Energy Generation

 

Name:

Institution:

Lecturer:

Course:

Date:

Energy Generation

There are various types of energy produced in Saudi Arabia and Japan. The types of energy produced in these countries include solar energy, electricity generation, geothermal power generation, natural gas and other renewable energy production. Japan is ranked as the third countries across the globe that is leading in electricity production. Electricity generation is the method of producing electric energy using other energy forms. Electricity is used for various purposes such as lubricating oil, transportation sector, residential and in other numerous uses. Another form of energy produces is natural gas in Saudi Arabia. It is the fourth largest nation leading in natural gas production as a source of energy across the globe. Saudi Arabia has many reserves for natural gas, and it is the largest producer and exporter of petroleum oil. The natural gas is used for various activities, and the country is the largest oil consumer especially in the Middle East due to economic and industrial development.

Japan and Saudi Arabia have high generating capability and more energy consumption rate. For instance, in 2008, Japan generated 1.025* 1012 KWh in the same year (Stiebler, 2008). However, the generation capability has increased tremendously in the year 2010, and the analysts projected that, by the year 2015, Japan would be the leading in electricity production globally. Electricity in Japan is somewhat expensive when compared to other nations. The consumption rate is high especially in industrial use because Japan has many industries thus high consumption rate in industries than in any other sectors. It is approximated that the average per capita of electricity consumption is 8,458 Kilowatt per person. On the other hand, Saudi Arabia has high generation capability of natural gas. They produce over 240 trillion cubic feet of natural gas. Saudi Arabia has many oil fields, Ghawar being the largest oil field across the globe. They are the primary consumers of natural gas, and the remaining is exported to different countries across the globe. The natural gas is used in industrial sectors, commercial and for domestic purposes. The government of Saudi Arabia is now trying to open more fields as well introduces better strategies in natural gas production in order to increase the production capacity. Moreover, the Organization of Petroleum Exporting Countries (OPEC), which is one of the intergovernmental organizations, has helped the Arabians in price control and modernizing market for the oil production.

There are diverse methods employed in transforming energy forms into electrical energy in Japan. One of the methods is electromagnetic induction. This is whereby an electrical generator or alternator alters energy in motion into electricity. This method of generating electricity energy is based on the law of Michael Faraday. The method simply experimented through rotating a magnet within the closed loops of a conducting material (Stiebler, 2008). Another method used is the thermoelectric effect, which involves direct temperature conversion to electricity. Additionally, electrochemistry method is used in generating electricity in Japan. This method involves direct conversion of electricity from chemical energy. The last method used is static electricity, which involves physical separation of energy as well as charge transportation such as triboelectric effect thus producing electric energy. Static electricity method is still used as a modern device especially the MHD generators. The charge transporters are transported physically to a position of electric potential.

The methods employed in natural gas production in Saudi Arabia are diverse. One of the methods of natural gas production is through mining. This is whereby sensors and mining apparatus are used especially the Davy lamp is used in order to avoid ignition sources. A mine gas treating method is used in large-scale industries in gas production process to remove components of acidic gaseous. Hydrogen sulfide is removed from the natural gas because it is acidic. Another method used in extraction using hydraulic fracturing. This process involves chemical combination varying from toxic to harmless in order to force the gas onto the surface from the reservoirs (Green, 2003). However, due to environmental health and safety awareness, this method has been banned in some countries because of the impact it causes to the environment. This is because gas extraction leads to pressure decrease in the reservoirs contributing to subsiding or sinking of the ground.

Energy generation contributes to varied environmental consequences depending on the method used in extracting or generating energy. Pollutants and greenhouse emissions from fossil fuels used in generating electricity and extraction method of natural gas contributes to environmental problems. Emission transportation during electricity generation contributes to increased carbon dioxide in the environment. Extraction method used during the mining process of natural gas may lead to sinking of the ground. Thus, the governments in the two countries have raised environmental awareness. This has been done through ensuring that the environmental laws and regulations are properly followed during energy generation process. Moreover, environmental education is carried out by environmental bodies such as National Environmental Management Authority (NEMA), Environmental Protection Agencies (EPA) and United Nations Environment Programme (UNEP). These environmental bodies try to raise environmental awareness in Japan and Saudi Arabia through creating laws as well as educating industries generating energy to protect and conserve the biodiversity.

In conclusion, some of the recommendations provided about energy generation and use in Japan and Saudi Arabia are varied. First, it is recommendable that clear energy generation method should be followed in order to increase energy production while maintaining sustainability in the environment. Additionally, there should be clear methods that should be followed in energy production in order to increase the output. For instance, the government in Saudi Arabia has banned extraction method of natural gas because it contributes to environmental consequences. The Saudi Arabia government has a strategic vision of increasing production capacity. This is through opening up more oil fields and conducting extra drilling at the existing oil fields. Lastly, some electricity generation in Japan such as the Tokyo Electric Power Company (TEPC), which is the world’s largest electricity production have tried to increase its production capacity. This has been made possible through employing vital methods of power production that leads to increased production and power supply across the globe.

Mind Map

 

 

References

Green, M. A. (2003). Third generation photovoltaics: Advanced solar energy conversion. Berlin:

Springer.

Stiebler, M. (2008). Wind energy systems for electric power generation. Berlin: Springer.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Sports law stories

Name:

Course:

Instructor:

Date:

Sports law stories

Story 1

The story is about the civil case brought against the Syracuse assistant basketball coach Bernie Fine by three victims who claim that he molested them. The first victim, Tomaselli, claims that assistant coach Bernie Fine molested him when he was thirteen years old. The victim is being represented by Jeff Anderson a famous lawyer who also represented the victims of the catholic sexual abuse scandals. The assistant coach was fired when the allegations of sexual abuse emerged. On his part, the Syracuse assistant coach Bernie Fine maintains that he is innocent.

Two more victims have emerged who claim that they were also sexually abused by Bernie Fine. These victims are former Syracuse ball boys Mike Lang and Bobby Davis. The two victims have filed defamation charges on the SyracuseUniversity and the men’s basketball coach Jim Boeheim. They claim that Boeheim called them liars who were out to make money by accusing former assistant coach Bernie Fine of molesting them (The associated press, 2012). The university’s lawyers together with the coach’s lawyers have filed for a motion to relocate the case that is closely related to the former assistant coach Fine to Onondaga from New York since that is where the proceedings of the case are being held.

The fourth victim Floyd VanHooser admitted to lying about assistant coach Bernie Fine molesting him. This revelation has resulted to the first victim Tomaselli admitting that he too lied and made up emails to increase his evidence to the story. He fabricated an email, which he sent to the Daily Orange, and the post-standard that accused the Syracuse police of insinuating that his father Fred Tomaselli was a troubled man full of lies. This was because his father Fred Tomaselli had declared in public that Zach was a liar. In his defense, Zach said that he did this to let people know about his side of the story, which he could not since the police were claiming that his dad was lying. In addition, he fabricated an email to prove that he had attended a game at Pittsburgh where the alleged sexual abuse by Fine took place (Thamel, 2012).

The district attorney of Onondaga, William Fitzpatrick who is no longer part of the case, pointed a finger at the chief of Syracuse police department of not carrying out a thorough investigation on the claims made by Tomaselli and VanHooser. William added that the truth to the claims made by Tomaselli and VanHooser were easy to detect and that he had a file that indicated that VanHooser was lying. On the other hand, the verification of where Tomaselli was on that particular day he alleges that Fine molested him was carried out by the district attorneys office within a few hours. The office verified that he was at school on that day. William claimed that the police carried out a substandard investigation in order to discredit the district attorneys office that has resulted to a messy situation.

The judgment has not been issued yet although the victim, Tomaselli, through his lawyer Jeff Anderson, has dropped, the civil charges against the former Syracuse assistant coach Bernie Fine, though he maintains that Fine molested him. Tomaselli dropped the charges due to the damage caused to his credibility after all the lies he told. In addition, his lawyer Jeff Anderson has stopped representing him.

 

 

Story 2

The story is about the civil lawsuits facing Jerry Sandusky, PennState and the Second Mile Charity from his alleged sexual abuse victims. This case in which, Jerry Sandusky a former assistant coach at the state college is facing forty counts of charges from victims that he sexually abused and raped is still going on. One victim who remains anonymous filed a civil charge against Sandusky, the PennState and the Second Mile charity that Sandusky founded for negligence and allowing the sexual abuse perpetrated against eight boys over a span of fifteen years by Sandusky to go on. The lawyers of the victim claim that these cases were institutional since the two closely-knit institutions had allowed Sandusky to get away with his molestation. The abuses took place due to the association Sandusky had with the Penn state and the second mile charity where he met these boys. The suit was filed by renowned lawyer Jeff Anderson who advocates for sexually abused children victims and Marci Hamilton who is a professor at the Cardozo law school.

Sandusky is said to have predatory behavior that include being a kind mentor who is loved by many but has uncontrollable sexual instincts. The plaintiff, who is twenty-nine years of age, first came to know Sandusky when he was ten years old back in nineteen ninety two. The plaintiff alleges that Sandusky abused him more than one hundred times between nineteen ninety-two and nineteen ninety-six. The victim who was too young then, would not have given his consent hence Sandusky abused him against his wishes and caused him great harm. Furthermore, Sandusky threatened him that no one would believe him when he reported the abuses and further threatened him that if he told any one something would happen to his family.

The plaintiff released a statement that entailed details of where the abuses took place and the reasons why he was doing this. He stated that he wanted to ensure that other children do not go through what he went through and to make sure that institutions like PennState do not get away with negligence. The abuses had taken places within and outside Pennsylvania, in the football, coaches’ locker room in Penn state, at Sandusky’s home, within PhiladelphiaCounty and during out of state Penn state bowl games (Weiss, Thompson & Red, 2011). The plaintiff also encouraged other victims of abuse by Sandusky to come forward. These allegations have resulted to the football coach Joe Paterno being fired, especially after brushing aside allegations made against Sandusky in two thousand and two that he had attacked a ten-year-old boy at the football facility showers.

The case has caused major furor with claims that some officials of the university will be charged in civil lawsuits along side Sandusky once the criminal charges are complete. So far, the university’s president Graham Spinner was fired, and two former administrators of the university are facing perjury charges in connection with the case. The lawyers of the victims believe that they have a strong civil case against Penn state since there were suspicions of former defensive coordinator Sandusky yet they did nothing about the suspicions (Pennington, 2011). The lawyers indicate that there are signs of a cover up since the university president supported the two principals who are facing perjury the day they were arrested.

The judgment has not been passed yet since the case is ongoing but the lawyers have a strong case, which will be boosted further if more victims of the abuse come forward, and are willing to testify. In addition, the fact that Penn state is a state sponsored institution, which means that it will not be granted the immunity defense.

 

Story 3

This is the story involving the criminal case brought against Marion Jones for making false statements in federal criminal investigation on two different accounts. The first case took place in two thousand and two concerning BALCO. The investigation conducted was to establish the distribution of anabolic steroids and other drugs that enhanced performance of athletes on the field. The investigation initially was to investigate BALCO, which is a corporation that performs blood testing and other functions when the investigators stumbled on evidence that linked Trevor Graham with distribution of performance enhancing drugs. Graham coached professional field and Olympic track athletes among them Jones, whom he had coached for about six years.

The search intensified and sought to find out if some witnesses had given false statements to the federal agents. This led to a search warrant being issued on the premises of BALCO. Upon a through search, evidence-linking Jones with BALCO was uncovered at the premises. This evidence included receipts that showed drugs provided to Jones by her coach Graham from BALCO. The internal revenue service-criminal division sent out an officer in the company of another government officer to interview Jones. Jones had a letter agreement with the northern district of California that anything she said during the interrogation would not be used against her though she was not given immunity from prosecution if she lied during the interview (PR newswire, 2008). However, during the interrogation Jones lied in her statement that she had never seen or taken the performance enhancement drug called Clear. Jones said that Graham had never given her the drug nor had she used any drug to enhance her performance. In 2008, she confessed to having given false statements since she had taken Clear for one year before the 2000 Olympic Games. However, she said that at the time she did not know she was taking a performance enhancement drug but only came to learn about it in 2003 when she was interviewed by the federal agents, yet she gave false information.

The second case in which Jones gave false statements involved money laundering scheme which was done through depositions of altered and fake checks to numerous banks owned by the parties involved. The people involved included Jones former sports agent Charles Wells, Montgomery who was Jones partner at the time among others. The conspirators deposited a check of $850,000 in to an account of Nathaniel Alexander an associate of Riddick’s on April 2005. The aim was to distribute the money from the check, and they issued Jones with a check worth $25,000 that she deposited into her account. In addition, Alexander deposited a fake check into an account controlled by both Jones and Montgomery on May 2005 worth $200,000. Montgomery had executed documents to add Jones as a signatory to the account a few days before the deposit. When Jones was interrogated in 2006, she lied that she did not know that Alexander had given her a check that she endorsed. She also lied about having any knowledge concerning Montgomery receiving a large check in 2004 or 2005 even the $200,000 fake check. In addition, she lied that she had no idea that Montgomery was involved in a fake check fraud scheme. In 2008, she admitted to making those false statements knowingly and willingly.

The judgment she was given included a sentence of six months in prison, two years of probation and community service for giving false statements to the federal prosecutors conducting an investigation on performance-enhancing substances (CNN Justice, 2008). In addition, she was striped off all her Olympic medals since she admitted to using steroids and lying about it to a federal agent. She served her sentence in a Federal medical center, Car Swell prison facility in Fort Worth between March 7 and September 5 2008.

 

Story 4

            The story involves the criminal charges facing two players in English football due to racism that has for sometime dominated the English football scene. The first player is John Terry captain of England’s national soccer team and Chelsea club. Terry faces criminal charges over allegations that he made racial slur towards Anton Ferdinand during match held in October 2011. Terry denies the charges and says that he does not discriminate against anyone and is a friend to all people of different races and religions. He is charged with violating Britain’s crime and disorder act of 1998 that focuses on antisocial behaviors. He is set for a hearing on February 1 2012 and if found guilty will face a maximum fine of $4,000. In addition, if convicted he will lose his captaincy of the Chelsea club and the national team together with his reputation and the capability to get endorsement money (Longman, 2011).

Terry was charged by the crown prosecution service that is responsible for charging people with criminal charges. This comes due to the widespread racism problem in the European soccer that has persisted over the past with the football association sweeping it under the carpet. The antiracism officials were happy with the progress since they had been advocating for less racial smears in the stadiums between the players on the field and the fans. However, they were alarmed by the international soccer comments about racism in the field when the FIFA president Sepp Blatter, under played the extent of racism by suggesting that the matter should be solved through a post game handshake. This is the first case ever where police were called in to investigate a racism case. The antidiscrimination group is hoping that the case will be a lesson to the rest and will be treated with professionalism to send out a clear message to the other players.

The other case of racism in the pitch involves Luis Suarez a player in the Liverpool football club and an Uruguayan citizen, who is alleged to have racially insulted Manchester united Patrice Evra during a league game on October 15 2011. Suarez is said to have called Patrice ‘Negro’ seven times during the confrontation in the game. Suarez has since been banned from eight matches and fined $63,000 in December 2011. However, his team Liverpool has supported Suarez in a very vigorous campaign that included wearing t-shirts bearing his face on them during training. The club is considering on whether to appeal against the sentence or not. The Liverpool club is also questioning the reliability of Evra’s testimony despite the fact that he was found to be a credible witness by the judgment committee and Suarez was found to be a non-credible witness.

The reputation of Liverpool club is being harmed due to their unwavering support and campaign for Suarez despite being found guilty of racism in the field. The antiracial activist said that the football association had taken time to come up with a good implementation of football rules that go hand in hand with those of the British justice. The activists say that this should serve as a good example to the other players who indulge in racists slurs during confrontations in the pitch. The anti racial groups are asking for tougher measures since racism in the pitch has gone for much too long with the football association ignoring and overlooking it. Other people are arguing that the punishment was harsh and unfair since Evra too abused him in Spanish. They are saying that he too should be punished though there is not much evidence to support this claims. It is very unfortunate that this behavior has spread to the fans with some who go to an extent of throwing peanuts and bananas while chanting monkey chants towards black players (Valencia, 2012).

 

Work cited

CNN justice. Track star Marion Jones sentenced to 6 months. Cnn.com, January 11 2008. Web. January 30, 2012.

Longman Jere. Racism Charges Put a Sport on Edge. The New York Times, December 21, 2011. Web. January 30, 2012.

Pennington Bill. Penn State Officials, Including Paterno, Could Face Civil Lawsuits. The New York Times, November 11, 2011. Web. January 30, 2012.

PR newswire. Olympic Gold Medalist Marion Jones-Thompson Pleads Guilty to Making False Statements in Two Separate Federal Criminal Investigations. Prnewswire.com, 2008. Web. January 30, 2012.

Thamel Pete. Accuser of Syracuse Coach Admits Doctoring E-Mails and Drops Civil Suit. The New York Times, January 20, 2012. Web. January 30, 2012.

The associated press. Syracuse University and hoops coach Jim Boeheim want defamation trial moved upstate from NYC. The republican, January 26, 2012. January 30, 2012.

Valencia Jackee. Racism in English Football: Suarez and Terry Dirty the Pitch. Wit and fancy.com, January 2,2012. Web. January 30, 2012.

Weiss Dick, Thompson Teri & Red Christians. Civil suit vs. Sandusky claims extensive abuse. Ney York daily News, November 30, 2011. Web. January 30, 2012.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

National Approach on Child Safety Zones

 

Name:

Institution:

Lecturer:

Course:

Date:

National Approach on Child Safety Zones

A safety zone for a child is an area set aside for children. It could even be at home or any other public place. If a child is lost or too far from home, they go to these places because they are assured of safety. As they are in these areas, transportation home is provided. The ones at home are used as a playing area since they are safe for children. However, it is advisable to have an adult who is checking on the children as they play. These zones are mostly found in central parks, schools and other public places. If a child is not sure about his or her way home, a safety zone can be of help (Community of health service department, 2002).

Introduction of these zones brought relief to parents, guardians and the whole community. If a child is lost, it is easy to trace them using children safety zones. Before they were introduced, parents dreaded situations when they would lose their children. Today, if such an incident happens, they would just check on the nearest safety zone and contact security for help. It is also convenient when children are in school (Jerry & Bartholomew, 2000). In case they cannot get home, these zones are available to help. However, these safety zones are faced by a few challenges. A determined offender will easily harm children. For example, sex offenders have managed to access these zones and hurt children. The ones situated in homes may be hazardous if not well monitored by an adult. Children may end up doing dangerous activities and hurt themselves. Sensitive activities like swimming need undivided attention from guardians because children could easily drown (Cooner et al, 2004).

One reason why sex offenders attack children is their vulnerability. The safety zones have assisted in reducing this problem. The police arrests any person seen staring at children in a suspicious manner. This has been accompanied by other laws that punish the offenders. One of them is registering with the authorities after a given length of time. This is after they serve their term in prison. Many criticisms have been made about this law. People think that it is a way of making repeat offenders look bad, whereas they have not done any new crime. The numbers of times they register depend on the degree of their crime others understand it by saying this criterion will discourage potential offenders as well as make the culprits reform (Jerry & Bartholomew, 2000).

Children’s safety zones have benefited even the economy through business people. These zones have been put playing equipment like swings, which entertain the children. This equipment is fixed by business people who benefit economically. Apart from playing equipment, the zone needs maintenance after it has been put up. The management hires services from business people. When children are safe, their guardians have peace of mind. Therefore, they become fully productive in their economic practices. It also saves time used in searching for children. Before the safety zones were introduced, more time was used in looking for lost children. This resulted in less production economically (Jerry & Bartholomew, 2000). For example, a sole proprietor whose child is lost has to close down their business to help in looking for the child. Any other business activity brought by the safety zones is a boost to the economy of the country. On the other hand, children’s safety zones can deteriorate the economy. Since they are not fully guaranteed of safety, a loss is likely to occur. When a child is lost, the parent will look for the child until he is found. The time used to could have been utilized at the work place (Community of health service department, 2002).

The law on child safety zones was formed because of the problems experienced by children. They include getting lost, suffering injuries when playing, and abuse from offenders among others. The legislature considered the using safety zones, and there have been improvements. This Act is contained in the children’s law of safety and protection. Children have always been vulnerable to all sorts of abuse. Before this Act was formed, children were neglected, and there was less concern about them. According to the common English law, they were said to be under the father’s care. These beliefs were carried on to United States by the colonialists. People’s minds were changed by a specific incident that happened to a child. News went round that an eight-year-old child was being abused. Her name was Marry Ellen, an orphan. She lived in a foster home where she was assaulted on a daily basis. Lawyers’ society intervened in this matter. They agreed that it made no sense when animal protection was better than that of children (Cooner et al, 2004).

Mary Ellen’s case was presented before a judge, and the mother was sentenced to one year behind bars. After this incident, legal experts took child protection issues into consideration. People became more vigilant in protecting children from any sort of abuse. The medical association supported this movement and educated people about identifying a child abuse case. After ten years, every state had already formed laws that protected children from any kind of abuse and any other dangers (Community health service department, 2002). Today, it is a very big crime to abuse a child in any way. The laws of child abuse protection have been modified through the years. Other segments have been added concerning children’s welfare. For example, right to health care, education and general safety. This is where the child safety zones have been included.

Every person in the state should contribute to ensuring child safety. This is especially in homes and schools. Teachers and guardians should teach children how to be safe. They can do this by encouraging them to play safely and be around an adult when they are at home. In case they lose their way, they should be shown how to seek safety zones and seek for help. The latest strategy used by guardians is wearing a bracelet. When parents and guardians go to the parks or other public places with their children, the children are made to wear these bracelets. They contain the guardian’s contacts and the name of the child. This is a convenient way of helping the security or police to trace the parents. It is a convenient strategy, which applies to children of all ages. The government should continue to increase safety measures for children to eradicate all forms of dangers from them. Those found violating children rights on safety should be penalized heavily (Cooner, 2004).

 

References:

Berry, J. W., & Bartholomew, (2000). Alerting kids to the danger of sexual abuse. Waco, Tex: Word, Educational Products Division.

Community Health Services Department (County of Lambton). (2002). Be a house detective!: How to protect young children from hazards in the home. Point Edward, ON: Community Health Services Department.

Cooner, S. A., Ford, G. L., Crawford, J. A., Fitzpatrick, K., & Wooldridge, M. D. (2004). Operations and safety around schools: overview of project activities and findings.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

The Chinese Culture

Name:

Course:

Institution:

Tutor:

Date:

The Chinese Culture

It is important to understand one’s culture, not only as a means of self-identity, but also as a way of understanding the interactions one has with people from other communities. Therefore, the acknowledgement of other cultures is necessary and serves as a reminder, not of disparities in practices and beliefs, but as a commemoration of the uniqueness of one’s culture as compared to others. Personally, I am a second-generation American born Chinese individual. This gives me a particularly challenging aspect of understanding both the Chinese and American cultures with one serving as the basis of my roots and the other serving as the basis of the home I have known for the better part of my life.

One of China’s cultures, which attract a lot attention, is their new year. The Chinese New Year falls on a different date from the Western New Year. It is also celebrated in a unique way. The Americans do not celebrate it in such a way. Unlike the American culture where the Gregorian Calendar is followed, the Chinese follow the Lunisolar Calendar thus the New Year in China is referred to as the Lunar New Year. In this calendar, the New Year falls between the twenty-first day of January and the twentieth day of February if we were to place it on the Gregorian calendar (Yu, Fang & Xiaoling, 2004).

Apart from the New Year, the Chinese culture is also popular for other practices. For example, people have adopted martial arts as a sport, a way of defense and a theme in the world of movie making. The practice of Martial Arts originated from the Chinese culture. These martial arts are mostly referred to as Kung Fu, where “Kung” (gong) means merit or achievement and “Fu” means man. In plain English, they can mean “human achievement”. When they originated, the martial arts were practiced for the sake of warfare and survival. They were later incorporated into the art world when people incorporated peace into their way of living. The American culture does not have this form of art. In fact, it has adopted this art in the department of defense and the world of sport.

Unlike the American writing where the Alphabets used are also used in other writings worldwide, the Chinese writing is unique and different. One needs special training in order to read it. It is categorized as calligraphy, which has been used by many artists worldwide. The Chinese cuisine is also very popular. In fact, there are restaurants, which particularly deal with Chinese foods. The Chinese mode of dressing is also unique. The kind of dressing in America can be found in many parts of the world such as Europe. It has also been adopted by some African countries and Australia. However, the Chinese dressing, especially the dressing associated with women. Different occasions call for different kinds of dressing. The men’s dressing is also unique especially when attending a Confucian ceremony. This dressing is known as xuanduan.

With this understanding of these cultures, I am made aware of the unique nature of the differences of beliefs and practices that many individuals have. These will be particularly helpful for me at NDNU, as I would not only bring recognition of both the American and Chinese culture but also an understanding of how differences can be used to ensure interaction with other communities is efficient. I would therefore bring NDNU a great experience as an individual that is conversant with the Chinese practices of dressing, writing and the arts, and how these can be incorporated into the larger American culture. This would aid individuals from other cultures at NDNU in interacting with their American counterparts and bringing their own cultures into the institution.

References

Yu, D., Fang, Z., & Xiaoling, L. (2004). Chinese culture. Beijing, China: Foreign Language Press.

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Death Penalty

Name:

Lecturer:

Course:

Date:

Death Penalty

Introduction

Capital punishment, otherwise known as the death penalty or execution, is a death sentence warranted upon an individual by a given state or competent authority as a punishment for a given crime (Phillips, 4). Crimes that lead to an issue of the capital punishment are referred to as capital offences or capital crimes. This mode of passing judgment has been utilized by numerous societies. Currently, ninety-six states have moved to abolish it in their regions while, a remaining fifty-eight countries, still enforce the practice. Most notably, these countries have not enforced this practice in about ten years, and only implement it in exceptional scenarios such as times of war (Phillips,13). Capital punishment is an issue of active controversy predominant in various states and countries, varying within arguments on cultural issues or ideologies in politics. Regardless of the fact that numerous nations have abolished the death penalty, sixty percent of the world’s introduction still witness executions taking place, most notably Indonesia, United States of America, as well as China. Each of these four nations surprisingly solicited against moves by the General assembly to abolish the death penalty. In reality, capital punishment is ultimately the denial of an individual’s right to live (Phillips, 18). It is always a premeditated action involving the cold-blooded killing of a person. There can never possibly be any justification for cruel treatment or torture. It is my stand that the death penalty should be completely abolished from the face of the earth.

Argument     

Execution of criminals as well opponents in politics has been greatly used in numerous societies, as a means of suppressing political dissent as well as punishing crime. Societies that practice capital punishment mainly reserve it for actions such as espionage, treason and murder. Certain states practice it in the cases of rape, sodomy, incest and even adultery as do even apostasy in Islamic nations (renunciation of the religion in the state). China passes the capital punishment for cases involving human trafficking, as well as serious corruption cases.

The practice of capital punishment extends back to ancient history when society was filled with primitive practices. It is an astonishing fact that as far as the world has come that this practice is still in force. Countries or states that practice this abhorrent activity argue that it constitutes deterrence thus preventing future indulgence in crime (Gobert, 8). Society has and will always utilize punishment as a form of discouraging would be criminals from engaging in unlawful actions. Society argues that since it is best interested in preventing serious crimes, it is therefore justified to use the highest means of achieving this goal, which is the use of capital punishment. If serious offenders are executed through the death sentence, potential criminals will therefore have a second thought before they engage in any serious crime for fear of losing their own lives (Gobert, 9).

Nevertheless, judging from their argument, the capital punishment does not prove any deterrence in future murders. Societies that believe deterrence is a justification for executing serious criminals end up bearing the burden of proving its viability in deterring future crimes. An overwhelming conclusion from significant research on deterrence is that the capital punishment, at best, does not act any more deterrent as compared to a life long sentence in prison (Gobert, 22). In fact, capital punishment constitutes an opposite effect, therefore, brutalizing society thus increasing the probability of more serious crimes such as murder. Research shows that some states in the United States, which do not use capital punishment, register lower murder cases as compared to those that do. In any case, capital punishment is not deterrent since most criminals who engage in serious crimes either do not carefully weigh the propensities of life in prison and the death penalty, or do not expect to be apprehended in any case. Once dangerous criminals are in prison in life long sentences, will often tend to settle into a practice routine, therefore, being of less harm to other inmates. In addition, most societies have further incorporated sentences without the possibility of any parole. Therefore, there can be an assurance on society’s safety as well as a life saved (Galliher, 14).

Society further argues in its defense on capital punishment a just society should call for capital punishment especially in the case of murder as a form of retribution. When someone takes life, it argues that balance on justice has been disturbed and needs to be restored, failure to which, society will succumb in an ideology of violence. Only when you take the life of the murderer will the balance be restored, allowing society to display convincingly that taking life is intolerable warranting an equal punishment (Galliher, 28). Retribution further bases its argument on values in religion, maintaining its ideology of taking an eye for an eye thus justifying taking a life as compensation for another life. From individuals who commit heinous and cruel crimes, those whose remedy is capital punishment, the criminals require the worst punishment in the society’s law system. They argue that granting any lesser form of punishment will contradict society’s value of safeguarding other lives.

In my opinion, capital punishment is in no case a just remedy for responding to a murder case. From my understanding, retribution is in accord with revenge and both ideologies are the same. It is a natural instinct for human behavior to crave immediately for retaliation when wronged, but society, on the other hand, should stand for a more measured mature response. Impulse on emotion does not serve as sufficient justification for employing a system that incorporates the death penalty (Galliher, 24). Society’s laws on should impart knowledge on higher principles as well as displaying utmost respect for human life, be it that of a murderer. It is in my view that when we base judgment on revenge motives, which result in another murder, the consequence ends up extending the violence chain. Allowing executions will therefore sanction murder as a form of pay back. Society’s ideologies are very primitive in my opinion; and end up contradicting themselves. Why then does society fail to torture those convicted of torturing or even sanction rapes for rapists? This especially sheds light onto the United States, which even though sanctions minimal death penalties, which are merely cases of defendants who lack adequate resources to defend themselves, rather than serious offenders (Galliher, 31).

Moreover, in my support to abolish capital punishment, employing this practice runs the risk of passing this judgment to innocent people, who are more often than not mistaken identities. Once a convict has been executed, there is no way of making any amends if a mistake is recognized later on. Since the year 1973, a considerable number of eighty-eight people up to now have been released from conviction subsequent to the emergence of evidence of their innocence (Gobert, 45). In the same time span, six hundred and fifty people have been sentenced to capital punishment. Therefore, one in every seven people executed, is innocent. Most recently, students studying journalism in the Illinois state were mandated to investigate a case concerning a man who was sentenced to capital punishment, subsequent to unsuccessful appeal attempts. These students managed to find out that the witness had given false testimony. They eventually managed to identify the true criminal in the case, who accepted to confess his crime on tape. The innocent convict was quite lucky and was immediately released. A point to note is that his life was not spared due to a reliable justice system, but because of the selfless endeavors of concerned individuals.

Our current society is taking numerous risks that can eventually lead the loss of innocent lives. Construction workers engage in activities statistically aware that some of them are at the risk of perishing; we therefore take great precaution in efforts aimed at minimizing unwarranted fatalities. Nevertheless, unwarranted executions can be prevented. When we implement sentencing a criminal to a life sentence without parole, society’s needs for punishment are met as well avoiding the risk of a wrongful irrevocable sentence. Moreover, when the death penalty is practiced, it currently does not point out to the criminals who ‘deserve it’. Rather, it falls on an arbitrary group of individuals on irrational and incompetent factors such as viability of the defense counsel, the race of the victim or criminal, as well as the county or state in which the offense was committed (Galliher, 36).

Conclusion

Capital punishment is in nature an unfair practice that in any manner cannot serve as a remedy for any kind of wrong or crime. It is a cold-blooded practice with a nature of predetermination; the convicted is informed in advance of his day of death. You can just imagine the hell-like situation the convict and their family will be going through prior to the execution day. It greatly violates human right to life as prescribed by the universal declaration on human rights. With all due reason and measure of maturity, I take a stand to solicit for the complete abolition of capital punishment.

 

Works cited

Sundby, Scott. “The Capital Jury and Empathy: The Problem of Worthy and Unworthy Victims.” Cornell Law Review. 88.2 (2003). Print.

Phillips, Fred. The Death Penalty and Human Rights. Kingston, Jamaica: Caribbean Law Pub. Co, 2009. Print.

Gobert, J. “The Us Decision to Abolish the Death Penalty.” Childright. (2005): 14-15. Print.

Galliher, John F. America Without the Death Penalty: States Leading the Way. Boston: Northeastern University Press, 2002. Print.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Patriot Act

Institution

Address:

January 27, 2012

 

To:

From:

Re: Patriot Act

 

The following memo explains and discusses the Patriot’s Act, terrorism as a separate offence and the act’s violation of the human rights.

The explanation and Discussion of the Act

The USA Patriot Act is an acronym, which was reinstated in the year 2001 after the 9/11 terrorist attacks. It stands for Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism. The act loosened the restrictions enforced on the agencies of law enforcement. After the implementation of this act, agencies could search telephones and listen over conversations. They could also go through a person’s records whether financial, medical, or otherwise. They can also go through an individual’s emails, messages, and other personal details without the acquisition of a warrant. The act also gave the Secretary of the Treasury the power to control the financial transactions of a foreign entity or individual. Immigrants suspected of terrorism activity could be deported or held into custody by the law enforcement agencies.

Since domestic terrorism was also included as terrorism, this act can be applied in many activities. Three provisions were given a four-year expansion by President Barrack Obama in the year 2011. These provisions include the searching of business records, roving wiretaps and lone wolves surveillance. Lone wolves are individuals who are suspected of engaging in terrorist activities even though they have no link to any terrorist group (DOJ, 2011).

Terrorism as a Separate Offence

Although the act of terrorism was addressed in other previous acts, the destruction and the devastation associated with terrorism, not to mention it increase globally, qualifies its separation as a separate crime. Although the 9/11 attacks are the most memorable and destructive of all the terrorist attacks in the history of America, other attacks, not only in America but also globally, have caused great pain, destruction and devastation. There should be policies, rules, regulations and even laws (act) that prevent future attacks by terrorist.

The act and Human Rights

The debates, discussions and controversies relating to this act are numerous. Many scholars, activists, senators and other public representatives agree that this law argue about the act’s interference with the fourth amendment. However, it is important to understand that the interpretation of this law may have been taken overboard, as some senators state (Savage, 2011). The law enforcement agencies will not just go through records and listen to conversations for the sake of interfering with ones privacy, they are doing this for the sake of keeping the country safe. The lack of “interference” led to pain, death and destruction in the year 2001. Maybe, it is time we try “interfering” and see whether such an event will never take place again. Every thing comes with a price. There are critical actions that must be taken in order to keep the whole country safe. It is good to identify that these terrorists are sometimes citizens of the countries being terrorized. The agencies have no way of knowing the terrorists unless they take such extreme measures.

 

Yours Faithfully.

 

 

Student.

References

Department of Justice. (2011). Highlights of the USA Patriot Act. Justice.gov. Retrieved From http://www.justice.gov/archive/ll/highlights.htm

Savage, C. (2011). Senators Say Patriot Act Is Being Misinterpreted. New York Times, May 26.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Privacy invasion and Libel Case Study

 

Privacy invasion and Libel Case Study

Student’s Name

Date of Submission

Institutional Affiliation

 

Introduction

The case study provided is a good example of the balance between first amendment rights and the freedom of religion. The first amendment as entrenched in the United States constitution is part of the bills of rights that allows free exercise of religion (Kister, 1987, p. 102). It has clauses on the freedom of region which separates the church and the government. It also prohibits government interfering with an individual’s practice of religion. However, religious actions and rituals may be limited by federal and civil laws (Allen, 2010, p. 1711). Therefore,

Privacy violation has become a common cause of actions cited for lawsuits. Many people have been compensated for damages resulting from privacy violation. Privacy violation refers to the right to posses and control property and personal information against, seizure, searches and exposure. In circumstances where a party may feel that his/her privacy has been invaded, the person has the right to sue the parties by means of civil law attorney and the civil court for the damages (Young, 1975, p. 138). This case helps in understanding issues relating to invasion of personal privacy and libel in line to Steve’s case.

A tort is an illegal act or harm that does not involve an infringement of a contract for can result in civil action (Cathy, 2009, p. 163). Of the four violations of privacy torts, intrusion of solitude and seclusion, public disclosure of private facts, false light, and appropriation, Steve’s case involves the torts of intrusion of solitude and public disclosure of private facts. In the first tort, it involves an individual undesired exposure to publicity by third party. The attorney need to confirm that indeed there were damages or the undesired exposure. Steve had decided to reveal his confidential data to the leaders and the leaders had no right to expose this information to other people against his wish.

The second tort is the public disclosure of private facts which pertains to circumstances where a person reveals; unnecessary offensive confidential information to the community regardless of whether the information is true or false.  Like the first tort, the attorney needs to establish that the information is not of worry to the civic. It is therefore, true that the leaders of the church invaded Steve’s privacy by insisting and threatening to expose his private information to his employers, colleges and family members and yet the information was private that was required to be shared between him and the leaders only. By threatening to expose the information to third party, Steve privacy was being invaded and he has got the right to demand for his rights.

A libel is a written and false and disparaging statement about an individual that a tortfeasor communicates to the third parties (Stanford encyclopedia of philosophy n.d). Such communication or publication must injure the victim’s reputations in the community or society.        In summary, libel is written statement, it is false and defamatory statement about an individual, tortfearors must communicate the statement to third parties and the communication must harm the victim reputation (Young, 1975, p. 348). To this end, Steve’s case is not a libel and it only qualifies to be libel in the circumstance that his private affairs are transferred to third parties in writing, and should be false. In his case, he has been informed and he has objected his private information to be realized to the third parties as it may injure his reputation.

In this case, expectation of privacy is expected regardless of the church’s doctrines stating or requiring that any person joining the church discloses personal indiscretions to the leaders of the church. When joining the church, Steve thought that the information that he will disclose to the leaders will not be disclosed to other members of the church. He only knew or was informed after disclosing his indiscretions that his problems and what he said was going to be communicated to other parties (4 common law privacy torts n.d).  Therefore, to this end, Steve expected that information he was disclosing was going to be private between him and church leaders only.  The church leaders invaded his privacy by not informing him of the disclosure. If Steve was aware that the information he was going to give would be distributed to third parties, he would not have opted to disclose his problems or he could not have been hesitant in allowing the information to be communicated to the public.

Defenses to the tort of libel and privacy torts in relation to Steve’s lawsuit include; in the tort of libel, if the statements were written or recorded, the information   was communicated and was false. For instance, if the leaders transferred the information that was not what Steve said and lastly. Furthermore, if the information disclosed to third party harmed him and destroyed his reputation in the society.

When it comes to privacy tort, Steve would prove that the leaders exposed his private information to third parties against his will and that the information exposed caused damage to him in terms of his reputation in the community. On the public disclosure of private facts, Steve would also defend himself that the leaders revealed or disclosed private facts or information to the public that was not of concern to the public.

There is a legal disparity in revealing individual indiscretions to church elders, congregation, or even the members of the public.  This is because every person has the right of disclosing such information if the church doctrines allow that and if the person does not feel any violation of his/her privacy. When a person decide to disclose personal or private indiscretions to the members of the  church, the individual does not feel any privacy violation therefore, in such circumstances the  person cannot claim that his/her rights to information privacy is invaded.

In the case of Steve, there is clear evident that he was not wiling his private indiscretion to be disclosed by the leaders to the members of the church and therefore, by the leaders threatening to reveal the information they were contravening and breaking his rights to privacy. Therefore, they were liable to breach of Steve’s rights.

In conclusion, the case study provided is a good illustration of how violation of an individual privacy can be done. The case also helps in understanding the differences of first amendment and the freedom of religion on the rights of individuals.  It is therefore, true that the tort on privacy was breached by the leaders. Steve was not informed that his private indiscretion would be disclosed to third parties. What he knew while joining the church was that his problems would be solved between him and the church leaders. The leaders contravened his rights and by telling him that his personal indiscretion would be disclosed to the public, it was a clear intrusion of privacy. Libel did not happen in the case study as Steve’s private information was not written, but if that could have happened, the leaders would be accused of libel. However, the case has assisted in providing insight on how privacy invasion and libel occurs in real world.

References

Allen, A. (2010). Privacy Torts: Unreliable Remedies for LGBT Plaintiffs. California Law           Review, 98(6): 1711-1764.

Cathy, J. (2009). Torts and personal injury law. New York: Delmar publishers.

Kister, K. (1987). A Chilling Effect: the growing threat of libel and privacy invasion actions         to the First Amendment (Book). Library Journal, 112(10):102.

Stanford encyclopedia of philosophy

http://plato.stanford.edu/entries/tort-theories/

Young, R. L. (1975).  Libel Damages Upheld in Privacy invasion Case. American Bar       Association Journal, 61 (3):  p348.

4 common law privacy torts.   http://www.cas.okstate.edu/jb/faculty/senat/jb3163/privacytorts.html

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Book Assignments

Name:

Lecturer:

Course:

Date:

Book Assignments

Our daily lives involve making choices: to do this or that, to go or stay, to spend or save. Whether the situation is life threatening or petty, these choices ultimately define who we are as well as shape our lives. Sheena, Iyengar, the author of the book “The Art of Choosing” asks questions concerning the reasons about how and why people make choices. Why do people sometimes make choices against their best interests? Is the reason for making that choice inert or culture bound? Iyengar’s award winning book highlights on the profound and surprise nature behind these reasons. In a world filled with diverse cultural and political forces, interconnected commerce as well as revolution in technology, Iyengar’s book attempts to act as a guide for the far-fetched challenges and consequences involved in our choices.

Chapter 1 point 1

Steve Callahan was cruising in the sea, and his boat unfortunately capsized some eight hundred miles west of the islands in Canary. Callahan found himself stranded in an inflatable raft adrift at sea all alone with limited resources. He managed to survive for 76 days when he was later found by people on a boat. Another survivor, Simon Yates had to endure crawling across a glacier with a broken leg for five miles after a hiking accident with his partner Joe Simpson. He managed to reach a base camp five days later where he was saved.

Point 2    

Sometimes suffering accompanied with persistence can reap no rewards, with heartbreak for possible distress goes unrecognized.. Some researchers used test rats and immersed them in jars filled with water with onrushing jets of water from the top such that they had to swim continually. Some rats would only swim for a few minutes and later on succumb while others would go on for 60 hours before they finally drowned due to fatigue. Did the rats that succumb shortly after just simply give up while the others somewhat believed there would be a way out?

Point 3

The desire of making choices lies within us, acts as natural driving, force, and even though we develop this action because it is fundamental for our survival, it will more often than not occur independently of any viable benefits. In these cases, our power in making choices is so crucial, that it not only becomes a means to an end, but also develops into something of intrinsic value as well as necessity.

Point 4

Choices are sometimes made out of instinct. These conditions may simulate the wild environment for an animal but the main difference is that they do not worry about shelter, safety and finding food. These animals feel engraved in a death trap because they have minimal influence on their lives. Consequently, several zoos over the years have reported attempted escapes by various animals. Their instincts would ultimately lead them to make escape decisions despite the easy life they lived.

Point 5

A person’s perception on helplessness or control is not wholly determined by outside forces. We have a choice of making decisions by altering our mind’s interpretation of circumstances. Callahan and Simon’s decision to survive is a good example for this point. By asserting control and authority in a situation that seems utterly impossible to succeed, people can improve their likelihood of success. Perceiving negative results one’s life will ultimately lead to higher chances of succumbing to depression.

Point 6

Sometimes people make decisions oblivious of the dangerous risks in the forefront. A decade long research was concluded and the findings involved two categories of individuals. One, the people who work at high paying jobs are exposed to the job’s high pressures, and those who work in lesser paying jobs characterized by minimal stress. Employees with minimal pay were at a greater risk of sustaining coronary heart disease as compared to their counterparts.

Chapter 2 Point 1

The association between religion and personal happiness has strong bonds in terms of frequency of attendances by religious people as compared to their religious beliefs. Majority of the benefits in religion are not perceived from one’s belief in God or gods, but is rather attributed to an increase in social support guidance in life from beneficial association to a religious group, or an assistance in the process of implementing self control.

Point 2

Highly structured environments that display secular qualities in religion take, for example, the military service eventually have an effect on an individual’s character by building it. Lacking a religion does not mean that does not have a natural driving force that one can focus into. Individuals who lack religious beliefs in turn pay their reverence to other beliefs that boost their moral as well as giving them encouragements.

Point 3

The bridge that connects democracy and individualism, as well as communism and collectivism is deemed as evidence that solicits freedom as a special product; one that hails from cultures in the western region characterized by individualistic qualities. Moreover, cultures that collective group individuals greatly tolerate oppression as well as recognizes due authority. Communities with cultures that encourage these qualities often find themselves in positions where there are bridging gaps.

Point 4   

Love in marriage is a very fundamental principle. The change in social attitude towards marriage from the era where marriages were planned, has led to marriages doing away with the conditions of love while striving to reciprocate friendship conditions. A very few percentage of couples, merely ten, were found to maintain the original love and affection many decades subsequent to their marriage. For the other remaining ninety percent, the love and affection present in the early stages of the marriage sought of withers away.

Point 5

Decisions by people to engage in marriage regardless of whether or not they display affection towards each other are due to specific choices. These choices are determined by the influence on self-representation by culture. A research carried out between two groups concluded that students in America would display a neural activation response in the medial and anterior cingulated cortex in matters relating to self-judging circumstances. The other group of Chinese culture displayed activity in those neural areas when passing judgments about familiar people.

Point 6

People often tend to make choices and decisions in relation to driving forces that are seemingly in accord with the situation at hand. I can draw a good example from the saying that goes “God helps those who help themselves”, which an ideology in the western culture that can be traced back many centuries. People tend to act in a situation believing that a higher deity will reward their efforts, be the action right or wrong.

Chapter 3 Point 1

In this chapter, Sheena discusses linkage between a multilayered concept and self-contradiction rhetoric scenario of Whitman. Our situations become more complex in situations where we are able or in a less position to establish reconciliation or balance in the multidimensional structures within us. People will tend to wallow in a zone of cognitive dissonance when at the mercy of two conflicting forces. These two forces are more often than not our actions and beliefs.

Point 2

Even in situations where we tend to consider that we that we are in control of our personal unique traits and qualities, or when we think we are walking in a path leading to our self-discovery, we are interconnected between relations that are either internal or external. This relationship is in relation to what we personally believe about our selves, society’s perception of ourselves and the manifestations of our actions.

Point 3

As the world is changing, the people are changing accordingly. Change will manifest itself in numerous ways. It can unexpected, planned, be imposed on by others or by ourselves. Regardless of the change and the manner through which it will manifest itself, we determine the way we react. Our reaction is witnessed in multiples ways. Many people will react in relation to their beliefs and culture.

Point 4

When people are challenged by situations that test their willpower, despite the determination to uphold their morals and beliefs, people not always stand by their convictions. The repercussion often leads us to reconciling our actions to our morals and beliefs. This may be through committing ourselves to measures that curb us from repeating the action, lying to ourselves, or by incorporating that action among our very own beliefs and morals.

Point 5  

We often tend to conform to different standards in the society. These norms go on to describe us onto to the extent of how we should speak, dress and who and how we interact. Our judgments on these issues hail from our external and internal relationships. Therefore, our individualism will depend on the people we relate to. Either this or what is popular in that given time.

Point 6

Cognitive dissonance will often occur in my occasions, with or without our knowledge. Different scenes of our everyday life will always come in mind such thinking about whether one will pass a test or not, or whether they had prepared adequately. However, what stands out in these situations is that when we develop an identity, we tend to try side step dissonance when all the while we are supplementing it.

Chapter 4 Point 1  

Reflective and automatic systems are, in the primal thought of choice and judgment; they are of both equal importances in the case of controlling an action. Take for example; one is walking down the street while at the same time engaging in a debate. These actions will require both systems as to maintain stability in walking and talking. This system may be referred to as analytic and heuristic processing.

Point 2   

Tendencies to perform a certain habit by people due to their previous behaviors especially in childhood are more often than not carried into adulthood. Many people have a habit of doing something unpleasant to their personal beliefs and morals. Despite the fact that they are ready and willing to quit that particular habit, they find it hard maybe because it has already blossomed to an addiction.

Point 3

We will always have a tendency of making decisions with regard on the outward appearance of a situation, or through the ways our minds make out a situation. An excellent example is how people in casinos continue to spend more money in gamble machines that are activated using chips instead of cash. This partial vividness of the situation allows people to continue gambling because they cannot outwardly see the money they are spending.

Point 4

The biases and heuristics of our judgments are only a fraction when it comes to situations that determine our choices. This describes how someone’s understanding of a situation will ultimately affect his or her choice or decision. We tend to make choices with regard on the circumstances in a given situation regardless of whether of our decisions are biased or sincere.

Point 5

Another point is that people continually make decisions for their own personal reasons; reasons from facts that sometimes we are not consciously aware of. It may seemingly look like we sometimes live instinctively through decisions that may seem to come unexpectedly. This manifests itself in our daily lives, which involve the petty decisions of one makes unconsciously.

Point 6   

Every crucial decision is made from sufficient debate as well as thinking. People will always fully analyze a situation before making a decision as well having in mind all the possible repercussions of every choice made; and then ultimately making the sound decision. However, people unknowingly think too much and therefore affect the outcome of their choices.

Chapter 5 Point 1  

Numerous instances on the limits of our abilities to process information as well as process it, are all drawn from the circumstances drawn from our environment, as well as our judgment. The fact that we make choices dependent on the situation at hand ultimately leads to its success even though the intended result was not intentional.

Point 2

Our decisions are mostly filled with theories that make a simplifying assumption that people are capable of analyzing in a rational manner the cons and pros of every possible alternative in a viable choice that is designed to eventually lead to maximizing the benefits to an individual.

Point 3

Observations on contributions those are influential on the processing abilities of people that are aimed in making decisions. The effort people utilize in the process of comparing the available options; the process of selecting the most beneficial option could eventually prove to worse compared to the very first option that displayed quality in threshold.

Point 4

People continuously make decisions. These decisions however vary in terms of the amount of analysis put towards them. Decisions that are; say petty in nature, do not warrant the human mind to engage in detailed analyses. On the other hand, we will all engage in sufficient debate as well as seek the necessary guidance before we arrive to a conclusion in the event of a pressing matter.

Point 5

When people are required to make a decision concerning a particular issue on a daily basis, they usually end up make the same choice concerning that issue each day. On the other hand, when called upon to make a choice in advance for several days, people usually make differed choices on the same issue.

Point 6

The choice of satisfaction heavily relies on the previous conditions as well as our actions subsequent to the choice made. We all make choices with the due intention of enjoying the eventual benefits. A choice made will have its repercussions eventually but sometimes we make choices subconscious of the outcome. We may either be satisfied or dissatisfied by our choices eventually.

Chapter 6 Point 1

People were born to choose. Notwithstanding this, however, people are also supposed to create meaning in the process of their decision-making. Meaning and choice are interconnected. Decisions play the role of defining our personal identities. These choices are in turn determining by the meaning we intend for them. We are in a position to alter some meanings while others remain beyond our control.

Point 2

Meaning displays a fundamental relevance as compared to choices and decision-making. What is the meaning of the decision that you are making? Behind every decision lies a profound reason as well as meaning held by the one making the decision. However, it does not matter where the meaning or reason is of a noble nature or not.

Point 3

 A choice or decision made will always lead to consequences that will either suit our intended benefits, or will at the extreme lead to unwarranted consequences. There is therefore a significant inter relationship between a choice made, happiness or regret. The decision made may end up suiting our needs. This would either be the case or we would find ourselves regretting making that respective choice.

Point 4  

There is a complex relationship between choice and freedom. Nevertheless, this two have a significant point in determining our lives. However, they are at given times not in accord with each other. Having the freedom to make too many choices eventually overwhelms us leading to unpleasant results. Choices, both momentous and mundane are ultimately shaped by either invisible or visible forces.

Point 5    

Having numerous choices to choose from is not a pleasant thing. There are numerous times when we find ourselves in situations where we are faced with many options to choose from. There is a notion that more is less as we have a tendency of lacking to make a choice in these kinds of situations. Some options do not offer us choices at all. For some of us, having to make a choice leads to a dilemma.

Point 6

Culture in itself plays a crucial role in determining the ideology about what or who makes the decisions in these situations. There is a distinct difference between the ways in which collectivist and individualist cultures endeavor in the processes of arriving at their choices. Numerous choices demand someone to over think before arriving at a conclusion; a situation that is not at all necessary.

Chapter 7 Point 1

Sometimes we are required to make choices in situations where we would rather not. Take a situation whereby you have to make a decision of undergoing an operation that could probably lead to your demise. Either risk taking the operation or risk living with the illness, which will ultimately take its toll on you eventually leading to early death.

Point 2

Making a choice is not an easy thing especially when you are faced with a conundrum and the two available options are not pleasant. By taking either of the options, the repercussions are seemingly dire. We usually end up asking ourselves whether to make a decision or to leave the whole situation uninterrupted and let fate take over the situation.

Point 3

Exactly at what point should a decision cross for it to be referred no longer be as a choice. Does it have to be life threatening or does have to be a situation where we are compelled by the situation to make the decision. Apparently, we sometimes face situations where we are not in a position make a choice pertaining to our best interests.

Point 4  

All decisions and choices we willingly make are aimed to be of our best interests. The final chapter however, highlights on situations characterized with dire circumstances. We therefore find ourselves making choices that are not in regard with our best interests. Some choices will ultimately lead to dissatisfaction or fail to fulfill our intended benefits.

Point 5

The optimal point of every decision or choice dwells between very little and infinity, and that the optimal point is greatly dependent on the persons context, situation as well as the circumstances involved. When face in a situation where the options are very limited, we will either make a decision that is on the extreme or one that is not.

Point 6

A decision, regardless of the implications it will make will be dully addressed and analyzed before it is selected. In the situation where we have limited choices to make, people will have a tendency of analyzing the situation very carefully attempting to forecast the repercussions of the options at hand. Eventually, we all end up making a decision of choosing the option that seemingly has the minimal negative consequences.

 

Works cited

Postrel, Virginia. “The Art of Choosing. by Sheena Iyengar.” The New York Times Book Review. (2010): 16. Print.

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

image processing

Image Processing

Name

Institution

Edge Detection Using function “edge”

It is documented that, MATLAB is supported by the function “edge” detection of an image in addition, and different methods develop for edge detection can also be used (Fisher, Walker & Wolfart, 2003). Therefore, one can opt for the best method depending on the application. In this case, MATLAB edge detection method is applied to study the behavior of three edge detection methods namely Sobel, LOG, and Canny edge detection. The code that used for implementing the edge detection methods using MALTLAB edge function and the results achieved are as indicated below.

 

 

 

%% Edge Detection using different Methods supported by MATLAB edge function

%Reading Input Image

I = imread (‘img06.tif’);

%applying Sobel edge detection and recording the value of threshold applied

%by MATLAB

[sobel_edge, th_sob] = edge (I,’sobel’);

%applying log (Laplacian of Gaussian) edge detection and recording the value

%of threshold applied by MATLAB

[log_edge,th_log] = edge (I,’log’);

%Applying canny edge detection and recording the value of threshold applied

%by MATLAB

[canny_edge,th_cany] = edge(I,’ canny’);

%Displaying the Original image and result of edge detection using three

% different methods.

Figure (‘Name’,’Edge Detection’);

Subplot 121;

imshow (I);title(‘Original Image’);

Subplot 122;

imshow (sobel_edge);title(‘Sobel Edge Detection’);

Figure;

Subplot 121;

imshow (log edge);title(‘Laplacian of Gaussian (LOG) Edge Detection’);

subplot 122;

imshow (canny edge);title(‘Canny Edge Detection’);

 

  1. 1.      Give the algorithms of these three edge methods

In brief, we shall discuss three edge detection methods supported by MATLAB in addition, discuss the advantages and disadvantages of working algorithm. The three edge detections are:

  1. Sobel Edge Detection
  2. LOG (Laplacian of Gaussian ) Edge Detection
  3. Canny Edge Detection

 

Sobel Edge Detection

Basically, this method calculates the gradient of image pixel that eventually gives direction of any largest increment from lighter darker regions. Additionally, it gives rate changes of direction. Therefore, this indicates how rapidly or smoothly images pixel values changes and how likely a may result to as edge. Mathematically, the gradient of a point in two dimension signal like image is a vector of the two components; vertical and horizontal calculated by derivates in horizontal and vertical directions.  At any point, the gradient vector points toward the direction of an increase of maximum intensity. With this in mind, the gradient with regions with the constant pixel or intensity image is zero, while for any point at the edge the gradient vector point across the edge from darker to brighter region (Canny, 2002).

To calculate the gradient at any point, the horizontal and vertical components are calculated. When calculating horizontal and vertical components of the gradient field the following and  are used respectively as indicated below.

 

            Fundamentally, Gx and Gy bestow horizontal and vertical components of the gradient of the image. The gradient magnitude can be calculated as follows.

The gradient direction at any point is calculated as follows.

 

LOG (Laplacian of Gaussian) Edge Detection

As the name suggests, LOG (Laplacian of Gaussian) edge detection is the combination of two filters; Laplican and Gaussian. In brief, when discussing the algorithm of LOG edge detection it important to note that, the Laplacian of an image I ( x, y) is given by:

 

Given that the input image is represented as the set of discrete pixels, one has to find the pixel convolution kernel to derive to the definition of the Laplican Operator. The discrete Laplacian operators can alternatively be defined by the arithmetic signs (Rafael & Richard, 2002).

 

Steps for LOG edge detection

The following steps need to be followed for the detection using LOG method (Raman & Dr. Himanshu, 2003).

  1. Generate LOG mask
  2. Apply mask in the input image
  3. Scanning each row by looking at zero-crossing to detect edges.
  4. Scanning each column by looking at zero-crossing to detect edges

Canny Edge Detection

Canny Edge Detection is said to be the most complex and optimal algorithm to detect edges of an image. First, a smoothing filter is applied to the input image to filter noise in the image. Mostly, a Gaussian filter is convolved at the image to filter noise. Once the image is filtered from noise, some gradient operators are applied on the smoothed image to find the gradient of the image. For example, a Sobel operator is convolved by the smoothed image to give absolute value for each pixel gradient location. Thereafter, gradient direction is computed by the gradient in the x and y direction given by the formula.

 

In this case, Gy and Gx are gradients of Y and x direction respectively. Whether the edge is horizontal or vertical, positive or negative diagonal, the direction of the gradient is determined upon theta values of 0, 45, 90, and 135 degrees (  ).

  1. Compare the performance, advantages and disadvantages
Method Advantages Disadvantages
Sobel It is the simplest in terms of complexity, time, computation, and orientations

There is no Y junction problem

Lack of accuracy in term of edge detection

Very sensitive to noise

LOG Accurate in finding places for edges

Wider area of testing pixel

Lack of Y junction ;problem

 

Fails to find orientation of edge.
Canny Have  better detection

Precise in noise suppression

Use two thresholds thus, making it more flexible to edge detection

Helpful in removing ineffective information

 

Time consuming

Problems in Y junction

Intensive computationally.

 

  1. Determinate the suitable thresholds for “img06” to bring out the principal features and reduce irrelevant details.

To eliminate unwanted details and preserve the main edges, thresholds needs are changed. Through default, MATLAB chooses threshold (Raman & Dr. Himanshu, 2003). With this regard, the value for threshold edge detection for every method is another output variable that is introduced and as a result, MATLAB stores value of the threshold to variable and black and white detected edge images. Though the threshold leaves some irreverent information, the threshold used by MATLAB is 0.0738. With the new threshold of 0.1 the following results were obtained as shown below. It is important to note that, increasing threshold by a certain range does not only removes unwanted information but, affects main edges of input image in addition; inexact threshold can slide in the small range. In this context, a 0.0002 threshold has been found to be the the LOG operator for calculating edges of MATLAB with the new threshold being 0.0055. With this in mind, the results are shown in the following figures. One can articulate that, a lower threshold of 0.0188 and the upper threshold of 0.0469 is applied by MATLAB canny edge detector. In this context, the new upper threshold is 0.18 whereby, the MATLAB opt for lower threshold of the input upper threshold given by the following equation; Lower threshold= Upper threshold *0.4. The results of the new threshold are given below:

 

 

 

 

The code that generate the above images is:

%% Edge Detection With new thresholds

%Applying Sobel edge detection with new threshod

sobel_edge_new = edge(I,’sobel’, 0.1);

%Applying log (Laplacian of Gaussian) edge detection with new threshod

log_edge_new = edge(I,’log’,0.0055);

%Applying canny edge detection with new threshod

canny_edge_new = edge(I,’canny’,0.18);

%New Figure Window and Displaying the MATLAB thresholded Sobel image and the

%one with new threshold

figure (‘Name’,’Sobel vs Sobel’);

subplot (1,2,1);imshow(sobel_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(sobel_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded LOG image and the

%one with new threshold

figure (‘Name’,’LoG vs LoG’);

subplot (1,2,1);imshow(log_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(log_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded Canny image and the

%one with new threshold

figure (‘Name’,’Canny vs Canny’);

subplot (1,2,1);imshow(canny_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(canny_edge);title(‘With MATLAB calculated Threshold’);

 

d) Without using any MATLAB filtering functions, implement a sobel edge detector.

%% Edge Detection With new thresholds

%Applying Sobel edge detection with new threshod

sobel_edge_new = edge(I,’sobel’, 0.1);

%Applying log (Laplacian of Gaussian) edge detection with new threshod

log_edge_new = edge(I,’log’,0.0055);

%Applying canny edge detection with new threshod

canny_edge_new = edge(I,’canny’,0.18);

%New Figure Window and Displaying the MATLAB thresholded Sobel image and the

%one with new threshold

figure (‘Name’,’Sobel vs Sobel’);

subplot (1,2,1);imshow(sobel_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(sobel_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded LOG image and the

%one with new threshold

figure (‘Name’,’LoG vs LoG’);

subplot (1,2,1);imshow(log_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(log_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded Canny image and the

%one with new threshold

figure (‘Name’,’Canny vs Canny’);

subplot (1,2,1);imshow(canny_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(canny_edge);title(‘With MATLAB calculated Threshold’);

d) Without using any MATLAB filtering functions, implement a Sobel edge detector.

It is borne in mind; the new code of the Sobel edge detection is given below. From this argument, I have developed my personal convolution function to perform convolution with the new code of Sobel filtering and convolution filters as follows.

%% OWN Developed Sobel Edge Detection

%Converting the image matrix to double precision data type

I = double(I);

% The Horizontal Sobel Operator

Hx = [-1,-2,-1;0,0,0;1,2,1];

%The Vertical Sobel Operator which is the Transpose of Horizontal Operator

Hy = Hx’;

%Convolving Image and Horizontal Sobel Operator using my own convolution

%function

Ix = my_conv(I,Hx);

%Convolving Image and Vertical Sobel Operator using my own convolution

%function

Iy = my_conv(I,Hy);

%Final Result of Sobel Operation is obtained by combining the results of

%above two convolutions.

S = sqrt(Ix.^2 + Iy.^2);

%Converting the result to uint8 data class.

S = uint8(S);

%Applying Threshold to obtain the Black and White image after Sobel

%Operation

Sbw = im2bw(S,0.6);

%Creating New Figure

figure(‘Name’,’Sobel Edge Detection’);

%Displaying Image Obtained from MATLAB sobel Edge Detection

subplot 121; imshow(sobel_edge); title(‘Sobel Edge MATLAB’);

%Displaying Image Obtained from my own developed method of sobel of Sobel

%Edge Detection

subplot 122; imshow(Sbw); title(‘Own Method after thresholding’);

 

The convolution function being used in above code is given below. It is vital to note that, the code for the convolution is only applicable for 3*3 filter mask.

function Y = my_conv(X,W)

%This function convolves the input matrix X with the input mask W where X

%can be of any size while W is of size 3×3

%Padding Zeros along all four boundaries of the image X in-order to get it

%convolved by mask of 3×3. So two rows (above and below) and two columns

%(left and right) consisting of zeros have been padded with the matrix X

X = padd_zero(X);

%Calculate the new size of matrix X

[m,n]=size(X);

%The Output matrix X should have two rows and two columns less than the

%new size of matrix X, that’s why creating matrix of zeros of this size.

Y = zeros(m-2,n-2);

%Start of For Loop for rows

for i = 2:m-1

for j = 2:n-1%Start of For Loop for columns

%Multiplying X(i,j) with the Mask W(n)

tmp=[W(1)*X(i-1,j-1),W(2)*X(i,j-1),W(3)*X(i+1,j-1),W(4)*X(i-1,j),W(5)*X(i,j),W(6)*X(i+1,j),W(7)*X(i-1,j+1),W(8)*X(i,j+1),W(9)*X(i+1,j+1)];

Y(i-1,j-1)=sum(tmp);%Calculating Sum and hence the result of convolution at this point

end %End of Loop Columns

end %End of Loop Rows

 

The results obtained are shown in the figure below comparing with MATLAB generated Sobel edge detected image.

 

e) Compare the Sobel filtered image from d) and that of the image from a). Are they the same? If not, why?

Generally, the above code for implementing segmentation was written in MATLAB. In this case, the initial threshold that was equal to the average of the minimum and maximum values of the input image was taken. Eventually, the initial threshold was set to be 127.5 as the midpoint of max and the min. The code for calculating appropriate threshold value T becomes equal to 0; T0=0. The loop image was segmented in two portions whereby, one had a greater and equal pixels and threshold respectively while the other consisted of pixels less that the threshold. Thereafter, the mean intensities of the region were calculated to find the new threshold. This was used to check the difference of the previous and the new threshold set of calculation in loop. The following results were observed:

  1. The loop took three iterations when the differences between the new and threshold became zero.
  2. The initial threshold selected was 127.50
  3. The final threshold calculated was 125.4018

With this regard, the new threshold calculated is used for segmentation of the image “img07.jpg” using MATLAB Function “im2bw”. It is vital to note that, the new threshold calculated should be first normalized since, the valid input range for thresholds range from 0 to 1 obtained by dividing the threshold value by the maximum pixel intensity 255. The results achieved by threshold and the code are as shown below.

Image segmentation

As the name suggests, image segmentation divides the image into two or more than two groups or segments. Image segmentation ensures that, the resulted segmented image is easy to understand. In the second question in this assignment, we will discuss technique of image segmentation and show the applicability of the resultant image. Specifically, we will discuss how threshold acts as basic building block for image segmentation process.

Initial Threshold

Initial Threshold is used to perform binary segmentation that occur when pixels in an image is white or pure black. In cases when the image is grey, the pixel values vary from 0 to 255.  In order to divide an image into segments, two extreme values 0 and 255 are put into consideration. In cases of gray scales, the pixel value is 128 though it is not a good threshold initialization. Hence, the best way to initialize the threshold is calculating accurate minimum and maximum gray sale image. In this case, the values are obtained using max (max IM) and Min (Min (Im)) operators that turns to be 29 and 224; minimum and maximum respectively. Therefore, the arithmetic mean of the two values and the initial threshold results to 136.5.

 

 

Grouping

By using the initial threshold, the image is divided into two groups G1 and G2. G1 is divided by having pixel values above the threshold while G2 by lower pixel values and equal threshold values. The average intensity values of U1 and U2 for groups G1 and G2 is calculated by:

T=0.5* (u1 +u2) where T is the new threshold. Thereafter, threshold and grouping is performed by the new value of threshold until a predefined constant is obtained.

Applying the Threshold

When the iterative process stops, threshold is used to perform binary segmentation that entails assigning pure black values below and pure white pixel values above. The following are the input image and the binary segmented image. At this point, we can see how the segmentation has made image crisp and separated finger prints from the background.

%% Image Segmentation

%Reading input image

I = double(imread(‘img07.jpg’));

%Calculating initial estimated threshold

T = (max(I(:))+min(I(:)))/2;

i = 0; %Just to check the number of iterations it takes ‘T0’ to become zero

%Assigning any random value other than zero

T0 = T;

%Start of While Loop-Should continue if T0 is not zero

while (~(T0==0))

tmp = I>=T;%Logical matrix: tmp(x,y) will be 1 if I(x,y)>= T else zero

u1 = mean(I(tmp));%Taking Average of all the values of I(x,y)>=T

tmp = not(tmp);%Previously tmp(x,y) was 1 for I(x,y)>=T, a logical not will change the inequality and so tmp(x,y) will be 1 for I(x,y)<T

u2 = mean(I(tmp));%Taking Average of all the values of I(x,y)<T

T_new = (u1+u2)/2;%Finding new approximate value for threshold

T0 = abs(T_new-T);%Difference of new and old threshold

T = T_new;%Assigning new threshold value

i = i+1;%Just counting the number of iterations which is found to be 3

end

%End of While Loop

%Threshold to be used in the calculation for im2bw as the value for the

%threshold to be input to the “im2bw” function should lie between 0 and 1

t = T/255;

%Converting the image to uint8 class of data

I = uint8(I);

%Converting image I to black and white image using threshold ‘t’

B = im2bw(I,t);

%New figure

figure(‘Name’,’Threshold and Segmentation’);

%Displaying the original image and the thresholded black and white image.

imshow(I);title(‘Original Image’);

figure;

imshow(B);title(‘Black & White Image with calculated threshold’);

 

 

 

 

 

 

 

 

 

 

 

 

References

Canny, L.G. (2002). Edge Detection:

http://www.cs.ucf.edu/courses/cap6411/cap5415/spring02/Lecture-7-h.pdf

Fisher, S. R., Walker, A., & Wolfart, E. (2003). Spatial Filters. Laplician/ Laplacian of     Gaussian: http://homepages.inf.ed.ac.uk/rbf/HIPR2/log.htm

Rafael C. G, & Richard E. W.  (2002). Digital Image Processing, Second Edition. New York:       Prentice Hall

Raman, M., & Dr. Himanshu. A. (2003).Study and Comparison of Various Image Edge   Detection Techniques. International Journal of Image Processing (IJIP) 3, 1

 

 

 

 

 

 

 

 

 

 

 

Image Processing

Name

Institution

 

 

 

 

 

 

 

 

Edge Detection Using function “edge”

            It is documented that, MATLAB is supported by the function “edge” detection of an image in addition, and different methods develop for edge detection can also be used (Fisher, Walker & Wolfart, 2003). Therefore, one can opt for the best method depending on the application. In this case, MATLAB edge detection method is applied to study the behavior of three edge detection methods namely Sobel, LOG, and Canny edge detection. The code that used for implementing the edge detection methods using MALTLAB edge function and the results achieved are as indicated below.

q1-1a

 

q1-1b

 

 

 

%% Edge Detection using different Methods supported by MATLAB edge function

%Reading Input Image

I = imread (‘img06.tif’);

%applying Sobel edge detection and recording the value of threshold applied

%by MATLAB

[sobel_edge, th_sob] = edge (I,’sobel’);

%applying log (Laplacian of Gaussian) edge detection and recording the value

%of threshold applied by MATLAB

[log_edge,th_log] = edge (I,’log’);

%Applying canny edge detection and recording the value of threshold applied

%by MATLAB

[canny_edge,th_cany] = edge(I,’ canny’);

%Displaying the Original image and result of edge detection using three

% different methods.

Figure (‘Name’,’Edge Detection’);

Subplot 121;

imshow (I);title(‘Original Image’);

Subplot 122;

imshow (sobel_edge);title(‘Sobel Edge Detection’);

Figure;

Subplot 121;

imshow (log edge);title(‘Laplacian of Gaussian (LOG) Edge Detection’);

subplot 122;

imshow (canny edge);title(‘Canny Edge Detection’);

 

1.      Give the algorithms of these three edge methods

In brief, we shall discuss three edge detection methods supported by MATLAB in addition, discuss the advantages and disadvantages of working algorithm. The three edge detections are:

1.      Sobel Edge Detection

2.      LOG (Laplacian of Gaussian ) Edge Detection

3.      Canny Edge Detection

 

Sobel Edge Detection

            Basically, this method calculates the gradient of image pixel that eventually gives direction of any largest increment from lighter darker regions. Additionally, it gives rate changes of direction. Therefore, this indicates how rapidly or smoothly images pixel values changes and how likely a may result to as edge. Mathematically, the gradient of a point in two dimension signal like image is a vector of the two components; vertical and horizontal calculated by derivates in horizontal and vertical directions.  At any point, the gradient vector points toward the direction of an increase of maximum intensity. With this in mind, the gradient with regions with the constant pixel or intensity image is zero, while for any point at the edge the gradient vector point across the edge from darker to brighter region (Canny, 2002).

            To calculate the gradient at any point, the horizontal and vertical components are calculated. When calculating horizontal and vertical components of the gradient field the following and  are used respectively as indicated below.

 

 

            Fundamentally, Gx and Gy bestow horizontal and vertical components of the gradient of the image. The gradient magnitude can be calculated as follows.  

The gradient direction at any point is calculated as follows.

 

LOG (Laplacian of Gaussian) Edge Detection

            As the name suggests, LOG (Laplacian of Gaussian) edge detection is the combination of two filters; Laplican and Gaussian. In brief, when discussing the algorithm of LOG edge detection it important to note that, the Laplacian of an image I ( x, y) is given by:

Eqn:eqnlog1

Given that the input image is represented as the set of discrete pixels, one has to find the pixel convolution kernel to derive to the definition of the Laplican Operator. The discrete Laplacian operators can alternatively be defined by the arithmetic signs (Rafael & Richard, 2002).

 

 Steps for LOG edge detection

The following steps need to be followed for the detection using LOG method (Raman & Dr. Himanshu, 2003).

1.      Generate LOG mask

2.      Apply mask in the input image

3.      Scanning each row by looking at zero-crossing to detect edges.

4.      Scanning each column by looking at zero-crossing to detect edges

Canny Edge Detection

Canny Edge Detection is said to be the most complex and optimal algorithm to detect edges of an image. First, a smoothing filter is applied to the input image to filter noise in the image. Mostly, a Gaussian filter is convolved at the image to filter noise. Once the image is filtered from noise, some gradient operators are applied on the smoothed image to find the gradient of the image. For example, a Sobel operator is convolved by the smoothed image to give absolute value for each pixel gradient location. Thereafter, gradient direction is computed by the gradient in the x and y direction given by the formula.

    In this case, Gy and Gx are gradients of Y and x direction respectively. Whether the edge is horizontal or vertical, positive or negative diagonal, the direction of the gradient is determined upon theta values of 0, 45, 90, and 135 degrees (  ).

2.      Compare the performance, advantages and disadvantages

Method

Advantages

Disadvantages

Sobel

It is the simplest in terms of complexity, time, computation, and orientations

There is no Y junction problem   

Lack of accuracy in term of edge detection

Very sensitive to noise

LOG

Accurate in finding places for edges

Wider area of testing pixel

Lack of Y junction ;problem

 

Fails to find orientation of edge.

Canny

Have  better detection

Precise in noise suppression

Use two thresholds thus, making it more flexible to edge detection

Helpful in removing ineffective information  

 

Time consuming

Problems in Y junction

Intensive computationally.

 

3.      Determinate the suitable thresholds for “img06” to bring out the principal features and reduce irrelevant details.

      To eliminate unwanted details and preserve the main edges, thresholds needs are changed. Through default, MATLAB chooses threshold (Raman & Dr. Himanshu, 2003). With this regard, the value for threshold edge detection for every method is another output variable that is introduced and as a result, MATLAB stores value of the threshold to variable and black and white detected edge images. Though the threshold leaves some irreverent information, the threshold used by MATLAB is 0.0738. With the new threshold of 0.1 the following results were obtained as shown below. It is important to note that, increasing threshold by a certain range does not only removes unwanted information but, affects main edges of input image in addition; inexact threshold can slide in the small range. In this context, a 0.0002 threshold has been found to be the the LOG operator for calculating edges of MATLAB with the new threshold being 0.0055. With this in mind, the results are shown in the following figures. One can articulate that, a lower threshold of 0.0188 and the upper threshold of 0.0469 is applied by MATLAB canny edge detector. In this context, the new upper threshold is 0.18 whereby, the MATLAB opt for lower threshold of the input upper threshold given by the following equation; Lower threshold= Upper threshold *0.4. The results of the new threshold are given below:

q1-c-1

 q1-c-2

 q1-c-3

 

 The code that generate the above images is:

%% Edge Detection With new thresholds

%Applying Sobel edge detection with new threshod

sobel_edge_new = edge(I,’sobel’, 0.1);

%Applying log (Laplacian of Gaussian) edge detection with new threshod

log_edge_new = edge(I,’log’,0.0055);

%Applying canny edge detection with new threshod

canny_edge_new = edge(I,’canny’,0.18);

%New Figure Window and Displaying the MATLAB thresholded Sobel image and the

%one with new threshold

figure (‘Name’,’Sobel vs Sobel’);

subplot (1,2,1);imshow(sobel_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(sobel_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded LOG image and the

%one with new threshold

figure (‘Name’,’LoG vs LoG’);

subplot (1,2,1);imshow(log_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(log_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded Canny image and the

%one with new threshold

figure (‘Name’,’Canny vs Canny’);

subplot (1,2,1);imshow(canny_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(canny_edge);title(‘With MATLAB calculated Threshold’);

 

d) Without using any MATLAB filtering functions, implement a sobel edge detector.

%% Edge Detection With new thresholds

%Applying Sobel edge detection with new threshod

sobel_edge_new = edge(I,’sobel’, 0.1);

%Applying log (Laplacian of Gaussian) edge detection with new threshod

log_edge_new = edge(I,’log’,0.0055);

%Applying canny edge detection with new threshod

canny_edge_new = edge(I,’canny’,0.18);

%New Figure Window and Displaying the MATLAB thresholded Sobel image and the

%one with new threshold

figure (‘Name’,’Sobel vs Sobel’);

subplot (1,2,1);imshow(sobel_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(sobel_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded LOG image and the

%one with new threshold

figure (‘Name’,’LoG vs LoG’);

subplot (1,2,1);imshow(log_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(log_edge);title(‘With MATLAB calculated Threshold’);

%New Figure Window and Displaying the MATLAB thresholded Canny image and the

%one with new threshold

figure (‘Name’,’Canny vs Canny’);

subplot (1,2,1);imshow(canny_edge_new);title(‘After New Threshold Applied’);

subplot (1,2,2);imshow(canny_edge);title(‘With MATLAB calculated Threshold’);

d) Without using any MATLAB filtering functions, implement a Sobel edge detector.

It is borne in mind; the new code of the Sobel edge detection is given below. From this argument, I have developed my personal convolution function to perform convolution with the new code of Sobel filtering and convolution filters as follows.

 %% OWN Developed Sobel Edge Detection

%Converting the image matrix to double precision data type

I = double(I);

% The Horizontal Sobel Operator

Hx = [-1,-2,-1;0,0,0;1,2,1];

%The Vertical Sobel Operator which is the Transpose of Horizontal Operator

Hy = Hx’;

%Convolving Image and Horizontal Sobel Operator using my own convolution

%function

Ix = my_conv(I,Hx);

%Convolving Image and Vertical Sobel Operator using my own convolution

%function

Iy = my_conv(I,Hy);

%Final Result of Sobel Operation is obtained by combining the results of

%above two convolutions.

S = sqrt(Ix.^2 + Iy.^2);

%Converting the result to uint8 data class.

S = uint8(S);

%Applying Threshold to obtain the Black and White image after Sobel

%Operation

Sbw = im2bw(S,0.6);

%Creating New Figure

figure(‘Name’,’Sobel Edge Detection’);

%Displaying Image Obtained from MATLAB sobel Edge Detection

subplot 121; imshow(sobel_edge); title(‘Sobel Edge MATLAB’);

%Displaying Image Obtained from my own developed method of sobel of Sobel

%Edge Detection

subplot 122; imshow(Sbw); title(‘Own Method after thresholding’);

 

The convolution function being used in above code is given below. It is vital to note that, the code for the convolution is only applicable for 3*3 filter mask.

function Y = my_conv(X,W)

%This function convolves the input matrix X with the input mask W where X

%can be of any size while W is of size 3×3

%Padding Zeros along all four boundaries of the image X in-order to get it

%convolved by mask of 3×3. So two rows (above and below) and two columns

%(left and right) consisting of zeros have been padded with the matrix X

X = padd_zero(X);

%Calculate the new size of matrix X

[m,n]=size(X);

%The Output matrix X should have two rows and two columns less than the

%new size of matrix X, that’s why creating matrix of zeros of this size.

Y = zeros(m-2,n-2);

%Start of For Loop for rows

for i = 2:m-1

    for j = 2:n-1%Start of For Loop for columns

        %Multiplying X(i,j) with the Mask W(n)

        tmp=[W(1)*X(i-1,j-1),W(2)*X(i,j-1),W(3)*X(i+1,j-1),W(4)*X(i-1,j),W(5)*X(i,j),W(6)*X(i+1,j),W(7)*X(i-1,j+1),W(8)*X(i,j+1),W(9)*X(i+1,j+1)];

        Y(i-1,j-1)=sum(tmp);%Calculating Sum and hence the result of convolution at this point

    end %End of Loop Columns

end %End of Loop Rows

 

The results obtained are shown in the figure below comparing with MATLAB generated Sobel edge detected image.

 

q1-d-1

e) Compare the Sobel filtered image from d) and that of the image from a). Are they the same? If not, why?

Generally, the above code for implementing segmentation was written in MATLAB. In this case, the initial threshold that was equal to the average of the minimum and maximum values of the input image was taken. Eventually, the initial threshold was set to be 127.5 as the midpoint of max and the min. The code for calculating appropriate threshold value T becomes equal to 0; T0=0. The loop image was segmented in two portions whereby, one had a greater and equal pixels and threshold respectively while the other consisted of pixels less that the threshold. Thereafter, the mean intensities of the region were calculated to find the new threshold. This was used to check the difference of the previous and the new threshold set of calculation in loop. The following results were observed:

1.      The loop took three iterations when the differences between the new and threshold became zero.

2.      The initial threshold selected was 127.50

3.      The final threshold calculated was 125.4018

            With this regard, the new threshold calculated is used for segmentation of the image “img07.jpg” using MATLAB Function “im2bw”. It is vital to note that, the new threshold calculated should be first normalized since, the valid input range for thresholds range from 0 to 1 obtained by dividing the threshold value by the maximum pixel intensity 255. The results achieved by threshold and the code are as shown below.

Image segmentation

As the name suggests, image segmentation divides the image into two or more than two groups or segments. Image segmentation ensures that, the resulted segmented image is easy to understand. In the second question in this assignment, we will discuss technique of image segmentation and show the applicability of the resultant image. Specifically, we will discuss how threshold acts as basic building block for image segmentation process.

 Initial Threshold

Initial Threshold is used to perform binary segmentation that occur when pixels in an image is white or pure black. In cases when the image is grey, the pixel values vary from 0 to 255.  In order to divide an image into segments, two extreme values 0 and 255 are put into consideration. In cases of gray scales, the pixel value is 128 though it is not a good threshold initialization. Hence, the best way to initialize the threshold is calculating accurate minimum and maximum gray sale image. In this case, the values are obtained using max (max IM) and Min (Min (Im)) operators that turns to be 29 and 224; minimum and maximum respectively. Therefore, the arithmetic mean of the two values and the initial threshold results to 136.5.

 

 

Grouping

By using the initial threshold, the image is divided into two groups G1 and G2. G1 is divided by having pixel values above the threshold while G2 by lower pixel values and equal threshold values. The average intensity values of U1 and U2 for groups G1 and G2 is calculated by:

T=0.5* (u1 +u2) where T is the new threshold. Thereafter, threshold and grouping is performed by the new value of threshold until a predefined constant is obtained.

 Applying the Threshold

When the iterative process stops, threshold is used to perform binary segmentation that entails assigning pure black values below and pure white pixel values above. The following are the input image and the binary segmented image. At this point, we can see how the segmentation has made image crisp and separated finger prints from the background.

%% Image Segmentation

%Reading input image

I = double(imread(‘img07.jpg’));

%Calculating initial estimated threshold

T = (max(I(:))+min(I(:)))/2;

i = 0; %Just to check the number of iterations it takes ‘T0’ to become zero

%Assigning any random value other than zero

T0 = T;

%Start of While Loop-Should continue if T0 is not zero

while (~(T0==0))

    tmp = I>=T;%Logical matrix: tmp(x,y) will be 1 if I(x,y)>= T else zero

    u1 = mean(I(tmp));%Taking Average of all the values of I(x,y)>=T

    tmp = not(tmp);%Previously tmp(x,y) was 1 for I(x,y)>=T, a logical not will change the inequality and so tmp(x,y) will be 1 for I(x,y)<T

    u2 = mean(I(tmp));%Taking Average of all the values of I(x,y)<T

    T_new = (u1+u2)/2;%Finding new approximate value for threshold

    T0 = abs(T_new-T);%Difference of new and old threshold

    T = T_new;%Assigning new threshold value

    i = i+1;%Just counting the number of iterations which is found to be 3

end

%End of While Loop

%Threshold to be used in the calculation for im2bw as the value for the

%threshold to be input to the “im2bw” function should lie between 0 and 1

t = T/255;

%Converting the image to uint8 class of data

I = uint8(I);

%Converting image I to black and white image using threshold ‘t’

B = im2bw(I,t);

%New figure

figure(‘Name’,’Threshold and Segmentation’);

%Displaying the original image and the thresholded black and white image.

imshow(I);title(‘Original Image’);

figure;

imshow(B);title(‘Black & White Image with calculated threshold’);

 

q2b

q2a

 

 

 

 

 

 

 

 

 

 

 

 

References

Canny, L.G. (2002). Edge Detection:

            http://www.cs.ucf.edu/courses/cap6411/cap5415/spring02/Lecture-7-h.pdf

 Fisher, S. R., Walker, A., & Wolfart, E. (2003). Spatial Filters. Laplician/ Laplacian of     Gaussian: http://homepages.inf.ed.ac.uk/rbf/HIPR2/log.htm

Rafael C. G, & Richard E. W.  (2002). Digital Image Processing, Second Edition. New York:       Prentice Hall

 Raman, M., & Dr. Himanshu. A. (2003).Study and Comparison of Various Image Edge   Detection Techniques. International Journal of Image Processing (IJIP) 3, 1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]

Civil Rights Movement from WWII Until 1968

Name

Course

Course Instructor

Date

Civil Rights Movement from WWII Until 1968

Many people today refer to the civil rights era as the period between 1950s and 1970s. However, this is but a glimpse of the historical context of the civil rights era. By the early-19th Century, the presence of civil rights movements was already felt in America. This was mainly in the form of the struggle for racial equality, which was experienced during this era. Therefore, the civil rights movements witnessed in the mid-19th Century are a continuation of the struggle for equality, which had begun in the early 19th Century and even earlier than that. Nonetheless, the civil rights movement comprised various African-Americans, who led in the struggle for racial equality, since the blacks in America were entitled to less privileges compared to the whites. This essay focuses on the civil rights movement from WWII until 1968, this therefore, is the period between 1938-1968, with special attention on major events, which indicate struggle for racial equality by African-Americans, and whether they won or lost in their different struggles for equality.

Although the Civil Rights Movement is associated with the African Americans only, this was important for both African Americans and the whites. After the civil war, which was detrimental to America, the country was left with many national issues to address in order to ensure stability of the nation and its people.  It was during this period, after the civil war, which is also called the reconstruction period that major civil rights movement were experienced. During this era, America had a considerable number of its population comprising African Americans. These were former slaves, who upon being freed, needed to find land, build homes, settle down, and live a free life, like any other white person. Therefore, the American governments had a responsibility of addressing the needs of the former slaves in order to ensure there entry back into the society, as free people. However, when the government failed to address the issues of the African Americans in a fair way, these would rise up and demand for fair treatment and fair legislation, which did not deny them of the privileges the whites were entitled to. Therefore, this continued struggle for racial equality is what gave birth to the modern civil rights movement.

Before the WWII, the American government, starting the late 19th Century, had used the legislation to enable the integration of African Americans back in the society as free people. Although the government based its decisions and legislation on the doctrine of “separate but equal,” there were vast elements of racial discrimination, as the African Americans were not free to share public space or enjoy the privileges of same legislation with the whites. Public places and amenities such as restaurants, schools, bus and railroad stages, among others, were separated between the whites and African Americans. Facilities belonging to African Americans were of poor quality, and inferior, compared to those of whites. This was one of the situations, which would result in the civil rights movement.

In 1938, one major incidence that showed struggle for equal rights was experienced in one of the Southern states. In these states, there was a high level of inequality of the African Americans, compared to other states. Southern states did not allow for the admission of African Americans in institutions of higher learning, but referred them to institutions of higher learning in the northern states. However, in 1938, one African American student, who was denied admission to the University of Missouri Law School, filed a case in court, since he wanted Law in this particular university, as others did not offer law. Nonetheless, the courts ruled that the student be admitted in the university. This is one of the incidences, which portray the struggle of African Americans to gain equal opportunities with the whites in America.

During the WWII, African Americans were still discriminated against, and treated unequally, based on their race. In 1943, when the WWII was ongoing, there occurred the Detroit race riots, where 25 African Americans died. These riots mainly involved attacks between the whites and blacks. In addition, many African Americans were forced to take up different tasks, including construction, and transport, among others, where they worked in segregation from the mainstream population. It was also during this period that African Americans were forced to give up railroad care sears to the Nazi Prisoners of War. In addition, African Americans were denied their right to the GI Bill, which comprised benefits for those people who served in war. This is because local authorities at that time were even driven by racial discrimination. In Middle Tennessee State University (MTSU), there was no black student admitted, until in 1962, when one Olivia Woods was admitted. In 1944, Gunnar Myrdal published An American Dilemma: The Negro Problem and Modern Democracy, which explained race relations. In this book, Myrdal showed optimism that democracy would rule over racism. Nonetheless, in future, this was used as a basis for development of policies, which addressed racism.

In 1944, there was the enaction of “The Economic Bill of Rights,” which would grant equal rights to all American population. This was emphasised by Roosevelt, who also participated in drafting the “Universal Declaration of Human Rights,” in a UN committee. However, acts of racial discrimination persisted even after these two legislations. A major incidence occurred in 1955 when a 14-year old black in Mississippi was murdered when he whistled at white women.

To act on discrimination, which had become elaborate, Rosa Parks in 1955-56 led the Montgomery Bus Boycott, to act against discrimination on transport, and buses. This event saw the rise of Martin Luther King, Jr. as a leader in the civil rights movement. This led to the Supreme Court to rule against segregation. However, most Southern congressmen in 1956 signed the “Southern Manifesto,” which showed their opposition to desegregation. Nonetheless, Martin Luther King in 1957, formed the Southern Christian Leadership Conference (SCLC), an African American civil rights organization, which adopted non-violence to resist racial discrimination.

Additionally, in 1960, students in Greensboro, NC formed student resistance to discrimination against blacks. This spread to other cities, including Nashville. In the film “Ain’t Scared of your Jails,” students in Nashville, Tennessee, are shown to employ the non-violence resistance to discrimination, and engaged in a wave of demonstrations, following their arrest. In the same year, students formed the Student Non-Violent Coordinating Committee (SNCC), which was a student branch of the larger non-violent activists’ body.  In 1961, the Congress of Racial Equality (CORE) launched “freedom rides” to act against segregation in buses and bus terminals.

Further struggle by Martin Luther King (MLK), is evident in the 1963 Birmingham marches, which later turned violent, leading to the arrest and jailing of MLK. He wrote “Letter from Birmingham’ in the same year. Most whites in Southern states were opposed to desegregation. In 1963, Alabama Governor showed his opposition to a move to desegregate the University of Alabama. Nonetheless, in June the same year, President Kennedy called for the nation to embrace civil rights legislation. However, in the same night, a member of the Klu Klux Klan (KKK) murdered Medgar Evers, an African-American activist. Evers pushed for desegregation at the University of Mississippi. Nonetheless, his death resulted in increased actions by civil rights movements, including films, music, and works of art, which protested against increased violence for the blacks.

The year 1963 was an important year in the civil rights movements, as this year saw increased cases of violence and discrimination aimed at blacks. In August, activists marched to Washington, led by Philip Randolph, but organized by Bayard Rustin. It was on this day in Washington, when MLK delivered his “I Have a Dream” speech. The documentary “Four Little Girls” was inspired by the death of four small girls in the basement of a Birmingham church, due to an explosion that was aimed at African-Americans. Finally, in November 1963, the assassination of President John f. Kennedy happened.

In 1964, Congress passed the Civil Rights Act, meant to end segregation in America. In the same year, SNCC and CORE organized the Mississippi Freedom Summer, which was an election campaign attended by both white and black activists. The following year, MLK lead close to 8,000 nonviolent demonstrators in the Selma to Montgomery March, in a voting rights campaign, where the SNCC and SCLC also participated. This march was successful as the Congress passed Voting Rights Act in the same year, which would eliminate all discriminations against black voting. This was a success for the nonviolent activists. However, discrimination and violence against blacks persisted, and in 1968, MLK was also assassinated in Memphis, Tennessee. This was quite a blow to nonviolent activists, since MLK played a great role in the civil rights movement. Nonetheless, even after the assassination of MLK, the struggle for equality for the African-Americans continued in the years that followed.

 

Use the order calculator below and get started! Contact our live support team for any assistance or inquiry.

[order_calculator]