Tuesday, May 5, 2020

Alice Munros Boys and Girls Essay Example For Students

Alice Munros Boys and Girls Essay Alice Munros Boys and GirlsAlice Munros short story, Boys and Girls, has a very interestingdetail written into it. The narrators brother is named Laird, which wascarefully chosen by the author. Laird is a synonym for lord, which plays aimportant role in a story where a young girl has societys unwritten rulesforced upon her. At the time of the story, society did not consider men andwomen equal.The name symbolized how the male child was superior in theparents eyes and in general.Along with that, the name also symbolizes thedifference between the sexes when this story took place. We will write a custom essay on Alice Munros Boys and Girls specifically for you for only $16.38 $13.9/page Order now The time when this story took place was a time when men and women werenot equal. Mothers had traditional roles, which usually left them in the house,while men also had their roles, outside of the house. The male was the dominantfigure in the house, while the woman had to be subservient. It was an off thing to see my mother down at the barn. She did notoften come out of the house unless it was to do something hang out the wash ordig potatoes in the garden. She looked out of place, with her bare lumpy legs,not touched by the sun, her apron still on and damp across the stomach from thesupper dishes.1The narrator had problems coming to terms with the role in life that shewas expected to lead. She wanted to work outside with her father doing the workthat she deemed important. The mother tried to get the narrator to work insidedoing work deemed appropriate for a lady, however it was not something sheenjoyed. I hated the hot dark kitchen in the summer (p. 530).The narratorwas not considered of any consequential help to her father, simply because shewas female. Could of fooled me, said the salesman. I thought it was only a girl(p. 529). Even though the narrator could do more work than her younger brother,she was still under appreciated.Wait till Laird gets a little bigger, thenyoull have a real help (p. 530).Laird, on the other hand, was able to goout and do the things that he enjoyed. When Flora, the familys horse, runsaway Laird is invited to join the father and his assistant to re-capture thehorse, while the narrator must stay at home. When the narrator is reminiscing of the past, she recalls a time whenshe lured Laird up to the top of the barn. The whole purpose of this idea wasto get Laird in trouble. However, when her parents come and remove Laird fromdanger, they are actually mad at her, instead of Laird.This shows how theparents were more concerned with their son and that he could do no wrong. Thisreflects societys notion at the time, how men were always right. My father came, my mother came, my father went up the ladder talkingvery quietly and brought Laird down under his arm, at which my mother leanedagainst the ladder and began to cry. They said to me, Why werent you watchinghim? (p. 534)The grandmother is the best example of how women were thought of at thetime. She is from a time when there were even stricter rules of conduct forgirls. The narrators parents are more lackadaisical than the grandmother and alot less out-spoken. She voices what was taught to her when she was a child. At the time of the story, girls were expected to be dainty and quaint, while aman was expected to be the rough and tumble one. .ud202743cd1e435cf77be7763e728e12d , .ud202743cd1e435cf77be7763e728e12d .postImageUrl , .ud202743cd1e435cf77be7763e728e12d .centered-text-area { min-height: 80px; position: relative; } .ud202743cd1e435cf77be7763e728e12d , .ud202743cd1e435cf77be7763e728e12d:hover , .ud202743cd1e435cf77be7763e728e12d:visited , .ud202743cd1e435cf77be7763e728e12d:active { border:0!important; } .ud202743cd1e435cf77be7763e728e12d .clearfix:after { content: ""; display: table; clear: both; } .ud202743cd1e435cf77be7763e728e12d { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .ud202743cd1e435cf77be7763e728e12d:active , .ud202743cd1e435cf77be7763e728e12d:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .ud202743cd1e435cf77be7763e728e12d .centered-text-area { width: 100%; position: relative ; } .ud202743cd1e435cf77be7763e728e12d .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .ud202743cd1e435cf77be7763e728e12d .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .ud202743cd1e435cf77be7763e728e12d .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .ud202743cd1e435cf77be7763e728e12d:hover .ctaButton { background-color: #34495E!important; } .ud202743cd1e435cf77be7763e728e12d .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .ud202743cd1e435cf77be7763e728e12d .ud202743cd1e435cf77be7763e728e12d-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .ud202743cd1e435cf77be7763e728e12d:after { content: ""; display: block; clear: both; } READ: An Unexpected Gift EssayGirls dont slam doors like that. Girls keep their knees together when theysit down. And worse still, when I asked some questions, Thats none of girlsbusiness. I continued to slam the doors and sit as awkwardly as possible,thinking that by such measures I kept myself free. (p. 532)The narrator, however, did not keep her self free. Eventually, she began tochange and to become a stereotypical female. She began to conform to societysideas about women. Near the end of the story, Laird starts to realize his sex-determinedsuperiority. He explains to his father and mother how Flora escaped from theyard and also starts listening to his father almost exclusively. We shot old Flora, he said, and cut her up in fifty pieces. Well I dontwant to hear about it, my mother said. And dont come to my table like that.My father made him go and wash the blood off. (p. 536)Laird washes the blood off only after his father tells him to do so. This showsthe dominance of males in the society of the time. Laird may field his motherscomplains, but only does something about it once his father tells him to do so. This shows how his father is the authority figure, that his mother secondary tohis father. Even the daughter thinks lowly of the mother in comparison to thefather. It showed how little my mother knew about the way things really were(p. 531). Boys and Girls takes place at a time where there is no such thing asequality between the sexes. Men in this society are the dominant, authoritarianheads of the house-hold whose work is done outside the home. Women are expectedto look after the men and their work is done in the home. The narrator in Boysand Girls slowly becomes accustom with her role in society. The narrator andher brother symbolize the roles of males and females in that society. Thenarrator is forced into doing jobs that she doesnt enjoy doing, namely thatassociated with womens work at the time. Laird is allowed to do what hepleases. Laird is the lord, as a male he is deemed as the more important of thetwo, simply because of his sex, while the narrator cast into her womanly role,being of secondary importance. Bibliography1 Munro, Alice, Boys and Girls, Introduction to literature, eds. GillianThomas et al, third ed. (Toronto: Hardcourt Brace, 1995), p. 528 All subsequentreferences will be from this edition and will be cited in the text. Category: English

Saturday, April 4, 2020

Bpr at Ford Motor Company, India Essay Example

Bpr at Ford Motor Company, India Paper CHALLENGE: need for business process reengineering in Ford Motor Company Ford Motor Company is the world’s second largest manufacturer of cars and trucks with products sold in more than 200 markets. The company employs nearly 400,000 people worldwide, and has grown to offer consumers eight of the world’s most recognizable automotive brands. CHALLENGE With inherent large-scale growth issues, more demanding customers, and mounting cost pressures, Ford needed to transform from a linear, top-down bureaucratic business model to an Internet ready, nimble organization that engages and integrates customers, suppliers, and employees. SOLUTION Working with Cisco, Ford integrated and leveraged their supplier base by designing Covisint, an end-to-end infrastructure that enables an online, centralized marketplace connecting the automotive industry supply chain. Ford also enhanced the customer buying experience through redesigned and more user friendly Web sites. RESULTS Ford is enjoying an increase in customer satisfaction, sees huge revenue opportunities for developing and retaining loyal product advocates, and has taken both complexity and cost out of the supply chain. BUSINESS PROCESS REENGINEERING Business process reengineering (BPR) is a management approach aiming at improvements by means of elevating efficiency and effectiveness of the processes that exist within and across organizations. The key to BPR is for organizations to look at their business processes from a clean slate perspective and determine how they can best construct these processes to improve how they conduct business. Michael Hammer, the management expert who initiated the reengineering movement, defines reengineering as â€Å"the fundamental rethinking and redesign of business processes to achieve dramatic improvements in critical, contemporary measures of performance, such as cost, quality, service, and speed. It uses many of the tools just discussed to achieve these goals. It is a redesign and reorganization of business activities that results from questioning the status quo. It seeks to fulfill specific objectives and can lead to breakthrough improvement. We will write a custom essay sample on Bpr at Ford Motor Company, India specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Bpr at Ford Motor Company, India specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Bpr at Ford Motor Company, India specifically for you FOR ONLY $16.38 $13.9/page Hire Writer It is often associated with significant cultural and technological changes. Methodology of reengineering 1. Envision new processes 1. Secure management support 2. Identify reengineering opportunities 3. Identify enabling technologies 4. Align with corporate strategy 2. Initiating change 1. Set up reengineering team 2. Outline performance goals 3. Process diagnosis 1. Describe existing processes 2. Uncover pathologies in existing processes 4. Process redesign 1. Develop alternative process scenarios 2. Develop new process design 3. Design HR architecture . Select IT platform 5. Develop overall blueprint and gather feedback 5. Reconstruction 1. Develop/install IT solution 2. Establish process changes 6. Process monitoring 1. Performance measurement, including time, quality, cost, IT performance 2. Link to continuous improvement In the early 1980s, when the American automotive industry was in a depression, Ford’s top management put accounts payable- along with many other departme nts- under the microscope in search of ways to cut costs. Accounts payable in North America alone employed more than 500 people. Ford was enthusiastic about its plan to tighten accounts payable- until it looked at Mazda. While Ford was aspiring to a 400-person department, Mazda’s accounts payable organization consisted of a total of 5 people. The difference in absolute numbers was astounding, and even after adjusting for Mazda’s smaller size, Ford figured that its accounts payable organization was five times the size it should be. The Ford team knew better than to attribute the discrepancy to calisthenics, company songs, or low interest rates. THE EXISTING SYSTEM First, managers analyzed the existing system. When Ford’s purchasing department wrote a purchasers order, it sent a copy of the receiving document to accounts payable. Meanwhile, the vendor sent an invoice to accounts payable. It was up to accounts payable, then, to match the purchase order against the receiving document and the invoice. If they matched, the department issued payment. The department spent most of its time on mismatches, instances where the purchase order, receiving document, and invoice disagreed. In these cases, an accounts payable clerk would investigate the discrepancy, hold up payment, generate document, and all in gum up the works. THE PROCESS FLOW CHART It was slow and cumbersome. More than 500 accounts payable clerks matched purchase orders, receiving documents and invoices and then issued payment. Mismatches were common. SYSTEM DRAWBACKS: The drawback in this system was that ford’s accounts payable organization was performed by so many people. The department spent most of its time on mismatches, instances where the purchase order, receiving document, and invoice disagreed. In these cases, an accounts payable clerk would investigate the discrepancy, hold up payment, generate document, and all in gum up the works. Its process was not efficient. SUGGESTED IMPROVEMENT The management thought that by rationalizing processes and installing new computer systems, it could reduce the head counts. One way to improve things might have been to help the accounts payable clerk investigate more efficiently, but a better choice was to prevent the mismatches in the first place. To this end, Ford instituted â€Å"invoiceless processing. † Now when the purchasing department initiates an order, it enters the information into an on-line database. It doesn’t send a copy of the purchase order to anyone. When the goods arrive at the receiving dock, the receiving clerk checks the database to see if they correspond to an outstanding purchase order. If so, he or she accepts them and enters the transaction into the computer system. (If receiving can’t find a database entry for the received goods, it simply returns the order. ) Under the old procedures, the accounting department had to match 14 data items between the receipt record, the purchase order, and the invoice before it could issue payment to the vendor. The new approach requires matching only three items- part number, unit of measure, and supplier code- between the purchase order and the receipt record. The matching is done automatically, and the computer prepares the check, which accounts payable sends to the vendor. There are no invoices to worry about since Ford has asked its vendors not to send them. Ford dint settle for the modest increases it first envisioned. It opted for radical change- and achieved improvement. FORD REENGINEERED THE PROCESS. NOW ITS FAST AND EFFICIENT The new process cuts head count in accounts payable by 75%, eliminates invoices and improves accuracy. Matching is computerized. CONCLUSION: Ford discovered that reengineering only the accounts payable department was futile. The appropriate focus of the effort was what might be called the goods acquisition process, which included purchasing and receiving as well as accounts payable. When Ford reengineering its payables, receiving clerks on the dock had to learn to use computer terminals to check shipments, and they had to make decisions about whether to accept the goods. Purchasing agents also had to assume new responsibilities-like making sure the purchase orders they entered into the databases had the correct information about where to send the check. Attitudes towards vendors also had to change: vendors could no longer be seen as adversaries; they had to become partners in a shared business process. Vendors too had to adjust. In many cases, invoices formed the basis of their accounting systems. At one ford supplier adapted by continuing to print invoices, but instead of sending them to Ford threw them away, reconciling cash received against invoices never sent.

Sunday, March 8, 2020

Essay Sample on #8220;A Brief History of Zen#8221;

Essay Sample on #8220;A Brief History of Zen#8221; Zen (or â€Å"chan† in China and â€Å"dhyan† in India) is trendy now. It is seen in shops, magazines, songs, literature, meditation centers, and many other places. However, the real Zen, the one of history, has a long tradition. Zen is a type of Buddhism that started in India and traveled to China, across Asia, and ultimately became a global phenomenon. Its secular nature and simplicity has made it more accessible to the masses than many other spiritual practices. In this essay, the eras of Zen will be looked into: Proto-Chan, Early Chan, Middle Chan, Song-Dynasty Chan, Post-Classical Chan, and the Modern Era. Proto-Chan (c. 500-600) The beginning of Zen stems from the teachings of Bodhidharma, who was an Indian Buddhist monk. However, there is not much reliable historical evidence of his life, and mostly legends are relied upon. What is known is that Bodhidharma taught â€Å"dhyan,† or the quieting of the mind to reach a state of thoughtless awareness. Bodhidharma traveled to China on orders from his teacher, and his brand of Buddhism spread throughout northern China. Carrying the torch of Zen in China after Bodhidharma’s passing was Dazu Huike. He is considered the Second Patriarch of Chinese Chan (McRae, John R.). Early Chan (618–750) This period is famous for the founding of the first Chan institution in Chinese history by the fifth patriarch Daman Hongren and his student Yuquan Shenxiu. Also, this era featured a debate between the ideas of sudden or gradual enlightenment. The sixth patriarch, Dajian Huineng, focused on spontaneous nirvana. These differences in approaches formed various sects of Zen (Ray, Gary L.). Middle Chan (c. 750–1000) Many new schools of Zen developed during this period. The Hongzhou school of Mazu Daoyi came about, and concentrated on insight, the lack of positive statements, and on questions and answers between a master and student. Ultimately, this school promoted the idea that there is no real difference between ignorance and enlightenment, or the Buddha and an ordinary person. But later in this period, new traditions cropped up that became known as the Five Houses of Chan: the Codà ²ng school (Soto in Japan), the Là ­njà ¬ school (Rinzai in Japan), the Guiyang school (IgyÃ…  in Japan), the Fayan school, and the Yunmen school. Each school promoted varied teachings based on a certain master. A lot of the hallmarks of Zen were developed during this time, such as dialogues between masters and students, the drawing of circles, shouting, hitting, and other methods to prompt enlightenment (McRae, John R.). In addition, two important occurrences took place in Middle Chan. The Anthology of the Patriarchal Hall was created, and there was The Great Anti-Buddhist Persecution in 845. This had a strong detrimental effect on the propagation of Zen, but the Hongzhou school stayed intact (Takeuchi, Yoshinori, and Jan Van Bragt). Song-Dynasty Chan (c. 950–1300) You can say that Zen, or Chan, flowered in this period. Chan became the most popular Buddhist sect in China and made strong ties with the imperial government. Through the support of the government, the Linji school began to be the most renowned form of Chan. Also, the Linji school absorbed the other schools of Zen, except the Caodong school. These two schools did their best to win the favor of the imperial government (Wang, Youru). Furthermore, Chan started to embrace teachings from Pure Land Buddhism, Taoism, and Confucianism. This integration had effects on the aforementioned religions as well, as Zen started to influence them. Also, classic koan collections were written during the Song Dynasty, and Zen took hold in Japan and Korea (Wang, Youru). Post-Classical Chan (1368–1912) Chan became so widespread that about every monk in China was either from the Linji school or the Caodong school. However, as time went on, the syncretism of Zen and Pure Land Buddhism increased, with most temples practicing both. This prompted some people like Yunqi Zhuhong (1535-1615) and Daguan Zhenke (1543-1603) to carve out the distinction between Zen and other types of Buddhism through the study of scriptures and writing new texts. In addition, transitioning from the Ming Dynasty to the Qing Dynasty, monks focused on reviving the practices of shouting and beating to prompt enlightenment and published influential works on the transmission of knowledge across all the schools of Zen (Wang, Youru). Modern Era Though there was a decline in the popularity of Zen in the Qing Dynasty, the 19th and 20th centuries saw a fresh revival of the practice. Chan started to take on social issues like poverty and injustice, and even got involved in politics. Modern scholarship coupled with science was encouraged, and a deep study of the history of Zen began. It was also at this time that Zen reached the West, and despite it being repressed in the 1960s in China, it flourished in America and other major western nations. In the 1970s, China once again embraced Zen, and throughout the decades since, it has only grown in popularity as a practice, media phenomenon, and way of life (Wang, Youru). In summary, Zen began from the teachings of a Buddhist monk from India named Bodhidharma. He spread his teachings around China, and he was succeeded by several capable disciples. Through hundreds of years of tradition, Zen has become a mainstay sect of Buddhism through the nature of its mainly secular teachings, its connection with the Chinese imperial court, and its many revivals through literature and opening of new schools. Once Zen became the main spiritual practice of China during the Ming Dynasty, its influence was strongly felt in other religions and in political power. Chan also proved popular not only in Japan, Korea, and other Asian countries, but also in America and many other western countries. Now Zen is so popular that it is difficult to separate the practice from the cultural phenomenon. McRae, John R. Seeing through Zen: Encounter, Transformation, and Genealogy in Chinese Chan Buddhism. University of California Press, 2005. Ray, Gary L. The Northern Chan School And Sudden Versus Gradual Enlightenment Debates In China And Tibet, Institute Of Buddhist Studies Berkeley. Takeuchi, Yoshinori, and Jan Van Bragt. Buddhist Spirituality: Indian, Southeast Asian, Tibetan, Early Chinese. Crossroad, 1994. Wang, Youru. Historical Dictionary of Chan Buddhism. Rowman Littlefield, 2017.

Friday, February 21, 2020

Snowstorm Case Study Essay Example | Topics and Well Written Essays - 500 words

Snowstorm Case Study - Essay Example Every airport should have safety as the priority when conducting its operations. An important first step to doing this is by ensuring that all equipment that is to be used in snow and ice control are calibrated properly, updated, and certified as required at all time. The supervisor, mechanics, and equipment operators should inspect equipment at all times to ensure that the airport is in a position to deal with a snowstorm (Zhang, Debendra,and Rorik, 13). The supervisor needs to ensure that the required automotive fluids, parts used for replacement, and equipment are inventoried and stocked as is required as a pre-emptive move towards preventing a crisis in the event of a snowstorm. It is important to ensure that personnel notification procedures are up to date at all times. The supervisor should, therefore, review the call-out procedures for personnel preceding winter. The supervisor can do this by overseeing the updating of the cell phone numbers and other contacts of personnel involved in snow and ice control. Weather forecasting is of utmost importance to an airport because it is invaluable when it comes to scheduling of flights and the snow crew. The supervisor should, therefore, ensure that the airport contracts aviation weather services so that it is prepared in case of a snowstorm. In addition to contracted forecasting services, the airport should make use of the local weather service forecast and the runway surface condition sensor system. Forecasting information from these avenues is useful in scheduling of on-duty and off-duty snow crew personnel. The forecasting information can also be used for preparation of necessary equipment in snow and ice control procedures and the restocking of anti-icing or deicing materials. One way to ensure that snow and ice do not accumulate and cause a nuisance in the airport is by sweeping or plowing accumulations of the runway. The

Wednesday, February 5, 2020

Internet Marketing and an Impact on Buying Behaviour of Teenagers Personal Statement

Internet Marketing and an Impact on Buying Behaviour of Teenagers - Personal Statement Example Page, K., & Uncles, M (2004) define Internet marketing as a marketing strategy adopted by many entrepreneurs to reach out their customers through the Internet with an organized plan and a smart marketing campaign. The author argues that the online market is growing at a rapid pace compared to the retail market so that anyone with the need to make money select Internet as his first choice. As per the statistics available, in the fourth quarter of 2005, US retail e-commerce sales totaled $26.5 billion with an increase of 27.5% just from the third quarter of 2005. At the same time, millions of people are exploring opportunities on the Internet that made the competition stiff in online marketing. The author put forward two things; an effective plan and aggressive marketing for success in Internet marketing. He has pointed out that a website without planning and the identification of the target market will definitely end in failure whereas in-depth planning will increase the chances of su ccess more. The author also argued that even amidst the stiff competition, the future of Internet marketing is bright (Hartman, J. B., Gehrt, K., & Watchravesringkan, K., 2004). Mick, D.G., & Fournier, S (1998) defines In... strategies he has pointed out other methods such as site optimization, linking, and indexing, implementing online marketing partnerships with high-profile online businesses, paid keyword advertising, etc. as the successful strategies for Internet marketing. Buying behaviors of the teenage community Lenhart, A., Rainie, L., & Lewis, O (2001) reflects on buying behaviors of the teenage community in terms of their attitude toward appearance. They argued that the marketers should make advertisements to target "jockettes" (young women who have active lifestyles) and "young metrosexuals"(young men focussed on their outward appearances) in order to convince the teen community. Gender and brands can influence the buying habits of teens according to the author. Park, C., & Jun, J.K (2003) summarizes buying behaviors of teenagers with respect to the cool looking technology and customizations of products are essential for attracting teen customers. Personalization, style, and functionality are the major features of a product which influence the teen community. Impact of Internet marketing on buying behavior of teenagers The online purchasing behavior of teens for goods like books, apparels, dining, music, practices is around half of the teenage consumers that has risen significantly from the 31 percent of statistical from the result December 2000 (Park, C., & Jun, J.K., 2003). Teens are the major segment of Internet visitors. This is not easy to convince the teen community with conventional methods of marketing. A business plan and marketing strategies are essential for canvassing the teen community through Internet marketing.  

Tuesday, January 28, 2020

Fault Tree Analysis

Fault Tree Analysis Fault Tree Analysis Fault tree analysis (FTA) is a failure analysis in which an undesired state of a system is analyzed using boolean logic to combine a series of lower-level events. This analysis method is mainly used in the field of safety engineering to quantitatively determine the probability of a safety hazard. An Overview of Basic Concepts This quick subject guide provides an overview of the basic concepts in Fault Tree Analysis (FTA, system analysis) as it applies to system reliability and a directory of some other resources on the subject. History of Fault Tree Analysis (FTA) Fault Tree Analysis (FTA) is another technique for reliability and safety analysis. Bell Telephone Laboratories developed the concept in 1962 for the U.S. Air Force for use with the Minuteman system. It was later adopted and extensively applied by the Boeing Company. Fault tree analysis is one of many symbolic analytical logic techniques found in operations research and in system reliability. Other techniques include Reliability Block Diagrams (RBDs). Fault Tree Analysis (FTA) was originally developed in 1962 at Bell Laboratories by H.A. Watson, under a U.S. Air Force Ballistics Systems Division contract to evaluate the Minuteman I Intercontinental Ballistic Missile (ICBM) Launch Control System. Following the first published use of FTA in the 1962 Minuteman I Launch Control Safety Study, Boeing and AVCO expanded use of FTA to the entire Minuteman II system in 1963-1964. FTA received extensive coverage at a 1965 System Safety Symposium in Seattle sponsored by Boeing and the University of Washington. Boeing began using FTA for civil aircraft design around 1966. In 1970, the U.S. Federal Aviation Administration (FAA) published a change to 14 CFR 25.1309 airworthiness regulations for transport aircraft in the Federal Register at 35 FR 5665 (1970-04-08). This change adopted failure probability criteria for aircraft systems and equipment and led to widespread use of FTA in civil aviation. Within the nuclear power industry, the U.S. Nuclear Regulatory Commission began using probabilistic risk assessment (PRA) methods including FTA in 1975, and significantly expanded PRA research following the 1979 incident at Three Mile Island. This eventually led to the 1981 publication of the NRC Fault Tree Handbook NUREG-0492, and mandatory use of PRA under the NRCs regulatory authority. Fault Tree Analysis (FTA) attempts to model and analyze failure processes of engineering and biological systems. FTA is basically composed of logic diagrams that display the state of the system and is constructed using graphical design techniques. Originally, engineers were responsible for the development of Fault Tree Analysis, as a deep knowledge of the system under analysis is required. Often, FTA is defined as another part, or technique, of reliability engineering. Although both model the same major aspect, they have arisen from two different perspectives. Reliability engineering was, for the most part, developed by mathematicians, while FTA, as stated above, was developed by engineers. Fault Tree Analysis usually involves events from hardware wear out, material failure or malfunctions or combinations of deterministic contributions to the event stemming from assigning a hardware/system failure rate to branches or cut sets. Typically failure rates are carefully derived from substantiated historical data such as mean time between failure of the components, unit, subsystem or function. Predictor data may be assigned. Assigning a software failure rate is elusive and not possible. Since software is a vital contributor and inclusive of the system operation it is assumed the software will function normally as intended. There is no such thing as a software fault tree unless considered in the system context. Software is an instruction set to the hardware or overall system for correct operation. Since basic software events do not fail in the physical sense, attempting to predict manifestation of software faults or coding errors with any reliability or accuracy is impossible, unless assumptions are made. Predicting and assigning human error rates is not the primary intent of a fault tree analysis, but may be attempted to gain some knowledge of what happens with improper human input or intervention at the wrong time. FTA can be used as a valuable design tool, can identify potential accidents, and can eliminate costly design changes. It can also be used as a diagnostic tool, predicting the most likely system failure in a system breakdown. FTA is used in safety engineering and in all major fields of engineering. More on Fault Tree Diagram (FTD) Fault tree diagrams (or negative analytical trees) are logic block diagrams that display the state of a system (top event) in terms of the states of its components (basic events). Like reliability block diagrams (RBDs), fault tree diagrams are also a graphical design technique, and as such provide an alternative to methodology to RBDs. An FTD is built top-down and in term of events rather than blocks. It uses a graphic model of the pathways within a system that can lead to a foreseeable, undesirable loss event (or a failure). The pathways interconnect contributory events and conditions, using standard logic symbols (AND, OR etc). The basic constructs in a fault tree diagram are gates and events, where the events have an identical meaning as a block in an RBD and the gates are the conditions. Fault Trees and Reliability Block Diagrams The most fundamental difference between FTDs and RBDs is that in an RBD one is working in the success space, and thus looks at system successes combinations, while in a fault tree one works in the failure space and looks at system failure combinations. Traditionally, fault trees have been used to access fixed probabilities (i.e. each event that comprises the tree has a fixed probability of occurring) while RBDs may have included time-varying distributions for the success (reliability equation) and other properties, such as repair/restoration distributions. Drawing Fault Trees: Gates and Events Fault trees are built using gates and events (blocks). The two most commonly used gates in a fault tree are the AND and OR gates. As an example, consider two events (or blocks) comprising a Top Event (or a system). If occurrence of either event causes the top event to occur, then these events (blocks) are connected using an OR gate. Alternatively, if both events need to occur to cause the top event to occur, they are connected by an AND gate. As a visualization example, consider the simple case of a system comprised of two components, A and B, and where a failure of either component causes system failure. The system RBD is made up of two blocks in series (see RBD configurations), as shown next: The fault tree diagram for this system includes two basic events connected to an OR gate (which is the Top Event). For the Top Event to occur, either A or B must happen. In other words, failure of A OR B causes the system to fail. Relationships Between Fault Trees and RBDs In general (and with some specific exceptions), a fault tree can be easily converted to an RBD. However, it is generally more difficult to convert an RBD into a fault tree, especially if one allows for highly complex configurations. The following table shows gate symbols commonly used in fault tree diagrams and describes their relationship to an RBD. (The term Classic Fault Tree refers to the definitions as used in the Fault Tree Handbook (NUREG-0492) by the U.S. Nuclear Regulatory Commission). Methodology FTA methodology is described in several industry and government standards, including NRC NUREG-0492 for the nuclear power industry, an aerospace-oriented revision to NUREG-0492 for use by NASA, SAE ARP4761 for civil aerospace, MIL-HDBK-338 for military systemsfor military systems. IEC standard IEC61025 is intended for cross-industry use and has been adopted as European Norme EN61025. Since no system is perfect, dealing with a subsystem fault is a necessity, and any working system eventually will have a fault in some place. However, the probability for a complete or partial success is greater than the probability of a complete failure or partial failure. Assembling a FTA is thus not as tedious as assembling a success tree which can turn out to be very time consuming. Because assembling a FTA can be a costly and cumbersome experience, the perfect method is to consider subsystems. In this way dealing with smaller systems can assure less error work probability, less system analysis. Afterward, the subsystems integrate to form the well analyzed big system. An undesired effect is taken as the root (top event) of a tree of logic. There should be only one Top Event and all concerns must tree down from it. Then, each situation that could cause that effect is added to the tree as a series of logic expressions. When fault trees are labeled with actual numbers about failure probabilities (which are often in practice unavailable because of the expense of testing), computer programs can calculate failure probabilities from fault trees. The Tree is usually written out using conventional logic gate symbols. The route through a tree between an event and an initiator in the tree is called a Cut Set. The shortest credible way through the tree from fault to initiating event is called a Minimal Cut Set. Some industries use both Fault Trees and Event Trees. An Event Tree starts from an undesired initiator (loss of critical supply, component failure etc.) and follows possible further system events through to a series of final consequences. As each new event is considered, a new node on the tree is added with a split of probabilities of taking either branch. The probabilities of a range of top events arising from the initial event can then be seen. Classic programs include the Electric Power Research Institutes (EPRI) CAFTA software, which is used by many of the US nuclear power plants and by a majority of US and international aerospace manufacturers, and the Idaho National Laboratorys SAPHIRE, which is used by the U.S. Government to evaluate the safety and reliability of nuclear reactors, the Space Shuttle, and the International Space Station. Outside the US, the software RiskSpectrum is a popular tool for Fault Tree and Event Tree analysis and is licensed for use at almost half of the worlds nuclear power plants for Probabilistic Safety Assessment. Analysis Many different approaches can be used to model a FTA, but the most common and popular way can be summarized in a few steps. Remember that a fault tree is used to analyze a single fault event, and that one and only one event can be analyzed during a single fault tree. Even though the fault may vary dramatically, a FTA follows the same procedure for an event, be it a delay of 0.25 msec for the generation of electrical power, or the random, unintended launch of an ICBM. FTA analysis involves five steps: Define the undesired event to study Definition of the undesired event can be very hard to catch, although some of the events are very easy and obvious to observe. An engineer with a wide knowledge of the design of the system or a system analyst with an engineering background is the best person who can help define and number the undesired events. Undesired events are used then to make the FTA, one event for one FTA; no two events will be used to make one FTA. Obtain an understanding of the system Once the undesired event is selected, all causes with probabilities of affecting the undesired event of 0 or more are studied and analyzed. Getting exact numbers for the probabilities leading to the event is usually impossible for the reason that it may be very costly and time consuming to do so. Computer software is used to study probabilities; this may lead to less costly system analysis. System analysts can help with understanding the overall system. System designers have full knowledge of the system and this knowledge is very important for not missing any cause affecting the undesired event. For the selected event all causes are then numbered and sequenced in the order of occurrence and then are used for the next step which is drawing or constructing the fault tree. Construct the fault tree After selecting the undesired event and having analyzed the system so that we know all the causing effects (and if possible their probabilities) we can now construct the fault tree. Fault tree is based on AND and OR gates which define the major characteristics of the fault tree. Evaluate the fault tree After the fault tree has been assembled for a specific undesired event, it is evaluated and analyzed for any possible improvement or in other words study the risk management and find ways for system improvement. This step is as an introduction for the final step which will be to control the hazards identified. In short, in this step we identify all possible hazards affecting in a direct or indirect way the system. Control the hazards identified This step is very specific and differs largely from one system to another, but the main point will always be that after identifying the hazards all possible methods are pursued to decrease the probability of occurrence. Comparison With Other Analytical Methods FTA is a deductive, top-down method aimed at analyzing the effects of initiating faults and events on a complex system. This contrasts with Failure Mode and Effects Analysis (FMEA), which is an inductive, bottom-up analysis method aimed at analyzing the effects of single component or function failures on equipment or subysystems. FTA is very good at showing how resistant a system is to single or multiple initiating faults. It is not good at finding all possible initiating faults. FMEA is good at exhaustively cataloging initiating faults, and identifying their local effects. It is not good at examining multiple failures or their effects at a system level. FTA considers external events, FMEA does not. In civil aerospace the usual practice is to perform both FTA and FMEA, with a Failure Mode Effects Summary (FMES) as the interface between FMEA and FTA. Alternatives to FTA include Dependence Diagram (DD), also known as Reliability Block Diagram (RBD) and Markov Analysis. A Dependence Diagram is equivalent to a Success Tree Analysis (STA), the logical inverse of an FTA, and depicts the system using paths instead of gates. DD and STA produce probability of success (i.e., avoiding a top event) rather than probability of a top event. References Ericson, Clifton (1999). Fault Tree Analysis A History (pdf). Proceedings of the 17th International Systems Safety Conference. http://www.fault-tree.net/papers/ericson-fta-history.pdf. Retrieved 2010-01-17. Rechard, Robert P. (1999). Historical Relationship Between Performance Assessment for Radioactive Waste Disposal and Other Types of Risk Assessment in the United States (pdf). Risk Analysis (Springer Netherlands) 19 (5): 763-807. doi:10.1023/A:1007058325258. SAND99-1147J. http://www.osti.gov/bridge/servlets/purl/759847-JsFRIG/webviewable/. Retrieved 2010-01-22. Winter, Mathias (1995). Software Fault Tree Analysis of an Automated Control System Device Written in ADA (pdf). Masters Thesis (Monterey, CA: Naval Postgraduate School). ADA303377. http://handle.dtic.mil/100.2/ADA303377. Retrieved 2010-01-17. Benner, Ludwig (1975). Accident Theory and Accident Investigation. Proceedings of the Society of Air Safety Investigators Annual Seminar. http://www.iprr.org/papers/75iasiatheory.html. Retrieved 2010-01-17. DeLong, Thomas (1970). A Fault Tree Manual (pdf). Masters Thesis (Texas AM University). AD739001. http://www.dtic.mil/cgi-bin/GetTRDoc?AD=AD739001Location=U2doc=GetTRDoc.pdf. Retrieved 2010-03-09. Eckberg, C. R. (1964). Fault Tree Analysis Program Plan. Seattle, WA: The Boeing Company. D2-30207-1. http://www.dtic.mil/srch/doc?collection=t3id=AD0299561. Retrieved 2010-01-17. Begley, T. F.; Cummings (1968). Fault Tree for Safety. RAC. ADD874448. http://www.dtic.mil/srch/doc?collection=t3id=ADD874448. Retrieved 2010-01-17. Hixenbaugh, A. F. (1968). Fault Tree for Safety. Seattle, WA: The Boeing Company. D6-53604. http://www.dtic.mil/srch/doc?collection=t3id=AD0847015. Retrieved 2010-01-17. Acharya, Sarbes; et. al. (1990) (pdf). Severe Accident Risks: An Assessment for Five U.S. Nuclear Power Plants. Wasthington, DC: U.S. Nuclear Regulatory Commission. NUREG-1150. http://www.nrc.gov/reading-rm/doc-collections/nuregs/staff/sr1150/v1/sr1150v1-intro-and-part-1.pdf. Retrieved 2010-01-17. Vesely, W. E.; et. al. (1981) (pdf). Fault Tree Handbook. Nuclear Regulatory Commission. NUREG-0492. http://www.nrc.gov/reading-rm/doc-collections/nuregs/staff/sr0492/sr0492.pdf. Retrieved 2010-01-17. Vesely, William; et. al. (2002) (pdf). Fault Tree Handbook with Aerospace Applications. National Aeronautics and Space Administration. http://www.hq.nasa.gov/office/codeq/doctree/fthb.pdf. Retrieved 2010-01-17. 7.9 Fault Tree Analysis (pdf). Electronic Reliability Design Handbook. B. U.S. Department of Defense. 1998. MIL-HDBK-338B. http://www.everyspec.com/MIL-HDBK/MIL-HDBK+(0300+-+0499)/download.php?spec=MIL-HDBK-338B.015041.pdf. Retrieved 2010-01-17. Fault Tree Analysis. Edition 2.0. International Electrotechnical Commission. 2006. IEC61025. ISBN2-8318-8918-9. Long, Allen (pdf), Beauty the Beast Use and Abuse of Fault Tree as a Tool, fault-tree.net, http://www.fault-tree.net/papers/long-beauty-and-beast.pdf, retrieved 16 January 2010.

Sunday, January 19, 2020

The Characters of Maria and Oscie in Ann Rinaldis In My Fathers House :: Ann Rinaldi In My Fathers House

The Characters of Maria and Oscie in Ann Rinaldi's In My Fathers House   Ã‚  Ã‚  Ã‚  Ã‚  In the book In My Fathers House, written by Ann Rinaldi, there are two main characters whose names are Maria and Oscie. These two girls are sisters that live in a house that is being divided by the civil war. Their stepfather (Will McLean) is from the north and is known as a Yankee in the south. Most southerners disagree with his beliefs on slavery, but nevertheless, he is still a respected town leader on the school board and is head of the volunteer fire department. Maria, fifteen and more a southern belle, tries to get along with people and stays out of trouble with Will. Oscie, who is a year younger, often tries to get the better part of Will.   Ã‚  Ã‚  Ã‚  Ã‚  Oscie and Maria vary in many obvious ways. One of these ways is that Oscie is more independent and can be more self sustained. Maria on the other hand is a southern belle who is heavily dependent on her family for all sorts of different needs. Maria is able to accept reality more than Oscie, is more mature and can handle being beaten in an argument, but Oscie can not accept losing and is always trying to best people around her and herself. An example of this is how Oscie is always arguing with Will. She even asked her tutor, â€Å"will you teach me to best Will McLean?†   Ã‚  Ã‚  Ã‚  Ã‚  Although Maria and Oscie are very different they do have a few things in common. They both have an odd attraction to military men. This is shown in their choice of guys. They also both share the same parents. Sarah who is dead now, also has Dr. John and Mama as parents. Both Oscie and Maria are in love with the south and don’t want to part with most of its ways when they move.