Monday, September 30, 2019

Never Let Me Go Essay

Over the past century, biological engineering has made a huge step forward. They made possible to duplicate human DNA in order to produce a genetic replicate. The novel â€Å"Never Let Me Go† by Kazuo Ishiguro in the fiction story of three friends, as the products of genetic cloning, illustrates the negative view of the human nature. This novel, through the eyes of Kathy H. , shows what it means to be a clone and what problems they experienced growing up. Clones are real humans and should be treated as naturally born humans. The clones were not naturally produced, but they created inside of a government lab. These story shows that they were not considered as a humane, and were treated not as rest of the real people. They were created to increase the health of the greater population. If clones are the real people then it is wrong to donate their vital organs against their will. These clone students who lived in school called Hailsham were cut off from the world. They were told only what they needed to know. Once, their teachers, Miss Lucy, explained to her students that one day they all will donate their organs and then die before they even became middle aged. As naturally born humans, clones should have free will. Further, when they were fifteen years old teenagers they had dreams about future. Some of them wanted to go to America, another wanted to be actors and to be a film stars or to work in supermarkets (81). But Miss Lucy told them â€Å"Your lives are set out for you. You’ll become adults, then before you’re old, before you’re even middle-aged, you’ll start to donate your vital organs. That’s what each of you was created to do. You’re not like the actors you watch on your videos, you’re not even like me. You were brought into this world for a purpose, and your futures, all of them, have been decided (81). † Real humans are brought into this world for a purpose and they have free will, not like these clones and it is not right. As a real human, clones should have a chance to choose as we all do. Later, when they were thirteen years old they were told that they will not going to be able to have babies. â€Å"Then there was the whole business about our not being able to have babies (83). † Conclution : The whole idea of cloning humans is wrong

Sunday, September 29, 2019

ICT Specification for a spreadsheet for the Hairdressing business

The specification points are very useful because they are like a shopping list and help us to make sure we follow a list of requirements that are important in order for us to ensure that the system that we will create will be able to do certain things in the list below. To have a list of specification points so that when it comes to planning and creating the spreadsheet it will be much easier for us. The list below is extra support and a helpful list to guiding me when I create the spreadsheet for the Hairdressing business. 1. Allows creating a booking system for example an easy way to organise all the clients in a useful way for example in alphabetical order. The booking system is able to store and organise the clients details in alphabetical order this can be done by left clicking ascending order. 1. The system should be allowed to create queries such as multiple criteria or simple search criteria search. To help find for only certain clients that I need to find for example if I there is a discount on women’s haircuts so then I will need to identify only females in the system. Queries can be made on the system for example multiple or simple searches. This will help to identify the people that are only needed to find. 1. I will have a validation rule to minimise errors in the database. E.g. presence check or a formula checks in the system. Validation rules have been entered to reduce the amount of errors occurring in the database system In order to keep the records correct and up to date. 1. The system must be able to have a print button and save the work quickly and easily I will have a print or save button. The system I have created will have a print button on it. 1. I should be able to edit for example to delete old clients and store details and keep record of the data and keep record up to data and recent. Records on the table are able to be stored deleted and kept up to date on the recent data. 1. Include a menu page for the system to make it easy to navigate from page to page and this should help get us easily from page top page. My system has a menu page in order to help to ease the use of navigation 1. Include a primary key to give clients in the system a unique number so it will be easy to find him or her with reference to that specific unique number that is supplied to them in the system. The primary key has been put on the booking ID field because this is recognised to be the key field. 1. To have a back up strategy in case the system is hacked into or is lost or damaged so the back up program is a USB or a CD containing the program/system on it and their details. The information has been stored on my USB and that there is anti-virus is stored to prevent any data or memory loss. 1. To have tables and then link the tables together by relationships and this should make it easier for the user to navigate from page to page quickly. Relationships have been attached to both the tables the Customer details table and the Appointment booking table. 1. I will create a form that will make it another way of presenting the information to the user or the receptionist. Forms will be created to help make the reading of the details and the information easier for the person using it. The testing that we had previously carried out helped to improve my system and the evaluation has helped to make sure that all the criteria of the specification points have been met. The specification points have helped me to carry out the task as a whole more efficiently and to make sure it has appeared on my database the way I have wanted it to turn out. Testing made sure that all the specification points were all able to be fulfilled and achieved but at the same time realistic in order for me to carry them out efficiently. The new database system can now carry out some new and amazing functions it can now make the spreadsheet function well. For the database I have made macros/ navigation buttons to help make moving from one table to another much more simpler and easier. The Database will help me to store my information and store the data precisely in ascending order. There have not been many problems that have occurred from the database that I have created because the database that’s been created has hardly and errors and is functioning well it seems to be making good progress. The database has been made with the purpose to help to make sure that the new Hair Salon will be able to function properly. The two tables that I have created will help me to quickly find out which appointments have been appointed for which person and which person and the customer details have been sorted to keep them safe and in a more reliable way. This also makes it easier to view the information for each customer.

Saturday, September 28, 2019

Income Elasticity of Demand

Price elasticity of demand measures the degree of responsiveness of quantity demanded of a good X to a given change to a price of itself, ceteris paribus. Price elasticity of demand is calculated by dividing the proportionate change in quantity demanded by the proportionate change in price. When PED is greater than one (PED > 1) demand is said to be elastic When PED is between zero to one (0 > PED > 1) demand in said to be inelastic When PED is equal to one (PED > 1) demand is said to be unit-elastic (unitary elasticity) A perfectly inelastic demand curve, perpendicular to the X-axis, has zero elasticity. A perfectly elastic demand curve, horizontal to X axis, is infinitely elastic. The price elasticity of demand for a particular demand curve is influenced by the following factors: Availability of substitutes: the greater the number of substitute products, the greater the elasticity. Degree of necessity or luxury: luxury products tend to have greater elasticity than necessities. Some products that initially have a low degree of necessity are habit forming and can become â€Å"necessities† to some consumers. Proportion of income required by the item: products requiring a larger portion of the consumer's income tend to have greater elasticity. †¢ Time period considered: elasticity tends to be greater over the long run because consumers have more time to adjust their behavoir to price changes. Income elasticity of demand measure the degree of responsiveness of quantity demanded of good X to a given change in level of income, ceteris paribus. Income elasticity of demand is calculated by dividing the proportionate change in quantity demanded by the proportionate change in level of income. When YED is less than one (YED ; 1) demand is income inelastic. When YED is greater than one (YED ; 1) demand is income elastic. If YED is negative (YED ; 0) the good is sometimes referred to as an inferior good as opposed to normal goods ( 0 ; YED ; 1) and superior ( luxury ) goods (YED;1). The income elasticity of demand for a particular demand curve is influenced by the following factors: †¢ Need of good ( Basic necessity or luxury good ) †¢ Level of income †¢ Time factor One reason for this is that as a society becomes richer, there are changes in consumer perceptions about different goods and services together with changes in consumer tastes and preferences. What might have been considered a luxury good several years ago might now be regarded as a necessity Income Elasticity of Demand Income Elasticity of Demand is a measure of responsiveness of demand to the changes in income and it involves demand curve shifts. It provides information on the direction of change of demand, given a change in income and the size of the change. Formula for YED: Percentage change in quantity demanded = %?Q Percentage change in income %?Y Normal goods have a positive value of YED, while Inferior goods have a negative value of YED as shown in the graph below: Normal goods: when income increases, demand for normal goods increases as well. An increase in income leads to an increase in consumption, demand shifts to the right Inferior goods: when income increases, demand for this good falls. The demand curve shifts left as income rises. As income rises, the proportion spent on food tends to fall while the proportion spent on services tends to rise. Necessity and Luxury goods Necessity YED 1 If a good has a YED that is greater than one, is has income elastic demand: a percentage increase in income produces a larger percentage increase in quantity demanded. Luxuries are income elastic goods. Like the I Phone or chewing gum. Applications of Income and elasticity of demand YED implication for producers and for the economy Overt time the economy grows and the society’s income increases. Increasing income means a rising demand for goods and services. If the average economic growth is 3% per year, goods and services have income elastic demand (YED >1) thus, the demand of these goods and services grows at a higher rate than 3%. Examples include Restaurants, Movies and Health care, (these goods and services are produced by industries that develop and expand more rapidly than the total income in the economy). Also the demands of other goods such as food, clothing and furniture which are inelastic have a rate of less than 3%, (these goods and services are produced by industries growing more slowly than total income). Higher YED greater future expansion Lower YED Smaller future expansion This means that before you may produce a good think about the YED. The three parts of an Economy Primary sector agriculture, forestry, fishing and extractive industries. Positive YED thus is income inelastic. * Manufacturing sector textile and appliances. Income elastic Negative YED. * Service sector entertainment, insurance and education. Higher YED, greater percentage increase in the demand. Hence as the total output of agricultural shares in the economy drops, the share manufactured output grows. Through continuous growth, t he service sector expands at the expense of both agriculture and manufacturing as shown in the diagram below: Less economically developed countries have a larger primary sector while developed countries are dominated by services. **Remember that if the total output increases over time, a falling share of a certain sector (like the primary sector) does not automatically mean that the output is reducing, probably the sectors output is growing but slower than the total output. An increasing share for a sector means that its output is growing more rapidly than the total output.

Friday, September 27, 2019

Business Management Practice Assignment Example | Topics and Well Written Essays - 2000 words - 3

Business Management Practice - Assignment Example More specifically, the new organisations have forgone the idea of individual accountability, rather have willingness to adopt Total Quality Management principles such as team based working environment, experimentation, continuous learning, benchmarking, reduced cycle time and others etc. The role of communication and information sharing has increased tremendously among business organisations because the managers strongly believe that they are operating in a complex world of globalisation, where they have to grapple with challenges at every stage. This report will critically evaluate the notion that successful business management usually requires the implementation of an appropriate management structure and culture together with effective methods of managing the behaviour and attitude of the business workforce. The researcher will use classical management theories to support above mentioned statement as well as will provide examples of multinational organisations that have implemented classical model of management. It is worth mentioning that classical approach does not focus on creation of flexible organisational culture and employee empowerment; therefore, it has received various criticisms by modern business management experts and theorists who emphasise on adaptability, change management, decentralisation, experimentation and collaborative approach as new workplace principles. In addition, the report will also include a discussion on the approach of public and private sector entities towards the ideas of corporate social responsibility / corporate philanthropy and business ethics. The importance of management and organisational culture could not be denied in contemporary business environment because discrimination free and shared value based culture produces a satisfied pool of employees. It should be mentioned that the more satisfied the employees are, the higher their job commitment, morale, confidence and trust over their

Thursday, September 26, 2019

International business Essay Example | Topics and Well Written Essays - 2750 words

International business - Essay Example In order to solve any kind of issues related to customer queries or quality of services and products offered, the company has hired well trained and skilled staff. This study proposes to evaluate Starbucks from an international strategic viewpoint. It will also shed light on the coffee industry of USA. The primary rationale behind the industry analysis is to present strategies followed by the company and the advantages and disadvantages. The organisational structure is explained in detail. Apart from the external business environment, the report will also analyse using PESTEL analysis. The next part will be about identifying the strengths and weaknesses of the company. The main findings include business strategies for future. Methodology Organisational Structure In order to combine functional and divisional structures, Starbucks have used a matrix configuration. As a result of complex matrix structure, the company is known as a mechanistic firm. There is high level of horizontal and vertical complexity, high centralisation, high formalisation, high standardization and narrow control spans. The senior management has planned to create a more streamlined and efficient structure where free flow of information will be present. This will help in exchange of important information and feedback from consumers and front level executives to the organisational level (Anthony, Gales and Hodge, 2003). In a complex structure, this is often difficult to achieve. The matrix structure is used by Starbucks in order to avoid breakdowns in communications especially in case of vertical integration. As we go down in the organisation, authority level increases. Starbucks have divided its workforce into cross-functional teams, allowing workers to report to different supervisors. This organisational structure has helped the employees to have efficient and successful communication downward, upward and lateral with the workers. Matrix structures have also helped Starbucks in creating succ essful external and internal communication. To increase internal collaboration, the management encourages discussions and exchange of ideas in a timely manner. External communication is achieved by promoting ownership and loyalty with customers and stakeholders. Regular feedback is solicited in order to generate updated customer preferences. Strategic Management of the Company In the year 1971, Starbucks was launched (Starbucks, 2013a). The firm started as a small retailer of whole beans and ground coffee, tea and spices in a single store in Seattle. Today, the company has millions of customers. The products of Starbucks include more than 30 blends of premium coffee, merchandises, handcrafted beverages, consumer products and fresh food products. Starbucks coffee and Seattle’s Best Coffee are the best selling brands of Starbucks. The corporate value of the company lies in building an organisation with a soul. The company owns more than 20,000 stores located in 50 different cou ntries (Starbucks, 2013b). These stores are categorised into company owned and licensed stores catering people all over the world. Starbucks is not in favour of franchising because of culture and quality control issues. The business of Starbucks runs on ethics and doing the right

Nursing Management Leadership in Health Care Institutions Research Paper

Nursing Management Leadership in Health Care Institutions - Research Paper Example It is all about striving to balance between doing the right thing at the expected time in the correct manner and doing such things right. The rapid and dramatic transformations in healthcare systems make these skills even more vital than ever. Both managers and leaders should envision the future to provide a leading role towards an efficient and productive unit with satisfying personnel. As leaders, it is never possible to stop seeking professional growth and opportunities that can help guarantee a difference in our own profession. Certainly, there exist many ways that can help in accomplishing this, including reading professional journals, being politically active and aware, as well as attending continuing education relevant to the nursing practice (Sehested, 2002). As good leaders, nurses are expected to take advantage of such opportunities for their advantage (Sehested, 2002). As a means of seeking professional growth, an article that entails balancing leadership roles and practis ing nursing roles has been chosen to guide the process. This paper, therefore, intends to critically evaluate a research article titled, ‘leading nurses in dire straits: head nurses' navigation between nursing and leadership roles.’ by Sorensen e., Delmar c. & Pedersen b.d. (2011). This article was published in the Nursing Management Journal. This paper intends to critique a study reports and the findings from a study focusing on the nursing and leadership roles of head nurses’ in the hospitals. The reason as to why this article is chosen is because of the conflict head nurses face as they perform their nursing and leadership roles in the healthcare settings. The debate is centred on how management reforms challenge professional leadership roles in public organizations (Sehested, 2002). This study is vital in the sense that it helps in improving nursing practices to patient care and exploring how successful nursing leaders tend to navigate between the two roles. In this case, the two roles are; nursing and leadership roles. The findings of the study are properly done to comprehensively validate the nursing practice. Therefore, there is a need to critically put forth the worth of this study and the evidence in it, thus appraising the study. The title of study define clearly what the study is all about, that is, to investigate the negotiation between nursing and their leadership roles in hospital practice. The study population, a brief description of the methodology and the key outcomes being investigated are all included in the title of the study. The study populations in the study are the nurses in leadership positions working at a first line level and at a departmental level whose age range is 39-57 years with an experience of 3-4 years in either of the leadership roles.?The key outcome of the study was Closeness distance and the recognition game. The methodology applied in this study was participant observation and ethnographic interviewi ng techniques where nurses in leadership positions acted as informants. They were selected in a stratified fashion to ensure diverse, rich and nuanced data the informants were gathered. Here, the inclusion-exclusion criteria were not satisfactory, for instance, the leadership experience number of years was limited to a maximum of only 4 years. This should have been extended to about 8 years to get the views of the most experienced nurses in leadership roles hence a more valid, representative and reliable study results.

Wednesday, September 25, 2019

Small business financials Assignment Example | Topics and Well Written Essays - 1750 words

Small business financials - Assignment Example Increase in population has various positive effects on the businesses as well. This rise directly affects demand and supply of various goods and services including food and clothing as they are very basic in nature and required by everyone. In this regard, it is important to mention that the purchasing power of ordinary Qataris is considerably strong and sound as well; the recent estimates reflect that per capita income of ordinary Qatari is $88,000 in 2010 and this country has been identified as among the world’s richest countries (Greenfield, 2012; World Bank, 2015). Based on these fundamental economic indicators, it can be easily deduced that Qatar is ideal country for the purpose of investment as the country has all those basic economic and infrastructural factors that are highly needed for every investor. More clearly, the country has ideal business climate where stable currency exchange rate, low or no crime rate and investment friendly policies of the government, above all the absence of terror threats are some of those indicators that catch the eye of every investors. Keeping these healthy and attractive factors in mind, it is highly reasonable to open small scale retail shop in the country with the following basic accounting and budgetary allocations and estimations. Unique will be name given to this new retail store as this retail store will be located at the centre of Doha city. This location has been chosen for various reasons. First, this city is commercial hub of the country where trade and other commercial activities are carried out; additionally, Doha is highly populated area in the entire country. At the same time, the city is undergoing a faster pace of urbanization which further attracts investment and migrants from under developed areas of the country (Kovessy, 2014). And the government’s

Tuesday, September 24, 2019

Porter's Five Forces Strategy Analysis as it applies to the Auto Essay

Porter's Five Forces Strategy Analysis as it applies to the Auto Industry - Essay Example For international organizations, decisions have to be made on whether the strategies would be the same for every country it competes with as well as giving managers the mandate to choose their own strategies. Functional strategies for particular operations derived from business level strategies include marketing, accounting and finance. An automotive industry manufactures, designs, develops, markets and sell motor vehicles and is considered the world’s most significant economic sector in terms of revenue generation. The American automobile industry is the only industry that has never changed for years since its inception. Businesses begin, grow, develop, and end just like human beings. Some do not complete their life cycle as a result of their interruptions. They undergo a myriad of challenges that make them eventually die. Contrary to a human being, a business can change its methods of operation to more efficient mechanisms for improvement. From this view, the American automo bile industry has raised the question of whether it will be able to adapt or it will end from its stagnating condition. Before establishing an organization’s business-level strategy, it must discern the determining factors of profit maximization of an industry. The tool of analyzing these factors is what is known as Porter’s Five Forces Model. ... Introduction to the Auto Industry As defined earlier, an automotive industry manufactures, markets, designs, develops and sells motor vehicles. It does not include industries attached to automobiles after delivery to the client such as fuel stations, electronics and repair shops. An automobile industry involves producing and selling individual powered vehicles such as trucks, passenger cars, farm equipment and other commercial vehicles. The auto industry has facilitated the growth of infrastructure for long distance commuters, entertainment and shopping, growth of market centers, increased urbanization and industrialization (Burgess, 1980). The industry is also one of the key employers thus contributing to economic growth. Until 2005, the US dominated the world in production of automobile. Majority of the auto dealers in the US were blacksmith and carriage shops. Progress was soon developed when the car replaced the horse and buggy. Blacksmith shops were everywhere in the market cent ers and played the role of serving customers at a great deal. The inventors of automobile industries were engineers like Henry Leland and Henry Ford. Blacksmith shops were service oriented whereas carriage shops required time to time management together with the horses that drew them. Since their goal was to provide exceptional satisfaction to the customers needs, they slowly became auto dealers of servicing their customer’s vehicles. They were able to compete with service stations such as Jiffy Lube, Midas, and Meineke among others. From that time the number of dealers began to increase giving rise to many franchised automobile dealers. This trend went down from 1950 until 2007 (Tuman 19). 3.1 Industry definition The first fifty years saw the industry

Monday, September 23, 2019

Arminian and Calvinist Views Research Paper Example | Topics and Well Written Essays - 1750 words

Arminian and Calvinist Views - Research Paper Example Christianity denotes a religious grouping that believes in God as a Supreme Being and Jesus Christ as his begotten son through which mankind receive salvation. â€Å"For God so loved the world that he gave his one and the only son that whoever believes in him shall not perish but have an everlasting life†1 Christianity as a religion has two major groupings, Catholics and protestants, which are further divided into numerous groups with different doctrines. The paper will explore Calvinism and Arminianism as two different views in the Christian fraternity and evaluate their merits. Nosorto states that, â€Å"There are several notable differences between the two theologies of Calvinism and Arminianism.2 Let us examine these two views to bring out the differences and to understand them. The term Calvinism was coined by John Calvin who was a close ally of Martin Luther for a long time before they parted ways due to divergent religious ideologies.3 Calvinism is a religious viewpoin t that holds five major pillars and each of the pillars have biblical backings. One of the pillars as documented by Nosorto is total depravity that states that, a man 1.International Bible Society. Holy Bible; New International Version. USA:International Bible Society Press,1973. 106. 2. Nosotro Rit. Calvinism and Armianism.Hyperhistory.net. 2010. http://www.hyperhistory.net/apwh/essays/comp/cw20calvinismarminianism.htm (Accessed April, 24 2012) 3.Norsoto does not have a freewill but only in accordance to his nature.†4 This is a proposition that man’s heart is naturally wicked and therefore cannot choose God. It is a belief that unless man is prompted by the Holy Spirit, he will remain wicked. This believes are supported by Jeremiah 17:9 that state that, the heart is deceitful above all things and beyond cure. 5. This brings out the fact that man’s heart is wicked from creation and will remain so unless God intervenes. You cannot choose God because you are unclea n but God can choose you and cleanse you; this is the essence of total depravity and lack of freewill. On the other hand, Arminianism advocates for freewill. It argues that even though man is sinful in nature, they have the ability to choose to do-good or do bad. God does not impose decisions on human beings but gives them an opportunity to make their own decisions. These decisions do not depend on nature. This position is supported by John 7:17, that states that if any one chooses to do well then they will know that my teachings are from God.6 According to Coulter, other areas of divergent opinions between the Calvinist and Arminianist perspectives are on the election to salvation, where it is conditional in Arminianism and unconditional in Calvinist, limited atonement for Calvinism but universal atonement for Arminianism and irresistible grace for Calvinism and grace that can be resisted in Armianism.7 4. Norsoto 5. .International Bible Society. Holy Bible; New International Versi on,817 6. International Bible Society. Holy Bible; New International Version,112 7. Coulter B. Paul. Devine Sovereignity and Human Responsibility.Paulcoulter.net. 2011 Web 23 April 2012 http://www.paulcoulter.net (Accessed April, 23 2012) How do these views relate with God’s providence? What is providence? The word providence is derived from the Latin noun providentia, ‘foresight, forethought,’ and the related verb providere, ‘to provide for, take precautions for or against something.8

Sunday, September 22, 2019

Vehicular Ad Hoc Networks Essay Example for Free

Vehicular Ad Hoc Networks Essay ABSTRACT. Vehicular Ad Hoc Networks is a kind of special wireless ad hoc network, which has the characteristics of high node mobility and fast topology changes. The Vehicular Networks can provide wide variety of services, ranges from safety and crash avoidance to internet access and multimedia applications. Attacking and misusing such network could cause destructive consequences. It is therefore necessary to integrate security requirements into the design of VANETs and defend VANET systems against misbehaviour, in order to ensure correct and smooth operations of the network. In this paper, I propose a security system for VANETs to achieve privacy desired by vehicles and traceability required by law enforcement authorities, in addition to satisfying fundamental security requirements including authentication, nonrepudiation, message integrity, and confidentiality. Moreover, we propose a privacy-preserving defense technique for network authorities to handle misbehaviour in VANET access, considering the challenge that privacy provides avenue for misbehaviour. The proposed system employs an identitybased cryptosystem where certificates are not needed for authentication. I show the fulfilment and feasibility of our system with respect to the security goals and efficiency. 1 INTRODUCTION VEHICULAR ad hoc networks (VANETs) are receiving increasing attentions from academic and deployment efforts from industry, due to the various applications and potential tremendous benefits they offer for future VANET users. Safety information exchange enables life-critical applications, such as the alerting functionality during intersection traversing and lane merging, and thus, plays a key role in VANET applications. Valueadded services can enhance drivers’ traveling experience by providing convenient Internet access, navigation, toll payment services, etc. Other applications are also possible including different warning messages for congestion avoidance, detour notification, road conditions (e.g., slippery), etc., and alarm signals disseminated by emergency vehicles (e.g., ambulance) for road clearance. The attractive features of VANETs inevitably incur higher risks  if such networks do not take security into account prior to deployment. For instance, if the safety messages are modified, discarded, or delayed either intentionally or due to hardware malfunctioning, serious consequences such as injuries and even deaths may occur. This necessitates and urges the development of a functional, reliable, and efficient  security architecture before all other implementation aspects of VANETs.Fundamentally,VANET security design should guarantee authentication, nonrepudiation, integrity, and in some specific application scenarios, confidentiality, to protect the network against attackers. Besides the fundamental security requirements, sensitive information such as identity and location privacy should be reserved from the vehicle owner’s perspective, against unlawful tracing and user profiling, since otherwise it is difficult to attract vehicles to join the network. On the contrary, traceability is required where the identity information need be revealed by law enforcement authorities for liability issues, once accidents or crimes occur. In addition, privilege revocation is required by network authorities (e.g., network administrator) once misbehaviour is detected during network access. It is less difficult to prevent misbehavior of unauthorized users (i.e., outsiders)since legitimate users and roadside units (RSUs) can simply disregard communication requests from outsiders by means of authentication. Nevertheless, misbehaviour of legitimate users of VANETs (i.e., insiders) is more difficult and complex to prevent, the reason being that insiders possess credentials issued by the authority to perform authentication with peer vehicles or RSUs who canbe   easily tricked into trusting the insiders. Consequently, the insiders misbehaviour will have much larger impact on the network and will be the focus of this paper. I proposed system in this paper and many recent proposals on VANET security provide the option of using anonymous credentials in authentication, rendering it even more complex to handle misbehaviour in VANETs, since the user identity is hidden and cannot be linked arbitrarily which curbs the punishment of misbehaving users. Contributions. Given the conflicting goals of privacy and traceability, and the challenges in designing a privacy-preserving defense scheme for VANETs,  i motivated to propose a security system that can effectively and efficiently solve the conflic ts and challenges. Specifically, my main contributions in this paper include: 1. I propose a pseudonym-based scheme to assure vehicle user privacy and traceability. 2. I design a threshold signature-based scheme to achieve nonframeability in tracing law violators. In this scheme, an innocent vehicle cannot be framed by a corrupted law enforcement authority due to rolesplitting mechanism. 3. A novel privacy-preserving defense scheme is proposed leveraging threshold authentication. It guarantees that any additional authentication beyond the threshold will result in the revocation of the misbehaving users. This defense scheme differs from others mainly in that it yields flexibility in the revocation (i.e., not all types of misbehaviour should be punished). Moreover, the dynamic accumulators in the threshold authentication technique facilitates each user to place further restrictions (besides the threshold) on other communicating users, which is an attractive feature to service providers. 4. My design incorporates mechanisms that guarantee authentication, nonrepudiation, message integrity, and confidentiality. 2 RELATED WORK There is a large body of research work related to the security and privacy in VANETs. The most related works are on the design of privacypreserving schemes. Raya and Hubaux [1]investigated the privacy issue by proposing a pseudonym-based approach using anonymous public keys and the public key infrastructure (PKI), where the public key certificate is needed, giving rise to extra communication and storage overhead. The  authors also proposed three credential revocation protocols tailored for VANETs, namely RTPD,RC2RL, and DRP [5], considering that the certificate revocation list (CRL) needs to be distributed across the entire network in a timely manner. All the three protocols seem to work well under conventional public key infrastructure (PKI). However, the authors also proposed to use frequently updated anonymous public keys to fulfillusers requirement on identity and location privacy. If this privacy preserving technique is used in conjunction with RC2RL and DRP, th e CRL produced by the trusted authority will become huge in size, rendering the revocation protocols highly inefficient. A lightweight symmetric-key-based security scheme for balancing  auditability and privacy in VANETs is proposed in [2]. It bears the drawback that peer vehicles authenticate each other via a base station, which is unsuitable for inter vehicle communications. Gamage et al. [6] adopted an identity-based (IDbased) ring signature scheme to achieve signer ambiguity and hence fulfill the privacy requirement in VANET applications. The disadvantage of the ring signature scheme in the context of VANET applications, is the unconditional privacy, resulting in the traceability requirement unattainable. Group signature-based schemes are proposed in [4] where signer privacy is conditional on the group manager. As a result, all these schemes have the problem of identity escrow, as a group manager who possesses the group master key can arbitrarily reveal the identity of any group member. In addition, due to the limitation of group formation in VANETs (e.g., too few cars in the vicinity to establis h the group), the group-based schemes [4]may not be applied appropriately. The election of group leader will sometimes encounter difficulties since a trusted entity cannot be found amongst peer vehicles. There are also a number of defense techniques against misbehaviour in VANET literature besides those in [1]. An indirect approach via the aid of infrastructure is used in [4].The TA distributes the CRL to the infrastructure points which then take over the TA’s responsibility to execute the revocation protocol. The advantage of this approach is that vehicles never need to download the entire RL. Unfortunately, the conditional anonymity claimed in [4]. only applies to amongst peer vehicles, under the assumption that the infrastructure points are trusted. The infrastructure points can reveal the identity of any vehicle at any time even if the vehicle is honest. Recently, Tsang et al. [7]proposed a blacklistable anonymous credential system for blocking misbehavior without the trusted third party (TTP).The blacklisting technique can be applied to VANETs as: if the vehicle fails to prove that it is not on the blacklist of the current   authenticator, the authenticator will ignore the messages or requests sent by this vehicle. Although not proposed specifically for VANETs, the proposal in [7] has a similar claim as the capability of a TTP (network authority in this paper) to recover a user’s identity in any case is too strong a punishment and highly undesirable in some scenarios. The downside of this  technique is the lack of options to trace misbehaving users, since any user in the system(misbehaving or not)will by no means be identified by any entity including the authorities. I proposed a privacy-preserving defense scheme against misbehavior in [8] leveraging threshold authentication technique. This scheme and the scheme in [3] both preserve user privacy, and simultaneously provide trace ability (i.e., tracing law violators by enforcement authorities in [3] and tracing misbehaving users by network authorities in [8]). The major differences between these schemes are the different technical realizations of the privacy and traceability schemes, due to the different application 3 SYSTEM MODEL We describe the functionalities of our security system and define security requirements in this section. 3.1 Overview Major entities in a VANET environment are depicted in A VANET system diagram. As mentioned before, traceability is needed by law enforcement authorities (LEAs) who require the identity of a violating vehicle to be disclosed for investigating the cause of accidents or crimes. Due to the seriousness of liability issues, if a single authority (e.g., the police) is fully capable of revealing the vehicle identity, this privilege may be abused. It is desirable if two or more authorities (e.g., the police, judge, special agents, and other possible law enforcement authorities) are granted distributed control over the identity retrieval process. One benefit in doing so is that corrupted authorities (the number being less than the threshold) cannot arbitrarily trace vehicle users to compromise their privacy. Another benefit is that malicious authorities cannot falsely accuse (or frame) honest users. Such role-splitting is not required for network authorities since the threshold authentication technique in our defense scheme prevents a network authority from falsely accu sing honest users. The proposed security system primarily consists of techniques addressing the privacy, traceability, nonframeability, and revocation (only by network authorities) issues. The  logic diagram of the entities interactions is depicted in logic diagram, where the arrowed lines indicate the direction of packet flow or physical communications, the bracketed numbers near each line index the major events or procedures between the connected entities. The vehicle users are split into access group owners and members, whereas the RSUs can only be access  group owners. The entities and events/procedures are described in what follows. 3.2 Entities and Procedures The entities in this system are the regional transportation authorities (RTAs), law enforcement authorities (LEAs),network authorities, roadside infrastructure including border RSUs for pseudonym management and regular RSUs (simply RSUs) for Internet access, and vehicle users. Considering practical scenarios, the RSUs in this system are mainly responsible for providing infrastructure access and network services. The RSUs are assumed to be operated by third-party service providers (SPs) who have business contracts with the RTA to build access infrastructure in the RTA’s region. The RSUs are thus not owned by the RTA and have no preestablished trust relationship with the RTA. On the other hand, borders RSUs are owned and operated by the RTA, and can be considered as the agents who are delegated with the RTA’s authority. These entities are involved in the following procedure:   may be caused by malfunctioning hardware and thus is incidental. These types of misbehavior share a common feature, i.e., their occurrence or frequency is low, specifically, lower than a predetermined threshold. Threshold authentication-based defense further consists of six sub-procedures: Membership registration: RSUs and vehicle users register with the RTA to use VANETs. Upon successful registration, a member public/private key pair (mpk;msk) is issued to each RSU and vehicles. The RTA associates the member’s credential with the issued public key and includes this pair of information into a credential list IDlist. Access group setup: RSUs and vehicles setup their own access groups, the member of which is granted privilege to communicate with the access group owner. The group owner adds members to the group and updates related public information. Each added member obtains an access key mak for the group. Access group revoking: The access group owner revokes the granted privilege when deciding to stop communications with a member, due to some decision criteria for misbehaviour. The access group owner removes the member from the access group and updates related public information. Threshold authentication: This procedure is executed between an RSU and a vehicle, or between peer vehicles. We call the authenticator in this procedure Alice who announces the threshold k possibly different for each user being authenticated. The  authentication succeeds if and only if the following conditions are met simultaneously: the user Bob authenticating with Alice is a registered member of the VANET system, Bob is a legitimate member of Alice’s access group (if Alice is an access group owner) whose member privilege has not been revoked, and the authentication threshold has not been exceeded. Alice records the authentication transcripts in AUTHlog: Tracing: This procedure is used by Alice to trace a misbehaving member Mn who attempts to authenticate more than k times. Alice relies on the AUTHlog and public information, and obtains Mn’s credential n as the procedure output which is reported to the RTA.Revocation/recovery: Upon receiving the complaints from other entities in the system as the output of Tracing, the RTA decides if the misbehaving member’s credential needs to be revoked. The RTA then performs the identity recovery by looking up the same pseudonym lookup table PLT (cf.System setup above) which also records the correspondence between the credential n and identity IDn. Note that for the ease of presentation, we assume the RTAs to act as network authorities for the defense scheme in this paper. In reality, when the roles of RTA and network authority System setup: This procedure is executed by the RTA for initial VANET system setup including domain parameter publication, public/private key assignment for entities in the system to perform desired tasks, and database creation for storing necessary records (i.e., the pseudonym lookup table PLT). Pseudonym generation and authentication for privacy: RTA and border RSUs execute this procedure to assign pseudonym/private key pairs to both vehicles traveling in their home domain and vehicles from other RTAs’ domains, so that these vehicles are able to authenticate with RSUs and other vehicles to obtain services and useful messages. Threshold signature for nonframeability: This procedure is invoked by LEAs to share the secret information for recovering a guilty vehicle’s identity. Meanwhile, it prevents corrupted authorities from gathering full power to accuse an innocent vehicle. The functional component of this procedure is the threshold signature. Threshold-authentication-based defense: Designed for the network authorities, this procedure is used to revoke a misbehaving vehicle’s credential, refraining the vehicle from further disrupting system operations. As the core of this procedure, the threshold authentication  technique provides a mechanism to allow certain types of misbehavior that should not result in revocation. For instance, the misbehavior   are separate, the network authority can simply take charge as the RTA in the above sub procedures. Nonetheless, in the execution of Revocation/recovery, the network authority needs to establish trust with or be delegated by the RTA in order to access the PLT. When we mention network authorities in what follows, we implicitly refer to RTAs in the network authority role. 3.3 Security Requirements I define the security requirements for a VANET security system, and will show the fulfillment of these requirements after presenting the design details. 1. Privacy: The privacy requirement states that private information such as vehicle owner’s identity and location privacy is preserved against unlawful tracing and user profiling. 2. Traceability: It is required where the identity information of violators need be revealed by law enforcement authorities for liability purposes. The traceability requirement also indicates that a misbehaving user will be identified and the corresponding credential revoked, if necessary, by network authorities, to prevent this user from further disrupting system operations. Certain criteria have to be met for the traceability of a misbehaving user as explained in the next section. 3. Nonframeability: Nonframeability requires that no entity in the system can accuse an honest user for having violated the law or misbehaved. 4. Other requirements: A secure VANET system should satisfy several fundamental requirements, namely, authentication, nonrepudiation, message integrity, and confidentiality where sensitive information is being exchanged, to protect the system against unauthorized-message injection, denial of message disseminations, message alteration, and eavesdropping, respectively. Nonrepudiation also requires that violators or misbehaving users cannot deny the fact that they have violated the law or misbehaved. 4 CONCLUSIONS AND FUTURE WORK I have presented the VANET security system mainly achieving privacy, traceability, nonframeability, and privacy-preserving defense against misbehaviour and reducing traffic in the network. These functionalities are realized by the  pseudonym-based technique, the threshold signature, and the threshold authentication bas ed defense scheme. The ID-based cryptosystem facilitates  us to design communication and storage efficient schemes. Our future work consists of simulating the proposed security system and experimenting it in real VANET settings. REFERENCES [1] M. Raya and J-P. Hubaux, â€Å"Securing Vehicular Ad Hoc Networks,† J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007. [2] J.Y. Choi, M. Jakobsson, and S. Wetzel, â€Å"Balancing Auditability and Privacy in Vehicular Networks,† Proc. First ACM Int’l WorkshopQoS and Security for Wireless and Mobile Networks (Q2SWinet ’05), pp. 79-87, Oct. 2005. [3] J. Sun, C. Zhang, and Y. Fang, â€Å"An Id-Based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks,† Proc. IEEE Military Comm. Conf., pp. 1-7, Oct. 2007. [4] X. Lin, X. Sun, P.-H. Ho, and X. Shen, â€Å"GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications,†IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007. [5] M. Raya, P. apadimitratos, I. Aad, D. Jungels, and J.-P. Hubaux,â€Å"Eviction of Misbehaving and Faulty Nodes in Vehicular Networks,† IEEE J. Sele cted Areas Comm., vol. 25, no. 8, pp. 15571568,Oct. 2007. [6] C. Gamage, B. Gras, B. Crispo, and A.S. Tanenbaum, â€Å"An Identity Based Ring Signature Scheme with Enhanced Privacy,† Proc.Second Int’l Conf. Security and Privacy in Comm. Networks (SecureComm ’06), Aug. 2006. [7] P. Tsang, M.H. Au, A. Kapadia, and S.W. Smith, â€Å"Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs,† Proc. ACM Conf. Computer and Comm. Security (CCS),pp. 72-81, 2007. [8] J. Sun and Y. Fang, â€Å"A Defense Technique against Misbehavior in VANETs Based on Threshold Authentication,† Proc. IEEE Military Comm. Conf., Nov. 2008.

Saturday, September 21, 2019

Study on Movement Time of Individual After Stroke

Study on Movement Time of Individual After Stroke Case scenario A 25 year old male Patient who was apparently well 1 year ago when he met with an accident and got severe head injury, diagnosed with right hemiplegia, was hospitalized for 1 month. Presently Patient complains of, difficulty in getting up from bed, and difficulty in walking. Patient has flexor synergy in Upper limb and extensor synergy is in lower limb, Rom and strength for right is decrease, tone for upper limb and lower limb is increased , grade3 on MAS , reflexes are exaggerated. Presently, Patient is able to sit but only with support and need assistance in toileting and mobility. INTRODUCTION Activities of daily living is refers to those â€Å"sensory motor skills necessary for the performance of usual daily activity† (1). These sensory – motor skills under lie the task of daily self care such as feeding, dressing, hygiene and physical mobility that are known as basic activities of daily living (1). Any problem in performing the ADL can affect personal social life (1),as well as community mobility. Stroke is the sudden loss of neurological function caused by an interruption of blood flow to the brain (1). Stroke can be caused by many reasons like traumatic, pathological etc. Post stroke patient deal with the variety of deficit like cognitive (1), sensory (3), motor (4), balance and coordination (5). All these components are necessary for the optimal performance of any ADL (6). In young population ADL can be affected because of several reasons, but now a days most common problem which young patient are facing is stroke(6) which affect their ADL in terms of transferring like sit to lie or lie to sits which is the basic activity in order to carry out any task. In this study time is measured for the individual to perform a particular activity. Time taken to perform any task measures several components like cognition (7), sensory (8), motor, balance and coordination (8). Any deficit in any one or all the components leads to increase in the time taken to perform any activity (7) (8) (9). Any deficit in cognition patient will have difficulty in interpreting the command given to patient which leads to increase in the time taken to perform the task. Any motor deficit and sensory deficit can cause difficulty in moving limbs and awareness about the orientation of the limbs. Balance and coordination deficit leads to decrease postural control, all these components will hinder the patient to perform the task at appropriate time (7) (8). Although there is no evidence or normative values are yet described which tells about the normal time taken by an individual to perform sit to lie and lie to sit activity. In order to rehabilitate the patient for sit to lie and lie to sit task, it is also necessary to see that at what degree of trunk flexion (0` or 45`) and with which side (dependent or non dependent) it is easy for the patient to perform task which is measured in terms of time taken by individuals to finish the task so that therapist can rehabilitate the patient with minimum difficulty. The normal timing taken by an individual to perform any task can be used both as a qualitative as well as quantitative. It helps to asses the various components of the deficit, and to rehabilitate the patients who have difficulty in performing ADL. Hence objective of this study is to measure the time taken to perform sit to lie and lie to sit activity at 0` and 45` of bed from dependent and non dependent side. This can be use to asses as well as rehabilitate the patient. NEED FOR STUDY Stroke in the young is particularly debilitating as the patient wants to get integrated into the society as early as possible. Also a unique requirement for stroke in the young is that the expectations and the society needs are different from the elderly when comparing community dwelling young adults vs. geriatric populations. There is no normative values are present in literature in order to find out the usual time taken by young individual to perform ADL. Sit to lie and lie to sit are basic bed mobility which patient with stroke generally encounter first. So in reference to these timing it is easy to asses as well as rehabilitate the patient in activities of daily living which is most important requirement of patients with stroke. LITERATURE REVIEW Lindmark B ,Hanrin E ,Tornquist K in 1920 conducted study on 207 stroke patient, they were tested after3 month and 1 year after the stroke, 183 survivors from the original population were assessed with standardized practical equipment which has 12 daily activities which is concerned with cognitive factor and coordination, hand function, mobility and balance . They did not find any significant difference, concluded that there is no difference in the performance of daily activities at 3 month and1 year after stroke and also found out that women had more difficulty in performing compare to men in performing mobility task (6). Podsiodlo D , Richardson S , in 1991 conducted study on 60 elderly patient(mean age 79.5 years) to find out TUG as test for basic functional activity, time is calculated for the patient to perform a rise from chair ,walk for 3 meters and then sit down again to perform a particular ADL, found out that TUG test is reliable and correlates well with berg balance scale and concluded that TUG test is reliable for evaluation of the ADL(10). Owsley C, Sloane M, Mc Gwin, Ball K. in 2001 conducted study on 173 older adults (65-90 yrs), which is large sample size in order to find out visual processing speed and correlation between memory and inductive reasoning with IADL ,time taken to perform the 5 IADL was calculated and found out that individual who have slow processing speed , takes more time to accomplish the task they concluded that cognition especially memory and reasoning are related to time taken to perform any ADL and it is useful in evaluating in cognition(8). Owsley, Cynthia, mcGWIN, Gerald Sloane, Michael E in 2001 conducted a study on 342 older adults who had visual impairment (58-86year) from eye clinic, to find out relation between visual function and time required to complete the IADL, under visual impairment –visual acuity, contrast sensitivity and useful field of view .17 IADL task which includes visual activity was evaluated with time taken. They concluded that visual function is necessary to achieve any ADL (9). Hsieh CL ,Shen CF,Hsueh IP, Wang CH in 2002 conducted a prospective study was on 169 stroke patient to find out relation between trunk control and ADL in early stage in stroke patient after6 month of stroke, postural assessment scale for stroke patient scale(PASS-TC) fugl meyer motor test and balance test was used to asses motor and balance respectively, patients were assessed at 14thday after stroke and 6 month. They concluded that trunk control is related to comprehensive ADL(11). Gregory T, Cullaghan A, Nettelback T ,Wilson C in 2009 conducted study on elderly people to examine whether early inspection time predict future problem in ADL , participant completed IT at baseline, 6 month,18 month and at 14 month after stroke, 2 group of 15 elderly with aged (74-88 years) are assessed for timed IADL, it shows that group with slower IT had poorer performance (took longer time to finish task)on more than half of the functional activity and concluded that slower IT shows difficulty in performing functional activity(12). Emma Barry, Rose Galvin, Claire Keogh, Frances Horgan and Tom Fahey in 2014 did a systemic review and metanalysis to find TUG is a predictor of risk of fall in older adult, a literature search of 25 in systemic review and 10 in metanalysis was done and TUG score> 13.5 sec was used to identify individual with high risk of falling and found out that TUG test has limited ability to predict to predict risk of fall in elderly (13). METHODOLOGY Study design: Cross- sectional study –a pilot study Sample size: n=30(50% male and 50% female) Type of sampling: convenience sampling Source of data collection: M.S. Ramaiah Medical College, Department of Physiotherapy. METHOD OF DATA COLLECTION: A cross- sectional study design was undertaken for the study. Young adult aged between 20 – 25 years fulfilling in M.S. Ramaiah medical college, department of physiotherapy were included in study. Convenience sampling was done and sample of 30 subjects were included in the study. Informed consent of all the 30 subjects are taken prior to undertaking the study and procedure was explained to them. Inclusion criteria: Mentioned conditions directly affect the time taken to perform a particular task. cognition is tested by checking memory reasoning and intelligence. 1. Aged between 20-25 years. 2. Subject should not have any pain, trauma, inflammation, fracture etc by history /reported. 3. Should not have any cognitive deficit. 4. Should have competed consent form. Exclusion criteria: Above mentioned condition can interfere in test and also affect the time taken to perform the  given task. Any reported trauma, inflammation, pain in lower back and lower limbs. History of Low back pain, knee pain. Intake of alcohol in last 24 hrs. Any history of hypotension while performing ADL. Any giddiness while performing IADL tasks Any cognitive or higher mental funti0n deficit. Materials used for the study: Stop watch Adjustable firm couch Height scale Weighing machine Test procedure: Demographic data of young adult was noted, including height, weight, gender etc. subjects to be tested was explained about the procedure of the test. Subjects are asked to sit at edge of bed. When start command was given, the subject had to lie down according to given instruction by using preferable speed to perform the activity, time taken for the subject to perform the sit to lie and lie to sit was noted down. Both these activities were performed at 0` and 45` of elevation of bed end, from dependent side as well as from independent side of elevation of bed end. Starting positions: Sitting Position: neck straight, head in midline, spine erect, Hands on a side, knee and hip at 90`, foot unsupported. Lying position: straight, head in midline, hands on sides, legs together, foot in a neutral position Task was observed from standing in front of patient. The same procedure was repeated and time is taken for 30 subjects, to find out normal value to perform sit to lie and lie to sit in young adult. Picture 1a: Firm and adjustable couch at 00. Picture1b: Firm and adjustable couch  at 450. PICTURE 2a: Starting position at 00 PICTURE 2b: Starting position at  00(side view). Picture 3: Starting position at 450 PICTURE 4a: Final position of sit to lie at 00 PICTURE 4b: Final position of lie to sit 45` Picture5: During test Data Analysis Statistical analysis: Microsoft word and Excel were used to generate data and graphs. Statistical Tests: mean, mode, median of time taken to perform the sit to lie and lie to sit activity was calculated for 30 subjects. Mean is taken to as average time taken to perform the task. t –test was done to compare the values of sit to lie and lie to sit from dependent and non dependent at 0` and 45`. RESULT A cross sectional study consisting of 30 normal healthy young adult is taken to find out the normal time taken by younger individual to perform sit to lie and lie to sit at 00and 450from dependent and non dependent side. This graph is showing average time taken to perform sit to lie and lie to sit. The values of sit to lie and lie to sit which are not showing any statistical significance depending on different side and angle of trunk flexion. Table2: t and p value of the average of time taken to perform sit to lie and lie to sit. t- scorep-score Sit to lieND(00) vs. ND(450)0.7040.483 D(00) vs. ND(450)1.0100.318 ND(00) vs. D(450)-1.0470.299 D(00) vs. D(450)1.3550.180 ND(0) vs. D(0)-0.4090.683 ND(45) vs. D(45)0.7040.483 Lie to sitND(00) vs. ND(450)1.6330.107 D(00) vs. ND(450)1.1700.246 ND(00) vs. D(450)1.5810.119 D(00) vs. D(450)1.1040.273 ND(00) vs. D(00)0.4880.626 ND(450) vs. D(450)-0.1160.907 Sit to lie vs. Lie to sitND(00) vs. ND(00)0.0270.978 D(00) vs. D(00)0.9330.354 ND(450) vs. ND(450)1.1600.250 D(450) vs. D(450)0.9470.347 Table2 the t value and p value are showed non of the data have p value Table 3: Comparison between 00 and 450 in sit to lie and lie to sit. 00450 Sit to lieND (3.497)ND(3.366) D(3.565)ND(3.366) ND(3.497)D(3.321) D(3.565)D(3.216) Lie to sitND(3.491)D(3.156) D(3.375)ND(3.136) D(3.345)D(3.156) ND(3.491)ND(3.156) Above table is showing the comparison between average time taken at 00 and 450. There is not significant difference between the time taken by subject in sit to lie and lie to sit from 00and 450. Figure2a: 00 vs. 450 from sit to lie Figure2b: 00 vs. 450 from lie to sit Given figure 2a is showing comparison of mean time taken to sit to lie from 00 and 450 which is not statistically significant(p Table 4: Comparison between the averages of time taken from dependent vs. non dependent side. Non Dependent Side (sec)Dependent (sec) Sit to lie 450(3.366)450(3.321) 00(3.497)450(3.321) 450(3.366)00(3.565) 00(3.497)00(3.565) Lie to Sit450(3.136)450(3.156) 00(3.491)450(3.156) 450(3.136)00(3.375) 00(3.491)00(3.375) This table presents the comparison between dependent vs. non dependent side from sit to lie and lie , average mean of the sit to lie and lie to sit are statistically not significant , P >0.05 , hence no suitable value can be concluded from this present data. Figure3a: Dependent vs. Non Dependent Figure3b: Dependent vs. Non Dependent from sit to lie. from lie to sit Given fig 3a is showing the comparison between dependent vs. non dependent from sit to lie and fig3b. From, the t scores of these data is not showing any statistical significance (p>0.05). Table 5: Comparison between average time taken in sit to lie vs. lie to sit. Sit to lie vs. lie to sitSit to lie in (sec)Lie to sit in (sec) Nondependent (00)3.4973.491 Dependent(00)3.5653.375 Nondependent(450)3.3663.136 Dependent(450)3.3213.156 This table presents the comparison between the average time taken from sit to lie vs. lie to sit. Statistically these values are not significant (p>0.05). Figure 4: comparison between time taken from sit to lie vs. lie to sit Figure 4: showing the comparison between the time taken from sit to lie vs. lie to sit which is statistically not significant hence is not showing any difference in time taken to perform both these activities. TABLE 6; Average of mean value for sit to lie and lie to sit from dependent and non dependent side at 00 and 450 Mean values Sit to lieNon Dependent(0)3.50 Dependent(0)3.57 Non Dependent(45)3.37 Dependent(45)3.32 Lie to sitNon Dependent(0)3.49 Dependent(0)3.37 Non Dependent(45)3.14 Dependent(45)3.16 Average3.36 In table6, the average of all mean time taken to perform sit to lie and lie to sit, as it is not any statistical significance ,so there is no difference in time taken to perform this task. DISCUSSION The time taken by young adult (20-25 years) to perform sit to lie and lie to sit from dependent and non dependent side at 00 and 450 of trunk flexion has done to find out the normal time taken by young adult to perform this particular activity. This activity is a basic mobility which the stroke patient encounter first and also find difficult to do. Timing of these activity measures cognition, sensory, motor, balance and coordination component of the patient which will help to find out the level of functional activity in reference to the time taken to accomplish the given activity. Activity was measured at different angle of trunk flexion (00 and 450) a well as from different side (dependent and non dependent). Before the study it was assumed that from dependent side it is easy to accomplish the task, as well as from 450 it is easy to lie down as well as get up as therefore should take less time to finish the task, as at 450 the length tension relationship is good and it provide extra leverage to come against gravity, in 450 as the muscle is in tension, muscle fiber recruitment is more. Getting up from dependent side was hypothesized to be easier as compare to nondependent. It was also assumed that as sit to lie and lie to sit are two different activities so time taken to perform both these activity will be different. In our study, on analyzing the result of table 2 ( t – test of the average of the time taken to perform the sit to lie and lie to sit at different plane) is observed that p-value of mean score of time taken to perform sit to lie and lie to sit is statistically not significant. Values at different plane is statistically not significant that may be because of the small sample size as well as population age. Good strength in muscles, balance and coordination in limbs helps to overcome the gravity easily. The t – score and p- value for the comparison of sit to lie and lie to sit is also statistically not significant. Since all comparisons were statistically insignificant, we averaged the mean for condition The average for the sit to lie and lie to sit was found to be 3.36 sec. In order to asses and rehabilitate the stroke patient timed ADL will asses several components in one time. In order to asses the patient who has difficulty in basic mobility like sit to lie or lie to sit can be assessed with respect to time taken to accomplish that activity , any increase in time taken to accomplish the particular activity may suggest need for intervention , and patient can be trained for the same activity for time taken. Time taken can evaluate contribution from different components such as cognition, strength, balance, coordination. Therefore assessing time may help the therapist to quantify these components and give direction to treatment. Thus concluded that sit to lie and lie to sit takes same time irrespective of dominant and non dominant side, and angle of trunk flexion (00 and 450). The average time to perform sit to lie or lie to sit for young adult is 3.36 sec. CONCLUSION From the present study we can conclude that the average time taken to perform the sit to lie and lie to sit activity is 3.36. The time taken to perform sit to lie and lie to sit from dependent and non dependent side at 00 and 450 was the same. It did not differ with the side as well as the angle of trunk flexion. à ¢Ã¢â€š ¬Ã†â€™ Limitation of the Study Video for the task is not taken which can help to evaluate the different components of task and may be helpful to explain the reason behind the variation in timing in different individual. Instruction to use a preferable speed may not reliable for every patient. The sample size is small and taken for only 20-25 year old young adult. Clinical Implication As the time taken to perform sit to lie or lie to sit is 3.36 sec, and in my case scenario patient is 25 year old and has difficulty in bed mobility we can take it (3.36 sec) as a baseline in order to asses and rehabilitate the patient . We can measure the time taken by a patient to complete sit to lie and can further retrain the patient to complete the tasks within 3.36 sec; this will help the patient to achieve the status of community functional mobility. It will help us to plan a treatment parameter such as time taken to complete and components of sit to lie as an outcome measure. So in this case summary we could set a goal of 3.36 sec as the time required to achieve functional mobility.

Friday, September 20, 2019

Bicycle Thieves (1948) and Umberto D (1952) Analysis

Bicycle Thieves (1948) and Umberto D (1952) Analysis Two films from the neorealism movement are Bicycle Thieves (1948) and Umberto D (1952) both directed by Vittorio De Sica. Both films in their own way show the real-life hardships that were faced during this time of poverty and more particularly show it from the point of view of normal everyday people. The most pronounced thing about neorealism that sets it apart from other cinematic movements is its birth from necessity. During a time when everything was scarce films were produced using whatever was at hand, filming out on the streets and using non-professional actors, a reason why these films are so genuine in their authenticity. They dont show the past or the future they show the struggles of the present.[1] Vittorio De Sica said his goal was to look for the dramatic in ordinary situations, the wonderful in the smallest, the tiniest news item, in the material everybody considers insignificant. It was with this goal in mind that he created Bicycle Thieves. This film is a key example of the neorealism movement and can be argued to be the most notable. It shows the journey of a man and son as they search for his stolen bicycle. A bicycle which is key in the father getting the job he needs to support his family during a time in which jobs were scarce. This bicycle represents their livelihood and stealing the bicycle also steals this familys hope of surviving.[2] Bicycle Thieves can be described as shockingly authentic in two main ways; the way in which the film has been shot and the message that the narrative expresses. Figure 1 Bicycle Thieves (1948) At the start of the film we see the husband and wife pawn their bedding to be able to get their bicycle back, here De Sica gives us a glimpse of not just our on-screen family, but others when he shows the shot of the high shelves completely full of bed sheets as shown in Figure 1, each representing a family which has done the same. It shows the amount of people that were in poverty after the war and that there is a harsh reality outside this world that De Sica shows us. A reason why his films were so impacting is that he released films based on the post-war era during the post-war era. A time when the audience themselves may have had to pawn something to support their family. Filming at this time meant everything was scarce, films in the post-war era were created using the bare necessities. We can see this through Bicycle Thieves as its it almost completely filmed out on location and any inside shots are cramped, De Sica was also known for his use of non-professional actors, another way of making use of what was available and at the same time making his characters more believable.[3] When looking at the Mise-en-Scà ¨ne of the film De Sica uses very little expressive camera techniques, tending just to show straight on, wide and mid shots; apart from this scene with the bed sheets which is taken from a low angle and pans up as if to express the largeness of the scale of the shelves. He just shows the scene for what is happening and communicates mostly through the narrative alone. There are few interesting camera movements to catch the audiences attention and no more than simple cuts between scenes. The scenes in Bicycle Thieves tend to be long takes as if De Sica is trying to keep cuts to a minimum, this could explain his fondness for wide shots as it allows more actions to happen in the frame, these long shots also allow for a lot of background movement to be in the frame in these real-life locations expressing De Sicas wish to show the outside world. He also relies on natural lighting while filming out on location. These techniques, or lack of, work together to show the films authenticity.   De Sica takes us on a journey of ups and downs in the search for the bicycle and the relationship between father and son, the addition of the son is very important in expressing this shock authenticity. A child adds sentiment with their innocence and makes an audience more emotionally invested in the film. We see throughout the film however, a strange relationship between them. Antonio ignores Bruno throughout the film, being so set on his search for his bicycle and young Bruno is there to witness his father at his lowest point. De Sica avoids the idea that Antonio should realise that his son is whats important, not the bicycle. This ignorance could be De Sica showing that this is not a luxury that the poor can afford.[4] Knowing his fate is directly proportional with his fathers and that of the bike shows a harsh reality of the time, that not even children were not safe from the hardships of the post-war era. De Sica gives us reprieve from the bleakness of the narrative by introduci ng short moments of happiness, such as our main character Taking his son out for lunch. It almost seems they can forget their troubles for a moment, however the table next to them with the multiple servings of food break them from the illusion. This parallels the unjust support the bike thief receives from his neighbours, whereas the innocent man from which it has been stolen is the one who truly needs it for survival, it shows the unfair world of the post-war era.[5] The end scene is the most defining for our main character. He looks around him at a sea of bicycles and he lowers himself to do what has been done to him throughout the entirety of the film. it gives us an idea that no one at this time is below the acts of others, this era has driven this man to do what he initially found immoral. During our ending scene, we see the owner of the bike let him go when he sees the young boy, showing his understanding of the hardships of others and that the end of the day everyone is in so me way in the same boat. Father and son inevitably walk home defeated, De Sicas brutal honesty lasts through to the end, he doesnt shy away from the harsh reality, he makes this film shockingly authentic by showing that happy endings arent inevitable in real life. De Sica continued to work in the neorealism movement and moved onto the film Umberto D. This film has recognisable similarities to Bicycle Thieves in the way both were filmed and the fact that they both show the struggles of the time. We see the main character Mr Umberto being thrown out of his home by his indifferent land lady. A man who comes into solitude apart from his dog. There is an idea through Umberto D of the wish of the main character to live his life by his own terms, with dignity, and being unable to. He is left with no home, no family and no health. Although the narrative of Umberto D is different it still portrays the same era as Bicycle Thieves and can also be described for its authenticity. When It comes to using the bare necessities, this is where we see the greatest similarities. Umberto D also uses real locations for filming as well as non-professional actors, they make use of everything around them with a budget that was most likely close to nothing, again portra ying an authenticity for the time.[6] Looking at Umberto Ds Mise-en-Scà ¨ne we see a little more expression through camera work but not a lot. An example would be the scene where Mr Umberto looks out of his window and we see the sudden zoom in on the street below with this hard hit of non-diegetic music to accompany it. This was De Sicas way of showing the thoughts of our main character, that he has this sudden idea of jumping to his death rather than live in this world he feels he has no control over. Again, De Sica tends towards wide shots and mid shots, showing the streets that hes filming in, showing the people and including the outside world. De Sica again uses simple cuts in between his scenes and opts for long takes which these wide shots manage to capture with the odd pan to include the surroundings more. In accordance with the neorealism movement Umberto D takes advantage of natural lighting whilst out on location, one of the bare necessities and making the most of what was available. Figure 2 Umberto D (1952) When It comes to the characters that De Sica portrays they arent loved for their perfection or their beauty. Mr Umberto is left with only his dog and a maid who has her own troubles. He is almost completely alone. This movement means a camera that shows things for exactly how they are, the character if Mr Umberto isnt romanticised yet he is loved by the camera and it sticks with him through an ordinary experience.[7] The actor himself is one which was chosen from a sea of thousands, like this opening scene in Figure 2, showing the men marching demanding fair pension, any one of them could have been De Sicas muse, all of them in a way are Mr Umberto. This would be the first and last film that this non-professional actor would play and yet this man manages to create such an emotion because he is authentic, and this is what the camera captures.[8] Like in Bicycle Thieves we see a character going on a journey, however, in bicycle thieves it is a journey looking for life whereas Umberto D focusses on a man searching for his death. This is however complicated by his dog Flike which he loves above anything else. He cant bear to abandon him. He finds himself at times having to beg on the street something which he cant stand to do himself, hence using Flike, but even when Flike is recognised by an acquaintance he claims he is only messing around in the hopes of saving his own dignity. Mr Umberto represents the middle class, one which is concerned with the protection of outward appearances. He is more afraid looking poor than actually being so.[9] Everything is taken from him so only Flike and his dignity remain, he represents a character which doesnt want to be defined a nuisance by a post-war society. A society which already sees a group of men marching down the street in protest as a pest. In the ending scene, we see Mr Umberto walking straight onto the rail tracks with Flike with the intention of ending both their lives, this is accompanied by dark music and an accompanying atmosphere. However, last minute Flike jumps out of his arms and Mr Umberto chases him, missing the train that would have ended his life. In chasing after Flike Mr Umberto chooses life. The music in changes from one of despair to one of buoyancy, for the first time in the film we see a happy and carefree Mr Umberto as he jogs off into the distance with Flike, escaping the manipulation of society and showing an understanding that his fate Is truly in his own hands. Even though the ending is ambiguous it leaves an audience with hope, a different yet preferable ending to that of Bicycle Thieves. One which shows that even though an individual may feel hopeless for a time they may find themselves again in the end, a true reflection of the damage yet survival of the war (Lu, 2010).[10] In conclusion both these films capture a true authenticity for the time that they were released. Since the neorealism movement meant filming using a scarcity of resources and a reliance on real world locations, and the fact that both narratives tell stories that were incredibly impacting and realistic for this time. So much so that they could be described as documentary like in their depiction of real places and real people. References Bradshaw, P. (2008). Film review: Bicycle Thieves. [online] the Guardian. Available at: https://www.theguardian.com/film/2008/dec/19/film-review-bicycle-theives [Accessed 3 Mar. 2017]. Eggert, B. (2009). Umberto D.. [online] Deep Focus Review. Available at: http://deepfocusreview.com/definitives/umberto-d/ [Accessed 4 Mar. 2017]. Haaland, T. (2009). Bicycle Thieves (Ladri di biciclette) (review). Project Muse, [online] 16, pp.463-465. Available at: http://muse.jhu.edu/article/263879 [Accessed 3 Mar. 2017]. Hamzaki, Z. (2010). The Bicycle Thief. [online] Twocentsworthafilm.blogspot.co.uk. Available at: http://twocentsworthafilm.blogspot.co.uk/2010/06/bicycle-thief.html [Accessed 3 Mar. 2017]. Kartal, E. (2013). Defining Italian Neorealism: A Compulsory Movement. Cinej Cinema Journal, [online] 2.2(2158-8724). Available at: http://cinej.pitt.edu [Accessed 4 Mar. 2017]. Lannone, P. (2016). Deep focus: The roots of neorealism | Sight Sound. [online] British Film Institute. Available at: http://www.bfi.org.uk/news-opinion/sight-sound-magazine/features/deep-focus/roots-neorealism [Accessed 4 Mar. 2017]. Lu, J. (2010).  » Film Analysis on Umberto D. Media Studies. [online] Jennylu.qwriting.qc.cuny.edu. Available at: http://jennylu.qwriting.qc.cuny.edu/2010/10/21/film-analysis-of-umberto-d/ [Accessed 4 Mar. 2017]. Snyder, S. and Curle, H. (2000). Vittorio De Sica. 1st ed. Toronto: University of Toronto Press. [1] Esma Kartal, defining Italian Neorealism: A Compulsory Movement, Cinej Cinema Journal, 2.2.2158-8724 (2013) . [2] Pasquale Lannone, Deep Focus: The Roots Of Neorealism | Sight Sound, British Film Institute, 2016 [accessed 4 March 2017]. [3] Zulfiya Hamzaki, The Bicycle Thief, Twocentsworthafilm.Blogspot.Co.Uk, 2010 [accessed 3 March 2017]. [4] Peter Bradshaw, Film Review: Bicycle Thieves, The Guardian, 2008 [accessed 3 March 2017]. [5] Torunn Haaland, Bicycle Thieves (Ladri Di Biciclette) (Review), Project Muse, 16 (2009), 463-465 [accessed 3 March 2017]. [6] Brian Eggert, Umberto D., Deep Focus Review, 2009 [accessed 4 March 2017]. [7] Stephen Snyder and Howard Curle, Vittorio De Sica, 1st edn (Toronto: University of Toronto Press, 2000). [8] Brian Eggert, Umberto D., Deep Focus Review, 2009 [accessed 4 March 2017]. [9] Esma Kartal, defining Italian Neorealism: A Compulsory Movement, Cinej Cinema Journal, 2.2.2158-8724 (2013) . [10] Jenny Lu,  » Film Analysis On Umberto D. Media Studies, Jennylu.Qwriting.Qc.Cuny.Edu, 2010 [accessed 4 March 2017].

Thursday, September 19, 2019

Betty Smith :: essays research papers

Betty Smith Betty Smith was born Elisabeth Wehner on December 15, 1896. The daughter of German immigrants, she grew up poor in Brooklyn, a world where she re-creates in â€Å" A Tree Grows in Brooklyn.† Wehner later on married fellow Brooklynite George H.E. Smith, where they moved to Ann Arbor, Michigan, where he was a law student at the University of Michigan. The bride son had two daughters, Nancy and Mary, and had to wait until the girls entered school before endeavoring to complete her own education. Although Smith never finished high school, she was permitted to take classes at the university, she focused on her studies in journalism, drama, writing and literature. Smith showing off her knowledge won the Avery Hopkins Award for work in drama, and had a three-year course in playwriting at the Yale Drama School. After writing features for a Detroit newspaper, reading plays for the Federal Theatre Project, and acting in summer stock, Smith than moved to Chapel Hill, North Carolina under the favors of the W.P.A. She and her first husband divorced in 1938. In 1943, she married Joe Jones, a writer, journalist, and associate editor of the Chapel Hill Weekly, while he was serving as a private in the wartime army. That same year, â€Å" A Tree Grows in Brooklyn,† her first novel, was published. The prestige of writing a best-selling, critically lauded a book brought assignments from the New York Times Magazine, which she wrote both light-hearted and serious commentary. In a December 1943 piece called â€Å"Why Brooklyn is that Way,† Smith shown the core of her childhood borough’s unofficial champion. Although most readers remembered for the amazing success of that first book, Smith wrote other novels, including Tomorrow Will Be Better, Maggie-Now, and Joy in the Morning.

Wednesday, September 18, 2019

The Causes of World War II Essay -- American History, World War Two, p

From the Treaty of Versailles, to the rise of Hitler, and the failure of the League of Nations, there were many causes that lead up to World War II. World War I left Germany with many shortfalls, thus leaving them in the hands of the Treaty of Versailles. Rather unfair of a Treaty, this left Germany once again looking for another way out. A country resented by many had no other choice but to feel optimistic toward Adolph Hitlers empty promises†¦ making it substantially simple for him to gain power so quick. Throw in the Great Depression, and you have a vastly unstable world, which the Germans believed Hitler would lead them out of. After World War One, Germany was thrown into downward spiral. They were left with a monstrous amount of unemployed people, and they were still unhappy about being the scapegoat of World War One, thus according to the Treaty of Versailles. Looking for a way to rebuild, Hitler came in at a perfect time. Adolph Hitler made them many promises, ensuring them that in believing in him, Germany would be great once again. One of his many promises was that he would stimulate employment. To do this, he promised that he would employ the unemployed, by giving them jobs building roads, stadiums, etc. Hitler promised the middle class he would reinstate small business profits, and communist threat. He also promises farmers the reimbursement for their losses during the Great Depression, by raising the prices of their produce. Another one of Hitlers many promises was that he would destroy the Treaty of Versailles. The Treaty of Versailles basically blamed Germany for everything, stating that Germany accepted the guilt in causing the war. Germany signed under protest. It stated that Germany was to pay for the reparat... ... They weren't allowed any more than 100,000 men in their army, they were only entitled to keep six battleships, they were not to create and kind of powerful aircraft. The Germans believed this was only to keep them weak. Enter Hitler, and his obliterating the Treaty of Versailles. He led Germany in rearming in 1933, and Hitler proclaimed they would be ready for war by 1940. Hitler basically destroyed the Treaty of Versailles by 1939, and thus World War II began with the invasion of Poland. All in all, there were many events and a vast amount of problems that ignited World War II. It's amazing how so many different aspects can all snowball into having the same motive of causing a world war. With so many powerful individuals all wanting something different (peace, power), it was just a recipe for disaster. Evidently, a nation under stress isn't a sound nation at all.

Tuesday, September 17, 2019

Public Police and Private Security Essay

Abstract         Public police and private security agencies will hardly find a compromise. Public police votes for limitation of private security rights. Private security becomes more popular with the increasing criminalization of the society. In reality, the objectives of public police and private security significantly differ.       The increasing popularity of private security agencies has raised substantial concern among the public police officers. The objectives of public police and private security differ, but public police agencies fear that private security will bury traditional policing standards, and will replace the major policies objectives and responsibilities.          In the general structure of public policing responsibilities, private security guards traditionally fulfill â€Å"supporting roles†. By hiring contractors, some federal agencies save up to 50 percent of their traditional expenditures. â€Å"One firm provides security for six major public transit systems around the country, transports prisoners, maintains booking and security for a juvenile assessment center, and supplies security for court houses in 40 states† (Youngs, 2004). Although private security agencies possess full range of policing equipment, personnel, and opportunities, such agencies are permanently restricted from fully participating in public policing. Potentially, private security and public policing could have similar objectives, but public policing remains purely a state structure. Public police agencies use private security firms to concentrate on their major tasks. In many aspects, these strategies remind outsourcing principles, which are often employed business. In Ontario, private security was given some freedom â€Å"to observe, report, and deter [†¦] elsewhere private security companies are offering quasi-police services in low-income housing projects† (Harman, 2000). Although private security and public policing could effectively combine their efforts, and work for the decrease of criminalization in the country, public policing insists on the fact that public police and private security cannot follow the same objectives.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Public policing continues fulfilling its â€Å"traditional crime-fighting duties. Private security carry out their mission of protecting their companies or clients’ people, property, and information, while at the same time serving the homeland security objectives† (COPS, 2004). Private security and public policing are still too far from joining their efforts and objectives for the benefit of criminal situation in society. References COPS. (2004). Private security / Public policing. Harman, A. (2000). Private security use debated. Law & Order, 48 (6), pp. 125-126. Youngs, A. (2004). The future of public / private partnerships. FBI Law Enforcement Bulletin, 73 (1), pp. 7-12.  Ã‚  Ã‚  Ã‚  

Monday, September 16, 2019

Authoritarian Pmr Screed

AUTHORITARIAN PMR SCREED You will make yourself comfortable†¦ Once feeling comfortable and safe in your chosen place†¦ You will close your eyes†¦ Listen to my voice†¦ Any noises in the background are unimportant†¦ From now on, you will only hear my voice†¦ Concentrate on your breathing†¦ Breathe in†¦ Hold it for a few seconds†¦ Breathe out†¦ Notice how each breath in, is equal to the amount of time it takes to breathe out†¦ Repeat this one more time†¦ Now you are going to relax your mind and body by allowing any tension to flow from your head, to the extremities of your toes†¦ Keep concentrating†¦ You are in control†¦ You will be in control throughout this session†¦Continue with your breathing as you would normally †¦ Now relax the muscles in your scalp†¦ Think of your present position†¦ Your purpose for this exercise†¦ Your head is getting heavier and more relaxed†¦ Your subconscious mind will start to imagine the rest of your body relaxing, in order for you to achieve your set goal and reason to be here today. Let the muscles in your eyes relax†¦ Let the muscles in your ears relax†¦ Relax your nasal muscle†¦ Relax your mouth muscles†¦ Loosen your tongue†¦ Feel your palate with your tongue and relax, letting your tongue drop to the base of your mouth†¦ Keep your teeth unclenched†¦ Feel your facial muscles†¦ Relax your facial muscles†¦ continue with your breathing in†¦ and out†¦ You are now much more relaxed†¦ You are in control†¦ I will mention all the other muscles and parts of your body†¦ As you are in control†¦ And in contact with your own powerful subconscious you will feel completely relaxed as we carry on†¦ becoming aware and eager of reaching your goal†¦ bringing in satisfaction of achieving the change you want to achieve†¦ Release any tension in your neck†¦ Feel any tension flowing away from your neck†¦ You are going to relax your shoulders†¦ The top of your back†¦ Your uppe r abdomen, reaching to your lower abdomen†¦ Feel how much more relaxed you are†¦ A feeling that you have never experienced before, while continuing to breathe in and out with your breathing getting much smoother and more gentle†¦ Still concentrating on my voice†¦ Relax your hip muscles†¦ going down to the thighs and knees†¦ You are now feeling the benefits to you and on the way to achieving your goal†¦ Feel yourself getting much more relaxed s any tension continues to flow down your calves reaching the extremities of your toes†¦ Now you are feeling totally relaxed in mind and body†¦ Totally relaxed and ready to achieve the change that you want to achieve. Go through the suggestions from here: You will listen to my voice taking you through the changes you want to make†¦ As you are completely relaxed†¦ you will respond to my suggestion†¦ From now, you will stop smoking†¦ This is your wish and desire on which you will act on from now†¦ No one is able to make the change except yourself†¦ Think of the positives gained by yourself in total command†¦ your response is yours only†¦ You are the only benefactor†¦ Think of the harm cigarettes cause†¦ think of lungs being completely black†¦ foul smell from your mouth†¦your clothes smelling †¦ continue with your breathing in and out†¦ hink of your family†¦ Think of spending money on buying cigarettes as money going down the drain†¦Don’t turn them into passive smokers†¦ your health and that of your family matters†¦You will continue with further sessions which will help you achieve the change†¦ You are now going to come back in this room feeling much more relaxed and refreshed†¦ feeling less tensed as at the start of this session†¦ Think of all the benefits while you are gradually returning back to your normal awareness†¦ You know that you will be able to achieve thi s state when you want and when it is safe to do so. I will count from 1-5 and at 5 you will open your eyes feeling relaxed and refreshed with the sense of some achievements little this maybe for now. 1. Feel the chair/ bed beneath you 2. The noises from inside this room and outside are coming back 3. You are half-way there 4. Still feeling relaxed and refreshed breathing normally 5. Open your eyes gently looking around slowly getting acquainted with your surroundings†¦you are now completely back. Welcome back.

Sunday, September 15, 2019

Abraham Maslow’s Hierarchy of Needs Essay

Aron Ralston’s physiological need was to satisfy his hunger, thirst, and a need to love and be loved. His desire was to be a father. This gave him a purpose to live. His will to live became greater than dying. But thirst and hunger overcame him to a point where he was saving and sipping his own urine to stay alive. I also believe that he had a divine appointment as he was shown insight into his reproductive future by the vision he had of a son. He was also shown that he was going to lose his arm when he saw the preschool boy being scooped up by a one armed man. I do not know if Aron believed in God or if he even had a relationship with my Lord and Savior or not, but I do think that his spiritual development should have grown through his journey. Hunger can put us in a life or death situation. After hours of driving alone in an unfamiliar city, you finally see a diner where you can eat. Even though it looks deserted and a little creepy, you end up stopping because you are really hungry. According to Maslow (pg 407) our need to meet the physiological need of hunger and thirst takes priority over our safety needs prompting us to take risk at times in order to eat. See more:Â  Masters of Satire: John Dryden and Jonathan Swift Essay References Myers, David G. Psychology. New York: Worth, 1998. Print. Abraham Maslow’s Hierarchy of Needs Essay With the exception of reflexes, the science of psychology portends that all human behavior is motivated. The subject is exhaustively dealt with by different schools of thought and each of which appears to be valid explanations of human behavior. Dr. Abraham Maslow (Halonen & Santrock, 1996) made a strenuous effort to arrange human motives in a hierarchy from stronger and lower at one end to weaker and higher at the other. Maslow essentially suggested that what man really wants is more of everything. Man desires a better and better situation for himself. He wants only what he does not already have, and thus satisfied needs do not motivate behavior. Maslow said that needs or wants can be arranged in a hierarchy of importance. Thus, when needs on the lower level are fulfilled, those on a higher level emerge and demand satisfaction. The hierarchy of needs he suggested placed physiological needs as lowest or basic, then safety needs, social needs, esteem needs, and finally self-realization needs. In other words, Maslow believed that higher needs are expressed only when the prepotent physiological needs are satisfied. See more:Â  Perseverance essay This is also true of needs for safety and security. Until there is a basic amount of order and stability in meeting the lower needs, a person may have little interest in higher pursuits (Halonen & Santrock, 1996). A person with an empty stomach cannot be expected to write literary work or tasked to write an essay about the effects of war on Afghanistan. The paper attempts to scrutinize the validity of Maslow’s Hierarchy of Needs theory based on several criteria which shall be discussed as follows. Discussion Maslow’s theory is classified under the humanistic perspective as it emphasizes the direction towards an individual must proceed which is self-actualization. This point in his hierarchy, Maslow tried to explain in much detail. According to him, self-actualization when attained, demonstrates what it is to be a fully developed human being. It is described as elusive due to the fact that man must have to satisfy the lower needs or those needs preceding this highest need (Halonen & Santrock, 1996). To satisfy further one’s curiosity about this theory, the theory will be determined by the following: Freedom or Determinism: can a person control their own behavior or is it determined by internal or external forces? In Maslow’s viewpoint, human motives are ordered in hierarchy and thus, man responds to these as they arise (Halonen & Santrock, 1996). With this premise, the theory is basically leaning toward the philosophical idea of freedom. Man is free to chart his course and how he is supposed to fulfill his various needs; i. e. his physiological dimension. In addition, the manner with which he carves himself in a particular niche that satisfies his psychological domains is also based on his own volition. There is no flavor of unconscious thoughts pervading motivation like when the idea of psychological instincts being interpreted within Maslow’s understanding; in contrast to this notion, any individual can basically control their own behavior. Maslow’s theory believes on the capacities of human nature to achieve what man wants to achieve rather than be held captive by forces within him or in his external world; it is the internal determinants such as self-determination that separates the theory from the rest especially among those with the deterministic stance (Halonen & Santrock, 1996). Hereditary or Environmental: are the characteristics a person has inherited and inborn or is it developed by social influences? Since the premise of this theory hinges on freedom, a person’s characteristics therefore are developed by social influences. According to Maslow then, people vary in their manner of satisfying their needs because of various environmental influences that surround him/her. Man is free to choose from several options adequately provide for his own needs or desires. What are essentials though, are man’s tendencies or propensity to follow the order of needs. Biology or heritability is deemphasized, rather the value of experience is pre-eminent in the theory (Halonen & Santrock, 1996). Uniqueness or Universality: individuals are unique or people are all pretty much the same This theory eventually emphasizes individuality or uniqueness, as it fundamentally illustrates in its assertion that every one has the capability for breakthroughs in circumstances which may be difficult. Man is also capable to understand himself and others, showing a lot of hope on the potentials that man possesses that he can exhaust in his lifetime (Halonen & Santrock, 1996). Proactive or Reactive: individuals act on their own initiative or just in reaction to external stimuli? Since man is free, unique and has the possibilities to accomplish whatever he is set to do, it is also asserted that man is proactive: he can choose how to respond in any situation and may even extend himself to advance his interests, both positive and negative at whatever goal or in whatever circumstance he may be in (Halonen & Santrock, 1996). Optimistic or Pessimistic: individuals can change given the right environment or they are unchangeable? The Hierarchy theory by design is hopeful and positive in every essence, if one is to follow the line of thinking which Maslow attempted to direct his audience. Individuals then have all the chances to make their lives fulfilling, impact others on virtues of honesty, charity and generosity, if and when he determines himself to be one. Likewise, he can also influence and negatively affect those that surround him when he chooses to do so. In this perspective then, an individual has high hopes of changing his attitudes and disposition, as well as his physical arrangements in life (Halonen & Santrock, 1996). Part II. Evaluation of the theory If this theory is to be evaluated, the strength of Maslow’s assumptions lies in his recognition of the positives that humans possess. It reminds the audience of the person as a whole being and not just an organism subject to either what the psychoanalysts termed as instincts or behaviorists’ position as merely organismic. The emphasis on developing the potentialities mark Maslow’s crowning achievement in terms of theoretical appeal (Halonen & Santrock, 1996). However, there are obvious or clear discrepancies or weaknesses in the theory. Since Psychology claims to start and end as a scientific endeavor, thus following scientific procedures to provide proofs to any of its claims, then Maslow’s theory must be ready to be tested accordingly. And this is where his theory fails in almost every measure in essence. At the outset, this viewpoint of explaining behavior is difficult to measure or put to test. Specifically, despite the details and emphasis Maslow placed on self-actualization the concept is still hard to operationally define. Scientists then and now are encountering various dilemmas in making the concept scientifically or empirically acceptable. In addition, there are illogical and inconsistent presuppositions in the constructs he postulated. He adheres to man’s capability to choose and yet how can he justify the existence of the structure of ordering needs in every individual if man is not born with it in the first place. How can he explain as well on those people who have achieved (jumped to the higher order needs) when they are barely existing or are starving at the same time; being altruistic and yet has no means to adequately meet their own needs (Halonen & Santrock, 1996). Lastly, studies even show that many who adhere to this philosophical viewpoint shun the scientific procedures imposed on any scientific field or discipline, and choose to lean towards the clinical orientation for the explanation of specific behaviors or motivations. Others who examined this theory explained that the assumptions on human behavior are too high or exaggerating on positives or the freedom and the logical capabilities that humans possess. Maslow’s theory, especially his self-actualization concept, critics affirm, implies the tendency for man to reinforce his self-centeredness (Halonen & Santrock, 1996). Conclusion If popularity and appeal are benchmarks for a theory to pass with flying colors, Maslow’s theory probably will go to the top. This is evidenced also as to the current prevalence of his theory in business; it is pervadingly present in almost every discussion in any business management course apparently (Halonen & Santrock, 1996). For convenience, I too would readily fall for his theory and its seemingly simplistic way of explaining behaviors. But if I were to stick to following empirical underpinnings, I should say that the theory is not deep enough to satisfy more difficult human dilemmas, though in some instances, the theory seems to point to some aspects of life’s realities. It is not sufficient to compel me to believe in the theory enough. To illustrate, pursuing many of our own self-centered needs only frustrates us all the time and eventually makes many of us disordered and mentally sick along the way. Can I use it to predict human nature? In fairness, yes; but to a certain extent only, because as I mentioned, it is not sufficient enough to merit full dependence. The theory can probably modified to some degree as a picture of several aspects of being human, but to explain about the potentialities, may imply believing too much when all that is in there is just hot air, so to speak. Self-actualization may provide hope for those who are so discouraged in life, but it is still very limited in reality. Some even say that a by-product of this belief is a sense of irresponsibility (Halonen & Santrock, 1996). Remarkably, Maslow suggested that various famous personalities illustrate what his theory posited including Beethoven, the brilliant composer, and Lincoln, one of the greatest leaders of all time. Each of them exemplified individuals who had characteristics of the self-actualized person (Halonen & Santrock, 1996). Reference: Halonen, Jane and John Santrock (1996). Psychology: Contexts of Behavior. Brown and Benchmark Publishers, pp. 453 and 553-556.