Thursday, August 27, 2020

Analysing The Terrorism In Southeast Asia Tourism Essay

Breaking down The Terrorism In Southeast Asia Tourism Essay Voyaging has consistently been a piece of people groups lives for a long time, in the former times individuals used to go for strict purposes, social, or just to investigate the world out there. To be perfectly honest, the travel industry is characterized as making a trip starting with one spot then onto the next spot or starting with one nation then onto the next whether it is for relaxation purposes, business purposes, or different purposes. The travel industry is considered as one of the quick and biggest in developing, just as ventures of creating occupations around the globe. Emergency and clashes are portions of our day by day lives as it generally will and consistently have been, subsequently the significance of the countrys financial influenced by psychological oppression occasions to a countrys the travel industry is obvious, which will also impacts the countrys political and social issues too. For most creating nations around the globe, the travel industry is a basic source that produces income and henceforth a significant part that assumes a significant job in political, prudent, and social turn of events, a solid tie of relationship that help with remunerating the nation if there is certain condition exist on worldwide economy. As Malaysia is one of the Southeast Asian nations, as per research the Malaysian Tourism Minister, Datuk Seri Ng Yen expressed that despite the fact that the time of 2009 is a year that Malaysia had its difficult situations, however it appeared that it was a decent year for Malaysian the travel industry, commitment of RM1bil every week to the economy of the nation by the business of the Tourism Malaysia in the time of 2009, giving just as producing work to in excess of a million Malaysians making Malaysia positions the ninth most voyaged goal around the globe by the United Nations World Tourism Organization (UNWTO). Anyway imagine a scenario in which there is a negative condition exist in Southeast Asia area which will influe nce nations inside that district, for instance, for example, fear mongering occasions orccured in the nation or neighboring nations. (www.news.malaysia.msn.com) Fear based oppression is characterized as political brutality based emergency express a sort of bedlam that points genuinely to decimate individuals whom are unprotected, while asserting themselves that they have an ideological perspective, essentially saying fear mongers are political in their points, and they typically take steps to utilize viciousness or resort to mighty acts, their activities are generally structured, for it is past the prompt objective of their mental reprecussions, they are ordinarily administered by an association from a hierarchy of leadership, which that is the reason they were assigned as psychological warfare from what they have done. Fear based oppression occasions are eccentric as these occasions would happen at whenever and anyplace. The impacts of psychological warfare to a countrys economy may be unnerving, this is because of the reason for high abatement in the quantity of vacationers that has potential in producing assets to the nation also a dimini shing in the travel industry pay that will jeopardize a breakdown in the nearby travel and the travel industry which influences and gets interference the travel industry sectoral exercises. Other than that, this effect may likewise prompt flattening, mass joblessness from the zone that had been threatened and individuals working there need to make delay in their work or be jobless except if there is another conceivable occupation opening for them , vagrancy where regular people remaining close by the threatened zone where they call it home may be mentioned to moved from that territory to another protected sanctuary, wrongdoing may ascend also when they countrys security is unbalance and wild, business separate and other social and financial ills. One of the territories in Asia that is quick in turning into the problem area of fear mongering acts which is the locale of Southeast Asia. Southeast Asia comprise of 17 nations which incorporates Cambodia, East Timor, Indonesia, Burma (Myanmar), Laos, Philippines, Singapore, Malaysia, Vietnam and Thailand. This is because of the high rate of developing and expanding theft danger from fear based oppression around the zone of Southeast Asia, where this is the provincial zone that pulls in generally inclined on demonstrations of robbery whereby bookkeeping on all theft assaults for around 50 percent around the world. This fear based oppression occasions are disturbed by indigenous gatherings of psychological militant in solid oceanic customs, and this fear based oppression acts and robbery has made Southeast Asia a worry in local security. There are three fear based oppressor bunches that normally strikes Southeast Asia areas which has the demonstrated ability and expectations to pract ice sea psychological warfare, which is The Abu Sayyaf Group (ASG), the Jemaah Islamiyah (JI) and the Gerakan Aceh Merdeka (GAM), and Abu Sayyaf Group (ASG) is the most popular in its fear based oppression acts in light of its hierarchical structure, how they work their system, participation and how they suggest for sea security in Southeast Asia. (Oceanic Terrorism In Southeast Asia, Rommel C.Banlaoi 2005, pg:1) 1.2 Problem Statements The issue is about by what means will the demonstrations fear mongering influence the vast majority of the travel industry in Southeast Asia. The travel industry is the most delicate division in Southeast Asia just as the entire world, and fear based oppression has quickly expanded its effect on the travel industry everywhere throughout the world including Southeast Asia. Fear based oppressor picks the travel industry as their objective since the travel industry is one of the countrys asset creating relationship which prompts political, social, and conservative issues. The travel industry will be their obvious objective crowd because of the way that fear based oppressor activities will harm a nation by harming the economy of that specific nation in Southeast Asia through the travel industry, whereby the multiplier impact from the psychological oppression acts are high. Other than that, it will lessens an open picture of Southeast Asia through the travel industry that visitor dare not travel into Southeast Asia realizing that nations in it was being pointed, or vacationer will feel uncertain regardless of whether they went into that specific nation influencing all through their entire outing as they can't appreciate however feeling stressed over their wellbeing, or may never visit to nations situated in Southeast Asia any longer. Individuals around the globe may reconsider before heading out to places in Southeast Asia and this is certainly a danger to the improvement of Southeast Asian the travel industry since the travel industry must be flourish under serene conditions (Pizam and Mansfield, 1996 : 2) and its strength influence a ton of good the travel industry chances to Southeast Asia. 1.3 Research Objectives 1. Breaking down the psychological warfare in Southeast Asia. 2. Breaking down how profoundly will fear mongering influence the travel industry in Southeast Asia. 3. Make mindfulness about fear mongering in Southeast Asia to vacationer. 4. Proposals and recommendations in decreasing and battling against fear based oppression in Southeast Asia. 1.4 Research Questions What are the mainstream gatherings of psychological oppressor accessible in Southeast Asia. Which nation in Southeast Asia that draw in most to fear based oppression? What are the impacts of fear mongering to Southeast Asia the travel industry? What has been done to lessen fear based oppression in Southeast Asia? Who will profit when fear based oppression is effectively diminished? 1.5 Conceptual Framework and Theoretical Framework 1.5.1 Conceptual Framework Fear based oppression In Southeast Asia Singular mindfulness and information on Terrorism. The activities done by the administration and associations. The Effects of Terrorism to the Tourism Industry in Southeast Asia. 1.5.2 Theoretical Framework This exploration will for the most part address the psychological warfare that is quickly expanding its effect on the travel industry of Southeast Asia and how it really influences the travel industry. In addition, Terrorism occasions can happen anyplace and whenever, bringing its impact that includes generally in the Political, Economical, and Social issues just as its results around the territorial region that was being assaulted just as their travel industry. In the papers, we can see that fear mongering acts happened all around the globe and we can find out about it yet not all can comprehend the genuine appalling that specific nations had experienced taking care of, explaining and forestalling these psychological oppression acts from happening once more, and individuals may get messy reasoning that fear based oppression acts like these are simply one more day around the globe and care less about it. This will permit conceivable fear based oppression to happen again as individual s don't play it safe and counteractions. There are numerous activities taken by the administration around the globe to decrease conceivable fear based oppression occasions to happen once more. On the off chance that these fear mongering acts are not appropriately forestalled, it will be risky to the likely casualties and individuals living in their nation, as their nation may be in disorder just as traveler going far and wide. 1.6 Importance of Significance of study This is significant on the grounds that, Terrorism is expanding radically around the globe and examination has demonstrated that Southeast Asia is quick in turning into the universes problem area for psychological oppression exercises. Since the time what occurred on September 2001, America has put center around fear based oppressor association and gatherings that is situated in Southeast Asia, which as indicated by research especially to nations like Indonesia, Malaysia, Philippines, Singapore just as Thailand, and this is all since Southeast Asia is a possible base for their psychological warfare activities. Other than that, this exploration is focused to recognize individuals around the globe of how genuine the significance of wellbeing and security during a movement and how it will make harm nations in Southeast Asias economy, social, and policy driven issues through the travel industry by focusing on visitors. It is significant that individuals around the globe attempting to unravel and decrease psychological oppressor association supposing that individuals around the globe care less about that fear mongering is simply occurring in specific territories of Southeast Asia and never do any safeguards or counteractions then psychological warfare acts are so a lot simpler and visit it will happen again and it will be exceptionally difficult to cut them down when their association is all through the world. This is the reason a

Saturday, August 22, 2020

Bisexual Discrimination Essay

Sexuality has throughout the entire existence of humanity involved a significant pat of the general public. In all history of humanity, it has been difficult to order individuals in some other structure without one’s sex assuming a significant job. Anyway the issue isn't the organic sex contrasts. The issue is the sex jobs the general public has designated to people, making it look like there are a few things that ladies can do yet men can't do, and that there are a few jobs young men can play yet young ladies can't. This has come to be known as sexual orientation mainstreaming. This paper inspects promiscuity in the general public and how it has prompted segregation to the individuals who don't buy in to the majority’s sexual directions. Indiscriminateness alludes to a circumstance whereby an individual wants to participate in sentiment or sex with the two guys and females. Anyway most bisexuals will in general have a proclivity for either guys or females and it is regularly uncommon for an androgynous to adjust the craving to both genders. As indicated by Kinsey Scale (Klein and Wolf, 1985) bisexuals are overwhelmingly hetero and by chance gay. In this manner promiscuous could be described by stylish attractions for individuals from the other gender and doesn't really need to include sentiment or real sex (Klein and Wolf, 1985). In spite of the fact that androgyny was in the past mistaken for bisexuals, the term has become well known and new phrasings have developed to additionally explain indiscriminateness. Such wording incorporate Biphobia which alludes to the dread which bisexuals are exposed to by being dismissed by individuals from standard sexual directions, for example, heteros and gay people who hold that, promiscuity isn't a proper way of life. Bisexuals are likewise confronted with homophobia which comes from the dread of dismissal and downfall by individuals who just have faith in heterosexuality as the main suitable way of life and thusly don't perceive androgyny as a way of life. This prompts the separation of the bisexuals by heteros who structure most of the general public. As indicated by (Greene, 2000), about 2% of the American populaces are bisexuals. This is a marker that bisexuals structure an extensive extent of the American culture and subsequently has the right to be tuned in to and perceived in every single social measurement. The vast majority of the issues being knowledgeable about terms of battling the segregation being leveled against bisexuals have something to do with how the general public everywhere builds sex. The vast majority take a gander at life from the component of duality (Peplau, and Garnets, 2000), something which leads numerous individuals to have issues understanding how individuals can easily take part in sexual or sentimental associations with either sex. This has prompted generalizations which thus have prompted segregation. Bisexuals have been looked by various difficulties in their undertaking to pick up acknowledgment from the general public. These difficulties chiefly originate from the propensity of most bisexuals to have the fear to come up in the open and reject segregation while simultaneously coming to their meaningful conclusions known to the general public. Clashes command a large portion of the bisexuals’ life circles like marriage, training and occupation. Bisexuals in a marriage get it exceptionally hard to open up to their mates and admit about their sexual directions in dread of dismissal by their accomplices or out and out dismissal. This can be trying minutes for bisexuals and consequently numerous outcomes into living in discipline. In spite of the way that there are many hitched individuals who are swinger; opening up isn't something many are prepared to do. The truth of separation doesn't pull in numerous in that, numerous bisexuals connect out in the open as heteros not at all like it is the situation with gay people and heteros where accomplices something which is generally viewed as disloyalty in the general public. The other significant test confronting bisexuals is acknowledgment by strict associations. Most strict factions have an issue perceiving some other sexual direction separated from heterosexuality. This presents incredible difficulties to the individuals who happen to be profound as it turns that their ways of life don't concur with their strict teachings. This is testing and is a typical wellspring of segregation for bisexuals. Bisexuals are confronted with a character emergency emerging from the above difficulties and this is at present a significant concern for bisexuals whose privilege to articulation is enormously influenced by difficulties obvious in the strict, social, conjugal just as work life. Social hindrance keeps on being a wellspring of separation for bisexuals. Most societies are generally male commanded and the social structures are developed to such an extent that; the man is the head of most family units (Lane, and Goeltz, 1998). The issue of androgyny has not exactly been gotten well in most customary societies. This presents hardships to bisexuals who wish to have ordinary existences as bisexuals yet at a similar need to fit in the way of life. This is obvious in schools whereby the training framework doesn't mull over the requirements of bisexuals yet accept that everybody is hetero. This is anguishing for bisexuals whose interests are not very much dealt with, which is plainly a wellspring of segregation. Bisexuals as of now appear to be the most recent survivors of the ceaseless fixation of sexuality in the general public. Segregation based on one’s sex happens when an individual is denied a few rights and opportunity based on their convictions concerning sex and relationship. Normally, sexual segregation is regular in cases whereby the casualty has a place with a minority sex gathering, for example, indiscriminateness, and homosexuality. Reliable battle for equivalent rights for gay people and heteros prompted the acknowledgment of the gay people as social bonafide gatherings. Today in numerous states, gay people can be glad for their sexual direction, communicate openly and furthermore look for social rights. A few states perceive and permit gay people to wed. It is not, at this point a major issue for one to be gay or lesbian. The general public has now obviously turned the warmth on bisexuals. Anyway the purposes behind this separation are outlandish a portion of the regular reasons adversaries of indiscriminateness give are; it is ungainly, it is in reverse, and it is bizarre (Peplau, and Garnets, 2000). These are a portion of the reasons being progressed by rivals of bisexualism. Plainly, the above reasons are unmerited and need observational help as they do need any lawful support. This has made it especially difficult for bisexuals to have ordinary existences in schools as well as in all circles of life, for example, the work place. Bisexuals are in any event, confronting separation from gay people who having experienced a similar encounter of segregation, ought to be in the bleeding edge of ensuring and protecting the androgynous development. Lamentably that isn't the situation. Gay people simply like the heteros are not going to yield in their oppression bisexuals. This is absolutely unsatisfactory and is in direct infringement of the privileges of the bisexuals. The way that the bisexuals are just a minority in the network and accordingly can't wage a solid ‘war’ against segregation has caused bisexuals to keep on to endure unreasonably. Sexual segregation takes a ton of structures and is showed in the work environment, in getting to training, getting to of openings for work, just as in the getting to of government managed savings. The entrance to circumstances dependent on sex is biased in that, it favors individuals from some sexual directions and persecutes others. In the U. S. , the enactment that shields individuals from segregation dependent on sex is the Title VII, in Civil Rights Act of 1964 (Randen, 2001). The law has been censured because of the way that it just tends to issues encompassing inappropriate behavior that is material to the work place however neglects to address sexual segregation in different settings. The Equal Pay Act of 1963 is the other law in the US that covers those confronting or are under danger of sex separation. Once more, this law like the others just covers a few individuals from the network and doesn't take great consideration of swinger interests. End There is a requirement for the general public to be edified as to rising patterns in sexual directions and ways of life. This is conceivable through intrigue gatherings and the administration investing exertion as far as enactments, mindfulness crusades, and joining of sex instruction into the training educational program. All the above measures, will prompt a superior comprehension of indiscriminateness and thusly the separation as of now being coordinated towards bisexuals is probably going to stop. It is feasible for bisexuals to beat the present separation, just if the bisexuals proceed in the battle against sex segregation. References Greene, B. (2000). African American Lesbian and Bisexual Women. Diary of Social Issues, 56(2). Klein F. what's more, Wolf T. (1985). Bisexualities: Theory and Research. Haworth Press, New York. Path, R. what's more, Goeltz, W. (1998). Character disarray, promiscuity, and departure from the mother. Clinical Psychology Review, 18(3). Peplau, L. also, Garnets, L. (2000). A New Paradigm for Understanding Women’s Sexuality and Sexual Orientation. Diary of Social Issues, 56(2 Randen, H. (2001). Bi Signs and Wonders: A meeting with Robyn Ochs. Diary of Bisexuality, 1(1): 5-26.

Friday, August 21, 2020

How to Find Scholarship Essay Samples - Your Essay Writing Tips

How to Find Scholarship Essay Samples - Your Essay Writing TipsGraduate college scholarship essay samples can be found easily on the internet. You have to type in a keyword such as 'scholarship essay samples' into your favorite search engine and you will find many websites that sell them to you. Many of these are legitimate and others may be copies of other sites.Before you buy one of these, make sure that you have a copy of the document so that you can take a plagiarism check on it. To do this, go to the Google search and type in 'plagiarism check'plagiarism proof'.Most of the sites that offer these are for a fee and they offer access to their products for a fee but there are some free sites that offer them too. For instance, CollegeAdvice is one of the free sites that give free education scholarship essay samples. The main drawback with free sites is that they do not offer the best quality products.If you want a high quality product, then the best site is the membership site. The m embership site offers up to date, original samples from the top schools in the nation. One of the main reasons why the premium membership sites are better than the free ones is because the premium sites have actual professors that write and edit the essays and give critiques.The key to getting the best, original, highest quality and high paying grad school scholarship essay samples is to find one that has actual, published professors that wrote and edited the essays. One example is University of Phoenix, another is Kaplan. You can also use MSN, Yahoo, Ask.com and any search engine to find the best grad school essay samples.Once you find the best site that offers you these, you should also make sure that you have the right to research information about the person's work. You can read the actual transcript, interview notes, etc.Remember, the last thing you want to do is spend your money on the high priced fake or plagiarized essay samples that do not produce the results you want. It i s better to spend the extra money on a high quality product instead.Remember, when you are getting your essay samples it is important to take all the tips above into consideration. Getting a high quality, original and affordable product is the key to obtaining the information you need for your application essay.

Monday, May 25, 2020

Race in Othello and Titus Andronicus Essay - 1909 Words

Race in Othello and Titus Andronicus Within both Titus Andronicus and Othello both by William Shakespeare the reader is introduced to the concept of a black man within a white society. Stigmas and stereotypes are attached to the black characters of Aaron and Othello. Although each black character has a similar stigma, the characters are very different from one another. Aaron is portrayed as evil, conniving and malevolent, while Othello has none of these traits. Othellos fault lies in the fact that he is very gullible and easily led. Aaron within Titus Andronicus is a character that is both bound and not bound to his colour. Though his actions can be blamed on his colour, there are two paths to follow in this†¦show more content†¦His is the stereotypical black Devil form within Elizabethan literature. The pleasure Aaron takes parallels the pleasure the Devil gets in seeing humans suffer. Aaron proclaims his delight in the trouble he causes with an aside to himself and the audience O how villainy / Doth fat me with the thoughts of it! / Let fools do good, and fair men call for grace: / Aaron will have his soul black like his face (TA III.i.201-204). Aaron gets deep satisfaction and pleasure from the torture of others. Aaron himself acknowledges his anger and his hate towards those around him (Incidentally those around him are all white). The only individual with whom he takes complete trust and compassion is his own child who is as black as he is. Up until his child has been born he has no allies and certainly no friends. He has been good enough to be Tamoras lover, a teacher to her children and a quiet part within the court but he has not been good enough to technically be raised above the station of a slave or servant. It is also ironic to point out the concept of family and colour. Both Titus and Tamora are white people yet their treatment of their own children leaves something to be desired. Titus himself follows the rules and codes of Rome without fail, though his parenting skills are much to be desired. However Aaron who never keeps his word to anyone else (save himself), causes deaths, rapes andShow MoreRelatedEssay on The Moor in the Works of William Shakespeare4150 Words   |  17 Page sof the Other: race such as that of Shylock and Aaron, nationality as in Iachimo, bastardy such as the characters Don John and Edmund, social status such as that belonging to Iago, and deformity, for example, Richard III (35). Not every Other is characterized as evil, but nonetheless depicted as being somehow different or separated from society. Characters such as Malvolio, Faulconbridge, Macbeth, and Othello are of this subdivision.       One sect of Otherness is that of race. During thisRead More William Shakespeares Othello as a Victim Essay1370 Words   |  6 PagesWilliam Shakespeares Othello as a Victim Not All Works Cited Included In Othello Shakespeare shows that Othello is victimised in many ways, for instance; his race, his culture, his social position and naÃÆ' ¯ve. Othellos victimisation could also show Shakespeares meaning of the term tragedy. In other Shakespearean tragedies the lead character is shown as cunning, ruthless and manipulative, more similar to Iago than Othello. This could represent a change in Shakespeares Read MoreOthello Research Paper1226 Words   |  5 PagesCarly Niedert Dr. Helen Davis English 120 1 December 2011 Othello In the play Othello written by Shakespeare, the issue of racism is addressed. Othello, the protagonist of the play, is African American or black. â€Å"According to Lois Whitney, many of Othello’s specific attributes probably derive from Shakespeare’s reading of Leo Africanus, whose Geographical Historie of Africa which was translated and published in London in 1600†(Berry, 1990). Many critics have different views on this. â€Å"If ShakespeareRead MoreOthello - Values and Attitudes2518 Words   |  11 Pagesquot;If Othello didnt begin as a play about race, history has made it one.quot; The Venetian society that Othello is set in is representative of the writers context. The attitudes and values that Shakespeare reveals through the text are those same attitudes and values of Elizabethan society in England in the sixteenth-century. Although Othello is set in Venice and Cyprus, the attitudes and values shared in the text are probably reflective of the attitudes and values of Shakespeares ownRead MoreExposing Racism in William Shakespeare’s Othello Essay2036 Words   |  9 Pagesracist’s hate plagues a vulnerable community of black slaves, with religion and war corrupting diverse cultures in the attempts to purify the existence of sin. This enlightening argument of what inspires William Shakespeare’s to compose the play Othello contaminates romantic relationships, Before the integration of black-skinned people into Elizabethan culture, Christian ideology coalesce Satan’s appearance with babies born black, with such manifestations supported by centuries of anecdotal evidenceRead MoreThe Tragedy Of Othello By William Shakespeare1824 Words   |  8 Pages242-243). She is nothing close to the loyal wife of Othello in Shakespeare; she is an adulteress who despises the confinement of marriage. While women are used in Shakespeare, these recreated women use men and despise them. Desdemona expresses contempt for marriage â€Å"Women are clad in purdah, we decent, respectable matrons, from cradle to the altar to the shroud†¦bridled with linen, blinded with lace†¦These very walls are purdah† (Adaptations 242). Although race is not the focus in this play, neither is it

Thursday, May 14, 2020

Civil Rights in the United States - 1282 Words

Pieces of the People’s Puzzle In total there are fifteen laws that count towards the topic of civil rights in the United States, alone. Kenji Yoshino, author of â€Å"The New Civil Rights† says that in order for us to turn our current beliefs into a set of ‘new’ civil rights, law must play a role. Obvious enough, law alone cannot bring about a new set of civil rights. There are more than enough pieces that could make up this puzzle. For instance, media plays a huge role in this situation. The media only shows what they want us, the people, to see. If we only see what they want us to see then wouldn’t that leave us very narrow-minded? The media adds irrelevant detail to every situation. For example, a person’s race, which otherwise†¦show more content†¦to push the negativities of inequalities in America. I could say â€Å"Racism is wrong† but unless I do something about it and spread word on why racism is wrong, civil rights activism won’t go anywhe re. The Merriam-Webster Dictionary defines covering as an object or substance that goes over or on top of something especially in order to hide or protect it. Kenji Yoshino donates a more philosophical definition which is also geared towards the topic at hand. He states that covering is â€Å"to tone down a disfavored identity to fit into the mainstream (479).† People should be able to show their true selves to the public. Then, there are people who just can’t show their true identity and they are covering to live. For example, Middle-Eastern women cover their whole bodies in an effort to abide laws or be killed. In a less literal sense, in such a judge-mental society there are millions of homosexuals hiding their true identity for fear of being bashed in public. â€Å"Your commitment is to help people ‘be themselves’ – to resist demands to conform that take away their ability to be the individuals they are. But the covering idea could perpetuate t he stereotypes you want to eliminate (Yoshino 485).† In other words, covering is wrong and we know this so we want to give a helping hand. But, by helping out and showing gays or blacks that it’s okay to act in the manner they really want to act will do no good. As a final verdict in the strife forShow MoreRelatedThe Civil Rights Of The United States Essay1653 Words   |  7 PagesThe United states has been called the, â€Å"Land of The Free† since its independence was won from Great Britain, however, until 1965 â€Å"Free† only applied to a select demographic, white, land owning males. The most largely discriminated demographic before 1996 and somewhat even so today is the African American population. In 1619 the first African American slaves were introduced into the colony of Jamestown, Virginia 1. Then after many years and revolts, in 1831 slavery was finally abolished and all freedRead MoreThe Civil Rights Of The United States951 Words   |  4 PagesCivil rights have been a big issue throughout American history. From the time America was formed, groups have been discriminated against due to their ethnicity, religion, and race. Slaves were not considered American so they did not have rights. They did not become American c itizens until the Fourteenth Amendment was passed in 1868. Still, African Americans still did not have as many rights as other groups. Almost a century after the Fourteenth Amendment was enacted, African Americans were stillRead MoreThe Civil Rights Of The United States902 Words   |  4 PagesJury duty is a constitutional and fundamental right guaranteed to American citizens. Jury service is a way for citizens to directly participate in the judicial system. Jury duty and jury trials have been around for so long that people take it for granted. The jury was one of the factors that caused the American Revolution because the English common law system did not allow alleged criminals to have the sixth amendment rights that the United States has today. In fact, The Declaration of IndependenceRead MoreThe Civil Rights Of The United States2011 Words   |  9 Pagesdifficult part about it was, as time went by, people were given more rights and were unjustly discriminated because of the pa st. This has happened in many cases throughout our countries history. Civil rights are a big part of our society and the past shows many ways that the civil rights of the citizens were taken from. In Unit 2 of the course, we learned three different ways the government can discriminate the people of the United States and the meticulous process it takes the government to discriminateRead MoreThe Civil Rights Of The United States2348 Words   |  10 Pagessegregated. African Americans insisted on receiving their rights. In this essay, I will be analyzing all the main factors, and explaining why I think that the Supreme Court was responsible for the improving status of black people in the United States in the years 1945-1965. The Federal Government plays a role in improving the status of African Americans. Truman was the initial president since Abraham Lincoln to attend to the civil rights issue who affected African Americans. As a young man, TrumanRead MoreThe United States Civil Rights3535 Words   |  15 Pages When citizens of society break federal and state laws they face a punishment known as â€Å" jail† or â€Å" prison†, which purpose is to not only to serve as a punishment but to also act as a program designed to help convicts enter back in to the society as a better person. As citizens of the United States we have civil rights granted to us from the U.S. Constitution that are not meant to just be taken away from us whenever the correctional system feels like it. Many people believe that once a person isRead MoreThe Civil Rights Of The United States891 Words   |  4 Pagesspeaker for the Salazar Vs. Buono case was lead justice, John Roberts. He was born in Buffalo, New York as a religious catholic that took interest in law. Roberts was a graduated from Harva rd Law School who went on to became the Chief Justice of the United States in 2005. However, In 2003 John Roberts was the lead justice of the Supreme court who read the final decision for the Salazar Vs. Buono case. The final decision ruled in favor of Salazar stating that the cross did no longer violate the First AmendmentRead MoreThe Civil Rights Era Of The United States1141 Words   |  5 Pagesis mightier than the mightiest weapon of destruction devised by the ingenuity of man.† (Gandhi). The Civil Rights era was filled with a slew of various protests attempting to bring equality to the African American race in the United States. During this period in history, African American people of all social classes and places across the country were racially oppressed and were denied basic rights that were available to their Caucasian counterparts. People began to protest this oppression and decidedRead MoreThe Civil Rights Movement Of The United States1668 Words   |  7 PagesTh e civil rights movement in the USA in the 1950’s and 1960’s.can be termed as a democratic movement. The basic reason behind this was the discrimination of the African-Americans that were enslaved and did not have citizen rights. The African-Americans protested greatly against their injustice. The birth of the civil rights movement was before the 1954 Supreme Court’s decision on Brown versus Board of Education (Topeka) which stated that separate but equal schools was against the Constitution. FromRead MoreThe Civil Rights Movement Of The United States1157 Words   |  5 PagesAnd by virtue of the power and for the purpose of the aforesaid, I do order and declare that all persons held as slaves within said designated States and parts of States are and henceforward shall be free; and that the Executive government of the United States, including the military and naval authorities thereof, will recognize and maintain the freedom of said persons.† (CITE TEXT) I t took just over 100 years for African-Americans to achieve the dream that Abraham Lincoln envisioned nearly a century

Wednesday, May 6, 2020

Angela Davis An Advocate For Feminism, Prison Reform,...

Biography Angela Davis is recognized as an advocate for feminism, prison reform, and communism. She is best known as a radical African American educator and activist for civil rights. She established her own group called the Critical Resistance, an organization working to abolish the prison-industrial complex.While a high school student, she performed well, earning her a scholarship to Brandeis University where she graduated Magna Cum Laude in French literature. After that, she continued to earn numerous degrees which include studies at University of Paris, 1963–64; graduate study at University of Frankfurt (Germany), 1965–67; University of California, San Diego, M.A., 1968, doctoral study, 1968–69. (Horsley, 2017) Inspiration Born in†¦show more content†¦In 1969 she was fired from her teaching post at the University of Los Angeles because of her affiliation with the Communist Party of the U.S.A. (Gale,2005). Then California Governor Ronald Reagan and President Richard Nixon barred Davis because of speculation of radical behaviour, despite the fact that she was evaluated as being unbiased in her teachings and adored by faculty and students. Angela Davis fought back to be reinstated with the help of strong protests and then On October 20th, Judge Jerry Pacht ruled in favour of Davis by saying they could not fire her because of her affiliation with the communist party (Saxon, 1997). Before present times, the United States had created a system where people of colour—specifically black people, were purposely deprived of the opportunity to live a quality lifestyle. Examples such as improper support of fine schooling, condemning all social interaction between white and black people and seizing th e right to vote(Pilgrim, 2012), promoted negative paths for people of colour. The disenfranchisement of black people is still used today as a step stool for white people to gain high power at their expense. In regards to Angela Davis’ case, Judge Perry Pacht used the constitution to make the decision. He concluded that Governor Reagan and President Nixon would have breached her constitutional right of being a member of a group. On the Constitution of theShow MoreRelatedBlack Feminism : A Profound Effect On Society s History3616 Words   |  15 PagesIntroduction Black Feminism has proven to have a profound effect on society’s history, and is now beginning to impact even more this day and age. Black feminism is broader than what comes to mind. It is an essential component of black struggle against oppression and authority. Generally Black feminism is used to empower and liberate black women. Throughout the years many liberals have tried to exclude and silence black feminist. Black feminist have demanded for social, economic and political equalityRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 PagesSandweiss, St. Louis: The Evolution of an American Urban Landscape Sam Wineburg, Historical Thinking and Other Unnatural Acts: Charting the Future of Teaching the Past Sharon Hartman Strom, Political Woman: Florence Luscomb and the Legacy of Radical Reform Michael Adas, ed., Agricultural and Pastoral Societies in Ancient and Classical History Jack Metzgar, Striking Steel: Solidarity Remembered Janis Appier, Policing Women: The Sexual Politics of Law Enforcement and the LAPD Allen Hunter, ed.,

Tuesday, May 5, 2020

An Assignment on sainsbury

Question: An assignment on sainsbury's discussing the sources of income, considerations taken into account by management when choosing type of finance. Calculating WACC based on 2014 balance sheet. Problems that might be encountered by company. Answer: Introduction In this report we are going to study regarding WACC which is an important part of capital structure or we can say helps in taking capital structure decision, the various external sources of finance factors to be kept in mind while making choice of types of finance. The calculation of WACC is required as co wants to raise its capital at lowest possible cost yield higher return. John Pemberton was an American pharmacist who developed Coca cola in 1886 it was sold in 1888 to a businessman who promoted the drink among public by selling free products along with it such as calendars, clocks etc. in 1895 coca cola was started selling in bottles so that it could be consumed everywhere by the customer. In 1917 the export of coca cola was started firstly in Cuba, France Puerto Rico etc. After that many big promotional campaigns were launched in 1920s such as Olympic Games in Amsterdam, bullfighting games in Spain etc. There are near about 400 beverage brands of coca cola such as Fanta, Sprite, Minute maid etc. launched in many countries. (Cleveland, 1995) Sources of finance External sources of finance It refers to raising money from sources outside the business. It includes short term, long term as well as medium term finance. Short term finance: Bank overdraft This facility is available to businessmen having current accounts with banks. Bank provides credit to the businessmen which are more than the balance in their account. Such advance given by the bank is decided earlier as bank provides a limit to the businessmen whoused it to meet his short term liabilities as he can overdraw amount up to this limit allowed by the bank.(Annon, 2008) Trade Credit It refers to allowing credit to customers or providing them grace period to make payment for the purchases made by them. Grace period may be of 60 days, 90 days depending upon the nature type of organization.(Mike, 1996) Factoring This facility is used when business is in urgent need of cash. They get the bill discounted by selling it to a factoring company result of which factoring company will now collect money from the customer. Medium Term Hire Purchase It refers to buying an asset by making few payments as down payment balance in installments over a period of time agreed under hire purchase contract. Interest will also be charged on these installments.(Ehsan, 2006) Leasing It involves use of an asset by lessee but ownership of that asset is not transferred. The lessee will make the payment to lessor till the time the asset is used by him as rent Long Term Bank Loan It involves getting loan from bank for longer period by providing security against that loan. Business is required to repay this loan in installments along with interest. Share Issue it involves public limited co issuing shares up to authorized capital while private limited companies issuing shares to their existing shareholders. Sales and lease back It involves making a sale to Investment Company then leases back this property after a long period of time for using it into the business. Critical evaluation of various sources of finance The long term finance provides permanent source of capital as it involves fixed amount of return which will be paid to investors whether there are profits or not but sometimes it can be a problem for the company to make interest payments.(Natalie, 2012) In medium term finance leasing can provide benefit as asset is not required to be purchased can be used by business. But sometimes cost of leasing asset can be more than cost of purchasing the asset. In case of short term finances bank overdraft facility provided is beneficial as it is flexible limit can be changed anytime as per the needs of business. But interest rates of banks may be high they may demand repayment at short notice which may create problem for the business. Factors influencing Capital Structure decisions Cash Flow Position For making investment it is necessary to check cash flow position of the company as cash is required for making interest payment as well as repayment of principal amount.(Saritha, 2009) Interest coverage ratio (ICR) Although this ratio is not considered as appropriate factor while making capital structure decision but still it is considered to determine the earnings available for making interest payments. Debt Service Coverage Ratio-DSCR: The weakness of ICR is overcome by DSCR ratio as this ratio helps in determining the cash available for making payments. This ratio reflects the debt paying capacity of the company. Return on Investment-ROI This is another factor to be considered while making investment as greater ROI will determine the debt capacity of the company. Cost of Debt It determines the capacity of the company to take debts. Hence it should be kept in mind while determining capital structure.(H, 2011) Tax rate It helps in determining the debt cost which will decrease in case tax rate increases. Cost of equity It is dependent on utilization of debt capital as it will increase with increased use of debt capital. This will also increase the risk of equity shareholders Floatation Costs: It refers to expenditure incurred while issuing securities such as underwriters, brokerage commission etc. the floatation cost of equity capital is more than debt capital. Risk assessment There can be operating risks and financial risks. Risk factor must be kept in mind while taking capital structure decisions. Flexibility: Capital structure should be flexible as capable of changing in amount of capital. Capital amount can be increased or decreased but decrease in amount is possible only in case of debt capital. There is no repayment in case of equity share capital. Hence we can say that issue of debt capital preference capital is preferable.(Zane, 2003) Control: Capital structure is also influenced by control as it must be kept in mind that interest of shareholders should not be affected while taking investment decisions. It is better to raise capital through debt as it will not affect the control position of the company. Regulatory Framework: The regulations provided by government must be followed while making capital structure decisions. For example compulsory requirement of the company to maintain debt equity ratio while raising capital Calculation of WACC Weighted Average cost of capital is the rate offered by the company for making payments to security holders for financing the assets of the company.The assets are financed through debt equity. WACC which is also called as cost of capital of firm is calculated by using following formula.(Annon, 2015) It will also help in determining the interest paying capacity of the company against its finances. Following is the formula for calculating WACC: WACC= E/ (E+D)*Cost of equity/ (E+D)* cost of debt* (1-Tax rate) Coca Cola co.s returns are higher than its costs as its cost of capital is approximately 8.32 % as compared to ROI which is 14.45%. The continuity in higher returns will increase the value the growth prospects of the business.(William, 2013) Calculation of Weights As we know that debt equity are used to finance the assets of the company, thus it is necessary to calculate the weights of equity debt. The market capitalization of coca cola is approx. $ 176085.6 million which is denoted by E. The book value of debt is used to calculate market value of debt by adding latest two year average of short term long term debt in order to simplify the calculation. For the year ending 2015 the two year average of coca cola Companys short term debt is $20310.4 million while long term debt is $19110.4 million. The book value is $39408 million. Weights of equity = E/E+D =176085.6/ (176085.6+39408) = .817 Weights of debt= D/ (E+D) = 39408/ (176085.6+39408) = .183 Calculation of cost of equity CAPM model is used to calculate cost of equity as per following formoula: Cost of equity = Risk free rate of return+ Beta of asset* (expected return of market- risk free rate of return.(Franklin, 1996) Risk free rate of Coca Cola Company is 2.44%, Beta is 1.04, Expected return of market less risk free rate of return is 8% Cost of equity = 2.44+1.04 *(8) = 10.76% Cost of Debt The co.s interest expense amounting to $ 479 million book value was $39408 million. Hence cost of debt will be 1.23% (483/39408) WACC = .8171*10.76%+.183*1.23*(1-24%) =.0879+.171 =.259 Conclusion It can be concluded from the above that return on investments are high as compared to its cost incurred to raise the capital. However if the returns on investment is lower as compared to its cost it may badly affect the value growth of business.(Scott, 2007) But on the other hand excess returns on investment will increase the value as well as growth prospects of business. Therefore it is recommended that while making investment decisions above mentioned factors must be considered. So, that it can be ensured that investment will yield a higher return. WACC appears to be simple theoretically but it is difficult to calculate from practical point of view. WACC tool is used by many investors to take decisions regarding making investments. Bibliography Annon, 2008. https://www.dineshbakshi.com/igcse-gcse-economics/private-firm-as-producer-and-employer/revision-notes/1296-external-sources-of-finance. External sources of finance . Annon, 2015. https://www.gurufocus.com/term/wacc/KO/Weighted%2BAverage%2BCost%2BOf%2BCapital%2B%2528WACC%2529/Coca-Cola%2BCo. Coca-Cola Co (NYSE:KO)WACC. Cleveland, P. S., 1995. The cost of capital : theory estimation. USA: greenwood publishing group. Ehsan, N., 2006. Finance. Newyork: s.n. Franklin, P. J., 1996. Understanding Return on Investment. Canada: John Wiley SOns. H, B. K., 2011. Capital structure corporate financian decision. s.l.:s.n. Mike, B., 1996. accounting Finance in Business. s.l.:s.n. Natalie, P., 2012. A Critical analysis of efficacy of law as a tool. USA: University Press of america. Saritha, P., 2009. https://www.yourarticlelibrary.com/stock-exchange/14-important-factors-affecting-the-choice-of-capital-structure/1042/. Important Factors Affecting the Choice of Capital Structure. Scott, B., 2007. Essentials of managerial finance. s.l.:Cengage Learning. William, L. R., 2013. Practical Financial Management. Canada: s.n. Zane, S., 2003. Capital structure paradigm. USA: Praeger Publishers.

Tuesday, April 7, 2020

An Intro to Teen Pregnancy in essays

An Intro to Teen Pregnancy in essays In my introduction I am going to answer the following questions: Is teenage pregnancy a problem If so, how big is the problem and how have other countries and communities tried to reduce it How does the national situation in Britain compare to that of other countries How has teenage pregnancy affected the community of Lewisham In this section I plan to take a detailed view of my community by using the statistics that have been given to me. Firstly, I am going to re-compile the statistics so that they are more readable and make for easier comparison. I plan to compare and contrast the data of different areas within my borough to identify trends and possible causes. I am also going to look at how the level of teenage pregnancy has changed over the last decade. From this data, I plan to make comparisons of different boroughs and then draw conclusions about the possible causes of teenage pregnancy in my borough. Factors That Influence the Rate of Teenage Pregnancy Economic - For this issue, I would like to focus on family income and the provision of sex education in schools. Moral and Social - I would like to discuss the change in our societys view on teenage pregnancy and single parents. I would also like to discuss the effect that peer pressure has on young people and to what extent it causes teenage pregnancy. Another important aspect in this area that I am going to discuss is the role that the media plays in changing social attitudes to various ways of living. Political - For this part, I am going to talk about the effectiveness that the governments policy has on reducing teenage pregnancy and also what other policies are being used throughout the world and what effect they have. I am also going to consider what the possible effects of introducing such policies will have on Lewisham and how they might work. I will be dealing with these sections separately, howe ...

Monday, March 9, 2020

Free Essays on The Marriage of Heaven and Hell

In The Marriage of Heaven and Hell, the famous British poet William Blake wrote that â€Å"without contraries there is no progression - Attraction and repulsion, reason and imagination, and love and hate are all necessary for human existence† (Blake 122). As Blake noted, the world is full of opposites. But, more importantly, these opposites allow the people of the world to see themselves and their thoughts more clearly. For, as Blake asserts, without attraction, one cannot understand repulsion, and without imagination, one cannot understand reason. In Much Ado About Nothing (MAAN), William Shakespeare uses this idea of the power of opposites to show the differences in two types of love. Using the relationship, language, and actions of Hero and Claudio as a foil against those of Beatrice and Bene*censored*, Shakespeare has painted a world in which the ideas of courtly love only serve to illuminate those of true love. In an essay on Chaucer’s Canterbury Tales, William Kittredge defined the idea of courtly love that is illustrated in MAAN. Kittredge said that courtly love must involve a love that is extremely idealized and superficial, with the vassal or servant-like suitor, who is often a valiant knight, devoting himself completely to an ideal woman who is often the daughter of a powerful man (Kittredge 528-529). When this definition is applied to the relationship between Hero and Claudio in MAAN, one is able to recognize a perfect match. For example, Claudio, a young lord of Florence, is a valiant soldier as is shown in the first scene of the play with the comments made by the Messenger: â€Å"[Claudio] hath borne himself beyond the promise of his age, doing in the figure of a lamb the feats of a lion† (Shakespeare 1.1.11-12). He is, from the very beginning of the play, hopelessly in love with Hero, but that love is a relatively superficial thing. This is proven by the fac t that he ea! sily believes others comments abo... Free Essays on The Marriage of Heaven and Hell Free Essays on The Marriage of Heaven and Hell In The Marriage of Heaven and Hell, the famous British poet William Blake wrote that â€Å"without contraries there is no progression - Attraction and repulsion, reason and imagination, and love and hate are all necessary for human existence† (Blake 122). As Blake noted, the world is full of opposites. But, more importantly, these opposites allow the people of the world to see themselves and their thoughts more clearly. For, as Blake asserts, without attraction, one cannot understand repulsion, and without imagination, one cannot understand reason. In Much Ado About Nothing (MAAN), William Shakespeare uses this idea of the power of opposites to show the differences in two types of love. Using the relationship, language, and actions of Hero and Claudio as a foil against those of Beatrice and Bene*censored*, Shakespeare has painted a world in which the ideas of courtly love only serve to illuminate those of true love. In an essay on Chaucer’s Canterbury Tales, William Kittredge defined the idea of courtly love that is illustrated in MAAN. Kittredge said that courtly love must involve a love that is extremely idealized and superficial, with the vassal or servant-like suitor, who is often a valiant knight, devoting himself completely to an ideal woman who is often the daughter of a powerful man (Kittredge 528-529). When this definition is applied to the relationship between Hero and Claudio in MAAN, one is able to recognize a perfect match. For example, Claudio, a young lord of Florence, is a valiant soldier as is shown in the first scene of the play with the comments made by the Messenger: â€Å"[Claudio] hath borne himself beyond the promise of his age, doing in the figure of a lamb the feats of a lion† (Shakespeare 1.1.11-12). He is, from the very beginning of the play, hopelessly in love with Hero, but that love is a relatively superficial thing. This is proven by the fac t that he ea! sily believes others comments abo...

Friday, February 21, 2020

Business questions Essay Example | Topics and Well Written Essays - 250 words

Business questions - Essay Example As Jones & George say, consumption and investment rates are highly dependent on the economic aspects and the political scenario respectively (128). The political force, in my opinion, is the major determinant of successful business transactions. Political forces determine whether a society will be peaceful and stable enough to allow for investment. As Lynch indicates, the Chinese would benefit from venturing into the U.S markets as there are fewer trade barriers, alternative energy sources are in plenty, as well as the Chinese are better placed to learn new technologies that could benefit their home markets (1). With the Chinese shifting a lot of focus in the U.S markets, Lynch is of the opinion that U.S.A. will gain from job creations by the Chinese. The Chinese companies have sustained investors with loans, which is shifted to U.S economy (Lynch, 1). With the IMF expecting the Chinese outward investment to augment, the U.S assets are slowly gaining prominence among the Chinese buyers. The U.S markets and economy will automatically grow, while back at home, the Chinese manpower is grabbed by the world’s superpower (Lynch,

Wednesday, February 5, 2020

Review the Capstone case Chaplinsky v New Hampshire on pages 310-311 Essay

Review the Capstone case Chaplinsky v New Hampshire on pages 310-311 of your textbook. Briefly discuss the issue the court had t - Essay Example 135). The court said it did not contribute to any meaningful benefit to a healthy discussion of ideas and that social order and morality are much more important than allowing someone to use profanity to castigate one type of religion by using free speech. The court’s ruling – the judge ruled that profanity has no place in society because it is a different matter altogether as compared to mere obscenity. Profanity already involved God’s name being used in a disparaging or unflattering manner and should therefore be disallowed. Although previous court rulings had nullified anti-blasphemy laws in the United States before this case (such as Cantwell v Connecticut), the judge in this capstone case drew the line as it pertains to certain acts not allowed under guise of the First Amendment protection (ibid.). The rationale – a justification behind this precedent-setting case is that there are limits to First Amendment rights. Profanity is not allowed in the same manner obscenity is outlawed and protection under First Amendment extends only to legitimate political, religious or social discussion of ideas in the spirit of free and open dialogue. It does not allow derogatory words. Moreover, the larger implication of this ruling was it reinforced the separation of the Church and State in that no single religion is favored over other religions (Christianity was favored in earlier times being the majority religion).

Tuesday, January 28, 2020

Vehicle ad-hoc Network (VANETS) Technology

Vehicle ad-hoc Network (VANETS) Technology Chapter 1 Introduction Now a day, everything is moving away from wired technology and leading towards wireless. The fascination of mobility, accessibility and flexibility makes wireless technologies the dominant method of transferring all sorts of information. Satellite televisions, cellular phones and wireless Internet are well-known applications of wireless technologies. This work presents a promising wireless application and introduces a tiny contribution to its research community. Research in wireless communication field is growing faster, day by day, then any other field. It serves a very broad range or series of different kind of applications using different topologies. Every one of these comes with some new and specialized protocols. In this research, we will present an introduction to a wireless technology. This wireless technology directly affects car accidents and the sales of one of the largest markets. It is the technology of building a strong network between mobile vehicles; i.e. let vehicles communicate to each other. This promising technology is literally called Vehicular Ad-Hoc Networks (VANETs). 1.1 Background Since the first invention of mobile vehicles, governments and manufacturers have researched accidents to reduce the number of vehicle crashes in order to reduce costs, injuries and fatalities. First of all, VANET technology is going to reduce crashes by doing research in this field. Accordingly, related governmental authorities initiated new projects to the learning institute for study, research, development in the field of wireless technology and VANETs also paying attention in its standards. The ‘Dedicated Short Range Communications (DSRC) [1] is a pioneer ITS (Intelligent Transportation Systems which is a branch of the U.S. Department of Transportation [2]) project dedicated to VANET standardization. Then, the acronym or short form ‘DSRC becomes a global or familiar name of kind of standards that aim to put VANET technology into life. The DSRC mainly concerns with the communication that is how to make different communication links between vehicle-to-vehicle and vehicle -to/from-roadside units. 1.2 Motivation In the last few years, vehicular network has gained great attention in industry. Federal communication commission (FCC) has assigned 5.850-5.925GHZ frequency band to promote safe and efficient road trips, which is planned for vehicle-to-vehicle and vehicle-to-infrastructure communication. Car manufacturers, e.g., Audi, BMW and DaimlerChrysler, also formed a Car2Car communication consortium [3], in which the prototype development for inter-vehicle communications is underway. In near past, IEEE 802.11-based solutions for VANETs are also studied by IEEE 802.11p. IEEE 802.11p Wireless Access in the Vehicular Environment (WAVE) that defines changes to IEEE 802.11 to help Intelligent Transportation Systems (ITS) applications. IEEE 802.11p helps data exchanges between fast moving vehicles with each other and also exchanges data from vehicles to road side unit or from road side unit to vehicles in the licensed ITS band of 5.9 GHz. The Dedicated Short-Range Communications (DSRC) at 5.9 GHz is here today to provide safety that is increasing safety in case of road accidents, reducing highway or road maintenance cost and also improving mobility. Intersection and road departure collisions report for round about 50 percent of all crashes and victims on our roads. On an average day in the United States, vehicular collisions kill 116 and injure 7900[8]. More health care dollars are consumed in the United States treating crash victims than any other cause of illness or injury [8], [10]; the situation in the European Union is similar, with over 100 deaths and 4600 injuries daily, and the annual cost of â‚ ¬160 billion [11]. By getting rid from road victims and crashes, DSRC can provide or play important role in reducing road accidents, deaths, injuries, heavy traffic and increasing road safety by improving communication between vehicles and between vehicles and road side infrastructure. DSRC emerged from a partnership among automobile manufacturers, state and federal transportation officials, toll transponder equipment suppliers and the Federal Communications Commission. There is a recognized need for on-the-go communication with motor vehicles and reliable communication between vehicles to increase highway safety by providing warnings and alerts that enable drivers to take corrective and/or evasive actions. At the same time, it can be able to provide information i.e. real time information to drivers so that to improve mobility and motorist conv enience, such as information on congestion or traffic incidents. The car manufacturing industrys determination to roll out vehicle-to-vehicle communication in the near future and, on the other hand, to the increasing disillusionment concerning the need for the vast number of protocols developed for general Mobile Ad-Hoc Networks (MANETs) in the past few years while on the other side that is for VANETs, industry pressure has created a situation in which an overwhelming interest in solutions to problems leads to a preference for real-world research as opposed to fancy theory. As the concept came from MANETs which totally depend on the subscribers motion as the motion is random it is difficult to cater it but this problem was very negligible when researchers observed it in VANETS. At highways vehicle move in an organized pattern with different speeds so initially it seemed that VANET will easily be implemented. Another major reason for VANET can be Traffic deaths and injuries which is a major health and social issue. While industrialized nations (e.g., the United States) have continuously reduced annual traffic deaths since 1970, annual traffic-related fatalities and injuries remain high (in the United States alone there were over 41,000 deaths and 5 million injuries in 2000, according to the NHTSA) [7]. The economic impact of vehicle crashes in the United States exceeded US$230 billion or 2.3 percent of the U.S. GDP in 2000 [7]. We want to remain connected with the world through net whether at home, airport, at work or even on the roads. Example Description Obstacle warning Stopped/Skidding/Slowing down vehicle warning, road obstacle/object-on-road warning Lane Merge/Lane Change Assistance Merging/Lane changing vehicles communicates with vehicles in lane to safely and smoothly merge. Adaptive Cruise/Cooperative Driving Automatically stop and go smoothly, when vehicles are in heavy roadway traffic; cooperates driving by exchanging cruising data among vehicles. Intersection/Hidden Driveway Collision Warning vehicles communicates to avoid collisions at intersections without traffic lights or hidden driveway. Roadway Condition Awareness Vehicles communicates to extend vision beyond line of sight (e.g. beyond a big turn or over a hill) Table-1.1: Example of Vehicle Safety Communication [10] 1.3 Scope of Project Some of the industries and universities working on VANETs are as follow DaimlerChrysler AG Fraunhofer FOKUS NEC Europe Ltd. Robert Bosch GmbH Siemens AG TEMIC Telefunken Microelectronic GmbH Universities of Mannheim, Hamburg-Harburg, Karlsruhe, and Hannover. 1.4 Organization of Project Thisthesisis mainly divided into four chapters. In the first two chapters (1-2) introduction and an overview over the topic and used technologies is given. In the following chapter (3), we have discussed the standards of IEEE and also discussed the MAC Layer and PHY Layer of IEEE 802.11 in detail. In chapter 4, simulation analysis of our work is shown along with the results. In the last chapter, we have summarized this whole thesis, what we have concluded from this project and future work needs to be done are discussed. Finally, in appendix some additional information can be found. In chapter two, VANETs characteristics, some of its applications and the research challenges faced by governments and car manufactures are discussed, continued by MAC Layer and PHY in chapter three. We have also discussed the WAVE architecture in chapter 2. From chapter three on, we have a look at some protocol improvements and extensions. Some thoughts, tests and their results on VANETs, those are related to our work, can be found in chapter 4. Chapter 2 VANETs VANETs (Vehicle ad-hoc Networks) is a form of Mobile Ad-hoc Networks (MANETs), which provide a communication between the vehicles and also fixed equipments, usually defined as road side equipments. 2.1 What is VANET Vehicle ad hoc network comprises of three words. i. Vehicle ii. Ad-hoc iii. Networks i. Vehicle â€Å"A machine such as a bus or car for transporting people or goods†. [4] A lot of progress is happening in the field of vehicles since the invention of wheel. Development is due to provide services to the people and make their task easier. ii. Ad-hoc It refers to dealing with special situations as they occur rather than functions that are repeated on a regular basis. For example you just meet someone outside your office and you exchange some words. On the other hand infrastructure system is a system which is fully installed and deployed than it works according to some predefined rules and regulations. iii. Network â€Å"A system, as in a business or university, consisting of a computer or computers and connected terminals, printers etc. specific, a local area network†.[3] The concept of networking is introduced because resources are limited and we have to utilize them efficiently. As it is not possible for firms to provide printer, faxes and other machines to everyone so they just inter linked all the devices so that each one can utilize it keeping the cost at minimum. Vehicular connectivity can be fairly considered a future killer application, adding extra value to the car industry and operators services. Taking into account the constant growth of automotive market and the increasing demand for the car safety, also driven by regulatory (governmental) domain, the potential of car-to-car connectivity is immense. Such system should be suitable for a wide spectrum of applications, including safety related, traffic and fleet control and entertainment. First, issues concerning architecture, security, routing, performance or QoS need to be investigated. Standardization of interfaces and protocols should be carefully planned to ensure interoperability, as vehicles coming from different vendors must communicate seamlessly. Having different competing systems would result in decreased market penetration and poor overall system efficiency, thus only one common system can be deployed. And finally, wise deployment strategy has to be proposed, as most applicatio n would become functional only after certain market penetration is reached. The first milestone of standardization process was the allocation of 75 MHz of DSRC (Dedicated Short Range Communications) spectrum to accommodate Vehicle-to-Vehicle (V2V) and Vehicle-to- Infrastructure (V2I) communication for safety-related applications by US Federal Communications Commission (1999). Commercial applications are also allowed to operate in this spectrum. 2.2 VANETs Applications According to the DSRC, there are over one hundred recommended applications of VANETs. These applications are of two categories, safety and non-safety related application. Moreover, they can be categorized into OBU-to-OBU or OBU-to-RSU applications. Some of these applications are as followed: 2.2.1 Co-operative Collision Warning Co-operative collision warning is an OBU-to-OBU safety application, that is, in case of any abrupt change in speed or driving direction, the vehicle is considered abnormal and broadcasts a warning message to warn all of the following vehicles of the probable danger. This application requires an efficient broadcasting algorithm with a very small latency. 2.2.2 Lane Change Warning Lane-change warning is an OBU-to-OBU safety application, that is, a vehicle driver can warn other vehicles of his intention to change the traveling lane and to book an empty room in the approaching lane. Again, this application depends on broadcasting. 2.2.3 Intersection Collision Warning Intersection collision warning is an OBU-to-RSU safety application. At intersections, a centralized node warns approaching vehicles of possible accidents and assists them determining the suitable approaching speed. This application uses only broadcast messages. In June 2007, General Motors ‘GM addressed the previously mentioned applications and announced for the first wireless automated collision avoidance system using vehicle-to-vehicle communication (Figure-2.1), as quoted from GM, If the driver doesnt respond to the alerts, the vehicle can bring itself to a safe stop by avoiding a collision. 2.2.4 Approaching Emergency vehicle Approaching emergency vehicle is an OBU-to-OBU public-safety application, that is, high-speed emergency vehicles (ambulance or police car) can warn other vehicles to clear their lane. Again, this application depends on broadcasting. 2.2.5 Rollover Warning Rollover warning is an OBU-to-RSU safety application. A RSU localized at critical curves can broadcast information about curve angle and road condition, so that, approaching vehicles can determine the maximum possible approaching speed before rollover. 2.2.6 Work Zone Warning Work zone warning is an OBU-to-RSU safety application. A RSU is mounted in work zones to warn incoming vehicles of the probable danger and warn them to decrease the speed and change the driving lane. 2.2.7 Near Term [5] Traffic Signal Violation Warning Curve Speed Warning Emergency Electronic Brake Lights 2.2.8 Mid Term [5] Pre-Crash Warning Cooperative Forward Collision Warning Left Turn Assistant Lane Change Warning Stop Sign Movement Assistance Application Comm. type Freq Latency Data Transmitted Range Traffic Signal Violation 12V One-way, P2M 10 Hz 100msec Signal Status, Timing, Surface Heading, Light Position, Weather 250m Curve Speed Warning 12V One-way, P2M 1 Hz 1000msec Curve Location, Curvature, Speed Limit, Bank, Surface 200m Emergency Brake Light Vehicle to Vehicle Two-way, P2M 10 Hz 100msec Position, Deceleration Heading, Velocity 200m Pre-Crash Sensing Vehicle to Vehicle Two-way, P2P 50 Hz 20msec Vehicle type, Yaw Rate, Position Heading, Acceleration, 50m Collision Warning Vehicle to Vehicle One-way, P2M 10 Hz 100msec Vehicle type, Position, Heading Velocity, Acceleration, Yaw Rate 150m Left Turn Assist 12V and V21 One-way, P2M 10 Hz 100msec Signal Status, Timing, Position, Direction, Road Geom., Vehicle Heading 300m Lane Change Warning Vehicle to Vehicle One-way, P2M 10 Hz 100msec Position, Heading, Velocity, Acceleration, Turn Signal Status 150m Stop Sign Assist 12V and V21 One-way 10 Hz 100msec Position, Velocity, Heading, Warning 300m Table-2.1: Eight high-priority vehicular safety applications as chosen by NHTSA and VSCC. Note that communication freq. ranges from 1-50 Hz and Max. Communication range spam 50-300 meters. P2M represents â€Å"Point-to-Multipoint†, 12V represents â€Å"infrastructure to vehicle† and V21 represents â€Å"Vehicle-to-Infrastructure†. [5] 2.2.9 Comfort related applications Traffic efficiency Better navigation Internet access The whole theme of these applications is improving passengers comfort and traffic efficiency. That includes nearest POI (Points of Interest) localization, current traffic or weather information and interactive communication. All kinds of applications might be applied here. Another application is reception of data from commercial vehicles and roadside infrastructure about their businesses (wireless advertising). Enterprises (shopping malls, fast foods, gas stations, hotels) can set up stationary gateways to transmit marketing data to potential customers passing by. The important feature of comfort/commercial applications is that they should not interfere with safety applications. In this context traffic prioritizing and use of separate physical channels is a viable solution. 2.2.10 Safety related applications Accidence avoiding Danger warnings Intersection coordination Cooperative driving Safety-related applications may be grouped in three main classes: assistance (navigation, cooperative collision avoidance, and lane-changing), information (speed limit or work zone info) and warning (post crash, obstacle or road condition warnings). They usually demand direct communication due to their delay-critical nature. One such application would be emergency notifications, e.g. emergency braking alarms. In case of an accident or sudden hard breaking, a warning is sent to the subsequent cars. That information could also be propagated by cars driving in the opposite direction and, thereby, conveyed to the vehicles that might run into the accident. Another, more advanced example is cooperative driver assistance system, which exploits the exchange of sensor data or other status information among cars. The basic idea is to broaden the range of perception of the driver beyond his field of vision and further on to assist the driver with assistance applications. Transmitting this data to cars following on the same road, drivers get information about hazards, obstacles or traffic flow ahead; hence driving is more efficient and safer. Some applications of this kind are operating only when certain penetration of VANET enabled cars is reached. [6] 2.3 VANETs Characteristics Although VANETs, Wireless Sensor Networks and Wireless Mesh Networks are special cases of the general MANETs, VANETs possess some noticeable characteristics that make its nature a unique one. These properties present considerable challenges and require a set of new especially designed protocols. Due to the high mobility of vehicles, that can be up to one hundred fifty kilometers per hour, the topology of several VANET changes frequently and unexpectedly. Hence, the time that a communication link exists between two vehicles is very short especially when the vehicles are traveling in opposite directions. A one solution to increase the lifetime of links is to increase the transmission power, but increasing a vehicles transmission range will increase the collision probability and mortify the overall throughput of the system. The other solution having a set of new protocols is employing a very low latency. Another effect of these high speed nodes is that the usefulness of the broadcasted messages is very critical to latency. For example, if we assume that a vehicle is unexpectedly stopping or suddenly stops, it should broadcast a message to warn other vehicles of the probable danger. Considering that the driver needs at least 0.70 to 0.75 sec to initiate his response [7], the warning message should be delivered at virtually zero sec latency. In VANETs, location of nodes changes very quickly and unpredictably, so that, building an efficient routing table or a list of neighbor nodes will tire out the wireless channel and reduce the network efficiency. Protocols that rely on prior information about location of nodes are likely to have a poor performance. However, the topologies of a VANET can be a benefit because vehicles are not expected to leave the covered road; therefore, the running direction of vehicles is predictable to some extent. Although, the design challenge of protocols in wireless sensor networks is to minimize the power consumption, this is not a problem in VANETs. Nodes in VANETs depend on a good power supply (e.g. vehicle battery and the dynamo) and the required transmission power is small compared with power consumption of on-board facilities (e.g. air-condition). It is predicted that, as VANET is deployed in the beginning, only a small percentage of vehicles will be outfitted with transceivers. Thus, the benefits of the new technology, especially OBU-to-OBU applications, will not go up until many years. Furthermore, the limited number of vehicles with transceivers will lead to a numerous fragmentation of the network. Even when VANET is fully deployed, fragmentation may still exist in rural areas, thereupon, any VANET protocol should expect a fragmented network. Privacy, safety and security are of fundamental effect on the public receiving of this technology. In VANETs, every node represents a specific person and its location tells about his location. Any requirement of privacy can ease a third party monitoring persons daily activities. However, from the other point of view, higher authorities should gain access to identity information to ensure punishment of illegal actions, where, there is a fear of a possible misuse of this feature. The tampering with messages could increase false alarms and accidents in some situations defeating the whole purpose of this technology. Finally, the key difference between VANET protocols and any other form of Ad-Hoc networks is the design requirement. In VANETs, the key design requirement is to minimize latency with no prior topology information. However, the key design requirement of Wireless Sensor Network is to maintain network connectivity with the minimum power consumption and the key proposed design requirement of Wireless Mesh Network is reliability. WE can summarize the main characteristics of VANETs as follows; High mobility of nodes No prior information about the exact location of neighbor nodes Predictable topology (to some extent) Significant latency requirement especially in cases of safety related applications No problem with power Slow migration rate High possibility to be fragmented Crucial effect of security and privacy 2.4 Research Challenges in VANETs When deploying of a vehicular networking system, a number of issues have to be determined, often from distant fields of expertise, ranging from applications improvement up to efficient issues. VANET could be considered as an instantiation of MANETs (Mobile Ad hoc Networks); however their behavior is fundamentally different. These unique characteristics of these networks are as follows: Rapid topology changes and fragmentation, resulting in small effective network diameter Virtually no power constrains Variable, highly dynamic scale and network density Driver might adjust his behavior reacting to the data received from the network, inflicting a topology change Here we briefly mention some of the core research challenges that need to be discussed. 2.5 Wireless Access technology There are several wireless access standards that could be used as a foundation for VANET technology. In general the major seek is to provide a set of air interface protocols and parameters for high-speed vehicular communication by mean of one or more different media. 2.5.1 Cellular technology (2/2.5/3G) The key role of 2/2.5G i.e. cellular technology are coverage and security, and 3G, slowly but steadily coming over 2/2,5G, provides enhanced and better capacity and bandwidth. Several telematic and fleet management projects already uses cellular technology (e.g. SMS reports), on the other hand it is comparatively more expensive, together with limited bandwidth and latency make it impossible to use as a main communication means. 2.5.2 IEEE 802.11p based technology IEEE is working on a variation of 802.11 standards that would be applied to support communication between vehicles and the roadside, or, alternatively, among vehicles themselves, operating at speeds up to 200 km/h, handling communication ranges as high as 1,000 meters. PHY and MAC layers are based on IEEE 802.11a, shifted to the 5.9 GHz band (5.850-5.925 GHz within US). The technology is promoted by the car industry both in Europe and US. Estimated deployment cost is foreseen to be relatively low due to large production volumes. C. Combined wireless access one of the most significant and important efforts in combining those wireless access technologies is done by ISO TC 204 WG16. It builds on the top of IEEE 802.11p, using additional set of interface protocols. Currently supported standards include: Cellular Systems: GSM/GPRS (2/2.5G) and UMTS (3G), Infrared Communication and wireless systems in 60 GHz band. Using all those interfaces in a single, uniform system would result in incre ased flexibility and redundancy, thus improving applications performance. Apart from interoperability issues, CALM is also engaged in the standardization of the protocols, network layer and the management services. 2.6 WAVE Architecture WAVE system architecture is totally a set of WAVE standards that describes the communication stack of vehicular nodes and the physical air link between them. Any RSU may have two interfaces, one for the WAVE stack or architecture or wireless networks and the other for external interfaces like wired line Ethernet that may be used to get access to internet and for connection to internet it is mainly used. Similarly, each OBU may have two interfaces, one for the wireless WAVE stack and the other for sensor-connections and human interaction. OBU is not full-duplex so, therefore, it cannot transmit messages simultaneously, so DSRC is half-duplex. The RSU and OBU can send messages only when the channel becomes idle and also confirmed that it is idle. If the channel is busy, RSU and OBU need to wait and if the channel is idle then RSU or OBU will send the signal Request to Send (RTS) to control channel. The control channel will allocate the channel on the basis of high priority first followed by low priority. The high priority messages are those messages related to public safety. The WAVE architecture is defined by the IEEE 1609 family of standards and uses the IEEE 802.11p amendment to extend the use of 802.11 to vehicles. The IEEE 1609 family is composed of four standards describing the resource manager, security services, networking services and multi- channel operations. WAVE standard consists of five complementary parts 802.11p â€Å"Wireless Access in Vehicular Environments (WAVE)† [8] which is an amendment to the well known IEEE 802.11 Wireless LAN Standard and covers the physical layer of the system. 1609.1 â€Å"Resource Manager† [8] that covers optional recommendations for the application layer. [13], [14] 1609.2 â€Å"Security Services for Applications and Management Messages† [8] that covers security, secure message formatting, processing and exchange. [13], [14] 1609.3 Networking Services† [8] that covers the WAVE communication stack. [13], [14] 1609.4 â€Å"Multi-Channel Operation† [8] that covers the arrangement of multiple channels and how they should be used. [13], [14] The most evident part is its dual stack. Whereas there is a well-known stack, called TCP/IP stacks and on the other hand there is a stack, called WAVE Short Message stack. The function of the WAVE Short Message stack is to provide a connectionless transport protocol i.e. without checking the connection that whether connection is made or not, similar to UDP but on a single-hop basis. The safety applications are supposed to use this stack only while non-safety applications can use both. It should be noted that the devise or design of this approach is focused on non-safety applications and considers safety as a black box. 2.6.1 IEEE 1609.1 Resource Manager The IEEE 1609.1 standard defines the architecture and data flows of WAVE. It also describes command messages and data formats. [9], [8]. The standard explains how data communication between road side units and vehicle on board units occurs. The discussion of this standards operation will be based on the standard defines applications residing on the on board unit as Resource Command Processors and those residing in road side units or elsewhere as Resource Manager Applications. The Resource Manager is the focus of this standard and is also the application that is responsible for managing communication between multiple Resource Manager Applications and Resource Command Processors. [9], [8] WAVE communication imitates a client-server architecture that is managed by the Resource Manager. For example, in the case where a company wants to provide traffic updates by analyzing vehicle speed statistics in a stretch of highway, the application that analyzes the traffic data (a Resource Manager Application) would reside on the road side unit or a remote server that is connected to a road side unit. When the Resource Manager Application sends a request for the speed of the vehicle the Resource Manager application in the road side unit receives the request then forwards it to the vehicles Resource Command Processor application using WAVE. The vehicle then replies to the Resource Manager which forwards the message to the Resource Manager Application. If another passing vehicle asks for traffic updates by sending a request to the road side unit, the roles of client and server from the previous case are switched. WAVE is designed to provide secure communications and minimize the cost of on board units by minimizing the amount of processing required by them. All only desired information relevant to road safety will be transferred. 2.6.2 IEEE 1609.2 Security Services The IEEE 1609.2 standard defines secure message formats and processing and infers circumstances for using secure message exchange. [13], [8]. It deals with security services for applications and management messages. Security is important in WAVE because vehicles transmit sensitive information that could constitute a violation of privacy if accessed by unauthorized parties. The efficacy and reliability of a system where information is gathered and shared among autonomous entities raises concerns about the authenticity of the received data. For example, a bad actor could misrepresent its observations in order to gain advantage (e.g. a vehicle V falsely reports that its desired road R is stopped with traffic, thereby encouraging others to avoid R and providing a less-congested trip for V on R). More malicious actors could impersonate other vehicles or road-side infrastructure in order to trigger safety hazards. Vehicles could reduce this threat by creating networks of trust, and ignorin g, or at least distrusting, information from un-trusted senders. [13], [8] A trusted communication generally requires two properties are met: The sender is conclusively identified as a trusted source. While in transit, the contents of the senders message are not tampered. WAVE maintains security by ensuring confidentiality and authenticity in message transmissions. The final standard is expected to address privacy issues with the current version. WAVE ensures confidentiality

Monday, January 20, 2020

Relations Between the United States and Japan Before September 1941 Ess

Relations Between the United States and Japan Before September 1941 Japan was no longer able to rely on itself for food and raw materials and, so, for Japan to survive and prosper it would have to modernise and adopt Western technology. Japan was a medieval country but had managed to beat Russia in the war in 1905. They joined Britain in the War against Germany. On the 7th September 1914, they took over Germanys interests in China, but weren’t given any credit for the war. The Japanese demanded the right to send experts as ‘advisors’ to the Chinese Government. Only 15% of Japan was habitable, they needed more living space but weren’t allowed to emigrate to the U.S while the Washington agreement stopped them expanding in the Far East. In 1919, the United States called a conference, where nine countries attended, to limit the size of the navies of Britain, the U.S and Japan. It did so in the ratio 5:5:3. The Japanese were treated like a minor nation. They weren’t allowed to emigrate out of Japan or expand into China. They ...

Sunday, January 12, 2020

Natural Environment Essay

IB Environmental Science and Society. In this class, we focused on the ways that society affects our environment and vice versa. It opened my eyes to the fact that we can be environmentally conscious while utilizing our natural resources. I became determined to become involved with the oil and gas industry that provides so much support for Alaska’s economy, while considering the unique environment around us. I have been accepted to and intend to attend the University of Alaska Fairbanks to study Petroleum Engineering, with a minor in Environmental Politics. This particular program focuses on Alaska’s unique petroleum resources and environment. My Environmental Politics education will be a beneficial supplement and balance to my study of petroleum engineering, as I will learn the necessary precautions that must be taken when handling natural resources, and also because I will be exposed to the political issues surrounding natural resource extraction on a local and global scale. I have been accepted into the UAF Honor’s College, which I intend to become a part of, in an effort to get the most out of my education and surround myself with other students that are as focused as I am. UAF also appeals to me given the opportunities for summer internships with oil companies that operate in Alaska, many of which lead to long-term jobs after graduation. I wholeheartedly intend to stay in Alaska, but I am also interested in the international programs offered by several large oil companies as a chance to see the way other parts of the world extract and utilize their natural resources. Though it still seems far off, I am also strongly considering going for a Master’s degree at UAF in Engineering Management to be competitive and more prepared to become a leader in my field. In my career, I am most interested in increasing the efficiency of oil extraction and transportation through technology, in order to maximize the productivity and environmental safety while minimizing cost and time. Outside of my employment, I also look forward to encouraging young people, especially girls, to pursue math and science related fields, as my mother and aunt have done for me, and it has made all the difference in my decision to pursue a challenging, male-dominated field with confidence. I am confident that I will be a strong addition to the team working in Alaska to utilize our resources and improve our economy, while protecting our environment.

Friday, January 3, 2020

Chris Abanis Graceland - 1177 Words

Contemporary Perspectives Graceland Analysis â€Å"Elvis had read a newspaper editorial that stated, rather proudly, that Nigeria had a higher percentage of millionaires...than nearly any other country in the world, and most of them lived and conducted their business in Lagos. The editorial failed to mention that their wealth had been made over the years with the help of crooked politicians, criminal soldiers, bent contractors, and greedy oil company executives. Or that Nigeria also had a higher percentage of poor people than nearly any other country in the world.† (Abani 8) This quote exemplifies the image of Nigeria presented in Chris Abani’s shocking novel Graceland. Based on Abani’s own experiences in the conflicted, war-torn country,†¦show more content†¦How could a place be so ugly and violent yet beautiful at the same time? he wondered. He hadnt known about the poverty and violence of Lagos until he arrived. It was as if people conspired with the city to weave a web of silence around its uns avory parts. People who didnt live in Lagos only saw postcards of skyscrapers, sweeping flyovers, beaches and hotels.† (Abani 7) In this land beset by violence, poverty, death, and exploitation, Elvis becomes a dancer, using talcum powder and a black wig in order to impersonate his namesake (The American singer Elvis), in order to make a living entertaining the rich tourists on the Lagos City beaches. He takes a second job as a private dancer for the tourists – a job where he makes more money, but is treated as a disposable slave. As Elvis progresses to adulthood without any strong male figures to guide him in his life, he befriends two other characters, Caesar Augustus Anyanwu (a.k.a. The King of Beggars) and Redemption. The King of Beggars is a Nigerian political activist, willing to do anything to topple the abusive, corrupt military regime that controls the nation. Redemption lives on shady dealings – specifically drug trafficking, in order to survive. Elvis gets sucked into the seedy underworld, and gets in deeper than he would ever imagine. Abani sets a very grim and cynical scene, with lit tle hope. Elvis manages to flee by taking a plane to America, in