Saturday, August 31, 2019

Machinery Of The Fume Scrubber Engineering Essay

The geographic expedition in this undertaking evolves about the designing of the components in the machinery of the FUME SCRUBBER in the present twenty-four hours universe. Furthermore, the principal characteristics besides include significance of fume scrubber and its applications in the modern epoch. At the same minute is besides reveals about the facts of distinct parts of the machine and the operation of the machine. Following, it besides explores the design computations in order for the successful completion of the undertaking. It besides does include information about the basic survey of the Fume Scrubber that how it is created. The research besides reveals about the distinguishable types of smoke scrubbers available in today ‘s period. Consequently, it besides comprises of the CAD Model of the needed Fume Scrubber via utilizing PRO-E. In add-on, the theoretical account was re-done in order to obtain the Computation Fluid Dynamic Analysis for the flow of fluids inside the Fume Scrubber. As a consequence, of the applications, as elaborated in the undermentioned study the FINITE ELEMENT ANALYSIS has besides been justified. Therefore, the undertaking FUME SCRUBBER is illustrated in this study with the easiness of CAD Model. Introduction In the modern universe today, promotion in engineering via industries is at its highs. This sweetening of universe has its ain advantages and disadvantages. The advantages consider the amenitiess of the world and the possible disadvantage is menace to conventional environment conditions. Therefore, the endurance of world is influenced by the environment and hence, protection of the environment is of extreme importance in today ‘s epoch. As a effect, FUME SCRUBBER has been introduced to protect the nature from the harmful milieus created due to human activities ( e.g. mineral extraction, metal processing etc ) Mounting pollution of the environment from industries has anticipated to the speedy augment in environmental wellness and authorities ordinances, the milieus are really parlous for the species on Earth to digest, hence to heighten the environmental conditions the subsequent smoke scrubber were utilised. Scrubbers are intended to proficiently extravagancy and extinguish toxic exhausts from the concern bring forthing toxic gases which bring about decrease in ozone bed and green-house consequence. Scrubbers are miniature in volume and can be positioned where appropriate. Making usage of a typical tubing surrounded by a tubing propose, it has been built from plastic acid and base immune stuff that permits it denominate expeditiously indulged and extinguish up to 95 % of fumes gases. The specifications of the fume scrubber discussed in this study comprise of: – Large figure of holes for spraying the liquid 289cm tallness of the scrubber 143litres/min scouring liquid flow 5.08cm tubing OD Scrubbers are significantly utilized in industrial furnaces, hotel, chemicals procedure works, fabric Millss, boilers, metalworks and cement workss. In add-on, they are operated in air pollution monitoring equipments, allied industries and vacuity wadding. Scrubbers have apparent advantages which consist of: – Low force per unit area depletion and least energy necessity Easy flexibleness and high turn down Maintenance free and noiseless operation No adult male power required Therefore, the undermentioned study would find the operations of the fume scrubber, ways of bettering its design in an effectual method and depicts the efficient disposal of the undertaking. The study will show the design process followed in planing the FUME SCRUBBER and it will demo the consequences of CFD analysis and FEA analysis every bit good as discoursing ways of bettering the public presentation. Besides, its constituents aid in adept apprehension of the operation and applications of the fume scrubber. Therefore, the undermentioned study makes possible in emerging out the successful completion of the marks.Aims/objectivesThe main purpose of the undertaking ( FUME SRUBBER ) is to plan the constituents that exist in the machinery of Fume Scrubber. In add-on, analyzing the importance of Fume Scrubber and its applications in the existent universe are besides the chief characteristics of the undertaking. The undertaking design can be achieved via design computations which can fart her be accomplished after the research about the machinery is carried out. Therefore, the research work involves the survey of distinct parts of the machine and the operation of the machinery. Consequently, the design computation leads to the preparation of the needed CAD theoretical account of the machine. Furthermore, enhanced analysis is carried out via executing the Finite Element Analysis of the system as the effects of lading are studied on the components of the setup. As a concluding point, the Computational Fluid Dynamics is besides involved to analyze the consequence of air flow in the Fume Scrubber. Last, the applications of the fume scrubber are to be elaborate via explicating the advantages of FUME SCRUBBERS in the industry.Design and Application of Fume ScrubberThere are assorted types of designs available in the industry for different applications. The primary aim of the fume scrubber is to undertake the caustic exhausts, moist gases and air flows with dust nowadays in an industrial environment. There are three chief types of designs that have been developed in order to undertake the issue of remotion of contaminated air by purification procedure utilizing the appropriate fume scrubber. These are as listed below: Impingement Plate Scrubbers Packed bed Scrubbers Venturi Scrubbers Impingement Plate scrubbers are the scrubbers in which gas is passed vertically through all right perforations in a home base and is collided on marks and contacted with H2O or any other liquid fluxing horizontally across the home base. Pressure bead is one of the premier factors that determine the pick of scrubber. The figure and types of phases in home base scrubbers are specially designed to the conditions ; nevertheless these can be modified depending on alteration in the conditions or demands. Packed bed scrubbers are designed in such a manner that flow of gas rises, counter current to the flow of the scouring liquid through a jammed tower type construction, in which the taint or purification procedure takes topographic point. These types of scrubbers are besides designed in a horizontal alliance. The horizontal designed is used where multiple phase scouring is required or besides used in countries with less ceiling tallness. Venturi Scrubbers consists of an external venture subdivision which is designed to increase the speed of the incoming air before the air is combined with the scouring liquid and centrifuge where the remotion of contaminations take topographic point and hence sublimating the air. This type of scrubber is applied in procedures where condensation of liquid is present or metallic bluess are present or in the presence of chemical reaction which subsequently consequences in production of toxic exhausts for illustration ammonium chloride. Particle aggregation chiefly takes topographic point due to impaction as the fumes gas which is exhausted from the procedure and base on ballss through spray. The turbulency happening due to this causes the atoms to come in contact with the wet droplets and hence get collected. The efficiency of aggregation of atom additions with the nozzle force per unit area increasing which gives rise to an addition in liquid to gas ratio. This will besides ensue in an addition in force per unit area bead, which once more causes a rise to coerce bead. This type of scouring system has some restrictions every bit good such as care job. Venturi scrubbers are subjected scratch job in the high-speed countries such as the recess and mercantile establishment.3.1 Advantages and Disadvantages of ScrubberIn order to compare the scrubber in footings of working phenomena, the device is usually compared and evaluated with fabric filters and Electrostatic precipitators. The advantages of the scrubber over this device are as listed in the tabular array on the following page:AdvantageDisadvantagesCan work at high temperatures, high humidness Gas StreamsProne to corrosionMinimal exposure to fire and explosive jeopardiesRequires High PowerCan roll up both gases and particulate affairWater disposal jobsNo Secondary dust beginningDifficult merchandise recovery.Requires minimal infinite compared to other control devicesVertical clip demands height clearanceTable Advantages and Disadvantages of Fume Scrubber3.2 Construction MaterialsAs corrosion is one of the major job that could impact the systems behavior, the building of the scrubber is done chiefly in many different stuffs runing from Fibre reinforced plastic, PVC, CPVC, Polypropylene, Polyethylene, Mild steel, Stainless Steel, FRP-lined mild steel, nickel metals and aluminum. The building stuff choice procedure is based on the demands and design footing provided by the client.3.3 Suitable ApplicationsScrubbers can put to death the riddance of acidic, alkalic, soluble organic gasses, bluess, and odours get downing a gas watercourse. The jammed bed engineering scouring comprises the widest array of vapor and gas scouring maps. When fabrication of smoke scrubbers, it permit to choose the finest stuffs of production, in add-on to choose the finest wadding for the intent. Fume scrubber designed for the subsequent intents: Metal Pickling Lines Chemical Cleaning/Milling Lines Acid Etching Lines Acid /Chemical Bulk Storage Solvent Bulk Storage Metal Finishing Lines Metal Plating Lines Chemical Mixing Operations Chemical Processing Equipment Food Processing Pharmaceutical Blending Pharmaceutical Production3.4 EfficiencyScrubbers include a acute measure of vigorous surface country with arbitrary dumped packing. The packing stuff elected is sourced on the maps ; attesting that it rupture the liquid watercourse into legion, smooth surface movies that generate in-depth gas/liquid familiarity at a low force per unit area diminution. In the class of procedure, gas watercourses rises by agencies of a jammed bed although scouring liquid class down ( by gravitation ) over the packing stuff. The counter-flow lineations standard beliefs most favorable mass transportation.3.5 Benefits of Fume Scrubbers:Very Small Footprint Ease of Installation Variable Packing Height Local or Remote Blower Local or remote control panel Multiple Phases Height & A ; Width FlexibilitySignificance of fume scrubberIt is an air pollution control device that utilizes an inordinate energy liquid spray in order to eliminate aerosol and gaseous pollutants get downing an air watercourse. However, the gases are removed in two ways which are: – By soaking up Chemical reaction Gass are discharge from the burning procedure is conceded by agencies of armored combat vehicle enveloping a lime substance acknowledged as limestone slurry which can restrict and antagonize the S dioxide. Engineers concept and saddle horse high competency, depleted continuance smoke exhaust systems proposed to extinguish H2O soluble contaminations through gas soaking up and mechanical encroachment. These units can be standard-sized or usage built with the purpose of correspond to infinite and height boundaries or outline disposition. Appropriate smokes control setup in add-on necessitates the appropriate mechanism and system incorporation to be the chiefly efficient. In add-on to it, declaration to fume and wash up jobs by agencies of: Entire system design and integrating Automated pH control Performance information for air licenses Professional installing by experient applied scientists Extensive experience in system design Choice of proper stuffs of building Utilize high public presentation Lamtec wadding Flexibility in taking constituents for best public presentation Fume Scrubbers propose: Translating elements in gas watercourse into more effectual substances Geting rid of atoms from gas watercourses A choice of sizes, with the criterion sizes being: 24 † , 30 † , 36 † , 48 † and 60 † diameter scrubbers. Fabrication of both perpendicular and horizontal scrubbers harmonizing to your demands. Materials of creative activity utilised fluctuate depending on the chemical and procedure environments necessitated Fume scrubbers assembled are individually fabricated to extinguish mist, entrained liquid atoms, noxious caustic gases and bluess from the exhaust air watercourse. A jammed bed utilizing Lintec wadding is the bosom of the scrubber. Pollutant gases can normally be eliminated to any needed soaking up to convene confined air pollution ordinances. The pollutants are eliminated by agencies of the followers: Gas Absorption – toxic or otherwise unwanted gasses are captivated into the liquid section. Impingement – Particulate affair is eliminated by agencies of encroachment in the map of it is foremost forced by agencies of a moist packed bed and so by agencies of a stripe blade or mesh tablet filters subdivision.Equations used in fume scouring:The gases normally scrubbed include HCl produced from metal pickling. This is removed by a neutralization reaction with sodium hydrated oxide. The reaction is shown below: Another common smoke gas is azotic oxide every bit good as other N oxides. These will usually respond with the O in the air and the H2O vapor to organize azotic acid. Since it is acidic, azotic acid can be scrubbed by utilizing base. Nitrogen oxides tend to be produced from burning reactions. The reaction for this is: The merchandises of the scouring are so dissolved in the H2O and taken off from the air. Another common pollutant is sulphur dioxide. This is a gas that is produced by assorted industrial procedures such as doing semiconducting materials, batteries, and burning of sulfur incorporating fossil fuels. This gas, like N oxides, dissolves in H2O to organize sulfuric acid which is scrubbed with the usage of base. The undermentioned chemical reactions are known to take topographic point. A closely related pollutant is hydrogen sulphide gas. This is treated in a similar manner to sulfur dioxide. The chemical reactions speaking topographic point in the fume scrubber are: The salt merchandise of the reaction is taken off with the H2O therefore liberating the air from the H sulfide gas. One common gas is carbon dioxide gas. This is produced chiefly by burning and when heating carbonates. It is responsible for planetary heating and can be removed by change overing it into a carbonate that can be dissolved off from the air by the H2O. The chemical used is sodium hydrated oxide and the merchandise of the reaction is baking sodium carbonate, Na carbonate. The reaction is: Unburned hydrocarbons are besides an issue. These are dealt with by oxidizing them utilizing hydrogen peroxide or carboxylic acids. The merchandises are carbon dioxide and H2O. These can be farther scrubbed to bring forth carbonates to acquire rid of the C dioxide. The equations are: AndType of scrubberWet scrubberA development of pollution manipulates engineering. The chief principal of operation of the moisture fume scrubber is the usage of liquids in wetting the air fluxing indoors. The contaminations will fade out into the liquid thereby traveling from the gas stage to the liquid stage. The air that leaves the scrubber is well cleaner than that air which entered it. The wet fume scrubber is able to command the flow of many pollutants including acids and the acidic gases e.g. HCl, SO2 etc that are produced from the assorted industrial procedures when handling metals. Wet scrubber is operated to scour assorted pollutants for case air and dust atoms. The operation of wet scouring involves contact of particulate affair along with the scouring solution for case H2O, complex solutions of reagents that peculiarly aim for house compounds. In add-on to this, the efficiency of the fume scrubber must be high to take all or bulk of the pollutants. In order for this to be achieved, the following techniques could be implemented: Increasing abode clip in the scrubber Increasing the surface country of the scrubber ‘s solution utilizing spray nose, packed towers. Bettering the soaking up of contaminations by taking an appropriate liquid There are two chief types of moisture smoke scrubbers. The first 1 is the venture nozzle type and the 2nd 1 is the jammed bed fume scrubber. An illustration of a wet fume scrubber is shown in figure 1 below. Mention: – Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Wet Scrubber. USA: Human Press IncFigure 1, an illustration of a wet fume scrubber [ 1 ]The venture type moisture fume scrubber uses a individual nose to spray the liquid at really high force per unit area into the reaction chamber. The high force per unit area flow is aimed at the bottleneck of the chamber which is the venture subdivision. An of import and desirable effect of this manner of operation is that the venture wet fume scrubber does non necessitate the usage of a fan or a blower to travel and go around the air in the system as the force per unit area distribution creates the forces necessary for this to go on. Because of this, the venture type moisture fume scrubber is besides called ouster venture scrubber. Another of import facet of the operation is that this type of wet fume scrubber can non straight take contaminations and exhausts with a tom sizes less than a micrometer. Since the ouster venture wet fume scrubber relies on the force per unit area and turbulency to blend the air and the liquid together, so an addition in force per unit area which leads to an addition in turbulency will maximize the commixture of the two flows ( the contaminated air and the liquid ) therefore taking to an addition in efficiency. The 2nd type of wet fume scrubber is known as the jammed bed moisture fume scrubber. Here a blower is used to coerce the air with contaminations to travel to the commixture chamber where the pollutants are removed. This type of wet smoke scrubbers requires less energy to run. However, it can non take atoms less than 5 microns in size. [ 2 ] [ 3 ]Dry scrubberDry scrubbers comprises of a chemical interpolation zone followed by manner of a reaction zone where the pollutant in the gas kernel treated counters with the base. Dry scouring involves two criterion procedures which are at present utilised in industries. First, a dry soaking up which introduces powered alkali soaking up agent addicted to foul gas watercourse. Second, semidry ; this instills resolute slurry into the contaminated gas watercourse and eliminates the liquid by agencies of vaporization, separating the vigorous, dry base soaking up agent. Both the procedures mentioned above eradicate base agent with an electrostatic pr ecipitator. [ 4 ] Mention: – Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Dry Scrubber. USA: Human Press IncStructures of smoke scrubbersVertical smoke scrubberThe perpendicular assembly is a counter-flow type with contaminated gas traveling upwards and reticulating liquid spraying downward into the mixing country. Gaseous contaminations are absorbed by the liquid due to solubility degrees or by chemical reaction. Counter-flow scrubbers can hold higher remotion efficiency than a Horizontal Packed Bed Scrubber. The perpendicular counter-flow design typically provides the best scrubbing efficiency of bluess and is the most common design found in most industries. Figure 2 below shows an illustration.Figure 2 a perpendicular packed bed fume scrubberHorizontal smoke scrubberThis is a cross-flow design where the scouring liquid flows vertically downwards while the gas passes horizontally through the wadding commixture subdivision. A Horizontal Packed Bed Scrubber is used when limited headway is an issue at a installation or when low profile is desired for roof-top applications. Multiple phases can be easy provided in one lodging with separate sumps and pumps if required. The cross-flow design is less susceptible to bed fouling for airstreams that may incorporate solid particulate.Figure 3 A horizontal packed bed fume scrubberComponent of fume scrubberRECIRCULATING Tank CONVERGENT TOP CONE Scrub Tank MIST ELIMINATOR RECIRCULATING Pump Motor WITH BLOWER NOZZLE PIPE HOOD / DUCTFunction of constituentRECIRCULATING Tank: –Bacillus AFigure Water armored combat vehicle in a fume scrubberIt comprises of combination of legion chemical intents for scouring process and H2O provender in the function of put in for the unneeded elements to repair downwards which has been set away through mercantile establishment port. It is utilised to allow efficient use of the trustee. In this undertaking H2O is utilized in such a manner that it will blend with the dust atoms coming from the recess and will settle at the underside of the armored combat vehicle. The armored combat vehicle has a drainage mercantile establishment which will be used when the armored combat vehicle requires emptying and cleaning procedure. This is denoted by missive A in the above figure Letter B denotes at the mercantile establishment of the H2O armored combat vehicle, which is connected to the recirculating pump. This so drives the H2O upward which will be sprinkled in the scouring armored combat vehicle as explained subsequently.Convergent Top cone: –Figure Convergent Top ConeThe above figure is of a convergent cone which is comprises of the top subdivision of the fume scrubber tower. The portion is designed in such a manner that it provides a meeting way to the fluid to flux out of the fume scrubber. The convergent form allows the fluid flow to be extracted at a higher speed ensuing in a lessening in a force per unit area. This is supported by Bernoulli ‘s equation. On the top face of the convergent cone an extractor goon is placed which will make a force per unit area differential resulting in the suction of the pure air.Scrubing armored combat vehicle: –Calciferol C Bacillus AFigure Scrubbing TankThe inner of the armored combat vehicle is enveloped in the thick of acerb cogent evidence for case acid brick and it is a location where scouring development takes topographic point. Scrubing armored combat vehicle interruptions free toxic stuff and gases from air, which so gets assorted with the H2O and is deposited in the H2O armored combat vehicle as mentioned earlier. The armored combat vehicle has three recesss and one mercantile establishment. Letters a‚? , B and C are recesss and Letter is Outlet. Inlet A is the chief recess to the scouring armored combat vehicle this is from where the air enters the scouring armored combat vehicle. The air come ining the scouring armored combat vehicle is a assorted air i.e. with drosss. The elaborate dimensions of all the parts can be found in the undertaking logbook. Inlet B is the recess from which the H2O is sprinkled in to the scouring armored combat vehicle. This sprinkled H2O is will so unite with the drosss or dust and will therefore settle in the H2O armored combat vehicle at the underside of the construction. The sprinkled H2O enters the scouring armored combat vehicle by agencies of the recirculating pump connected externally. Inlet C and Outlet D are the countries where a wadding medium is placed. The ground behind the fond regard of the wadding media is to supply a maximal surface contact between the gas and the scouring liquid by easing uninterrupted formation of droplets throughout the jammed bed. This will ensue in addition in efficiency of a scrubber. The efficiency is besides depended on the tallness of the packing stuff. This maintains a unvarying volume and flow. Besides provides a high liquid to gas ratio.Moisture Eliminator: –Figure Mist EliminatorMist Eliminator is a device that is placed in order to maintain the liquid in the vas. The ground behind add-on of this characteristic is that without this characteristic the droplets become airborne and are carried out of the vas by traveling fluid which causes job as liquid gets collected in the part where it is non meant to be present. This device is besides referred to as Moisture Eliminator or Moisture centrifuges. The image below describes a general procedure of how a wet eliminator works.Figure Working process of a Mist Eliminator [ 5 ]As it can be seen from figure 5 Mist eliminator captures the liquid drains. Mist is carried by vapor. The overhead vapor shown in the figure is free of all the drosss that are being suctioned by the goon.RECIRCULATING Pump: –Figure Recirculation PumpThe chief map of the recirculation pump is to supply H2O to the scouring armored combat vehicle. The pump is driven by the motor which is fixed to the land. The motor provides a impulsive force for the H2O to be pushed into the scouring armored combat vehicle. The H2O from the H2O armored combat vehicle is suctioned by this pump. One of the positive facets of the motor design is that it will non be affected even in the instance of a presence of chemical in the H2O.Blower is a constituent that will force the air to the ambiance. The blower consists of usher vanes that direct the air flow out of the system.Motor with BlowerFigure Moto r with BlowerNozzle Pipe: –Figure Pipe with NozzleThe above diagram is of a pipe holding little pores in it. These pores allow the scattering of H2O which is coming from the recirculating pump. The working of this constituent is in the same mode as that of the sprinkler. The efficiency of this portion will hold an consequence on the efficiency of the fume scrubber. This is because the sum of H2O sprinkled from this pipe will ensue in the sum of dust being collected.Hood: –ABacillusFigure HoodThe goon is a pipe linking the fume scrubber with the blower. Inlet A is connected to the top of the convergent top cone subdivision of the fume scrubber. Mercantile establishment B is connected to the blower which will so steer the air flow out of the system as explained earlier. The decompression sicknesss in the goon will do a difference in the force per unit area and this force per unit area should be overcome by the blower in order for the system to run successfully.615852347O peration of fume scrubber12111491610131Figure Fume Scrubber Set upFigure 10 shows a complete installing set up of the fume scrubber with each of the constituents separately labelled by different Numberss. The maps of each constituent are as explained earlier, but the following description will sketch the working of the fume scrubber in an industrial environment. First, the installing is done either in a perpendicular or horizontal orientation depending on the design specification. The design selected in this scenario is of perpendicular orientation. In this peculiar type of fume scrubber assorted air enters the recess at point 1 from the room, chamber, etc. at a specified value of the volume flow rate. Item 15 are the recesss and mercantile establishments of the packing media. The map of the wadding media is to cut down the speed of the air which is coming from the recess ( item 1 ) . This will blockade the assorted air. The air is so in the assorted province inside the point 2 ( sc ouring armored combat vehicle ) . At this point, the recirculation pump ( item 13 ) is started which will so pull the H2O from the mercantile establishment in H2O armored combat vehicle ( item 10 ) into the recirculation pump and is so discharged into the pipe ( item 6 ) and from this point onward the H2O so enters the scouring armored combat vehicle by agencies of sprinkler ( item 5 ) . The H2O is so assorted with the impure air. The dust atoms in the air so combines with the H2O doing it heavier and therefore deposited at the underside of the H2O armored combat vehicle. Item 3 is the wet eliminator which collects the H2O droplets and eliminates it from the vapor. This will forestall the H2O or wet from traveling into the goon via the top conelike subdivision ( item 4 ) of the scrubber. The pure air is drawn into the goon ( item 7 ) . This suction procedure is done with the assistance of the blower ( item 14 ) . The outlet terminal of the goon is connected to a subdivision of canal which consists of usher vanes ( point 9 ) , set up in such a manner that air is directed in the upward way towards the perpendicular canal ( item 8 ) which so discharges the pure air to the ambiance. The H2O from the H2O armored combat vehicle can be extracted manually detecting the H2O quality through a crystalline screen. After the armored combat vehicle is to the full emptied the H2O can be refilled into the armored combat vehicle by an extra recess which is located at the back terminal of the H2O armored combat vehicle every bit shown as figure 16 in the figure 10. The chief characteristic of the full procedure is the proper recirculation of H2O in the system, which mixes with the impure air to cut down the pollution degrees of the incoming gaseous mixture, therefore supplying a more purified and uncontaminated air to the ambiance leting a control in the air pollution and therefore lending to the decrease in the production of green house gases ensuing in the planetary heating.Cad theoretical account of fume scrubberFigure Isometric ViewThe CAD theoretical account was made of a jammed bed fume scrubber utilizing pro applied scientist. The fume scrubber was designed by piecing together different parts. The parts of the fume scrubber were modelled separately and so assembled together. The diagram above shows a fume scrubber with all parts assembled together. The bluish chamber has been made transparent to enable the reader to see the internal parts of the fume scrubber. The parts were explained separately in a old subdivision. The assembly was made by stipulating the restraints for each portion. For illustration, the bluish chamber is to be steadfastly attached to the ruddy base. Therefore, the restraints were specified that at the junction between the bluish chamber and the ruddy base, an Ten way and Y way restraint was applied. Another illustration is the long ruddy connection tubing that joins the bluish chamber at the top. In that instance, the restraints are that the axes go throughing through the Centres of each must be coinciding i.e. the cross subdivisions of the two tubings must be homocentric. The same can be applied to all the other parts in the assembly. After the basic construction of the fume scrubber has been made by piecing the single parts, the moving parts and the mechanisms had to be specified. The chief moving machine is the blower which made of the fan and the motor. First, the mechanism was specified. The mechanism used was a rotating articulation applied to the shaft of the fan and the blower. Then, the way of rotary motion of the mechanism was specified. Finally, the interaction with other parts of the assembly was specified. This is fundamentally to guarantee that no struggle occurs when the joint rotates e.g. such as the fan clashing with the base or with the ruddy goon. This was a really basic description of the methodological analysis employed in piecing the fume scrubber and making the gesture simulation. The figure 12 on the following page shows the front position of the fume scrubber for better apprehension of the system and besides the construction.Figure Fume ScrubberCFD of fume scrubberThe CFD ( Comp utational Fluid Dynamics ) analysis theoretical accounts the flow of the air through the fume scrubber. This gives a basic thought of the flight of the airstream and helps the interior decorators to modify the construction consequently. The CFD simulates how the watercourse behaves from entry to go out, and bespeaking the countries where the flow looses energy. The airstream used here is simulated at a volume flow rate of 10m3/s fluxing in from the chief recess country. Plots below are of the speed contour secret plans and of Velocity and Velocity in the y-direction.Figure: speed contour secret planFigure: Y – speed counter secret planThe graph shows the speed of the airstream at different countries of the flow inside the chief vas. As can be observed, the speed is the highest at the top of the fume scrubber, bespeaking that the air moves at a high velocity at the top. Areas at a low speed have dveloped whirls, which result due to air at opposite speeds fluxing adjacently, doing the speeds to call off out. Looking at the Y – speed secret plan, it can be seen that some portion of the recess air flow moves upwards straight, while another volume of air moves downwardly. This portion so bounces back in to the upwards traveling air and merges with the flow.Figure: Flow Trajectory of airstreamThe above secret plan gives a clear simulation of the flow forms of the air flow inside the construction signifier recess to outlet. As can be seen, th is trajectory representation mirrors the speed contour secret plans. Air moves from the recess in both the upwards and the downwards way. Upwards speed reaches its upper limit at the top of the mercantile establishment cone, while the other portion of the air flows back from the bottom towards the top. In the diagram, it can be seen that the air from the underside of the fume scrubber merges with the upwards fluxing air, which accelerates it further and tends to travel it towards the top mercantile establishment. The air flow simulated here is wholly disruptive. This means that the streamlines are non laminal and be given to travel in different waies once they exit the controlled infinite of the recess pipe. This pattern is true in the sense that a true complete laminar flow does non be in the existent universe, and to pattern the flight of the air as a turbulent fluid flow will give more accurate readings, which will be helpful in usage for farther computations which can be taken o ut for different parametric quantities.FEA of fume scrubberWhen planing a portion or constituent, it is necessary to analyze the elements and understand the forces impacting the operation of the system, and to set the construction consequently to obtain a successful theoretical account of the concluding merchandise. Transporting out the FEA ( Finite Element Analysis ) of a construction reveals the emphasis degrees, strain undertaken, and the supplanting of the construction under the applied force. There are assorted forces moving on the fume scrubber, nevertheless, the chief forces which apply a important consequence of the construction are the weight of the construction itself, the weight of the H2O in the H2O armored combat vehicle, and the force exerted by the inflowing airstream. However, sing the stuff selected for the fume scrubber, which is unstained steel 304, the initial premise is that the construction will hold a high value of the factor of safety, which is an optimal factor used to depict the dependability and sustainability of the fume scrubber.13.1 CalculationsSee Appendix for measure by measure computation carried out to cipher the weight of the construction. Besides the computation for the Head losingss in the recirculation pump can be found in the Appendix.13.2 AnalysisThe FEA analysis of the fume scrubber is evaluated by sing it being fixed at the base of the theoretical account. This ensures that the fume scrubber does non skid from its base. However some scrubbers might be intended to hold a sliding base, they have different specifications to go to to.Figure: fixture of the base of the H2O armored combat vehicleThe forces being applied on the construction are the weight and the force per unit area due to the H2O and air. However, the air is fluxing at a comparatively low velocity and due to its low denseness, it does non impact a force sufficient plenty to associate to the weight and H2O force per unit area, therefore it is omitted from the computations for the simplification of the modeling. Transporting out engagement of the chief construction, it provides with the values of the emphasis distribution, supplanting and the factor of safety of the construction. These belongingss are really utile when depicting the sum of force that the stuff can defy. It besides suffices as to how much excess burden above the design emphasis can be undertaken by the construction if needed.Figure: emphasis distributionThe figure shows the emphasis distribution across the construction due to the weight of the construction and the force per unit area on the H2O armored combat vehicle due to the H2O contained in it. As can be seen, the maximal emphasis occurs at the Centre of the H2O armored combat vehicle, which is about 39.2 MPa. This occurs because the centreline of the H2O armored combat vehicle experiences weight of the construction from the top and the reaction of the base from the underside, which tends to make a high emphasis at the center of the armored combat vehicle.Figure: supplant ing secret planThe supplanting secret plan mirrors the emphasis secret plan in footings of the critical countries where the supplanting is at a upper limit. Although the supplanting is higher on the armored combat vehicle than at the other countries, the value is comparatively low, approximately 0.09034mm and does non impact the armored combat vehicle in any physical position.Figure: factor of safety secret planAs represented by the factor of safety secret plan, the minimal factor of safety is about 5.27, which occurs at the H2O armored combat vehicle. This means that the construction can at least prolong about more than 5 times the emphasis that it was designed to achieve. This reflects the dependability and sustainability of the construction, which is really important to any company willing to put in it. This besides represents a step of the life-time of the fume scrubber, detailing how long the system will work expeditiously until it is sent to be scrapped.DiscussionThe usage of fume scrubbers in industry is increasing and is being incorporated in different procedures such as metal intervention, metal pickling, and machining. The efficiency of fume scrubbers available today can near 99.9 % . The procedure of smoke scouring is of import for the protection of the environment and for wash uping the gases and contaminated air produced or used by the assorted industrial procedures described above. The design of fume scrubbers is a long and iterative procedure. The demands for fume scrubbers are that they must be able to scour exhausts with atoms that can be less than five micrometers in size. The operation of the fume scrubber will differ harmonizing to the rule employed. These different rules of operation have been discussed in this study in item. Furthermore, a moisture packed bed perpendicular smoke scrubber has been described in inside informations in this study with the design procedure outlined and the analysis of the scrubber. The analysis included transp orting out a CFD analysis to see the public presentation of the scrubber in footings of decelerating down the air and supplying the force per unit area needed for the disruptive commixture of the smoke atoms and gases with the cleansing liquid ( which efficaciously works by fade outing the gases and atoms in the exhausts ) . In this peculiar design although is non shown here, many jobs were encountered in the design of this scrubber to enable the efficient commixture to take topographic point. So, the system was modified several times to make the coveted public presentation. In the CFD analysis, as discussed in the CFD subdivision it is noted that the velocity at the recess to the scrubber of the spray ( the cleansing liquid spray ) was reduced as the country of the cross-section of the fume scrubber increased. This created some jobs in the initial design as it led to †uncontrolled † flow of the liquid spray significance that it is disruptive but, it does non follow the way intended for it to travel through. This job was solved by the aid of CFD analysis together with the fluid kineticss knowledge base. The force per unit area inside the fume scrubber is non high ( at least in this instance as the type used was packed bed type ) . If the design made were a venturi type smoke scrubber, so the force per unit area used will hold to be considered since it can be rather high. However, in the instance of the design presented here the force per unit area was non high and so it was ignored when a emphasis analysis was carried out. There are grounds for this. First, the force per unit area is really little and handling the fume scrubber as a force per unit area vas, it is seen by transporting out a simple computation that the emphasis in the walls, which will be maximal as a hoop emphasis, will non be high to be of importance. However, the perpendicular smoke scrubber besides acts a column or a prance and is subjected to a burden due to its ain weight that acts as a compaction burden ( ideally ) which can do buckling of the scrubber. Buckling is an utmost instance as the wall thickness has to be really little and the tallness of the fume scrubber really big or the stuff from which it is made is holding a low snap modulus. The FEA showed that no buckling was at that place and so the compaction strength of the scrubber was equal. There is a safety factor for the scrubber and this besides takes into history the little force per unit area rise inside the scrubber. Again, the emphasiss in the walls due to the internal force per unit area have been ignored because these are little plenty to be neglected but for a venture type, these would hold been basically included in the emphasis analysis of the scrubber.DecisionThe decision from the above is that the usage of fume scrubber is a really cost effectual method of cleaning procedure air from the exhausts and suspended atoms in the air. The concern director or the mill which wishes to use fum e scrubbers in its operations will be benefit from improved pureness of the fumes gases and better working environment in welding and metal machining premises. The clean air is an indispensable legal demand today and the usage of fume scrubbers helps make the set aims. Furthermore, the fume scrubber reduces environmental pollution that arises due to the particulates every bit good as the acidic and caustic gases produced in the exhausts. The chief issues to see are the type of fume scrubber to use, the constellation, and the cost of the scrubber. The type will be dictated by the energy supply available to run the scrubber as the venture type scrubbers need to bring forth a high force per unit area spray which requires a big energy input. The jammed bed type has lower energy demands. The constellation to utilize i.e. horizontal or perpendicular will be dictated by the infinite available in the premises where the fume scrubber will be installed. The concluding factor is the cost of th e scrubber which can be justified by transporting a cost analysis to compare the different types of the scrubbers to utilize.Mentions: –Kingston University, ( Internet ) Available at & lt ; & lt ; hypertext transfer protocol: //www.monroeenvironmental.com/air-scrubber-venturi.htm accessed 18/04/2010 & gt ; & gt ; Kingston University, ( Internet ) Available at hypertext transfer protocol: //en.wikipedia.org/wiki/Ejector_venturi_scrubber accessed on 18/04/2010 Kingston University, ( Internet ) available at hypertext transfer protocol: //en.wikipedia.org/wiki/Packed_bed accessed on 18/04/2010 Wang, Lawrence K, Pereira, Norman L & A ; Hung, Yung TSE. ( 2004 ) Air Pollution Control Engineering ( Volume1 ) : Dry Scrubber. USA: Human Press Inc Kingston University, ( Internet ) Available at hypertext transfer protocol: //www.amistco.com/PRODUCTS/ELIMINATORS/index.html accessed on 19/04/2010. Kingston University, ( cyberspace ) Available at & lt ; & lt ; hypertext transfer protocol: //www.engineeringtoolbox.com/reynold-number-water-flow-pipes-d_574.html accessed on 21/04/2010 & gt ; & gt ; Kingston University, ( cyberspace ) available at & lt ; & lt ; hypertext transfer protocol: //www.pipeflow.co.uk/public/articles/Darcy_Weisbach_Formula.pdf accessed on 22/04/2010 & gt ; & gt ; Kingston University, ( Internet ) available at hypertext transfer protocol: //opencourseware.kfupm.edu.sa/colleges/ces/che/che309/files % 5C2-Experiments_Losses_in_Pipe_systems.pdf accessed on 22/04/2010. Kingston University, ( Internet ) available at hypertext transfer protocol: //www.thermexcel.com/english/ressourc/pdclocal.htm Kingston University, hypertext transfer protocol: //mysite.du.edu/~jcalvert/tech/fluids/orifice.htm hypertext transfer protocol: //www.surechem.com.my/download/eijkelkamp/P2/P2-25e.pdf www.pipeflow.co.uk/public/articles/Darcy_Weisbach_formula.pdf Mention: -Kingston University ( Internet ) , available at: hypertext transfer protocol: //process-equipment.globalspec.com/learnMore/Manufaturing_Process_Equipment/Air_Quality/ScrubbersBibliography

Friday, August 30, 2019

Why Did the South Lose the Civil War

Why did the South Lose the Civil War? Beginning as a battle of army versus army, the war became a conflict of society against society. In this kind of war, the ability to mobilize economic resources, the effectiveness of political leadership, and a society’s willingness to keep up the fight despite setbacks, are as crucial to the outcome as success or failure on the battlefields. Unfortunately for the Southern planters, by the spring of 1865, the South was exhausted, and on April 9, Lee surrendered to Grant at Appomattox Court House, effectively ending the war.Economically, the war was a benefit for the North and a disaster for the South. The North began the war with several advantages. The North held a distinct lead in nearly every resource needed for warfare. Not only was the population deficit of the South compared to the North, roughly around 13 million, but the statistics for factories, goods produced, railroad tracks, textiles, and firearms all succeeded the south by mor e than half. As a result, the union army became the best-supplied and fed army while southern armies suffered shortages of food, and clothing.Shortly after the start of the war, Lincoln would further suffocate the south economically by implementing the Anaconda Plan, a naval blockade. Industrially the South couldn't keep up in output but also and in manpower. By the end of the war, the South had, more or less, plenty of weaponry still, but it just didn't have enough men to use the guns. Let alone enough men to defend the perimeter around the confederacy to protect its territory.Another key aspect that the North held over the South was the determination of Abraham Lincoln to win, and the incredible staying power of the people of the North, who stuck by Lincoln and stuck by the war in spite of the first two years of almost unrelenting defeat. A problem of the South was that it lacked the moral center that the North had in this conflict, the idea of Union, was important. One of the Sou th’s objectives’s for creating their own government, was to give states more power than the central government. This was ironic, because a strong central government was what the South needed, but what Abraham Lincoln had in the North.Abraham Lincoln also offered a better explanation to his own people of what they were fighting for. He displayed this leadership through his progressive steps towards emancipation, one early example being the contrabands of war. The army and congress determined that they would not return escaped slaves who went to Union lines and classified them as contraband. They used many as laborers to support Union efforts and soon began to pay them wages. This would seem exceedingly important as the war turned into one against slavery.Despite the lack of economic and political power, the South was also at a loss of collective will. Certainly the course of the war, the military events, had a lot to do with the loss of will. The Southerners hoped that they would win spectacular victories on Northern soil, and that they would be able to exhaust the will of the Northern people, and they failed to do so. The battle of Gettysburg with the largest number of casualties is often described as the war’s turning point. The Union defeated attacks lead by Confederate General Robert E. Lee, ending Lee's invasion of the North.With regard to military turning points, the outcome of the war also became inevitable in November 1864 with the reelection of Lincoln and the utter determination to see the things through, and the finding of leader U. S. Grant, the man to provide the leadership that the North needed. As long as Lincoln was determined to prosecute the war and as long as the North was behind him, inevitably superior manpower and resources would win it out. With more men, more money, more industrial power, and a strong unity for the will to win, the Northern Union crushed the Southern planter aristocracy and it never regained its poli tical power again.

Thursday, August 29, 2019

Implications of Information Technology in Developing Countries Essay

The survival and growth of organizations in an increasingly turbulent environment would depend upon effective utilization of information technology for aligning the organizational structure with environmental preferences and for creating symbiotic interorganizational structures. How can IT help the organizations in responding to the challenges of an increasingly complex and uncertain environment? How can IT help the organizations achieve the flexible organization structure? These are the topics that remains to be a matter of question for many developing countries. Although Information technology is still a .black box . technology for developing countries, it is largely applied in industrialised countries to the disadvantage of the majority of developing countries. This paper will try to illuminate the aspects and the impact of Information Technology in managing organizational change and its implications for developing countries. 1. Introduction The rate and magnitude of change are rapidly outpacing the complex of theories. economic, social, and philosophical on which public and private decisions are based. To the extent that we continue to view the world from the perspective of an earlier, vanishing age, we will continue to misunderstand the developments surrounding the transition to an information society, be unable to realize the full economic and social potential of this revolutionary technology, and risk making some very serious mistakes as reality and the theories we use to interpret it continue to diverge..-Arthur Cordell(1987). We have modified our environment so radically that we must modify ourselves in order to exist in this new environment..Norbert Wiener(1957) The survival and growth of organizations in an increasingly turbulent environment would depend upon effective utilization of information technology for aligning the organizational structure with environmental preferences and for creating symbiotic interorganizational structures. How can IT help the organizations in responding to the challenges of an increasingly complex and uncertain environment? How can IT help the organizations achieve the .flexible. organization structure? These are the topics that remains to be a matter of question for many developing countries. This study will try to illuminate the aspects and the impact of Information Technology in managing organizational change and its implications for developing countries. 2. Aspects of Information Technology Information technology (IT) may be defined as the convergence of electronics, computing, and telecommunications. It has unleashed a tidal wave of technological innovation in the collecting, storing, processing, transmission, and presentation of information that has not only transformed the information technology sector itself into a highly dynamic and expanding field of activity – creating new markets and generating new investment, income, and jobs- but also provided other sectors with more rapid and efficient mechanisms for responding to shifts in demand patterns and changes in international comparative advantages, through more efficient production processes and new and improved products and services (e.g. replacing mechanical and electromechanical components, upgrading traditional products by creating new product functions, incorporating skills and functions into equipment, automating routine work, making technical, professional, or finan cial services more transportable). The development of IT is intimately associated with the overwhelming advances recently accomplished in microelectronics. Based on scientific and technological breakthroughs in transistors, semiconductors, and integrated circuits (â€Å"chips†), micro-electronics is affecting every other branch of the economy, in terms of both its present and future employment and skill requirements and its future market prospects. Its introduction has resulted in a drastic fall in costs as well as dramatically improved technical performance both within the electronics industry and outside it (Malone and Rockart, 1993). The continuous rise in the number of features on a single micro-electronic chip has permitted lower assembly costs for electronic equipment (each chip replacing many discrete components), faster switching speeds (thus faster and more powerful computers), and more reliable, smaller, and lighter equipment (fewer interconnections, less power and material). Similar dramatic falls in costs occurred in the transport and steel industries in the nineteenth century and in energy in the twentieth, associated with the emergence of the third and fourth Kondratiev cycles, respectively. The potential effects of microelectronics are thus very far-reaching, for its use in production saves on virtually all inputs, ranging from skilled and unskilled labor to energy, materials, andcapital. All sectors of the economy have been influenced by the development of IT applications: information technology opens up greater opportunities for the exploitation of economies of scale and scope, allows the more flexible production and use of labor and equipment, promotes the internationalization of production and markets, offers greater mobility and flexibility in capital and financial flows and services, and is frequently the precondition for the creation of innovative financial instruments. Information system developments are constantly being applied to increase the productivity, quality, and efficiency of finance, banking, business management, and public administration. In manufacturing, and to some extent in agriculture, many processes have been automated, some requiring highly flexible, self-regulating machines, or robots. The engineering industry has been transformed by computer-aided design and three-dimensional computerized screen displays. The pace of technological change in IT will most likely accelerate the already observable growth in the interdependence of international relations not just economic or financial, but also political and cultural. National economies have become more susceptible to the effects of policy decisions taken at the international level, and domestic economic measures are having increased impacts on economic policies of other countries. World markets for the consumption of similar goods are growing, and so are common lifestyles across national borders. The advance of telecommunications and computerization has recently enabled large companies to use information systems to transmit technical and economic information among numerous computer systems at different geographical locations, subjecting widely dispersed industrial plants to direct managerial control from a central location; this affects the international division of labor and production and international trade, changing the patterns of industrial ownership and control, altering the competitive standing of individual countries, and creating new trading partners. It is the integration of functions that confers on information technology its real economic and social significance. More than just a gradual and incremental technological evolution leading to improved ways of carrying out traditional manufacturing processes (i.e. simply the substitution of new technologies for existing systems and the rationalization of standard activities), IT offers the opportunity for completely new ways of working through systems integration. Rather than applying one item of new technology to each of the production functions now performed at distinct stages of the production process, i.e. design, production, marketing, and distribution (in what could be called â€Å"stand-alone† improvements or â€Å"island automation†), having evolved in to new technologies, i.e. Enterprise Resource Planning systems, IT offers the possibility of linking design to production (e.g. through programmable manufacturing, measuring, and testing equipment responding to the codification of design), planning and design to marketing and distribution (e.g. through a variety of computer aids and databases that sense and collect changing market trends), production to distribution (e.g. by automatically incorporating orders and commissions by customers and suppliers into the production process), etc. The complete integration of all these production subsystems in a synergistic ensemble is still more a long-term trend than a reality, but use of automated equipment to link together individual items of equipment belonging to hitherto discrete manufacturing operations has already made IT a strategic issue for industry. More technical advances are expected soon in the automation of telecommunications and the linkage of computers by data transmission that will enhance the possibilities of systems integration. Such â€Å"programmable automation,† or computer-integrated manufacturing (CIM), has the capability of integrating information processing with physical tasks performed by programmable machine tools or robots. CIM offers radical improvements in traditional problem areas confronting manufacturers, such as: – reduced lead time for existing and new products; – reduced inventories; – more accurate control over production and better quality production management information; – increased utilization of expensive equipment; – reduced overhead costs; – improved and consistent quality; – more accurate forecasting; – improved delivery performance (Miles et al., 1988). These features characterize information technology as a new technological system, in which far-reaching changes in the trajectories of electronic, computer, and telecommunication technologies converge and offer a range of new technological options to virtually all branches of the economy. Moreover, IT forms the basis for a reorganization of industrial society and the core of the emerging techno-economic paradigm. The reason for the pre-eminence of the new technological system clustered around information technology over the equally new technological systems clustered around new materials and biotechnology is the fact that information activities of one kind or another are a part of every activity within an industrial or commercial sector, as well as in our working and domestic lives. Almost all productive activities have high information intensity (some involve little else, such as banking or education). Further more, along with the premier of internet technology and e-business architectures; powerful concepts like inventory control, supply chain management, customer relationship/service management, and management resource planning through the internet under the name of Enterprise Resource Planning have enabled IT to be capable of offering â€Å"strategic† improvements in the productivity and competitiveness of virtually any socio-economic activity. Other than industrial or commercial sectors, information technology is also applicable in education sector and in public institutions. Thus, Information Technology is universally applicable. Probably only a fraction of the benefits derived from information technology-based innovations have so far been reaped and the rest remain to be acquired in the next decades. The shift towards systems integration to capitalize the full potential benefits of IT requires considerable adaptations, learning processes, and structural changes in exis ting socioeconomic institutions and organizational systems. The tradition in most current organizations is still to operate in a largely â€Å"disintegrated† fashion, reminiscent of the Ford-Taylorist management approaches that dominated the fourth Kondratiev cycle: high division of labor, increasing functional specialization/differentiation and de-skilling of many tasks, rigid manufacturing procedures and controls, long management hierarchies with bureaucratic decision-making procedures and a â€Å"mechanistic† approach to performance. Under these conditions, use of IT is restricted to piecemeal technology improvements. By contrast, information technology-based systems offer organizations the opportunity of functional integration, multi-skilled staff, rapid and flexible decision-making structures with greater delegation of responsibilities and greater autonomy of operating units, a more flexible and â€Å"organic† approach enabling a quick adjustment to changing environmental conditions. (Piore and Sabel, 1984.) But this means that information management skills require the ability to make choices about the optimal arrangements for particular situations: unlike earlier generations of technology, IT offers not a single â€Å"best† way of organization but a set of more or less appropriate alternative organizing, staffing, and managing options that may be adopted in different organizational contexts. There is no â€Å"determinism† in the way information technology influences the socioinstitutional framework. Therefore, organizational innovation is a crucial part of the requirement for firms to adapt to survive (Miles, 1988). Unfortunately, this is true for all the institutions as well. Further, it is even more dramatic for the organizations in developing countries because of not being able to properly adapt to this so-called .black-box. technology. No matter how frustrating it is interpreted for these countries, IT still has significant impact on their development. Although socio-economic structure of these countries resists organizational or institutional changes, the complex interrelations between these changes and information technologies have significant implications for the way IT does and will affect the societies and economies of developing countries. As a matter of fact, the negative and positive potential impacts of IT on these countries are a matter of great controversy among economists and politicians. The main short term issues usually discussed are the potential erosion of the comparative advantages of low labor costs, particularly in relation to assembly facilities, and the effects of automation, particularly on internal markets and international competitiveness. Implications of information technology for those countries hold great importance. 3. Implications for Developing Countries The first direct effect of the â€Å"micro-electronics revolution† was the location of production for export in third world countries. While production of mainframe computers continued to be located largely in industrialized countries, production of smaller computers and of microelectronic devices, more subject to price competition, was shifted to low-wage locations, mainly in East Asia, where countries presented low wage costs as well as political stability, a docile labor force, and government incentives. Location of production for local and regional consumption followed, but the countries concerned were mainly middle income: three quarters of US investment in third world micro-electronic industries was concentrated in 11 countries, namely the four Asian â€Å"dragons,† India, Thailand, Malaysia, the Philippines, Brazil, Mexico, and Colombia (Steward, 1991). Export-oriented investments in these countries were associated more with direct foreign investment from larger firms in industrialized countries than with firms producing for the local market; on the other hand, licensing was more associated with smaller firms (Tigre, 1995). The automation of production decreases the relative importance of labor-intensive manufacturing and cost of labor, thereby eroding the competitiveness of low labor costs. For instance, automation led to a sharp decrease in the difference between manufacturing costs of electronic devices between the United States and Hong Kong: in manual processes, manufacturing costs were three times higher in the United States, and the introduction of semi-automatic processes made the difference practically disappear (Sagasti, 1994). Equally, the expansion of automation in Japan has contributed to a reduction of Japanese investments in the Asia/Pacific region involving firms in electronics, assembly parts, and textiles (Sagasti, 1994). The trend to increasing systems optimization and integration is most likely to induce large producers in industrialized countries to bring back a significant share of their production located in developing countries (offshore production). This movement has been called â€Å"comparative advantage reversal.† As integration increases, with functions previously obtained by assembling pieces being incorporated in the electronic components, value-added is pushed out of assembly processes into the components themselves and upwards towards servicing. In addition, the growing technological complexity of electronic devices increases the value of the parts manufactured by firms located in industrialized countries The amount of value-added obtained in offshore assembly has thus been constantly decreasing (Sagasti,1994). Global factories constructed in locations of least cost, often at a considerable distance from final markets, were economically worthwhile because labor was one of the major determinants of costs. Technology and rapid responsiveness to volatile local markets are becoming more important components of competitiveness. The reduction of product cycles due to the growing resistance to obsolescence of programmable machines and equipment has led to a concentration of manufacturing investment in capital-intensive flexible manufacturing, further adding to the erosion of the comparative advantages of developing countries. The assembly of systems will probably continue in some developing countries that have adopted protective legislation for local production targeted at particular market segments (e.g. Brazil), although this is changing very rapidly (Steward, 1991). The types of equipment produced under these circumstances are used largely in internal markets and are hardly competitive on the international level; they tend to be far more expensive than comparable equipment available abroad, and often their installation and use are also more costly because of expensive auxiliary installations, under-use, and lack of management skills. Nevertheless, they may at least provide the country with the capacity to follow the development of information technologies more closely. In other countries, assembly of equipment is taking place from components bought practically off the shelf, but as the level of hardware integration and the amount of software incorporated into the chips (firmware) grow, valueadded will be taken away from the assembly process, reducing or eliminating its economic advantages. The introduction of microelectronics requires certain new skills of design, maintenance, and management, as well as complementary infrastructural facilities such as reliable telephone systems and power supplies. Deficiencies in these factors prevent the widespread adoption of information technology in developing countries (Munasinghe et al., 1985). The more advanced developing countries, with a wider basis of skills and infrastructure and a more flexible labor force, may be in a better position to adopt IT and to increase their productivity and their international competitiveness. But the less developed countries, with inadequate skills and infrastructure, low labor productivity, and lack of capital resources, will find it difficult to adopt the new technologies; they are likely to suffer a deterioration in international competitiveness vis-à  -vis both industrialized and the more advanced developing countries (Stewart et al., 1991). Quality, too, requires an adequate level of skills, infrastructure, and managerial know-how that is generally lacking in developing countries. This greatly reduces the synergies, number of options, faster responses, and more informed decisions that can be implemented in the firm by the optimization of the systems performance. In turn, the composition of the labor force existing within firms located in industrialized countries will further improve their systems performance and further reinforce the advantages derived from automation. The proportion of the labor force employed in production is constantly decreasing in the industrialized countries, implying that performances at the systems level and innovation, not manufacturing, are becoming the key to profit, growth, and survival (Sagasti, 1994). Like biotechnology, information technology is a proprietary technology, vital technical information regarding design engineering specification, process know-how, testing procedures, etc., being covered by patents or copyrights or closely held as trade secrets within various electronic firms from industrialized countries. Many companies in the software area do not patent or copyright their products because it entails disclosing valuable information, and firms are generally reluctant to license the more recent and advanced technologies. Therefore, technology transfer takes place mainly among established or important producers, hindering the access to developing countries. Moreover, the main issue facing developing countries is not so much the access to a particular technology but to the process of technological change, because of the dynamism of this process. Sagasti implies this issue in the book The Uncertain Guest: science, technology and development (1994) that recent trends in int er-firm relationships seem to indicate that this access takes place essentially through the participation in the equity of the company holding the technology.

Wednesday, August 28, 2019

Cloud Essay Example | Topics and Well Written Essays - 500 words - 1

Cloud - Essay Example Access rights given allow the client to run applications, save data, or compute virtually any task. It has been enabled by the ever improving computer processing capabilities while reducing cost on the other hand. The distinctive services provided by cloud computing are either; SaaS (software as a service), PaaS (platform as a service), or IaaS (infrastructure as a service) (Rodrigues, 2012). Saas’ functionality can be explained in a business perspective. Uses of software as a service, clients are availed with access to databases and application software. Cloud vendors manage the involved technicalities platform and infrastructure running the involved applications. On-demand software is the other term used to describe software as a service and is charged on the basis of pay per us. The vendors tag prices on their services based on a subscription fee per package. The subscription may be monthly or annual allowing the prices to be adjustable and scalable where users are removed or included at a certain point. Manipulation is not possible for the clients as the owner of the infrastructure manages applications. The cost of I.T infrastructure is cut from the clients end through the process of outsourcing software and hardware support and maintenance from the cloud computing vendor. The salvage cost is channeled to equally productive objectives. Updates are done without affecting the client or without the need of any installation. The main demerit is that the clients’ data is stored in these servers which risks unauthorized penetration that turns clients to increasingly embrace intelligent or third-party managing systems to attempt to secure their data. As for the pros of Amazon EC2, there is no vendor-locks system, which eases code transfer. It also allows for code writing in simpler languages such as MVC, C#, and Net above being backed by a strong support team. It allows its clients to scale single instances to several more giving full

Tuesday, August 27, 2019

Monetary economics Essay Example | Topics and Well Written Essays - 2250 words

Monetary economics - Essay Example flow of capital can be supported with the example of Argentina which has experienced the floating exchange rate in the economy and the volatility and the evolution of the exchange rate which was not affected severely due to the international crisis in spite of the rise or the increase in the exchange rate. The arguments in favour and against the topic can be highlighted with the help of the statement that emphasizes that floating exchange rate is effective in implementing the monetary policy and ineffective or inefficient in implementing the fiscal policy whereas in case of the fixed exchange rate it is effective in implementing the fiscal policy and it is unable or incapable for formulating the monetary policy. In order to derive at the conclusion in ascertaining whether the floating rate has been able to control the inflow and outflow of cash it is required to consider various factors which includes the inflation rate, the credibility of the policy makers, the flexibility in the labour market, the size and the openness in the economy, maintaining of capital mobility and the extent of financial development. The main aim or the objective of floating exchange rate in controlling the inflow and the outflow of capital is reducing the volatility in the exchange rate and also maintaining the monetary stability in the economy (Arnold, 2008). The floating exchange rate generally considers the economic and financial structure and policies in the economy and the intervention of the central bank in the foreign exchange market either dealing in the spot market or dealing in the forward market for developing the regulation and reserves of the capital inflow and capital outflow. The floating exchange rate focuses on increasing the capital inflow and mitigating the excessive capital outflow. The balance of payment is considered as an important instrument for controlling and dealing with the related inflow and outflow of capital in the economy. Balance of payment is

What is politics Essay Example | Topics and Well Written Essays - 500 words

What is politics - Essay Example The initial philosophy is easy for many people to agree that anguish and death have nothing to do with great things. The second philosophy can be illustrated with the example that Singer provides that if we were in a situation where we take a rail switch and divert a train thus saving a child’s life or act like Bob who decides to throw away the train switch to save his Bugatti. In a nut shell, Singer is trying to say that stopping something bad from taking place will at all times lead to destroying something material or spending cash on something meaningless.Depending on these two philosophies enables Singer come up with his conclusion at the end of his line of reasoning. Singer initially indicates that there are individuals in East Bengal who suffer and die from food deficiency and shelter which is trailed by his philosophy. When Singer mentions his 2 philosophies at first makes it easy to understand and in fact agree with his line of reasoning. However, his conclusion is act ually not convincing enough. Singer claims that it is undisputable that when money is sent to charity, life will be saved and people will be elevated from poverty. However, it is also evident that no matter how much we try to help the needy by donating some money, the global poverty will not end. This is, even if we send a lot of cash to poor countries, we will end up doing this for the rest of our lives. In due course, with never ending donations and charity work, it is evident that this will lead to immense depression and untold suffering.

Monday, August 26, 2019

Compare and contrast modern conservatism and modern liberalism Essay

Compare and contrast modern conservatism and modern liberalism - Essay Example The paper tells that one of the major requisites of the comparative analysis of modern conservatism and modern liberalism is a thorough understanding of the underlying principles of both these ideologies. In an attempt to classify the major arguments of modern conservatism, one may recognize that the body of opinion called conservatism does not have a clear-cut dogma or ideology. Rather than a system of ideological dogmata, it is mainly a body of sentiments which upholds the attitude we call conservatism. As Russell Kirk remarks, â€Å"Perhaps it would be well, most of the time, to use this word â€Å"conservative† as an adjective chiefly. For there exists no Model Conservative, and conservatism is the negation of ideology: it is a state of mind, a type of character, a way of looking at the civil social order.† However, a clear understanding of the major tenets of modern conservatism suggests that it is an ideology which shows respect for the institutions of law, Consti tution and the rights of the people. Although it has changed many of the traits of true conservatism, modern conservatism has played a crucial role in the equality, liberty, justice, and education of the people in the modern states. This fact is clear from Russell Kirk discussion of the ten principles that have loomed large during the two centuries of modern conservative thought, and he specifies that the conservative understanding of justice, education, etc have similar significance in the modern world. ... Rather than a system of ideological dogmata, it is mainly a body of sentiments which upholds the attitude we call conservatism. As Russell Kirk remarks, â€Å"Perhaps it would be well, most of the time, to use this word â€Å"conservative† as an adjective chiefly. For there exists no Model Conservative, and conservatism is the negation of ideology: it is a state of mind, a type of character, a way of looking at the civil social order.† (Guide, pg. 40) However, a clear understanding of the major tenets of modern conservatism suggests that it is an ideology which shows respect for the institutions of law, Constitution and the rights of the people. Although it has changed many of the traits of true conservatism, modern conservatism has played a crucial role in the equality, liberty, justice, and education of the people in the modern states. This fact is clear from Russell Kirk discussion of the ten principles that have loomed large during the two centuries of modern conser vative thought, and he specifies that the conservative understanding of justice, education, etc have similar significance in the modern world. In his comparison of the ideologies of modern conservatism and modern liberalism Russell Kirk considers that the former has more relevance than the latter. According to him, the great line of demarcation in modern politics is between the ultimate principles of these ideologies: â€Å"on one side of that line are all those men and women who fancy that the temporal order is the only order, and that material needs are their only needs, and that they may do as they like with the human patrimony. On the other side of that line are all those people who recognize an enduring moral order in the universe, a constant human nature, and

Sunday, August 25, 2019

Geopolits and Science Fiction Assignment Example | Topics and Well Written Essays - 500 words

Geopolits and Science Fiction - Assignment Example Nevertheless, it is worth noting that the concept of Manifest Destiny was rather a mere component, which only captured popular imagination of young Americans. Over the recent year, the concept has been revived among the American population (Ekeh 2004, p.67-69). Even so, it has taken a new dimension in movies. In this regard, a variety of science fiction movies are attributable to the creation of a new wave of Manifest Destiny especially in the Young Americans. Star Trek for instance, is an American science fiction movie producer. In 2009, they produced a movie which revolved around James Kirk, Starship Kelvin and their expedition. This occurs in the future; in 2233 where the USS Kelvin ship investigating a lightning storm in the space was attacked by the Navada and a Romulan ship that emerges from the storm. On Vulcan, Spock (who is believed to be half-human), joins Starfleet Academy. Meanwhile, on Earth, Kirk becomes reckless and intelligent and is recommended to join Starfleet. While in the academy, the Cadets are mobilized to crew ships waiting in the orbit. Their ship known as the Enterprise arrives at Vulcan and is attacked by Navada which led to their surrender. Consequently, a large damage as well as mass killings of its inhabitants occurred. Spock manages to rescue his father and the high council of Vulcan. However, his mother does not survive the attack. Later on, Kirk, in conjunction with Sarek and Spoc plot a secret attack on Navada. They successfully attack and crash down the crew on Navada thus conquering them. Back on earth, both Kirk and Captain Pike were promoted to higher ranks. Spock Prime selected a planet for the surviving Vulcans to Colonize. It is therefore palpable that the events in this movie could inculcate some sense of the Manifest Dream in most of its viewers. In this regard, ultimate victory by Kirk, Sarek and Spoc could be interpreted to depict the superiority that America has towards other

Saturday, August 24, 2019

Unofficial support for LOTEs Essay Example | Topics and Well Written Essays - 250 words

Unofficial support for LOTEs - Essay Example For example, during marriage ceremonies, they use these languages because the main marriage makers in the city have memorized the languages. Different churches use these languages in their masses with an example being the Catholic Church since they conduct their services in Spanish, Italian, French, Polish, and Haitian. Television channels and different newspapers publish their news in LOTEs, in mayoral campaigns, the New Yorkers apply LOTEs. Finally, they allow interpretation of government proceedings for LOTEs to enhance understanding among the population (Mair 166). In NYC, dissimilar departments value and encourage the use of LOTEs. For example, both the domestic and international business sectors in the City have implemented a policy to promote LOTEs, as they believe it attracts many individuals involved in business. This method is applicable with the AT & Tlanguage line, which is a full time free telephone service interpreting more than 140 LOTEs to NYC banks, utilities, hotels and businesses (Mair 167) The ethno-linguistic enclaves in NYC support language maintenance through different manners. For example, they speak LOTEs in their homes, in business activities, churches, during marriage ceremonies and government proceedings (Mair

Friday, August 23, 2019

Haqqani Network Research Paper Example | Topics and Well Written Essays - 2000 words

Haqqani Network - Research Paper Example The Haqqani Network operates under the supervision of Maulvi Jalaluddin Haqqani, a highly dangerous fighter and anti-soviet resistance commander, and his son Sirajudin Haqqani, who now handles the important affairs of this enemy network. This group has been existing in Pakistan since Soviet era and is spread across Kabul (Clarke, R, 2011, p.105). The Haqqani Network is claimed to have been in alliance with many intelligence groups such as Central Intelligence Agency (CIA), Osama Bin Laden and Saudi Arabia’s Spy Service (Takashi, 2012, para.2). The Haqqani Network runs under the leadership of Haqqani family. Jalaluddin Haqqani and his sons now lead this insurgent group. Acording to Mazzetti, Shane & Rubin (2011) the Haqqani family is the Sopranos of the Afghanistan war, a family that made out its earnings and rose from the bottom through exercise of all kinds of illegal activities like trafficking, kidnapping, extortion, and so forth (para. 1). That being said, they are also reported to acquire protection money from the American reconstruction funding that was particularly aimed at construction of schools and roads in Afghanistan. With increasing network horizon and an enormously vast web of connections, this group has many top-tier leaders that operate different parts of the group secretly. That being said, the pioneer of the group, Jalaluddin Haqqani is considered a chief figure in the leadership of this network. Jalaluddin acted as a mujahedin leader in his fight against Soviet forces where he received significant help from the ISI and CIA (Bowman, 2009, p.26). The leader himself focused more upon his hometown Zadran, which is a central territory that connects nine tribally linked districts at the border of Paktika, Khost and Paktia province. Since the leader Jalaluddin has turned old and weak due to illnesses, most of the network’s responsibilities and activities have been transferred upon

Thursday, August 22, 2019

Threat of Information Technology to Law Enforcement Essay Example for Free

Threat of Information Technology to Law Enforcement Essay Information technology can be defined as â€Å"Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information. The term information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources†. (Section 508 Definitions) In present days, the use of information technology has become a life blood for every organization. In this regard, the internet has greatly effect on the world of business transactions, and the fast price declines of telecommunications bandwidth and computing power are having a dramatic impact on the financial world. All banks and financial institutions have connected their network by using IT and hence made it possible that user can withdraw and send payment from one place to another in no time. It becomes very easy to make an online debit or credit card payment. Electronic commerce has been rapidly increasing not only in B2B business to business transactions but also in B2C business to consumer transactions. Simultaneously, the fast expansion of electronic-commerce has brought about important changes in the territory of settlement, which is inevitably incidental to transactions. Paper-based payment by check, which is a normally conventional method of settlement, has been used in fewer cases due to a altering connection between sales transactions and settlement with the development of IT and the expansion of Internet-based financial transactions. However, some new ideas have emerged in terms of legal constitutions, legal theories, legal concepts, and concerning conventional settlement. Use of IT unable the development of procedures financial markets, and instruments that economist in the past could only theorize about. Financial transactions can be settled in real time although the contracting parties may be hundreds of miles apart. As technology has progressed, Electronic-money is being introduced as the newest method of exchanging value. Obviously, the electronic exchange of money is by no means a new invention. Financial institutions and Banks have been using computers to deal with one another for quite some time. Alone in the United States, in terms of the volume of dollars exchanged, the computer-based Fed-wire and Clearing House Inter-bank Payments System (or CHIPS) together account for 90 percent of all transactions. Besides, 90 percent of individual transactions are still made by check and cash. With the huge advancement in information technology several payments and collections methods have been developed and used successfully. â€Å"The rise of the Internet and the speed of financial transactions facilitated by computers have expanded money laundering opportunities and activities in the latter half of the 1990s. There are increasing numbers of Webs sites that solicit money for transfer offshore, the rise of internet gambling and of virtual banking have made it possible to launder money without any infrastructure to run or regulate international banking operations. Instead, the rise of information technology and the growth of uncrackable encryption have provided the possibility of laundering money with greater facility and with almost perfect anonymity. All that is needed is a computer†. (Shelley, n.p.)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The rise of the new IT has helped an incredible communications revolution, also it has led to the growth of money laundering in some of the most remote areas in the world. Some important locations include Nauru, Vanuatu and the Marshall Islands through whose banks millions have been laundered in the last couple of decades. â€Å"Facilitating the rise of virtual banking in offshore locations has been the willingness of major banks to receive funds that have been routed through these locales. While well-written software could screen these transactions and prevent the absorption of these funds into mainstream banking centers, this has not occurred†. (Shelley, n.p.) What is Money Laundering?   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   â€Å"Electronic Money Laundering covers the ABCs of money laundering and its connection to drug trafficking, terrorism and the global underground economy.   It traces the relevant statutory history from the Bank Secrecy Act of 1970 onward†. (Farber, n.p.) How Money is Laundered Typically, by moving it from one state to another electronically or physically and obscuring its origin through complicated financial transactions. Financial Action Task Force (FATF), calculates of the amount of money laundered yearly worldwide from the illicit drug trade alone range between $US 300 billion and $US 500 billion. Usually money laundering has three stages: placement, where illicit cash is converted into monetary instruments or deposited into financial system accounts; layering, where the funds are moved to other financial Institutions; and integration, where these funds are used to acquire assets or fund further activities. The credit card industry includes: (1)   â€Å"Credit card associations (associations), such as VISA and MasterCard, which license their member banks to issue bankcards, or authorize merchants to accept those cards, or both; (2)   Issuing banks, which solicit potential customers and issue the credit cards; acquiring banks, which process transactions for merchants that accept credit cards; and (3)   third-party processors, which contract with issuing or acquiring banks to provide transaction processing and other credit card–related services for the banks†.( Money Laundering Extent of Money Laundering through Credit Cards is Unknown, pg, 1, 2) According to Assistant Director James E. Finch, of the FBI’s Cyber Division â€Å"The advent of new electronic currency systems increases the risk that criminals, and possibly terrorists, will exploit these systems to launder money and transfer funds globally to avoid law enforcement scrutiny and circumvent banking regulations and reporting.†   (Digital Currency Business E-Gold) Representatives of regulatory bodies, law enforcement agencies and gaming and credit card industries expressed mixed views concerning the vulnerability of Internet gambling to money laundering. According to law enforcement officials gambling on internet could be used as a primary motive for laundering criminal proceeds at the comparatively obscure layering stage of money laundering. Moreover, officials admitted the lack of adjudicated cases involving money laundering via internet gambling sites but referred what they believe to be leading factors, including the deficiency of any industry regulations or oversight. Regulatory gaming and banking officials did not consider internet gambling as being especially susceptible to money laundering. Particularly, when credit cards, which make a transaction record and are subject to comparatively low transaction limits, are employed for payment. Similarly, officials of gaming industry and credit card did not believe Internet gambling posed any peculiar risks in terms of money laundering. According to gaming industry officials Internet gambling was any more or less vulnerable to money laundering than other types of E-commerce, in their view, the financial industry, which is primary responsible for the payments system, is suited to monitoring for doubtful activity in the area than the gaming industry itself. Money Laundering Methods Electronic Funds Transfer Also known as wire transfer or telegraphic transfer, this method of money laundering consists of sending funds electronically from one nation to another in order to avoid the need to physically transport the currency. Postal Money Orders The purchase of money orders for cash provides opportunities to money launderers to send these financial instruments out of the state for deposit into overseas or offshore account. Credit Cards Overpaying credit cards and keeping a high balance in credit cards gives money launderers right of entry to these funds to purchase high value items or to change the credit balance into checks. Casinos In this method cash may be taken to a casino to buy chips which can then be redeemed for a casino check. Refining In this method the money launderer exchange small denomination bills for larger ones and can be carried out by a person who change the bills at a number of different banks in order not to raise suspicion. Structuring Smurfing Smurfing is perhaps the most used money laundering method. In this method many peoples who deposit cash into bank accounts or purchase bank drafts in amounts under $10,000 value to avoid the reporting threshold. Currency Exchanges and Money Services   Currency exchanges and Money services render a service that enables peoples to exchange overseas currency that can then be transported out of the city or country. Money can also be wired to accounts in other states. Other services provided by these businesses include the traveler’s checks, sale of money orders, and cashiers cheques. Asset Purchases with Bulk Cash In method of money laundering a money launderer may but high value items like cars, boats or other luxury items like electronics and jewelry. Money launderers will use these items but will distance themselves by having them registered or bought in a company’s name. Legitimate Business Individuals or criminal groups may invest or take over in businesses that usually handle a high cash transaction volume in order to mix the illicit moves with those of the legitimate business. Criminals may also buy businesses that receive cash payments, including bars; currency exchange shops restaurants, night clubs, and vending machine corporations.  Money launderer will then insert criminal funds as false income mixed with revenue that would not otherwise be adequate to maintain a legitimate business. Value Tampering â€Å"Money launderers may look for property owners who agree to sell their property, on paper, at a price below its actual value and then accept the difference of the purchase price under the table. In this way, the launderer can, for example, purchase a $2 million dollar property for $1 million, while secretly passing the balance to the seller. After holding the property for a period of time, the launderer then sells it for its true value of $2 million†. (Money Laundering A Preventive Guide) Loan Back In this money laundering method a criminal furnishes an associate with a sum of illegitimate money and the associate makes the paperwork for mortgage or a loan back to the criminal for the same amount, including all of the essential documentation.  This makes a false impression that the criminals funds are legitimate about our national security†. (Electronic Money Laundering An Environmental Scan) Effects of Money Laundering â€Å"Money laundering has far-reaching consequences: It makes crime pay; it allows drug traffickers, smugglers and other criminals to expand their operations. This drives up the cost of law enforcement and health care (e.g., treatment of drug addictions). It has the potential to undermine the financial community because of the sheer magnitude of the sums involved. The potential for corruption increases with the vast amounts of illegally obtained money in circulation. Laundering diminishes government tax revenue and therefore indirectly harms honest taxpayers and reduces legitimate job opportunities. Perceived ease of entry to our country attracts an undesirable element across our borders, degrading our quality of life and raising concerns â€Å"The key to control of international crime may depend on cutting off the flow of illegal profits to criminal organizations. It is estimated that $300 billion of dirty money may be laundered each year, its origin and ownership obscured as it passes through financial institutions and across national boundaries in an effort to hide and protect it from law enforcement authorities. Criminal organizations, like legitimate businesses, enjoy a swift and nearly risk free conduit for moving money between countries wire transfer systems. Illicit wire transfers are easily hidden among the 700,000 mostly legitimate wire transfers that occur daily in the United States, moving well over $2 trillion†. (Information Technologies for the Control of Money Laundering) The OTA was asked by the Permanent Subcommittee on Investigations of the Senate Committee on Governmental Affairs to evaluate the proposed use of techniques derived from AI research to monitor wire transfer traffic and realize doubtful transfers. Furthermore, fully automated computer screening of wire transfers was found to be almost impossible for some technical reasons. Nevertheless, OTA analysts developed and assessed a number of alternative configurations of technology that, combined with obvious legal and institutional innovations, could greatly improve the capability of law enforcement agencies to discover and prosecute money launders seeking to exploit United States. In addition, wire transfer systems and financial institutions all of these suggested configurations entail some social costs and economic, including some possible diminution of financial privacy, strategies are proposed for minimizing these costs while improving the possible usefulness of IT in control of money laundering.          Future of Money Laundering Cyber payments â€Å"The term cyber payments is just one of many used to describe systems which facilitate the transfer of financial value (i.e., digital currency, e-money). In fact, these developments may alter the means by which all types of financial transactions are conducted and financial payment systems are operated. Such transactions may occur via the Internet or through the use of smart cards which unlike debit or credit cards actually contain a microchip, which stores value on the card. Some Cyber payments systems use both. E-Cash There are several systems of e-money. There are stored value cards such as MONDEX which is a rechargeable card (charged by putting it in a special slot in an ATM), and is both an access device and a self contained store of value. Further to this is Internet-based payment systems that use the Internet’s telecommunications capability to facilitate financial transactions with other users. The personal computer which serves as the user’s interface with the Internet payment system can also store value and is therefore, also an access device and self contained store of value. Morris-Cotterill (How Not To Be a Money Launderer, 1996) describes the Internet as being one of the greatest opportunities for laundering because of the total lack of traceable transactions, the use of encryption software will further make transactions totally secure. With the Internet, being connected to anywhere in the world is no problem and this will allow cross border movements of capital to take place. It remains to be seen whether money laundering managers take advantage of these new technologies to circumvent any legislation on other traditional laundering techniques (smurfing, wire transfers, bank drafts for example). It is however, a worry to the authorities†. (International Money Laundering Information Bureau) Conclusion Money laundering may have shocking social consequences. Laundered funds furnish financial support for arms dealers, drug traffickers and other criminals to operate and expand their operations. Investigations disclose that criminals manipulate financial systems in Canada and other countries to support a broad range of illicit activities. For instance, drug trafficking alone generates millions of dollars in illicit funds for criminal organizations annually. Businesses backed by the proceeds from crime produce unfair competition and can insolvent legitimate competition in the market. Works Cited Digital Currency Business E-Gold Indicted for Money Laundering and Illegal Money http://www.usdoj.gov/opa/pr/2007/April/07_crm_301.html Accessed, June 14, 2007 Electronic Money Laundering An Environmental Scan http://ww2.ps-sp.gc.ca/publications/crim_jus/money_laundering_e.asp Accessed, June 14, 2007 Farber Dave, (08 Dec 1995), IP: Information Technology for Control of Money Laundering Information Technologies for the Control of Money Laundering http://stinet.dtic.mil/oai/oai?verb=getRecordmetadataPrefix=htmlidentifier=ADA336940 Accessed, June 14, 2007 International Money Laundering Information Bureau http://www.imlib.org/page13_future.html Accessed, June 14, 2007 Money Laundering A Preventive Guide http://www.rcmp-grc.gc.ca/poc/launder_e.htm Accessed, June 14, 2007 Money Laundering Extent of Money Laundering through Credit Cards is Unknown (July, 2002 ) Report to the Chairman, Permanent Subcommittee on Investigations, Committee on Governmental Affairs, U.S. Senate, (page 1,2) Section 508 Definitions http://www.grc.nasa.gov/WWW/Purchase/Section_508_def.htm Accessed, June 14, 2007 Shelley Louise (n.d.), Money Laundering, Organized Crime and Corruption