Wednesday, October 30, 2019

Article analysis Example | Topics and Well Written Essays - 750 words - 3

Analysis - Article Example arding specific learning needs of students with LD in the classrooms and how they are able to adopt instructions for such particular students in the middle schools .The third question deals with perception teachers who teach mathematics in the middle schools on issues of resources and support for such inclusion by the teachers. The last question deals with perceptions of the mathematics teachers of middle school on issues of preparation received in programs of pre service in inclusion of students in classrooms. The literature background supports the need for the study. This is because there is need to reduce the generalization of teachers who use inclusive classrooms in needs for students with LD. The literature provides an academic analysis of previous research done on the topic on what teachers can do to improve the effectiveness of using the inclusive classrooms and programs for meeting the need of the students with LD. The variables under study were gender of the teachers, educational level, years of experience teaching, years of experience teaching in inclusion settings, number of math courses, number of inclusion- or LD-related workshops, level of support services, Level of administrative support .The variables used in the study were independent variables. They used descriptive statistical procedures to enable in describing the features of the data. It provided basic summaries on the sample used and the measures. This was used to be able to describe what the data was and what the data showed. Some respondents agreed that students with LD should be taught mathematics with general education students however other respondents stated that students with LD should be taught in inclusive classrooms .A percentage of twenty-one percent of teachers agreed that middle schools positively executed the inclusion practices where others were undecided. The responses were varied and indicated that many schools are doubtful the resource room effectively ensures learning of

Monday, October 28, 2019

PTLLS Assignment. The teaching and training cycle Essay Example for Free

PTLLS Assignment. The teaching and training cycle Essay |Using the teaching and training cycle |Identifying needs and planning | |as a model, discuss one responsibility|One role/ responsibility of a teacher is to initially assess the students in order to identify their current skills; their preferred learning styles and any barriers or| |which would come under each part of |challenges to learning. This will enable the teacher to plan lessons according to the needs of the learners and in accordance with organisational policies and | |the cycle. |procedures. | | | | | |Designing | | | One role/ responsibility of a teacher is to prepare teaching and learning resources and activities. This will usually involve designing a scheme of work, session plans | | |and appropriate materials and resources suitable to the level and needs of the learners. | | | | | |Facilitating | | |One role/ responsibility of a teacher is to use a variety of teaching and learning materials and approaches to motivate, engage and encourage learning in an appropriate| | |and professional manner. | | | | | |Assessing | | |It is the role / responsibility of a teacher to assess learners’ progress in accordance with the requirements of the awarding organisation. The teacher does this by | |Â  |preparing realistic assessment materials (both formative and summative) and by giving feedback to the learners on what has been done correctly and what needs to be | | |improved on. | | | | | |Evaluating | | |It is the role/ responsibility of the teacher to reflect on the teaching and learning process. This involves reflecting on the weaknesses and strengths of the lesson | | |plans, the resources and the actual delivery with the aim of improving the teaching and learning process. The reflection is usually done by the teacher after each | | |lesson and sometimes by students/other teachers. | |Discuss 2 professional boundaries you |I would need to remain in control, be fair and ethical with all my students and not demonstrate any favouritism towards particular students. For example, I should not | |would need to maintain. |give one student more support than I give to the others. | | | | | | I would need to remain professional when in contact with other co-workers within the organisation and not to overstep the boundary of my role as a teacher. For example,| | |if something goes wrong with the electrical system while I am teaching, I should not try to fix this myself but rather I should call the electrical crew. | |Give 2 examples of when you might need|Two examples of when I might need to refer a learner for him/her to get needed support are: | |to refer a learner in order for them |The learner is being abused in any form. | |to get needed support. |The learner has depression issue that is affecting his/her learning process. | |List 2 responsibilities you have in |Two responsibilities I have in respect to other professionals I work with are: | |respect to other professionals you |I should ensure that all my administrative work such as class register; students’ assessment records are up to date. | |will work with. |I should ensure that I complete my lessons within the scheduled time so that the next teacher can start his/her lesson on time. |

Saturday, October 26, 2019

The Scop (beowulf) :: Epic of Beowulf Essays

The Scop After Julius Caesar lay claim to Englisyou do not want to receive this notification, click the Options link on the top horizontal menu bar. On the Options page, click the Preferences link. Scroll down to the Confirm Sent Messages option and select Noh soil, the Britons were subject the Northern coasts remained to become settlers and tillers of the soil, and Anglo-Saxon part of the Anglo-Saxon body of folklore and legend. It was not long until various warrior-kings had a â€Å"singer†, or scop attached to their courts who could recite and sing a body or oral literature- particularly about the warrior-king’s glorious deeds. In the late sixth century, Augustine came to England at the request of Pope Gregory. Gregory advised his monks not to disrupt England’s pagan customs, but to proceed with conversion gradually. Consequently, the question arises concerning whether Beowulf resulted from the traditions handed down by the scops, or whether the poem was a product of the monasteries. Some critics claim that it is an amalgam of both elements. Since the poet gives us a valuable portrait of the scop in all, they reason, the scop had a storehouse of old folktales, legenyou do not want to receive this notification, click the Options link on the top horizontal menu bar. On the Options page, click the Preferences link. Scroll down to the Confirm Sent Messages option and select Nods, and heroic deeds performed by great heroes of the past. Hrothgar’s scop was able to sing Beowulf’s praises the day following the defeat of Grendel, and in the song, he includes the older â€Å"Lay of Sigemund†. The scop’s purpose was to honor his noble patron or others who past and be able to sing them at the pride of the tribe depended upon a long genealogy of heroes. Additionally, the scop defined the moral values of his society by singing about heroes and about those who acted in non-heroic ways. His songs endorsed models of behavior. By example, he taught that certain actions were profitable to the group, and and criticized those who failed to perform according to the expectations of the group. course, do not recognize the code which includes the wergild option. The Scop After Julius Caesar lay claim to English soil, the Britons were subject to numerous invasions, mostly from Scandinavian tribes to the north of England. Many Scandinavian tribes who raided the Northern coasts remained to become settlers and tillers of the soil, and Anglo-Saxon society continued to be reasonably well organized, aristocratic, and of folklore and legend.

Thursday, October 24, 2019

Motivation Case Study on Gp Essay

When people join an organization, they bring with them certain drives and needs that affect their on-the-job performance. Sometimes these are immediately apparent, but often they not only are difficult to determine and satisfy but also vary greatly from one person to another. Understanding how needs create tensions which stimulate effort to perform and how effective performance brings the satisfaction of rewards is useful for managers. Several approaches to understanding internal drives and needs within employees are examined in the chapter. Each model makes a contribution to our understanding of motivation. All the models share some similarities. In general, they encourage managers not only to consider lower-order, maintenance, and extrinsic factors but to use higher-order, motivational, and intrinsic factors as well. Behavior modification focuses on the external environment by stating that a number of employee behaviors can be affected by manipulating their consequences. The alternative consequences include positive and negative reinforcement punishment, and extinction. Reinforcement can be applied according to either continuous or partial schedules. A blending of internal and external approaches is obtained through consideration of goal setting. Managers are encouraged to use cues—such as goals that are accepted, challenging, and specific—to stimulate desired employee behavior. In this way, goal setting, combined with the reinforcement of performance feedback, provides a balanced approach to motivation. . : . Additional approaches to motivation presented in this chapter are the expectancy and equity models. The- expectancy model states that motivation is a product of how much one wants something-and the probabilities that effort will lead to task accomplishment and reward. The formula is valence X expectancy X instrumentality = motivation. Valence is the strength of a person’s preference for an outcome. Expectancy is the strength of belief that one’s effort will be successful in accomplishing a task. Instrumentality is the strength of belief that successful performance will be followed by a reward. The expectancy and equity motivational models relate specifically to the  employee’s intellectual processes. The equity model has a double comparison in it a match between an employee’s perceived inputs and outcomes, coupled with a comparison with some referent person’s rewards for her or his input level. In addition, employees use the procedural justice model to assess the fairness of how rewards are distributed. Managers are encouraged to combine the perspectives of several models to create a complete motivational environment for their employees. Motivation: Motivation is the set of internal & external forces that cause an employee to choose a course of action and engage in certain behavior. A Model of Motivation : Although a few spontaneous human activities occur without motivation, nearly all conscious behavior is motivated or caused. Growing hair requires no motivation, but getting a haircut does. Eventually, anyone will fall asleep without motivation (although parents with young children may doubt this), but going to bed is a conscious act requiring motivation manager’s job is to identify employees’ drives and needs and to channel their behavior, to motivate them, toward task performance. The role of motivation in performance is summarized in the model of motivation in Figure 5.1. Internal needs and drives create tensions that are affected by one’s environment. For example, the need for food produces a tension of hunger. The hungry person then Environment Opportunity Needs and drive Tension Effont Performance Rewards Goals and incentive Ability Need satisfaction FIGURE 5.1 A Model of Mitivation examines the surroundings to see which foods (external incentives) are available to satisfy that hunger. Since environment affects one’s appetite for particular kinds of food a South Seas native may want roast fish, whereas a Colorado rancher may prefer grilled steak. Both persons are ready to achieve their goals, but they will seek different foods to satisfy their needs. This is an example of both individual differences and cultural influences in action. As we saw in the formulas in Chapter 1, potential performance (P) is a product of ability (A) and motivation (M). Results occur when motivated employs are provided with the opportunity (such as the proper training) to perform and the resources (such as the proper tools) to do so. The presence of goals and the awareness of incentives to satisfy one’s needs are also powerful motivational factors leading to the release of effort. When an employee is productive and the organization takes note of it, rewards will be distributed. If those rewards are appropriate in nature, timing, and distribution, the employee’s original needs and drives are satisfied. At that time, new needs may emerge and the cycle will begin again. It should be apparent, therefore, that an important starting point lies in understanding employee needs. Several traditional approaches to classifying drives and needs are presented first; these models attempt to help managers understand how employees’ internal needs affect their subsequent behaviors. These historical approaches are logically followed by a discussion of a systematic way of modifying employee behavior thought the use of rewards that satisfy those needs. Achievement Motivation Achievement motivation is a drive some people have to pursue and attain goals. An individual with this drive wishes to achieve objectives and advance up the ladder of success. Accomplishment is seen as important primarily for its own sake, not just for the rewards that accompany. A number of characteristic define achievement-oriented employees. They work harder when they perceive that they will receive personal credit for their efforts, when the risk of failure is only moderate, and when they receive specific feedback about their past performance,. People with a high drive  for achievement take responsibility for their actions and results, control their destiny, seek regular feedback, and enjoy being part of a winning achievement through individual or collective effort. As managers, they tend to export that their employees will also be oriented toward achievement. These high expectations sometime make it difficult for achievement-oriented managers to delegate effectively and for â€Å"average† employees to satisfy their manager’s demands. Affiliation Motivation : Affiliation motivation is a drive to relate to people on a social basis. Comparisons of achievement-motivation employees with affiliation-motivation employees illustrate how the two patterns influence behavior. Achievement-oriented people work harder when their supervisors provide detailed evaluations of their work behavior. But people with affiliation motives work better when they are compli9mentions of their work behavior. But people with affiliation motives work better when they are complimented for their favorable attitudes and cooperation. Achievement-motivated people select assistants who are technically capable, with little regard for personal feelings about them; those who are affiliation-motivated tend to select friends and likable people to surround them. They receive inner satisfactions from being with friends, and they want the job freedom to develop those relationships. Managers with strong needs for affiliation may have difficulty being effective managers. -Although a high concern for positive social relationships usually results in a cooperative work environment where employees genuinely enjoy working together, managerial overemphasis on the social dimension may interfere with the vital process of getting things done-. Affiliation-oriented managers may have difficulty assigning challenging tasks, directing work activities, and monitoring work effectiveness. Power Motivation Power motivation is a drive to influence people, take control, and change situations. Power-motivated people wish to create an impact on their organizations and are willing to take risks to do so. Once this power is obtained, it may be used either constructively or destructively. Power-motivated people make excellent managers if their drives are for  institutional power instead of personal power. Institutional power is the need to influence others’ behavior for the good of the whole organization. People with this need seek power through legitimate means, rise to leadership positions through successful performance, and therefore are accepted by others. However, if an employee’s drives are toward personal power, that person tends to lose the trust and respect of employees and colleagues and be an unsuccessful organizational leader. Managerial Application of the Drives Knowledge of the differences among the three motivational drives requires managers to think contingently and to understand the work attitudes of each employee. They can then deal with employees differently according to the strongest motivational drive that they identify in each employee. In this way, the supervisor communicates with each employee according to that particular person’s needs. As one employee said, â€Å"My supervisor talks to me in my language.† Although various tests can be used to identify the strength of employee drives, direct observation of employees’ behavior is one of the best methods for determining what they will respond to. HUMAN NEEDS When a machine malfunctions, people recognize that it needs something. Managers try to find the causes of the breakdown in an analytical manner based on their knowledge of the operations and needs of the machine. Types of Needs Needs may be classified in various ways. A simple classification is (1) basic physical needs, called primary needs, and (2) social and psychological needs, called secondary needs. The physical needs include food, water, sex, sleep, sir, and reasonably comfortable temperature. These needs arise from the basic requirements of life and are important for survival of the human race. They are, therefore, virtually universal, but they vary in intensity from one person to another. For example, a child needs much more sleep than an older person., . Needs also are conditioned by social practice. If it is customary to eat three meals a day, then a person tends to become hungry for three, even  though two might be adequate. If a coffee hour is introduced in the morning, then that becomes a habit of appetite satisfaction as well as a social need. Secondary needs are more vague because they represent needs of the mind and spirit rather than of the physical body. Many of these needs are developed as people mature. Examples are needs that pertain to self-esteem, sense of duty, competitiveness, self-assertion, and lo giving, belonging, and receiving affection. The secondary needs are those that complicate the motivational efforts of managers. Nearly any action that management takes will affect secondary needs; (here/ore, managerial planning should consider the effect of any proposed action on the secondary needs of employees, Here are seven key conclusions about secondary needs. They: 0 Are strongly conditioned by experience 1 Vary in type and intensity among people 2 Are subject to change across time within any individual 3 Cannot usually be isolated, but rather work in combination and influence one another. 4 Are often hidden from conscious recognition 5 Are vague feelings as opposed to specific physical needs 6 Influence behavior in powerful ways Whereas the three motivational drives identified earlier were not grouped in any particular pattern, the three major theories of human/needs -presented in the following sections attempt to classify those needs. At least implicitly, the theories of Maslow, Hertzberg, and Alerter build on the distinction between primary and secondary needs. Also, there are some similarities as well as important differences among the three, approaches. Despite their limitations, all three approaches to human needs help create an important basis for the more advanced motivational models to be discussed later. Maslow’s Hierarchy of Needs According to A. H. Maslow, human needs are not of equal strength, and they emerge in a definite sequence. In particular, as the primary needs become reasonably well satisfied, a person places more emphasis on the secondary needs. Maslow’s hierarchy of needs focuses attention on five levels.This  hierarchy is briefly presented and then interpreted in the following sections. Lower-Order Needs First-level needs involve basic survival and include physiological needs for food, air, water, and sleep. The second need level that tends to dominate is bodily safety (such as freedom from a dangerous work environment) and economic security (such as a no-layoff guarantee or a comfortable retirement plan). These two need levels together are typically called lower-order needs, and they are similar to the primary no discussed earlier. Higher-Order Needs There are three levels of higher-order needs. The third level ia the hierarchy concerns love, belonging, and social involvement at work (friendships and compatible associates). The needs at the fourth level encompass those for esteem and status, including one’s feelings of self-worth and of competence. The feeling of competence, which derives from the assurance of others, provides status. The fifth-level need is self-actualization, which means becoming all that one is capable of becoming, using one’s skills to the fullest, and stretching talents to the maximum. Interpreting the Hierarchy of Needs Maslow’s need-hierarchy model essentially says that people have needs they wish to satisfy and that gratified needs are not as strongly motivating as unmet needs, Employees are more enthusiastically motivated by what they are currently seeking than by receiving more of what they already have. A fully satisfied need will not be a strong motivator. Interpreted in this way, the Maslow hierarchy of needs has had a powerful impact on contemporary managers, offering some useful ideas for helping managers think about motivating their employees. As a result of widespread familiarity with the model, today’s managers need to: ‘ Identify and accept employee needs 7 Recognize that needs may differ among employees  8 Offer satisfaction for the particular needs currently unmet 9 Realize that giving more of the same reward (especially one which satisfies lower-order needs) may have a diminishing impact on motivation. The Maslow model also has many limitations, and it has been sharply criticized. As a philosophical framework, it has been difficult to study and has not been fully verified. From a practical perspective, it is not easy to provide opportunities for self-actualization to all employees. In addition, research has not supported the presence of all five need levels as unique, nor has  the five-step progression from lowest to highest need levels been established. There is, however, some evidence that unless the two lower-order needs (physiological and security) are basically satisfied, employees will not be greatly concerned with higher-order needs. The evidence for a more limited number of need levels is consistent with each of the two models discussed next. Hertzberg’s Two-Factor Model On the basis of research with engineers and accountants, Frederick Hertzberg, in the 1950s, developed a two-factor model of motivation. He asked his subjects to think of a time when they felt especially good about their jobs and a time when they felt especially bad about their jobs. He also asked them to describe the conditions that led to those feelings. Hertzberg found that employees named different types of conditions that produced good and bad feelings. That is, if a feeling of achievement led to a good feeling, the lack of achievement was rarely given as cause for bad feelings. Instead, some other factor, such as company policy, was more frequently given as a cause of bad feelings. Maintenance and Motivational Factors Hertzberg concluded that two separate sets of factors influenced motivation. Prior to that time, people had assumed that motivation and lack of motivation were merely opposites of one factor on a continuum. Hertzberg upset the traditional view by stating that certain job factors, such as job security and working conditions, dissatisfy employees primarily when the conditions are absent. However, their presence generally brings employees only to a neutral state. The factors are not strongly motivating. These potent dissatisfies are called hygiene factors, or maintenance factors, because they must not be ignored, They are necessary for building a foundation on which to create a reasonable level of motivation in employees. Other job conditions operate primarily to build this motivation, but their absence rarely is strongly dissatisfying. These conditions are known as motivational factors, motivators, or satisfiers. For many years managers had been wondering why their custodial policies and wide array of fringe benefits were not increasing employee motivation. The idea  of separate motivational and maintenance factors helped answer their question, because fringe benefits and personnel policies were primarily maintenance factors, according to Hertzberg. Job Content &Context: Motivational factors such as achievement and responsibility are related, for the most part, directly to the job itself, the employee’s performance, and the personal recognition and growth that employees experience. Motivators mostly are job-centered; they relate to job content. On the other hand, maintenance factors are mainly related to job context, because they are more related to the environment surrounding the job. This difference between job content and job context is a significant of is. It shirrs that employees are motivated primarily by what they do for themselves. When they take responsibility or gain recognition through their own behavior, they are strongly motivated. Intrinsic and Extrinsic Motivators The difference between job content and job context is similar to the difference between intrinsic and extrinsic motivators in psychology. Intrinsic motivators are internal rewards that a person feels when performing a job, so there is a direct and often immediate connection between work and rewards. An employee in this situation is self-motivated, Extrinsic motivators are external rewards that occur apart from the nature of work, providing no direct satisfaction at the defter the work is performed Examples are retirement plans, health insurance, and vacations. Although employees value these items, fey are not effective motivators. Interpreting the Two-Factor Model Harrier’s model provides a useful distinction between maintenance factors, which are necessary but not sufficient, and motivational factors, which have the potential for improving employee effort. The two-factor model ‘ broadened managers’ perspectives by showing the potentially powerful role of intrinsic rewards that evolve from the work itself. (This conclusion ties in with a number of other important behavioral developments, such as job enrichment, empowerment, self-leadership, and quality of work life, which are. discussed in later chapters.) Nevertheless, managers should now be aware that they cannot neglect a wide rare. go of facers that create at least a neutral work environment. In addition, unless hygiene factors are reasonably adder; their absence will serve as significant distractions to workers. The Hertzberg model, like Maslow’s, has been widely criticized. It is not universe applicable, because it was based on and applies best to  managerial, professional, an; upper-level white-collar employees. The model also appears to reduce the motivation* importance of pay, status, and relations with others, since these are maintenance facto; This aspect of the model is counterintuitive to many managers and difficult for them k , accept. Since there is no absolute distinction between the effects of the two major factors the model outlines only general tendencies,† maintenance factors may be motivators to some people, and motivators may be maintenance factors to others. Finally, the model also seems to be method-bound, meaning that only Hertzberg’s approach (asking for self-reports of favorable and unfavorable job experiences) produces the two-factor model. In short, there may be an appearance of two factors when in reality there is only one factor. Alderfer’s E-R-G Mode: Building upon earlier need models (primarily Maslow’s) and seeking to overcome some their weaknesses, Clayton Alderfer proposed a modified need hierarchy—the E-R-G model—with just three levels three levels. He suggested that employees are initially interested in satisfying their existence needs, which combine physiological and security factors. Pay, physical working conditions, job security, and fringe benefits can all address these needs. Relatedness needs are at the next level, and these involve being understood and accepted by people above, below, and around the employee at work and away Growth needs are in the third category; these involve the desire for both self-esteem at self-actualization. The impending conversation between the president and the marketing manager could be structured around Alderfer’s E-R-G model. The president may first wish to identify which level or levels seem to be satisfied. For example, a large disparity between their salaries could lead the marketing manager to be frustrated with his existence needs, despite a respectable salary-and-bonus package. Or his immersion in his work through long hours and heavy travel as the stores prepared to open could have left his relatedness needs unsatisfied. Finally, assuming he has mastered his present job assignments, he may be experiencing the need to develop his no marketing capabilities and grow into new areas. In addition to condensing Maslow’s five need levels into three that are more consistent with research, the  E-R-G model differs in other ways. For example, the E-R-G model does not assume as rigorous a progression from level to level. Instead, it accepts the likelihood that all three levels might be active at any time—or even that just one of the higher levels might be active. It also suggests that a person frustrated at either of the two higher levels may return to concentrate on a lower level and then progress again. Finally, whereas the first two levels are somewhat limited in their requirements for satisfaction, the growth needs not only are unlimited but are actually further awakened each time some satisfaction is attained. Comparison of the Maslow, Hertzberg, and Alderfer Modes The similarities among the three models of human needs are quite apparent,but there are important contrasts, too. Maslow and Alderfer focus on the internal needs of the employee, whereas Herzberg also identifies and differentiates the conditions (job content or job context) that could be provided for need satisfaction. Popular interpretations of the Masiow and Herzberg models suggest that in modern societies many workers have already satisfied their lower-order needs, so they are now motivated mainly by higher-order needs and motivators. Alderfer suggests that the failure to satisfy related-ness or growth needs will cause renewed interest in existence needs. Finally, all three models indicate that before a manager tries to administer a reward, he or she would find it useful to discover which need or needs dominate a particular employee at the time. In this way, all need models provide a foundation for the understanding and application of behavior modification. BEHAVIOR MODIFICATION The models of motivation that have been discussed up to this point are known as content theories of motivation because they focus on the content (nature) of items that may motivate a person. They relate to the person’s inner self and how that person’s internal state of needs determines behavior. The major difficulty with content models of motivation is that the needs people have are not subject to observation by managers or to precise measurement for monitoring purposes. It is difficult, for example, to measure an employee’s esteem needs or to assess how they change over time. Further, simply knowing about an employee’s-needs does not directly suggest to managers what they  should do with that information. As a result, there has been considerable interest in motivational models that rely more heavily on intended results, careful measurement, and systematic application of incentives. Organizational behavior modification, or OB Mod, is the application in organizations of the principles of behavior modification, which evolved from the work of B. F. Skinner. OB Mod and the next several models are process theories of motivation, since they provide perspectives on the dynamics by which employees can be motivated.

Wednesday, October 23, 2019

Bullying In Schools Essay

A huge problem seems to be taking over our schools these days. Bullying has become a major issue in our schools and should be a problem taken very seriously. Parents need to take action in putting a stop to their children harming others. Teachers also should be aware of what is going on in their schools and take immediate action before something terrible occurs. Bullying is when someone intentionally brings harm to someone else. It comes in forms of physically harming another person or mentally harming them. Bullying is not based on one single incident but reoccurring incidents. It can be brought on by one single person or even a group of people targeting an individual . Bullying is usually an unfair fight where the person doing the bullying has an advantage over the one being bullied. Teaching our children empathy at an early age is a vital piece to their lives. â€Å"Without empathy; we would have no cohesive society, no trust and no reason not to murder, cheat, steal or lie. At best we would only act out of self-interest; at worst, we would be a collection of sociopaths†(Szalavitz). This advice is so true because the way we teach and treat our children will ultimately be the way they treat others as they get older. Spending quality time and giving lots of positive attention to our children will help them grow and develop positive social skills. It is very sad to sit and watch the news or read the paper and see that there are young people committing suicide over being bullied at school. These children should not see ending their life as a solution to any problem. Teachers and parents should be doing everything in their power to put a stop to bullying in schools. If a child is bringing that much harm to another child they should be expelled. Maybe then their parents will realize how serious the problem is and do something to help their child before it’s too late. School is a place to learn and develop as people in society. Children should not have to feel threatened but feel safe in school. Teachers, school staff, and parents definitely need to be aware of everything that goes on with  these children in order to teach them the right ways to deal with problems. After all they are going to be harder to control the older they get.

Tuesday, October 22, 2019

the solar feeder essays

the solar feeder essays The solar feeder company is a unique twist on the typical bird feeder, which is resembled a typical birdhouse, but it houses feed instead. The solar feeder is a new technology, which is to prevent squirrels from taking the birdseed with an electronic shock. Due to the solar feeder companys financial statement are not breaking even, so it is the time for the solar feeder company to implement its plan to increase its sales and production and reduce its cost. The main problems of the solar feeder are as the following: 1. Squirrel Defense, Inc. (SDI) is a company, which manufactures and sells solar feeder. As the financial statement indicates the company does not operate profitable and has no cash. SDI's balance sheet shows negative checkings/savings of $(7,308) and the income statement shows a negative net income of $(26,607) in 1999. 2. The feeders are expensive and time consuming to make. Furthermore, production capabilities do not meet incoming orders. So, the inefficient production results in long delivery delays and a feeder, which is too expensive for the market. 3. Another problematic factor is that the company's pricing of the feeder is not competitive. Prices had been calculated based on what management wants to earn per unit, rather than thinking from a market perspective. There was only little market research done in the beginning by visiting some local stores. The advertising of the feeder seems not to be the ideal promotion campaign, e.g. the video on the website does not function properly or advertising with a retro theme for an innovative product. Moreover, SDI has no defined vision, nor business objectives, nor strategy. What issues does the SDIs management need to address? SDI's management needs to set up a vision and objectives. Therefore, a business plan is required. Management needs to find answers to questions like: 3. What are our strength, weaknesses, opportunities and threads? 4. ...

Monday, October 21, 2019

Battle of Dak To in the Vietnam War

Battle of Dak To in the Vietnam War The Battle of Dak To was a major engagement of the Vietnam War and was fought from November 3 to 22, 1967. Armies Commanders US Republic of Vietnam Major General William R. Peers16,000 men North Vietnam Viet Cong General Hoang Minh ThaoTran The Mon6,000 men Background of the Battle of Dak To In the summer of 1967, the Peoples Army of Vietnam (PAVN) initiated a series of attacks in western Kontum Province. To counter these, Major General William R. Peers commenced Operation Greeley using elements of the 4th Infantry Division and the 173rd Airborne Brigade. This was designed to sweep PAVN forces from the jungle-covered mountains of the region. After a series of sharp engagements, contact with PAVN forces diminished in August, leading the Americans to believe that they had withdrawn back across the border into Cambodia and Laos. After a quiet September, US intelligence reported that PAVN forces around Pleiku were moving into Kontum in early October. This shift increased PAVN strength in the area to around division level. The PAVN plan was to utilize the the 6,000 men of the 24th, 32nd, 66th, and 174th regiments to isolate and destroy a brigade-sized American force near Dak To. Largely devised by  General Nguyen Chi Thanh, the goal of this plan was to force the further deployment of American troops to the border regions which would leave South Vietnams cities and lowlands vulnerable. To deal with this build up of PAVN forces, Peers directed the 3rd Battalion of the 12th Infantry and the 3rd Battalion of the 8th Infantry to launch Operation MacArthur on November 3. Fighting Begins Peers understanding of the enemys intentions and strategy was greatly enhanced on November 3, following the defection of Sergeant Vu Hong who provided key information regarding PAVN unit locations and intentions. Alerted to each PAVN units location and objective, Peers men began engaging the enemy the same day, disrupting the North Vietnamese plans for attacking Dak To. As elements of the 4th Infantry, 173rd Airborne, and the 1st Brigade of the 1st Air Cavalry went into action they found that the North Vietnamese had prepared elaborate defensive positions on the hills and ridges around Dak To. Over the ensuing three weeks, American forces developed a methodical approach to reducing PAVN positions. Once the enemy was located, massive amounts of firepower (both artillery and air strikes) were applied, followed by an infantry assault to secure to objective. To support this approach, Bravo Company, 4th Battalion, 173rd Airborne established Fire Support Base 15 on Hill 823 early in the campaign. In most instances, PAVN forces fought tenaciously, bloodying the Americans, before vanishing into the jungle. Key firefights in the campaign occurred on Hills 724 and 882. As these fights were taking place around Dak To, the airstrip became a target for PAVN artillery and rocket attacks. Final Engagements The worst of these took place on November 12, when rockets and shellfire destroyed several C-130 Hercules transports as well as detonated the bases ammunition and fuel depots. This resulted in the loss of 1,100 tons of ordnance. In addition to the American forces, Army of Vietnam (ARVN) units also took part in the battle, seeing action around Hill 1416. The last major engagement of the Battle of Dak To began on November 19, when the 2nd Battalion of the 503rd Airborne attempted to take Hill 875. After meeting initial success, the 2/503 found itself caught in an elaborate ambush. Surrounded, it endured a severe friendly fire incident and was not relieved until the next day. Resupplied and reinforced, the 503rd attacked the crest of Hill 875 on November 21. After savage, close-quarters fighting, the airborne troopers neared the top of the hill, but were forced to halt due to darkness. The following day was spent hammering the crest with artillery and air strikes, completely removing all cover. Moving out on the 23rd, the Americans took the top of the hill after finding that the North Vietnamese had already departed. By the end of November, the PAVN forces around Dak To were so battered that they were withdrawn back across the border ending the battle. Aftermath of the Battle of Dak To A victory for the Americans and South Vietnamese, the Battle of Dak To cost 376 US killed, 1,441 US wounded, and 79 ARVN killed. In the course of the fighting, Allied forces fired 151,000 artillery rounds, flew 2,096 tactical air sorties, and conducted 257 B-52 Stratofortress strikes. Initial US estimates placed enemy losses above 1,600, but these were quickly questioned and PAVN casualties were later estimated to be between 1,000 and 1,445 killed. The Battle of Dak To saw US forces drive the North Vietnamese from the Kontum Province and decimated the regiments of the 1st PAVN Division. As a result, three of the four would be unable to participate the Tet Offensive in January 1968. One of the border battles of late 1967, the Battle of Dak To did accomplish a key PAVN objective as US forces began to move out from cities and lowlands. By January 1968, half of all US combat units were operating away from these key areas. This led to some concern among those on General William Westmorelands staff as they saw parallels with the events that led to French defeat at Dien Bien Phu in 1954.  These concerns would be realized with the beginning of the Battle of Khe Sanh in January 1968. Resources and Further Reading Vietnam Studies: Tactical and Material InnovationsEdward F. Murphy, Dak To. New York: Presidio Press , 2002.

Sunday, October 20, 2019

Major General John B. Gordon, American Civil War

Major General John B. Gordon, American Civil War The son of a prominent minister in Upson County, GA, John Brown Gordon was born February 6, 1832. At a young age, he moved with his family to Walker County where his father had purchased a coal mine. Educated locally, he later attended the University of Georgia. Though a strong student, Gordon inexplicably left school before graduating. Moving to Atlanta, he read law and entered the bar in 1854. While in the city, he married Rebecca Haralson, daughter of Congressman Hugh A. Haralson. Unable to attract clients in Atlanta, Gordon moved north to oversee his fathers mining interests. He was in this position when the Civil War began in April 1861. Early Career A supporter of the Confederate cause, Gordon quickly raised a company of mountaineers known as the Raccoon Roughs. In May 1861, this company was incorporated into the 6th Alabama Infantry Regiment with Gordon as its captain. Though lacking any formal military training, Gordon was promoted to major a short time later. Initially sent to Corinth, MS, the regiment was later ordered to Virginia. While on the field for the First Battle of Bull Run that July, it saw little action. Showing himself to be an able officer, Gordon was given command of the regiment in April 1862 and promoted to colonel. This coincided with a shift south to oppose Major General George B. McClellans Peninsula Campaign. The following month, he ably led the regiment during the Battle of Seven Pines outside Richmond, VA. In late June, Gordon returned to combat as General Robert E. Lee began the Seven Days Battles. Striking at Union forces, Gordon quickly established a reputation for fearlessness in battle. On July 1, a Union bullet wounded him in the head during the Battle of Malvern Hill. Recovering, he rejoined the army in time for the Maryland Campaign that September. Serving in Brigadier General Robert Rodes brigade, Gordon aided in holding a key sunken road (Bloody Lane) during the Battle of Antietam on September 17. In the course of the fighting, he was wounded five times. Finally brought down by a bullet that passed through his left cheek and out his jaw, he collapsed with his face in his cap. Gordon later related that he would have drowned in his own blood had there not been a bullet hole in his hat. A Rising Star For his performance, Gordon was promoted to brigadier general in November 1862 and, following his recovery, given command of a brigade in Major General Jubal Earlys division in Lieutenant General Thomas Stonewall Jacksons Second Corps. In this role, he saw action near Fredericksburg and Salem Church during the Battle of Chancellorsville in May 1863. With Jacksons death following the Confederate victory, command of his corps passed to Lieutenant General Richard Ewell. Spearheading Lees subsequent advance north into Pennsylvania, Gordons brigade reached the Susquehanna River at Wrightsville on June 28. Here they were prevented from crossing the river by Pennsylvania militia which burned the towns railroad bridge. Gordons advance to Wrightsville marked the easternmost penetration of Pennsylvania during the campaign. With his army strung out, Lee ordered his men to concentrate at Cashtown, PA. As this movement was in progress, fighting began at Gettysburg between troops led by Lieutenant General A.P. Hill and Union cavalry under Brigadier General John Buford. As the battle grew in size, Gordon, and the rest of Earlys Division approached Gettysburg from the north. Deploying for battle on July 1, his brigade attacked and routed Brigadier General Francis Barlows division on Blochers Knoll. The next day, Gordons brigade supported an attack against the Union position on East Cemetery Hill but did not take part in the fighting. The Overland Campaign Following the Confederate defeat at Gettysburg, Gordons brigade retired south with the army. That fall, he participated in the inconclusive Bristoe and Mine Run Campaigns. With the beginning of Lieutenant General Ulysses S. Grants Overland Campaign in May 1864, Gordons brigade took part in the Battle of the Wilderness. In the course of the fighting, his men pushed the enemy back at Saunders Field as well as launched a successful attack on the Union right. Recognizing Gordons skill, Lee elevated him to lead Earlys division as part of a larger reorganization of the army. Fighting recommenced a few days later at the Battle of Spotsylvania Court House. On May 12, Union forces launched a massive assault on the Mule Shoe Salient. With Union forces overwhelming the Confederate defenders, Gordon rushed his men forward in an attempt to restore the situation and stabilize the lines. As the battle raged, he ordered Lee to the rear as the iconic Confederate leader attempted to personally lead an attack forward. For his efforts, Gordon was promoted to major general on May 14. As Union forces continued to push south, Gordon led his men at the Battle of Cold Harbor in early June. After inflicting a bloody defeat on the Union troops, Lee instructed Early, now leading the Second Corps, to take his men to the Shenandoah Valley in an effort to draw off some Union forces. Marching with Early, Gordon took part the advance down the Valley and the victory at the Battle of Monocacy in Maryland. After menacing Washington, DC and forcing Grant to detach forces to counter his operations, Early withdrew to the Valley where he won the Second Battle of Kernstown in late July. Tired of Earlys depredations, Grant sent Major General Philip Sheridan to the Valley with a large force. Attacking up (south) the Valley, Sheridan clashed with Early and Gordon at Winchester on September 19 and soundly defeated the Confederates. Retreating south, the Confederates were defeated again two days later at Fishers Hill. Attempting to recover the situation, Early and Gordon launched a surprise attack on Union forces at Cedar Creek on October 19. Despite initial success, they were badly defeated when Union forces rallied. Rejoining Lee at the Siege of Petersburg, Gordon was placed in command of the remnants of the Second Corps in December 20. Final Actions As the winter progressed, the Confederate position at Petersburg became desperate as Union strength continued to grow. Needing to force Grant to contract his lines and wanting to disrupt a potential Union assault, Lee asked Gordon to plan an attack on the enemys position. Staging from Colquitts Salient, Gordon intended to assault Fort Stedman with the goal of driving east towards the Union supply base at City Point. Moving forward at 4:15 AM on March 25, 1865, his troops were able to quickly take the fort and open a 1,000-foot breach in the Union lines. Despite this initial success, Union reinforcements quickly sealed the breach and by 7:30 AM Gordons attack had been contained. Counterattacking, Union troops forced Gordon to fall back to the Confederate lines. With the Confederate defeat at Five Forks on April 1, Lees position at Petersburg became untenable. Coming under attack from Grant on April 2, Confederate troops began retreating west with Gordons corps acting as a rearguard. On April 6, Gordons corps was part of a Confederate force that was defeated at the Battle of Saylers Creek. Retreating further, his men ultimately arrived at Appomattox. On the morning of April 9, Lee, hoping to reach Lynchburg, asked Gordon to clear Union forces from their line of advance. Attacking, Gordons men pushed back the first Union troops they encountered but were halted by the arrival of two enemy corps. With his men outnumbered and spent, he requested reinforcements from Lee. Lacking additional men, Lee concluded that he had no choice but to surrender. The afternoon, he met with Grant and surrendered the Army of Northern Virginia. Later Life Returning to Georgia after the war, Gordon unsuccessfully campaigned for governor in 1868 on a staunch anti-Reconstruction platform. Defeated, he achieved public office in 1872 when he was elected to the US Senate. Over the next fifteen years, Gordon served two stints in the Senate as well as a term as Governor of Georgia. In 1890, he became the first Commander-in-Chief of the United Confederate Veterans and later published his memoirs, Reminiscences of the Civil War in 1903. Gordon died at Miami, FL on January 9, 1904, and was buried at Oakland Cemetery in Atlanta. Selected Sources Civil War: John B. GordonNew Georgia Encyclopedia: John B. GordonCivil War Trust: John B. Gordon

Saturday, October 19, 2019

Hospitality Company analysis Essay Example | Topics and Well Written Essays - 750 words

Hospitality Company analysis - Essay Example The company believes in personal dedication for the employees to achieve anything the employees dream of in the attainment of success. Stinking Rose has many branches in United States that use multi hotel reservation system. The company is known as the largest hotel with lodging and providing garlic stuffs. Stinking Rose has more than 4000 hotels and operates in more than 90 countries operating under Stinking Rose. The company operates under names like Beverly Hills. For example Beverly is located at California which offers famous garlicky signature dishes. If one spends a night at Beverly he or she will only pay $ 139 per night. Another example is Dracula Grotto which is known as the best for a medieval hideaway in this restaurant one will not feed in garlic, and the last Piazza & cafes which is known as the heart of stinking room and one is put under Italy, great people watching and a place for conversation. One of the strategic future directions of Stinking Rose Restaurant is to expand for example in Caribbean and other parts. Another future direction is to remain in the market as the largest hospitality company that provides wide range of brands that are unique and satisfy the customers in all corners of the world. The company was graded as high classic restaurant in San Francisco and was awarded a certificate of excellence in 2013 in terms of food, services, value and atmosphere. The restaurant price range is approximately $23 to $32 when one spends a night in the restaurant being served with garlic stuffs. The company aim is to make sure that it expands world wide and be the best with high quality services at affordable prices to meet all market segments. The board of directors in Stinking Rose Restaurant has the power to hire all qualified and ready to work employees and managers to supervise the company. This means the company will have the best result by attracting a lot of customers due to management. Stinking Rose

Friday, October 18, 2019

Wikipedia entry. The Global city . Focusing on London Area Essay

Wikipedia entry. The Global city . Focusing on London Area Spitalfields - Essay Example A global city bears a large percentage of the world’s financial transaction, and there are twenty-five cities in the world which control almost the entirely global financial transactions. Among them, New York, London and Tokyo stand out as the most influential cities in the world, in matters of economy and financial transactions, and they are characterized by large scale in-migrations from different countries, societies and cultures throughout the world [1]. According to Sassen, a global city refers to the central â€Å"command and control point† of the global economy, where corporate presence is the fundamental characteristic, with many of the multinational corporations based in the city as their headquarters. Further, productive service companies such as accounting, management and law firms have also been attracted into the city, to provide services to the major corporations with their headquarters in such cities [1]. Productive Support Services in London Area Spitalf ields The concept of global city developed in the past two decades, and has become a phenomenal concept in the modern world, owing to the ability of the global cities to influence the financial and the economic activities of the world. ... Aspects of different socially stratified classes of societies The rise of the London Area Spitalfields as a global city started in the early 17th century, specifically in 1669, when Truman’s Brewery was opened and was followed by a major boost in 1682, when King Charles II issued a charter allowing for market activities to be held on two market days, namely Thursday and Saturdays [3]. It is the success of the market that encouraged people to settle in the region, and in-migration then followed, with the French being the first group to immigrate into the region, to bring their silk weaving skills which were highly desirable in the market. Subsequently, the Irish in-migrated into the region escaping from the potato famine, and were followed by the Jews. Between 1880s and 1970s, the area became an overwhelmingly Jewish community area, representing the largest Jewish community in Europe [4]. The Bangladeshi also followed the in-migration route, and by the early 20th century, the c ommunity had established itself in the London Area Spitalfields, and introduced further Eastern cultures, businesses and trades. Therefore, the London Area Spitalfields suits the definition of a Global city, because it has become the societal and cultural melting and fusion point, where different cultures from the East and the West were integrated, to create a unique regional culture of its own [5]. The evidence of the people who have given the London Area Spitalfields its unique name and culture is still observable to date, with the existence of Jewish synagogues, Methodist Chapel, Muslim mosques and Huguenot church for Christians [3]. Characteristics of London Area Spitalfields

Don't really have one Essay Example | Topics and Well Written Essays - 750 words

Don't really have one - Essay Example All of this also happened to a man who is known to history as Frederick Douglass, the first black man to appear on a presidential ticket. In his early narrative Frederick Douglass: Life of an American Slave, the author details his early life and education in such a way that he illustrates both the dehumanizing effects of slavery as well as those factors that operated to inspire him to ‘become a man’ rather than remaining in the role of a slave. Douglass’s narrative begins with his earliest knowledge about himself, which is far less than most people’s knowledge and highlights the degree to which black people were considered beasts of the field. Douglass sadly informs the reader that he is uncertain of his age or the day he was born and, although his mother died when he was seven years old, he was relatively unaffected by the news as he had been separated from her since infancy. â€Å"Never having enjoyed, to any considerable extent, her soothing presence, her tender and watchful care, I received the tidings of [my mother’s] death with much the same emotions I should have probably felt at the death of a stranger† (Ch. 1). In highlighting this unnatural separation of mother and child, Douglass also points out that he never knew who his father was although there had been some rumors that he was a white man. However, the important element of these early chapters is the way in which the slave is creat ed from birth, separated from his family to destroy any natural human feelings of attachment and support and cruelly treated to keep him always in fear. By the time he was seven, he had learned of the death of his mother, watched his aunt brutally whipped and had taken his own place at work in the fields. He describes the life of the slave, illustrating its bestial level of survival existence and the types of behaviors they were expected to exhibit when they were in the presence of their masters. A turning point in the book

Thursday, October 17, 2019

Market Intervention Essay Example | Topics and Well Written Essays - 1250 words

Market Intervention - Essay Example The prime argument for the initiation of minimum wages has been the removal of economic disparity. As it has been observed time and again that the poor workers have been deprived of the minimum facilities and benefits by the employers all over the globe, the concept of minimum wages aimed to end the economic oppression. United Kingdom has not been an exception either. It was in the year of 1999 that the government of United Kingdom (led by the Labour Party) introduced the minimum wage. The initiation of the ‘National Minimum Wage’ is considered as one of the most significant interventions by the government in the labour market. The other major party of the United Kingdom, the Conservative Party which opposed the minimum wage previously in 1991, also vouched for the cause since 2005. The major objective of the minimum wages has been the rise of standard of living of the working class of the society (Center for Economic Performance, â€Å"Policy Analysis†). Prior to the implementation of minimum wages, the concerned quarters of the industry speculated that the installation of minimum wages might reduce up to two million of jobs alone in the market of United Kingdom. It was so predicted because it was estimated that the employers will reduce the number of posts as they would have to pay minimum wages for any new employment and therefore, they would rather try to extract more work from those who already have higher wage. But the various research reports prepared in the subsequent years proved such speculation to be impractical as there was no reported news of spillover. The implementation of minimum wage proved to be extremely beneficial to the female workforce of the United Kingdom. Also, it was observed that the implementation of such wage structure contributed to increase of wage for about 5% to 6% of the workforce of the United Kingdom during the initial years.

Human Trafficking and Sex Tourism in Latin America Essay

Human Trafficking and Sex Tourism in Latin America - Essay Example Brazil is one of the countries in the Latin America mentioned in many international reports to have experienced blossoming sex tourism and human trafficking. The tremendous development of sex tourism and human trafficking in Brazil attributes to various historical, political, economic and social factors. Currently, serious cases of children involvement in commercial sex have gained an upward gradient as many of the participants are under-educated or totally illiterate. Evolution of the Menace According to Hannum, sex tourism in Latin America evolved as a result of increased demand for sex among the wealthy Europeans who travelled to Latin America to obtain cheap sex from the regional women. The evolution of sex tourism in the Latin American countries also relates to the establishment of military bases of foreign armies in those regions. The British armies are held as major participants in the evolution sex tourism in the Latin America. In the views of Hannum, governments of the Latin American countries like Brazil resolved to support tourism in their specific countries as this was one of the ways to generate massive revenues. Promotion of tourism in these areas coupled with the increase in number of commercial sex workers desperate for the foreign European currencies. Sex tourism as per the current statistics has grown to a multibillion dollar industry in Brazil. However, most of the revenues gathered from the sector do reach the government in either ways (Hannum). The industry encompasses women, males and international clients who either come to obtain sex or to sell their sex to respective consumers. Current Status, Trends and Predisposing Factors Hannun in reference to the reports of End Child Prostitution, Child Pornography and Child Trafficking (ECPAT), estimates that child sex tourism in Brazil rose to 500,000 in the year 1994. This is number is exceptional to Brazil alone without putting into count similar cases in other Latin American countries. Hannun reports that research conducted by the Predo Foundation averred that most incidents of prostitution among children in the larger Latin America correlate to regional incapability to care for its population. Reports indicate that most children resort to prostitution as an alternative way to earning a living. In addition, most of the children engaged in prostitution in the Latin American countries, specifically Brazil are victims of civil conflicts who faced abusive families. Hannum further demonstrates that increase in child sex tourism in Brazil links to the growing dislike of the old sex workers feared to have infections of sexually transmitted disease. Moreover, Hannun confirms that child sex tourism in Brazil and entire Latin America is factored by sex clients’ feeling of freedom from their social cultural rules that restrict the practice. The rigorous growth of child sex tourism in Brazil also relates to the increased media advertisements of jobs that lure desperate childr en to apply for such rare vacancies in their respective countries (Hannum). Advertisements of luxurious free travel have also been one of the ways used by dealers in the sex tourism industry to hunt for children and other sex tourism practitioners. Increase in sex tourism in Brazil also links to the wide internet advertisement of sexual pictures that trigger the urge for sex among the

Wednesday, October 16, 2019

Market Intervention Essay Example | Topics and Well Written Essays - 1250 words

Market Intervention - Essay Example The prime argument for the initiation of minimum wages has been the removal of economic disparity. As it has been observed time and again that the poor workers have been deprived of the minimum facilities and benefits by the employers all over the globe, the concept of minimum wages aimed to end the economic oppression. United Kingdom has not been an exception either. It was in the year of 1999 that the government of United Kingdom (led by the Labour Party) introduced the minimum wage. The initiation of the ‘National Minimum Wage’ is considered as one of the most significant interventions by the government in the labour market. The other major party of the United Kingdom, the Conservative Party which opposed the minimum wage previously in 1991, also vouched for the cause since 2005. The major objective of the minimum wages has been the rise of standard of living of the working class of the society (Center for Economic Performance, â€Å"Policy Analysis†). Prior to the implementation of minimum wages, the concerned quarters of the industry speculated that the installation of minimum wages might reduce up to two million of jobs alone in the market of United Kingdom. It was so predicted because it was estimated that the employers will reduce the number of posts as they would have to pay minimum wages for any new employment and therefore, they would rather try to extract more work from those who already have higher wage. But the various research reports prepared in the subsequent years proved such speculation to be impractical as there was no reported news of spillover. The implementation of minimum wage proved to be extremely beneficial to the female workforce of the United Kingdom. Also, it was observed that the implementation of such wage structure contributed to increase of wage for about 5% to 6% of the workforce of the United Kingdom during the initial years.

Tuesday, October 15, 2019

Three important lessons (PLato's Apology) Essay Example | Topics and Well Written Essays - 500 words

Three important lessons (PLato's Apology) - Essay Example In truth, Socrates was imparting a lesson that was central to his work and to his beliefs. His apology was a lecture on the triumph of knowledge over ignorance and he was beseeching his listeners to discard old and traditional beliefs and embrace modern intellectual development. The background of the Apology is that Socrates is being charged with the corruption of the youth and disrespect towards the Gods. He begins by saying that â€Å"The task is not an easy one; I quite understand the nature of it. And so leaving the event with God, in obedience to the law I will now make my defence.† (Plato, quoted in Biffle, 34) He confronts his accuser Meletus and demonstrates exactly why and how the charges against him are false. However, despite his use of logic to defend himself, he is still found guilty and sentenced to die. It is clear throughout the text that Socrates wants to emphasize that he will counter his accuser’s lies and accusations with wisdom. This is the first lesson: the importance of wisdom. He also wishes to emphasize that it is his wisdom and knowledge that make him persecuted, but this wisdom and knowledge will be of much use to the city of Athens. Therefore, instead of using pathos, or arousing pity, he was appealing to the logic of the crowd. Instead of beseeching the people to spare his life, he reasoned with them – making logical and coherent arguments with the end in view of convincing them that they would be better off with him alive than with him dead. To quote: For if you kill me you will not easily find a successor to me, who, if I may use such a ludicrous figure of speech, am a sort of gadfly, given to the state by God; and the state is a great and noble steed who is tardy in his motions owing to his very size, and requires to be stirred into life. I am that gadfly which God has attached to the state, and all day long and in all places am always fastening upon you, arousing and persuading

Monday, October 14, 2019

Security policies and alternatives Essay Example for Free

Security policies and alternatives Essay In light of the September 11, 2001, terrorist attacks, the United States has made several efforts to increase the country’s security. Within the last year, one of the largest debates has been with regard to border security. While the terrorist attacks are some of the fuel behind the debate, other issues include providing for the needs of illegal immigrants and their families and the economic impact of illegal immigration. Though in theory the debate centers on all American borders, the focus has been primarily on the southern border with Mexico and little discussion has been had about improving the security along the Canadian border. New border legislation enacted in 2006 provided for the building of a wall measuring several hundred feet long on the United States/ Mexico border in Texas, longer jail sentences for those convicted of smuggling illegal immigrants into the United States, and the posting of National Guard troops along the United States/Mexico border. A report in the September 21, 2006, edition of the Washington Post states that recent bills passed by the United States Congress regarding border security have all been somewhat weak, and have covered disparate aspects of border security that have little to do with each other. Little has been done to create laws that are both tactically strong in preventing illegal immigrants and terrorists from crossing the borders of the United States as well as providing laws that are fair and equal to those wishing to emigrate by legal means. Heightened interest in illegal immigration has led to more reporting of conflicts between Mexican Nationals and those charged with patrolling the border. These conflicts have simply added fuel to the cry for improved border security. Recent advances in technology have made it so that the United States can employ newer technology, ranging from facial recognition software to fingerprint readers in their effort to have more control over who enters the country via the southern border. Because the technology is complicated and new, many lawmakers are concerned about the potential invasion of privacy that it might cause, as well as the expense that it will entail. In addition, many who do not live in the Border States or are unfamiliar with American geography may have trouble envisioning both the length and scope of the American-Mexican border. Many policy makers have difficulties understanding the specific nature of the problems and therefore end up developing inadequate or poorly functioning solutions that don’t do anywhere near enough to resolve the problems created by these inadequate solutions. According to Ackleson (2005) one of the main issues in helping policy makers develop functional, efficient policies is the fact that very few people in power understand exactly what creates a situation where border security is both efficient and fair. One of the major complaints that have been made about current border security and immigration policy is that it does little to stop illegal immigrants, or potential terrorists from entering the country. Little has been done by the Federal Government to expand the rights of INS Border Patrol Agents to act in order to prevent illegals from entering the country. The National Guard presence on the border is minimal and nowhere near enough to patrol the thousands of miles of unprotected border. Another issue is that of the Untied States border with Canada. Several thousand miles of this border are completely unguarded, and in many places, people can simply walk into the United States from Canada. According to Mass (2007) one of the major issues is the influence of major corporations on the political agenda in the United States. This is most true regarding industries that rely almost completely on the flow of illegal immigrants. Fields such as agribusiness, and the service industry that includes multi-national corporations such as Con-Agra and McDonalds have all had issues in the past with the hiring of illegal immigrants, and many of these businesses have a powerful lobby in the U. S Congress. This lobby affects the ability of lawmakers to put more effective border security policies in place on the United States Mexico border. Mass (2007) also characterizes the current lack of border security as an effort by the government and the lobbies of major corporations that influence political policies to create a North American Union similar to the European Union. This may, or may not be true however, it is a strong possibility that this could happen since countries in Asia, the Middle East, and South and Central America are moving towards similar alliances. Many have proposed the idea that the border begins not just at the physical entry points to the United States but in places where people and cargo embark upon the journey to the United States. Problems with border security are not just related to Mexican and Canadian borders but with the entry of people and goods from Europe, Asia and the Middle East as well. The numbers are rather overwhelming given the fact that land based borders between the U. S and other nations are around 7,500 miles long, 95,000 miles of coastline, and over 500 million people to contend with. This means that we need to be doing much more than we are currently doing in order to protect our borders. Jennifer Lake (2007) of the Congressional Research Service states that we must focus on border security for two primary reasons. First, alternative solutions to border security must be addressed in order to protect the United States from terrorism. Second, something must be done in order to stem the flow of illegal immigration from Mexico, and Central and South America. We also do very little to limit or stop immigration from countries with large numbers of suspected terrorists, or to limit student and temporary work visas even further. Although President Bush proposes increasing the number of available temporary worker visas, some people argue that this is not a feasible solution since it could allow for the entrance of terrorists into the country. The potential problem is similar to an existing one: there is no enforcement to assure that people with temporary visas leave when their visas expire. Many proponents of increased border security argue that the United States must first enforce the current immigration laws on the books, including taking action against the estimated 12 million illegal immigrants already in the country. Many argue that until the current laws are enforced, adding more laws will simply be additional laws that illegal immigrants ignore. Desired Situation The key issues in border security are preventing terrorists from entering the country via weak borders and stemming the flow of illegal immigration from Mexico and South and Central America. Ideally, the objective would be for national security interests to be able to identify anyone who chooses to set foot on American soil. The overall goal would be to know who is entering the United States and for what purpose. Preventing Terrorism Preventing terrorism is one of the major issues that must be addressed when looking at border security. Since September 11, 2001 much has been done to ensure border security in this direction. However, there is still a great deal of work to be done. A. Airport Security: Enforcing federal guidelines regarding airport security is vital. Critics of the Transportation Safety administration say that the regulations are enforced differently at various airports across the country and that many airport security personnel are poorly trained and ineffective. In reality, this may currently be one of the most secure entry points into the United States and efforts need to be made to make the physical borders of the country as safe as the airports and harbors. B. Terrorist Acts. Regardless of public outcry over profiling, the U. S. Immigration and Naturalization Service needs to have more stringent control on the immigration of people from countries with high numbers of known or suspected terrorists. This could include more stringent background checks before visas are issued and a mechanism by which INS is alerted if a person with a temporary visa fails to leave the country on time. It might also be worth considering some sort of monitoring system so that persons of suspect origin can be monitored while in the United States on a temporary visa. Other things to consider are: 1. Limiting the number of available student, or temporary worker visas. Many of the 9-11 terrorists entered on these types of visas. Many of their visas were also expired. INS need to be authorized to do extensive pre-entry background checks on those requesting visas and needs to have an effective enforcement arm for deporting those who stay beyond the length of their visas. 2. Adequate supervision of immigrants coming in from the Canadian border; instead, we focus on the mass numbers coming in from Mexico. Both borders must be equally secure so that terrorists do not simply adapt to changing security issues. 3. Utilizing more of the advanced technology that has been developed in the wake of 9-11. Fingerprint readers and facial recognition software should be available at every legal port of entry into the United States. Stemming the Flow of Illegal Immigration An equally hot topic in the border security debate has been the issue of stemming the flow of illegal immigrants that cross the border from Mexico. Many of these immigrants cross the border where there are no security checkpoints and therefore federal security agencies have no way to monitor who might be entering the country. Opponents to the prospect of tightening border security have claimed that we need the illegal immigrants to take service sector and farming jobs American-born workers refuse to do. While this type of culturally-biased and bigoted rhetoric has no place in the immigration debate, the country does need to address employment needs as part of an overall immigration reform package. Additional proposals for increasing security on the southern border include: 1. Using a mix of enforcement officers to patrol the border, including INS, National Guard and U. S. Border patrol. 2. Empowering border patrol agents to act with impunity in protecting the borer. When a border patrol officer is convicted of attempted murder for firing at someone illegal crossing the border, there is a problem. 3. Border crossing stations on all roads, not just major highways. 4. Using biometric, and computerized border control methods 5. Extending walls between United States and Mexican borders, and making them much higher than they currently are. 6. Longer jail sentences for illegal immigrants and those who smuggle them into the country. 7. Encouraging economic growth and development in Mexico and South and Central America Evaluative Criteria In creating the desired solution, the United States has many issues to consider. These are very long borders and therefore will require a mixture of approaches and means of enforcement. Furthermore, to effectively reach the desired solution, the entirety of the political structure has to reach a consensus regarding the goals and outcomes desired. Currently, the two sides of the immigration debate cannot even agree on the desired outcome. Issues that will have to be considered are: 1. Can this solution be reached through political consensus? Because the political parties in the United States have been so diametrically opposed of late, there seems to be little chance that the parties will agree on a solution that is both politically expedient and effective in any manner. The one thing that might alter this is the public outcry last spring over the legislation that congressional leaders put forth. 2. Can this project be done in a cost-effective manner? With more than 7500 miles of borders to the north and the couth, the United States needs to make a major investment in border security and doing so requires selling the majority of the populace on the need for that security. 3. Do we have the technological capabilities for this solution? One proposal before Congress gave the INS one 24-hour period to determine if someone was eligible for a temporary visa into the United States. This restriction is ludicrous. Other countries often take months to determine if a person is eligible for a short term visa. 4. Can we justify this solution to ourselves and the world? America has long been considered the land of opportunity. If we take significant steps which effectively reduce the number of immigrants allowed into the country, are we betraying our past? 5. Does this solution address the need to grant political and religious asylum to persecuted peoples around the world and is it so cumbersome as to make legal immigration even more difficult? 6. Does this solution adequately address matters of national security such as knowing who is within our borders and when they leave? Current Situation Currently the United States is not going as far as it should in protecting our borders. We are still stuck in the frame of mind that assumes that border security involves merely the increase of manpower. This is not necessarily true. We have tools that can be utilized to both protect our borders, and to ensure that the system operates in an efficient and an effective manner. As of right now the United States has increased the Border Patrol run by the Immigration and Naturalization Service by several thousand employees. The Federal Government has also stationed several National Guard units along the U. S, Mexico border. They are doing little or nothing to protect the Canadian border. Through the Department of Homeland Security and the Transportation Security Administration, some entry into the united States has become more monitored and more difficult, but the estimated 12 million illegal immigrants already within our borders proves that country is not doing enough to protect itself from outside treats. Scenario One Jose and Rita live in Mexico near the border with El Paso. Rita is pregnant and Jose believes that he can find better employment in the United States. He applies legally for a temporary work permit, crosses the border daily for work and then applies as a legal immigrant. This is, of course, the best case scenario and the way it should work. If Jose attempts to get a temporary visa, the government should conduct an appropriate background check and issue the visa. He should be allowed to work in the United States and return to his native country to live. These day passes are a normal thing in border towns. The key issue here is that we must monitor to make sure they are leaving when the temporary pass expires. Scenario Two Juan and Carmelita want their unborn child to be born in America so that it will be an American citizen. After several days of observation, they find a spot in central Arizona along the fence where they can sneak into the United States. Carmelita’s child is automatically an American citizen because it was born in the United States. The problem here is that there are miles of unsecured border where illegals can sneak through and that we reward them for the effort by providing them with free medical care and free citizenship for their children. We need to develop a way to prevent illegal border crossing and to discourage its use. Scenario Three Terrorists observe the American border with Canada is largely unprotected and find ways to enter Canada. Then, they purchase hiking gear and backpacks and simply hike across the border into northern Minnesota. Homeland Security has no way of knowing they have entered the country and no way to protect the populace. The Canadian border is very rugged in some places and difficult to monitor. However, the border must be monitored to prevent terrorists from simply walking across it. ALTERNATIVES: Solution One Provide more border security by utilizing computer, and biometric technology as well as infrared cameras etc to monitor the flow of people in and out of the U. S/ Mexico and the U. S /Canada borders. Utilize these technologies to inspect cargo as well as people. A technological approach will be costly given the length of the borders and the terrain in some regions. In addition, there will need to be additional manpower to respond to threats detected by the technology and to monitor the machines reporting. Solution Two Decrease the number of work visas available for high tech, or medical fields (there are jobs in these fields but this is not where the majority of illegals work) and increase work visas for the service sector (this is where the majority of illegal immigrants work). In addition, the screening process before these visas are issued should be more extensive and the reporting requirements for employers should be more extensive as well. For example, if an employer hires a person with temporary work visa and that person suddenly stops coming to work, there should be a reporting mechanism within the INS so that his location and intentions within the country can be determined. Solution Three Increase the number of United States Customs Agents in airports, train stations at international borders, highways, and sea and river ports. Solution Four Reduce the number of services available to illegal immigrants even further than they are now. Currently they receive services for children born in the United States by making these unavailable there would be little motivation to sneak across the U. S border in order to receive them. Solution Five Offer aid to Mexico and Central and South American nations to help them raise the minimum wage rate, and attract new industries to Mexico. By improving the employment conditions in these countries we reduce the number of illegal immigrants crossing the borders. Make it conditional on governmental responsibility and fair distribution of funds. Stakeholders Defining who has a stake in the immigration debate is difficult as it includes all American citizens, Canadian and Mexican citizens and those wanting to immigrate to the United states from anywhere in the world. Among the largest stakeholders though are American politicians. Politicians are faced with an on-going crisis of national security unlike any they have ever faced before. Despite their best efforts, there is not simply a place or a person that the country can use as a military target and end the threat to national security. Instead, politicians are left with the requirement that they make the country feel safer and, if possible, be safer from external attacks. Politician’s further interest in the subject comes in the form of campaign donations and voting blocks. Many fear that if they are viewed as strong on immigration policy, they may lose voters among the Hispanic community and in other groups which believe that American opportunity should be available for everyone. On the other side of the coin, mostly Republican lawmakers are concerned about the big business interest in illegal immigration and do not want to offend the donors with big wallets. Caught in-between is the average American, Canadian or Mexican citizen. Many in border states grew up in a time when crossing the border was as easy as going into the next state. Many are mentally unprepared for the idea that Mexico and Canada really are sovereign countries and that a passport is required to visit them. Furthermore, people living in Border States have no desire to lose additional civil liberties in the name of security. Recommendations/Rationales American border security options have been criticized worldwide from countries which do far more to police their borders and regulate immigration than we ever have. Even Mexico, which has fence with concertina wire on its southern border, has argued that the United States should not protect itself from illegal border crossings. The people of America disagree. Middle America wants to feel safe from terrorist attacks and citizens in the Border States would like to feel that their jobs are secure from replacement with illegal immigrants. Unfortunately, with world criticism and a self-image based on the Statue of Liberty’s invitation to the â€Å"poor huddled masses yearning to be free†, it is difficult to find a solution that is both economically feasible and politically feasible. The best option is to increase physical security on the border including both personnel and technology. Building a wall is a fruitless and ridiculous idea that will waste valuable resource. Instead, we need to encourage the economies of Mexico and Central America while instituting serious enforcement of our border crossing laws. We also need to eliminate social welfare programs for illegal immigrants and restrict or eliminate auto-citizenship for newborns. Or, if we really do want to be the nation of immigrants we once were, we need to establish a new Ellis Island, in Texas or California, where people can line up and wait for their chance to swear allegiance to the United States and become citizens the right way. Success Indicators Perhaps it is the insidious nature of the problem, but measuring success of border security will be difficult. The largest measure of success is freedom from outside attack, but that is only one component of this issue. The further measure of success would be to see a decline in the number of illegal immigrants in the country and an increase in the number that are here legally. References Ackleson, Jason. Border security technologies: local and regional implications. The Review of Policy Research 22. 2 (March 2005): 137(19) Dizard, Wilson P. , III. DHS gets down to details on SBI: new technology plans include budget and staffing blueprints; cost put at nearly $8b. (Department of Homeland Security, Secure Border Initiative). Government Computer News 25. 34 (Dec 11, 2006): 1(2). I â€Å"House Passes Border Security Bill† Washington Post, September 21, 2006: http://www. washingtonpost. com Lake, Jennifer E. Border security: the complexity of the challenge. Congressional Research Service (CRS) Reports and Issue Briefs. Congressional Research Service (CRS) Reports and Issue Briefs, 2007. Mass, Warren. Why cant we secure the border? In truth, we can secure the border. The problem is that the federal government is pursuing an open-borders policy as a steppingstone to North American merger. (SPECIAL REPORT: ILLEGAL IMMIGRATION). The New American 23. 8 (April 16, 2007): 25(2). I

Sunday, October 13, 2019

Interlaminar Stress Behaviour of the Flywheel Rotor

Interlaminar Stress Behaviour of the Flywheel Rotor 1.1 History of the Flywheel For over thousands of years, flywheels have been used in potter wheels and spindle wheel whorls Gowayed et al., 2002 The concept of storing energy in a rotating disk dates as far back as 2400 BC when rotating wheels were used by Egyptians to handcraft pottery. In fact, flywheel systems were widely used in everyday life (Genta, 1985): in warring chariots, water pumps and even power generations. However, these conventional flywheels are not as efficient as energy storage devices due to the large amount of mass required for the relatively meagre amount of energy stored not to mention the capability of delivering power for only a relatively short period. The advent of the industrial revolution brought about the significant advances of the flywheels. In the 18th century, Man witnessed the widespread use of metal in the construction of machines and soon, flywheel had found its way into steam engines. This development of the flywheel had been attributed to the works of James Watt. With flywheels made of cast iron, a higher mass moment of inertia could be achieve and thus a significant weight saving as well. During the industrial revolution, James Pickard developed a solution for transforming reciprocating to rotary motion with the combination of a crank and flywheel. And it was not till the last thirty years that we witness high performance flywheels being significantly developed with marked improvement and demonstrate the potential as energy storage systems in a wide range of applications. The energy crisis of then 1970s marked the beginning of another significant era for the development of flywheels as the need to search for an alternative energy storage implement. Large amount of money were invested by the governments of many nations into the development of flywheel energy storage technology with subsequent establishment of research programs in the development of flywheel devices as alternative energy storage systems (Genta, 1985). However, development pace since to slow down as fuel prices begin to stabilized in the early 1980s. That particular time period was nevertheless a crucial development era for the flywheel; during which the use of flywheels are explored and developed for electrical vehicles. In addition it was also explored as a device to help utilities manage peak power demand. With the incorporation of high specific strength advanced composite materials into flywheel designs, weight reductions and strength increment can be achieved; and this cannot be achieved with the use of metallic alloy. However, the use of flywheels can yet be commercialized even with the significant improvements in the design concept of flywheel as it remains a challenge still to design flywheel systems that are cost competitive to other energy storage devices. In addition, composites, though stronger than metal, would require the use of advanced bearings due to the inability to withstand certain forces exposed in high performance application (Kim, T.H. 2003). The 1990s witnessed developments in stronger, lightweight composite materials, magnetic bearings and other electronic devices, and all of which contribute to the exciting development of the flywheel. Excessively high rotational speed could now be reached, with a subsequent increment in energy stored, making them a possible candidate again for energy storage system of superior performance. As a summary, the improvement in the flywheel quick energy recovery, high efficiency, low maintenance and long service life, high amount of stored energy per unit volume and mass, high output power levels, as well as lower product and operational cost (Horner, 1996) as well as environmental friendly components are all that have made the flywheel energy storage system a feasible option. 1.1.2 Flywheel as an Energy Storage Device Flywheel energy storage (FES) has, in various past researches, proven its superiority over conventional battery technology based energy storage system in terms of its higher energy density, durability, rapid charge and discharge capability, as well as its tolerance over a wide range of temperature with very minute environmental concerns; and with the progress in power electronics, loss reductions techniques and advanced materials, the then seemingly inconceivable idea of economical flywheel energy storage (FES) devices are no longer chimerical (Hebner et al, 2002). In fact, all of the prepossessing characteristics mentioned briefly above (in comparison with those that of conventional battery system) are what that result in the advanced flywheel systemsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ appeal as one of the fast- gaining attention alternative for energy storage devices. (Arvin Bakis, 2006) A flywheel is an inertial energy storage system where the rotating mass functions as the energy storage retainer. While connected to the motor (possibly electrical motor), a flywheel can be accelerated to a specific angular velocity. In this process, electrical energy was converted into kinetic energy and the rotating inertia of the composite rotor acts to store this form of mechanical energy. When the need arises, the mechanical energy can be transformed back to electrical power by the motor. Thus, the motor in the flywheel system acts not merely as a motor to accelerate the energy storing process but also as a generator in recovering the transformed electrical energy. A typical flywheel energy storage system consists of five primary components (Lazarewicz et al., 2006), namely the rotor, the bearings, the motor/generator unit, the vacuum enclosure and the power electronics. A rotor consists of a hub and rim. As the rim is the main rotating mass of the rotor, it is quite easy to comprehend the fact that the rim acts to store most of the energy whereas the hub functions to connect to the rim to a shaft. The rotating flywheel shaft on the other hand is supported by bearings which could either be of the mechanical or magnetic variety. These bearings allow for low resistance to rotor rotation. However, magnetic bearings are preferred over mechanical ones due to the energy loss associated with energy loss. The motor, as the third major component introduced, acts to accelerate the rotor when electrical energy us supplied to it; whereas the generator acts to extract electrical energy from the rotating rotor by decelerating the rotor. This is in accordance with the principle of conservation of energy. As a result of the rotor deceleration, torque is inevitably produced and is typically transferred between the rotor rim and the motor unit via the hub and the shaft. In addition, as the occurrence of input and output events are not concurrent, the combination of the motor and generator into a single functional unit is typically done to the advantages of weight and cost reduction (Hebner et al. 2002). In addition, a low pressure, vacuum environment is maintained via the use of a pressure vessel enclosure, which serves also to support the structural assemblage of the flywheel and bearing system. This vacuum compartment also serves to house all of the rotating components of the flywheel to reduce aerodynamic drag. Other than that, such a compartment is also crucial in protecting the system from catastrophic failure as a consequence of high energy debris. The power electronics on the other hand act as the interface between the motor/ generator unit and that of the electrical power system by converting the input power into a suitable electrical signal for the operations of the motor/ generator unit. Flywheel energy storage devices have the potential to store a higher amount of energy per unit mass than typical chemical batteries. Where design weight is of major concern, and where maximum energy storage is a fundamental necessity, flywheel energy storage systems seem to offer the most appealing capabilities. This is particularly so in space applications where the crucial design weight necessitates the need for a high energy storage capacity in the smallest available size and mass (and thus weight). Other than its high specific energy density, flywheel also possesses superior specific power and when used with magnetic bearings and advanced motor/ generator system, more than 90% of the storage energy can be retrieved, an efficiency far more superior than that if conventional chemical batteries are used where the reclaimed energy constitutes less than 80% of the energy input. In addition, the increment of the amount of energy stored in flywheels can be achieved via the increase of s peed of the rotating rotor while chemical batteries would possibly need some reassembling of the connections from parallel to serial. Flywheels are very effective devices in avoiding unbalanced or oversized design of power systems due to the way they store energy and this is especially crucial in the deliverance of peak power on demand. For instant access to the desired efficiency of energy storage as well as energy required, flywheels repeat the charging and discharging cycle. This process of charging and discharging occurs at a rapid speed as both processes occur in the very same motor/generator. In addition, the flywheel life will not be affected with the large amount of charging and recharging cycles whereas chemical batteries undergoing a similar process will need a replacement after every few years. In addition, flywheel, as a mechanical type of battery, is also tolerant of the extremity of temperatures and as flywheels do not contain acidic and other hazardous material, flywheels are easily handled during manufacturing process, and disposed of at the end of the flywheelsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ lif e cycles. Flywheel energy storage systems had since found its way into various applications such as transportation and space satellites, to name a few. In transportation, flywheel systemsà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢ deep recharge and rapid charging capability, the ability to provide high pulses of power as well as the tolerance to a wide operating temperature range as well as the longer operating life on top of weight reduction make flywheel systems an obvious choice in replacing chemical batteries in mobile applications such as electric vehicles. (Hebner et al 2002). A reliable, steady state power quality is of vital importance for critical manufacturing, hospitals, and internet servers. In this context, the flywheel energy storage systems have also found its way into electrical load levelling application such as in ensuring an uninterruptible power supply by providing a smooth and effective transition between a main power source when necessary (Hebner et al 2002) This is one of the current capability of the flywheel and it seems promising that as the technology improves in the near future, flywheel could possibly be applied to peak power managing, where excess energy produced us stored and later released at the peak time in energy consumption. The concept of flywheel is also not novel in the hybrid electric vehicles (HEVs) industry, where small combustion engine is operated while the vehicle is moving at a constant speed. The acceleration process is executed with the extra power provided by the additional battery power supplier. This additional power, on the other hand is generated and stored in the battery when the vehicle brakes such that no additional power is wasted in the form of heat dissipation generated by the friction during brakes. At the present moment, flywheel seems promising in being use for hybrid buses as chemical battery is expensive. In space applications, light weight, compact with high energy density storage capability devices are highly sought after. With increase performance demands on space systems, space programs had had to make consistently huge effort in reducing rim mass to increase payload capacity as well as reduce launch/ fabrication costs. Although chemical batteries had long been a trusted source of energy but flywheel offers much better weight and life benefits as well as the potential to store a larger amount of energy at a lower weight, not to mention the capability to be used as attitude control actuators in replacing reaction flywheel assemblies and control moment gyros. In 2000, Truong et al introduced the Flywheel Energy Storage Demonstration Project, initiated at the NASA Glenn Reasearch Center as a possible replacement for the Battery Energy Storage System on the International Space Station; whereas Fausz et al. had, in the very same year reported that the Flywheel Attitude Control, Energy Transmission and Storage (FACETS) system could combine all or parts of the energy storage, attitude control, and power management and distribution (PMAD) subsystems into a single system, this significantly decreasing flywheel mass (and volume). Thus, in space applications, crucial weight reductions for satellites could, and have hitherto, been achieved with the use of the multi-function high speed flywheel system which not only functions as energy storage but also in providing a gyroscopic effect for attitude control. (Bitterly, 1998, Hebner et al., 2002) But even until recently, the historical development of flywheels and their uses has largely been dependent on advances in both materials and machine technology, coupled with opportunity and necessity (Horner, et al,.1996) However with technological advancements in such a rapid pace, it is not hard to envisage the status of flywheels in the near and distant future. 1.1.3 The Use of Composite and Fiber- Reinforced Materials in Flywheel Design The kinetic energy stored in a flywheel rotor increases linearly with mass but quadratically with rotational speed. . With the increasing demand for high energy storage, flywheels in present applications are often designed for high angular velocities; and these correspond to large centrifugal loads and consequently a higher circumferential and radial stresses, i.e. the dominant stress distribution are hoop stresses (concentric). In this context, the use composite materials with fibers of high unidirectional strength would be desirable. (Shah, 2008) For a fixed axis rotation, the energy stored in a thin rotating ring rotor is [1.3.1] Where I = the rotor moment of inertia ÃÆ' °Ãƒâ€šÃ‚ Ãƒ ¢Ã¢â€š ¬Ã‚ ºÃƒâ€¦Ã‚ ¡ = is the rotor angular velocity. It seems feasible that to increase the stored energy, the mass of the flywheel must be increased and thus its moment of inertia. However, it must be noted that the energy is only linearly proportional to the mass of the flywheel whereas the energy is proportional to the square of the rotational speed. These relations indicate that the rotational speed for a given radius will have a higher influence to the energy density than that of the mass of the flywheel; and to achieve a high rotation speed, a high strength per weight material must be used. Further derivations of the equations below will explain this condition. Resultant force along the hoop and circumferential directions [1.3.2] [1.3.3] Where = force summations in the radial direction = force summations in the circumferential direction dm = mass of the mass element located at radius r rdÃÆ' °Ãƒâ€šÃ‚ Ãƒâ€¦Ã¢â‚¬Å"Æ’ = arc length of the mass element located at radius r ar = radial acceleration of the mass element located at radius r From equation [1.3.3], [1.3.4] With [1.3.5] Where ÃÆ' Ãƒâ€šÃ‚ = mass element density V=mass element velocity B=mass element width Substitute equation [1.3.5] into [1.3.4] and knowing that V=rÃÆ' °Ãƒâ€šÃ‚ Ãƒ ¢Ã¢â€š ¬Ã‚ ºÃƒâ€¦Ã‚ ¡ and for ÃÆ' °Ãƒâ€šÃ‚ Ãƒâ€¦Ã¢â‚¬Å"Æ’ [1.3.6] The tensile stress in the circumferential direction [1.3.7] The stress in a thin- ring rotor is: [1.3.8] It is observed that the maximum speed achievable by a flywheel rotor is limited by the strength of the material from which it is made. The critical speed of the thin ring rotor can be approximated as [1.3.9] Where is the material ultimate strength. From the substitution of equation [1.3.9] into [1.3.1], the specific energy stored in the rim is obtained [1.3.10] K= Flywheel shape factor (Typically 1 for uniform stress disc and 0.5 for thin ring) The dependency of the maximum specific energy stored in the flywheel on the specific strength of the material is thus observed. With the demand for high specific energy in flywheel rotor design, the use of suitable material is thus of paramount importance. Due to their high stiffness to strength, composite materials have successfully been established in flywheel rotor design. Fiber reinforced composites are particularly attractive for use as flywheel materials due to their high strength and low density (Takahashi et al., 2002) The use of composite materials in flywheel designs offer numerous advantages over metallic alloys, including weight and increased strength. This is due to the high tensile strength of the fiber reinforcement phase. In 1986, a composite flywheel rotor was developed by Potter and Medicott for used in vehicle applications. In 1995, the study by Curtiss, et al. shown that the composite Carbon fiber epoxy disc rotor is capable of a 38% higher rim speed or 91% greater rotor energy density than a rotor built of an isotropic high strength to weight ratio Titanium or steel alloys. The carbon fiber reinforced plastic (CFRP) flywheel proposed by Kojima, et al. (1997) shown that high-modulus graphite/epoxy filament wound composite flywheel is able to rotate at a higher speed. The polar woven flywheel by Huang (1999) was shown to possess weight savings features as well as the improvement in life and reliability of the total spacecraft system, and in 2002, the Multi-Direction Composite (MDC) flywheel systems was reported by Gowayed and Flowers. The MDC flywheel system studied employed a new approach to strengthen flywheels with additional reinforcement in the radial direction along with the typical hoop direction reinforcement. In fact, analytical and numerical approaches had over the years been presented to determine the stress, and displacement distribution of the rotor. With the increasing demand for high energy storage, flywheels in present applications are often designed for high angular velocities; and these correspond to large centrifugal loads and consequently a higher circumferential and radial stresses. And the determination of these stresses as well as the ply orientation became especially crucial. As early as 1977, Danfelt et al. published an analytical method for a hybrid multi-rim flywheel with ply-by-ply variation of material properties and based on the assumption of axisymmetry. The method by Danfelt was later extended by Tzeng (1997,2003) which accounts for viscoelasticity effects. In addition, the original method by Danfelt had also been supplemented by a series of researches by Ha with additional consideration of the interference between adjacent rims and varying fiber angles (Ha et al., 1998), the rim radii of numerous material lay- ups for a constant angular velocity (Ha et al. 1999b), residual stresses due to the curing process (Ha et al., 2001) and the subsequent research on a split- type hub (Ha et al., 2006). The effect of rim thicknesses and angular velocity was studied by Arvin and Bakis (2006) while Fabien (2007) studied the optimal continuous variation of fiber angle in a single-material rotor. Other than that, finite element approaches have also been used for stresses and displacement computations which, though computationally more demanding, have gained importance for the analysis and design optimization of flywheel rotors because of the greater modeling depth offer by such methods. It is also possible to assemble the flywheels as a hybrid with rims of different materials in a sequence of increasing ratio of stiffness per density value E/ÃÆ' Ãƒâ€šÃ‚  for increasing radius, r (Arvin Bakis, 2006) using a method called ballasting. From their studies, with circumferential fiber reinforcement, the radial stress distribution is purely tensile with a maximum located approximately in the midplane between the inner and outer radii. But with two-material rotor, the radial stresses turn compressive in the region near the material interface due to the lower stiffness of the inner material which would result in greater expansion. A compressive stress minimum thus exists at the material interface, with two tensile stress maxima found close to the innermost and outermost radius. Despite the increase in circumferential stress level for the outer composite carbon/epoxy rim, such a condition still arises due to the lower radial stresses as a consequent of rotor strength inc rement. After all, composite materials are generally weaker in the transverse direction than in the longitudinal direction. As fiber reinforcement is typically aligned in the circumferential direction, radial tensile stress is often more crucial in comparison with the other mode of stresses due to the weaker strength in this direction. Thus, the dominating stresses are typically those of the circumferential and radial stresses. In this context, much effort had been invested to enhance the efficiency of the composite flywheel rotors by applying stress reduction methods. In view of this method, Danfelt et al. (1997) suggested a sandwich-like rim lay-up with a compliant material between the composite rims of one material to decrease interlaminar stress transmission. 1.2 Literature Review 1.2.1 Interlaminar stresses of Composite Laminates Interlaminar stresses arise when there are discontinuities in the load path, such as free edges and notches. (Wilkins, 1983). In particular, models with a significant amount of curvature. This is because the presence of high interlaminar stresses due to the effect of shell curvature could result in delamination and possibly failure of the laminate at a lower load than that predicted by in-plane failure criteria had they not been properly accounted for. (Edward, K.T., Wilson, R.S. and McLean, S.K. ,1989; Lagace, P.A., 1983) The accurate determination of interlaminar stresses are thus crucial in the design of laminated composite models as the interfacial surfaces of a laminate represent planes of minimum strength (Pagano, N.J. Pipes, R. B., 1973). Classical laminated plate theory (CLPT) was formed in conjunction with the kinetical assumptions of Kirchhoff classical plate theory by assuming a layerwise plane state of stress. However, 2-D CLPT theory alone is not sufficient to explain stress concentration phenomena in various lightweight constructions in aviation vehicle, such as the free-edge effect where full-scale 3-D and singular stress fields occur in the interfaces between two dissimilar layers along the free edges of thermally and/ or mechanically loaded laminates (Mittelstedt Becker, 2003) which decay rapidly with increasing distance from the laminate edge. Such stress localization problems is caused by the discontinuous change of the elastic material properties of the laminate plies at the interfaces and might result in premature failure of the laminate. This is thus an area of concern by designers and much researched has been done since the early 1970s, with the studies initiated by of Pipes and Pagano on the free edg e effects in laminated structures. Early analytic studies were conducted by Hayashi (1967) on edge stress effects consisting of anisotropic plies and adhesive layers transferring interlaminar shear stresses. In early 1970s, Pagano and Pipes also introduced approximation equations for interlaminar normal stresses in the interfaces and was expanded by Conti/ De Paulis in 1985 for the stress- approximation in angle-ply laminates and the calculation of interlaminar stress distribution through the laminate thickness. Whitney simple stress approximations in 1973 did not fulfill the continuity conditions in the interfaces, although Whitney assumption of products of exponential and trigonometric functions did fulfilled the equilibrium conditions and the given traction-free boundary conditions. Researches in the area of free edge effects were also done using various approaches by Tang and Levy (1975) with layerwise series expansion, Hsu and Herakovich (1977) with edge displacement fields in the form of trigonometric and exponential terms, Wang Dickson (1978) with the expansion of the displacement fields into series of Legendre polynomials. However, much discrepancy has been reported. In 1981, series expansions for the stresses in the inner laminate regions and in the vicinity of the free laminate edges by Bar-Yoseph/Pian.CLPT was recovered in the inner laminates with this zero-order approach and unknown parameters obtained by minimizing the laminate complementary potential. The subsequent work by Bar-Joseph used the principle of minimum complementary potential, leading to an eigenvalue problem. The approach used by Bar-Yoseph allowed the continuity of interlaminar stresses in the interfaces as well as the fulfilment of the conditions of traction free surfaces of the laminate. The force balance method by Kassapoglou/Lagace in 1986 and 1987 was developed. Stresses were assumed to consist of layerwise products of in-plane exponential terms and polynomials through the thickness with adjustments done on the thickness terms to satisfy the continuity of all interlaminar stresses in the laminate interfaces and such that they blend into CLPT in the inner laminate regions. Despite its simplicity, the force balance method exhibited good performance even for thick laminates and was thus further explored and refined by other authors. The effects of transverse shear and continuity requirements for both displacements and interlaminar stresses on the composite interface was accounted for by Lu and Liu in developing an Interlaminar Shear Stress Continuity Theory (ISSCT) capable of being used for finite element formulation (Lu, X., Liu, D., 1990). Through that particular theory, interlaminar shear stress could be obtained directly from the constitutive equations. But as the deformation in the thickness direction was neglected during the formulation of the theory, the interlaminar normal stress could not be calculated directly from the constitutive equations. Other than that, a small discrepancy between the results of theirs and that of Pagano elasticity solution in the interlaminar shear stresses small aspect ratios composite laminates was observed (Pagano, N.J. 1969). Although, rigidly bonded laminated composite materials models are always assumed in conventional analysis; but it must be noted that poor bonding and low shear modulus could result in a non-rigid composite interface. As a continuation of the ISSCT, Lu and Liu (1992) later developed the Interlayer Shear Slip Theory (ISST) based on a multilayer approach in investigating the effect of interfacial bonding on the behavior of composite laminates. The Hermite cubic shape functions was used as the interpolation function for composite layer assembly in the thickness direction, and the closed-form solution is obtained for the cases of cylindrical bending of cross-ply laminates with non-rigid interfaces. However, results shown that at some special locations, namely singular points, the transverse shear stress or in-plane normal stress remains insensitive to the condition of interfacial bonding. A closed- form solution was later derived by Lee and Liu (1992) for the complete analysis of interlaminar stresses for both thin and thick composite laminates subjected to sinusoidal distributed loading. The theory was proven to satisfy the continuity of both interlaminar shear stress and interlaminar normal stress at the composite interface and also the interlaminar stresses could be determined directly from the constitutive equations An accurate theory for interlaminar stress analysis should consider the transverse shear effect and continuity requirements for both displacements and interlaminar stresses on the composite interface. It is also advantageous if the formulation is variationally consistent so that it can also be used for finite element formulation. (Kant, T., Swaminathan, 2000) Using the first order shear deformation theory, the interlaminar stresses in laminated composite cylindrical stripes under dynamic loading are studied. Dynamic equations of equilibrium are solved by a combination of Navier approach and a Laplace transform technique. Dynamic magnification factor is calculated for the stresses and deflections for various types of loading and for different values of the geometric parameters. (Bhaskar, K. Varadan, T.K., 1993). Higher order layerwise theorectical framework has been used by Plagianakos and Saravanos (2008) in predicting the static response of thick composite and sandwich composite plates. The displacement field in each discrete layer through the thickness of the laminate include quadratic and cubic polynomial distributions of the in- plane displacements, as well as the linear approximations assumed by linear layerwise theories in addition to the Ritz- type exact solution used to yield the structural response of the thick structure. The formulation has been found to be especially robust in comparison to linear layerwise theory due to the number of discrete layers used to model the thick laminate through thickness and in the prediction of interlmainar shear stresses at the interface. In addition, the theory used also offers a better range of applicability due to the better accuracy offered. Over the years, many papers investigating the effects of interlaminar stresses had been published. The finite difference method with classical elasticity theory was used by Pipes and Pagani for determining the behaviour of finite width laminate in uniform axial strain and where interlaminar stress at the free edge is found to be of a significantly huge amount. Other studies soon ensued such as the perturbation solution techniques by Hsu and Herakovich, the finite difference method using large elements with complex stress field by Rybicki; and Wang and Crossman finite difference method, as well as the approximate analytical solution by Pagano and Wang and Choi. However, all of these studies involve the interlaminar stresses at the free edges of finite composite laminates. It is however, well acknowledged that interlaminar stresses arise such as to satisfy equilibrium at locations with in-plane stress gradients (Saeger, Lagace Dong ,2002), and material discontinuity within a structure is another source of arising in plane stress gradients, and therefore, interlaminar stress appear near the material discontinuities. (Tahani, 2005) Rose/ Herakovich, in 1993, further explore the force balance method of Kassapoglou/Lagace with the introduction of additional terms for the consideration of the discontinuous change of the elastic material properties in the interfaces and which accounted for the local mismatches in Poisson ratio and coefficient of mutual influence between adjacent layers. There are reported improvements in the resultant stress field. However, such improvements are also accompanied with a more demanding computational effort for the minimization of the complementary potential. In a similar study done by Kim/Atluri in 1995, thermal and mechanical loads were analyzed by assumed stress shapes which also accounted for both the local mismatches in Poisson ratio (similar to that of Rose/ Herakvich) and coefficient of mutual influence by applying respective mismatch terms in the stress representations. An approach that agreed to equilibrium demands and the given boundary conditions, the unknown stress functio ns were determined by application of the principle of minimum complementary energy of the laminate. The principle of minimum complementary theory was used by Bhat and Lagace (1994) to evaluate the interlaminar stresses at material discontinuities. In their analytical model, the laminate is formed by the merging of two area