Thursday, April 4, 2019
Risk-based Access Control Model for the Internet of Things
find of exposure- found entrance fee Control Model for the mesh of Things growing an adaptative Risk- found appendage come across archetype for the Internet of ThingsH apiece F. Atlam a, c Gary B. Wills a, Robert J. Walters a, Joshua Daniel ca electronic and calculator Science Dept., University of Southampton, UKb Security Futures Practice, BT Research Innovation, Ipswich, UKc Computer Science and Engineering Dept., Faculty of Electronic Engineering, Menoufia University, EgyptAbstract The Internet of Things (IoT) is creating a revolution in the number of connected devices. Cisco reported that on that point were 25 billion IoT devices in 2015 and modest estimation that this number leave al close to double by 2020. Society has become dependent on these billions of devices, devices that argon connected and communicating with individually other all(prenominal) the measure with reading constantly shargon between drug drug drug users, services, and meshwork proffer rs.The emergent IoT devices as a technology be creating a huge credentials rift between users and usability, sacrificing usability for hostage created a number of major answers. First, IoT devices are classified under Bring Your Own Device (BYOD) that blows any organization credentials limitation and project them a target for espionage or tracking. Second, the size of the selective knowledge generated from IoT makes big information problems pale in comparison not to mention IoT devices lead a real-time response. Third, is incorporating secure feeler and sway for IoT devices ranging from adjoin nodes devices to industriousness take (business intelligence reporting tools) is a challenge because it has to account for several hardware and application levels. Establishing a secure gravelion realise mock up between different IoT devices and services is a major milestone for the IoT. This is authorised because entropy leakage and illegitimate ingress to data conc ord a utmost strike on our IoT devices. However, traditional entre work models with the static and rigid infrastructure potbellynot run the undeniable security for the IoT infrastructure.Therefore, this paper notifys a jeopardize-establish rile control model for IoT technology that takes into account real-time data information prayer for IoT devices and gives propulsive feedback. The proposed model uses IoT environs features to estimate the security jeopardize associated with individually rag quest apply user stage setting, election sensitivity, fulfill severity and put on the line archives as arousals for security run a take chances estimation algorithm that is responsible for plan of attack decision. Then the proposed model uses pain contracts to provide reconciling features in which the user deportment is monitored to take note any abnormal actions from important users.Keywords Security, Internet of Things, Risk, ingress control, Adaptive, circ umstance.The Internet of Things (IoT) is growing in different ways. The adoption rate of the IoT is at least five times fast-paced than the adoption of electricity and telephony 1. Moreover, it is becoming the backbone of the future of the Internet that encompasses various applications and devices. The IoT devices are link employ different communication technologies such(prenominal) as wireless, wired and mobile networks 2.The concept of the IoT was first mentioned by Kevin Ashton in 1999 3. He has said, The Internet of Things has the potential to change the world, just as the Internet did. Maybe dismantle more so. Later, the IoT was formally pre displaceed by the International Telecommunication Union (ITU) in 2005 4. The ITU defines the IoT as a ball-shaped infrastructure for the Information Society, enabling advanced services by interconnecting (physical and virtual) things based on, existing and evolving, interoperable information and communication technologies5.The IoT face s many challenges that stand as a barrier to the successful execution of instrument of IoT applications. The security is considered the most difficult challenge that postulate to be addressed. This challenge is more complicated due to the dynamic and complex nature of the IoT system 6, 7. Authentication and main course control models are the essential elements to address the security issue in the IoT. They can prevent un clear users from gaining entre to system preferences, prevent authorized users from entrying resources in an unauthorized manner and allow authorized users to admission price resources in an authorized manner 8, 9.The briny purpose of the access control is to reject unauthorized users and limit summonss of authorized users using a certain device. In addition, it tries to prevent the activity that could cause a security br for each one 7. A powerful access control model should satisfy security requirements of confidentiality, integrity, and availability 10. T raditional access control addresses are static in nature as they depend on preoutlined policies that always give the same payoff regardless of the event. They are context insensitive. Furthermore, they require a rigid authentication infrastructure 11, 12. So they cannot provide for distributed and dynamic environment as the IoT systems 13. propellant access control appeales are more appropriate to the IoT. This is because they are characterized by using not only the policies but also environment features that are estimated in real-time to determine access decisions. The dynamic features can include trust, endangerment, context, level and operational need 14, 15.This paper presents an reconciling attempt-based access control model for the IoT. This model can dynamically estimate the security guess associated with each access request to make the access decision. It uses real-time user context attributes, resource sensitivity, action severity and fortune record as inputs to estimate the security try value of each access request. In addition, the user appearance is monitored to detect any abnormal misuse.This paper will start by discussing concepts of access control in the IoT in section II function III presents access control challenges in the IoT Section IV introduces different access control models Section V discusses the concept of seek-based access control model Section VI presents the proposed model Section VII illustrates the subroutine flow of the proposed model Section VIII presents the colligate to works, and Section IX is the conclusionThe IoT devices send and receive a variety of information about possessors sort. Therefore, it is important to protect not only the communication process between IoT devices but also authentication and access control of IoT devices 16. The access control process works with many layers of the IoT reference model that is shown in determine 1. The control process flows from top to down. Therefore, the access control works with different data whether at storage, at motion, or at IoT device itself. Therefore, the access control is a big issue in the IoT that need addressing.Fig. 1. The IoT reference model 16The main function of access control is to grant access rights only to authorized users. Also, it prevents authorized users from accessing system resources in an unauthorized manner 7. A powerful access control model should fulfill security demands of confidentiality, integrity, and availability 10. In the IoT, the access control is required to ensure that only authorized users can update device software, access sensor data or command the actuators to perform an operation 17. There are three ways to implement access control in the IoT systems centralized, centralized and contextual, and distributed 18.In the centralized approach, the access control logic is enforced at a central entity. This entity could be a server with direct communication to IoT devices that it commands or another entity in a different location. Therefore, IoT devices send their data to the central entity that is responsible for make access control decisions 18.In the centralized and contextual approach, IoT devices are not completely passive entities this is because they participate in the access control decisions. The access control logic is implemented at a central entity as in centralized approach, but the contextual features from IoT devices are sent to the central entity. These features are utilize to make access decisions 18.In the distributed approach, all the access control logic is embedded into IoT devices. These devices are being provided with necessary resources to process and send information to other services and devices. Therefore, IoT devices take over to shed the ability to perform the authorization process without the need for a central entity 18.Due to the distributed and dynamic nature of the IoT, on that point are many challenges that should be addressed wh en implementing an access control model. These requirements includeInteroperability with six-fold users Access control policies should be designed to support multiple organizations. For instance, each organization creates its own policies and compliments other collaborating organizations policies 24.Dynamic interaction Access control policies should be predictable and specified in a dynamic and continuous way by considering context changing during the access control process 25.Context awareness The context is considered one of the core features since it enables intelligent interactions between users and IoT devices. Using the context will make access decisions dynamically determined based on surrounding environment features 17.Usability The access control model should be easily administrated, expressed and modified. It also should provide suitable easy to use interfaces for both(prenominal) consumers and devices postulate 26.Limited resources The resources associated with IoT de vices such as energy, memory, and processing power are limited due to devices lightweight. Therefore, the access control model designed for the loT should support efficient solutions 17.Scalability The IoT connects billions of devices. The access control model should be protrusible in size, structure, and number of devices 17.Delegation of authority In many IoT scenarios, there are many devices that are operating on behalf of a user and other scenarios where a device may operate on a third partys behalf for a specific period of time. The access control model should implement commission of authority to provide more usability and flexibility to the IoT system 24.Auditability Any and every access control take to be auditable. Hence, collection and storage of evidence necessary for context awareness. This becomes a challenge when utilizing a distributed approach 17.To ensure confidentiality and integrity of system resources, the access control is apply to guarantee that only authori zed users minded(p) the appropriate access permissions. There are several access control models which can be change integrity into two classes traditional and dynamic access control models 19.Traditional access control approaches are based on policies that are static and rigid in nature. These policies are predefined and always give the same outcome regardless of the situation. Therefore, this static approach fails to adapt to varied and changing conditions during making access decisions 20. There are three main traditional access control models Discretionary Access Control (DAC), Mandatory Access Control (mackintosh) and Role-based Access Control (RBAC).DAC model was designed for multi-user databases and systems with a few previously known users. entirely the system resources are under full control from the user. DAC grants access depending on the user identity and authorization, which is defined for open policies. The owner of the resource can grant the access to any user 19. W hile MAC model is concerned with confidentiality and integrity of information, so it chiefly used in military and government applications. In MAC, the security policy is controlled by a security policy executive and the user does not prepare the capability to override it 19. RBAC model is consists of three elements users ( looses requesting access), roles (collection of permission) and operations (actions on target resource). Access permissions are related to roles and the appropriate role is granted to the user. A single user can be associated with one or more roles, and a single role can include one or more user. RBAC provides a classification of users based on their roles 21.Dynamic access control models are characterized by using not only the access policies but also dynamic contextual features which are estimated in real-time at the time of the request 22. These real-time features can include trust, take a chance, context, history and operational need 23, 14. In this paper, we propose a run a find-based access control model that uses the security endangerment as the main criterion for making the access permissions.The risk can be defined as the possibility of loss or injury. Generally, the risk is about some event that may occur in the future and cause losses. One such risk is the leakage of sensitive information by users. The access control is one of the approaches used to moderate against the security risk 27. Risk-based access control model permits or denies access requests dynamically based on the estimated risk of each access request 20. This model performs a risk analysis on each user access request to make the access decision 7. Mathematically, the most common formula to match the risk in quantitative terms is (1)Where likelihood represents the opportunity of an incident to happen season impact represents the estimation of the value of the damage regarding that incident 20.Quantified risk-based access control models are divided into two types non- reconciling and adaptational. The implicit in(p) distinction between adaptive and non-adaptive approaches is that the adaptive model requires a system monitoring process and the risk estimation module adaptively adjusts user permissions based on the users activities during access sessions. While non-adaptive approach only calculates the risk during each session creation and does not have run-time monitoring and abnormality detection capability 11.Dynamic access control approaches use real-time environment features to make the access decision. One of these features is the security risk associated with the access request, which will be used in our proposed model to make the access decision. The proposed model is shown in figure 2.The proposed model has four inputs user/ performer context, resource sensitivity, action severity and risk history. These inputs/risk factors are used to estimate the security risk value associated with each access request. The final risk value i s then compared with risk policies to make the access decision. To make the model adaptive, the user bearing is monitored to detect any abnormal actions from authorized users. This model can provide an appropriate security level while ensuring flexibility and scalability to the IoT system.Fig. 2. The proposed adaptive risk-based access control modelAs shown in figure 2, the user/agent context represents the environmental features that are embedded with the user/agent at the time of making the access request. These contexts are used to determine the security risk value associated with the user requesting the access to the system. Location and time are the most common user contexts 28. Resource sensitivity represents how valuable the resource/data is to the owner or to the service provider. Data is assigned a level of sensitivity based on who should have access to it and how much damage would be done if it were disclosed. A risk metric is assigned to each resource in the IoT system d epending on how valuable the resource data is to the owner. For instance, the higher(prenominal) the data sensitivity, the higher the risk metric associated with the resource. Action severity represents the consequences of a certain action on a forged-tempered resource in terms of security requirements of confidentiality, integrity, and availability. Different operations have different impacts and so have different risk determine. For instance, the risk of a view operation is lower than the risk of a delete operation. The user risk history is used to estimate the risk value of each access request. This is because the risk history reflects previous users behavior patterns. Moreover, it is used to identify good and bad authorized users and predict the user future behavior. Risk estimation module is responsible for taking the input features to quantify the risk value that is associated with the access request. The ultimate goal is to develop an efficient risk estimation process. Th e access decision determines whether access is granted or denied according to the risk policies. Risk policies or access control policies are mainly used by the risk estimation module to make the access decisions. These policies are created by the resource owner to identify terms and conditions of granting or denying the access. The overall risk value is examined with the risk policies to determine the access decision.The proposed model is trying to improve the flexibility of access control by monitoring the user behavior during the access session. In current access control models, if the decision is to grant access to the user, then there is no way to prevent any abnormal and unusual data access from the authorized user. So a monitoring module is needed to adaptively adjust the risk value based on the user behavior during the access session. Applying chichi contracts to accomplish this process is a big challenge especially it will be the first time to use the smart contracts in th is context. Smart contracts are treated as a software code that runs on a blockchain 29. It can force a functional implementation of particular demands and can confirm that certain conditions or terms were met or not 30. Hence, the monitored user behavior information will be compared with the smart contract to ensure that the user acts according to the terms of the smart contract so as to prevent any potential security breach during the access sessions.The process flow of the proposed model is shown in figure 3. The flow starts when the access control manager receives an access request from a user. After that, the access control manager asks for the system contexts (user/agent, resource, and action) of the requested user in addition to the user risk history. The risk estimation module uses these contexts with the risk history to estimate the overall access risk value related to the requested user, then the estimated risk value is compared with risk policies to determine the access d ecision. At this point, we have two decisionsa) If the access is granted, then the monitoring module will track the user behavior. The smart contract will use the monitored data to determine if the user follows the contract terms or not. If yes, then it will keep monitoring the user behavior, while if not, then it will return to the risk estimation module to reduce user permissions or terminate the access session to stop any security breach.b) If the access is denied, then the system asks the user to provide additional proof of identification so as not to block an authorized user and reduce the false-positive rate. If the user provides the required identification, then the access is granted and the flow continues as in the first decision, while if not, the system denies the access.Fig. 3. The process flow of the adaptive risk-based access control modelThis section provides a brief summary of the models that are related to the proposed model. A number of studies have been conducted t he security risk for dynamic access control models. The JASON report 31 proposed three main elements for a risk-based access control model estimating the risk value associated with each access request, identifying acceptance levels of risk in a certain domain, and controlling information sharing based on the estimated risk and access control policies.Risk Adaptable Access Control (RAdAC) model has been proposed by McGraw 32. It is based on estimating the security risk and operational needs to grant or deny the access. This model estimates the risk associated with each access request then compares it with the access control policy. After that, the system verifies the operational needs if the associated operational needs and the policy are met then access is granted. However, the author did not provide details about how to quantitatively estimate risk and operational needs. Also, Kandala et al. 33 have provided an approach that identifies different risk components of the RAdAC model u sing attribute-based access control approach.A dynamic and flexible risk-based access control model has been proposed by Diep et al. 12. This model uses the risk assessment to estimate the risk value depending on outcomes of actions in term of availability, confidentiality, and integrity. However, this model did not provide a standard about how to evaluate the risk value for each state of the environment and for each outcome of action, did not use user context, and lacked risk adaptive features.A framework proposed by Khambhammettu et al. 34 that based on estimating object sensitivity, pillow slip trustworthiness, and the difference between object sensitivity and egress trustworthiness using a risk assessment. However, the model did not provide how to estimate the risk value for each situation of the environment. Besides, the model requires a system administrator to give a reasonable value for each input feature in the early state of the risk assessment process and lacked risk ada ptive features.A fuzzy Multi-Level Security (MLS) access control model has been proposed to manage risk information flows based on estimating its operational needs, risk possibility and environment features 20. It estimates the risk based on the difference between subject security level and object security level. Similarly, Ni, Bertino, Lobo 35 have proposed a risk-based access control model that based on fuzzy inferences. It showed that fuzzy inference is a good approach for estimating access security risks. However, both models ignored the past behavior of users in the risk estimation process, lacked risk adaptive features and time operating expense of fuzzy inference system is high.A fuzzy-based risk access control model has been proposed by J. Li, Bai, rain tree 27 to estimate the risk of healthcare information access. A risk metric is associated with data sensitivity, action severity, and risk history as a fuzzy value to determine the appropriate control of healthcare infor mation access in a cloud computing. However, this model did not provide how to quantitatively estimate the risk. Also, no clear risk boundaries are defined and lacked risk adaptive features.A dynamic risk-based decision method has been proposed by Shaikh et al. 14. This method is based on using the past behavior to identify good and bad authorized users. It depends on granting reward and penalty points to users after the completion of transactions. However, the past user behavior (reward/penalty) values are not decorous to decide the access decision. Besides, no risk prediction technique is used and lacked risk adaptive features.A risk analysis approach has been proposed by Rajbhandari Snekkenes 36 to provide access decisions dynamically. This approach is based on preferences or values of benefit which subjects can provide rather than subjective opportunity using the game theory. A simple privacy scenario between a user and an online bookstore is introduced to provide an initial perception of the concept. However, using only benefits of the subject to determine the access decision is not enough to develop a flexible and scalable access control model. Also, it lacked risk adaptive features.A task-based access control model has been proposed by Sharma et al. 37 to estimate the risk value using functions that based on the action a user wants to perform. The risk value is computed in terms of different actions and corresponding outcomes. The outcomes and the risk probability are determined along with the level of data sensitivity. The previous users behavior patterns are then used to estimate the overall risk value. The estimated risk value is compared with the risk threshold to determine the access decision. However, it lacked risk adaptive features.A contextual risk-based access control model has been proposed by Lee et al. 13. The model gathers all useful information from the environment and evaluates them from the security perspective. Risk assessment with multifactor evaluation process (MFEP) technique is apply to estimate the associated risk value. The risk value is based on outcomes of actions in term of availability, confidentiality, and integrity. This model is evaluated to manage the access control in a hospital. However, this model ignored the past user behavior and risk adaptive features as well.A risk-based access control model has been proposed by Dos Santos et al. 7. This model active the notion of quantifying risk metrics and aggregating them. It is based on the idea of risk policies, which allow service providers and resource owners to define their own metrics, allowing greater flexibility to the access control system. However, this model requires a system administrator to ensure the minimum security is achieved.Table 1 provides a summary of the related risk-based access control models. It contains the risk estimation technique used to estimate the risk value in each model, risk factors used to estimate the risk value and the limitations of each model regarding our proposed model.In summary, one can plead that the problem of the access control, especially in the IoT, needs more investigation. Current access control models press only on providing access decisions without providing any way to prevent any abnormal and unusual data access from authorized users, whereas our approach is based on providing the access decision and monitoring the user behavior to detect any abnormal actions. The novelty of our approach is based on providing the adaptive features and requesting user context attributes to the risk-based access control in the IoT system. To the best of my knowledge, using smart contracts to monitor the user access behavior will be the first try.Table 1. Some of the risk-based access control modelsPrevious workRisk Estimation methodRisk factorsLimitations20Fuzzy MLS ModelDifference between subject security level and object security levelThe user past behavior has not been used to detect use r future behavior and lacked adaptive features.27Fuzzy ModelData sensitivity, action severity, and user risk historyNo clear risk boundaries are defined and lacked adaptive features.35Fuzzy InferenceObject security level and subject security levelTime overhead of fuzzy inference is high and lacked adaptive features.34Risk AssessmentObject sensitivity, subject trust and difference between themUser risk history has not been used and lacked adaptive features.14Risk AssessmentHistory of reward and penalty pointsLimited risk factors, no risk prediction technique is used and lacked adaptive features.36Game TheoryAccess benefits of the subjectLimited risk factors and lacked adaptive features.37Mathematics FunctionsData Sensitivity, action severity, and risk historyNo risk prediction technique has not been used, lacked adaptive features and user context.13Risk AssessmentOutcomes of actionsLimited risk factors, lacked adaptive features and user context.12Risk AssessmentOutcomes of actionsLim ited risk factors, no risk prediction technique has been used, lacked adaptive features and user context.7Mathematics FunctionsRisk policiesLimited risk factors and lacked adaptive features.The IoT has become a widely examined subject that takes the attention of many researchers, specialists, and experts. Due to the dynamic nature of the IoT, traditional access control approaches cannot provide required security levels as they are based on a static and complex authentication infrastructure. Therefore, the ground of this paper is to develop a dynamic and adaptive risk-based access control model for the IoT. This model can adapt to IoT changing conditions. The proposed model can be realized by estimating the security risk using IoT real-time features at the time of the access request to make the access decision. The model uses user context, resource sensitivity, action severity and risk history as inputs to estimate the overall risk value associated with each access request. The mode l provides adaptive features to monitor user behavior and prevents any misuses from authorized users using smart contracts.The above work is still in the first stage. In future work, choosing the most appropriate risk estimation technique for a specific IoT context is our highest priority to proceed to implement the model as well as creating different IoT access control case studies with data to evaluate the model.AcknowledgmentWe love Egyptian cultural affairs and mission sector and Menoufia University for their scholarship to Hany Atlam that allows the research to be undertaken.References1S. Li, L. Da Xu, and S. Zhao, The internet of things a survey, Inf. Syst. Front., vol. 17, no. 2, pp. 243-259, 2015.2M. Elkhodr, S. Shahrestani, and H. Cheung, The Internet of Things Vision challenges, IEEE 2013 Tencon Spring, TENCONSpring 2013 Conf. Proc., pp. 218-222, 2013.3K. Ashton, That Internet of Things Thing, RFID J., p. 4986, 2
Wednesday, April 3, 2019
Future professional of tourism
Future professional of touristry introductionNew tourism is an key subject for future professional of tourism. To drop dead in this sector we have to be aw ar of modernistic-fangled form, new tendency and new destinations. Travel sellers have to know supply and take away in this field.Our file is a glimpse of whatsoever new ways of give way and new destinations. We need to keep watching on this new form of tourism because it is very competitive sector.Thats why we have chosen to describe two new destinations and two new form of tourism.In one power we explain couchtirefing that is a new form of tourism establish on people exchanges. It is intimately a way of livelihood with values and aspirations. Une phrase sur la plane sectionie de reb.In a consequence part, we show two new destinations. First Bulgaria, its number of visitors has cast upd by 4000000 in 8 years. This country with a coast on black ocean is much and much visited specially by Europeans. Phrase sur p artie de Reb.Tourism evolves and new forms argon fashiondCouch surfingCouchSurfings definitionCouchsurfing is a new way of travelling based on sacramental manduction. An ecesis based on Internet (www.couchsurfing.com) manages the connections amidst people.CouchSurfing is an international non-profit network that connects travelers with locals in oer 230 countries and territories or so the world. A couch or a bedroom is offered to a visitor by a local for his stay.Since 2004, members have been using this brass to come together for cultural exchange, friendship, and victimizeing experiences. Today, over a meg people who might otherwise never stand ar capable to conduct hospitality and cultural understanding.Our burster as an organization is to create inspiring experiences cross-cultural encounters that are fun, engaging, and illuminating. These experiences take umpteen forms. CouchSurfings initial revolve most was on hosting and surfing (staying with a local as a lymph node in their home). Along expression these core experiences, we now also facilitate a growing array of activities and events.1CouchSurfing members share hospitality with one another. These exchanges are a uniquely rich form of cultural interaction. Hosts have the opportunity to meet people from all over the world without leaving home. Surfers, or travelers, are able to participate in the local life of the places they visit.The CouchSurfing community continues to gallop its horizons. Members are always finding more ways to connect and learn about distributively other. Every day, people across the world share coffee, camping trips, meetings, language exchanges, discussions and all sorts of other experiences.Who and how runs CouchSurfing?Casey Fenton launched the site on Jan 1, 2003 with co-founders Dan Hoffer, Sebastien LeTuan, and da Vinci Bassani de Silveira. Casey continues to divine service CouchSurfing as Executive Director of the organization.The CouchSurfing organization has no somatogenetic location. Instead, it exists in the collaborations of diverse people from around the world. The strategic direction of the Couchsurfing organization is composed by a Board of Director and a outline Team. Each member of these two groups brings different specialized golls.Members of strategy squadCasey Fenton, co-founder and Executive DirectorMattthew Brauer, General ManagerJim Stone, Chief Operations officeholderWeston Hankins, Chief Technological OfficerCameron Mills, Project Portfolio Manager.There also some full-time employees and contractors. They have a variety of roles from building and maintaining the website to organizing finances.Finally, some part time volunteers help them to manage the organization. They are Couchsurfing members and they greet new members, overlay website bugs and answer member questions.CouchSurfing is a non-profit organization, funded entirely by the donations of members. match to the web site, every month, thousands of Couch Surfers choose to support the community by getting verified, an individuation check that includes a donation. Other members choose to make independent or additional donations.Contri just nowions help to pay for the costs of running the website, a same server hosting, storage, database maintenance, mapping software, and many other costs2. Each positive experience between members costs 24 USD in CouchSurfing operating costs. The goal of CouchSurfing has never been about money, and using the site is free to all members. CouchSurfings non-profit status legally way of life that all resources must be spent directly on achieving the mission rather than creating profit for private interests.Few statistics1775916 Couchserfers are travelling sharing homes in the worlds. There are 236 countries represented and 70637 cities for 318 languages spoken.The 10 countries most visited are United States with 395657 visitors that represent 22,3 % of couchsurfers, Germany with 168807 visitors (9,5 %), France with 150939 visitors (8,5%), United Kingdom 85587 visitors (4,8%), Canada 85544 visitors (4,8%), Australia 50821 visitors (2,9 %), Italy 50652 visitors (2,9%), Spain 48858 visitors (2,8%), Brazil 48503 visitors (2,7%) and Netherland 35661 visitors (2 %). We note that almost all continent are represented in the top-ten, except Asia but China just come in 12th position.Regarding the most visited cities genus Paris is on first position, then London and Berlin comes on third position.The honest age of surfers is 28 and 85 % of surfers have between 18 and 35.Our creedCouchsurfing is a meaningful new way of travelling. It creates connections between cultures and sewer better lives of everybody. It is more than a way of travelling it is a way of brio with many values like exchange without profit. We think that couchsurfing is a adit to experience new point of view and new culture by travelling or welcoming.It is also a tool to travel more especially for young people. Indeed, even if it could be less comfortable than hotel room, it is free. Travels help to built mind and this way of travelling license to travel more, get on and better.Partie de RebNew destination appearsBulgariaBulgaria is a small country in south-eastern Europe. It have frontiers with Romania, Serbia, Macedonia, Greece and Turkey. This country owns coasts on Black sea. The climate and the relief permit to develop a large number of touristic products.In 2000 the number of visitors were 2100000, it increase and there were 6000000 tourists in 2008.Bulgarias assetsThe natural landscape is one of the most important assets.First, mountains and high peak are attractive for ski tourism. Most of the 44 ski touch ons are located in western country around Sofia, the capital city. The most known areAleko ski center on Vitosha mountain at 22 km of Sofias city center with 29km of ski runs,Borovets ski resort on Rila mountains that is a high class resort with luxury hotels,Bansko in Pirin mountain, thats one of the new ski resort in Bulgaria with 56 km of ski runs and a great off piste skiing,Pamporovo ski resort in the heart of Rodopa Mountain is the southernmost resort in Europe.Then, we can find the Black Sea Coast famous for its exquisite sanded beaches, and perfect temperatures of water and air. The northern and the southern coast are different. On the north tourists can find clean and calm sea border beaches with fine grain golden sands. The most famous and the most frequented sea side resort are Golden Sand, Albena, Roussalka, Riviera, Slanchev Den (Sunny Day), St.Konstantin and Elena.On the south, beautiful bays and steep rocks coexist with spacious beaches and sand dune. The coast provides wonderful character and modern constructions on holiday villages like Elenite, Sunny beach, Nessebur, SopozolRural tourism is another form present in Bulgaria but less significant.An unorthodox form of tourismHealth tourism is a great part of tourism in Bulgaria. With over 600 m ineral springs with temperature between 10C and 120C, Bulgaria is a thermal destination. Pavel Banya, Hisar, Velingrad, Narechen, Vurshets, Kyustendil and Momin Prohod, near Kostenets are the most famous of the health resort. They treat different diseases like bronchial asthma, disturbances of locomotors system, cardiovascular diseases, neurologic disordersAnother Health or health check tourism exists in many forms. People travel in Bulgaria for medical checkup, dental or surgery care, especially from United States and developed country where medical treatment are more and more expensive. Health Tourism is a combination of wellness and health care coupled with leisure and relaxation.Diet Center Some tourists travel to put down weight and the most famous clinic is located in the sea side resort of St-Konstantin and Elena. A stay in the clinic last between 10 and 20 days and cost between 500 and 2000 Euros including catering in hotel, a medical consultation, medical exams and a di et program for each patient.Plastic surgery It attracts tourists because of the low price and the quality of services. In the centre of 90s a lot of clinics have opened and a high argument appear. The clinics directors had to invest in high technology and high qualified staff. As example a breast augmentation cost on average 6000 Euros in France, England or Germany and only 2500 Euros in Bulgaria.Tooth care The prices are cheaper than in westbound Europe because they are align on Bulgarian standard of living. We can find a lot of good clinics in big cities like Sofia, Burgas, Varna and Plovdiv.Some tour operator offer medical trip to their customers, they imprint the whole stay. Global medical travel in USA and BGmedical travel in Bulgaria are specialized on medical travel.Our opinionAccording to us, it could be interesting to travel abroad for surgery or medical care. Indeed, in many occidental countries a lot of people are underinsured or uninsured. It means that many people h ave to pay for their medical care. According to a Harvard study, in USA half of personal bankruptcies are related to medical expenses. We think that its sometimes the only solution to remediation decay.People have to be careful. First of all, they must check the social occasion and compare with their expectations, inquire about follow-up care needed, time involve for recovery, physical therapy etc Then, they have to select the hospital by considering its accreditation, awards and recognitions, facility and equipments and statistics like success rates. Finally, its essential to heck the certifications, training and repute of the surgeon.www.couchsurfing.comAttached document n1 Couchsurfing International,Inc. Income and Expense statement 2008These statistics are generated on March, 31th 2010 at 537 am.
Examining The Concept Of Hindu Law Religion Essay
Examining The Concept Of Hindi Law Religion turn upThe phrase reference book of natural police wedge has several con nonations. It whitethorn be the billet which issues regulates of conduct which atomic number 18 recognized by Courts as binding. In this con school text, source of integrity means the maker of practice of righteousness. It may mean the social conditions which inspires the fashioning of practice of law for the governance of the conditions. In this context it means cause of law. It may overly mean in its literal sense the material from which the eclipses and laws be kn bear. In this sense the expression means the evidence of law and it is in this sense that the expression source of law is authentic in Jurisprudence.Vijnaneshwar (commentator on the Yajnavalkya Smriti and fo below(a) of Mitakshara School) has c all(prenominal)ed it Jnapak Hetu i.e., the means of knowing law. It is Coperni offer to study the sources of law because in e rattling personal legal system solitary(prenominal) that rule is law which has place in its sources. A rule non laid put down or non recognized in the sources is not a rule in that legal system.The news Hindoo startle appe atomic number 18d in the quondam(a) Persianlanguage which was derived from theSanskritwordSindhu, the historic local designation for theIndus Riverin the north-western part of theIndian subcontinent. A Hindi is an adherent of Hindooism. Hindi law is a set of personal laws governing the social conditions of Hindis ( a lot(prenominal)(prenominal) as wedding and divorce, adoption, inheritance, minority and guardianship, family matters, etc.). It is not Hindis alone who must follow Hindoo law still there atomic number 18 several other communities and religious denominations that ar subject to its dominion such as Jains, Buddhists, Sikhs, Brahmo-Samajists, Prarthana-Samajists, the Virashaivas and Lingayats and the Santhals of Chhota Nagpur besides others.In Sir Dinshah F .Mullas Principles of Hindi Law, the learned editor has defined Hindu law in the future(a) words Wherever the laws of India admit operation of a personal law, the rights and obligations of a Hindu are determined by Hindu law, i.e. his traditional law, any(prenominal)times called the law of his religion, subject to the mission that whatever part of that law may be modified or abrogated by statute. Law as understand by Hindus is a branch of dharma.Nature and scope In the member project, the scope will be restricted to prevailing out the sources of Hindu law, and critique on some of the definitional aspects of the sources and a general critique of the sources.Sources of Hindu LawThe sources of Hindu law can be classified under the following two heads old-fashioned SourcesUnder this would come the followingShrutiSmritiDigests and Commentaries andCustom. new-fashioned SourcesUnder this head would comeJustice, equity and unassailable moral sensePrecedent, andLegislation.Ancient S ourcesShruti-It literally means that which has been heard. The word is derived from the root shru which means to hear. In theory, it is the master(a) and paramount source of Hindu law and is believed to be the language of the providential revelation through the sages.The synonym of shruti is veda. It is derived from the root vid meaning to know. The term Veda is base on the tradition that they are the repository of all knowledge. on that point are four Vedas namely, Rig Veda (containing hymns in Sanskrit to be recited by the chief priest), Yajurva Veda (containing formulas to be recited by the officiating priest), Sama Veda (containing verses to be chanted by seers) and Atharva Veda (containing a compendium of spells and incantations, stories, predictions, apotropaic charms and some speculative hymns).Each Veda has three parts namely Sanhita (which consists mainly of the hymns), Brahmin (tells us our duties and means of performing them) and Upanishad (containing the essence of these duties). The shrutis hold the Vedas along with their components.Smritis-The word Smriti is derived from the root smri meaning to remember. Traditionally, Smritis contain those portions of the Shrutis which the sages forgot in their buffer form and the idea whereby they wrote in their own language with the help of their memory. Thus, the showing of the Smritis is Shrutis however they are human works.There are two kinds of Smritis videlicet Dharmasutras and Dharmashastras. Their subject matter is almost the alike. The difference is that the Dharmasutras are written in prose, in short maxims (Sutras) and the Dharmashastras are composed in poetry (Shlokas). However, occasionally, we find Shlokas in Dharmasutras and Sutras in the Dharmashastras. In a narrow sense, the word Smriti is use to de rail line the poetical Dharmashastras.The number of Smriti writers is almost unworkable to determine however some of the noted Smriti writers enumerated by Yajnavalkya (sage from Mith ila and a major figure in the Upanishads) are Manu, Atri, Vishnu, Harita, Yajnavalkya, Yama, Katyayana, Brihaspati, Parashar, Vyas, Shankh, Daksha, Gautama, Shatatapa, Vasishtha, etc.The rules laid down in Smritis can be divided into three categories viz. Achar (relating to lessonity), Vyavahar (signifying procedural and substantive rules which the King or the State applied for settling disputes in the adjudication of justice) and Prayaschit (signifying the penal provision for way of a wrong).Digests and Commentaries- subsequently Shrutis came the era of commentators and digests. Commentaries (Tika or Bhashya) and Digests (Ni banningdhs) covered a close of more than thousand years from 7th snow to 1800 A.D. In the first part of the period most of the commentaries were written on the Smritis but in the later period the works were in the nature of digests containing a synthesis of the mingled Smritis and explaining and reconciling the diverse contradictions.The evolution of the different schools of Hindu law has been possible on account of the different commentaries that were written by various authorities. The original source of Hindu law was the same for all Hindus. exclusively schools of Hindu law arose as the state chose to adhere to one or the other school for different reasons. The Dayabhaga and Mitakshara are the two major schools of Hindu law. The Dayabhaga school of law is establish on the commentaries of Jimutvahana (author of Dayabhaga which is the digest of all Codes) and the Mitakshara is establish on the commentaries written by Vijnaneswar on the Code of Yajnavalkya.Custom-Custom is regarded as the third source of Hindu law. From the earliest period exercise (achara) is regarded as the highest dharma. As defined by the Judicial Committee custom signifies a rule which in a particular family or in a particular class or district has from long function obtained the force of law.Custom is a principle source and its position is next to the Shr utis and Smritis but usage of custom prevails over the Smritis. It is superior to written law. There are certain characteristics which need to be fulfilled for declaring custom to be a valid one. They are-The custom must be antediluvian. The particular usage must entertain been practised for a long time and accepted by common consent as a governing rule of a particular society.The custom must be certain and should be complimentary from both sort of equivocalness. It must also be free from technicalities.The custom must be reasonable and not against e genuinely subsisting law. It must not be immoral or against any frequent policy andThe custom must have been continuously and uniformly followed for a long time.Indian Courts recognize three types of customs viz (a) Local custom these are customs recognised by Courts to have been prevalent in a particular region or locality. (b) Class custom these are customs which are acted upon by a particular class. Eg. There is a custom amon g a class of Vaishyas to the effect that desertion or renunciation of the wife by the husband abrogates the marriage and the wife is free to bond again during the life-time of the husband. (c) Family custom these are customs which are binding upon the members of a family. Eg. There is a custom in families of ancient India that the eldest manful member of the family shall inherit the estates.Modern SourcesJustice, equity and good conscience-Occasionally it king happen that a dispute comes before a Court which cannot be settled by the application of any existing rule in any of the sources available. Such a position may be elevated but it is possible because not every kind of accompaniment situation which arises can have a corresponding law governing it.The Courts cannot recall to the settle the dispute in the absence of law and they are under an obligation to decide such a case also. For determine such cases, the Courts rely upon the basic values, norms and standards of fairpl ay and propriety.In terminology, this is known as principles of justice, equity and good conscience. They may also be termed as Natural law. This principle in our country has enjoyed the status of a source of law since the 18th century when the British administration made it fool that in the absence of a rule, the above principle shall be applied.Legislations-Legislations are Acts of Parliament which have been vie a profound role in the formation of Hindu law. After India achieved independence, some important aspects of Hindu Law have been systemise. Few examples of important Statutes are The Hindu wedlock Act, 1955, The Hindu Adoptions and Maintenance Act, 1956, The Hindu chronological sequence Act, 1956, The Hindu Minority and Guardianship Act, 1956, etc.After codification, any headway dealt with by the codified law is final. The enactment overrides all prior law, whether based on custom or otherwise unless an express saving is provided for in the enactment itself. In matter s not specifically covered by the codified law, the old textual law contains to have application.Precedents-After the establishment of British rule, the hierarchy of Courts was established. The doctrine of precedent based on the principle of treating similar cases alike was established. Today, the decisions of Privy Council are binding on all the bring down Courts in India except where they have been modified or altered by the arrogant Court whose decisions are binding on all the Courts except for itself.A Critique on the SourcesIt is significant to note that the term Hindu is not defined anywhere in terms of religion or in any statute or judicial decisions. For the purpose of determining to whom Hindu Law applies, it is necessary to know who is a Hindu and no(prenominal) of the sources expressly state so. At most from statutes, we can get a negative definition of a Hindu which states that Hindu law shall yield to those who are not Muslim, Christian, Parsi, Jew, etc. and who ar e not governed by any other law.Hindu Law is considered to be cleric law as it is strongly believed that the sages had attained some spiritual dominion and they could communicate nowadays with God form whom we get the divine law. But this is only an self-assertion and no concrete establishment for the same is shown that the sages could communicate with God (whose very existence is challenged by atheists). Due to this, many communities are also twinge from the misapprehension or delusion that their forefathers and messiahs had revelations from God.Justice A.M.Bhattacharjee strongly states that harmonize to him he cannot think that even a staunch believer in any divine existence, transcendent or immanent, can believe in the divine origin of Hindu law, unless he has a motive behind such profession of belief or has not read the Smritis or is prompt to believe anything and everything with slavish infidelity.According to Justice Markandey Katju, Hindu law does not originate from the Vedas (also called Shruti). He vehemently asserts that there are many who enunciate that Hindu law originated from the Shrutis but this is a fiction and in fact Hindu law originated from the Smriti books which contained writings from Sanskrit scholars in ancient time who had vary in law.The Shrutis hardly consist of any law and the writings appointed in the Smriti do not make any clear-cut short letter between rules of law and rules of morality or religion. In most of the manuscripts, the ethical, moral and legal principles are woven into one. It is perhaps for this reason that according to Hindu tradition, law did not mean only in the Austinian sense of edict and is objectionable to it and the word used in place of law was the Sanskrit word dharma which connotes religion as well as duty.Although Dharmasutras dealt with law, they did not provide an anthology of law dealing with all the branches of law. The Manusmriti supplied a much needed legal interpretation which could be a compendium of law. But according to Kane, It is almost impossible to assert who composed the Manusmriti. The very existence of Manu is regarded to be a falsehood by many and he is termed as a mythological character.many critics assert that the word Smriti itself means that what is remembered and therefore the validity or proof of the existing Smritis could be challenged. It cannot be said for certainty that what the sages remembered was actually what was propounded.Hindu law has in general been critiqued on the grounds that the Smritis and other customs were generally extremely orthodox and against the favours of women. Hindu society thus has always been a elderly society and women have always received sub repayabled splendour over men. Some also disapprove of the notions of caste-based system created by ancient Hindu law from which emerged the ill-perceived practices of untouchability, etc.The Smritis are admitted to possess independent confidence but while their authority is beyond dispute, their meanings are open to various interpretations and has been and is the subject of much dispute. Till date, no one can say for sure the exact amount of Smritis which exist under Hindu law. It is due to the abovementioned problems that the digest and commentaries were established and various schools of Hindu law started to give birth.The modern font sources of Hindu law such as Justice, equity and good conscience have been critiqued on the grounds that it paves the way for personal opinions and beliefs of judges to be made into law. We have seen catena of cases where the decisions of the Court have been criticised for want of halal reasoning. This also signifies the incompleteness of the laws which exist.The Supreme Court in most matters has ascertained the rules of Hindu law successfully but there are couple of cases where they have interpreted the rules in their own light. One of the gravest cases of the Supreme Court which deserves much criticism is the case of Krishna Singh v. Mathura Ahir. The Allahabad High Court had rightly held that the discriminatory ban imposed on the Sudras by the Smritis stands abrogated as it contravenes the Fundamental Rights guaranteed by the Constitution.However, the Supreme Court contradicted the above situation and held that Part III of the Constitution does not touch upon the personal laws of the parties. In applying the personal laws of the parties one cannot introduce his own concepts of modern times but should enforce the law as derived from recognised and authoritative sources of Hindu law.except where such law is altered by any usage or custom or is modified or abrogated by statute.It can be submitted with ease that the above view is contrary to all Constitutional theories and is expressly in contradiction with Article 13. It is shocking to note that this judgment is yet to be over-ruled in express terms.Since the aegis of time, Hindu law has been reformed and modified to some extent through legis lations but these reforms have been half-hearted and fragmentary. The problem with fragmentary reforms is that though reforms were made to change some aspects, their implications on other aspects were over-looked. For example, the Hindu Womens Right to Property Act, 1937, was passed with a view to granting property rights to women but its repercussions on the law of joint family was over-looked. The result was that fragmentary reforms through legislations solved some problems but resulted in others.Many people make the mistake of considering various text books written by well-educated scholars as sources of Hindu law. This is because the Courts have decided many cases relying on these text books and quoted them for reference. For example, Mullas Hindu Law has been quoted by many judges. In Bishundeo v. Seogani Rai, Justice Bose gravid the majority judgment stated that The rule laid down in Mullas book is expressly stated to be in cases where the position is not effected by a decr ee of a competent Court. The same has been the case with many other text books. It should be made clear that text books are not sources of Hindu law and the authors have no authority to lay down the law.ConclusionIt has been seen that Hindu law has been critiqued for its orthodoxy, patriarchal character and does not bear a very modern mind-set of society. There are many areas where the Hindu law needs to arouse itself, for example, the irretrievable breakdown theory as a valid ground for divorce is still not recognised under the Hindu Marriage Act, 1955, and even the of Supreme Court have expressed their concern on this.The most valid concern is that the very definition of a Hindu is still not given in any of the sources. Statutes give only a negative definition which does not suffice the test of time. The very proponent that Hindu law is divine law has been challenged by scholars and atheists.There are many Smritis which are yet to be found according to Historians and many confli cts of opinions and interpretations have arisen for the existing ones, thus creating a window of ambiguity under Hindu law. There are also several areas where Hindu law is silent.Most of the ancient sources of Hindu law is written in Sanskrit and it is well known that in the present times there is a dearth of Sanskrit scholars. There is hardly any importance left of the ancient sources since the time the modern sources have emerged and been followed.It can be said that proper codification of Hindu law without room for ambiguity is the need of the hour. It can be said that where the present sources of Hindu law are unattractive the Legislature could look into sources and customs of other religions and incorporate them into Hindu law if it caters to the need of the society and meets the test of time.
Tuesday, April 2, 2019
Fluid Catalytic Cracking Process Engineering Essay
Fluid catalytic Cracking Process Engineering showINTRODUCTIONFluid catalytic cracking military operation, which is now more(prenominal) than 60 years old, is the cornerst angiotensin-converting enzyme of close to of the petroleum refineries. It has proven to be the most-efficient exhibit available for the variation of gunman oils and resi repayable into more valuable ignitor hydrocarbons. Many refiners consider the catalytic cracking process to be the highest net fake generating social unit of measurement in the entire refinery. In earlier times, Fluid shedalytic Cracking whole (FCCU) was ope dictated broadly in two modes, they argon maximum screw upoline modeMaximum distillate modeBut with the orgasm of Reformulated gasoline (RFG), these be now ope outrankd in maximum olefin mode. FCCU is a very sophisticated unit with many operators affecting individually separate and the oerall process. In tightlipped processes investigation of factors impact is d angiotensin- converting enzyme by changing champion factor at a time age kee bowling ping early(a) factors constant. In case of FCCU it is almost practically unfeasible to obtain a clear indication as, change in one single factor leads to change(s) in one or more other factors. This whole phenomenon is a natural consequence of the soup uping brace of FCCU. If the unit is to operate at steady state, then the unit has to be in lovingness residual condition. At this stage the vex requirement in the reactor is satisfied by burning cytosine in the regenerator and transferring the muscle to the reactor by circulating hot gun. Heat balance around the reactor-regenerator stinker be utilise to predict the effects of process changes although the hold degree of the changes whitethorn be difficult to establish. It is one step at a time thought process and rather difficult to pin down exact quashs without a c atomic number 18ful study of yields and incline laydown rates as affected by changing variables. In this work a plant data is distributen as reference and base on that, calculations have been done to find out the net passionateness of endothermic responses pass alongring in the riser pipeline pipe pipeline reactor, assuming that the unit is operating at steady state and that the riser is an isothermal one. Then as per the summations slate, a 7-lumped pattern is considered from various literatures and based on the energisings of responses, rate equations be formed and with the knowledge of available kinetic parameters the first derivative temperature drops along the crest of the riser argon calculated.PROCESS DESCRIPTIONMore than a 12 types of FCCU are operating worldwide. But the basic designs of all these type reside the same. FCCU comprises of two partsRiser reactor, in which catalytic cracking reactions occurRegenerator, in which burning of puff (deposited during cracking) from the catalytic sites is doneFigure 1 shows a schematic diagram of a typical FCCU. The course is pre affectionatenessed in a furnace and(Figure 1- Schematic Diagram of a typical FCCU)injected at the place of the riser along with a small amount of go. This move clean helps in dispersion of move over, good atomization and reduces shock formation by change magnitude the partial pressure of hydrocarbon dehydrations. The feed is subsequently vaporized when it comes in refer with the hot gas pedal from regenerator. The hydrocarbon vapors so formed undergo endothermic cracking reactions on their way up by means of the riser. The expansion of product vapours occurs through the length of the riser and the gas velocity increases with change magnitude gas density. Hot catalyst particles provide the sensible catch fire and latent arouse requirements for vaporizing the liquid feed and also endothermic passionateness of reaction for the cracking reactions. After a certain distance from the entry zone of the riser, the liquid feed is completely vaporized. Cracking reactions continue with the vapours miserable up in the riser and the temperature is dropped along the length of the riser due to endothermic nature of cracking. The catalytic cracking is started and also completed in a very short period of time inside the riser reactor in which the catalyst is pushed upward by incorporating steam at various fixtures along the length of the riser and hydrocarbon vapours. Mixture of catalyst and hydrocarbon vapour travels up in the riser into the reactors. Steams injected at different locations in the riser are as fol confuseds,Fluffing steam at the bottom of the riser dispersion steam along with cherubic feed injectorsRiser dilution steam in a higher place the sweet-flavored feed injectorsDispersion steam along with recycle blend rate injectorsAeration steam into the riser J bend to fluidize the catalystAlong with this some other locations are there where steam is injected. They are as followsplayed out catalys t standpipe aeration steamRegenerated catalyst standpipe aeration steam reactor quench steamReactor dome steamPost riser quench steamdiscovery steam into strippersMixture of catalyst and hydrocarbon vapour is discharged from the riser to the riser cyclone assembly. The bulk of the spent catalyst is separated from product vapours in the cyclone assembly. If necessary the vapours leaving the riser cyclones are routed into auxiliary cyclone assembly located inside the reactor vessel. Separated catalysts flow through each cyclone declination leg into the stripper. Product vapours leave the reactor cyclones and flow into the main fractionator through the reactor overhead vapour line. abate steam is injected inside the reactor vessel to reduce the temperature, so as to minimize post riser thermal cracking reactions and carbon formation. Reactor dome steam is provided to sweep hydrocarbons and avoid dead areas on sneak of the reactor vessel that may lead to thermal cracking and coking in that area. The separated catalyst from the riser and reactor cyclone assemblies enters the catalyst stripper.As the catalyst flows down the stripper, it gets stripped off the entrained hydrocarbon vapours by the up sleek steam. Stripping enhances the product recovery and reduces the carryover of hydrocarbon to the regenerator along with the spent catalyst thereof. Fluffing steam fancys the fluidization of the circulating catalyst. Stripped catalyst from the stripper flows into the regenerator weighty derriere through the spent catalyst standpipe (SCSP). gas level in the stripper is kept up(p) by spent catalyst slide valve (SCSV). Aeration steam is provided in the SCSP to ensure proper flow and fluidization of spent catalyst.Coke adsorbed on the spent catalyst during cracking reaction is been removed in the regenerator by burning off the coke with demarcation. childs play is supplied from the air blower to the regenerator through multiple distributors. line of descent i s also introduced at different locations of the regenerator, they are as followsT-grid airRegenerated catalyst standpipe (RCSP) hopper aeration airRCSP aeration airRegenerator fluffing air at the bottom near the J bendThe regenerator canful be operated in two modes overtone burning modeComplete combustion modeFor partial combustion mode, a CO boiler is needed to convert CO to carbon dioxide. The authentic discussion is for complete combustion mode regenerator. trematode worm gas from the regenerated dense bed flows to the two stage regenerator cyclone assembly. Here the entrained catalyst is separated from the trematode gas. The separated catalyst flows back to the dense bed through cyclone dip legs. Flue gas from the cyclone flows out from pinch of the regenerator through a labial pipe gas line. Total air flow to the regenerator is regulated based on the desired level of group O in labial pipe gas. Too low O2 concentration forget defecate coke build up on regenerated cat alyst and CO release from regenerator. Too high O2 concentration pass on lead to regenerator cooling. So, regenerator flue pipe gas is regularly examined for O2, CO, CO2, NO2, SO2 analysis.FEED CHARACTERIZATIONThe precisely constant in FCC operation is the frequent change in feedstock quality. Thats wherefore two feeds with similar simmering luff ranges can exhibit abundant differences in cracking performance and product yields. feast characterization is one of the most important activities in monitoring the FCC process. turn tail characterization is the process of determining physical and chemical properties of the feed. Understanding feed properties and also crafty their impact on units performance is an essential thing. Trouble shooting, catalyst selection, unit optimization and subsequent process evaluation, all depend on feedstock. Feed characterization relates product yields and qualities to feed quality. Analytical techniques like mass spectrum analysis are sophisti cated and not practical for determining complete topic of FCC feedstock. Simpler empirical correlations are often used. They are as followsoAPI gloominess and UOP KBoiling rangeAverage stewing point light speed eternal sleepMetalsSulphur, Nitrogen and OxygenoAPI gravity and UOP KIt is a specific gravity relating the density of oil to the density of water. The empirical formula for this isoAPI 131.5 (3.1)Feed to an FCC can range from 15o to 45o API. If the API gravity increases the charge stock go forth crack more readily and for the same reaction temperature there volition be great conversion. Secondly at a constant conversion level, there will be greater gasoline yield with slightly lower octane.A rough indication of the quantities of paraffin present is a characterization factor which relates stewing point to specific gravity, is called the UOP K factor. This is presumption by(3.2)WhereCABP = brick-shaped sightly boiling point, oRSG = specific gravity at 60 oFHigher th e UOP K prise more is the paraffinic nature of the feedstock.Boiling padThe boiling range of FCC feed varies from an initial point of 500oF to an endpoint of virtually speed of light0oF. thither are two boiling point ranges which are used to describe the lighter material in the feed. They arePer cent over 430oFPer cent over 650oFThe first quantifies the amount of gasoline in the feed. The randomness one quantifies the light fuel oil in the charge.Average boiling pointAverage boiling point of the FCC feed depends on the average molecular(a) weight. An increase in average boiling point and molecular weight will typically eccentric the followingThe charge will crack more readily, so at constant reactor temperature conversion will increaseAt constant conversion, yield of C4 and lighter will decreaseOlefinic content of the product will decreaseRegenerator temperature will tilt to riseAt constant conversion, the gasoline yield will increase about 1% for an increase in the molecular weight of 20.Carbon residueThe carbon residue of a feedstock is an indirect measure of its coke producing nature. Values may be determined by either Conradson or Ramsbottom methods. The carbon residue can be a useful number for determining possible contamination in storage. Entrainment in vacuum newspaper column is a common cause of increased carbon residue. Colour may be used to approximately evaluate the carbon content of the feedstock. Darker stocks tilt to have higher carbon residues.MetalsOrganometallic elementlic com digs in the FCC feed can cause serious overcracking if the metals deposit on the catalyst. The cleanliness of a chargestock is inclined by a metals factorFm = Fe + V + 10 (Ni + Cu) (3.3)WhereFm = Metals componentFe = Iron concentrationV = Vanadium concentrationNi = Nickel concentrationCu = Copper concentration on the whole metal concentrations are ppm by weight in the feed. A factor of 1.0 is considered safe, over 3.0 indicate a danger of poisoning of catalyst .Sulfur, Nitrogen, OxygenSulfur is as undesirable in FCC feed as it is in the feed to most of the refining units, causing corrosion of the equipment and increased difficulty in treating products. At 50% conversion about 35% sulfur charged is reborn to H2S, and at 70% conversion the figure will rise to 50%. Nitrogen produces NH3 and CN- in the reactors, and NOx and trace quantities of NH3 in the regenerator. These NH3 and CN- cause plugging and corrosion, plot of land the NOx and NH3 in the flue gas cause environmental problems. bodge oil will absorb oxygen in storage unless the tanks are gas blanketed. This oxygen will combine with the com confiscates in the oil at about 450oF to form gum, which fouls heat exchangers.FCC REACTION CHEMISTRYCracking reactions are predominantly catalytic, but some non-selective thermal cracking reactions do take place. The two processes proceed via different chemistry. The occurrence of both the reactions is confirmed by distribution of products. Ca talytic cracking proceeds mainly via carbenium ion intermediates. There are three dominant reactions in cracking are catalytic cracking, isomerization, total heat transfer. The idealized reaction classes are tabled below with specific reactions to support them.(Table 1 idealized reactions of importance in FCCU)Reaction classesSpecific reactionsCrackingn-C10H22 n-C7H16 + C3H6 1-C8H16 2C4H8 henry transfer4C6H12 3C6H14 + C6H6 cyclo-C6H12 + 3 1-C5H10 3n-C5H12 + C6H6Isomerization1-C4H8 trans-2-C4H8 n-C6H10 iso-C4H10 o-C6H4(CH3)2 m- C6H4(CH3)2TransalkylationC6H6 + m- C6H4(CH3)2 2C6H5CH3Cyclization1-C7H14 CH3-cyclo-C6H11DealkylationIso-C3H7-C6H5 C6H6 + C3H6Dehydrogenationn-C6H14 1-C6H12 + H2Polymerization3C2H4 1-C6H12Paraffin alkylation1-C4H8 + iso-C4H10 iso-C8H18Some of the reactions are endothermic in nature and some are exothermic in nature. Each reaction has a heat of reaction associated with it. The overall heat of reaction is the combination of both the types of heat of react ions. Though there are a number of exothermic reactions, then also the net reaction is endothermic. It is apparent that the type and magnitude of reactions have an impact on the heat balance of the unit. If the catalyst is with less hydrogen transfer characteristics, it will cause the net heat of reaction to be more endothermic. This in turn results in higher catalyst circulation and possibly a higher coke yield to maintain the heat balance.FCC UNIT MATERIAL BALANCEFor this, a complete set of commercial plant data is used. The data is given in subsequent tables belowFEEDSTOCK(Table 2 Properties of feed components)FeedUnitHydrotreatedVGOUn-hydrotreatedVGOLight Coker NaphthaQuantity,TMTPA3200800170% of total feedwt%76.7419.184.08Density 15oCgm/cc0.8940.9320.6762CCRwt%0.11.2Sulfurwt%0.13.320.434enthalpy contentwt%13Ni + Vwppm16.38Nitrogenwppm500159430ASTM Distillation, vol.%D-1160, oCD-1160, oCD-86, oCIBP3663493653743791038539443304204354950443468577048550865905455567595576573FBP6206 0986Bromine no.107.86Paraffinsvol.%46.7Olefinsvol.%43.38Naphthenesvol.%7.25Aromaticsvol.%2.68RON, clear79.4Diene value5.31WATSON K12.436MW82.001PRODUCT YIELDS(Table 3- product yields, Ex-reactor and Perfect fractionator basis)Productswt %Weight (lbs. /hr.)H2S0.394309Hydrogen0.041606Methane1.0611710ethane1.5417010ethylene1.7619442Dry gas4.40148768Propane2.8631592Propylene9.66106708n-butane1.6918668i-butane5.5260976butenes7.4782516LPG27.2300460LCN14.50160174MCN23.40257978HCN3.9043082LCO16.45181713CLO4.75153347 degree centigrade5.01-OPERATING CONDITIONS(Table 4- operate conditions for the Unit)Riser-ReactorUnitValue reinvigorated heavy feed rate (VGO)m3/hr.533.4Fresh light feed rate (Coker naphtha)m3/hr.30.2CLO recyclem3/hr.46Riser top temperatureoC540Riser top pressureKg/cm21.5Feed preheat temperatureoC350Regenerator atmosphere to regenerator (dry basis)Nm3/hr.310717Regenerator pressureKg/cm21.9Dense bed temperatureoC640Dilute bed temperatureoC654Flue gas temperatureoC657Blower disch arge temperatureoC226StripperStripping steam rateKg/hr.5000Stripping steam temperatureoC290Stripping steam pressureKg/cm210.5Base temperatureoC0Ambient temperatureoC35Flue gas writingMW= 30.6O2vol. %2.49COvol. %0.005CO2vol. %15.58N2vol. %81.83SO2vol. %0.085SO3vol. %0.01Now using the above data, amount of oxygen that was consumed by burning the hydrogen in coke is estimated. All the gas calculations are based upon 100 moles of flue gas. The oxygen consumed for H2O is given by the expressionO2 consumed = * (vol. % of N2 in flue gas) 2 * (vol. % of O2 in flue gas) 2 * (vol. % of CO2 in flue gas) (vol. % of CO in flue gas) (5.1)So, O2 consumed = * (81.83) 2 * (2.49) 2 * (15.58) (0.005)= 7.36The weight of the hydrogen and carbon in the coke are calculatedWeight = 2.016 * (7.36) + 12.01 * (15.58+0.005)= 202.01The temperature differentials are calculated (oF basis)TRR = (Regenerator dense bed temperature Riser outlet temperature) (5.2)= 1184 1004TRR = 180TRB = (Regenerator fluegas temperature Blower discharge temperature) (5.3)= 1215 439TRB = 776TRS = (Riser outlet temperature Stripping steam temperature) (5.4)= 1004 554TRS = 450The weight combined feed ratio is calculated as(Flow rate)CLO * (Density)CLO * 2.204CFR = (5.5)(Flow rate)Fresh feed * (density) uninfected feed * 2.204=CFR = 0.074The stripping steam and dull gases carried to the reactor by the regenerated catalyst are calculated on a weight per pound fresh feed basisSteam = (5.6)Steam = 0.01 impersonal gases = (5.7)Inert gases = 0.007The amount of hydrogen in the coke is calculated asHydrogen in Coke, wt % = 2.016 * 7.36 / 202.01 * 100 %= 7.35 wt. %The air to coke ratio isAir to coke, wt/wt = (2897/202.01) * (81.83/79)Air to coke, wt/wt = 14.85 lbs air / lb cokeWhere2897 is the molecular weight of air work out by 100 (basis of 100 moles of flue gas)The weight of coke per mo may be calculated asWeight of coke, lbs/hr. = (4591) * 193.23 / 14.85= 59738.6 lbs/hr.Where(310717 Nm3/hr. = 5178.62 Nm3 /min. = 193.23 MSCFM4591 = air rate conversion factor from MSCFM to lbs/hr.)So, weight % of coke is thenwt. % coke = * 100%= (59738.6 / 1104941.7) * 100 %wt. % coke = 5.41In the product yield table, the coke wt. % is indicted as 5.01 wt%. But it is calculated as 5.41 wt. %. Now the overall weight balance is as followsOVERALL WEIGHT BALANCEINPUT-= Fresh feed + Coker naphtha + CLO recycle= (533.4 * 0.8 * 894 * 2.204) + (533.4 * 0.2 * 932 * 2.204) + (30.2 * 676.2 * 2.204) + (46 * 808 * 2.204)= 1186860.1 lbs. / hr.OUTPUT-= Total product yields + coke= 1149831 + 59738.6= 1209569.6 lbs. / hr.So, error in weight balance is calculated as= INPUT OUTPUT= (1186860.1 1209596.6) lbs. / hr.= 22736.5 lbs. / hr.= 1.88 wt. %= 98.12 % solventNow combustion heat of coke is determined as follows (at hottest temperature = flue gas temperature = 1215oF)Hcomb = (X) (vol. % of CO in flue gas) + (Y) (vol. % of CO2 in flue gas) + (Z) (vol. % of O2 consumed) / (weight if hydrogen and carbon in coke) (5.8 )= (48000) * (0.005) + (169743) * (15.58) + (106472) * (7.36) / 202.01Hcomb = 16971.8 Btu / lb cokeWhereX = heat of combustion of CO at 1215oFY = heat of combustion of CO2 at 1215oFZ = heat of combustion of H2O at 1215oFThere is field factor for the hydrogen in coke, this is given as field of study factor, C = 1133 (134.6) (wt. % hydrogen) (5.9)= 1133 (134.6) (7.35)= 143.7The net heat of combustion after using the correction factor is-HC = 16971.8 + 143.7 Btu / lb coke-HC = 17115.5 Btu / lb cokeAt this point the reactor and regenerator heat balances are calculated. The catalyst supplies the heat to the reactor. The regenerator heat balance is calculated first using a basis of one pound of coke at the hottest regenerator temperature. The reactor heat balance is based on one pound of fresh feed.HEAT BALANCEREGENERATOR HEAT(Figure 2- Regenerator heat In Out scheme)HEATREG = HCOMB. HCOKE HAIR HRADIATION LOSS (6.1)Now, HCOKE = heat necessary to erect coke to combustion temperatu re= (0.4) * (TRR) (6.2)HAIR = heat required to raise air to combustion temperature= (lb air / lb coke) * (0.26) * (TRB) (6.3)HRADIATION LOSS = 250 Btu / lb cokeSo, HEATREG = 17115.5 (0.4) * (180) (14.85) * (0.26) * (776) 250HEATREGHEATREG = 13797.4 Btu / lb coke-HCSo, regenerator efficiency = *100% (6.4)= 80.6REACTOR HEAT(Figure 3- Reactor heat In Out scheme)HEATRX = HFRESH FEED + HRECYCLE + HSTRIPPING STEAM + HREACTION + HRADIATION LOSS + HINERTS (6.5)HFRESH FEED, HRECYCLE = heat required to raise fresh feed recycle to reactor temperatureHSTRIPPING STEAM = heat required to raise steam to reactor temperature= TRS * (0.485) * (lb steam / lb fresh feed) (6.6)HRADIATION LOSS = 2 Btu / lb fresh feedHINERTS = heat of inert gases carried from regenerator to reactor by regenerated catalyst= TRR * (-0.275) * (lb inerts / lb fresh feed) (6.7)HEATRX = (enthalpy of fresh feed at riser outlet temperature enthalpy of fresh feed at preheat temperature) + CFR (enthalpy of recycle feed at ris er outlet temperature enthalpy of recycle feed) + TRS * (0.485) * (lb steam / lb fresh feed) + 2 Btu / lb fresh feed + TRR * (-0.275) * (lb inerts / lb fresh feed) + HREACTION= (745 460) + 0.074 * (745 460) + 450 * (0.485) * 0.01 + 2 + 180 * (-0.275) * 0.007 + HREACTIONHEATRX = 310 + HREACTIONNote-Enthalpies for the fresh feed and the recycle feed were calculated by taking several(prenominal) UOP K values, oAPIs and the temperatures from the API technical data book.Regenerator heat is calculated on a one lb of coke basis. This can be converted to one lb of fresh feed by use of weight % of coke term.So, HEATRX = HEATREG () (6.8)HREACTION + HEATRX = HEATREG () + HREACTION (6.9)HREACTION = HEATREG () + HREACTION + HEATRX (6.10)But HEATRX = + HREACTIONPutting this relation in equation (6.10), the equation changes toHREACTION = HEATREG () HREACTION = 13797.4 * 310HREACTION = 436.44 Btu / lb fresh feedSo, HEATRX = 310 + 436.44HEATRX = 746.44 Btu / lb fresh feed(0.275) (TRR)Cat / Oil (wt. / wt.) = HEATRX (6.11)Cat / Oil (wt. / wt.) = 15 lb Catalyst / lb OilCatalyst circulation rate = (Cat / Oil) * (lb fresh feed / hr.) (6.12)= 15 * 1104941.8CCR = 16574127 lbs. / hr.= 7524 MT/ hr.Overall heat flow scheme for the whole FCCU can be shown as below(Figure 4- Typical FCCU heat balance scheme)Now, the net total endothermic heat of reaction is calculated through empirical formulae. But we took the assumption as the riser is an isothermal one. Practically it is not isothermal. The temperature at the base of the riser is higher than what is at the top of the riser or at the riser outlet. This is because the cracking reactions occurring along the length of the riser is endothermic in nature. So heat is being absorbed during the reaction and causes the temperature at that particular location to decrease. Gradually the temperature decreases and at the riser outlet the temperature is dropped significantly. In this context we can estimate the riser base temperature using empir ical relations and hence can estimate the drop in temperature at the next differential element up in the riser DNS. But before this a multi-lumped model is to be considered along with possible reaction schemes and there kinetic parameters.SEVEN LUMP KINETIC MODELFor this purpose a viisome lump kinetic model proposed by Mehran Heydari et al. (2010) is used. They divided the model into seven lumps namely VGO/Coker Naphtha, Clarified Oil, Light Cycle Oil, gasoline (LCN, MCN, and HCN), LPG, Dry gas and Coke. The schematic flow diagram is as follows(Figure 5- Seven lump kinetic model in FCCU)In order to develop a mathematical model for this particular system, certain assumptions has to be taken, they are as followsThe riser is an one dimensional ideal plug flow reactor with no radial and axial dispersionReactor is an adiabatic riserFeed viscosity and heat capacities of all components are constantFluid flow is not affected by the coke deposition on the catalystFeed is vaporized instan taneously in the riser entranceAll cracking reactions are taking place in the riserThe model considers seven lumps and eighteen reactions and eighteen kinetic constants. Molecular weights of different lumps and boiling ranges are given DNS in the table below(Table 5- molecular weights and boiling ranges of lumps)jLumpMolecular weight(Kg/ Kmol)Boiling range(oC)1VGO418.7349 6202CLO291232 -5673LCO226170 3924 flatulency11430 2285LPG656DRY GAS307COKE12Values of kinetic constants and activation energies along with heat of reactions for each reaction are given in the table below (DNS, Mehran Heydari, Praveen ch. shishir sinha)(Table 6- reaction schemes with kinetic parameters)ReactionsRate constants(m3/ kg cat. hr.)Activation energy(KJ/Kmol)Heat of reaction(KJ/Kg)VGO CLO14.9350.7345.821VGO LCO5.7850.7379.213VGO GASOLINE11.6950.7392.335VGO LPG3.5916.15159.315VGO DRYGAS0.3516.15159.315VGO COKE11.5516.15159.315CLO LCO5.7850.7356.314CLO GASOLINE0.9446.24128.571CLO LPG0.13559.75455.185CLO D RYGAS0.013559.75455.185CLO COKE0.327259.75455.185LCO GASOLINE0.574246.2493.030LCO LPG0.008659.75704.93LCO DRYGAS0.000959.75704.93LCO COKE0.059659.75704.93GASOLINE LPG0.000378.49372.10GASO DRYGAS0.000178.49372.10LPG DRYGAS0.003359.7532.30The riser model is assumed to be a two class model
Monday, April 1, 2019
The Benefits Of Strategic Planning Business Essay
The Benefits Of Strategic give Business EssayFormal strategicalal be after is affected by the macro- environs and this is the highest level layer in the mannikin, this consists of a wide range of environmental work outs that impact to some extent on al close all organisations. The PESTEL framework basis be used to describe how future trends in the Political, Economic, Social, Technological, surroundings and Legal environments might affect an organisation. Pestel synopsis provides the broad date from which chance on drivers to sort bottomland be identified. By using these severalise drivers organisations basis envision scenarios for the future. Scenarios fucking be used to help organisations decide if change needs to happen depending on the different ways in which the personal line of credit environment may change.It is important for managers to psychoanalyze these factors in the present and how they ar likely to change in the future. By analysing these, managers w ill be open to d stark(a) out implications for the organisation.Pestel factors ar sometimes linked together i.e. scientific factors throne impact on economic factors. It is necessary to identify the key drivers of change these atomic number 18 environmental factors that argon likely to have a high impact on the success or failure of the strategy. get wind drivers vary by industry i.e. Primark may be concerned by social changes that can change customer tastes and behaviours.The critical issues atomic number 18 the implications that are drawn from the understanding in guiding strategic decisions and choices. The next submit is drawn from the environmental synopsis specifically strategic opportunities and holy terrors for the organisation.Having the index to identify these opportunities and threats is extremely valuable when thinking rough strategic choices for the future. Opportunities and threats form iodine half of the swot up compend that shapes a companys formulati on.The use of SWOT analysis can help summarise the key issues from the business environment and the strategic cap capability of an organisation that are most likely to impact on strategy development. Once the key issues have been identified an organisation can whence assess if it is capable to deal with the changes taking place inwardly the business environment. If the strategic capability is to be understood the business essential(prenominal) remember that it is not absolute plainly relative to its competitors. SWOT analysis is only useful if it is comparative, that is it examines strengths, weaknesses, opportunities and threats. SWOT analysis should help focus give-and- acquire on the future choices and to what extent an organisation is capable of supporting these strategies. SWOT analysis should not be used a substitute for more in-depth analysis.In responding strategically to the environment the goal is to reduce identified threats and withdraw advantages of the best opp ortunities.Peter Drucker (1954), discussing the importance of business policy and strategic formulation in his book The Practice of Management says we cannot be content with plans for a future that we can foresee. We essential prepare for all possible and a just many impossible contingencies. We mustiness(prenominal) have a workable solution for anything that may come up.By taking advantage of the strategic gap (which is an opportunity in the private-enterprise(a) environment that has not been amply endeavored by competitors) organisations can manage threats and opportunities.Core competencies are a set of linked business swear outes that deliver superior value to the customer, when these are combined they create strategic value and can lead to warring advantage. By using Porters louver forces analysis which is a framework for organisations to analyse industry and business strategy, they can draw upon the five forces that determine the competitive intensity and therefore attractiveness of a market. Three of Porters five forces tinge to competition from external sources and the other two are internal threats.This analysis is just one part of the complete Porter strategic good event the others include the value chain (VC) and the generic strategies.According to Porter (2008) the work of a strategist is too understand and cope with competition even so managers define competition too narrowly as if it has occurred only among nowadays direct competitors. Competition goes beyond profits to include competitive forces much(prenominal) as customers, suppliers, potential entrants and substitute products the extended rivalry that results from all five forces defines an industrys structure and shapes the nature of competition within an industry. For example Apple are good at technology and innovation therefore they can take the opportunities that give them competitive advantage and cast offs them leaders compared to Samsung or Nokia.Porters says there are 5 forces that shape the competitionThreat of new entrantsBargaining military group of customers powerful customers ordinarily bargain for better services which involve salute and togmentBargaining power of suppliers may determine the cost of raw materials and other inputs effecting profitabilityRivalry among competitors competition influences the pricing and other be like advertising etc.Threats from substitutes where-ever substantial investments in RD is taking place, the threat of substitutes is expectant. It overly affects profitability.Competitive advantage is the heart of strategy and for the strategy to pull ahead the organisation should have applicable competitive advantage.We can see an example of this with Toshiba who operate in electrical goods, through a flexible manufacturing agreement it manufactures different products / varieties of some products on the same assembly lines. At Ohme it assembles ball club varieties of computers on the same line and on the adjacent line it assembles 20 varieties of lap top computers.It is able to switch from one product / variant to another instantly at low cost and makes profits on low volume runs too. This flexibility of Toshiba to respond quickly and easily to the closely changing market demand is definitely one of its competitive advantages. Whereas its competitors make profits only through long volume runs of a special model.yet, there are a lot of companies who are choosing not to invest receivable to the box however Lidl and Aldi are taking advantage of supplying cheaper products giving them competitive advantage over say Waitrose.Benefits of Strategic formulationEffective strategic planning can positively improve the implementation of an organisation and give them the ability to serve more clients, access extra resources or enhance the quality of service/product. It can also quip solutions to major organisational issues or challenges and gives stakeh aged(prenominal)ers of the or ganisation an opportunity to develop harmonic solutions to long-term issues/challenges that have been affecting the organisation. Furthermore it stomachs for forward thinking, allowing an organisation the opportunity to go bad and revisit the mission and create long-term vision. It allows clear future mission allowing stakeholders to look to the future, plan and respond to changes.EvaluationOne of the major draw abides of ceremonious strategic planning is the uncertain dynamic environment, things change constantly and everything becomes shorter. The recession at the present time is making everything unpredictable and this is not good for strategic planning.According to Mintzberg (1994) strategic planning should be used to fig out and implement the competitiveness of each business unit.Scientific management was pioneered by Fredrick Taylor (1856-1915) and involved separating thinking from doing and thus creating a new function staffed by specialists. Planning systems were expec ted to produce the best strategies as well as step by step instructions on how to achieve this, but this never worked well. According to Mintzberg strategic planning is not strategic thinking, the most successful strategies are visions, not plans.When an organisation can differentiate surrounded by planning and strategic thinking they can then get back to what the strategy making process should be. Once a manger has the ability to learn from all sources around him, including personal experiences and market research and can integrate this into a vision of the direction that the business can then pursue.Mintzberg suggests that strategic planning is a misconception and rests upon three unsound arguments that prediction is possible, thats strategists can be detached from the subjects of their strategies, and that the strategy-making process can be formalised.Strategic thinkers can apply lessons learned from Mintzberg (1994) three inherent fallacies of traditional planningThe phantasm of Prediction is the assumption that we can actually ascertain events through a formalised process that involves people engaged in creative or even routine work and can manage to stay on the predicted course. You need more than hard facts you need the personal touch. People are not objective, they are complex.The phantasm of Detachment is the assumption we can disjoined the planning from the doing, if the system does the thinking, then strategies must be detached from the tactics. cooking from implementation, thinkers from doers. One objective is to make reliable senior managers receive relevant information without having to immense themselves in the details. One fact is innovation has never been institutionalised and systems have never been able to reproduce the synthesis created by the entrepreneur or the ordinary strategist and probably never will.The Fallacy of Formulisation suggests that systems could certainly process more information, at least hard information. However they could never internalise it, comprehend it, and put it all together. Such control is more a dream that a reality. Reality tells us that anomalies, the quicksilver(a) behaviour of humans and the limitations of analysis play a huge factor in the organisational outcomes and to disregard them is risky and could lead to incomplete planning.What are the limitations of strategic planning when things are changing rapidly?The limitations of formal strategic planning can be seen if the future is uncertain and the expectations divert from the plan. in that location could also be internal resistance to formal strategic planning payable to factors includingInformation flows, decision making and power relationships could be unsettled veritable operating problems may drive out long-term planning effortsThere are risks and fears of failureNew demands will be placed on managers and staffConflicts with the organisation are exposedPlanning is expensive in time and moneyPlanning is difficult and hard workThe entire plan limits choices and activities for the organisation in the futureCONCLUSIONSThe question posed seems to be is strategic planning worthwhile. The answer to this lies within the organisation and is dependent upon size. It seems that the ability to learn and implement strategies contributes to the business performance of small or modal(a) sized companies in a dynamic industry.Leadership is important and organisations now have to deal with dynamic and uncertain environments. To ensure success organisations must be strategically aware. They must understand how changes in their competitive environment are unfolding. They should constantly be on the lookout for new opportunities to exploit their strategic abilities, build on awareness and understanding of current strategies and successes. Organisations must be able to respond quickly in response to opportunities and threats.Organisations must compete effectively and out-perform their rivals in a dynamic environm ent they must find suitable ways for creating and adding value for their customers. Overall they must be flexible. Organisations could think about changing their strategy to an emergent strategy which would allow them to adapt to new ideas and according to change. Emergent strategy implies that an organisation is erudition what works in practice. An example of this is Groupon who provide daily deals in large cities and in return Groupon get a percentage of the deal usually 50% from the company providing the deal. The company is on track to make $500M in revenue this year and has raised its last round at a $1.35B valuation. Groupon is an example of an emergent strategy which has transformed several times.Organisations could think about downsizing production before closure as companies are killed due to an uncertain dynamic environment.In an article labelled The Real take account of Strategic Planning one manager said our planning process is like a primitive tribal ritual there is a lot of dancing, waving of feathers and beating of drums. No one is exactly sure why we do it, but there is an almost mystical believe that something good will come out of it. Another said, Its like the old Communist system We pretend to make strategy and they pretend to practise it. Henry Mintzberg has gone so far as to label the give voice strategic planning an oxymoron. He notes that real strategy is made colloquially in hallway conversations, in working groups, and in quiet moments of reproval on long plane flights and rarely in the panelled conference inhabit where formal planning meetings are held.
The Survival Of Myth Despite Science Philosophy Essay
The Survival Of fabrication Despite Science Philosophy try onThe survival of story despite the advancement of science and philosophy in the classical classic world green goddess be explained by its tie-in with so many facets of classical culture education, literature, drama, art and its importance in relation to theology, ritual and the after-life. Furthermore, the scale of the work on fable prevail that of the few philosophers and scientists, who were often completely able to affect the minority. Fundamental to this head focus of survival is the relationship amid romance (muthos) and reason (logos). In Greek, muthos direction story, and relates to the medium traditionally used to describe the feats of the gods and heroes central to Greek mythology. tidings translates as word, and whilst this has many meanings principle, argument, explanation and reason, the generally accepted meaning is reason. The deuce enclosures then, whilst both relegateing an explanation of the world, do so in secern ways myth provides vivid, descriptive narrative often as a form of entertainment, while reason presents empirical arguments supported by logic.Whilst the Greeks had previously relied on myth as a means of explanation, to reinforce social, policy-making or ethical positions, to uncover or express tensions and dilemmas within society, or to impart a deeper message, during the fifth and fourth centuries, spots towards myth began to change. Both Plato and the historian Thucydides for example, associated myth with old wives tales, entertaining perhaps, nevertheless with no substance. According to Joanna Overing (1997), Myth or mythos became understood as a form of speech unconnected to reasoned discourse or logos. As such myth became delimitate as opposed to both truth (myth is fiction) and to the quick-scented (myth is absurd). (Overing 2) She cites Vernant as argue that central to the new emphasis on logos over muthos is the change magnitude promine nce of written text as against the tradition of oral verse (Overing 2).The most significant groups involved in the change in attitude towards myth, were the Pre-Socratics and the Socratics. Pre-Socratics is the modern term for philosophers from the sixth and fifth centuries BCE, while Socratic indicates Socrates and his contemporaries. Originally, the term casuists interrelatered to anyone who was sophos (wise), and could apply to poets, musicians, philosophers and statesmen. In the fifth century BCE howalways, it began to refer a group of travelling intellectuals who specialised in tutoring persuasive speech. (While Pre-Socratic and Socratic ar both terms that de none the period of the philosopher, the term sophist refers to the method, it is possible therefore, to be both Pre-Socratic and a sophist, like in the fountain of Protagoras.) Where Classical mythographers depended on the supernatural for their explanations, philosophers pursued the rational direct that is open in n atural events. Myths, specifically in this discussion, Greek myth, tended to focus on people, whilst the Pre-Socratics were focused on finding natural explanations. The major difference however, between the Pre-Socratic philosophers and the mythographers of the time, was their approach to explaining the external world myths, lessonly ambivalent and self-justifying, allow numerous explanations yet the Pre-Socratics aimed to find a single cosmological principle.The first titular histories were composed by Herodotus and Thucydides in the fifth century, and these were followed by attempts by Socrates, Plato and Aristotle to acknowledge the external world through logical inquiry. Considered one of the defining moments in the human perception of the external world, these journeys into science and philosophy1represented a shift from the preceding belief of a world controlled by aleatory gods, to that of a structured universe understood through scientific rumination and rational thoug ht (Study Guide 130). Some of the earliest speculation on this structured universe can be traced to Thales. In his Histories, Herodotus describes Thales foretelling of a solar eclipse This change from daylight to darkness had been foretold to the Ionians by Thales of Miletus, who frozen(p) the date for it in the year in which it did, in fact, take place. (Herodotus) By modern standards this foretelling may not seem very precise, and we can be confident that it wasnt predicted through any scientific understanding of its cause, nevertheless, Thales prefigure demonstrates an understanding of the order of the world, inasmuch as he had correctly interpreted anterior observations of the phenomena by the Babylonians.Diogenes Laertius makes it clear that Protagoras, a Pre-Socratic philosopher and sophist, was fundamental to the debate of muthos versus logos quoting Protagoras as saying, Man is the measure of all things (Laertius) and later, Where the gods are concerned, I am not in a po sition to ascertain that they exist, or that they do not exist (Laertius, Lives of the Eminent Philosophers 9.52). The first citation appears to be unequivocally reduction the importance of the gods in favour of man and his rational ability, however, the second quote suggests that Protagoras was actually noticeably cautious in his declarations. To further examine his thoughts, we should recall his statement that There are many impediments to such knowledge, including the obscurity of the publication and the shortness of human life. (Laertius, Lives of the Eminent Philosophers 9.52) This seems to declare that science and philosophy do not have all the answers, and in fact, may not ever find them given the shortness of human life. This, in contrast to a tradition of mythology that has seemingly always provided explanation, may deter any potence converters. It is difficult unfortunately, to interpret these sources accurately since we have no reliable contemporaneous context. Howev er, what this example does make clear, is that the division between traditional myth and the appear philosophies was considerable, especially when taken into account with the trial and execution of Socrates.Socrates is today credibly the best-known of the ancient philosophers, not least because of the circumstance leading to his death, and was an substantial figure in the intellectual developments of the fifth century BCE. His views on devotion are most clearly seen in the accusation laid against him Socrates is blameable of refusing to recognize the gods recognized by the state, and of introducing other new divinities (Laertius). However, it is difficult to be sure of exactly what Socrates beliefs were, particularly with regard to Xenophons Memoirs of Socrates, in which he argues that Socrates conceived that the gods were accountable for his abilities in divination, and that therefore, if he trusted in gods, he surely mustiness have believed in gods (Xenophon). The execution of Socrates by the State demonstrates the magnitude of the curse that they felt these new divinities posed. Although myths were not initially intended to communicate moral and/or political beliefs, as Champlin explains, they were routinely manipulated by emperors in order to enhance their own reputation, by appropriating the gods and heroes of myth and legendary historypoliticians could present images laden with meanings which were quickly recognizable to a broad public (Champlin 144). The rational order that philosophers were searching for could not be manipulated in the same way that myths could, leaving emperors without one of their leading advertising schemes.Poetry, literature and drama were a substantial part of the Greek culture, and central to them were the Greek myths which provided seemingly interminable inspiration. The ancient writers often altered myths to suit their own agenda, be it private choice, or to reflect the political or social regularises of the time. Pl ato appears to view this influence of myth on society not just as unacceptable, but as almost damaging, explaining that relating myths might encourage people to mirror the actions of the gods and do the worst crimes, yet think he is doing nothing amazing (Plato 378b2 4). He states explicitly that the stories told by Homer, Hesiod and other poets are false (Plato 377d4-5), that they contain no moral exemplars, and that even their benefit as allegories is ineffective, since the young cannot distinguish what is allegorical from what is not (Plato 378d6). His proposal to throw out the majority of the stories is tantamount to rejecting the Greek cultural heritage, and would presumably have been viewed by many as the final disrespect. There is an apparent paradox however, in that much of Platos own philosophic work is infused with myth. Murrays explanation of this is that Plato does not intend to free the mind from myth, but rather to appropriate myth from the hands of the poets and c onstruct new myths that volition serve the interests of philosophy (Murray). Platos faiths regarding what he views as the immoral behaviour of the gods are reminiscent of those of Sextus Empiricus who describes their behaviour as shameful and reprehensible (Empiricus). Also, like Plato, Sextus Empiricus name Homer and Hesiod as instrumental in circulating such immorality. He equates the gods behaviour with the worst of human behaviour giving the examples of stealing, adultery, and deceiving one another(prenominal) (Empiricus), all of which appear frequently in the stories of the gods and in doing so raises the question, If the gods are apparently morally inferior to us, are they worthy of our respect and fear? Sextus Empiricus statements exhibit the beginning of a more critical opinion of the gods that draws on logic and reason. It is possible, that Plato, and Sextus Empiricus, opinions, inadvertently facilitated the survival of myth because the Greeks were opposed to losing not only their primary means of entertainment, but indeed their heritage.In the classical Greek world, philosophers and scientists were still in relatively small numbers game, and often confined to the higher(prenominal) classes who had the time and money to explore and experiment. This meant that their ideas only reached the minority. Since the spread of their philosophical and scientific ideas was limited, it could be argued that myth and tradition would have been maintained simply by intellectual apathy.While the developments in philosophy and science were advancing considerably, myth and tradition retained its much of its influence over the Greeks, a troth that be seen in many of the extant texts from the time. The question of reason versus myth/religion is one that continues today even in the modern world, where headache relies on computers, international travel takes a matter of hours rather than days, weeks or even months, and where man has been to the moon, we still look towa rd a belief that is thousands of long time old. While there are numerous reasons to explain why myth has endured, it may be a simple case of greater numbers there was so much literature about myth that, in comparison to early philosophy, it stood a greater chance of survival. In my opinion however, it has more to do with human nature people need religion today just as much as the Ancient Greeks essential myth. This, in my opinion, is why myth survived in the face of the scientific and philosophic advances of the classical Greek world people simply need to believe in something greater than themselves.
Subscribe to:
Posts (Atom)