Monday, September 30, 2019

Critical period in language development Essay

The concept of a critical period is well in nature. In human beings there seems to be a critical for the first language acquisition. Research shows that any human who is not exposed to any language before puberty, becomes completely unable to the syntax of their first language later in life. From my personal experience I have learnt that any individual who learns their first language at infancy and later (at puberty) gets to move from their motherland to foreign land where no one speaks their language, no matter how long these individuals stay from home they can never forget their mother tongue. Accent may change but they will always remember their first language Here is another practical example to prove that there is a critical period in language development. I happen to be living in Africa; my bosses are Italians (man and wife) they have had to learn English and Kiswahili for easy communication with the locals. They have a five year old baby. When the baby is with her parents they always speak in their first language; when she is left behind with the nanny she is spoken to in Kiswahili all the time. The nanny knows no other language apart from her mother tongue and Kiswahili. This baby has been looked after by this same nanny since she was born. At the age of three a teacher from America was employed to teach this girl. She knew no other language but English. Now look at this closely; the baby is now very fluent in two languages; her first one Italian and her second one; Kiswahili. She is so fluent that she corrects her parents on it! She seems to be doing just fine in English for the last two years she has been taught. Interestingly her teach who is very interested in learning Kiswahili asks her enough times to translate to her in English what has been said in Kiswahili by colleagues. I would say that all depends with the stage at which the language was introduced to an individual. The stage in life. †¢ Kiswahili is a language for the East African state and some of the West African.

Sunday, September 29, 2019

Computers & social change Essay

To argue for and against, use authors that are for and against technological determinism. In order for me to carry out this task effectively, I will define what is meant by the term technological determinism then break down the mystery of these term into parts and also demonstrate out some different technologists who have had a say on the term. According to Babylon, Technological Determinism is considered as an autonomous ling and is defined as technology being developed by its own ruling, with its potential limited by material resources. 1 Authors For As said by Neville Holmes a senior lecturer at the University of Tasmania â€Å"Computers are merely tools. They are not members of society; they are not even pseudo members, like corporations and governments. They are not independent agents. Like cars and telephones, they only do things if and when someone uses them. They can neither be blamed for what they do (are used for), nor given credit for what they do (are used for). â€Å"2 Here Holmes is arguing in favour of the above statement, he is telling readers that computers should not be classified as living being that they are just machines which we can control or use to assist ones doing, they are helpers or assistants. Also Jacque Ellul is arguing alongside Holmes, he also apply that computers are not independent of social change as he wrote that; †Technology, is symbolic of a cancer which as it grows increases the fundamental danger to its host, in this case society† Ellul see’s the idea of technology as a whole as an autonomous means with no ruling. He suggests that computers can not be autonomy of social change because they are not only created by humans but they are also used by humans. 3 Arthurs Against Whereas the Dutch social critic Michiel Schwarz is against the above authors opinion as he stated that; †Technology has become our environment as well as our ideology. † †We no longer use technology, we live it. † Schwarz is arguing for computers, he believes humans see computers as the structure of society. He is trying to tell us that computers are independent of social change. Also Marshall McLuhan is arguing alongside Schwarz, he believes that computers are independent of social change as he stated that †inventions in technology invariably cause cultural change. † McLuhan is trying to inform readers of his theory that the introduction of technology has changed the world, is still changing the world and will always have some kind of connection to do with the rapid evolving of the world. 4 Conclusion As a whole having looked at different authors’ point of view over the past years, one can see that computers have played and are still playing a great responsibility amongst our society since technologies are improving in terms of their functioning and capability, the society is adapting to it. I agree with (name of author u fink is right) and because of his/her point, we can see that technology is definitely the motor of our society therefore, I recon. 1 Babylon Translation, Available at: http://dictionary.babylon.com/Technological_Determinism (Assessed on 17-December-2008) 2 Neville Holmes, University of Tasmania, Available at: http://eprints.utas.edu.au/2765/1/ieeec97may.pdf (Assessed on 3-November-2008) 3 Jacque Ellul, Available at: http://www.umsl.edu/~keelr/280/class/gregtd.html (Assessed on 16-December-2008) 4 Amy Schick, Technological Determinism: A Critique, Available at: http://oak.cats.ohiou.edu/~as491398/tdaes.htm (Assessed on 17-December-2008)

Saturday, September 28, 2019

David Fletcher Essay

David Fletcher, a heavily overworked portfolio manager of the Emerging Growth Fund at a New York investment management firm, plans to ramp-up a team of research-analysts. He wishes to delegate a part of his workload to this team. The case explores the problems that David faces at various stages of introducing new members in his team. It also touches upon the challenges faced by a typically task oriented person while engaging in a team building exercise. Is David Fletcher successful? As an individual, David Fletcher is extremely successful at his job. An economics major and a Harward business school graduate, he started his career as a securities analyst in a New York based brokerage firm. He cut through the ranks in relatively quick time and very soon he was handled the responsibility of two of the most aggressive mutual funds of his time. David continued his stellar performances in these funds even as he took them to 10 times their original/starting value. In the words of his colleagues and close cronies, David was not only a detail and decision oriented person but was also a person who was extremely familiar with the art and the science of portfolio management. In the latter half of his described career, David joined Paul Jenkins to form the Jenkins Fletcher partners where he managed a portfolio of 150+ million US$ single handedly. David’s performances in the various roles he assumed during his career amply justify his credibility as an individual and as a professional (portfolio manager). As a team player, colleagues acknowledged David’s acumen in the field of portfolio management. In a way, David commanded respect from his colleagues and superiors alike which is testament to the fact that David was an internal cog in the teams that he worked in. As a team manager, David’s success is questionable. I wish to analyze his stint at building and thereafter leading and managing a team at Fletcher Jenkins partners to substantiate my aforementioned stance. This brings me to address a more pertinent question first, What was David’s motivation to build a team? As mentioned previously, David is a highly overworked portfolio manager. Being the best at what he does, in a way, acts as a detriment to his position as he has to juggle with multiple tasks at a time. As one of the main portfolio managers of Jenkins Fletchers partners, David manages a huge pile of investor’s money (to the tune of 150 million US$) from a total fund size of 400 million US$. If managing a fund wasn’t enough, David also has to do the research of the industries/markets from which he builds his portfolio himself. He is often faced with an information overload which prompts him to look for individuals who can assist him in doing justice to his task. As I delved deeper into the case, I realized that David’s intention behind building a team, in a manner, was to ensure the success of his portfolio irrespective of how the success was achieved. David was so clinical in his pursuit of focusing on his fund’s performance that he became oblivious to the imbalance in his team. In consequence, this approach had David lose two of his critical team members. In the following section, I wish to analyze the core factors that contributed towards David’s relative lack of success as a team manager. Why did David’s pursuit of building an effective team not achieve the desired success? There were multiple mistakes that Fletcher made while ramping up his team of research analysts. Some of his shortcomings are blaringly evident in his interactions with his subordinates and colleagues. Take the case of Stephanie Whitley, with whom he shared a very close relationship. In his haste to recruit Doyle, Fletcher completely overlooked the act of taking Stephanie into confidence. The lack of consent and thought for how he would fit into the company’s culture and moreover how he would gel with Stephanie Whitley became evident when tension grew between Doyle and Whitley. At a time when both Whitley and Doyle should have provided inputs to each other in their work, most of their time was spent and therefore rendered unproductive in ego-trips rather than on focusing on their work. To make matters worse, Fletcher failed to resolve the conflict by taking a passive approach. In fact, Fletcher admitted that he did not actively try to resolve the conflicts which culminated in it being stretched all the way till one of the affected parties – Doyle left the firm. In his methodology of approaching people problems, David Fletcher has exudes callousness. At some plane, it just seems as though Fletcher does not aim at forging relationships with his team members but just tries to leverage their skills and synergies to achieve his final outcome – performance of his portfolio. Fletcher’s callousness is evident in the way he hypothesizes Whitley’s problem as being one of requiring more attention. Fletcher’s attitude caused him to lose credibility with Whitley to such an extent that she did not even confide in him about her decision to quit the job at Fletcher Jenkins partners. Also, in his handling of Doyle, the new associate, Fletcher exudes a certain degree of inflexibility. Doyle, according to the case is excellent in his job at managing portfolios of large Hi-Tech product companies. Even as he joined, Doyle started to research upon stocks of emerging stocks in the same market. Obviously, Doyle was unsuccessful at the beginning because of a probable longer ‘unlearning curve’. It is evident that Fletcher allows Doyle to move on in a bid to retain Whitley, however the situation could have been better handled by firstly resolving the personal differences and thereafter by infusing some confidence in Doyle – In that way Fletcher could have retained both his critical employees. Can we see any positives from Fletcher’s behavior thereafter? Yes. In a bid to learn from his past mistakes, Fletcher does try and make a conscious attempt to get new employees acquainted with his existing team before recruiting them. As is evident during the discussions on recruiting Mary Robinson, Fletcher actually has Rachel Kindred meet Mary Robinson in person at Boston. This, he presumes, shall allow them to reach to an understanding of each other as persons before establishing their compatibility as colleagues. Even in this case, however, he does not use the same procedure of recruitment with Robert Fiske. The case is left open-ended at this point, so it might not be an argument one can convincingly hold against Fletcher. What can we learn from this case, Is this practically feasible? This case, in itself is an excellent example of how callousness towards understanding people’s problems can end up disrupting the performance of a team. I hail from a successful Sales team in the IT sector. From personal experience, I can attest that it is usually not feasible to take the entire team into confidence before the recruitment of a new team member. However, broad level interaction issues – such as the one witnessed in the case can definitely be addressed at the outset. Secondly, I believe that the efforts taken to recruit a team member or to build a team are directly proportional to the criticality of the task carried out by the team. I have witnessed this factor at my workplace and this was evident in the case as well. In my experience, I have witnessed that during the recruitment of a candidate for the role of a business development manager, prospective candidates were actually flown down to the UK at my company’s expense. This role was obviously highly critical for our company’s prospects and the efforts taken by the company were commensurate to the same. In the context of the case, it is interesting to note the background of David Fletcher. He happens to be a Portfolio manager. As a part of his core job itself, he is responsible to pick multiple stocks by looking at their behavior. In totality, his job is to pick up such stocks that would be completely synergistic and thereby build a winning/high performing portfolio. If a direct analogy is drawn to the way Fletcher picks his team, this is the base principle on which he should have picked his team as well. It is only on recruiting perfect complements in his team that Fletcher could have ensured a synergistic performance in his team. Why is this case relevant to me as a person? I wish to embark on a career in financial services wherein I might be assuming a role similar to that assumed by David. It is said that â€Å"If you wish to go quickly, go alone but if you wish to go far, go together. † To go together effectively, it would be imperative for me to contribute towards building a strong team. For this, I would not only have to trust my own instincts but would also have to trust my team members and enable them to realize their self worth. Effectively, it is only when the self interests of team members are aligned with the team interest, that a team is successful.

Friday, September 27, 2019

Value based purchasing Essay Example | Topics and Well Written Essays - 500 words

Value based purchasing - Essay Example This situation where we need to provoke health care employees to serve clients should change and they should voluntarily provide best care to their clients. Here, we intend to prove that, value added purchasing need to be eliminated as this destroys the commitment and voluntary assisting nature of health care employees. Logically, it is arguable that, the idea of permitting bonus to the health care employees to provide quality health care is non beneficial for the employers of health care industry. As pr (Porter)â€Å"Value based purchasing is, however, a critical external motivator in establishing a business case for why providers of care should embrace, leads, and implements the reengineering of healthcare delivery†. From a logos concept, health care professionals need to be concentrating solely on the idea of providing the best health care treatment to their clients as it is the ethical law of their duty When it comes to ethos, the focus is on the policies and statutory laws of the health care professional and industry. A health care provider, especially the nurses, by the nature of their professional law is liable to perform quality service as they work on ethics and moral standards. As per (Butt) â€Å"Historically, a primary value consideration in nursing ethics has been the determination of the focus of the nurses’ work†. On the other hand, the pathos concentrates on the emotional background, where the health care professional needs to understand the pain and suffering undergone by their clients and serve them with utmost care. The allotment of bonus to the health care professional is in real sense, blocking the development of their commitment to the job. Ultimately there is no need of a plan for quality service by health care professional as the job by its nature itself demands high quality. Today health care industry is a wide spread business, where the employers attempt to earn profit in a short cut manner. According to (Mathews)â€Å"Hospitals are

Thursday, September 26, 2019

SATURATION ANALYSIS OF D2 DOPAMINE RECEPTORS EXPRESSES IN RECOMBINANT Essay

SATURATION ANALYSIS OF D2 DOPAMINE RECEPTORS EXPRESSES IN RECOMBINANT CHO CELLS - Essay Example The experiment was successful in the sense that the inhibition constant for [3H]-spiperone at around 0.5 nM corresponded with that quoted in literature available on the subject. The experiment demonstrated that [3H]-spiperone is a very efficacious antagonist of dopaminergic activity in specific relation to receptor subtypes with very specific inhibition capabilities and very low inhibition constant. This may later prove valuable to drug development against disorders like schizophrenia that is caused by excessive dopaminergic activity. The variations in physiologic actions of dopamine are mediated by at least five distinct G protein coupled receptor types (Missale, C., et al, 1998). Kebabian and Calne (1979) distinguished two dopamine receptor types - and - that can be differentiated ‘pharmacologically, biologically, physiologically and by their anatomical distribution’ (Civelli, O., 2000). Since the analysis is on receptors only they are being discussed here. Subsequent cloning of receptors revealed that they belonged to the supergene family of the G-protein coupled receptors (Civelli, O., 2000). The three subtypes belonging to the -like sub-family are the, and ones that inhibit adenylyl cyclase and activate channels (Missale, C., et al, 1998). The genetic structure of the and vary by tissue types and species’ through alternative splicing. The subtype is highly polymorphic. Since the analysis is on receptor activity on recombinant CHO (Chinese hamster ovary) cells it is necessary to point out that-like receptor activity in the peripheral regions is evident mostly in the kidney, vasculature and pituitary where they affect sodium homeostasis, vascular tone and hormone secretion (Missale, C., et al, 1998). More specifically the analysis of the gene structure of the subtype reveals that there are six introns in the receptor-coding region. This generates two main variants – the (short) and (long) receptors – in turn

Case study Example | Topics and Well Written Essays - 500 words - 75

Case Study Example This a big problem because when such data is shared and introduced over a network it usually becomes easy for an attacker to gain delicate information like credit and debit card numbers, passwords that is previously stored in our operating systems. Another issue that comes is that the operating systems provided by Windows do not supply dependable firewalls to prevent the hacking of our operating systems. And another problem is the security policies provided by the Windows operating systems. The security standards that are already provided are not good and the safety policy settings and the password schemes are not strong and are quite vulnerable. The data encryption by the Windows operating systems is also not good and is quite feeble and also there are no tough encryption schemes or standards in place. (Gibson, 2011) These issues and problems can become a problem for us as the information of our company, the company’s employees and the company’s customers are at a risk and if any information is leaked than it might become a problem for us and disrepute our company. I have a got a few good ideas that can make the company overcome these issues and problems with ease. Windows has already faced such problems in the past and has up graded there latest operating systems overcoming these problems and issues. There latest server version Windows Server 2008 RC2 includes many solutions for such problems. These solutions and upgrades are very impressive and I have already tested them with my own self and believe that the company should also upgrades it’s operating systems and servers in to this current operating thus making the company’s, it’s clients and its employees important data to be secure. The upgrades in the server include the Server Manager for managing security components. This upgrade provides help for managing, installing and configuring server roles and the features that are

Wednesday, September 25, 2019

Joe Salatino research paper Example | Topics and Well Written Essays - 1750 words

Joe Salatino - Research Paper Example Every organization’s behavior is impacted by the customer’s perception. Perception refers to how an individual comprehends the world they live in and what is comprised in that environment. Personal perception is the kind that is pertinent to a salesperson when they approach a customer. The attribution theory proposes approaches to create vindications to assess people because people have different reactions in situations. Joe’s salespeople have to understand this theory so as to know, when approach an individual, if the cause of their behavior is internal or external. Internal behaviors are the ones that the individual can control while external behaviors are beyond a person’s capability to control. People have perceptions whose source can be positive or negative past experiences. A salesperson has to be patient and avoid making fast judgment and conclusions about a perspective customer. This will be denying the customers a fair chance in their decision mak ing. There are various ways that people form perceptions. The examples are the halo effect, stereotyping, the contrast effect and selective perception. Selective perception is when a trait or characteristic makes a product or situation stand out. The halo effect happens when conclusions are based on one characteristic. The contrast effect is based on past experiences. In order to acquire a customer, the salesperson has to identify potential customers. Telemarketing has been mentioned as a method of identifying the customers. Establishing a solid rapport is crucial for the salesperson for it helps them to know the needs and requirements of the prospect and know if the products offerings can match with these needs. It also helps know if there are other unmet needs and can therefore, be a source of information on possible changes or innovations to be made by the organization. Joe’s employees have seemingly done a superb job in maintaining customers. The challenge remains in unde rstanding how they form perceptions and attributions. A successful sales representative is an excellent listener to a prospect and gets to listen to their feelings and opinions on the products being offered. Customer perception is undoubtedly mandatory in customer retention. How customers form a perception on the business, will be determined about their past experiences. How the products they used turned out to be, how they were treated previously by the salespeople, the services and prices of the organization. To understand how they form their perception, it is essential to hear out their voice regarding the business. This can be done by conducting interviews, administering questionnaires and carrying out surveys to find out what they think about the company. In understanding how they form perceptions, the employees will be able to build relationships and trust effectively with customers. Joe Salatino as the president of the company has the responsibility of directing his employees so that they can work towards achieving the overall objectives of the firm. By the employees understanding how people make perceptions and attributions, they are able to know how people create a sense of the immediate world they live. Understanding them will help in providing products and services exactly how they want it, and these will guarantee profits which is one of the company’s most fundamental goals. By doing these, they are enabled to attain cognitive

Tuesday, September 24, 2019

Business Proposal Assignment Example | Topics and Well Written Essays - 750 words

Business Proposal - Assignment Example As a company, Samsung is more of a market follower because it does not pioneer any product but only innovates existing products to make it better and cheaper. The classic example is the smartphone industry whereby Samsung was not its pioneer but is able to dominate the market. This demonstrates Samsung’s ability to adapt to market conditions and dominate it. At present, Samsung dominates the smartphone industry seconded by Apple. The industry may be very competitive with several players vying for market share but the majority of the market share is occupied by Samsung and Apple with other players only having a tiny fraction of the market. The two players, Samsung and Apple also dictate the price of the industry. Such, albeit there are several players in the industry, the smartphone industry can still be considered as an oligopoly because only two companies control and dominate the market. Oligopoly is a market structure dominated by few firms (www.economicshelp, nd). The other players such as Sony, Nokia, NEC and Lenovo has very little influence in the market although these companies are introducing their own innovations, they were however not significant enough to reverse the trend in the smartphone industry as dictated by the two major players. One aspect of the smartphone industry that makes it an oligopoly is the huge amount of resources needed to enter in the market. There resources are not only limited in monetary terms but also in human and intellectual resource. These serve as a barrier to entry that only very few firms can join the industry making the market structure as oligopoly. Information about the products are also tightly guarded as industrial advantage and are considered as a competitive advantage honed by research and development. Research and development is one of key characteristics of Samsung that enabled it to dominate the market even if it is just a market follower. The company was not even a significant market player in

Monday, September 23, 2019

Biography on Harlem Renaissance Research Paper Example | Topics and Well Written Essays - 1500 words

Biography on Harlem Renaissance - Research Paper Example The most peculiar aspect of the Harlem Renaissance was that it was ushered in by African American thinkers, artists, writers and musicians who evinced a prominent predilection towards the quintessential African American culture and heritage (Kramer & Russ 10). Harlem Reniassance was particularly marked by a distinct shift towards a self confident and strongly embracing notion of the racial pride and ethnic identity, which metamorphosed into remarkable cultural, artistic and literary achievements (Kramer & Russ 47). Harlem Renaissance evinced an effervescent and zealous interest in the black history and cultural moorings amongst the African American middle class. One of the salient objectives of the Harlem Renaissance was an honest portrayal of the African American talent and heritage through art, literature, music and thought. The objective of the central ideals eschewed by the Harlem Renaissance was to attempt a serious portrayal of the overall African American experience in its tot ality. The aim was to resuscitate and rescue a deliberately impaired collective psychology and to remould and revive a social perspective that got utterly warped over decades (Kramer & Russ 47). Harlem Renaissance had a marked influence on the African American musical heritage and the jazz music of the era flouted the conventional notions to voluntarily opt for improvisation and syncopated rhythms. Harlem Renaissance and Music It goes without saying that no one single aspect of the Harlem Renaissance played such an important role in influencing and shaping the American and world cultural landscape as the Jazz music (Wintz 183). Strongly favouring improvised solos and syncopated rhythms, the Jazz music of those times tended to be strongly averse to the many established musical conventions (Wintz 183). The composer of those times commanded such a strong following that people thronged in on a continual basis to listen to and appreciate their compositions. Yet, the remarkable thing abou t these compositions was that owing to a strong bend towards improvisation, no two performances of a single composition tended to be same. The musicians and singers of the era not only revived and invigorated the jazz music, but played a pivotal role in shaping and consolidating many new musical traditions. The musicians of those days played a major role in transforming the African American music and culture. The breath taking and engrossing pouring of the remarkable jazz compositions rendered by the musicians and singers of the Renaissance, happened to be a direct and emphatic expression of the hardships and travails faced by the African Americans in a racially divided South and an utterly severe urban North (Wintz 183). Harlem Renaissance attracted the public attention towards a musical tradition that would have utterly been lost or never contrived. In that context the Harlem Renaissance popularized the musical style of the African Americans amongst diverse cultures and racial gro ups. The salient composer of the era blended the poetry contrived by the African

Sunday, September 22, 2019

Emily dickinsons nature poems Essay Example for Free

Emily dickinsons nature poems Essay Emily Dickinsons use of nature imagery in her poetry incorporates elements of both romanticism and realism. These usually contrasting visions allow Dickinson to express a duplicity of perception, a duplicity which can be considered as a part of nature itself, as expressed through human consciousness. Although the overall impact of Dickinsons nature imagery is romantic and reveals perception of nature as a mode of transcendence, the imagery and diction of Dickinsons poems also establish a convincing realist tone, which separates her work from strictly transcendentalist nature-poets such as Emerson or Thoreau. It is not difficult to pinpoint individual poems by Dickinson where nature emerges as an obvious transcendent force. Her poem #214 I Taste a Liquor Never Brewed (Perkins, 990) utilizes an obvious metaphorical dynamic: the speaker of the poem is drunk on elements of nature: Inebriate of Air am I / And Debauchee of Dew (Perkins, 990) and the exuberance of the speaker is meant to be both humorous and extreme. The poem strikes a comic tone, due to Dickinsons belief that the comic or humorous is no less serious than the tragic (Eberwein 150) and in her mind, the depths of human existence could never be climbed, would never be plumbed, without a humorous attenuation to the world (Eberwein 150). The humor in poem #214 is meant to emerge from the irony of a speaker blatantly celebrating their drunkeness. Despite the poems comical overtones, the theme of the poem is, in fact, quite serious. The poems theme is that nature is a gate through which ecstacy is reached. The true irony of the poem is that liquor is superfluous to true ecstacy; all that is needed is nature itself. In this way, Dickinson is casting a criticism on her societys reliance on artificial stimulants. Nature will endure where actual liquor runs dry: When `Landlords` turn the drunken Bee/Out of the Foxgloves door /When Butterflies renounce their `drams` / I shall but drink the more! (Perkins, 990) The seriousness of the poems theme is in the implied isolation of the speaker, who is acknowledged only by the Seraphs and Saints (Perkins, 990) who watch the little Tippler / Leaning against the Sun - (Perkins, 990). It is impossible to escape the feeling that Leaning against the Sun (Perkins, 990) is a dangerous position even fro an ecstatic poet; so while the poem demonstrates transcendence, it also expresses isolation and alienation. By contrast, Dickinsons poem # 328, A Bird came down the Walk (Perkins, 995) begins with a sense of alienation and rigid realistic description and opens toward the end to a transcendentalist vision of nature. The beginning line describe how a bid hopped on the speakers walk and bit an Angleworm in halves (Perkins, 995). The poets observation that the bird ate the fellow, raw, (Perkins, 995) suggests anything but a transcendental vision of nature. rather, the scene evokes a stark, biologically precise depiction of natural processes. Nevertheless, a duplicity of perception is hinted at in the following lines And then he drank a Dew /From a convenient Grass / And then hopped sidewise to the Wall/ To let a Beetle pass (Perkins, 995) where the previously predatory scene gives way to one of civility and calm. The duplicity of perception is extended by the phrase Like one in danger, Cautious (Perkins, 995) which may modify either the preceding He stirred his Velvet Head or the following I offered him a Crumb, hence either the bird or the speaker or both (Eberwein 85) and, as such, admits an ambiguity into the poems diction which is foreshadowed by the imagery. This ambiguity is not quite resolved, but merely turned toward an image of transcendent nature in the poems closing lines: Too silver for a seam /Or Butterflies, off Banks of Noon/ Leap, plashless as they swim (Perkins, 995). Whereas poem #214 began with a blatant expression of intoxicated transcendence and ended with an ambiguity of isolation and alienation, poem # 328 begins with a sense of alienation and even violence,but resolves in a harmonious, transcendental uplift of diction and imagery. Obviously, Dickinson aim in her poetry was to represent the duality of human perception and the duality of the natural world which can be resolved in aesthetic expression, but not by methods based solely on rationalism or realism. Works Cited Eberwein, Jane Donahue, ed. An Emily Dickinson Encyclopedia. Westport, CT: Greenwood Press, 1998. Perkins, George; Perkins, Barbara. The American Tradition in Literature 11th Edition 2007

Saturday, September 21, 2019

The Benefits Of Music Education Education Essay

The Benefits Of Music Education Education Essay Imagine yourself waking up in the morning to your iHome playing a song from one of your favorite playlists. While you are getting a shower, preparing yourself for the day, you start to sing a song that has been stuck in your head for days. As you are driving to school, your favorite radio station plays a continuous set list of the popular songs by your favorite artist that you enjoy listening to so much. You and your friend both meet up to talk about how many times you both have listened to the new Lady Gaga single. Because of your common interest in music with your best friends, during a free period all you are able to discuss is music and what your favorite songs are. Even while you are leaving school later on that afternoon, your favorite station is playing yet another smash hit. Something that is highly essential to everyday lift must be understood, and utilized, as frequently as possible. The positive effects of instrumental training as well as aural training, in the younger gen eration, have been widely acclaimed. Therefore, these components to an individuals development should be carried throughout all levels of secondary education in order to offer a well-rounded artistic and musical appreciation that will be of great aide to the student during their present lives and continuing through later adulthood. Out of the fine arts programs, music education is most beneficial to all aspects of an individuals development and should be made available to students.In order for a student to truly enjoy the value of precise musical training in the secondary levels of education, the several benefits of this specific training must be first established. Music education is a creative outlet for adolescents to be passionate, emotional and heartfelt. Music is a way for students to express themselves, and in a greater focus, the emotional benefits that it provides for them. Many adolescents used music as their creative outlet from the academic and social pressures of middle and high school life along with the added stress and pressure caused by home life and family authority. Music is an expression of the heart (Girl, age 15), Music is awesome! Thats what makes my world go round! (Girl, age 13), and the shouted message I LOVE MUSIC. ITS A WAY TO EXPRESS MYSELF! (Boy, age 14) were all commentaries taken from essays on music and what it means to the students. (MENC 6). The overall concept that had emerged was that the art of music education provides students with the freedom to just be who they are, whether that is to be different, be a person they had no idea they could become, to be accepted and feel at ease and stress free in school and through their everyday lives (MENC 7). Students have noted in academic essays that music was a greater source of a get-a-way for them. A typical answer came from a girl who stated When I am angry or everything seems like its spinning out of control, I write a song. It calms me down and gets my feelings out. As for another student who stated that The only way for most teenagers to express their angerà ¢Ã¢â€š ¬Ã‚ ¦ in a nonviolent way is through music. Music also can act as a coping mechanism for an adolescent who is dealing with the pressures of society, family life, and the aspects of friendships and social status. Song lyrics are realized as a message that act as a hope, that you do you not need to feel alone b ecause people have experienced the pain and struggles that you are feeling. Students have wrote and explained that music was a great factor of coping for them, and without it being present in their struggles, it would not of been possible to endure the struggles and obstacles of the teenage life. As well as the emotional benefits which music has to offer to teenagers, it also has social benefits which are essential for social interaction and influence of peer pressure.Secondary students, who participated in band or orchestra, reported the lowest lifetime and current use of all substances (alcohol, tobacco, illicit drugs.) (CMW 1). On the same side, the MENC newsletter also stated that Students spoke of musics social benefits in relation to its function as a distraction from involvement in spurious activity such as drugs, alcohol, smoking (cigarettes), gang life, and promiscuous sex-in their own lives or in the lives of adolescents in general.(MENC 8). Music has a strong influence on teenagers and also has the ability to deter teenagers from suicidal tendencies, by allowing the singers and instrumentalists meaning in their young lives. Being involved in orchestra, band or even choir, provides students with the means of interacting and meeting new people, along with creating ne w and lasting friendships. Being involved in musical ensembles allows a person to step outside their comfort zone and interact with new people. It also enables a student to feel secure within the group. Images of families have been chosen to illustrate this feeling of security that they were experience as the result of taking part in the musical ensembles at their school including: band, orchestra or choir. Along with the numerous benefits that music provides an adolescent with, it also has an impact on how a persons intelligence and development is affected. The question of Can music make us more intelligent, is in the process of being explored in a series of ongoing experiments under the supervision of Frances Rauscher of the University of California, Irvine. In 1993, it was noted that, in contrast to students who merely sat in silence or listened to relaxation instructions, thirty six college students who listened to only ten minutes of Mozarts Piano Sonata K.448 successively experienced a substantial growth in their spatial IQ scores. Another experiment was conducted later on this year, using seventy nine students and additional test situations, which confirmed that the Mozart Effect is without a doubt a real phenomenon. Last year, a pilot study was conducted by a group of researchers where a group of three year old children were given music training, whether it was singing or keyboa rd lessons. The scores of each individual child improved significantly on the Objects Assembly Task, which was a section of the Weschler Preschool and Primary Scale of Intelligence-Revised that could measure the spatial reasoning of a child. According to the results which were found at the American Psychological Associations annual convention, it was reported that the results of a follow-up experiment which concluded that the spatial reasoning performance of nineteen preschool children who received eighteen months of music lessons greatly exceeded that of a comparable group of fifteen preschool children who did not receive music lessons (Rauscher 1). Because it draws on various attributes, music develops flexibility in thinking. Music training is a very effective way, not only to boost the conceptual-holistic-creative thinking process, but to also assist in the melding and merging of the minds capabilities. Although most musical capabilities seem to be represented initially in the r ight hemisphere of the brain, as a person becomes more skilled, capabilities that were stored in the right hemisphere are located increasingly in the left. (Ponter 112). Music is a very noticeable asset in the lives of the youth, and they appreciate its effectiveness in leading the course of their daily routines, along with their long-term hopes and dreams. During a free-flow of ideas, students in American secondary school wrote into their essays their individual reflections of musics roles and meanings for them in their academic studies at school and in their involvement beyond school, not only as performers but as composers and listeners as well. (MENC 11). Some of these students wrote with very cultured vocabulary, while other individuals wrote as if they were talking to a friend through an informal chat application. Each student described music as a knowledge area and an enormous set of skills that bring together their notational literacy, listening awareness, motor ability, eye-hand coordination, and rational hold of musics meaning in the past and in society. (MENC 11). The performance skills of instrumental and vocal nature, were described as g oals to be attained by musical study, and the sense of achievement and superiority that music education had given students, allowed them to progress their skills while performing a various range of musical repertoire and committing to the score, not only melodically but stylistically as well. According to essays that were conducted in American secondary schools, students desire more study of their specified area that is pertinent to their needs, interests, and appropriate rehearsal spaces. However, a few of the same students also wrote negatively about their emotions, while some spoke passionately of their needs of more musical study in school, lack of proper rehearsal space, appropriate practice time, and instruments that could be made available for use. Students are highly particular when it comes to the extracurricular activities which they are involved with. Some students prefer to be involved with things that are beneficial to them and not just activities that are not going to help them in their lives. Some of these students are on the fence of the schools music programs, having once participated in various instrumental and vocal ensembles, but dropped them, would prefer to have curricular developments in the study of popular music styles, including rock or pop music ensembles which could be taught by music teachers and professional musicians. For these students, the typical jazz ensemble was simply not cutting it for them. Even within the scope of what should have been an invitation to adolescents to describe the favorable assets of school music programs that should not be BAN-ned, these programs may not yet be fully in touch with the needs of a considerable population of young people in secondary schools. (MENC 11). The lack of student participation in musical ensembles is due to their self-consciousness of being labeled as band geek. Most students in high school have this notion in their head that if they play an instrument such as the clarinet or trumpet, they will be labeled by their peers. On the other hand, students do not become involved with musical activities due to the simple fact that the music is not what they would like to be learning. According to the MENC newsletter, it states that Music should be a mandatory course just like Math, Science, and English, in all schools not just high schools. The lack of funding for the arts also has a big portion of influence to what courses are placed into the schools curriculum. Other clubs and activities such as football, basketball, and cheerleading are given greater quantities of funds which are unfair to music departments which are always being questioned for their purpose.

Friday, September 20, 2019

Principles Of Information Security And Governance Information Technology Essay

Principles Of Information Security And Governance Information Technology Essay The progress and expansion of the field of information technology and worldwide network has given birth to the issues like, violation of information security, hacking and virus attacks. Information security governance play vital role in providing regular protection of information from a wide range of threats to ensure business continuity. It helps minimize risk factors, maximize profits, investment returns, and boost the reputation. Virus attacks, hacking and information theft are some of the basic dangers faced by many organizations, and the solution lies not only in the hands of technology but management as well. Information security failure or poor management lead to business and financial loss and reputation damage. I will be shedding light upon the principles, risk factors, privacy threats and then the required strategies, policies and procedures for administration and management of an information security and governance program in my organization. Information Security Governance A structured framework of policies, procedures and authority of handling, sharing and recording information securely and confidentially is termed as information security governance (NHS, 2005). A successful information security governance in an organization ensures the confidentiality, integrity, availability, authentication and identification, authorization, accountability and privacy (Whitman and Mattord, 2009, p. xvii) of information and data related to security and reputation of an organization. Information governance in an organization requires teamwork, where all the staff members are aware of the importance of the confidentiality of information. This framework makes sure that the information and data is secure with accuracy and also that the information are shared and recorded in compliance with all the legal and lawful procedures and proper set of rules and guidelines (Simmons, Scott, et al., 2006). Information security governance compliments the Information technology and corporate governance and is an important segment of both. Most of the companies in order to provide a contemporary environment to the information system of governance are using internationally recognised frameworks like; COBIT and ISO 17799. The Control Objectives for Information and related Technology (COBIT) is a framework designed in 1992, by the IT Governance Institute (ITGI) and the Information Systems Audit and Control Association (ISACA). This framework works for the IT management in implementing and developing the Information security governance on a wider platform. It includes the threat analysis, risk assessment, cost estimation as well as countermeasures and future (Solms, 2005). Figure 1 : Proposed Integrated IT Governance Framework (Dahlberg and Kivijà ¤rvi, 2006). Figure 1 shows a proposed integrated IT governance framework. A successful information governance structure builds on the integration between the structural and processes perspectives of IT governance, business-IT alignment, and senior executives needs (Dahlberg and Kivijà ¤rvi, 2006, p. 1). The framework requires the involvement of the management board, executive and subject steering committees, service delivery teams and all the staff members related to the networking, systems, applications, desktops and cross functional works (Richardson, 2010, Q 3). Implementation and administration of IT security are carried out by the Information security management of the organisation which help identify the levels of requirements. Information security management follows a methodology or framework which include top management commitment and information security policies (Ghonaimy, El-Hadidi, et al., 2002). Information security governance ensures that the information security management establish, implement, monitor, and review these procedures and policies in order to meet the business objectives of the organization (Pironti, 2008). The Information security team is responsible for handling security issues regarding the safety and confidentiality of companys information and data protection. It also helps maintain the integrity and availability of information. Information security management deals with the security team, organisational culture, change management, assessment risk factors, people and risk behaviour. It is responsible for the deve lopment of strategies, policies and procedures to reduce threats, risks and attacks. The Security team presents to the management team the security analysis, reviews and implementation plans (Parker, 1981). Information Security issues and risk factors A hack, a virus or a denial-of-service attack may have the effect of halting business operations (Ross, 2008, p 1). The main dangers faced by many organizations include, identity theft, leakage of personal information, data manipulation and modification and improper access to security passwords and secure areas. Widespread IT security risks include; malware, hacking the system, terrorism, extortion, people and non compliance behaviour of the staff and mangers. These dangers can affect the overall reputation of the company and stakeholders become concerned. Main losses and threats include; loss of Confidentiality, integrity, availability, authenticity and reliability of information, which require protection (Stoneburner, Goguen, et al., 2002). Confidentiality threat means the unauthorised access to secure information. The breach of confidentiality can occur in number of ways, like the absence of the screen savers on the personal computers and laptops would invite dangers like leakage of data information as staff members or any external visitor with bad intentions can easily access them. Similarly, the post-it notes with id and passwords reminders would pose the same violence of confidentiality. Secondly, the direct access to the server room key would be like inviting security theft and accessibility of the unauthorised person (Stoneburner, Goguen, et al., 2002). Integrity implies unauthorised modification and manipulation of data. Unauthorised access implies leakage of important information which could mean that anyone can steal or misuse the confidential information of the company and this could lead to the distribution; alteration and stealing of personal data and identities of key personnel and hacking and virus attacks on the organization secure system. An employee can misuse the data information by changing the main figures, mistyping or deleting important information by accident or on purpose. When members of staff take the official laptops home with unencrypted personal information, this could mean the leakage and distribution of confidential data going in the wrong hands (Stoneburner, Goguen, et al., 2002). Availability means providing accessibility only to the authorised users. Loss of availability of data could be caused by attacks like hacking, virus or hardware failure. Unavailability of system to the end-users could mean for example affecting the productivity time and hence affecting the organisational goals of the company (Stoneburner, Goguen, et al., 2002). There are number of other issues and risk factors regarding information security that can threaten the Information security governance. Lack of professionalism of the employees can generate many high risk issues, for example, sending unofficial emails within the organization indicate improper use of internet, which is wrong and unethical. Plus if someone is incharge of companys high risk or sensitive data information then internet browsing or emailing can easily invite virus attacks or hacking. Information Security Strategies, Policies and Procedures These risk factors and security issues require proper security policies and advanced framework. Although the HR department already possess a set of security policies and procedures but they are seldom implemented. The information security governance program works with the risk management program with strategies, security policies and procedures to work effectively in providing a completely secure environment. Information governance ensures application of all the security policies (Nagarajan, 2006). Risk analysis is very important before implementing information security rules, strategies, policies and controls. Risk analysis forms the basis of risk management system. Implementations of information security in an organization comprise six major activities: Policy development, understanding roles responsibilities, suitable information security design, regular monitoring, security awareness, training and education. Now in order to achieve reliable information security essential elements of control within the organization is required. Security controls include technical and non-technical controls. Technical Control Technical control provides logical protection by implementing protective software into the system. This includes; access control mechanisms, identification and authentication mechanisms, data encryption, access control list and intrusion detection system, plus other software and hardware controls. Computer security can be achieved by creating strong passwords, updated anti-viruses anti-malwares, firewalls, screen savers, proper encryption and creating backup files (Stoneburner, Goguen, et al., 2002). Keeping in minds that the passwords should be strong and well protected and employees must not share them with anyone and these passwords should be changed periodically. Organisations must have incident response procedures which include the backup generators for electric failure and off-location data centres in case of natural disasters or accidents. Non-technical Controls Management control include management and administration of security policies, operational measures, risk assessments and training and education. Management control is responsible for educating staff members to guide them in handling the case sensitive data and information through a suitable security awareness program. HR team should conduct a proper background check on the employees and especially on the ones who are incharge of handling confidential information in addition to providing proper training to the staff members. The administrative control should also inform employees the UK legislation and laws of data protection that are in place. Internet threats can be handled by educating staff member and creating an awareness of confidentiality, prohibiting web browsing, chatting and useless emailing within the computers containing confidential information and downloading software from unknown or unprotected sources. Moreover, their level of computer literacy must be analysed in or der to identify their capabilities in handling information. It must also administer the authorization and re-authorization of the system (Stoneburner, Goguen, et al., 2002). Security awareness program should provide security training and must also analyse the level of computer literacy in each employee. Information security officer must administer and implement information security awareness program, which should include providing training and awareness to the senior management, staff and employees involved in handling data information as well as educating the end-users or the clients. Involvement of all the users within the organisation is essential (Ghonaimy, El-Hadidi, et al., 2002). Operational control include physical control and environmental security. It plays a vital role in implementing administrative and technical controls. Operational security ensures the quality of electric supply, humidity, temperature controls and physical facility protection system. Some examples include; backup generator, physical intrusion detection systems like alarms and motion detectors. This system also monitors and controls physical accesses to the secured areas, some examples include; locks, doors, cameras, security guards and fencing (Stoneburner, Goguen, et al., 2002). The HR department should provide security awareness training to the staff members and must make sure that when appointing a new employee, the contract of employment must include the security policies and procedures. These security controls should be revised and renewed annually in order to achieve successful information security. All these essential controls and security awareness program must be implemented by the Human Resource department. Information security culture Peoples behaviour and attitude towards their working atmosphere forms the organisational culture of the organisation. Information security culture evolves from the behaviour and attitudes of the people towards confidentiality, integrity and availability of the organisational information and knowledge. It includes people, training, processes and communication because the inside behaviour poses a more serious threat to the security of information than outside behaviour (Ghonaimy, El-Hadidi, et al., 2002, p. 204). It is therefore essential to understand and analyse the organisational and corporate culture of the organisation as well as the need to change the security culture within the organisation. Threat analysis would indicate how much the organisational culture contributes towards the violation of security and it should be changed accordingly by educating staff members (Ghonaimy, El-Hadidi, et al., 2002). Figure 2 describes a proposed information security culture in an organisation. Figure 2 : A proposed information security culture (Ghonaimy, El-Hadidi, et al., 2002). A healthy security culture is achieved when people in the environment are trained to handle the clients confidential information securely and are completely aware of the threats and dangers around them regarding information theft; hacking and virus/malware attacks and they should be trained to handle these situations with confidence and responsibilities (Richardson, 2010, p. 3). Information security culture can change the organisational culture in a positive way. For example, the staff must understand that if servicing or repairing is required than this should only be handled by an authorized person. Security culture depends upon the managerial attitude, including the top management, security awareness and training and awarding of security conform behaviour (Ghonaimy, El-Hadidi, et al., 2002). Risk Management System However, the information security policy alone cannot be counted upon to effectively eliminate these threats because it narrowly focuses on the use of technology to mitigate threats as the nature of threats and attacks have changed to become highly targeted, highly effective and nonadvertised (Pironti, 2008, p. 1). Therefore a proper risk management model is compulsory. The ever changing faces of attacks and dangers on the information security require proper risk management system which must be understood and supported by the senior management and business leaders of the organization, to identify and finalize investment levels utilizing proper information protection and risk management capabilities. Moreover, regular reporting is essential to demonstrate the effectiveness of the Information Risk management practices. This model will definitely improve the efficiency of the information security team in following the Risk management teams decisions, which is made by the higher officials, who can have the valuable approach towards information infrastructure and can make these decisions effectively. The corrective approach of a successful risk management program depends upon the presence of a single team leader (Pironti, 2008). Information risk management program helps in characterizing and analyzing whole system of companys information highlighting risk factors and information infrastructure. It combines individual functional capabilities into one single well managed and well oriented organization enhancing business strategies. It increases the efficiency of security teams. It produces a bridge of confidence and communication between the team and the leaders. This program provide protection against wide range of threats in terms of security theft not by limiting access but by evaluating appropriateness and requirement of extent of that access, which in turn does not stop an organization to achieve their targets (Pironti, 2008). Conclusion In order to achieve a level of satisfaction in terms of confidentiality, integrity and availability of companys case sensitive information and data protection, reliable information security governance is required. This framework must include the implementations, renewal and revision of the strategies and policies within the organisation, understanding the need to change the organisational security culture and monitoring and management of the information security team with the supervision of the top management. However with the expansion of global network day by day, there are major risk factors of viruses and malware which require a risk management system as well. These policies, strategies and procedures must be implemented through the HR department including hiring and training of security officers and staff members with the approval of the top management. Appendix A: Summary of the paper presentation Key Elements of an Information Risk Management Program As part of our MSc assessment we were asked to take part in a paper presentation on the key elements of an Information Risk Management system based on a paper written by John Pironti, which was published in 2008 in the Information Systems Control Journal, Volume 2. Information security has become more challenging with the ever-changing and evolving faces of threats in the information processing. The adversary creates a new threats as soon as the defender develops and implements the defensive controls. The defenders get affected by the ethics, rules, knowledge, time, and lack of investment and resources. The adversaries can only be defeated by a suitable Risk management approach by using available assets, resources and potential. Policies, procedures and processes complemented by technology prove far more effective in mitigating security threats than the technology alone. Information security only relies upon the technology to create defences against threats that can easily be downloaded or purchased. The reason is that these components require proper implementation and operation. The organizations Information Risk Management approach identifies which information to protect and the level of protection required to align with organizational goals. It must be understood and supported by the senior management and business leaders of the organization, to identify and finalize investment levels utilizing proper information protection and risk management capabilities. Team Structures in most of the companies today have segregated leaders with the title chief, which is of no significance as the main chief has limited access to the senior positions and business strategies. In order to meet current challenges, all these independent capabilities must be united on a single platform as Information Risk Management program. Information Risk Management Program helps in characterizing and analyzing the whole system of companys information highlighting risk factors and information infrastructure. It combines individual functional capabilities into one single well managed and well oriented organization enhancing business strategies lead by the Chief Risk Officer. The leader becomes the focal point to produces a bridge of confidence and communication between team and leaders regarding all communications about risk identification, mitigation and management. This program provide protection against wide range of threats not by limiting access but by evaluating appropriateness and requirement of extent of that access, which does not stop an organization to achieve their targets. This team leader has regular access to higher officials to provide them correct and update information regarding risk factors and business strategies. Key performance indicators are essential measurement tools for the performance of a business function, process or capability. These indicators need to be assigned thresholds to ensure that they are working within normal limits. The key elements of risk management program include; presence of a Chief Information Risk Officer, Information security, Physical security, compliance, privacy, financial risk, market strategy risk, business operations risks, risk methods, practices, key performance analysis effectiveness, cultural awareness, training, communications, strategy governance and risk oversight board and committee. Information Risk Management serves as a mature progression of information security. The Risk management program structures the Risk management, utilizing existing capabilities and provides a 360 degree holistic view of security risks within the organization. Appendix B: Discussion generated from the paper presentation Q. What do you mean by the holistic view of risks that affect productivity and success? A. A holistic view implies focusing from a high perspective and ensuring that all the organisational requirements are met with relevant policies, processes and procedures complimented by technology rather than certain technical area on which the information security team focuses on. Q. How would you convince the businesses that such a wide model of Risk management program can get implemented with the requirement of so many resources? A. This program probably applies mostly to the larger organisations with more number of people involving different levels so that they are able to map on this new mature model, explaining the benefits and understanding why change the structure of the information governance. Another key element to highlight would be that this model re-uses the existing resources within the organisation. Q. Who decide the key performance indicators in the policy and standards maintained by the Risk Management program? A. Normally it would be something which is discussed by all the actual relevant departments rather than the IT department telling you what your KPI should be. It will be coming from a higher level and senior management. Appendix C: References

Thursday, September 19, 2019

Significance of the Porch in Hurston’s Novels, Seraph on the Suwanee and Their Eyes Were Watching G :: Their Eyes Watching God Seraph Suwanee

Significance of the Porch in Hurston’s Novels, Seraph on the Suwanee and Their Eyes Were Watching God â€Å"She took to inviting other women friends to drop in and they all expressed envy of her porch. It built Avray up and made her feel more inside of things. It was a kind of throne room, and out there, Avray felt that she could measure arms and cope. Just looking around gave her courage. Out there, Avray had the courage to visit the graveyard of years and dig up dates and examine them cheerfully.† (Seraph on the Suwanee 234) â€Å"It was the time for sitting on porches beside the road. It was the time to hear things and talk. These sitters had been tongueless, earless, eyeless conveniences all day long. Mules and other brutes had occupied their skins. But now, the sun and the bossman were gone, so the skins felt powerful and human. The became lords of sounds and lesser things. They passed nations through their mouths. They sat in judgment.† (Their Eyes Were Watching God 1) In Seraph on the Suwanee and Their Eyes Were Watching God, the physical structure of the porch serves to both literally and figuratively elevate its sitters, and becomes an arena for exploring the theme of inside versus outside spaces. Avray’s porch in Seraph on the Suwanee is associated with a higher standard of living and is the envy of her visitors. At first, Avray is unsure about this new, â€Å"outside show of ownership.† (234) Avray is uncertain about her right to belong to this class of folk and as a result feels inner turmoil about whether or not she deserves such privilege. Her initial conflift with the porch mimics her desire to â€Å"[brace] herself to glory in her folks† despite her disgust with their old junk, cracked dishes, and shabby house. Over time, Avray found it easier to rejoice in the comforts of her new life. As she reclined further back into the chaise lounges and cushions of her class, her porch became a place of pride and courage. The use of the metaphor that describes the porch as a throne (and hence the porch-sitters as royalty) reinforces the idea of an elevated social status and its implied protection. Similar to Avray’s porch, Phoeby’s porch in Their Eyes Were Watching God is a social place. Those who sit out on the porch feel free reign to pass judgment on those who walk by.

Wednesday, September 18, 2019

Martin Luther :: essays research papers

The Renaissance marked new interests in the discovery of the natural world through art and the sciences. In art, the discovery of perspective brought a revolutionary realism to painting, architecture, and exploration. This led to the Europeans’ discoveries of new lands, such as Africa, Asia, and the Americas. Because of the Renaissance’s deviance from the thoughts of the medieval age, an opportunistic view of humanity developed. Many began believing that man was capable of doing anything, as long as they had the will.   Ã‚  Ã‚  Ã‚  Ã‚  Society developed a man-centered thought, somewhat departing from the God centered thought of the medieval period. The educated leader, soldier, and artist were revered, whereas the bishop, priest, and monk took a back seat. The artists and humanists of the Renaissance era would help establish this age as one of individualism and creativity Renaissance thinkers appealed to a combination of Christianity and Humanism, by referring to Genesis 1:26 (â€Å"And God said, ‘Let us make humankind in our image, according to our likeness’†) and Genesis 1:28 (â€Å"Have dominion over [earth]’†). Because man is made in God’s likeness and has dominion of Earth, Humanists believed they were divine creations of God living on Earth. The Renaissance helped secularize Europe. Man was now the creator of his own destiny.   Ã‚  Ã‚  Ã‚  Ã‚  The exploration during this era brought more centralized monarchies. The flood of silver and gold made many nations money hungry, as they raced to discover more lands. Also, this era could be considered a scientific one, as Copernicus published his De Revolutionibus, which culminated into the growth of universities. Also, the printing press had created the ability to produce books cheaply and in more quantities. And this was important, as the Renaissance created a literate public eager for whatever was freshly published.   Ã‚  Ã‚  Ã‚  Ã‚  The Renaissance occurred for many reasons. One main reason could be with the dissatisfaction with the Church. There was a shift from group salvation to a more personalized view on life, due to the Humanistic movement. People wanted an individualized way of salvation. The sacraments became devoid of meaning. The papacy lost much of its power, due to the secularization of many cities. People were able to congregate among themselves and discuss ideas and thoughts. Many people noticed the wealth of the papacy. The poor resented this wealth, while the rich citizens envied it. At the same time, the popes were still selling indulgences and high offices. The clergy had become lax and corrupt.

Tuesday, September 17, 2019

Process Strategy and Analysis For Toyota Motors Corporation Essay

Introduction When organizations seek to improve or transform their resources into goods and services, they are, in a way, developing their process strategy in producing their customer and product specifications at lower costs and less managerial constraints. As companies are targeting global markets at present, each organization needs to decide on long-term competitive goals that are strategic in nature. In making these process decisions, managers need to focus on controlling competitive priorities like quality, flexibility, time, and cost to meet the global demand for their products. In having a look at Toyota Motor Corporation’s process strategy, it will be helpful to realize why their decisions for both service and manufacturing processes are successful. By determining the processes that comprise their operations, we will be able to assess if their value chains are managed efficiently and effectively. According to Krajewski et al. (2007), a process strategy specifies the pattern of decisions made in managing processes so that they will achieve their competitive priorities. Also, a â€Å"process strategy guides a variety of process decisions, and in turn is guided by operations strategy and the organization’s ability to obtain the resources necessary to support them†. Thus, a process strategy consists of decisions that help define the value chain. Usually these decisions seek the improvement of processes and they are done most likely when: A gap exists between competitive priorities and competitive capabilities. A new or substantially modified service or product is being offered. Quality must be improved. Competitive priorities have changed. Demand for a service or product is changing. Current performance is inadequate. The cost or availability of inputs has changed. Competitors are gaining by using a new process. New technologies are available. Someone has a better idea. As a leading auto manufacturer in the world, Toyota Motor Corporation sells its vehicles in more than 170 countries and regions worldwide. Toyota’s primary markets for its automobiles are Japan, North America, Europe and Asia. Employing nearly 300,000 people, its headquarters is located in Toyota City, Japan. Their products include passenger cars, recreational and sport-utility vehicles; minivans and trucks. Toyota’s subsidiary, Daihatsu Motor Company, also produces and sells mini-vehicles and compact cars. While another brand, Hino Motors produces and sells commercial vehicles. More importantly, Toyota manufactures automotive parts, components and accessories for its own use and for sale. Toyota has 52 manufacturing facilities in 27 countries and regions (Toyota Website). Process Strategies in Toyota One of the most notable processes that Toyota Motor Corporation had made famous is the Toyota Production System (TPS). At present, TPS is also known for a variety of terms like lean systems or just-in-time (JIT) manufacturing, lean production, stockless production and zero inventories. Cox and Blackstone (1998) defined lean systems as â€Å"a philosophy of production that emphasizes the minimization of the amount of all the resources (including time) used in the various activities of the enterprise †¦Ã¢â‚¬  Lean systems thinking was initiated and developed as the TPS. It was Toyota’s vice president Taiichi Ohno who pushed for the TPS beginning in 1937 when he discovered that labor at American manufacturers was nine times more productive than labor at Japanese manufacturers (Monden 1983, p. v). Since there was a pressure to improve after World War II because capital was restricted and production volumes were low, Ohno researched on some methods they can adopt in Toyota to make their production system work better. However, it was not until the 1973 oil crisis that most Japanese manufacturers became interested in TPS and it was not until the end of the 1970s that a significant number of U.S. manufacturers began to investigate TPS. The Toyota Production System became widely known in the United States in 1983 when a book of that title was published. During the 1980s, the popular term in the United States for the TPS system was â€Å"just-in-time manufacturing†. At the beginning of the 1990s, the term lean systems became popular because of a series of books and articles by U.S. consultants and researchers in which they referred to TPS as â€Å"lean systems,† because they allow more and more to be done with less and less. Fact is that Ohno only borrowed important roots of lean systems from two distinct American institutions: Henry Ford’s mass production system and the supermarket. Lean Systems That Sparked More Process Strategies In the book by Womack and Jones (1996), entitled Lean Thinking, they simplified Ohno’s lean systems approach. As it is not just a set of techniques but a management philosophy, this means managers must have a different mental model or perspective of managing the manufacturing process. The five steps or principles to develop this mental model are: Precisely specify value for each specific product. Identify the value stream for each product. Make value flow without interruptions. Let the customer pull value from the producer. Pursue perfection. During the 1980s, some U.S. companies have adopted lean systems successfully. But many more failed or even refused to take action. Many managers are skeptical that TPS could not succeed in the United States or it provided no real benefits. However, the publication of a book titled The Machine That Changed the World (Womack, Jones & Roos, 1990) ended the debate about whether lean systems created real, lasting benefits. The book presented the results of a three-year study of automobile manufacturing throughout the developed world. They found that in 1990 a Japanese plant in Japan took 16.8 hours to build an auto, while a U.S plant in the United States took 25.1 hours per car. Not only did a Japanese plant produce cars faster, its cars had fewer defects per hundred vehicles, lower space requirements, and lower inventories than their competitors. Their findings also indicate that it is the management system and not the country’s culture that is responsible for the success of lean companies, since Japanese plants in the United States performed better than U.S. plants on all criteria. Aside from the TPS, Toyota pursued total quality management or â€Å"kaizen†, a change strategy that involves a continuous incremental improvement of work procedures. Using kaizen, production-line employees are made responsible for finding ways to improve work procedures to drive down costs and drive up quality. Individually, and in quality groups or circles, employees suggest ways to improve how a particular Toyota car model is made. Over time, from their thousands of suggestions, incremental innovations made to the car assembly process result in major improvements to the final product. Employees receive cash bonuses and rewards for finding ways to improve work procedures, and the result has been a continuous increase in car quality and reduced manufacturing costs. In the 2000s, under the leadership of Toyota’s new president, Jujio Cho, the company sought to increase the speed of change to further improve its efficiency and quality to gain an edge over its major competitors such as GM, Ford, and Daimler-Chrysler. It has begun a series of new kinds of change programs, each directed at improving some aspect of its operations, which Toyota hopes will bring both incremental and radical changes to the way it operates. Some incremental change programs involve strengthening its kaizen program, such as â€Å"pokayoke,† or mistake-proofing. This initiative concentrates on the stages of the assembly process that have led to most previous quality problems; employees are required to double- and triple-check a particular stage to discover defective parts or to fix improper assembly operations that lead to subsequent customer complaints. Another program is Construction of Cost Competitiveness for the 21st Century program or â€Å"CCC21,† which involves working with the company’s suppliers to find ways to reduce the costs of Toyota’s car components by 30 percent—something that will result in billions of dollars in savings. Toyota has also introduced a new manufacturing process called â€Å"GBL,† which uses a sophisticated new assembly process to hold a car body firmly in place during production. This allows welding and assembly operations to be performed more accurately, resulting in better-quality cars. GBL has also enabled Toyota to build factories that Toyota to build factories that can assemble several different kinds of models on the same production line with no loss in efficiency or quality. This is a major competitive advantage. The company’s global network of plants can now quickly change the kinds of cars they are making depending on buyers’ demands for various models at different points in time (Dawson, 21 February 2005). Other radical change efforts have focused on revamping Toyota’s development and design process to keep up with changing customer needs and demographics. In the 1990s, for example, the age of the average Toyota car buyer steadily rose. Despite Toyota’s climbing global sales (which exceeded $203 billion in 2006), the company was criticized for failing to understand how the market was changing. Some blamed the problem on centralized decision making at the company and a culture that had long been dominated by Toyota’s cautious and frugal Japanese designers. Rather than designing innovative, flexible vehicles customers were increasingly demanding, Toyota continued to focus on cutting costs and increasing the quality of its vehicles. To quickly get an improved design process into gear, President Cho bolstered two new change techniques to radically alter the design process: PDCA and â€Å"obeya†. Obeya is based on frequent brainstorming sessions among engineers, designers, production managers, and marketers designed to speed new model cars to the market. PDCA (â€Å"plan,† â€Å"do,† check,† â€Å"action†) is a program designed to empower the company’s designers outside of Japan to intervene in the car development process and champion designs that meet the needs of local customers. The results of promoting a flexible, decentralized car design process were the speedy introduction of the rugged eight-cylinder Tundra pickup truck and the angular, ScionxB compact in the United States, as well as the Yaris, Toyota’s best-selling European car. The Yaris was designed in Europe, and its success there led to its subsequent introduction in Japan where it also sold well (Hill, 2004). Conclusion Throughout its existence, we could see that Toyota has managed their process strategies effectively as they root everything out from the TPS. Through the TPS, they continued to change and improve their processes to lessen production time, lessen the wastes and make production efficient to the benefit of both the company and its employees. Also, it is important to note that, despite all these changes, their customers remain at the core of their focus as Toyota seeks to meet all their demands. As for their management, the decisions are translated into actual process designs or redesigns. This matches the complementary philosophies for process design: (1) process reengineering and (2) process improvement (Krajewski et al., 2007). In this regard, we could say that Toyota Motors Corporation has an excellent decision patterns to further improve their manufacturing processes in the future. The Process Analysis of the Toyota Motor Corporation Introduction In the book The Toyota Way, Liker (2003) claimed that Toyota has the fastest product development process in the world. In analyzing their manufacturing process, Liker found that new cars and trucks take only 12 months or less to design in Toyota, while competitors typically require two to three years. Also, Toyota has been benchmarked to be the best in its class by all of its peers and competitors throughout the world. This is because Toyota maintains high quality, high productivity, faster manufacturing speed and flexibility in processing their products (p. 5). All these successes are due to the TPS that Liket (2003) summarized into 4 Ps (Problem-Solving, People and Partners, Process and Philosophy (see Figure 1). Figure 1. 4Ps That Comprise the Toyota Production Systems (Source: Liker, 2003). Analyzing the TPS In the process part of the TPS, we can see at its core is the goal of eliminating waste. For example, in the manual assembly operation of a truck chassis assembly line (see Figure 2). The operator takes many individual steps, but generally only a small number of the steps add value to the product, as far as the customer is concerned. In this case, only the three steps identified add value. Although some of the non value-added steps are necessary (for example, the operator has to reach to get the power tool), the point here is to minimize the time spent on non-value-added operations by positioning the tools and material as close as possible to the point of assembly. Toyota has identified seven major types of non-value-adding waste in business or manufacturing processes: Overproduction. Producing items for which there are no orders, which generates such wastes as overstaffing and storage and transportation costs because of excess inventory. Waiting (time on hand). Workers merely serving to watch an automated machine or having to stand around waiting for the next processing step, tool, supply, part, etc., or just plain having no work because of stockouts, lot processing delays, equipment downtime, and capacity bottlenecks. Unnecessary transport or conveyance. Carrying work in process (WIP) long distances, creating inefficient transport, or moving materials, parts, or finished goods into or out of storage or between processes. Overprocessing or incorrect processing. Taking unneeded steps to process the parts. Inefficiently processing due to poor tool and product design, causing unnecessary motion and producing defects. Waste is generated when providing higher-quality products than is necessary. Excess inventory. Excess raw material, WIP, or finished goods causing longer lead times, obsolescence, damaged goods, transportation and storage costs, and delay. Also, extra inventory hides problems such as production imbalances, late deliveries from suppliers, defects, equipment downtime, and long setup times. Unnecessary movement. Any wasted motion employees have to perform during the course of their work, such as looking for, reaching for, or stacking parts, tools, etc. Also, walking is waste. Defects. Production of defective parts or correction. Repair or rework, scrap, replacement production, and inspection mean wasteful handling, time, and effort. Unused employee creativity. Losing time, ideas, skills, improvements, and learning opportunities by not engaging or listening to your employees (Liker 2003, p. 28-29). Figure 2. Waste in a Truck Chassis Assembly Line (Source: Liker, 2003). Figure 3. Timeline of Waste in a Value System (Source: Liker, 2003). TPS: A Goal Driven Process Like any system, the TPS is a goal-driven set of interrelated or linked activities. Managers who recognize that they are managing a system are aware of two main points: (1) the system reacts to any solution and (2) the system controls the behavior of those individuals who operate within it. The first point means that there are often unintended consequences when a solution to a problem in a system is introduced. To avoid unintended consequences, managers must fully understand the system. The second point means that managers must avoid attributing the problems in a system to the character of the individuals within the system. The manager must instead identify how the structure of the system is shaping the choices of the individuals within the system. By understanding these two points, the manager can now redesign the system to increase the system’s performance. The incorrect use of performance measures can prevent the successful introduction of lean systems. For example, a performance measurement system that encourages high equipment and high labor utilization often discourages production at the rate demanded by the customer. Indeed, these performance measures actually encourage large-batch production, thus creating the waste of overproduction and decreasing the system’s ability to respond to the customer. Firms that implement lean systems often use a performance measure called overall equipment effectiveness (OEE). Soiichi Nakajima (1988) first formulated this performance measure to assess how effectively equipment is maintained and operated. Figure 4 shows six types of capacity losses in the right-hand column (breakdown losses, setup and adjustment losses, idling and minor stoppages, speed losses, quality defects, and start-up and yield losses). These capacity losses are organized into three categories: downtime losses, speed losses, and quality losses. Figure 4. Six Probable Causes For Equipment Losses (Source: Masaji & Goto, 1992). Knowing performance measurements are an important part of any manufacturing system, thus TPS support the elimination of possible waste. The operations manager must select the performance measurements that will encourage behaviors that lead to the desired business performance. In TPS, the desired business performance is shorter flow time, reduced costs, and faster response to the customer. Another advantage of the TPS is its support towards employee empowerment as a means for continuous improvement. Toyota empowers its employees by training them to use the scientific method to continuously improve processes. The scientific method involves four elements: theory, hypotheses, data, and verification. In the research of Spear and Bowen (1999) they indicated that the scientific method is integrated into the Toyota Production System so that every time a job is performed is an experiment. This creates a system where all the work processes are very specified and structured, but the system itself is very flexible and responsive. Toyota implements the scientific method as part of four unspoken rules that everyone in the organization must learn and practice: Highly Specified Work – Toyota’s first rule requires that managers, engineers, and line workers fully understand how a job is to be done and its relationship to other jobs. By ensuring that every job has a very clearly defined set of steps, it is obvious when the correct process is not being followed and it is also obvious when more training is needed or when the job definition needs to be changed. This allows quick identification and correction of any problems that occur. This first rule reduces variance in how work is done. By creating a highly specified sequence of steps to perform the job, Toyota is actually proposing a theory that this procedure is the best way to do the job. Given this theory, two implicit hypotheses in every standard job specification are first that each person doing the activity is capable of performing it correctly and second that performing the activity as specified actually creates the expected outcome. Direct Connections – Toyota’s second rule states that there must be direct, unambiguous communication between each customer and supplier. Direct, unambiguous communication means that each customer and each supplier know the exact form and quantity of goods and services to be provided. The theory implicit in this second rule is that the supplier has the capacity to meet the customer’s needs as they are communicated. This theory leads to two hypotheses: (1) the customers’ requests will be for goods and services in a specific mix and volume and (2) the supplier can respond to the customers’ requests. The production process generates data through the observation of the customer-supplier interactions. Simple Direct Pathways – Toyota’s third rule is that all pathways must be simple and direct. This means that goods and services must flow to a specific person or machine. The underlying theory in this rule is that having simple and direct pathways will quickly reveal any source of variances in the flow of goods and services. This rule suggests two hypotheses: (1) every supplier is necessary and (2) any supplier not connected to the pathway is not necessary. Each day of production provides data to analyze the hypotheses. Was there a supplier who was not connected to a pathway? Obviously any supplier or activity not connected to the flow pathway can be eliminated. This rule eliminates noise from the system and means that there are no pooled queues of completed work from suppliers waiting for the customers to use. Instead, completed work leaves one activity and goes to the next activity. If one supplier has a high variance in deliveries, their variance will not be hidden b y the deliveries of the other suppliers. Scientific Method – Toyota’s fourth rule requires that employees be trained to formulate and test hypotheses about how they can improve their job activities. Toyota constantly encourages its workers to conduct experiments trying to identify a better method of performing their job activities. Conclusion In analyzing the Toyota Production System, we can deem that the company seeks to benchmark their operations to become more efficient. This is the reason why that the TPS is highly regarded among all companies in the world because it focuses on setting quantitative goals for improvement. TPS seeks to make Toyota’s manufacturing processes to be made simple and they are utilizing a scientific model that goes one step further it transforms their processes to be more dynamic. The Toyota management is also constantly gathering ideas for reengineering or improving a process become apparent after documenting the process. They are carefully examining the areas of substandard performance, efficient interaction between departments and finally making customers’ preferences a prime priority. The ultimate goal of TPS is to apply the ideal of one-piece flow to all Toyota’s business operations, from product design to launch, order taking, and physical production by eliminating the unnecessary waste. Thus, the TPS is an all-encompassing philosophy that includes product design, process design, equipment and facilities design, supply chain coordination, job design, and productivity improvement. If there is one â€Å"key† to successful implementation of TPS, it’s adopting a holistic approach. This is probably the reason why Toyota remains to be one of the most admired companies in the world because they implemented a system that cut all the unnecessary costs and produced faster results without compromising the product expectations of their stakeholders. References Cox, J.F. & Blackstone, J.H. Jr. (Eds). (1998). APICS Dictionary, 9th ed. Alexandria, VA: APICS. Dawson, C. (2005, Feb 21). A China Price for Toyota.   Business Week, 3921, 50-51. Hill C.W.L. (2004). Toyota, in C. W. L. Hill & G. R. Jones, Strategic Management: An Integrated Approach, Boston: Houghton Mifflin. Krajewski, L.J., Ritzman, L.P. & Malhotra, M.K. (2007). Operations Management: Processes and Value Chains, 8th   ed. NJ: Prentice-Hall. Liker, J. (2003). Toyota Way. Blacklick, OH: McGraw-Hill Professional Publishing. Monden, Y. (1983). Toyota Production System, Norcross, GA: Industrial Engineering and Management Press. Nakajima, S. (1988). TPM: Introduction to TPM, Total Productive Maintenance Cambridge MA: Productivity Press. Spear S. & Bowen, H. K. (1999, Sept-Oct). Decoding the DNA of the Toyota Production System, Harvard Business Review, pp. 96–106. Tajiri, M. & Gotoh, F. (1992). TPM Implementation: A Japanese Approach, New York: McGraw-Hill. Toyota Website. (2007). Retrieved November 10, 2007, from http://www.toyota.com/about/our_business/ Womack, J.P. & Jones, D.T. (1996). Lean Thinking: Banish Waste and Create Wealth in Your Corporation, New York: Simon and Shuster. Womack, J.P. Jones, D.T. & Roos, D. (1990). The Machine That Changed the World, New York: Rawson Associates

Monday, September 16, 2019

Proposed Vibration Monitoring And Analysis Engineering Essay

Vibration is a broad capable country that has continued to pull research over the old ages because of its import in about every aspect of daily life. From aircraft patterning to constructing design in temblor prone parts of the universe ; from plus status monitoring in assorted industrial workss to wheel reconciliation and alliance at the local auto garage, an application of the cognition of quiver rules can be observed. The quiver of an object can merely be referred to as the oscillating motion of that object about a average equilibrium place. The gesture is brought approximately by the application of some force or excitement. Common illustrations of this phenomenon include the gesture of plucked guitar strings, the gesture of tuning forks, and the shaking felt at the station floor when a train base on ballss, the agitating observed on the route when a heavy truck base on ballss or the rattle of the route workers ‘ impact cock. Some quiver nevertheless is non every bit pronounced as the illustrations given. For case houses and Bridgess vibrate every bit good. Normally, these quivers can non be detected by simply looking. When the excitement is big plenty, the vibrational gesture can be seen and this would likely ensue in the prostration of the construction. From the foregoing, it can be seen that some quiver is utile while some is destructive. The failure or devastation brought about by quiver is non an immediate 1. Vibration finally leads to a fatigue failure and this should be of involvement to the operators and upholders of works equipment. For the care applied scientist or plus direction practician, these facts about quiver can be translated to intelligent and informed determinations for industrial workss. With legion different devices, quiver degrees on works equipment can be detected, measured and recorded. It is possible to analyze the informations collected to find the status of an plus and even predict an at hand failure. All revolving or stationary works equipment have acceptable quiver degrees stipulated by criterions such as the International Organization for Standardization ( ISO ) Codes or developed in-house by Vibration Monitoring Engineers. A divergence from the acceptable quiver degrees is an indicant of the oncoming of impairment which is unwanted. This cognition gives insight into the existent status of a piece of equipment, eliminates guessing and enables the care applied scientist to be after a fitting response to the plus ‘s impairment. Such control and planning can take to a immense economy in care costs, prevent unneeded downtime, better safety and public presentation for any plus. Furthermore, quiver monitoring and analysis incorporates some advanced techniques for the find of the root cause of frequent machinery failures. Using these techniques can intend the difference between changeless dislocations and good plus handiness. It is the aim of this study to supply a clear cut proposal as to how to work out the job of the frequent failures of the Yoho High Pressure ( H.P. ) Flare Scrubber Pumps by the application of these advanced quiver analysis techniques and besides supply a method for supervising the status of the pump to pre-empt any impairment that can jump surprises. This will guarantee a decrease in present care costs and relieve the work load of care forces whose clip is tied up with the attention of these pumps. Case Study and job Description The Yoho H.P. Flare Scrubber pumps are perpendicular, turbine, submerged pumps that transfer cured liquids from the Flare Scrubber vas to the chief petroleum oil production heading on the Yoho offshore oil and gas installing. The pumps are submerged in barrels that receive provender from the H.P. scrubber vas by gravitation. The cured liquid is a mixture of H2O and light petroleum oil. There are three pumps on skid and these pumps are critical to works operations. One pumps runs at a clip and an extra pump or the other two pumps can be put in service, if the demand arise due to an increasing degree of liquid in the H.P. Flare Scrubber. In the event of an outage of all three pumps, the works could lose production to the melody of one hundred 1000 barrels of rough oil per twenty-four hours ( 4100 barrels/hour ) . The pumps were commissioned in 2006 at works start-up and hold had legion failures since. They have proven undependable and soon a contractor ‘s pumps ( which are portable and of a different design ) , are relied upon to execute their map. There have been occasions when all three pumps are in a province of disrepair. These pumps normally run swimmingly for a piece and so go noisy, vibrate and eventually neglect. After a pump fails, it is taken out of the hole, sent to the shore-base for fix, sent back to the platform for reinstallation and so reinstalled. Probes of the legion failure instances reveal that the pump bearings, riser line drives and bushings have worn out given room for shaft drama, impeller harm and mechanical seal failure. Installation, fix and rebuild processs have been scrutinized and checked for quality. This has non yielded any dividends nevertheless, as the pumps maintain neglecting after two or three months in service. Fig. 1. overleaf shows a cut-away subdivision of the pumps. The diagram is supplied by the makers but is simplified as the existent H.P. Flare Scrubber pump has six impellers, a top column of 11inches length, two intermediate columns of 30 inches length, a bottom column of 30 inches length, and a pump bowl assembly of 36.25 inches length. The length of the pumps makes it hard for remotion and installing and as such care practicians, works operators and works direction have been invariably distressed by the frequent failure of these pumps. Fig. 1. Gould Pump Model VIC-T ( beginning ITT-Gould Product catalogue, [ online ] www.gouldspumps.com/pump_VIC.html [ Accessed 6th May 2010 ] Pump Specification Manufacturer: ITT-Gould Head shaft Length: 129 Inchs Head shaft Diameter: 1 Inch Seal Method: Mechanical Sealing wax Drive: 40 HP Electric Motor Differential Pressure: 200 Pounds per square inch Capacity: 180 Gallons per Minute Revolutions per minute: 3000 Impeller: 5 Weathervanes, Enclosed Failure and Maintenance History The tabular array below shows the failures and some care activities performed on the three H.P. Flare Scrubber Pumps over a biennial period. The rows 69, 71, 72, 90,91,97,98,102,103 and 110 show times when none of the three pumps were operational. The cost of this inaccessibility of the pumps is multiplex. It ranges from the loss of production of about one hundred 1000 barrels of rough oil per twenty-four hours, to punishments for non-compliance with environmental ordinances and most significantly, safety.Signal-to-noise ratioDateEVENT/ACTIVITYEQUIPMENT TAGNO. OF PUMPS AVAILABLECOMMENTS/ FINDINGS1 11-Jan-06 HP Flare Scrubber Pump B Auto Operation job YP-G-180 3A2 12-Jan-06 Trouble-shooting of LSLL-6207 on HP Flare Scrubber YP-G-180 3A3 1-Mar-06 PM on HP Flare Scrubber Pumps A and B YP-G-180A/B 3A411-Mar-06Pumps Operation StartedYP-G-180A/B /CAEarliest recorded day of the month of petroleum and produced H2O motion with YP installations5 5-Jun-06 Test-run HP Flare Scrubber Pump C with quiver group, QIT to find cause of inordinate quiver YP-G-180C 3 Expecting consequence 6 7-Jun-06 Investigating cause of inordinate quiver on HP Flare Scrubber Pump C YP-G-180C 3 Vibration traced to damaged Mech. Sealing wax 7 9-Jun-06 Removed HP Flare Scrubber Pump C for fixs YP-G-180C 2A8 9-Jun-06 Unblocked strainers on HP Flare Scrubber Pumps A & A ; B YP-G-180A/B 2A9 12-Jun-06 Rectified hapless discharge and noisy operation on HP Flare Scrubber Pumps A & A ; B YP-G-180A/B 2A10 19-Jun-06 PM on HP Flare Scrubber Pump A YP-G-180AAA11 3-Jul-06 Completed installing of HP Flare Scrubber Pump C YP-G-180C 3A12 4-Jul-06 Removed HP Flare Scrubber Pump B for fixs in QIT YP-G-180B 2A13 15-Jul-06 Remove and clean HP Flare Scrubber Pump C suction strainer YP-G-180C 2A14 12-Aug-06 Remove and clean HP Flare Scrubber Pump C suction strainer YP-G-180C 2A15 24-Aug-06 Remove and clean HP Flare Scrubber Pumps A & A ; C suction strainer YP-G-180A/C 2A16 27-Aug-06 Rigged out HP Flare Scrubber Pump A and transferred to lading bay YP-G-180A 1A17 30-Aug-06 Rigged in HP Flare Scrubber Pump B after QIT fixs YP-G-180B 2A18 2-Sep-06 Removed shaft matching on HP Flare Scrubber pump B, removed motor and installed motor from pump Angstrom YP-G-180A/B 2 Electricians look intoing high electromotive force on motor 19 3-Sep-06 Transfer motor, pump and all associated parts from YP-G-180B to G-180A YP-G-180A/B 1A20 4-Sep-06 Installed pump caput, motor and shaft hub on HP Flare Scrubber Pump A YP-G-180A 1A21 5-Sep-06 Carried out matching runout cheques, impeller lift ( Reinstallation ) on pump Angstrom YP-G-180A 2A22 8-Sep-06 PM on HP Flare Scrubber Pump C YP-G-180C 2A23 11-Sep-06 Remove and clean HP Flare Scrubber Pump C suction strainer YP-G-180C 2A24 29-Oct-06 Bleed off gas from HP Flare Scrubber Pump C suction and discharge line YP-G-180C 2A25 12-Nov-06 Replacement of Mech. Seal on Pump C YP-G-180C 1A26 13-Nov-06 Removed HP Flare Scrubber Pump C for fixs in QIT YP-G-180C 1A27 28-Nov-06 Reinstallation of Pump C YP-G-180C 1A28 2-Dec-06 Completed installing of HP Flare Scrubber Pump C and test-ran it. YP-G-180C 2A29 21-Dec-06 PM on HP Flare Scrubber Pumps A and C YP-G-180A/C 2A30 6-Feb-07 Commenced installing of pump B YP-G-180B 2A31 7-Feb-07 Continued installing of pump B YP-G-180B 2 Expecting Mech. Sealing wax 32 24-Apr-07 Installation of Mech. Seal on Pump B YP-G-180B 2A33 25-Apr-07 Completed Mech. Seal Installation of Pump B YP-G-180B 3A34 28-Apr-07 Troubleshoot overload trip mistake on Pump B YP-G-180B 3A35 30-Apr-07 Rechecked alliance of Bump B YP-G-180B 3A36 1-May-07 Rectified overload trip on Pump B- cleaned recess strainer YP-G-180B 3 Discharge line was filled with sand and sludge 37 14-May-07 Mech. Seal replacing on Pump C YP-G-180C 2 Shaft worn around Mech Seal 38 15-May-07 Rigged out HP Flare Scrubber Pump C for fix at QIT YP-G-180C 2A39 27-May-07 Troubleshoot high quiver on Pump B YP-G-180B 2A40 30-May-07 Removed HP Flare Scrubber Pump B for fixs in QIT YP-G-180B 1A41 1-Jun-07 Assessed stuffs for stiff valves associated with pumps YP-G-180A/B /C 1A42 3-Jun-07 Reinstallation of Pump C YP-G-180C 1A43 6-Jun-07 Completed Pump C Installation YP-G-180C 2A44 7-Jul-07 Reinstallation of Pump B YP-G-180B 2A45 10-Jul-07 Completed Pump B Installation YP-G-180B 3A46 13-Jul-07 Troubleshoot frequent tripping of Pump B YP-G-180B 3 Electric motor job. This was fixed 47 21-Jul-07 Rigged out HP Flare Scrubber Pump A and transferred to lading bay YP-G-180A 2A48 22-Jul-07 Rigged out HP Flare Scrubber Pump B and installed in A barrel YP-G-180A/B 1 Pump B becomes Pump A 49 23-Jul-07 Alliance and commissioning of Pump A YP-G-180A 2A50 26-Jul-07 Remove and clean HP Flare Scrubber Pumps A & A ; C suction strainers YP-G-180A/C 2A51 10-Aug-07 Rigged out HP Flare Scrubber Pump A and transferred to lading bay YP-G-180A 1A52 17-Aug-07 Commenced installing of pump Angstrom YP-G-180A 1A53 18-Aug-07 Continued installing of pump Angstrom YP-G-180A 1A54 22-Aug-07 Alliance and commissioning of Pump A YP-G-180A 2A55 11-Sep-07 PM on HP Flare Scrubber Pump A YP-G-180A 2A56 17-Oct-07 Removal and resettlement of Pump A to Pump B barrel YP-G-180A/B 2 Pump A becomes B 57 21-Oct-07 Investigate low discharge force per unit area on Pump B YP-G-180B 2A58 22-Oct-07 Replacement of Mech. Seal on Pump C YP-G-180C 2A59 23-Oct-07 Rigged out HP Flare Scrubber Pump B and transferred to lading bay YP-G-180B 1A60 24-Oct-07 Rigged out Pump A barrel for leak fixs by FMS YP-G-180A 1A61 25-Oct-07 Rigged in Pump A barrel after leak fixs by FMS YP-G-180A 1A62 28-Oct-07 Commenced installing of pump Angstrom YP-G-180A 1A63 29-Oct-07 Completed installing of pump Angstrom YP-G-180A 2A64 31-Oct-07 Remove stiff hub from Pump B Motor YP-G-180B 2A65 3-Nov-07 Remove Motor to W/Shop to bore and tap broken bolts of Motor Fan CoverA2A66 29-Dec-07 Remove damaged pump C and commenced installing of refurbished pump YP-G-180C 1A67 30-Dec-07 Rig out Pump C due to miss of keyway on shaft YP-G-180C 1A68 1-Jan-08 Transferred bad pump to lading bay for QIT W/ShopA1A69 8-Jan-08 Removed HP Flare Scrubber Pump A for fix in QIT YP-G-180A 0A70 9-Jan-08 Installed Flare Scrubber Pump A YP-G-180A 1A71 10-Jan-08 Removal of Pump A YP-G-180A 0 Pump stiff. 72 12-Jan-08 Commenced installing of pump Angstrom YP-G-180A 0A73 13-Jan-08 Completed installing of pump Angstrom YP-G-180A 1A74 27-Jan-08 Rigged in Pump B and commissioned same YP-G-180B 2A75 4-Mar-08 PM on HP Flare Scrubber Pumps A & A ; B YP-G-180A/B 2A76 13-Apr-08 Removal and resettlement of Pump A to Pump C barrel YP-G-180A/C 1 Pump A barrel leaking petroleum from cut bleed line. Pump A becomes C 77 14-Apr-08 Commenced installing of pump C YP-G-180C 1A78 15-Apr-08 Completed installing of pump C YP-G-180C 2A79 17-Apr-08 Rigged out HP Flare Scrubber Pump B and transferred to lading bay YP-G-180B 1A80AAAAA81 18-Apr-08 Removal of dust from Pump barrel YP-G-180B 1A82 21-Apr-08 Commenced installing of pump B YP-G-180B 1A83 22-Apr-08 Completed installing of pump B YP-G-180B 2A84 9-May-08 Commenced set uping out Pump C YP-G-180C 1A85 10-May-08 Completed set uping out Pump C YP-G-180C 1A86 17-May-08 Commenced installing of pump C YP-G-180C 1A87 18-May-08 Completed installing of pump C YP-G-180C 2A88 20-May-08 Rectified failure to raise on Pump B YP-G-180B 2A89 23-May-08 Rigged out HP Flare Scrubber Pump B for QIT fixs YP-G-180B 1A90 26-May-08 Rigged out HP Flare Scrubber Pump C for QIT fixs YP-G-180C 0A91 27-May-08 Commenced installing of pump B YP-G-180B 0A92 28-May-08 Completed installing of pump B YP-G-180B 1A93 13-Jun-08 Commenced installing of pump C YP-G-180C 1A94 14-Jun-08 Completed installing of pump C YP-G-180C 2A95 17-Jun-08 Rigged out HP Flare Scrubber Pump B for QIT fixs YP-G-180B 1A96 17-Jun-08 Troubleshoot failure to raise on Pump C YP-G-180C 1A97 18-Jun-08 Rigged out HP Flare Scrubber Pump C for QIT fixs YP-G-180C 0A98 20-Jun-08 Commenced installing of pump B YP-G-180B 0A99 21-Jun-08 Completed installing of pump B YP-G-180B 1A100 22-Jun-08 Reconfirmed Pump B alliance YP-G-180B 1A101 24-Jun-08 PM on HP Flare Scrubber Pump B YP-G-180B 1A102 26-Jun-08 Rigged out HP Flare Scrubber Pump B for QIT fixs YP-G-180B 0A103 30-Jun-08 Commenced installing of pump B on freshly designed base YP-G-180C 0 FMS welding / design inaccurate. Pump pulled out to C-Barrel 104 1-Jul-08 Completed installing of pump C YP-G-180C 1A105 5-Jul-08 Swapped Barrel B to ‘A ‘ Position YP-G-180A 1A106 11-Jul-08 Investigated unusual noise on Pump C YP-G-180C 1A107 22-Jul-08 Worked with FMS to measure alteration of Pump bases YP-G-180A/B /CAA108 26-Jul-08 Installed pump Angstrom YP-G-180A 2A109 29-Jul-08 Removed pump C YP-G-180C 1A110 31-Jul-08 Commence remotion of Pump A YP-G-180A 0AFig.2. Failure and Maintenance Summary for H.P. Flare Scrubber Pumps, YP Literature Review Graham and Nurcombe ( 2003 ) , observed that many perpendicular submergible pump failures happen instead out of the blue, without due warning and rough economic climes and competition has become an inducement for equipment operators to want to acquire the best service out of their equipment. This translates to higher life anticipation with works equipment and as such status supervising engineerings such as Vibration, Lubricant and Exhaust gas analyses have become really popular to forestall unwanted and unplanned machinery outages. Of the afore-mentioned techniques, Vibration analysis they say, is likely the most of import because of its proved efficaciousness and global credence in many industries. In a instance history of submergible pumps at Saudi Aramco, they highlighted the demand to cognize the status of the pump internals which were submerged in liquid and are normally without status monitoring. ISO codes specify that bearings be monitored but this is non straight done for submerged pumps because the bearings are usually unaccessible. Alternatively, ISO allows measurings to be taken from the accessible parts of the machine i.e. from the Electric motor and the downside of this is that plentifulness of quiver information gets losing or attenuated. A batch of the mistakes associated with perpendicular submergible pumps nevertheless arise from those unaccessible places e.g. cavitation, flow induced quiver etc. , and as such supervising the status of the submersed parts straight provides a valuable beginning of information for predictive and diagnostic steps that can do large cost nest eggs for equipment operators. They have developed and tested transducers and quiver monitoring equipment which can be used to straight acquire information from the submerged pump parts. It is non plenty merely to supervise the quiver status of these pumps nevertheless. The job at manus is that of the frequent failures of the H.P. Flare Scrubber pumps from the very clip they were commissioned. Installing the submergible quiver monitoring devices would decidedly assist to foretell the failures but would make nil to place the implicit in cause of the frequent failures. So, the failures might be predicted but would go on often however. The root-cause of these failures demands to be identified so that a permanent solution can be developed. Vibration analysis besides makes this possible. Sinha ( 2008 ) shows that site installing of machines has effects on their quiver and dynamic features, even when they are good designed. He points to the fact that many freshly installed machines vibrate severely and neglect often merely as has been described in the debut and in the care history of the H.P. Flare Scrubber pumps. Hence it is of import to decide any machine installing jobs if equipment handiness is desired. A quiver analysis and dynamic word picture technique known as Modal Testing can be used to uncover the natural frequences of the machine installing assembly and the operating velocity checked to see if near to any of the natural frequences. Operating machines at velocities at or shut to structural natural frequences brings about resonance which is seen as inordinate quiver. This trial makes it possible to place the right places on the construction to use stiffening in order to cut down quiver by modifying the structural natural frequences. He gave some illustration s were these had been done successfully to extinguish frequent machinery failures. DeMatteo ( 2001 ) presents a instance survey of how the quiver analysis methods of Modal Testing and Operating Deflection Shape have been used to work out the job of inordinate quiver on perpendicular pumps which are similar to the H.P. Flare Scrubber pumps. A common yet enfeebling mistake for these pumps is cavitation. A mentioned earlier, it occurs at the submersed parts of this pump where there is no status monitoring as of the present. Cavitation is a phenomenon that takes topographic point in these kinds of pumps when the impact of a fall ining vapor of the fluid been pumped causes harm to the impellers and other pump internals. Vapour-bubbles can be formed within the wired fluid at low force per unit area pump internals as a consequence or restricted suction, fluctuating liquid degrees of the H.P. Flare Scrubber vas etc. When these bubbles move on to higher force per unit area countries within the pump, they collapse and cause harm to the pump. Wilcoxon Research says that, â€Å" The prostration of the bubbles is a violent procedure that creates an impacting action inside the pump. This impact will excite high frequence resonances in the pump construction. † For this ground, they advocate the usage of quiver detectors in pum ps. Cernetic ( 2009 ) says in the same vena, that quiver signals should be used to observe cavitation at the early phases of development since this phenomenon causes pump harm and a decrease in efficiency. From the foregoing, the instance for forestalling failures is being made and the demand for Condition Based Maintenance ( CBM ) emphasised. Prickett and Eavery ( 1991 ) compared preventative care and Breakdown care with CBM. CBM is shown to be cheaper and as such is required for the H.P. Flare Scrubbers if concern profitableness and equipment handiness are desired. Overview of Proposed Vibration Monitoring and Analysis Based Solution to Frequent Failures First and first, it must be ascertained that the site installing of the three pumps is non doing any quiver jobs. The Vibration analysis techniques of Modal Testing and Operating Deflection Shape are proposed for usage to find the root-cause of the frequent failures. Modal proving on the one manus would demo structural natural frequences, node points and manner forms for the three pumps. The manner form is the warp of the construction at any natural frequence. This information would assist to find: if operating velocity is perilously close to the structural natural frequences, the dynamic feature of the construction and the points of least or no warp on the construction ( nodes ) – where supports or stiffening may be added in order to relieve quiver degrees. The Impact cock method shall be used to transport this trial out, in situ. The Operating Deflection Shape ( ODS ) on the other manus, would as the name implies show the warp of each pump construction at the operating frequence of 50Hz ( 3000RPM ) . In other words, the ODS would demo the consequence of the operating velocity on assorted parts of the construction and it can be seen if points on the construction vibrate in stage or non. Should parts of a construction non travel in stage with the other parts, destructive burden can happen which can give rise to frequent failures. Transporting out these trials as mentioned above would place jobs with the installing. Solving the installing jobs would extinguish the frequent failures. The solution as mentioned earlier, normally involves the application of supports in identified places or the stiffening of bing supports. After the installing jobs are taken attention of, it is proposed that for good mounted quiver detectors are put in topographic point. For the open parts of the pump assembly i.e. the electric motor, it is proposed that two accelerometers be mounted at each of the antifriction bearing lodging countries. The accelerometers would be stud mounted at each bearing lodging at right angles apart. Having these accelerometers installed in add-on to the analysis of the generated signals would do it possible to observe bearing mistakes at their incipient phases, such that something could be done to forestall a more dearly-won harm to the whole pump assembly. As for the submersed parts of the pump, i.e. the journal bearings, the shaft, the impeller/bowl assembly, the Bently Nevada designed submergible propinquity investigations are proposed for usage to supervise the quiver and give diagnostic and prognostic capablenesss for such mistakes as cavitation, impeller harm, weariness shaft cleft, instability etc. , which are the common mistakes of machinery such as these and can merely be detected by submersed detectors. Understanding what goes on in the pump hole is critical to maintaining the pump healthy. For case cavitation can be detected on clip with these investigations, procedure conditions changed and the dependability of the pumps maintained. The quiver information collected by these detectors would be analysed and used to do quality determinations sing the needed care responses. Analysis techniques would include frequence spectrum analysis, envelope analysis, polar secret plans, orbit secret plans etc. This three prong attack is strongly believed to extinguish the frequent failures, cut down the overall care costs and assist in guaranting the handiness of the three H.P. Flare Scrubber Pumps. The techniques shall be expounded in more item within this study and all the necessary tools and quiver signal processing methods shall be specified. In-Situ Modal Testing for the Pumps This quiver trial is to uncover any jobs with the installing of the pumps which might be responsible for the frequent failures experienced within the past few old ages. In this trial, the natural frequences, manner form and nodes will be determined for each pump construction. An instrumented cock would be used to provide impact or energy to each construction at a known frequence and responses measured. When there is resonance, elaboration would be seen in the response spectrum. A Frequency Response Function ( FRF ) is obtained utilizing the force and the response spectra. The response can be represented as: FRF= = A + J B Where A= Real Part, B= Imaginary Part and Phase = At Resonance, the exciting frequence from impact cock = Natural Frequency of Pump Structure. A 0, B gives the Mode Shape, and Phase 90A ° The computations are performed and graphs displayed by the FFT ( Fast Fourier Transformation ) Analyzer as shown below. Fig. 3. Time sphere and frequence sphere signals. ( Beginning: M14 Lecture Notes, 2010, MSc Maintenance Engineering and Asset Management, University of Manchester ) The FRF shows frequence extremums which may or may non be structural natural frequences. However, for the structural natural frequences, the relationships shown supra would all use. The existent portion of the curve ( A ) would go through through nothing and the stage would alter by 90A ° . The fanciful portion of the FRF gives the manner form. So, the needed equipment for the unmoved average testing of the pump constructions are as follows: Some accelerometers positioned along points on a pump construction ( accelerometers can be secured by magnetic agencies ) An instrumented cock An FFT Analyzer Cable connexions for cock and accelerometers to analyzer Post Processing Software. The diagram below shows the layout for the trial. The instrumented cock is used to excite the pump construction and the responses taken from the measuring points and analysed to give all the information required i.e. manner form, nodes and natural frequences. Fig.4. Schematic of Vertical Pump Impact Test Fig. 5. Impact Test and Modal parametric quantities ( beginning: Richardson M.H. ( 1997 ) , â€Å" Is It a Mode Shape, or an Operating Deflection Shape † , Sound and Vibration Magazine, 30th Anniversary Issue. ) Fig.6. Mode shapes from Imaginary Part of FRF ( beginning: Richardson M.H. ( 1997 ) , â€Å" Is It a Mode Shape, or an Operating Deflection Shape † , Sound and Vibration Magazine, 30th Anniversary Issue. ) Fig.7. Example of manner form obtained from pump modal proving. ( Beginning: Sinha J.K. , ( 2008 ) , â€Å" Vibration-based Diagnosis Techniques Used in Nuclear Power Plants: An Overview of Experiences † , Nuclear Engineering and Design, Elsevier B.V. , Volume 238, Issue 9, pp. 2439-2452. From the attendant manner forms and ascertained natural frequences, penetration can be obtained as to the exact places for stiffening application or mass remotion in order to alter the natural frequences. Experience has shown that resonance in these kind of instances is due to the intimacy of the operating velocity ( runing frequence or 1x ) or multiples thereof, to one or more structural natural frequences. For the pump described in fig.7. above, the job was solved welding a thick home base to the stool in order to stiffen it and by put ining extra u-bolts on the discharge line. Operating Deflection Shape The Operating Deflection Shape ( ODS ) merely shows how much the pump construction is traveling at a peculiar frequence ( most significantly, the normal runing velocity ) and how much difference there is in stage between different points of the pump construction as it operates. The set-up is merely as was used for the average testing. The difference nevertheless, is that the instrumented cock is non used to excite the construction. Alternatively the machine would be run at its normal operating velocity and quiver informations collected from the accelerometers is fed to the multi-channel analyser. The end product from the analyser is so fed into the computing machine which would hold installed specializer package for ODS show. The show would demo the existent quiver form of the construction. It would be clearly seen, if the pump construction is flexing, if parts are traveling out of stage with one another etc. It would be seen if any status exists which contributes to frequent failures. Fig.8. Example of Software Animation of ODS FRF informations. ( Beginning: Richardson M.H. ( 1997 ) , â€Å" Is It a Mode Shape, or an Operating Deflection Shape † , Sound and Vibration Magazine, 30th Anniversary Issue. ) It is proposed that both Modal Testing and ODS analysis be carried out by contractors who are specializers in the country of survey and have a proved path record of success. Proposed Permanently Mounted Vibration-based Condition Monitoring System Fig.9. Set-up of Proposed Permanently mounted quiver monitoring system for the H.P. Flare Scrubber Pumps ( Influenced by Fig.5. , Graham K.M. and Nurcombe B. , ( 2003 ) , â€Å" Vertical Water Pumps- What ‘s Happening Down The Hole † , Orbit Magazine, 1Q 2003, pp. 4-9 ) Fig. 10. Orthogonally mounted propinquity investigations [ on-line ] Available from: hypertext transfer protocol: //zone.ni.com/reference/en-XX/help/372416A-01/svtconcepts/obt_tbs_shctln/ [ Accessed 6th May 2010 ] The proposed for good mounted quiver monitoring and analysis system for each pump would hold the followers: Four Bently Nevada 330400 Accelerometers mounted as shown on the diagram Four 3300XL 8mm submerged Proximity Probes mounted in Custom Housings ( two each for two different journal places along shaft length ) A Bently Nevada 1900/65 General Condition Equipment Monitor A tacho-sensor for shaft place mention ( from any reputable manufacturer- Bently Nevada, SKF, Endevco ) and, A laptop with the Bently Nevada System 1 version 6.5 Diagnostic package installed for the analysis of information collected by any of the proctors. The accelerometers would be used to mensurate the quiver degrees of the anti-friction bearings on the pumps ‘ electric motors while the submersed propinquity investigations would mensurate shaft quiver, within the impeller shell and intermediate columns. All the transducer information would be collected by the 1900/65 proctor for each equipment. The proctors are designed for uninterrupted monitoring and readouts from them can be checked from clip to clip by dedicated forces or works operators. Besides, these proctors have the capableness of being tied into bing works control systems such that quiver warning degrees and danger bounds for each pump can be announced in control suites via hearable dismaies or visible radiations when these degrees are breached. Additionally, there is the capableness to configure trips and closures in the instance of high quiver degrees occasioned by mistakes such as cavitation. The proctors can be installed near to the equipment in sheltered enclosures, utilizing a short overseas telegram tally. The System 1 package is capable of advanced quiver analysis through the usage of shows such as Bode Plots, Spectral shows, Polar secret plans, Envelope analysis, etc. It is besides capable of informations acquisition and storage which makes swerving possible. Detailed specifications for the assorted equipment are supplied in the appendix. Signal Conditioning and Processing As is good known, the end product from the accelerometers and propinquity investigations are linear and clip sphere signals. These have to be converted to digital end products and frequence sphere signatures for mistake diagnosing to be carried out. This is achieved by the Fast Fourier Transformation ( FFT ) algorithm. Analyzing the frequences shown in a spectrum is indispensable for understanding implicit in machinery mistakes, as certain mistakes have distinguishable frequence features. For case, pump revolving velocity would be shown in the frequence spectrum and mistakes on the shaft could be presented as multiples of revolving frequence. The Bently Nevada 1900/65 proctor and System 1 package facilitate this. Fig. 11. Time sphere and frequence sphere signals. ( Beginning: M04 Lecture Notes, 2010, MSc Maintenance Engineering and Asset Management, University of Manchester ) The quiver measuring devices have been chosen carefully to understate the noise and unwanted intervention to measuring signals. The Bently Nevada 1900/65 has the capableness for low base on balls filtering and high base on balls filtering and these can be configured to accommodate user demands. This helps to extinguish the aliasing consequence and other instrument related noise. ( See merchandise specification sheet in appendix for inside informations ) . There is besides the capableness for envelope analysis by the usage of criterion or enhanced demodulation. This is supported by proctor and analysis package and is peculiarly utile for the early sensing of mistakes on the electric motor anti-friction bearings. Diagnosis Software Display Plots and Uses The following show some of the show plots that can be generated by the diagnostic package: Bode Performance map Rotor stator profile Rotor form Hydro air spread Phasor Histogram Octave Casacade/Full Casacade Current values Bar graph Machine train diagram Alarm/System event list Trend / Multivariable tendency Tabular list Time base ( with option for superposition of baseline informations ) Orbit / Time base ( with option for superposition of baseline informations ) Orbit ( with option for superposition of baseline informations ) Shaft mean center line Spectrum / Full spectrum ( with option for superposition of baseline informations ) Ten vs. Y Waterfall / Full waterfall Polar/Acceptance part Of the list above, accents would be placed on the Bode, Polar, Orbit, Shaft mean centreline and Waterfall secret plans. These secret plans can be used during normal and transeunt machine conditions to expose the normally experient mistakes. The Bode secret plan is really utile in placing the critical velocity ( natural frequence ) of a machine, as it shows the quiver behavior of the said machine during start-up or shut-down ( transeunt conditions ) . Fig. 12. Bode Plot Example. [ Online ] Available from: hypertext transfer protocol: //zone.ni.com/reference/en-XX/help/372416A-01/svtconcepts/bode_polar_plots/ [ Accessed 6th May 2010 ] The polar secret plan gives the amplitude of 1X ( machine RPM or runing frequence ) and its stage difference from the mention place. The amplitude and stage behaviors can be interpreted to existent equipment wellness or defect. Fig. 13. Polar Plot illustration [ online ] Available from: hypertext transfer protocol: //zone.ni.com/reference/en-XX/help/372416A-01/svtconcepts/bode_polar_plots/ [ Accessed 6th May 2010 ] The Orbit secret plan hints out how the shaft is revolving within the bearing. This tells how much clearance exists between shaft and bearing wall. This information is priceless as it can be used to find bearing load alterations and the oncoming of bearing wear. Fig. 14. Orbit Plot illustration [ online ] Available from: hypertext transfer protocol: //zone.ni.com/reference/en-XX/help/372416A-01/svtconcepts/obt_tbs_shctln/ [ Accessed 6th May 2010 ] The Shaft centreline secret plan is used in much the same manner as the orbit secret plan in that it can be used to state how much wear has happened within a bearing. The secret plan checks the concentricity or eccentricity of shaft running within a diary bearing, as the name implies. Fig. 15. Shaft Centerline secret plan illustration [ online ] Available from: hypertext transfer protocol: //zone.ni.com/reference/en-XX/help/372416A-01/svtconcepts/obt_tbs_shctln/ [ Accessed 6th May 2010 ] The Waterfall secret plan is utile during the transeunt machine operations. It shows how frequency constituents such as 1X, 2X, 3X etc alteration with clip or any other variable. The information obtained can be used to do good judgements as to existent machine conditions. Fig. 16. Waterfall plot illustration [ online ] Available from: hypertext transfer protocol: //integratedpro.com/content/ ? p=1114 [ Accessed 6th May 2010 ] Diagnosis ChartMistakeSteady province CharacteristicTransient State CharacteristicShaft hang-up 0.3 X shown in frequence spectrum, Funny Orbit secret plan forms and discontinuities thereof. Imbalance Merely 1X is seen in frequence spectrum, 1X additions with clip and the Phase angle alterations Bode Plot remains the same, There is no alteration in critical velocity or stage angle when compared with the healthy status. Misalignment ( or Preload in the instance of unstable bearings ) 1X,2X,3X,4X etc are shown in frequence spectrum, Phase angle remains changeless The orbit secret plan will non change with velocity and polar secret plan remains the same. Crack 1X, 2X, 3X, 4X etc are shown in frequence spectrum and these continually alteration in amplitude. The stage angle alterations every bit good. There is amplitude and phase alteration of 1X constituent in the polar secret plan, The orbit secret plan alterations from a figure eight form to a cringle incorporating a little cringle. Bend Merely 1X is seen in frequence spectrum, 1X additions with clip and the Phase angle alterations A signal alteration of stage takes topographic point at critical velocity. Mechanical Diarrhea Presence of 0.3X, 0.5X, 1X,1.5X,2x, 2.5X in frequence spectrum Motor Bearing Damage Bearing Characteristic Frequencies would be seen in spectrum Fluid induced instability The presence of 0.45-0.48 X in spectrum when fluid natural frequence is approached by circumferential velocity of fluid, stand foring Oil Whirl. The presence of 0.45-0.48 X in spectrum when fluid natural frequence is approached by circumferential velocity of fluid, stand foring Oil Whirl Oil Whip consequences when Pump System rotor natural frequence peers fluid ‘s. Fig. 17. Diagnosis Chart for common mistakes ( Beginning: Sinha J.K. , M14 Lecture notes 2010, MSc Maintenance Engineering and Asset Management, University of Manchester ) Fault Diagnosis Process The overall quiver degrees measuring would be the first phase of protection for the pumps. The ISO recommends the usage of RMS values of speed for overall quiver measuring. Limits for acceptable quiver would be set and configured into the Bently Nevada 1900/65 proctors in footings of Velocity ( RMS ) . These proctors can denote when the bounds have been breached and this would motivate farther probe and trials. These bounds can be obtained from ISO tabular arraies or decided upon in-house by the care applied scientist. The proctor would demo which peculiar detector or detectors has detected a mistake. Furthermore, the proctor and diagnosing package proposed are capable of informations acquisition and storage which make it possible for swerving. The tendencies would be observed hebdomadal and when a set quiver bound is approached, the frequence of review is increased and trials such as the 1s mentioned before can be carried out to determine the mistake type, so a fitting care response can be planned. Fig. 18. Swerving illustration ( beginning: M04 CBM Lecture notes ( 2010 ) , MSc Maintenance Engineering and Asset Management, University of Manchester ) The mistake diagnosing chart would be used in concurrence with the FMEA diagram, 1900/65 proctor event logs and assorted applicable show secret plans ( frequence spectrum shows, Bode secret plan, Polar secret plan etc ) to corroborate the exact mistake of the pumps. Pump related frequences would be noted such that when they appear in the frequence spectrum, they can easy be identified. FMEA, Symptoms of identified impairment mechanismsPotential Failure ModePotential Effectss of FailurePotential Failure CausesSymptoms of identified impairment mechanisms1 Antifriction Bearing mistake ( Electric motor ) Bearing Seizure, Misalignment, Damage to motor shaft, Mechanical seal failure. Poor lubrication, Resonance High Frequency Hump seen in Frequency spectrum related to bearing lodging natural frequence 2 Shaft Cracks Shaft Fracture, Loss of pump action Resonance, Manufacturing defects 1X, 2X, 3X, 4X etc are shown in frequence spectrum. These addition in amplitude over clip. 3 Cavitation Impeller Damage, Reduced end product, Pump loss. Process disturbances, Gas lock in Pump Barrel Noisy operation, High frequence extremums in spectrum 4 Imbalance Excessive Vibration, B Damage to bearings and Impellers, Pump loss. Wear, Impeller harm 1x constituent in frequence spectrum which increases in amplitude over clip. 5 Journal Bearing Wear Lateral shaft drama, Shaft harm Matching misalignment Noisy operation, Lateral shaft drama, 6 Impeller Damage Reduced end product, Pump loss, Imbalance, Improper assembly, Cavitation, Flow-induced quiver Blade Passing frequence nowadays in frequence spectrum ( 5X,10X etc ) 7 Bent Shaft Bearing harm, High quiver Matching misalignment, Resonance Axial quiver, 1X presence in frequence spectrum 8 Matching Misalignment Resonance, Damage to pump internals, Mechanical seal failure, Loss of pump. Improper assembly, Resonance 1X,2X,3X,4X etc are shown in frequence spectrum 9 Shaft hang-up Damage to pump internals, Mechanical seal failure, Loss of pump. Matching misalignment 0.3X, 0.5X presence in quiver spectrum secret plan 10 Diarrhea Damage to pump internals, Mechanical seal failure, Loss of pump. Resonance, Improper Assembly The presence of 0.5X, 1X, 1.5X, 2X, 2.5X etc in frequence spectrum Fig. 19. FMEA tabular array for pump and motor assembly. Cost and Man-Power Implications of Vibration Monitoring and Analysis Set-up The monetary values given are estimations based on monetary values obtained from assorted cyberspace shopping web sites. They are non unequivocal as Bently Nevada gives monetary values based on different functionality demands and applications worldwide. Item Measure required for all three pumps Unit Price ( $ ) Price ( $ ) Accelerometer, Bently Nevada 330400 12 500 6000 Monitor, Bently Nevada 1900/65 3 2500 7500 Submersible Proximity investigations, Bently Nevada 12 1000 12000 Tacho Sensor, Bently Nevada 3 300 900 Laptop 1 1000 1000 System 1 Diagnostic Software Licence, Bently Nevada 1 20000 20000 Training for quiver applied scientist ( from bing care administration ) 2500Entire Price $ 49,900Fig.20. Cost breakdown of needed equipment for for good mounted quiver monitoring and analysis system. At lease one applied scientist with accomplishments for quiver monitoring and analysis would be required to supervise the whole set-up. He must be trained and competent in the usage of assorted show secret plans, signal processing and conditioning, for mistake designation and sensing. This cognition can besides be used on other critical works equipment such as the gas turbines and the centrifugal gas compressor. The dynamic word picture trials are to be contracted out to see service suppliers with the equal hardware and package for real-time life of vibrational gesture. It is estimated that the cost of this service would be circa $ 100,000. This brings the expansive sum of the proposed quiver programme from the frequent pump failures solution to for good installed status monitoring to about $ 150,000. Benefits and Limits of the proposed Vibration-based Condition Monitoring System The proposed set-up for monitoring and analyzing the quiver from the pumps has rather a figure of benefits. From the concern point of position, it is an investing because it can forestall dearly-won failures. The dollar value of the pumps ‘ failure within the biennial period considered in this study easy exceeds $ 1million when fix costs, trim parts, logistics and man-hours expended are considered. For the care administration, the presence of these vibration-based status monitoring equipment, makes it possible for care to be pro-active instead than reactive. Furthermore, frequent failures are eliminated which give room for better planning and more clip for effectual and efficient care. The cost of the quiver monitoring and analysis equipment can be seen to be a little monetary value to pay for plus handiness, enhanced productiveness and even safety. The restriction to the proposed system is the accomplishment, cognition and competency of the applied scientist or applied scientists who are in charge of the set-up. The signals for any mistake status would ever be picked up by the monitoring equipment. The proper and accurate diagnosing of mistakes and subsequent care determinations made are the remit of the applied scientist ( s ) responsible for the vibration-based status monitoring programme. In add-on, quiver monitoring equipment could neglect and necessitate replacing. Decision A glimpse through the summarised failure and care history of the H.P. flair scrubber pumps for a two twelvemonth period reveals the sum of resources expended on them and their hapless handiness. Clearly so, something new and different from the old attacks should be attempted. This proposed system covers all the grounds- from installing jobs check, procedure vagaries that cause cavitation, to common mistakes experienced by revolving machines such as bearing defects and matching misalignments to advert a few. Besides, the proposed methods are tested and trusted and can lend to nest eggs in care cost, works handiness and safety which are cardinal public presentation indexs for most industrial workss. Appendix i- Bently Nevada 1900/65 Monitor [ Online ] Available from: www.ge-energy.com/prod_serv/products/oc/en/bently_nevada.htm [ Accessed 6th May 2010 ] Appendix ii- Bently Nevada 330400 Accelerometers [ Online ] Available from: www.ge-energy.com/prod_serv/products/oc/en/bently_nevada.htm [ Accessed 6th May 2010 ] Appendix iii- Bently Nevada System 1 Diagnostic Software [ Online ] Available from: www.ge-energy.com/prod_serv/products/oc/en/bently_nevada.htm [ Accessed 6th May 2010 ] Appendix iv- Vibration Severity Limits for Machines Fig. 21. ISO 10816 Vibration Severity Limit Chart Appendix v- Submersible Proximity Probes [ Online ] Available from: www.ge-energy.com/prod_serv/products/oc/en/bently_nevada.htm [ Accessed 6th May 2010 ]