the S231+, S241+ and S261+ variants the yellow LED will flash indicating a fault. Different flashing rates are used to indicate different faults, as follows: †¢ †¢ Window obscuration: 0. 5Hz Detector fault: 2. 0Hz The S251+/S271+ will not provide a local indication for a fault, instead the fault indication will be displayed on the controller. 5. 4 FAULT SIGNALLING The detectors signal a fault condition as follows: S231+ – Open circuit fault band ie, the EOL resistor is made open circuit.The faulty detector puts 4 pulses of total width 45ms and level 55mA on the line which is detected by the S231+ connected at the end of the zone. This detector open circuits the EOL resistor. Note: The end detector in the zone must be an S231+ with the EOL fitted as it is this device which will signal a fault, the faulty detector will indicate with a flashing yellow LED. †¢ †¢ †¢ †¢ S241+ – Current drawn on the lo op will be as follows: †¢ 0. 0 to 0. 5mA for a detector fault †¢ 1. 8 to 2. 2mA for a window fault †¢ 1. 3 to 1. 7mA for any fault in the S241 compatible mode S251+ – Analogue returned current will be as follows: †¢ 0. 0 to 0. mA for a detector fault †¢ 1. 3 to 1. 7mA for a window fault †¢ 0. 65 to 0. 85mA for any fault in the S251 compatible mode S261+ – Fault relay will open S271+ – Digital returned values will be as follows: †¢ between ? 51 and ? 11 bits for a window fault †¢ ? 10 for a non-window fault The S231+/S241+/S261+ detectors may be selected as fault latching or non-latching. In the nonlatching mode, the fault condition will be cancelled up to 80 seconds after the fault has been removed. The S251+/S271+ have only the non-latching mode. 18 5. 5 SENSITIVITY (RANGE) SELECTION The range is switch selectable on a 6-way DIL (4-way S271+) switch (S1, Fig.C-4) on the backbox terminal PCB. The following nominal ranges a re available: †¢ †¢ †¢ †¢ Extended range. (50 metres) Normal range. (25 metres) Reduced range (12. 5 metres) 6m (S251f+ and S271f+ only) These ranges are for an n-heptane fire in a 0. 1m2 pan located on the main axis of the detector field of view. With the S241+ set to Continuously Variable Signalling mode (see Section E 2. 1), the nominal ranges above correspond to an alarm threshold set to 17mA. Laboratory tests indicate that setting the alarm thresholds at 9 and 15mA (as opposed to 17mA) will increase the range a fire is detected at by approximately 20 and 10% respectively.For the S251+/S271+, the detection distance for the PRE-ALARM function is approximately 18% higher than the ALARM distance. Range can also be selected in MX CONSYS and will take effect if all switches are in the OFF position from the controller for the S271+. There is provision for halving the range value selected by the switches. If the terminal connector ‘Range’ is connected t o 0V then the detection range is reduced to half that of the switch setting. This may be done by taking cables to a remote contact the other side of which is connected to the same 0V as the reference for ‘Line In’ supply. . 6 DELAY TO ALARM The minimum delay to alarm is 3 seconds from a fire being present in the field of view that is large enough to be detected. This delay is also switch selectable using 6-way (4-way S271+) DIL switch (S1, Fig. C-4), the following additional values are available: †¢ †¢ Note: 6 seconds. 12 seconds. The minimum delay to alarm is 3 seconds. However, with this setting, the detector requires that the alarm threshold level has been exceeded throughout for a minimum of 3 seconds in any given 5 second window. Therefore, for fires where the intensity varies, the time to alarm may be longer.Similarly, for the 6 second setting, the alarm threshold level must be maintained for a minimum of 6 seconds in any 8 second window and for the 12 s econd setting, the alarm threshold level must be maintained for a minimum of 12 seconds in any 14 second window. When the S241+ is operated in Continuously Variable Signalling mode, the delay to alarm switches on S1 are inoperative. This means that in windy conditions where the fire signal varies over time, the detection range will be reduced on the longer time to alarm settings.The signal is smoothed to reduce jitter and this results in a settling time of between 3s and 5s. Further delay could be added by the controller if required. 19 In the case of the S251+, there is additional delay to alarm introduced by the confirmation procedure of the Minerva control panel. This extra delay is between 4 and 6 seconds. For the S251+/S271f+ PRE-ALARM function, the delay to alarm settings on switch S1 are inoperative, the only delay is that introduced by the Minerva/MX panel. For the S271+, the delay may be set from MX CONSYS via the controller if all the switches are in the OFF position.SWITC H S1 (S271+ ONLY) SWITCH S2 (S251+ ONLY) SWITCH S1 SWITCH S2 (S271+ ONLY) ON S1 ON S1 ON S2 ON S2 1 4 1 6 1 7 1 8 INTERFACE PCB CONNECTOR BLOCKS RELAYS AND CONNECTOR BLOCK (S261+ ONLY) Fig. C-4 Switch Location 5. 7 SELF-TEST The detector normally carries out a complete self-test every 20 minutes. The self-test exercises the pyro-electric sensors, electronics and monitors the window for cleanliness. If the window cleanliness test fails on 20 successive occasions (6 hours 40 minutes), a fault condition is generated and the fault LED, where fitted, flashes at the rate of 0. 5Hz.In this condition, the window self-test only is automatically repeated every minute until the window clears and window self-test passes. If the window test continuously fails then the complete self-test will still be repeated every 20 minutes. Other self-test failures will be indicated on the first test after they have occurred. For the complete ‘self-tests’ to be run automatically, the ‘self- test’ connection on the terminal board must be left open circuit when the unit is powered up. In this mode, additional self-tests may be initiated remotely by connecting 0V to the ‘self-test’ terminal, refer to the wiring diagrams in Section D. 0 The detector may be powered up in such a condition that the window ‘self-test’ can only be initiated remotely on demand (the automatic window ‘self-test’ is disabled). In order for this to be achieved the detector must be powered up with the ‘self-test’ terminal connected to 0V (terminals 3 or 5). To initiate the test for the first time after power up, the connection to the ‘self-test’ terminal must be opened for at least 5 seconds and then closed again. This ‘self-test’ function (which takes 10 seconds) will commence within 2 seconds of the closing and the result of the test indicated for as long as the connection remains closed.If the test passes, an alar m condition will be indicated and if it fails a fault condition will be indicated. To remove the test indication, the connection to the ‘self-test’ terminal must be opened. A self-test fail indication due to a window fault will remain until a window ‘self-test’ is successful and will then unlatch after a 1 minute delay. The ‘self-test’ should not be repeated more frequently than every 20 seconds (to allow the ‘self-test’ circuitry to recharge) as erroneous results may occur. Note: that if a unit is poorly sited such that sunlight can reach the window test detector element, the receive amplifier may saturate.In this event, that particular test is aborted and if this situation persists for 6 hours 40 minutes, the unit will register a fault condition. CAUTION: A REMOTELY INITIATED TEST WILL PRODUCE AN ALARM SIGNAL FROM THE DETECTOR IF THE TEST SHOWS THAT THE WINDOW IS CLEAN. TAKE THE NECESSARY STEPS TO INHIBIT A FULL ALARM CONDITION A T THE CONTROL PANEL BEFORE PROCEEDING. IF THE SELF-TEST CONNECTION IS NOT OPENED AFTER A SELF-TEST THE DETECTOR WILL REMAIN DISABLED. The window ‘self-test’ may be disabled by permanently connecting the ‘self-test’ terminal to 0V (pins 3 or 5) before power up.This may be desirable in those conditions in which contaminants may make the window appear dirty but which may not affect the ability of the detector to otherwise function normally. The detector may be reset by reducing the voltage to less than 2 volts for greater than 0. 5 seconds. A remote LED may be used with the detector except for the S251i+ and S271i+ when the detector is used through a shunt diode safety barrier or galvanic isolator. A ‘self-test’ may be initiated remotely from the controller for the S271+ (dependant on MX firmware version). 1 6. PERFORMANCE CHARACTERISTICS 6. 1 GENERAL A large number of fire tests have been carried during the development phase of the S200+ Series d etectors to determine their response limits. The results of these tests are summarised below. In order to appreciate their significance, an understanding of the mode of the operation of the detector is necessary, and a brief explanation follows: 6. 2 MODE OF OPERATION – BEHAVIOUR IN FIRE TESTS Flaming fires involving carbonaceous materials produce large quantities of carbon dioxide.This part of the combustion process gives rise to a very high level of infra-red radiation in a narrow wavelength region centred upon 4. 3? m. The radiation from a fire flickers in a characteristic way and the detector uses this flicker signal in conjunction with the black body rejection technique described in Section A to discriminate between flame and non-flame signals. The level of the signal depends upon the size of the flame and its distance from the detector. For liquid fuels the signal level increases as the surface area of the burning liquid increases.For any type of fire the signal level g enerally varies inversely with the square of the distance. For convenience, fire tests are normally carried out using liquid fuels burning in pans of known area in still air. Note: The results of fire tests can be significantly affected by weather conditions prevailing at the time, eg, – wind. The sensitivity of a detector can then be conveniently expressed as the distance at which a particular fire size can be detected. While the S200+ will reject modulated signals from blackbody sources, the presence of such sources of high intensity may affect the sensitivity of the detectors.It is important to think in terms of distance rather than time because of the different burning characteristics of different fuels. Fig. C-5 shows the response to two different fuels which ultimately produce the same signal level. The signal level given by n-heptane quickly reaches its maximum and produces an alarm within about six seconds of ignition. Diesel, on the other hand, being less volatile, t akes about a minute to reach equilibrium and an alarm is given in about 60 seconds from ignition. Note: 22If a fire test is carried out using non-miscible fuels then it is strongly recommended that water be placed in the bottom of the pan to keep it cool and prevent it deforming. A sufficient amount of fuel must be placed in the pan to ensure combustion occurs over all of its area throughout the intended duration of the test. 2 a) 0. 1m N-HEPTANE PAN FIRE b) 0. 1m 2 DIESEL PAN FIRE c) 0. 1m 2 METHANOL/ETHANOL PAN FIRE a) c) ENERGY FROM FIRES a) and c) at 25m FIRE b) AT 15m ENERGY b) 0 10 20 30 40 50 60 TIME SECONDS Fig. C-5 Burn Characteristics of Pan FiresThe time taken by the fire to reach equilibrium depends on the initial temperature of the fuel. If diesel were to be pre-heated to a temperature above its flash point then its behaviour would be more like that of n-heptane at 25oC. The test data presented below refers to fires which have reached their equilibrium condition. 6. 3 F IRE TEST DATA The S200+ range has been tested by LPCB to BS EN 54 Part 10 : 2002 and classified as a Class 1 flame detector on the 50m and 25m range settings. The S200+ is certified as Class 3 on the 12m range setting. 6. 3. 1 N-HEPTANEThe most convenient fuel for fire tests is n-heptane since it is readily available and quickly reaches its equilibrium burning rate. The range figures specified in Para 5. 5 relate to a n-heptane fire in a 0. 1m2 pan on the main axis of the detector field of view. 6. 3. 2 OTHER LIQUID HYDROCARBONS Typical ranges achieved with other fuels burning on 0. 1m2 pans, relative to that for n-heptane, are as follows: Alcohol (Ethanol, Meths) Petrol 100%* 95% Paraffin, Kerosene, JP4 70%** Diesel fuel 52% * Test performed using meths in a 0. 25m2 pan. ** Test performed using paraffin.The detection range is also a function of pan area. Field trials using n-Heptane fires indicate that the detection range increases by approximately 20% when the pan area is doubled. 23 Note: 6. 3. 3 When testing at the limits of the detectors range, the delay in response will vary due to the ambient conditions and may be significantly longer than the minimum response times, as described in 5. 6. GAS FLAMES The S200+ will not detect a hydrogen fire as it does not contain carbon. The S200+ will detect gas fires from inflammable gases containing carbon and hydrogen providing its flame produces flame modulation in the 1 to 15Hz ange. Fires burning a premixed air/gas mixture may be difficult to detect as they may produce little modulation. Tests show that an S200+ detector set to the 50m range will typically detect a 0. 8m high and 0. 2 sqm area methane/natural gas flame (venting from an 8mm diameter gas vent at 0. 5Bar (7. 5lbs/sq in) as below: Range 6. 3. 4 30m 40m 50m Time to Respond 3 seconds 6 seconds 15 seconds DIRECTIONAL SENSITIVITY WARNING: WHEN MOUNTING THE FLAMEPROOF VERSIONS OF THE S200+ DETECTORS, ENSURE THAT THE PARTS OF THE FLAMEPROOF GUARD INDICATED IN FIG.C-6 ARE NOT DIRECTED AT THE RISK AREA BEING PROTECTED, AS THE FIELD OF VIEW IS RESTRICTED. MIRROR COVER DO NOT MOUNT THE FLAMEPROOF VERSION OF THE S200+ DETECTOR WITH THIS PART OF THE GUARD (WINDOW PROTECTOR) DIRECTED AT THE RISK AREA BEING PROTECTED. RESTRICTED FIELD OF VIEW DUE TO WINDOW GUARD METAL PROTRUSION 24 Fig. C-6 The sensitivity of the S200+ is at a maximum on the detector axis. The variation of range with angle of incidence is shown in (Polar Diagrams) Figs. C-7 and C-8 for open air tests using 0. 1m2 pan fires with the detector operating at normal range. 90 80 DETECTOR o PLAN VIEW 90 o

Tuesday, July 30, 2019

Inside the Story and Movie of Beowulf

Ever since I was younger I remember reading the story of Beowulf in my English and thinking how much better it would be if it had a movie to it. Little did I know it did, produced in 1999 my English teacher Mr. Billings made us watch then movie then discuss the two stories. Now when I saw this movie I could not stay awake to save my life. Then in 2007 another movie with the story of Beowulf came out and I was excited as it got great reviews. Now when I watched the movie, I noticed many similarities and differences from the poem and the movie.So with what I can recall from the story line and the movie I will give a brief explanation of what these two stories had in common and not common. There are many similarities between the poem and movie of Beowulf. Some include the clothes, the drinking, some fight scenes, and Beowulf’s arrogance. When we first read the story you can tell the description of the older style clothes and armor and spot on throughout the movie. Another similar ity is the drinking between the two stories. When we first read the book we hear about the Danes hall where they celebrate and drink till they pass out.When we watch the movie you see many scenes of these men drinking mass amounts of alcohol. The next similarity I want to talk about is the fight scene between Grendel and Beowulf. At the beginning of the story Beowulf grasps Grendel’s’ hand until he breaks Grendel’s’ fingers which stays true to the poem. Also it is important to mention that that in the movie and poem, Beowulf is seen as a hero of humans able to overpower the Danes. This is why he arrogant throughout both stories thinking he can destroy anything in his path.Now as we all know, most of the time when a book or poem is turned into a movie it will have many differences. I was not surprised to see the movie of Beowulf not stay true to the original poem. The first difference we come across is at the beginning of the movie as it starts off with Gr endel’s death, when in the poem it starts with the Danes having a beer party in the hall. The major difference between the two is the poem actually explained a detailed story line of Beowulf’s journey. When I watched I movie I felt if left out some important pieces that i like in the poem.Another big difference was the fight between Beowulf and the dragon. In the movie Beowulf had the cut part of his off arm off and he rips out the heart of the dragon. Now this scene is extremely different from the poem, the movie just added more dramatics to make the viewer more into the movie. Now in this writer professional opinion I thought the movie and poem had many differences but still caught the essence and story of Beowulf. This movie and poem are connected by a history of power and violence in which we can see bloody scenes and deaths.There also two histories that lack of love, and neither of them provides any link of friendship, but rather each of them cares about their own , every character of the movie and poem takes care of themselves because they have to fight to defend themselves from the terrible things that happen. Another important aspect of the two stories are they both belong to the old English period with differences with the pronunciation of Modern English and the English spoken at the time of the poem.So as you can see there are many major differences and similarities between both the poem and movie and Beowulf. I hope after you have read this compare and contrast essay you will have more knowledge over the poem and movie of Beowulf. The story and movie of Beowulf is one of my favorites and a great memory of why I love to read. So no matter what, if you have not yet read of seen the movie I highly encourage you to as it’s a great story, one to not be forgotten.

Monday, July 29, 2019

Animal right Essay Example | Topics and Well Written Essays - 500 words

Animal right - Essay Example According to his theory, when value is given to all other humans regardless of their mental and rational abilities then the same value should be ascribed to the non-human animals as well. His arguments are based on the views of Immanuel Kant that all animals have moral rights but he criticizes Kant’s belief that only rational beings are subjected to respect. Regan rejects this view and argues that humans gain the value and respect regardless of their rationality as with infants and those who are mentally instable thus non-human animals are also subjected to the same value and respect regardless of their rationality. Since all human and non-human animals are subjects-of-a-life, life is the only attribute which would subject to value. Thus every being that is subject-of-a-life must be treated with respect and must be given moral rights (Regan, 2004). On the other hand, utilitarianism is a theory which proposes that any action will be morally right only when it benefits and provides good to a large number of people. According to this theory, what’s right is determined by the value of pleasure or pain that it causes to other people. If an action causes pleasure to most of the people then it is considered as morally right while if it causes pain and suffering for the people, it will be considered morally wrong. Utilitarianism is often used to justify animal rights as their pain and pleasure is also counted for actions that are morally right or wrong (Brooman, 1997). Utilitarian theorists believe that biologically it is justified that non-human animals are sentient and biologically they are able to feel pain and pleasure. This is justified also practically as many people have experienced such feelings in animals, especially cats and dogs. There is a lot of evidence that non-human animals are sentient and they feel

Sunday, July 28, 2019

EC201 Essay Example | Topics and Well Written Essays - 500 words

EC201 - Essay Example For the top 1% income has soared by 200%, but for the average people income has only risen by 30%. A way to reduce battle against the income disparities in the population is by increasing the level of education attainment. The income gap that exists between a person that has a high school degree and a college graduate with a bachelors degree is approximately $23,000 a year. Over a lifetime a person with a college degree will earn 75% more than a higher graduate while a person with a graduate degree with earn four times more. Income data can be presented graphically using a Lorenz curve. A Lorenz curve is a curve that shows cumulative shares of income received by individuals or groups. It was developed in 1905 by Marx Lorenz. The distribution of US income shows that the Lorenz became more bowed out between 1968 and 2006. The Gini coefficient measures the ratio between the Lorenz curve and the 45 degree line and the total area under the 45 degree line. The Gini coefficient in the United States in 2006 was 0.46. A form of inequality that has risen since the 1960’s is an increase in the number of families headed by women. Technological changes have influenced the demand for labor. The demand for skilled labor has risen while the demand for unskilled labor has declined. The result has been an increased in the income gap between skilled and unskilled workers. Along with new technologies firms are adopting new management styles that required stronger communication skills. The intellectual gap will continue to widen as we move further into the 21st century. Future generations are going to become more educated than ours in order to survive. In our current workforce some of the changes in include the use of production teams and small assembly line work units. Due to the fact the people are being force to work together interpersonal and communication skills have become critical skills employees have to master. College graduates entering the workforce

Saturday, July 27, 2019

What went wrong to Swissair flight 111 Research Paper

What went wrong to Swissair flight 111 - Research Paper Example This paper delves into one of the biggest aviation accidents in history; the crash of Swissair Flight 111. This accident brought to fore one of the most common causes of aviation accidents- structural and design problems. The insulating material used to cover fiberglass insulation had propagated a fire that was started above the cockpit ceiling by an arcing event. Although aircraft insulation blankets help in protecting passengers and crew against noise and frigid temperatures at high altitudes, the materials used should meet the Federal Aviation Authority (FAA) flammability test requirements. Swissair Flight 111 was en route from New York, United States of America to Geneva, Switzerland on 2 September 1998. There were 229 souls on board (National Geographic, 2014). However, approximately 53 minutes into the flight, while the plane was flying 33000 feet, the crew members began to smell something unusual in the cockpit. The smell came from an area right above them. Almost at the same time, the pilots noticed a small amount of smoke filing the cockpit. The pilots started to investigate exactly where the smoke came from (Carley, 1998). After a while, they noticed that what was initially seen as the source could no longer be seen, and they stopped the investigation. Based on their experience and perception, they concluded that the smell and smoke was as a result of the air conditioning system in the pane. Although the smoke had disappeared, the pilots decided that it was necessary to land and have the plane checked before continuing with the flight. At first, they wanted to t urn to Boston, but the air traffic controller advised them to land at Halifax, Canada (National Geographic, 2014). The crew also requested the air traffic controller at Halifax that they needed to dump fuel, and the plane was diverted to St. Margaret’s Bay where the fuel could be dumped. The crew started to prepare for an emergency landing, and this involved undertaking the

Friday, July 26, 2019

Safe and Quality Healthcare Services Essay Example | Topics and Well Written Essays - 1500 words

Safe and Quality Healthcare Services - Essay Example So as we see, FMEA is a precautionary process, which helps prevent problems and help deal with them in an effective and organized manner, if they were to occur. This analytical method has been used since several decades in the production and engineering industry and has proved to be an excellent tool in identifying and reducing hazards. It examines each individual component of a particular system to determine a number of ways in which each component could fail and, not only this, but the effect of a particular failure on the stability of the entire system. (Spath, 2003) One of the major concerns in the healthcare industry is safety. The assurance that a patient is in reliable hands and that the treatment being done or service being offered is safe up to quality standards. For patient safety and wellbeing, healthcare service providers must adopt a set of rules or standards to abide by. The Joint Commission on Accreditation of Healthcare Organizations (JCAHO) assumed responsibility for the certification of hospitals in 1951, back then, the standards continued to uphold a safe environment. Because of increasing public concern with the problem of medical errors and patient injuries, JCAHO reinforced its commitment to patient safety. Commencing in 1996, JCAHO introduced a number of new standards that are intended to maintain continuous improvement in the safety of the services provided to the public. (Spath, 2003) In addition to adopting well defined processes used in healthcare services and assuring that the personnel performing the processes are competent, there is a need for more safety and precautionary measures. The solution to this lies in other industries. This is when JCAHO executives considered standard changes to adopt a more a proactive approach to risk reduction, they researched many other techniques to improve safety used in other high-risk industries to find one that would be adaptable to health care services as well. (Spath, 2003) The process So, basically FMEA is a proactive approach and it consumes little time and resources when compared to the return on investments. The National Center for Patient Safety website developed by the Veterans Affair, devised a set of steps applying the traditional FMEA to healthcare. The process is as follows: 1. Choose a process to study. JCAHO requires the

The case against hurting others Essay Example | Topics and Well Written Essays - 1000 words

The case against hurting others - Essay Example The focus is on the concept of â€Å"How would you like it if someone did that to you?† (Nagel, 1987. p. 64). The point emphasized by Nagel here is that a person should endeavor to step into the shoes of the other individual. Then the perspective of reality would become evident, and perhaps, the action could be avoided. He further argues that people fail to appreciate the viewpoint of the other person because their own orientation about the facts is not only specific, due to being a different person altogether . Kant on the other hand, almost refers to the doing of these acts as an act of duty, wherein a person would be internally compelled to undergo a task. He feels that it is important to take heed of situation as a consequence of one’s internal drive, instead somebody from the outer world forcing an action.  Nagel also tends to believes that the concept of majority is a more generalized concept, and cannot be left at the whims of individuals. Universal good, thoug h is not clearly defined, yet it exists as unison. It is only for a person to explore the same in appropriate conditions and circumstances, whereby the true inner persona of the individual will come out. In the context of hurting others, this is a very important stance, the fact remains, that of there is a concept of universal good, then a person should not harm others in the first instance. Therefore, he should make that realization earlier in, and should begin to establish the norms that would help him world.... Nagel also tends to believes that the concept of majority is a more generalized concept, and cannot be left at the whims of individuals. Universal good, though is not clearly defined, yet it exists as unison. It is only for a person to explore the same in appropriate conditions and circumstances, whereby the true inner persona of the individual will come out. In the context of hurting others, this is a very important stance, the fact remains, that of there is a concept of universal good, then a person should not harm others in the first instance. Therefore, he should make that realization earlier in, and should begin to establish the norms that would help him live appropriately in the world. The reality is that the integrity of the will is imperishable. In the perspective, the meaning can be inferred in the same line. The will alone can have no integrity - it has to be linked with man himself, as per Kant. Therefore, again extrapolating the fact that the mind is sure to dominate the proceedings of life, despite what course of actions are to be taken, the case against hurting people becomes clear. The soul as an entity can never destroy, as it is the true emblem of existence for man - his distinguishing factor. These factors give an intrinsic line of reasoning for the person who is about to or intends to harm somebody. When the established pattern of thought is already present, then the person will automatically restrain himself from doing the superfluous. The concept of uniformity of behavior and thought has always triggered the minds of people who want to dwell into the science of what humans may do in a particular scenario. However, it is interesting that

Thursday, July 25, 2019

Dematologic Disease or Condition Report Essay Example | Topics and Well Written Essays - 500 words

Dematologic Disease or Condition Report - Essay Example It is irregular in shape, and lacks raised wheals or pustular abscesses. No ecchymoses, petechiae, any other sign of epidermal or subdermal injury or damage are present near the hyperpigmented area (Calonje, 2009). There are several acneform papular lesions near the center of the patch (Rivers & Wiseman, 2010). No evidence of ulcers of any type is seen. Testing: Patient was sent for surgical biopsy, with the incision to be made at the center of the hyperpigmented area. Biopsy results are negative for malignancy and infection. The biopsy showed smooth muscle bundles within the dermis and an excess of melanocytes in the affected area, confirming diagnosis of Beckers nevus. (Rivers & Wiseman, 2010). Treatment/Plan: Prognosis is good, as the area appears to be a benign lesion. Patient has been warned to expect hypertrichosis on the area, and referred to a laser hair removal center. Neither dermabrasion nor cryosurgery is indicated, as the pigmentation is within the dermal layers and cannot be removed in this manner. The condition is non-infectious, so treatment with antibiotics, antifungals, or parasiticides is unneccessary (Book, Glass, & Laude, 1997). Keratolytics will be similarly unhelpful at treating the pigmentation, despite sun exposure being a possible correlating factor (Tymen et al., 1981). Further treatment is not necessary except on cosmetic grounds; however, if desired by the patient, laser treatment can reduce the excess pigmentation (Rivers & Wiseman, 2010). Patient has been told to return for further examination if the lesion shows major changes, excepting mild erythema resulting from laser treatments or

Wednesday, July 24, 2019

Case Study Example | Topics and Well Written Essays - 750 words - 29

Case Study Example Hiring a new worker, training them, and ensuring that they perform better than the previous employee is very expensive and time-consuming (Shaer 6). 2. Even if the underperforming employee is fired and a replacement is brought in, there is no guarantee that the new employee will perform better and the manager might be forced to again fire the new employee and find a replacement (Shaer 8). Such a trend will prove detrimental to the company’s progress. Once the manager decides to give an underperforming employee the chance to redeem themselves and reach an acceptable performance, the former is forced to come up with a counseling strategy. According to Shaer, counseling involves setting goals and objectives for the employee, then advising and coaching them on how to achieve the set goals (25). During the counseling process, the manager should remember to: 2. Clearly explain to the employee the areas in which they are failing and make them understand exactly what is expected of them. It may be that although the employee is productive, they lack certain personality traits that are vital to good performance (Shaer 35). 3. Assure the employee of continuous support from the management throughout the performance improvement period. Support from the manager makes the employee feel important to the company and increases their motivation to perform better. In most cases, underperforming employees do not realize that they are underperforming until they are given a bad review or fired. These employees believe that their performance is good and consider the bad review or firing as unfair by rationalizing that: 1. Their performance is not bad but rather find fault in the methods used to measure performance. According to Shaer, such employees demand to be evaluated using different criteria other than the normal criteria used in the company (29). 2. Although their performance might be bad, the underperforming employees see no need

Tuesday, July 23, 2019

Interim assessment For PhD research Paper Example | Topics and Well Written Essays - 4250 words

Interim assessment For PhD - Research Paper Example However, the cultures which are being followed in construction industry is associated with the ineffective communication and coordination among members of project team, sexual harassment, poor mentality and lack of trust among project team members. These features results in negatively affecting the overall performance of the industry (Ankrah, 2007). This research study is being conducted in order to investigate the impact of organisational culture on safety of the project with reference to the construction industry. The study also seeks to explore the impact of culture and safety on project performance. The study is based on the construction industry located in Kingdom of Saudi Arabia. The researcher in this study also interested in finding the current health and safety policies being adopted by construction industry in Saudi Arabia, the accidental rates in construction sites, and the factors influence in implementing safety culture in construction companies. The research would be he lpful in determining the degree to which culture influence safety and performance of the project. 1.2. Justification: Choudhry, R., Fang, D., and Lingard, H. (2009) conducted research study regarding the safety climate of the construction industry and concluded that the safety is highly important for improving the overall performance of the construction organizations and thus provided a framework for measuring the safety climate of a construction company. Fang, Chen, and Wong (2006) conducted research study on the safety climate of the construction industry in Hong Kong and presented important insights for the organisations operating in the construction industry of Hong Kong. Larsson, Pousette, and Torner (2008) and O’Toole (2002), worked on the relationship of the safety climate with the employees’ behaviour and performance. There have been few or no research studies conducted in order to explore the impact of the different cultural practices in the construction indus try on the safety and eventually the impact of the organisational culture and safety on the project performance with reference to the Saudi Arabia. Therefore this research study would be significant for researchers who would conduct research related to the topic in future. Furthermore, there are some studies conducted in this topic but they did not focus on significance of culture related to safety and performance. This study would be helpful for owners and contactors of the construction company. The study will highlight the factors influencing project performance of the construction companies. The research study will also suggest the safety techniques which should be adopted by construction companies in order to create safety environment during different projects. It will also highlight the weaknesses of the policies being adopted by construction companies in accomplishing a project. The study would also be beneficial for government of KSA in making the safety policies for construc tion industry. 2. Background 2.1. Construction Industry in Saudi Arabia: The progress of construction industry in a country shows the future progress of the country. The construction industry of Saudi Arabia is one of the largest and fast growing markets which encountered the business of $36.5 billion in 2011 and is expected to reach $43.8

Monday, July 22, 2019

Ethnicity and Gender in Late Childhood and Adolescense Essay Example for Free

Ethnicity and Gender in Late Childhood and Adolescense Essay Abstract This paper focuses on an study that was conducted to examine the awareness of gender and ethinic bias along with gender and ethnic identity in late childhood and early adolescence. Data was collected on children in 4th, 6th, and 8th grades from various elementary and middle schools. The ethnic groups that were represented were White/European American, African American, an Latino. Daily diaries and individual interviews displayed that ethnic, gender, and grade level differences affected the awareness of bias ( Developmental Psychology, 2011). It was further proven that children in this age range were more aware of gender bias than ethinic bias. Keywords: gender identity, ethnic identity, bias During adolescent development a child’s need to be identified based ethnicity and/or gender becomes more prevalent and is further influenced by their peers. In addition, during this stage of development, social identity can have a deeper impact on intergroup attitudes. In the text, chapter 3 discusses gender schemas and how they evolve from being inflexible to flexible though the development of a human being (Wade Tavris, 2011). In the Development Psychology article, â€Å"Ethnicity and Gender in Late Childhood and Early Adolescence: Group Identity and Awareness of Bias†, 2011, psychologists, Alabi, Brown, Huynh, and Masten examined the awareness of gender an identity bias and its impact on the individuals/groups. The hypothesis is the possibility that children can be aware of one type of bias and oblivious to the another based on their group identity. The study was conducted with 350 students from three participating elementary schools and three middle schools in Southern California. The schools represented various ethnic/racial make-ups and socioeconomic statuses that included 67 African American, 120 White, and 167 Latino students. Two methodologies were used during this study, case study and naturalistic observation. The case study methodology as described by the text is the description of an individual based on their observation of behavior during a specified period (Wade Tavris, 2011, p. 18). During the first week the case study was conducted by each participant receiving a diary to document their assessment of what identity was most important to them. The approach was referred to as identity centrality and the children received an ethnicity and gender score based on the results. The second portion of this test, identified as the identity salience approach involved students documenting whether or not they thought about gender, ethnic, or no identity at all during each period of the school day. The results of this test revealed that 51% of the children mentioned ethnicity and 63% mentioned gender. Following this portion of the study, the students were assessed through individual interviews with the same ethnicity, same gender experimenter. To assess ethnic identity, the students were presented five items with opposing questions, in which they had to choose the statement that they most identified with. A similar assessment was conducted to determine the degree of their gender identity. The final results of these assessments revealed that 51% of the students were aware of ethnic bias associated with ethnic identity while 49% were unaware. The relationship between bias and group identity was determined by eight ethnic and gender identity measures to include: gender and ethinic identity, salience, centrality, positivity/importance of ethnicity, contentedness with gender, felt gender typicality, and felt pressure to conform to gender norms. Over 38% of the students felt positive about their ethnicity and felt content/typical with their gender. 26% percent felt that their ethnicity was not important and felt no pressure to conform to gender norms. 20% of the students felt that their ethnicity was not important but was discontent with the gender norms. Finally, 9% felt that their ethnicity was positive and important and were content with gender norms. In this study the awareness of gender and ethnic bias varied by age group. It comes as no surprise that children become more aware of gender bias than ethnic bias at a young age. As the text mentions, gender identity is discovered at preschool age in which the process of gender typing begins. This is where boys and girls begin to get in touch with their masculine and feminine characteristics (Wade Tavris, 2011, pg. 107). Ethinic identity creates a sense of emotional attachment to the group and the individual feels the need to conform to the values set forth (Wade Tavris, 2011, pg. 350). This study further showed that European American students were more aware of gender bias than ethnic bias. In middle school all students were equally aware of both biases but African american and Latinos were likely to be aware of ethnic bias in elementary school. The potential cause of this stemmed from belonging to a negatively stereotyped group which raised the earlier awareness. This showed that European American students were less likely to be targeted for ethnic bias ( Developmental Psychology, 2011). In early adolescence girls were more aware of gender bias than boys and could attest to being targets of discrimation. Conclusion The conduction of this study proved that children in late childhood and adolescence were more aware of gender bias than ethnic bias. In addition the results showed that children who were non European-American experienced and identified with ethnic bias at an earlier age. The limitations to this study was the demographics. This study was conducted in Los Angeles which has a very unique demographic because it is essentially a melting pot of ethnicities. The different socioeconomical factors and educational inequalities impacted the outcome of the results. Children in the poorest schools had more challenges to encounter in school than their peers in this study. These experiences molded their ethnic identities and the biases associated with it. During late childhood an adolescence development, group identity and intergroup relations became important factors. It is expected that this age group no matter the gender/ethnicity will witness or be a target of discrimination. Although legal segregation is a thing of the past, gender and ethnic bias can greatly impact society but the attitudes and beliefs of individuals can be contained through intervention. With intervention at the earlier stages of development, children can fully witness equality. Future research methods inspired by this article should focus on the data collected from various locations throughout the country. Keeping this research generalized to one location compromises the true validity of the study. New research methods will determine how different ethnicities identify with gender and ethnic bias. Other areas of concentration that should be included in this study are the workforce, judicial system and media/television. Successful results of these research methods can pave the way for some individuals to change their ideologies. These studies can impact the lives of everyday people and potentially unveil solutions to discrimination. As we become a more multicultural country, we must realize the importance of cultural awareness so that we can better interact with different ethnicities/genders. Parents should encourage their to children to foster positive relationships with their peers despite cultural difference. These solutions will alleviate the stereotypes associated with gender and ethnic identity. References Brown, C. , Alabi, B. , Huynh, V. , Masten, C.. (2011). Ethnicity and Gender in Late Childhood and Early Adolescence: Group Identity and Awareness of Bias. Developmental Psychology, 47(2), 463. Retrieved May 21, 2011, from Research Library. (Document ID: 2321539051) Wade, C. , Tavris, C. (2011). Invitation to Psychology, fifth Edition. Upper Saddle River, NJ: Prentice Hall.

Trends in Human Services Essay Example for Free

Trends in Human Services Essay To run an organization, the management of the labor plays a great role in reflecting on the output of the company.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   In the recent years, there are challenges due to technological, economic changes, competition and market trends. An organizations needs to cater for the needs of employees and ensure friendly supervision as well as freedom to the employees. To ensure high performance , this will involve attracting, developing and retaining a qualified and motivated workforce. The top management foresees the needs of their employees and organizes for training and development sessions among others. The personal needs of the employees are taken care; they are involved in decision making and participate in organization’s activities. Developing of the employees’ potential is very critical so that there is self actualization through job sharing, job enlargement and job-enriching. An action plan is prepared so that recruiting, selecting, training and developing and rewarding of employees is recognized and done properly. Continued efforts at work between the management and staff helps to achieve organizational success locally and internationally through legal compliance and employee satisfaction.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For high output, strategic management will aim to integrate the managerial planning and decision making and hence lead to forecasting, planning and acquisition of desired labor force. There are programs that ensure right number of individuals is available at the right place and right time, and this ensures effective running of an organization. Delays may be felt when fewer labor force is recruited while a high number would lead to labor wastage and incurred loses.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A lengthy procedure that recruits and selects applicants ultimately identifies and selects prospective employees. While carrying out the interview, actual screening and selection of appropriate candidates require good planning, availability of resources and qualified interviewers. For fair approval, discrimination of the candidates due to gender, age or nationality should be avoided.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A safe and healthy working environment is a requirement by virtue of legal, social and political value especially due to exposure to hazardous substances or stress in the workplace. Safety equipment as well as accident prevention programs have been put forward to ensure safer environments.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As a result of the competitive global economy, managing labors relations have been great concern especially because the economy is service oriented. There is need to prioritize the needs of the organization and that of the employees and constructively analyzed and take them into consideration.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The quality of some services offered may have negative environmental and human health effects and this has been felt in some social groups due to poverty in such regions. The well being of many people has been improved while others have been affected by the international trade. Competition for same resources may occur however this should be constructively managed so that one group does not benefit at the expense of the other.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A great benefit in conserving the various groups is to inform the society to explicitly consider trade-offs between different regions and people as well as the labor force because this benefits the society.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To help the organization’s ability in service delivery, selection of the human resource especially is crucial. For example, those coming from a relatively poor region need the support of the management so as to increase their output.   Technology has ensured continued identification, monitoring and reviewing of the services specified. Use of computer rather that manual operations has improved the quality and accuracy in the service delivered. The difference in biodiversity has not affected these operations and hence technology has offset the cost of service delivery.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Over dependence on government funding or sponsorship while carrying out projects in regional areas may be frustrated as a result of extra costs in some regions of a country. Where the government sets out the priorities for investments in a certain year, the funds may not have been adequately allocated and hence may affect service delivery. Reference: Marianne w., Tricia M. (2006) Introduction To Human Services:

Sunday, July 21, 2019

The role of e commerce in the era of globalization

The role of e commerce in the era of globalization E commerce is the electronic commerce where business starts with electronically. For using the e commerce transaction must be happen via electronic system. For example someone wants to sell his product then he needs to get the order of that product and also needs to get payment so that he can send the product. In this case the buyer can buy that product through the electronic payment system. But there is some problem for this case such as security issue. If the third party involve on the e payment system then it will be harmful for both buyer and sellers. So the security of e payment system should be strong to protect from third party. Here third party is internet expert hacker. Aim objective: To secure and monitor of the e payment will be increase in the business sector day by day. More than one browser needs to be user friendly. Maintain a good customer service. Different section: Blaise j.(2004)said that Though the Internet has increased the speed and number of victims a fraudster can reach in one attempt, the actual types and techniques of the Internet scams follow the same patterns as scams previously conducted by mail or telephone. As with pre-cyber scams, the number of scams and the subsequent variations make it impossible to mention them all. The primary intent of the fraudster is to befriend the victim, gain their trust, and then obtain money or enough personal information to access financial accounts. Becoming aware of and informed about some of the different types of Internet scams should make consumers more mindful of their on- line actions and transactions. According to the Adi m alwaked.(2008).some questions arisen like: Do the electronic payments securely exist in the Business to Business transactions within the country? What are the governmental security criteria for the e-business transactions? And do I as a work owner and a government have professionals and graduates who can manage e-business departments and projects using the new e-business methodologies as knowledge management and expert systems? And if the e-business pillars are not yet completed or initiated, to what level should the users deal with e-business? Do we have any alternatives? Many of these critical enquiries should be answered when reviewing e-government and e-readiness situations. Failing to answer and solve this ambiguity can result in two unwanted situations: the work owners will not adopt e-business, or the e-business will be initiated based on ambiguous visions that will not achieve the expected propositions and therefore will fail. All the e-business revenues are part of the whole business revenues and they will be part of the final financial statements of the enterprises, and if the governments decided to give these taxation supports to motivate e-business inside the different enterprises, it is recommended that good policies and frameworks applied against frauds that take advantage of the financial facilitations, for instance the fake online contracts and payments in order to delude the authorities and to create an impression that the e-business in a particular company was the main reason for the revenues, and therefore there should be some efficient procedures against these kinds of frauds. The e-business field has become the first target for the e-hackers today, many kinds of frauds in credit cards, stealing identities, and different kinds of frauds are evolving every day, but actually the solution is not always within the responsibility of the governments, but can the governments support the e-business adopters here? Traditionally, this is found in e-business pillars and e-readiness, as the secure e-payment methods in e-billing, and the good regulations to fight the net crimes, and the e-business awareness programmes as mentioned. But as a part of a new strategic e-business policy that keeps and increase the advantages of the e-service and limits the weaknesses, calls for defined e-security criteria in the DNs might be a solution, such criteria that specifies strict standards for e-commerce websites, including all the security aspects, as authentications, IP viewers for more identifications of customers, a strong insist on the ecommerce website owners to include the security awareness issues in the main pages of their websites and to keep reminding their users about them, all these procedures can increase the customers confident about security and solve the ambiguity of these issues. National payment systems are the backbone of a financial sector. Standard protocols for check and electronic payments will facilitate the adoption of electronic payments by banks, retailers, government agencies, and others in the payments chain. Access to electronic payments settlement can be contentious, as banks typically control or influence payment systems and may resist opening access to other financial service providers and retailers (Isern, Deshpande van Doorn, 2005). Avshalom Aderet et al(2007).said security and privacy assesses the degree of customer exposure to the risks involved in the e-shopping process and the likelihood of a product or service not meeting consumer expectations (Dillon and Reif, 2006). The variables discussed in this factor are: the means used to assure data security, the privacy of personal information, and the security guarantee that pertains to each transaction (Chung-Hoon and Young-Gul, 2003). We group privacy and security together following Flavià ¡n and Guinalà ­u (2006) who, having reviewed the privacy and security literature, suggest that, although these concepts are often researched as separate variables, there is a close relationship between them in the mind of the consumer and they should therefore be considered as a single variable. Furthermore, in practice, e-vendors tend to handle the protection of privacy and security together. Finally, in public policy these concepts run side by side. Globalization has brought in many changes in the business scenario with the whole world inching towards one big market place. Communication between the buyers and sellers has become critical as each can opt to explore a greater number of alternatives than ever before. E-commerce through Internet, e-mails, websites, and other facilities, enables a businessman to be linked with every corner of the world, and thus opens up greater opportunities in the world market. Important factor is the time required for completing a business transaction. As markets are becoming competitive and information is more readily available, a quick, reliable and replicable transaction implies availing of prevailing opportunities. On the contrary, delays in processing a transaction might become synonymous to wasting an opportunity. Therefore, a fast and alternative mechanism of communication, contract, and payment is an Integral part of a globally competitive business organization. Wasting the customers time Time is the most important commodity in online shopping. You want your customers to be able to find what they want and buy it as quickly as possible. Dynamic pages with changing content may look interesting, but they also make pages take longer to load. When customers have to wait for pages to load, they often give up and go to a faster-moving site. Additionally, some e-commerce sites make the mistake of wasting a customers time during the checkout process by requiring registration or asking for unnecessary info. Once a customer decides to buy from your site you should make the checkout processes as fast as possible with as few clicks as possible. Otherwise, the customer may fail to complete the sale out of frustration. Lack of compatibility with more than one browser While 80% of the market uses Microsoft Internet Explorer, failing to design your e-commerce site to work with other browsers is passing up a huge opportunity. You immediately knock out at least 20% of your potential customer pool, maybe more. Making your website work with a variety of browsers usually only requires a few minor tweaks, but it can make a big difference in the amount of traffic you receive. Poor overall web design -When a website is not well organized or looks unprofessional, many customers will immediately look elsewhere. Online shoppers have high standards these days when it comes to how your e-commerce site looks and functions. Your products should be easy to find and displayed nicely. Customers should be able to search for what they want and find it. Likewise shopping cart use should be a streamlined process. Any hitches in the buying process from start to finish will cost you customers. Poor customer service -All e-commerce sites should make it easy to get questions about products and purchases answered. Too many sites make finding contact information and accessing company policies challenging for the customer. If customers cant find the information they need to feel comfortable about a sale, they will probably abandon the sale. Make sure all of your merchant policies and contact information are prominently displayed on multiple pages of your website. Conclusion: Internet fraud can evidently be defined as an electronic deception and theft. However, as technology advances, the tactics and skills used by fraudsters to commit these crimes will also advance. In 2002, over $14.6 million in losses were reported in the U.S. alone, due to Internet fraud; while it is expected, several million more went unreported. Local, state and federal agencies are actively tracking, investigating, and prosecuting fraud offenders. However, with the limitless capabilities of the Internet, its often difficult to determine if the con artist is in the next apartment, next state, or in a completely different country. These cyber swindles and dot-cons present new challenges to governments. The Internet enables criminals to cloak themselves in anonymity, making it imperative that governments act more quickly to stop newly emerging schemes before the perpetrators can disappear in the World Wide Web. Online consumers need to execute added precaution when surfing, reading e-mail, making purchases, and considering online opportunities. The great thing about the Internet is it is easy to find other information, and consumers should do crosscheck before they become a victim. Legitimate online retailers and credit card companies will also have to make continued efforts to reassure consumers that their Internet activities will be secure. The global nature of the Internet, and law enforcement experience in conducting Internet fraud investigations, have made it increasingly clear that law enforcement authorities need to coordinate their efforts to have a substantial effect on all forms of Internet fraud. Reference: Blaise J(2004), internet fraud: a global perspective,vol4,pp1-9. Anguelov, C., Hilgert, M. Hogarth, J. (2004). US consumers and electronic banking, 1995-2003. Federal Reserve Bulletin, Winter 2004. Retrieved December 10, 2005 from: http://www.federalreserve.gov/pubs/bulletin/2004/winter04_ca.pdf BIS. (2004). Survey of developments in electronic money and internet and mobile payments. Committee on Payment and Settlement Systems (CPSS). Basle: Bank for International Settlements. BIS. (2003). Risk management principles for electronic banking. Electronic Banking Group of the Basel Committee on Banking Supervision. Basel: Bank for International Settlements. Bà ©zard, G. (2005). Low-value payments: Looking for the code cracker. Boston: Aite Group, LLC. Journal of E-Business: Volume VII, No 2 (2007) 45 the United States, Federal Reserve Bulletin, Spring, 180-201. Isern, J. (2007). Launching electronic banking in developing countries: What can be learned from experience in developed countries? E-Business Review, 7. Isern, J., Deshpande, R. van Doorn, J. (2005). Crafting a money transfers strategy: Guidance for pro-poor financial service providers. CGAP Occasional Paper 10. Washington: The World Bank. Lafferty Group. (2005c, November 14). US consumers and corporates reduce cheque usage. Electronic Payments International Newsletter. London: Author. NetBank, Inc. (2004). Annual report. Retrieved December 29, 2005 from: http://www.netbankinc.com/ir_reports.htm Pennathur, A. (2001). Clicks and bricks: E-risk management for banks in the age of the internet. Journal of Banking and Finance (25), 2103-2123. Rombel, A. (2005). The worlds best internet banks 2005. Global Finance 19(8), 31-36. Adi m alwaked.(2008). encouraging e-business investments in the developing nations and the ambiguous road: a proposed vision.vol8, pp12-18, Avshalom Aderet et al(2007). taking customer perceptions of the ethical commitments of e-vendors seriously,vol6 pp12-15

Saturday, July 20, 2019

The Dilemma of Euthanasia and Assisted Suicide Essays -- Euthanasia Ph

The Dilemma of Euthanasia      Ã‚  Ã‚  Ã‚   Jack Kevorkian, serving a 10-to-25-year prison sentence for second-degree murder for giving a lethal injection to Thomas Youk, was honored as a humanitarian on April 10. Kevorkian received the Gleitsman Foundation's Citizen Activist Award in ceremonies at Harvard University. Foundation president Alan Gleitsman calls him "a selfless believer in death with dignity" who "sacrificed his medical license and now his own freedom toward that cause." With Kevorkian unable to attend, the award was accepted for him by one of those who nominated him -- his victim's wife, Melody Youk. Kevorkian will share the $100,000 award with Alabama attorney Bryan Stevenson, a crusader against the death penalty. Kevorkian has long favored allowing execution by lethal experiments or removal of a prisoner's vital organs.    What is happening here? At Harvard University a famous euthanasia-doctor receives a gift of $100,000. What's wrong with this picture?    Numerous US studies have established that the Americans most directly affected by the issue of physician-assisted suicide -- those who are frail, elderly and suffering from terminal illness -- are also more opposed to legalizing the practice than others are:    * A poll conducted for the Washington Post on March 22-26, 1996, found 50% support for legalizing physician-assisted suicide (Washington A18) Voters aged 35-44 supported legalization, 57% to 33%. But these figures reversed for voters aged 65 and older, who opposed legalization 54% to 38%. Majority opposition was also found among those with incomes under $15,000 (54%), and black Americans (70%).    * An August 1993 Roper poll funded by the Hemlock Society and other euthanasia sup... ...d suicide: attitudes and experiences of oncology patients, oncologists, and the public." 347 The Lancet 1805 (June 29, 1996):1809    Humphry, Derek. "What's in a word?" Euthanasia Research & Guidance Organization 1993, Table 1-A.    Koenig, Dr. Harold et al.. "Attitudes of Elderly Patients and their Families Toward Physician-Assisted Suicide." 156 Archives of Internal Medicine 2240 (Oct. 28, 1996)    Lee v. Oregon, 891 F.Supp. 1429 (D. Or. 1995), vacated on other grounds, 107 F.3d 1382 (9th Cir. 1997), cert. denied, 118 S. Ct. 328 (1997).    "Poll Shows More Would Support Law Using Gentler Language," TimeLines (Jan.-Feb. 1994):9    Washington v. Glucksberg, 117 S. Ct. 2258, 2262 n. 7 (1997. -- -- --. 117 S. Ct. at 2272, quoting United States v. Rutherford, 442 U.S. 544, 558. 1979. Washington Post, April 4, 1996.

Friday, July 19, 2019

The Development of Attachment Essays -- attachment theory, John Bowlby

One of the most important factors that affect child development is the relationship of the child with their primary caregiver. This is a tenet of developmental psychology known as attachment theory. John Bowlby, the creator of this theory, wanted to examine how early childhood experiences influence personality development. Attachment theory specifically examines infant’s reactions to being separated from their primary caregiver. Bowlby hypothesized that the differences in how children react to these situations demonstrates basic behavioral differences in infancy that will have consequences for later social and emotional development. To study attachment theory, Mary Ainsworth developed the Strange Situation Paradigm. This procedure examines the reaction of the infant when their primary caregiver leaves them for up to three minutes. The emotional response of the child to being left alone and the behavior of the child when the caregiver reappears are coded on a seven point rating scale. Based on these scores children are divided into three categories which illustrate the quality of the attachment. Securely attached children are confident in their relationship with their primary caregiver, and are not afraid to explore new things. In the Strange Situation, these infants are less distressed during separation and happy to see their caregiver during the reunion and will often make contact with them. Infants with an insecure-avoidant attachment are characterized by a lack of positive affect toward their primary caregiver. They are less distressed during the separation than most infants, and reserve their emotiona l response not for their caregiver but for toys or the experimenter. Infants with insecure-ambivalent or resistan... ...t. Child Development, 62, 906-917. Joseph, R. (1999). Environmental Influences on Neural Plasticity, the Limbic System, Emotional Development and Attachment: A Review. Child Psychiatry and Human Development, 29. Koran-Karie, N., Oppenheim, D., Dolev, S., Sher, E., & Etzion-Carasso, A. (2002). Mothers’ Insightfulness Regarding Their Infants’ Internal Experience: Relations With Maternal Sensitivity and Infant Attachment. Developmental Psychology, 38, 534-542. Meins, E., Fernyhough, C., Wainwright, R., Gupta, M. D., Fradley, E., & Tuckey, M. (2002, November/December). Maternal mind-mindedness and attachment security as predictors of theory of mind understanding. Child Development, 73, 1715-1726. Sonkin, D. J. (2005, January/February). Attachment Theory and Psychotherapy. The Therapist. Retrieved from http://www.danielsonkin.com/attachment_psychotherapy.htm

The Status of Africa :: Politics Economics Geography African Essays

On October 7 1999, Arizona Daily Wildcat published a remarkable article by Lora Mackel, a history Junior in the University of Arizona. In the article, Mackel expressed her views about the current state of the African continent as follows: We have all seen the images before: Children with bloated bellies, rebels with assault weaponry, shanty towns that spread as far as the camera can pan. These images reflect our own modern conceptions of Africa, for it seems that these wretched conditions and the continent itself are permanently linked. (4) Mackel’s article reminded this writer of a little anecdote told by a fellow countryman of mine named Kagiso, who is from northern Botswana and is currently studying in Alabama. Apparently, one of his American classmates innocently asked him how he had escaped from the civil war going on in Africa. According to Kagiso, this particular classmate of his has this notion that Africa is just one big country. Although it was easy for my countryman, Kagiso, to dismiss his classmate’s question as emanating from an individual on the lower side of the I.Q. scale, the point is that it connects to Mackel’s views and summarizes the perceptions of some Americans about Africa. Their perception is that the whole African continent is a basket case. On the other hand, there are some Americans who – unlike some of their countryman – may not dismiss Africa entirely out of hand. Such Americans may hold the view that Africa is a serious cause for concern. Once in a while , a sympathetic soul who holds the latter view more strongly may arise. Unfortunately, most of the time, such people feel so sorry for Africa that they end up being apologists for the African continent, never mind the fact that the continent is home to 61 countries with varying economic successes (â€Å"Atlas† 122). The generalized descriptions of Africa by writers such as Mackel fail dismally to present a true image of the continent. Africa’s critics may single out the political instability prevalent in some African countries as a cause for their dismissal of Africa. These critics may use Rwanda to plead their case. In 1994, approximately 250,000 Rwandans crossed into neighboring Tanzania as refugees. This was after their village leaders forced them out just because they belonged to a different ethnic group (Shawcross 4). It is easy for Africa’s critics to gloat over these reports. However, one need not be reminded that political strife is not uncommon in this day and age.

Thursday, July 18, 2019

Oedipus and Creon: Leaders of Thebes Essay

In the plays Oedipus the King and Antigone Sophocles portrays two characters, Oedipus and Creon, as rulers of Thebes. After the murder of Laius, former King of Thebes, Oedipus became leader when he successfully solved the riddle of the Sphinx. Some time later, Creon became King of Thebes as the result of his nephews deaths. â€Å"Oedipus is a good ruler in spite of his defects. Creon is a bad ruler in spite of his virtues.† This essay will discuss Oedipus and Creon as rulers of Thebes. In the eyes of the townspeople, Oedipus is seen as a good leader. He demonstrates the qualities any good leader possesses. When Oedipus learned of the plague that had spread through the town he immediately took action before the town confronted him with their fears. Upon meeting with the town, he notified them of his actions and his understanding of their concerns regarding the outcome of Thebes. Oedipus says, â€Å"You can trust me. I am ready to help, I’ll do anything. I would be blind to misery not to pity my people kneeling at my feet† (Sophocles 159). We see that Oedipus is sympathetic to their needs and concerns and dependable as he had already sent his brother-in-law to gain information from the oracle Upon Creon’s return from the oracle, Oedipus demonstrates his honesty, truthfulness, and determination as leader. Creon states, â€Å"If you want my report in the presence of these people†¦I’m ready now, or we might go inside† (Sophocles 163). Oedipus responds by asking Creon to report right then and there suggesting that he has nothing to hide and only truth to share with Thebes. The news from the oracle suggested that the only way to end the plague was to remove the source of Laius’s death, either by banishment or murder. Oedipus immediately seeks out to uncover the murderer of the former king. These qualities are those admired in a leader, like Oedipus, but hard to find in Creon. Creon, unlike Oedipus, is seen as a poor leader of the town, Thebes. The qualities with which he rules are unlikable. Creon immediately instills a sense of fear as he acknowledges the absolute power he possesses in his initial speech as ruler of Thebes. â€Å"Whoever refuses to adopt the soundest policies but fearing someone, keeps his lips locked tight, he’s utterly worthless. And whoever places a friend above the good of his own country, he  is nothing† (Sophocles 67). Furthermore, Creon issues a decree to his people that anyone who provides Polynices with a proper burial will face death. By enforcing the decree, Creon lacks sympathy for the beliefs of his town and his blood relatives, Antigone and Ismene. When the sentry enters with a message for the King we learn that Creon’s rule focuses on threats and violence. The sentry hesitates to relay this message to Creon fearing that he would react harshly. Creon then demands that the sentry tell all that he knows. The sentry informs Creon that someone has defied the decree and given Polynices proper burial. Creon irrationally accuses the sentry; although he has spoken several times that he is not to blame. The king threatens the sentry saying, â€Å"Well now, you just be clever about your judgments – if you fail to produce the criminals for me, you’ll swear your dirty money brought you pain† (Sophocles 75). Terrified by the King’s word, the sentry quickly leaves to keep watch of Polynices and later returns with news that Antigone is the culprit. We find that Oedipus is a good leader because he is honest, sympathetic, dependable and determined. On the other hand, Creon fails to sympathize with the citizen. The fear and violence of his absolute power became detrimental to his leadership. Despite these differences between Oedipus and Creon, the leaders did share some qualities that influenced the way they ruled. Oedipus and Creon both ruled with pride. Each individual was proud of their actions and the way they lead the people of Thebes. At times they were so proud that they failed to believe what was being told to them. Tiresias proclaims to Oedipus, â€Å"You are the curse, the corruption of the land† (Sophocles 179). Oedipus refuted the truth, â€Å"Aren’t you appalled to start up such a story? You think you can get away with this?† (Sophocles 179) Tiresias warned Oedipus of his family curse and the he was the cause of the plague, but he failed to see this. Similarly, Creon was warned by Tiresias in Antigone of the trouble that was to result from his injustice. â€Å"If he tried to make amends, however low he’s fallen, and stops his bullnecked ways. Stubbornness brands you for stupidity-pride is a crime† (Sophocles 112). Creon failed to accept the information told to him by Tiresias,  instead his pride prevailed until he admitted his wrongdoings at the end of the play, at which it was too late. The town of Thebes was also ruled by both with stubbornness. Once they had an idea set in their minds nothing could change it. Each had a firm belief in what they thought. Creon sentenced Antigone to death, since she was the individual who gave her brother, Polynices, a proper burial. Despite warnings from the town and Tiresias, Creon carried out the sentencing of his niece by sealing her in a cave. His stubborn character led to defiance of the Gods, which led to his downfall as King of Thebes. In Oedipus the King, Oedipus goal was to save his people from the plague by removing the murderer, who was present in the town. Oedipus was stubborn and refused to see the clues which revealed the source of the plague. Eventually, Oedipus overcame his stubbornness and accepted the truth that he was indeed the source of the plague by murdering his father and marrying his mother. Oedipus, being a good leader, remained true to his word and banished himself from Thebes. In conclusion, Sophocles portrays two rulers of Thebes in his plays Oedipus the King and Antigone. Oedipus and Creon share similarities and differences that characterize them as leaders of Thebes. Oedipus is seen as a good ruler due to the fact that he possesses the qualities the town seeks in a leader. Creon is deemed a bad ruler. He places himself above the state, people, and gods therefore being a feared and intimidating leader. Works Cited Sophocles. The Three Theban Plays: Antigone, Oedipus the King, Oedipus at Colonus. New York: Penguin Books, 1984. Works ConsultedMcManus, Barbara. â€Å"Background for Antigone.† CLS 267 Topic Page. 1999. The College ofNew Rochelle. 20 April 2005 Mitchell-Boyask, Robin. â€Å"Study Guide for Sophocles’ Oedipus the King.† Department ofClassics. 2002. Temple University. 22 April 2005