Thursday, September 3, 2020

The Drill Stem Component Description Engineering Essay

The Drill Stem Component Description Engineering Essay Section 3 Presentation This section presents general strategies for drill string structure. The plan parts of basic significance and elements controlling drill pipe determination are featured. The term Drill Stem is utilized to allude to the blend of tubulars and embellishments that fill in as an association between the apparatus and the boring apparatus (RGU address slides). It comprises for the most part of Drill Pipe, Drill Collars (DC) and Heavy Weight Drill Pipes (HWDP) and frill including bit subs, top drive subs, stabilizers, containers, reamers and so on. Drill stem is regularly utilized reciprocally with the term Drill String which really alludes to the joints of drill pipe in the drill stem. With the end goal of this report, Drill String will be utilized to allude to the string of drill pipes that along with drill collars and overwhelming weight drill pipe make up the drill stem see fig 3.1. 3.1 DRILL STEM COMPONENT DESCRIPTION 3.1.1 Drill Pipe The drill pipes are consistent channels generally produced using distinctive steel evaluations to various widths, loads and lengths. They are utilized to move rotational torque and penetrating liquid from the apparatus to the base opening gathering (drill collars in addition to adornments) and boring tool. Each drill pipe is alluded to as a joint, with each joint comprising of a funnel body and two associations (see fig 3.2). Drill pipe lengths shift, and these various lengths are named ranges, the accessible or progressively regular reaches include: Range 1: 18 22 ft Range 2: 27 30ft Range 3: 38 40ft. Drill Stem. Fig 3.1: Drill Stem with parts. (Heriott Watt University address Notes: Drilling Engineering) Drill pipes are additionally fabricated in various sizes and loads which mirrors the divider thickness of the drill pipe. Some basic sizes and their comparing loads incorporate 31/2 in. 13.30 lb/ft and 4 1/2in. 16.60 lb/ft. The demonstrated weight is the ostensible load in air (pipe body weight barring instrument joints) of the drill pipe. A total posting of API perceived drill pipe sizes, weight and grades are distributed in the API RP 7G. The drill pipe grade means that the base yield quality of the drill pipe which controls the burst, breakdown and pliable burden limit of the drill pipe. The normal drill pipe grades are introduced in the table underneath Evaluation Yield Strength, psi Letter Designation Exchange Designation D D-55 55,000 E E-75 75,000 X X-95 95,000 G G-105 105,000 S S-135 135,000 Table 3.1: Drill Pipe Grades. Drill pipes are regularly used to bore more than one well, accordingly much of the time the drill channel would be in a ragged condition bringing about its divider thickness being short of what it was the point at which the drill pipe was fresh out of the plastic new. So as to recognize and separate drill pipes, they are gathered into classes. The various classes are a sign of the level of wear on the divider thickness of the drill pipe. The classes can be summed up as keeps as per API guidelines: New: Never been utilized, with divider thickness when to 12.5% underneath ostensible. Premium: Uniform wear with least divider thickness of 80%. Class 2: Allows drill pipe with a base divider thickness of 70%. It is basic that the drill pipe class be distinguished in drill pipe use or plan, since the degree of wear influences the drill pipe properties and quality. While determining a specific joint of drill pipe, the class, grade, size, weight and range must be recognized, the particular could subsequently show up along these lines: 5 19.5 lb/ft Grade S Range 2 Fig 3.2: Parts of Drill pipe. (Handbook for Petroleum and Natural gas) 3.1.2 Tool Joints Instruments joints are screw type associations welded at the closures of each joint of a drillpipe. The device joints have coarse tightened strings and fixing shoulders intended to withstand the heaviness of the drill string when it is suspended in the slips. Device joints are of two sorts; the pin (male area) and the crate (female segment). Each drill pipe has a pin joined to one end and a crate connected at the opposite end. This makes it feasible for the pin of one joint of drill channel to be cut into box of a past drill pipe. There are a few sorts of hardware joints generally utilized: Joint Type Chart Portrayal Inside Upset (IU) Device joint is not exactly the channel. Instrument joint OD is around equivalent to the channel. Interior Flush (IF) Instrument joints ID is roughly equivalent to the funnel. The OD is vexed. Inside/External Upset (IEU) Instrument joint is bigger than the funnel with the end goal that the device joint ID is not exactly the drill pipe. The device joint OD is bigger than the drill pipe. Table 3.2 Types of hardware joints. (The Robert Gordon University Lecture Notes: Drill String Design) 3.1.3 Drill Collars Drill collars are thick walled tubes produced using steel. They are ordinarily the overwhelming piece of the base opening get together (BHA) which gives Weight on Bit (WOB). Because of the huge divider thickness of the drill collars, the association strings could be machined legitimately to the body of the cylinder, along these lines dispensing with the requirement for instrument joints (see fig 3.3). Drill collars are produced in various sizes and shapes including round, square, triangular and winding furrowed. The smooth and winding furrowed drill collars are the most widely recognized shapes utilized at present in the business. There are drill collars produced using non-attractive steel used to confine directional overview instruments from attractive impedance emerging from other drill stem segments. The steel grade utilized in the assembling of drill collars can be a lot of lower than those utilized in drill pipes since they are thick walled. Capacities Give weight on bit Give solidness to BHA to keep up directional control and limit bit soundness issues. Give solidarity to work in pressure and forestall clasping of drill pipes. Fig 3.3: Carbon Steel Drill Pipes. 3.1.4 Heavy Weight Drill Pipe Substantial weight drill pipes (HWDP) are regularly produced by machining down drill collars See fig 3.4. They generally have more noteworthy divider thickness than ordinary drill pipe. HWDP are utilized to give a steady traverse when making progress between drill collars and drill channels to limit pressure fixation at the base of the drill pipe. These pressure fixations regularly result from: Distinction in solidness because of the distinction in cross-sectional territory between the drill neckline and drill pipe. Bit ricocheting emerging from turn and cutting activity of the bit. HWDP can be utilized in either compressive or pliable help. In vertical wellbores it is utilized for progress and in exceptionally veered off wells, it utilized in pressure to give weight on bit. Fig 3.4: Heavy Weight Drill Pipe. (Heriott Watt University address Notes: Drilling Engineering) 3.1.5 Accessories Drill Stem adornments include: Stabilizers: these are made of a length of funnel with cutting edges on the outer surface. The sharp edges are winding or straight, fixed or mounted on elastic sleeves to permit the drill string pivot inside. Elements of the stabilizer include: Settle the drill collars to lessen clasping and twisting Guarantee uniform stacking of tricone bits to decrease wobbling and increment bit life. To give important divider contact and solidness behind the bit to actuate positive side power to construct point when penetrating digressed wells. Reamers: utilized in the BHA to extend the very much bore distance across and ream out doglegs, key seats, edges. Boring Jars: joined in the BHA to convey a sharp blow and help with liberating the drill string should it become stuck. 3.2 DRILL STRING DESIGN The drill string configuration is done so as to build up the most effective mix of drill pipe size, weight, and grades to satisfy the penetrating goals of a specific gap segment at the least expense inside satisfactory security measures. So as to structure a drill string to be utilized in a specific opening segment, the accompanying boundaries should be set up: Opening area profundity Opening area size Expected mud weight Wanted wellbeing factors in pressure and overpull. Wanted wellbeing factor in breakdown Length of drill collars required to give wanted WOB including OD, ID and weight per foot. Drill pipe sizes and assessment class The drill string configuration needs to meet the accompanying prerequisite: The working burdens (pressure, breakdown, burst) on the drill string must not surpass the appraised load limit of every one of the drill pipes. The drill collars ought to be of adequate length to give all required WOB to forestall clasping loads on the drill pipe. The drill pipes utilized need to guarantee the accessibility of adequate liquid stream rate at the boring tool for opening cleaning and great pace of infiltration. 3.2.1 Design Safety Factors Plan wellbeing factors are applied to determined working burdens to represent any sudden help load on the drill string. They are utilized to speak to any highlights that are not considered in the heap computations for example temperature and consumption, along these lines guaranteeing that administration loads don't surpass the heap limit of the drill pipe. Plan security factor esteems are frequently chosen dependent on experience from working inside a specific territory, the degree of vulnerability in the working conditions for example while working in HPHT conditions, a bigger security factor is applied than while working in less brutal conditions. Some generally utilized plan wellbeing esteems are represented in the table beneath Burden Structure Safety Factor Value Strain 1.1 1.3 Edge of overpull (MOP) 50,000 100,000. MOP of 400,000 have been utilized in ultra profound wells Weight on Bit 1.15 or 85% of accessible Weight on bit to guarantee nonpartisan point is 85% of drill neckline string length measures from the base (API RP 7G) Torsion 1.0 (in light of the lesser of the funnel body or device joint quality) Breakdown 1.1 1.15 Burst 1.2 3.2.2 Drill Collar Selection The drill collars are chosen with the point of guaranteeing that they give adequate WOB without clasping or putting the lower segment of the drill string

Saturday, August 22, 2020

Disaster Prediction Problems Essays

Calamity Prediction Problems Essays Calamity Prediction Problems Essay Calamity Prediction Problems Essay , a. K. A. Mr.. Be was exceptionally partial to testing. He wants to frothed content jokes and news to his companions and family members. Since Mr.. Chug is a fire fighter himself, he chose to should content to his companions where the fire is. Until some other time, a companion called him and asked him not to send these messages as they were simply upsetting him. Mr.. Chug being a bustling man neglected to delete his name on the rooftop content Until one day his companion moved toward him, and said bless your heart. Much obliged to you in such a case that not for the content of Mr.. Chug, he would not realize that there was a fire at back of his home. His companion around then was in the market and his children were still at home dozing. So then did Mr.. Chug choose to make this greater, better, and quicker! Today our TEXTURE SMS System Dispatcher has more than 1 70,000 individuals across the nation. Mr.. Chug as he generally state NAG AMALGAM IMAGINATION TOYOTA AS TAO to likewise include is his adage DO GOOD DEEDS Communicating for compelling fire reaction is the most ideal approach to react quicker. Regularly security framework offered in showcase is completely wired framework. In handy, it IS not helpful for a home to apply this wired security framework as more than one sensor will be utilized. In thought, the wire framework is more solid than remote framework as it is anything but difficult to investigate and better execution in speed. As flow need in actuating the framework, higher force utilization can't be keep away from if framework utilized is completely work utilizing direct electric gracefully. In result the expense of framework application is higher in cost. Utilization of security framework for home don't mean anything if the client not ready when sensors activated. Fundamental security framework usage possibly permitting the client cautioned on the off chance that they are still inside the house. As they are away from home, the security framework introduced turns out to be less useful as no individual will be alarmed. Cautioning framework by means of SMS is proposed in this venture for client warning progressively as the interruption happens. Crisis SMS application for Barings (Bills Canyon) A SMS or content informing application intended to help blasting authorities and their networks during crises won the top prize at an ongoing Hackett composed by the Smart Developer Network (Smartened), the pullover network program of Smart Communications, Inc. , (Smart) and portable substance startup Whipcord Labs. Bills Canyon, created by IT experts Allan Danes and Erwin Quaint of Team 98, was made a decision about the best among the 10 SMS APS made on the spot during the SMS. Programming interface (feed) Hackett. Each group chipped away at an application utilizing the Whipcord SMS API, another and free stage that permits engineers and even Nan-geeks to rapidly and effectively dispatch SMS-based APS. Whipcord Labs built up the API with the specialized direction of Smartened. Programming interface, which represents application arrogating interface, is a lot of instruments and conventions for making programming APS. Whipcord SMS API disentangles application advancement by basically expelling a large portion of the hard coding piece of the procedure. Clients can skirt the codes which take weeks or even a long time to program. The stage likewise permits designers to promptly dispatch SMS administrations to the in excess of 70 million supporters of Smart, Talk N Text, and Sun Cellular. Whipcord SMS API does the hard work. It would have taken us multi week to complete Bills Canyon rather than only five hours notwithstanding this API, Quaint said. As a stage for episode revealing Bills Canyon is structured as a snappy reaction apparatus for blasting pioneers and their locale. Customary residents can utilize this application to caution or solicitation help from blasting authorities during crises or disasters. Whipcord SMS API permits you to make SMS-based APS rapidly and convey them right away. The Whipcord SMS API stage is a piece of a greater activity Smarts Partner API Program which energizes conventional portable substance suppliers to venture into the API space and give their abilities to outsider designers. Expect more API administrations and instructive occasions coming about because of this program, said Jim Season. As testing physically can make us hustle and for long time message composing, the best way to make things all the more quicker is to concocted programmed content informing which is less hustle and be all the more quicker to expend less time and reaction to that scene in a perfect time. Nearby Journalists in the Philippines use SMS to Get Information to Their Communities Local columnists in the Philippines are posting news and data on natural issues and speaking with fiasco influenced networks utilizing an imaginative new SMS-based revealing stage called Environs. The stage was propelled by the Philippine Network of Environmental Journalists with help from Internees Earth Journalism Network (JEAN). Environs permits neighborhood writers to content tips and reports into the framework. Confirmed data is then checked on and posted by a pool of editors to environs. H, lastly pushed out to web based life stages that incorporate Twitter and Backbone. The Philippines, a low lying little nation of in excess of 96 million individuals, is at the doorstep of environmental change, suffering tropical storms, serious dry spell, floods, and seaside disintegration all the time. Utilizing SMS announcing, writers can contact crowds extending from secluded affirms to government organizations all the more rapidly during and after a tropical storm or other fiasco, to share data, for example, flood alerts or to find territories where salvage groups are generally required. Ding Balboa of Vulcan Journalist stated, When calamity strikes, we need to get and convey data as quick as could reasonably be expected. We need to give essential data and alarms on climate condition or overwhelmed regions to neighborhood networks. It is a ground-breaking announcing framework particularly in a debacle inclined nation like the Philippines. With the dispatch of the SMS-based synergistic news coverage stage neighborhood columnists are currently ready to discuss and deliver stories, even in the most remote areas, utilizing SMS. The framework likewise engages neighborhood residents who are anxious to have an outlet to report and discover answers for the squeezing natural issues influencing their nation. The undertaking depends on Frostiness, a free and open-source instrument that empowers writers to quickly share data through a cell phone and a PC. This is a generally excellent case of saddling innovation, particularly in announcing catastrophes and tropical storms and other natural issues in our networks, said Dave City-based writer Henrietta Tacit. Our detailing is quick, prompt and perusers can find most recent data. Remote Literature Real-time Notification and Situational Awareness in Fire Emergency Fire crisis frameworks are responsive in their tendency; dispatching and protecting tasks are proceeded as reaction activities upon the event of fire. Postponing the reaction would cause an expansion in the loss of lives and property, where few moments can isolate between fire regulation and flasher. Kasbah (2009) talked about the information got on the off chance that a fire crisis happened. The idea of information that helps fire reaction activities can be characterized onto two classes: static and dynamic information. Topographical data, for example, areas of authentic episodes, insights, hazard zones, road systems, focal points and different highlights are remembered for the static information class as they are seldom alterable after some time. Current GIS frameworks and applications are fit for dealing with this class of data productively. Then again, dynamic information incorporates abrupt events of occasions or quickly evolving data. Areas of crisis vehicles, meteorological sensor perceptions, 91 1 crisis calls, and airborne obvious and infrared mages of current 5 dynamic flames are a few instances of dynamic information. Debacle Management Cycle Disaster the executives intends to diminish, or keep away from, the potential misfortunes from perils, guarantee immediate and fitting help to casualties of catastrophe, and accomplish fast and powerful recuperation. The Disaster the executives cycle outlines the continuous procedure by which governments, organizations, and common society plan for and lessen the effect of calamities, respond during and promptly following a fiasco, and find a way to recoup after a debacle has happened. Proper activities at all focuses in the cycle lead to more noteworthy speed, better admonitions, diminished helplessness or the counteraction of calamities during the following emphasis of the cycle. The total catastrophe the board cycle incorporates the forming of open arrangements and plans that either alter the reasons for fiascos or moderate their impacts on individuals, property, and framework. Calamity is an unexpected unfriendly or tragic outrageous occasion which makes extraordinary harm individuals just as plants and creatures. All things considered debacle reaction must be powerful and proficient. Himalayan expressed that Absence of a focal expert for incorporated calamity the executives and need f coordination inside and between catastrophe related associations is liable for compelling and productive debacle the executives. Calamity Risk Management incorporates aggregate all things considered, software engineers and measures which can be taken up previously, during and after a debacle with the reason to keep away from a fiasco, decrease its effect or recoup from its misfortunes. The three key phases of exercises that are taken up inside calamity hazard the board are as per the following. Pre-catastrophe exercises those which are taken to decrease human and property misfortunes brought about by a potential danger. For instance, doing carefulness battles and fortifying the current powerless structures. The planning of the fiasco the board plans at family unit and network level, and so forth. Such hazard decrease estimates taken under this stage are named as alleviation and readiness exercises. These incorporate activities taken to guarantee that the requirements and arrangements of casualties are met and enduring is m

Friday, August 21, 2020

Dementia Awareness Essay

1.1 Explain what is implied by the term ‘Dementia’ The word dementia depicts a lot of manifestations that may incorporate memory misfortune and troubles with speculation, critical thinking or language. These progressions are regularly little to begin with yet for somebody with dementia they have gotten serious enough to impact every day life. An individual with dementia may likewise encounter changes in their temperament or conduct. 1.2 Describe the key elements of the cerebrum that are influenced by dementia. The key elements of the mind that are influenced by dementia are Transient Lobe †Responsible for vision, memory, language, hearing, learning. Frontal Lobe †Responsible for dynamic, Problem fathoming, controlling conduct and feelings. Parietal Lobe †Responsible for tactile data from the body, additionally where letters are framed, taking care of things and spatial mindfulness. Occipital Lobe †Responsible for preparing data identified with vision. Cerebrum Lobe †This is the greatest piece of the mind, Its job is memory, consideration, thought and our awareness, faculties and development. Hippocampus †Responsible for memory framing, sorting out, putting away and feelings. 1.3 Explain why Depression, Delirium and age related memory weakness might be confused with Dementia. Ridiculousness, Dementia and Depression are disarranges that are frequently confounded via parental figures as they are unpredictable and patients can be distressed with more than one of the conditions simultaneously. Albeit regularly occurrence they are altogether isolated conditions. Wooziness is an intense however reversible mess happening in up to 50 percent of more seasoned post-careful patients. Dementia is an irreversible decrease of mental capacities which influences 5-10 percent of the populace over age 65, with frequency multiplying like clockwork after 65. Discouragement is a temperament issue which influences 16 percent of the populace in spite of the fact that it is frequently unrecognized. 2.1 Outline the clinical model of dementia The clinical model spotlights on the debilitation as the issue and spotlights on a fix, these might be reliance, limitation of decision, weakening and debasing people. 2.2 Outline the social model of dementia. This is close to home focused, concentrating on the privileges of the person, thus engaging the individual, advancing autonomy, giving decision and taking a gander at what the individual can do. 2.3 Explain why dementia ought to be seen as a handicap. People who have dementia don't know about necessities for living. They can neglect to do the basic things that are crucial. Taking prescriptions, cleanliness and in any event, eating are regularly overlooked. They can get lost or hurt and not comprehend what is important to address a circumstance. People can't act in the way of a mindful grown-up which is the reason dementia ought to be seen as an inability. 3.1 List the most widely recognized reasons for dementia. The most widely recognized reasons for dementia are †Alzheimer’s malady †This is the most well-known reason for dementia. Over the span of the illness, the science and structure of the cerebrum changes, prompting the demise of synapses. Vascular Dementia †If the oxygen gracefully to the mind fizzles, synapses may pass on. The indications of vascular dementia can happen either unexpectedly, followingâ a stroke, or after some time, through a progression of little strokes. Dementia with Lewy Bodies †This type of dementia gets its name from minor circular structures that create inside nerve cells. Their quality in the mind prompts the degeneration of cerebrum tissue. Frontoâ€temporal Dementia †In fronto-worldly dementia, harm is normally engaged in the forward portion of the mind. Character and conduct are at first more influenced than memory. 3.2 Describe the reasonable signs and side effects of the most widely recognized reasons for dementia. Dementia is an assortment of indications including memory misfortune, character change, and weakened scholarly capacities coming about because of infection or injury to the cerebrum. These progressions are not part of ordinary maturing and are sufficiently serious to affect day by day living, freedom, and connections. With dementia, there will probably be recognizable decrease in correspondence, picking up, recalling, and critical thinking. These progressions may happen rapidly or gradually after some time. The movement and result of dementia differ, however are generally dictated by the sort of dementia and which region of the cerebrum is influenced. Finding is conceivable through cutting edge cerebrum imaging, clinical assessments, and symptomatic testing. 3.3 Outline the hazard factors for the most widely recognized reasons for dementia. The best realized hazard factor for Alzheimer’s is propelling age. Most people with the malady are age 65 or more established. The probability of creating Alzheimer’s copies about at regular intervals after age 65. After age 85, the hazard arrives at almost 50 percent. Probably the best riddle of Alzheimer’s ailment is the reason hazard rises so significantly as we become more seasoned. Another solid hazard factor is family ancestry. The individuals who have a parent, sibling, sister or kids with Alzheimer’s are bound to build up the ailment. The hazard increments if more than one relative has the ailment. At the point when illnesses will in general run in families, either heredity (hereditary qualities) or natural components, or both, may assume a job. When all is said in done, the hazard factors for vascular dementia are equivalent to those for coronary illness andâ stroke. Hazard factors for vascular dementia include: Increasing age. History of respira tory failure, stroke or smaller than expected strokes. Atherosclerosis. Elevated cholesterol. Hypertension. Diabetes. Smoking and Atrial fibrillation. In spite of the fact that the reason for Lewy body dementia isn’t clear, a few variables seem to build the danger of building up the sickness. They include: Being more established than 60. Being male and having a relative with Lewy body dementia. Numerous degenerative neurological sicknesses don't have a solid hereditary segment, yet Frontoâ€temporal Dementia is accepted to be a special case, with a high familial segment contrasted with different occurrences of dementia. Dissimilar to in different types of dementia, in any case, there are no wholesome inadequacies or different propensities that improve the probability of creating Frontoâ€temporal Dementia. Rather, hazard factors for creating Frontoâ€temporal Dementia include: Mutations in the MAPT as well as GRN qualities of chromosome 17, a family ancestry of Frontoâ€temporal Dementia. 3.4 Identify predominance rates for various kinds of dementia. The Prevalence’s of Alzheimer’s malady, vascular dementia, Parkinson’s sickness dementia, and different dementias †Overall, 72% of the dementias were of Alzheimer type, 16% were vascular dementia, 6% were Parkinson’s ailment dementia, and 5% were different dementias. 4.1 Describe how various people may encounter living with dementia relying upon age, kind of dementia, and level of capacity and incapacity. Dementia isn't an ailment however a lot of side effects which diminishes the capacity to think, memory and relational abilities of individuals. It likewise decays the aptitudes that expected to do day by day exercises. There are numerous reasons for dementia. Few are :  · Alzheimer’s sickness  · Vascular illness  · Lewy body malady  · Front transient issue  · Parkinson’s ailment  · Depending on the type of dementia people’s capacity and handicap vacillates. It isn't really to believe that individuals with dementia are constantly neglectful. Like, individuals with Fronto-worldly dementia are less distracted than Alzheimer infection. Their memory stays flawless yet their character and conduct recognizably changes. Dementia with Lewy bodies intrudes on the brain’s normalâ functioning and influence the person’s memory, fixation and discourse aptitudes. It has comparative indications to Parkinson’s malady, for example, tremors, gradualness of development and discourse challenges. Individuals with vascular dementia may experience the ill effects of incontinence or seizure where different sorts of dementia may not influence those. Anyway level of capacity and inability rely upon individual’s age and state of dementia. Individuals who are living with dementia in prior age, for example, 60’s-70’s are less reliable than individuals living with dementia at the age or over 70’s or 80’s. Individuals have distinctive endurance in various ages. Along these lines, their capacity and incapacity changed and level of help are fluctuated also 4.2 Outline the effect that the mentalities and conduct of others may have on a person with dementia Dementia can bigly affect a person’s conduct. It can cause them to feel on edge, lost, confounded and baffled. Albeit every individual with dementia handles these sentiments in their own specific manner, certain conduct is basic in individuals with the ailment. This incorporates: †¢ rehashing questions or doing a movement again and again †¢ strolling and pacing all over †¢ Aggression, yelling and shouting †¢ getting dubious of others In the event that you are encountering these practices, or are taking care of somebody who acts along these lines, it’s imperative to recollect this is an endeavor to impart how they’re feeling and that they are not being purposely troublesome. In the event that you remain quiet and work out why they’re communicating along these lines, you might have the option to quiet them down.

Friday, June 12, 2020

Never Let Me Go The Creation of Kathys Identity - Literature Essay Samples

The thoughtful formation of identity is a significant part of Hailsham life, and as a narrator, Kathy shares her doubts while consciously searching for the aspects of her personality that could answer her queries about her life at Hailsham. Kathy’s search is divided into her actions, uniqueness, as well as key events like art and donations that help shape her identity. Amongst these three quests, she constantly seems to blame her personality for her deeds. Hence, exploring her distinctiveness and questioning herself â€Å"what makes me so different?†. Due to the integral nature of art and donation in Hailsham students’ lives, Kathy is compelled to investigate how it influences her character. In Never Let Me Go, author Kazuo Ishiguro demonstrates the ways in which the search for identity can be a conscious process through her uniqueness, actions and events such as donations and art that help shape her identity. Kathy is mindful of the fact that students at Hailsham are unlike those in the outside world in terms of their personalities. However, she doesn’t understand the meaning behind it, â€Å"We certainly knew–though not in any deep sense–that we were different from our guardians, and also from the normal people outside; we perhaps even knew that a long way down the line there were donations waiting for us. But we didnt really know what that meant† (69). Kathy is aware that Hailsham students were distinctive from â€Å"the normal people outside† and â€Å"didn’t really know what that meant†, illustrating how she was unable to comprehend the state of being unalike as believed that she could possibly connect their uniqueness to her soul. In addition, Kathy believes that her search for identity has been everlasting and there are still missing pieces she needs to discover. As she recalls, â€Å"Thinking back now, I can see we were just at that age when we knew a few things about ourselves–about who we were, how we were different from our guardians, from the people outside–but hadnt yet understood what any of it meant† (36). This uncovers the journey that Kathy has witnessed when she claims that she â€Å"hadn’t yet understood what any of it meant†, indicating a lack of understanding of their differences. This obliviousness is concerning to Kathy, as she realizes that she needs to find her deeper self before it’s too late. By referring to these past events, Kathy is showing that she is constantly attempting to search for herself, as â€Å"we knew a few things about ourselves† demonstrates the struggle for Kathy in her search and a constant attempt. As Kathy is unaware of the fact that makes them unique, it leads her to questioning constantly the ideas and searches for the aspect of her identity that makes them stand out. Kathy believes that her development as a person influences the way she conducts herself. Which accordingly, obliges her to explore the causes behind those actions. When Kathy experiences strange feelings, she responds in an amusing manner, saying, â€Å"I get these really strong feelings when I want to have sex. Sometimes it just comes over me and for an hour or two its scary. [] Thats why I started thinking, well, it has to come from somewhere. It must be to do with the way I am† (179). Since she finds the feeling quite strange, she knows that, â€Å"It must be to do with the way I am†, suggesting that her personality is responsible for her deeds. This indicates how Kathy’s always aware of the link between the two, however is unable to figure out the way in which association. Another way in which she connects her actions to her identity is through the idea blame. When she says, â€Å"Something in me just gave up. A voice went: ‘All right, let him think th e absolute worst. Let him think it, let him think it.’ And I suppose I looked at him with resignation, with a face that said, ‘Yes, it’s true, what else did you expect?’† (195). The lingering thought in her mind that makes her feel guilty for breaking apart the friendship between Ruth and Tommy leads her to associate this guilt with her personality. Since Ruth and Tommy are of great significance to her, their separation evokes gloominess inside her, which can be seen when she cries, â€Å"something in me just gave up†. Ishiguro deliberately uses â€Å"something in me† contrary to the usual saying of â€Å"I give up†, to underline the impact of her actions on her internal consciousness. Overall, Kathy is uncovering what might have caused that aspect of her identity to give up, leading her to blames her actions for the she happens to be. Even though Kathy sees how activities like art and donation positively help shape their identities, she strives to find a link between the two. Despite the fact that donations have always been considered to be of utter importance to the life at Hailsham, Kathy still displays uncertainty towards the idea of being donors. This idea is witnessed when she states, â€Å"About us, about how one day well start giving donations. I dont know why, but Ive had this feeling for some time now, that its all linked in, though I cant figure out how† (29). Kathy acknowledges the fact that by being a Hailsham student, she is obliged to give donations. Despite knowing the fact that donating is an essential practice, she is oblivious as to how it helps construct their identities. Another key aspect of Hailsham life is art, from the very beginning, students have been taught that it helps discover their identities. However, once again Kathy is unable to apprehend the connection between them. When M iss Lucy reveals, â€Å" ‘your art, it is important. And not just because its evidence. But for your own sake. Youll get a lot from it, just for yourself. ‘Hold on. What did she mean, evidence?’ ‘I dont know. But she definitely said that’ † (92). After Tommy shares Miss Lucy’s words with Kathy, she quite visibly becomes more curious and intrigued by it, particularly when she questions, â€Å"What did she mean†. Miss Lucy’s words inspire Kathy to use art as a medium to express herself, which forges her to find a link between the two. To brief, for the students of Hailsham, donations and art are used as an important tool to develop their identities. These mandatory rituals lead Kathy to explore the influence of the two mediums on her. In Never Let Me Go, Ishiguro examines the different ways in which the search for identity could be a conscious process. He successfully does this through the help of Kathy’s uniqueness, actions and events such as donations and art, all of which contribute in the shaping of her identity. Throughout the novel, she consciously wonders about the relation between her physical actions, obligations, and personality to her identity. She often shares these feelings and doubts with the readers, indicating how her search for identity is a conscious process. Overall, Kathy represents the students at Hailsham as a whole, revealing that she is definitely not the only one to struggle and overcome the loss of identity.

Sunday, May 17, 2020

Who Were the Mujahideen of Afghanistan

In the 1970s, a new group of fighters arose in Afghanistan. They called themselves mujahideen (sometimes spelled mujahidin), a word applied initially to Afghan fighters who opposed the push of the British Raj into Afghanistan in the 19th century. But who were these 20th-century mujahideen? The word mujahideen comes from the same Arabic root as jihad, which means struggle. Thus, a mujahid is someone who struggles or someone who fights. In the context of Afghanistan during the late 20th century, the mujahideen were Islamic warriors defending their country from the Soviet Union, which invaded Afghanistan in 1979 and fought a bloody war there for a decade. Who Were the Mujahideen? Afghanistans mujahideen were exceptionally diverse, including ethnic Pashtuns, Uzbeks, Tajiks, and others. Some were Shia Muslims, sponsored by Iran, while most factions were made up of Sunni Muslims. In addition to the Afghan fighters, Muslims from other countries volunteered to join the mujahideen ranks. Much smaller numbers of Arabs (including Osama bin Laden, 1957–2011), fighters from Chechnya, and others rushed to the aid of Afghanistan. After all, the Soviet Union was officially an atheist nation, inimical to Islam, and the Chechens had their own anti-Soviet grievances. The mujahideen arose out of local militias, led by regional warlords, who independently took up arms all across Afghanistan to fight the Soviet invasion. Coordination among the different mujahideen factions was severely limited by mountainous terrain, linguistic differences, and traditional rivalries among different ethnic groups. As the Soviet occupation dragged on, the Afghan resistance became increasingly united in its opposition. By 1985, the majority of the mujahideen were fighting as part of a broad alliance known as the Islamic Unity of Afghanistan Mujahideen. This alliance was made up of troops from the armies of seven major warlords, so it was also known as the Seven Party Mujahideen Alliance or the Peshawar Seven. The most famous (and likely most effective) of the mujahideen commanders was Ahmed Shah Massoud (1953–2001), known as the Lion of the Panjshir. His troops fought under the banner of the Jamiat-i-Islami, one of the Peshawar Seven factions led by Burhanuddin Rabbani, who would later become the 10th president of Afghanistan. Massoud was a strategic and tactical genius, and his mujahideen were a crucial part of the Afghan resistance against the Soviet Union during the 1980s. The Soviet-Afghan War For a variety of reasons, foreign governments also supported the mujahideen in the war against the Soviets. The United States had been engaged in detente with the Soviets, but their expansionist move into Afghanistan angered President Jimmy Carter, and the U.S. would go on to supply money and arms to the mujahideen through intermediaries in Pakistan for the duration of the conflict. (The U.S. was still smarting from its loss in the Vietnam War, so the country did not send in any combat troops.) The Peoples Republic of China also supported the mujahideen, as did Saudi Arabia. The Afghan mujahideen deserve the lions share of the credit for their victory over the Red Army. Armed with their knowledge of the mountainous terrain, their tenacity, and their sheer unwillingness to allow a foreign army to overrun Afghanistan, small bands of often ill-equipped mujahideen fought one of the worlds superpowers to a draw. In 1989, the Soviets were forced to withdraw in disgrace, having lost 15,000 troops. For the Soviets, it was a very costly mistake. Some historians cite the expense and discontent over the Afghan War as a major factor in the collapse of the Soviet Union several years later. For Afghanistan, it was also a bittersweet victory; more than 1 million Afghans were killed, and the war threw the country into a state of political chaos that eventually allowed the fundamentalist Taliban to take power in Kabul. Further Reading Feifer, Gregory. The Great Gamble: The Soviet War in Afghanistan. New York: Harper, 2009.Girardet, Ed. Afghanistan: The Soviet War. London: Routledge, 1985Hilali, A.Z. U.S.—Pakistan Relationship: Soviet Invasion of Afghanistan. London: Routledge, 2005.

Wednesday, May 6, 2020

Implementing A Nutrition Education Component On The Double...

Project design: This project seeks to implement a nutrition education component in the Double Up Food Bucks program at the Oakland County Farmer Market The first step in achieving the goal of increasing the purchase and consumption of SNAP beneficiaries in Oakland County is to increase the participation rates of the DUBF program. A good way to accomplish this is through promotion. Promoting the the DUFB program and what is has to offer will increase awareness and educate participants of the benefits they are able to receive when they shop at the farmers market. Starting two months prior to the beginning of the farmers market season, the community dietitian will have developed numerous promotional advertisements . With the help of an assistant, the advertisements will be sent out and displayed at local businesses, community centers, government agencies and libraries within Oakland County. Promotional marketing types will include newsletters, flyers, brochures, and websites. Each adver tisement material will include information about the farmers market, such as day and time of operation and location of market, as well as information on the DUFB program, the SNAP incentives offered, and benefits of participating. Additionally, the marketing material will promote the opportunity of nutrition education and ability to speak with a RD to answer any questions they may have. Newsletters will be sent out local residents homes, especially those in close proximity of the OaklandShow MoreRelatedDeveloping Management Skills404131 Words   |  1617 PagesCoral Graphics Text Font: 10/12 Weidemann-Book Credits and acknowledgments borrowed from other sources and reproduced, with permission, in this textbook appear on appropriate page within text. Copyright  © 2011, 2007, 2005, 2002, 1998 Pearson Education, Inc., publishing as Prentice Hall, One Lake Street, Upper Saddle River, New Jersey 07458. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the publisher

A Report on Behavoiural Profiling for Loyalty - MyAssignmenthelp

Question: Write aboutA Report on Behavoiural Profiling for Loyalty. Answer: This paper centralizes on changes in my behavioural patterns as a staff co-ordinator on the recent employee development program conducted in CERA. In my psychometric profiling based on D.I.S.C analysis, results indicate that I exhibit a high degree of dominance; the levels of my ability to influence my peers and perform steadily are moderate while my compliance with the company has been above average. During my orientation to the staff co-ordinating, I was very responsible throughout the recent recruitment process in the Company. I made sure that the trainees took their training seriously while maintaining a friendly demeanour towards them. I have been more of a calm and calculated employee, who tends to think more analytically. I appreciate learning from my mistakes and work persistently. According to the data compiled in Big Five personality test, the resultant data indicates my personality likely to be that of a confident, positive and self-conscious person. Moreover, my staff members speak highly of me and the opinion of core members of HR department suggests that I am an employee full of potential and diligence. Furthermore, my problem-solving capabilities are uniquely satisfying although there are much more skills I can learn and develop in the future while my tenure in this Company. Hence, this paper concludes that the employee development program was successful and has a considerable loyalty and dedication towards this company and its goals.