Thursday, October 31, 2019

Terrorism in Sudan Essay Example | Topics and Well Written Essays - 1250 words

Terrorism in Sudan - Essay Example This research will begin with the statement that terrorism is one of the most complex problems facing the modern world at present. It is difficult to tackle terrorism effectively because of the wide spread roots of terrorism in different countries. Afghanistan, Pakistan, Iraq, Sudan etc are some countries from which the terrorists are operating. At present war on terror is going on in Iraq, Afghanistan, and Pakistan. However, Sudan has not faced such problems even though its role in encouraging terrorist activities suspected for the last few years. â€Å"The U.S. has charged the Sudanese government of being liable for the al-Qaeda attack on the USS Cole missile destroyer in 2000†. Moreover, U.S. believes that Sudan is supporting various terrorist organizations in many ways to conduct attacks in various parts of the world including America. Since Sudan is a country with a poor economy, it is easy for the terrorists to operate from its soil. It should be noted that poor countrie s normally have weaker administration and hence terrorists may not face many problems while operating from such countries. Poverty, unemployment, lack of education of the people, religious fundamentalism etc are some of the major factors which contribute heavily to the development of terrorism in Sudan. Sudan is a strategic location for many of the terrorists. Majority of the people in Sudan are Muslims and they do not have enough education. Moreover, it borders with some of the prominent Muslim states like Egypt, Libya and some of the Muslim dominated African countries. Religious fundamentalism is widespread in Sudan because of lack of education of its public. These are the factors, which encourage Osama Bin Laden and his followers to select Sudan as his country of operation in the 1990s. America knows very well that Sudan is playing a major role in the spreading of various kinds of terrorist activities all over the world. It is believed that Sudan is currently providing military training and support to terrorist organizations such as Hezbollah, Hamas, Palestinian Islamic Jihad, Egyptian Islamic Jihad, Algeria's Armed Islamic Group etc. Moreover, many of the Islamic terrorist groups in other parts of the world are sending their people to Sudan for getting proper training on conducting terrorist activities. The current Sudanese president is behaving like a dictator and he is using iron fist to suppress the agitations against his administration. Because of that, internal problems and political unrest are common in Sudan. The northern and southern regions of Sudan are behaving like independent states even though the current president is trying hard to stamp his authority all over Sudan. America has enforced lot of economic embargos and sanctions with the help of UN against Sudan for the last few years. They have also listed Sudan in the category of State Sponsors of Terrorism from 1993 onwards. From 1996 onwards, Sudan is under diplomatic sanctions by the UN.â€Å"The U.S. government offered to take Sudan off its State Sponsors of Terrorism list in exchange for the northern government allowing a referendum on southern secession to take place without obstruction† (U.S. Offers to Remove Sudan from State Sponsors of Terrorism List, p.39). However, the northern government is not much i nterested in this offer and hence internal agitations are still going on in Sudan. â€Å"In 2008, the International Criminal Court at The Hague charged Sudanese President Omar Hassan al-Bashir with crimes against humanity and genocide in Darfur† (National Security p.86). In fact, the ICC issued arrest warrant against the president in 2009. Even though human right activists have seen this arrest warrant as a positive step, so far the president has been successful in avoiding or ignoring the arrest warrant. Al-Bashir’s anti-American or anti-western stands are inspirational to the terrorists in Sudan. His remarks against America and

Tuesday, October 29, 2019

Business Law Conference Research Paper Example | Topics and Well Written Essays - 500 words

Business Law Conference - Research Paper Example icials claimed that if they validated the results they could in turn be sued by a minority community for developing a practice that disadvantaged the minority groups (Supreme Court of the US 2008). The use of disparate treatment as an alternative to disparate impact has to be strongly justified based on evidences and reasonable standards (remedial action). The Judge rejected the claim that the Department did not discriminate but said that the Department was involved in making a decision based on race, which was more like disparate treatment. IF there is a conflict between disparate treatment and disparate impact, then disparate treatment should be avoided based on clear and outright evidences and standards. Title VII, Civil Rights Act of 1964: â€Å"Title VII prohibits employment discrimination based on race, color, religion, sex and national origin. The Civil Rights Act of 1991 (CRA) and the Lily Ledbetter Fair Pay Act of 2009 amend several sections of Title VII.† By invalidating the results, there was an impermissible disparate impact, which in turn amounted to a racial preference, and was against Title VII. The Court gave a decision in favor of the 12 firefighters claiming that invalidation of their test results was a violation under Title VII. Another judge mentioned that the court failed to provide a clarification between the provisions of disparate impact under Title VII and the equal protection clause under the US Constitution (14th Amendment). Other evidences suggested that there were many flaws in the testing system adopted by New Haven, and if the testing system was better, the results outcome was have not been skewed. The court found the racial decision making adopted by New Haven Department as discriminatory and hence had to reinstate the results. However, it was also found that the testing system adopted by New Haven was improper compared to that of other Departments. However, this was not a basis invalidating the results obtained by the White

Sunday, October 27, 2019

Pure Enantiomers of Phenylethylamine Mixture

Pure Enantiomers of Phenylethylamine Mixture Introduction The purpose of this laboratory was to resolve the pure enantiomers of ( ±)-ÃŽ ±-phenylethylamine (racemic) mixture, by separating their diasteriomeric derivatives using (+)-tartaric acid. The differing enantiomers form different salts with acids. Two molecules that are enantiomers have nearly identical physical and chemical properties although this may be true, the salts that are formed after the reaction with acid have distinct properties. Some salts are less soluble [(+)(-)] than others, and therefore crystallize from the mixture in a nearly pure stereoisomeric form. When using NaOH as a strong base to treat the salt, it allows for the isolation of the enantiomer (Lab Manual, 2007). Polarimetry is a common method used to distinguish between enantiomers, based on their ability to rotate the plane of polarized light in opposite directions (+ and -). This allows the observer to determine the enantiomeric purity, and therefore the composition of the mixture (Wade, 2007 Chemical Reaction: (-)-amine (+)-amine less soluble salt [(-)(+)]: crystallizes more soluble salt [(+)(+)] remains in solution 2NaOH + 2H2O (-)-ÃŽ ±-phenylethylamine (Lab Manual, 2007) Procedure: Instead of using a 50 mL beaker to boil the amine solution in, we used a 50 mL Erlenmyer flask For the rest of the proceduce refer to pg. 18, 22-24 (Lab Manual, 2007) Observations: The crystals were given a 4 week crystallization period and afterward, the (-)-ÃŽ ±-phenylethylamine- (+)-hydrogen tartrate salt was observed to be a white crystalline solid, and the methanol was a transparent liquid. Two very distinct layers were visible following the reaction with the NaOH (strong base) and addition of the methylene chloride (CH2Cl2). The top layer was translucent in some places and opaque in others, very cloudy, white liquid, while the bottom layer was transparent and also liquid. The resultant mixture following the three separate extractions was close to transparent Discussion: When the (+)-tartaric acid was added to the racemic mixture, ( ±)-ÃŽ ±-phenylethylamine, (-)-amine-(+)-hydrogen tartrate, and (+)-amine-(+)-hydrogen tartrate salts were formed. The (-)-amine-(+)-hydrogen tartrate was much less soluble in methanol, and therefore crystallized out of the solution (Lab Manual, 2007). This method of separation was proven to be quite successful, as the percent yield of this crystallization was 73.1 %, which is relatively high. The presence of impurities, as well as the inability to completely crystallize the salt from methanol most likely attributed to any discrepancies. It is also possible that although the (-)(+) salt is less soluble than the other salts, it still has some sort of solubility, and therefore crystallizes rather slowly (hence the mandatory 2 week waiting period, in our case it was 4 weeks). As well, the other salts, despite their high solubility in methanol, may have still crystallized very slightly over the long waiting period, adding to impurities Addition of NaOH resulted in the formation of two distinct layers: a white, cloudy aqueous layer (top), and a clear amine layer (bottom), and allowed for the isolation of (-)-ÃŽ ±-phenylethylamine (Lab Manual, 2007). The addition of 5 mL of water to the flask confirm that the top layer was the aqueous layer, since it increased relative to the bottom layer and the water was absorbed here (Lab Manual, 2007). The aqueous layer consisted of the (-)-amine, along with sodium tartrate, and water, while the amine layer included any impurities. The sodium tartrate readily dissolved in water, while methylene chloride (CH2Cl2) was added to dissolve (-)-ÃŽ ±-phenylethylamine (boiling point ~ 186oC), since it had a lower boiling point (40oC), and could easily be removed through heating (Synthesis and resolution of alpha-phenyethylamine. After a filtration process, including a series of extractions, there was percentage yield of 61.3% for the (-)-ÃŽ ±-phenylethylamine, which is a lower yield than the original 73.1 %, indicating that there was a loss of amine during the second part of the experimental procedure. The main cause of this error was the accidental disposal of much of the amine layer, in which a small amount of (-)-ÃŽ ±-phenylethylamine was still present. The presence of some impurities may have also affected results, however, they would have instead increased the yield and lead to misleading results. Another possible cause of error is the slight leakage out of the glass stopper on the separatory funnel when the solution was shaken. There was a bit of solution that leaked out the bottom or squirted out the top when releasing the pressure in the funnel. Subsequently, the error that substantially lowered the yield of the product greatly increases the optical purity of the mixture. The observed rotation of the final sample was -31. 8o (levorotary, left hand rotation) and the specific rotation was -33.8o compared with the empirical specific rotation of -40.4o  ± 0.2o (Lab Manual, 2007). The resultant optical purity was 83.7%, which is considerably high. Aside from the previously mentioned disposal of the organic layer, numerous other errors, such as the presence of impurities may have contributed to deviations in the optical purity. The negative (counter clockwise) rotation essentially confirmed that the enantiomer being isolated was the (-)-ÃŽ ±-phenylethylamine, and the high optical purity demonstrated that the extraction was accomplished with much success and considerable accuracy, since the final product was mainly (-)-amine, despite the relatively low yield.

Friday, October 25, 2019

Plotinus, Augustine, Aquinas, K.Wojtyla on Person and Ego Essay example

Plotinus, Augustine, Aquinas, K.Wojtyla on Person and Ego ABSTRACT: Today the connection between "person" and the "I" is acknowledged in many respects but not always analyzed. The need to relate it to the reality of the human being has sparked the present investigation of the philosophical anthropology of four thinkers from the late ancient, medieval, and contemporary periods. Although it may seem that the question of the role of the "I" with respect to the human being hinges on the larger problem of objectivity v. subjectivity, this does not seem to be the case. Many topics, however, are necessarily entailed in this investigation such as individuality and universality, soul and body, consciousness and action, substance and history, the self and the other, the metaphysical and the phenomenological, and experience and the ethical. At the end of this study we arrive at more than a grammatical use of the "I." From reflection on the contributions of Plotinus, Augustine, Aquinas, and Wojtyla, the ontological role of the "I" is identified. In doi ng so, one realizes that the ontological does not forsake the concrete, but penetrates it more deeply. Indeed, that was what Plotinian philosophy claimed to be doing: recognizing the richness of human reality. A common interpretation of Plato's theory of human reality is to identify it with "soul." It has been for some a problem as to whether or not Plotinus adhered to his master's position on this point. H. J. Blumenthal initiated much discussion when he asked: "Did Plotinus believe in Ideas of Individuals?" (1) Supported by apparently contradictory texts Blumenthal concluded that Plotinus did believe at times in such ideas, and at other times did not. One way that commentators take in s... ..., De Genesi ad litteram VII.27.38. (10) Augustine, De anima et ejus origine IV.2.3. (11) Augustine, De Trinitate XII.4.4; VII.6.11. (12) Augustine, De Trinitate XV.5.7; Epistula 137.3.11; De civitate Dei V.11. (13) Augustine, De civitate Dei XXI.7. (14) Thomas Aquinas, St. Summa Theologiae I,29,3,c. (15) Thomas Aquinas, St. op.cit. I.29, ad 2. (16) F.D. Wilhelmensen, "The "I" and Aquinas" Proceedings ACPA, v. 51, 1977, p. 51 (17) Thomas Aquinas, St. Summa contra Gentiles I.65. (18) Augustine, De Trinitate X.11; Thomas Aquinas, Summa Theologiae I.87,3,c. (19) Wilhelmsen, op. cit. p. 55. (20) K. Wojtyla, "The Personal Structure of Self-Determination," Tommaso D'Aquino nel suo VII Centenano, Roma, l974, 379-390. (21) K. Wais, Metafizyka, 1924. (22) M.T. Clark, "An Inquiry into Personhood," Review of Metaphysics, 46, 1, 1992,3-28.

Thursday, October 24, 2019

Computer Security Measures Essay

The Problem and Its Scope The Internet and computer networking means that there is a need for new security measures to reduce the threats and challenges inherent from these new technologies and software applications and network devices. Information, network equipments, transmission media, computer systems, and servers are subject to threats. â€Å"Yet the use of information and communication technologies has increased the incidents of computer abuse.† Computer security involves safeguarding computing resources, ensuring data integrity, limiting access to authorized users, and maintaining data confidentiality. Effective computer security therefore involves taking physical security measures (to ensure hardware and media are not stolen or damaged), minimizing the risk and implications of error, failure or loss (for example by developing a resilient back-up strategy), appropriate user authentication (for example by employing strong pass wording), and possibly the encryption of sensitive files. We live in a world where â€Å"information wants to be free† and in which people are getting used to having access to whatever information they want anytime, anywhere and from a wider range of computing devices. Unfortunately, in terms of the security and control of the resources to which computers permit access, this can prove quite a problem. Indeed, many users unfortunately often view security and control measures as inhibitors to effective computer use. The student’s awareness about computer security measures can be a big help to them to acquire some knowledge about protection of their digital asset. In this sense, the students acquire knew knowledge on how to use computer security measures in order to protect all the data stored in their computer system. Because of the computers evolution, the researchers want to share the implications on how important the computer security measures, so that the respondents will be able to know on how to handle some cases in the future. Globally, the most used computer security measures are Anti-virus programs are the most frequently used tools to protect computer systems, and they must be upgraded regularly to protect against any new viruses. Firewall  is different from anti-virus software, which simply verifies that a file is virus free. You can also add an anti-spy ware program. Spy ware is a small program downloaded onto your computer via the internet, usually with your approval, to collect information. Anti-spy ware operates a lot like an anti-virus program, but its role is to prevent malicious spy ware (or malware) from sneaking onto your computer and transmitting your personal data. Firewall intercepts and controls traffic between networks with differing levels of trust. It is part of the network perimeter defense of an organization and should enforce a network security policy. By Cheswick’s and Bellovin’s definition, it provides an audit trail. A firewall is a good place to support strong user authentication as well as private or confidential communications between firewalls. As pointed out by Chapman and Zwicky [2] , firewalls are an excellent place to focus security decisions and to enforce a netw ork security policy. They are able to efficiently log internet work activity, and limit the exposure of an organization. The exposure to attack is called the â€Å"zone of risk.† If an organization is connected to the Internet without a firewall, every host on the private network can directly access any resource on the Internet. Or to put it as a security officer might, every host on the Internet can attack every host on the pri vate network. In the Philippines, some of the businesses are employing security products, such as intrusion detection system and firewalls, and other internal controls which are meant to safeguard, physically and logically, all servers and information systems, including the data stored in the systems. In Davao City, many colleges’ offers IT courses and one of these schools is the Holy Cross of Davao College. Some computer security measures used in some colleges are anti-virus, firewall, ad ware, spy ware and etc. This help to secure data from viruses, unauthorized a ccess, hardware failure and hardware theft. Rationale of the Study The term Information Technology is the area of managing technology and spans wide variety of areas that include computer software, information systems, computer hardware, programming languages but are not limited to things such as processes, and data constructs. In short, anything renders data,  information or perceived knowledge in any visual format whatsoever, via any multimedia distribution mechanism, is considered part of the Information Technology (IT) domain. Computer security is to prevent or detect unauthorized actions by users of the system. The protection of data stored in your computer system. The protection of data (information security) is the most important. The protection of networks is important to prevent loss of server resources as well as to protect the network from being used for illegal purposes. The objective of this study is to know the level of awareness and utilization of all first year BSIT students in terms of computer viruses, unauthorized access, and hardware failure and hardware theft. Theories and Concept This study was anchored on the concept of Dynamic awareness theory (DAT) offers an alternative to explaining the creation of awareness in distributed work groups. DAT highlights the important role of users and social practices in awareness creation. The theory further points to the dynamic nature of awareness creation: Awareness emerges over time and depreciates when not being actively attended to by the users. A person’s awareness is not a static state which can be arbitrarily turned on and off. It is rather a slow build-up of information about his surroundings (Kai Riemer, Russel Haines, 2008).  This theory of awareness is use to conceptualize each individual of their daily awareness about what happen in their community, because awareness requires active maintenance because it diminishes over time. Independent variable Dependent variable Figure 1. Conceptual Framework Showing the Variables of the Study The response of the first year BSIT students in the level of awareness and utilization about computer security measures in terms of Virus, Unauthorized Access, Hardware Failure and Hardware Theft depends with the experiences  they encountered in their system in which it is the basis of the reasons for the awareness of the students. Statement of the Problems 1. What is the level of awareness of the respondents about computer security measures against the following threats: a.Virus b.Unauthorized access c.Hardware failure d.Hardware theft 2. What is the level of utilization of the respondents on computer security measures? 3. What is the most practiced computer security measure by the respondents? 4. What is the least practiced computer security measure by the respondents? 5. Is there a significant difference between the level of awareness and utilization of the computer security measures by the respondents? Method The researches conduct this type of research in order to obtain certain information about the computer security measures. The researchers used descriptive assessment method in order to meet the objective of the study. To gather data, the researchers use these procedures in order to analyze the data that has been collected. Research Design In order to determine the level of awareness and utilization about computer security measures, the descriptive assessment method of research is used. This is used by the researches because the objective of this study is to determine the level of awareness and utilization within the first year BSIT students without affecting them in any way. Descriptive research design exhibits specific subject and as precursor to more quantitative studies. The actual survey is conducted during the second semester of the year 2011-2012. The procedure used is carefully, analyzed in order to obtain accurate information. Research Environment The researchers conducted a research to a certain private school. The Holy Cross of Davao College is located at Sta. Avenue Davao City. The respondents of this research are all first year BSIT students. Respondents of the Study To achieve the desire information, all first year BSIT students of Holy Cross of Davao College were the participants of the study. They were chosen because they are not more knowledgeable compared to the higher years. The selected numbers of respondents were expected to give their honest answers. Research Instruments In this study, the researches use questionnaire as research instrument. It is most common instrument or tool of research for obtaining data beyond the physical reach of the observer.  Part I of the questionnaire is the level of awareness of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Part II of the questionnaire is the level of utilization of all first year BSIT students towards computer security measures in terms of Viruses, Unauthorized access, Hardware Failure and Hardware Theft. Data Gathering Procedures In gathering data procedure, first the researchers conceptualized what study to conduct and arrived to a research title â€Å"Level of Awareness and Utilization of All First Year BSIT students about Computer Security Measures†. The research title was approved by the research adviser with the panel of examiners. After the approval of the title, a questionnaire was established to answer the research study was validated. Data Analysis The following statistical tools were employed to answer pertinent problems of the study, as follows: Frequency Count: This tool was used to count the number of items of the respondents who are aware and unaware about the computer security measures and its utilization. Weighted Mean: The weighted mean is similar to an arithmetic mean (the most common type of average), where instead of each of the data points contributing equally to the final average, some data points contribute more than others. The notion of weighted mean plays a role in descriptive statistics and also occurs in a more general form in several other areas of mathematics.

Wednesday, October 23, 2019

Advanced Level Diploma in Diabetes Essay

INTRODUCTION Together with an identified fellow student a written patient education report regarding a planned diabetes group education is to be completed and presented during a seminar. A suggestion is to study the text book: The Art of Empowerment by Anderson & Funnell (2005). Diabetes group education In UAE diabetes self-management education has been highlighted as a cornerstone in diabetes care (Al-Maskari et al 2013). In order to get patients to manage their diabetes it is needed to arrange possibilities for special diabetes group education sessions for persons with diabetes. Many patients in UAE might have poor metabolic control and they have poor knowledge regarding why. Furthermore many people need to increase their ability to perform life style changes (Alhyas et al 2013). The traditional diabetes education was based upon telling patients what to do. However, the more was learnt about diabetes education the focus has turned more to the patients ´ views of living with diabetes (Anderson & Funnell 2005). Considerations when arranging group sessions for persons with diabetes: Theoretical educational approach – your own pedagogical view and ability; in this circumstances you must have the nosogogic perspective (an adult person with a chronic disease). Setting, time, day of the week Budget, cost, payment, and fees Who and number of participants in each group How often the group meets and where How you start a group session How you interact/communicate with group members Any learning aids to use How you put/initiate questions in the group How you evaluate the different sessions How you work with and approach group discussions What you do to get all patients involved in the sessions Assessment Altogether the report should consist of approximately 6– 8 pages (not including the first page and the reference list). Your proposed group education plan will be presented and discussed with your peers during the tutorial session. After the tutorial session each plan will get written feed-back from the examiner. Grounds for assessment by examiners will be presented and published on ITSL. C2 – Assignment 3 Group education plan/BS/AMW/18 August, 2014 Page 2 REFERENCES Al-Maskari F, El-Sadig M, Al-Kaabi J et al. (2013). Knowledge, attitude and practices of diabetic patients in the United Arab Emirates. PLOS One Vol 8, 1p 1-8. Alhyas L, Jones Nielsen J D. Dawoud D and Majeed A. (2013). Factors affecting the motivation of healthcare professionals providing care to Emiratis with type 2 diabetes. J the Royal Society of Medicine. Doi: 10.1177/2042533313476419. Anderson B & Funnell M. (2005). The art of empowerment. Stories and strategies for diabetes educators. ADA- American Diabetes Association. Hornsten A, Stenlund H, Lundman B et al. (2008). Improvements in HbA1c remain after 5 years – a follow-up of an educational intervention focusing on patient ´s personal understandings of type 2 diabetes. Diabetes Research and Clinical Practice. 81 (1), p50-55. Juul L, Maindal HT, Zoffmann V, Frydenberg M, Sandbaeck A. (2011). A cluster randomized pragmatic trial applying self-determination theory to type 2 diabetes care in general practice. BMC Fam Pract Nov 24, 12:130. Wikblad K, Leksell J, Smide B. (2004). â€Å"I’m the boss’: testing the feasibility of an evidence-based patient education programme using problem-based learning. European Diabetes Nursing, Vol 1 (1) p 13-17.