Wednesday, October 30, 2019

Questions in Communication & Social research Essay - 1

Questions in Communication & Social research - Essay Example t all the different reasons that explain a particular course of action, whereas nomothetic explanation looks at all the different factors behind a particular course of action. Stating that their paycheck was not direct deposited on time, but a day late, that HR failed to include holiday pay on the check when it was deposited, and that they will not be able to correct it for another two days are examples of idiographic explanations to a company as to why a bill may be late. Looking at the proximity of a job to a place of residence, how much they pay versus how much may be saved in travel time, and the amount of work that will need to be done when compared to a person’s current job all fall under the blanket of nomothetic reasoning. A paradigm is â€Å"the fundamental model or frame of reference we use to organize our observations and reasoning† (Babbie, p. 33). There are many different types of paradigms present in our world today; including the postmodern paradigm which suggests only experience is real, scientific paradigms such as Newtonian mechanics and Einstein’s theory of relativity, macrotheory which focuses on the big pictures in society, and microtheory which focus on interactions at the individual level and while these are not the only paradigms covered in the text itself, these are some of the main paradigms discussed. Paradigms are important because they not only offer a variety of different viewpoints, but they also offer certain insights into the field of study being referenced. Paradigms are â€Å"neither true nor false; as ways of looking, they are only more or less useful† (Babbie, p. 34). Every paradigm makes assumptions about the nature of reality, and offers a different way of looking at the world and the societies in it; each of these different paradigms offers a new branch of research, and new methods and concepts to be investigated. They offer a different way of seeing the world, which in turn can shed light on the resolution of different

Monday, October 28, 2019

Machine Learning in Malware Detection

Machine Learning in Malware Detection 1.0 Background Research Malware was first created in 1949 by John von Neumann. Ever since then, more and more malwares are created. Antivirus company are constantly looking for a method that is the most effective in detecting malware. One of the most famous method used by antivirus company in detecting malware is the signature based detection. But over the years, the growth of malware is increasing uncontrollably. Until recent year, the signature based detection have been proven ineffective against the growth of malware. In this research, I have chosen another method for malware detection which is implementing machine learning method on to malware detection. Using the dataset that I get from Microsoft Malware Classification Challenge (BIG 2015), I will find an algorithm that will be able to detect malware effectively with low false positive error. 1.1 Problem Statement With the growth of technology, the number of malware are also increasing day by day. Malware now are designed with mutation characteristic which causes an enormous growth in number of the variation of malware (Ahmadi, M. et al., 2016). Not only that, with the help of automated malware generated tools, novice malware author is now able to easily generate a new variation of malware (Lanzi, A. et al., 2010). With these growths in new malware, traditional signature based malware detection are proven to be ineffective against the vast variation of malware (Feng, Z. et al., 2015). On the other hand, machine learning methods for malware detection are proved effective against new malwares. At the same time, machine learning methods for malware detection have a high false positive rate for detecting malware (Feng, Z. et al., 2015). 1.2 Objective To investigate on how to implement machine learning to malware detection in order to detection unknown malware. To develop a malware detection software that implement machine learning to detect unknown malware. To validate that malware detection that implement machine learning will be able to achieve a high accuracy rate with low false positive rate. 1.3 Theoretical / Conceptual Framework 1.4 Significance With Machine Learning in Malware detection that have a high accuracy and low false positive rate, it will help end user to be free from fear malware damaging their computer. As for organization, they will have their system and file to be more secure. 2.0 Literature Review 2.1 Overview Traditional security product uses virus scanner to detect malicious code, these scanner uses signature which created by reverse engineering a malware. But with malware that became polymorphic or metamorphic the traditional signature based detection method used by anti-virus is no long effective against the current issue of malware (Willems, G., Holz, T. Freiling, F., 2007). In current anti-malware products, there are two main task to be carried out from the malware analysis process, which are malware detection and malware classification. In this paper, I am focusing on malware detection. The main objective of malware detection is to be able to detect malware in the system. There are two type of analysis for malware detection which are dynamic analysis and static analysis. For effective and efficient detection, the uses of feature extraction are recommended for malware detection (Ahmadi, M. et al., 2016). There are various type of detection method, the method that we are using will b e detecting through hex and assembly file of the malware. Feature will be extracted from both hex view and assembly view of malware files. After extracting feature to its category, all category is to be combine into one feature vector for the classifier to run on them (Ahmadi, M. et al., 2016). For feature selection, separating binary file into blocks to be compare the similarities of malware binaries. This will reduce the analysis overhead which cause the process to be faster (Kim, T.G., Kang, B. Im, E.G., 2013). To build a learning algorithm, feature that are extracted with the label will be undergo classification with using any classification method for example Random Forest, Neural Network, N-gram, KNN and many others, but Support Vector Machine (VCM) is recommended for the presence of noise in the extracted feature and the label (Stewin, P. Bystrov, I., 2016). As to generate result, the learning model is to test with dataset with label to generate a graph which indicate detec tion rate and false positive rate. To find the best result, repeat the process using many other classification and create learning model to test on the same dataset. The best result will the one graph that has the highest detection rate and lowest false positive rates (Lanzi, A. et al., 2010). 2.2 Dynamic and Static Analysis Dynamic Analysis runs the malware in a simulated environment which usually will be a sandbox, then within the sandbox the malware is executed and being observe its behavior. Two approaches for dynamic analysis that is comparing image of the system before and after the malware execution, and monitors the malware action during the execution with the help of a debugger. The first approach usually give a report which will be able to obtain similar report via binary observation while the other approach is more difficult to implement but it gives a more detailed report about the behavior of the malware (Willems, G., Holz, T. Freiling, F., 2007). Static Analysis will be studying the malware without executing it which causing this method to be more safe comparing to dynamic analysis. With this method, we will dissemble the malware executable into binary file and hex file. Then study the opcode within both file to compare with a pre-generated opcode profile in order to search for malicious code that exist within the malware executable (Santos, I. et al., 2013). All malware detection will be needed either Static Analysis or Dynamic Analysis. In this paper, we will be focusing on Static Analysis (Ahmadi, M. et al., 2016). This is because, Dynamic analysis has a drawback, it can only run analysis on 1 malware at a time, making the whole analysis process to take a long time, as we have many malware that needed to be analysis (Willems, G., Holz, T. Freiling, F., 2007). As for Static Analysis, it mainly uses to analyze hex code file and assembly code file, and compare to Dynamic Analysis, Static Analysis take much short time and it is more convenient to analyze malware file as it can schedule to scan all the file at once even in offline (Tabish, S.M., Shafiq, M.Z. Farooq, M., 2009). 2.3 Features Extraction For an effective and efficient classification, it will be wise to extract feature from both hex view file and assembly view file in order to retrieve a complementary date from both hex and assembly view file (Ahmadi, M. et al., 2016). Few types of feature that are extracted from the hex view file and assembly view file, which is N-gram, Entropy, Image Representative, String Length, Symbol, Operation Code, Register, Application Programming Interface, Section, Data Define, Miscellaneous (Ahmadi, M. et al., 2016). For N-gram feature, it usually used to classify a sequence of action in different areas. The sequence of malware execution could be capture by N-gram during feature extraction (Ahmadi, M. et al., 2016).   For Entropy feature, it extracts the probability of uncertainty in a series of byte in the malware executable file, these probability of uncertainty is depending on the amount of information on the executable file (Lyda, R.,Hamrock, J,. 2007). For Image Representative feature, the malware binary file is being read into 8-bit vector file, then organize into a 2D array file. The 2D array file can be visualize as a black and gray image whereas grey are the bit and byte of the file, this feature look fo r common in bit arrangement in the malware binary file (Nataraj, L. et al., 2011). For String Length feature, we open each malware executable file and view it in hex view file and extract out all ASCII string from the malware executable, but because it is difficult to only extract the actual string without extract other non-useful element, it is required to choose important string among the extracted (Ahmadi, M. et al., 2016). For Operation Code features, Operation code also known as Opcode are a type of instruction syllable in the machine language. In malware detection, different Opcode and their frequency is extracted and to compare with non-malicious software, different set of Opcodes are identifiable for either malware or non-malware (Bilar, D., n.d.). For Register feature, the number of register usage are able to assist in malware classification as register renaming are used to make malware analysis more difficult to detect it (Christodorescu, M., Song, D. Bryant, R.E., 2005). For Application Programming Interface feature, API calling are code that call the function of other software in our case it will be Windows API. There are large number of type of API calls in malicious and non-malicious software, is hard to differentiate them, because of this we will be focusing on top frequent used API calls in malware binaries in order to bring the result closer (Top maliciously used apis, 2017). For Data Define feature, because not all of malware contains API calls, and these malware that does not have any API calls they are mainly contain of operation code which usually are db, dw, dd, there are sets of features (DP) that are able to define malware (Ahmadi, M. et al., 2016). For Miscellaneous feature, we choose a few word that most malware have in common from the malware dissemble file (Ahmadi, M. et al., 2016). Among so many feature, the most appropriate feature for our research will be N-gram, and Opcode. This is because it is proven that there two feature have the highest accuracy with low logloss. This two feature appears frequently in malware file and it already have sets of well-known features for malware. But the drawback using N-gram and Opcode are they require a lot of resource to process and take a lot of time (Ahmadi, M. et al., 2016). We will also try other feature to compare with N-gram and Opcode to verified the result. 2.4 Classification In this section, we will not review about the algorithm or mathematical formula of a classifier but rather their nature to able to have advantage over certain condition in classifying malware feature. The type of classifier that we will review will be Nearest Neighbor, NaÃÆ' ¯ve Bayes, Decision tree, Support Vector Machine and XGBOOST [21] (Kotsiantis, S.B., 2007) (Ahmadi, M. et al., 2016). As we need a classifier to train our data with the malware feature, we will need to review the classifier to choose the most appropriate classifier that are able to have the best result. The Nearest Neighbor classifier are one of the simplest method for classifying and it is normally implement in case-based reasoning [21]. As for NaÃÆ' ¯ve Bayes, it usually generates simply and constraint model and not suitable for irregular data input, which make it not suitable for malware classification because that the data in malware classification are not regular (Kotsiantis, S.B., 2007). For Decision Tree, it classify feature by sorting them into tree node base on their feature values and each branch represent the node value. Decision Tree will determine either try or false based on node value, which make it difficult to dealt with unknown feature that are not stored in tree node (Kotsiantis, S.B., 2007). For Support Vector Machine, it has a complexity model which enable it to deal with lar ge amount of feature and still be able to obtain good result from it, which make it suitable for malware classification as malware contains large number of feature (Kotsiantis, S.B., 2007). For XGBOOST, it is a scalable tree boosting system which win many machine learning competition by achieving state of art result. The advantage for XGBOOST, it is suitable for most of any scenario and it run faster than most of other classification technique (Chen, T., n.d.). To choose a Classification for our malware analysis, we will be choosing XGBOOST, as it is suitable for malware classification, it also recommended by winner from Microsoft Malware Classification Challenge (Ahmadi, M. et al., 2016). But we will also use Support Vector Machine, as it too is suitable for malware classification and we will use it to compare the result with XGBOOST to get a more accurate result. References   Ahmadi, M. et al., 2016. Novel Feature Extraction, Selection and Fusion for Effective Malware Family Classification. ACM Conference on Data and Application Security and Privacy, pp.183-194. Available at: http://doi.acm.org/10.1145/2857705.2857713. Amin, M. Maitri, 2016. A Survey of Financial Losses Due to Malware. Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies ICTCS 16, pp.1-4. Available at: http://dl.acm.org/citation.cfm?doid=2905055.2905362. Berlin, K., Slater, D. Saxe, J., 2015. Malicious Behavior Detection Using Windows Audit Logs. Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security, pp.35-44. Available at: http://doi.acm.org/10.1145/2808769.2808773. Feng, Z. et al., 2015. HRSà ¢Ã¢â€š ¬Ã‚ ¯: A Hybrid Framework for Malware Detection. , (10), pp.19-26. Han, K., Lim, J.H. Im, E.G., 2013. Malware analysis method using visualization of binary files. Proceedings of the 2013 Research in Adaptive and Convergent Systems, pp.317-321. Kim, T.G., Kang, B. Im, E.G., 2013. Malware classification method via binary content comparison. Information (Japan), 16(8 A), pp.5773-5788. Kà ¼Ãƒ §Ãƒ ¼ksille, E.U., Yalà §Ãƒâ€žÃ‚ ±nkaya, M.A. Uà §ar, O., 2014. Physical Dangers in the Cyber Security and Precautions to be Taken. Proceedings of the 7th International Conference on Security of Information and Networks SIN 14, pp.310-317. Available at: http://dl.acm.org.proxy1.athensams.net/citation.cfm?id=2659651.2659731. Lanzi, A. et al., 2010. AccessMiner: Using System-Centric Models for Malware Protection. Proceedings of the 17th ACM Conference on Computer and Communications Security CCS10, pp.399-412. Available at: http://dl.acm.org/citation.cfm?id=1866353%5Cnhttp://portal.acm.org/citation.cfm?doid=1866307.1866353. Nicholas, C. Brandon, R., 2015. Document Engineering Issues in Document Analysis. Proceedings of the 2015 ACM Symposium on Document Engineering, pp.229-230. Available at: http://doi.acm.org/10.1145/2682571.2801033. Patanaik, C.K., Barbhuiya, F.A. Nandi, S., 2012. Obfuscated malware detection using API call dependency. Proceedings of the First International Conference on Security of Internet of Things SecurIT 12, pp.185-193. Available at: http://www.scopus.com/inward/record.url?eid=2-s2.0-84879830981partnerID=tZOtx3y1. Pluskal, O., 2015. Behavioural Malware Detection Using Efficient SVM Implementation. RACS Proceedings of the 2015 Conference on research in adaptive and convergent systems, pp.296-301. Santos, I. et al., 2013. Opcode sequences as representation of executables for data-mining-based unknown malware detection. Information Sciences, 231, pp.64-82. Stewin, P. Bystrov, I., 2016. Detection of Intrusions and Malware, and Vulnerability Assessment, Available at: http://dblp.uni-trier.de/db/conf/dimva/dimva2012.html#StewinB12. Willems, G., Holz, T. Freiling, F., 2007. Toward automated dynamic malware analysis using CWSandbox. IEEE Security and Privacy, 5(2), pp.32-39. Tabish, S.M., Shafiq, M.Z. Farooq, M., 2009. Malware detection using statistical analysis of byte-level file content. Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics CSI-KDD 09, pp.23-31. Available at: http://portal.acm.org/citation.cfm?doid=1599272.1599278. Lyda, R.,Hamrock, J,. 2007.Using Entropy Analysis to Find Encrypted and Packed Malware. Nataraj, L. et al., 2011. Malware Imagesà ¢Ã¢â€š ¬Ã‚ ¯: Visualization and Automatic Classification. Bilar, D., Statistical Structuresà ¢Ã¢â€š ¬Ã‚ ¯: Fingerprinting Malware for Classification and Analysis Why Structural Fingerprintingà ¢Ã¢â€š ¬Ã‚ ¯? Christodorescu, M., Song, D. Bryant, R.E., 2005. Semantics-Aware Malware Detection. Top maliciously used apis. https: //www.bnxnet.com/top-maliciously-used-apis/, 2017. Weiss, S.M. Kapouleas, I., 1989. An Empirical Comparison of Pattern Recognition , Neural Nets , and Machine Learning Classification Methods. , pp.781-787. Kotsiantis, S.B., 2007. Supervised Machine Learningà ¢Ã¢â€š ¬Ã‚ ¯: A Review of Classification Techniques. , 31, pp.249-268. Chen, T., XGBoostà ¢Ã¢â€š ¬Ã‚ ¯: A Scalable Tree Boosting System.

Friday, October 25, 2019

Alcohol Essay -- essays research papers

Many pregnant women are not aware of the complications that are involved with pregnancy. The greater majority of young women see pregnancy as a way of bringing a life into the world but do not use precaution in their dietary habits to prevent the destruction or inhibition of such a life. Most pregnant women continue on their drinking and drug abuse binge right throughout their pregnancy. They do not think ahead to the inexplicable damage that it could do to their fetus. What they do not know is that when a woman drinks while pregnant it could do damage, and pose problems not only to herself, but to the fetus that she is carrying. The problem? FAS, Fetal Alcohol Syndrome. According to many physicians it is the leading cause of birth defects and developmental disabilities in the United States today. Douglas A. Milligan states that, "FAS is the single greatest cause of mental retardation in the U.S. today". ( Seachrist, p. 314) Fetal Alcohol Syndrome was first named and treat ed and found in the late 1960's. This condition results from the toxic effect of alcohol and its chemical factors on the developing fetus and its brain. The alcohol enters the bloodstream though the placenta and then the damage begins to occur. FAS consists of a characteristic pattern of abnormalities resulting from the exposure that the fetus has had with alcohol during early development. There have been many reports linking alcohol use and fetal deficiencies in growth that emerged from France in the late 1950's. Not until the 1960's was the correlation made between the number of defects and the increasing amount of babies born with the syndrome. The term Fetal Alcohol Syndrome was coined to describe the pattern of the abnormalities found in some children born to alcoholic women. It clearly was very noticeable and distinctive in the recognition of itself and was distinct from all other patterns of malformation in the fetus; there was a significant association found between the alco hol consumption rates during pregnancy and a lower general cognitive index of these children. Being further studied in the 1970's under the heading as a birth defect that occurs, FAS was one of the most common causes of birth defects. Researchers said that it occurred in almost 1 of every 500 to 1 in every thousand births.( Seachrist, p. 314) There is a major thing that causes difficulty in the diagnos... ...cose from mother to fetus. Several studies have shown that with the human placental tissue alcohol directly obstructs the transport of both these substances. These are two essential substances that, through research with rat embryos, have proven that the depravity of such causes malformations of fetal tissue's energy sources. The materials needed for cell proliferation, growth, and differentiation are also affected in this. The supplemental glucose thus becomes only minimally effective because of the lack of diminution of fetal growth retardation. (Michaelis and Michaelis, p. 21) Included within the nutritional deficiencies that occur are the loss of vitamins B6 and A. There is noted decrease in the transfer of B6 from an alcoholic mother to her fetus through the placenta. This vitamin is especially important in the development of the fetus because it functions as protein metabolism. There exists also a possible defect in the metabolism of folic acid. The lack of which during the gestation period produces malformations in the fetus. The last vitamin deficiency that I will note revolves around the receiving of vitamin A from the alcoholic mother to the fetus via the placenta. Alcohol Essay -- essays research papers Many pregnant women are not aware of the complications that are involved with pregnancy. The greater majority of young women see pregnancy as a way of bringing a life into the world but do not use precaution in their dietary habits to prevent the destruction or inhibition of such a life. Most pregnant women continue on their drinking and drug abuse binge right throughout their pregnancy. They do not think ahead to the inexplicable damage that it could do to their fetus. What they do not know is that when a woman drinks while pregnant it could do damage, and pose problems not only to herself, but to the fetus that she is carrying. The problem? FAS, Fetal Alcohol Syndrome. According to many physicians it is the leading cause of birth defects and developmental disabilities in the United States today. Douglas A. Milligan states that, "FAS is the single greatest cause of mental retardation in the U.S. today". ( Seachrist, p. 314) Fetal Alcohol Syndrome was first named and treat ed and found in the late 1960's. This condition results from the toxic effect of alcohol and its chemical factors on the developing fetus and its brain. The alcohol enters the bloodstream though the placenta and then the damage begins to occur. FAS consists of a characteristic pattern of abnormalities resulting from the exposure that the fetus has had with alcohol during early development. There have been many reports linking alcohol use and fetal deficiencies in growth that emerged from France in the late 1950's. Not until the 1960's was the correlation made between the number of defects and the increasing amount of babies born with the syndrome. The term Fetal Alcohol Syndrome was coined to describe the pattern of the abnormalities found in some children born to alcoholic women. It clearly was very noticeable and distinctive in the recognition of itself and was distinct from all other patterns of malformation in the fetus; there was a significant association found between the alco hol consumption rates during pregnancy and a lower general cognitive index of these children. Being further studied in the 1970's under the heading as a birth defect that occurs, FAS was one of the most common causes of birth defects. Researchers said that it occurred in almost 1 of every 500 to 1 in every thousand births.( Seachrist, p. 314) There is a major thing that causes difficulty in the diagnos... ...cose from mother to fetus. Several studies have shown that with the human placental tissue alcohol directly obstructs the transport of both these substances. These are two essential substances that, through research with rat embryos, have proven that the depravity of such causes malformations of fetal tissue's energy sources. The materials needed for cell proliferation, growth, and differentiation are also affected in this. The supplemental glucose thus becomes only minimally effective because of the lack of diminution of fetal growth retardation. (Michaelis and Michaelis, p. 21) Included within the nutritional deficiencies that occur are the loss of vitamins B6 and A. There is noted decrease in the transfer of B6 from an alcoholic mother to her fetus through the placenta. This vitamin is especially important in the development of the fetus because it functions as protein metabolism. There exists also a possible defect in the metabolism of folic acid. The lack of which during the gestation period produces malformations in the fetus. The last vitamin deficiency that I will note revolves around the receiving of vitamin A from the alcoholic mother to the fetus via the placenta.

Thursday, October 24, 2019

Floating Power Plant

FLOATING POWER PLANT [pic] By K. SRIKAR 10071A0228 VNR VJIET Ph no: 8341103940 Srikar. [email  protected] com CH. PRADEEP 10071A0211 VNR VJIET Ph no: 7207606693 [email  protected] com ABSTRACT: The concept of the Floating Power Plant is so far the only one known in the world that has combined the two energy forms and has an operating prototype. Our abstract deals with the Floating Power Plant, the current prototype is called Poseidon 37and MH-1A. INTRODUCTIONFloating Power Plant (FPP) is a new type energy source based on technologies of shipbuilding and designed to provide a reliable whole-year energy supply to households, industry and infrastructure facilities [pic] FPP, can combine heat and low-power nuclear station, are vessels projected that present self-contained, low-capacity, floating nuclear power plants. The stations are to be mass-built at shipbuilding facilities and then towed to the destination point in coastal waters near a city, a town or an industrial enterprise.Al though the world's first floating nuclear power station was MH-1A, the Rosatom project represents the first mass production of that kind of vessel. By 2015, at least seven of the vessels are supposed to be built. The floating power plant can economically supply electricity to a specific district or to a specific facility that temporarily uses the electricity and can minimise limitations caused by environmental regulations, and can be used as an emergency electrical power source HISTORY MH-1A was a pressurized water reactor and the first floating nuclear power station.One of a series of reactors in the US Army Nuclear Power Program, its designation stood for mobile, high power. The FIRST FLOATING NUCLEAR reactor was built for the U. S. Army by Martin Marietta under a $17,000,000 contract (August 1961), with construction starting in 1963. The original ship propulsion system was removed, and a single-loop pressurized water reactor, in a 350 ton containment vessel, was installed, using low enriched uranium (4% to 7% 235U) as fuel. The reactor supplied 10 MW (13,000 hp) electricity to the Panama Canal Zone from October 1968 to 1975. pic] Waller Marine has played an important role in the reintroduction of the Floating Power Plant (FPP) since the late 1980’s when the Company was asked to inspect the power barge â€Å"Impedance†; a barge constructed with steam generating technology that was first used in the Philippines by the US Army in 1940. Since that time, Waller has been involved in development, design, construction and operations of numerous power barge projects using all available generating technologies, different fuels and cooling system [pic]Floating Power Plants (FPPs), or Power Barges as they are more commonly called, have been around for many years. In fact one of the earlier units, constructed in 1940 by the US Army Corp of Engineers, a 30 MW steam generation facility and put into service in the Philippines, is still in operation at a site in Ecuador. . .Heavy fuels were selected as the fuel of choice mainly due to cost and availability, with consideration being given to simply meeting World Bank emissions standards being made at the time. Single barge designs ranged from 30 MW up to 100 MW. DESIGN:- BARGE CONSTRUCTION:-When using a semi-submerged structure for a wave energy device, the structure is modified radically compared to a standard barge. On the Poseidon 37, three sections constitute the barge: *The front section, which contains the turret mooring, *The middle section carrying the wave absorbers, and *The rear section. The whole structure is 37 meters wide and 25 meters long (excluding the buoy). The middle section can be disconnected from the front, and the energy device can thus be sailed to port without interfering with the mooring. This is needed since the P 37 is a prototype and a test facility.The front and rear sections ensure that the Floating Power Plant always turns against the wave front – a nd that it does so in a passive way without consuming energy. [pic] The wave absorbers (floaters) are hinged at the front. The floaters absorb the pressure motion of the wave both forwards and upwards. Up to 34 percent of the incoming wave energy is converted to electricity in the Floating Power Plant. According to FPP, this has been confirmed by the research and consultancy organization DHI (Danish Hydraulic Institute) in the latest wave flume test series.Each absorber on Poseidon 37 weighs 4. 7 tonnes without ballast and 24 tonnes fully ballasted. The ballast system is an active control system. Along with trimming of the submerged depth, these are the only two active controls in the whole structure, thus the only part where energy is consumed. Ballast is used to secure the optimum floater movement: in this way the floaters have high efficiency in small as well as large waves. MOORING With a floating structure that turns towards the waves, an anchor system which allows full 360 deg rees rotation is needed.With the Pivot Hinged Wave Absorber, a standard system from the oil and gas industry is used: the Turret Mooring System. Turret mooring is widely used on so-called FPSO vessels (Floating Production, Storage and Offloading). FPSOs typically extract oil and gas from fields far away, refine it and store it, and then offload it onto a transport vessel. Because of the oil extraction (through pipelines), a FPSO has to remain at the exact same position regardless of weather conditions. For this purpose, the vessel is secured with a Turret Mooring System.The turret is in its essence a buoy held in place by three or more mooring lines. The mooring lines are secured with anchors – in Poseidon’s case, these are plow anchors. A tugboat drags the anchors into the seabed until a given tension is achieved. [pic] The mooring lines have enough slack for the turret to move up and down when water levels rise and fall – but because of the number of mooring l ines, the horizontal position remains the same with little deviation. Thus, a platform installed at more than 40 meters depth will be able to follow a rise in the sea level of up to 30 meters.The system is not suited for depths less than 40 meters because of the energy in the waves at low depths. It would not be commercially viable. ENERGY PRODUCTION Whether one has a starting point in the wind industry or in wave energy, the logic behind a combination of the two energy forms is that it increases the return. The benefits of adding a wave energy device to a floating support structure for a wind turbine is stability and the boat landing. The wave energy device absorbs the wave motions, and thereby makes the structure even more stable.According to FPP, 70-90 percent of the energy in the wave motion is absorbed into a controlled system. This provides stability compared to a normal floating structure without any absorption. [pic] The wave absorbers convert the forward and upwards pressur e from the waves to an upward and downward motion. The movement of the floaters drives a double piston pump on each flow, pushing water at high speed and pressure through a turbine. The prototype Poseidon 37 has a rated power of 140 kW from the waves and 33 KW from wind, a total of 177 kW.Power production On the Poseidon 37 the wave absorbers start production at 20 centimetres significant wave height (Hs). Cut-out is at 1. 5 meters wave height (Hs). Plants will be dimensioned after the specific conditions at the given site, thus the cut-in and cut-out values can be varied. Apart from the waves, the rest of the energy comes from the three wind turbines. The size and power of the turbines are chosen according to a single criterion: tower height. The surface area and weight of the platform defines how high the tower can be. And the tower height defines what turbines are available on the market.In the case of the Poseidon 37, engineers chose a common onshore wind turbine: the Gaia-Wind 133-11kW. The tower is normally 18 meters high, but offshore 12 meters was possible. Instead of a standard lattice tower, a tubular tower was chosen to improve corrosion protection. According to Floating Power Plant, the wind turbines can be of any type and the number will vary from 1 to 3 turbines. The turbine can be upwind or downwind, and fitted with any number of blades. Only the tower height matters. In fact, the turbines have been proved to stabilize the whole construction’s pitching at sea. pic] Normally, the direction of wind and wave are overall the same, and this is also the optimal scenario for the plant. For the Poseidon, the power output from the middle wind turbine declines when the wind turns out of alignment with the wave direction. In rare cases with crosswinds the power output from turbines is at its lowest. On average, the middle turbine produces 85 percent of rated power, and the two front turbines produce up to their rated power. UPCOMING PROJECTS The nex t step is the construction of a power plant of 110 meters width to be installed in Oregon, USA.The Collaboration between Floating Power Plant and American venture capitalists was announced in April 2011, and the new prototype will be installed between 2014 and 2015. The largest scale of the Floating Power Plant will be 230 meters wide and mounted with three 2 MW turbines. The wave energy device will have a rated power of approximately 5-6 MW. The yearly production will be 50 GWh – of this 60-70 percent will be produced from wave energy, because the waves represent a more stable energy source. PROS AND CONS ADVANTAGES * Relatively fast construction dependent upon equipment availability. * Transportable power. Fast supply of electricity to areas with limited infrastructure. * Provides fast supply of electricity to areas with limited infrastructure * Is a mobile asset, possible to relocate or trade . * Does not require a large site. * Is independent of soil quality. * Provides s ecure power supply in the event of earth quakes or floods. * Eco friendly, doesn’t produce any harmful gases. [pic] DISADVANTAGES:- * FPP has end user power demand and supply cannot be synchronized. * Access to the installation is critical and infrastructure is costly. CONCLUSION: There are several positive environmental impacts from the construction of Poseidon.The energy production from a 230 meter Poseidon power plant will reduce the annual emission from a traditional fossil fuel power generation by: †¢ 145 tons of sulphur dioxide †¢ 120 tons of nitric oxides †¢ 35,000 tons of carbon dioxide †¢ 2,600 tons of slag and fly ash Poseidon utilizes and absorbs the inherent energy from the waves, thereby reducing the height of the waves significantly and creating calm waters behind the front of the plant. REFERENCES http://www. floatingpowerplant. com/ http://www. wallermarine. com/ http://www. lorc. dk/Home http://www. google. co. in/ http://en. wikipedia. or g/wiki/Wiki

Wednesday, October 23, 2019

Living in a multicultural society takes time Essay

‘Living in a multicultural society takes time.’ To what extend is this illustrated by the challenge of multicultural societies in the UK? (40) A multicultural society is the status of several different ethnic, racial, religious or cultural groups coexisting in harmony in the same society. From the early 19th century people have immigrated to England, developing its diversity. During World War 2 polish and Jewish people immigrated to the UK to escape fascism. Also as the UK is part of the European Union, free and fair movement between the 28 member states means that there are no limits on immigration between these countries. This has seen it compulsory for the UK to adapt and change in order to accommodate for these individuals. For different ethnic minorities to coexist in harmony time is imperative, groups of different people will never coexist harmoniously over night. This is evidenced by holiday and school timetables being altered for ethnic minority groups, opportuni ties for people to learn English for free and websites being available in other languages. The vast majority of immigrants to the UK have settled in the industrial cities and towns as there is a demand for workers. Consequently, councils then have to work to help integrate these ethnic minorities into the communities, limiting tensions that may occur as a result of groups of people lacking understanding of each other. For example, Birmingham city council has created a festival to promote and express culture within Birmingham. Using twitter and other social media they have emphasised ‘your postracial is a myth #itooambirmingham’ this is the idea that no matter what ethnic group you originate from are equal and almost labelling Birmingham as an ethnic group with no specific image. This integrates ethnic minorities in to society and creates a sense of community by almost blurring the lines between people differences. The process of integration takes time, therefore supporting the statement. However, some council’s are better than others at creating a sense of community and educating their population about different cultures; moreover councils are not literally able to force peo ple to be accepting of change. This issue can create racial tensions. In 2005 Riots started in Birmingham initially due to the alleged rape of a Jamaican girl. Violence erupted between gangs of Black and Asians; Isiah Young-Sam was stabbed and later died as a result. Even though Birmingham council have worked to create a sense of community between ethnic minorities, it did not stop gangs fighting for revenge. This  may suggest that council’s efforts are rendered ineffective and ethnic groups in society will never coexist harmoniously, because these groups still see themselves as different and don’t completely understand each other which consequently cause tensions. This racial violence can then cause other ethnic groups to resent the groups that were involved because they are seen as unpleasant trouble makers causing more of a divide. Furthermore, political parties like UKIP and the BNP feed off this negative image created and demonstrate intolerance towards others. In times of crisis people may lo ok to more extreme parties and favour them as they believe government is ineffective. Another issue that the UK faces due to the development of multicultural societies is in education. Holiday patterns, school meals and school timetable may need to be altered for ethnic minorities groups. Religious holidays may demand time off school, the English school holiday is based on the Christian calendar, but people of different religions such as Islam celebrate at different times. For example schools in Tower Hamlet are now allowed two days off to celebrate Eid. School meals have to be altered for Muslims as they can only eat Halah meat and no pork so an alternative needs to be given. Furthermore, prayers occur on Friday afternoons, in Oxford Spire Academy in Oxfordshire pupils are allowed to travel to the mosque on Cowley road during lunch to attend prayers, if they are too young to travel alone there is a prayer room located onsite. The school adapting to changes in requirements shows they are accepting of a multicultural society, it has taken time to cater for these differing ethnic minorities. On the other hand, faith schools have developed in some areas to teach children according to a particular religion. Faith schools make up around a third of the education system. This limits choice for parents who do not want a religious education for their children, or do not share the faith of their local school. For example, in hackney Lubavitch Senior Girls’ School is a strictly orthodox, small secondary school for girls only. Liberal secularists argue that faith schools have no place in a growing diverse population as they promote segregation. Children should be educated around others from all religions and cultures as it is a truer representation of society. Moreover, enclaves of ethnic minorities are likely to locate near a school of their own faith this demotes integration and interaction within the community, resulting in a lack of understanding of others which consequently can cause racial tensions. Conservative people would argue that parents should have the right to bring a child according to religion and they should be able to continue to practise the religion at school. Faith schools demote integration with others who do not share the same beliefs; this is evidence to show that as long as there is faith schools in the UK ethnic minorities will never coexist in harmony. In the 1970’s and 80’s ethnic minorities were subject to racial discrimination in the workplace. Racial discrimination is still present today but it is declining slowly, Of the Civil Service employees in March 2014 who declared their ethnicity, 10.1% were from an ethnic minority, an increase of 0.5 percentage points on March 2013. 7.5% of these people are of senior civil service. This suggests that the UK has changed and become more accepting of other ethnic minorities, giving them access to promotions and roles with more power. Some people would argue work places reflect society and there is still more work to do to protect ethnic minorities’ from discrimination and enable them to progress in their jobs. This slow change in decreasing racial discrimination has taken time and will continue to need help to completely abolish racial discrimination. Although, there are still incidents of worker exploitation and discrimination in the UK. A poultry farmer had to pay over  £5,000 in compensation to a Polish worker who also won a case of racial discrimination. The worker, who had not been paid the same as his British co-workers, was unreasonably criticised over his work and was not allowed to attend English classes. The Polish Embassy stated that number of Polish workers in Britain was between 500,000-600,000. The amount of polish migrants who have settled in the UK increased after Poland joined the European Union, as the minimum wage in Poland is half of the UK meaning workers are prepared to work for less and longer than a native British worker. This is appealing to an employer’s as low skilled jobs become cheap labour as the migrants are prepared to work for less, some companies then take advantage of this and there have been examples were breaks are not given or employees are being paid less than the minimum wage. This suggests that immigrants can be vulnerable and some don’t even realise that how they are being treated is wrong. It could be argued that ethnic groups will never live harmoniously as there will always be a way to exploit immigrants. On the other hand, if all immigrants were educated of their rights it would  make it a lot harder for employer’s to take advantage of them as the person would know right from wrong. Some UK-born people may completely disagree with the statement. This is because some unemployed may feel that the immigrants are ‘taking their jobs’ as they are prepared to work for less than them and an employer favours this and not investing in our country as they may be sending money back to their families. However others may argue that they are just benefit tourists and they have only come to live off the state as the welfare system in their country is not as generous. In times of crisis (housing, economic) anti-immigration parties feed of the negative image painted for immigrants and the people which have these crisis’s hit them the hardest may decide to support them. Parties like UKIP and the English Defence league promote intolerance towards others this can influence people to stop trying to accept other ethnic minorities. In conclusion, I think there are many challenges of multicultural societies in the UK and some are easier to overcome than others. I strongly believe that living in a multicultural society harmoniously does and will still take time. People need time to accept change and some people will never accept it but as time goes on generations are taught to be tolerant of others. Councils holding events to educate everyone about the different religions, cultures and ethnicity can bring a sense of community and help ethnic groups understand each other. However, I feel as if there will always be obstacles such as faith schools and scapegoating different groups of people but it is the attitudes of society towards these obstacles that will allow for everyone to coexist harmoniously.