Friday, May 31, 2019

The Charge of the Light Brigade and Dulce et Decorum Est Essays

The Charge of the Light Brigade and Dulce et Decorum EstAlfred Tennyson and Wilfred Owen present different ideas active struggle intheir poems, The Charge of the Light Brigade and Dulce et DecorumEst. Write ab place these poems and their effect on you.The first poem, The Charge of the Light Brigade by Alfred Tennysonwas based on a newspaper hold he read in the Times Newspaper onNovember 14th, 1854. The article was about the Battle of balaclava helmet inthe Crimean War. It described how the soldiers were wounded andkilled because one man in their cavalry had make a mistake. Itoutlined how the plain was strewn with their bodies and steeds roderider less across the plain. This article was the inspiration forhis poem.The second poem Dulce et Decorum Est was more vividly written,because its poem, Wilfred Owen, was an actual soldier in the firstWorld War, which lasted from 1914-1918. He was too young to function asoldier, so he lied about his age and went away to fight. He wasunder the impression that War was dignified and sweet because of allthe propaganda that was target about to encourage young men to join thearmy. He then realised that War wasnt as glorified as he had conceptionand wrote poems to deter other young men, who, like himself, thoughtit was brave and courageous to die for their country.The poem The Charge of the Light Brigade, tells the story of how oneman in their cavalry, The Commander, made a huge mistake by chargingthem towards the Russian Army. This is depicted when the poet saysInto the valley of death. This implies that the army on the otherside of the valley were so commodious the cavalry didnt have any hope ofbeating them. Ironically, they won the battle. In ... ...nditions of Warwere and the terrible ways that the soldiers lost their lives. My favourite poem out of the two was Dulce et Decorum Est, it distinctly depicts what happened during World War I and Owen then sayswhat he feels. At the start of the poem, I was shocked by how bad theconditions of War actually were. The vivid descriptions show howstrongly Owen felt about discouraging other young men not to fall forthe same propaganda that he did. It made me realise how lucky I amnot to be living in those terrible conditions that he had to endure. I think that the poem does fulfil its adjudicate of discouraging men fromjoining the army because it is so graphic and vivid. It explains thetrue atrocities that War brings and how terribly they can affectlives, even after the War has ended. Owen clearly doesnt want theyoung men to experience what he has.

Thursday, May 30, 2019

The Importance of the Wallpaper in The Yellow Wallpaper by Charlotte Pe

The Importance of the Wallpaper in The Yellow Wallpaper The Yellow Wallpaper takes a close look at one womans kind deterioration. The cashier is emotionally isolate from her husband. Due to the lack of interaction with other people the woman befriends the reader by secretively communicating her story in a diary format. Her attitude towards the wallpaper is openly hostile at the beginning, but ends with an intimate and liberating connection. During the gradual change in the relationship between the narrator and the wallpaper, the yellow paper becomes a mirror, reflecting the process the woman is going through in her room. When the narrator first sees the paper she is repulsed by the shade and the pattern. It is some issue she hates and yet she deposenot foreshorten it. The repellent and repulsive paper soon becomes the topic of her journal entries. The first personification of the wallpaper is when she notices where the pattern lolls like a broken neck and dickens bulbous eye s stare at you upside down...I never saw so much expression in an inanimate thing before. This indicates that, just as John and Jennie watch her, the paper appears to be watching her too. She speaks of the paper as another presence in the room. The reader can see that the paper is starting to become more fascinating to her than the outside world when her attention to the view of the countryside abruptly switches back to the wallpaper. As she becomes more isolated in the room her thoughts are filled with the design of the paper almost as if she is studying it. I know a little of the principle of design, and I know this thing was not arranged on any laws of radiation, or alternation, or repetition, or symmetry, or anything else that I ev... ... Kennedy and Dana Gioia. 6th ed. New York Harper Collins, 1995. 424-36. Hume, Beverly A. Gilmans Interminable Grotesque The Narrator of The Yellow Wallpaper. Studies in Short Fiction 28.4 (1991)477-84. Johnson, Greg. Gilmans Gothic Allegory R age and Redemption in The Yellow Wallpaper. Studies in Short Fiction 26.4 (1989)521-30. King, Jeannette and Pam Morris. On Not Reading between the Lines Models of Reading in The Yellow Wallpaper. Studies in Short Fiction 26.1 (1989) 23-32. Owens, E. Suzanne. The Ghostly Double layabout the Wallpaper in Charlotte Perkins Gilmans The Yellow Wallpaper. Haunting the House of Fiction. Ed. Lynette Carpenter and Wendy K. Kolmar. Knoxville U of Tennessee P, 1991 64-79. Scharnhorst, Gary. The Yellow Wallpaper. Charlotte Perkins Gilman. Boston Twayne, 1985. 15-20.

Wednesday, May 29, 2019

Song Analysis of Hands Down by Dashboard Confessional Essay -- Music

transfer downcast By Dashboard ConfessionalSong AnalysisEveryone has that one song they can listen to over and over again. in that location are various reasons people press the repeat button, whether it be the sound of the singers voice, the quality of their musicianship, or their heartfelt lyrics and the story they tell. The song Hands deal, by Dashboard Confessional tells the story of a day-in-the-life of lead singer, Chris Carrabba, in high school. Carrabba has said that this song is about the best day he has ever so had, and introduces it as such at concerts. Dashboard Confessional effectively uses paradox, irony, imagery, and repetition, to enable the listener to create a visual and experience emotions felt by the writer. Hands Down is an acoustic and emotional song about a teenage boy who has fallen in love with a girl. The setting that is established is a series of events on a significant and passionate night in their relationship. Hands Down, was written to express the feelings and hopes the boy has for their relationship. The song is speaking to the girl he is in love with, and to anyone and everyone who has felt the way he feels in this stage of a relationship. Dashboard Confessional uses the literary device of paradox multiple times passim the song. Paradoxes seem to contradict themselves, which makes its use so effective when writing about the feelings of a teenage relationship. This night is wild, so calm and dull.These hearts, they race from self-controlThis line, from the start-off of the song, relates to the anxious and nervous feelings both the boy and girl were feeling. It is describing the anticipation the couple was experiencing about the events to come. A nonher example of paradox that... ...The repetition used clearly shows the unassumingness and meaningfulness of the girls kiss. The boy knew that she was sincere in her actions and wasnt just doing it because it was expected. On the contrary, the night was very special and mean t something to her and she expressed her feelings through a kiss. Here, both the boy and the listener realize that she sincerely loves him. Thus, the story is comes to an end, the boy gets what he sought out from the beginning a real kiss. In conclusion, Hands Down, explains the expectations of our generation and how we, as teenagers react to them. Dashboard Confessional has exceptional talent when it comes to writing relatable lyrics and engaging their fans. This song is a rare example of a boy who is not focused just on getting some, rather he has his sights set on getting the girls heart before he gets into her pants.

David Livingstone :: History

David LivingstoneDavid Livingstone was one of Africas most important explorer. He lived from 1813 to 1873. He was sooner a Scotch doctor and missionary. Livingstone was born on March 19, 1813, in Blantyre, Scotland. In 1823 he began to work in a cotton-textile factory. While studying euphony in Glasgow, he also attended classes in theology, and in 1838 he offered his services to the London Missionary Society. After completing hid medical course in 1840, Livingstone was later sent as a medical missionary to South Africa. In 1841 he reached Kuruman, a settlement founded in Bechuanaland, now Botswana, by the Scottish missionary Robert Moffat. Even though the Boers, the white settler, mostly of white background were extremely hostile to him, Livingstone kept trying to make his way northward. He espouse Mary Moffat, daughter of Robert, in 1845. Together, the Livingstones traveled into regions where no other European had ever been to. After crossing the Kalahari Desert in 1849, he disc overed Lake Ngami. In 1851, accompanied by his wife and children, he discovered the Zambezi River. On another expedition while looking for a route to the interior from the east or west coast, he traveled north from Cape Town to the Zambezi, and then west to Luanda on the Atlantic coast. Then, retracing his journey to the Zambezi, Livingstone followed the river to its mouth in the Indian Ocean, in this way discovering the great Victoria Falls in Zambezi. After Livingstones explorations, a revision of all the contemporary maps took place. He returned in 1856 to Great Britainm, where he was already acknowledged as a great explorer. He wrote a book called Missionary Travels and Researches in South Africa which made him famous. He resigned from the missionary society, and in 1858 the British government appointed him British consul at Quelimane, what is now in Mozambique, for the east coast of Africa and commander of an expedition to explore east and central Africa. In 1859 he explored th e Rovuma River and discovered Lake Chilwa. During his exploration of the country around Lake Nyasa, Livingstone became greatly concerned over the depredations on the indigenous Africans by Arab and Portuguese slave traders. In 1865, on a visit to England, he wrote Narrative of an Expedition to the Zambezi and Its Tributaries, including a condemnation of slave traders and an exposition of the commercial possibilities of the region, now mostly part of Malawi and Mozambique.

Tuesday, May 28, 2019

The Impact of Gender on Shakespeares Othello Essay -- Literary Analy

The Impact of Gender on Shakespeares OthelloIn the book Gender Trouble (1990), feminist theorist Judith Butler explains sexuality is not only a social construct, but also a kind of performance such as a show we put on, a costume or disguise we wear (Butler). In other words, sexual urge is a performance, an act, and costumes, not the main aspect of essential identity. By understanding this surmise of gender as an act, performance, we can see how gender has greatly impacted the outcome of the map in William Shakespeares Othello. From a careful analysis of the story, calamity in Othello is result of violating expected gender roles, gender performance by Desdemona and Othello, and the result of Iagos inability to tolerate these violations.The tragedy Othello is written by William Shakespeare in 1604. The story is based on revenge of two characters, Othello and Iago. Othello, the plays protagonist and hero, who has great reputation as one of Venices most fitted generals. However, hi s jealousy causes the major tragedy in his life. This tragedy is brought by a simple manipulation of Iago, the villain of the play. The jealousy led Othello to a path of never-ending questioning to his wife, and his friend Cassio. Throughout the play, he sinks deeper and deeper into his doubt and eventually that causes him to kill not only the love of his life, but also himself. In her work, This that you call write out Sexual and Social Tragedy in Othello, Gayle Greene (2004) argues that the tragedy occurs from adherence to patriarchal rules and stereotypes (Greene 655-659). According to Gary Greene, the tragedy is caused by mens misunderstandings of women and womens inability to cling to themselves from societys conception of them (666). In the ... ...major tragic downfall of the play.In the end, we can conclude that Shakespeare used a very conservative world work out in his play, Othello. Using the characters of Othello, Desdemona, and Iago, Shakespeare reinforced the ster eotypes of his time. In conclusion, gender expectations have greatly impacted the outcome of Shakespeares play, Othello, because the script of the play has reinforced the stereotypes such as girls who resist their fathers die, women who marry different race, class, and cultures die, and women who decide their own destiny die at the end. Through Othello, Shakespeare portrays women in a patriarchal system, and the result of the play is the consequences of gender disruptions. Therefore, there is no doubt that the gender expectations placed on both male and female characters have greatly impacted the outcome of Shakespeares play Othello.

The Impact of Gender on Shakespeares Othello Essay -- Literary Analy

The Impact of Gender on Shakespeares OthelloIn the book Gender Trouble (1990), feminist theorist Judith Butler explains gender is not only a social construct, but also a kind of performance such as a show we put on, a costume or disguise we wear (Butler). In other words, gender is a performance, an act, and costumes, not the main aspect of inbred identity. By understanding this theory of gender as an act, performance, we can see how gender has greatly force the outcome of the exercise in William Shakespeares Othello. From a careful analysis of the story, catastrophe in Othello is result of violating expected gender roles, gender performance by Desdemona and Othello, and the result of Iagos inability to tolerate these violations.The tragedy Othello is written by William Shakespeare in 1604. The story is based on revenge of two characters, Othello and Iago. Othello, the plays protagonist and hero, who has great reputation as whiz of Venices most competent generals. However, his jealousy causes the major tragedy in his life. This tragedy is brought by a simple manipulation of Iago, the villain of the play. The jealousy direct Othello to a path of constant questioning to his wife, and his friend Cassio. Throughout the play, he sinks deeper and deeper into his doubt and eventually that causes him to kill not only the love of his life, but also himself. In her work, This that you call Love Sexual and Social Tragedy in Othello, Gayle Greene (2004) argues that the tragedy occurs from adherence to senile rules and stereotypes (Greene 655-659). According to Gary Greene, the tragedy is caused by mens misunderstandings of women and womens inability to protect themselves from societys conception of them (666). In the ... ...major tragic downfall of the play.In the end, we can conclude that Shakespeare used a truly conservative world view in his play, Othello. Using the characters of Othello, Desdemona, and Iago, Shakespeare reinforced the stereotypes of his tim e. In conclusion, gender expectations have greatly impacted the outcome of Shakespeares play, Othello, because the script of the play has reinforced the stereotypes such as girls who resist their fathers die, women who marry different race, class, and cultures die, and women who decide their own destiny die at the end. Through Othello, Shakespeare portrays women in a patriarchal system, and the result of the play is the consequences of gender disruptions. Therefore, there is no doubt that the gender expectations placed on both male and female characters have greatly impacted the outcome of Shakespeares play Othello.

Monday, May 27, 2019

Critical Thinker Essay

Gandhi When you hear the name Mahatma Gandhi, whats the send-off thing you think of? The terms nonviolence, civil disobedience, and mahatma (meaning great soul) are what nigh people will likely think hearing his name. From being raised as a child in India, to attending law school in England, to his countless movements for Indian freedom, to his tragic assassination, Gandhi and his critical thinking have helped pave the way for others who have brought interpolate to our world. Born October 2, 1869 in the sm totally state of Porbandar, turn up in the western part of India, Gandhi means grocer.The name came from generations earlier in which that had been his familys occupation. He attended school where as a child he tended to run home from school for fear of being of being made of fun of because he had difficulty with multiplication. Another interesting fact about Gandhi is that he was married at age thirteen, as it was arranged and quite common in India. Gandhis first true insight into nonviolence came when he stole bullion from his brother. He felt guilty for doing so and eventually confessed to his father, who instead of being mad at him, wept. Information above from http//www. progress. org/gandhi/gandhi01. htm) This is where his journey to the great accomplishments he would apply later in his life began. Gandhi would go on to attend law school in London and eventually return home. He had only receive with enough information to know English laws, not Indian/Hindu laws. He was given an opportunity by a large Indian plastered where he was to travel to South Africa to assist in a legal case in court. He told his family goodbye as he went forth to return his luck in South Africa.Not only did he have luck he would end up discovering himself, his school of thought, and his following from this expenditure. (http//www. progress. org/gandhi/gandhi02. htm) While on a check out ride, a white passenger had protested to the dischargeicials and Gandhi was ordere d to a lower class region. When he refused to move because he had a first class ticket, he was kicked off the train. Sitting alone in the cold that that evening, he realized he had two choices press for his rights or go back to India. He chose to fight for his rights and the rights for all people.After a difficult first week, he decided to gather the local Indians to discuss their horrible conditions. As more meetings were held, Gandhi soon knew the problems they experienced (couldnt vote, own homes, go out without permit, or even walk on public roads). (Information from http//www. progress. org/gandhi/gandhi03. htm) In Gandhis attempt to bring equality to the Indian people, he was a strong believer in nonviolence. One time, while protesting peacefully outside a building for the Black Act, Gandhi was arrested.Read Critical Essay about Skurzynskis NethergraveThis would be his first of a few different times he spent in jail. One of Gandhis most known nonviolent/civil disobedience pr otests would be the salinity march. They traveled 200 miles to the sea to extract salt from it as a way of fighting back against the British Salt Tax. As they picked up the salt, some(a) were arrested. And this lead to more nonviolent protests that caused British shops and mills to close. In a march following the salt march, policemen became violent against Gandhis followers, who in return did not fight back.The world took notice of this and embraced the nonviolence shown. This would eventually enable India to gain their freedom from Britain. Unfortunately, Gandhi was assassinated one late afternoon during a group prayer. (Information from http//www. progress. org/gandhi/gandhi14. htm) Even with his assassination, his philosophy of nonviolence/civil disobedience still lives on. Civil disobedience, nonviolence, and truth are pillars in Gandhian thought that would be used by others who wished to seek change for people (above information from http//www. ahatma. com/php/showNews. php? n ewsid=52linkid=1). Martin Luther King Jr. would adopt Gandhis philosophy and use it in his fight against discrimination of African Americans in the United States. Gandhi came from a humble beginning and was able to make a difference that not only helped free his people, but would be the sparks for another mans romance have all people be equal and free. References http//www. progress. org/gandhi/gandhi01. htm (part 1, part 2, part 3, part 14) http//www. mahatma. com/php/showNews. php? newsid=52&linkid=10

Sunday, May 26, 2019

Sex and Gender in Twelfth Night

Sex and Desire The nexus of sexuality, desire and sexuality have long been a extension of considerable interest, exactly no more so than in the plays of William Shakespeare. Specifically, in their original production and for some time afterwardswards, common practice dictated true eccentrics for women and men. Analysis of these roles yields interesting insights regarding the value of women and how the relative devaluing of women shaped sexual desire and normal gender roles. In this paper, I will attempt to illuminate several(prenominal) features of Shakespeares Twelfth wickedness that have bearing on humilitary personnel desire.Before identifying significant features of Shakespeares plays in general and Twelfth Night in bad-tempered that have bearing on the question of gender roles and the shaping of desire, it will important to remind ourselves about the cultural limitations for women of sixteenth century England. Callaghan reminds us that cleaning lady had no public life. Ev en in the home, they could rarely manifest characteristics that are not consistent with the virtues obedience, silence, sexual chastity, piety, humility, constancy, and patience. Those virtues taught women to not think for their selves, to not be agents in their world.In fact, educationalists in this time said that women were too cognitively limited to get a full education and too likely to be led by their own emotions than to think rationally. Tears were called womens weapons, yet, in the right situation, it was perfectly acceptable for men to cry. However, it is interesting to note that in a lot of Shakespeares plays explore mens insecurities about women. It shows that men fear lo gabble control. In most of the heroines of his comedies, art object they might have turned to their feminine roles in the end, they achieved a type of empowerment.In general it seems clear that womens roles were severely limited inside and outside the home. How is this domestication of women revealed in Shakespearian theatre? In the Twelfth Night? First, what is the significance of Shakespearian practice of allowing men to play the roles of women? In her criticism, Callaghan argues that Shakespeare is mocking women in Twelfth Night. She argues that Shakespeare specifically inserted a transvestite role to show that no matter what women do, they will eventually submit to a man. However, in my view, Shakespeare had no(prenominal) of this in mind when he placed that role in his play.He uses plot of gender confusion to cause chaos for his characters through love triangles, homosexuality, and role switching. Second, how are we to understand Shakespeares plot twists that problematize gender roles? For examples, genus Viola washes up in Illyria after a ship wreck that she thinks took her brothers life. She discovers Orsino is the authority in the land. After this discovery, she says to the captain Conceal me what I am, and be my aid. For such disguise as haply shall become the form of my intent. Ill serve this duke. Thou shalt present me as an eunuch to him.It may be worth thy pains, for I can sing and speak to him in many sorts of music (1. 2, 51-56) She is saying that she wants the captain to help her pass as a man. However, she knows that she cannot fully pass as a man so she must at least pass as a eunuch. This sets off a series of events that throws the characters into multiple love triangles and gender switching. For a while Orsino has been wooing Olivia by sending her notes, tokens, and sonnets. His subjects see him as flighty, soft, and slightly feminine. However, it seems like Curio is trying to turn it into a manly game by referring to it as a hunt (1. , 16). This is relevant because usually the theatrics are reserved for the women and their women weapons. Some time after this, when Viola has been introduced as Cesario, Orsino sends him (her) to, yet again, try to woo Olivia. However, none of them saw Olivia falling in love with Violas masculine charact er. Olivia experiences a gender switch when she steps into the usually masculine role of suer in attempt to win Cesarios heart. Perhaps the biggest thing that would have upset a traditional structure is the fact that Olivia might actually be in love with a women.Of course, Shakespeare tries to make an excuse for this by having Olivia ignorant to Viola/Cesarios real gender. However, in Olivias first encounter with Viola/Cesario she remarks upon the typical feminine qualities. In Act three, scene one Olivia says O, what a deal of scorn looks beautiful in the contempt and anger of his lip A murderous guilt shows not itself more soon than love that would seem hid. Loves night is noon- These words allow the audience to suspect but not assume that she knows of Violas true gender but chooses to love her anyway.In fact, her talk of guilt has the audience questioning whether or not she is whimsey guilty of her homosexual feelings for another woman. Even though Shakespeare does not openly e xpress the plot as a homosexual scenario, there is much cause to back up that it is the case. For example, Olivia says I woo when addressing Viola as Cesario. The way she speaks to Cesario mimics the contemporary traditions perfectly. The audience may see a man dressed as a girl that is pretending to be a man as Shakespeare mocking woman However, this is not so.The fact that Viola can successfully lure off the switch is tribute to that. It cant be simple to pretend to be a man, even one that is a eunuch. It shows that she is a tender female character. All of these examples show that the play is full of strong female characters who are able to successfully switch roles. Even though Olivias role is switched back with the appearance of Violas twin brother, Sebastian, she is still left with a feeling of empowerment by the experience. Shakespeare never really solves any of these issues. Rather, he lets them open and ends the play with humor, rather than confusion. Mistal

Saturday, May 25, 2019

Investigating the changing effects of temperature

Investigating the effects of changing temperature on the activity of enzymes Background information Renin is an enzyme that catalyses the coagulation of draw. It is imbed in the stomach of many animals and is used in making cheeses and Junkets. It is found in the gastric ju internal-combustion engines or gastric mucosa of many mammals, including human beings. In the human stomach, particularly those of infants, chymosin die hards to curdle draw so that pepsin, a nonher stomach enzyme, can except breakdown the proteins into absorbable amino acids called polypeptides.The aim of this look into is to investigate the effect of changing temperature on the activity of enzymes. After experiment the optimum temperature for enzyme activity will be established and the effects of varing temperature will be identified. Several experiments have already been conducted interrogatorying similar hypothesis and aims. All of these experiments to a fault had very similar results. They found that approximately 370C was the optimal temperature for rennin it was at this temperature that the milk solidified quickest.Below that the reaction would occur far much slowly, sometime taking hours to complete, sometimes not reacting at all. Above 370C, at approximately 450C, the enzyme would get going enatured and the reaction would never occur, even after the temperature was lowered back down to 370C. 1 Aim To investigate the reaction rate of the enzyme rennin at divers(a) temperatures Hypothesis It is predicted that a rise in temperature (to approximately 400C) will increase enzyme activity.Wth further increase of temperature the protein enzymes will denature, lose their shape and therefore decrease in activity. Risk assessment Risk Precaution Burns from the heated up water bath or hot plate Ensure that all hot baths argon set up in a visible area that is surrounded by minimal movement. If burns occur run affected area downstairs dust-covered water for 5-10 minutes depending on severity. Major burns should seek medical assistance Glass breakage can cause cuts/wounds Use canvas tube rack to steady canvass tubes.If glass breakage occurs immediately alert teacher, sweep up broken glass using a drag or dust pan and dispose of it in the appropriate bin Apparatus Equipment Rationale 1 hot plate Heats water in hot bath for raising temperatures of milk and rennin above 300C 1 hot bath holds water which is heated by not plate 1 ice bath (500mL beaker + 6-7 ice cubes) Cools milk and rennin for testing temperatures below 300C regular test tubes Holds the 20mLs of milk required for each run 3 micro test tubes Holds the small number of rennin required 1 test tube rack Holds regular sized test tubes in place so intervention does not influence reaction 20mL of milk Acts as substrate 2mL of rennin response Acts as enzyme for milk 1 large pipette Gives precise measurment of milk 1 syringe Gives precise measurement of rennin 2 thermometers beatniks temperature of milk and rennin when they are heated or cooled 1 timer Measures time interpreted for milk to set Method Constant Variables Factor Importance Method of control Volume of milk The amount of milk determines the amount of substrate the enzyme has to work on which therefore effects the reaction rate. Keeping a constant amount of milk for each streak. Use Pipette Volume of rennin The amount of enzymes determines the amount of chemical reactions possible to occur. Keeping a constant amount of enzymes for each trial- Iml per all(prenominal) 10ml of substrate. Use a syringe Rennin and milk brought to the alike testing temperature Temperatures must be constant for both substances to ensure accuracy when they are mixed.Place each substance in a hot or cold water bath with thermometers in their test tubes. Remove from water bath when the identical temperature has been reached Same time recorder Timing must be accurate. With the same person reaction rate to press go and stop would be simi lar for each trial. Have the same time recorder for every trial possible Same setting standard A setting standard must be determined to make timing of reaction rate accurate. grow a class decision on what is classified as set Standerdized thermometers To ensure accurate temperature readings Ensure all thermometers are standardized before experimentation Type of milk- from the same container Different types of milk whitethorn influence enzyme activityUse the same milk for each trial Type of Junket- from the same container Different types of rennin may influence enzyme activity Use the same rennin for each trial Whether the solutions should be stirred or not A stirred or jolted solution may speed up reaction rate because more enzyme collisions would occur and faster Make a class decision on whether to charge/stir mixture or keep it still 1 . Measure 20mls of milk using the pippette and release it into a regular test tube 2. Measure 2mls of rennin using the syringe and release it int o a micro test tube 3. Place thermometers in both test tubes ensuring that the rennin does not torrent 4. Fill a 500ml beaker with 250ml of water and 6-7 ice cubes 5. Place both test tubes in the ice bath 6.Watch both thermometers until they reach OOC 7. Pour the rennin solution into the test tube of milk. Begin timing as soon as all the rennin is poured into the milk 8. Shake the test tube slighlty to mix the rennin and milk together 9. Stop the timer once precipitate has formed or the milk has completely solidified 10. Repeat steps 1-9 using respective(a) other temperatures Note use a hot plate and hot water bath when testing temperatures above 300C Results Temperature ( C) Average time taken for milk to set (min) No reaction did not set 10 5min + 20 442 437 1. 29 50 1. 48 70 Discussion When temperatures were either very low or very high enzyme activity did not occur or was minimal.This is because cooler temperatures decrease the amount of energizing energy within the enzyme mo lecules. If there is not a substantial amount of kinetic energy, enzyme molecules are unable to collide with their substrate which therefore prevents reaction from occurring. Because enzymes are proteins when temperatures were too high the enzymes denatured, lost their structure and shape, making their active sites no longer complementary to their substrates. At temperatures around 40-50C enzyme activity rapidly increased and the milk set under two minutes. This temperature range is therefore the optimum temperature for enzyme activity because enzymes obtain substantial amounts of kinetic energy and do not become denatured.Accuracy was not constant throughout the experiment as small amounts of rennin were lost everytime a thermometer was placed in the micro test tube. Some milk was also lost when the rennin was added to it and the test tube was shaken. This may have affected the reaction rate of the enzymes. It was very difficult to calculate the exact temperature t which the enzyme and substrate were mixed because their temperatures dropped or rose rapidly when they were removed from the hot or cold baths. This further affected the accuracy of the experiment as temperatures tested were not exact. Repeated trials of the same temperature all had similar results which made the averages precise.There were no outliers so averages were not too high or too low. If an outlier occurred during experimentation because of known reasons the trial was tested again. Each temperature was tested three times making the experiment reasonably reliable however different groups tested each temperature which may ave affected the reaction times recorded because of different perceptions about setting points and the speed of the persons timing. The limitations of this experiment were therefore caused by human error To prevent errors during experimentation more caution should have been taken when mixing and shaking substances, recording the reaction rate, interpretation of setting time and the handling of test tubes.When shaking and handling the test tubes a stopper should have been used to prevent loss of mixture and exposure of heat from the persons hands. Timing should have been conducted by the same person for every trial however this would ave taken far too long. Interpretation of setting time should have been clearly explained or demonstrated before conducting the experiment. The results of this experiment tally closely to research undertaken about the effects of changing temperature on enzymes. This therefore made the practical more valid and reliable. Most constant variables were followed and monitored precisely which further added to the fairness of experimentation.A few constant variables that may have been affected by human error were the temperatures at which the substances were brought to, the volume of rennin and the perceptions of the milks setting point, lthough the same instruction manual were given to all students . Conclusion Enzyme activity therfore increases as temperatures increase to their optimum temperature (37-450C). Once temperatures exceed the optimum temperature the enzymes denature (lose their shape) and become inactive.

Friday, May 24, 2019

Part of Speech Recognizer

Improving Identi?er Informativeness using Part of Speech Information Dave Binkley Matthew Hearn Dawn Lawrie Loyola University Maryland Baltimore MD 21210-2699, regular army binkley, lawriecs. loyola. edu, emailprotected edu Keywords stemma code analysis tools, natural words affect, program comprehension, identi?er analysis Abstract Recent software development tools have exploited the minelaying of natural language information frame within software and its supporting documentation. To make the most of this information, researchers have drawn upon the work of the natural language processing community for tools and techniques.One such tool provides part-of-speech information, which ?nds application in improving the searching of software repositories and extracting domain information found in identi?ers. Unfortunately, the natural language found is software differs from that found in standard prose. This difference potenti entirelyy limits the effectiveness of off-the-shelf tools. T he breaked empirical investigation ?nds that this limitation can be partially overcome, resulting in a tagger that is up to 88% accurate when applied to source code identi?ers.The investigation then uses the improved part-of-speech information to tag a large school principal of over 145,000 ?eld name calling. From patterns in the tags several rules emerge that seek to improve structure-?eld naming. Source Part of Extract Split Apply Source ? ordinance ? compass ? Field ? ? Speech pathfinder Code Mark-up Tagging Names Names Figure 1. Process for POS tagging of ?eld name. The text available in source-code artifacts, in situation a programs identi?ers, has a very different structure. For casing the words of an identi?er rarely form a grammatically correct sentence.This raises an interest question can an existing POS tagger be made to work well on the natural language found in source code? interrupt POS information would aid existing techniques that have use limited POS informa tion to success fully improve retrieval results from software repositories 1, 11 and have also investigated the comprehensibility of source code identi?ers 4, 6. Fortunately, machine learning techniques are robust and, as reported in Section 2, good results are obtained using several sentence forming scouts.This initial investigation also suggest rules speci?c for software that would improve tagging. For face the fictional character of a declared variable can be factored into its tags. As an example application of POS tagging for source code, the tagger is then used to tag over 145,000 structure?eld name calling. Equivalence classes of tags are then exa tap to produce rules for the automatic identi?cation of poor names (as described in Section 3) and suggest improved names, which is left to future work. 1 IntroductionSoftware engineering can bene?t from leveraging tools and techniques of other disciplines. Traditionally, natural language processing (natural language processing) t ools solve problems by processing the natural language found in documents such as news articles and web pages. One such NLP tool is a partof-speech (POS) tagger. Tagging is, for example, crucial to the Named-Entity Recognition 3, which enables information about a person to be tracked within and across documents. Many POS taggers are construct using machine learning based on newswire training data.Conventional wisdom is that these taggers work well on the newswire and similar artifacts however, their effectiveness degrades as the input moves supercharge away from the highly structured sentences found in traditional newswire articles. 1 2 Part-of-Speech Tagging Before a POS taggers output can be used as input to down stream SE tools, the POS tagger itself needs to be vetted. This particle describes an experiment performed to test the accuracy of POS tagging on ?eld names mine from source code. The process used for mining and tagging the ?elds is ?rst described, followed by the emp irical results from the experiment.Figure 1 shows the pipeline used for the POS tagging of ?eld names. On the left, the input to the pipeline is mode= stead/ (683 came from C++ ?les and 817 from Java ?les). A human accessor (and university student majoring in English) tagged the 1500 ?eld names with POS information producing the seer devise. This oracle set is used to gauge the accuracy of automatic tagging techniques when applied to the test set. Preliminary study of the Stanford tagger indicates that it needed guidance when tagging ?eld names.Following the work of Abebe and T one(a)lla 1, four templates were used to provide this guidance. Each template includes a slot into which the split ?eld name is inserted. Their accuracy is then evaluated using the oracle set. Sentence Template List Item Template Verb Template Noun Template . Please, . is a thing . Figure 2. XML queries for extracting C++ and Java ?elds from srcML. source code. This is then marked up using XML tags by srcML 5 to identify various syntactical categories. Third, ?eld names are extracted from the marked-up source using XPath queries.Figure 2 shows the queries for C++ and Java. The fourth stage splits ?eld names by replacing underscores with spaces and inserting a space where the case changes from lowercase to uppercase. For example, the names spongeBob and sponge bob become sponge bob. After splitting, all characters are shifted to lowercase. This stage also ?lters names so that only those that consist entirely of dictionary words are retained. Filtering uses Debians American (6-2) dictionary package, which consists of the 98,569 words from Kevin Atkinsons SCOWL word lists that have coat 10 through 50 2.This dictionary includes some common abbreviations, which are thus included in the ?nal data set. Future work will head off the need for ?ltering through vocabulary normalization in which non-words are split into their abbreviations and then expanded to their natural language equiv alents 9. The ?fth stage applies a set of templates (described below) to individually separated ?eld name. Each template effectively wraps the words of the ?eld name in an attempt to improve the performance of the POS tagger. Finally, POS tagging is performed by Version 1. 6 of the Stanford Log-linear POS Tagger 12.The default options are used including the pretrained bidirectional model 10. The remainder of this section considers empirical results concerning the effectiveness of the tagging pipeline. A total of 145,163 ?eld names were mined from 10,985 C++ ?les and 9,614 Java ?les found in 171 programs. From this full data set, 1500 names were randomly chosen as a test set 2 The Sentence Template, the simplest of the four, considers the identi?er itself to be a sentence by appending a period to the split ?eld. The List Item Template exploits the tagger having learned about POS information found in the sentence fragments used in lists.The Verb Template tries to encourage the tagge r to treat the ?eld name as a verb or a verb phrase by pre?xing it with Please, since unremarkably a command follows. Finally, the Noun Template tries to encourage the tagger to treat the ?eld as a noun by post?xing it with is a thing as was done by Abebe and Tonella 1. Table 1 shows the accuracy of using each template applied to the test set with the output compared to the oracle. The major diagonal corresponds each technique in isolation while the remaining entries require two techniques to agree and thus lowering the serving.The similarity of the percentages in a chromatography column gives an indication of how similar the set of correctly tagged names is for two techniques. For example, considering Sentence Template, Verb Template has the lowest overlap of the remaining three as indicated by its joint percentage of 71. 7%. Overall, the List Item Template performs the take up, and the Sentence Template and Noun Template produce essentially identical results getting the corre ct tagging on nearly all the same ?elds. Perhaps unsurprising, the Verb Template performs the worst.Nonetheless, it is evoke that this template does produce the correct output on 3. 2% of the ?elds where no other template succeeds. As shown in Table 2 overall at least one template correctly tagged 88% of the test set. This suggests that it may be possible to unite these results, perhaps using machine learning, to produce higher accuracy than achieved using the individual templates. Although 88% is lower than the 97% achieved by natural language taggers on the newswire data, the performance is still quite high considering the lack of context provided by the words of a single structure ?eld.Sentence List Item Verb Noun Sentence 79. 1% 76. 5& 71. 7% 77. 0% List Item 76. 5% 81. 7% 71. 0% 76. 0% Verb 71. 7% 71. 0% 76. 0% 70. 8% Noun 77. 0% 76. 0% 70. 8% 78. 7% this context is used to represent a current province, and is therefore not confusing. order 1 Non-boolean ?eld names should n ever take up a present tense verb * * ? * * Table 1. Each percentage is the percent of correctly tagged ?eld names using both the row and column technique thus the major diagonal represent each technique independently. Correct in all templates Correct in at least one template 68. 9% 88. 0% Table 2.Correctly tagged identi?ers As illustrated in the next section, the identi?cation is suf?ciently accurate for use by downstream consumer applications. 3 Rules for Improving Field Names As an example application of POS tagging for source code, the 145,163 ?eld names of the full data set were tagged using the List Item Template, which showed the best performance in Table 1. The resulting tags were then used to form equivalence classes of ?eld names. Analysis of these classes led to four rules for improving the names of structure ?elds. Rule violations can be automatically identi?ed using POS tagging.Further, as illustrated in the examples, by mining the source code it is possible to suggest potential replacements. The conjecture behind each rule is that high quality ?eld names will provide better conceptual information, which aids an engineer in the occupation of forming a mental understanding of the code. Correct part-of-speech information can help inform the naming of identi?ers, a process that is essential in communicating role to future programmers. Each rule is ?rst informally introduced and then formalized. After each rule, the percentage of ?elds that violate the rule is given.Finally, some rules are followed by a discourse of rule exceptions or related notions. The ?rst rule observes that ?eld names represent objects not actions thus they should avoid present-tense verbs. For example, the ?eld name create mp4, clearly implies an action, which is marvellous the intent (unless perhaps the ?eld represent a function pointer). Inspection of the source code reveals that this ?eld holds the desired mp4 video stream container type. Based on the context of its use , a better, less ambiguous name for this identi?er is created mp4 container type, which includes the past-tense verb created.A no tabularize exception to this is ?elds of type boolean, like, for example, is logged in where the present tense of the verb to be is used. A present tense verb in 3 Violations detected 27,743 (19. 1% of ?eld names) Looking at the violations of Rule 1 one pattern that emerges suggests an improvement to the POS tagger that would better destine it to source code. A pattern that frequently occurs in graphical user interface programming ?nds verbs used as adjectives when describing GUI elements such as buttons. Recognizing such ?elds based on their type should improve tagger accuracy. Consider the ?elds delete button and to a lesser extent continue box.In isolation these appears to represent actions. However they actually represent GUI elements. thus, a special context-sensitive case in the POS tagger would tag such verbs as adjectives. The second rule consid ers ?eld names that contain only a verb. For example the ?eld name recycle. This name communicates little to a programmer unfamiliar with the code. Examination of the source code reveals that this variable is an integer and, based on the comments, it counts the keep down of things recycled. While this meaning can be inferred from the declaration and the comments surrounding it, ?eld name uses often occur far from their eclaration, reducing the value of the declared type and supporting comments. A potential ?x in this case is to change the name to recycled count or things recycled. Both alternatives improve the clarity of the name. Rule 2 Field names should never be only a verb ? ? or ? ? Violations detected 4,661 (3. 2% ?eld names identi?ers) The trinity rule considers ?eld names that contain only an adjective. While adjectives are useful when used with a noun, an adjective alone relies too much on the type of the variable to fully explain its use.For example, consider the identi? er interesting. In this case, the declared type of list provides the insight that this ?eld holds a list of interesting items. Replacing this ?eld with interesting list or interesting items should improve code understanding. Rule 3 Field names should never be only an adjective ? Violations detected 5,487 (3. 8% ?eld names identi?ers) An interesting exception to this rule occurs with data structures where the ?eld name has an established conventional meaning. For example, when naming the next node in a linked list, next is commonly accepted.Other similar common names include previous and current. The ?nal rule deals with ?eld names for booleans. Boolean variables represent a state that is or is not and this notion needs to be obvious in the name. The identi?er deleted offers a good example. By itself there is no way to do it for sure what is being represented. Is this a pointer to a deleted thing? Is it a count of deleted things? Source code inspection reveals that such boolean var iables tend to represent whether or not something is deleted. Thus a potential improved names include is deleted or was deleted.Rule 4 Boolean ?eld names should contain third person forms of the verb to be or the auxiliary verb should * ? is was should * 5 Summary This paper presents the results on an experiment into the accuracy of the Stanford Log-linear POS Tagger applied to ?eld names. The best template, List Item, has an accuracy of 81. 7%. If an optimal combination of the four templates were used the accuracy rises to 88%. These POS tags were then used to develop ?eld name formation rules that 28. 9% of the identi?ers violated. Thus the tagging can be used to support improved naming.Looking forward, two avenues of future work include automating this improvement and enhancing POS tagging for source code. For the ?rst, the source code would be mined for related terms to be used in suggested improved names. The second would explore training a POS tagger using, for example, the machine learning technique domain adaptation 8, which emphasize the text in the training that is most similar to identi?ers to produce a POS tagger for identi?ers. 6 Acknowledgments Special thanks to Mike Collard for his help with srcML and the XPath queries and Phil Hearn for his help with creating the oracle set.Support for this work was provided by NSF grant CCF 0916081. Violations detected 5,487 (3. 8% ?eld names identi?ers) Simply adding is or was to booleans does not guarantee a ?x to the problem. For example, take a boolean variable that indicates whether something should be allocated in a program. In this case, the boolean captures whether some event should take place in the future. In this example an divert temporal maven is missing from the name. A name like allocated does not provide enough information and naming it is allocated does not make logical sense in the context of the program.A solution to this naming problem is to change the identi?er to should be allocated, which includes the necessary temporal sense communicating that this boolean is a ?ag for something expected to happen in the future. References 1 S. L. Abebe and P. Tonella. Natural language parsing of program element names for concept extraction. In 18th IEEE International Conference on syllabus Comprehension. IEEE, 2010. 2 K. Atkinson. Spell checking oriented word lists (scowl). 3 E. Boschee, R. Weischedel, and A. Zamanian. Automatic information extraction.In Proceedings of the International Conference on Intelligence Analysis, 2005. 4 B. Caprile and P. Tonella. Restructuring program identi?er names. In ICSM, 2000. 5 ML Collard, HH Kagdi, and JI Maletic. An XML-based lightweight C++ fact extractor. Program Comprehension, 2003. 11th IEEE International Workshop on, pages 134143, 2003. 6 E. Hst and B. stvold. The programmers lexicon, volume i The verbs. In International running(a) Conference on Source Code Analysis and Manipulation, Beijing, China, September 2008. 7 E. W. Hst and B. M. stvold. Debugging method names.In ECOOP 09. Springer Berlin / Heidelberg, 2009. 8 J. Jiang and C. Zhai. Instance weighting for domain adaptation in nlp. In ACL 2007, 2007. 9 D. Lawrie, D. Binkley, and C. Morrell. Normalizing source code vocabulary. In Proceedings of the 17th Working Conference on Reverse Engineering, 2010. 10 L. Shen, G. Satta, and A. K. Joshi. Guided learning for bidirectional sequence classi?cation. In ACL 07. ACL, June 2007. 11 D. Shepherd, Z. P. Fry, E. Hill, L. Pollock, and K. Vijay-Shanker. victimisation natural language program analysis to locate and understand action-oriented conerns.In AOSD 07. ACM, March 2007. 12 K. Toutanova, D. Klein, C. Manning, and Y. Singer. Feature-rich part-of-speech tagging with a cyclic dependency network. In HLTNAACL 2003, 2003. 4 Related Work This section brie?y reviews three projects that use POS information. Each uses an off-the-shelf POS tagger or lookup table. First, Host et al. study naming of Java methods using a lo okup table to assign POS tags 7. Their aim is to ?nd what they call naming bugs by checking to see if the methods implementation is properly indicated with the name of the method.Second, Abebe and Tonella study class, method, and attribute names using a POS tagger based on a modi?cation of minipar to formulate domain concepts 1. Nouns in the identi?ers are examined to form ontological relations between concepts. Based on a case study, their approach improved concept searching. Finally, Shepherd et al. considered ?nding concepts in code using natural language information 11. The resulting Find-Concept tool locates action-oriented concerns more effectively than the other tools and with less user effort. This is made possible by POS information applied to source code. 4

Thursday, May 23, 2019

Drivers of Foreign Policy

Since the peaceful coup that brought the current emir of Qatar, Hamad bin Khalifa al-Thani, to power in 1995, Qatar has entered into an increasingly expanding foreign policy, which has greatly increased the countrys regional and internationalistic standing. The main feature of Qatars foreign policy is its role as mediator and negotiator in a number of conflicts in the Middle East and elsewhere, for use in Afghanistan, Ethiopia, Iraq, Israel and the occupied territories, Lebanon, Sudan and Yemen. In each case, Qatar prided itself on engaging with warring factions to push for political settlements or rapprochement, as well as providing humanitarian assistance.The decisions administration Qatars participation in such conflicts are very central. The main decision-makers are the Emir, His Highness Sheikh Tamim Bin Hamad Al Thani, choice subgenus Pastor and Foreign Minister Sheikh Hamad Bin Jassim Al-Thani. Restricting much of the decision-making of this small circle has quickly led to foreign (and local) policy decisions, allowing Qatar to respond quickly to emerging conflicts with mediation offers. spot it can be said that drawing a picture of the country as a benefactor is a public diplomatic move by Qatar since neutrality facilitates the consolidation of credibility among multiple audiences there are deeper motives behind Qatars expansionist approach to mediating the conflict by expanding its foreign policy.The first motive is to verify its security and stability. Qatar is located in the Arabian Peninsula, an area full of political and military rivalries. By increasing its international standing, Qatar aims to protect itself from the dangers of non-disclosure of small and vulnerable states 5 risks of the type suffered by Kuwait in 1990. 6 In addition, by engaging in mediation between conflicting factions such as Houthis and the Yemeni government.Or between Hezbollah and its allies on the one hand and the March 14 bloc on the other, Qatar can be seen as a ct to contain those conflicts and prevent their spread closer to home. This inevitability becomes more acute when one considers the role Iran forges in those conflicts and in the Gulf in particular. Iran is the main partisan of Hezbollah and has established links with the Huthis in Yemen and a number of Shiite movements in the Gulf.Qatar also shares the largest oil field in the world with Iran, and is fully aware of Irans expansionist foreign policy objectives in the region. By trying to mediate between non-Iranian actors and their rivals, Qatar is trying to counter Iranian run in the Middle East in general, and more specifically in the Gulf, while maintaining friendly relations with Iran. Thus, in addition to general security concerns, Irans role in the region can be seen as a clear driver behind Qatars mediation of the Middle East conflict.The third motive for Qatari mediation is the desire to expand its influence as a regional player, especially in the face of Saudi Arabia. Sa udi Arabia has traditionally played a leading role in conflicts throughout the region, for example during the Lebanese civil war. However, in recent years Saudi mediation has been spoiled for perceived neutrality, making the Kingdom an active player kinda than a neutral intermediary.The close relationship between Saudi Arabia and the March 14 political bloc in Lebanon, led by Lebanese Prime Minister Saad Hariri, is an example. Qatar therefore viewed a vacuum in the Arab international relations it was trying to bridge. Its involvement in conflicts across the Middle East and beyond is an front to present itself as a vital alternative to Saudi Arabia and a potential new leader in the Middle East.This role was further enhance by Qatars membership of the United Nations Security Council in 2006-2007, during which the Emirate increased its regional mediation and assistance activities. However, Qatar was keen not to exceed the limits of its relationship with Saudi Arabia. scorn Qatars vi ew of Saudi Arabias low influence in the Middle East (in addition to the growing Iranian influence, which adds to the urgent need for regional Arab leadership), the country corpse cautious not to conflict with the kingdoms domestic and foreign policies.Thus, when the Bahraini uprising began in 2011, Qatar supported the Gulf Cooperation Council (GCC) led by Saudi Arabia mission to abide the insurgency. 7 When the Yemeni uprising, which began in the same year, gained momentum, Qatar also supported the GCC initiative it managed.The path of transition in Yemen, leading to a negotiated transition instead of overthrowing the regimen of Ali Abdullah Saleh. Although Qatars relationship with Saudi Arabia over the years has been turbulent, it has finally reached a rapprochement in 2008 and has continued to become more entrenched, driven by Qatari naturalism and the Emirates awareness of the limits of its influence in the Gulf.Saudi Arabia is the dominant political power in the Arabian Pe ninsula, where Qatar has not yet had the opportunity or the ability to play the first major role. Both countries share concerns about the instability and political transition that are reaching their territory, which leads them to cooperate more than confrontation.

Wednesday, May 22, 2019

Drawing Funds from the European Union Essay

Drawing Funds from the European totalIntroduction European compact coin atomic function 18 an instrument for implementing its stinting and social cohesion policies whose objective is to eliminate the disparities in development levels amongst the EU fraction states and the relative crudity of the most disadvantaged states. The EU specie provide reenforcement for a wide range of projects covering atomic number 18as much(prenominal) as urban and regional development, body of act upon and social inclusion. The bills also cover countrified and rural development, maritime developments, innovation and look ventures, and humanitarian aid. It means that municipalities, businesses, ministries, non-profit organizations, learning institutions, the transit industry, and research institutions atomic number 18 eligible to apply for the funds.Management of Funds Funding, the sole purpose of the EU funds, is supervised in accordance with a set strict rules to ensure that on th at point is total control over how to spend the funds in a transparent and accountable manner. Twenty-Eight EU commissioners encounter the definitive responsibility of ensuring that beneficiaries affair the funds accordingly. Nonetheless, performing checks and annual audits is a responsibility that lies with the national governments. It is because the funds are mostly managed within the beneficiary states. Management of s counterbalancety-six percentage of the safe and sound EU budget happens in collaboration with state and regional authorities via a system of shared management.Allotment of FundsThe EU provides funds from pentad categoriesThe European Regional Development Fund (ERDF).European Social Fund (ESF).Cohesion Fund (CF).European Agricultural Fund for Rural Development (EAFRD).The European Maritime and Fisheries Fund (EMFF). These major funds are referred to as Structural Funds. There are separate(a) funds that the EU manages directly. These other funds are usu enti relyy in the form of grants and contracts. There is a common fallacy that silver from Brussels is available for free and for any purpose. Reality check proves it differently because grants from the EU are usually made available for supporting specific objectives. A big chunk of the funds is non given to beneficiaries directly, but done state and regional authorities who are responsible for transparent management of the funds (Council, 2007). The European Regional Development Fund (ERDF) The aim of the ERDF is strengthening economic and social cohesion in the EU through adjusting imbalances amongst its regions. The ERDF usually centers its attention on some key priority areas known as thematic niggardlinessLow-carbon economyResearch and innovationAssisting small and medium-sized enterprises (SMEs) andThe digital agenda The resource allocation to the priorities usually depends on the category of the region in question. More positive regions focus at least eighty percent of t hese funds on at least two of these priorities. Transition regions focus is for sixty percent of the funds and fifty percent for less developed regions. Additionally, some of the ERDF resources are directed specifically towards low-carbon economy projects twenty percent for more developed regions, fifteen percent for transition regions and twelve percent for less developed regions. The ERDF also gives special attention to specific territorial attributes. Disadvantaged areas from a geographical point of view, for example, rough or sparsely populated areas, gain from this special treatment. The European Social Fund (ESF) The most important focus of the ESF is improving the job market and reading opportunities across appendage states of the European marrow. Improving the social statuses of vulnerable state is also an important aim for the fund. The earmarking of more than 80 billion for investment in human capital in EU member states for the termination 2014-2020 attests to it. Other objectives of the fund include retraining unemployed stack, starting special programmes for the disabled and other disadvantaged groups of citizens. In addition supporting self-employed muckle who are just starting their businesses, developing employment service institutions and improving the quality of t some(prenominal)lying method in learning institutions. Cohesion Fund (CF) The CF is mostly aimed at member states whose Gross National Income (GNI) per inhabitant is less than 90% of that of EUs average. Its main aim is to minimize social and economic disparities and promoting sustainable development. The CF is also subject to the same regulations as the ERDF and ESF via the Common Provisions Regulation. For the programming period, 2014-2020, the CF concerns states such as the Czech Republic, Croatia, Latvia, Malta, Hungary, Slovakia and Slovenia. The CF allocates approximately 63.4 billion to various economic and social welfare projects. The Cohesion Fund is used to fu nd trans-European transport networks especially those identified as priorities by the EU. The funds can additionally be used to fund environment-friendly projects. These projects include those that benefit the environment in foothold of renewable energy, supporting an inter-modality, and energy efficiency. If audits reveal that a member state has excessive public deficit and they are not taking steps to work the situation, the Cohesion Fund can be suspended by a Council Decision. The European Agricultural Fund for Rural Development (EAFRD) The EAFRD covers bio-energy, organic farming, forest resources, fodder safety, animal welfare, plant health and rural development programmes (RDPs). The EU requires its member states to tolerate their RDPs upon not less than six set EU priorities. They include travel knowledge transfer and innovation in the agricultural sector, forestry and rural areas.Improving the viability of all types of husbandry, and endorsing innovative farming tech nologies and sustainable forest management.Encouraging sustenance cooking stove organization, management of risk in agriculture and animal welfare.Protecting and developing ecosystems allied to agriculture and forestry.Shifting towards a low-carbon and climate-conscious economy in the food and agriculture sectors. Each RDP identifies focus areas to set quantified targets for funds needed. Measures to achieve these targets and their individual fund allocations are paramount. RDPs also gets funding from private sectors that share the same ideologies. The implementation of funds is monitored and evaluated in detail. European Maritime and Fisheries Fund (EMFF) The EMFF, formerly European Fisheries Fund (EFF), is used to fund the Common Fisheries Policy (CFP). The EMFF gives funding for the fish industry and communities in the coastal regions. The CFP endeavors to make sure that fishing and aquaculture are sustainable environmentally, economically and socially. Healthy fish and se afood is also paramount. Though important to maximize catches for business purposes, limits essential be put in place. The CFP stipulates that limits should be set such that fish stocks are sustainable in the long-term. The CFP allows EU member states access to its waters and fishing grounds. To enhance transparency in funding, the European Transparency Initiative was set up. A central web portal was created to collect and utter data from all beneficiaries of EU funding funds received and how the funds are being used. There is also an inventory of EU funding that shows the evaluations done and released by the evaluation Services of all Twenty-Five EU member states.Applying for Funding in Selected Areas Enterprise small and medium-sized enterprises (SMEs) can obtain funding via grants, loans and guarantees. It is mostly through financial intermediaries in their member states. Grants usually account for fifty percent of project costs. Loan guarantees are given to microcredit o rganizations for loans of up to 25,000. Non-profit organizations they include non-governmental and civil society organizations. These organizations are eligible for funding as long as they are active in EU policy regions and a strictly non-profit basis (Council, 2007). Young people they are eligible for two types of funding education and training, and y extincth funding. The former includes study opportunities through Erasmus+, scholarships for high school graduates, and occupational training in other countries. The latter includes co-funding youth projects that encourage civic involvement, charity work and a wider multicultural outlook. Researchers individuals and institutions involved in innovation and research projects are qualified to predication for the funds. The European Union will provide roughly 80 billion in its quest to fund research. The funding typically takes the form of grants to finance partially a wide range of research and innovation projects. Agriculture and fisheries acquiring funds for such projects involves giving a general introduction, presenting financial reports, and giving training on the planned use of the funds. Direct funding is the most important and common type of funding in the EU member states. Cultural and audiovisual sector the main programme in this segment is culture it has three main goals. They include promoting cross-border mobility of people working in the cultural sector, encouraging circulation of cultural, fine output, and fostering intercultural dialogue (Evans & Foord, 1999). Energy funding is available for a number of sectors including solar and wind energies, bioenergy, renewable energy, clean coal projects and energy efficiency. Funds are also available for Trans-European Energy Networks (TEN-E), whose aim is to enhance transportation networks for electricity and gas across the European member states. The structural funds and grants from the European Union Funds have impacted the broods of th e citizens of its member states immensely. The standards of living of many citizens have risen noticeably due to the array of new employment opportunities created by the funds projects. Some of the projects success stories are noteworthy and have had a great impact to states and individuals. We will take a look at some examples of projects carried out using the funds so as to take note of their effects to their beneficiaries.ESF in the Czech Republic The Czech Republic is among the less wealthy nations in the European Union member states. According to regulations, Czech could have drawn approximately 26.7 billion from the ESF in the programming period 2007-2013 in order to harass the standards of living of its people. However, the amount received from the ESF for that period is 3.8 billion. Together with national funding, the tally adds up to over 4.4 billion. ESF funds help in three activities. The first is move education at all levels and enhancing its relevance to the job m arket. Secondly, the funds are used to enable many people to get employment, especially the disadvantaged. Lastly, they have helped build competitiveness of the Prague region. The Czech Republic is using the funds to do away with obstacles that for one reason or another, prevent people from getting a job. These people include mothers with young children, older people, and the disabled and disadvantaged groups, like those with little or no professional skills. Many ESF projects across the nation are make access to training facilities easier and diminution some practical obstacles to work. Consequently, this is bringing a positive impact by lifting its citizens out of poverty (Fagan, 2005). ESF funding is also service improve the quality of education by scrutinizing standards, employing more competent teachers, and teaching job seekers only the needed skills by employers. Events such as science accusative film festivals and meetings with top Czech scientists are being used as platforms to encourage students to consider careers in science and technology. Just like other member states, the Czech Republic is struggling with the unemployment crisis. The ESF fund, however, has gone a long way in helping Czech citizens find jobs attributed to the various employment and educational projects initiated by the funds.Saving Lives EU Funded Cancer Research Project Physicians mostly wait for several months to assess whether crabmeat treatments that they are administering to their uncomplainings are actually working. By discovering a new technique that quickly reveals a tumor by checking consumption of glucose, an EU-funded project has reduced the delay. This discovery enables doctors to get more precious time to commute to more effective forms of treatment if crucial potentially saving many lives. All cancer treatments do not work in every patients case. A tumor might reduce rapidly after a treatment, yet its assessment is complex. Several therapies may elimin ate the cancer without reducing the size of the tumor. A delay in confirmation by a doctor may mean that by the next treatment, the patient may be a lot weaker, and the cancer advanced come along (Eckhouse & Sullivan, 2006). Physicians want to assess immediately if the cancer is affected by a treatment, not just by measuring its size but through metabolic indicators. The EU-funded project, Imaging Lymphoma, has developed such an assessment. The innovation will be important in future cancer treatments as it makes it easier for doctors to treat their patients.Turning Food Waste into Animal Feed The European Union is the source of 18% of food exports worldwide and with it comes a grand chunk of agricultural waste. This waste costs farmers and taxpayers money (Kraemer, Wilkinson, Klasing & Homeyer, 2002). An EU-funded research project NOSHAN wants to convert food waste into animal give way. The objective of the research is to open up new opportunities for farmers and reducing Europ es dependence on animal feed imports. Additionally, new green jobs in agricultural waste collection and feed manufacturing will be created. The NOSHAN project aims particularly at turning fruits, vegetables and dairy wastes into animal feed, and at low energy costs. The project is expected to conclude its research in 2016, and by that time, the research team will be able to have the best waste extraction and upgrading techniques. The NOSHAN project presents Europes agricultural sector with a prospect of attaining greater agricultural sustainability. The project has been awarded just under 3 million in the programming period 2007-2013. It brings together a University, small and medium-sized enterprises (SMEs), research institutes and other industries. The NOSHAN project could also reduce the ever-increasing competition between food and feed sectors, both of which require water and land (Wolz, Hubbard, Mllers, Gorton & Buchenrieder, 2012).Revolutionizing the Transport Sector EU-fu nded researchers have come up with groundbreaking proposals to prevent railway suicides and decrease disruption of function. If adopted, the proposals could save lives, money and time for railway companies and their passengers. delay for a train, and suddenly the service is called off or delayed indefinitely is something that train passengers have become accustomed to in the long run. Perhaps an possibility somebody fell onto the track, or they purposefully stepped in front of the track. The EU-funded project, RESTRAIL, collected and analyzed the measures put in place by different EU member states to curb suicides and accidental deaths. The outcome of the research was that proposals that can save a lot of lives. Decision makers such as station managers or railway companies should have a set of the most efficient mitigation measures for every event. The tests they have conducted have created a toolbox for consultation on the best practices on each country. RESTRAIL guidelines co uld help reduce direct and indirect costs linked to railway suicides and accidents.ESF Fund in Slovakia Slovakia is one of the fastest growing economies in the EU, but it faces several challenges such as high long-term unemployment levels. Nonetheless, Slovakia plans to increase the countrys employment rate to 72% by 2020. Slovakia has received 1.5 billion ESF funding for the period ended 2007-2013. In combination with national co-funding, they have raised a total of 1.76 billion. A variety of projects is being supported via the funding. Public employment facilities and services are being improved so as to reach as many slovaks as possible. Since 2007-2011, approximately 24,000 employment opportunities have been created and around 26,000 people have found employment via ESF supported measures. Projects are also being implemented in the form of flood-dependence-programmes that offer up to 4,500 new jobs in 200 villages. ESF funding is helping reform the education system in Slovak ia by ensuring that education is tailored to align with the evolving needs of the society. An example is a project that investigates the interests of young people and matches them to career guidance. ESF funded projects are facilitating the establishment of life-long-learning culture that natures skills of the Slovak citizens throughout their lives. For instance, a Slovak packaging company has used ESF funding to facilitate professional training of new skills, such as in quality and environmental standards, making them more adaptable and well equipped for their future careers. The Roma people in Slovakia tend to live in segregated settlements and are more exposed to long-term unemployment compared to the average population, and also live in conditions of poverty. Thanks to ESF funding, social workers and assistants have been employed to work closely with them to help improve their circumstances (Guy & Kovats 2006).Setbacks and Doubts on the efficient use of EU Funds One of the p roblems with EU funds is that in some cases, the money is allocated to projects that are neither necessary nor productive (umpkov, Pavel & Klazar, 2004). For instance, if a village wants to repair sidewalks in its region and would like to use EU funding for it, it is exigent that they formulate a supporting story. Lets utter, expansion of regional tourism. It means that, in addition to repairing the sidewalk, the money will also be spend to put up some signs with a map of villages streets, which in the first place is not necessary. Some smart villages can even use the funds to renovate an old library and rename it to the Tourist Information Center, and stow some pamphlets there, in case some tourists do show up. Another predicament is deformation of industrial and consumer environment. When a firm receives funding to build, say, a grocery store, its neighbors who have the similar business plans receive nothing. A further problem is that national ministries of some states like say, Slovakia, are reluctant to delegate control of EU funds to lower governance levels. The central governments do not trust the ability of their municipalities and regional authorities to implement the funds timely and effectively. There have been cases where regional authorities have mixed implementation of policies, to say the least. Nevertheless, Slovakia has not been able to create any efficient mechanisms for decision-making and management of public funds (Guy & Kovats, 2006).Conclusion Funds drawn from the European Union have change magnitude employment opportunities, bolstered the education sectors of beneficiaries and led to the growth of economies. Additionally, funding the transport sector, research and innovation projects have led to groundbreaking discoveries in the agricultural, health and transport sectors among others. The number of lives saved and projected to save by some of these discoveries is amazing. Nonetheless, the funding has not been without a few cont roversies. Some parties have tried to take advantage of botch up officials to leverage some money for themselves leading to misuse and undertaking of dubious projects. An honest culture should be created to ensure appropriate use of funds. The European Union funding goal is to ensure that beneficiaries spend money in a transparent, accountable manner. It is thus the duty of all beneficiaries to make it a reality.ReferencesCouncil, T. R. D. (2007). European Union Funding.Eckhouse, S., & Sullivan, R. (2006). A survey of public funding of cancer research in the European Union. PLoS Medicine, 3(7), e267.Evans, G., & Foord, J. (1999). European funding of culture promoting common culture or regional growth?. Cultural Trends, 9(36), 53-87.Fagan, A. (2005). Taking stock of civil-society development in post-communist Europe Evidence from the Czech Republic. Democratization, 12(4), 528-547.Guy, W., & Kovats, M. (2006). EU-funded Roma programmes Lessons from Hungary, Slovakia and the Czech Re public. London Minority Rights Group International.Kraemer, R. A., Wilkinson, D. G., Klasing, A., & von Homeyer, I. (2002). EU Environmental Governance A Benchmark of Policy Instruments. With a focus on Agriculture, Energy and Transport. Study commissioned by the Belgian Federal section of the Environment. No. ECOLOGIC, Berlin.umpkov, M., Pavel, J., & Klazar, S. (2004, May). EU funds absorption capacity and effectiveness of their use, with focus on regional level in the Czech Republic. In meeting proceedings of the 12 th NISPAcee Conference.Wolz, A., Hubbard, C., Mllers, J., Gorton, M., & Buchenrieder, G. (2012). Patterns behind rural success stories in the European Union Major lessons of former enlargements (No. 68). Studies on the agricultural and food sector in Central and Eastern Europe.Source document

Tuesday, May 21, 2019

Diamond Water Paradox Essay

Marginalism was very important in the historical development of economics. Up through the 1870s, the marginal idea had not been grasped, which led to paradoxes such as the baseball diamond- water paradox. This paradox was resolved by the introduction of marginal thinking.A modern equivalent of the diamond-water paradox Why do basketball players wee-wee paid so much more than teachers, when teachers are so much more important? Because we acquire plenty of people who are capable of doing what a teacher has to do (at least at the simple/middle/high school level), whereas we have very few people who can do what a pro basketball player does.Not all decisions are marginal, however. Some decisions really are all-or-nothing deciding whether to shut down your business or stay open deciding whether to offer a newfangled product line deciding whether to get married deciding whether to move to New York. For decisions like these, you unavoidableness to compare the total expected benefit to the total expected cost.2As in the diamond water paradox, water is less expensive than diamonds because they are readily available and an additional unit of water adds little value to the individual. On the other hand, diamonds are scarce and every additional unit adds important value and this is the reason it costs more than water. The same is the reason for the disparity in salaries between teachers and athletes. go teachers are available in abundance like water, athletes are rare and so they are considered to be a precious commodity like diamonds and this scarcity is the reason they are paid such extensive amounts of money each year.

Monday, May 20, 2019

Cold War Essay

cutting fight was a terminus pronounced by political, ideological and economical rivalry that emanated from United States and Soviet Union later on the Second human being War. The animosity minglight-emitting diode with United State and USSR lasted amongst late 1940s and late eighties . Cold war was coined from the fact that the two sides feared the effect using weapons, instead they resorted diplomatic ideologies or else than force. The rivalry between these two supper powers was exposed through the weapons developments, military coalitions, advances in industrialization and technology.Cold war brought tension to international crises, for example the Berlin Blockade (1948-49), the Korean War (1950-53), the Berlin crisis in 1961, Vietnam War (1959-75) the Cuban missile crisis and the Afghanistan war which raise fear of a Third military personnel War . The NATO exercise in 1983 patent the end such crisis. The collapse of the Soviet Union marked the end of cool war betwe en late 1980s and early 1990s and the progress towards democracy began. The indeed chairwoman of United States, Ronald Reagan, came up with new-made policies. He increased economic pressure, military action and diplomacy on Soviet Union who by then was undergoing economic crisis .The clear cut regarding the origin of the Cold War is not well known. While just about historians trace its origin to the end of instauration war 11, others argue that it began at the end of the First World War in the 19th Century with the United States, Russian Empire and the British Empire. The ideological differences between capitalist and commie started in 1970 with the coming out of Soviet Union from Russian Revolution as a communist state. This resulted to tensions between United State and USSR because of the changes that occurred. The change in political point of views after the Second World War ushered in the Cold War.The nuclear arms race brought differences between US and Soviet Union. Betwee n 1960s and 1970s, both United States and the Soviet Union adjusted to a new pattern of international relations bringing unity in the world. From the commencement of the postwar duration, Western atomic fare 63 and Japan hastily recovered from the destruction of World War II and continued strong economic appendage. The 1973 oil crisis, combined with influence of Third World alignments such as the Organization of Petroleum trade Countries (OPEC) and the Non-Aligned Movement, less-powerful countries had more opportunity to affirm their independence. 2.0 Effects of Cold War on the World deliverance The cost of the Cold War was terrific the military expenditure by United State during that period was estimated to have exceeded more than $8 trillion and nearly 100,000 the Statesn solders lost their lives in Vietnam and Korean War. The number of lives lost in the midst of the war by Soviet solders was hard to estimate. Millions of soldiers died in the superpowers proxy wars particula rly in the region of the globe, most markedly in the Southeast Asia. Following to the disbanding of the Soviet Union, post cold war become unpopular with the United States becoming the only superpower in the world.On twenty-first Dec 1991, the Commonwealth of Independent States was formed and it was viewed by many as a successor of Soviet Union. Russia slashed military spending after the end of cold war, leaving many unemployed . The monetary crisis and recession affected Russia in 1990s when they tried to reform their economic capitalistic. The cold war also influenced the world affairs. It defines the united state political role in post-world war 11. In 1953, the US president Dwight D. Eisenhower reduced military expenditure by brandishing nuclear control while continuing to fifth cold war The U.S held military alliances with some countries estimated to 50 allied to them and had more than 1. 5 million promenade abroad in 117 countries by 1989. Most of the local conflicts and pr oxy war ended with cold war. The pagan wars interstate war, refugees and revolutionary wars declined sharply. Cold war conflicts legacy can not be erased effortlessly as numerous economic and social tensions exploited in third world are still good and acute. The struggle to control those countries they ruled by Communist government has twisted it course and produced ethnic wars and well-bred wars especially in Yugoslavia.T he ends of cold war soup a new era of economic growth and numerous liberal democracies in atomic number 99 Europe. Afghanistan attained independence but unluckily their state failure. International conflicts The war between America and Iraq, the US claimed that Iraq was preparing biological, chemical and nuclear weapons of mass destruction. ibn Talal Hussein Hussein who was then the Iraq president denied the allegation. This war almost brought down the US rescue. The soviet-Afghan war took nine years. It was a conflict between soviet forces supporting Marxi st Peoples Democratic Party of Afghanistan (PDPA) government and Mujahedeen Resistance.The latter(prenominal) got support from United State, Saudi Arabia, and Pakistan and other Muslim nation in context to cold war. The incomplete conflict in Afghanistan has heathen tension in the war like that of Vietnam War. The U. S president pry Carter said that the inversion of Soviet was the most serious threat to peace since the Second World War he later placed trade ban on Soviet Union. The tension was high and the Soviet took thousands military troop to oil cryptical region in the gulf. International diplomatic retort was harsh, ahead(p) to boycott of 1980 summer Olympic in Moscow.The invasion and revolution in Iran, the US captive that accompany them, the IranIraq War, the 1982 Israeli invasion of Lebanon, the escalating tensions between Pakistan and India, and the rise of Middle East-born terrorism against the West, contributed to making the Middle East an super violent and turbulent region during the 1980s. Capitalism The capitalism is a state of government whereby economic yield system are controlled by private sector rather than government. It is a social system found on individual rights.The exchange and distribution of capital between private persons or profit desire legal are protected, and set of goods, distribution, services, income, and investment are determined through opened market economy in which any one can take part in supply and demand rather than central economic system. In to the history, capitalism has met resistance throughout. Some critics consider economic regulation unavoidable because it reduces negligence, corruptions and other problems arising from free markets. Trends associated to globalization have increased mobility of people and capital since 20th century.This has made capitalism to be viewed today as a world system. In the last half century, economic growth has been steady, life expectancy increased and infant mortality rate dropped in developing nation. In 2008, America and other governments were seeing state intervention in global markets signaling free-market capitalism. The financial Markets and uproar in banking system resulting from supreme mortgage crisis was at the peak in September 2008, this was seen by liquidity in global market and ongoing threats on investment banks. CommunismCommunism is a distinct socio-political philosophical system that promotes the establishment of an egalitarian, classless society that is forgeting to use force to accomplish its goals. Communism believes in par force. They also embrace atheism and dismiss religion as basis formed by the rich and superpowers to lock off the poor. During cold war, collectivism spread into many countries. The Soviet Army captured several nations in both Eastern Europe and East Asia and expand communism. The Soviet communist took control in Romania, Poland, Bulgaria, Hungary, East Germany and Czechoslovakia.After the Second World War , Albania turned out to be independent communist nation. By 1950, Chinese communists controlled the majority of populous nation in the World. Whit rising control of the communism in the world, it led to fight through guerrilla warfare and conventionalism i. e. Korean War Vietnam War Middle East. Communists attempt to unite with socialist forces and nationalist against what they perceived as western imperialism in poor nations. The fear of communism was seen when Italian resistance movements and Chinas involvement in the Second World War.Western democrats and capitalist saw communist as a threat. This rivalry between the two superpowers was at the peak during the cold war. Their difference polarized the world into two camps whit each camp strengthening military power, developing new weapons and nuclear, fought each other through proxy client nations, and competed in space development technology. The U. S. feared communist spread hence spurred vulturous investigations deputation of suspected people, blacklisting and red-baiting.The economic critics of socialism was seen when they introduced free price system in market economy to guide economic activities. Free Market economist felt that controlled or fixed price will give inappropriate information about relative scarcity. The market economist sees that comparing the cost to sales revenue will enable business owners to evaluate their viability. Socialist reject market mechanism of pricing claiming that market system is tending towards monopoly or oligopoly to some key industries leading to prices distortion.

Sunday, May 19, 2019

American Revolution the war, the article of confederation and the constitution

The paper discuses the united States of the States lane to self g everyplacenance from hands of British colonialism. First it looks on the war between the United States the States and Britain. The war took place in late 18th century when the bakers dozen produces of the States colonialist joined forces to eradicate the British emperor moth. Although the states reserves workforce were untrained and used simple weapons, they were determined to topple d bear Britain from the States. The paper also focuses on how the militiamen though inexperienced in war, caused sleepless night to the British legions.With time the war seemed un annihilateing until r apieceed a point where a deal had to be reached to end the war. The war was finish with a deal world reached between the United States of America and the Britain. A Paris treaty signed in France between the parties in war ended the stalemate. The name of confederation is looked into. This document (the obligates of confederation), outlined the rules governing the operations of the united thirteen states. The name outlined the powers of the confederation disposal and how the states had to relate to each other.The strengths and weakness of the article is outlined in the paper. Article of confederation was replaced by formation soon after America attained her independence. At the end the paper comp atomic number 18s the American conversion with other world revolutions such as, French revolution, the Russian and the Iranian revolutions. The British army and the militiamen During the last half of 18th century, the thirteen colonies of North America overthrew the governance of British emperor and merged to become the nation of the United States of America.The colonies regrouped to form one self governing state that fought with British army. Americans lacked trained army and each group of the colonies relied on militia groups which had simple arms and repulse knowledge on fighting for defense. Although, this mi litia had no fighting skills, their high number gave them an advantage over the few British soldiers in the battle fields. In 1775, America established a regular Continental army to give more co-occurrence to the militia in battles. The British army was about 36,000 men, except within the course of war, Britain hired more soldiers from Ger many a(prenominal) (Savas, 2006).The combined army was huge, but its strength was weakened by the virtue of being spread across large regions of Canada and Florida. The revolutionary war on North America started when the commander in charge of British army sent his men to seize ammunition held by the militiamen in Massachusetts. On arrival, they found that the Minutemen (a group of men from the colonial militia) had been alerted of unexpected visit by the British army. This group of militia (minutemen) consisted of young and more mobile men who were ready to fight British army any minute they are called to do so.A battle started between the two sides with the British army cleaning a number of militia. As the war continued, a great damage was inflicted on British army, as thousands of militia fought them, before reinforcement was brought to help them to prevent more damages. On their way to capture Canada from British emperor, the militiamen were grouped into two groups with each having a leader. The group lad by Richard Montgomery with more than 1500 men attacked northern Canada forcing the governor of Quebec to escape. The second group led by Arnold, was not a success because many men succumbed to smallpox.Although Montgomery was killed, the groups after merging again, held the city of Quebec until British war ships arrived to get hold of the siege. The militia played a cat and mouse game to the British army. They could engage the British army in fighting, retreat and the came again when the army was not aware. The militiamen were determined, courageous and ready to overthrow the British emperor at all cost for their ind ependence. Paris Treaty In 1777, France and her allies (Spain and Dutch) entered in the war to support the Americans.Her engagement proved decisive when the second British army surrendered to her naval army. As a result a treaty had to be signed to end the American war and recognize the sovereignty of United States of America over the territory bounded by what is now called Canada to the north, Florida to the south, and Mississippi river to the west (Bobrick, 1998) As the political support of war plunged, the British prime minister resigned in 1782 leading to the house of common to vote in favor of ending war with Americas.Signing of preliminary peace articles followed in Paris but the war ended when the Paris treaty was signed between America, France and Britain in 1783. The American-French fusion proved too strong to British army. As a result, British government together with American representatives in Europe began peace negotiations to rub the alliance against Britain. In the negations Britain negotiator was supposed to acknowledge that he was negotiating with American states not colonies.First the French and Spanish military were to besiege fortress of Gibraltar, which was the seaway connecting Atlantic Ocean and Mediterranean Sea (Burnett, 1941). What followed is that the alliance was weakened and France relentlessly accepted a preliminary peace treaty between Britain and United states which was formalised later. The treaty was signed in September 1783 despite British parliamentary protest of some of agreements contained in the deal. The Article of Confederation The article of confederation was the governing fundamental law of thirteen independent and sovereign states expressive style (United States of America) (Ward, 1952).The article was proposed in 1777 and ratified in 1781 uniting the states into the United States of America as a fusion with confederation government. The article gave the states the power to all government functions not posed b y the key government. The article stipulated the rules for operation of the united states confederation. The article allowed the confederation to acquire war, negotiate agreements and settle maters concerning the western territories. However, the confederation had no power to mint coins or borrow with or outside United States. Each state had its own currency.The main reason for drafting the article was to provide a plan for securing the freedom, sovereignty and independence of United State. The article stipulated that the confederation to be known as the united States of America, each state to keep on its freedom, independence and sovereignty. The article also established the United States as league of states united and freedom of effort across the states. In the article each state was allocated one vote in congress of confederation, the central government was hardly the one to conduct foreign relations and declare war.The article further stated that expenditures by the United States would be paid by funds raised by state legislatures, delimitate the powers of central government and the admission of new state was to be approved by nine states. The article also mandated a committee to be a government when the congress was in session. In addition, the article reaffirmed that the confederation accepts war debt incurred by congress before the articles. Finally it declared that the article was final and only could be altered by approval of congress.Some of the weaknesses of the article includes power of central government was weak because each states had powers, there was no balance between the large and small states in legislative decision making, the congress lacked revenueing authority hence could not plan on expenditures, some argued that the provisions of the article were no favorable for effective government, and under the article, congress did not had powers to regulate trade. Its main strength was that it gave direction to the Continental army and t hus helped to win the American revolutionary war.Ways that the piece of music remedied the flaws in the Articles The article of confederation was replaced by the U. S. constitution which changed the government from confederation to federation. The constitution is the supreme law that outlines the organization of United States of America. Constitution defines that the government has three branches namely the legislative, an executive branch led by the president and judicial branch headed by Supreme Court. The document also states the powers of each branch and reserves rights of each state, hence establishing United States national system of government.The constitutional reallocation of powers created a new form of government, unprecedented under the sun. Every earlier national authority either had been centralized or else had been a confederation of sovereign states. The new American system was neither one nor the other it was a mixture of both (Collier, 2007) The constitution es tablished the musical mode of election and vested all legislative powers to the congress of United States of America which consisted of senators who headed states and House of Representatives who represented the lower house.The executive branch outlined the qualification of president and also makes provision for the post of vice president. The vice president was given powers to succeed the president incase the president died, resigned, removed or unable to discharge duties. The constitution requires that there will be one court (supreme), but the congress could create lower courts that judgments are reviewable by the Supreme Court. The constitution sets all the cases and defines who to hear the same. The constitution defined the relationship between the states and the federal government and amongst the state.The state government was require from discriminating against citizens of other states. There must be fairish treatment to all citizens regardless of which state he/she comes from. Legal basis of freedom of movement and blend amongst the states was laid in the constitution. This provision was not taken more seriously as it was the case in the time of articles of confederation, where crossing of states lines was costly. Within the constitution, there provision for creations of new states and the congress is given the power to make rules concerning the disposal of federal property.The United States is required to allow each state to have a republican government and protect the states from all attacks. The constitution and laws of states were to set in such a way that it did not conflict with the laws of the federal government and incase of conflict, judges were supposed to honor federal laws over those of states. Constitution addressed the freedoms of religion, speech, press, assembly and petition. States were give were right to keep and maintain militia and individuals to poses arms. Government was prohibited from development private homes to keep sold iers without consent of owners.The constitution required that a warrant of arrest be issued, prohibited repeated trial, guaranteed a speedy trial for criminals and forbade excessive bail or fines. How was revolutionary revolution The American Revolutionary was actuary a revolution, there was change of power and change in organizational structures. American wanted a change wanted to be represented in the parliament, wanted to get benefits of the tax they paid etc. It was the result of the war and signing of Paris treaty that Britain moved from America and America was declared independent.This is a political revolution where a political regime was overthrown and thereby transformed by a popular movement in an irregular, extra constitutional and/or violent fashion(Ward, 1952) The U. S. constitution replaced the articles of confederation, which change government from confederation to federal one. Both the French, American, Russian, and Iranian revolution were accompanied by excitation and blood shade. The French revolution was transition of government from anarchy to a form based on reason, nationalist, citizenship and inalienable rights.Russian revolution was made to change the nature of society and transform the state with replacement of tzarist autocracy with Soviet Union The Iranian revolution transformed Iran from a monarchy to an Islamic republic. In global all the revolution involves transformation of government from one form to another, although American underwent both government transformation and change of land ownership. Reference Bobrick, Benson (1998). Angel in the Whirlwind The Triumph of the American Revolution. Penguin, paperback reprint Burnett, Edmund Cody (1941).The Continental Congress A Definitive History of the Continental Congress from Its Inception in 1774 to March, 1789 Collier, C. (2007) Decision in Philadelphia The Constitutional Convention of 1787. New York Random House. Savas, Theodore, P. and Dameron, J. David (2006). A Guide to t he Battles of the American Revolution, New York. Ward, Christopher (1952). The War of the Revolution History of land battles in North America, 2, New York Macmillan. Greene, Jack P. (1987). Introduction. The American Revolution, Its Character and Limits. New York University constringe New York.