Monday, September 30, 2019

Caveat Emptor

Caveat Emptor in Latin means † Let the buyer beware † in other words it is a notice to the buyer that the goods sold to the buyer are â€Å"as it is†. This rule Is a rule of the common law applicable to the sale and purchase of lands, other real estate and so on. Under the principle of Caveat Emptor, the buyer could not recover damages from the seller for defects on the property. However, this rule Is not arranged to protect sellers who engage In fraud or bad faith dealing by making false or misleading representations about the quality or condition of a particular product.Also, in buying used goods, like a used car, often the buyer has the risk, bears the burden of making sure that he or she gets what she bargained for or what she paid for and that there are no defects in the car because they will not be able to return the car and get money back because of the doctrine of caveat emptor. The word ‘caveat' is often used to warn buyers. For instance, you could s ay that the regulatory agency issued a caveat to citizens to do something or not to do something.This ollowing case is connected to the caveat emptor rule: Cheater v Cater [1917] 21 KB 247 The defendant landlord let a farm to a tenant retalnlng the adjoining premises on which was a shrubbery containing yew trees. The branches of the yew trees overhung the farm and were within the reach of the tenants cattle and horses. The tenant's horse died after eating yew from the overhanging branches of trees growing on the landlord's adjoining land. Held: The tenant's claim against the landlord in negligence and nuisance failed.Pickford LJ said: The law of this country is that a tenant, when he takes a farm, must look and Judge for himself what the state of the farm is. Just as in the case ofa purchaser of a business the rule is caveat emptor, so in the case of taking the lease of property the rule is caveat lessee; he must take the property as he finds it. I never heard that a landlord warran ted that the sheep should not eat his yew trees. † That is a distinct statement of the law and not a dictum. It Is the second ground given by the Lord Justice for his Judgment.If a Judge states two grounds for his Judgment and bases his declslon upon both, neither of those grounds Is a dictum. The law so stated by Melllsh L J. Is In agreement with a series of cases of which Sutton v Temple is an early instance. In a case of this kind the tenant takes the land demised as it is, and therefore if the tenant here took the land with the yew trees growing over it so that his cattle could eat of the branches and they did eat, he cannot complain. Therefore the broad proposition argued on behalf of the plaintiff cannot be maintained.In conclusion The caveat emptor had been seen as a powerful tool to the extent that many Jurisdictions have tried to overpower or neutralize it by establishing consumer protection or sale of goods legislation but when it comes to issues concerning land, the principle still applies. Towards the end of the 19th century, Caveat Emptor was still very much breathing as a general rule but the Judiciary were going In to some extent a different direction to go to the length of protecting a buyer as caveat emptor offers buyers very little protection. ThisInevitably led to the drafting of the Sale of Goods Bill. CAVEAT EMPTOR By elnxhshm Caveat Emptor in Latin means † Let the buyer beware† in other words it is a notice to the buyer that the goods sold to the buyer are â€Å"as it is†. This rule is a rule of from the seller for defects on the property. However, this rule is not arranged to protect sellers who engage in fraud or bad faith dealing by making false or The defendant landlord let a farm to a tenant retaining the adjoining premises on overhung the farm and were within the reach of the tenant's cattle and horses.The egligence and nuisance failed. Pickford LJ said: ‘The law of this country is that a farm is. Just as in the case ofa purchaser ofa business the rule is caveat emptor, so not eat his yew trees. † That is a distinct statement of the law and not a dictum. It is grounds for his Judgment and bases his decision upon both, neither of those grounds is a dictum. The law so stated by Mellish L. J. is in agreement with a series of but the Judiciary were going in to some extent a different direction to go to the length inevitably led to the drafting of the Sale of Goods Bill.

Sunday, September 29, 2019

Architectural Project

Parliamentary buildings are always meant to attract different people meaning that the grander the structure, the stronger the public and national interest and reaction to them.   These buildings normally reflect the tradition and stability showing that they portray the image or the commanding presence of the state (Daniel, 1995).The parliamentary buildings are also known to provide ideals of national identity and pride of a given state showing its strength.   Splendor and command, even majesty is always shown in the grandest of parliamentary buildings especially those in America in the nineteenth century.The Norman Foster New German parliament is a project of architecture since it has developed after destruction of many parliamentary buildings.   Attention was first devoted to German development, both in regard to the Bundestag building in Berlin (Michael, 1998).The Reichstag building is historical known for its richness in sensitive historical and political associations.  Ã‚   These buildings have raised some questions of national symbols, questions of the European traditions and democratic aspiration of the newly reunited Germany.This why there has been debates on whether the new parliament building is something to do with politics or architecture.   But in the real sense it is believed to be an architectural project following the changes that have been experienced in the field of architecture since early ages in the building and rebuilding of the parliament. (Dieter, 2003).Early architectural changes began from year 1949 – 1971 following reunification of Germany.   They started rebuilding projects and expanding the parliament in Bonn.   Architectural changes were undertaken from 1949 by a leading architect of the day by the name Haris Schwippert. He laid down a new chamber for the Bundestag which was completed for a short while.The project was made up of glass showing that they were a trademark of German post-war architectural style.   Several small developments existed to the parliament buildings site by 1969 when a large multi-storey building was erected to accommodate members and other services.   The building consisted of 30 storeys and was a notable landmark in Bonn region since it could be seen from Rhine.Towards the end of 1969 the federal cabinet ordered a stop to the adhoc building programs of the government in Bonn (Stephen, 2005).   The cabinet then formed a commission to look at a wider town planning implications of government office and parliamentary accommodation.Restructuring of the town and new buildings was an architectural concern in the country.   The parliament new building was to contain office blocks for government, child care facilities, an international conference center, new buildings for Bundestage, and the bundestrat and finally a hotel with apartment.All these led to a lot of complications and confusions.   This forced the different architectural firms to do some projects in co llaboration with other firms. This led to further development in the redesigning of the Bonn parliamentary building from 1971 – 1992. (Foster, 2000).The architectural firms made a lot of restructural challenges, arrangements and consultation with the concerned citizens.   The revised plan was then announced or declared in the December 1978.   Further architectural competitions were experienced by this time.In1983 another complication emerged when it was found out that the fabric of the main chamber (plenarsaal) was seriously impaired. This required the parliament building to be demolished as it could not be re-built a according to the architectural findings. Various experts were called for advice and in the upshot it emerged that preservation of the existing building in its framework would greatly increase expenditure because of its unsuitable nature.The decision to build new parliamentary building was finally made after along discussion that did not want the building to be demolished.   Many stakeholders wanted the only affected chamber to be rebuilt (Corola, 2004).   However the demolition of the new chamber succeeded since the state government had limited power to intervene in matters affecting the federal parliament.The rebuilding of the chamber included other ancillary facilities adjacent to it meaning that the project was expected to be wider than just the chamber it self. (Jaeger, 1999).

Saturday, September 28, 2019

Spiritual Beliefs as a Factor in the Performance of Nursing Staff Research Paper

Spiritual Beliefs as a Factor in the Performance of Nursing Staff - Research Paper Example These questions are significant to nursing practice; in order to meet the demands of the population and increase both patient chances of survival and patient satisfaction the role of spiritualism as a factor considered motivational has been studied to evaluate its efficiency. Following a literature review nursing practices have been identified which contribute to better patient outcomes and advanced education has been noted to increase the ability of the nurse to provide spiritual care. Those nurse’s with more experience and those working at a higher grade have a greater understanding of spirituality (Noble, & Jones, 2010). The value of communication with non-verbal cues is necessary and spiritual care must be guided by the patients themselves. Communication has been identified as a strong factor in the ability to deliver appropriate spiritual care in Milligan, 2004; McSherry, 2006; and Ross, 2006 by Noble and Jones. A lack of time is also considered a barrier to providing spi ritual care and the need for better education and training would be welcome by many. Spirituality among nurse’s is related positively to education levels and those having a Master’s degree. It is also related to 11-19 years clinical experience and having received spiritual education and training (Wu, & Lin, 2011). In Lind, Sendelbach, & Steen, (2011) nurses were described as feeling unprepared and unable to meet the spiritual needs of patients. Patient satisfaction surveys in a Minnesota cardiovascular progressive care unit determined that meeting the spiritual needs of patients in the unit was an area that needed improvement. The unit first analyzed the 2001 Joint Commission of 2001Press Ganey national inpatient data which indicated that there is a high value placed on emotional and spiritual care while patient’s are hospitalized. Second, there is a very strong correlation between meeting a patient’s emotional and spiritual needs to their overall satisfa ction and third, this is area in most hospitals that provides opportunity for a significant improvement. Spiritual distress has been named as an appropriate nursing diagnosis by The North American Nursing Diagnosis Association and it is a recommendation of the American Association of Colleges of Nursing that spiritual care is included in all education programs. Despite this fact education and training seems to be lacking to many nurses. Only a small number of nurses feel that they are able to meet the spiritual and emotional needs of patients. The unit began offering a two hour voluntary education program to the nurses with time paid and which 37 or 70% of the nurses attended over the period of a year. The instructor who taught the class was from a local faith affiliated University and the hospital Chaplain participated in each training class. This education program included concepts such as defining spirituality, what spiritual care is, what prevents spiritual care, when to call th e Chaplain and nursing interventions for spiritual care. Sessions were based on literature and staff surveys. The unit implemented a new survey, the HOPE survey, in order to provide spiritual assessment. The survey was taken from a teaching tool that was developed for Physicians. Likert type survey scores which measured patient satisfaction with spiritual and emotional care went up from 65% and 62% to 74% and 71% the two months following implementation of the training program. Pastoral care consultancies were increased from 16 to 27 per month and spiritual care plans were increased from 1 to 4 per month. The success of this program in the

Friday, September 27, 2019

Coca Cola (Coke) Report Essay Example | Topics and Well Written Essays - 1000 words

Coca Cola (Coke) Report - Essay Example Contents Contents 3 1. Introduction 4 1. Introduction Coca Cola boosts of having the highest brand equity in the world. According to surveys, one of the most recognized words in the world is â€Å"Coca Cola†. The product Coca Cola continues to dominate the carbonated drinks market despite sturdy headwinds and is well ahead of its competitor Pepsi. Considering a slow but steady move towards non-carbonated healthy drinks, the product has faced mounting pressure to boost and enhance its promotional activity across the globe in order to maintain market share which has seen a decline from 2005-2010 (Euromonitor International, 2011). This report shall investigate and describe the promotional mix and strategies that have enabled the Coca Cola brand to uplift and maintain the leadership of its carbonated Coke beverage across the globe. 2. Promotional mix From partnerships with renowned international brands to using celebrities in advertisements to keep the youth hooked, Coke has effec tively been promoted through all promotional media. In 2006, for instance, Coca Cola distributed approximately 70 million codes of songs inside Coke’s packs which were redeemable at Apple’s i-tunes store (Telecomworldwire, 2006). ... The diamonds had three shapes namely round, marquise and princess each of which corresponded to personalities attached to Vanilla Coke, Lemon Coke and Coke Light respectively (Hargrave-Silk, 2004). This was one of the most expensive promotional campaigns of its times beating its rival products such as Pepsi. This strategy also reflects how Coke’s lifestyle-oriented promotions aim at aspiring young, exuberant, contemporary men and women. The attributes of the Coke drink are reflected in its advertisements. For instance, one of the ads depicted a confident, bold and sexually appealing customer at a restaurant where Coke was sponsoring a giveaway (Hargrave-Silk, 2004). As mentioned earlier, Coca Cola has effectively used psychological marketing in its promotional mix. The company has also partnered with Parts Connection (a motor trade dealer) whereby a can of Coke is given with every purchase worth $100. The can is worth $1,000 of petrol (Motor Equipment News, 2009). At the end o f a particular period, the labelled cans can be used for drinking Coke (Motor Equipment News, 2009). This has given cash starved customers another reason to purchase spare parts from this dealer. The product has such a huge fan following that some of the company’s promotional efforts have fallen short of its customers’ expectations. As part of its regular line of promotion, the Coke brand has been running an online loyalty program for its Coke fans which has become a source of disappointment for its loyal fans. These fans claim to have collected several codes from bottle caps in return for points only to discover that few of the expensive products (against which the points are redeemable) have run out of stock

Thursday, September 26, 2019

What drives Chinese into Buying Luxury Goods in the 21 century Essay

What drives Chinese into Buying Luxury Goods in the 21 century - Essay Example This research will begin with the statement that China’s luxury market has turned into a lucrative business over the recent years. Chinese consumers are becoming more brand conscious, becoming shrewder in their tastes, and making a better exertion to comprehend the traditional brands. China has become the second largest market for luxury goods in the world. The Chinese economy is growing day by day and her people are buying expensively priced branded commodities. Â  They buy these things not only within China but also from other countries as tourists. A rapidly growing upper and middle class are seen as bent on enhancing their individuality by buying luxury goods. China has been reported to have already overtaken the United States and Japan in terms of luxury items purchases. Â  China has worked hard to achieve economic prosperity, producing current generations of millionaires. Â  Accordingly, this generation has been spending a large amount in the luxury market day by day and Chinese are becoming more dynamic and active buyers in the market. China has emerged as the biggest purchaser of luxury goods in the world market. Chinese consumers are showing great interest in buying luxury goods these days, and this has not been left unnoticed by the global luxury market. The United States, Japan, and Europe, who have been the top consumers of luxury goods, are indeed quite surprised with the growing appetite of Chinese for luxury items. Nearly all Chinese visiting Paris have bought expensive bags without looking at its price tags.

Wednesday, September 25, 2019

Utilitarianism and Deontology Assignment Example | Topics and Well Written Essays - 750 words

Utilitarianism and Deontology - Assignment Example There are many different philosophical perspectives that one could apply to the issue of human cloning; it is the utilitarian and deontological perspective that offer two interesting comparative views. Human cloning has dominated science fiction for decades with scenarios revealing how the practice could go terribly wrong. Ethical debates have proposed many other unique issues with cloning; everything from the development of unforeseen genetic flaws, to the devaluation of life, to whether, or not, a cloned being will have rights and even a soul. (McGee) However, it is the incredible potential of medical â€Å"miracles† that cloning might allow, in all its forms, which includes, ending infertility, eradicating genetic diseases, curing illnesses, replacing damaged organs, and last but not least, the ability to create life as they see fit, that continues to lure supporters. The potential positives and plausible negatives of human cloning are not an easy controversy to weigh. Utilitarianism essentially takes an ultimate stand of; do the ends justify the means? The philosophy cares less about how you accomplish something as long as the overall outcome leads to the greatest amount of overall good and happiness. (Moreland 1) While deontology considers less the outcomes and more about the intention behind doing it. The moral intent is more important in deciding whether something is good or bad, or right or wrong, has greater than the outcomes and results. The ideology embraces the â€Å"Categorical Imperatives,† which include a "universality" within the principles, all humans are rational agents, and must be treated as such.

Tuesday, September 24, 2019

The underground water in the uae area and their quality, distribution Case Study

The underground water in the uae area and their quality, distribution and their effects in plantation - Case Study Example The need for water in agriculture, domestic and industrial use remain the primary areas where significant volumes of water are necessary to run the economy of U.A.E not to mention sustaining the livelihood of about 1.4 million people living in U.A.E (Heard-Bey 98). Because of poor quality water in most underground water sources, U.A.E have to contend with desalination of water as show in appendix A. While U.A.E has the least number of rainfall in the, a characteristic of many nations in the Arab Peninsula, the Emirates have the highest number of water use. The amount of water use per-capita in the U.A.E is the highest as compared to any part of the world. Despite the high rate of water use in U.A.E, there demand for water outstrips the supply given that U.A.E has less surface water. The primary source of water in the U.A.E is underground sources, which contribute to meeting the demand of water for domestic, industrial, and agricultural use. The underground water sources provide the h ighest amount of water from well such as one figure 1 depicts. Even with water quality being low due to salts, underground water remain significant resource. ... While the U.A.E have a varying landform, there are several aquifers. Appendix B shows a representation of the main aquifer system in U.A.E that provide underground water sources. In the U.A.E, the primary aquifer system that determine the distribution of underground water consist of alluvial aquifer system, the Batinah coastal plain aquifer, and the deep carbonate aquifer system. The alluvial aquifer system is made of sand, cobbles boulders, and pebbles and stores underground water of nearly 5,280 x 10 9 cm3. The second aquifer system—the Batinah Coastal Plain Aquifer—consist of course sand, boulders, and gravel. In this aquifer system, well sunk are shallow and allows drawing of water because water levels are high and often above the sea level. The third category of aquifer systems is the deep carbonate aquifer system. This system has thick carbonate rocks that stretch across the southern part of Abu Dhabi. This aquifer demonstrates the characteristics of a system unde r an artesian condition. Statistics from the U.A.E Ministry of Agriculture and Fisheries reveal that all the seven Emirate have close to 76,000 sources of ground water. These wells produce water used for domestic purposes across the U.A.E. The cumulative production of water from these underground well totals to 137.5 Mm3. Most of the underground water sources have an age between 12,000 and 40,000 years pointing to water deposits that have taken long time to accumulate in the aquifers. Across the U.A.E, the main underground sources of water belong to three aquifers, which represent one of the factors that influence the distribution of underground water. Other factors that play a role in determining

Monday, September 23, 2019

Are or should rights be based on nationality The Module is [ Essay

Are or should rights be based on nationality The Module is [ Citizenship in Theory and Practice] politics - Essay Example It is for this reason that arbiters of rights are always under scrutiny and lot of discussion goes on regarding the role and task of rights arbitrator for informing people regarding their rights. The question of rights has always challenged political philosopher and thinkers. The question has also tested the wits of moral thinkers as it is one of the fundamental issues of morality. Since, philosophy started in ancient Greece therefore early thought had Greek city state or polis in mind and for this reason the application of rights focused on the relationship of individual and polis. As such, the idea of rights is mainly based on the responsibilities of the individual citizen to the wider polis (Delanty, 2000). Individual submitted before the authority of polis for the protection of his life and limb. The concept of rights in the ancient world was related with area and territory. The concept of citizenship was firmly based on birth. Therefore, the development and application of rights has traditionally been firmly linked with a concept of territorial integrity (Lister & Pia, 2008). Modern concept of Western nationalism has firmly established the link between rights and territorial integrity, which was originally formed in ancient Greece and practiced in Roman Empire. ... Nationality and the nation state have always been linked; as a result, a similar link has been formed between the concept of rights and the foundation of nationality (Held, 1995). This strong link of rights and nationality continued on for a long period of time but development in science and technology along with better communication has brought significant changes in the outlook and approach of thinkers. Many factors are responsible for the changed attitude but three primary processes account for this attempt to revise the idea of rights. Firstly, migration has brought phenomenal changes in the concept of nationality. Secondly, the formation of regional political structures has meant that concepts of regional citizenship have taken firm ground. Numerous examples of regional bodies can be found; however, possibly the most significant at the present time is the European Union (Faist, 2007). Finally with advent of Information Technology the concept of globalisation has become a byword. The commencement of globalisation and the necessary political responses that have been taken have led many to question whether basing rights on nationality is applicable in an unified and mutually dependent world (Held, 1995). This concept of globalisation has questioned the link of rights and territory. Above all, as globalisation has increasingly served to de-link individuals and societies from the national setting, the idea that rights can be founded on the basis of national territory has been greatly criticised (Held, 1995). Considering the above assessment, the purpose of this work is to assess and examine whether, or should the application of rights be based on

Sunday, September 22, 2019

Facebook and Privacy Essay Example for Free

Facebook and Privacy Essay Objective Summary: Ex-Apple Engineer, Peter Warden, has collected public fan page data from 215 million Facebook pages, revealing current trends, such as ‘God’ being the number one most popular fan page among Facebook users in the Southern U.S., whereas ‘Barack Obama’ featured heavily for San Francisco users, and ‘Starbucks’ was number one in Idaho. Warden plans to release this data to the academic community because he sees great potential in the data that can be extracted from these sites. This process is called data harvesting. The article suggests future academic work in this area is likely to occu impacting on peoples privacy. (FACTS 100 words) Response: The ETHICAL issue central to this article is privacy and control. On one hand, Warden claims his intentions are altruistic (helpful to others) and that the data he is making visible here is a matter of public discourse. However, the FACTS are that individual users who are generating this data have neither been consulted about the data collection nor have they given permission for Warden to use it. Clearly Warden does not VALUE others peoples privacy as much as he WANTS (emotion) to create the website. The argument could be made that once a user ‘becomes a fan’ of a page on Facebook or, indeed, publishes any content to the internet, that information becomes public. User who have deployed privacy settings to carefully maintain a strong sense of control over their profiles, however, might well feel very ANGRY about this use of their data. Facebook can harvest that data (and does, for targeted advertising purposes) because they have a commitment to those advertisers (emotion )and engineers like Warden can develop data-trawling engines to collect accessible information across a massive dataset. The LAW needs to be much clearer about the rights of consumers, companies and advertisers in these situations. As Facebook is presumably bound by its own set of critically considered ETHICAL guidelines, these are neverthess underpinned by commercial VALUES and a vested interest (emotion) in keeping the data of its users from competitors. Warden claims to be operating under his own set of ethics that privilege (value) the furthering of knowledge. The issue then shifts to the academic community. Warden contends that one of his central motivations for collecting this data was so that he could share it with the academic community. Although this claim may be true, most (if not, all) Universities have clear ETHICAL guidelines for research that explicitly VALUE and therefore require consent from participants. If none of the users gave consent for their data to be collected in this way, this in effect denies them a sense of AGENCY. Thus, academically, this data is tainted. While its implications are important the trends it makes visible are crucial to understanding the localised structures of social network sites like Facebook. Personally, I would believe people should be able to tick a box that gives consent for the use of their personal material. I do not believe, either, that it should be one of those boxes you are obliged to tick before being able to use a site: that removes my personal AGENCY and I VALUE this very much. It should be up to me to decide whether other people get my data. If this sort of system was in place, everyone would know the FACTS, everyone would understand what is going on and no one would feel (emotion) betrayed or exposed unfairly.

Saturday, September 21, 2019

Black Men and Public Space Essay Example for Free

Black Men and Public Space Essay In Brent Staples’ personal essay â€Å"Black Men and Public Space†, he tells the readers what happen to a young black man in an urban setting. He pinpointed that people often stereotype you because of color, race, gender, culture or appearance. In addition, the author expresses to us that he notices the space between him and other people, such as women on the street. Some people may disagree that women set a certain amount of space when walking by a black man on the street. This statement is not true and public space is not about race, gender, color, culture, or appearance. Do we as a people stereotype other people because of race or gender? I believe that race plays a big role when viewing other people, either if were walking down the street or walking into the store. We have a specific view of people from other races and even their own. For example, a black businesswoman might stereotype another woman from her own race because she may not have the same attire as her or grew up in a different area. A white businesswoman might look down on another white women who make less money than her like she is no one, which is not true. But back to Staples’, he once said that a woman cast worried glance at Staples when she saw him walking down the street. Staples found this to be a little strange as he walks too close to the women she seems to pick up her pace of speed after a few glimpses of Staples. In this part of the essay, Staples had a sense that a woman who barely knows him was probably stereotyping him. In addition, he stated that when he would walk in front of a car when people were at a stoplight, men and women would lock their car doors. In recent news in the put exact month it happened year 2013, there was a famous story about a young boy named Trayvon Martin. Trayvon’s story can relate well with the author personal essay. Just like Staples, Travyon was a young African American boy who was stereotyped by the way he looked by someone of another race. The person that speculated young Trayvon to be dangerous was a Latino man, name George Zimmerman who was well over Trayvon’s age, and thought the young boy had a gun in his pocket and was going to shoot him. Zimmerman perceived Trayvon to be a dangerous threat to the person of a different race but in reality he was a young boy with a hoodie over his head and skittles in his pocket. Staples personal essay relates to this story because when he walks into a store or down the street people would look at him in a different light. Just because he is young African American man walking down the street or into the store doesn’t mean he will steal, kill, or rape someone. Instead looking down on people of other races than our own, we other need to be optimistic because not everyone is the same. People shouldn’t have to change their demeanor for other people not to be scared of them because of what they look like or their race. Brent Staples believed that the woman in his personal essay thought he was a rapist, mugger, or worse, he noted that there was a certain amount distance between him and women especially at night. This proves to show that when people are being stereotyped they pay close attention to gender as well as race. You’re less likely to be afraid of a black woman, or any woman, walking down the street at night. When the woman saw a black man it seemed as if she felt trapped and that the narrator closing in on her only made her more anxious and ready to run. Would the situation be the same if a black woman were walking behind her? I believe the situation would be nothing similar to what the narrator experienced. Most people see women as less intimidating than a man. I know if a woman was wearing a hoodie and walking behind me I would be less scared and intimidated than if a man was walking behind me. I think part of that is our perception of the opposite sex. I perceive men as stronger than women, no matter what their race is. It’s just the image that we get from the media, our parents, and our surroundings. Either way people are stereotyped everyday, it doesn’t matter if you are black/white or a man/woman. As a whole we need to stop labeling people by the way they look because one day we might mistake the wrong person that appears to be a good a person but in reality they are the rapist or mugger. So before you decide to give off any perception of anyone by the way they look, you should be optimistic and have an open mind towards other people, but still have guard up.

Friday, September 20, 2019

Chest Pain Case Study

Chest Pain Case Study Ebunoluwa Mikiie Chest Pain There are various Chest pains. Chest pain may be caused by gastrointestinal, respiratory, cardiac or musculoskeletal analysis. Chest pains may also be caused by anxiety, pericardium, myocardium, parietal pleural, aorta, esophagus, Chest wall, trachea and large bronchi, skin, and musculoskeletal system. As a nurse, I must carefully assess by asking questions, such as Location: where do you feel the pain in your chest? Onset: when did the pain begin? Duration: Does it happen with breathing? Is it nonstop or comes and goes? Associated manifestation: what else is experienced with the chest pain? Characteristics: describe your pain? Treatment: have you seen anyone or tried any medication? Relieving factors: does anything make it better (Nursing Guide)? Anxiety procedure is not clear. It is located below the left breast or across the anterior chest. The quality of pain is stabbing, sticking, dull or aching. Its severity is varying. It can be from hours to days. Symptoms are shallow breathing, anxiety, weakness and palpitations. Aggravating factor may be emotional stress. A relieving factor is unknown (Nursing Guide). Pulmonary: Tracheobronchitis is Inflammation of the trachea and bronchi, and is located at the on both sides of the sternum or at the sternal. The quality of pain is a burning sensation, severity, mild to moderate. The timing is variable. Aggravating factor is coughing, and relieving factor is lying on the affected side (Nursing guide). Pleuritis Pain: Inflammation of the parietal pleura as in pleurisy, pneumonia, pulmonary infarction or neoplasm, located at the chest wall. The quality of pain is sharp and can hurt like a knife with severe pain. Aggravating factors are inspiration, coughing and movements of the trunk, and relieving factors are medication and treatment. Its timing is persistent (Nursing Guide). Cardiovascular: Angina Pictoris: Temporary myocardial ischemia, usually secondary to coronary atherosclerosis, located at the anterior chest that sometimes radiates to the shoulder, arm, neck, lower jaw or upper abdomen. The quality of pain is pressing, squeezing, tight and heavy with occasional burning. The severity is mild to moderate; this is sometimes perceived as discomfort rather than pain. Its timing is usually 1-3 minutes but up to 10 minutes, prolonged episodes are up to 20 minutes. Association symptoms are dyspnea, nausea and sweating. Aggravating factors are exertion in the cold, meals, emotional stress, it sometimes occurs at rest. Relieving factors are rest and nitroglycerin (Nursing Guide) Myocardial Infarction: This is prolonged myocardial ischemia, and results in irreparable muscle damage and/or necrosis. It is located at the anterior chest that sometimes radiates to the shoulder, arm, lower jaw, neck or upper abdomen. The quality of pain is like angina. Myocardial Infarction is often but not always a severe pain, with a timing of 20 minutes to several hours. The relieving and aggravating factors are unknown (Nursing Guide). Pericarditis: Irritation of the parietal pleura, adjacent to the pericardium. It is located at the precordial space and could radiate to the tip of the shoulder and the neck. The quality of pain is also sharp and knife-like and also severe with persistent timing. Aggravating factors are breathing changing position, lying down, swallowing and coughing. A relieving factor is sitting forward (Nursing Guide). Gastrointestinal: Reflex Esophagitis: Inflammation of the esophageal mucosa by reflux of gastric acid. It is located retro sternal and may radiate to the back. Its severity is mild to severe with variable timing. The quality of pain is burning and squeezing sensation. Aggravating factors are eating large meals, lying down, and also bending over. Relieving factors are antacid and sometimes belching. Associated symptoms are regurgitation and dyspnea (Nursing Guide). Chest wall Pain: The progression is not always clear, it is frequently found along the costal cartilages or below the left breast. The quality of pain is aching, dull, stabbing, or sticking. Its timing can be from hours to days and has variable severity. An associated symptom is a local tenderness. An aggravating factor may be movement of arms, trunk and chest. Relieving factor is unknown (Nursing Guide). Assessment SOAP note on two individuals adults. The first individual has a history of high blood pressure; he is taking his blood pressure medication regularly. The second individual has a history of diabetes; he exercise regularly and eat healthily, but is concerned that his lifestyle change is not apparent in weight loss outcome. A general assessment was done on both patients, but focused area was done on the upper and lower extremities for skin turgor, color temperature and capillary refills. Patient one: Mr. J.M. is a 49-year-old white male, a car salesperson. He was born in Georgia. Subjective: Mr. J.M. has a history of High Blood Pressure. Mr. J.M. said that he has been taking atenolol 25mg once a day by mouth for one year, and has no negative effect from it. He rated his pain scale as 0/10 (0-10 pain scale). He said he was concern about having a heart failure form cardiac issues from stress due to the nature of his job. Objective: Vital Signs, temperature 98.4, pulse 77, respiration 18 and blood pressure 130/80. Head, eyes and nose appears normal no pallor noted. Skin turgor normal and elastic, no signs of dehydration or excessive dryness noted. Color fair, normal for race, no change or abnormal pigmentation observed. Skin is warm and dry to touch (using the back of my hands). Capillary refills in upper and lower extremities of nail beds less than 2 seconds. Respiration clear, no, wheezing or shortness of breath or noisy breathing noted. Lung sounds auscultated, clear bilaterally at anterior and posterior lower and upper lobes. Normal breath sounds, soft and low pitch over most of both lungs, equal expiratory and inspiratory sounds. Irregular breath sounds will necessitate instantaneous care. No adventitious breath sounds such as crackles, wheezes or rhonchi noted. Heart sounds auscultated, normal S1 and S2 noted. These areas were palpated, brachial pulse found at the inner aspect of the elbow; it i s also a regular site use to obtain blood pressure measurements. The radial pulse is located at the thumb site of the wrist, the popliteal pulse at the back of the knee, the femoral pulse is located in the groin region, the dorsalis pedis pulse at the top of the foot, the posterior tibial pulse at the lower side at the inner aspect of the ankle. It is to locating these sites are imperative because they are necessary pressure points in case of severe bleeding. The amplitude of the pulses compares equitably, when the pulses were palpated (www.nursing times.net). Abdomen is soft and non-tender, and the bowel sounds active in all four quadrants, with active range of motion (ROM) noted in bilateral upper and lower extremities. Diagnosis: Knowledge deficit related to signs and symptoms of heart failure as evidence by patient’s concern of stress and impending heart failure. Blood pressure within normal range. Plan: Encourage Patient to continue taking his medication, increase water intake to at least eight glasses per day, decrease additional salt intake to help maintain normal blood pressure. Patient to continue daily exercise. Encourage patient to keep physician appointment. Routine laboratory test include complete blood count (CBC), urinalysis, thyroid panel, chemistry panels, thyroid panel, blood urea nitrogen (BUN), glucose check, and white blood count (WBC). Patient 2: Mr. J.J. is a 40-year-old African America male, businessperson. He was born in Georgia. Subjective: Patient came into the clinic with concern of not able to see the resulting exercise with his weight, change in diet. Patient associated his not being able to loose with his history of being a diabetic for over three years. He said that currently he takes metformin 1000mg twice a day by mouth. Patient denies any pain at this time. Objective: Vital Signs, temperature 98.6, pulse 84, respiration 20 and blood pressure 127/76. Blood sugar 115 mg/dl. Weight 200 pounds. Head, eyes and nose appears normal. Skin turgor normal and elastic, no signs of dehydration or excessive dryness noted. Color appropriates to ethnicity, no pallor noted, no change or abnormal pigmentation noted. Temperature of the skin is warm to touch. Capillary refills in upper and lower extremities nail beds less than 2 seconds. Respiration clear, no shortness of breath, wheezing or noisy breathing noted. Lung sounds auscultated, clear bilaterally at anterior and posterior upper and lower lobes. Normal breath sounds noted. No crackles or wheezes or rhonchi. Heart sounds auscultated and normal. These areas were palpated; brachial pulse establish at the inner part [tm1]of the elbow. Radial pulse found at the wrist. Femoral pulse found in the groin area. Popliteal pulse found at the back of the knee, the dorsalis pedis pulse found at the top of the f oot, the posterior tibial pulse found at the lower side at the inner aspect of the ankle. The amplitude of the pulses compares equitably, when the pulses were palpated (www.nursing times.net). Abdomen soft and non-tender, bowel sound noted in all four quadrants, active range of motion noted in bilateral upper and lower extremities. Diagnosis: Non-reassuring weight loss related history of diabetes. GLucose 115mg/dl before food. Plan: The patient should be congratulated on taking steps to live a healthy life. I would encourage the patient to continue his exercise and include exercises to target specific areas he wants to loose. I would encourage him to continue with his medication regimen and continue with his healthy lifestyle change to help with his medication. Routine laboratory test: Glucose (hemoglobin A1C); thyroid panel; white blood count (WBC); blood urea nitrogen (BUN); complete blood count (CBC). [tm1]

Thursday, September 19, 2019

armenian genocide Essay -- essays research papers

By the late 1880's there were approximately 2,500,000 Armenian people living in the Ottoman Empire. Since World War I, the number of Armenians in Turkey has barely reached more than 120,000. The difference can be accounted for in the large number of Armenians who were slaughtered or forced to flee to other countries in the period from 1894 to 1921. The tension began when Armenians in the eastern provinces of the Ottoman Empire started to impress upon the people the idea of Armenian self-government, under the encouragement of Russia. As the number of revolutionaries grew, they formed into various political groups, ad finally into two revolutionary parties. The first party, developed in 1887, was called Henchak, meaning "The Bell." The second, called Dashnaktzutiun, meaning "Union," was established in 1890. During this time, Sultan Abdulhamid II, the leader of the Ottoman Empire, was promoting nationalistic feelings and animosity towards the Armenians among neighboring Kurdish tribemen, in hopes of suppressing the revolutionaries. The persecution that resulted, along with an escalation in taxes, gave the Armenians two solid reasons for a revolt. In 1894, Armenians in Sasum fought back by refusing to pay the required taxes. Their revolt was not successful- Armenian villages were burned and thousands of people w ere killed by Kurdish tribesmen and Turkish troops. Two years later, the Armenians again attempted to rise against the Turkish autocracy. Hoping t...

Wednesday, September 18, 2019

Technology in Teaching and Learning Essay -- Education Technology

Educational technologies are being utilized in every way shape and form, from inline gaming to numeracy, literacy and painting by numbers. From learning to leisure we have embraced the internet, in online chat rooms we communicate, interact and move into future learning through educational programmes and technology that lets us learn virtually. Instruction and directions are sent across cyberspace which change perceptions and give us an insight into different cultures far away across the other side of the world .The enigma that is cyberspace has the capacity to change our way of thinking, learning and teaching, and it is this teaching aspect that most interests me. As classroom based beings, teachers and the technological movement ebb slowly toward each other as interactive learners push educational boundaries into virtual reality. This assignment will attempt to show the importance of internet connections for interactive learners. As communication is the main aim of any interface, society in the main has accepted these progressive technologies and as our willingness to integrate this mechanically driven entity into our lives draws education into our very living rooms, for some though the challenge of engagement continues, especially for those with learning difference. Developing learning for students with difference has always confronted society with a dilemma; nevertheless the technological age of interactive education has increased access to learning for all those who are willing to take up the challenge. Traditional teaching methods have taken a backwards step and the cyber spaced virtual reality of online has in my view, rightfully taken its place at the classroom. In the Community Engagement Department where I teach a... ... of Inquiry into Higher Education, (NCIHE) (1997) Dearing, R. Higher Education in the Learning Society. Report of the National Committee of Inquiry into Higher Education. London: NCIHE Publications (HMSO). Ehrich, R, W., Reaux, R, A., (1998) PCs for families: a study of early intervention using networked computing in education, Journal of Educational Computing Research, 19(4), p.383-410. Stefani, L., Nicol, D., (1997) From teacher to facilitator of collaborative enquiry, in: Armstrong, S., Thompson, G., and Brown, S., (Eds) Facing up to Radical Changes in Universities and Colleges London: Kogan. Tapscott, D. (1998). Growing up digital: The rise of the net generation. New York: McGraw-Hill.(p.16) York, M. (2003) Formative assessment in Higher Education: moves towards theory and the enhancement of pedagogic practice, Higher Education, 45(4), pp.477-501.

Tuesday, September 17, 2019

Relationship Between Money and Happiness

Preface First, people could not be without money. That is, if people out of money, people have no happiness lives with. Money is the foundation of live, for if there is no money, people cannot survive. If people cannot survive, how can there be happiness at all. Second, money is not everything. Most of the happiness could not be brought by money. For example, Bill Gates cannot enjoy the happiness of escape from a disaster, cannot enjoy the happiness of be a world champion, cannot enjoy the happiness of win the gold medal, cannot enjoy the happiness of families reunion, cannot enjoy the happiness of be a president. Money only slightly associated with happiness In fact, when people have enough of money, the happiness people gain become less and less. It is majority people unexpected, but this is the fact that Western countries live for decades. Experts in the West confirmed a fact: â€Å"If you made a graph of American life since the end of World War II, every line concerning money and the things that money can buy would soar upward, a statistical monument to materialism. Inflation-adjusted income per American has almost tripled, such as per capita income, real income, lifetime, housing area, the per capita car number, the number of telephone calls each year, the number of trips per year, the highest degree IQ scores. No matter how you chart the trends in earning and spending, everything is up, up, up. But if you made a chart of American happiness since the end of World War II, the lines would be as flat as a marble tabletop. Almost everything is getting better, but people did not feel happier. Yale University political science professor Robert †¢ Portland found that if you charted the incidence of depression since 1950, the lines suggest a growing epidemic. Money jangles in our wallets and purses as never before, but we are basically no happier for it, and for many, more money leads to depression. Correlation between money and happiness- 0. 25 Many scholars have been extensive, large-scale sample survey concluded. Concluded that: money and happiness is not the way people think proportional, neither the happier the more wealthy people, the more money the less happy people. The relationship between them is minimal, with scholars jargon, the relationship between them is only â€Å"slightly positive. † The psychology of money, this book made a quantifiable figure on the relationship between money and happiness – † there have been a number of studies of this relationship, and they all come up with a correlation of about 0. 25 † This book use x-axis and y-axis, the mathematics way, visually describe the relationship between money and happiness: assuming that use y-axis draw the satisfaction of happiness, and use x-axis describe the amount of money. The intersection of two axes is the starting point of zero. And then make a mark on y-axis at 0. 25, which is limit value of the correlation between money and happiness. When people's incomes are low, the satisfaction of happiness is very low indeed. When people are without money, the satisfaction of happiness is almost close to zero. Once people just out of the poverty line, the curve which describe the relationship between money and happiness will rush up almost touch the 0. 25 line. And then quickly become a horizontal line at 0. 5 irrelevant with the x-axis. Even if the amount of money on the x-axis increasing in thousands, millions, or billions rate doubled, the relationship between money and happiness curve ignore it. The line will never exceed 0. 25. And the curve maybe fall to 0. 2, 0. 1 or lower level. In mathematics, this phenomenon is called â€Å"diminishing marginal effect. † Reasons for money and happiness curve diminished Through observation and study of happine ss, we can find that any happiness in the world has a premise which is desire. If people have no desire, people would not have happiness. So eager is only source of happiness. Desire is something people look forward, but do not get yet. So happiness is the pleasure when people are satisfied or say gets the thing which they look forwards. Furthermore, we can draw a conclusion, happiness (that is the source) is unrenewable. After we got a happiness, we can repeat to enjoy it, the desire will diminished, until disappear. This means people only have N times to enjoy the same type of happiness. For example, when people have learned how to ride bicycle, he will use it as much as possible, the happiness he get will increase. But when the time he ride bicycle reach to N, the happiness he get before will fall to zero. Because of happiness is non-renewable resources, so in the world of money and material, everyone has the limited resources of desire, and everyone has limited happiness to enjoy. For example, after we learned how to ride bicycle, and enjoy the happiness of ride bicycle, we will never enjoy it again. Along with our possession increase, our happiness will increase too. But the resources of happiness will diminish. It means the happiness we can enjoy will decrease. That is reasons for money and happiness curve diminished Conclusion They say money can't buy happiness, but it can facilitate it. —Malcolm Forbes Happiness is the desire for repetition. –Milan Kundera At the lower end of the income scale the better-off are happier; there is no effect from the middle of the scale onwards. And there has been no historical effect of increased national prosperity on happiness. There is evidence that people are happier of they think they are doing better than other people, or than they did themselves previously. Other sources of happiness are much more important, such as leisure, job satisfaction, social relations and personality. Money has very little effect on these, money people want to be rich or richer, and many take part in lotteries, no doubt in the belief that winning will make them happier. References

Monday, September 16, 2019

Qam and Qpsk

QAM and QPSK: Aim: Review of Quadrature Amplitude Modulator (QAM) in digital communication system, generation of Quadrature Phase Shift Keyed (QPSK or 4-PSK) signal and demodulation. Introduction: The QAM principle: The QAM modulator is of the type shown in Figure 1 below. The two paths to the adder are typically referred to as the ‘I’ (inphase), and ‘Q’ (quadrature), arms. Not shown in Figure 1 is any bandlimiting. In a practical situation this would be implemented either at message level – at the input to each multiplier – and/or at the output of the adder.Probably both ! The motivation for QAM comes from the fact that a DSBSC signal occupies twice the bandwidth of the message from which it is derived. This is considered wasteful of resources. QAM restores the balance by placing two independent DSBSC, derived from message #1 and message #2, in the same spectrum space as one DSBSC. The bandwidth imbalance is removed. In digital communications this arrangement is popular. It is used because of its bandwidth conserving (and other) properties. It is not used for multiplexing two independent messages.Given an input binary sequence (message) at the rate of n bit/s, two sequences may be obtained by splitting the bit stream into two paths, each of n/2 bit/s. This is akin to a serial-to-parallel conversion. The two streams become the channel 1 and channel 2 messages of Figure 1. Because of the halved rate the bits in the I and Q paths are stretched to twice the input sequence bit clock period. The two messages are recombined at the receiver, which uses a QAM-type demodulator. The two bit streams would typically be band limited and/or pulse shaped before reaching the modulator.A block diagram of such a system is shown in Figure 2 below. QAM becomes QPSK: The QAM modulator is so named because, in analog applications, the messages do in fact vary the amplitude of each of the DSBSC signals. In QPSK the same modulator is used, but wi th binary messages in both the I and Q channels, as describe above. Each message has only two levels,  ±V volt. For a non-bandlimited message this does not vary the amplitude of the output DSBSC. As the message changes polarity this is interpreted as a 1800 phase shift, given to the DSBSC.Thus the signal in each arm is said to be undergoing a 1800 phase shift, or phase shift keying – or PSK. Because there are two PSK signals combined, in quadrature, the twochannel modulator gives rise to a quadrature phase shift keyed – QPSK – signal. Constellation: Viewed as a phasor diagram (and for a non-bandlimited message to each channel), the signal is seen to occupy any one of four point locations on the complex plane. These are at the corner of a square (a square lattice), at angles ? /4, 3? /4, 5? /4 and 7? /4 to the real axis.M-PSK and M-QAM: The above has described digital-QAM or QPSK. This signal is also called 4-PSK or 4QAM. More generally signals can be generated which are described as M-QAM or MPSK. Here M = 2L, where L = the number of levels in each of the I and Q arms. For the present experiment L = 2, and so M = 4. The ‘M’ defines the number of points in the signal constellation. For the cases M > 4 then M-PSK is not the same as M-QAM. The QAM Receiver: The QAM receiver follows the similar principles to those at the transmitter, and is illustrated in idealised from in the block diagram of Figure 3.It is idealised because it assumes the incoming signal has its two DSBSC precisely in phase quadrature. Thus only one phase adjustment is required. The parallel-to-serial converter block performs the following operations: 1. regenerates the bit clock from the incoming data. 2. regenerates a digital waveform from both the analog outputs of the I and Q arms. 3. re-combines the I and Q signals, and outputs a serial data stream. Not shown is the method of carrier acquisition. This ensures that the oscillator, which supplies the local carrier signal, is synchronized to the received (input) signal in both frequency and phase.In this experiment we will use a stole carrier to ensure that carrier signal in the transmitter and receiver are in synchronism with each other. (Please read about Costas Receiver to understand more about carrier acquisition). In this experiment, two independent data sequences will be used at the input to the modulator, rather than having digital circuitry to split one data stream into two (the serialto-parallel converter). Two such independent data sequences, sharing a common bit clock (2. 083 kHz), are available from a single SEQUENCE GENERATOR module.The data stream from which these two channels are considered to have been derived would have been at a rate of twice this – 4. 167 kHz. Lowpass filter bandlimiting and pulse shaping is not a subject of enquiry in this experiment. So a single bandpass filter at the ADDER (summer) output will suffice, providing it is of adequate bandwidth. A 100 kHz CHANNEL FILTERS module is acceptable (filter #3). Experimental Procedure: The QPSK transmitter: A model of the generator of Figure 1 is shown in Figure 4. The QAM modulator involves analog circuitry.Overload must be avoided, to prevent crosstalk between channels when they share a common path – the ADDER and output filter. In practice there would probably be a filter in the message path to each multiplier. Although these filters would be included for pulse shaping and/or band limiting, a secondary purpose is to eliminate as many unwanted components at the multiplier (modulator) input as possible. T1 patch up the modulator according to Figure 4. Set the on-board switch SW1 of the PHASE SHIFTER to HI. Select channel #3 of the 100 kHz CHANNEL FILTERS module (this is a bandpass filter of adequate bandwidth).T2 there are no critical adjustments to be made. Set the signals from each input of the ADDER to be, say, 1 volt peak at the ADDER output. T3 for interest predict th e waveforms (amplitude and shape) at all interfaces, then confirm by inspection. Constellation: You can display the four-point constellation for QPSK: T4 set the oscilloscope in X-Y mode. With no input, select equal gains per channel. Locate the ‘spot’ in the centre of the screen; then connect the two data streams entering the QAM to the scope X and Y inputs.The Demodulator: Modelling of the demodulator of Figure 3 is straightforward. But it consumes a lot of modules. Consequently only one of the two arms is shown in Figure 5. The PHASE SHIFTER can be used to select either channel from the QAM signal. If both channels required simultaneously, as in practice, then a second, identical demodulator must be provided. T5 patch up the single channel demodulator of Figure 5, including the z-mod facility of the DECISION MAKER. T6 while watching the ‘I’ channel at the transmitter, use the PHASE SHIFTER to match the demodulator output with it.T7 while watching the â⠂¬ËœQ’ channel at the transmitter, use the PHASE SHIFTER to match the demodulator output with it. Tutorial Questions: 1) Explain how a QAM system conserves bandwidth. 2) The modulator used the quadrature 100 kHz outputs from the MASTER SIGNALS module. Did it matter if these were not precisely in quadrature ? Explain. 3) Name one advantage of making the bit rate a sub-multiple of the carrier frequency. 4) Why is there a need to eliminate as many unwanted components as possible into the modulator ?

Sunday, September 15, 2019

The Convenience of Today’s Technology

Who would have ever thought that you will be able to communicate with a person, just by typing a letter push press and send all from one location. Today’s technology is more convient, faster, and cost effective. As one of the projects that I have worked with for years is preparing the church newsletter, programs, notes, and other resources. In the past we had the manual and then the electric typewriters. When typing and a mistake were made, before the correction ribbon on the electric typewriter, you had to continually hit the back button and retype the correct letter. Your choice of print was very limited with the typewriter. There was no way to do spell check. Every paper had to be carefully proof read by a department of peoples. If you were adding a picture to your paper, you had to find pictures out of books and they were limited. Once the picture was found it had to be cut out and paste or taped to the paper. In order for someone else to add an article to the paper they had to type their part, get it proofread and then transport it to the location of the paper being prepared. In today’s world we have the technology that allows us to do all printing while sitting in one location. There are different types of programs to choose from to publish the newsletter, program, and other resources You have many different fonts to choose from depending on the type of message you are sending. There are thousands of clipart from cartoon, silhouettes, to any thing you can name to add as an image to your project. After finding the set up that fits your needs you can start your project, you can begin to type in your message in the designated area. To insert an image, you can go to the clipart or internet to locate the desired image. The computer does the spell check and some grammar checking as well. Usually when a word is misspelled it is underline with a squiggly red or green line. Some proofreading is still required but it may not take a team of people as in the past. In order from some one else to add a message to the paper being prepared all you need to do is send it to them by email as an attachment. As a downfall to this technology, if everyone is in the same office working with the same programs all will work well. However, if I’m working from home on my personal computer and I send it to another person at home, we may be working with different programs. Some people may have older systems while others may be on a up to date system. In conclusion, the convience of today’s technology and printing is much easier and faster in this day and time. As the years go on we will be amazed at how technology will advance in the future.

Saturday, September 14, 2019

Corrections Purpose and History Essay

The history of punishment is a unique one, since the dawn of man human kind has punished one another. Man did not merely throw someone in a chamber and let them contemplate their crimes such as we do in today’s society; rather, during those early times, punishment was harsh and swift. Criminals were not drawn through the litigation processes; instead, they were found immediately guilty of a crime and brought forth to be punished in an open forum, serving to the masses as an example of the consequences of crime. The early forms of punishment in Europe varied greatly but all forms were meant to inflict unimaginable pain upon the recipient, and it is from the European methods of imprisonment from which the U.S. drew inspiration. Punishment such as crucifixion, burning on pyres, guillotines, and gauntlets are but a few examples of what methods were utilized as early methods of punishment in early Europe. This illustrates the underlying ideology that punishment should be administer ed with two principles in mind, deterrence and retribution. Purpose and History Methods of imprisonment introduced near the turn of the eighteenth century England inspired and revolutionized the way we punish and house inmates. In England during the fifteenth and sixteenth century’s corporal punishment reined supreme. Public beatings were carried out in the streets with whips; beheadings and torture were the norm for serious crimes; and enslavement was common for petty offenders. During the seventeenth century in England and other European countries, imprisonment for lesser offenses started to occur but conditions were less than desirable or humane. These facilities were overcrowded, unsanitary, and, worst of all, gender/age neutral, which meant that male felons frequently took liberties with incarcerated women and children (â€Å"Incarcerated: The History of the Penitentiary from 1776-Present†, 1997). The American Colonies quickly embraced the idea of imprisonment, because of the religious freedoms English settlers sought when they colonized this nation. The Quakers were a religious group that settled in the northeast United States and they developed new laws to govern punishment and incarcerations that focused on prolonged imprisonment to serve as retribution for crimes committed. The Quakers belief system focused on of morality, peace, non-violence, and humanity. As such they showed mercy on offenders by allowing them to shed their anti-social behaviors through long term incarceration and a penance of hard labor. It is from this that modern the concept of reformation was established. Since this form of incarceration gained popularity, it has held onto two core principles: that a criminal can make restitutions for his/her crimes and that a convict can be eventually reintegrated back into society. The new form of punishment provided an alternative to the implemented punishments of yesteryear. Auburn versus Cherry Hill Pennsylvania System This reformation of how society punished criminals served as the foundation for new and competing theories on incarceration and punishment. In America around the early 1800’s, two prison systems were the dominant models of confinement: the Pennsylvania and the Auburn State. The first model was the Pennsylvania model, which was first used at Cherry Hill prison. This model used solitary confinement as its primary tool: convicts were perpetually detained without interactions with other individuals or time outside of confinement. The idea was that solitary confinement would lead to inward reflection and religious motivation and result in a penitent convict. In fact the word penitentiary actually comes from the Pennsylvania model of perpetual confinement because it had religious implications. At first, particularly in Cherry Hill, a Bible would be left in the solitary confinement cells in the hopes it would help prisoners repent. The second model was the Auburn State prison system, which supported the labor penance model. It operated under the assumption that hard, physical labor could not only serve as restitution but as a means of helping a convicted criminal reintegrate into society fully reformed. Often, prisoners worked during the day in total silence and would be hosed down them at night. A main criticism of the Auburn system was that prisoners were being used essentially as slave labor. Inmates were being farmed out to private business owners, who had contracts with the state, which in turn lined the pockets of the private businesses and cut costs for the state. As such, the Auburn model became the popular model, because states faced significantly less prison and prisoner care costs. Businesses paid a fee in order to use the prisoners and the prisoners acted as unpaid labor for the businesses. The state prisons pocketed the fees thus creating a revenue stream that could be used to support the prisons, rather than tapping into state funds, i.e. tax payer dollars (Colvin, 1997). Around the 1920’s to 1930’s many changes occurred due to the state of the economy and activists pressing the government for prison reform. One of the main changes occurred when Congress enacted the Hawes Cooper Act, which effectively stymied the sale of prison-made goods or the us e of prison-labor by making such goods subject to state punitive laws. This act was passed in no small part due to the jobs that were needed by good upstanding citizens—jobs that were being taken away during extremely tough financial times by cheap prison labor. Congress had the authority to pass such a law thanks to its power to control and tax interstate commerce. The Ashurst-Sumners Act was the final nail in the coffin by prohibiting transport companies from accepting prison-made products (McShane & Williams,1996). The changes that stemmed from the Depression helped shape the correctional system into the rehabilitation-oriented program we have today. Prisoners are now classified into the likelihood of rehabilitation and the type of crimes that were committed, and this determines what type of facility an offender is incarcerated. Since 1935, the government made it clear that prisons must separate prisoners on the basis of gender and age. Now, facilities specifically for juvenile offenders have been established and the handling procedures for yo unger offenders have been defined. Furthermore, there are programs to rehabilitate all types of offenders whether their needs are as simple as talking to someone during counseling sessions or educational opportunities. In some ways this system has been detrimental to corrections as a whole because it arguably results in overcrowding and a more lenient attitude: if you commit a crime then you will only have to contend with years off your life rather than hard labor and making reparations for the crime (Seiter, 2011). Over-population has resulted in more money taken from the taxpayers because if there are more people in the correctional system, more facilities and care are needed. Crime levels have dissipated over the years but not dramatically enough to really prove that this system is the true solution to our problems. Conclusion Modern principles of rehabilitation and reform have brought about the institution of facilities to incarcerate convicted individuals; these structures are called penitentiaries, jails, and prisons. Current prisons are more aptly concerned with long-term detention rather than a temporary housing prior to punishment like it was used as in the past. Today’s Prisons are a shell of the former institutions. Inmates in facilities today would never allow themselves to be used for labor outside prison walls it would be considered cruel and unusual punishment. For now the correctional system work, but soon it could be on the verge of collapse and any moment the flood gates could burst and the concept of rehabilitation could come to an end. References: Mcshane, M. D., & Williams, F. P. (1996). Encyclopedia of American Prisons (2nd ed.). Taylor and Francis. INCARCERATED: THE HISTORY OF THE PENITENTIARY FROM 1776- PRESENT. (1997). Retrieved from http://www.richeast.org/htwm/jails/Jails.html Colvin, M. (1997). Penitentiaries, Reformatories, and Chain Gangs: Social Theory and the History of Punishment in Nineteenth Century America. : St. Martin’s Press. Seiter, R. (2011). Corrections an Introduction (3rd ed.). Upper saddle Hall, NJ: Pearson/Prentice Hall.

A Property of the Clan Essay

Page 28, Jared confesses to Ricko that he had witnessed the raping of Tracy that night at Black Rock. But Jared had not said anything to anyone as those who committed the felony, were in fact his friends. Jared tells Ricko â€Å"It’s a madhouse. Davo and them running round saying don’t be a dobber, and then the posters on telegraph poles. Shame Black Rock Shame. † This cleary portrays peer pressure as he feels as though he needs to refrain from telling the truth, to not be labelled a snitch. And he is put under more pressure considering the fact that they are his friends, and he believes that he cannot go against them, even if it is the right thing to do. After Jared tells Ricko what he had saw, Ricko gets defensive and tells Jared to keep his mouth shut. â€Å"Forget you even saw it. Nobody knows you were there. It’s just the way things happen. †. Jared respons with â€Å"All right! † This represents peer pressure as Jared is put on the spot and being hassled not to tell anyone what he had seen. Jared’s response with â€Å"All right! † shows him giving into peer pressure and is listening to what they are telling him to do. Powerlessness is shown in this scene by the main character Jared, as he is the vitim in the situation. This is shown mainly with the use of language techniques. For instance, page 31, â€Å"Not a word. Not a name. Not a single fucking name. Get it? † says Ricko. The use of slang and cursive lauguage by Ricko portrays aggressiveness toward Jared, putting Jared in a powerless state as he listens and just goes with it, not saying one word. Also, this use of launguage portrays Ricko’s assertivness and puts Jared in a state where he cannot do anything about it, and that he has to listen to him. He is powerless in the situation. My poster promotes peer pressure through visual techniques such as juxaposition. This is evident as in the background, the people are positioned close together as a group, to show isolation and power over the main image of the girl. Also the use of colour is simple but eye-catching as it creates the focal point (girl) due to the contrast in colour (black and white). This layout portrays how in the play, Jared is left to decide for himself, whether he should do the right thing, or stick by his peers. Peer pressure also plays a huge role in the film â€Å"Thirteen†. Tracy (7th grader) becomes friends with the most popular girl in school, Evie, and is introduced to drugs, alcohol and sex. But Peer pressure was first and most evident when Tracy first hung out with Evie at a popular clothing store. Tracy shockingly witnesses Evie and her friend stealing clothing and accessories but steps outside the store as she knew it was wrong, and was laughed at and looked down by them. She had a moment to herself and thought about what had just happened. Ironically, a woman then sat next to her, and put her purse down. Tracy had a thought to herself. And only moments later, reunites with Evie, showing the wallet she had stolen and all the money that was inside. Evie’s attitude toward Tracy was flipped and was then happily welcomed by her. This shows a form of peer power as Tracy is felt unwelcomed and as if she weren’t fitting in, leading her to feel pressured into stealing aswell. Both power and powerlessness is shown by the main character Tracy in this scene. Powerlessness is shown through the technique juxtaposition, as Evie and her friend are always positioned close together, where as Tracy is always by herself ; portraying power over Tracy. But at the end of this scene, when Tracy decided to steal the purse, she was welcomed by Evie and the use of up-beat music showed power as they walked happily together; ending the scene. Again, my poster promotes the theme of peer pressure through visual techniques such as colour. The colour of the people in the background are coloured in a shade of black, to contrast with the main image of the person in the foreground, to represent isolation and power over her. Also, the gestures made by the main image, (e. g. er stance and facials) show the feel of uneasiness in the situation, as she is under pressure by her peers. This contrasting image reflects how in the film, Tracy felt powerless and also uneasy about the situation she was in, but eventually gave in due to her peers. To conclude, peer pressure is clearly present in both the related texts â€Å"A Porperty of the Clan† and the film† thirteen†. Peer pressure is an inevitable part of life, which everyone will eve tually encounter; And these both these texts show the consequences of such. A Property of the Clan Essay Page 28, Jared confesses to Ricko that he had witnessed the raping of Tracy that night at Black Rock. But Jared had not said anything to anyone as those who committed the felony, were in fact his friends. Jared tells Ricko â€Å"It’s a madhouse. Davo and them running round saying don’t be a dobber, and then the posters on telegraph poles. Shame Black Rock Shame. † This cleary portrays peer pressure as he feels as though he needs to refrain from telling the truth, to not be labelled a snitch. And he is put under more pressure considering the fact that they are his friends, and he believes that he cannot go against them, even if it is the right thing to do. After Jared tells Ricko what he had saw, Ricko gets defensive and tells Jared to keep his mouth shut. â€Å"Forget you even saw it. Nobody knows you were there. It’s just the way things happen. †. Jared respons with â€Å"All right! † This represents peer pressure as Jared is put on the spot and being hassled not to tell anyone what he had seen. Jared’s response with â€Å"All right! † shows him giving into peer pressure and is listening to what they are telling him to do. Powerlessness is shown in this scene by the main character Jared, as he is the vitim in the situation. This is shown mainly with the use of language techniques. For instance, page 31, â€Å"Not a word. Not a name. Not a single fucking name. Get it? † says Ricko. The use of slang and cursive lauguage by Ricko portrays aggressiveness toward Jared, putting Jared in a powerless state as he listens and just goes with it, not saying one word. Also, this use of launguage portrays Ricko’s assertivness and puts Jared in a state where he cannot do anything about it, and that he has to listen to him. He is powerless in the situation. My poster promotes peer pressure through visual techniques such as juxaposition. This is evident as in the background, the people are positioned close together as a group, to show isolation and power over the main image of the girl. Also the use of colour is simple but eye-catching as it creates the focal point (girl) due to the contrast in colour (black and white). This layout portrays how in the play, Jared is left to decide for himself, whether he should do the right thing, or stick by his peers. Peer pressure also plays a huge role in the film â€Å"Thirteen†. Tracy (7th grader) becomes friends with the most popular girl in school, Evie, and is introduced to drugs, alcohol and sex. But Peer pressure was first and most evident when Tracy first hung out with Evie at a popular clothing store. Tracy shockingly witnesses Evie and her friend stealing clothing and accessories but steps outside the store as she knew it was wrong, and was laughed at and looked down by them. She had a moment to herself and thought about what had just happened. Ironically, a woman then sat next to her, and put her purse down. Tracy had a thought to herself. And only moments later, reunites with Evie, showing the wallet she had stolen and all the money that was inside. Evie’s attitude toward Tracy was flipped and was then happily welcomed by her. This shows a form of peer power as Tracy is felt unwelcomed and as if she weren’t fitting in, leading her to feel pressured into stealing aswell. Both power and powerlessness is shown by the main character Tracy in this scene. Powerlessness is shown through the technique juxtaposition, as Evie and her friend are always positioned close together, where as Tracy is always by herself ; portraying power over Tracy. But at the end of this scene, when Tracy decided to steal the purse, she was welcomed by Evie and the use of up-beat music showed power as they walked happily together; ending the scene. Again, my poster promotes the theme of peer pressure through visual techniques such as colour. The colour of the people in the background are coloured in a shade of black, to contrast with the main image of the person in the foreground, to represent isolation and power over her. Also, the gestures made by the main image, (e. g. er stance and facials) show the feel of uneasiness in the situation, as she is under pressure by her peers. This contrasting image reflects how in the film, Tracy felt powerless and also uneasy about the situation she was in, but eventually gave in due to her peers. To conclude, peer pressure is clearly present in both the related texts â€Å"A Porperty of the Clan† and the film† thirteen†. Peer pressure is an inevitable part of life, which everyone will eve tually encounter; And these both these texts show the consequences of such.

Friday, September 13, 2019

Petroleum contract and economics Essay Example | Topics and Well Written Essays - 3000 words

Petroleum contract and economics - Essay Example It is reported that crack spreads are mostly higher in areas that have a constricted capacity for refining oil and a high demand for refined products. Some areas are categorized as having a constrained capability of refining oil and an above average growth for the demand of refined oil products. In the last decade, some areas such as Tema, have experienced higher profit margins for oil products than other areas. The location of a refinery is also vital because it affects the supply of crude oil which is processed at the refinery. It is worth noting that access to cheaper heavy crude oil helps the refinery optimize on feedback differentials such as feedstock (Economic impacts of oil spills Spill unit costs for tankers, pipelines, refineries, and offshore facilities 1993). The site for the new oil refinery was chosen for a number of reasons but mainly due to strategic purposes. Ghanaville has a well-connected infrastructure consisting of roads and an existing port. This is coupled with the recent government’s initiative (Ghana Ports & Harbors Authority) to implement new changes at the port with an aim of upgrading and modern sing the port. The site Ghanaville, has an already existing operational port with ease of access to a railway line and a network of roads that will facilitate the receival of feedstock and the shipment of refined products at the new location. The location is also very secure with regards to the specially designated area that is patrolled routinely by police officers. The security is further aided by the already established contract between the authority body and the company relating to the tenure of the land where the new refinery is going to be located. A long term lease has been already approved. The new location is surrounded by a growing urban center which will be able to offer a relatively good support system for families and businesses. The quality of life of both businesses and families that will be

Thursday, September 12, 2019

Criminal justice Essay Example | Topics and Well Written Essays - 750 words - 1

Criminal justice - Essay Example It has often been confused that correctional facilities are intended to punish perpetrators of law. That said, the prison system plays a major role in removing criminals from the street thereby creating a safer haven for its citizens while providing opportunities for criminals to understand their offenses and change for the better. The rate of imprisonment in the United States has been on the increase in recent times and this has raised concern among public administrators and citizens in general. The prison administrators primarily are alarmed that in the near future the prisons may be insufficient to hold inmates convicted of felonies. Claims that the correctional facilities are not given enough attention as they ought to given their importance in ensuring security of its citizenry has lead to the recent debate on whether or not correctional facilities should be privatized or remain in the hands of federal and state government. Of course, each opposing side has reasons why they think things should be as they propose. Therefore, what are the pros and cons of privatization of correctional facilities specifically jails in the United States. The jail system is best left in the hands of the public because there are many aspects that would be negatively imparted if jails were privatized, for example employment. This is because underlying privatization of any state owned corporation is the issue of cost reduction. Therefore, in the arms of private companies, profit margins take precedence, meaning that most prison guards and staff would be laid off and the few left to work twice as hard in order that expenses are reduced. Moreover, the urge to cut corners in vital activities like recruiting staff, training and compensation among prison workers among others is high probability. The outcome increased rate of unemployment and by extension higher crime rate. In addition, privatized companies are notorious for bending standards of requirement. Employing of under

Wednesday, September 11, 2019

Analyze, Compare and Contrast Essay Example | Topics and Well Written Essays - 500 words

Analyze, Compare and Contrast - Essay Example When Dexter Filkins Realized what had happened the initial thought she had was that she was in the third world. Dexter Filkins thought that people in the United States would think that it was the end of civilization as the worst has happened. However, Dexter Filkins understood that such things happened in the third world occasionally. In the third world cases such as earthquakes, plagues and famine were common where thousands of people would die. Dexter Filkins also had a similar experience on a bomb attack in Tel Aviv (Hampton, 2007). On the other hand, Katherine Finkelstein experienced the attacks. During the attack, she was in her gym and after the attack she moved to the scene of the attack. She got involved with the some of the survivors and interviewed them. She was scared and at some point she was screaming. Katherine Finkelstein was present when the building collapsed and at some point she was not able to tell what she saw or heard. Her situation was different from Dexter Filkins as things were hectic, and people were running away from the scene. However, she managed to get out of the scene alive and made the effort of writing small notes in her notebook about the events that happened. Her perception was either the world has ended or has changed. Later on Katherine Finkelstein was involved in the rescue operation of the individuals injured at the scene (Roleff, 2003). Both Katherine Finkelstein and Dexter Filkins were journalists. Dexter Filkins indicates that she realized she was not alone in the building as there was a photographer at the scene taking photos. She also indicates that she at one moment thought of the battery of the cell phone as she used to call the station frequently. Both of the journalists also had encounters with the police as there were restricted areas where they could not access. On the case of Katherine Finkelstein she was personally rescued by an FBI agent from the collapsing building (Hampton,

Tuesday, September 10, 2019

No topic Assignment Example | Topics and Well Written Essays - 500 words - 17

No topic - Assignment Example Hence, it is advisable that the Christians with the heart of helping the needy should not spoon feed them, but provide them with guidelines on how they can solve their problems and come out of their situations. Bob Lupton, Bart Fikkert, and Melissa Dodson realized that the people being helped had the capacity and capability of doing the things that they were a help. For instance, they observed that persons whose streets were littered and charity works were geared towards cleaning their streets had the capacity including physical fitness to undertake these tasks by themselves. Additionally, they realized that the people who were being helped by charities became lazy to perform tasks that could help them obtain what they were provided with yet they were in positions to do the same. Therefore, these charity works only increased their dependency on handouts from the charity organization or people. These circumstances are different from other circumstances that these authors highly criticized. Obviously, the natural disasters are usually emergencies that people need to be helped out of or help to recover to their normal ways of life. In these cases, Bob Lupton, Steve Corbett, and Brian Fikkert may not criticize persons, organizations, or religions that provide charity to these people. Notably, after a well-coordinated response by the government among other relevant agencies to these emergencies, the affected persons from natural disasters are expected to resume their normal life. Therefore, they are not expected to depend on the charity for the rest of their lives; hence, Bob Lupton, Steve Corbett, and Brian Fikkert may support individuals to provide such groups with charitable services and goods. Relief is an urgent, but temporary aid provided to reduce suffering following a man-made or natural disaster. On the other hand, rehabilitation are is reconstruction steps that are often undertaken immediately after

Monday, September 9, 2019

Internet Activities Essay Example | Topics and Well Written Essays - 1000 words

Internet Activities - Essay Example The military is divided, and the political rivals seek to undermine each other and serve their own interests. Humanitarian conditions have gotten worse, because the government has not paid any attention to this. Economic problems, such as high unemployment, poverty and shortage of basic commodities also exist. Al-Qaeda’s presence, in the form of Ansar Sharia is also a problem. 2. The ICG has a number of recommendations to particular groups in the country, to improve the conditions. This includes the fulfilling of the agreement and let President Hadi take his position. This has been recommended to the armed forces. The President is also recommended to perform all the tasks as mandated by the agreement. The present government is also implored to see the implementation of laws. The crux of the recommendations to different interest groups remains to respect the agreement, and support the present government. The global community, along with non-state actors are also recommended to support this country. 3. Yemen is a Middle-East country, which faces the same sort of problems, as other countries in her region. This is because of the long dictatorship, and the revolution that occurred. ... The U.S-Pakistan relationship has also deteriorated, because of the raiding of Pakistan to find Osama Bin Laden. The different political parties, particular the PML (N) refuses to accept assistance from U.S. Serious aid reduction has had effect on the work of NGOs, which had been working for the betterment of the country. Kidnapping of officers has also been an issue. Additionally, Pakistan needs basic necessities, such as electricity, roads and telecommunications, water, but the current state of the government and its institutions have not been able to keep up with the demand for these necessities. The U.S has recently been on bad terms with the military of Pakistan, and it has reduced civilian assistance; the effects of this are largely seen. 2. Proper democratic rebuilding, capacity building and to have proper policy implementation are the basic recommendations for this particular country. However, the U.S government is also implored to take the opinion of USAID in foreign policy development, and to provide aid effectiveness. The U.S is also recommended to help Pakistan in different ways, including strengthening the government so that it can provide the basic necessities to people. The National and the Provincial Governenmts have also been implored to let the NGOs conduct their work easily and to initiate national dialogue on issues, such as the energy crisis. Additionally, advancement of social and human rights is also recommended. 3. The public in Pakistan has recently turned against the United States, because of the recent NATO attacks, which breached the national sovereignty of Pakistan. Therefore, it is not only the military, or even a particular political party that are part of the hate campaign against U.S. The public is also involved. However,

Sunday, September 8, 2019

Consumer Behaviour Models and Their Strategic Applications Essay

Consumer Behaviour Models and Their Strategic Applications - Essay Example Pepsi and Low Involvement Decision Making With the advancement of technology, it has become easier for consumers to search for necessary information and make careful and informed decisions. This theory was first mentioned by Walters (2002), where he had considered all the external and internal factors affecting the purchase decision of an individual and created a complex connection. Group, as well as social forces, influence the buying process of a customer. Consideration of research work of Krugman and Hartley (1970) reveals the fact that there is a significant amount of divergence exist peoples involvement in the decision-making process. In some decision-making process, people pay a significant amount of importance on evaluating available options while in case of some products, consumers do not put significant importance on evaluating options and just go by their intuition. In the first case, the decision-making process is known as high involvement decisions while the second proces s known as low involvement decision process. ... On contrary, decisions regarding fast food purchase, buying drinks, buying small products etc can affect customers only during the specific period of consumption and such decisions can hardly impact overall aspects of human life. Therefore, people tend to involve less while making decisions regarding above-mentioned issues. In Low Involvement Decision Making, people can make a purchase decision with the help of specific stimulus such as positive feelings during consumption, a suggestion from a peer group, consumption environment, previous consumption experience etc. Involvement based Consumer Decision Making Process In this section, the study will use Pepsi’s marketing and promotional efforts in order to understand how Low Involvement Decision Making takes place while consumers make soft drinks purchasing decision. From a marketing perspective, Pepsi’s marketing and promotional efforts aim to persuade consumers that they are better compared to Coke. Pepsi uses TV commer cials. Print advertisements, celebrity endorsements, sports events sponsorships, music event sponsorships, retail promotions which are tailored for the local market, in-store displays, billboards, hoardings, social media advertisements in Facebook, Twitter etc to promote their offering (Aronson, 1999). Aronson (1999) stated that market share of Pepsi is smaller than Coke but in the last 14 years, Pepsi has regained its market share with the help of the promotional strategies. Now, when customers make soft drinks consumption decision then what factors they exactly consider?  

Saturday, September 7, 2019

Ethanol Alcohol Research Paper Example | Topics and Well Written Essays - 500 words

Ethanol Alcohol - Research Paper Example It is not thus converted for supply to the tissues or cells. Only about 20% of the alcohol is directly absorbed into blood via walls of the stomach while the rest directly goes to the bloodstream by way of the small intestine (Dunlap). A very low dose of ethanol alcohol is just as powerful to affect the brain’s memory and make the processing of new information complicated for the hippocampus. â€Å"Somebody who drinks too much, the next day doesnt remember what happened during that time, but yet at the same time has the ability, unfortunately in certain cases, to drive home after drinking a lot† (Gislason 86). Ethanol affects the energy metabolism of carbohydrates which causes the glycogen level inside the muscles and the liver to recess. Ethanol causes loss of structural tissue because it is catabolic in nature. This effect causes an individual to lose more weight than what he/she may gain from the in-take of calories. This is one of the most fundamental effects sought by the consumers of ethanol alcohol. The fat rather moves over to the trunk and belly leaving the individual with a weaker and skinnier appearance. As a result of the accumulation of estrogen inside the body, men may experience an enlargement of breasts. The degeneration of body destroys their personality and turns a macho man into an irritated person. Consumption of ethanol alcohol can also cause many diseases to occur. Up to 80 percent of alcoholics, however, have a deficiency in thiamine (15), and some of these people will go on to develop serious brain disorders such as Wernicke–Korsakoff syndrome (WKS) (16). WKS is a disease that consists of two separate syndromes, a short–lived and severe condition called Wernicke’s encephalopathy and a long–lasting and debilitating condition known as Korsakoff’s psychosis. (NIAAA). Occasionally ethanol alcohol may be employed for

Friday, September 6, 2019

Terrorism and Technology Essay Example for Free

Terrorism and Technology Essay India and the United States, the world’s two largest democracies, are both vulnerable to terrorist attacks. As an Indian participant in the workshop said, â€Å"The most vulnerable states are those with open societies that tolerate dissent.† So far, India and the United States have faced rather different forms of terror attacks. Notwithstanding the terrorist threat, modern industrial societies have some offsetting advantages. Their global intelligence services and military presence, especially when they cooperate with one another, may keep the terror networks off balance, and may be able to damage some of them and interfere with their communications and money flows. Military action, or the threat of it, may discourage rogue states from supporting the terrorists. Nevertheless, highly efficient economies also acquire vulnerabilities and reduced resilience from the private sector’s reluctance to sacrifice efficiency to reduce catastrophic risks whose likelihood is difficult to estimated One area in which both India and the United States enjoy impressive capability is research and innovation. Through the application of available or new technologies, states can make targets less vulnerable, thus less attractive. They can limit the damage that may result from an attack, increase the speed of recovery, and provide forensic tools to identify the perpetrators. However, terrorist networks are led by well-educated and well-financed people who may also enjoy advanced technical skills. If supported by a government whose military establishment has developed weapons of mass destruction, these skills may be greatly amplified. Any technical strategy for responding to the threat of catastrophic terrorism must address this fact. †¢fissile nuclear materials, tactical nuclear weapons, and radiological materials †¢pathological organisms (human, plant, and animal) †¢military-type toxic chemical weapons †¢inflammable, toxic, and explosive chemicals and materials in industrial use †¢cyberattacks and electromagnetic pulse (EMP) attacks on electronic targets (telecoms, data, or command and control centers) †¢transportation systems used as delivery systems for weapons †¢explosives, either conventional or derived from fuel oil and nitrogen fertilizer (ammonium nitrate), for example Benefits- †¢revitalization of the public health service for serving the normal health needs of communities †¢technical capability to respond even faster and more effectively to natural biological threats such as Severe Acute Respiratory Syndrome (SARS), West Nile virus, and monkey pox virus †¢reduction in the number of illnesses caused by infection or poisoning of the food supply †¢more reliable electric power and other services, especially in the face of hurricanes, floods, and earthquakes †¢further improvements in the safety standards of the chemical industry †¢reduced incidence of cyber attacks by hackers and financial systems made more secure against theft and malicious damage †¢more efficient and timely tracking of goods in transit and billing for their content †¢reduced risk to fire, police, and emergency health professionals MITIGATION: THE ROLE OF SCIENCE AND TECHNOLOGY Nuclear and Radiological Threats If terrorists with a minimal level of scientific knowledge can acquire enough highly enriched uranium (HEU), they may be able to assemble an inefficient but effective nuclear weapon for detonation in a major city. The countries are now cooperating in safeguarding fissile material and blending down stocks of HEU, but progress is far too slow. Even more dangerous is the possible availability to terrorists of finished nuclear weapons either stolen and sold from nuclear states or provided by rogue states capable of making them. The public must be educated on the nature of radiological threats, both from Radiation Dispersal Devices (dirty bombs) and from damaged nuclear electric power plants and radioactive waste storage. Public ignorance about radiation hazards may induce a level of panic much more destructive than the radiation from which people may be fleeing.. Biological Threats to People and Their Food Supply Research on pathogenesis of infectious agents, and particularly on means for early detection of the presence of such pathogens before their symptomatic appearance, is important. Nations will stockpile vaccines against known diseases, but the threat of genetic modification—while perhaps beyond the capability of most terrorists but not of rogue states—requires a vigorous research effort to find solutions for detection, evaluation, and response.  In the United States the Center for Disease Control and Prevention (CDC) provides a robust capability in epidemiology, but there is no equivalent epidemiological response capability for possible biological attacks on agriculture and farm animals. Thus, measures to protect the food supply, and to provide decontamination after an attack, must have high priority. Toxic Chemicals, Explosives, and Flammable Materials . Dangerous chemicals in transit should be tracked and identified electronically. To ensure that only first responders, and not terrorists, know what the tank cars contain, the rail cars should be equipped with encrypted electronic identification. Sensor networks are required to detect and characterize dangerous materials, particularly when they are airborne. Self-analyzing filter systems for modern office buildings whose windows cannot be opened can not only protect the inhabitants but also detect and report the first presence of materials (such as aerosols) that may be trapped in improved filters. An example of long-range, basic research that could be highly beneficial would be the discovery of olfactory biosensors than can reach dog levels of sensitivity, some 10,000 times that of humans. Communications and Information Systems In the United States the most urgent issue is to reconfigure first responder communications so that police, fire, and medical personnel can communicate with one another and with the emergency operations centers. Inability to do so greatly aggravated loss of life, especially among firefighters, in the World Trade Center attacks. The main worry about cyber attacks is the possibility of their use, perhaps with electromagnetic pulse devices as well, to amplify the destructive effect of a conventional physical or biological attack.13 Cyber security is one of the top priority areas for research investment because private industry was, before September 11, 2001, largely content with the level of computer and network security available to it. A quite inadequate level of sophisticated talent is devoted to the goal of fully secure operating systems and networks. Transportation and Borders Sensor networks for inspection of goods and passengers crossing the nation’s  borders will be a research priority. The primary technical challenge will not be the design of sensors themselves, although much progress is needed in this area, but in the systems engineering of the networks of sensors together with data fusion and decision support software. Biometrics for more secure identification of individuals shows promise, and systems superior to the driver’s licenses and passports used by most travelers are promising. The range of threats to the transportation networks of a modern state is very great, and careful systems analysis is essential to identifying the weak points and finding the most effective and economical means of protecting them. Cities and Fixed Infrastructure The Emergency Operations Centers (EOC) in many large U.S. cities are quite vulnerable, not only to a destructive physical attack but to more indirect attacks on their ability to access data and to communicate through a cyber attack or electromagnetic pulse attack. Remedying these vulnerabilities must have high urgency; in many cases the centers will have to be relocated. Tragically, the EOC in New York City was located in a known target, the World Trade Center. Much research is already under way to analyze the structural characteristics of high-rise buildings that may make them much more vulnerable than necessary. Without waiting for this research to result in revised building codes, the expert panel recommended immediate adoption and extension, where appropriate, of European standards for fire and blast, which were much improved following World War II. As already noted, air intakes for large buildings need to be less accessible and equipped with better air filters, perhaps with chem ical analysis sufficient to determine if a toxic material is present. Instrumentation to allow first responders to detect toxic and hazardous materials; special provisions for protecting harbors, bridges, dams, tunnels, and dikes; and protection against attacks on urban water supplies downstream from the treatment plant are all discussed in Making the Nation Safer. How much of the long term, imaginative research and development envisioned in Making the Nation Safer has been undertaken by the Department of Homeland Security (DHS)? Not enough. The Science and Technology Directorate of DHS does not have the scope of authority, nor the length of vision that the Academies’ study urged on Congress. Critics say that it has been difficult for DHS to sustain an  expert staff with low enough turn over to build and execute the needed technical strategies. Nor has the Homeland Security Institute been given the necessary scope of independent system-level review of the DHS technical priorities. SOCIETAL RESPONSES TO TERRORIST THREATS the public can also be an attack amplifier. The government faces a number of dilemmas, such as using a color-coded warning system to alert the public to the perceived likelihood of additional terrorist attacks. Some citizens feel that this system itself may needlessly amplify the threat, thus doing terrorists’ psychological job for them. An urgent issue to be addressed is for government to train and introduce to the public, well in advance of any attack, a number of trusted and knowledgeable people who are prepared to provide accurate and trustworthy information quickly and authoritatively. TECHNICAL STRATEGIES From the great variety of threats studied by the National Academies’ experts, several commonsense conclusions about technical strategy can be extracted: †¢repair the weakest links (single-point failures) in vulnerable systems and infrastructures †¢use defenses-in-depth (do not rely only on perimeter defenses or firewalls) †¢use â€Å"circuit breakers† to isolate and stabilize failing system elements †¢build security and flexibility into basic system designs where possible †¢design systems for use by typical first responders †¢Focus priority attention on the â€Å"system of systems† technical challenge to understand and remedy the inherent weaknesses in critical infrastructure that are inherent in their architecture. †¢Ensure that first responders, including technical teams from critical infrastructure service industries, are properly trained and equipped, and the targets themselves are designed to be more resilient in the face of disaster. †¢Emphasize the importance of flexibility and agility in responding to disasters that were not anticipated in the system design and personnel training. The last point is particularly important. Future attacks are likely to involve multiple complex systems. There are a number of dimensions to the systems engineering challenge of homeland security. The multiple critical industrial infrastructures are closely coupled. Almost all of the responses to terrorist threats require  the concerned action of national agencies, state and local authorities, private companies, and in many cases, friendly nations. The technologies used in counterterrorism will themselves be coupled, complex systems. An evident example is the notion of complex networks of sensors that are coupled to databases, within which the network output is fused with other information, and from which sensible and useable information for local officials in Emergency Operations Centers must be provided. Thus, setting priorities requires modeling and simulating attack and response, and â€Å"red teaming† to test the effectiveness of proposed solutions. Finally, there is a need to build up investments in the social sciences, which will be especially important in devising strategies for countering terrorism. Both the roots of terrorism and its consequences need to be better understood. Social science can also contribute to a sustainable effort, involving multiple levels of government, with minimal economic cost, and where the perceived conflict between security activities and protection of individual freedom can best be informed and adjudicated. A SUSTAINABLE STRATEGY FOR HOMELAND SECURITY Because major terrorist attacks against civil populations may be separated by considerable intervals of time, there is reason to be concerned that the public will lose interest in the threat, and that none of the organizational or investment needs will be satisfactorily met. For these reasons, the strategy for maximizing civil benefits deserves high-priority attention. There are many obvious examples of how counter terror research and development can create values appreciated by the public and of economic value to firms, such as creation of a more agile vaccine development and production capability, information and communications networks that are more resistant to cyber attack, energy systems more robust in the face of natural disasters and human error, security technologies that are more effective yet more unobtrusive and convenient for the public. Sustainability will be a challenge for those in political power in the United States, for they find themselves compelled to emphasize the public’s vulnerability (for example, with the color-coded alert system, which is largely successful in making the public nervous) and at the same time to emphasize that the government’s efforts â€Å"have the terrorists on the run.† Indeed, we can easily imagine that  terrorist organizations such as al Qaeda may deliberately wait long intervals between attacks to decrease the alertness of the target’s defenses. SUMMARY AND CONCLUSIONS There are seven major points that I would conclude from this discussion. First, only a far-sighted foreign policy, addressing the roots of terrorism and denying terrorist ideologies a foothold in other societies, can make the United States and its allies safer in the long run. Second, weapons of mass destruction are potentially devastating, but the most probable threats will be fashioned from the economy itself, as was the case on September 11, 2001. Private property and commercial industry is most often the target of terrorist attacks, and may be providing the weapons for their own destruction. Thus, the federal government must devise both positive and negative incentives for private investments in hardening critical infrastructure and urban targets. Third, the protection of critical infrastructure must, to the extent possible, be accomplished through a civilian benefits maximization strategy. Fourth, reducing vulnerabilities in critical infrastructure is a highly complex systems problem; it requires a strategy tested by the most modern systems analytic approaches. Fifth, since most of the science and technology capability of market economy governments lies outside the security agencies, governments must be able to coordinate and fund a national science and technology strategy. Sixth, a degree of cooperation between industry, cities, and government unknown in prior experience is required. In particular, local authorities must have an effective voice in setting the technical agenda for equipment for which they are the customer. Finally, for the protection against terrorism to be sustainable, more than a civilian benefits maximization strategy is required. The negative effects on civil freedoms from increased authority in the central government must be resisted, since the threat of terrorist attack is indefinite and emergency measures may never be relaxed. Now, let us examine security. First, although science and technology will not solve all problems related to terrorism against the components making up a modern regional or national infrastructure, it can help in prevention, mitigation, and restoration if an attack or attacks are attempted or carried out. In other words, science and technology will help to reduce the threat of  terrorism, but it cannot eliminate it. Unfortunately, terrorism has become a fact of life. Whenever there are dissatisfied people who are willing to give up their own lives or do not value human life, it will be difficult to eliminate the threat of terrorist attacks. A specific point where science and technology can help is in the area of intelligence, by providing information about the potential for an act of terrorism to be conducted. For example, what is being done to sort through open-air communications—both e-mail and voice wireless—is rather startling both in quantity and in degree of soph istication. There are programs, such as Trailblazer at the National Security Agency, that look for keywords and matches. Some of the recent terrorism alerts have been based on information gathered through these programs. There is another aspect that inexorably links infrastructure and security. The more sophisticated, complicated, or technologically evolved the infrastructure, that is, the more fragile it is, the more difficult it is to secure against terrorism and the greater theneed for science and technology solutions. The latter was the particular challenge that we were confronted with at the National Academies in producing the report entitled Making the Nation Safer.50 What can and should be done incrementally as society becomes more and more complex, sophisticated, and interdependent? How do you establish layers of protection because of increased vulnerability? First, communication and coordination is required. When the September 11, 2001, terrorist attacks occurred, the New York City Resp onse Center was in the World Trade Center. So the ability of the fire and police departments within New York City to respond was hampered severely because there was no way to centralize and coordinate the actions of the first responders. The lesson to be learned is that redundant response centers are needed for just this sort of contingency. The lack of communication was another lesson coming from the World Trade Center disaster. There is a definite need to have common systems that will allow all parties to communicate seamlessly Regarding building structures, another lesson can be drawn from the attack on the Pentagon. The Pentagon was hit exactly at the point between a newly restored portion of the Pentagon and the old Pentagon. While there was damage to the newly restored section, there was no structural failure to that part of the building. The walls absorbed the energy of the crash. In contrast, the old Pentagon suffered severe damage. Its walls collapsed. Most of the loss of life was in the old part of the Pentagon. The lesson here is to incorporate blast-resistant designs and materials into high-profile buildings For cities, one of the areas that is most in need of immediate attention is the ability to respond to catastrophic events. There is a need for simulation models, improved communications, and associated training. There is also a need to conduct systems analyses of responses to events in both space and time. For transportation systems, there is an immediate need for intelligent â€Å"information agents† for cargo. These agents would include a combination of global positioning systems and sensors to detect intruders and, possibly, the presence of certain materials as well as shipping documents detailing the contents. Such agents would be installed on every freight car in a rail system, every container on a ship, and every container transported by truck. Thus, one could monitor at every point in time exactly where each container or rail car is, what it contains, its destination, and whether there has been any attempt to tamper with or enter it. The various pieces of the so-called intelligent agent exist today and have been used on a limited basis. Efforts are under way to marry these various components into the type of agent I have described. Cargo scanning technology is complementary to the intelligent agents. While cargo scanners do exist, there is a need to integrate various components into a â€Å"one-stop shop† to monitor for specific items or radioactivity. The scanning equipment should be located at the point of embarkation of the container to prevent lethal weapons from reaching their intended destination. What good would it be to identify a nuclear weapon in a container as you offload it in New York Harbor?53 Transportation technology needs to extend beyond the cargo. There is a compelling need to develop means of rapidly identifying people, checking them and their luggage. Although there are systems in place today, the sheer numbers of people and locations is daunting. The use of biometrics would greatly alleviate this problem, while increasing the confidence level of the security forces. Rapidly deployable barriers to keep underground structures and tunnels from being flooded are another need.