Thursday, September 5, 2019

Concentric Circle Approach To Defence And Foreign Policy Politics Essay

Concentric Circle Approach To Defence And Foreign Policy Politics Essay Security perspective after Cold War has changed tremendously. Not only that state has to deal with external military aggression, it also has to go through overwhelming challenges of non-traditional security issues. Among the issues are terrorism, ethnic conflict, sea piracy, smuggling of illegal weapon and drug trafficking  [1]  . In this case, Indonesia is not an exceptional. Although Indonesia has been cautious to any action taken by any states within its geostrategic area since 1945 (after independent today), the concentration given by Indonesia government since mid-1990s is more on the non-traditional issues that impede states domestic political stability, unity, territorial integrity and thus to its sovereignty. This is partly due to the region where it is located, that is (to a certain extent) stable and less prone to the state-to-state conflict. In this case, the traditional threat of aggression from other countries is very unlikely to happen in this region  [2]  , its military preparedness has to be intact to overcome all mentioned non-traditional security issues that it is currently confront with  [3]  . For Indonesia, the dynamic shift of threat from non-taditional to traditional security may manifest themselves in the form of invasion or aggression from other countries  [4]  especially when considering the case of 9/11 terrorist attack and the reaction taken by United States and its allies in their mission on the global war on terror in Afghanistan as an instance. Concious with the challenges that impede Indonesia lately particularly when we look at terrorist Bali bombing in 2002 and J.W. Marriott bombings in 2003  [5]  , the twin-suicide bombing at the J.W Marriott and Ritz-Carlton hotels in 2009, as well as its unresolve issues of armed separatist movement imposed by Free Papua Movement (OPM)  [6]  , has made Indonesia aware that if the government did not overcome such non-traditional security issues effectively, it would cause more political, economic and social instability than what Indonesia is currently facing with. Thus, in order to overcome such situations, Indonesia through its defence and foreign policy has been used as a guideline to maintain states order as well as its national interest or national security. The question is what is Indonesias defence and foreign policy? How does Indonesia utilise its resources to overcome the traditional and the non-traditional security threat considering the challenges that it has to face especially when domestic instability is eminent. Apart from that, how does Indonesia synergise its defence and foreign policy to overcome the problem? What kind of approach that Indonesia use to preserve its own national interest? And what exactly is Indonesia national interest? By considering its security threats this paper argues that i) on one hand, Indonesia mobilises or use its armed forces to tackle the problems that occur, in which the preservation of states sovereignty and territorial integrity is its primary goal. ii) Indonesia, on the other hand utilises its foreign policy as a synergy in maintaining and achieving states national interest through different type of strategies. iii) This paper will conclude that, as in the case of Indonesia; foreign and defence policy cannot be separated especially when discussing states security perceptions and the strategy that it use to overcome it. In this case, state (Indonesia) uses its two statecrafts (state strategies) through the use of force as well as diplomacy as its major instrument in preserving and maitaining its national interest. Therefore, this paper will highlight, first, Indonesia internal and external security threats. Second, Indonesia defence policy in addition to its strategic national interest and third, this paper will focus on its foreign policy and approach taken by Indonesia in synergising its defence and foreign policy as a method of preserving and maintaing its national interest. 2.0 INDONESIA INTERNAL AND EXTERNAL SECURITY THREAT As the Republic of Indonesia enters the year of 2010, and celebrates its 65th Independence Day in August of the same year, it is evident that the security concern of the state will continue to be dominated by the same issues that it faced a decade ago. In fact the major concern of Indonesian government is unlikely from external threat of aggression rather their internal or domestic political instability. It was stated in the white paper issued in 2003 when Indonesian government acknowledged for the first time on the persistence of non-traditional security issues that occurs in the country  [7]  . A glance at Indonesias security perceptions, internally; despite a relative improvement in the economic development as well as its political situation, Indonesia faces tremendous difficulty in overcoming at least three [3] key security issues or challenges: i) the threat of terrorism, ii) protracted secessionist movements, and iii) the return of communal violence. Externally, the war on terrorism both at the regional and global levels continues to place Indonesia at the centre of regional and global attention. In this case, the nature of Indonesian government responses to the problem of terrorism, in which the government is constrained with its domestics capabilities in pertaining to the communication network level and its locals sensitivity to curb terrorism within the country, is putting the Indonesian government in a state of strain particularly on its relations with the outside world; regionally ASEAN as the whole, its close neighbour Australia as well the United States. The security environment of Indonesia remains volatile since it retains independent status in 1945. In this case, the most security challenges faced by the government of Indonesia now remain the threat of terrorism  [8]  910. Being the world largest archipelago with the biggest Muslim and multicultural population in the world, Indonesia certainly has a multi-diverse complexity in maintaining order and security. In this particular context, terrorism has become the threat to the safety of the nation, even a threat to democracy and civil society  [11]  . Despite the successes of arresting and prosecuting hundreds of terrorism suspects, radical groups were still active in recruiting new members. Since the bombing of Toserba Ramayana, Jakarta on January 2nd 1999 until the twin-suicide bombing at the J.W Marriott and Ritz-Carlton hotels in 2009, terrorism threat in Indonesia has increased tremendously  [12]  . Ten years of receiving consistence terrorisation from the terrorist group, there has been a serious doubt, if not pessimism, in the country whether the government has the ability to find and deal with the impact in a swift and firm manner. The government faced a difficult task of balancing the need to crack down terrorist networks and the imperative of taking into account terrorist group activities  [13]  . Apart from terrorism, Indonesia at the same time faces major threats from armed separatist movement  [14]  . In fact, the armed separatist movements were not new to Indonesian government. As early as 1950s (during the tenure of Sukarno until today; President Bambang Yudhoyono), the primary objective given by Indonesia government are still the same which is maintaining order at the domestic level especially to the case that derived from armed separatist movements which happened in East Timor  [15]  (now Timor Leste), West Papua  [16]  (still happening), and even in Aceh  [17]  province  [18]  19. In other words, its main task is safeguarding Indonesias territorial integrity. Aside from territorial integrity comes national economic strategic interest and states sovereignty. All these interest embedded in the Preamble of the 1945 Constitution. Among others, State has to safeguard and protect the sovereignty of the state, territorial integrity of the Republic of Indon esia, the nations safety and pride, and at the same time involve actively in efforts to create world peace  [20]  . Communal conflicts that happened in Maluku, South Sulawesi (Poso), in Kalimantan (Sanggau Ledo, Sampit, Sambas) was also considered as one of the major security threat facing by Indonesia from within  [21]  . So much so, it requires serious attention from the central government. Indonesia is a heterogeneous state. With a vast number of ethnic residing in a country as well as the geographical characteristic as an island nation; makes it easy for communal conflicts to occur. The issue that triggered the conflict was mainly due to a religious (Maluku and Poso, Sulawesi) and racial (West Kalimantan) background  [22]  . In fact, to some extent it was also triggered by an intergroup exclusivity and the socio-economic gap. According to Jones  [23]  , in her report says, one of the things we see is how changing population balances among different ethnic and religious groups has led to certain kinds of tensions, often with one group feeling that it is under siege by another. The l oss caused by communal conflict is enormous; it causes waves of evacuation, tremendous suffering of people, casualties and large material loss. In fact, the biggest communal conflict is ruined national solidarity and the bond of unity as a nation. Indonesias external threat perceptions on the other hand remain shaped primarily by internal sources of instability and conflict and suspicious of involvement of foreign actors in those internal conflicts. Indonesias elite, both civilian and military, continue to express concern over the possible involvement of foreign countries not only in the regional rebellions such as Aceh and Irian Jaya (Papua) but also in the spate of terrorist attacks across in the country, especially the Bali bombings. Some Indonesians believe that there is an international conspiracy (especially by the West) to undermine Indonesias stability and security through the issue of terrorism  [24]  . Many also recent the fact the international community, especially the United States, has come to see Indonesia as a hotbed of terrorism. These sensitivities among government officials, political, community leaders, and the public at large have in turn brought about a degree of uneasiness for Indonesia in both its r elationship with neighbouring countries in the regional war on terrorism and its relations with the United States  [25]  . 3.0 INDONESIA DEFENCE POLICY AND ITS STRATEGIC NATIONAL INTEREST In analysing Indonesias defence policy and its strategic interest, this paper will highlight few important things. First, this paper will look at its defence policy, the nature of its national interest as well as its strategic interest in overcoming states security challenges. The map of Indonesia. Source: http://www.electricscotland.com/thomson/reflections10.htm. Date of Accessed: 1 October 2010. The primary legal documents bearing on defence policy are the 1945 Constitution and the Defence Act (Law No.20) of 1982  [26]  . Constituted under article 30 of the Constitution, it is stated clearly that the duty of the state government is to protect all Indonesians (citizens) in every aspect from any threat. The notion to protect Indonesias citizens, however, is part and parcel of Indonesias national interest that is; to safeguard and to protect the sovereignty of the state, the territorial integrity, the nations safety as well as its pride  [27]  . The foci of Indonesias defence and security are thus, represented in conventional term as a series of concentric cirle emanating from Jakarta. In providing a clear picture of this defence and security strategy, the main area that covers the most or hot area of Indonesias security is its land and maritime borders (strecting up to its Zone Economy Exclusive, ZEE). The second circle, on the other hand covers the area of its neighbouring countries as well as the region where it is located. In this particular context, what ever happens in the region will directly or indirectly gives impact on the security aspect of Indonesia especially when it is located at one of the most important trade sea-lane that connect the West and the East; streching from Indian Ocean to the Straits of Malacca and the South China Sea. Thus, on account of its strategic position, it is important for Indonesian Armed Forces to maintain its national jurusdiction especially when almost all countries in the world rely heavily on Indonesias stability and security as well as its self-defence capacity for its own national resilience  [28]  . In other words, the development of a strong and flexible state apparatus, political and social cohesion and a ruboust economic infrastructure which enables Indonesia to defend itself and contribute to the defence of the region. Defence Act 1982, on the other hand provides a basic provisions of the defence and security of the Republic of Indonesia. It is a notable document that mentioned the social and political functions of Indonesian Armed Forces. Lowry  [29]  stated that; The act states that national defence and security includes defence against both external and internal threats amd that these threats may be directed against national freedom, sovereignty, national unity and solidarity, the integrity of the nation and national jurisdiction, and the values of the national idealogy; Pancasila as well as the constitution. The Act also explained that the threat can be overcome by total peoples resistance within a system of total peoples defence (Sishankamrata). It was designed to marshal and mobilise the nations physical, moral and material resources. In order to attain the desired goals, Indonesia has highlghted few startegies. Among them are permanent strategic interest, urgent strategic interest and the international cooperation in defence which underlies in future strategic interest. All of these embedded in Indonesias Strategic Defence Interest  [30]  . The permanent strategic defence interest of Indonesia is the administration of defence to guard and protect the countrys sovereignty and the unityof Indonesia and the countrys honour from every threat, either from outside or from inside of the country. In order to protect all these interests, it is important to be prepared to defend the country without regard for the argument as to whether or not a concrete threat exists. In carrying out permanent defence interest, Indonesia will always maintain a love for peace, independence and sovereignty. Thus, in resolving every conflicts and dispute, Indonesias will always first put forward diplomatic efforts and the use of force wil l be mobilised if the diplomatic means fail. Therefore, the Indonesia chooses an active defensive strategy in its defences. Indonesias urgent strategic interest on the other hand is directed to overcome actual security issues, which action could undermine and distrupt indonesias sovereignty and unity. In line with this, there are few security threats that Indonesia has to overcome with. The security issues, nonetheless, are heavily concentrated on the non-traditional security issues that emerge within the country. This includes fighting and overcoming the international threat at home and abroad, overcome the disturbances of armed separatist movements, counter radicalism and solve communal conflicts, overcome international crime as well assisting the government in handling natural disaster or any humanitarian activity  [31]  . As part of the international community, Indonesias pursue its third form of direct defence strategy based on international cooperation interest. In this case, Indonesia realise that other than the use of force as part of its statecraft strategy, Indonesia is committed to create a peace and good relations with other countries especially with its neighbour, the regional context and the world based on trust and cooperation. In fact, it cannot release itself from any connection with the world in the effort to achieve its desired goals. For Indonesia, this is the best strategy that could protect the nation from any external aggression especially in a form of state-to-state war. It is ecapstulated as part of Indonesias regional resilience. As a former secretary general of the Department of Defence and Security put it: we must defend further forward by befriending our neighbours and even by possesing the same threat perceptions (Quoted in Lowry  [32]  ). Recognising the limitations of i ts resources, Indonesia thus seeks a balance of interest rather than a balance of power  [33]  . In order to fulfil the requirement in upholding states national interest, Indonesia defence policy has come out with a strategic defence in which it should ensure the accomplishment of its national interest and its international cooperation. 4.0 INDONESIA FOREIGN POLICY AND THE LINGKAGES TO ITS DEFENCE POLICY IN PRESERVING ITS NATIONAL INTEREST Although Indonesian government recognises and stressing oftenly on the need to maintain internal order or domestic political stability as well as territorial integrity as a primary objective for its defence strategy, this does not mean that other form of strategy is neglected. Indonesia, like other country in the world, pursue diplomatic statecraft as its first agenda especially at the international level. In this case, Indonesia apply active defensive approach or as what Lowry  [34]  coined as forward defence. As its defence policy, Indonesias foreign policy is also uniquely influenced by its domestic events. Indonesias foreign and defence policy has always been a reflection of the beliefs and the actions of policymakers who are influenced, in varying degrees and ways by the society and the international system in which it operates. Although Indonesia has withnessed different kind of leadership and approach that has been taken on its foreign policy, there has been no major changes being made by the Indonesian leaders except for some concentrations at the substantial issues like, the issuence of stabilising political order and combating terrorism by President Megawati and diliberating and extending economic resilience during the tenure of Abdul Rahman Awahid and B.J. Habibie. All of these could be said as the extraneous variables that has influnced Indonesias foreign policy. Over all, the domestic imperatives such as commitment on the need to stabilise domestic politics, to preserve states territorial integrity and sovereignty as well to maintain states economic development has dominantly influence Indonesia foreign policy until today. What kind of approach that has been taken is rather different from one leader to another. As mentioned ealier, Indonesia foreign policy is a synergy to Indonesias defence policy. In this case, it requires extensive participation at the regional level as well as at the global level. For instance, under the tenure of President Bambang Yudhoyono, Indonesia is currently focusing on a new foreign policy outlook claimed as securing Thousand friends and Zero Enemies  [35]  . Under this policy Indonesia is moving towards attaining and trying to emerge as a responsible power (Middle Power) in the Southeast Asia region. It is carefully articulated as to improve relations with every nation in the region through bilateral and multilateral means. This includes promoting justice and order at the international arena, better investment policy for economic development, democracy and consolidation in regional integration as well as maintaining national unity. All of these strategies are important for Indonesia as one of the method that could improve Indonesias image at the internatioal fora esecially against all allegations of human rights abuses conducted against armed separatist movements in Aceh and Papua. For that, Indonesia is pursuing an active and independent approach  [36]  37 The necessity in conducting its foreign policy in constructivist approach is to denotes the ability to turn adversary into friend and to turn friend into partner. All of these are important as to provide a conducive environement in the region for the better future development based on thrust, confidence building  [38]  . With such sitiation, all disputes and conflicts could be settle at the table of discussion through a diplomatic approach rather than aggressiveness. In this case, Indonesia will therefore not to use its forces as a method of finding solution. To prove this kind of things as important as it is, Indonesia, as of to this date, has not engaged in any military alliance with a foreign policy especially in securing its own capacity to influence world order or international relations. For that, Indonesia advocates that all Southeast Asian states develop their full economic, political and social potential while cooperating extensively with each other. This is the hope tha t could boster external aggression or challenges. At one level, this could be a security buffer for Indonesia if the region could be persuaded to act in unison to twart the incursion of hegemonic influence. However, no other nations are enthusiastic to serve as security buffer for Indonesia  [39]  . Indonesias contributions to international security remain limited and focused on the regional level, especially in the war against terrorism. Indonesia has signed a number of antiterrorism agreements with some regional states. The Bali bombings and the Marriott bombing have not persuaded Jakarta to publicly-support the involvement of external powers in regional problems in which Indonesia continues to prefer regional solutions to regional problems. Apart from that, Indonesias foreign policy goal is to emerge as a responsible power in the Southeast Asian region. It is a unique amalgamation of the two schools of thought and policy of adaptation to the changing geopolitical and geostrategic compulsions. Being the world largest archipelago with the biggest Muslim population is again trying to gain leadership position in the region through a constructive and cooperative gestures and balanced bargaining between major powers. In fact, Indonesias foreign policy is based upon a number of cherished principles that reflect the countrys sense of national identity, how it wishes to protect and pursue its national interests vis-à  -vis other countries, and the shape of the desirable world order. On 19 September 1999, President B.J. Habibie signed Act no. 37 of 1999 on Foreign Relations, which was actually the first such Act on foreign policy, signed since trigger Indonesias independence. This Act formally stipulates key principles of Indone sias foreign policy that had been practiced for most of the countrys existence. In that context, Indonesia consistently expresses the hope that the ASEAN will continue to serve as the main vehicle for regional countries to cope with security challenges in the region, especially non-traditional threats such as terrorism. During the 2003, ASEAN Summit in Bali, Indonesia obtained agreement from other ASEAN members to transform the organisation into a security community by 2020. Indonesia has also called for an increase in intra-ASEAN maritime cooperation to provide more and more security aspect of the region as well as to its own country. 5.0 CONCLUSION Being the world largest archipelago with the biggest Muslim and multicultural population, Indonesia is trying it best to play a leadership role and at the same time struggling to maintain order mainly from its domestic instability as well as external security threats. Overseeing its defence, security as well as its foreign relations has proven complex in sense considering its size, location, economic underdevelopment, geographical fragmentation and ethnic and religious diversity. However, since its Independence, Indonesian leaders have managed to manoeuvre the state and provide cohesion and national identity under a unitary state. Looking at its foreign affairs, Indonesia has become a major political force in Southeast Asia. With its power resources mainly from its population, huge area of territory, vast number of natural resources and its potential market makes it important at the international arena especially in the region of rapid economic growth. Indonesia has taken a traditional-middle power role or approach in encouraging continued US engagement in the region as a stabilising force during the current period of transition (referring to Indonesias domestic politics from guided democracy with vast amount of military involvement in the administration to civilian control). Moreover, the encouragement is also due to the fact of uncertainty especially with the rising of Chinas power in the future regional order. Nonetheless, it also need China to participate into the regional community is some form of cooperative or common security arrangement to prevent the formation of competing power blocs. Indonesia sought to change the pattern of its external relations. The pattern usually occurred in terms of partnership as well the type of activity that it involves. At home, Indonesias traditional defence strategy has been one of national self-reliance based on total peoples defence with the armed force as the core of the nations arms. However, there are some challenges that it has to overcome with. Indonesia in this case acknowledged that their major difficulties are to cope with the vast number of islands as well as with the vast number of ethnic residing in the country. All of these could be tackled through an active participation from the population to help maintain order. However, globalisation is somehow another and big challenge to Indonesia as more and more population becoming more political democratic, appreciate interdependence economic development based on open market, there is no way that it could avoid for the population to become more individualistic than ever. It has somehow deteriorating the nationalism of the population. ENDNOTES

Wednesday, September 4, 2019

Advantages And Disadvantages Of Optimisation Techniques

Advantages And Disadvantages Of Optimisation Techniques We have to use different techniques to optimise our website. Our main focus will be on how to reduce the size of the webpage and script execution time. This, in turn, will definitely improve the user experience as well as reduce the load on the servers. The images and graphical interfaces occupy the maximum storage size on the webpage. Therefore we need to compress the images and the scripts in an effective manner that wont affect functionality and quality of the website. First we need to simplify the design of the website, reducing the number of HTTP requests. JavaScript and CSS can be minified by removing comments and space characters from the code. Furthermore we can make java script and CSS external which can be cached by the browser. Post Load and Pre Load components can be set, which will make the user experience better by initially loading the important content and then loading the remaining content. Ultimately we can optimise loops which will reduce the script execution time. Specific Optimisation Techniques to be used for the Website The different optimisation techniques are: Minimise HTTP requests Add an expiry or a cache control header Put scripts at the bottom Remove duplicate scripts Make Ajax cacheable Post load components Pre load components Make JavaScript and CSS external Reduce DNS Lookups Minimise HTTP requests The majority of the time taken when a page is loading is a result of HTTP requests. Reducing the number of components will thus reduce the number of HTTP requests required to render the page. This is the key to faster loading pages. Combined files are a way to reduce the number of HTTP requests by combining all scripts into a single script, and similarly combining all CSS into a single stylesheet. Discussing the decisions for each page We will use some techniques which will be applicable on all the pages. Style sheets will be placed at the top and scripts at the bottom of the webpage. AJAX, JavaScript and CSS made cacheable. CDN servers will be used and redirects, 404 errors, and empty image source avoided. GET will be used for AJAX requests and also make efficient use of pre and post load components. The complete JavaScript code and CSS will be minified. The Home page is the one which should be fast, attractive and interactive. The Home page will make up the rapport of your website. In order to make it attractive we need to use different images, CSS, graphical interfaces and flash content. Images and graphical interfaces are bigger in size so we will scale them and try to convert them into a more suitable format such as Portable Network Graphics (.png). The users login page, discussion page, upload page and modify page will be much simpler than home page but they will contain lots of videos and images with the description. Thus, we can just remove the white space characters from their code reducing the size of the webpage and optimising the images. Videos are too big in size so we will not upload it on our server. We will use YouTube or other free video upload sites and embed the link on our webpage. Product Catalogue will contain all the images of the product that can be searched and sorted by category and brands. The loops will be optimised for faster search and sorting. Business information, current employees and product information will contain the detailed textual description with images of what we do, what we sell and who works in our company. All this information is static, so we will cache the information and optimise the images. Q2. Client side security issues are an extremely important component of any web-based application. Introduction Client side security is one of the most important topics in internet security. All the information which has been downloaded from servers is stored on the clients machine. All the site preferences as well as your login details are stored as cookies on the local machine and we need to keep those files safe from hackers. We use different antiviruses and firewalls on the local machine, however they are not as efficient as they should be. JavaScript and AJAX are the most vulnerable languages for most of the current web-based exploits like Trojans, viruses, etc. [1] (Uta Priss, 2012, Advanced Client-Side Security:What many users do not know, From http://www.upriss.org.uk/awt/lec4a.pdf) In this document we will look at the major threats, type of client side attacks and some strategies for minimising those risks. Problem Domain Nowadays internet is a basic necessity of day to day life. We are so dependent on internet these days. Everything from paying our electricity bills to international business meetings we do online. All our bank details are on our local machine which is vulnerable to hackers. For this reason do we need a secure system to work safely online. Whenever we use internet our local system stores the information from the server which contains your preferences, form data and the history of the webpages you viewed. How do hackers operate..? Hackers try to bypass the firewall and gain inappropriate access to local host resources. There are more chances to breach the security of the firewall when the hacker and the host are on the same network because request for resources originating within the network can be trusted more than request originating from outside the network. (Bidgoli Hossein , Wiley John Sons, (2006) Hanew Jersey, John Wiley Sons) Issues One of the most widely used languages for website development, JavaScript, is not secure. JavaScript is an open scripting language which means anyone can manipulate it and change its function. The JavaScript security model attempts to protect the user from websites that may be malicious and is not designed to protect the website owner. It cant protect data sent from the browser to the server and there are limits on what the page author can control via JavaScript whilst it is being executed within the browser. The success of JavaScript is also however the reason why attackers have targeted and leveraged the technology as a means to compromise the systems and reek untold grief for clients. JavaScript has been used to perform attacks that involve redirects, downloading of content, or even revealing details about a victims system.[2] Now we will discuss some attack strategies such as XSS (Cross Site Scripting), CSRF (Cross Site Request Forgery) and introduce some prevention measures to i mprove the security of the website. XSS Cross-Site Scripting attacks are a type of injection problem, in which malicious scripts are injected into the otherwise benign and trusted websites. Cross-site scripting (XSS) attacks occur when an attacker uses a web application to send a malicious code, generally in the form of a browser side script, to a different end user. Flaws that allow these attacks to succeed are quite widespread and occur anywhere a web application uses input from a user in the output it generates without validating or encoding it. An attacker can use XSS to send a malicious script to an unsuspecting user. The end users browser has no way to know that the script should not be trusted, and will execute the script. Because it thinks the script came from a trusted source, the malicious script can access any cookies, session tokens, or other sensitive information retained by your browser and used within that site. These scripts can even rewrite the content of the HTML page. Prevention measures: Validate, filter, and sanitise all input Process output response stream data through encoding Many modern browsers will attempt to detect an XSS attack and notify the user CSRF CSRF (Cross-Site Request Forgery) is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attackers choosing. A successful CSRF exploit can compromise end user data and operation in the case of a normal user. If the targeted end user is the administrator account, this can compromise the entire web application. Prevention measures: Implement strong XSS mitigations Use Tokens to verify expected user actions Hidden form value fields E.g., RoR ASP.Net MVC provide framework support Use POST for any actions that alter data on server side Is the idempotent web paradigm for HTTP GET compromised? Check HTTP Referrer Most modern browsers include features to palliate the following attacks: Phishing Attacks Spyware Malicious websites Adware Destruction or corruption of data or configuration Theft of configuration information Installation of malware Theft of information and identification (Oriyano Sean-Philip and Shimonsk Robert,(2012)Client Side Attacks and Defense, USA, Elsevier, Pg 130) Conclusion In summary, we discussed the major client side scripting attacks, preventive measures and the most vulnerable languages. Client side scripting attacks are effective in taking the personal information of the user. However, if we play smart we can extenuate and avoid those attacks in the first place by making some changes in our firewall settings and not clicking on suspicious links. Prevention is always preferred over a cure for the problems being faced for a normal user in this unprotected web environment. As programmers, we should make appropriate use of the AJAX commands and code the website in such a way as to make it more reliable and harder to alter. Lastly, JavaScript is the most popular language and will remain so in coming years. In light of this, we should make efficient use of the primary functions and the libraries to make it less vulnerable to attacks.

Free Hamlet Essays: Deception in Hamlet :: GCSE English Literature Coursework

Deception in Hamlet Deceit, misleading information, and spying on others can lead to their demise, intentionally or accidentally. The misleading and deceitful instances in the play are indirectly responsible for Hamlets’ death. Claudius misleads Hamlet when he shipped him off to England under the guise of a restful retreat and when he realizes that the new king has lied to not only him, but the people of Denmark about the death of the former king. Hamlets’ deceit comes from his mother, believing that she has betrayed his father’s love by not mourning for long enough after his death, and by marrying Claudius. Spying also causes problems for Hamlet down the line since it leads to the killing of Polonius, and the deaths of Rosencrantz and Guildenstern. Misleading instances in the play occur frequently.The moment when the Ghost tells Hamlet that his death was not accidental and that he was poisoned by Claudius is what starts the trail of lies and murder in the play, ( I;v;74-77 ) "Thus I was sleeping by a brother’s hand†¦/†¦/ cut off even in the blossoms of my sin, unhouseled, disappointed, unaveled." Until the night of the "Mouse trap", Hamlet still has some doubt in his mind about the Ghosts words. As soon as the king reacts negatively to the plot, Hamlet is one hundred percent sure that Clauduis was deceiving the whole country about Old Hamlet’s death; (III ;ii ;267) "O good Horatio, I’ll take the ghost’s words for a thousand pound. Didst perceive?" Hamlet witnesses the king storming out of the play, showing he was affected by the death of the player king, seeing as how the he died the same way as his brother. It is also apparent that Hamlet is out to mislead the general public by putting on a false face. His "antic disposition" allowes him to act without consequence. He is able to appear mad when it is convenient for him, and this allowes him not to raise any suspicion about his actions, ( I; v; 171-172 ) "As I perchase hereafter shall think meet to put on an antic disposition on." After the killing of Polonius, his antic disposition allows Hamlet not to be held responsible. This leads to him being sent away to England under the guise of a trip for rest. Claudius once again deceives Hamlet and his mother by having an alternate agenda.

Tuesday, September 3, 2019

Adolescence Essay -- Adolescent Behavior

Adolescence According to the dictionary, the word â€Å"Adolescence† is the stage of youth; or maturity. And yet, if you really think about it, that definition merely touches the surface. Adolescence is that part of ones life that he or she will never forget because it plays a big role in the formation of who that person will become.   Ã‚  Ã‚  Ã‚  Ã‚  It is quite normal for parents to think they know their children; REALLY know their children. In fact what they know, in most cases, is their child’s external behavior. Anything, which doesn’t fit into the parent’s idea of the child’s character, is liable to be classified as an unexpected reaction or absurd behavior.   Ã‚  Ã‚  Ã‚  Ã‚  To know a child however, one must not judge him by his defects, or his virtues. To do this could lead to the child being classified by the parents in such a way as to make it difficult for them ever to abandon this view. Knowledge of a person’s external behavior is a rather superficial kind of knowledge. It could lead parents to think of their child in terms of what he does, rather than what he is.   Ã‚  Ã‚  Ã‚  Ã‚  It is not clear what criteria parents follow when the want to classify or describe their child. Often they expect the child to fit into a scheme of adult values without realizing that the world of the adult and that of the child are quite distinct. Children have to be educated to be adults; it is not a matter of trying to turn them into adults when they...

Monday, September 2, 2019

Conflict, Decision Making, and Organizational Design Essay

1. Discuss how you could apply negotiation strategies to address potential conflicts in the workplace. The primary focus at Department of Veterans Affairs (VA) is patient/Veteran care and establishing new Veteran enrollees. This is done by direct marketing among other forms of outreach. For VA, negotiation will be important in not only establishing a new enrollee, but keeping that enrollee as well. According to Hellriegel and Slocum, integrative negotiations are used to â€Å"achieve results that benefit both parties† (2011, p.397). By consistently explaining and showing Veterans the benefits, they gain by maintaining their health care through VA, and how the outcome will benefit them, VA will continue to receive the federal funding to continue sustained operations for the coming years. According to Hellriegel and Slocum in order for integrative negotiations to be successful, VA should follow these principles: * Separate the people from the problem- VA’s staff must not allow their personal issues with Veterans to interfere with the negotiation process instead focus on the issue at hand. * Focus on interests, not positions – Understand the needs and interests of the clients instead of being concerned about title. * Invent options for mutual gains- This is where creative decision making comes into play. By presenting the client with several alternatives to meet their needs, Winston has a better chance of finding one that the client finds appealing. * Insist on using objective criteria – When dealing with marketing, it is imperative that goals are measurable and obtainable. 2. Determine how evidence-based management could be applied to the work environment you researched. Evidence-based management is defined by Hellriegel and Slocum as â€Å"the premise that using a better, deeper diagnosis and employing facts to the extent possible enable managers and leaders to do their jobs better† (2011, p.425). Hellriegel and Slocum also outline five diagnostic questions to be used to help leaders avoid â€Å"simpleminded quick fixes† (2011, p.425) which address how assumptions are used, if the assumptions are reasonable, and what alternatives could address the same issue more consistently. At Winston there are a few areas where evidence-based management could apply, specifically human resources and scheduling. The human resource department at Winston is responsible for recruiting talent and developing training. Both these tasks are found in almost all organizations, therefore extensive data about how to best approach them is available. In such an instance, utilizing tried and true techniques for evaluating prospective employees and training them to properly do their job saves Winston time and money because they do not have to risk failure trying to develop their own techniques. Scheduling is also an area where there is extensive data that supports how to properly schedule employees to ensure that all client goals are met in the predetermine time frame. In fact, scheduling is one of the major components of Operations Management. 3. Analyze the blocks, stages, and methods of creative decision making to determine the best approach the employer you researched should follow when making managerial decisions. The very nature of the business at Winston lends itself to creative decision making since all the tasks involve the use of some form of creativity. From packaging design to visual stylists, the team at Winston is constantly using their creativity to meet client expectations. As a result of the artistic environment, using creativity when making managerial decisions comes naturally at Winston. There are several blocks, stages and methods of creative decision making yet only one approach would work the best at Winston, Osborn’s Creativity Process. Creative decision making involves several things, but before beginning the process it is important to recognize the blocks that can it from working properly. Perceptual blocks happen when one does not interpret a problem correctly based on a limited scope of understanding. When applied to the type of work done at Winston this can happen if an Account Manager incorrectly stereotypes the target demographic based on their personal experiences. Cultural blocks happen when one has a desire to conform to societal norms, avoid conflict, be practical, and believe that open-ended exploration is a waste of time (Hellriegel & Slocum, 2011, p. 431). The staff at Winston must not be held back by cultural blocks because often the brands they work for are being marketed to an extremely diverse customer base with no clearly defined culture. In fact, part of what Winston does is create the brand’s culture so that like-minded individuals feel a sense of connection and will purchase the products . The final block, emotional, is most often seen as the presence of fear. Whether it is fear of failure, fear of others, or fear of making a mistake this emotion is a strong deterrent to the creative process. According to Hellriegel and Slocum, â€Å"For many organizations, fostering creativity and innovation is essential to their ability to offer high-quality products and services† (2011, p. 432). For Winston’s continued success, creativity and innovation must occur with every client on a consistent basis or they will lose business. For a brand to stand out in the increasingly crowded retail environment, their marketing efforts must be memorable and identifiable. This holds especially true when Winston designs the space a client will occupy in a brick-and-mortar retailer where brands are often thrown together based on functionality. If the space looks like something that has already been done, chances are customers will overlook it and go for something else that catches their eye. Once the three blocks are addressed, the creative process can begin. There are five stages to the creative process that are similar to the phases that are a part of Osborn’s creativity process. The first and second stages of the creative process, preparation and concentration, is similar to Osborn’s first phase, fact-finding. All three focus on identifying/defining and investigating the issue or problem. It is important to note that identifying the problem must be followed by â€Å"gathering and analyzing relevant data† (Hellriegel & Slocum, 2011, p 434) so that there is a solid base to build upon during the following stages/phases. For Winston this may mean discovering that a problem with accessibility and visibility, not the product itself, are the reasons why buyers were not interested in a particular brand at a trade show (supported by sales data). The team at Winston can then use pictures and diagrams of the last trade show booth and layout to create new des igns for the next one during the incubation stage or idea-finding phase. The incubation stage is the third of five stages in the creative process and is similar to the idea-finding phase of Osborn’s creativity process. During this stage/phase, management brainstorms alternative solutions to the problem or issue identified in the previous stage/phase. In order to come up with the best solution possible, no idea should be rejected during this stage and team members should let their imaginations run wild since this is the perfect opportunity to be innovative and separate the client’s brand from competitors. This stage/phase is the most important to a creative services firm such as Winston because the generation of several ideas gives the Account Manager several options to pitch to the client. With a variety of options it is more likely that the client will find one they like and decide to do business with Winston instead of another firm. The fourth stage in the creative process is the illumination stage which â€Å"is the moment of discovery† (Hellriegel & Slocum, 2011, p.432). Similarly, Osborn’s creativity process has the solution-finding phase which involves generating and evaluating possible courses of action and deciding how they should be implemented (Hellriegel & Slocum, 2011, p.435). During this stage management must come to a consensus about which of the ideas generated during the previous stage/phase would best address the problem or issue identified at the beginning of the process. At Winston this would mean narrowing down the ideas generated to the top two or three, pitching them to the client, and then working with the client to implement the one chosen. Verification, the final creative stage, has no counterpart in Osborn’s creativity process. According to Hellriegel and Slocum, this stage â€Å"involves the testing of the created solution or idea† (2011, p. 432). At Winston this may mean building a small version the revamped trade show booth and using it at a few minor shows as a test run before unveiling it at the industries larger trade shows such as WWD MAGIC in Las Vegas. Testing is important because it allows the kinks to be worked out before producing something on a large scale which could mean a huge financial loss if done improperly. Although there are other creative decision making methods, Osborn’s creativity process works best for Winston because it is straight-forward and simple to execute. The other models of creative decision making are electronic brainstorming and De Bono’s lateral thinking. Electronic brainstorming is also not a good option for Winston because the software required to correctly utilize this method is an expense that such a small firm cannot afford when trying to keep their prices competitive. Also, the artistic aspect of the work done at Winston is best collaborated on in-person so that drawings and models can be seen by all involved. De Bono’s lateral thinking method involves the usage of techniques such as analogy, cross-fertilization, and reversal. This method is not the best for Winston because the techniques used to foster the development of new ideas are not feasible for the type of work done at Winston. For instance, the cross-fertilization technique requires the use of outside experts from other fields which means additional expenses that a small firm such as Winston may not be able to afford. The analogy technique requires specific and concrete analogies, whereas the nature of the messages and work done by Winston are abstract. Finally the reversal technique â€Å"involves examining a problem by turning it completely around, inside out, or upside down† (Hellriegel & Slocum, 2011, p. 433). This is the one technique that may work for Winston, but it is a more complex process than Osborn’s and therefore harder to follow. 4. Discuss the environmental and strategic factors that affect the organizational design of the company you researched. Winston utilizes a decentralized network design to ensure efficiency and profitability. According to Hellriegel and Slocum, â€Å"Decentralization is the delegation of authority to lower level employees or departments† (2011, p.460). Decentralization relies upon upper management delegating certain tasks which allow lower level employees to make decisions within predetermined constraints. For instance, Winston’s field merchandisers often need to make changes to their schedules. There are a number of Staffing Managers who are able to review and approve these changes, thus allowing the Senior Manager of Staffing and Analysis to focus on more important tasks. Winston’s horizontal organizational design type is a network. â€Å"Organizational design is the process of selecting a structure for the tasks, responsibilities, and authority relationships within an organization† (Hellriegel & Slocum, 2011, p.446). In the case of Winston, although there are two main offices, New York and San Francisco, a large portion of the work is done by independent contractors throughout the nation in the field. According to Hellriegel and Slocum this is a network design, meaning an organizations â€Å"subcontracts some or many of its operations to other firms and coordinates them to accomplish specific goals† (2011, p. 467). There are several environmental factors that affect organizational design including suppliers, distributors, competitors, and customers (Hellriegel & Slocum, 2011, p448). The first environmental factor to be considered when developing an organizational design is suppliers. Although Winston does not use raw materials to create a product, they still need suppliers to provide office goods and technology. Office goods are used at Winston for basic needs such as printing, taking notes, etc., but also for industry specific tasks such as preparing storyboards and interior space design drawings necessary to acquire and service clients. Technology suppliers are needed for things such as phone and internet service as well as cell phones, analytical software, and computers. As a mid-sized company, Winston must ensure that they work with suppliers that are not only reliable, but also cost-efficient. To guarantee a streamlined ordering process, Winston employs a full-time Purchaser whose sole task is to negotiate with and order from suppliers. The second environmental factor that affects organizational design is distributors. Hellriegel and Slocum define distributors as â€Å"the various organizations that help other organizations deliver and sell its products† (2011, p.449). As a provider of a service, Winston has a small distribution channel in terms of tangible goods, but a large one in terms of intangible service providers. To deliver materials such as tags, name badges and other marketing goods to their network of field merchandisers Winston has a business account with FedEx. Within the organization the Account Managers are responsible for getting material to their subordinates get in a timely manner so that goals are met in the required timeframe. On the intangible side, Winston’s nation-wide network of independent contractors is responsible for delivering the in-store services that clients rely upon Winston to deliver. Competitors are the third environmental factor to be considered when determining organization design. Hellriegel and Slocum wrote, â€Å"Competitors can also influence the design of an organization because they drive the organization to become more productive† (2011, p.449). As a mid-sized company, Winston must work extremely hard to ensure they remain cost competitive against larger retail marketing firms. To do so, Winston needs to utilize a design that is â€Å"simple and easy to manage† (Hellriegel & Slocum, 201, p. 449). One way major way Winston does this is by keeping their employee count low. Account Managers handle several accounts at once, decreasing the need for a large number of employees on this level. Also Winston uses part-time independent contractors in the field instead of full-time staff to make the payroll process simpler as it does not include tax or benefit deductions. The final environmental factor that influences organizational design is customers. At Winston the customers are the retail companies that hire them to do a wide variety of marketing tasks such as merchandising, brand promotions, environmental design, etc. To develop and maintain accounts with valuable clients and remain competitive, Winston offers personalized services with an eye for detail. As mentioned in paragraphs above, Winston works hard to ensure that overhead remains low so that they can offer competitive pricing. References Hellriegel, D., & Slocum, J. W., Jr. (2011). Organizational behavior: 2011 custom edition (13th ed.). Mason, OH: South-Western Cengage Learning. Krivis, J. (2006). Can we call a truce? Ten tips for negotiating workplace conflicts. Employment Relations Today (Wiley), 33(3), 31-35. doi:10.1002/ert.20115 Supplier Relationships.(2012). Retrieved September 7, 2012 from http://www.entrepreneur.com/encyclopedia/term/82658.html

Sunday, September 1, 2019

Personality development Essay

Personality development can be described as the collection of a person’s behaviours, for example their thoughts, emotions and interactions with others. As such, researchers have often stressed the importance of social interactions and the environment on the development of personality. Bandura’s social-cognitive theory would describe the attainment of personality in terms of modelling, reinforcement and direct tuition. Particular emphasis is placed on modelling, whereby a person identifies with a ‘model’ and imitates their behaviour (and hence their personality traits). This may explain why siblings may have similar personalities, as they will have shared a common environment for a large part of their early lives. Support for modelling as an influence on behaviour comes from Bandura’s ‘Bobo doll’ studies, which found that children imitated the behaviour of an adult acting aggressively towards a doll. This demonstrates that reinforcement is not a necessary condition for personality development to take place, and is therefore an improvement on traditional learning theory. The process of modelling requires a number of cognitive factors to take place, but particularly important, according to Bandura, is motivation. This can take place by means of reinforcement or self-motivation, the latter having particular significance in personality development. Self-motivation covers a variety of self-evaluative cognitive processes, such as self-response (rewarding or punishing oneself for carrying out a behaviour) and self-efficacy (the perception of capability to carry out a behaviour). This holds particular imnportance in personality development as personality is, according to social learning theory, learnt as is any other behaviour, and traits such as social skills may be obtained by, for example, watching one’s parents socialise. If self-efficacy is low, the child may not imitate the behaviour, and as a result will have poor social skills as an adult. Feltz provides support for the importance of self-efficacy, finding that Russian athletes’ performance was improved when they saw videotapes of themselves that had been edited to make them seem better than they were. Further support is provided by Schunk, who found that American primary school children who were told that their peers had done well on a maths test proceeded to do better on it that those who were not told anything about their peers.

Saturday, August 31, 2019

Powder Metallurgy

Powder metallurgy is the process of blending fine powdered materials, pressing them into a desired shape or form (compacting), and then heating the compressed material in a controlled atmosphere to bond the material (sintering). The powder metallurgy process generally consists of four basic steps: (1) powder manufacture, (2) powder blending,(3) compacting, (4) sintering. Compacting is generally performed at room temperature, and the elevated-temperature process of sintering is usually conducted at atmospheric pressure. Optional secondary processing often follows to obtain special properties or enhanced precision. 1] Two main techniques used to form and consolidate the powder are sintering and metal injection molding. Recent developments have made it possible to use rapid manufacturing techniques which use the metal powder for the products. Because with this technique the powder is melted and not sintered, better mechanical strength can be accomplished. History and capabilities The hi story of powder metallurgy (PM) and the art of metals and ceramics sintering are intimately related to each other. Sintering involves the production of a hard solid metal or ceramic piece from a starting powder. While a crude form of iron powder metallurgy existed in Egypt as early as 3000 B. C, and the ancient Incas made jewelry and other artifacts from precious metal powders, mass manufacturing of P/M products did not begin until the mid-or late- 19th century†. [2] In these early manufacturing operations, iron was extracted by hand from metal sponge following reduction and was then reintroduced as a powder for final melting or sintering. A much wider range of products can be obtained from powder processes than from direct alloying of fused materials.In melting operations the â€Å"phase rule† applies to all pure and combined elements and strictly dictates the distribution of liquid and solid phases which can exist for specific compositions. In addition, whole body mel ting of starting materials is required for alloying, thus imposing unwelcome chemical, thermal, and containment constraints on manufacturing. Unfortunately, the handling of aluminium/iron powders poses major problems. [3] Other substances that are especially reactive with atmospheric oxygen, such as tin, are sinterable in special atmospheres or with temporary coatings. 4] In powder metallurgy or ceramics it is possible to fabricate components which otherwise would decompose or disintegrate. All considerations of solid-liquid phase changes can be ignored, so powder processes are more flexible than casting, extrusion, or forging techniques. Controllable characteristics of products prepared using various powder technologies include mechanical, magnetic,[5] and other unconventional properties of such materials as porous solids, aggregates, and intermetallic compounds. Competitive characteristics of manufacturing processing (e. g. , tool wear, complexity, or vendor options) also may be c losely regulated.Powder Metallurgy products are today used in a wide range of industries, from automotive and aerospace applications to power tools and household appliances. Each year the international PM awards highlight the developing capabilities of the technology. [6] Isostatic powder compacting Isostatic powder compacting is a mass-conserving shaping process. Fine metal particles are placed into a flexible mould and then high gas or fluid pressure is applied to the mould. The resulting article is then sintered in a furnace. This increases the strength of the part by bonding the metal particles.This manufacturing process produces very little scrap metal and can be used to make many different shapes. The tolerances that this process can achieve are very precise, ranging from +/- 0. 008  inches (0. 2  mm) for axial dimensions and +/- 0. 020  inches (0. 5  mm) for radial dimensions. This is the most efficient type of powder compacting. (The following subcategories are also from this reference. )[7] This operation is generally applicable on small production quantities, as it is more costly to run due to its slow operating speed and the need for expendable tooling. oda[8] Compacting pressures range from 15,000  psi (100,000 kPa) to 40,000  psi (280,000 kPa) for most metals and approximately 2,000  psi (14,000  kPa) to 10,000  psi (69,000 kPa) for non-metals. The density of isostatic compacted parts is 5% to 10% higher than with other powder metallurgy processes. Equipment There are many types of equipment used in Powder Compacting. There is the mold, which is flexible, a pressure mold that the mold is in, and the machine delivering the pressure. There are also controlling devices to control the amount of pressure and how long the pressure is held for.The machines need to apply anywhere from 15,000 psi to 40,000 psi for metals. Geometrical Possibilities Typical workpiece sizes range from 0. 25  in (6. 35  mm) to 0. 75  in (19. 05  mm) t hick and 0. 5  in (12. 70  mm) to 10  in (254  mm) long. It is possible to compact workpieces that are between 0. 0625  in (1. 59  mm) and 5  in (127  mm) thick and 0. 0625  in (1. 59  mm) to 40  in (1,016  mm) long. Tool style Isostatic tools are available in three styles, free mold (wet-bag), coarse mold(damp-bag), and fixed mold (dry-bag). The free mold style is the traditional style of isostatic compaction and is not generally used for high production work.In free mold tooling the mold is removed and filled outside the canister. Damp bag is where the mold is located in the canister, yet filled outside. In fixed mold tooling, the mold is contained within the canister, which facilitates automation of the process. Hot isostatic pressing Hot isostatic pressing (HIP) compresses and sinters the part simultaneously by applying heat ranging from 900 °F (480 °C) to 2250 °F (1230 °C). Argon gas is the most common gas used in HIP because it is an inert gas, thus prevents chemical reactions during the operation. Cold isostatic pressingCold isostatic pressing (CIP) uses fluid as a means of applying pressure to the mold at room temperature. After removal the part still needs to be sintered. Design Considerations Advantages over standard powder compaction are the possibility of thinner walls and larger workpieces. Height to diameter ratio has no limitation. No specific limitations exist in wall thickness variations, undercuts, reliefs, threads, and cross holes. No lubricants are need for isostatic powder compaction. The minimum wall thickness is 0. 05  inches (1. 27  mm) and the product can have a weight between 40 and 300 pounds (18 and 136  kg).There is 25 to 45% shrinkage of the powder after compacting. Powder production techniques Any fusible material can be atomized. Several techniques have been developed which permit large production rates of powdered particles, often with considerable control over the size ranges of the final grain population. Powders may be prepared by comminution, grinding, chemical reactions, or electrolytic deposition. Powders of the elements titanium, vanadium, thorium, niobium, tantalum, calcium, and uranium have been produced by high-temperature reduction of the corresponding nitrides and carbides.Iron, nickel, uranium, and beryllium submicrometre powders are obtained by reducing metallic oxalates and formates. Exceedingly fine particles also have been prepared by directing a stream of molten metal through a high-temperature plasma jet or flame, simultaneously atomizing and comminuting the material. On Earth various chemical- and flame-associated powdering processes are adopted in part to prevent serious degradation of particle surfaces by atmospheric oxygen. Atomization Atomization is accomplished by forcing a molten metal stream through an orifice at moderate pressures.A gas is introduced into the metal stream just before it leaves the nozzle, serving to create turbulence as the entrained gas expands (due to heating) and exits into a large collection volume exterior to the orifice. The collection volume is filled with gas to promote further turbulence of the molten metal jet. On Earth, air and powder streams are segregated using gravity or cyclonic separation. Most atomised powders are annealed, which helps reduce the oxide and carbon content. The water atomized particles are smaller, cleaner, and nonporous and have a greater breadth of size, which allows better compacting.Simple atomization techniques are available in which liquid metal is forced through an orifice at a sufficiently high velocity to ensure turbulent flow. The usual performance index used is the Reynolds number R = fvd/n, where f = fluid density, v = velocity of the exit stream, d = diameter of the opening, and n = absolute viscosity. At low R the liquid jet oscillates, but at higher velocities the stream becomes turbulent and breaks into droplets. Pumping energy is applied to droplet form ation with very low efficiency (on the order of 1%) and control over the size distribution of the metal particles produced is rather poor.Other techniques such as nozzle vibration, nozzle asymmetry, multiple impinging streams, or molten-metal injection into ambient gas are all available to increase atomization efficiency, produce finer grains, and to narrow the particle size distribution. Unfortunately, it is difficult to eject metals through orifices smaller than a few millimeters in diameter, which in practice limits the minimum size of powder grains to approximately 10 ? m. Atomization also produces a wide spectrum of particle sizes, necessitating downstream classification by screening and remelting a significant fraction of the grain boundary.Centrifugal disintegration Centrifugal disintegration of molten particles offers one way around these problems. Extensive experience is available with iron, steel, and aluminium. Metal to be powdered is formed into a rod which is introduced into a chamber through a rapidly rotating spindle. Opposite the spindle tip is an electrode from which an arc is established which heats the metal rod. As the tip material fuses, the rapid rod rotation throws off tiny melt droplets which solidify before hitting the chamber walls.A circulating gas sweeps particles from the chamber. Similar techniques could be employed in space or on the Moon. The chamber wall could be rotated to force new powders into remote collection vessels,[9] and the electrode could be replaced by a solar mirror focused at the end of the rod. An alternative approach capable of producing a very narrow distribution of grain sizes but with low throughput consists of a rapidly spinning bowl heated to well above the melting point of the material to be powdered.Liquid metal, introduced onto the surface of the basin near the center at flow rates adjusted to permit a thin metal film to skim evenly up the walls and over the edge, breaks into droplets, each approximately the thickness of the film. [10] Other techniques Another powder-production technique involves a thin jet of liquid metal intersected by high-speed streams of atomized water which break the jet into drops and cool the powder before it reaches the bottom of the bin. In subsequent operations the powder is dried. This is called water atomisation.The advantage is that metal solidifies faster than by gas atomization since the heat capacity of water is some magnitudes higher, mainly a result of higher density. Since the solidification rate is inversely proportional to the particle size smaller particles can be made using water atomisation. The smaller the particles, the more homogeneous the micro structure will be. Notice that particles will have a more irregular shape and the particle size distribution will be wider. In addition, some surface contamination can occur by oxidation skin formation. Powder can be reduced by some kind of pre-consolidation treatment as annealing. sed for cerami c tool Powder compaction [pic] [pic] Rhodium metal: powder, pressed pellet (3*105 psi), remelted Powder compaction is the process of compacting metal powder in a die through the application of high pressures. Typically the tools are held in the vertical orientation with the punch tool forming the bottom of the cavity. The powder is then compacted into a shape and then ejected from the die cavity. [7] In a number of these applications the parts may require very little additional work for their intended use; making for very cost efficient manufacturing.The density of the compacted powder is directly proportional to the amount of pressure applied. Typical pressures range from 80 psi to 1000 psi, pressures from 1000 psi to 1,000,000 psi have been obtained. Pressure of 10 tons/in? to 50 tons/in? are commonly used for metal powder compaction. To attain the same compression ratio across a component with more than one level or height, it is necessary to work with multiple lower punches. A c ylindrical workpiece is made by single-level tooling. A more complex shape can be made by the common multiple-level tooling. Production rates of 15 to 30 parts per minutes are common.There are four major classes of tool styles: single-action compaction, used for thin, flat components; opposed double-action with two punch motions, which accommodates thicker components; double-action with floating die; and double action withdrawal die. Double action classes give much better density distribution than single action. Tooling must be designed so that it will withstand the extreme pressure without deforming or bending. Tools must be made from materials that are polished and wear-resistant. Better workpiece materials can be obtained by repressing and re-sintering. Here is a table of some of the obtainable properties. Introduction | |[pic] | | | |Powder metallurgy uses sintering process for making various parts out of metal powder. The metal powder is compacted by placing in a closed| |meta l cavity (the die) under pressure. This compacted material is placed in an oven and sintered in a controlled atmosphere at high | |temperatures and the metal powders coalesce and form a solid.A second pressing operation, repressing, can be done prior to sintering to | |improve the compaction and the material properties. | |[pic] | |The properties of this solid are similar to cast or wrought materials of similar composition. Porosity can be adjusted by the amount of | |compaction. Usually single pressed products have high tensile strength but low elongation. These properties can be improved by repressing | |as in the following table. |Material | |Tensile | |MPa | |(psi) | |Tensile | |as Percent of Wrought Iron Tensile | |Elongation | |in 50 mm    | |(2 in) | |Elongation | |as Percent of Wrought Iron Elongation | | | |Wrought Iron, Hot Rolled | |331 | |(48,000) |100 % | |30 % | |100 % | | | |Powder Metal, 84 % density | |214 | |(31,000) | |65 % | |2 % | |6% | | | |Powder Metal, repressed, 95 % density | |283 | |(41,000) | |85 % | |25 % | |83 % | | | |Powder metallurgy is useful in making parts that have irregular curves, or recesses that are hard to machine. It is suitable for high | |volume production with very little wastage of material. Secondary machining is virtually eliminated. |Typical parts that can be made with this process include cams, ratchets, sprockets, pawls, sintered bronze and iron bearings (impregnated | |with oil) and carbide tool tips. | | | |Design Considerations | |[pic] | | | |†¢ | |Part must be so designed to allow for easy ejection from the die. Sidewalls should be perpendicular; hole axes should be parallel to the | |direction of opening and closing of the die. | | |†¢ | |Holes, even complicated profiles, are permissible in the direction of compressing. The minimum hole diameter is 1. 5 mm (0. 060 in). | | | |†¢ | |The wall thickness should be compatible with the process typically 1. 5 mm (0. 060 in ) minimum. Length to thickness ratio can be upto 18 | |maximum-this is to ensure that tooling is robust.However, wall thicknesses do not have to be uniform, unlike other processes, which offers| |the designer a great amount of flexibility in designing the parts. | | | |†¢ | |Undercuts are not acceptable, so designs have to be modified to work around this limitation. Threads for screws cannot be made and have to | |be machined later. | | | |†¢ | |Drafts are usually not desirable except for recesses formed by a punch making a blind hole.In such a case a 2-degree draft is recommended. | |Note that the requirement of no draft is more relaxed compared to other forming processes such as casting, molding etc. | | | |†¢ | |Tolerances are 0. 3 % on dimensions. If repressing is done, the tolerances can be as good as 0. 1 %. Repressing, however, increases the cost | |of the product. | | | Powder Metallurgy – Processing | | | |Topics Covered | |Materials | | |Powde r Consolidation | | |Cold Uniaxial Pressing | | |Cold Isostatic Pressing | | |Sintering | | |Hot Isostatic Pressing | | |Hot Forging (Powder Forging) | | |Metal Injection Moulding (MIM) | | |Materials | |The majority of the structural components produced by fixed die pressing are iron based.The powders are elemental, pre-alloyed, or partially | |alloyed. Elemental powders, such as iron and copper, are easy to compress to relatively high densities, produce pressed compacts with adequate| |strength for handling during sintering, but do not produce very high strength sintered parts. | |Pre-alloyed powders are harder, less compressible and hence require higher pressing loads to produce high density compacts. However, they are | |capable of producing high strength sintered materials. Pre-alloying is also used when the production of a homogeneous material from elemental | |powders requires very high temperatures and long sintering times.The best examples are the stainless steels, who se chromium and nickel | |contents have to be pre-alloyed to allow economic production by powder metallurgy. | |Partially alloyed powders are a compromise approach. Elemental powders, e. g. Iron with 2 wt. % Copper, are mixed to produce an homogeneous | |blend which is then partially sintered to attach the copper particles to the iron particles without producing a fully diffused powder but | |retaining the powder form. In this way the compressibilities of the separate powders in the blend are maintained and the blend will not | |segregate during transportation and use. | |A similar technique is to ‘glue’ the small percentage of alloying element onto the iron powder.This ‘glueing’ technique is successfully used | |to introduce carbon into the blends, a technique which prevents carbon segregation and dusting, producing so-called ‘clean’ powders. | |Powder Consolidation | |Components or articles are produced by forming a mass of powder into a shap e, then consolidating to form inter-particle metallurgical bonds. | |An elevated temperature diffusion process referred to as sintering, sometimes assisted by external pressure, accomplishes this. The material | |is never fully molten, although there might be a small volume fraction of liquid present during the sintering process. Sintering can be | |regarded as welding the particles present in the initial useful shape. |As a general rule both mechanical and physical properties improve with increasing density. Therefore the method selected for the fabrication | |of a component by powder metallurgy will depend on the level of performance required from the part. Many components are adequate when produced| |at 85-90% of theoretical full density (T. D. ) whilst others require full density for satisfactory performance. | |Some components, in particular bush type bearings often made from copper and its alloys, are produced with significant and controlled levels | |of porosity, the porosity being subsequently filled with a lubricant. | |Fortunately there is a wide choice of consolidation techniques available. |Cold Uniaxial Pressing | |Elemental metal, or an atomised prealloyed, powder is mixed with a lubricant, typically lithium stearate (0. 75 wt. %), and pressed at pressures| |of say, 600 MPa (87,000 lb/in2) in metal dies. Cold compaction ensures that the as-compacted, or ‘green’, component is dimensionally very | |accurate, as it is moulded precisely to the size and shape of the die. | |Irregularly shaped particles are required to ensure that the as-pressed component has a high green strength from the interlocking and plastic | |deformation of individual particles with their neighbours. |One disadvantage of this technique is the differences in pressed density that can occur in different parts of the component due to | |particle/particle and die wall/particle frictional effects. Typical as-pressed densities for soft iron components would be 7. 0 g/cc, i. e. | |about 90% of theoretical density. Compaction pressure rises significantly if higher as-pressed densities are required, and this practice | |becomes uneconomic due to higher costs for the larger presses and stronger tools to withstand the higher pressures. | |Cold Isostatic Pressing | |Metal powders are contained in an enclosure e. g. a rubber membrane or a metallic can that is subjected to isostatic, that is uniform in all | |directions, external pressure.As the pressure is isostatic the as-pressed component is of uniform density. Irregularly shaped powder | |particles must be used to provide adequate green strength in the as-pressed component. This will then be sintered in a suitable atmosphere to | |yield the required product. | |Normally this technique is only used for semi-fabricated products such as bars, billets, sheet, and roughly shaped components, all of which | |require considerable secondary operations to produce the final, accurately dimensioned component. Agai n, at economical working pressures, | |products are not fully dense and usually need additional working such as hot extrusion, hot rolling or forging to fully density the material. |Sintering | |Sintering is the process whereby powder compacts are heated so that adjacent particles fuse together, thus resulting in a solid article with | |improved mechanical strength compared to the powder compact. This â€Å"fusing† of particles results in an increase in the density of the part and | |hence the process is sometimes called densification. There are some processes such as hot isostatic pressing which combine the compaction and | |sintering processes into a single step. | |After compaction the components pass through a sintering furnace. This typically has two heating zones, the first removes the lubricant, and | |the second higher temperature zone allows diffusion and bonding between powder particles. A range of atmospheres, including vacuum, are used | |to sinter different mate rials depending on their chemical compositions.As an example, precise atmosphere control allows iron/carbon materials| |to be produced with specific carbon compositions and mechanical properties. | |The density of the component can also change during sintering, depending on the materials and the sintering temperature. These dimensional | |changes can be controlled by an understanding and control of the pressing and sintering parameters, and components can be produced with | |dimensions that need little or no rectification to meet the dimensional tolerances. Note that in many cases all of the powder used is present | |in the finished product, scrap losses will only occur when secondary machining operations are necessary. |Hot Isostatic Pressing | |Powders are usually encapsulated in a metallic container but sometimes in glass. The container is evacuated, the powder out-gassed to avoid | |contamination of the materials by any residual gas during the consolidation stage and sealed-off. It is then heated and subjected to isostatic| |pressure sufficient to plastically deform both the container and the powder. | |The rate of densification of the powder depends upon the yield strength of the powder at the temperatures and pressures chosen. At moderate | |temperature the yield strength of the powder can still be high and require high pressure to produce densification in an economic time.Typical| |values might be 1120 °C and 100 MPa for ferrous alloys. By pressing at very much higher temperatures lower pressures are required as the yield | |strength of the material is lower. Using a glass enclosure atmospheric pressure (15 psi) is used to consolidate bars and larger billets. | |The technique requires considerable financial investment as the pressure vessel has to withstand the internal gas pressure and allow the | |powder to be heated to high temperatures. | |As with cold isostatic pressing only semifinished products are produced, either for subsequent working to sma ller sizes, or for machining to | |finished dimensions. |Hot Forging (Powder Forging) | |Cold pressed and sintered components have the great advantage of being close to final shape (near-nett shape), but are not fully dense. Where | |densification is essential to provide adequate mechanical properties, the technique of hot forging, or powder forging, can be used. | |In powder forging an as-pressed component is usually heated to a forging temperature significantly below the usual sintering temperature of | |the material and then forged in a closed die. This produces a fully dense component with the shape of the forging die and appropriate | |mechanical properties. |Powder forged parts generally are not as close to final size or shape as cold pressed and sintered parts. This results from the allowances | |made for thermal expansion effects and the need for draft angles on the forging tools. Further, minimal, machining is required but when all | |things are considered this route is of ten very cost effective. | |Metal Injection Moulding (MIM) | |Injection moulding is very widely used to produce precisely shaped plastic components in complex dies. As injection pressures are low it is | |possible to manufacture complex components, even some with internal screw threads, by the use of side cores and split tools. |By mixing fine, typically less than 20 ? m diameter, spherical metal powders with thermoplastic binders, metal filled plastic components can be| |produced with many of the features available in injection moulded plastics. After injection moulding, the plastic binder material is removed | |to leave a metal skeleton which is then sintered at high temperature. | |Dimensional control can be exercised on the as-sintered component as the injected density is sensibly uniform so shrinkage on sintering is | |also uniform. | |Shrinkage can be large, due to both the fine particle size of the powders and the substantial proportion of polymer binder used. |