Monday, December 30, 2019

HEROISM IN THE ILIAD Essay - 1046 Words

In the Iliad there are many characters that could be considered heroic. But the two main characters that stand out as heroes to me are swift-footed Achilles and flashing-helmet Hector. Numerous times throughout the epic they display qualities and traits that are unsurpassed by anyone on their side. Many times throughout the epic Achilles and Hector are tested for their strength, and will to win in battle, which for both warriors always ends up positive because they always win their battles. Although both fighters are among the elite status in the armies, they each show human and god-like qualities that help them be as a fierce and feared as possible. As soon as we are exposed to Achilles in battle, it is obvious why he is the hero of the†¦show more content†¦Ã¢â‚¬Å"Would to god you could linger by your ships without a grief in the world, without a torment! Doomed to a short life, you have so little time.† (Homer book 1 line 496) All of these facts add up to Achilles having a clear-cut advantage over the opposition. Another smaller reason for Achilles heroism is his sense of responsibility. A prime example of that is when Patroclus dies. He takes immediate responsibility for Patroclus’ death, and instantly vows to take revenge on Hector for it. When you put all these details together it adds up to the heroism of Achilles throughout the entire epic. The other hero of The Iliad is Hector. He is still a major hero of the story but for much different reasons. Unlike Achilles he is not invincible or half-god. Hector is a hero because of his intangible characteristics that propel him to success. For his country, Hector represents qualities like honor, duty, and pride. Another reason for Hectors heroism is his devotion and loyalty to whatever cause he is fighting for. Unlike his brother Paris, who takes a break from war in the middle, Hector does not stop fighting until there is no more to be fought about. â€Å"Come, now for attack! We’ll set all this to rights, someday, if Zeus will ever let us raise the winebowl of freedom high in our halls, high to the gods of cloud and sky who live forever-once we drive these Argives geared for battleShow MoreRelatedEpic Heroism And Values Of The Iliad1030 Words   |  5 PagesHope Schoenhut DWC 101: Paper 1 November 1, 2017 Epic Heroism and Values of the Greek and Roman Culture The image of Achilles killing Hector and the image of Aeneas killing Turnus classify them as epic heroes. In the Greek epic poem the Iliad, Homer portrays Achilles as an enraged warrior fighting for revenge for a woman he loved. In the Roman epic poem the Aeneid, Virgil portrays Aeneas as fleeing the city of Troy to establish a new city. Achilles and Aeneas are epic heroes because they bothRead MoreAnalysis Of Homer s Iliad, Heroism801 Words   |  4 Pages​In Homer’s Iliad, heroism plays a major role in the two idols the reader will side with; Achilles or Hector. Society’s image of a hero demands for an altruistic, strong, and compassionate figure, but Homer refutes this idea of a hero. Homer’s Iliad demonstrates that in a realistic society, there is no such thing as a complete hero, and that true heroism does not exist. ​Achilles, the Achaean trophy soldier, was the creation of a mortal named Paleus and of a Goddess named Thetis. Because of his immortalityRead More The Paradox of Heroism in Homer’s Iliad1951 Words   |  8 PagesThe Paradox of Heroism in Homer’s Iliad The Iliad presents a full range of valorous warriors: the Achaians Diomedes, Odysseus, and the Aiantes; the Trojans Sarpedon, Aeneas, and Glaukos. These and many others are Homer’s models of virtue in arms. Excelling all of them, however, are the epic’s two central characters, Achilleus, the son of Peleus and, Hector, the son of Priam. In these two, one finds the physical strength, intense determination, and strenuous drive that give them first placeRead MoreEssay about Immense Heroism in Homer’s Iliad1664 Words   |  7 PagesImmense Heroism in Homer’s Iliad The Iliad opens with the anger of Peleus son, Achilleus, (1.1) and closes with the burial of Hektor, breaker of horses (24.804).1 The bracketing of the poem with descriptions of these two men suggests both their importance and their connection to one another. They lead parallel lives as the top fighters in their respective armies, and, as the poem progresses, their lives and deaths become more and more closely linked. They each struggle to fulfill the heroicRead MoreHeroism Depicted Throughout The Epic Poem, The Iliad And The Knights Tale866 Words   |  4 PagesHeroism is shown through the ages in a variety of areas all over the world. One of the greatest examples of how heroism is depicted within a literary work is in Homer’s epic poem, The Iliad. Although the ideals of heroism are apparent in the poem, it is important to understand how the same theme can be seen through other works of literature. The Knights Tale, which is one of the greatest stories that Chaucer’s Canterbury Tales has to offer. The Iliad and The Knights Tale are both stories that containRead MoreA Dynamic Greek Epic Poem Iliad1354 Words   |  6 PagesAncient Greek History is very well known as fascinating due to its many civilization and great heroic people surrounding their history. A dynamic Greek epic poem Iliad portrays the siege of Troy, attributed to Homer. Adventurous and braveness with god-like qualities describe an ancient classic Greek hero in this poem. Iliad is known now as one of the oldest in two surviving ancient Greek epic poems relating the events near the end of Trojan War. Hero’s are known as important figures inRead MoreThe Epic Poem Of Troy1356 Words   |  6 Pages The Ancient Greek History is famous for its many fascinating civilization and great heroic people surrounding the history. Iliad portrays the siege of a dynamic ancient Greek epic poem of Troy, which is attributed to Homer. Adventurous and braveness with god-like qualities is used to describe the ancient classic Greek heroes in this poem. Iliad is now known as one of the aged surviving ancient Greek epic poems, which directly relates to the events near the end of Trojan War. HeroicRead MoreThe Iliad And The Odyssey1317 Words   |  6 PagesThroughout The Iliad and The Odyssey, both Achilles and Odysseus go through intense acts of heroism, internal and external hardships, and fluctuations in confidence. During the epic, The Odyssey, the main character, Odysseus, has to endure many hardships which show. He has to show tremendous amounts of heroism and confidence just to keep his crew and himself alive. He has to rival and face many gods that despise him along with many humans. This theme can also be reflected from Homer’s The Iliad, where theRead MoreThe Iliad, By Homer1141 Words   |  5 PagesThe Iliad, along with the Odyssey, is one of two epics handed down through the Homeric tradition in the Greek Dark Ages, considered by many to be the Heroic Age. However, the key issue lies with the fact that ancient Greeks define a ‘hero’ very differently from what we would consider a ‘hero’ to be today. In ancient Greec e, a hero is any human descended from the gods and bequeathed with superhuman abilities. By this definition, Achilles is immediately classified as a hero, no matter his actions.Read MoreThe Heroes Of The Epic Of Gilgamesh1215 Words   |  5 Pagesof Gilgamesh is prideful and selfish in his conquests. Achilles in The Iliad drug his enemy’s body around his friend’s funeral pyre for days on end. Heroines in ancient literature are closest to what is considered a hero today, even if their methods are unconventional. Lysistrata in Lysistrata leads a sex strike in order to end a war, and Antigone in Antigone nobley buries her brother despite it being unlawful. Feminine heroism, as seen in Lysistrata and Antigone, has a more straightforward plan to

Saturday, December 21, 2019

Edc1100 - Society Begins at Home - 2682 Words

EDC1100 Lifespan Development and Learning Course Examiner: Dr Patrick O’Brien Tutor: Ms Linda De George Walker Critical review of Society begins at home By Sally Weale Due Date: May 30, 2011 Word Count: 1557 The article, Society begins at home, written by Sally Weale for The Age on May 9 2010, takes an objective look at two books written by author Sue Gerherdt, Why Love Matters: How Affection Shapes a Baby’s Brain and The Selfish Society. Weale emphasizes Gerherdt’s main objectives of both books, being how environment and experience at the start of life and through early childhood, namely childcare, effect a child’s development and ultimately society. This essay will analyse and evaluate four issues raised throughout†¦show more content†¦Weale (2010) writes, the people we become are fundamentally shaped by our earliest experiences and, in particular, the sort of love and attention we receive from our parents/carers. This statement would be of great interest to ethological theorist John Bowlby, formulator of the attachment theory which today is considered by many as the most persuasive theory of early emotional development (Oppenheim amp; Goldsmith, 2007). Bowlby was a strong believer that children required a warm continuous relationship to a mother figure or caregiver and without it they would become emotionally damaged (Penn, 2008, Pg 54). Bowlby theorized that the first attachment a child experiences in the first 6 months of age is most likely to a parent but could be to that of a grandparent or even sibling. Evidence from many studies on parent-child relationships, suggest significant associations between early secure attachment to later good functioning, and early insecure attachment to later emotional and behavioural difficulties (Prior, 2006, Pg 168). The toddler who has a secure attachment that she can rely on for comfort and support is more likely to trust others and be supportive than the toddler whose has an insecure attachment and is ignored, abused or belittled (Shonkoff amp; Phillips, 2000). Non-parental child care is in today’s economy somewhat unavoidable. What effects does this care have on development? Lev Vygotsky would strongly argue that childcare is essential

Friday, December 13, 2019

Los Zetas Free Essays

RUNNING HEAD: Los Zetas Nolita Oliveira Wayland Baptist University Dr. Paul Lankford Borderland Beat Reporter Overmex (2010, August 26), reported 72 illegal immigrants from El Salvador, Honduras, Ecuador and Brazil, were found dead on a ranch in San Fernando, Tamaulipas, which is 150 km from the U. S. We will write a custom essay sample on Los Zetas or any similar topic only for you Order Now border city of Brownsville. This discovery came from one survivor who found his way to the Navy troops and reported members of the Los Zeta cartel at the nearby ranch. According to the Borderland Beat; 21 rifles, six 5. mm M4 carbines, three 7. 60 mm AK-47, seven 12 gauge shotguns, five . 22 caliber rifles, 101 magazines, two ammunition belts, six thousand 649 cartridges of various calibers, four bullet proof vests, one helmet, four trucks, one with the Ministry of National Defense (SEDENA), were also found at the ranch. With such a rich supply of ammunition and a massacre of men and women with their hands and feet tied, the question remains, how have the Los Zetas become so powerful? Los Zeta’s was originally founded by a group of highly trained Mexican Army Special Forces deserters and has expanded to include corrupted former federal, state, and local police officers hired by Mexico’s Gulf Cartel (Los Zetas, 2010, November 22). The group originally consisted of 31 members with the first leader, Lieutenant Arturo Guzman Decena using his Federal Judicial Police radio code to become identified as Z1. This code was given to high-ranking officers for the Commanding Federal Judicial Police Officers in Mexico. Zeta is also named for the letter in Spanish. Decena was born in 1976 and trained with an elite Mexican military group called Grupo Aeromovil de Fuerzas Especiales (GAFE) which were trained in counter- insurgency and locating and apprehending drug cartel members, with Decena came 30 other GAFE deserters. Decena was killed in 2002 and his second-in-command Z2 was captured in 2004 (Decena, 2010, November 27). The current leader is Z3 Heriberto Lazcano. Los Zeta’s was originally hired to track down and kill rival cartel members and provide protection for the Gulf Cartel. Their power has grown and their savagery has had no boundaries. In 2003 Los Zetas negotiated a pact with the Gulf Cartel and the Beltran –Leyva Cartel to engage their own drug shipments (Los Zetas, 2010, November 22). Seven years later after the pact, Los Zetas have violently turned against their former partner, the Gulf Cartel, and have formed alliances with the Juarez Cartel, Tijuana Cartel and the Beltran- Leyva Cartel. The other major faction alignment includes the Gulf Cartel, Sinaloa Cartel, and La Familia Cartel. In response to the Los Zeta’s savagery the Sinaloa Cartel hired another armed enforcer gang, Los Negros, to fight back. Los Negros have also turned their back and become independent are gaining more control of regions. As with other terrorist organizations, such as al Qaeda, there are roots to the source of the evil. According to Brookes (2005), it is important to understand the many reasons for the terrorist phenomenon includes radical religious ideology, poor governance, a lack of economic opportunity, social alienation, demographic pressure, and political isolation (page 11). Although Los Zeta’s. Los Negros, or other Mexican Cartels have not been listed as terrorist organizations by the U. S. Department of State their actions are in compliance with the different definitions of terrorism. Narcoterrorist would describe what these Mexican Cartels are. The statutory definition used by National Counterterrorism Center NCTC states that terrorism is premeditated, politically motivated violence directed against non-combatants (Benjamin, D. 2010,August 5). According to Narcoterrorism (2010, December 6), former Peru President coined the term narcoterrorism when describing terrorist-type attacks against nation’s anti-narcotics policy. The term was originally understood to mean â€Å"the attempts of narcotics traffickers to influence the policies of a government or a society through violence and intimidation and to hinder the enforcement of the law and the administration of justice by the systematic threat or use of such violence (Narcoterrorism). FARC, ELN, Hamas, Taliban, and AUC in Colombia, and PCP- SL in Peru are all known terrorist organizations that engage in drug trafficking activity to fund their operations and gain recruits and expertise. Describing the horrific killing and torturing tactics Los Zetas use against their countrymen, government, innocent men, women, and children could be best described as simply terrorist, the best term when describing them would be narcoterrorist. Their battle against their own and the United States is not deeply rooted to a religion or some other similar ideology known terrorist organization’s base their practice on. These cartels are simply money hungry, power tripping, double crossing, unfaithful to any cause, and will burn their own to reach their desired level. The War on Drugs is not a new concept simply invented overnight by someone to calm people down or put the fear into those pushing and selling. According to Head (2011), there is a history dating back to the early 1900’s when the Harrison Tax Act of 1914 was enforced to restrict the sale of heroin and cocaine. The Marihuana Tax Act of 1937 attempted to tax marijuana because it was an alleged â€Å"getaway drug† for heroin uses and was popular among Mexican- American immigrants. President Eisenhower was considered the first president to literally call for a war on drugs and he stressed his determination by establishing mandatory minimum federal sentences for possession of marijuana, cocaine, and opiates. The increase in federal penalties was under the Narcotic Control Act of 1956. Today the war on drugs has made it difficult to determine what is legal and illegal. Depending on the drug and the wording of drug policy legislation, narcotics are illegal except when prescribed to a certain individual. In 1996 California legalized marijuana for medical use and both the Bush and Obama administration have arrested California medical marijuana distributors (Head). The current strategy for the War on Drugs as determined by President Obama’s drug policy coordinator, which is end War on Drugs terminology and attempt to rebrand federal antidrug efforts as simple harm- reduction strategies (Head). Head also quoted â€Å"you can’t declare war on inanimate objects, social phenomena, moods, or abstractions— and it’s a rhetorical convention that has determined the way our country views drug policy enforcement (Head). If you can’t declare war on these inanimate objects, social phenomena, moods or abstractions, and you can’t declare war on a country without resources to fight a war, than how do you rid the world of narcoterrorist? It’s simply not possible. Mexico has been the main foreign supplier of marijuana and methamphetamines to the U. S. Dr ug cartels have been illegally transporting an estimated 70 % of foreign narcotics such as cocaine, heroin, and other drugs into the United States and other countries but were not transporting in such violent methods as used today (Mexico Drug War, 2011, January 3). Mexican Drug War also states that Mexico only accounts for a small share of worldwide heroin production but is the major distributor of heroin introduced into the United States. The U. S. Department estimates 90% of the cocaine is mainly produced by Colombia but entered into the U. S. through Mexico. Mexico and the U. S. borders have been used since the mid- 1980’s when Mexico had established organizations competent and reliable to transport Colombian cocaine. Mexican cartels were given 30 % to 50 % of the cocaine shipment which led the cartels to become traffickers and distributors. Although the first few decades after the development of the cartels was passive, since 2006 the Mexican Cartels have turned deadly battling for territory rights and turning on each other. According to Timeline of the Mexican Drug War (2010, December 18), the deployment of Mexican Army soldiers into Michoacan to end drug violence was regarded as the first major retaliation made against cartel violence in Mexico and was regarded as the starting point of the Mexican Drug War between the government and drug cartels. The war escalated with each increase in military troops making Los Zeta’s violence against Mexicans harsher and frequent. It was reported 150 Mexican soldiers and police officers were killed as opposed to the 500 cartel gunmen killed in 2006. Violence surged and by 2008 there was a record of 5, 630 death. The kidnapping, torture, and decapitation of seven off duty soldiers and one police commander were included in this death toll. In 2008 high ranking police officials and government officials were gunned down or executed. The decapitated heads of the off duty police officials were left in a shopping center to be found with a threatening note to the military. Their terrorism tactics have since left their marks to be remembered. With Los Zetas becoming more violent and demanding more plaza’s the need for outside and local forces free from corruption is highly in demand. Regardless of the attempts to weed out those with possible links to Los Zetas or any cartel will remain impossible to prevent the introduction of new and easily corrupted officials. This can be said for their recruitment of poor, military, law enforcement and government officials. According to Los Zetas, their main recruits are all corrupted ex- federal, state, and local police officers as well as the poor men and women and former Kaibiles from Guatemala. This group does recruit women to help run the organization. The Kaibilies are special operations force of the Guatemala military and specialize in jungle warfare tactics and counter- insurgency operations (Kaibilies, 2010 November 2). There is also hierarchy within the group, just like other organized crime organizations. According to Los Zetas there are five groups. The first group consisted of the Los Halcones (The Hawks) and they were responsible for monitoring the distribution zones. The second group is the Las Ventanas (The Windows) who are bike-riding mid- teens responsible for warning the presence of police and other suspicious individuals near small stores that sell drugs. The Los Manosos (The Tricky Ones) gathered the arms. Los Zetas employ prostitute women who are called Los Leopardos (Leapards). The Los Zetas also have the Direccion (Command) which consists of 20 communications experts who intercept phone calls, follow and identify suspicious automobiles and are also known to accomplish kidnappings and executions. All of these groups form the composition of Los Zetas (Los Zetas). Los Zetas can also be compared to al- Qaida, in that their myriads of extensive criminal activities. They kidnap, murder- for- hire, use extortion, money- launder, smuggle humans and are involved with oil siphoning. Like al Qaeda, they have adopted a cell- like structure to limit the information known about members within the organization. Los Zeta’s boldness and cells are spread globally and it has been reported that the FBI were warned that a Los Zetas cell in Texas would use full tactical response if they intervened on their operations. Los Zetas have been able to take over and lord over a great deal of territories by battling it out with their enemies. Los Zetas is mainly based in the border region of Nuevo Laredo and have established lookouts in airports, bus stations, and main roads. They are also along the Gulf Coast region, Tabasco, Yucatan, Quintana Roo, Chiaps, Pacific Coast states, including Guerror, Oaxaca, Michocan, and in Mexico City. Los Zetas hires Mexican gangs such as the Texas Syndicate and MS-13 to carry out their contract killings (Los Zetas). According to the NarcoGuerra Times the DEA officials in Canada, Italy, and Mexico had arrested 175 members of the Zetas who were connected with the Ndrangheta. Los Zeta’s has been operating in approximately 47 countries and have been said to have established connections with the Italian Calabrian mafia known as Ndrangheta (NarchGuerra Times, 2009, September 19). There is research showing the Zetas and Ndrangheta had been working together for more than two years, since Europe needed the cocaine. The main reason their connection is important is because Ndrangheta is considered a major transnational criminal organization dealing in nuclear waste. Their partnership has also allowed the Zetas to advance their money laundering, real estate and human trafficking into Europe (Narco Guerra Times). Forming alliances with foreign countries organized criminal divisions will only make it harder for the Mexican government fight their war against the cartels and for these countries to fight their wars on drugs. America has been battling with the war on drugs and so have other countries’ making it harder to clean up the streets is becoming more impossible with each cell developed in other locations. Mexico’s battle with corruption within all the levels of police departments and constant recruitments with gangs across the border and international waters has made it harder for Homeland Security to fight the battle. Mexico’s war against the cartels seem to only be escalating the issue and although many of the main cartel members throughout the different territories have been brought to justice, it seems their war on that side of the border is not accomplishing much but more bled shed on both sides of the border. As one of the strongest and dominant countries, America could provide the assistance needed. Many may debate this or feel America has their hand in too many countries affairs but the fact remains the brutality and narcoterrorist tactics used by Los Zetas and other cartels will continue to increase. This is not saying President Calderon has rejected American help or has been using other security tactics to help prosecute criminals associated with known narcoterrorist organizations. According to Hansen (2008, November 20), Mexico has pursued different methods for security tactics including extraditing alleged criminals to the United States, including the head of the Gulf Cartel. They have also been actively attempting to dismantle illegal methamphetamine labs, cocaine shipments, and eradicate marijuana. This shows promise but only twenty six meth labs were dismantled between 2002 and 2007. President Calderon developed a 2008 constitutional reform that merged their Federal Preventive Police (PFP) and the Federal Agency of Investigation (AFI). The AFI is similar to the FBI and gathers intelligence and the PFP is responsible for maintaining public order but does not have investigative abilities. President Calderon constitutional reforms of 2008 also called for reforms on criminal procedures. The reforms include oral trials with public proceedings, sentencing based on the evidence presented during trial, judges who are allowed to quickly rule on search warrant requests (Hansen). Their old ways used written trial procedures that could last for years. These efforts show some willingness to adopt new and effective methods using foreign help and using modern legal methods but it is still not enough. According to Hernandez (2010, February 25), the International Narcotics Control Board (INCB) based out of Vienna stated that Mexico, Brazil, and Argentina were sending out the wrong messages in their legislative and judicial developments that were aimed to decriminalize the possession of some drugs. With their declaration Mexico, Brazil, and Argentina rebutted and claimed that the INCB was overstepping their organizations mandated and were unwarranted intrusions in their countries sovereign decision-making and that the INCB has no jurisdiction over police changes made within sovereign nations. In 2009 Mexico decriminalized the possession of small amounts of marijuana, cocaine, heroin, and methamphetamine (Hernandez). Brazil replaced prison sentences with education and treatment for small-time drug offenders in 2006. In 2009 Argentina’s Supreme Court declared punishment for possession of marijuana for personal use as unconstitutional. Argentina also called INCB’s arrogant for questioning the highest judicial authority of a sovereign state. Hernandez also stated that the INCB was deeply concerned with the United States moving towards legalizing or regularizing the use of marijuana for medical purposes may send the wrong message to other countries. The INCB had a legitimate concern for these countries actions of making it easier for criminals to pursue selling and people using marijuana and other drugs. In the United States inmates are allowed to pursue an education or gain their GED to help them gain employment when released but this does not prevent repeated offenders. Taking tough actions and measures is the only way to decrease crime and drug usage. Mexico’s President taking two steps forward and then two steps back is only causing confusion for others to know what actions they need to take. The hard core facts that these Mexican narcoterrorist organizations were developed by corrupted ex military or law enforcement officials make it hard for the rest of the world to believe Mexico is competent to battle against the cartels or protect heir citizens from the unthinkable. With Mexico’s incompetence comes inpatient Americans’ willing and ready to battle for their land. When the Arizona rancher was found dead on his land it was automatically assumed illegal immigrants had killed him. Arizona government officials quickly used his death as an example to push forwa rd their Senate Bill 1070. Now other states have developed similar versions for their own state immigration laws. The growing concern has somewhat shifted from illegal immigration, to how to battle Los Zetas and other cartels. Arizona’s Bill may have opened people’s eyes to the growing problem of illegal immigrants advancing in the United States, but no one in their right mind could have ever imagined seeing those poor immigrants hog tied, gagged, and executed by Los Zetas; for trying to make it across the border. The American people don’t want the Mexican’s killed, simply accounted for. When talking about Los Zeta’s and their narcoterrorist ways, it seems impossible not to think of them as terrorist in the same class as al Qaeda. They may not share the same fanatical ideology as al Qaeda but their terrorist tactics used against the Mexican and American people is on the same level. With the vast growth of their cells spreading globally and forming alliances with known organizations handling nuclear waste, the threat they pose to all those against them is even scarier than those threats by al Qaeda supporters living in the United States. Mexico has been using underground tunnels and smuggling drugs, humans, and weapons across both sides of the borders for decades. There have been reports that al Qaeda has helped train Los Zetas recruits with similar tactics. These Mexican military deserters have trained in the same American military installation, Fort Bragg, as known al Qaedan terrorist members have. The connection is too great and should not be ignored. Los Zeta’s is in a country that has a poor economy but extremely rich in the illegal drug trade. The promise of pay, respect, and fear is what appeals to those who join their ranks. This can be said for any organization. The Mexican government will not be able to use only their military forces to combat against these cartels. Los Zetas has proven they have no loyalty to any one organization but to themselves and their greed for territory and wealth has been fueling their fire. President Calderon should not wait for a full out battle to develop between the cartels and the cartels against the Mexican military. Zetas is growing rapidly and stronger with support and alliances from other countries. Instead President Calderon should call upon Mexico’s allies for help battling them and cleaning up their streets. These cartels have gained their intelligence from working on the inside and gaining as much intelligence, expertise, and experience as possible. Their knowledge, tactics, and alliances will keep them thriving and defining who they are. It is up to the Mexican government to develop solutions to their economic crisis, drug laws, and protection of the people. Their military can only combat so long for so little pay and then they will turn to the darker side. If they paid their people enough salary there would be fewer traitors. It’s like a mother developing rules for her children and expecting them to follow without having to actually enforce them. Countries have been known to break down barriers such as Germany. Countries have also sat by and watched a power hungry Jew hating man murder thousands of innocent people before calling in the big guns. Countries should not sit idly by and watch thousands of people get slaughtered because some men in uniform are greedy for territorial rights and making money by distributing, marketing, laundering drugs, humans, and weapons. There are American military installations located across Border States and if that is what it takes, so be it. References Arturo Guzman Decena. (2010, November 27). In Wikipedia, The Free Encyclopedia. Retrieved 20:30, January 2, 2010. From http://en. wikipedia. org/w/index. php? title=Arturo_Guzm%C3%A1n_Decenaoldid=399212394 Benjamin, D. (2010, August 5). Briefing on the release of country reports on terrorism for 2009. U. S. Department of State: Diplomacy in action Retrieved January 2, 2010 from http://www. state. gov/s/ct/rls/rm/2010/145734. htm Borderland Beat Reporter Overmex (2010, August 26). Zetas Massacre 72 Illegal Immigrants in San Fernando, Tamaulipas. Borderland Beat: reporting on the Mexican Cartel drug war. Retrieved December 2, 2010 from http://www. orderlandbeat. com/2010/08/zetas-massacre-72-illegal-immigrants-in .html Hansen, S. (2008, November 20). Mexico’s Drug War. Council on Foreign Relations. Retrieved 2010, December 30 2010 from http://www. cfr. org/publications/13689/mexicos_drug_war. htm Head, T. (2011). History of the War on Drugs. About. com Civil Liberties. Retrieved 2011, December 2, 2010 from http://civilliberty. about. com/od/drugpolicy/tp/Wa r-on-Drugs-History. Hernandez, D. (2010, February 25). The International Narcotics Control Board criticizes several Latin American countries. La Plaza: News from Latin American and the Caribbean. Retrieved December 22, 2010 from http://latimesblogs. latimes. com/laplaza/2010/02/united-nations-latin-america-international-narcotics-control-board-incb-mexico-brazil-argentina. html Kaibilies. (2010, November 10). In Wikipedia, The Free Encyclopedia. Retrieved January 2, 2010 from http://en. wikipedia. org/w/index. php? title=Kaibilesoldid=395893797 Los Zetas. (2010, November 22). In Wikipedia, The Free Encyclopedia. Retrieved November 27, 2010 from http://en. wikipedia. rg/wiki/Los_Zetas NarcoGuerra Times (2009, September 19). Zetas/La Compania, Ndrangheta and the Nuclear Options. NarcoGuerra Times. Retrieved from http://narcoguerratimes. wordpress. com/2009/09/19/zetasla-compania-ndhrangeta-and-the-nuclear-options/ Narcoterrorism. (2010, December 6). In Wikipedia, The Free Encyclopedia. Retrieved January 2, 2010 from http://en. wikipedia. org/wiki/Narcoterrorism Timeline of the Mexican Drug War. (2010, December 18). In Wikipe dia, The Free Encyclopedia Retrieved January 2, 2010 from http://en. wikipedia. org/w/index. php? ttle=Timeline_of_the_Mexican_. How to cite Los Zetas, Papers

Thursday, December 5, 2019

Big Data Security Breaches

Question: Discuss about the Big Data Security Breaches. Answer: Introduction The year 2015 had been considered as the year of breaches. In 2015, there were numerous large organizations, such as, health-care organizations, financial organizations, higher educational institutes, federal markets, and even security industries, which had suffered a lot with data breaches. While the data breach barrage had proceeded, the solution providers for security breaches said that the awareness of customers about the security issues is required as well as investments are necessary for the data security technologies. The LastPass organization provides the easiest way for online account holders to secure their data accounts because the LastPass is the organization, which generates unique as well as strong security passwords or codes for millions of account holders, which is such a relief, but in September 2015, the password managing organization LastPass itself was smashed by cyber attackers, and the hackers had gained access to all the details of the users accounts (Bellovin, 2015). In September 2015, the password management firm LastPass had announced that the firm is suffering with computer security breach and became the victim of a big cyber-attack, due to which the firm is compromising with its secured data, such as, email addresses, authentication hashes, password reminders as well as with the servers of their users. The company LastPass had disclosed that the servers per user salts, which they are using is not enough to prevent dictionary brute and cyber force attacks. In September 2015, th e LastPass firm also had posted a blog, which indicated that the team of the LastPass has discovered as well as observed that some suspicious activities are happening on their entire network (Ducklin, 2017). During the investigation, the company has discovered that the email addresses of users accounts, authentication hashes, as well as their password reminders were compromised. Why and How It Occurred The firm LastPass had revealed that the cryptographic protection technique in which they use master passwords to protect their users online accounts include hashing as well as salting functions, which are designed to make the basic passwords, which are impossible for the hackers to crack (Paul, 2017). However, the accounts with very simple passwords and those online accounts which are reused by the users on some unauthenticated websites are not completely safe. Therefore, the delicate data of users via their email-ids can be hacked. There are a number of online account holders which are affected by this security breach. The severity of this cyber-attack is very high, which was first discovered in the year 2011. This breach had proved to be very bad for the users who had weak passwords, as it was easily guessed by the hackers. The LastPass in 2015 had disclosed that when they tried to reset their users passwords then they came to know that their entire security accounts have been hack ed. Possible Solutions The cyber-attacks or digital assaults are always developing, so the security experts must remain working in their labs and preparing new plans to keep all such breaches under control. The experts believe that a new technique named as encryption will deflect hackers and cyber attackers by serving fake information for each inaccurate guess for the passwords (Dutt, Kaur, 2013). This kind of approach slows down the activities of the attackers or cyber hackers, as well as conceivably covers the right passwords in a stack of false ones. One other emerging method is there to overcome such cyber-attacks like the LastPass had faced is quantum key dispersion, which shares the passwords integrated in photons over the fiber optic, that may have the viability now as well as for many years in the future also. The LastPass must enable a multi-figure authentication to secure their users accounts. This step is the most essential step which LastPass can take in case they havent already used it. Even in case of the worst cyber-attacks occurring in the organizations like if the hackers get master passwords of customers, then they still require the authentication code so that they can get access to the users of online accounts. If the firm has complete two-factor authentication, then hackers will not be able to access any account. The multi-factor authentication technique is essential for the LastPass and it is also useful for many websites, such as, social networking sites and email account websites. The cryptology technique is the best practice to protect and secure the communication of users in the existence of any third party called adversaries. Usually, cryptography is all about constructing as well as analyzing protocols, which help to prevent users accounts from third parties (Bhandari, 2016). To protect the online accounts of the LastPass customers is necessary so that their private messages cannot be read by the public. The cryptography provides various characteristics in the information security, for instance, data confidentiality, integrity and authentication. Premera BlueCross BlueShield The Premera BlueCross BlueShield is one of the biggest health insurance organizations in Boston. In 2015, numerous data breaches had hit several health insurance organizations and Premera is one of them, the company was smashed by a mega security breach. The health insurance company, the Premera BlueCross BlueShield in December had revealed that they discovered a data breach that had affected almost 11.2 million endorser, and a few individuals who work with the organization. In this data breach, the data of subscribers, such as, their names, bank details, security numbers, birth dates and some other delicate information were compromised. According to some news posted by the CEO of the firm, they had claimed that the health insurers IT systems are vulnerable to overcome the possible attacks but still they faced such issue (Tankard, 2012). The Premera organization did not disclose to its customers that their data has been hacked for the first six months when the cyber-attack has occurr ed to them, therefore, several customers filed lawsuits against them. Numerous lawsuits that were registered against the Premera organization are for being delinquent, breached its promise to customers, profaning of the Washington Clients Protection Act and the failure to discover the breach timely. Some threat related blogs indicated that the domain of the Premera website might have been portrayed to the Healthcare supplier, where the hackers utilized the identical characters replacement method and replaced the characters, like m to n, inside a fake domain. However, the Premera organization did not accumulate or store the credit card data of users, hence, the credit card details were not affected by this attack. Affected and How This cyber-hack enables DNS inquiry logging to recognize the hostname query for known malevolent C2 domains. Identify irregular string entropy, obscure endorsements, files name and so on. Monitor for excessively short endorsements, authentications with missing data, and so on. Disclose and impart information ruptures in a convenient way. The Premera had revealed that about 11 million individuals were affected by this data breach, from which 4.1 million customers belonged to other departments of Blue Cross Premera plans. In 2015, when the attack was first occurred, the organization did not have proper information on how much data breach had impacted their customers, but they were sure that it definitely affected the members from Washington and also from Alaska during that time-period. Since the underlying notice, the CareFirst had been working with Premera to audit and check the quantity of present and previous CareFirst individuals, who were possibly influenced, and also the type of members whose data was accessed throughout the assault (Rubenfire, Conn, 2015). The examination had confirmed that the assailants may have increased unapproved access to data, including name, address, date of birth, Social Security Numbers (SSNs), part ID numbers, claims data and clinical data. Attack carried out The Premera's examination verified that the assailants may have increased unapproved access to data that could incorporate names, birth details, locations, phone numbers, email addresses, Social numbers, recognizable proof numbers, financial balance data, and cases data, including clinical data of Premera subscribers. As of now, there is no sign that the information is expelled from the framework or has been utilized inappropriately (Kolbasuk, 2017). The Premera Blue Cross (Premera), which works in Washington and Alaska, had declared that the digital assailants has executed a refined assault to increase the unapproved access to its Information Technology (IT) frameworks. The Premera is working intimately with Mandiant, one of the world's driving digital security firms, and the FBI to research the assault. To date, specialists have verified that the aggressors may have increased unapproved access to individuals' data, which could incorporate part name, date of birth, email address, re sidential address, telephone number, social number, part distinguishing proof number and claims data, including clinical data. The Skyline BCBSNJ is a different and particular organization from Premera ("Premera Blue Cross Breach Exposes Financial, Medical Records Krebs on Security", 2017). Notwithstanding, a few horizons, BCBSNJ individuals who have gained access to social insurance in Premera's administration regions may have had their data stored in the Premera's information frameworks (Mcpherson, 2004). Prevent the attack The Premera Massachusetts considers security as an important parameter, which is the reason they took several steps to ensure individuals' protection as well as the protection of their data (Kim, 2016). The Premera has consent to stringent principles, including the state and government prerequisites. The Premera has started exhaustive security program addresses and security risks from various points of view, such as: Dedicated security plans Security oversight as well as governance program Various vendor risk appraisals Safety risk assurance The Data encryption is also one of the unique methodology that works with scrambling of data so that the data is unreadable by every unintended parties. Cryptography technique Triple DES was planned to renew the primary Data Cryptography Standard Algorithm, which cyber hackers finally erudite to defeat with relative ease (Greenberg, 2015). The Blowfish is also one of the algorithm designed to secure data and it also helped Premera to secure their data and protect themselves from any type of security breach. Conclusion This study concludes that both of the organizations should utilize good as well as cryptic passwords to secure their users or customers accounts to prevent it from the cyber-attackers and make it difficult for the hackers to crack the passwords. The management team of both the organizations can prepare a well-defined structure as well as execute some strategies to enhance their security systems to maintain the data integrity, availability and confidentiality. Bibliography Bellovin, S. (2015).Password Manager LastPass Warns of Breach Krebs on Security.Krebsonsecurity.com. Retrieved 7 April 2017, from https://krebsonsecurity.com/2015/06/password-manager-lastpass-warns-of-breach/ Bhandari, S. (2016). A New Era of Cryptography : Quantum Cryptography.International Journal On Cryptography And Information Security,6(3/4), 31-37. Chakraborty, H., Axon, R., Brittingham, J., Lyons, G., Cole, L., Turley, C. (2016). Differences in Hospital Readmission Risk across All Payer Groups in South Carolina.Health Services Research. Ducklin, P. (2017).Bad news! LastPass breached. Good news! You should be OK.Naked Security. Retrieved 7 April 2017, from https://nakedsecurity.sophos.com/2015/06/16/bad-news-lastpass-breached-good-news-you-should-be-ok/ Dutt, V., Kaur, A. (2013). Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection.International Journal Of Trust Management In Computing And Communications,1(3/4), 261. GREENBERG, A. (2015).Cite a Website - Cite This For Me.Wired.com. Retrieved 7 April 2017, from https://www.wired.com/2015/06/hack-brief-password-manager-lastpass-got-breached-hard/ Kim, K. (2016). Cryptography: A New Open Access Journal.Cryptography,1(1), 1. Kolbasuk, M. (2017).CareFirst BlueCross BlueShield Hacked.Databreachtoday.com. Retrieved 7 April 2017, from https://www.databreachtoday.com/carefirst-bluecross-blueshield-hacked-a-8248 Mcpherson, B. (2004). The Failed Conversion of CareFirst BlueCross BlueShield to For-Profit Status: Part 1, the Whole Story.INQUIRY: The Journal Of Health Care Organization, Provision, And Financing,41(3), 245-254. Paul, I. (2017).The LastPass security breach: What you need to know, do, and watch out for.PCWorld. Retrieved 7 April 2017, from https://www.pcworld.com/article/2936621/the-lastpass-security-breach-what-you-need-to-know-do-and-watch-out-for.html Premera Blue Cross Breach Exposes Financial, Medical Records Krebs on Security. (2017).Krebsonsecurity.com. Retrieved 7 April 2017, from https://krebsonsecurity.com/2015/03/premera-blue-cross-breach-exposes-financial-medical-records/ Rubenfire, A., Conn, J. (2015).Cyberattack exposes data of 11 million Premera Blue Cross members.Modern Healthcare. Retrieved 7 April 2017, from https://www.modernhealthcare.com/article/20150317/NEWS/150319904 SHAHANI, A. (2015).Premera Blue Cross Cyberattack Exposed Millions Of Customer Records.NPR.org. Retrieved 7 April 2017, from https://www.npr.org/sections/alltechconsidered/2015/03/18/393868160/premera-blue-cross-cyberattack-exposed-millions-of-customer-records Tankard, C. (2012). Big data security.Network Security,2012(7), 5-8.

Thursday, November 28, 2019

Structure Of Dna Essays - Genetics, Molecular Biology, Nucleic Acids

Structure Of Dna The ?Thread of Life?, is deoxyribonucleic acid, also known as DNA. This molecule which is the bases of life, is spiral shaped and found in the nucleus of cells. DNA has the genetic code for bodies, controls development of embryo's, and is able to repair damage caused to itself. All DNA molecules have linked units called nucleotides. These nucleotides have sub-units that have 5 carbon sugars that are called deoxyribose. DNA is composed of four bases called adenine, thymine, guanine, and cytosine. These are some of the main principles of DNA. What we know today about structure of DNA begins in 1868 when a Swiss biologist Friedrich Miescher did the first experiments on the nuclei of cells. Miescher used the nuclei of pus cells from old medical bandages. In these pus cells he found What We know today about structure of DNA begins in 1868 when a Swiss biologist Friedrich Miescher did the first experiments on the nuclei of cells. Miescher used the nuclei of pus cells from old medical bandages. In these pus cells he found phosphorus with a substance he called nuclein. This nuclein has an acidic portion which is classified as DNA. Another scientist Thomas Hunt Morgan made an important discovery around 1900. He observed that certain characteristics were inherited quickly through numerous generations of fruit flies. So he made the conclusion that these genes must be near one another on the chromosome. In 1943 Oswald Avery, Colin MacLeod, and Maclyn McCarty, three scientists working in the Rockefeller institute, preformed an exper iment by taking DNA from a virulent (disease-causing) strain of Streptococcus pneumonae and transformed a non-virulent (inactive) form back to a virulent form. Avery, MacLeod, and McCarty discovered from their experiments that DNA carried a virulent message that can be transferred into the recipient of non-virulent cells. This proved that DNA was a carrier of genetic information. An important discovery of the 1940's was the discovery by Erwin Chargaff who established that ?heredity's alphabet? which are the four bases adenine (A), guanine (G), thymine (T), and cytosine(C) can occur in different orders in different organisms. In 1953 James Watson and Francis Crick put forth a radical new idea about DNA. Their idea suggested that the DNA molecule was made up of two helical chains instead of three intertwined chains as previously thought. Today we have a strong knowledge of DNA and scientists are applying that knowledge to a three billion dollar project called the human genome project. This project will examine the structure of human DNA and map out every single gene in the human body and will take 15 years. The strong knowledge that we have of DNA allows the scientist to map out the genes at about 1 to 2 per day. This may not seem to be a very fast rate but scientists have already found the genes that cause diseases such as Hunnington's, Lou Gerhig's, and the ?Bubble-Boy? disease. Another way that we use our strong knowledge of DNA is in criminal identification. This plays a major role in today's society. Because each person's DNA is different (except in identical twins) police officers can take blood or semen samples from a crime scene and take them to the lab for identification. This can insure the guilt or innocence of a suspect. An example of this is the O.J. Simpson case where investigators tried to match O.J.'s DNA to the DNA at the scene of the crime. Another way scientists apply their knowledge of DNA today is by using special enzymes called restriction enzymes that cut through the phosphate of DNA and these cut ends are called ?sticky ends? because they easily attract other tails from other DNA. Scientist use these restriction enzymes for genetic engineering by removing a gene from one organism to another. In the future DNA has great possibilities for the betterment of mankind and also the detriment. The most obvious and controversial possibility would be the cloning of humans. Scientists have already cloned sheep and other such organisms but have yet to take the step for cloning a human even though the technology is in place, the ethics of this may not be. The method to arrive at is quite

Monday, November 25, 2019

Marine Biology Essays - Aquatic Ecology, Ocean Pollution

Marine Biology Essays - Aquatic Ecology, Ocean Pollution Marine Biology Aquarium Assignment A major source of coastal pollutants, human sewage fouls bays and beaches with both toxic and nontoxic pollutants. Although billions of dollars have been invested in sewage treatment plants to treat wastewater, new and growing coastal communities have increased the amount of discharge into oceans and estuaries. The United States Office of Technology Assessment has identified thirteen hundred major industries and six hundred municipal wastewater treatment plants that discharge into coastal waters of the United States. Many toxic substances enter the sea through the sewer systems, but others originate as industrial discharges. For many toxic substances, we do not yet know how to determine their extent or fate in the marine environment or to evaluate their effects on marine life. Some of the better-known trace metals and toxic chemicals include mercury, copper, lead, and chlorinated hydrocarbons. Chlorinated hydrocarbons, synthetic chlorine-containing compounds, are created for use as pesticides or are by-products of the manufacture of plastics. Oil is a very dangerous thing when it comes to oil spills into the ocean. These catastrophic oil spills engender a concern for the marine environment as no invisible containment can. Spilled oil floats on seawater and provides a constant reminder of its presence until it is washed ashore, sinks, or evaporates. Large volumes of oil suffocate benthic organisms by clogging their gills and filtering structures or fouling their digestive tracts. Marine birds and mammals suffer heavily as their feathers or fur become oil soaked and matter, and they lose insulation and buoyancy. Until recently, marine debris was considered to be of minor importance when compared to other pollutants. Problems caused by marine debris, however may rival or exceed those resulting from some better known pollutants, including oil. By definition, marine debris is any manufactured object discarded in the marine environment. When dumped, it may sink to the sea floor, remain suspended at mid-depths, or float at the surface and eventually be carried ashore by winds and waves. Plastics constitute as great an environmental threat as all the other kinds of debris, combined. Although plastics may break up into smaller pieces, they degrade much more slowly than most other kinds of debris, and most plastics float. Concentrations of plastics tend to be highest in the Northern Hemisphere, where vessel traffic is the heaviest, where most plastics manufacturers and fabricators are located, and where more intensive recreational use is made of beaches and coastal waters. Hopefully, as we approach the twenty-first century, we can learn to leave some old and wasteful habits behind. It will not be easy or simple, but each one of us must develop a sense of stewardship toward the world ocean and its

Thursday, November 21, 2019

Journal Article Review - Phonemic Awareness Essay

Journal Article Review - Phonemic Awareness - Essay Example Performance of other abilities such as sound-based tasks and other related activities can be performed. Although this is the case there are differences in the performance of children with CI and those with normal hearing capabilities. In terms of the phonological awareness (PA) for children with CI, learning phase that is protracted and long can be observed. Controlled tasks and revealed no significant difference from the normal children (Spencer and Tomblin, 2008). Based on the objective of the study that is to present a comparative analysis in the different hearings properties such as phonological awareness in relation to CI use, it can be perceived that the research conducted was able to achieve such goal. The exercises and tests that had been undertaken can be considered simple yet were able to clearly present the needed data. Variation in the use of tasks to test the hypotheses can also be observed in the research undertaken. These characteristics of the results are important in the characterization of the success of the study. It can be perceived that the methodology had been able to cover the possible points that are needed to be included in the area under study. Aside from the methodology undertaken, the presentation of the data and the analysis of the results had been presented in a commendable manner. Important characteristics of the organization of data are simple, clear and can easily be analyzed and understood. The presentation and development of the paper can also be considered important. For the said paper, the ideas and concepts had been developed and presented clearly and segregated properly for better understanding. The presentation of pertinent data related to phonological awareness is also essential. Included in the tasks under study are rhyming tasks, blending words task and Elision task which are determinants of the capabilities of the CI children in relation to learning how to read (Spencer and Tomblin, 2008). These

Wednesday, November 20, 2019

Opening a Krispy Kreme Doughnut in Spain Essay Example | Topics and Well Written Essays - 250 words

Opening a Krispy Kreme Doughnut in Spain - Essay Example The target group should be adolescents and children from affluent households who would not mind spending more for being a part of hip and happening brigade (ICMR, 2003). Undertaking local manufacturing operations This is perhaps the trickiest part of all since Krispy Kreme Doughnuts are advertised as tasting best when they are served hot off the frying pan. Hence, it is imperative that some sort of heating arrangement must be available at the outlet but the crucial question is whether local manufacturing operations should, rather, could be undertaken. Considering the distance between Spain and USA and also taking into account the freshness of these doughnuts which happens to be one of their USPs; even if the first few consignments are air freighted from US it would not be economically feasible to get them on a regular basis from United States. So, with some initial help from the parent company and under the sharp eyes of their quality controllers, local production must have to be und ertaken after imparting sufficient training to local recruits.

Monday, November 18, 2019

Quantitative Analysis for Managers Essay Example | Topics and Well Written Essays - 750 words

Quantitative Analysis for Managers - Essay Example This essay describes an allocation of manufacturing overheads and explaines it using an examples. This essay responses to the request for the analyses of the allocation of manufacturing overheads related to two our products. A comprehensive report detailing the allocation basis and possibilities of our two products Rona Loa coffee and Colombian coffee along with their related implications and recommendations are provided for your study. Using activity based costing as the basis for assigning manufacturing overhead cost to products, the researcher established the total amount of manufacturing overhead cost assigned to the Rona Loa coffee and to the Colombian coffee for the year amounts to  £32,900 AND  £7,300 respectively. The amount of manufacturing overhead cost per kilo of the Rona Loa coffee and the Colombian coffee amounts to  £0.33  £3.65 respectively. The unit product cost of one kilo of the Rona Loa coffee and one kilo of the Colombian coffee amounts to  £4.83  £7. 15 respectively. The researcher also calculated costing as the basis for assigning manufacturing overhead cost to products, the total amount of manufacturing overhead cost assigned to the Rona Loa coffee and to the Colombian coffee for the year amounts to  £32,900 AND  £7,300 respectively. For detailed working regarding the calculation of these amounts please refer Appendix A and B. It also provides the reader with the detailed statistics tables and results.... Traditional costing systems therefore can result in significant under-costing and over-costing. However, traditional costing systems are simpler and easier to implement than ABC systems. The use of such a rate enables us to determine the approximate total cost of each job when completed. In recent years increased automation in manufacturing operations has resulted in a trend towards machine hours as the activity base in the calculation. It is believed fluctuations in product costs serve no useful purpose. To avoid such fluctuations, actual overhead rates could be computed on an annual or less-frequent basis. However, if the overhead rate is computed annually based on the actual costs and activity for the year, the manufacturing overhead assigned to any particular job would not be known until the end of the year. Simplistic overhead allocations using a declining labour base cannot be justified, particularly when information processing cost are no longer a barrier to introducing more s ophisticated cost systems (Drury 2004). ABC provides a way to allocate costs more accurately when overhead costs are not incurred at the same rate as direct labor hours. Using ABC means that all the individual activities that are part of a process can be accurately costed. For example in case of our entity it will be possible to accurately determine the cost of each activity involved in processing a coffee from input to final packaging. In this way it will be easy to identify the most and least expensive parts of the process. Process improvement activity could then focus on the most expensive parts of the process. A model could then be constructed showing a comparison between the existing process costs and the redesigned process and its associated costs.

Friday, November 15, 2019

Geographic Study of Mountain Area

Geographic Study of Mountain Area CHAPTER II STUDY AREA PROFILE 2.0 General: The study area (13858.83 ha) is a mountain range between River Pravara and River Mula Basin. The range started from western boarder at Ghatghar village and end eastern border at village Washere in the Akole tahsil, district Ahmendagar of Maharashtra state. The extent of study area is 19 ° 35 06.86 to 19 ° 30 13.08 N latitude and 73 ° 37 00.03 to 74 ° 04 24.65 E longitude. It covers parts of the Survey of India topographic sheet numbers 47 E/ 10, 11, 14, 15 and 47 I/ 2, 3. The depth and water-holding capacity of the soils are varied even if there is slightly change in slopes which is the one of the reason in the variation of forest land. The slope of the area is decreasing from NW to SE respectively and the height varies from 560 m to 1646 meters above mean sea level. Study area is distributed in the Sahyadri mountains (Western ghat) region of the Maharashtra state. Geologically this area formed from basaltic lava. Basalt rock prevent percolation of rainy, reservoir water in to underground zone. Due to rock type the soil cover is very shallow at the top of the mountain and increasing its deepness at foothill zones near water reservoirs. Basic Intrusive (Dykes) mainly found nearby this area. This are the approximate reasons of the shallow soil cover. Very shallow loamy, shallow clayey soil found on the moderate (1 °- 3 °) and stiff (3 °- 6 °) slope. Soil moisture impact on the amount of the vegetation cover with respect to soil type and slope. Therefore, North West and South zone have maximum vegetation cover compare to other land of the study area. It receives annual rainfall about 440.4 mm. The mean annual maximum and minimum temperatures are 39.80 C and 8.70 C respectively. Local tribal people engages with the agricultural activities at reclaimed land from forest area. Forestry is the second occupation after agriculture. 2.1 Geology: Study area is a part of Sahyadri Mountain Range (Western Ghat). Also called as Deccan Trap formed by basaltic rocks; amygdaloidal basalts form the bedrock. This area has shallow soil like loam, clayey; again divided in to sub types based on depth and slope classes. Overlying weathered and fractured rocks, resting on hard massive basalt. The basalts are nearly horizontal, separated by thin layers of ancient soil and volcanic ash (red bole). The basalt flows are nearly flat-lying (the sequence has a regional southerly dip of 0.5-1 °) and mainly belong to the Thakurvadi Formation (Fm) of the Kalsubai Subgroup (Khadri et al. 1988; Subbarao and Hooper 1988). The lithology of the area indicating that around 77.17 % area covered by 12-14 compound pahoehoe flows and some Aa flows (max 206m). Around 4.53 % by 2 compound pahoehoe flows (40-50m) and Megacryst compound pahoehoe basaltic flow M3 (50-60m) up to 3.26 %. Remaing 0.89% covered by 5 Aa and 1 compound pahoehoe basaltic lava flows (Max. 160m); 4-5 compound pahoehoe basaltic lava flows (Max. 150m), Basik Sill/Lava channels respectively. The regional stratigraphy of the Deccan basalts has been described by Beane et al. (1989), Khadri et al (1988), and Subbarao and Hooper (1988). Structural indices indicate the part of basic intrusive (dykes) in the part of noer-west and south-east. One fault line cross at the middle part of the study area. 2.2 Relief: Study situated at the middle of the tehsil Akole. It has horizontal shape and act like a natural water divider. Relief turn and fix the surface geographical landforms. The altitude of this area is varies from less than 640 meter (minimum) to 1646 meter (maximum). The formation of soil, natural vegetation cover and soil moisture conditions are totally controlled by the status of the relief. Contour lines demarcate the height of the study area above mean sea level. The Kalasubai (1646m) highest peak of the Maharashtra state located in the Akole tehsil. In the tehsil second highest peak Harishchandragarh (1422m) located in the south-west part of the study area. Relief decreasing toward to the Washere village of this mountain range. Drainage network flow depends on relief is explained in next point. 2.3 Slope: Slope of the study area calculated in degree (0 ° to 90 °) on the basis of contours. This slope of the area divided in to 7 classes. Gentle slope has up to 1 ° slope where water reserve and collected in dam. Soil depth, cover and types also depends on the nature of slope. Hill top and cliff sides has precipitous to very steep slope (12 ° to 90 °). At foothill slope moderate to steep (1 ° to 12 °) zone has maximum forest cover in north-west and south-west direction. Eroded material on the top hill concentrating on the foothill slopes and favourable for soil formation. That is why the in this area soil moisture, soil depth and vegetation cover found more than other zone. Soil types and different characteristics has been elaborated in the next point. 2.4 Drainage: Network of drainage is developing continually and it’s responsible for the different landform creation. Relief controlled the drainage flow and streams erode land surface in to different geographical landform features. Relief and streams has strong correlation. Study area has an origin point of the main river Pravara. River flows from north-west to north-east direction. This river has main and minor dam. Bhandardara is main dam situated on river Pravara, which is an important land-cover feature in study area. At the time of robust forest change analysis this water body play an important role. Soil moisture depend on drainage network and water reservoirs after rainy season. It made difference in the type of vegetation cover from dense forest to open scrub land. Drainage pattern related to slope and slope related to forest growth has been explained in detailed in the next point. 2.5 Soil: The growth and reproduction of forest cannot be understood without the knowledge of soil. The soil and vegetation have a complex interrelation because they develop together over a long period of time. The vegetation influences the chemical properties of soil to a great extent. The selective absorption of nutrient elements by different tree species and their capacity to return them to the soil brings about changes in soil properties (Singh et al. 1986). Soil element is one of the most important biophysical matter. Concentration of elements in the soils is a good indicator of their availability to plants. Their presence in soil would give good information towards the knowledge of nutrient cycling and bio-chemical cycle in the soil–plant ecosystem (Pandit and Thampan 1988). Generation of soil is depend on geology, topography, time span, climatic conditions, organic and inorganic factors, etc. Forests in general have a greater influence on soil conditions than most other plant eco system types, due to a well-developed ‘‘O’’ horizon, moderating temperature, and humidity at the soil surface, input of litter with high lignin content, high total net primary production, and high water and nutrient demand (Binkley and Giardina 1998). Study area is a hilly zone, soil is very shallow at the top-hills while excessively drained loamy soil (a rich soil consisting of a mixture of sand and clay and decaying organic materials) found at steep slopes north-west direction. Shallow well drained clayey soil and slightly deep excessively drained loamy soil found over moderate to gentle slope respectively. Clay soils, are made up of very fine, microscopic particles. These tiny particles fit together tightly, resulting in tiny pore spaces between them. The tiny pore spaces allow water to move through them, but at a much slower pace than in sandy soils. Clay soils drain quite slowly and hold more water than sandy soils. Loams soil capacity of maximum water holding (MWHC) approximately 0.18 inches of water per inch of soil depth, and clays hold up to 0.17 inches of water per inch of soil depth. However, soil types, soil elements, soil depth depends on the geology of the study area, explained in next point. 2.6Population and economic activities: Humans being living surrounding this area most are the tribal population. Primary economical activities including shifting cultivation, fishery, 2.7Spectral properties of plants in the forest: (1st ch) Interaction of radiation with plant leaves is extremely complex. General features of this interaction have been studied but many spectral features are yet unexplained. Gates et al., (1965) are considered pioneers, who have studied spectral characteristics of leaf reflection, transmission and absorption. Optical properties of plants have been further studied to understand the mechanisms involved by Gausman and Allen (1973), Wooley (1971) and Allen et al., (1970). It is the synthesis of the parameters like reflection of plant parts, reflection of plant canopies, nature and state of plant canopies and Structure and texture of plant canopies, which will be required to fully understand the remote sensing data collected from space borne and aerial platforms. They have been attempted for crop canopies through the development of models but not yet fully achieved. It will be initially required to discuss the electromagnetic spectrum and its interaction with vegetation canopies. Subsequent factors affecting the spectral reflectance of plant canopies with its possible applications in remote sensing technology would be discussed. The vegetation reflectance is influenced by the reflectance characteristics of individual plant organs, canopy organization and type, growth stage of plants, structure and texture of the canopies. The synthesis of the above four aspects provides true reflectance characteristic. However, various authors without fully achieving models to determine vegetation reflectance characteristics have studied effect of individual parameters. 2.6.1 Nature of the Plant: Numerous measurements have been performed to evaluate the spectral response of various categories of plants with a spectrophotometer (Fig. ***). For a plant in its normal state i.e., typical and healthy the spectral reflectance is specific of the group, the species and even of the variety at a given stage in its phenological evolution. The general aspects of spectral reflectance of healthy plant in the range from 0.4 to 2.6  µm is shown in figure ****. The very abrupt increase in reflectance near 0.7  µm and the fairly abrupt decrease near 1.5  µm are present for all mature, healthy green leaves. Very high; further in the far infrared >3.0  µm. Thus, the typical spectral curve of plant is divided into three prominent zones correlated with morphological characteristics of the leaves (Gates, 1971). 2.6.2 à ¯Ã¢â€š ¬Ã‚  Pigment Absorption Zone: The important pigments, viz. chlorophyll, xanthophylls and carotenoids absorb energy strongly in ultraviolet blue and red regions of the EMR. The reflectance and transmittance are weak. The absorbed energy of this part of this spectrum is utilized for the photosynthetic activity (Allen et al. 1970). 2.6.3 Multidioptric Reflectance Zone: In this zone, the reflectance is high, while the absorbptance remains weak. All the unabsorbed energy (30 to 70% according to the type of plant) is transmitted. They reflectance is essentially due to the internal structure of the leaf and the radiation is able to penetrate. The reflectance from internal structure is of physical more than chemical nature. Apart front the contribution of the waxy cuticle, the magnitude of the reflectance depends primarily upon the amount of spongy mesophyll. 2.6.4 à ¯Ã¢â€š ¬Ã‚  Hydric Zone: Amount of water inside the leaf affect the pattern of spectral reflectance with water specific absorption bands at 1.45  µm, 1.95  µm and 2.6  µm. Liquid water in a leaf causes strong absorption throughout middle infrared region. Beyond 2.5  µm the reflectance becomes less than 5% due to atmospheric absorption and beyond 3  µm the vegetation starts acting as quasi blackbody (Gates et al., 1965). There are numerous factors either internal of the plant or external coming from the environmental conditions have an influence on the specific spectral reflectance. The above descriptions are true only for a normal, mature and healthy vegetation. The factors which affect the spectral reflectance of leaves are leaf structure, maturity, pigmentation, sun exposition, phyllotaxis, pubescene, turgidity (water content) nutritional status and, disease etc. Important factors are pigmentation, nutritional status, anatomy of leaves and water content. While, sun exposition and phyllotaxy affects the canopy reflectance, phenological state and disease are linked to the primary factors affecting the spectral reflectance (Wooley, 1971). 2.7Spectral vegetation indices: Radiant energy intercepted by a vegetative canopy is primarily scattered by leaves either away from the leaf surface or to the leaf interior. The scattered radiation is reflected, transmitted or absorbed by leaves. The partitioning of radiation a reflected, transmitted or absorbed energy depends on a number of factor including leaf cellular structures (Gates et al. 1965; Kfipling, 1970; Woolley, 1971), leaf pubescence and roughness (Gausman, 1977), leaf morphology and physiology (Gausman et al., 1969 a, b; Gausman and Allen, 1973; Gausman et al., 1971) and leaf surface characteristics (Breece and Hommes, 1971; Grant, 1985). Leaves are not perfectly diffuse reflectors but have diffuse and specular characteristics. Leaf transmittance tends to have a non Lambertian distribution, while leaf reflectance is dependent on illumination and view angles. Knowledge of soils radiation interaction with individual leaves is necessary for several reasons like special to interpret and process remotely sensed data. Typical reflectance and transmittance spectrum of a individual plant leaf indicate three distinct wavelength regions in interaction: visible (0.4-0.7  µm), near infrared (NIR) (0.7-1.35  µm) and mid infrared (mid IR) (1.35-2.7  µm). Thus the typical spectral curve of plant is divided into three prominent zones correlated with morphological/anatomical/physiological characteristics of the leaves and these are Pigment Absorption Zone, Multi-Dioptric Reflectance Zone and Hydric Zone, etc. The analysis of all remotely sensed data involves models of many processes wherein the EM radiation is transformed (the scene, atmosphere and sensor) and whereby inference is made about the scene from the image data. The most common strategy for relating remote sensing data to vegetation canopies has been via the correlation of vegetation indices with vegetation structure and functional variables. This simple empirical approach has yielded substantial understanding of the structure and dynamics of vegetation at all scales. These indices are capable of handling variation introduced in a scene due to atmosphere or sensor and vegetation background influence in low vegetation cover areas. The capacity to assess and monitor the structure of terrestrial vegetation using spectral properties recorded by remote sensing is important because structure can be related to functioning, that is to ecosystem processes that are ultimately aggregated up to the functioning of the local-regional-global level of ecosystem. The categorization of the various spectral indices in to approximately five types. Such as Ratio Indices, Vegetation Indices, Orthogonal based Indices, Perpendicular Vegetation Indices and Tasseled Cap Transformation, etc. Remote sensing of cropland, forest and grassland involves the measurement of reflected energy of component in the presence of each other. The development and usefulness of vegetation indices are dependent upon the degree to which the spectral contribution of non-vegetation component can be isolated from the measured canopy response. Although vegetation indices have been widely recognized a valuable tools in the measurement and interpretation of ‘vegetation condition’ several limitation have also been identified. They are related to soil brightness effect and secondary soil spectral deviations. The use of site specific soil lines reduces soil background influence. In this context SAVI, GRABS and PVI holds greater promise in low vegetated areas. The vegetation indices are simplified method to extract information about vegetation parameter from multispectral data however, their use in spectral modeling needs to be studied in context of spectral dynamics of earth surface components. 2.8Resume`: Forest cover is an important natural resource for the environment and socio-eco on the surface of the earth. It can bridge the gap between nature and human beings conflicts. Changes in the forest land increase the imbalance in the ecosystem, climatic conditions, temperature, land degradation, drought prone zones, soil erosion, depending manmade activities, etc. The living tribes in the mountain hill as well as foot hill area utilized forest material for their domestic usages. Therefore, the objectives of detection and delineation of the forest land by using ordinary classification methods have been outlined in the present study. The methodology has been outlined in this chapter. The Landsat-5 TM and Landsat-7 ETM+ dataset has been suggested as a source of information to achieve the objectives of the study. The basic knowledge regarding spectral properties of the forest and physiographic elements as well as spectral vegetation indices area has been proposed for the second chapter to m ake information base study for image analysis, classification and interpretation in the next chapters. *********

Wednesday, November 13, 2019

Essay --

A market is a process of buyers and sellers exchanging good and services. Buyer is a group that determines the demand side of the market, whether it is consumers purchasing goods or firm purchasing inputs, while seller is a group that determines the supply side of the market, whether it is firms or companies selling their goods or resources owners selling their inputs. So, the market can be an interaction of buyers and sellers that determine market prices and output through the forces of supply and demand. DEMAND The definition of the demand is the amount of goods that consumers are willing and able to buy at a particular price. According to law of demand, there is an inverse relationship between price of goods and quantity demanded of goods and services. In a better way of explanation, when price of goods and services increase, the quantity demanded for foods and services will be decrease, vice versa. There are some reasons that show that why there is an inverse or negative relationship between price and quantity demanded. Firstly, since everyone likes to save money and buy cheap goods, so, consumers will only buy more goods and services at lower prices than higher prices, vice versa. Next, another reasons for negative relationship is diminishing marginal utility, which means, in a given time period, a buyer will feel less satisfaction from each successive unit consumed so consumers will only buy added units if the price was reduced. Lastly, there are the substitution and income effects of a price change. For the substitution effect, it states that an increase in the price of goods will encourage customers to buy alternatives goods, for example, when the price of meat increases, the quantity demanded for meat will be decrease as ... ... the indirect business tax increase, people will invest less and lead the aggregate demand to be decrease, ideally to a long-run, full –employment level of RGDP. This results a lower price level and full employment output; a new short and long-run equilibrium. After government had lower the government spending, increase the taxes and lower the transfer payment, the aggregate demand will be decreasing. Then with the help of multiplier, the aggregate demand curve shifts to the left even further. LRAS PRICE LEVEL SRAS Multiplier effect RGDPNR In a nutshell, when there is no more shortage or surplus problem, quantity demand is equal to quantity supply; there will be market equilibrium and after government had applied the expansionary fiscal policy for recession and contractionary fiscal policy for inflation, the economy problems will be solved.