Thursday, October 31, 2019

Businesses and their impact in Spanish speaking countries Essay

Businesses and their impact in Spanish speaking countries - Essay Example With the increase in the demands for energy in recent years the government of Mexico has increased its budgeted capital, but due to its high tax burden the company has been forced to depend upon debts to finance the projects. PEMEX has been adversely affected by the increase in oil prices over the years and requires funding to stabilize its position in the market. The main oil field Cantarell has reached its peak capacity of production and heavy investments is desirable coupled with explorations for new area for oil production as the current capacity of 3.3 million barrels per day would deplete towards the end of this decade. Being heavily taxed, the President of Mexico has relaxed the tax by $2.4 billion to be paid by the company next year. Despite the reserves Mexico has started importing oil at the rate of 374,000 barrels per day in the recent past due to non availability of refining process for oil and related products. The tax break and provision of favorable environment for the oil companies to undertake oil exploration is one of the major steps which the newly appointed President has taken over the period of time. There have been quiet an opposed reaction to the initiative as private investments is deemed to be loss of control over PEMEX. As PEMEX has invested more in oil exploration rather than investing in refineries for a quarter of the century, Mexico now imports 20% of its current capacity of oil and 25% of the natural gas based products. The aim of the paper is to analyze and understand effect of PEMEX on the Mexican economy and society in general. The paper also analyzes the employment opportunity which private investments create and the favorable business environment for business growth. Mexico has the second largest oil reserve after Venezuela among the western countries and the country has been ranked among the top five oil producing nations for crude and refined oil production.

Monday, October 28, 2019

India Change over Time Essay Example for Free

India Change over Time Essay India is a country with a rich culture and many age-old traditions. Although some of these aspects of indian culture can still be seen today, India has changed greatly over the year. A major contributing factor to this change was British colonization of India in the early and mid-1700s; colonization had both short-term and long-term impacts on India. Prior to British colonization most of India lived in small villages and maintained a predominantly agricultural economy. In most regions of India there is a strong sense of family and community. There are many festivals and occasions for celebration, especially weddings. As each region of India has elements of unique culture, occasions and celebrations can vary widely. Before colonization, people lived in extended families. A son would not leave his parents home when he married. Instead, his new wife would live with her husbands family and work for and serve his household. Women had very few choices or rights. They were expected to obey their father until they married, then they would obey their husband. If their husband died, they would be expected to obey their father-in-law. Houses were built of wood, reeds, mud bricks and straw. People slept, ate and sat on the floor, and furniture in houses was not common prior to colonization. Jainism, Hinduism and Buddhism are the three religions that are believed to have shaped Indian thought; religions that are practices world-wide. Many motivations pushed Europeans towards colonizing foreign lands. Primarily, nations established colonies to gain economic profits. In addition to a desire for economic profit, nationalism also served as a reason for colonization. Europeans used the ideas of the White Mans Burden to help justify their colonization of foreign lands. The White Mans Burden was the idea that as supreme beings, it was the job of the white people to spread their superior ways of living to the inferior people of other places. Britain discovered the Indian sub-continent when it was looking to expand its vast empire. In the mid eighteenth century, India became one of Great Britains most important colonies. Great Britain relied heavily on India as a source of raw materials. Britain profited from Indias vast supply of tea and cotton. Beginning in 1757, the East India Company, which was overseen by the British government, ruled India. Britain did benefit from the situation; however, notwithstanding the obvious injustices associated with colonization, India also experienced positive impacts. While Great Britain felt that they were being very generous to the Indian people in colonizing and modernizing the nation, the Indians did not always agree with this. Under British rule, many new roads, railways, and harbors were built, and a telegraph system was created. While the Indians were forced to do much labor in the construction of these things, they were often kept from enjoying and benefiting from the finished products. In fact, the Indian people were treated as second class citizens in their own nation. They were banned from many government positions, and had little rights. They often received lower wages than Europeans working in the same job, and their educations did little for them. The Indians eventually came together to fight against the way that they were treated influenced by the same sense of nationalism that had prompted the British to colonize India more than a century before. After much hard work, India finally gained independence from Great Britain in August 1947; however, although India gained independence all ties with the British nation were not cut. One of the first impacts that colonization had in India was the development of unity. When Britain first acquired India as a colony the country was divided. The British imposed system impacted India by bringing more equality to the country as the caste system which outlined social hierarchy was adapted. It is also significant that Britain accepted all of the religions of India which also allowed unity to prosper. India has also experienced positive impacts from the institution established and then left behind by the colonizers. The institutions established by the British Raj and then inherited by India helped lead to democracy in modern day India. The assistance of these institutions assisted India in becoming the world’s largest democracy today. It is also of note that Britain first introduced India to early capitalism through colonization. Britain transformed India into an agricultural based capitalist economy and established forms of private ownership. These actions led India into creating free trade and competitive business. Today India is the largest provider of services in the world in large part due to colonization; however, it is uncertain if without colonization this would be possible. The Indian population is able to compete in the service sector due to the positive impact of the English language being left behind post British rule. When colonization was occurring in India schools were established which taught and offered instruction in English. It is also of note that the East India Company had a positive impact by establishing some services such as rail throughout the country. The culture of India was also greatly impacted. As the English language spread, indigenous languages were diminished, and the culture, as a whole, began to take on a more European style. Under colonial rule India often depended on Great Britian for such things as technological advances and manufactured goods. Once it became independent, India slowly fell behind the rest of the world, as it had to learn to depend less on other nations and more on itself. India, even today, is considered a third-world country. The nations that were once under colonial rule, such as India, are for the most part the nations that are currently undergoing industrial revolutions. In addition to colonization changing the culture of India, it also affected that of the mother country, Great Britain. Colonization led to an increased diversity of culture in Great Britain. This was because many people from India began to move to Great Britain. Today, Great Britain is still home to many Indian people. The impacts of British colonization were huge and the changes made to India as a nation were great. However, not all of that rich culture was lost. Many of those original religions such as Jainism, Hinduism and Buddhism are still practiced world-wide. Also, even though English is common in education and business, the official language of India today is Hindi. Indians continue to be proud of their culture and traditional Indian buildings, attire, and customs can still be seen throughout the country.

Saturday, October 26, 2019

System Analysis And Design Learning Outcome

System Analysis And Design Learning Outcome Before getting into detail, it is important to understand the concept of System Analysis and Design. It is a study of interactive entities, including computer system analysis and designing the process of defining components, modules and etc. In this assignment I will work on the following three different phases. Each phase will cover the related content in detail. In the first part we will understand the different system life cycles models. In this part, I will discuss different life cycles and will discuss the importance of a following a procedural/staged life cycle in a system investigation. In learning outcome 2, I am going to explain the feasibility report, feasibility study and impact of different feasibility criteria on a system investigation for a particular garment shop. The purpose of feasibility study is to find the solutions or to investigate the tasks requirements, referencing this I will discuss the contents of feasibility report and when to use the feasibility study Third learning outcome is to be able to perform a system investigation in this we will undertake a system investigation to meet a business need. Use appropriate system analysis tools and techniques to carry out a system investigation. Then I will create documentation to support a system investigation and at last I will evaluate how user and system requirements have been addressed. In this assignment, each issue process would be discussed in detail to understand the basic concept. Task-1: (a): Waterfall Model: It is a very useful model which is widely used and its easy to understand as well, its a sequential design process which is flowing steadily downwards like water. It is a step by step process, if we will find any error so we would check from backward instead of directly going to that point of error. The following diagram shows the steps. images Analysis and Gathering Requirement: In this first step of waterfall model, the developer has to conduct a meeting with the costumer to know about his requirement for the software. He discusses the things in details and analyzes the whole project system and then collects requirements based on software development. System Design: In this stage based on the requirements he has collected, he will make a rough model so that the software process becomes easy for implementation. After this stage they would have documentation so that it would be easy for the user to understand. Detailed Design and Coding: In this step the developer will make an actual model of software. The developer sees the problems in details. And if there is any error they would check and correct that which is also called coding. Testing: After implementation the developer sees the software weather it is working properly or not then he will do the testing. Delivery: This is the last phase, in which the developer correct all the errors and he will hand over the software to the client. Merits of Water Fall Model: This model is easy to understand for the user. It is good for small projects where requirements are well understood. Waterfall model is preferred in projects where quality is more important than schedule or cost. Demerits of Water Fall Model: It is costly and time consuming. If we want any change we have to go from below so its difficult. Not suitable for difficult or moderate projects. (b) Some of the models that dont have specific structures are: a) Code and fix: Its very easy and simple kind of model and consists of two steps. a) Write coding to the program b) Fixing the problem in that code This model is very simple as it doesnt need any proper team work, and each one would not be able to convince his point to the others so it saves time by fixing errors in the early ages. Merits of Code and fix: It is actually less time taking. Easy to use. Good for small projects as risk is reduction. Demerits of Code and fix: Its difficult to detect the errors. No time limits. Difficult for the large projects. b) Rapid prototyping: In this model the costumers are not familiar with the software so they dont know what kind of program they actually want. It is one among the easiest and user friendly model. It does not require any team work. It will be easy to understand for non-technical management. a) The developer will do that phase or step first according to the customers wish. b) The developer will do that step first which is easy and the phase which is difficult that part he will do at the end. Merits of Rapid Prototyping: a) Less chances of risk of incorrect user requirement. b) Its a user friendly. c) The developer can save the changes and it is easy to change the changes. Demerits of rapid prototyping: The developer only can make the project for just one company. Very expensive/costly. c) Cots: (Commercial off-The Shelf Software) This is the easiest and cheapest model. In this model the developer takes the model which already is exists and they make changes in that same model only according to the user requirement. Merits of cots: a) It is a well worked model. b) It has to make changes minor. Demerits of cots: a) When we put it on internet, we face problems because the internet asks for the security code. d) Agile (XP) Manifesto: This model is used for companies only. In this model, the developer wants the team for the other skills to complete the project. Communication must be there with the client. It is easy for the developer to make changes in the software from start to the end itself. The developer gives all the updates to the client about the software. Merits of Agile: a) It is easy to make small projects. b) Main aims to final the product. c) The company can test for a good result in every week. Demerits of Agile: a) For this model it is difficult to make large projects. b) We should need to have proper planning and documentations. c) If the program will make in pairs then it will be much costly. 1.2) (a) SDLC (System development life cycle): images The System Development is consists of the following stages: a). Preliminary Investigation: The developer has to spend for some days to understand the problem; he can install the proper system. In this stage, the developer collects all the information available for the system which they need and he is also gathering the whole workers with him to collect the requirements for the system. b). Analysis of the Requirement: The developer understands the information and functions of the software which all he requires for the system. He briefly goes through the requirements and to develop the performance of the system. He also wants to get more information and resources to build the suitable system. c). System Design: The developer makes rough designs on paper or on the computer, to check whether the rough image of system includes all the requirements or not. Once this stage done, then he will choose and finalizes the suitable designs for the development of the system. d). System Coding: The developer translates the code or the program in machine language so that it can be readable easily. The coding step is time spending and it has many errors. e). System Testing: Once the programming stage done, then he tests the systems whether it is working according to the clients needs or not. And he corrects the error if there are any. f). System Implementation: This is the most important phase. In this stage the developer finally gives the system to the client and expecting for a positive response. g). System Maintenance: In this last stage, the developer wants to maintain the system and checks whether its working in the way he made it or not. Then he again maintains the system by removing the defects of flaws if happened. 1.2) (b) Rapid Prototyping: I would prefer rapid prototyping life cycle model to develop software for university works because it is one among the easiest and user friendly model. It does not require any team work and even for the non technical management it will be easy to understand. At each stage of development the progress details has to submit to the management. Here instead of presenting report we submit rough model. It will be more convenient as the management could see the development physically rather than theoretical documents. In universities any time there could be change in system or introduction of new courses. So if the management demands change in the software developing in the middle also it can be done easily. It indicates advantage over other models because complex models like water fall or spiral, if user demands changes it will be great loss because they have to follow step by step procedure and then make changes. It will consume more time and cost high. As this model is completely customer oriented theyll proceed only after the management finds satisfaction. LEARNING OUTCOME # 02 2.1 a) Feasibility Report: It is the end stage of a feasibility study. It verifies the effect of the changes suggested in feasibility study. This report used by management is brief and nontechnical to be understandable. In other words, feasibility report basically the report which gave the advice weather the project is feasible or not. Basically the report contains the summary of findings and recommendations, followed by documentations. The components of the feasibility report are the following: a) Cover letter: presents the report formally and indicates the findings and changes to be made briefly to the management b) Table of contents: an index to understand the location of each and every part of the report. c) Overview: it explains the reason for undertaking a feasibility study and includes the people affected by it and the names of the persons who conducted the study. a) Detailed findings: provides the details regarding the present system and its defects. b) Economic Justification: Here detailed cost comparison and cost estimations are presented. c) Recommendations and conclusions: Here the proposed changes and its effects on present system all are mentioned and as per the study a conclusion is provided for the report. d) Appendixes document to provide all the necessary documentation within the report for reference. b) Feasibility Study: The purpose of feasibility study is to find solutions or to investigate the tasks requirements and to determine whether its worthwhile/feasible to develop the system, collecting data or analyzing that how the project will be operate, relating it consulting the recommended business requirements. In other words, a feasibility study can help us to confirm the outcome of solution we are unaware off. A feasibility study becomes necessary when sometimes the customer is not an ideal customer. Thus it becomes necessary to confirm the assumption of project based on the client ideas. In expense terms its better to have feasibility than making poor decision from improper analysis. We should have basic information about business ideas to make the study best. We should know one or more business models or scenarios that might be used. Sufficient investigation about these models should be conducted to determine viability. A feasibility study cannot be just conducted by making few calls. For this early investigation is done before the study. For this we can seek committee member of business itself or consultant. It starts with the marketing feasibility to confirm if the present idea influences it by checking their current marketing. Its then proceeded by technical and financial feasibility by checking resources, location, current availability, budget of the project etc. since its essential to analyze before starting a project. If the idea goes with market availability, we can proceed with feasibility analysis and use it for feasibility study. 2.2) Impact of Feasibility Criteria on a System Investigation for a Garment Shop: Before starting up a garment shop a feasibility study can help us in increasing chance of our success by analyzing our ideas, shop localities, types of clothes, management staffs etc before starting. Let us discuss about the feasibility criteria on garment shop on social, economic and time scales. Social Factor: The garment shop is a socially responsible business; it has the responsibility to form a good impact on the environment as well. Earning profit is not only the aim of the project but also to provide a healthy environment with proper clothing. Considering in social basis it is necessary that the garment should variety clothes belonging to different cultures, such as western and eastern out fits. While checking viability of the project, it is necessary to include aspects like how it will work in the market, how it will differ from other organizations and how long our idea will be effective. Well profitability cannot be judged during initial months as competitions are there in all fields and shops like garment shop can provide high cash returns if it attracts customers for quite long. Economical Factor: On economic basis it is a preliminary analysis in order to determine our idea is effective. Before doing analysis there are certain criteria to keep in mind such as: a) To evaluate whether we and our management staffs posses the idea and methodologies in common that lead the company to success. b) We need assess the market for the idea we have come up with. c) To estimate basic financial feasibility our project is necessary as it is initial requirement including revenue sales, fixed prices, stock availability, financial access etc. d) To identify drawback of the garment shop as it a business it have strong competitors and analyze how to defend them. e) Finally make a right choice that whether ideas can be still effective and practical. Time Scales: The basic idea implanted of timescale in here is that, the time to market the product, which means the changes which we apply on the present system and as per the cost estimation when the shop would be ready to hit the market? The time as a constraint has always been considered by system analyst and programmers, but here in garment shop the estimated time might differ as per the budget, resources, design, etc. needed for the change. These three phases of feasibility study are observed in a system investigation for a garment shop to improve the accuracy and to make the shop much more efficient. All these stages are covered so that in future the shop would face no consequence in matter of Legal, Economical and Social. Learning Outcome # 03 Opening a new Garment Shop:- a). Introduction: I am going to explain that how a system investigation is held for opening a new garment shop and that what are the actual and basic techniques, needs and requirements at business scale. Regarding this I would make documentation on system investigation and would discuss that how user and systems requirements have been addressed. b). Descriptions of the Business: It is a clothing retail shop (a garment shop). c). Market Consideration: Clothing items and stuff would be targeted especially for teenagers and young adults; this would the starting point so it would b little bit challenging of course, especially keeping up with each of the seasonal trends. They always expect to have material to be available of their choice in color and size. Dissatisfaction of the customer in purchasing can bring lose in my sales. To store clothing in a temperature controlled ware house, cost varies. It can be reduced by proper inventory management. d). Management Team: Since it is a small-business, hiring staff increases costs dramatically, both in salary and taxes. To hire someone, looking for part-time help well in advance of the opening day would be suitable. I would provide them with adequate training on how to run the cash register, store policies and regulations, and information on the merchandise. e). Technical Specifications and Production Plan: I recommend purchasing retail fittings for the shop. These may include special needs such as display cases, racks, counters, cashier, landlines, credit cards, changing rooms for men and women and shopping bags and gift wrapping. As trend in the fashion industry is ever changing, a successful store always focuses on the latest trends and identifies which trends are on the least. A single mistake can bring great lose ending up in excessive goods, undetermined costs and collaborated brands names in the shop. And eventually causes destruction of the business. f). Marketing Plans: By adopting proper marketing strategies, I would create a buzz in the market about my clothing retail store business. Marketing would be done in such a manner that it grabs the attention of my targeted customers. For example, the design of the store and the stores website are made with the target customers in full consideration. Advertising would be done later since it needs to be well made in order to be successful and successful advertising can be costly. g). Financial and Economic Plans: A good location can do wonders to the success of any retail business. Realtors would give estimates on traffic patterns near the store location. Convenience factors, such as handicap access and parking are important for the success of the garment shop. If the store was already a clothing store, careful inquiries about the previous tenants are necessary. h). Evaluation and Conclusion: This system investigation provides a good outline and vision over the starting of the clothing retail store, committing to this plan would give a smooth start over the starting of a small business as such. However later on, modifications are necessary to keep up with new challenges introduced by this ever changing market. I would analyze about the other companies achievements and draw backs that I need to work on and get better. Then I would have extra working hours comparing to other shops and have staffs for working shifts.

Thursday, October 24, 2019

Consequences And Remedies Of Din In The Scarlet Letter :: essays research papers

The Scarlet Letter shows many types of sin. Some is only sin in the Puritan eye, some is internally blamed sin and some is sin only defined back in the time period of pre-Romanticism. Three main characters; Hester Prynne, Reverend Arthur Dimmesdale, and Roger Chillingworth are the 'sinners' of the Nathaniel Hawthorne's The Scarlet Letter. Nathaniel Hawthorn gives each one very different a consequence and remedy for each ones sin. Hester is publicly punished right away, Dimmesdale has to dwell on his sin for years and Chillingworth is punished abruptly when his sin comes to an end. Each punishment is different and holds its own lesson. Hester was forced into the marriage of a man she did not love, and after being separated for a long amount of time, she became attracted to another man. She then falls into a spell of passion with Reverend Dimmesdale. She then becomes pregnant with Dimmesdale's baby, obviously revealing her 'sin'. She is sent to the Scaffold to be mocked by all and is forced to reveal the father of the child. She refuses and then for her sins, received a scarlet letter, "A" which she had to wear upon her chest for the rest of her life in Boston. She wondered the streets and was given bitter looks from all. This was the Puritan way of punishing her for her then criminal action of adultery. The Scarlet Letter on her bosom does the exact opposite of that which it was meant for. Eventually, Hester upsets all the odds against here due to her courage, pride and effort. Hester goes beyond the letter of the law and does everything asked of her in order to prove that she is "able"(158). Hester, even though she was more appreciated by the Puritans, she still was not respected and her life was never the same. This eventually caused so much mental and physical anguish that she eventually questioned why she should live if it weren't for her Pearl. Pearl was a bundle of life sent from god to remind her of her wrong doing each and every moment and as a walking sermon to preach against sin for others. The symbolic Pearl helped Hester overcome her guilt. Hester becomes a highly respected person in a Puritan society by overcoming one of the harshest punishments, the scarlet letter. After Dimmesdale's passing away, she remains in the small Boston town as payment of her sin and more importantly as an example to other future women of the town.

Wednesday, October 23, 2019

Issue in Corporate Failure of Bank Essay

It also raised millions of revenue by accounting techniques to show false profits and hided their losses which occur in trading and bad debt. The biggest bank fraud in history According to Manhattan District Attorney Robert M. Morgenthau, the BCCI scandal that came to light in 1991 was ‘the largest bank fraud in world history. ‘ Perhaps no other criminal enterprise has involved or at least embarrassed so many prominent people, from billionaire Arab sheikhs to Third World dictators to present and former leading figures in the U. S. and British governments. Certainly none could match the international web of financial chicanery, political intrigue, and unsavoury figures with which BCCI was said to be associated. (Source: Encyclopaedia Encarta 2007) BCCI was engaged in four major frauds. One was a cover-up of $633m of losses on treasury trading. The second was the illegal acquisition through nominees of several banks in the US, in which it spend $346m. The third was a complex manipulation of accounts to prop up its largest borrower, the gulf shipping group of Pakistan, to which it lent more than $725m, which was over the limit set by banking regulations. The fourth was fundamental fraud by which BCCI allegedly acquire secret control of 56% of its own shares at a cost of over $500m. BCCI was a serpent eating its own tail. These sums add up to more than $2bn. But this is a minimum: it omits the enormous cost to BCCI of financing its secret losses. The manipulation to cover up the fraud involved another $2bn, bringing the grand total to well over $4bn. BCCI frauds were the main reasons for its corporate failure. The scale the fraud is breathtaking enough. But while most frauds involve the disappearance of real money, BCCI did the exact opposite. It manufactured billions of dollars out of nothing to conceal gaping holes in its balance sheet, like a giant game of ‘Double Your Money’. This involved extraordinary financial gymnastics and illegal loans on a huge scale. When BCCI finally came crashing down, it was not with a thud, but in a shower of paper. (Behind Closed Door: FT Publication) BCCI initiated every single route to excel its growth. In a first place its corporate structure was so complicated which involved uses of shell corporations frequently termed as satellites, bank confidentiality and secrecy. BCCI’s top management including nominees which also includes some famous personalities in politics were involved in corruption and made it a supreme atmosphere for crime. BCCI’s criminalities included, †¢Fraud by BCCI and BCCI customers involving billions of dollars; money laundering in Europe, Africa, Asia, and the Americas; †¢BCCI’s bribery of officials in most of those locations, †¢Support of terrorism, arms trafficking, and the sale of nuclear technologies; †¢Management of prostitution; †¢The commission and facilitation of income tax evasion, smuggling, and illegal immigration; †¢Illicit purchases of banks and real estate. Source: Walker, L. 2001) Abdul Basir, head of BCCI Pakistan operation, says: â€Å"We looked after clients in the most efficient, personalised manner. † The diamond market which is home to Lahore’s famous dancing girls, Prostitutes, who for centuries have provided entertainment for emperors and th eir courtiers – and latterly for politicians, Arab Sheikhs and bankers. BCCI used these girls to treat Arabs rich businessmen and major shareholders. BCCI’s Zafar Iqbal, former chief executive, was in charge of managing prostitutes. Corporate Failure of BCCI There were two main reasons of BCCI’s corporate failure apart from their criminal activities. These were high risk loans and trading. A bank’s treasury plays a key role in managing its financial affairs by trading large amounts of money and currencies. Some if this dealing is done on behalf of clients. But bank treasuries also speculate on whether currencies will rise or fall, using their own money. BCCI was no exception. According to Price Waterhouse, the bank combined these two activities by trading huge amounts of clients’ money – but in its own name, and without their knowledge.

Tuesday, October 22, 2019

Learn About Orb Weaver Spiders, Family Araneidae

Learn About Orb Weaver Spiders, Family Araneidae When you think of a spider, you probably picture a big, round web with its resident spider poised in the center, waiting for a hapless fly to land in the webs sticky strands. With few exceptions, you would be thinking of an orb weaver spider of the family Araneidae. The orb weavers are one of the three largest spider groups. The Family Araneidae The family Araneidae is diverse; orb weavers vary in colors, sizes, and shapes. The webs of orb weavers consist of radial strands, like spokes of a wheel, and concentric circles. Most orb weavers build their webs vertically, attaching them to branches, stems, or manmade structures. Araneidae webs may be quite large, spanning several feet in width. All members of the family Araneidae possess eight similar eyes, arranged in two rows of four eyes each. Despite this, they have rather poor eyesight and rely on vibrations within the web to alert them to meals. Orb weavers have four to six spinnerets, from which they produce strands of silk. Many orb weavers are brightly colored and have hairy or spiny legs. Classification of Orb Weavers Kingdom - AnimaliaPhylum - ArthropodaClass – ArachnidaOrder – AraneaeFamily - Araneidae The Orb Weaver Diet Like all spiders, orb weavers are carnivores. They feed primarily on insects and other small organisms entrapped in their sticky webs. Some larger orb weavers may even consume hummingbirds or frogs they’ve successfully ensnared. The Orb Weaver Life Cycle Male orb weavers occupy most of their time with finding a mate. Most males are much smaller than females, and after mating may become her next meal. The female waits on or near her web, letting the males come to her. She lays eggs in clutches of several hundred, encased in a sac. In areas with cold winters, the female orb weaver will lay a large clutch in the fall and wrap it in thick silk. She will die when the first frost arrives, leaving her babies to hatch in the spring. Orb weavers live one to two years, on average. Special Orb Weaver Adaptations and Defenses The orb weavers web is a masterful creation, designed to ensnare meals efficiently. The spokes of the web are primarily non-sticky silk and serve as walkways for the spider to move about the web. The circular strands do the dirty work. Insects become stuck to these sticky threads on contact. Most orb weavers are nocturnal. During daylight hours, the spider may retreat to a nearby branch or leaf but will spin a trapline from the web. Any slight vibration of the web will travel down the trapline, alerting her to a potential catch. The orb weaver possesses venom, which she uses to immobilize her prey. When threatened by people or most anything larger than herself, an orb weavers first response is to flee. Rarely, if handled, will she bite; when she does, the bite is mild. Orb Weaver Range and Distribution Orb weaver spiders live throughout the world, with the exceptions of the Arctic and Antarctic regions. In North America, there are approximately 180 species of orb weavers. Worldwide, arachnologists describe over 3,500 species in the family Araneidae.

Monday, October 21, 2019

Elections essays

Elections essays There are actually many definitions of civil society. But with all its working definitions, I understand civil society as a certain domain that is independent of the state. According to Sidney Silliman, civil society seeks benefits, political reform and accountability from the state but it does not aim to gain formal power nor is it there to overthrow the government. As the country develops to keep up with the modern world, the political system also becomes more complex and in addition, the people become more difficult to control. This is why there has been an ongoing rise for civil society groups, many of which assume the functions and processes normally associated with governments to try and compensate with the current situation. Citizen activism in the Philippines has been generally caused by our deteriorating socioeconomic conditions, the corruption which goes on in different parts of the political system and the failure of the government to address and mend them. Citizens have then come together and organized different civil society groups in response to these circumstances to either compensate for the states failures or to pressure the state to correct its policies. Election, both local and national, especially in the Philippine context, has been a very controversial issue for the longest time. We have heard of different cases such as vote buying, presence of deceased/flying voters, and taking of ballot boxes among others. This only decreases the credibility of the choices of people we can put into power. The most likely outcome would be the discouragement of the public to vote for the different candidates since the winner would most likely be a product of injustice. The Philippines, being a democratic country, needs citizen organizations to participate in the election process to help educate the masses about the importance of elections and the urgency of voting and also to be there to monitor every aspect of the ...

Sunday, October 20, 2019

About the U.S. Department of Labor

About the U.S. Department of Labor The United States Department of Labor is a cabinet-level department in the executive branch of the U.S. federal government headed by the U.S. Secretary of Labor as appointed by the President of the United States with the consent of the U.S. Senate. The Department of Labor is responsible for workplace safety and health, wage and hour standards, racial diversity, unemployment insurance benefits, re-employment services, and maintenance of key labor-related economic statistics. As a regulatory department, the Department of Labor has the power to create federal regulations deemed necessary to implement and enforce labor-related laws and policies enacted by Congress. Department of Labor Fast Facts The United States Department of Labor is a cabinet-level, regulatory department in the executive branch of the U.S. federal government. The Department of Labor is headed by the U.S. Secretary of Labor as appointed by the President of the United States with the approval of the Senate.The Department of Labor is primarily responsible for the implementation and enforcement of laws and regulations relating to workplace safety and health, wage and hour standards, racial diversity, unemployment benefits, and re-employment services. The purpose of the Department of Labor is to foster, promote, and develop the welfare of the wage earners of the United States, to improve their working conditions, and to advance their opportunities for profitable employment. In carrying out this mission, the Department administers a variety of federal labor laws guaranteeing workers rights to safe and healthful working conditions, a minimum hourly wage and overtime pay, freedom from employment discrimination, unemployment insurance, and workers compensation. The Department also protects workers pension rights; provides for job training programs; helps workers find jobs; works to strengthen free collective bargaining; and keeps track of changes in employment, prices, and other national economic measurements. As the Department seeks to assist all Americans who need and want to work, special efforts are made to meet the unique job market problems of older workers, youths, minority group members, women, the handicapped, and other groups. In July 2013, then Secretary of Labor Tom Perez summarized the purpose of the Department of Labor in stating, â€Å"Boiled down to its essence, the Department of Labor is the department of opportunity.† Brief History of the Department of Labor First established by Congress as the Bureau of Labor under the Department of the Interior in 1884, the Department of Labor became an independent agency in 1888. In 1903, it was reassigned as a bureau of the newly-created cabinet-level Department of Commerce and Labor. Finally, in 1913, President William Howard Taft signed a law establishing the Department of Labor and the Department of Commerce as separate cabinet-level agencies as they remain today. On March 5, 1913, President Woodrow Wilson appointed William B. Wilson as the first Secretary of Labor. In October 1919, the International Labour Organization chose Secretary Wilson to chair its first meeting, even though the United States had not yet become a member nation. On March 4, 1933, President Franklin Roosevelt appointed Frances Perkins to be Secretary of Labor. As the first female cabinet member, Perkins served for 12 years, becoming the longest-serving Secretary of Labor. Following the civil rights movement of the 1960s, the Department of Labor made the government’s first concerted effort to promote racial diversity in the hiring practices of labor unions. In 1969, Secretary of Labor George P. Shultz imposed the Philadelphia Plan requiring Pennsylvania construction unions, which had previously refused to accept black members, to admit a certain number of blacks by an enforced deadline. The move marked the first imposition of racial quotas by the U.S. federal government.

Saturday, October 19, 2019

Does power inevitably corrupt the powerful Essay

Does power inevitably corrupt the powerful - Essay Example From this perspective it could be argued that the simple ability to control others is by its nature a corruption of other peoples will and as such, power is inherently corruptible. However in practice this may not be true. Ultimately it could be argued that power does often corrupt however it does not necessarily have to corrupt. There is little question that in many circumstances in history people have been greatly corrupted by power. According to Haddock (2006) there have been several examples in history of people exerting their power over others. On one side of the spectrum one finds powerful men such as President Lyndon B. Johnson who would often hold meetings whilst he was sitting on the toilet (Demonstrating a kind of contempt over his coworkers) to a megalomaniac such as Joseph Stalin who killed millions. One issue regarding power that has arisen is the idea that people may be hardwired for egocentric power rather than simple institutional power. However it remains the case th at many people do achieve a great deal of power yet do not necessarily have to demonstrate their egocentric power over others. Many people who achieve professional success remain quite humble in their regular life. Bailey & Dash (2006) Highlighted that Billionaire Warren Buffett has lived in the same home in Omaha, Nebraska for over forty years. Moreover the billionaire remains committed to homespun values such as shunning executive payouts, avoiding investing in technology companies and frequently criticizing tax policies that benefit the rich. Having demonstrated that some powerful people do not necessarily exert egocentric power it is the case that according to haddock (2006) there are many people that do flex their ego muscles once they reach a certain level of power. This may be achieved through taking childish liberties, through sexual dominance over weaker people or through making outlandish purchases. Ultimately stride to egocentric power can be manifested through any number of mechanisms. The question of how the exercise of egocentric power affects followers can cover a wide range, owing to the fact that people respond differently to different treatment. On one end of the spectrum people could respond very negatively to egocentric behavior, such as creating deep feelings of insecurity, negative self esteem issues etc. However it could be argued that strong negative reinforcement from a leader could ultimately motivate the underlings to perform better. Anybody who has trained extensively for competitive sports would have likely experienced the effect of a trainer or coach shouting critiques and personal insults designed to motivate the trainee to do almost anything to win approval. However it could also be that people simply do not respond one way or the other and simply not strongly affected by egocentric behavior whatsoever. The issue of whether or not a leader can do anything to help combat the effect of power corrupting it long and storied. Accordi ng to Tertullian as espoused by Wehner (2009) it was a classical Roman tradition that generals would tour the streets after a military success (Much like the veterans parades today). However in the Roman tradition the Imperator (Equivalent to a commander) would be trailed by his servant who would be paid to whisper into the ear of his master â€Å"

Friday, October 18, 2019

Summary Essay Example | Topics and Well Written Essays - 750 words - 42

Summary - Essay Example It’s the next generation of leaders who can be nurtured to be the next several years are the baby boomers of the organization. Strength and development may be looked in various in a group as discussed as follow: Diversity inclusion is one of the ways in which an organization uses to identify strength in an organization. Diversities are the difference that people have, and it may be in terms of having different talents, and culture (Yaeger & Sorensen, 2009). Diversity is among the propelling factors of many things in the organization. It’s the fundamental driver of innovation and creativity, and it is one of the critical components of the organization being successful on an international scale. It enhances innovation by encouraging different views and ideas that foster innovation (Yaeger & Sorensen, 2009). A diverse and inclusive organization workforce is very critical for an organization that is interested in attracting and retaining the top talent the top talent in the organization. Competition has become very stiff currently due to the global economy; therefore, the companies need to have planned to recruit, retain, and develop a diverse workforce (Yaeger & Sorensen, 2009). Another way through which strength and development are realized is by upholding self-confidence through positive attitude and outlook. Confidence helps one in mastering critical skills and situations. Moreover, it helps one to understand himself better thus being able to explore on ones strengths and weaknesses. However, positive outlook entails the way a leader approaches situations realistically but the negative outlook of give in the room for stress and pressure while handling the situation. In my research, I looked at motivation as a way through which the leader can deliver the vision to people in a diverse way. It is important that the leader

Job Design as a Motivational Tool Essay Example | Topics and Well Written Essays - 500 words

Job Design as a Motivational Tool - Essay Example Job enrichment is the practice of enhancing job content by building into it more motivating factors such as responsibility, achievement, recognition, and personal growth (Schermerhorn & Hunt & Osborn). A small business owner depends a lot on the output of their staff since resources are limited. The employees must be empowered by the owner in order to get more out these employees. The job enrichment strategy can be used effectively by proving the employee with higher level of involvement in the everyday activities of the business so that the employee feels that the overall performance of the company is highly dependent of the work the person is performing. Job enlargement increases the variety of tasks by combining two or more jobs into job description that used to be performed by different set of workers. This is a very typical scenario in a small business. Sometimes the accountant is also the marketing executives. The small business owner can use this strategy, but the owner must m ake sure the employee is being compensated adequately in financial terms so that the person does not feel he / she is being exploited. Job rotation is a work layout technique that involves a horizontal approach which involves the periodical shifting or rotating of employees into different job tasks. In small company job rotation occurs intrinsic without the employees noticing the business owner is shifting their job duties. The business need determines the rotation of the employee. Employees get motivated when the manager gives them different tasks to perform because the monotony of repetitive work tasks is eliminated. Employees enjoy working in a place where their time needs are part of the equation. A system that provides the flexibility employees desired is flextime. Flextime is a job design system that allows the employee to select the time he or she will

Routing Protocol Security Dissertation Example | Topics and Well Written Essays - 1000 words

Routing Protocol Security - Dissertation Example The Pervasive nature of the existing information infrastructure when coupled with cyber terrorism related threats makes the security of the network infrastructure an area of interest for network or computer security researchers. While a significant amount of research has been done on the content of security information, and software development, securing of the network infrastructure has increasingly become an issue of concern over the years.   The key critical infrastructure security entails securing of the routing infrastructure. According to Jones & Moigne   (2006) abuse of routine protocol and mechanism is perhaps the simplest available protocol-based attack. Recently, the emergence response team highlighted the imminent need for ensuring that routing infrastructure becomes secured (Yasser, 2007). According to Russell (2003) routers are widely used by intruders as common platforms for activity scanning. They are also reported to be less protected by the security policy (Tanen baum,   2003). For purposes of routing, the infrastructure is often categorized into two domains. These are inter-domain and intra-domain (IETF, John & Moy, 1998). Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers.... These are inter-domain and intra-domain (IETF, John & Moy, 1998). Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers within its domain although this does not necessarily include all the links that connect all the intra-domain routers. Within an automated system, the routing protocols that are most commonly deployed in Autonomous System, are the Open Shortest Path First (OSPF) alongside the Intermediate-System-to-Intermediate System routing protocols. The two protocols are based upon the link-state routing OSPF v2 Routing protocol, which is a link-state routing protocol that was developed purposely for the internet Protocol networks. OSPF is often based upon the relative cost of transferring the information between hops such as the networks and routers. This protocol is, most often than not, categorized into an interior-Gateway protocol with an intension of running it internally in the AS (Cisco Systems Inc, 2009). This protocol is mostly distributed in the AS amongst various routers and it provides an allowance for building similar representation of the network topology belonging to AS. This is often realized through publishing (LSAs) or Link state Advertisement by routers (Cisco Systems Inc, 2009). The routers then construct a tree of shortest-path to various destinations maintaining itself as a root. It then routes the IP packets via the internet basing on the IP addresses. If a topological change

Thursday, October 17, 2019

Cyberbulling Research Paper Example | Topics and Well Written Essays - 1250 words - 1

Cyberbulling - Research Paper Example Unlike traditional bullying, cyberbullying offers anonymity to bullies contributing both to impunity of offenders. Alongside with anonymity, it is the significant distance between bullies and the bullied that lead to crueler actions and more serious consequences. The rise of cyberbullying is caused by technology, especially by the Internet, introduction of which was soon followed by chat rooms. The latter were supplemented by AOL Instant Messenger, a program that allowed users to communicate with each other privately or in public chat rooms for hours. With its development, AOL Instant Messenger allowed creation of group-specific chat rooms. Telecommunication advances also contributed to proliferation of cyberbullying and cell phones in particular. The first generation of these telecommunication devices did not cause the rise of cyberbullyin; the second generation, however, did. The cell phones of the second generation appeared in the 1990s, and then spread widely. In 2010, about seventy-five percent of teenagers in the United States had cell phones, and one third of them sent three thousand messages per month. Today, about seventy-eight percent of teeangers are owners of cell phones (Donegan, 2012). Further development and spread of the Internet as well as the introduction of social networking websites also have fostered cyberbullying. All the social networks allow to create profiles, which include personal information, photos etc., and communicate with other people. Such publication of personal information and distanced communication is dangerous for children because it puts them in the position of either a victim of cyberbullying or an active offender (Donegan, 2012). The relatively short history of cyberbullying is notable for a significant number of suicides committed by victims. One of the most well-known cases is the case of a girl named Maggie Meier. She committed suicide in 2006 after her sister and mother created a fake account

Whatever the artical is talking about something over Article

Whatever the artical is talking about something over - Article Example However, Leovy notes that this approach by the police has not yielded positive results in terms of reduction of homicides among the African American community. The article by Leovy has a relationship to economic theory. I find this relationship in the manner in which the proliferation of homicide, which is a crime under the constitution, is prevalent among the African American communities in America, despite the existence of laws and a criminal justice system to deter and deal with such crimes. The economic theory of crime is rooted in the cost benefit relationship. Under this theory, people commit crime rationally when they perceive that doing so will reap more benefits than risks. I find this element in Leovy’s article. The criminals committing murders in the African American community do not perceive greater risks in doing so. They commit the murders because they know that the risk of being brought to justice is low compared to the perceived benefits. For example, if an individual has some grudge with another because of an illegal drug deal, I think he will have more economic reason to eliminate the enemy by murdering him. This w ill be more beneficial in the sense that the individual will have no competition. Yet, the chances of being arrested, taken to court, and sentenced is slim. Therefore, I believe that Leovy’s argument is based on economic theory. However, I believe that if the criminal justice system, particularly the police, responded effectively to murder crimes by arresting the suspects and taking them through the due course of the law, the crime levels would reduce. After all, no individual would want to spend his or her entire life in prison for murder. This will mean that the risk or cost of committing murder will be higher than the perceived crime. In addressing crime from an economic theory perspective, the criminal justice system ought to

Wednesday, October 16, 2019

Routing Protocol Security Dissertation Example | Topics and Well Written Essays - 1000 words

Routing Protocol Security - Dissertation Example The Pervasive nature of the existing information infrastructure when coupled with cyber terrorism related threats makes the security of the network infrastructure an area of interest for network or computer security researchers. While a significant amount of research has been done on the content of security information, and software development, securing of the network infrastructure has increasingly become an issue of concern over the years.   The key critical infrastructure security entails securing of the routing infrastructure. According to Jones & Moigne   (2006) abuse of routine protocol and mechanism is perhaps the simplest available protocol-based attack. Recently, the emergence response team highlighted the imminent need for ensuring that routing infrastructure becomes secured (Yasser, 2007). According to Russell (2003) routers are widely used by intruders as common platforms for activity scanning. They are also reported to be less protected by the security policy (Tanen baum,   2003). For purposes of routing, the infrastructure is often categorized into two domains. These are inter-domain and intra-domain (IETF, John & Moy, 1998). Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers.... These are inter-domain and intra-domain (IETF, John & Moy, 1998). Generally, the whole routing infrastructure entails a collection of the intra-domain routing regions often connected through the inter-domain functionality (John, 2005). An intra-domain routing environment, which is commonly referred to as the Autonomous System, is often administered using an administrative authority (John, 2005). As often is the case, this authority owns routers within its domain although this does not necessarily include all the links that connect all the intra-domain routers. Within an automated system, the routing protocols that are most commonly deployed in Autonomous System, are the Open Shortest Path First (OSPF) alongside the Intermediate-System-to-Intermediate System routing protocols. The two protocols are based upon the link-state routing OSPF v2 Routing protocol, which is a link-state routing protocol that was developed purposely for the internet Protocol networks. OSPF is often based upon the relative cost of transferring the information between hops such as the networks and routers. This protocol is, most often than not, categorized into an interior-Gateway protocol with an intension of running it internally in the AS (Cisco Systems Inc, 2009). This protocol is mostly distributed in the AS amongst various routers and it provides an allowance for building similar representation of the network topology belonging to AS. This is often realized through publishing (LSAs) or Link state Advertisement by routers (Cisco Systems Inc, 2009). The routers then construct a tree of shortest-path to various destinations maintaining itself as a root. It then routes the IP packets via the internet basing on the IP addresses. If a topological change

Tuesday, October 15, 2019

Whatever the artical is talking about something over Article

Whatever the artical is talking about something over - Article Example However, Leovy notes that this approach by the police has not yielded positive results in terms of reduction of homicides among the African American community. The article by Leovy has a relationship to economic theory. I find this relationship in the manner in which the proliferation of homicide, which is a crime under the constitution, is prevalent among the African American communities in America, despite the existence of laws and a criminal justice system to deter and deal with such crimes. The economic theory of crime is rooted in the cost benefit relationship. Under this theory, people commit crime rationally when they perceive that doing so will reap more benefits than risks. I find this element in Leovy’s article. The criminals committing murders in the African American community do not perceive greater risks in doing so. They commit the murders because they know that the risk of being brought to justice is low compared to the perceived benefits. For example, if an individual has some grudge with another because of an illegal drug deal, I think he will have more economic reason to eliminate the enemy by murdering him. This w ill be more beneficial in the sense that the individual will have no competition. Yet, the chances of being arrested, taken to court, and sentenced is slim. Therefore, I believe that Leovy’s argument is based on economic theory. However, I believe that if the criminal justice system, particularly the police, responded effectively to murder crimes by arresting the suspects and taking them through the due course of the law, the crime levels would reduce. After all, no individual would want to spend his or her entire life in prison for murder. This will mean that the risk or cost of committing murder will be higher than the perceived crime. In addressing crime from an economic theory perspective, the criminal justice system ought to

Romanticism and Transcendentalism Essay Example for Free

Romanticism and Transcendentalism Essay 1. After reviewing the Romanticism resource page, list three characteristics of Romanticism. Also, identify three authors of the Romantic period. * Three characteristics of Romanticism are appreciation of nature, idealism and nationalism. Three authors of the Romantic Era: Edgar Allan Poe, William Cullen Bryant and Lord Byron. 2. Using the Transcendentalism resource page, list three characteristics of Transcendentalism * Three characteristic of Transcendentalism are nature, intuition and the thought of God being a part of nature. 3. How did Transcendentalists feel about nature? What did Transcendentalists feel about the inherent nature of human beings (were humans inherently good or evil)? * Transcendentalists had much respect for nature and believed in the best and goodness of humans. 4. Describe two specific things Thoreau learned about life by translating the lines below in your own words: I went to the woods because I wished to live deliberately, to front only the essential facts of life, and see if I could not learn what it had to teach, and not, when I came to die, discover that I had not lived. I wanted to live deeply and suck out all the marrow of life. (Walden) * Walden wanted to learn more about life in order to understand it completely by living it. I think Walden got to comprehend that some things aren’t necessary in order to live happy and in the right way. He realized that he didn’t really know what life was, until he was to experience things himself. 5. Which two great passive resistance leaders were influenced by the premise of Transcendentalism through the works of Thoreau and Emerson? *

Monday, October 14, 2019

Real Time Video Processing and Object Detection on Android

Real Time Video Processing and Object Detection on Android Real Time Video Processing and Object Detection on Android Smartphone Abstract – As Smartphone is getting more potent, can do more superior stuffs that previous required a computer. For employing the high processing power of Smartphone is mobile computer vision, the ability for a device to capture; process; analyze; understanding of images. For mobile computer vision, Smartphone must be faster and real time. In this study two applications have been developed on Android platform using OpenCV and core library called as CamTest with own implemented algorithms. Efficiency of two Android applications have been compared and found that OpenCV performs faster than CamTest. The results of examining the best object detection algorithm with reverence to efficiency shows that FAST algorithm has the finest blend of speed and object detection performance. Next projected object recognition system using FAST algorithm, which uses SVM, BPNN for training and validation of object in real time. The application detects the object perfectly with recognition time arou nd 2 ms using SVM and 1 ms using BPNN. Keywords—Android; Video Processing; object detection; SVM; FAST corner detector; BPNN I. INTRODUCTION As Smartphone is the perfect combination of personal digital assistant, media player, camera and several other stuffs. It has entirely changed the past about mobile phone. In the early days of Smartphone application development only mobile company was able to develop. After the introduction of Android OS in 2007, Smartphone application development is high in demand. Android was developed by Google with Linux core kernel and GNU software stuffs. [16]. The introduction of Smartphone with camera Real Time video processing becomes very trendy now and having most critical computation tasks. Nearly all Smartphone applications uses a camera to use mobile computer vision technology [2]. Mobile computer vision technologies playing vital role in developing our day to day activities applications [1].This technology having many objectives like object finding, segmenting, location recognition [2]. As Smartphone processors such as MediaTek, ARM, NVIDIA Tegra, and Snapdragon are achieving more computation capability showing a fast growth of mobile computer vision applications, like image editing, augmented reality, object recognition. Long processing time due to the high computational difficulty averts mobile computer vision algorithms from being practically used in mobile phone applications. To overcome this problem, researchers and developers have explored the libraries such as OpenGL and OpenCV [2]. Application developers will face lot problems as he does not having basic idea to process real time video. OpenCV library is the solution which is written in C, C++ language, reduces the complexity for development and research [17] [2]. Real-Time recognition and detection of objects is complex and favorite area for research in the today’s fast growing mobile computer vision technology. Applications like machine vision, visual surveillance; robot navigation are the best examples [4].Object detection and recognition consist of three steps basically, first is the feature extraction, second classification and third is the recognition of object using machine learning and several other technologies [3]. Due to the growth of Scale Invariant Feature Transform (SIFT)[10], the object detection method using matching filter changed to key point matching based object detection method [8] [10].SIFT is more focusing on invariant key point matching. On the similar concept new algorithms were born such as the Speeded-Up Feature Transform (SuRF)[11],Center Surrounded Extrema (CenSurE)[22], Good Features to Track (GFTT)[26], Maximally-Stable Extremal Region Extractor (MSER)[24], and Oriented Binary Robust Independent Elementary Features (ORB)[21], and Features from Accelerated Segment Test (FAST)[12] [4] [6] [8]. In this paper, real time video processing efficiency was find using OpenCV [17] and CamTest with support of core library. Next analyze best object detection algorithm with respect to efficiency in support with OpenCV library. Projected real time object recognition system using FAST algorithm [12], SVM [15] and BPNN [25]. All the stuffs have been conducted on LG Optimus Vu Smartphone with Android 4.0.4 OS. II. ANDROID ARCHITECTURE The Android operating system is like other Smartphone OS, with stacked structure [2][16]. Android operating system stack consist on several layers such Kernel Layer,System Libraries,Dalvik Virtual Machine layer (i.e Android Runtime layer),Application Framework layer and on top Applications layer [2][16].The Kernel gives basic funtionalities like network management memory management, process management, device management. Libraries are used for different oprations like internet security [2][16].Android Runtime consist of Dalvik Virtual Machine which is optimized for Android and provides core libraries.The Application Framework layer gives services to the installed applications in the form of Java Class Library. [2][16].Application developers takes the services of this layer for application development [2][16].Application layer is the top layer in the stack where your application will get install [2][16]. III. OPENCV IN ANDROID The OpenCV library was officially developed and introduced by Intel in 1999 to enforce CPU and GPU exhaustive application [17]. The earlier version of OpenCV was written in C[27]. From the edition 2.0 OpenCV provided both C and C++ interfaces[27]. In the next edition of 2.2 they had introduces Android port with some sample applications of image processing. Currently it has several optimized methods with the version OpenCV 2.4.9[27] [17]. IV. real time video processing methods To find and compare the efficiency of OpenCV and CamTest, each processing method of mobile computer vision was applied and average value was calculated [2]. The input format of video frame should be in standard form such as RGB space[2][27]. The input video frame to RGB conversion is done by following relation [28] R = 1.164(Y 16) + 1.596(V 128) G = 1.164(Y 16) – 0.813(V 128) – 0.391(U 128) B = 1.164(Y 16) + 2.018(U 128) (1) Each pixel of video frame is threshold with a constant number T. If it is greater than T, pixel will be set 1, otherwise 0. g(x,y) = 1, if f(x,y) > T = 0, otherwise (2) Where f(x, y) is the original frame and g(x, y) is the threshold frame. The descriptions of processing methods are shown in Table I. TABLE I. FRAME PRCESSING METHODS AND ITSDESCRIPTION V. METHODOLOGY First designed application layout using JAVA and XML. Then, the processing methods and object detection algorithms are written using JAVA and OpenCV. The tools used for designing and programming are Android SDK [16], OpenCV [17] and JAVA SDK.Application file is then installed to the LG Optimus Vu. If there are no errors, then started to measure the result regarding frame processing rate. After all the data had been collected, and the result is analyzed and compared with the theory. The Application flow is shown in Fig.1.0 and Fig.1.1 A) System Flow of Real Time Video Processing and Object Detection Algorithms No Yes Next Real Time Video Frame z Fig. 1.0: Real time video processing flow B) System Flow of Real Time Object Detection Algorithms No Yes Next Real Time Video Frame Fig. 1.1: Real time object detection algorithms flow. VI. EXPERIMENT RESULTS A) Performance of Real Time Video Processing Methods For the calculation of processing efficiency of OpenCV and CamTest is calculated by following formula. (7) The unit of FPR is frames processed per second i.e. fps. If the value of Frame Processing Rate(FPR) is high for the particular processing metohd then theat method is more efficient. Higher the value of FPR represents the method is more efficient. Table II. Shows real time video processing methods and frames processed per second by CamTest, OpenCV test. TABLE II. REAL TIME VIDEO PROCESSING METHODS AND FPS OF CAMTEST AND OPENCV TEST Frame Processing Ratio is as follows, FPR Ratio = (OpenCV FPR – CamTest FPR)/OpenCV FPR (8) As from Table II, FPR shows significant differences between OpenCV and CamTest.If there is Positive FPR ratio value e.g N, then OpenCV is 1/N times better than CamTest.If there is Negative FPR ratio value e.g –M,then CamTest is 1/M times better than OpenCV.As shown in Table III, Frame Processing Rate Ratio(average) is 0.64,leads to a conclusion that OpenCV (1/0.64 times) 1.56 times faster and better than CamTest. TABLE III. REAL TIME VIDEO PROCESSING METHODS AND FPR RATIO Fig. 2.0: Frame processing rate using CamTest and OpenCV test for eight image processing methods. B) Performance of Real Time Object Detection Algorithms TABLE IV. REAL TIME OBJECT DETECTION ALGORITHMSAND THEIR FPS Fig. 2.1: Frame Processing Rate for object detection algorithm. As shown in Table IV and Fig. 2.1, FAST algorithm is having the highest fps value and 10 times faster as compare to SIFT and SURF.The minimus fps for real time object recognition should be at least 15 fps and FAST achieves the almost same thing. So that FAST is having optimum performance in real time scenario while executing real time object detection operation. VII. APPLICATION As from experimental results shown above in Table IV, we concluded that FAST algorithm [12] is almost several times faster than other algorithms. To recognize the object in real time video FAST algorithm almost achieves 15 fps. As FAST algorithm extracts the corner features accurately and it requires less time for it. So proposed a Real Time Object Recognition system using FAST algorithm is as follows. A) System Flow of Real Time Object Recognition As shown in Fig. 3.0 Input object image is captured by Smartphone camera and it is saved to internal storage. FAST corner detector [12] algorithm is applied on the captured image to extract the features. The extracted features should have the same number and location as the viewpoint and corner changes. So the extracted features should be adjusted to the same number and it called as normalization. After the features are adjusted to the same number, weight is calculated for SVM [15] and BPNN [25] for training the features. After that feature database will get created. After the preparation of database object will get recognized in real time video via SVM [15] and BPNN [25]. As system recognizes the object it shows the feature count and recognition time on the display of Smartphone. No Input Database Yes Fig. 3.0: Real Time Object Recognition Flow A) Results The Real time object recognition system shown above in Fig. 3.0 was developed for LG Optimus Vu and Android platform 4.0.4. The development environment consist of Microsoft Windows 7 with Intel Core i3,2GB RAM,Android SDK,NDK and JAVA SDK.The object used for training was Hand Watch and training time was 102 ms using SVM and 1115 ms using BPNN.The Table V presents the recognition time for object (Hand Watch) using FAST corner detector, SVM and BPNN. TABLE V. RECOGNITION TIME FOR HAND WATCH OBJECT VIII. CONCLUSION As per the above experimentation and results, Most of the real time video processing methods executed using OpenCV having high performance with respect to efficiency than the CamTest. OpenCV gives more attention towards the efficinecy than the CamTest.As per the result obtained from the real time object detction application, FAST algorithm achieves high efficiency, almost 15 fps compared to other algorithms.For the futurescope, like to enhance the FAST algorithm in terms of accuracy.The proposed real time object recognition system gives faster and accurate recognition of object(Hand Watch) on the Smartphone using SVM and BPNN. In future would like to introduce multi object recognition, location tracking on Smartphone platforms,also like to introduce the concept like GPU and parallel computing with OpenCL. REFERENCES [1] Nasser Kehtarnavaz and Mark Gamadia, â€Å"Real-Time Image and Video Processing: From Research to Reality†, Synthesis Lectures On Image, Video and Multimedia Processing Lecture 5, 2006. [2] Khairul Muzzammil bin Saipullah and Ammar Anuar, â€Å"Real-Time Video Processing Using Native Programming on Android Platform†, 8th IEEE International Colloquium on Signal Processing and its Applications, 2012. [3] Kanghun Jeong and Hyeonjoon Moon, â€Å"Object Detection using FAST Corner Detector based on Smartphone Platforms†, First ACIS/JNU International Conference on Computers, Networks, Systems, and Industrial Engineering, 2011. [4] Paul Viola, Michael Jones, â€Å"Robust Real-time Object Detection†, Second International Workshop on Statistical and Computational Theories of Vision, July2001. [5] L. Zhang and D. Yan, â€Å"An Improved Morphological Gradient Edge Detection Algorithm†, IEEE International Symposium on Communications and Information Technology (ISCIT), Vol. 2, pp. 1280-1283, 2005. [6] O. Folorunso, O. R. Vincent and B. M. Dansu, â€Å"Image edge detection, A knowledge management technique for visual scene analysis†, Information Management and Computer Security, Vol. 15, No. 1, pp. 23-32, 2004. [7] D. G. Kamdar and C. H. Vithalani, â€Å"Simulation and Performance Evaluation of Edge Detection Techniques in Differential Time Lapse Video†, IEEE International conference on Computational Intelligence and Computing Research (ICCIC), 2012 [8] David G. Lowe, â€Å"Object Recognition from Local Scale-Invariant Features†, the Proceedings of the Seventh IEEE International Conference on Computer Vision, pp. 1150-1157, 1999. [9] Clemens Arth, Christian Leistner, â€Å"Robust Local Features and their Application in Self Calibration and Object Recognition on Embedded Systems†, Computer Vision and Pattern Recognition, 2007. IEEE Conference, June 2007. [10] D. G. Lowe, â€Å"Distinctive Image Features from Scale-Invariant Key points†, International journal of Computer Vision, 60(2), pp. 91-110, 2004. [11] H. Bay, T. Tuytelaars, L. V. Gool, â€Å"SURF: Speeded Up Robust Features†, Proceedings of the European Conference on Computer Vision, 2006. [12] E. Rosten and T. Drummond, â€Å"Machine learning for high-speed corner detection†, European Conference on Computer Vision, Vol. 1, pp. 430-443, 2006. [13] E. Rosten and T. Drummond, â€Å"Fusing points and lines for high performance tracking†, Tenth IEEE International Conference on Computer Vision (ICCV05), Vol. 2, pp.1508-1515, 2005. [14] Y. Hirose, K. Yamashita and S. Hijiya, â€Å"Back-Propagation Algorithm Which Varies the Number of Hidden Units†, Neural Networks, Vol. 4, pp.61-66, 1991. [15] E. J. A. K. Suykens and J. Vandewalle, â€Å"Least Squares Support Vector Machine Classifiers†, Neural Processing Letters (ICCV05), Vol. 9, pp. 293- 300, 1999. [16]K. Owen, an Executive Summary of Research in Android Integrated Development Environments, April 2011. [17]OpenCV, Open source Computer Vision library. In http://opencv.willowgarage.com/wiki/, 2009. [18] Edward Roston and Tom Drummond, â€Å"Machine Learning for high-speed corner detection†, Department of Engineering, Cambridge University, UK. [19] Y. Khairul Muzzammil bin Saipullah and Ammar Anuar, â€Å"Coparision of Feature Extractors for Real-time Object Detection on Android Smartphone†, Journal of Theoretical and Applied Information Technology, Vol. 47, 2013. [20] Y. Khairul Muzzammil bin Saipullah and Ammar Anuar, â€Å"Analysis of Real-time Object Detection Methods for Android Smartphone†, 3rd International Conference on Engineering and ICT (ICEI2012), 2012. [21] Ethan Rublee Vincent,Gary Bradski, â€Å"ORB: an efficient alternative to SIFT or SURF† [22] Agrawal M,K. Konolige,â€Å"CenSurE: Center Surround Extremas for Realtime Feature Detection and Matching†, Computer Vision – ECCV, Springer Berlin/Heidelberg,vol.5305,pp.102-115,2008 [23] Calonder M,V.Lepetit, â€Å"BRIEF:Binary Robust Independent Elemetary Features†, Computer Vision – ECCV, Springer Berlin/Heidelberg,vol.6314,pp.778-792,2010 [24] Donoser M,Bischof H, â€Å"Efficeint Maximally Stable External Region(MSER) Tracking†, IEEE Computer Society Conference on Computer Vision and Pattern Recognition, pp.533-560,June 2006 [25] Y Hirose,K. Yamashita, â€Å"Back-Propagation Algorithm which varies the Number of Hidden Units†, Neural Networks,vol 4, pp.61-66,1991 [26] Shi J,Tomasi C, â€Å"Good Features To Track In Computer Vision and Pattern Recognition†, CVPR 1994,pages 593-600,1994 [27] Amar Anuar,Khairul Muzzamil Saipullah, â€Å"OpenCV Based Real-Time Video processing Using Native Android Smartphone†, International Journal of Computer Technology and Electronics Engineering(IJCTEE),Vol 1,Issue 3 [28] Khairul Muzzamil Saipullah ,Amar Anuar, â€Å"Measuring Power Consumption For Image Processing On Android Smartphone †, American Journal of Applied Sciences,pages 2052-2057,2012

Sunday, October 13, 2019

Cellular Functions Essay -- Biology Biological Essays

Cellular Pathways Several principles govern metabolic pathways in the cell:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  A. Complex chemical transformations in the cell do not occur in a single reaction, but in a number of small steps that are connected in a pathway.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  B. Each reaction is catalyzed by a specific enzyme.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  C. Metabolic pathways is catalyzed by a specific enzyme.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  D. Many metabolic pathways are compartmentalized, with certain steps occurring inside an organelle.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  E. Metabolic pathways in organisms are regulated by the activities of a few enzyme.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Obtaining Energy and Electrons from Glucose   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  The most common fuel for living cells is the sugar Glucose.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Cells trap energy while metabolizing glucose   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  If glucose is burned in a flame, it readily forms carbon dioxide, water, and a lot of energy----but only if oxygen gas(O2) is present. The balance equation for this combustion reaction is:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  C6 H12 O6 + 6 O2 ---- 6 CO2 + 6 H2O + ENERGY (HEAT AND LIGHT)   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  This same equation applies to the metabolism of glucose in cells, except that metabolism is a multi-step, controlled series of reactions, ending up with almost half of the energy captured in ATP.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Three metabolic processes play roles in the utilization of glucose for energy: GLYCOSIS, CELLULAR RESPIRATION, AND FERMENTATION.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  A. Glycosis is a series of reactions that begins the metabolism of glucose in all cells and produces the three-carbon product pyruvate. A small amount of the energy stored in the glucose is released in usable form.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  B. Cellular Respiration occurs when the environment is aerobic (contains oxygen gas , O2), and essentially converts pyruvate to carbon (CO2). In the process, a great deal of the energy stored in the covalent bonds of pyruvate is released and trapped in ATP.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  C. Fermentation occurs when the environment is anaerobic (lacking in O2). Instead of energy-poor CO2, relatively energy-rich molecules such as lactic acid or ethanol are produced, so the energy extracted from glucose is far than under aerobic conditions.   Ã‚  Ã‚  Ã‚  Ã‚  Redox reactions transfer electrons and energy   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  a.Reaction in which one substance transfers one or more electron... ... in glycolysis. This molecule then passes through the rest of glycolysis and the citric acid cycle,where its energy is extracted in NADH and ATP.   Ã‚  Ã‚  Ã‚  Ã‚  B. Lipids are converted to their substituents, glycerol and fatty acids. Glycerol is converted to dihydroxyacetone phosphate, an intermediatein glycolysis, and fatty acids to acetate and then acetyl CoA in the mitochondria. In both cases, further oxidation to CO2 and release of energy of energy then occur.   Ã‚  Ã‚  Ã‚  Ã‚  C. Proteins are hydrolyzed to their amino acid building blocks. The 20 amino acids feeds into glycosis or the citric acid cycle at different points.   Ã‚  Ã‚  Ã‚  Ã‚  Catabolism and Anabolism are Integrated   Ã‚  Ã‚  Ã‚  Ã‚  Glucose is an excellent source of energy. Polysaccharides and fats have no such catalytic roles. The level of acetylCoA rises as a fatty acids are broken down.   Ã‚  Ã‚  Ã‚  Ã‚  Allostery regulates metabolism   Ã‚  Ã‚  Ã‚  Ã‚  Glycolysis, the citric acid cycle, and the respiratory chain are regulated by allosteric control of the enzymes involved. The main control point in glycolysis is the enzyme PHOFRUCTOKINASE. The main control in the citric acid cycle is the enzyme ISOCITRATE DEHYROGENASE, which converts isocitrate to ketoglutarate..

Saturday, October 12, 2019

African American Bell Curve Essay -- essays research papers

The bell curve of African American rights has risen and fallen throughout America’s history. The period between the Pre-Civil War Era and the Post Civil War Era, were momentous in displaying the status and rights of African-Americans in the time. As the Civil War approached, the status of African-Americans was an increasingly troubling issue among the American Public. During the War, the bell’s curve had reached its height. And during the Post-Civil War, the curve fell slowly and would not rise again for another 100 years. The cause of this racial bell curve is a series of political and social events that directly affected the lives of African Americans.   Ã‚  Ã‚  Ã‚  Ã‚  The Compromise of 1850 marked the initial rise of Black loss of rights in this period. Previously, it was possible for Northerners to ferry slaves to their freedom. However, “Included in the compromise were funds budgeted specifically for catching fugitive slaves and prosecuting anyone lending assistance in the effort'; (Kevin Holloway, The Fugitive Slave Act and the Compromise of 1850). With specific funds that were directed in catching fugitive slaves, white bounty hunters could freely raid the North and search for fugitive slaves. These brutal hunters could now abduct any Black person left alone. Many Blacks that were never in bondage were kidnapped and taken to the South to be slaves. This legislation limited the rights of African Americans and enabled the white populous to oppress African Americans.   Ã‚  Ã‚  Ã‚  Ã‚  The bell curve approached its peak when the novel Uncle Tom’s Cabin was introduced to American Culture. This novel, by Harriet Beecher Stowe, was a revelation to the North because it displayed the cruelty of the southern trade practice. This single piece of literature created uproar throughout the country. The North was outraged by its tale of tragedy, deceit and hate. The South was outraged by its conception of slavery and its bashing of the southern culture. Either way, it marked an event in American History that would change history forever. African American status was now a major issue among Americans. Abraham Lincoln, in remarks to her book, once said to Harriet Beecher Stowe, “So you are the little lady that caused the big war.'; The quote displays the impact in which this one novel broug... ...created by Lincoln to educate the Freemen, and to make sure that the Blacks were not totally stripped of their rights. Along with the Freedmen Bureau, various laws and codes were passed (that had little effect) that also protected the rights of Blacks. After the Civil War, it was a time of Reconstruction. The Black Slave Factor was eliminated; blacks were now ignored and would not be heard for another 100 years. The bell’s curve fell.   Ã‚  Ã‚  Ã‚  Ã‚  Between the Pre-Civil War and Post Civil War periods, the rights and social place of Blacks had risen and fell similarly to that of the curve of a bell. The height of the curve reached its peak during the war, and fell after. The Compromise of 1850, Uncle Toms Cabin, and John Brown’s rebellion all marked the rise in the bell curve. The Civil War, and the Emancipation Proclamtion marked the peak in the bell curve. The 13th and 14th amendments, along with the Jim Crow laws and the establishment of the Freedmen’s Bureau all marked the decline in the Bell curve. 100 years later, the bell’s curve would reach its climax once again during the Civil Rights Movement, and once again, fall.

Friday, October 11, 2019

No Faith, No Love, No Time, and Dr. Lazaro Essay

The short story â€Å"Faith, Love, Time, and Dr. Lazaro† of Brillantes is caught in a juxtaposition and irony by the abstract elements of the title. This paper hopes to make these abstract elements concrete to further understand the story better. Furthermore, this paper will present a comparison and contrast of mainly two characters, Dr. Lazaro and Ben, as counterpoints. Faith often leads to the spiritual belief of the existence of a Higher or Supreme Being, in this case God (for the Catholics), which is contextualized in the story. On another level, faith is also believing in oneself, and this belief initiates the believer to proclaim, and spread such faith to others who are â€Å"non-believers. This is shown during the younger years of Dr. Lazaro, who firmly believed in God, but because of certain critical events in his life, lead to a loss of his faith. Looking at it on another level and from a professional perspective as a physician, Dr. Lazaro is emotionally and objectiv ely detached, as is required by his medical profession. On the other hand, Dr Lazaro’s inherent power to either save and heal or allow the ravages of disease to snuff life are perhaps reasons why he had been hard and emotionally detached. Firstly, after seeing a cancer patient suffering so much that even morphine, a kind of pain reliever, couldn’t even ease the pain of the patient, he was just back in his element, back in his coldness, numbness, and apathy. Lastly, his seeming air of detachment from reality while curing the tetanus of the child, juxtaposes with the impending reality of death and misery in the child’s family. But what could have done this to him? Perhaps, as a doctor, exposed to seeing patients undergo traumatic pain and deep suffering, could have anesthetized Dr Lazaro’s emotions. But this detachment, even aloofness is striking. His fear of having to deal with more pain prevented him to be at his best, especially after having experienced it himself. His son committed suicide by slashing his own wrist, and he could not do anything to save him. He felt that his efforts of saving life was useless. If he was not able to even rescue his own son’s life, what more others? These maybe are the underlying doubt and question that is in Dr. Lazaro’s mind that diminished his self-esteem, that made him emotionally detached. Because as a doctor, there are no room for doubts and fears but  rather only the belief in oneself and in one’s capability to help other people. Dr. Lazaro’s counterpoint, Ben, is different. Even at a young age, he was sure of what he wanted to be, and believes that he can follow a religious vocation. Although he may have a good career and become successful in being a doctor, surgeon or even an engineer, but is this really what he wanted to become? Ben’s faith in God, as well as his faith in himself, galvanized his stand to serve others by becoming a priest. Many clues and textual evidences to Ben’s desired career are shown. First, was his reading of a biography of a man who became a monk. Second, was when he baptized the child. Lastly, was when he was called Father Lazaro by his own father, Dr. Lazaro – after he performed the rite of baptism on the sick child.. The three showed concrete evidences of his wanting to become a priest. Love is passion and desire in disguise. It is when you do something, and you do it with your heart, mind and soul because of your desire, passion and love. This characteristic is shown by Ben in his passion of serving others by his desire to enter the priestly vocation. This desire to become a priest to serve others as minister of God rather than become a lucrative doctor or an eminent engineer became apparent when he subsumed others over and above and over self interest. The setting of the story has also intensified the color of love for Ben. It was set in April, midsummer, the hottest days of the summer season. Like April heat, it made love more raging and fiery. Ben didn’t have to be in Tarlac and stay with his father, he and his mother could have gone up to Baguio for a cool summer. But no, he stayed. He, like the April heat, is raging in love and desire to be of help to other people. The act of considering others before oneself is definitely a selfless act defined by love – made concrete through his desire of becoming of a priest. This is shown when he baptized the dying child, he baptized the child as a symbol of his love, his love of wanting to see him in the kingdom of God. Although Dr. Lazaro at first had the desire to also serve others, the death of his most loved son, killed off any love left for the doctor to serve, albeit mechanically, acting out a physician’s obligation, devoid of compassion and depth of feeling. His son who died was a reflection of himself. It was a treasure of his that he loved so much but which vanished so quickly. With the pains and sufferings, he grew more in hatred and not in love. Nevertheless, his blaming Adam for eating the apple was an unwitting  sign of still believing in the word of God. Nonetheless, to make matter worse, he hated God for taking away his treasure, the son, from him which is why he lost faith in God. It’s as if he had lost the willpower to live again. Time is an abstract element. Time is made manifest in the story not only by the sequence of events portrayed progressively by the plot, but by the seeming imperviousness of Dr. Lazaro to temporal matters that are expected of him – th at of sharing moments as father to his family which he does not; preferring instead to spend time ensconced in his study after work listening to classical music. Time is also the gap not only in the chronological difference between father and son, but more so by the glaring chasm that has separated both from each other – figuratively and emotionally. The detached air by which Dr. Lazaro tries to interact with Ben, and the trepidation faced by Ben to inform his father of his plans to enter the priesthood is indicative of a temporal and filial gap. Thus, no precious moments are shared by father and son except for the talk, which had to happen in the course of the long drive for sick call. Time can also be seen in the recollection of Dr. Lazaro. As he travels back in time and space, it proves only one thing that the past is not yet dead to him. He lives more on the past, than on the present. Regretting and wanting to have been able to show love, faith, he wished that he and his dead son must have spent more time together. He finds himself lost in time, and can’t express love and faith to anybody else. The name Lazaro has likened itself to that of the parable of Lazarus. There was a rich man who can have any human valuables in his life, but never dared to share it with anyone else. Lazarus was a beggar with sores lying at the gate who waited for leftovers and food scraps to fall from the rich man’s table to eat.. When rich man and Lazarus died, the former was tormented in hell and the latter went to Abraham’s side. The rich man asked Abraham to dip the finger of Lazarus in water to cool his tongue. But the chasm and gap had separated heaven and hell, hence, no one from any side could cross over the other side. He then requested to send Lazarus to his father’s house for he had five more brothers and warn them of this place of torment. Abraham replied that they must listen to Moses and the Prophets. But the rich man insisted to send someone from the dead to go his family and they will repent. Abraham replied that if they will not listen to Moses and the Prophets, they will not be convinced even  when someone rises from the dead. Dr. Lazaro was an allusion, pretty much like the rich man in the parable. Firstly, he had no faith in the existence of the Superior being, just like the rich man in the parable who never practiced his faith of sharing his riches with others. The rich man showed his love by way of his request to send back from the dead Lazarus to warn his equally delinquent brothers to mend their ways. Such action is definitely precipitated by concern and love to spare them from the same hellish fate. Dr. Lazaro, much like the rich man, only showed a semblance of love when there was already a big gap. Lastly, both the rich man and Dr Lazaro idled their time – the former surrounded by luxury and comfort oblivious of what goes around him, and the latter who prefers listening to classical music Needless to say, the story’s title should really means â€Å"No Faith, No Love, No time for Dr. Lazaro†.

Thursday, October 10, 2019

Bloodless Surgery

Bloodless Surgery| [Type the document subtitle]| Michael Jones| Abstract There have been many court cases that has made, parent who deny their child blood transfusion, to have to get one. Most time the courts will side with the parents, but if their decision not to is life threatening, the court side with the hospital. Most times it is for religious reasons that parent don’t want their child to have blood transfusion. There are many risks associated with blood transfusion, some parents don’t want to take that risk. Some of the diseases you can get are hepatitis B and hepatitis C. HIV and AIDS can also be contracted through blood transfusion. It can even lead to death of a recipient. Is it ethical for parents to chose for their kids not to have blood transfusion. There is an alternative to blood transfusion. There are many tools and techniques to prevent the need for blood transfusion. Many doctors today are moving more towards bloodless surgery. The growth of bloodless surgery can be largely due to the number of Jehovah’s Witness patients. It is beneficial for both the patient and the hospital. More cost effective and faster recovery. I will talk about how preoperative planning is important for a successful bloodless surgery. I will touch on technique like cell savaging and Normothermia. Also introduce you to a cool tool called Cyber-Knife. I will show how Jehovah’s Witnesses and their Hospital Liaison Committee help my family when it came to bloodless surgery. Blood transfusions have been known to have many dangers. In most cases the cons outweighs the pros, causing many people to consider alternative measures. Today one of the most innovative and effective alternatives is bloodless surgery. In the event that you are faced by such a challenging yet important decision such a surgery, allow me to enlighten you on some of the statistics, procedures and benefits of bloodless surgery to assist you in making an informed decision. As we look at some of the dangers that are associated with blood transfusion alongside modern methods, equipment and benefits of bloodless surgery. We will see how these procedures have progressed over the years, and how the increase in use of bloodless surgery can be attributed to a small group of people known as Jehovah’s Witness. Witnesses as patients will not accept blood transfusion, under any circumstances. This has caused doctors to look for other solutions. The reasons why you should use bloodless surgery are the risk associated with blood transfusion. Transfusions have been used for over fifty years in clinical medicine. Within those fifty years it has become apparent that the risk such as infectious viruses, bacterial infections and even death has been linked to blood transfusion. Infectious viruses include but are limited to blood borne pathogens like hepatitis B and C. The Blood bank reports â€Å"for screened units of blood in 2007, 1 in 137,000 had hepatitis B, fewer than 1 in 1,000,000 for hepatitis C† (Nagarsheth, N. P. , Sasan, F. 2009) Blood transfusions have been associated with higher incidence of bacterial infections. â€Å"Bacterial infection was 2 percent non-transfusion patients, 15 percent for those with up to 2 units of blood red blood cells transfused, 22 percent with three to five units of blood, and 29 percent for patients transfused with 6 or more units of blood. † (Nagarsheth, N. P. , Sasan, F. 009) The more blood received in a transfusion, the more likely you are to get a postoperative infection. Many People today receive multiple transfusions. Transfusion in time develops allergenic immunization. This limits the supply of compatible blood. These numbers may seem like lottery chances, but why take the chance. Ultimately there is death. Death is not a foreign outcome of blood transfusion. Transfusion related acute l ung injury or TRALI, was first reported in the early 90’s. It’s a life threading reaction following a blood transfusion. TRALI is now known to cause many deaths each year. However, experts believe that the number of death is much higher than what is reported in relation to TRALI, because many doctors are unaware of the symptoms. The cause for such a reaction is conclusive. New scientist states â€Å"The blood that causes TRALI appears to come primarily from people who have multiple transfusions. TRALI is the top reason for blood transfusion death in the world. Jehovah’s Witnesses have benefited greatly from their faithful course. Although their reason for not having blood transfusions are not because of the negative reasons that derive from it, but because of their devout belief in God and the Bible. They obey scripture such as Acts 15; 20 which states â€Å"abstain from blood† and Leviticus 7; 26 â€Å"you must not eat any blood. † Jehovah’s Witnesses respect Gods authority and has taken their stand against blood transfusions, regardless of the outcome. If you do not agree with such a point of view, let’s examine the benefits to bloodless surgery and its advancing technology. Over the years the tools and techniques of surgery without blood transfusion has improved greatly. One tool or technique used for surgeries with a lot of blood lost is called cell salvage. This involves recovering the blood lost by a patient, cleaning it, and putting it back into the patient. This is done non-stop during surgery. â€Å"Technological advances have increased system automation†¦ offering higher processing speeds and better end product. †(Lawrence Goodnough. 2003 Vol. 4) Cell salvaging is also cost effective for the hospital and the patient. If there is a surgery with lots of blood lost, it is cheaper to use cell salvage than the units of blood used in a transfusion. Also the recovery time is faster reducing the time and money a patient spends at a hospital. How can blood loss during surgery be lowered in order to lessen the chance for need of a blood transfusion? The key is preoperative planning for a successful bloodless surgery. The first thing to be considered is the amount of red blood cell (RBC) that will lost before a transfusion is needed. This is called the transfusion threshold. Another thing that can be done before surgery is to â€Å"increase the patients RBC mass. † (Watchtower Bible and Track Society, 2004) RBC mass can be increased by injection of iron into the patient. Also erythropoietin(EPO). EPO is a protein hormone produced by the kidneys. â€Å"This synthetic hormone acts like the natural erythropoietin found in our kidneys and stimulates the bone marrow to send new, fresh red cells into the bloodstream. † (Watchtower. org)EPO is normally given 10 to 20 days before surgery. If you increase the RBC mass and lower the transfusion threshold, it allows for an even greater acceptable amount of blood loss. Normothermia is a technique used to keep the patient’s body temperature during surgery. This helps keep the blood flowing properly. Managing the patient body temperature throughout the entire process reduces the surreal shock to the body which reduces the chances of incurring infection. The patient can be warmed by a thermal suit or a machine that infuses warm fluid into the body. The position can also help reduces blood loss during surgery. Local veins pressure changes depending on the field of relativity to the heart. Low pressure goes hand in hand with blood saved. Stanford University Medical Center is a pioneer in the use of bloodless surgery in neurosurgery. â€Å"Without sawing into the skull or so much as cutting the scalp, they are curing patients whose brain and spine tumors were not long ago considered a death sentences. † (Fillon, Mike 1997) These surgeries are possible with the use of Stanford University’s computer mediated stereotaxis radio surgery known as the Cyber-knife. The Cyber-Knife is basically a robotic x-ray gun that shots small amounts of radiation into the tumor in a lot of different directions. This kills off the infected tissue without over exposing other parts of the body to radiation. Cyber-knife is a robotic arm that locks the radiation beam on to the tumor and constantly readjusts its aim in response to the patient’s natural small movement. To help doctors in providing treatment without blood transfusions, Jehovah's Witnesses have developed a helpful liaison service. Presently, more than 1,400 Hospital Liaison Committees worldwide are equipped to provide doctors and researchers with medical literature from a data base of over 3,000 articles related to bloodless medicine and surgery. Not only Jehovah's Witnesses, but all patients in general today, are less likely to be given unnecessary transfusions because of the work of the Jehovah’s Witnesses' Hospital Liaison Committees. In many surgeries which doctors felt that a transfusion was needed. The liaison committee has provided them with medical literature that shows how effective EPO can be. Some did not think that it would work fast enough to make up the amount of blood needed. A number of cases have shown how quickly EPO gets results. In one instance, on the very same day after EPO was administered, the count of new red cells was already four times normal! †(Watchtower. org) My mother and father got to see how effective the liaison committee, and blood surgery first hand. When my brother was 16 years old, we found out that he had cancer in his knee. At that time there was no hospitals with a committee or doctor that would perform bloodless surgery on Staten Island. So the hospital liaison committee located Mount Sinai Hospital that had one doctor that did do bloodless surgery. My brother was put on EPO, and was the only patient that was. For all of the doctors this was their first time use EPO, or even doing bloodless surgery. They were extremely surprised how much better he was doing than the other kid’s that were having blood transfusions. â€Å"It was really sad to see all those little kids and babies having blood pumped in to them. † That is what my mother said when I was asking her about my brother surgery. She said â€Å"Junior what the only kid that was up walking around, all the other kids was in their beds look like they was about to die. † Two things happened to my brother. First he lost all his hire because of chemotherapy. He also lost his leg because that was the only way they could remove all the cancer. It is reasonable to conclude that although blood transfusion has been around for many years. With all its side effects such as, infectious viruses bacterial infections and even death. It is quickly becoming a thing of the past! With strong scriptural basis and its practical benefits, Jehovah’s Witnesses have been the main reason for the growth of bloodless surgery. Today hospitals across the world implanted bloodless programs to help meet the demand for this growing number. Along with that, doctors have developed many techniques and tools in order to be successful in bloodless surgery. Techniques such as cell savaging and blood recovery and tools like the Cyber-knife. This have allowed for more cost effective surgeries, faster recovery, lower chance for infection and viruses. If ever surgery is something you have to undergo. I hope that I have persuaded you to make the right decision. References Cantrell, S. (2010). New normothermia measure heats up patient- temperature management. Healthcare Purchasing News, 34(3), 22-29. Retrieved from EBSCOhost. Fillon, M. (1997). Bloodless surgery. Popular Mechanics, 174(1), 48. Retrieved from EBSCOhost. Goodnough, L. , ; Shander, A. (2003). Evolution in alternatives to blood transfusion. Hematology Journal, 4(2), 87. Retrieved from EBSCOhost. Nagarsheth, N. P. , ; Sasan, F. (2009). Bloodless Surgery in Gynecologic Oncology. Mount Sinai Journal of Medicine, 76(6), 589-597. doi:10. 1002/msj. 20146 Watch Tower Bible and track society of Pennsylvania. (2004) Transfusion Alternatives, Document Series. Watchtower. org