Tuesday, May 12, 2020

Women Rights in Saudi Arabia - 1800 Words

English 101 Essay #1 We can do it In most of the western civilization, particularly the Americans had heard or seen this female wartime propaganda poster created by J. Miller. There is much in our art and literature that romanticizes girls and women and the role they play in our culture. Nowadays, there is around 3.3 billion female living in our world. Sadly, one in every three women worldwide are victims of sexual, physical, emotional, and other abuse during their lifetime. Being female often means being sentenced to a life of poverty, exploitation, and deprivation. Therefore there are around 1 billion abused women around the world every single year. Being an ambassador’s son, I believe it is the most fortunate and†¦show more content†¦We are living in the 21st century, and there are still traditions from the 19th century, and that is just insane. Somehow, I knew I was losing Ms. Basha’ir. I could tell she was not the same person. Her energy in teaching was slowly disappearing. Her dream to one day be freed of limitations was getting smaller each day. And I understood perfectly what she was going through. With all those restrictions I would probably feel the same way. During my free time when I would step outside from school I saw that gender segregation is common in all areas of public life in Saudi Arabia, from the more obvious places, like swimming pools in public clubs, gyms and resorts to the less obvious, such as restaurants, coffee shops and even in ice cream shops. While you will hardly ever encounter a single Saudi woman on the streets, a woman living in Saudi Arabia who would like to dine out alone in the evening can usually do so in the family area of most restaurants. I have heard and witnessed enough about this absurd way of life. I started to think how I could help Ms. Basha’ir and the only way would be throughout my father’s diplomacy. I knew that would be almost impossible since most of the women in Saudi Arabia when want to be free from such an arbitrary lifestyle so they escape to another country. And that was exactly what happened. On certain day Ms. Basha’ir did not show up for her class. We were informed that she would not be teaching anymore. We just could notShow MoreRelatedWomen s Civil Rights Of Saudi Arabia And Consultative Council ( Majlis Alshura )1591 Words   |  7 Pagesability to act upon Women s civil rights challenges in Saudi Arabia are: The king of Saudi Arabia, Consultative Council (Majlis Alshura), The Council of Senior Scholars, The National Society for Human Rights, Human Rights Advocates, The Media, Saudi Ultra-Conservatives and the Saudi women themselves. See the matrix below to get more information about it: Policy Analysis Current Situation: As the researcher mentioned above some of Saudi Arabian citizens still look down upon women and they still believeRead MoreThe Culture Of Saudi Arabia1588 Words   |  7 Pages THE CULTURE OF SAUDI ARABIA SSG LUCAS, TIMOTHY 13B40 SENIOR LEADER COURSE (003-17) THE CULTURE OF SAUDI ARABIA The Kingdom of Saudi Arabia is a very diverse group of people with a heavy religious background. The Kingdom, located on the Arabian Peninsula situated amongst a very hot and arid climate. The people of Saudi Arabia remain very family oriented and have transformed from a nomadic culture to a very wealthy and thriving nation, largely due to theirRead MoreThe Importance Of A Training Program For Women851 Words   |  4 PagesIntroduction In Saudi Arabia, there is a need to activate the participation the role of women in the development process in the community. The role of female in Saudi society is to be a good mother and a good wife. Women in any society like men, and they have the same right to work. Women are less than half of Saudi society, and the estimated proportion of women in Saudi society is about 45% of the population. They have not an important and active role in the renaissance of the community. EducationRead MoreSaudi Women s Participation For Public Atmosphere1281 Words   |  6 Pages Saudi Women s Participation in Public Atmosphere Introduction The Kingdom of Saudi Arabia is one of the most influential countries in The Middle East. It is also a key member of the Gulf Countries Cooperation, amalgamation of monarchies in the Arabian Peninsula. Saudi Arabia is currently ruled by King Salman Al-Saud was crowned as the King on January 23, 2015. Saudi Arabia is also the cofounder of The Organization of the Petroleum Exporting Countries (OPEC), which plays a significant rule in theRead MoreThe Rights Of Women And Education1645 Words   |  7 Pagesimportance. In the United States women are held at an equal level with men, we’ve fought for this sense of equality for several years and unfortunately, not all women across the world have had that same success. Women from other countries do not have half of the rights that we do here in the United States, and this is something that we seem to never really think about. Saudi Arabia is just one of the many countries around the world in which the women do not have as many rights as men do. Being a feministRead MoreArgument Essay Outline903 Words   |  4 PagesOutline I. Introduction a. Hook: Women make up one half of society. Our society will remain backward and in chains unless its women are liberated, enlightened, and educated b. Background Information: women play important role in the family, men in Saudi Arabia consider women as a second sort. c. Opposing Position: Men in Saudi Arabia believe women should enjoy their lives and follow religious customs d. Thesis Statement: women in Saudi Arabia are deprived many rights, such as driving and social restrictionsRead MoreSaudi Arabian Women And The Obstacles1620 Words   |  7 PagesAbstract THE FOCUS OF THIS PAPER WILL BE ON SAUDI ARABIAN WOMEN AND THE OBSTACLES THEY MUST OVERCOME TO ACCESS HEALTHCARE. WHAT MANY BELIEVE TO BE SHARIAH LAW CONCERNING WOMEN’S RIGHTS OF HEALTHCARE IS ACTUALLY BASED MORE ON TRADITION AND CUSTOM RATHER THAN LAW. UNFORTUNATELY, MANY PEOPLE IN SAUDI ARABIA ARE UNAWARE OF THIS AND STILL ABIDE BY THESE TRADITIONS AS IF THEY ARE LAWS. THESE PEOPLE INCLUDE MEN AND WOMEN, AND MANY HEALTH CARE PROVIDERS. IN SAUDI ARABIA, MOST OF THE POPULATION IS ULTRA CONSERVATIVERead More Fighting for Equal Rights in Two Opposite Countries Essay832 Words   |  4 PagesIt is hard to believe that in the world that we live in, there are still countries in which women fight to have their rights. In the twentieth first century, there are countries that woman, â€Å"regardless of age or marital status is required to have a male guardian. Her guardian may be her father, her husband, her uncle, her brother, or even her own son† (Mandi). In strict arab cou ntries, Saudi Arabia, women are considered inferior to men, taking to an extreme point in which female are not registeredRead MoreHow Is It Different Countries?1444 Words   |  6 Pagesand systems of stratification and inequality in Saudi Arabia and UAE. As a woman living in one county could be totally different than living in another one. Women s status could be challenging in some countries and could be easy in another. Women s status in each society and culture differs in different ways around the world. In some societies, women s status improved progressively, while in other, it dropped or remained unimproved. Saudi Arabia has its own traditions that are carried from anRead MoreCan Nine Minimum Criteria Be Used for a Democracy in Yemen and Saudi Arabia?859 Words   |  4 Pagesof the nine criteria, if not all, are irrelevant in my assigned countries, since both my assigned countries are non-democratic. Criteria one gives elected officials constitutional power to make policy. Under this criteria, Yemen and Saudi both differ. Saudi Arabia has a Shura council, which is an advisory body, but they do not enact and enforce laws, only the King can. In Yemen, there are elected officials and a parliament; however, the power they have is also limited. The second criteria guarantees

Wednesday, May 6, 2020

The Cloning Debate Essay - 1018 Words

The Cloning Debate Not so far in the future, a young boy of the age of six, dying a heart-wrenching death, will only be able survive with a bone marrow transplant. His parents will have searched near and far for a match, but none will come to their aid. The only possible way that they can produce a perfect match for their sons bone marrow is to clone their son. Unfortunately, at this time this topic is still being discussed and debated upon with the government. Their only child that has been their treasure for six years might die. A clone of their son becomes their apple of aspiration to keep the treasure from being buried. With a scenario as presented above, cloning might seem like the answer to hundreds of lives taken at†¦show more content†¦It violates the mystery of what it means to be human. Along with Jewish leaders, Protestant theologians think cloning of humans would cross the line (Herbert). Others agree with him when they think that cloning violates, the dignity both of human procreation and the conjugal union. (Vitae). Is the idea of cloning homo sapiens too surreal and abstract or should it become an everyday activity? Are we stepping in Gods shoes when we should not be or are we not stepping up to our calling? Would cloning make us God? Another major issue concerning cloning is the fact that clones would definitely face a different lifestyle than the rest of us. Some philosophers believe that the difficulties that clones would face would be different than the ones we do but not to a higher degree. Everyone is born with some future hardships in their life so it wouldnt be any different for a clone (Wachbroit). However, he also believes that there could be distinct differences between a clone and a non-clone. Things we take for granted would be confusing to a clone therefore, ...cloning thus results in ambiguities. Is the clone an offspring or a sibling? Does the clone have one biological parent or two? (Wachbroit). Following that problem comes the concern of what the clone would be called. ...clonee sounds like a good term butShow MoreRelatedThe Cloning Debate On Cloning1227 Words   |  5 PagesEva Gaetz Sec 09 Kanchan Hulasare The Cloning Debate According to Mosby’s Medical Dictionary, the term â€Å"cloning† is defined as â€Å"a procedure for producing multiple copies of genetically identical organisms or cells or of individual genes.† Researchers have conducted several cloning experiments over the years, replicating tissues, organs, and even full organisms such as Dolly the Sheep in 1997. The history of cloning dates back to the early 1900’s when Hans Adolf Edward Dreisch studied the resultsRead MoreThe Intense Debate Over Cloning753 Words   |  3 Pagespeople to realize many things their ancestors would not have even dreamed of. Cloning is absolutely one of them. Having identical twins without being born on the same they is like a dream come true. But what is cloning exactly? Cloning ,particularly in biotechnology, is the process used to create copies of DNA fragment, cells, or organisms. Attempts at cloning might go back to much ea rlier times such as the attempt made by Hans DreischRead MoreAnimal Cloning Debate Essay1045 Words   |  5 PagesAnimal Cloning Debate A clone is a genetic copy of another living organism –animal, plant or human. Animal cloning is a widely discussed issue in our society today. The question now is whether the Australian government should ban animal cloning. Many opinions are generated from this subject, such as the justifiability of cloning, and how far it should go. Religious views are prevalent, so too are numerous ethical concerns. The issue of whether or not the government shouldRead More The Debate of Human Cloning Essay4507 Words   |  19 PagesMissing Appendix The Debate of Human Cloning Human cloning has become a hot topic for debate. As we progressed one step closer to successfully cloning and developing a human being, legislators and the general public have become more concerned about the ethical and moral implications of this procedure. The federal government has been unsuccessful in reaching an agreement as to what policy to pass and enact. Thus, any current legislation on human cloning has been developed and enforced by individualRead MoreThe Controversial Debate Of Cloning2276 Words   |  10 PagesIn recent years, cloning has been a controversial topic, being highly debated by scientists, politicians, and philosophers alike while invigorating popular culture through works such as Star Wars or Aldous Huxley s’ Brave New World (Brock E-3). However, the fantastical examples of cloning to increase labor supply or selective cloning to create a caste system as these works depict, are highly irrelevant to problems society faces today with the prospect of clo ning. Current medical technology suggestsRead MoreEthical Issues Related to the Cloning Debate1389 Words   |  6 PagesThe act of cloning a human being comes dangerously close to human beings acting as God. Do human beings have the right to tamper with nature in this way? This essay explores the various ethical issues related to the cloning debate, and seeks answers to this deep philosophical question at the heart of bioethics. As a student of genetic biology and future biologist, this question also has personal relevance. Our science is evolving at a rapid pace. As human cloning becomes increasingly possible, itRead MoreThe Debate Over Stem Cells And Cloning1398 Words   |  6 PagesAbstract Stem cells and cloning are very controversial today. There are debates and arguments about it all over the internet. The idea of stem cells is to use them to help cure and prevent diseases. You can use embryonic and adult stem cells. That’s one of the reasons people argue about it, because it kills the potential life of the embryo. [Stem Cells and Cloning] Stem cells and cloning is very controversial in today s society. Some people believe it’s not a good idea because it destroysRead MoreIs Cloning Be A Debate Of Morals And Human Privileges?1477 Words   |  6 PagesHuman cloning is unethical since it steps back from human identity. In addition, it brings emotional mental damage for the cloned kid and absolutely discards the basic biological gene selection. For the most part, not a single person can manage to ignore the procedure that is made in science today. Whereas scientific research, for instance grants us information and the procedure of being able to clone human beings, which is something nobody ever assumed could be possible. After watching the movieRead MoreHuman Cloning Debate: The Fate of Frankenstein1671 Words   |  7 Pageslife. This idea, cloning, is neither new, nor mysterious it is simply the biological process of producing replicas of organisms through other means than sexual reproduction. In the United State s, consumption of meat and other products derived from cloning was approved in December of 2006, with no special labeling required. However, although there are two types of human cloning typically discussed: therapeutic or using adult cells for use in medicine, and reproductive, involving cloning human beings.Read MoreCloning : A Debate Of Morals And Human Rights862 Words   |  4 PagesIn the creation of technological advances that survives today, the dispute of cloning is ever existent as a debate of morals and human rights. People are asking if we have the right to clone humans and other animals. Cloning, the process of taking a cell from one organism, taking a donor womb cell from another organism of the same species, inserting the original cell in the donor cell, and placing the newly developed embryo inside a surrogate mother. This is an inhumane desecration of human rights

Salvia Divinorum Free Essays

Salvia Divinorum is a hallucinogenic Mexican herb known as â€Å"diviner’s mint† in the US and is typically a natural substance that has the ability to cause intense hallucinations â€Å"out of body† experiences, and a short-term memory loss. Although this substance is legal in the United States despite of the herb’s hallucinogenic properties, this stuff is generally not considered as therapeutic despite of the notion that it was also used for curing by the Mazatic, and is more likely to be use as recreational drugs by adolescents because of mind altering properties of this substance. Because of these properties, Salvia Divinorum should be classified as a potential source of restricted drugs along with Marijuana or the Cannabis sativa and products derived from this herb should be considered as restricted drugs. We will write a custom essay sample on Salvia Divinorum or any similar topic only for you Order Now A mysterious plant that is both puzzling and perplexing, this herb was described botanically by Carl Epling and Carlos D. Jativa in 1962 through the help of two Americans, Albert Hofman a chemist, and Gordon Wasson, an ethno mycologist investigating Mazatic rituals (Clebsh Barner p. 06). Growing only in the territory lived in by the Mazatic Indians of Oaxaca, Mexico; the Maztic Indians use this plant along with other ingredients for their hallucinogenic properties â€Å"in divinatory rituals† (p. 106). According to Clebsch and Barner, It was reported that if this salvia was ingested â€Å"it would produce an illusory experience† (p. 106). Apparently, this stuff when ingested produces strange feelings that could be similar to the effects of particular drugs such as Marijuana and other prohibited drugs. Daniel J. Siebert pointed out that the effect of taking Salvinorin A(an encapsulated product from salvia divinorum), includes seeing visions of people, objects, and places, and with doses above one mg user will experience out body experiences and may get up or move around with no clear awareness of their actions or behavior (p. 55). Furthermore, during the most intense phase of the experience, Siebert noted that user of this substance speak nonsense and even laugh hysterically. Siebert summarized the feelings experiences that could be had by any taking substance derived from salvia divinorum as follows: User sees objects such as yellow plaid French fries, a drawer and even ferries wheel; a visions of various dimensional objects; body loss and even identity; uncontrollable hysterical laughter; and different feelings of motion, or being twisted or pulled by forces of some kind (p. 55). From this feelings and experiences resulting from the use of salvia divinorum there is a considerable evidence that this substance could produce drugs that with effect similar or might even harmful than the effect of marijuana. The irony is that this drug is not restricted in the United States thus companies promoting drugs derived from this herb are free to promote these types of substances on the internet sites targeting younger adults and adolescents. According to information released by DEA, Drug Diversion Program entitled â€Å"Drugs of Chemical Concern: Salvia Divinorum† this substance is being smoked and its effect are described by users similar to other restricted drugs (WWW. Streetdrugs. org). Based on new pharmacological findings and the description of users of this substance, salvia divinorum should be classified as potential source of restricted drugs and that government authorities should closely monitor and act decisively against the liberal use of this substance. Just like other restricted substance that causes potential harm to the user when taken liberally, this substance are prone to abuse and may also cause potential harm to the users. While, there seems to be no clear physical benefit on the use of this stuff aside from the notion of relaxation, the abnormal behavior of the person when at the peak of experience of this drugs, is a clear indication of the potential harm this substance may cause on the users. Work Cited Clebsch, Betsy Barner, Carol D. The New Books of Salvias USA: Timber Press, 2003 â€Å"Salvia Divinorum† WWW. Streetdrugs.org http://www.streetdrugs.org/salvia2.htm Siebert, Daniel Salvia divinorum and Salvinorin A: new pharmacological findings Elsevier Science Ireland Ltd., 1994 http://www.sagewisdom.org/siebertjep94.pdf How to cite Salvia Divinorum, Papers

World Without Aids Essay Example For Students

World Without Aids Essay Acquired immunodeficiency syndrome (AIDS). Today, despite the continuing production of better antibiotics since the discovery of penicillin, we are facing an infectious disease against which all these drugs are virtually powerless. This disease is spreading inexorably, killing more people and more people each year. AIDS does not know no national boundaries and does not discriminate by race or sex. It is rampaging not only throughout the United States, but also through Africa, India, China, Russia, Europe, South America, and the Caribbean countries. Even infants and children are at risk. AIDS is similar to the bubonic plague or the BLACK DEATH that killed perhaps one-third in Europe in the 14th century. Yet, the difference from the Black Death and AIDS is that it is in slow motion because the infectious agent that causes AIDS can remain dormant in a persons body for several years before it causes illness, and because death from AIDS can be slow and drawn out once symptoms appear. AIDS is essentially a disease of the immune system. The bodys defenses are destroyed and the patient becomes prey to the infections and cancers that would normally be fought off without any trouble. In 1984 it was proved that AIDS is caused by the human immunodeficiency virus (HIV). A virus is a minute infectious particle that enters and kills the immune cells, or lymphocytes. Because it destroys the very mechanism humans rely on for protection, prior to 1996 contracting Aids was considered a death sentence. For many years, 85 to 90 percent of all AIDS patients died within three years. They might have recovered from one infection only to succumb to another a few months later. Between infections they remain weak, emaciated and unable to work or carry on normal activities. In late 1996, almost 15 years after the first reported AIDS cases, researchers made the discovery that a certain combination of newly developed drugs could substantially prolong life in some AIDS patients. But AIDS i s a fiendish virus. When researchers cleared it out of a patients bloodstream, it hid in the lymph nodes. Scientists, figured out how to banish it from the lymph nodes, they found the virus lurking in the brain. Although, there is hope for a cure because they have done some experiments isolating a gene and it has had good results in some people infected with AIDS. The area that many people are concerned is with Southeast Asia-particularly India. At 900 million, Indias population is almost double that sub-Saharan Africa, which, with 13.3 million HIV-positive adults, accounts for 60 percent of the worlds total adult infections. The major reasons for such spread in India and following Africa is the high rate of their population, poverty rate, and other risk factors all point to a likely explosion. The number of HIV infections worldwide doubled between 1991 and 1996-and that number is expected to double again by the year 2000. By the turn of the century, about 44 million people will hav e fallen victim to the virus that causes AIDS. The signs of hope do not stop by the reason of Prevention Programs which they have succeeded in reducing HIV-infection rates dramatically among young men in Thailand and young women in Uganda-two of the countries hit hardest by the3 disease. The rate of new infections have also dropped sharply among gay men in the United States, Australia, Canada, and western Europe. However, many ingredients of the AIDS epidemic are still mystery. The cause of AIDS remained uncertain for several years after its discovery. Even now, there are questions about how efficiently the AIDS virus spreads, whether it will kill everyone who gets it, and why the virus is do devastating to the immune system. Its initial spread was in the United States was among groups that are frowned upon by society-homosexuals and intravenous(drug users)- AIDS has a stigma associated with it. This makes the disease difficult to confront rationally. However, people are terrified even by the word of AIDS. The virus does not get transmitted by any body contact neither through the air. However, the disease does not pass from one person to another through the air, by sneezing, on eating utensils, by shaking hands, or through body contact in sports. There are only four ways it can be spread: through injection with a needle contaminated with HIV, which it can happen when drug addicts share needle s; by receiving a transfusion of contaminated blood; or-in the case of infant with an HIV-positive mother-having the virus transmitted through the placenta before birth, or the mothers milk after birth. For years, some people to refused to admit AIDS was a problem. Although, the disease first received national attention in 1982, when the Centers of Disease Control (CDC) noticed an alarming rate of rare cancer (Kaposis sarcoma) in otherwise healthy gay men. SOUNDING THE FIRST ALARMThree patients examined by Dr.Gottlieb were very ill. Interestingly, they had several striking features in common. All had unusual infections such as thrush, which is the growth in the throat of a fungus called Candida; or a rare type of pneumonia caused by a parasite called Pneumocystis. Also, they had been infected by less-common viruses, such as Epstein-Barr virus, which causes mononucleosis, or by cytomegalovirus (CMV). Taken together, the infections pointed to a serious defect in the patients immune systems. Sure enough, when Dr. Gottlieb drew a vial blood from each patient and measured special kind of immune cell called a T-helper lymphocyte, all three patients tests gave the same startling result. They were virtually devoid of T-helper cells, Dr. Gottlieb found. It was clear that they had seriously deficient immune systems. The three men had something else in common: they were all homosexuals. At that time it was not clear that the patients homosexuality was related to the illness; a patients sexual preference had never before been considered the determining factor of a medical disorder. That situation was about to change radically. SIGNS AND SYMPTOMS OF AIDSEarly symptoms of HIV, lasting between one and four weeks, can mimic that of mononucleosis, with symptoms such as swellings of the lymph nodes, headache, fever, loss of appetite, weight loss, sweating and sore throat. Often of these symptoms are mistaken for the flu or another viral-type infection, so people may not even be aware that they have been infected with HIV. Even if the patient has seen a doctor, the physician may dismiss the symptoms as a viral infection. In nearly all the cases, this stage dissipates due to the healthy immune systems ability to fight the initial infection. Early symptoms may include:*Herpes zoster (shingles), a skin rash that appear on the chest, abdomen, and/or back. *Herpes simplex, a common sexually transmits disease that affects the rectal, genital, esophageal regions of the body. Painful lesions can erupt into ulcerations of the area. In HIV/AIDS patients, this may become a chronic condition. *Thrush, a white coating on the walls of the mouth, gums, and on the tongue, that is caused by a fungus called Candida Albicans. *Excessive bruising and bleeding that occurs when a person develops antibodies which attack the bodys platelets-cells which help blood to clot. This condition can go unnoticed, and is often not detected until a routine blood test is performed. *Chronic or intermittent diarrhea, found both in early and late stages of HIV infection. As the immune system becomes increasingly compromised, the body is not able to fight off more serious infections that a normal intact immune system could suppress. Some of these life threatening infection include:*Pneumocystis pneumonia (PCP), caused by parasite called pneumoncytis carinii. Symptoms include fever and respiratory complications that often lead to death. *Kaposis sarcoma, a condition in which tumors of the blood vessels develop on the skin, in the gastrointestinal tract, mouth, lungs, groin, brain liver, and lymph glands. The mall, nonpainful lesions usually are a red, brown, or purple color. *Tuberculosis (TB), which can occur in both early and late stages of HIV. Symptoms include night sweats, fever, cough, and weight loss. One of the major problems with this aspect of the disease is the development of TB strains resistant to drugs, making it harder and harder to treat. *Mycobacterium avium complex, which produces fatigue, chills, night sweats, fever, weight loss, diarrhea, and abdominal pain. *HIV related lymphoma, swollen lymph glands in the neck, groin region, or under the arms. This requires radiation and chemotherapy treatment. *Toxoplasmosis encephalitis, caused by a parasite, which produces an infection in the brain leading to neuro logical impairment and seizures. Symptoms include headaches, fever, lethargy, confusion, and loss of balance or coordination. Wal-Mart Tire and Lube Observation Evaluation EssayBut with the regard of the two ways that AIDS is transmitted, blood and sex, it is clear the illness does not select particular groups to afflict. It does not matter if you whether you are a man or women, or what type of lifestyle you practice. If you are injected or transfused with contagious blood or take into your body other contagious bodily fluids, such as vaginal secretions or semen, you run a high risk of getting AIDS. Minute amounts of these fluids pose very little threat to transmitting the virus, and most nongenital fluids, such as saliva, are currently thought to pose no risk whatsoever of transmitting it. There is, however, a theoretical risk involved when any fluid is passed from an infected person, though the relative risk is extremely small. Research is still being done to prove these conjecture. 80 percent of babies HIV positive did not develop AIDS although, their mother had AIDS. HEMOPHILIACSThere are several diseases in which the blood does not clot properly. Those born with these conditions lack one of the many elements in the blood that are essential to stop bleeding. Hemophilia A is an inherited clotting disorder that afflicts men almost exclusively. In a person with severe hemophilia A, internal bleeding or bleeding into joints can lead to serious complication, possibly even death. Even small cuts clot slowly. It was persons with severe hemophilia A who were at highest risk to get AIDS. To control their bleeding tendency, hemophiliacs inject themselves with a concentrated preparation made from the blood of persons with normal clotting ability. This preparation, called Factor VIII, is credited with increasing the life expectancy of hemophiliacs in the last two decades from 35 to 55 years old. Some hemophiliacs have a mild disorder and use Factor VIII only when they actually have a bleeding episode. But all hemophiliacs depend on it at some point. Factor V III, which was life saving for hemophiliacs, suddenly turned to be an instrument of death. The preparation is made by pooling blood collected from 2,000 to 5,000donors, then concentrating it, quick-drying it, and putting it in vials. Because so many peoples blood was represented in each vial of Factor VIII, the possibility existed that at least one donor had AIDS or was harboring the AIDS organism-especially because drug users (until concerns were raised about infected donors) often sold their blood for cash. And because each hemophiliac uses 20, 30, or 40 vials of Factor VIIII each year, there was a good chance that he would encounter a contaminated vial sooner or later. IDENTIFYING THE VIRUSIn particular, no known infectious agent was capable of producing the specific destruction of the immune system that AIDS causes. Underlying all the symptoms of AIDS is one primary defect: loss of a pivotal type of white blood cells called the T4 helper lymphocyte(The role of T4 lymphocytes is to help other types of immune cells become active and do their job. Without the T4 helper cells, the immune system virtually shuts down. And in some AIDS patients there was an almost complete loss of T4 helper cells. Viruses are the most minute form of life. Some people would not even call viruses living organisms. They are many times smaller than bacteria, the other cause of human infectious disease. Whereas bacteria are independent, able to grow and reproduce outside cells of the organism they infect, viruses are parasites. In order to make more of their kind, viruses must enter the cells of the creature they infect and take over the cellular machinery. They subvert its p roductive power by making more of their own kind. The cell dies, but the virus thrives. The virus is an intracellular parasite because its structure, unlike that of a bacterium, is too rudimentary to sustain itself-it must live within another cell (Bacteria are internally complex, containing all the equipment necessary for life). Viruses contain only the genetic material necessary to propagate themselves and a tightly wrapped protective coat of proteins. These differences lead to a crucial medical distinction between bacteria and viruses. Twentieth-century medical science has developed many antibiotics drugs, such as penicillin, to combat bacterial infections. But viruses are more difficult to kill. Because they reproduce inside of our own cells, it is difficult to find a drug to stop the virus from reproducing without harming the host cell. Progress against diseases caused by viruses-such as small pox, mumps, measles, and polio-has come through vaccines, which prevent infections. Latency, means that the infection stays in a persons body for a while before it causes clinical illness. Because viruses can lie dormant inside cells, they can have long latency periods. The latency periods for AIDS-the time between exposure to the infection and the first symptoms-may be as long as eight years, but it is usually three to five years. In children the latency is much shorter, and in women it may be shorter than in men. Persistence refers to how long the infectious agent remains after it starts the disease. With AIDS it is most likely that the agent stays for the persons remaining lifetime. Despite treatment of each opportunistic infection, the immune system remains impaired. As fast as new immune cells are made they are destroyed. One tentative conclusion is that a viral ancestor of HIV evolved in Africa millions of years ago and affected monkeys. Gradually it changed to the form of HIV we see today. But this still does not explain why the virus suddenly started causing human disease in the last quarter of the 20th century. THE OFFICIAL U.S. DEFINITION OF AIDSThere are two factors which determine the category: T-cell count and history of disease of symptoms. The T-cell (officially called CD4+T-lymphocyte) is the vulnerable immune system cell the HIV virus attacks, then uses as a breeding ground. Eventually, the T-cells killed by the virus. As a persons T-cell count decreases, the risk of severe disease, or opportunistic illness, increases. The three official levels of T-cell counts are:Level 1: a T-cell count greater than 500cells/mlLevel 2: a T-cell count between 200-499 cells/mlLevel 3: a T-cell count less than 200 cells/mlThese categories are based on the lowest T-cell count registered by a person. For example, someone who once tested at 180 but later received a boost in T-cells from a new protease inhibitor would still be considered level 3. To determine the three official government classifications, symptoms are also a factor. For example, a patient is in AIDS category 1 if he or she is asynmptomat ic (no symptoms) and has a level 1 T-cell count. An AIDS category 2 patient has a level 2 T-cell count and at least one of the early stage illness but has not developed a later-stage disease, such as pneumonia or Kaposis sarcoma. In category 3-full-blown AIDS-the T-cell count has dropped below 200 and the patient has developed a later-stage disease. TREATMENT BREAKTHROUGHSThere have been so many attempts to find a solution to end with AIDS but its too complex and we know little of it, therefore its difficult to find a solution. Although, many experiments have been made for example the cocktail. Its a treatment of vaccines that combine with an AZT. However, this vaccines does work for some but for others it does not do anything. Yet, the newest discovery is that some people are born with a certain type of gene that does not develop AIDS but has the virus. So this person may pass on the Virus and have it himself but it will not affect him at all. TABLE OF CONTENTS1-INTRODUCTION2-WHAT IS AIDS?3-WHAT ARE THE SIGNS AND SYMPTOMS OF AIDS4-KAPOSIS SARCOMA5-WHY HOMOSEXUALS?6-PUZZLING SYMPTOMS7-INTRAVENOUS DRUG USERS8-HEMOPHILIACS9-IDENTIFYING THE VIRUS10-THE OFFICIAL U.S. DEFINITION OF AIDS11-TREATMENT BREAKTHROUGHSBIBLIOGRAPHY Check, William. The Encyclopedia of Health AIDS. Chelsea House Publishers; Philadelphia: 1999 Encarta Encyclopedia 97AIDS Microsoft Windows. Center For AIDS Prevention Studies:www.caps.ucsf.edu(March 1, 2000) JAMA HIV/AIDS Information center:www.ama.assn.org/special/hivhome.htm(March 1,2000) International Association Of Physicians in AIDS Care:www.iapac.org/ (March 1,2000)Science Essays

Saturday, May 2, 2020

Migrating Business Critical Applications †Free Samples to Students

Question: Discuss about the Migrating Business Critical Applications. Answer: Introduction As said by the Zhang, Cheng, Boutaba, (2010), Technology is improving being used by the several organizations across the business to improve and enable their organization performance. Krutz, Vines, (2010) suggested that One of the most effective technological innovations that have revolutionized the way business and people work in todays world in cloud computing. Implementation of the cloud computing technologies within the organization can facilities collaborative platforms from learning and research, improved services and flexibility capabilities, high efficiencies, better compliance and security and access to leading technology. As per the evaluation and findings, it is seen that the organization Commonwealth bank is presently suffered from the issues associated with the data handling and security. The observation also shows that organization functions its operations in all overall the world and most of the users are presently accessing the services through mobile devices; there fore, data theft related problems also considered the main problems for the organization. Thereby, the present report is mainly focused upon the effectiveness of the mitigation of the application and data sources into external computing in organization. Moreover the report also empathized on the security policies that could computing technology; uses to secure data or information. Apart from that the findings provides the effective conclusion and recommendation to solve the existence problems. With context to financial services Stakeholders of the organization are mainly investors in business whose actions are determined the result of the organization decisions. The stakeholders of the organizations are governments, customers, employers, investors etc. The main roles and responsibilities of the stakeholders is to make decision regarding the investment and providing the detailed requirements about the financial plan; that helps the organization to sustain in market and achieve set of objective in successful manner (Krutz, Vines, 2010).. Apart from that stakeholder of the organization also committing the necessary resources and determining the issues and risks associated with the organization. As per the findings and evaluation of the organization present scenario it is seen that the organization is not be able to provide effective security to data that hampered the organization performance in upcoming years. Interface between business stakeholders and technologist is done with the help of communication mode such as face to face communication, meeting, telephonic communication, etc. Before the implementation of the technologies within the organization main roles and reponsiblteis of the technologist to provide the all information to stakeholders regarding the project and how it assist the organization to perform effectively. Therefore the interface between the organization stakeholders and technologist is illustrated using stakeholder communication chart that is shown in below table; Stakeholders Impact stake the project what needs to be communicated risks CEO high Procedures and polices owners who find out institutional administrator procedures and policies Benefits of the implementation of the cloud computing technology and costs associated with the project (Takabi, Joshi, Ahn, 2010). Lack of clarity regarding preferred procedures. Financial management high Manage the organization financial system cost associated with the project and all of the devices, benefits in terms of finance associated with the costs Lack of budget planning Admin staffs Operate the organization new system moderate It helps the organization in order to contributes to process design as well as system and testing Worried about the workload increases and what training they will receive. Technical team They mainly helps to develop the system high how the system is developed and how testing is performed lack of knwonelge regarding the project As per the above communication chart it is seen that cost and benefits related to the project is most vital. Moreover, use of the cloud computing technology organization offers its services from anywhere and anytime. Cloud computing technology provides the office anywhere on demand delivery environment that changes the way infrastrure, desktop, LOB and storage applications are delivered to the clients (So, 2011; Chen et al., 2010; Chen, Zhao, 2012). Apart from that use of the cloud computing technology within the organization uses can simply access their data and information from anywhere via internet. The technology offers the cloud storage backup, which means the organization can stored its information in cloud and access them from anywhere at any time. As said by the Catteddu, (2010), Cloud storage and backup also provides simplicity, costs effective, removal of burden in house management and maintenance. The technology is deliver the data storage as services from the cloud provi der with the help of internet as well as billing computed on capability used in certain features. There are several benefits associated with the cloud computing technologies; Therefore, from the analysis and findings it is said that the stakeholders make an effective decision regarding the improvement of the services and incorporation of the cloud computing technology. Apart from that to implement the cloud computing technologies at workplace organization need to implements cloud computing regulatory stock take that provide an overviews of the country existing rules and regulations that implements to cloud services in Australia. The regulations cover the range of the contractual agreements, consumers protection, data protection and primary act. Security postures Security is the most vital elements for the organization and helps them to protect consumers data and information in successful manner. As said by the Catteddu, (2010), in present era most of the organization uses the past data and information to make decision in critical situations. As per the company scenario it is seen that access of the information of the organization done by the users suffering problems from accessing their own information from the organization. Moreover the observation also observed that network security also concerned one of the vital issues of the organization because the organization offers its services and products to users in both national and international market. Apart from that it is seen that the organization is suffered from the data storage issues that means to store huge amount of the data the organization needs to require extra hardware system that create high budget problems in front of the organization. Data breaches is one of the main component and organization security professionals believed that their organizations security measurements to safe data on physical devices i.e. server are low. Evaluating the scenario it is concluded that data breaching issues was more likely to occur for bank that uses the server. Hijacking of account also considered the main security issues of the organization and it is done mainly by attackers (So, 2011). Hackers or attackers continuously monitor the organizations network scenario and use of the malware code they can easily access the organization information and application software. After accessing the organization application software they modify and access the users personal information for his purpose. If the organization suffered from the security issues problems that they lose market confidence and customers satisfaction. Moreover, the analysis shows that if an organization not implements better security policies within the organization then they can hamper their organization performance and lose customers trust. Migrating organization critical application and their associated data source to an eternal cloud computing helps the organization to achieve high security, collaboration and mobility. As said by the Takabi, Joshi, Ahn, (2010), cloud computing technogly offers the organization to provide high level of the security protocol and to make sure data protection. The cloud computing technology implements high security protocols including strong access controls, data encryption technique, security intelligence. Apart from that cloud computing offers the virtualization security to the organization that means it provides the virtual server and application and it is not easy from the attackers or hackers to determine the exact location where data is stored. Apart from that the main security of the cloud computing technology is to enhance security software maintenance and mechanism. According to the Krutz, Vines, (2010), Cloud computing technology has an effectively ability to develop more soph isticated security procedures that helps the organization to secure users personal information and data. Costs associated with the cloud computing technogly are very less as compared to the physical data storage. Moreover, cloud computing technology provide application programming interface that provides organization the opportunities to customize their cloud expense better manner. Implementation of the cloud computing technology at workplace helps the organization to recover data, long term viability, investigated support, lower maintenance costs, redundancy and resilience. As per the evaluation and findings it is seen that the organization must have to implement migrate its application and data store in cloud computing technology because it not only helps them to secure its data but also achieve high users experience. In organization perspective, if they incorporate this technology at workplace then they reduces its extra hardware costs, maintenance problems and data security related problems. Apart from that accessing of the information is also done in easy manner as it provides huge amount of storage capability. Vulnerabilities, threats and consequences Risk assessment plan based on the vulnerabilities, threats and consequence Risk no Vulnerabilities threats consequences Risks summery Recommendation R001 Wet pipe sprinklers System in organization data base or data center Fire All the stored data in the database may be destroyed Fire should be activated causing water damage To check the fire system in regal basis R002 Organization users indentifies identification number no longer removed from the data center Users uses data in own purpose Integrity as well as confidentiality of organization data not authorized uses of not needed user identification could compromise integrity and confidentiality of organization data (Feng et al., 2011) in order to solve this problem in most effective and successful manner organization needs to update its data base in regular basis. On the other hand organization needs to change users password in every days. R003 Organization not updated its firewall system unauthorized users access the data and information Confidentiality and integrity of the data is hampered If the organization not implemented its firewall system in regular manner then attackers easily access the information In order to solve this problems in most effective and successful manner organization needs to implement dual firewall system in the database R004 Organization TCP packets directed at the port 1521 will hamper to stop responding Computer crime using malicious code Data integrity and confidentiality is hampered (Popovi?, Hocenski, 2010) Attackers attacks the computer network using denial of service attacks with the help of sending large amount of the package using port no 1521 could slow down the database In order to solve these problems, organization needs to impalements new updated antivirus system at workplace. R005 Password and user name are in initialization file and scripts Computer crime using malicious code Data integrity and confidentiality is hampered Password exploitation in initialization file and script could result in compromise of integrity and confidentiality of the organization data Update install antivirus system in regular manner R005 sensitive organization data is stored on USB drive Computer crime using malicious code Data integrity and confidentiality is hampered Loss of the data or information theft from USB drives could outcomes in compromise of data confidentiality Organization needs to implement high security password system in database and disable USB seating. Existing industry risk recommendations for the project As per the above risk assessment framework it is seen that risks R001 i.e. Wet pipe sprinklers System in organization data base or data center and risk R005 i.e. sensitive organization data is stored on USB drive might be occurred in the Australian multinational bank. Therefore in order to solve these problems in more effective and successful manner it is recommended that organization needs to update and monitor its security system in regular manner. From the findings it is also recommended that organization needs to implement up to date antivirus system at workplace that would helps them from the attackers attack. Data security The data flows associated with the project Identified rinks, Assess risks policies and risks mitigates Flow of the data from one end to other is shown in above diagram. With the help of cloud computing technology organization effectively send data from one end to others ends. Risks assessment and mitigation is explained in below table; Risks identification risk assessment Risk mitigation Data breach Data breach can be outcomes to loss the information and data of the organization. Implementation of the two factor authentication techniques and critical protection such as prohibiting the sharing account information (Krutz, Vines, 2010). Service or account traffic hijacking Use of this techniques in cloud computing it is too easy for attackers to hack the data and information of users accounts Implement a single sign on, end to end encryption techniques denial of service attacks accessing users information Upgrade system and in house applications Insecure APIs Manipulation of the users information and accounts done easy manner Implement SSL and TLS communication protocols Abuse of cloud services Access organization and users information easy manner (Krutz, Vines, 2010). Scope immediate services and implement dual firewall techniques Conclusion As per the above findings and analysis, it is seen that flexible costs, always on availability, high security, improved performance, improve coloration are the main features associated with the cloud computing that helps the organization to solve its existence issues in better manner (Takabi, Joshi, Ahn, 2010).. The findings shows that cloud computing have an ability to secure computer network and provide data to uses in easy manner at anytime and anywhere. Therefore, use of this techniques at workplace organization not only achieve better customers satisfaction but also reduces the complexity of the existence configuration. Moreover, from the observation it is seen that cloud computing is cost effective; therefore if an organization implement this techniques than they do not spend much amount in maintenance problems. Therefore from the findings and observation it is said that migrating business critical application and their associated data source to an external cloud hosting solut ion is the best approach for the organization. References Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz, R., Konwinski, A., ... Zaharia, M. (2010). A view of cloud computing.Communications of the ACM, 53(4), 50-58. Carlin, S., Curran, K. (2011). Cloud computing security. Carroll, M., Van Der Merwe, A., Kotze, P. (2011, August). Secure cloud computing: Benefits, risks and controls. InInformation Security South Africa (ISSA), 2011 (pp. 1-9). IEEE. Catteddu, D. (2010). Cloud Computing: benefits, risks and recommendations for information security. In Web application security (pp. 17-17). Springer, Berlin, Heidelberg. Chen, D., Zhao, H. (2012, March). Data security and privacy protection issues in cloud computing. In Computer Science and Electronics Engineering (ICCSEE), 2012 International Conference on (Vol. 1, pp. 647-651). IEEE. Chen, Y., Paxson, V., Katz, R. H. (2010). Whats new about cloud computing security. University of California, Berkeley Report No. UCB/EECS-2010-5 January, 20(2010), 2010-5. Feng, D. G., Zhang, M., Zhang, Y., Xu, Z. (2011). Study on cloud computing security. Journal of software, 22(1), 71-83. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Krutz, R. L., Vines, R. D. (2010). Cloud security: A comprehensive guide to secure cloud computing. Wiley Publishing. Li, H., Dai, Y., Tian, L., Yang, H. (2009). Identity-based authentication for cloud computing. Cloud computing, 157-166. Popovi?, K., Hocenski, Ã… ½. (2010, May). Cloud computing security issues and challenges. In MIPRO, 2010 proceedings of the 33rd international convention (pp. 344-349). IEEE. Qian, L., Luo, Z., Du, Y., Guo, L. (2009). Cloud computing: An overview. Cloud computing, 626-631. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. So, K. (2011). Cloud computing security issues and challenges.International Journal of Computer Networks, 3(5), 247-55. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Takabi, H., Joshi, J. B., Ahn, G. J. (2010). Security and privacy challenges in cloud computing environments. IEEE Security Privacy, 8(6), 24-31. Zhang, Q., Cheng, L., Boutaba, R. (2010). Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 1(1), 7-18. commbank. (2017). commbank.. [online] Available at: https://www.commbank.com.au/ [Accessed 26 Sep. 2017].

Sunday, March 22, 2020

Effect of Ethnicity in Nigeria Essay Example

Effect of Ethnicity in Nigeria Essay EFFECT OF ETHNICITY ON THE SOCIO-ECONOMIC DEVELOPMENT OF NIGERIA CHAPTER 1 1. 0 INTRODUCTION Nigeria  is  by  far  the most populated of Africa’s countries, with more than one-seventh of the continent’s people. The people belong to many different ethnic groups. These groups give the country a rich culture, but they also pose major challenges to nation building. Ethnic strife has plagued Nigeria since it gained independence in 1960. Officially known as the ‘Federal Republic of Nigeria’, she has  a  federal form of government and is divided into 36 states and a federal capital territory. Lagos, (formerly the capital of Nigeria) is the economic and cultural center located along the coast, and inhabited majorly by the Yoruba-speaking tribe. It is also the country’s largest city (in terms of population). The government moved from Lagos to Abuja in 1991 in the hope of creating a national capital where none of the country’s ethnic groups would be dominant. The  land size area  of Nigeria is approximately 923,768 sq km (356,669 sq mi). It was home to ethnically based kingdoms and tribal communities before it became a European colony. In spite of European contact that began in the 16th century, these kingdoms and communities maintained their autonomy until the 19th century. The colonial era began in earnest in the late 19th century, when Britain consolidated its rule over Nigeria. In 1914 the British merged their northern and southern protectorates into a single state called the Colony and Protectorate of Nigeria. Nigeria became independent of British rule in 1960. We will write a custom essay sample on Effect of Ethnicity in Nigeria specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Effect of Ethnicity in Nigeria specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Effect of Ethnicity in Nigeria specifically for you FOR ONLY $16.38 $13.9/page Hire Writer After independence Nigeria experienced frequent coups and long periods of autocratic military rule between 1966 and 1999, when a democratic civilian government was established Nigeria is very rich in raw materials like crude oil, tin, iron etc but is almost solely dependent on crude oil which is a major source of income for the country. While oil wealth has financed major investments in the country’s infrastructure, Nigeria remains among the world’s poorest countries in terms of per capita income. Oil revenues led the government to ignore agriculture, resulting in dependence on food importation. Fig 1. 1 MAP OF NIGERIA SHOWING THE 36 STATES 1. 1 The people of Nigeria Nigerias diversity, both in tongue and tribe makes it a very difficult region to subject to precise classification. This has led to the tendency among many scholars to focus on the three major ethnic or geographic zones in the country viz the Hausa-Fulani (Northern Nigeria), the Yoruba (Western Nigeria) and the Igbo (Eastern Nigeria). These geographic zones are not in any way solely occupied by the three ethnic groups. A plethora of smaller socio-ethnic groups may be located in these zones. The  highest  population densities are in the Igbo heartland in south-eastern Nigeria, despite poor soils and heavy emigration. The intensively farmed zones around and including several major cities of the Hausa ethnic group especially Kano, Sokoto, and Zaria in the north are also densely populated. Other areas of high density include Yorubaland in the southwest, the central Jos Plateau, and the Tiv homeland in Benue State in the south central region. Densities are relatively low in the dry northeast and in most parts of the middle belt. Ecological factors, including the prevalence of diseases such as sleeping sickness, carried by the tsetse fly, and historical factors, especially the legacy of pre-colonial slave raiding, help explain these low densities (Encarta, 2009). Table 1. 1: Statistics of Nigeria Population| 138,283,240 (2008 estimate)| Population density| 152 persons per sq km 393 persons per sq mi (2008 estimate)| Urban population distribution| 48 percent (2005 estimate)| Rural population distribution| 52 percent (2005 estimate)| Largest cities, with population| Lagos, 11,100,000 (2005 estimate) Ibadan, 3,570,000 (2007 estimate) Ogbomosho, 861,300 (2007 estimate)| Official language| English| Chief religious affiliations| Muslim, 50 percent Christian, 40 percent Indigenous beliefs, 10 percent| Life expectancy| 47. 8 years (2008 estimate)| Infant mortality rate| 94 deaths per 1,000 live births (2008 estimate)| Literacy rate| 70. 7 percent (2005 estimate)| Source: Encarta Encyclopaedia (2009) 1. 2 Social issues Wealth  and  power  are  distributed very unevenly in Nigerian society. This is due to several factors including corruption, political instability, and unemployment, amid others. The great majority of Nigerians, preoccupied with daily struggles to earn a living, have few material possessions and little chance of improving their lot. Meanwhile, chiefs, rich merchants, politicians, and high-ranking civil servants often accumulate and flaunt massive wealth, which to a degree is expected and accepted in the Nigerian society. Most of these elite maintain power through networks of patronage: They secure and distribute labour and receive political support in return. The system allows for some redistribution of income because patrons often pay for things such as school fees and marriage costs for relatives, community development, and charity work. Economic  inequality  has a severe effect on health, especially for children. One-fifth of Nigerian children die before the age of five, primarily from treatable diseases such as malaria, measles, whooping cough, diarrhea, and pneumonia. Less than one-half of infants are immunized against measles, and malnutrition affects more than 40 percent of children under the age of five. Adults are equally affected, although with less deadly consequences. Only 20 percent of rural Nigerians and 52 percent of urban Nigerians have access to safe water. One-third have no access to health care simply because they live too far from clinics or other treatment centres. Many others cannot afford the fees charged by clinics. While  average  incomes are higher and death rates lower in cities, urban poverty is as pervasive as rural poverty. Secure, well-paying jobs are scarce, even for those with considerable education. Food is typically expensive. Housing, too, is costly despite its rudimentary quality, prompting the poor to build basic houses in shantytowns. Sewage disposal systems in most cities are also basic or primitive, with polluted streams, wells, roadside drains, and other bodies of water increasing the risk of infectious disease. Industry, automobiles, and the burning of fuel-wood further pollute air and water. Crime  in  Nigeria  rose in the mid-1990s as a result of unemployment, economic decline, and social inequality, which are abetted by inefficient and corrupt police and customs forces. More than half of all offenses are thefts, burglaries, and break-ins, although armed robberies are also prominent. Nigeria is a major conduit for drugs moving from Asia and Latin America to markets in Europe and North America. Large-scale Nigerian fraud rings have targeted business people in other parts of the world. Nigeria  has  been  wracked by periodic violent clashes between ethnic and religious groups since the 1990s. The reasons behind these clashes have varied from local political disputes to conflicts between fundamentalist Muslims and Christians or moderate Muslims. In many cases, local civic or religious leaders have manipulated these conflicts for political gain. 1. 3 Ethnicity: The Ethnic Composition of Nigeria Ethnicity is a term not easily defined and for proper understanding of the concept related terms requires description; an ethnic group is regarded as an informal interest group whose members are distinct from the members of other ethnic groups within the larger society because they share kinship, religious and linguistics ties (Cohen, 1974). Ethnicism is another related concept used to denote ‘ethnic loyalty’ (Pepple, 1985). The concept of loyalty here indicates willingness to support and act on behalf of the ethnic group. Subsequently, ethnic loyalty or ethnicism usually involves a degree of obligation and is often accompanied by a rejective attitude towards those regarded as outsiders i. e. members of other ethnic group (Salawu and Hassan, 2011). Thus the term Ethnicity can be defined as the interactions among members of many diverse groups (Nnoli, 1978). It is a commonplace fact that Nigeria is a society with different ethnic groups, religions, languages, cultures and institutional arrangements. As a heterogeneous society of several ethnic groups, Nigerians are thus characterized by groups, desires, beliefs, values, customs, fears etc. These diversities in national life manifest in several ways including; music, language, culture, dance, beliefs, religion etc. The fact that over three hundred identified language groups exist in Nigeria has created some confusion as one may equate each language group with an ethnic group (Adejuyibem 1983) and thereby arrive at over three hundred ethnic groups. As Iwaloye and Ibeanu (1997) and Anugwom (1997) have argued, however, languages and ethnic groups do not necessarily coincide. One language may be spoken by more than one ethnic group and one ethnic group may have linguistic variations of the same root language. Moreover, while language may be one of the important factors for defining an ethnic group, some ethnic groups in Nigeria may have lost their original linguistic roots, while retaining their identity, as a result of intense interaction with larger socio-ethnic groups. In the same vein, many ethnic groups may use the same language to case communication, as is the case of the smaller ethnic groups in the North of Nigeria, where Hausa has become more or less a lingua franca. Therefore, it has been proven that there is no direct relationship between language and ethnic group in Nigeria. Thus, the 56 ethnic groups identified by Iwaloye and Ibeanu (1997) as the existing ethnic groups in contemporary Nigeria are adopted. It is important to note that the ethnic groups in Nigeria may exceed this number by far, though these 56 groups are both visible and easily identifiable. The 56 ethnic groups are presented in the table below. Table 1. 2: Ethnic group in Nigeria 1. Hausa-FuIani| 29. Buri| 2. Igbo | 30. Balta| 3. Yoruba | 31. Kanuri| 4. Edo| 32. Margi| 5. Bassawa| 33. Delta Minorities| 6. Igala| 34. Gwadara| 7. Idoma| 35. Chamba-Daka| 8. Ora| 36. Mambila| 9. Ijo| 37. Katang | 10. Isoko| 38. Berom| 11. Urhobo| 39. Kadara| 12. Itshekiri| 40. Kurama| 13. Baatonum| 41. Mada| 14. Karnbari| 42. Alago| 15. Dulawa| 43. Migili| 16. Kamaku| 44. Eggon| 17. Ebira| 45. Bokyi| 18. Nupe| 46. Ekon| 19. Gwari| 47. Agoi| 20. Tiv| 48. Efik| 21. Jukun| 49. Ibibio| 2. Chomo-karim| 50. Annang| 23. Jarwa| 51. Mumuye| 24. Angas| 52. Waja| 25. Yekhee| 53. Busa| 26. Karekare| 54. Dendi| 27. Eloyi| 55. Buduma| 28. Gade| 56. Shuwa| Source: Iwaloye and Ibeanu (1997) Nigeria is known for its cultural diversities but while these diversities have been positively harnessed for greatness by other nations of the world the opposite is regrettably the case in Nigeria despite the efforts of heroes past in ensuring that these diversities are harnessed for development; rather they have served as the bane of social, economic and political development. Consequently, Nigeria as a nation has been besieged by an array of social, economic and political problems; these include corruption, tribalism, lack of patriotism, political gangsterism e. t. c (Nduka, 2004 and Omo-Ojugo et al. , 2009). 1. 4 Ethnicity and Marginalisation Before the advent of colonialism, the area now referred to as Nigeria was a large landmass occupied by un-unified people of diverse ethnic groups but for administrative convenience they were fused and merged together by the olonialists. For the duration of colonial rule, the ‘marriage’ of the diverse ethnic groups was maintained and the diversities were united without any problem. With the exit of the colonialists, things started falling apart resulting in marginalisation and ethnic conflict thus adversely effecting the development of the budding nation. Ethnic conflict has been rightly defined as one of the greatest obstacles to meaningful development in Africa. The ethnic factor did not diminish with the advent of independence; rather, it became a yardstick for measuring contribution to the national development effort and especially for allocating and distributing power and national resources and eventually resulted in the 30- month slaughter in the Nigerian civil war (1967 to 1970) which was anchored on ethnic rivalry. The history of present day Nigeria is rife with cases of ethno-religious conflicts. Since the annulment of the 1993 elections, there have been increased demands and counter-demands for marginalisa1ion by various ethnic groups in the country. Marginalisation stems from a peoples perception of their treatment in the allocation or distribution of power and resources. A classic example is made for the Ogoni, who despite having provided the nation with an estimated $30,000 million in oil revenues, their people had no pipe borne water or electricity, and lacked education, health and other social facilities: it is intolerable that one of the richest areas of Nigeria should wallow in abject poverty and destitution (Saro-Wiwa, 1992). In this light, the Ogoni ethnic group has concrete reasons to consider itself marginalised, especially since these facilities can be found in other ethno-regional areas of Nigeria. 1. 5 OBJECTIVE OF THE STUDY The general objective of the study is to 1. Investigate the role ethnicity plays in the socio-economic development of Nigeria. 2. Assess the impact of ethnicity on present day Nigeria 3. Examine the effect on day-to-day activities of Nigerians 1. 6 RESEARCH QUESTIONS i. Impact of ethnicity on social and economic development in Nigeria? ii. Role of colonialism in ethnic groups formation . 7 SCOPE OF THE STUDY The scope of the project envelops the influence of ethnicity in Nigeria’s social and economic development and its impact on present day Nigeria. 1. 8 SIGNIFICANCE OF THE STUDY The importance of this study is made manifest in the form of understanding the role ethnic diversity plays in the development of a country, in this case Nigeria. 1. 9 CONCEPTUAL CLARIFICATION ET HNICITY: Ethnicity in this study is referred to as an affiliation resulting from racial or cultural ties or the interactions among members of many diverse groups ETHNIC GROUP: For the purpose of this study, an ethnic group is regarded as an informal interest group whose members are distinct from the members of other ethnic groups within the larger society because they share kinship, religious and linguistics ties SOCIO-ECONOMIC DEVELOPMENT: in this project, socio economic development is defined as a comprehensive process involved in improving social and economic conditions on individual and group empowerment, community, national and regional building.

Thursday, March 5, 2020

Production of Acetone from isopropyl alcohol

Production of Acetone from isopropyl alcohol Introduction Acetone is one of the most widely used solvents in the world and can be used as an intermediate for several commercial products such as acrylic plastic, bisphenol, polycarbonates and epoxy resin, paints, and adhesives among others. According to Tremoulet et al. (Para 2), Acetone is often a by-product of phenol, with scientists capable of producing acetone from a variety of materials including propylene, cumene, and isopropanol.Advertising We will write a custom report sample on Production of Acetone from isopropyl alcohol specifically for you for only $16.05 $11/page Learn More In industrial production acetone is an organic compound with a chemical formula of (CH3)2CO. Tremoulet et al. affirm that during production of cumene, â€Å"hydro peroxide generated from this process undergoes slicing to engender phenol and acetone† (Para 2). Where scientists require a high concentration of high-purity acetone, they can undertake Catalytic dehydrog enation of isopropanol as a substitute method to manufacturing acetone. As a fresh engineer and based on knowledge in chemical engineering, this paper seeks to design an acetone plant that produces 50 thousand tons per year from isopropyl alcohol. Problem Statement For several decades, scientists have consistently tried to incorporate knowledge to individuals on how to produce simple acetone, with the importance of acetone becoming widely known. A research documented by Rahman indicates, â€Å"The catalytic hydrogenation of acetone is an important area of catalytic process to produce fine chemicals† (113). The fine chemicals are useful since the form key element in the conversion of liquid or gaseous fuels as well as having important application in the heat pumps. Typically, scientists have developed vast number of homogeneous complexes and heterogeneous catalysts that have existed until the date for the production fine chemicals, with little knowledge existing in the product ion of acetone using isopropyl alcohol (IARC 479). For this reason therefore, this paper seeks to provide a comprehensive report on the chemical production of acetone using isopropyl alcohol as the main material. Physical properties of all components Acetone is an organic compound having several physical properties during the entire process of production. Following the procedure in the production of acetone, the several materials emerge during and after the production. To begin with, in the feed drum there are normally three materials in this mixture.Advertising Looking for report on chemistry? Let's see if we can help you! Get your first paper with 15% OFF Learn More The mixtures found in the feed drum as described in the production process entail recycle stream, water, and isopropyl alcohol. This mixture has a number of physical properties noted as colourless, moveable, with mildly pungent smell and liquid in nature (IARC 481). The mixture goes through all other procedures including processes in the vaporizer, heater and reactor the mixture maintains similar physical characteristics. However, flammability of the mixture is eminent throughout the process and engineers should take caution during the chemical production of acetone. In the final process, the mixture produces acetone, as the final product and this liquid possesses characteristics such as colorlessness, mobility, flammability, and pungency in its smell. Production process and alternative processes In the process of producing acetone-using isopropyl alcohol, several processes are inclusive in this procedure. Since the advent of discovery of production of acetone, several Chemical Engineering processes and procedures have emerged with a range of materials proving imperative. As mentioned before, acetone can result from the chemical reaction of several materials. Laboratory production of Acetone can use isopropyl alcohol as the reactant; can use oxidation of Propylene process, oxidation of Butanol, oxidation of Isopropyl Benzene as well as Dehydrogenation of Isopropanol (Arda et al. 8). During the production or engineering process of acetone, all chemical reactions involved are essential to produce fine acetone, which is useful commonly as a solvent. To understand the chemical production of acetone, this study provides the entire engineering process of acetone from isopropyl alcohol using â€Å"feed drum, vaporizer, heater, reactor, furnace, cooler, condenser, flash unit, scrubber, acetone and IPA columns† (Arda et al. 10). The study will also provide a diagrammatic presentation of the process. Production process In common processes, original invention of acetone instigates in the feed drum where mixing of feed including isopropyl alcohol, water, and recycle stream takes place. Vigorous mixing of these feeds (components) leads to a substantial reaction. From the feed drum, the mixture goes to another important stage, where the vaporizer provides r oom for further chemical reaction (Arda et al. 11).Advertising We will write a custom report sample on Production of Acetone from isopropyl alcohol specifically for you for only $16.05 $11/page Learn More The mixture in the vaporizer changes the streams phase into vapor. After undergoing the necessary procedures required in the vaporizer, the mixture undergoes another important phase in the heater. In the heater chamber, the mixture undergoes vigorous heating to enhance reaction through subjecting the mixture to higher temperatures. Reactor is another important section, where this section provides tubular flow reaction. In the reactor, the process is capable of achieving two products namely, Acetone, hydrogen gas, while isopropyl and water undergo discharging. A concentrated mixture comprising of hydrogen, water, acetone, and isopropyl-alcohol proceeds to the cooler and then further to the condenser unit before it proceeds to the flash unit. In the flash un it Hydrogen, acetone, isopropyl-alcohol and water form the top product. The top product comprising of acetone proceeds to another important procedure in the scrubber. In the scrubber chamber, the main purpose is to separate hydrogen gas from the mixture. Thereafter, the bottom product produced in the flash unit comprising of water, isopropyl alcohol, and acetone is mixed with the bottom product from the scrubber in the acetone column. In the acetone column, the reaction produces acetone from the top product with almost 99-wtpercentage isopropyl and water (Arda et al. 7). 0.1% of acetone then proceeds to isopropyl alcohol column from the bottom product. Finally, the top product of the isopropyl column is taken to the feed drum. The remaining part of mixture (residue) found, popularly referred as bottom product, remains as dissipate of the reaction. The following is the general formulae for the reactions in the production of acetone using isopropyl alcohol. Advertising Looking for report on chemistry? Let's see if we can help you! Get your first paper with 15% OFF Learn More The production of acetone Discussion of the production process In the feed drum: A feed is a tank like object used in the mixing of the recycle stream and the feed stream. The mixture ran at a temperature of 25 Degrees Celsius in the feed stream, which the engineers assumed it was constant. The temperature in the recycle stream used was about 110 degrees Celsius. In the vaporizer: to reduce the chemical reaction speed necessary in the fine production acetone, it was important to consider the use of salt. Engineers used similar temperature of the mixture leaving the feed drum to maintain the reaction in the vaporizer. The mixture undergoes several chemical reactions to produce the product known as acetone. Kinetic data of the reactions During the chemical production process of acetone energy consumption and the rate of consumption are important factors considered in a bid to obtain fine acetone. This report adopted the kinetic energy data provided by (Arda et al. 15) to explain the e nergy consumption of the process. This part covered energy data consumed in the Feed Drum, where the process begins to the isopropyl-alcohol column, where the process ends. Other related processes (Chemical processes) Oxidation of Propylene-as postulated before, several other processes can be useful in production of acetone. Production of acetone can involve oxidation of Propylene. In normal occasions, a process for production of acetone by direct oxidation of propylene, involves the oxidation process by air. The process principally involves a solution of copper chloride with small quantities of palladium chloride mixed in the air to produce acetone. Chemical formulae: C3H6 + 1/2O2 CH3COCH3 Oxidation of Butanol- chemical engineers can as well produce acetone from a process of oxidation of Butanol. Rahman asserts, â€Å"The solvent used methanol, ethanol, propanol; n-butanol, ethylene glycol; propylene glycol, diethylene glycol, and triethylene glycol are useful solvents for hyd rogenation reactions† (120). According to Arda et al., catalytic oxidation of butane by using cobalt and manganese acetate produces acetic acid under a temperature rate of 150-225 degrees Celsius, where butane undergoes oxidation to produce acetone of almost 75-80% yield (18). Chemical formulae: CH3CH2CH2CH2CH3 + O2-CH3COOH + CH3COCH Oxidation of Isopropyl Benzene (Cumene) Cumene is an organic compound produced from an integrated process of producing phenol. Production of phenol further involves, â€Å"alkylation of benzene with propene to obtain cumene, oxidation of cumene to cumene hydro peroxide, acid cleavage of cumene hydro peroxide to produce phenol and acetone† (Rahman 114). According to the explanation given by Arda et al. (21), cumene is simply a product obtained from synthesis of propylene and benzene and oxidation of the product to produce acetone and phenol. Dehydrogenation of Isopropanol- Another important method of obtaining acetone is dehydrogenation of Isopropanol. Rahman postulates, â€Å"Isopropanol is widely regarded as an essential commodity in fine chemical synthesis which is used as a solvent in the industry and academia† (113). Normally, hydrogenation of acetone leads to production of Isopropanol, and the vice versa is that dehydrogenation of Isopropanol produces acetone. The catalyst used in this process is Zinc Oxide (ZnO) (IARC 483). The following is the chemical formulae for dehydrogenation of Isopropanol. Chemical formulae: (CH3)2CHOH (CH3)3CO + H2 Safety and environment concerns It is important to consider personal health and environmental safety concerns while undertaking chemical production of acetone. Acetone is a chemical like any other and there are possibilities of causing harm to human beings, animals and the entire flora and fauna (Tremoulet et al. Para 6). All chemicals used in the production of acetone comprise of some caution notices, which engineers of acetone should follow strictly to avoid explosi ve reactions. In special attention, engineers should ensure that they prevent contamination of soil, drains and surface water. According to Arda et al. (17), engineers interested in the production of acetone should strictly adhere to all industrial principles governing the production and consumption of chemicals including handling and storing of hazardous chemicals. Acetone forms explosive mixtures with air and is extremely explosive and users of this chemical should remain keen throughout. Engineers should address any accidental inhalation or suffocation and any accidental cases with any first aid before considering seeking health assistance from physicians. Preliminary cost of the materials For engineers to engage in the production of acetone, it is imperative to consider the preliminary cost of production. However, the cost of producing acetone depends entirely on the amount of acetone produced. The major aim of preferring to produce more attractive and affordable acetone in the market was to employ the use of isopropyl alcohol in producing acetone (Rahman 118). The production of acetone using isopropyl alcohol must be in a position to demonstrate the aspect of saving. Several materials and chemicals were useful and mandatory for the successful production of acetone. In a bid to determine the overall production cost of acetone for this project, this study employed a program costing technique known as CAPCOST to estimate the price of equipment employed. The following table provides a detailed cost data for the production of acetone of this study as adopted from an empirical study by Tremoulet et al. Total Production cost for acetone using isopropyl alcohol Item description Cost of the item Reactor Bare Module $204,300 Heat Exchanger Bare Module $96,500 Fired Heater Bare Module $234,200 Pump Bare Module $73,100 Vessel Bare Module $9,600 Bare Module Cost of Reaction Side $617,700 Catalyst $68,200 Total $496,100 Summary of the literature r eview Acetone is an organic compound produced using different chemical methods. However, this study dealt with the chemical production of acetone using isopropyl alcohol, which is an essential component in the production of acetone. Acetone is one of the most widely used solvents in the world and can be used as intermediate for several commercial products such as acrylic plastic, bisphenol, polycarbonates and epoxy resin, paints and adhesives, etc. In other places, acetone has been useful in nurturing women beauty, where women have used acetone in removing nail cuticles (Tremoulet et al. Para 7). Acetone is often a by-product of phenol, with scientists capable of producing acetone from a variety of materials including propylene, cumene, and isopropanol. Acetone production involves several chemical and physical processes including heating, vaporizing, reacting, cooling, condensing, flashing, heating and scrubbing. Production of acetone begins in the feed drum and ends in the isopropy l column where acetone finally emerges. One chemical formula can be useful in summarizing the process of producing acetone. CH3-CHOH-CH3 CH3-CO-CH3 + H2 can summarize the chemical reaction process in the production of acetone. It is also important to notice that production of acetone is a very reactive process that needs consideration of safety and environmental concern. All chemicals used in the production of acetone comprise of some caution notices, which engineers of acetone should follow strictly to avoid explosive reactions. Acetone forms explosive mixtures with air and is extremely explosive and users of this chemical should remain keen throughout. Finally, engineers should address any accidental inhalation or suffocation and any accidental cases with any first aid before considering seeking health assistance from physicians. Arda, Urun, Serkan Acarser, Muge Metin, Sila Gungor, and Ali Kucuk. Chemical Engineering Design Project: Acetone Production, 2009. Web. IARC. Isopropyl Alcohol Manufacture by the Strong-Acid Process. PDF file. Web. Rahman, Ateeq. â€Å"Catalytic Hydrogenation of Acetone to Isopropanol: An Environmentally Benign Approach.† Bulletin of Chemical Reaction Engineering Catalysis 5.2 (2010): 113 – 126. Print. Tremoulet Mike, Mike Unton, and Ed Feng. Production of Acetone Using Catalytic Dehydrogenation of Isopropyl Alcohol, 1998. Web.