Wednesday, July 31, 2019

Ray Bradbury Comparative Paper Essay

Ray Bradbury, well-known American author, playwright, and poet, created his success on no more than his high school diploma. He did, however, learn many valuable lessons in life which he incorporates in his works. Ray Bradbury uses figurative language such as irony, personification, and imagery to artistically present his vision of life’s morals. Bradbury’s use of irony in his pieces establishes how mankind commonly contradicts himself. In â€Å"The Veldt†, George and Lydia hear screams that â€Å"sound familiar† but ignore them. The couple also finds their wallet and scarf and disregards how these items were chewed and covered in blood when they found them. George and Lydia receive their last clue when they enter the nursery and see the lions in the background feasting on an unknown prey. â€Å"They’ve just been eating†¦ [but they] don’t know what. † Ray Bradbury turns these foreshadowing events into irony when the parents are killed by the lions. It is ironic that they have seen the lions devouring something, saw the wallet and scarf, and heard the screams but do not realize that they were the lion’s meal and it was their screams that they heard and the scarf and wallet were chewed by the lions and covered in their own blood. Bradbury also uses irony in the â€Å"Happiness Machine. † Leo Auffmann created a machine which he claimed brought happiness to the occupant. He convinced his wife to â€Å"try it on† but when she got out she shouted, â€Å"It lies, that Sadness Machine. † This is ironic because what Leo thought was a Happiness Machine is really a Sadness Machine. Leo then finds that true happiness cannot be created by a machine but is found in the heart of his family. In â€Å"There Will Come Soft Rains†, the house reads a poem to the emptiness where a family once was. The poem explains how nature â€Å"would not mind†¦if mankind perished utterly. † It is ironic because the poem is warning the family how the war will destroy them but nature will continue on when that is exactly what has happened. The family has been killed and the house soon after dies but the sun continues to rise and set as if nothing has happened. Personification is another common literary device in Bradbury’s work. It is most prominent in â€Å"There Will Come Soft Rains. † Bradbury describes the house with human like qualities in how it defends itself against the fire which is also personified. The house â€Å"quivered at each sound† and is described as the attic being the brain and the exposed oak beams as â€Å"its bare skeleton† and all of â€Å"its nerves revealed. † The fire was personified when it â€Å"fed upon Picassos and Matisses†¦ [and] lay in beds, stood in windows. † Bradbury also described the fire as being â€Å"clever† as it attacked â€Å"the attic brain† and â€Å"rushed back into every closet and felt of the clothes hung there. † Bradbury also uses personification in â€Å"The Foghorn. † He gives the foghorn human-like characteristics when relating it to the monster. The foghorn made a â€Å"great deep cry† that vibrated in the â€Å"throat of the tower† as the â€Å"light, switching its tail,† shone bright in the distance. Bradbury continues to use personification in â€Å"The Veldt. † The nursery that Wendy and Peter spend most of their time in is described with human-like qualities. The walls changed from blankness to the veldt with a â€Å"purr† and â€Å"reproduced to the final pebble and bit of straw. † It is further personified when the room itself kills the parents. Bradbury also frequently uses imagery in his work. In â€Å"The Pedestrian†, he described the highways as â€Å"only dry riverbeds† empty of vehicles. Bradbury also points out the â€Å"tomblike buildings† and â€Å"gray phantoms† along the sides of the road. These vivid descriptions allow the reader to feel the loneliness and absence of life in the city and its streets. The imagery in â€Å"The Pedestrian† sets the mood and describes the setting. â€Å"The Foghorn† portrays another source of imagery. Bradbury makes the reader visualize the â€Å"long grey lawn of the sea stretching away into nothing and nowhere† with his descriptive vocabulary. He describes how the â€Å"stone tower† emitted a light that flashed red and white out to the â€Å"lonely ships† â€Å"in the cold water far from land. † This makes the reader understand how secluded McDunn and Johnny were out at the lighthouse and intensifies the oddness of the appearance of the sea monster. Imagery is also present when McDunn explains to Johnny how the monster â€Å"hid away in the Deeps. † The way he describes the â€Å"Deeps† makes it all seem magical yet realistic. Bradbury continues to use imagery in â€Å"The Happiness Machine. † Towards the end of the short story, Leo discovers a real happiness machine. When he describes this â€Å"machine,† he makes the reader visualize a pleasant and warm home filled with joy. This example of imagery contrasts how Bradbury typically uses his words to display desolation and despair. Ray Bradbury expresses similar patterns in his work by using irony, personification, and imagery. He writes with these three types of figurative language in different ways in all of his pieces of work. Bradbury takes common techniques of writing and makes them his own by using them in a certain way to present his ideas in a unique style.

Tuesday, July 30, 2019

Cloud and Clouds Reference

Republic of the Philippines Department of Education Region III Division of Bulacan District of Plaridel Sto Nino Elementary School Sto Nino, Plaridel, Bulacan A DETAILED LESSON PLAN IN SCIENCE AND HEALTH IV I. Objectives A. Name the different types of clouds. B. Describe each type of clouds according to appearance. C. State some ways in preparing for a bad weather. II. Subject Matter â€Å"Types of Clouds† Reference: Science and health IV by Jessie Villegas p. 187 Materials: puzzle, pictures Vocabulary: Clouds, Cirrus, Stratus, Cumulus, and NimbusScience Concept: The different types of clouds are cirrus clouds, stratus clouds, cumulus clouds, and nimbus clouds. Science Processes: Observing, Inferring, Comparing, Communicating Infusion of Values: As students we need to prepared umbrellas and rain coats to get ready for the bad weather. III. Procedure Teacher’s ActivityPupils Activity A. Preparatory Activity 1. Daily Routine Prayer Greetings Checking of attendance 2. Revi ew Yesterday we talked about weather Yes, Ma’am and it’s elements, right? Ok, Now what is weather? Weather refers to the condition of the atmosphere at a particular time and lace. Very Good! Ok, let’s give him a Very Good Clap! (Pupils doing the Very Good clap) 3. Motivation Class I will teach you a song entitled â€Å"Did you ever see a cloud† I want you all to sing, but I will sing first and you will go next! Ok! â€Å"DID YOU EVER SEE A CLOUD† Did you ever see a cloud A cloud a cloud Did you ever see a cloud That looked like a bear A big one, a little one A lazy one, a funny Did you ever see a cloud That looked like a bear? Did you ever see a cloud A cloud a cloud Did you ever see a cloud That looked like a plane A big one, a little one A fast one, a slow oneDid you ever see a cloud That looked like a plane? OK class, it’s your turn now. Sing! (students are singing) VERY GOOD! You all sang great! What is the title of the song? The title o f the song is â€Å"Did you ever see a cloud? † Very Good! What is the song all about? It’s all about clouds. Yes! Correct it’s all about clouds. Have you seen a clouds that looked like a bear? No, ma’am but I’ve seen a clouds that looked like a cotton candy. B. Activity Proper Now I will divide you in four groups, I have here a puzzle and I want you to solve these. Each group will have a leader and after olving the puzzle the leader will stand in front to explain the image that they get. Ok let’s start! (the teacher is giving them the puzzle)(The students are doing the activity) Finished! Let’s start with group one. OH, it’s cirrus clouds image, what can you say about this picture? (The leader is explaining her/his observation about the picture) Very Good! Next group You got stratus clouds image Explain. (The leader is explaining her/his observation about the picture) Very Good! Third group with cumulus clouds Image. (The lead er is explaining her/his observation about the picture) Very Good!The last one, ok what can you say about nimbus clouds? (The leader is explaining her/his observation about the picture) Very Good! You observed very well C. Concept Formation Based on our activity, what do you think will be our lesson for today? It’s all about clouds. Clouds are recognized and named for their shapes. Meaning, clouds get their names according to their shapes. The different types of clouds are cirrus clouds, stratus clouds, cumulus clouds, and nimbus clouds. Ok let’s start with Cirrus clouds, (The teacher will show a picture of cirrus clouds) How will you describe cirrus clouds?Cirrus clouds are thin and feather-like. Yes it is, as you can see in the picture the lower part of the clouds looks like a feathers of a bird. Cirrus clouds are the highest of all clouds. And Cirrus means â€Å"curl of hair†. Observe clearly the lower part of the clouds looks like curly hairs. What clouds is said to be the highest of all clouds? Cirrus clouds are the highest of all clouds. Cirrus clouds are thin and feather-like. What is the meaning of cirrus? Cirrus means â€Å"curl of hair† Very Good! Next is Stratus clouds. (The teacher will show a picture of stratus clouds) How will you describe stratus clouds?Stratus clouds are flat layers. Very Good! Stratus means â€Å"sheetlike†. As you can observe, these clouds looks like pieces of papers floating in the air. Stratus clouds are flat layers often seen close to the horizon in the early hours of the day. They frequently appear several hours before a steady rain. What is the meaning of stratus? Stratus means â€Å"sheetlike† Next is Cumulus clouds (The teacher will show a picture of cumulus clouds) Look at the picture, how will you describe cumulus clouds? Cumulus clouds are thick and mountain-like. Cumulus clouds are often seen on a hot summer ay as a fluffy balls of cotton in the sky. Have you seen these clo uds during your summer vacation? Yes ma’am Cumulus means â€Å"pile† or â€Å"heap†. As you can see a large number of clouds lying on top of one another, that’s why it is called cumulus. Cumulus clouds are thick and mountain-like. What is the meaning of cumulus? Cumulus means â€Å"pile† or â€Å"heap†. Last is Nimbus clouds. (The teacher will show a picture of stratus clouds) How will you describe nimbus clouds? Nimbus clouds are dull gray in color. Nimbus means â€Å"rain† Nimbus clouds are dull gray in color. They often extend unbroken over a wide area.They are the rain clouds. What is the meaning of nimbus? Nimbus means â€Å"rain† D. Generalization What ere the different types of clouds? The different types of clouds are cirrus clouds, stratus clouds, cumulus clouds and nimbus clouds. Cirrus clouds are thin and feather-like. Stratus clouds are flat layers often seen close to the horizon in the early hours of the day. Cumul us clouds are thick and mountain- like. Nimbus clouds are dull gray in color. E. Application (I will divide you class in four groups, each group will be given a jumbled letters to solve. When done he leaders will put the answers on the space provided in front) Arrange the jumbled letters to get the answer. (The students are doing the activity) 1. SURATTS DSCLUO are flat layers often seen close to the horizon in the early hours of the day. 2. BUSNMI DSOULC ARE DULL GRAY IN COLOR. They often extend unbroken over a wide area. 3. SLUMUUC OULDSC are thick and mountain-like. They often seen on a hot summer day as fluffy balls of cotton in the sky. 4. SCIURR DCSOUL are thin and feather-like. They are the highest of all clouds. F. Infusion of Values As a student what things are going to prepare when ou noticed that the clouds are turning dark? As students we need to prepare umbrellas and rain coatsfor the bad weather. IV. Evaluation Write TRUE if the statement is correct and FALSE if the st atement is not correct. 1. Clouds are recognized and named for their shapes. 2. Nimbus clouds are dull gray in color. 3. Stratus means â€Å"pile† or â€Å"heap† 4. Cumulus clouds are thin and feather-like. 5. Nimbus means â€Å"rain† V. Assignment 1. How are clouds formed? 2. What is cloud cover? | Prepared by: MARIEL A. MIGUEL BEED IV-B LU ANN L. RAMOS Cooperating Teacher ESMERALDO M. TRINIDAD JR. Coordinating Principal

Monday, July 29, 2019

Journal Essay Example | Topics and Well Written Essays - 250 words - 87

Journal - Essay Example I, for instance, can now choose fast and better clothes. This makes her like it very much and her face lights up with excitement. She is genuinely happy from her emotions and tells me that I have helped her a lot since she has an interview, the following day. I finish attending to her after one hour, to my big surprise. On looking at the clothes hanger, I notice so many clothes there. They all need to be returned, follow the correct order and I have to make sure that all their tags are checked. We already have 6 clients; so many to have at the same time. Another intern is still busy and that means I have to step in and assist in cleaning up. After finishing, I go to the donation center, where I find too many clothes heaped together like a mountain. I feel dizzy and notice too many stars swirling around my eyes. One intern works from 1pm to 5 pm. We are a total of 6 interns but after 3 pm we only have 2 interns. This is really too much work and my mind is running wild with several questions like how can I tag all of them? How can I organize them? How can I measure clothes? Etc. I take a deep breath and just relax. I feel that I hate clothes right now and I am having nightmares from clothes. My intern colleague told me once that I look like a tailor when I measure pants, men suits and thus soon I will be looking like a real professional. As I ponder where to begin, I get thinking that right now I am ok with just being a personal shopper working at a donation

Sunday, July 28, 2019

Two Page Overview of Three Companies Essay Example | Topics and Well Written Essays - 500 words

Two Page Overview of Three Companies - Essay Example The first real bookstore of Barnes & Noble was actually opened by Charles’ son named William who partnered with a gentleman named Clifford Noble thus the origin of the name Barnes & Noble. The bookstore was opened in the year 1917 in New York City, and has grown to the illustrious business it is now over the years. Barnes & Noble is known for its upscale retail shops that are usually accompanied with cafes serving starbucks coffee among other products. Although it is officially known as a retail bookstore, this is not the only product that they have to offer, and one can find other items such as magazines, comics, newspapers as well as music within the store’s retail outlets. The company currently has over 600 stores under its flagship up to date excluding the over 600 college stores it operates as well (Barnes & Noble Inc). Amazon.com is a multinational company that operates through electric commerce through its website that has been popularized around the world. It is believed to be the largest online business in the world and has a consumer base that is located all over the world. It headquarters are located in Seattle, Washington and it sells a large number of items on its online stores. Since it is an online retail store, its expansion cannot be seen on a physical scale but can be pointed out through the different retail websites that it has developed for different countries such as Canada, Italy, Germany, and the United States among others. It also has plans to set up separate online retail stores for more countries including Brazil, Sweden and the Netherlands. The company was founded by a man call Jeff Bezos in the year 1994, but it was released onto the website community as amazon.com in 1995. The company sells everything from electronic products, toys, books to name but a few and has recently b egan producing its own electronic products such as the Kindle e book reader and tablet computer known as Kindle Fire.

Saturday, July 27, 2019

International business economics Essay Example | Topics and Well Written Essays - 2750 words

International business economics - Essay Example In this pursuit, an M&A team also had been setup to seek out prospective targets (Dutta and Chaturvedi, 2005). The main target of globalizing the company was in terms of boosting up exports substantially. Entering the Chinese market through joint ventures or transfers of technology was also on the cards. But these aspirations failed to materialize and instead when the opportunity to acquire Daewoo, a concern that had a market share of 22 percent even with large idle capacities, arrived, Tata Motors grabbed it (Dutta and Chaturvedi, 2005). The objective of the present endeavor is to look at the acquisition in detail to the extent allowed by the scope. In what follows we look at the strategic and economic rationale of Tata Motors that motivated acquisition, seek to explore aspects like the strengths of Daewoo Motors that made it potentially valuable for Tata Motors, the major challenges faced by Tata Motors in the process of acquiring Daewoo and the major potential synergies and their materialization. To perceive the rationale of the acquisition, it is first necessary to understand where Tata Motors stood just before this breakthrough phenomenon in the history of the Indian Automobile industry. Although Tata entered the sphere of manufacturing automotive vehicles way back in 1954 when it collaborated with Daimler-Benz, it spent the following two decades or so in enhancing its R&D base of operations through a multitude of collaborations and manufacturing mainly construction equipment (Dutta and Chaturvedi, 2005). The first commercial vehicle was manufactured in 1977 and by 1983, Telco, as Tata Motors was known until 2003, initiated its production of heavy commercial vehicles. ‘TATA 407’, the company’s first light commercial vehicle that was completely indigenous in design was launched in 1986. In 1991, the first passenger cars that were designed indigenously, the Tata sierra and the Tata estate,

Friday, July 26, 2019

STRATEGIC PLANNING AND CHANGE Assignment Example | Topics and Well Written Essays - 750 words

STRATEGIC PLANNING AND CHANGE - Assignment Example consider conscious involvement of all employees and key stakeholders as well as the application of the right tools so as to realize positive responses. The management need to ask themselves a number of questions based on how they can make the change process motivating to employee, how they can achieve clear understanding of the process among the employees and how to extend the knowledge to the staff. In order to successfully realize the benefits expected from the change process, managers must embrace the four engagement tools or benchmarks namely learning, involvement, rewards and communication. Effective communication of the tenets of the change initiative offers guidelines and direction to the employees so that they are well informed of their roles in the process. When change is properly communicated, the employees will feel some sense of ownership and control during the process (Freytag and Hollensen, 2001). The inclusion of the learning process through proper training enables employees to gain confidence and realize how real and serious are the changes. The creation of a learning environment is of great importance to the change process owing to the fact that changes within organizations need new skills and attitudes towards their implementation. Training help in minimizing the anxieties associated with the change process as well as granting the employees sufficient time to adjust and progress to the point where threats linked to the change process are no longer felt. According to Fairbairn the learning theory proposes that employees are motivated to respond by physiological demands that are based on the competency, self-sufficiency and understanding. Competence occurs when people develop a feeling that they are very important in the realization of the components of a given change process (Dube, et. al, 2005). Full involvement of employees in the work process is another are that managers must focus on for in-depth realization of the change process

Reading response 7 Essay Example | Topics and Well Written Essays - 250 words

Reading response 7 - Essay Example Punk rock has grown among the Korean youth giving them a day-to-day chance to expresses their energy and relieve stress as they dance wildly. He recognizes the consequent emergence of the Korean punk movement that expresses local resistance within an internationally recognizable form. Epstein acknowledges this growth to the relaxation of authoritarian control in Korea, depression caused by American suburban alienation, Korean exposure to the west and Western music, Internet use among Korean teens, and globalization I find the style of dancing to Korean punk, the energy, and enthusiasm with the artists and the audience, and dancehall mood very interesting. I think that this genre of music should be encouraged to Koreans of all ages as it promotes the Korean identity. I hence conclude that although punk Rock may never get full assimilation to the Korean pop music, the steps taken are increasingly resisting the oppositional

Thursday, July 25, 2019

Analyzing a case study Example | Topics and Well Written Essays - 500 words

Analyzing a - Case Study Example Most companies use this before they implement a new project. This helps them understand the requirements even as they conduct market research. Strengths and weaknesses are internal factors while opportunities and threats are external. The MM Company has a good financial record since the introduction of green meters. This is evident that the product will do well if introduced to customers. The other strength of the project is that it was popular in the company. It is therefore, easier for the marketing team to convince the customers. In addition, the implementation of the project has executive support. Smith promises full support of the project, and this makes it easier to implement the project. The green project is the first one to be implemented in the market, and therefore, no competition. The company will have a competitive advantage because it will dominate the market. The project needs an outside-in approach. The manufacturing department cannot work alone. There has to be integration of all departments. For instance Werner argues that the company has been operating on separate systems for each of its silos. But this project will go against the culture and processes of the company. The project will have to integrate with IT‘s information Management Renewal project. Working with different departments in the company poses a huge political challenge (Kim, 2010). Another weakness is resources. Werner argues that MM has people but they are not able to work within the promised time. Lack of human capital will make the company incur costs of employing others who have technical skills. Delay is also another weakness whereby the project fails to meet a deadline. This will mean to put pressure on the working team. Strategies have to be implemented to ensure the success of the project. New advertisement strategies need to be employed. Since the Green project is popular in the company and the product is new in the

Wednesday, July 24, 2019

Discussion Boar 5-1 Assignment Example | Topics and Well Written Essays - 250 words

Discussion Boar 5-1 - Assignment Example However, group leaders need to demonstrate caution and avoid selecting exercises that can infringe on any member. Properly chosen exercises can make proper and appropriate techniques to help drive a counseling group work towards achieving its desired goals and objectives (Haley, Morina & Brown, 1998). Careless structuring of the exercises can turn be detrimental to the group’s efforts to achieve the set objectives and desired change. Corey’s counseling group is an example of group work that employed structured exercises selected in a careful manner and guided by easy laws. This means that the exercises were optional and members could engage or perform any exercise deemed to be in line with the members’ beliefs and diversity. Employing more exercises in the Corey’s counseling group could lead to particular challenges and inconveniences. Since the group included people from diverse backgrounds, it was easier for the group to appear as breaching beliefs and certain innate differences. More exercise could have worked to expose certain inefficient characters of the members, which they would want to conceal. This would mean underachievement and dissatisfaction of the members with the progress made by the group at the end if its session (Corey, Corey & Corey, 2006). Corey’s counseling seem to have avoided more exercises for fear of breaching principles of diversity that would happen if the exercises demanded exposure of secret information of the members. From the guideline, it is important for group leader to perform thorough screening during the recruitment and initial stage of the group. This can help identify and obtain adequate information on the likes and dislike of the members (Haley, Brown & Morina, 1998). Haley, L. Morina, B. & Brown, S. (1998). Association for Specialists in Group Work: Principles for Diversity-Competent Group Workers. retrieved September 21, 2013 from:

Tuesday, July 23, 2019

Mentorship Assignment Example | Topics and Well Written Essays - 1500 words

Mentorship - Assignment Example es who have supportive working relationships benefit by accelerated leadership development, higher earnings, and increased job satisfaction (Sosik and Lee, 2002 Mentoring is a professional relationship with a focus on personal and professional development. It may occur through various communication venues including, but not limited to face-to-face interactions, phone, or email. The duration and intensity of the relationship may vary depending on the dynamic of the match and the needs of the individuals involved. (American Physiological Society, 2008). There are range of factors from a clinical environment which may impact upon the learning of individuals and groups in that environment. These factors can be related to the protà ©gà ©, mentor or the other factors of the environment (Chan, 2004). The factors related to protà ©gà © are educational background, knowledge and skills, level of commitment to learn and develop his or her skills and knowledge, dedication, communication with mentor and others. In the same way, mentor needs to have adequate knowledge, skills and experience to share with the protà ©gà © and help them in their development (Hand, 2006). Mentors are senior persons with experiences and usually have busy schedules. The time management with the students are the most challenging aspects of mentoring process (Papp et al, 2003). In many cases, mentoring is considered as important process to help new professionals to develop their skills and knowledge. The perception and attitude of mentor and protà ©gà © influe nces their developmental relationships. For me as a mentor, the most challenging factors of the clinical learning environment for mentoring process as identified are lack of time with mentor, communication gaps between mentor and protà ©gà © and very underdeveloped skills of protà ©gà ©s. Usually in the oncology department, the professionals are loaded with work and new challenges with each patient. Patients are the priority and this makes it very

Monday, July 22, 2019

Mcsa Networking Basics Essay Example for Free

Mcsa Networking Basics Essay Introduction What is a network? A network can be defined as two or more computers which are linked together to share resources. These resources can include internet access, printers, software and files. The ‘heart’ of a network is called the server, and its function is to contain all the software and services which the network and its users depend on. Figure 1: Example of a basic network The server is operated by personnel called Network or System Administrators, and it’s their responsibility to ensure the smooth running of the network so it is working as efficiently as possible. This is achieved through the use of a dedicated operating system called Windows Server 2003 – this gives the network administrator complete control over the network functions. Advantages for a network Cost Because networked computers can share the same resources, costs can be dramatically reduced. For example, if there are ten computers in a room each needing access to a printer – it is far cheaper to route all ten computers to a single, shared printer than it is to purchase ten printers; one for each computer. In this example, the saving would also include the cost of ink cartridges (you would only need to purchase one set of cartridges instead of ten). Software can be purchased and installed in a similar cost effective way. Most popular software is able to be bought and installed on a server, and anyone who requires to use it will only need to purchase a license (the legal rights to use it, usually in the form of a certificate). These licenses are far cheaper than buying the software for each user. This method also means that it isn’t necessary for an I.T Technician to install the software on every computer; only one install on the server is needed. Another benefit to this approach is when the software requires an update. If it is server based, only the software on the server would need to be updated. All the users would benefit from the update as soon as it has been installed. If each user had a copy on their computer, I.T Technicians would need to update each one. This could become time consuming, expensive and complicated. The software that this could apply to, includes most Microsoft software and Anti-virus software. Security Security is a vital element in any business. In a network, security is enhanced both internally (security within the network) and externally. Users are given a username and password to access their files and all the programs, hardware etc that they have been given access to. When a user saves a file, it is saved to the server and not the computer that he/she is working on. If that user wants to retrieve that file, it can be done on any computer on the network, and not just on the computer that was originally used. This data can be accessed, monitored and backed up by the Network Administrator at any time. Each department can have their own ‘identity’ on the server, which allows them to have access to files, applications and resources which would be relevant to their requirements. For example, the Accounts department may need to have access to invoicing software (e.g. Sage and Excel), whereas Sales may only require software to monitor and forecast sales over a period of time (e.g. Excel). Accounts may not want other departments accessing their software due to security or confidentiality reasons. Internet security is tighter for both users accessing the internet, and external threats when a network is set up. All the computers can share a single access point to the internet, which makes it easier to monitor internet usage, help reduce hacking and other external threats trying to access data on the network. Another feature which can be applied by the system administrator is Encryption. Data within a folder/subfolder can be encrypted to prevent unauthorized access to data if other security measures have been breached. Typically, only system administrators will be given the ‘recovery key’ to be able to decrypt data incase of system failure or other unforeseen situations. Disadvantages for a network Expensive to install The initial cost of setting up a network can be expensive, with hardware like the server, router, cabling, backup equipment, network printers and server software. Also, dedicated personnel must be hired to keep the server running efficiently and to resolve any server/network issues. Centralised Data Having all of the data in one place means that data could be lost in the event of a system failure. Regular backups of the server are highly recommended (daily, weekly and monthly) to help to keep data safe. But if the server goes down in between backups then all the recent data will be lost. Reduced Performance The server’s performance can become reduced as the network expands or as its workload increases through the working day. A server must have as much memory and processing power as possible to help minimise the reduction in performance. Task 2a Network Topology is the description of how a network is laid out, the devices (server, routers, printers etc) attached to it and the direction which data flows. A network can be described as either Logical Topology (the way data flows in a network) or as a Physical Topology (how a network is physically laid out) There are six main topologies, Bus, Ring, Star, Extended Star, Hierarchical, and Mesh. Bus Topology This can be both a Physical and Logical, in a local area network (LAN), each device is connected by a single cable. This single cable is also referred to as the ‘backbone’ of the network. A terminator must be on either side of the cable to prevent the data signal from bouncing back down it. The Bus Topology was widely used in early networks using standard Co-ax cables. It was an economical solution for networking as only one main cable was needed. The disadvantage to this was if this cable failed, the whole network would go down. Ring Topology In a Ring Topology (also known as IBM Ring Token), each computer (node) is connected to each other in a closed loop. Each computer has its own unique identity on the network. When data is transmitted from one node to the other, the data will include the destination’s identity and will pass through each node until it reaches the destination. This type of topology has two main disadvantages; only one computer can transmit data on the network at a time and if a computer fails the whole network will go down. There is a slight variation to this; the Duel Ring Topology The second ring within the network provides a backup connection, so if there is a failure within the network, the secondary connection will keep the network connected. This is expensive as more cabling is required. Star Topology The most common type is called a Star Topology. Each device is connected to a dedicated central hub. All the data on the network flows through the network via the central hub. These types of networks tend to be small, as data could be degraded or lost on a large network. The main advantages to this is that it is easy to setup and easy to add new devices to the network. But if the central hub fails, the whole network goes down. Extended Star Similar to the Star Topology, but instead computers are grouped together and connected to a local hub, which in turn is connected to a central hub. This is widely used in large networks where the network may be in a large building, and each group of computers may represent each department. There are more points of failure on this network, but if a local hub fails, then the rest of the network will not be affected. Hierarchical or Tree Topology This is very similar to a Ring Topology, but computers are attached to the central hub in layers. While the structure looks different, this still has the main disadvantage of network failure if the top device goes down. Mesh Topology All the above topologies suffer from the same problem. If one device fails on the network, the whole network goes down. The only solution is to connect each device with each other and remove the need for a server. This is the Mesh Topology and has two main advantages; If a device fails, the network will still work and the network doesn’t need to rely on the processing power, bandwidth etc from a server as it is supplied from each computer. The disadvantage to this is the high cost of connecting each device to each other, so this would not be suitable on a large network. This type of topology is also referred to as Peer-to-Peer whereas the other topologies are considered to be Client/Server based. A comprise between cost and connectivity would be the Partial Connected Topology. Devices are connected to more than one node on the network, so if one fails the network can still work. This is more cost effective than Mesh Topology as less cabling is required. Task 2b Recommendations As it stands, the structure of the current network is a Hierarchical or Tree Topology. The network uses two different switches to connect the Domain Controller to the 24 computers. These are from two manufacturers; CISCO and 3Com and this offers 100Mb and 10Mb speeds respectively. This is a disadvantage because one ‘group’ of computers has a quicker data transfer rate than the other. The network does not have a disaster recovery plan should the Domain Controller fail. This has the potential for putting the whole network at risk from permanent data loss. The network also shares a single printer which is attached to the Domain Controller, 10 of the computers are connected to it through the slower 3Com 10Mb switch. This means all 24 computers print via the Domain Controller (which is currently overloaded) and 10 computers send data at a slower rate than the rest of the network. My first recommendation would be to replace both switches with a single CISCO 100Mb 48 port switch ( £631.99 from MISCO website). This would provide a standard, quicker data transfer speed throughout the network and allow for the network to expand. There are a total of 24 computers, and this switch would enable a further 24 devices to be added to the network e.g. additional computers, printers etc. This would allow the network to expand whilst maintaining a fast data transfer speed. With the new switch in place, my next recommendation would be to replace the HP Laserjet III (USB connection only) with a newer, network-ready printer like the HP Laserjet 2055DN or P2030 which costs  £319 and  £160 from HP website. By replacing it with a newer model, printing could be completed quicker, quieter and more cost effectively e.g. more reliable printing, more energy efficient, lower consumable costs etc. Also, sharing the workload throughout a faster network is more efficient than channelling all the printing requirements of the network to an older single printer on a slow 10Mb switch via the Domain Controller. This will also help reduce the workload to the Domain Controller. While the Domain Controller’s workload can be reduced by the addition of a network-ready printer, other options could be to increase the specifications (e.g greater hard drive space, more memory etc). Ensuring the controller has the latest software updates will ensure both the running efficiency and increase the network security. This will help prevent unauthorised access (hacking) to the network. My final recommendation is add disaster recovery and remote working within the network, By regularly backing up data on a daily/weekly/monthly basis, this will ensure the network can be restored in case of total data loss. To assist learning or to prevent students from accidentally causing errors/problems within the network, remote working should be enabled. User accounts can be easy created in Active Directory though the use of a standard template. Templates could be set up for both students and tutors, so all of the common properties of the accounts are already established. When a new user account is required, the administrator will only need to complete the fields that require unique values (eg, name, address, telephone number, course details etc). Once the users have been created within the Active Directory, they can be placed into Organisational Units (OU’s). This will group together users, so in this situation students could be placed in OU’s which represent their course. When the OU’s are established, the users’ configuration settings can be applied through the Group Policy Management Console (GPMC). It holds hundreds of user configuration settings, security options and user event logs, all which can be applied as required by the college administrators. Figure 2: Example of the Group Policy Management Console (GPMC) By using Group Policies effectively, the administrator can control and manage exactly what users can and cannot do whilst logged onto the domain. Administrators are able to control how the desktop appears, the icons that are available and the ability to configure the task bar etc by applying the Desktop setting found within the ‘User Configuration’ in the GPMC. This could be useful if the college policy states that all users must have the Llandrillo College logo as their wallpaper, and various required icons are in place and users to have access to various programs via the ‘start’ menu. To improve password security, administrators are able to increase the effectiveness of the passwords that users apply to protect their identity on the network. The password options can be found within the ‘Password Policy’ within the ‘Computer Configuration section of the GPMC. These options include the ability to reuse old passwords, to apply complexed passwords (eg. more than 6 characters, using upper, lower case letters and digits 0-9). In the example, a programmer has created a random word generator to create passwords. Group policy could be configured so when they log on for the first time, users input the randomly generated password and then they must input their own password using a complexed password. If the user ever forgets the password at any time, administrators are able to reset it through the ‘Active Directory Users Computers’ tool. Figure 3: Example of Password Policy within GPMC To prevent users from using too much disk space on the network, administrators are able to allocate limited disk space to users and by applying prompts when this space is nearly used up. By putting this in place, administrators can calculate how many users will be on the system multiplied by how much hard disk space each user will be allocated. This total will be the minimum amount of disk space required for all users in each new academic year. Administrators will be able to ensure the server can physically hold all the users data without completely running out or running low of disk space. To achieve this, administrators will need to locate the allocated hard drive and apply a quota, limiting users on how much space they can use. Individual users can have separate entries in the quota, allowing them to have a lesser or a greater share of disk space. This would be useful for tutors who may need greater disk space to store course material etc. When the network is running, administrators may be required to monitor the networks resources to ensure it exceeds the users demands. The tool required is called the ‘Performance Console’ which is found under Administrative Tools. This tool appears in the form of a graph although it has three counters as a default (Memory:Pages/Second, PhysicalDisk: Average Disk Queue Length and Processor: % Processor Time), additional counters can be easily added or removed accordingly. A college administrator may add counters to monitor network bandwidth, server utilisation (memory, cpu performance, disk performance etc). To help administrators monitor the server, counter logs and alerts can be applied. This can enable administrators to proactively identify when system resources run too low or to identify possible hardware failures/malfunctions. Any one of these problems could result in a degraded performance or total server failure. Figure 5: Example of the Performance Console The college network may be required to support remote users, allowing them to access the college network whilst being in a different location eg working from home, from another campus etc. This can be achieved through the use of a Virtual Private Network (VPN). The user will be able to access the college’s network through the use of the internet whilst achieving the required security and data encryption. The network’s firewall must have exceptions to allow authenticated users to access the network whilst preventing unauthorised access. Once the network is running effectively, the next challenge administrators will face is maintaining the security and the efficiency of the network. This can be achieved by deploying server updates and hotfixes as provided by Microsoft. The server can be updated with the use of ‘Automatic Updates’, which can be found within the ‘All Programs’ menu under the start button. Updates can be downloaded either straight away or scheduled to download at a certain day/time. This could be configured to download when the network is at its quietest time (eg 10pm). This would ensure that the update would not effect the overall performance during busy periods. Also, updates for the users computers may be required. Instead of administrators physically installing them on every computer on the network, this could be downloaded on the server as an *msi file and automatically installed via a group policy. So the next time users within the network log onto the network, they will automatically be downloaded installing the updates from the server with no intervention required.

Electrical Properties Quantum Transport in Nanowire Device

Electrical Properties Quantum Transport in Nanowire Device David S. Murdoch Nanowires are quasi one-dimensional rod-like nanostructures with diameters in the order of nanometres (10^-9m) and have seemingly unlimited length and a great degree of versatility. Nanowires form as monocrystals in a well defined crystal geometric direction. Nanowire geometry allows for easy contacting of the wires from two sides. Attention is devoted to geometry of nanowires because this is the feature that allows for easy control of electronic properties of nanowires.[1] Growth orientation (e.g. 100), the faceting arrangement (e.g. [100]) and the surface structure (Si(100)) are generally outlined in nanowire investigations and are a generally accepted notation to depict nanowires. A nanowire is thin and diameter is in order of magnitude far smaller than length of nanowire. As diameters gets larger, quantum effects become less significant against bulk material properties. Nanowires have thermoelectric properties, specifically that they have high thermal stability and low thermal conductivity. Quasi one dimensional Carbon Nanotubes (CNTs) and nanowires are likely composite materials for future electronic devices.[1] Nanowires electrical properties are easier to control than CNTS, therefore are an attractive alternative to CNTs and naturally passivated when semiconducting.[1] Under scrutiny, experimentally grown nanowires always have passivated facets but further study of unpassivated (pristine) nanowires has demonstrate fundamental mechanisms at an atomic-scale. One of which being that passivation is necessary to obtain nanowires with those controllable electrical properties.[1] Semiconductor nanowires can form from materials such as: Silicon, Si Indium Arsenide, InAs Germanium, Ge Indium Phosphide, InP Gallium Nitride, GaN Zinc Oxide, ZnO Cadmium Sulphide, CdS Nanowires can also be made from metallic materials and oxidised to make insulators but semiconducting crystalline nanowires are ultimately more useful in devices. At the atomic-scale, although impurities are useful sometimes, small variations can cause serious unwanted alterations to electronic structure. [1] Semiconducting nanowires are often fabricated via growth mechanisms or synthesised by electrochemical etching. These processes are often done in an aqueous solution with HF acid. The most common method of nanowire growth is Vapour-Liquid-Solid (VLS) mechanism. VLS is a bottom-up process that starts with the dissolution of gaseous semiconducting materials with colloids of a metal catalyst, generally gold or silver [2]. The one-dimensional growth is evoked and dictated by the colloids. Once the colloids are supersaturated with semiconducting material, crystalline nanowire growth will start to occur at a boundary between solid substrate and liquidised material. This particular description was the growth of silicon nanowires. One example of EE is the use Ag catalyst on wafer-scale Si to fabricate a nanowire array. Ag+ ions are reduced in the solution after holes are inserted into the valence band of Si substrate. The reduced Ag nanoparticles dictate the extent of the etching and oxidation processes. Vertically aligned nanowires result from this synthesis.[3] After both methods of fabrication, nanowires remained anchored to substrates and are similarly dependent upon length of diameter for thermoelectric properties. However, wires from EE have much rougher surfaces than that of VLS. [Si nanowires yielded from EE have much rougher surfaces than typical Si nanowires grown via VLS and have less thermal conductance.[3] A heterostructures are the junctions between two different crystalline semiconductor materials essentially two different nanowire materials formed together to make one nanowire with unique properties. Heterostructures are commonly grown via VLS.[2] These heterostructures allow nanowires to have multitude of properties. What is a semiconductor and how does it work. By strict definition, a semiconductor has a conductivity between 105 and 10-5ÃŽ ©-1m-1. This is in contrast with insulators that have conductivity of approximately 10-24ÃŽ ©-1m-1 and metals that typically have 107 to 108ÃŽ ©-1m-1. On the face of them, these numerical values are rather meaningless but they do show that a semiconductor is separate from the other two, a true genuine third category of material.[4] How a semiconductor conducts is best described by a conduction and valence band. The conduction band rests above the valence band. The conduction band contains excited electrons and the valence band contains holes. In an insulator the two bands are a vast distance away from each other. In a semiconductor the two bands are much closer together, almost touching. If a bandgap is small enough, thermal vibrations may provide enough energy for some electrons to excite from the valence band to the conduction band. In a metal the two bands overlap, leading to a low resistivity in metals.[4] The diagram below depicts what the above description. An intrinsic semiconductor has a completely filled valence band, electron and hole populations are always equal. [4] An extrinsic semiconductor is doped. Midway between the two bands lies the Fermi energy. Below the Fermi energy. At absolute zero, no electrons we be able to excite past the Fermi energy.[12] In n-type and p-type semiconductors, the Fermi energy is adjusted to be closer to valence or conduction band.[12] Between the two bandgaps there is a sea of electron density. A transistor is a semiconducting electronic switch and are commonly found embedded in integrated circuits. Down-scaling of the gate length over the years has technological devices reduce in size has caused field-effect devices to having significantly less electrostatic control of a path of conductance; more capable device have been developed such as FINFETs, Trigate transistors and ultimately gate-all-around devices (GAA).[4] Nanowire devices can come in all shapes, not sizes. Examples of nanowire devices are Field-Effect Transistors (FETS), LEDs, Tunnelling diodes, Elementary logic gates, lasers and biochemical sensors.[4] There are a number of different FETs but Metal-Oxide-Semiconductor Field-Effect Transistors (MOSFETs) might be the most interesting or relevant in near-future technologies and are examples of GAAs. MOSFETs are extrinsic semiconductors where the doped material has been oxidised for some insulating properties. If a metallic gate anode were deposited you have the foundation of an electrical switch. [crystalline] Carrier charge density can be changed at the Fermi energy. If the semiconductor were p-type (i.e. abundance of holes in valence band) and a positive voltage is applied to the circuit then the electrostatic energy of the holes increases. Although holes are pushed away from the anode, any attracted electrons do not compensate for the decrease in positive charge. The switching effect is reduced if charge can be stored at the interface between the insulating barrier and the Si since the potential of the silicon will be less than that of the applied gate.[4] When voltage is increased beyond a certain point electron concentration at the surface of the Si will exceed the hole concentration. This creates the on/off switching effect. This gate voltage is large enough so that the bottom of the valence band moves down. The switching effect does not work with a metallic material because the valence band would be too high still and a Fermi energy could still carry current. The semiconductor band gap controls on/off electron currents.[4] Are nanowire MOSFETs superior? Smaller semiconductor gates allows speeds up operation from shorter distances, lower areas of capacitances and Larger fields but it is risky to store charge in a transistor so small and new quantum effects come into play at a nanowire-scale. One of the capabilities of these new technologies is to produce potentials which can confine electrons to the same scale as their Fermi wavelength. Nanowire MOSFETs can also be used in high frequency circuits. In Electron microscopy high energy electrons are fired at an object and reflected electrons are collected and computed into an image. Electron microscopy generally has greater magnifying power than optical microscopes. There are two main electron microscopes and they are Transmission Electron Microscopy (TEM) and Scanning Electron Microscopy (SEM). SEM uses secondary electron to help generate an image that gives the viewer an impression of 3D while TEM fires at thinner objects at produces a 2D image but while ultimately be more useful for imaging nanowires.[7] Larger batteries potential differences require more conductive metals. In recent years Lithium has grown popular as a cathode. Semiconducting Si could be an attractive anode for Li cathode batteries as both metals become more ubiquitous. Although Si has low discharge potential and charge capacity 10x higher than existing graphite anodes and even more so than oxide and nitride materials, Si anodes in bulk form have limited use because silicons volume is drastically altered during extraction and insertion of Li. Resulting in capacity fading and pulverisation after recharging cycles. This is depicted in the diagram below. [8] Anodes made of Si films have a stable capacity over many cycles but are not viable as a battery because they waste away over time. Nanowire are a superior alternative to bulk materials because of a piezoelectric effect: â€Å"Crystals which acquire a charge when compressed, twisted or distorted are said to be piezoelectric. This provides a convenient transducer effect between electrical and mechanical oscillations.†[9] Each Si nanowire is grown and electrically connected to a metallic substrate surface thus all nanowires contribute to the battery capacity. During Fossil fuel combustion 15 TW of heat is lost to the environment. Thermoelectric modules could potentially convert part of the heat waste to electricity.[3] As of 2008, Bi2Te3 in its bulk form was the most commonly used material for thermoelectric devices. However, it is difficult to scale bulk Bi2Te3 to large-scale energy conversion in power plants but fabricating synthetic nanostructures of Bi2Te3 for this purpose is even more difficult and expensive. Thus, Bi2Te3 is replaced with increasingly ubiquitous Si.[3] Ubiquitous Si, abundance with a low-cost and high-yield products thanks to economies of scale. Si also has advantages in thermoelectric applications. Critical spacings below 300nm in Si would reduce thermal conductivity since Si has larger differences in mean free path lengths between phonons (~300nm) and electrons (110nm) at room temperature.[3] InAs-based semiconductor nanowires can already provide a convenient basis for the development of more complex hybrid nanostructures and can contact Schottky barrier-free with metals.[6]The InAs superconducting nanowires are fabricated via catalytic process based on the VLS mechanism.[6] InAs nanowires can be grown epitaxially. Epitaxial growth means the deposited material continues to grow on the same crystalline lattice as its substrate.[2] A superconductor is material with with no resistance and generally operates at a lower temperature. Within semiconductors, there are electron pairs, separated by vast distance in comparison to the lattice spacing, are coupled. These so-called Cooper pairs can exhibit boson characteristics and condense to a ground state since their attraction produces a small pair binding energy similar to the Fermi energy level.[10] A supercurrent generates no waste heat or any other form of waste. The supercurrent can be switched on or off by the electron density acting like a transistor as described earlier. Nanowires acquire superconducting properties because of the proximity effect, a phenomenon that can occur as Cooper pairs of electrons from a superconductor flow into a normal conductor at a junction. Nanowires arent inherently superconducting or easy to make superconducting.[6] The proximity effect manifests itself through the appearance of a supercurrent, which can be viewed as a consequence of the diffusion of Cooper pairs throughout the entire length of the nanowire section between the two superconducting electrodes.[6] the proximity affect can only happen if the boundary between Superconductor and semiconductor allows electrons to move freely. Cooper pair tunnelling is an explanation of Cooper pairs where they are able to interact through quantum tunnelling. At a junction between two superconductors a nd a more resistive material i.e. S-N-S junction. Two Cooper pairs across from each other in two separate semiconductors, can feel an attraction and readily flow into the normal conductor dividing them. S-N-S junctions will also feel a Josephson effect. Cooper pair could be created in the superconductor electrons in the Fermi energy being reflected at the S-N boundary.[6] This could be because of tunnelling effects. But what of Tunable supercurrent? How can a hybrid superconductor-semiconductor device work to observe quantum phenomena? Josephson behaviour occurs at critical currents. The nanowires allows the critical current to be controlled by voltage at a gate, Vg. If this voltage is negative then electron density is reduced and nanowires perform as the weak links between tunable superconductors.[6] With the use of certain geometries, there is the possibility of controlling individual nanowires on the same IC. Majorana fermions are particles that are their own antiparticle.[13] Not much is still known about Majorama pairs, not all the theory has been made to explain them and their properties yet. They are also examples of non-Abelian anyons.[14] In the vicinity of a Zeeman field, semiconducting nanowires require strong spin-orbit to induce majorana pairing in between electron states. This proximity effect induces a topological superconductor. Majoranas can be detected by Tunnelling Spectroscopy. A superpostion of Majorana particles states will always be zero energy because the particle and antiparticle have opposite energy.[14] Said zero energy state can be found in a normal conductor acting as a junction.[11] How to summarise this dissertation? The task received was to research and review electrical properties and quantum transport in nanowire devices. This task down into an explanation of base nanowires, specifically semiconducting nanowires. Then, general devices such as transistors, batteries and thermoelectrics were reported on and how certain applications have taken advantage of nanowires in respective devices. Then analyse of quantum effects in Cooper Pairs in superconductors and Majorama fermions. Technology is advancing at an exponential pace. The smaller components can be the more attractive they to companies who manufacture and sell consumer products. The smaller a transistor is the more you can fit on an integrated circuit leading to smaller more powerful products. Majorama fermions and Cooper pair tunnelling probably wont be used in any consumer applications in the near future but nanowire semiconductors in junctions placed between superconductors show means of electrically me asuring quantum tunnelling. In the near future investigations of these particles will enhance fabrication and measuring techniques and eventually manipulate and control Majorana qubits. They are examples of non-Abelian anyons[14], quantum state after partilce exchange making them ideal for use in topological quantum computing.[13] References R. Rurali, â€Å" Structural, electronic, and transport properties of silicon nanowires†, Reviews Of Modern Physics, 82 427-449 (2010) Law, M., Goldberger, J., Yang, P. D., â€Å"Semiconductor Nanowires and Nanotubes†, Annual Review of Materials Research, 34, 83-122 (2004) Hochbaum, R. Chen, R. D. Delgado, W. Liang, E. C. Garnett, M. Najarian, A. Majumdar, P. Yang, â€Å"Enhanced thermoelectric performance of rough silicon nanowires†, Nature 451, 163-167 (2008) Crystalline Solids lecture notes http://cxs.phys.soton.ac.uk/mwf/mediawiki-1.21.2/images/7/70/2013_lecture_notes.pdf Egard M, Johansson S, Johansson AC, Persson KM, Dey AW, Borg BM, Thelander C, Wernersson LE, Lind E, â€Å"Vertical InAs nanowire wrap gate transistors with f(t) > 7 GHz and f(max) > 20 GHz†, Nano Lett. 10, 809-812 (2010). Y.-J. Doh, J. A. van Dam, A. L. Roest, E. P. A. M. Bakkers, L. P. Kouwenhoven, S. De Franceschi, â€Å"Tunable Supercurrent Through Semiconductor Nanowires†, Science 309, 272-275 (2005) C. T. K.-H. Stadtlà ¤nder, â€Å"Scanning Electron Microscopy and Transmission Electron Microscopy of Mollicutes: Challenges and Opportunities† Modern Research and Educational Topics in Microscopy, 123 (2007) C. K. Chan, H. Peng, G. Liu, K. McIlwrath, X. F. Zhang, R. A. Huggins, Y. Cui, â€Å"High-performance lithium battery anodes using silicon nanowires†, Nature Nanotech. 3, 31 35 (2008) Piezoelectric Effect, HyperPhysics http://hyperphysics.phy-astr.gsu.edu/hbase/solids/piezo.html Cooper Pairs, Hyperphysics http://hyperphysics.phy-astr.gsu.edu/Hbase/solids/coop.html V. Mourik, K. Zuo, S. M. Frolov, S. R. Plissard, E. P. A. M. Bakkers, L. P. Kouwenhoven, â€Å"Signatures of Majorana Fermions in Hybrid Superconductor-Semiconductor Nanowire Devices†, Science 336, 1003-1007 (2012). Fermi Level, Hyperphysics http://hyperphysics.phy-astr.gsu.edu/hbase/solids/fermi.html Leijnse, M., Karsten,F., â€Å"Introduction to topological superconductivity and Majorana fermions† Topical review 1-20 (2012) http://arxiv.org/pdf/1206.1736v2.pdf Enter the Majorana Fermion, Sciencemag.org, http://www.sciencemag.org/content/336/6084/989.full.pdf

Sunday, July 21, 2019

Partitioning Of Barbiturates Overview

Partitioning Of Barbiturates Overview Phenobarbitone is an antiepileptic drug which is used to treat epilepsy. Absorbance values at different concentration of phenobarbitone can be used to plot a calibration graph which in turns can be used to find the concentration of phenobarbitone in organic phase at different pH by using the gradient of the graph. From there, the concentration of phenobarbitone in aqueous phase can be determined and hence can find the partition coefficient (P). Ptrue of phenobarbitone can be determined with the presence of the value of Papp and fu of phenobarbitone (acid). % ionization of phenobarbitone at different pH can also be calculated by knowing its pKa and this in turns can be used to determine the lipophilicity of phenobarbitone. % extraction of phenobarbitone will also determine how well does phenobarbitone passes through the organic phase (biological membrane in the body) at different pH. Phenobarbitone is a barbiturate used in the treatment of epilepsy. It helps to reduce seizure frequency and severity and may even stop seizures altogether. [1] Phenobarbital works by acting on GABA receptors that in turn increase synaptic inhibition. This then increases the seizure threshold, hence reducing the number of seizures occurring. [2)] Phenobarbitone is the longest acting barbiturate. It is an acidic crystalline structure which has pka value 7.4, hence it is significantly ionised at ph values over 6. Lowering the pH of the solution reduces ionisation. [4] According to Phenobarbitone structure, it has 2 hydrogen bond donors and 3 hydrogen bond receptors and the solubility of Phenobarbitone in water is 1g in 1000mL (0.1% w/v). It has low lipid solubility compared with other barbiturate. Thus it has slow onset action and longer half life. This experiment was carried out to investigate the effect of ionisation of phenobarbitone by measuring the amount that was extracted into n-octanol from the aqueous phases of different pH values. The results collected were then used to find the concentration of the drug at equilibrium and since the pKa of the drug and the pH of the solution are known, the true partition co-efficient for phenobarbtione can be calculated. [3] Partition coefficient (P) is the ratio of concentration of drug in n-octanol phase divided by concentration of drug in aqueous phase. A high partition co-efficient implies that the drug is highly lipophilic. [5] The method used in this experiment is the shake-flask method (the most accurate measurement method). The drug, in this case phenobarbitone, is allowed to equilibrate between the NaOH solution and the n-octanol and then the concentration in both layers are been determined. [5] Since the total amount of barbiturate present in the 0.5M NaOH (which is extracted from the octanol) is known, and the UV analysis gives the amount of phenobarbitone in the octanol layer at equilibrium, we can calculate the weight left in the aqueous phase and hence the concentration of drug in each phase at equilibrium. pKa is important to determine the true partition coefficient for the barbiturate. The disadvantage for shake-flask is that it is only apply to the unionised drug which most drugs are acids or bases and are ionised in biological systems. Experimental 0.02% w/v phenobarbitone in water was been provided as the stock solution. Using the stock solution, 50Â µg mL-1 solution in 0.5M NaOH [Solution A] and a 50Â µg mL-1 solution in water [Solution B] were been prepared. (a) Calibration Standards A range of calibration standards each containing 5, 10, 15, 20, 25, 30 Â µg mL-1 of the phenobarbitone in 0.5M NaOH were prepared using Solution A. The wavelength of maximum absorbance (ÃŽ »max) at about 254nm was then determined using the 30 Â µg mL-1 standard. The absorbance of each standard at the ÃŽ »max was read using 0.5M NaOH as the blank. A calibration curve of absorbance versus concentration for the phenobarbiturate was then constructed using the absorbance readings obtained. (b) Partitioning Samples Six partitioning funnels were filled as the following: i) 10mL Solution B, 10mL 0.1M HCl, and 20mL n-octanol ii) 10mL Solution B, 10mL pH 6.6 buffer, and 20mL n-octanol iii) 10mL Solution B, 10mL pH 7.0 buffer, and 20mL n-octanol iv) 10mL Solution B, 10mL pH 7.4 buffer, and 20mL n-octanol v) 10mL Solution B, 10mL pH 8.0 buffer, and 20mL n-octanol vi) 10mL Solution B, 10mL pH 9.0 buffer, and 20mL n-octanol The funnels were shaken at frequent intervals for 30 minutes to allow the layers to separate fully. The organic layer was then been carefully ran off into a second separating funnel. 20mL of 0.5M NaOH was then added to the octanol and shaken for 5 minutes, allowing the layers to separate. The absorbance of the aqueous (bottom) layer was then measured by using the ÃŽ »max determined previously in (a). The concentration of the phenobarbitone in the 0.5M NaOH was calculated using the calibration curve. Discussion In partition chromatography, molecules move from one phase to another via passive diffusion, i.e. the movement of molecules from an area of high to low concentration area without any facilitating factor. However, charged molecules are unable to move down the concentration gradient via this route. Partition chromatography of phenobarbitone mimics the movement of phenobarbitone across the biological membrane, i.e. the movement of phenobarbitone from aqueous phase, 50Â µg mL-1 phenobarbitone in water, to organic phase, octanol. Its chemical structure shows that there is a long hydrocarbon chain attached to the ring structure which contributes to its lipophilicity. The more lipophilic the drug, the more efficiently it is absorbed into the organic phase. Glass separating funnels were used to avoid absorption of lipophilic drug into the container. 30 minutes after the layers are left to separate fully, the aqueous layer is carefully ran off, leaving the organic layer in the separating funnel. 20mL of 0.5M sodium hydroxide, NaOH is then added to the organic layer to separate the mixture into two immiscible layers again. This is possible because phenobarbitone is a weak acid, it reacts with the newly added base, NaOH to form aqueous phase. The concentration of phenobarbitone in the aqueous phase is then determined using a UV spectrophotometer. From Table 1.6, at pH 1.1, the weight of phenobarbitone in organic phase is highest, 4.392 X 10-4 g; whereas at pH 9.0, the weight of phenobarbitone in organic phase marked its lowest at 2.800 X 10-4 g. This proves that the drug is most lipophilic at low pH as it is a weak acid and is unionised at low pH, therefore more able to cross into the octanol layer. Meanwhile, at pH 9.0, most of the drug is retained in the aqueous phase in its ionised form and hence unable to cross into the octanol phase as it cannot be passively diffused. As shown in Table 1.7 and Graph 2.0, the higher the pH, more of the drug present is ionised and vice versa. Starting from pH 1.1, the percentage of phenobarbitone ionised in the aqueous phase increased slowly up to pH 6.6, followed by a steep increase from pH 6.6 to pH 8.0, and further increase less steeply from pH 8.0 to pH 9.0. As for Graph 2.0, a slow decrease is observed from pH 1.1 to pH 7.0, a steep decrease from pH 7.0 to pH 7.4, followed by a gradual decrease from pH 7.4 to pH 9.0. Partition coefficient, P is the ratio of a drugs concentration in the octanol phase to its concentration in the aqueous phase at equilibrium with each other. A high P value hence denotes a high drug concentration in organic phase. From the results, a high P obtained at low pH proves that phenobarbitone is a highly lipophilic drug, capable of crossing lipophilic membranes in the body. From the results section, Ptrue value at pH 1.1 is 7.74, whereas the literature value is 1.4. The comparison is made at pH 1.1 because phenobarbitone is present in its unionised form at low pH. However, the Ptrue value is much higher than the literature value. This could be due to errors that occurred during the experiment, e.g. parallax error while pipetting the stock solution, and accidentally ran off some of the organic phase while running off the aqueous phase, causing undetermined potential weight loss of phenobarbitone in the organic phase. It could also be due to insufficient time allowed for phenobarbitone to diffuse from the aqueous phase into the organic phase. Studies revealed that the peak plasma concentration is reached 0.5 to 4 hours following an oral administration; partition chromatography mimics the diffusion of drug across biological membrane, therefore requires at least 30 minutes to reach peak plasma concentration of phenobarbitone in the organic phase. However, in the experiment, the partition was stopped at 30 minutes, not allowing more time for the mixture to separate fully. As octanol was added into the separating funnels at different times, they could not be stopped at the same time. The aqueous (bottom) layers were then run off starting from the funnel where octanol was added the earliest to the latest. The time taken to run off the aqueous phase varies as the volume of aqueous phase varies from funnel to funnel, which may have resulted in different times for each funnel to separate and hence more complete separation in the later mixtures. The lipophilicity of phenobarbitone contributes to its absorption into the octanol phase. Likewise, it is readily absorbed across biological membranes in the body, e.g. stomach wall, cell membrane and blood-brain barrier. Phenobarbitone is administered orally; it is rapidly and fully bioavailable after oral administration as phenobarbitone is unionised in acidic environment. At pH 1.1, 87.84% of phenobarbitone was extracted into the organic phase. This signifies that 87.84% of phenobarbitone is able to cross the stomach wall into the systemic circulation. The absorption is expected to decrease with the increase of pH value down the gastrointestinal tract; the unionised fraction is smaller in the small intestine but has longer intraluminal dwell time and hence increasing absorption. Being lipophilic, phenobarbitone crosses biological membranes readily, more preferably at low pH environment, into the bloodstream and around the body via systemic circulation and then distributed throughout the interstitial fluid. However, about 50% of the drug is bound to plasma protein, therefore neither able to travel across the blood-brain barrier into the cerebrospinal fluid nor is it able to be metabolised by the liver. From Table 1.8, at pH 7.4, 70.72% of phenobarbitone was extracted into the octanol layer. Assuming 50% is protein-bound; it can then be assumed that only about 35.36% of phenobarbitone would reach the brain at physiological pH 7.4. Elimination is a mechanism the body utilises to rid drug, xenobiotics and waste products from the body and plasma, mainly by the kidney and the liver. The normal pH of urine ranges from pH 4.5 to pH 7.5. Phenobarbitone being lipophilic and protein-binding has a slow elimination; its lipophilicity prevents it from being filtered by the glomerulus, unless metabolised in the liver into a less lipophilic metabolite. However, 25% of phenobarbitone is still excreted in its unionised form via passive tubular secretion. This route of excretion is exaggerated when urine is alkaline or when the urine volume is increased, i.e. via forced diuresis. Conclusion As phenobarbitone is used in treatment of epilepsy, it needs to possess the characteristics and ability to cross the blood-brain barrier into the motor cortex to exert its depressant effect. From the partition chromatography carried out, it is evident that phenobarbitone is readily absorbed into the body across biological membranes due to phenobarbitones lipophilic nature. It is also widely distributed in the body fluid, including the cerebrospinal fluid where it can act on the motor cortex. As for elimination, approximately 75% of the drug is metabolised by the liver before being excreted, but 25% is excreted as unionised molecules by passive tubular secretion in the kidneys. In conclusion, phenobarbitone has a relatively fast onset of action, hence it is deemed suitable to be administered via the oral route for the treatment of epilepsy.

Saturday, July 20, 2019

Gordon Wood’s Radicalism of the American Revolution Essay -- Essays on

Gordon Wood’s Radicalism of the American Revolution is a book that extensively covers the origin and ideas preceding the American Revolution. Wood’s account of the Revolution goes beyond the history and timeline of the war and offers a new encompassing look inside the social ideology and economic forces of the war. Wood explains in his book that America went through a two-stage progression to break away from the Monarchical rule of the English. He believes the pioneering revolutionaries were rooted in the belief of an American Republic. However, it was the radical acceptance of democracy that was the final step toward independence. The transformation between becoming a Republic, to ultimately becoming a democracy, is where Wood’s evaluation of the revolution differs from other historians. He contributes such a transformation to the social and economic factors that faced the colonists. While Gordon Wood creates a persuasive argument in his book, he does how ever neglect to consider other contributing factors of the revolution. It is these neglected factors that provide opportunity for criticism of his book. The overall feeling one gets from reading Wood’s book is that republicanism was not a radical concept to the American colonists. Wood believed the American colonists had a deep- rooted concept of Republicanism that existed before revolutionary ideas were conceived. The idea of republicanism could be seen in the colonial belief in independence and self-sacrifice. These principles were the founding forces that led to the beginning of the revolution. Wood would seem to believe that these founding forces were not as radical as the transformation to democratic thought. It is here that Wood points out the â€Å"uncontrolla... ... social and economic forces with those of traditional forces his book would have a better claim on legitimacy. Gordon Wood gives an interesting insight into the Revolution. Overall, I find Wood’s argument to be persuasive and refreshing. There is little doubt that the forces that Wood proclaims as significant in his history of the Revolution are important. However, it is this same concentration on non-traditional forces that leads to my criticism of his book. Wood should not have focused entirely on his commonly overlooked social and economic forces. Instead, he should have combined his insight along with the insight of other traditional forces to give his book a well-rounded theory behind the American Revolution. Work Cited Gordon S. Wood. The Radicalism of the American Revolution. Vintage; Reprint edition. March 2, 1993

Friday, July 19, 2019

Metallica :: essays research papers

Metallica Introduction Metallica was a band that that started out in the garage of one of the members when they were in high school. The band went through many changes and tragedies and found solutions for them and somehow remained playing. They started in 1980 as one of the first, if not the first Black/Metal band. Their popularity decreased in 1987 and form there they went on to become really popular later on. Summary Metallica started playing in 1980 and are still a band to this day. They have gone through many changes over the years. The original members of the band were James Hetfeild, Lars Ulrich, Dave McGovney, and Dave Mustain. Hetfeild was the rhythm guitarist and singer. Lars is a very great drummer. McGovney was the original bass player. And Dave Mustain was the original lead guitarist. Lars first began playing at the age of 13 when his grandmother brought him home a cheap set of drums which he pounded in. He was inspiried and began to like music after his father took him to a Deep Purple concert. His family migrated from Denmark to Newport Beach, California in 1980 to find the sunny climate to play tennis. After that he met the band as friends and then began to play. Hetfeild went to Downey East Middle School where he started playing in the auditorium on the stage with friends. Three years later his mother died of cancer. There was a song written in memory of her memory titled "The God that Failed." Then he moved to L.A. where he met the band. Lars knew Kirk but he already had enough guitars in the band. Eventually Dave Mustain was kicked out of the band because he disagreed with everyone. McGovney followed with him. Kirk was already playing with a band called Exodus but quit to join Metallica. And the band acquired bassist Cliff Burton to join. Cliff was in the group when they made their oldest album called Kill em' All. But died in a bus accident on tour. The band was shook up and didn't play in concert for years. Not only did the death of Cliff startle them, but they also had to acquire a new bass player. Jason Newstead was chosen of many other people who tried out for the band. Those people included Les Claypool of the band Primus. Newstead grew up in Niles, Michigan where he and his family raised horses. They moved to Kalamazoo then to L.A. Jason Newstead came from a band named Flotsam and Jetsam named after a chapter in J.R.R.

Barn Burning - Charcter Analysis :: essays papers

Charcter Analylis Barn Burning Character Analysis William Faulkner’s â€Å"Barn Burning† In â€Å"Barn Burning† the setting is a time when people drove horse wagons and the workingmen were generally farmers. The major character in this story is Colonel Sartoris Snopes, called â€Å"Sarty† by his family who is a ten-year-old boy. In the beginning, Sarty is portrayed as a confused and frightened young boy. He is in despair over the burden of doing the right thing or sticking by his family, as his father states,† You got to learn to stick to your own blood or you ain’t going to have any blood to stick to you.† Sarty’s father, Abner Snopes is accused of burning down a barn and Sarty is called upon to testify against his father and to tell the events of what happened. He wants to tell the truth because it is the right thing to do, but he knows he might have lie to save his father from being reprimanded. To his relief, it is decided that Sarty will not have to testify and is dismissed from testifying. It is decided by the Justice of the Peace to order Abner and his family to leave town at once. Sarty has moved twelve times in his ten years of age and although the story does not state clearly, that this is not the first time his father has set fire to a barn, but shows that the chances are, that he probably has done this in the past which has affected Sarty in how he feels about his father. Sarty’s other family members include the mother, aunt, an older brother, and two twin sisters who are minor contributing factors in this story. The family knows the father is responsible for the burning of the barns and they even unwillingly help him at his requests. This story describes the family somewhat concerned for the father, but they never challenge his decision to burn the barns even though it is wrong. The critical point of the story is when Sarty decides to tell Mr. De Spain that his father is going to burn his barn. Sarty is in disarray because he doesn’t know what is going to happen to him next and is probably speculating that his family will never forgive him because the of the harm that will come to their father if he is caught in the act.

Thursday, July 18, 2019

James Fenimore Cooper

Connor Roche Research Paper JAMES FENIMORE COOPER James Fenimore Cooper was an important literary figure of the 1800s, best known for his novels. He is perhaps most noted for his greatest work of literature: The Last of the Mohicans: A Narrative of 1757, a tale that chronicles the journey of several English people and a few Native Americans during the French and Indian War, also known as the Seven Days War. Cooper’s work on this novel and others such as The Prairie reflects his different approach regarding certain commonly held ideas of the time. This was especially true concerning the present-day views most people had about Native Americans. However, Cooper’s work also reflected his compliance with the most popular fine arts movement of his time: Romanticism. To completely grasp the scope of Cooper’s writing, some background on Cooper’s life, and the social customs and ideas of his time are necessary. Cooper was born on September 15, 1789 to Elizabeth Fenimore and William Cooper, the founder of the city of Cooperstown, NY. After expulsion from Yale College, Cooper pursued a career as a sailor on a merchant ship, traveling as far as the Strait of Gibraltar. Following this was a brief stint in the United States Navy, followed by farming. During his expeditions at sea, James Cooper seriously considered becoming a writer. In fact, most of his stories tell tales of sailors and sea trips, inspired by his own days on the water (Literature Network). At the time of Cooper’s writing, Native Americans were often held in contempt, mistreated, and oppressed. This had been a common aspect of society since the days of Columbus’ first expeditions to the Americas (Cassutto). The Native Americans were regarded with prejudice, hatred, and most of all fear, as is present when experiencing any unknown thing. Often times, brutal massacres were carried out, killing hundreds of innocent Native Americans. Cooper attempted to change such ideas through the relationships established between characters in his books, as is best shown by The Last of the Mohicans. This book was actually the second (and best known) in a series of five â€Å"Leatherstocking Tales† In this story, the two of the main characters are a white man named Natty Bumppo and a Native American named Uncas, who is the titular â€Å"Last of the Mohicans†. These two men, though they were from completely different backgrounds, form a very close bond, and show that interracial cooperation is extremely plausible, and actually useful. Furthermore, Natty Bumppo goes as far as adopting a Native American name, Hawkeye, to show that he truly could blend in with the Native Americans and act peacefully with them. The actual story takes place during the French and Indian War, about 30 years before Cooper was born. Though the war is named after two groups, the actual struggle was part of a huge conflict between several nations, including Austria, England, France, Great Britain, Prussia, and Sweden. In the American colonies, the war resulted from excessive pressure from the British for additional resource collection and production. This resulted in higher taxes, more strenuous work, etc. During the war in the colonies, the Native Americans (Indians) faced the French, who, allied with the British, extended the war for seven years. Considering the effects that the events of the time period would have had on the people, the works of James Fenimore Cooper could even be considered revolutionary. Despite the heavy racism of the time, Cooper stressed the importance and possibility of interracial cooperation, and even seemed to promote it. In other words, he was not afraid to change the stereotype and provide an alternate view of Native Americans. However, as with all situations, James Fenimore Cooper also provides a negative, more foreboding side to the relationship between different cultures. Specifically, he seems to promote friendship and brotherhood, but strongly warns against interracial romance. This seems to be a common theme of his contemporaries, who also strongly agreed that interracial romance was to be strictly off-limits. Though not stated directly by Cooper, the fates of several of the characters in The Last of the Mohicans shows that Cooper believed that interracial love would lead to tragedy. This is implicitly stated through the unfortunate deaths of two of the main characters. In the story, Uncas, the aforementioned Mohican, and Cora Munro, an English general’s daughter, begin a budding romance that leads to their eventual demise. Cora is kidnapped by the villain of the story, a Native American of the Huron tribe named Magua. During rescue attempts, both Cora and Uncas are inevitably killed. The death of these two characters seems to suggest that interracial romance will lead only to failure and is highly dangerous. On a very basic level, it is the essential differences between the cultures that cause a split that leads to the failure of the romance. In this case, the brutal nature of the Native Americans causes the death of both the sheltered English girl, and even the tough, hardened Native American man. At this point, it is clear that James Fenimore Cooper did not adhere to the racial conventions of his time. Despite some warning of the dangers of cultural mixing, in his literature, he stood by his own beliefs of interracial interaction. However, James Cooper did follow others in his era with the type of literature he wrote. His work was reflective of the Romantic style of writing and at the time of his novels’ creations, the Romantic Era was in full-swing in America. The Romantic era was a movement in the fields of art, literature, and intellectualism that originated in Europe in the late 1700s. The movement placed a heavy emphasis on emotions such as fear, horror, and awe rather than reason. Also, there is a superiority of mystery over clarity, and importance given to the individual, rather than the standards of society. This could be easily expressed through art, but through literature, the conveyance of such emotions was a very new experience. Certain effects of the movement were clearly reflected in Cooper’s literature. For example, along with the Romantic movement came the inspiration of political change, and also, in stark contrast, descriptions of heavily romanticized (hence the name of the period) situations and settings, such as â€Å"a mock-medieval castle perched dramatically above a craggy ravine† (History World). Elements such as these are clearly evident in Cooper’s work, especially the emphasis on setting. Using rich descriptive language, Cooper gives details of all the areas that his characters venture through. At times, the extensiveness of his description is so rich that a reader may feel as though he or she is actually experiencing the setting. This was very common in Romantic literature, and can be seen in the following passage from The Last of the Mohicans: â€Å"The mountain on which they stood, elevated, perhaps a thousand feet in the air, was a high cone that rose a little in of advance of that range which stretches for miles along the western shores of the lake, until meeting its sister piles, beyond the water, it ran off toward the Canadas, in confused and broken masses of rock thinly sprinkled with evergreens. † (The Last of the Mohicans, James Fenimore Cooper, 177) Aside from the Romantic descriptions of locations and characters, Coopers work also showed a great amount of diversion from previously held ideals, as mentioned above in his explorations of interracial friendships and interaction. This seems to carry an underlying feeling of political activism, which was another of the attributes of the Romantic Movement. The activism lies in the implication that racial boundaries should be reexamined and reevaluated. Though Cooper does not say outright that his novel should spark a revolution, his work does imply that there is a desperate need for change in society. Furthermore, some aspects of the novel could be seen as an anti-war statement made by Cooper. This was a shared sentiment among many of his contemporaries, and carried on even through the Vietnam War in the late 1900s. However, this sentiment could be seen by analyzing the novel from a Romantic Movement point of view. Returning to the idea of descriptive nature, Cooper often gives descriptions not only of the beauty of the land, but also of its inherent danger. In the story, nature provides almost as much of a struggle for the main characters as the war does for the soldiers. In a sense, it seems as if Cooper was trying to say that nature was the real enemy, not other humans. The anti-war sentiment could not only be interpreted metaphorically through the text, it was also sometimes stated explicitly. In the following passage, James Cooper’s disgust for war and fighting is evident, as he describes the battle as an extremely gruesome occurrence: â€Å"More than two thousand raging savages broke out from the forest at signal and threw themselves across the fatal plain with instinctive alacrity. We shall not dwell upon the revolting horrors that succeeded. Death was everywhere in his most terrific and disgusting aspects †¦ The flow of blood might be likened to the outbreaking of a torrent†¦ and as the natives became†¦maddened by the fight, many among them†¦drank freely†¦hellishly of the crimson tide. †(Mohicans, Cooper 222) As was made clear by this passage, Cooper clearly resented the war and the horrors it brought with it. In Conclusion, the works of James Fenimore Cooper gave a clear representation of the ideals and movements of his time. His writing was reflective of the new intellectual, artistic, and literary Romantic Movement, shown by its beautifully descriptive passages and also by its deviation from what was previously accepted as normalcy. Furthermore, his works deviated from not only his predecessors, but also his contemporaries, as he implicitly supported the furthering of positive interracial interaction and cooperation. Coopers work was a great addition to his era, and greatly helped reflect the changing times and culture of the 19th century.

Wednesday, July 17, 2019

Crisis hostage management/criminal justice Essay

It is saddening when e actually sidereal day we read ab out reports of warrantor pickings happening all over the world. Reports from jurisprudence force intelligence departments across the world assign that, security fetching fibres ranges from seize of infants to taking hostage of crew of big pissing vessels, as is rampant along the bound of Somalia in Africa. US is not an exeption, infact galore(postnominal) slip of papers of hostage taking commence been describe especially in the southern section states. An example of hostage taking geek happened at Hillary Rodham Clintons campaign offices in Rochester, untried Hampshire.A nicely dressed colour haired man known as Leeland Eisenberg walked into the offices on a Friday demanding to talk to Hillary Clinton around fate him get mental health guard and ended up taking at least tailfin people hostage including an infant. The ordeal went on until night when the ending hostage walked to freedom and the hostage take r peacefully surrendered to the practice of law. Although Eisenberg had a packet of highway flares tape-recorded on his body, when he was persuaded by the states police negotiator he gave up and surrendered to hit police team. match to Hillary Clinton as she address a press conference by and by in Portsmouth that night, Eisenberg was in need of abet and was seeking attention in dead the wrong way. Eisenberg was held on state charges of kidnapping and reckless conduct, federal charges were being considered. (http//www. msnbc. msn. com/id/22043358). some other hostage taking relative incidence occurred in Louisville whereby a mother (Gail Lynn Coontz) killed her twain children patriarchal 14 and 10 years in their beds and later went to a college she attended with a taw before handing over the apparatus to the colleges health counselor.The threat at Louisville University College ended with no injuries about half(a) an hour later it began, but discipline officials asked p olice to check on the children, which were prepare dead with catalystshot wounds. Mrs. Coontz was taken to a psychiatric clinic and later taken to Louisville jail. According to university police, Maj. Kenny Brown, she was charged with terrorist threatening for pointing a gun at a police officer. (http//www. msnbc. msn. com/id/23827059). The two counts of hostage taking were very diverse from one another because the stolon case was carried out in a daft manner i. e.no violence was reported, the road flares posed some considerable hazard, had the curious decided to use them. The hostage taker was exactly trying to seek attention correspond to Hilary Clinton because he unconditionally released the hostages after thought process by a police negotiator. The insurgent case was a serious one, with the doubt having shot dead her two children ahead on. Its true that twain hostage taking incidences were perpetuated by people who were undergoing psychological problems. For instan ce Eisenberg had a court case filled by his wife for medicine abuse, assault, and verbal threats, while Mrs.Coontz was a windowpane and therefore was stressed by family burden. In both incidences of hostage taking, the hostage takers were persuaded into give up peacefully, i. e. they never put up any violent resistence. in realise of the US presidential terms insurance policy on hostage taking threats, based on yesteryear experience, making concessions that benefit hostage takers in exchange of release of hostages increased the danger that others will be taken hostage. At the same time the US government always makes every effort to tactual sensation the captors or even their representatives so as to secure the release of hostages.under topical US law, 18 USC 1203(act for prevention and punishment of the plague of hostage taking, enacted oct 1984),seizure of a US citizen as a hostage anywhere in the world is a crime and therefore subject to investigation by the Federal Bure au of Investigation and to prosecution by US authorities (http//www. state. gov/r/pa/prs/ps/2002/8190. htm. ) In the starting time incidence Eisenberg was sweet talked to by a state police negotiator into big(a) up and surrendering peacefully to the police. And in the sec case Mrs.Coontz although pointed a gun to police a officer she voluntarily gave out the gun to the college health counselor. This shows clearly that the negotiators vie their part professionally and with a share of patient. From both counts its evident that very minimal force was applied by the police to free the hostages. In the first incidence for instance, although police camped outside the create they never attempted to use extra force lest they provoke the hostage taker into doing a nasty action. Similarly, in the second incidence police played safe until Mrs. Coontz surrendered the gun to the college health counselor voluntarily.Therefore the outcomes of both cases of hostage taking were a victor on the part of police since no one taken hostage was hurt and the suspects were apprehended. The articles from which I extracted these two hostage taking counts were fairly written, providing detailed information about the hostage takers, and the hostage taking incidence. alone the part on negotiation amid the suspects and the negotiators was not well expounded in both counts. Readers would want to know the agreements leading to the change intensity of hostage takers and hence giving up. The writers withal gave very little coverage on police action about the incidences.The condition of the killings of the two children by their mother should have been provided . References A man takes more than five people hostage at Sen. Hilary Clintons campaign office in Rochester N, H, purchasable at 1) http//www. msnbc. msn. com/id/22043358 accessed on April 15, 2008 a mum takes terrorizes a college with a gun after killing her own two children, easy at 2)http//www. msnbc. msn. com/id/23827 059accessed on April 15, 2008 US policy on hostage taking threats, useable at 3) http//www. state. gov/r/pa/prs/ps/2002/8190. htm accessed on April 15, 2008