Tuesday, October 29, 2019

Balanced Scorecard Essay Example | Topics and Well Written Essays - 2500 words

Balanced Scorecard - Essay Example Although organizations measured their performance even before emergence of the balanced scorecard, they did not know how to implement new strategies. The balanced scorecard has evolved in its functionality to embrace translation of company strategies into action. The balance scorecard seeks to operationalize organizational strategy towards achieve desired outcomes. In this case, the balance scorecard ensures that the organization realizes its vision and mission through mobilization of resources and utilizing them in line with corporate objectives and goals, both short term and long term. Through the balanced scorecard, an organization can assess the current performance situation, as well as any feedback available from previous performance, and updating corporate strategies in such a manner that it effectively eliminates any bottlenecks available. This paper will discuss the adoption of Balanced Scorecard by contemporary organizations, and more specifically, the role of Balanced Scorecard in translating strategies to action as well as its role as a strategic management accounting technique. Translating Strategy into Action The Balanced Scorecard helps translate an organizations strategy and vision into a comprehensive set of measures and metrics to performance. This functionality puts into practice four perspectives of the Balanced Scorecard that include customer knowledge, financial measures, learning and growth, and internal organizational processes. This functionality particularly offers a balance between the company’s desired outcomes and their performance drivers, long term and short-term objectives, alongside objective outcomes. In addition, the balance scorecard has been used by managers as a revolutionary tool that enables them to mobilize their resources and strongholds to achieve the mission of the organization. The Balanced Scorecard appears as a management system that is applicable in channeling abilities, energies, advanced knowledge among its employees towards company objectives and long-term goals. The balanced score card is basically applicable in translating strategies put in pl ace by companies into performance measures that are comprehensive to the targets and achievement needs of the organization as a whole with respects to the complex environments in which they operate (Kaplan &Norton, 1996, p.2). Use of Balanced Scorecard for Strategy translation application to action has been evident among senior executives in banking, insurance, retailing, and oil industries to streamline current performance and target their future performance needs. Strategy translation focuses on effective and efficient use of a company’s intangible assets to spearhead the long-term financial success and value creation of the company through financial and non-financial perspectives. Growth and learning regards individual employees and the entire organizational human resource alongside cross-departmental initiatives to identify efficient new processes that would enable the organizations to meet customer needs and objectives of shareholders (Holl & Bohm, 2005, p.15). The Balan ced Scorecard is applicable as a learning system that is robust for testing the current situation, accessing situational feedback and updating ideal strategies fit for shortcomings of previous organizations functionality. However, strategy translation to action using the Balanced Scorecard is not completely ignorant of the steps that organizational managers use to build a tailored balanced scorecard.

Sunday, October 27, 2019

Eccentric and Concentric Bench Press Comparison

Eccentric and Concentric Bench Press Comparison Introduction Resistance training is an exercise modality that can be defined as a movement working against an external load resulting in physical adaptations (McArdle, Katch Katch, 2014). It is utilised by many as a means of increasing muscular strength, improving athletic performance, reducing the risk of injury and to maintain a healthy lifestyle. An average resistance training programme would incorporate a variety of static and dynamic movements whilst under an external load (Jones, 2009). Whilst the muscles are static, the fibres are in a fixed state and no change in length occurs. However, in a dynamic movement muscles go through a shortening and lengthening process. The concentric phase involving the shortening of muscle fibres, and the eccentric phase involving the lengthening of the fibres. Current literature proposes that eccentric and concentric training illicit different training responses and therefore could produce different muscular adaptations (Rosete et al. 2015). Although there are a variety of methods to provide resistance in a training sense, traditional exercises involve moving a load in opposite directions (i.e. push/pull) where there is a shortening (Concentric) and subsequent lengthening of the muscles (Eccentric). Proske (2001) describes the concentric phase as the actions that initiate movement, whereas the eccentric phase slows movement or brings it to a halt. Some research indicates that muscles acting in an eccentric fashion produce more force than when working concentrically. Other research shows eccentric movements have different fatigue patterns to concentric movements which could explain their apparent superiority. The intended purpose of this proposal is to quantify if concentric bench press yields less strength than eccentric bench press, measured via a 1 rep max max test. Literature Review As previously defined, resistance training is movement working against an external load resulting in physical adaptations. The health benefits of resistance training are widely documented with most of the literature reporting on musculoskeletal adaptations. Recently there has been an emergence of literature detailing other outcomes of resistance exercise such as benefits for metabolic disease (Jurca, 2005), bone density health (Lohman et al, 2003), all-cause mortality (Metter et al, 2002), mobility (Janssen et al, 2002) and quality of life (Levinger et al, 2007). Furthermore, resistance training provides a means of exercise for people whose current cardio vascular based regimes such as jogging or swimming have become too difficult. Based on these findings, resistance exercise is now considered an imperative component of a regular training program. The eccentric phase of a muscle action is when the force generate by a muscle is inferior to the external load. This is characterised by a lengthening of the muscle even though an actin-myosin cross bridge is formed. In this instance when actin separates from myosin it is regarded as a mechanical separating rather than chemical (Flint Hurst, 1978). In contrast, a concentric muscle action involves the actin filaments being pulled over the myosin filaments as the muscle shortens. This is commonly known as the Sliding Filament Theory (SFT).ÂÂ   SFT refers to the movement of actin and myosin sliding over one and other. (Baechle Earle, 2000). Cross bridges are separated through the splitting of an Adenosine Tri Phosphate molecule, thus making it a chemical reaction rather than mechanical. This is a more energy dependant process and should result in less trauma to the muscles. Eccentric muscle action, when used in a resistance training setting has been shown to improve neural activation (Enoka, 1996), muscular strength (Hortobagyi, 1996) and increase muscle size (Vikne et al, 2006). Enoka (1996) goes on to suggest that muscles become more resistant to fatigue when working eccentrically. Placing emphasis on the eccentric phase of an exercise has been proven in some studies to be effective at improving strength than an even split of eccentric/concentric (Brandenburg Docherty, 2002). Research has been conducted to examine the physiological and metabolic effects of concentric actions versus eccentric muscle actions. A study by Hollander et al, (2008) examined if contraction type (Eccentric/Concentric) or load (Absolute/Relative) has a greater metabolic impact on resistance exercise. Seven resistance trained men were included in the study. Their concentric 1 rep max determined for several exercises then their 1 rep max for eccentric was estimated at 20% greater. On completion of the initial 1 rep max testing, participants completed a further 2 bouts of maximum lifts in a random order: concentric only lift and an eccentric only lift. They were then assessed on rating of perceived exertion, pain rating and heart rate. Tests were conducted to take samples of blood PRE/POST exercise, and 15 minutes after exercise had finished to identify lactate and cortisol levels. To analyse the data, a repeated-measure ANOVA was used. No differences were noted between concentric and eccentric trials for pain rating and perceived exertion. Heart rate was significantly higher in every exercise except lat pulldown. Levels of lactate were significantly higher directly post exercise and 15 minutes after following concentric training compared to eccentric training. The study shows that at a relatively lower intensity, concentric and eccentric training show similar rate of perceived exertion pain perception under a relative load (%eccentric1RM= %concentric1RM +20%).ÂÂ   This suggests that you can overload the eccentric phase of an exercise with 20% more than the concentric phase and the body is not negatively affected. Heart rate was maintained at a lower threshold throughout training apart from in one instance despite the eccentric phase holding a 20% greater load. This potentially indicates that eccentric exercise could be deemed as a safer modality of exercise than concentric Enoka (1996) conducted a study highlighting the differences in concentric and eccentric muscle actions in regards to neural activity. Previous studies suggest that neuralogical factors can augment strength gains in trained (Edgerton et al, 1986) and untrained individuals (Komi, 1986) whilst also increase the efficiency in which they can lift sub-maximal loads (Ploutz et al, 1994). It is also noted that neural factors increase the synchronization of motor units (Milner-Brown et al, 1975). A motor unit is defined as motoneuron and all its associated fibres (Bachle Earle 2002). An action potential is passed through the motor neuron, this releases a hormone which passes across a neural junction resulting muscle fibre activation (Baechle Earle, 2000). To increase the force generated by a muscle, motor unit activation must increase frequency, or recruit more motor units at once. Usually motor units activate in a uniform sequence, inferior unitsÂÂ   activate first with superior units coming in to play when the external load becomes too great, commonly termed as the size principal (Baechle Earle, 2000). In order to generate maximum force, it is necessary for all of the motor units within a muscle to activate. In most people the size principle applies, lower threshold units being activated then the higher threshold as the load increases. Some research suggests that resistance exercise increases the efficiency that a person can recruit the higher threshold motor units (Sale, 1987). Enoka (1996) goes on to suggest that this differs for muscles working eccentrically. Research has identified that it is not likely to recruit all motor units during maximum eccentric contraction despite that fact that eccentric strength is usually 20% greater than concentric (Tesch et al, 1990). Aims Previous literature suggests that the strength of the eccentric portion of an exercise can be anything up to 120% greater than that of concentric (Hortobagyi, 1990). Current literature also proposes that eccentric and concentric training illicit different training responses and therefore could produce different muscular adaptations (Baechle Earle, 2000). From the previously mentioned literature, the following was hypothesised: Eccentric 1 Rep Max bench press will yield greater strength than concentric. Objectives The main objective of this proposal is to quantify the differences in eccentric and concentric bench press scores. Methodology Participants Twenty six males between the ages of 18 and 31 who have been taking part in resistance training for over 1 year volunteered for the study. For the purposes of this study resistance training experience is defined as having regularly trained bench press( 1p/w) over the year leading up to the study. Volunteers for the study where students recruited from sport and exercise science classes at The University of the West of Scotland, Hamilton Campus. It was required of the students involved in the study to firstly complete a Physical Activity Readiness Questionnaire to ensure that they were physically fit enough to engage in the study. It was also required of the students to complete an Informed Consent document outlining how the study would be carried out, how it affects them and highlighting that they have the right to withdraw themselves at any time. Exclusion criteria from the study included: orthopaedic injuries, hypertension, cardiovascular issues and abuse of anabolic agents. Current dietary intake will not be monitored throughout the study, but it will have to remain consistent throughout its entirety. Once the study begins, participants may not take part in any resistance training out with study. The assumption is made that all participants will follow all testing protocols relayed to them for completion out with the laboratory. The participant is also required to abstain from exercise that is greater than the needs for daily living during the testing period. They must also refrain from taking any ergogenic supplements or making dietary changes throughout the testing period. Protocol The study will consist of 3 testing sessions over an 8-week period. Testing will be conducted in the strength and conditioning laboratory in the University of the West of Scotland, Hamilton Campus. Participants will be split into 2 even groups for testing, concentric and eccentric. Participants will be prompted to complete an informed consent document providing their approval to take part in the study. Once the document is completed and reviewed, anthropometric measurements will be taken: weight, height and body composition. Following anthropometric measurements, participants will perform a cardiovascular warm up on a cycle ergometer for (90RPM 5 minutes). This will be followed by an incremental warm up protocol for bench pressing (10,5 and 3 repetitions). The weight used here will be self-selective and should increase with every set (Baechle Earle, 2000). All three testing sessions will include the cardio vascular warm up, bench press warm up followed by 1 Rep Max testing in eithe r eccentric/concentric bench press, depending on what group the individual has been placed in. Participants will be allowed to have a few practice attempts with an unloaded barbell to familiarise themselves with how the testing will operate. The concentric group will perform their lifts by lying supine on a bench from the chest until they can fully straighten their arm, extending the elbow. The bar will be lowered down to their chest prior to each rep to ensure that only a concentric muscle action is being measured. This will be done via a pulley system and two additional spotters positioned at either end of the barbell. When the participant is unable to completely straighten the arms to complete the concentric bench press, the repetition will be deemed a failed rep. The eccentric bench press will involve the slow and controlled lowering of a barbell from full extension down to the chest. It should take the participant three seconds to perform this movement and tempo will be kept with a metronome to help to identify successful reps. On completion of a rep the barbell will be returned to the original position via pulley system and assistance from spotters. If the participant is unable to control the descent of the bar, allowing it to touch their chest before the 3 seconds ends the repetition n will be classed as a failure. To ensure that all the participants are safe, stringent measure will be taken. Spotters will be used during all exercise sets, warm up and testing. The pulley system will be lowered to the appropriate height for each user, this will be marked to ensure consistency with the operator. Chalk will be made available on request to reduce the likelihood of the barbell slipping from the hands. Statistics All data collected in the study will be analysed using an SPSS software. The data will be initially inspected to make sure it is acceptable. The mean and standard deviation will be calculated using a paired T test which will help to identify if there is a significant difference between concentric one repetition maximums and eccentric. References Baechle, T.R., Earle, R.W. (eds.). (2000). Essentials of Strength Training and Conditioning, 2nd Edition. Human Kinetics, Champaign, IL. Brandenburg, J.P., and Docherty, D. (2002). The effects of accentuated eccentric loading on strength, muscle hypertrophy, and neural adaptations in trained individuals. Journal of Strength and Conditioning Research, 16(1), 25-32. Lohman, E.C., Cussler, T.G., Going, S.B., Houtkooper, L.B., Metcalfe, L.L., Teixeira, P.J. (2003). Weight lifted in strength training predicts bone changes in postmenopausal women. Medicine and Science in Sport and Exercise, 35(1), 10- 17 Edgerton, V.R., Roy, R.R., Gregor, R.J., Rugg, S. (1986). Morphological basis of skeletal muscle power output. In: Human Muscle Power, N.L. Jones, N. McCartney, A.J. McComas, eds. Champaign, IL: Human Kinetics. 43-64. Enoka, R.M. (1996). Eccentric contractions require unique activation strategies by the nervous system. Journal of Applied Physiology, 81(6), 2339-2346 Flitney, F.W., and Hirst, D.G. (1978). Cross-bridge detachment and sarcomere give during stretch of active frogs muscle. Journal of Physiology, 276, 449-465 Hollander, D.B., Kilpatrick, M.W., Ramadan, Z.G., Reeves, G.V., Francois, M., Kraemer, R.R. (2008). Load rather than contraction type influences rate of perceived exertion and pain. Journal of Strength and Conditioning Research, 22, 1184-1193. Hortobagyi, T., Devita, P., Money, J., Barrier, J. (2001). Effects of standard and eccentric overload strength training in young women. Medicine and Science in Sports and Exercise, 33(7), 1206-1212 Hortobagyi, T., Hill, J.P., Houmard, J.A., Fraser, D.D., Lambert, N.J., Israel, R.G. (1996). Adaptive responses to muscle lengthening and shortening in humans. Journal of Applied Physiology, 80(3), 765-772. Janssen, I., Heymsfield, S.B., and Ross, R. (2002). Low relative skeletal muscle mass (sarcopenia) in older persons is associated with functional impairment and physical disability. Journal of American Geriatric Society, 50, 889-896. Jones, Gareth. Strength Training. 1st ed. London: Dorling Kindersley, 2009. Print Jurca, R., Lamonte, M.J., Barlow, C.E., Kampert, J.B., Church, T.S., and Blair, S.N. (2005). Association of muscular strength with incidence of metabolic syndrome in men. Medicine and Science in Sports and Exercise, 37(11), 1849-1855 Komi, P.V. (1986). Training of muscle strength and power: interaction of neuromotoric, hypertrophic, and mechanical factors. International Journal of Sports Medicine, 7, 10-15. Levinger, I., Goodman, C., Hare, D.L., Jerums, G., Selig, S. (2007). The effect of resistance training on functional capacity and quality of life in individuals with high and low numbers of metabolic risk factors. Diabetes Care, 30(9), 2205-2210 McArdle, William D, Frank I Katch, and Victor L Katch. Essentials Of Exercise Physiology. 1st ed. Print. Metter, E.J., Talbot, L.A., Schrager, M., Conwit, R. (2002). Skeletal muscle strength as a predictor of all cause mortality in healthy men. Journal of Gerontology, 57(10), 359-365 Milner-Brown, H.S., Stein, R.B., Lee, R.G. (1975). Synchronization of motor units: possible roles of exercise and supraspinal reflexes. Electroencephalography and Clinical Neurophysiology, 38, 245-254 Ploutz, L.L., Tesch, P.A., Biro, R.L., Dudly, G.A., (1994). Effect of resistance training on muscle use during exercise. Journal of Applied Physiology, 76, 1675-1681 Rosete, Fernando A. et al. Eccentric, Concentric, And Isometric Strength In Trained And Untrained Older Adults. Medicine Science in Sports Exercise 47 (2015): 24-25. Web. Sale, D.G. (1987). Influence of exercise and training on motor unit activation, Exercise Sport Science Reviews, 15(1), 95-151. Tesch, P.A., Dudley, G.A., Duvoisin, M.R., Hather, B.M., Harris, R.T. (1990). Force and EMG signal patterns during repeated bouts of concentric or eccentric muscle actions. Acta Physiologica Scandinavica, 138, 263-271. Vikne, H., Refsnes, P.E., Ekmark, M., Medbo, J.I., Gundersen, V., Gundersen, K. (2006). Muscular performance after concentric and eccentric exercise in trained men. Medicine and Science in Sports and Exercise, 38(10), 1770-1781

Friday, October 25, 2019

DNA Molecule :: Biology, The Mitochondrial Cyt B

Haruan Channa striatus is in great demand in the Malaysian domestic fish market. Therefore, detailed knowledge of the genetic diversity and population genetics of Haruan C. striatus are needed for sound management, conservation, stock identification and successful fishing of the species. Haruan, the local name for the snakehead Channa striatus is an obligate freshwater fish of the family Channidae, which has important economic value as food fish, and has pharmacological properties as well as medicinal value (Mat Jais, 1991, 2007a, 2007b; Rahim et al., 2009; Jamaluddin et al., 2011). Haruan C. striatus can be morphologically distinguished based on coloration, meristics and morphometrics (Mat Jais, 1991; Rahim et al., 2009), as well as the distribution of scales on the underside of the lower jaw, and the morphology of the suprabranchial organs and a sharp pointed ridge at the mid-ventral part of isthmus (Vishwanath and Geetakymari, 2009). The wild species found in small rivers, lakes, pools and shallow water bodies where agro-chemicals are applied in their natural habitats can survive in harsh environments with low dissolved oxygen and high ammonia (Rahim et al., 2009; Jamaluddin, 2011). Haruan C. striatus in particular has a diploid chromosome number of 2n = 42, with a karyotype composed of 6 metacentric, 2 acrocentric and 34 telocentric chromosomes, NF=50, without heteromorphic sex chromosomes (Supiwong et al., 2009). The mitochondrial cyt b is one of the most important proteins encoding genes on the heavy strand of the mtDNA molecule, which has been widely used in molecular marker techniques for many applications to access intra- or interspecies genetic diversity, genetic variation, phylogeography, species and hybrid identification, phylogeny in numerous species and genera, population genetic structure, conservation and demographic history (Hsu et al., 2009; Li et al., 2009, Ma et al., 2010; Thangaraj and Lipton, 2010). Due to the potential of Haruan C. striatus previous studies have analyzed the genetics of this species at the morphological, biological, diet, physiological, biochemical composition, ecological and chromosomal level for breeding programs and medical and pharmaceutical activities for anti-microbial, antiinflammatory, cell proliferation, induction of platelet aggregation and anti-nociceptive properties (Mat Jais, 2007b; Rahim et al., 2009; Supiwong et al., 2009; Dahlan-Daud et al., 2010; Jamaluddin et al., 2011). In recent years, preliminary analysis of Haruan C. striatus populations has been examined based on different molecular markers, such as analysis of mitochondrial mtDNA (Abol-Munafi, 2007; Lakra et al., 2010; Jamaluddin et al., 2011), randomly amplified polymorphic DNA (RAPD; Ambak et al., 2006) and allozyme markers (Hara et al., 1998). Restriction fragment length polymorphism (RFLP) has been proven to be a successful method in studying the population genetic structure and differentiation of many fish, such as skipjack tuna

Thursday, October 24, 2019

A Cultural Comparison of English and Chinese Family Names

Abstract The family names of humans are formed and used in the long process of the course of history and the development of society. Family names, being a part of culture, are closely related to history and culture. English and Chinese names are different in their origins and name orders, which is certain to be reflected in their perspective culture.Therefore an exploration of their reflections in the cultural aspects of historical development, feudal history, historical tradition, historical influence and current social situation will be beneficial for the deepening of English study and the mutual understanding and communication of the East and the West. Keywords: Cultural comparison, English family names, Chinese family names, Origin, Name order The word â€Å"culture† comes from the Latin root â€Å"colere† (to inhabit, to cultivate, or to honor).In general, it refers to human activity; different definitions of culture reflect different theories for understanding, or criteria for valuing, human activity. Culture is traditionally the oldest human character, its significant traces separating Homo from australopithecines, and Man from the Animals, though new discoveries are blurring these edges in our day. Sir Edward B. Tylor wrote in 1871 that â€Å"culture or civilization, taken in its wide ethnographic sense, is that complex whole which includes knowledge, belief, art, morals, law, custom, and any other capabilities and habits acquired by man as a member of ociety† while a 2002 document from the United Nations agency UNESCO states that culture is the â€Å"set of distinctive spiritual, material, intellectual and emotional features of society or a social group and that it encompasses, in addition to art and literature, lifestyles, ways of living together, value systems, traditions and beliefs†. [UNESCO, 2002].It is generally accepted that language is part of culture. It carries culture, thus be influenced by culture. Names includin g family names, which is a part of language, are sure to reflect the distinct culture of the people using it.This paper intends to start from the English and Chinese family names from the perspectives of the origin and order so as to reveal their reflections on their own culture. A family name (in Western contexts often referred to as a last name or surname) is part of a person's name indicating the family to which the person belongs. A family name is the most fundamental and most significant symbols showing the identification of the members of a society. The use of family names is widespread in cultures around the world, which means family names are part of culture.As far as English and Chinese names are concerned, their cultural differences can be shown in the origins of their family names and the different orders of their names so as to make us learn about the development history of a society or a nation and some other aspects of its culture, which is the purpose of this paper in tending to make an analysis between English and Chinese family names from their cultures reflected. 1. Cultural reflections of the origins of family names If we trace back into the origins of Chinese family names, we can see that Chinese family names are closely related to the development history of the Chinese nation.According to legend, family names started with Emperor Fu Xi in 2852 BC. His administration standardized the naming system in order to facilitate census-taking, and the use of census information. For scientific documentation that matrilineal surnames existed in China before the Shang Dynasty (1600-1046 BC) and that â€Å"by the time of the Shang Dynasty they (Chinese surnames) had become patrilinea. † Therefore, what we can learn first is that the ancestors of the Chinese nation came from primitive society.When the Chinese nation went into class society, the emperors had the supreme powers in their hands in awarding lands and fields to those ministers who perfor med meritorious service to their reigns, establishing official positions. Their supreme power was best exemplified in granting a surname to a person when he was alive or after his death. In addition, in feudal societies, the emperors’ names was a taboo on every occasions. The origins of family names also showed that Chinese nation actually is combination of multiple nationalities, which is the same case for the British and American people.As for English family names, 226 ISSN 1911-2017 E-ISSN 1911-2025 www. ccsenet. org/ass Asian Social Science Vol. 6, No. 11; November 2010 they have a relatively short history. Documents indicate that surnames were first adopted among the feudal nobility and gentry, and only slowly spread to the other parts of society. In Britain, hereditary surnames were adopted in the 13th and 14th centuries, initially by the aristocracy but eventually by everyone. By 1400, most English and Scottish people had acquired surnames, but many Scottish and Welsh people did not adopt surnames until the 17th century, or even later.Henry VIII (1491–1547) ordered that marital births be recorded under the surname of the father. The whole process lasted for 500 years. However, English family names differ from Chinese family names in their civilians consciousness, which can be shown in the casual choice of their family names for even a nickname, childhood name like Fox, Stout, Armstrong, Longfellow can be a person's family name. The origins of English family names can show their love for nature, respect for and sentimental attachment to everything in it. English family names like Bird, Lion, Swan, Wood, Wolf, Bush, Flower, Rose and Apple are such examples.Their family names also indicated that English people are characterised by the pursuit for novelty and oddness without an exception of their family names. According to a survey made in 1974, there were as many as 1,280,000 family names in America, among which more than 1/3 were those that had never been used before, which was obviously a result of Americans' unconventional and original personality. 2. Cultural reflections of the order of family names 2. 1 Reflection of perspective feudal history The nations with a name order of family names preceding given names usually have a long feudal history.The Han nationality have a feudal history of more than 2,500 years, which started from the Western Zhou (1066 – 771 BC)or Eastern Zhou (770 – 256 BC) Chinese society to the Opium War in1839. However, the feudal history of those nations with a name order whose given names precede family names is relatively short. Great Britain is a case in point. It only had a short feudal history of several hundred years. From the 9th century to the 11th century, Britain was still on its way to feudalization and there exited a large number of free farmers.It was only after the Norman Conquest of 1066, the feudal system was widely established in Britain. However, only several hu ndred years later, in the 14th century, its feudal system was disintegrated. When it came to the 16th century, the capitalism was widely developed, which directly led to the British Bourgeois Revolution in the 17th century. To sum up, the feudal history of Britain is very short with no more than 500 years, but its capitalism was developed quite early. 2. 2 Reflection of perspective historical traditionThe nations with a name order of family names preceding given names usually have a long feudal history, in which there wasn’t any democratic tradition and everything was determined by the will of the supreme emperors. Therefore, in those nations, given names which represent a person himself can only be put behind family names which stand for home ownership. In China, from the very beginning of family names, they were put before given names and the tradition lasted for more than 2,500 years. In these nations, although the choice of a person’s given names has always been ch anging with the era, the order of names has always been stable.On the contrary, the British and American people had their democratic tradition even in the feudal reign, which made these nations strengthened more on individual roles. Therefore, their given name which stands for the individual himself was always put before their family name which is a representation of their family. 2. 3 Reflection of their historical influence Chinese name order has a direct influence on that of its neighbouring countries like Korea, Vietnam and Japan because of its 5,000 year history of civilization. China's naming system came into being as early as the reign of Emperor Fu Xi.Its neighbouring countries like Korea, Vietnam and Japan either had long been its dependent country or using Chinese characters as their own language. They were greatly influenced by its culture. Similarly, these countries all had a long feudal history, had no democratic tradition, bordered China, used Chinese characters. There fore it was no wonder that they were sure to be influenced Chinese cultures including naming system. However, the English name order was influenced by Roman Republic in its early time. Rome became a republic in about B. C. 510.From then on, the civilians had constant fights against nobility for their rights, which was the origin of their democratic tradition. Because at that time, ancient Rome was the number one civilized country in Europe and in the course of its development it constantly expanded its territories and formed its hegemony in the Mediterranean in the 2nd century B. C. , therefore, its democratic tradition had a great influence on the formation of the national psychology of the whole Europe. Ancient Romans' name was spelled in Latin, and freeman’s name was formed by given name plus tribe or clan name, which was actually their family name.Take the famous Great Emperor Caesar of ancient Rome for example, his name was formed by three parts, that is Caius, Julius Pu blished by Canadian Center of Science and Education 227 www. ccsenet. org/ass Asian Social Science Vol. 6, No. 11; November 2010 and Caesar. With the development of history, the middle name which was one's clan name disappeared with the diminishing power of clan. The Roman name order which strengthened individual role was widely accepted in the Miderterranean with its expansion in this area.The Latin language which was spoken by ancient Romans first replaced other languages in this area but then split into Italian, French, Portugese and Spanish with the fall of the Roman Empire. Because these languages all have Latin origin, it's natural that the name order of the Latin language permeated into their languages. 3. Reflection of current social situation Family names are not only used for addressing people, they also reflect social realities at that time. In China’s ancient Zhou Dynasty, having or not having a family name showed the contradictory relation between the ruling clas s and the working class.Before the establishment of the People's Republic of China, Chinese women followed their husband’s family name by abandoning their original family name, which showed the feudal prejudice against and bondage upon them. After the establishment of the P. R. C. , the social status of Chinese women has been greatly improved and been considered â€Å"half sky†, they can keep their own family name when they get married. However, in England and cultures derived from there, there has long been a tradition for a woman to change her surname upon marriage from her birth name to her husband's last name.From the first known US instance of a woman keeping her birth name, Lucy Stone in 1855, there has been a general increase in the rate of women keeping their original name. This has gone through periods of flux, however, and the 1990s saw a decline in the percentage of name retention among women. As of 2004, roughly 90% of American women automatically assumed t heir husband's surname upon getting married. Even in families where the wife has kept her birth name, parents traditionally choose to give their children their father's family name.Although in America, there was a great change for married women traditionally known as Mrs [Husband's full name] into a modern Mrs [Husband's last name], the incompleteness of women's liberation can still be shown from this. To sum up, family names are not only a sign for a person but reflect culture from different aspects. And a comparison of English and Chinese family names can make us learn about the cultural differences shown from the origins and name orders, which is good for the deepening of the study of English as well as helps to promote the mutual understanding and communication of the East and the West.

Tuesday, October 22, 2019

Child Sexual Abuse effects Essays

Child Sexual Abuse effects Essays Child Sexual Abuse effects Essay Child Sexual Abuse effects Essay Feb. 2012. Web. 23 Feb. 2013.. Currie, Janet, and Erdal Tekin. Does Child Abuse Cause Crime? IZA, Apr. 2010. Web. 23 Feb. 2013.. Garsden, Peter. Does Child Abuse Cause Crime? Inside Time Newspaper. N. p. , June 2012. Web. 01 Mar. 2013.. Impact of Child Abuse and Maltreatment on Delinquency, Arrest and Victimization. National Institute of Justice. N. p. , n. d. Web. 23 Feb. 2013.. Logan, Cassandra, Emily Holcombe, Suzanne Ryan, Jennifer Manlove, and Kristin Moore. Child Sexual Abuse and Teen Pregnancy. Nationa Campaign to Prevent Teen and Unplanned Pregnancy, Sept. 2011. Web. 23 Feb. 2013.. National Child Abuse Statistics. Prevention and Treatment of Child Abuse. Child Help, n. d. Web. 01 Mar. 2013.. Parental Substance Abuse. Child Welfare Information Gateway. N. p. , 2010. Web. 23 Feb. 2012.. Preventing Child Sexual Abuse. Preventing Child Abuse America, n. d. Web. 23 Feb. 2013.. Understanding Child Sexual Abuse: Education, Prevention, and Recovery. Understanding Child Sexual Abuse: Education, Prevention, and Recovery. American Psychological Association, n. d. Web. 23 Feb. 2013..

Monday, October 21, 2019

Presidents power essays

President's power essays Today the office of the United States President is considered the most powerful elected position in the world. Unfortunately it was not always so powerful. In 1789 the United State was a nation of only four million people. It had a new and untried government and also it had an agricultural economy and a tiny army and navy. Today the United States is a fine industrial nation with one of the largest forces in the world. As the power of the nation grown, so has the power of the president. The growth of the presidential power is in both domestic affairs and foreign affairs. When the Constitution was written, the purpose of the executive branch was to have the same amount of power as the other two branches. Many historians believe that the president has become more powerful the Congress or the Supreme Court. The president has many roles to play as a chief executive, military leader, legislative leader, diplomatic leader and ceremonial leader. In the Constitution it says that the president shall be chief executive, or head of government. The president directs the work of cabinet heads and supervises agencies that make up the executive branch. The enforcement of all-federal laws and programs is the responsibility of the president. The presidents chief responsibility includes giving leadership to organization and recommending a workable budget to Congress. The president is the commander in chief of the armed forces. The president must approve the most important military decision. In the role of legislative leader, the president either signs or vetoacts of Congress. The president recommends new laws in an annual and the state of the Union addresses. Another legislative power is the presidents ability to call Congress into special session after it has adjourned for the year. Another power that the Constitution gives to the president is to make treaties, with the approval of two th ...

Sunday, October 20, 2019

Edgar Allan Poes Philosophy of Death

Edgar Allan Poe's Philosophy of Death Ralph Waldo Emerson once wrote: Talent alone cannot make the writer. There must be a man behind the book. There was a man behind The Cask of Amontillado, The Fall of the House of Usher, The Black Cat, and poems like Annabel Lee and  The Raven. That man- Edgar Allan Poe- was talented, but he was also eccentric and prone to alcoholism- having experienced more than his share of tragedies. But, what stands out even more prominently than the tragedy of Edgar Allan Poes life is his philosophy of death. Early Life Orphaned at the age of two,  Edgar Allan Poe was taken in by John Allan. Although Poes foster father educated him and provided for him, Allan eventually disinherited him. Poe was left penniless, earning a meager living by writing reviews, stories, literary criticism, and poetry. All of his writing and his editorial work was not enough to bring him and his family above the level of mere subsistence, and his drinking made it difficult for him to hold a job. Inspiration for Horror Arising from such a stark background, Poe has become a classical phenomenon, known for the gothic horror  he created in The Fall of the House of Usher and other works. Who can forget The Tell-Tale Heart and The Cask of Amontillado? Every Halloween those stories come to haunt us. On the darkest night, when we sit around the campfire and tell horrible tales, Poes stories of horror, grotesque death, and madness are told again. Why did he write about such horrible events? About the calculated and murderous entombment of Fortunato, as he writes, A succession of loud and shrill screams, bursting suddenly from the throat of the chained form, seemed to thrust me violently back. For a brief moment- I trembled. Was it disillusionment with life that drove him to these grotesque scenes? Or was it some acceptance that death was inevitable and horrible, that it sneaks up like a thief in the night, leaving madness and tragedy in its wake? Or, is it something more to do with the last lines of The Premature Burial? There are moments when, even to the sober eye of Reason, the world of our sad Humanity may assume the semblance of a Hell... Alas! The grim legion of sepulchral terrors cannot be regarded as altogether fanciful... they must sleep, or they will devour us- they must be suffered to slumber, or we perish. Perhaps death offered some answer for Poe. Perhaps escape. Perhaps only more questions- about why he still lived, why his life was so hard, why his genius was so little recognized. He died as he had lived: a tragic, pointless death. Found in the gutter, apparently the victim of an election gang who used alcoholics to vote for their candidate. Taken to a hospital, Poe died four days later and was buried in a Baltimore cemetery next to his wife. If he was not well-loved in his time (or at least not as well-appreciated as he might have been), his tales at least have taken on a life of their own. Hes recognized as the founder of the detective story (for works like The Purloined Letter, the best of his detective stories). He has influenced culture and literature; and his figure is placed beside the literary greats in history for his poetry, literary criticism, stories, and other works. His view of death may have been filled with darkness, foreboding, and disillusionment. But, his works have lasted beyond the horror to become classics.

Saturday, October 19, 2019

Creating a dream job Essay Example | Topics and Well Written Essays - 2000 words - 1

Creating a dream job - Essay Example The above compensation package is fit for Ngallas bed and breakfast employees because the employees have achieved significant objectives in the past year. A firm’s employees are supposed to be provided with attractive packages as a strategy to retain the best performing employees (Tropman, 2002). Ngallas bed and breakfast’s employees are warranted to have attractive compensation packages if they meet the bed and break fast’s objectives in terms of saving costs or adding to the company’s profits. The other area that warrants for the compensation package are efforts employees have put in place to increase turnover, efficiency, saving time and cost reduction measures. For the past one year, Ngallas bed and breakfast managers have worked hard to ensure that employees are trained. In addition employees efforts have saved time and costs. Employees have done this to increase the bed and breakfast’s margins to cater for the remuneration. The compensation package is justified by the additional duties that employees have embraced to ensure to improve the bed and breakfast’ profits. Employees have gone to the extent of doing tasks that are supposed to be handled by subordinate staff in cases where the subordinates are absent. This is compatible with the teamwork spirit in the bed and breakfast. In the recent past, Ngallas bed and breakfast employees have put in exemplary efforts to ensure that, the spirit of team work achieves results.The efforts have improved the company’s fortunes. This effort has led to Ngallas bed and breakfast to attain high profit margins and increase its customer base. This outcome has been instrumental in justifying the compensation attractive compensation packages.Ngallas bed and breakfast has realized that, the best way to improve performance is to provide enough compensation incentives. Incentives motivate

Friday, October 18, 2019

Law and Ethics of Consent from Children in Medicine Essay

Law and Ethics of Consent from Children in Medicine - Essay Example In law children are those under 18 years of age. When ever providing consent for medical treatment, according to the age of the child there is a variance of treatment. The Family Reform Act of 1969 provides that, †the consent to treatment of a 16 or 17 year old is to be treated like the consent of an adult†( FRA 1969). Minors in some places are deemed incompetent and are not given the right to consent. In England, one can challenge the presumption of incompetence on the basis of proving that the minor is mature enough to understand the procedures and the outcome. However, whenever the minor is considered incompetent, the informed consent is required from the parents. This has no application to a refusal of medical treatment or to non-therapeutic procedures like organ or blood donation. For those children under 16 there is precedent in case law governing consent to treatment. The law was set out in the case of Gillick v West Norfolk and Wesbech AHA [1986] AC 112, the court held, â€Å"that if a minor has sufficient intelligence and understanding to enable him/her to understand the treatment and implications of treatment then he/ she is Gillick competent and can consent to treatment†( Gillick) The Human Rights Act 1998, which came fully into force on 2 October 2000, incorporates into UK law the bulk of the substantive rights set out in the European Convention on Human Rights: of particular relevance to this area Article 2, the right to life, Article 3,m the right not to be subjected to inhuman or degrading treatment, and Article 8, the right to respect for private and family life† (HRA 1998)

Market analysis in Abu Dhabi Research Paper Example | Topics and Well Written Essays - 1250 words

Market analysis in Abu Dhabi - Research Paper Example Abu Dhabi is the biggest of all seven emirates in UAE as well as the capital of the country. The population of the city is about 1.3 million out of 3.8 million of UAE and also covers the 87% of the entire area. The city has a booming retail real estate market for residential buildings, offices other tourism places. The real estate market condition in the United Arab Emirates is, as a whole, facing a boom. It has the most secure and profitable market in whole Gulf region. Abu Dhabi is currently enjoying real estate investment from all over the world. The Abu Dhabi market possesses number of opportunities in the real state sector. It has been difficult for the authorities to meet the ever rising demand for real estate projects in the city.This paper presents an overview of economy, demographics and real estate of the retail market growth in the UAE region. It primarily illuminates the major retail real estate markets of Abu Dhabi, reflects on existing and future demand and supply, and provides recommendation for stabilization in the sector.UAE came into being as a result of alliance of seven emirates and Abu Dhabi was made the capital of the state. Abu Dhabi has supremacy in almost all fields i.e. economically and geographically etc. Abu Dhabi covers approximately 87% of total UAE area. According to a census that took place in 2005 the official population of UAE was 3.8 million approximately while the Abu Dhabi population was around 1.3 million. 300,000 people were those non-nationals who did not become a part of the census (Emirates: Abu Dhabi-Country Profile). Economy UAE is one of largest oil and gas producing countries of the World. It has 9% of oil reserves and approximately 5% of gas reserves. Abu Dhabi has the predominant share in these reserves i.e. 95% and 92% of oil and gas reserves. Like almost every Middle East country natural resources are the back bone of economy of UAE. The IMF report says that the GDP group of UAE is around 12% in 2005 and expectedly more in near future (Emirates: Abu Dhabi-Country Profile). The government of UAE, however, does not want to rely completely on oil and gas due to the fluctuation in its prices. It has been focusing on minimizing the country's economic reliance on oil and gas exports. With the government efforts and local and foreign investment in real state retail, tourism and industry the 64% of GDP now consists of non oil and gas sector. The government put huge investment and established Abu Dhabi Tourism Authority (ADTA) and that has been handled by the Tourism and Development Investment Company (TDIC) to promote tourism and real estate sector. Hence, the economy is moving towards the right dimension in the whole UAE and especially Abu Dhabi, which is undergoing rapid economic growth due to huge foreign and local investment in the country from banks and financial institutions (Emirates: Abu Dhabi-Country Profile). . Real Estate The current boom in the real state market of the United Arab Emirates took place over the last few years and has made a significant difference to the economy. The ratio of real state was 2.5% of the economy which has reached to10.5% (Walters, Kadragic and Walters 78). The real estate is one of those sectors contributing heavily to the overall economy. This huge investment reflects the government interest in the development of real estate market. The whole Gulf region is showing its keen interest in developing its economy while supporting the real estate sector. Abu Dhabi attracts abounding investment from the region in its real estate market. Al-Futtaim is going to launch project of $9.5 billion. That would take approximately 10 years to be done. The project includes residential, commercial, hotel and several office towers (Woods) REAL ESTATE RETAIL MARKET IN ABU DHABI . Abu Dhabi is a different market than any other market in the region for instance Dubai, Sharjah etc. The city is ideal because of its property market and pricing that also

The United Nations Mission In Sierra Leone Essay

The United Nations Mission In Sierra Leone - Essay Example   At the beginning of 1995, the UN Secretary General appointed Mr. Berhanu Dinka, an Ethiopian national to help broker a peaceful settlement in Sierra Leone.   Dinka worked with the help of the Organization of African Union (OAU) and Economic Community of West African State (ECOWAS) to resolve this conflict and bring the country back to civilian rule. Mr. Dinka’s effort, together with ECOWAS and OAU, seemed to bear fruit as of February 1996, just a year after the war. Parliamentary and presidential elections were held, and the army ceded power to the winner, Alhaji Dr. Ahmed Tejan Kabbah. However, RUF refused to take part in the elections and declined to recognize Mr. Kabbah’s win. Their refusal to participate or accept the presidential and parliamentary election fuelled the war further.   In November 1996, Mr. Dinka, with the help of OAU and ECOWAS, assisted in the negotiation of the peace agreement between the government and RUF, commonly known as the Abidjan Ac cord.   However, the accord was not implemented immediately as it was derailed by another coup d’à ©tat 6 months later. At this time, the army also joined RUF and formed a ruling junta, forcing the president and his government to seek asylum in Guinea.   A new Special Envoy tried to persuade the military junta to cede power, but he failed. This forced the United Nations Council to impose sanctions on the rulers and allowed ECOWAS to implement the embargo using its military wing. 7 On October 23, 1997, a sub-committee of ECOWAS dealing with Sierra Leone met a delegation of the junta and held talks in Conakry, which led to the signing of a peace deal. This deal called for a ceasefire that was to be monitored by ECOMOG together with the UN military observers. On November 5, 1997, President Kabbah provided a communique accepting the new deal and said his government would work with ECOWAS, ECOMOG, UN, and the UNHCR to implement the new deal. However, although the junta said i t was committed to the agreement, it criticized some provisions of the agreement. This brought many questions than answers and as a result, the agreement was not implemented. 8 Due to continued conflict between the rebels and the government, the UN Security Council gave nod for the establishment UNAMSIL (United Nations Mission in Sierra Leone). The mandate of the mission was to help the government and the rebels to honor the Lome Peace Agreement. On February 7, 2000, the Security Council revised the mandate of UNAMSIL by adding more tasks. The military component was increased

Thursday, October 17, 2019

Identity Formation and the Bordelandsof Self Essay

Identity Formation and the Bordelandsof Self - Essay Example g thought-provoking complicated autobiographical work that has significantly led to the construction of Chicana and â€Å"mestiza† collective identity. The author narrates her experience of spiritual awakening and growth as well as her introduction to self knowledge. This experience is not for her consumption alone. The author also delineates the social implications of spirituality as a source of power for all Chicanas. Anzaldua’s concept of spirituality is central to â€Å"la mestiza’s† cultural experience defined by the borderlands. Let us now asses the relevance of the concept of â€Å"borderland†. Literally, the term refers to the borders between Mexico and the United States. The term â€Å"border† brings to mind the war between these tow countries which culminated in the annexation of Texas to the US in the 19the century. This annexation, ironically, has resulted in the Chicanos becoming second-class citizens in their own country. Gringos in the US Southwest consider the inhabitants of the borderlands – transgressors, aliens, whether they possess documents or not, whether they are Chicanos, Indians or Blacks. Do not enter; trespassers will be raped, maimed, strangled, gassed, shot. The only â€Å"legitimate† inhabitants are those in power, the whites and those who align themselves with whites. Consider the plight of Pedro, a Chicano in the following extract from Anzaldua’s text: â€Å"In the confusion, Pedro ran, terrified of being caught. He couldn’t speak English, couldn’t tell them he was fifth-generation American. Sin papeles – he did not carry his birth certificate to work in the fields La Migra took him away while we watched. Se lo llevaron. He tried to smile when he looked back at us, to raise his fist. But I saw the shame pushing his head down. I saw the terrible weight of shame hunch his shoulders.† The term â€Å"borderland† in Anzaldua’s work points to the strict boundaries that Western thought has laid down in the

A comparative study between the regulations of the U.S. and the United Essay

A comparative study between the regulations of the U.S. and the United Kingdom on Hip Hop music - Essay Example The notion of censorship has always been warily approached with differing emotions. Whereas many regard censorship as a form of curtailment against individual liberty and freedom of speech, there are also some who would argue for censorship as a necessary mechanism for the protection of civil society and public order. In our present day, for example, several organizations both in government and outside government, espouse the need to filter media content. Within governments, we have UK’s Office of Communications and the United States has its own Federal Communications Commission. Outside governments, organizations such as the Parents’ Music Research Center actively campaign for censorship as a necessary defense against the corruption of young minds. From the early days of the Inquisition wherein large volumes of books and other literature labeled as sacrilegious or scandalous were ripped into shreds before being thrown into large flaming pyres, till today’s curre nt practice of censorship cuts on mass-produced films and broadcast programs, artistic work has consistently come under the magnifying glass and scrutiny of regulating bodies bent on filtering the content of mass media which reach the common population.

Wednesday, October 16, 2019

Identity Formation and the Bordelandsof Self Essay

Identity Formation and the Bordelandsof Self - Essay Example g thought-provoking complicated autobiographical work that has significantly led to the construction of Chicana and â€Å"mestiza† collective identity. The author narrates her experience of spiritual awakening and growth as well as her introduction to self knowledge. This experience is not for her consumption alone. The author also delineates the social implications of spirituality as a source of power for all Chicanas. Anzaldua’s concept of spirituality is central to â€Å"la mestiza’s† cultural experience defined by the borderlands. Let us now asses the relevance of the concept of â€Å"borderland†. Literally, the term refers to the borders between Mexico and the United States. The term â€Å"border† brings to mind the war between these tow countries which culminated in the annexation of Texas to the US in the 19the century. This annexation, ironically, has resulted in the Chicanos becoming second-class citizens in their own country. Gringos in the US Southwest consider the inhabitants of the borderlands – transgressors, aliens, whether they possess documents or not, whether they are Chicanos, Indians or Blacks. Do not enter; trespassers will be raped, maimed, strangled, gassed, shot. The only â€Å"legitimate† inhabitants are those in power, the whites and those who align themselves with whites. Consider the plight of Pedro, a Chicano in the following extract from Anzaldua’s text: â€Å"In the confusion, Pedro ran, terrified of being caught. He couldn’t speak English, couldn’t tell them he was fifth-generation American. Sin papeles – he did not carry his birth certificate to work in the fields La Migra took him away while we watched. Se lo llevaron. He tried to smile when he looked back at us, to raise his fist. But I saw the shame pushing his head down. I saw the terrible weight of shame hunch his shoulders.† The term â€Å"borderland† in Anzaldua’s work points to the strict boundaries that Western thought has laid down in the

Tuesday, October 15, 2019

Economic Releases and Resulting Market Reactions Research Paper

Economic Releases and Resulting Market Reactions - Research Paper Example The US Economy created 113,000 jobs with unemployment rate dipping to a low of 6.6%. Despite more people gaining employment, decline in hiring rates raised concerns of a slower growth. Rather than the economy taking off, it stumbled. Federal Reserve’s much-anticipated announcement a decision to start scaling back, the monthly asset purchases in January encountered a relatively mute market reaction not just in the US but across the globe. Although US equity markets at first fell on news, markets rallied strongly for remaining part of the month coupled with economic activity improvements as well as reassurance from central bank that its major interest rate would most likely remain near zero until after unemployment in the US fell below 6.5%.Hourly wages increased by 5 cents. As a result of the changes, job changes were recorded with job growth being constrained by sharp decline in public sector. Federal government shed off more than 12,000 jobs, while states and municipalities shed off 17,000 workers. Healthcare increased only 1500 jobs. Consumer spending: consumer spending declined for a 2nd straight month signaling a slowdown in the economy. Retail sales declined 0.4% in January marking the largest drop in the last ten months. The slowing economic fortunes are likely to see further reduction in consumer spending. The Manufacturing sector experienced expansion as shown in PMI, 51.3% although this was drop by 5.2% compared to seasonally adjusted rate of 56.5% in December. However, the reading being more than 50% indicates expansion of the manufacturing sector. The number of unemployed people (10.2 million) as well as the unemployment rate (6.6 %) recorded little change in January. This is a continuous trend from October which has seen joblessness rates reducing by 0.6%. Of the major work groups 20.7% of the unemployed are teenagers, 5.7% are whites, 6.2% are adult men, 12.1% are blacks, 5.9%

Monday, October 14, 2019

Sniffing Attacks Prevention and Detection Techniques

Sniffing Attacks Prevention and Detection Techniques Security in Wired/Wireless Networks:  Sniffing Attacks Prevention and Detection Techniques in Wired and Wireless Local Area Networks (LAN) ABSTRACT During the past era, Information Technology made a revolution in RD. No doubt Internet becomes an essential backbone for all sciences and research nowadays. Accordingly security threats and data banks attacks turn out to be a phenomenon. Thus, granting protection to such crucial information becomes a high demand. While reviewing the latest studies in this area, there are strong signs that attacking information warehouse is the hot topic nowadays. Moreover, preventing attacks to TCP/IP networks and what are the most efficient techniques to protect it, is the most targeted research area for security experts. For instance, what so called the Man-in-the-Middle attack [MiM] and Denial of Service [DoS] are just some ways of vulnerable attacks to TCP/IP networks, using some tools available free on the internet. They are sniffing the data traffic or causing service denial. In our research, we evaluated the most famous security solutions and classifying them according to their efficiency against detecting or preventing the types of Address Resolution Protocol [ARP] Spoofing attacks. Based of the surprising experimental results in the security lab, we proposed an optimal algorithm to enhance their ability Keywords: Sniffing Attacks, ARP cache poisoning, Man-in-the-Middle [MiM], Intrusion Prevention Detection technique [IPS/IDS], Denial of Service [DoS] CHAPTER 1 INTRODUCTION 1.1 Overview As we mentioned in the abstract section that this research is focusing on the internal attack within the local area network [LAN] which is forming the major and critical attacks which the network resources are exposed to according to recent studies conducted in the Information Security domain[1]. We will demonstrate two major attacks affecting the Internet users the local network; The MiM attack[2] (Man-in-the-Middle Attack) and DoS (Denial-of-Service). There are many tools and softwares widely available and for free of cost which can carry out many attacks over the network and violate the privacy of users, such tools like Sniffers[3] monitors data traveling over a network, it either can be of authorized or unauthorized function. It was started initially as a Network Analyzer to help the Administrator to perform health check and maintain the network activities; however it is used today to redirect the traffic and access confidential files. Traditionally, research in the area of information and communication security focused on helping developers of systems prevent security vulnerabilities in the systems they produce, before the systems are released to customers. the majority of studies on network security, are considering only the external attacks. Internal as well as external are of the outmost importance when it comes to information security, but need to be complemented with more depth research for developing detection and prevention mechanisms, and studying internal threats. The research plan we followed in our work presented here are as follows: a. Address Resolution Protocol [ARP] b. ARP Spoofing attack [Poisoning] c. ARP Spoofing based MiM DoS attacks d. Experiments e. Optimal ARP Spoofing detection algorithm f. Results analysis g. Conclusion 1.1.1 What is an ARP: The Address Resolution Protocol (ARP) [4] is used by computers to map network addresses (IP) to physical addresses or what is usually refer to: Media Access Control addresses (MAC). It translates IP addresses to Ethernet MAC addresses and classified as a Networking protocol used to find hosts address given its IP address. Some network expert consider it as a DataLink Layer protocol because it only operates on the local area network or point-to-point link that a host is connected to[5]. The Address Resolution Protocol (ARP) is documented in RFC 826[1] and later it was adopted by other media, such as FDDI[6]. For more details about Internet Protocols Suits; see appendix [1] 1.1.2 How it works: The ARP Process RARP As we stated formerly from an architecture perspective, ARP is a layer 3 function (Network), however in a programming perspective ARP is considered as layer 2 (Datalink) because it calls the LAN data like layer code. RARP is stand for; Reverse Address Resolution Protocol, and it is a network protocol used to resolve a MAC address to the corresponding network layer address, i.e. RARP is used to map a MAC address to an IP address exactly the reverse function of the ARP request/reply. 1.1.3 Types of ARP/RARP protocol messages: There are four types of ARP massages that are sent by an ARP protocol: a. ARP request b. ARP reply c. RARP request d. RARP reply As we just said in the definition, ARP is used to map network address (IP) to physical address (MAC) and when a host need to communicate with another host it needs to know its MAC address. Here comes ARP protocol and works by broadcasting a packet (ARP-Request) for any hosts connected over the Ethernet network. The ARP packet contains the IP address of the sender and the IP address of the target it is interested in communicating with. See (1.2) and (1.3): However, the target host, identifying that the IP address in the ARP request packet is belong to itself, so it returns an answer back in a unicast reply (ARP-Reply) and the host which initiated the ARP request catches the [IP,MAC] pair and keeps it in ARP cache memory. Keeping the host reply in cache will minimize the ARP traffic in the LAN. See (1.4): So simply when the ARP request is broadcasted to all PCs on the network it asks the following question: Is x.x.x.x is your IP address?, if Yes send back your MAC address. Then every PC checks if its IP address is matching the one in ARP request and sends ARP reply with its MAC address. But the repeated ARP requests especially when it is broadcasted every time a MAC address is required; creates a high traffic in the network, and hence the Operating Systems keep copy of the ARP replies in the computers cache memory and update it frequently with any new pair, this will help in reducing the ARP requests number[9]. By the way ARP spoofing technique which we are going to talk about in the next chapter is occurring when forged ARP replies is created and sent to the source computer who initiated the ARP request formerly and updated its ARP cache with fake information. We will know afterward this kind of exploitation is called poisoning the ARP cache. The Reverse Address Resolution Protocol [RARP] is broadcasting a RARP request packet with the target MAC address which will be received by all hosts in the Ethernet network. Host which its MAC address is matching the one in the RARP request will reply with its IP address in the RARP reply packet and sends it to the host which initiated the RARP request. Afterward the IP address which consists of 32 bit will be converted to 48 bit Ethernet address, by the suitable encapsulation mechanism. This is the common practice for the Address Resolution Protocol (ARP), which is documented in RFC 826 [51]. ARP defines the exchanges between network interfaces connected to an Ethernet media segment in order to map an IP address to a link layer address on demand. Link layer addresses are hardware addresses (although they are not unchallengeable) on Ethernet cards; where the IP addresses are logical addresses assigned to machines attached to the Ethernet. Accordingly a Datalink layer address is known by other names, i.e. Ethernet Addresses, Media Access Control (MAC) Addresses, and even Hardware Addresses. However, the correct term from the kernels perspective is Link Layer Address because this address can be changed via command line tools [50]. 1.1.4 ARP and RARP message formats: The ARP packet consists of Ethernet Header and Data packet; the Ethernet header is divided to: 6 bytes for the destination address 6 bytes for source address 2 bytes for the frame type in hexadecimal (e.g. 0806 for ARP 8035 for RARP) Where, the data packet structure of ARP packet is encapsulated and the information that every part holds are demonstrated in the following table[10]: Table 1.1: ARP and RARP packet structure + Bits 0 7 Bits 8 15 Bits 16 31 0 Hardware type (HTYPE) Protocol type (PTYPE) 32 Hardware length (HLEN) Protocol length (PLEN) Operation (OPER) 64 Source hardware address [MAC] (SHA) (first 32 bits) 96 Source hardware address (last 16 bits) Source protocol address (first 16 bits) 128 Sender protocol address (last 16 bits) Destination hardware address (first 16 bits) 160 Destination hardware address (THA) (last 32 bits) 192 Destination protocol address (TPA) Hardware address type (2 bytes). 1=Ethernet Protocol address type ( 2 bytes). 0800H (hexadecimal) = IP address Operation type; 1 = ARP request, 2=ARP reply, 3=RARP request, 4=RARP reply etc†¦. 1.1.5 TCP Standard Ports/Services The table below is showing, a list of services and ports used by TCP protocol: Table 1.2: TCP Ports and Services Port # Keywords Description 20 FTP-DATA File Transfer [Default Data] 21 FTP File Transfer [Control] 23 TELNET TelNet [Telecommunication network ] 25 SMTP Simple Mail Transfer 37 TIME Time 42 NAMESERVER Host Name Server 43 NICNAME Who Is 53 DOMAIN Domain Name Server 79 FINGER Finger 80 HTTP WWW 110 POP3 Post Office Protocol Version 3 111 SUNRPC SUN Remote Procedure Call CHAPTER 2 LITERATURE REVIEW 2.1 Background 2.1.1 ARP Spoofing based on MiM and DoS attacks ARP spoofing is also called; ARP poison routing (ARP) or ARP cache poisoning or ARP Cache Corrupting. It is a method of attacking an Ethernet local area network by updating the target ARP cache with a forged ARP request and reply packets[9]. This will try to change the target MAC address by another one which the attacker has a control on it. Updating ARP cache with a fake entry value is so called ARP Poisoning. What is sniffer? or (The Network Analyzer); it is a software or a hardware which log the traffic over a network and captures the data packets, then decodes the packets and analyzes the content. Kindly notice in our research that the following terms; Spoofing, Poisoning and Cache Corrupting are referring to the same term . Furthermore, since ARP is considered as a trusted protocol within the network and is not designed to deal with malicious activities in the network, so attackers found unusual ways to illegitimately penetrate into the network; causing harmful costs. These harms or costs can be much worse when the attacker tries to impersonate another user, performs Man-in-the-Middle attacks (MiM), or even causes Denial of Service (DoS) on a Server or even the whole Network[11]. P.S. Spoof means: hoax or imitation. Thanks to the British comedian Arthur Roberts (1852-1933), who introduced the word spoof to the world in the 19th century. He invented a game and called it Spoof, it incorporates tricks nonsense[12]. Why it is so difficult to detect sniffers? †¢ The attack is essentially performed in the passive mode, which means it is hidden and working in the backend so the standard user will not recognize such attacks. Besides it is not easily for user to detect the sniffing since this kind of attacks is generating usual traffic over the network. †¢ The other point is the fact that sniffers can be normally linked to an active intrusion attacks. While talking about the requirement and resources; sniffing is only requiring a standard machine connected over the network with normal hardware configurations and there is no need to special requirements or high performance. †¢ Threat is always seen as external and many researches shows that most of the attacks are from the internal resources; according to the recent Global security surveys in 2009[13], another study [14] shows that internal threat is incredible increased to more than 80% of the security breaches, where external attacks showed about 15% with internal help and 5% just from pure outsiders. 2.1.2 How ARP caches are updated? Let us recall how the communication happens on an Ethernet LAN. As we early stated that all communications in layer 2 is based on the MAC address, so for any PC wants to talk to a target on the network is has to address it to the targets MAC address. If a source computer tries to communicate with another computer in TCP/IP based network it has to translate the targets IP into the corresponding physical address (MAC) and here where we use an ARP protocol. The translation happens by request/reply ARP broadcast processes. When the ARP requester receives the reply, it catches the pair and keep it in its ARP cache memory so it wont ask for it over again[15]. 2.1.3 ARP Cache Poisoning (Spoofing) Attack It is the process of corrupting an ARP cache with fake IP/MAC entries. It also used to perform some other attacks, for instance:  § Man-in-the-Middle (MiM) attack, also known as (MITM)  § Denial of Service (DoS) attack (refer to section 3.2) As we discussed earlier if an entry is exist in the ARP cache, then it can be updated or corrupted using ARP reply or ARP request. But what about if the entry; is NOT exist in the ARP cache? The answer is: ARP request packets always work to corrupt any Operating System ARP cache whether the entry exists or not in the ARP cache. On the other hand, for hackers, ARP requests allow them to corrupt always the target ARP caches! A recent study[16] showed by experiment the impact of the ARP request update on different Operating Systems. An experiment revealed which OS with dynamic entries in the ARP cache was vulnerable to the ARP cache poisoning attack. 2.1 [17], an evaluation for the impact of the ARP request update on different Operating Systems, e.g. Windows XP Professional, Windows 2000, 2003 Server, Linux 2.x, and Solaris 5.9: Table 2.1: ARP request impact on various OS Windows XP Windows 2000 Windows 2003 Server Linux 2.4 Linux 2.6 Free BSD 4.11 SunOS Solaris5.9 Entry exist in ARP cache? Yes No Yes No Yes No Yes No Yes No Yes No Yes No ARP request √ √ √ √ √ √ √ √ √ √ √ √ √ √ ARP reply √ X √ √ √ X √ X √ X √ √ √ √ √ = ARP request or reply message is accepted by the system allows the update or creation of MAC / IP entry X = ARP request or reply message is rejected by the system doest NOT allow update creation MAC/IP entry The results of the experiment indicated that: 1. If the entry does not exist in the ARP cache, all tested OSs, except Windows 2000, Free BSD 4.11 and SunOS Solaris 5.9, will not allow the creation of a new entry by an ARP reply message. 2. If the entry does not exist in the ARP cache, all tested OSs allow the creation of a new entry by an ARP request message. 3. However, if the entry existed already in the ARP cache, all tested OSs allowed its update by an ARP reply (even in the absence of an ARP request) or request message. Therefore, when using ARP reply messages, the ARP cache poisoning attack becomes difficult to realize against most OSs. However, it remains indeed possible when using ARP request messages. In conclusion, most common OSs are still vulnerable to the ARP cache poisoning attack. Malicious users can first use ARP request messages to create fake IP/MAC entries in the ARP caches of their target hosts. Then, fake ARP reply massages are used to maintain the existence of fake IP/MAC entries in the ARP caches of the target hosts. 2.1.4 Example of ARP Cache Spoofing As mentioned above the ARP Spoofing process is mainly to corrupt the ARP cache of any host over the network with fake IP/MAC pair in order to perform some serious attacks such as Man-in-the-Middle attack [MiM] or Denial-of-Service [DoS]. In the following demonstration we will show the two different steps before and after the ARP cache poisoning is taking place, in the (2.1) and (2.2). 2.1.4.1 ARP Cache Spoofing (before ARP corruption) In (2.1) its clear that the ARP cache table is legitimate for all hosts connected to the network via a switch, where we can see that every IP-address is mapped to a valid and corresponding MAC-address for that host. For instance; in ARP cache table of the host â€Å"A† ; the IP-address of the host â€Å"B† is mapped with the MAC-address of the host â€Å"B†. And the same case is applied on host â€Å"C†. On the other hand, in ARP cache table of the host â€Å"B† for example; the IP-address of the host â€Å"A† is mapped with the MAC-address of the host â€Å"A†. And the same case is applied on host â€Å"C†. Let us see what changes may occur after the cache poisoning: 2.1.4.2 ARP Cache Spoofing (after corruption) In (2.2): Host â€Å"C† is the malicious host in this scenario. It corrupted the ARP cache tables for both hosts â€Å"A† and â€Å"B†. The ARP cache table for host â€Å"A† is becoming illegitimate now, where we can see that every IP-address is mapped to an invalid and not the corresponding MAC-address for that host. For instance; in ARP cache table of the host â€Å"A† ; the IP-address of the host â€Å"B† is mapped with the MAC-address of the host â€Å"C†. And the same case is applied on host â€Å"B†. In this case whenever the host â€Å"A† want to communicate with host â€Å"B†, the TCP/IP traffic will be guided to pass by the malicious host â€Å"C† instead of â€Å"B†..! So what..? Hackers use the process of generating such abnormal ARP request packets to corrupt the ARP cache for certain hosts and perform different attacks over the network (e.g. MiM or DoS). 2.1.5 Gratuitous ARP: This process is concerned about IP address duplication attack. Such a situation is due to the case when a host sends an ARP request to look for its MAC. This may occur when the host reboots, or once changing its Ethernet Number or the IP address[17]. Gratuitous ARP is doing the following tasks: i. Finding IP address conflicts in the Network by verifying if there is another host that has the same IP address and displaying this message:  « duplicate IP address sent from Ethernet address: a:b:c:d:e:f » . ii. If a host changing its MAC or IP address by sending an ARP request, then it will force to update the ARP cache on the Network with the new MAC/IP address P.S. ARP Gratuitous is mainly influence old Operation Systems, such as; Windows XP SP1 or older. 2.1.6 MiM attack: The man-in-the-middle attack, (abbreviated as: MiM, or sometimes: MITM[18]) comes from the Packet-Sniffing[19]. MiM doesnt listen to all the packets that walk along the network as the Sniffer works, however it interfere with one or more hosts in the network and starts snooping between them. Such hosts been listened by a MiM are commonly called victims. A victim can be a normal host (e.g. PC or Notebook), gateway or even a router! An attacker who is mainly spying between two or more victims; is establishing a autonomous connections between the victims and convey messages between them as if they are directly connected. And hence we call him: Man-in-the-Middle. So far MiM is just listening to the traffic passing through two victims. Although this kind of outrage is illegitimate and can reach sensitive information like passwords, e-mail messages, encryption keys†¦etc. however it become worse and worse when he tries to go further than and inject false and fake packets and convey them between the deceived victims. According to[20] MiM attack is classified as an active attack, because the hacker manages the traffic in the network between the source and the destinations. MiM is very famous approach used by hackers nowadays and uses the ARP protocol in order to attack the ARP-Cache tables and hence control the targets[21]. By poisoning the ARP tables for all hosts in the network for example; will instruct the hosts to reroute the traffic to the Attacker host instead of the Gateway, where he starts interfering between any two or more victims. One more thing needs to be mentioned that the attacker has to forward all the interrupted packets to the original destination, so that the synchronized connection will remain and doesnt time out! In the above ; ARP spoofing occurs when sending a fake and spoofed ARP reply to the target, i.e. if the Attacker has an IP: [10.10.1.10] and wants to sniff the traffic between the Victim who has an IP: [10.10.1.20] and the Gateway which has an IP: [10.10.1.254] it simply sends fake ARP replies to associate its own MAC address with the Gateway IP [10.10.1.254]. The Victim then is trapped and starts sending all the packets intended to the Gateway to the Attacker address as in the above illustration. 2.1.7 Denial of Service [DoS]: DoS attacks; occurring when any suspicious host over the network performs ARP cache poisoning and receives any packet designated to the original target to the suspicious host and cause a block in the connection between the host and the target which is being attacked. Kindly notice that more details regarding Denial of Service [DoS] will be discussed in section (3.2) in chapter No. 3. 2.2 Evaluation Of Common Intrusion Detection Systems And Intrusion Prevention Systems 2.2.1 ARP cache poisoning and MiM attacks: The ARP cache spoofing attack and the Man-in-the-Middle attack are usually maintained and controlled by humans[22]. There are many solutions proposed in solving this type of security threat, based on different mechanisms or protocols at different OSI model layers; such as; Application layer, Network layer and Data link layer[16]. 2.2.2 Detection of ARP cache poisoning attack: Arpwatch[23] and Snort[24] are tools that are able to detect ARP cache poisoning attack by checking each packet contents. To do that, these tools monitor Ethernet activities and keep databases of Ethernet MAC/IP address pairs. If an analyzed packet has an Ethernet MAC/IP address pair, which does not appear in their databases, then the system administrator is alerted. Arpwatch and Snort are sensors that need to have access to monitoring ports on the switches (usually, known under the name of SPAN port, or mirroring port) or be placed in locations where they can see all the network traffic. Therefore, it would be more interesting and efficient to detect any ARP anomalies without the use of any access privilege or special ports on the switches. This is the case since substantial performance impact can be caused when port mirroring is in effect. This strategy makes ARP spoofing detection based on sniffing not quite viable on switched LAN networks[16]. 2.2.3 Packets sniffing and MiM attacks: On shared broadcast LAN networks, such as hubbed and wireless networks, packets sniffing can easily be achieved with minimal efforts. However, a switched LAN environment presents a different problem with few available techniques for sniffing. The first technique consists of connecting to an administrative port on the Switch and setting it to broadcast mode. The administrative port will now receive all traffic. A second technique is summarized by sending a large number of spoofed packets, which is usually an ARP packet (Address Resolution Protocol) to the Switch so it fails to open and sends all packets to all ports. However, a recent study[25] shows that only old switches models are vulnerable to this attack. Another technique, which is based on the MiM attack, is to tell target hosts on the LAN network to use an attackers MAC address in order to get to any other host. This technique is based on the generation of malicious ARP traffic. The attacker host takes a copy of the received t raffic then forwards it to the correct host. Today, security devices, such IDSs (An intrusion detection system) [26] and IPSs (An Intrusion Prevention System)[27], have become a standard component of security solutions used to protect computing assets from hostile attacks. IDSs are able to detect many types of attacks, such as denial of service (DoS) and IP spoofing attacks. But, their ability and reliability to detect certain attacks are still questionable, notably the MiM attack. Prevention mechanisms, such as S-ARP[28] and O-ARP[29] lack efficient implementation on real systems and for a performance evaluation 2.2.4 Prevention mechanisms based on secure ARP protocols: A number of cryptographic protocols have targeted issues related to ARP security. For example, S-ARP[28] is a popular ARP security protocol that uses asymmetric cryptography utilizing digitally signed ARP replies. At the receiving end, an entry is updated if and only if the signatures are correctly verified. S-ARP is considerably slow as can be deduced from the results presented in[28]. Furthermore, S-ARP can not prevent against cache poisoning attacks. a. O-ARP technique: O-ARP[29] is a secure ARP technique that is similar to S-ARP with regards to its message format and key management. However, it uses cryptography only when necessary and tries to avoid it when ever possible. The authors in[29] claim that O-ARP is much faster than S-ARP on the average, and can be used as security measure to prevent against cache poisoning attacks. Meanwhile, the authors did not implement O-ARP in any operating system to obtain measurements for its performance. In[30] the authors proposed another Secure Address Resolution Protocol. In this protocol, a secure server shares secret keys with each host on a subnet. The server maintains a database of MAC/IP address mappings, which is updated periodically through communication with each host. All ARP requests and replies occur between a host and the server, and replies are authenticated using the shared pair keys. The main drawback of this technique is congestion at the server, which constitutes a single point of failure in the network. b. Ticket-based Address Resolution Protocol Ticket-based Address Resolution Protocol (TARP)[31] is another secure ARP protocol. TARP is built as an extension to ARP. TARP implements security by distributing centrally issued secure MAC/IP address mapping attestations through existing ARP messages. These attestations, called tickets are given to clients as they join the network and are subsequently distributed through existing ARP messages. Unlike other popular ARP-based solutions, the costs per resolution are reduced to one public key validation per request/reply pair in the worst case. However, networks implementing TARP are vulnerable to two types of attacks-active host impersonation, and DoS through ticket flooding. In addition, TARP does not include support for dynamic environments, mainly when hosts IP addresses changes dynamically. c. Cryptographic Technique Another approach was presented in[32], where the authors proposed a cryptographic technique. The technique is based on the combination of digital signatures and one time passwords based on hash chains. d. ARPSec protocol Moreover, in[33], the ARPSec protocol was proposed as an ARP security extension that intends to solve the security weaknesses of the ARP protocol. ARPSec provides an anti-replay protection and authentication using a secret key shared only by the source and the destination of the packet computed by an authenticated Diffie-Hellman exchange. Unfortunately, no real-time implementation or performance evaluations on actual network systems were performed to quantify their efficiency. At the network layer, the IPSec[34] protocol can be used to facilitate the confidentiality, integrity, and authentication of information communicated using the IP protocol. IPSec proposes solutions for many security issues within the IP protocol, but does not prevent any malicious users from manipulating ARP packets, at the Data link layer, or redirecting target network IP traffic to other destinations. IPSec guaranties the confidentiality and integrity of the redirected IP traffic, but cannot prevent malicious users from causing DoS attacks on target hosts. 2.2.5 Protection mechanisms at the Application layer: Recently, several security protection mechanisms have been proposed at the Application layer. However, such mechanisms might not be effective against certain attacks at the lower layers, mainly at the Data Link layer. For example, in[35], the authors argued that most deployed user authentication mechanisms fail to provide protection against the MiM attack, even when they run on top of the SSL/TLS protocol or other similar protocols. The authors then introduced the notion of SSL/TLS session-aware user authentication, and elaborated on possibilities to implement it. Another example is the Interlock protocol, proposed in[36], which was later shown to be vulnerable to attacks when used for authentication[37]. For enhanced security at the Application layer, in[38] a new proposed technique called Delayed Password Disclosure (DPD) was shown to complement a password-based authentication and key exchange protocol to protect against a special form of the MiM attack, the doppelganger window att ack. On the other hand, in[39] the authors proposed the notion of a Password Protection Module (PPM) that provides protection against the MiM attack for certain situations. PPMs are effective only if they take into account network-related information, such as IP addresses and URLs. This makes PPMs very difficult to deploy and manage. Additional protection mechanisms were proposed in[40] to secure tunneled authentication protocols against the MiM attack. In most cases, prevention mechanisms at the Application layer guarantee the confidentiality and integrity of the traffic exchanged but do not prevent malicious users from redirecting network traffic to their hosts. 2.2.6 External protection mechanisms: Several attempts have been made to address the above security issues through methods external to the ARP protocol. For example, it has been proposed that hosts can statically be cond[41] . This would incur a huge administrative overhead and is largely intractable for dynamic environments. Conversely, the port security[42] features available in recent switches restrict the use of physical ports to con MAC addresses. If an attacker forges its own MAC address and includes an additional frame header containing malicious mapping, poisoning a victims ARP cache can still be possible. This approach only prevents certain kinds of MAC hijacking, but does nothing to prevent MiM attack. Hence, it is only a partial and in many ways limited solution

Sunday, October 13, 2019

Euthanasia and Assisted Suicide are Murder :: Euthanasia Physician Assisted Suicide

Euthanasia is Murder Euthanasia - is it killing or letting die? In the last thirty years, this has been a highly controversial topic, the worldly morals versus the Christian. Although there are certain instances where it is justifiably considered to be letting die, it is essentially murder. Euthanasia comes from a Greek word, meaning "easy death," and is now often associated with the infamous Dr. Kevorkian. There are three types of euthanasia - what doctors consider to be "letting the patient die," for instance taking both conscious and unconscious patients off of life support, not reviving the patient in case of a heart failure, et cetera. There is also assisted suicide. Dr. Kevorkian and his suicide machine have made themselves known through this technique. The machine injects a lethal dosage into the "patients" blood stream, killing then painlessly within ten minutes. The first type mentioned above is known as "active voluntary euthanasia." This is where a conscious, mentally competent person, usually with a severe physical ailment, loses the will to live. Many have said that keeping them alive is just prolonging their death, a form of cruel and unusual punishment. They may ask that life support equipment be disconnected so that they can die quickly, painlessly, with dignity. Most doctors are trained to try their best to defeat death, or at least try to delay it as long as possible. But if the patient is hopelessly ill, and would prefer to die, the doctor may consult the hospital ethics committee, and take him or her off of life support. When taken to court in these issues, the doctors defend themselves in saying, "I didn't kill him, I let him die." This is illegal throughout the United States and the rest of the world, but it still is a common occurrence. The second type, "passive voluntary euthanasia," is done when a terminally ill patient's or a patient in a persistent vegetative state's (PVS) family chooses to take their loved one off of life support. A PVS patient has no self-awareness or any awareness of their surroundings because the cerebral cortex, the thinking part of the brain, id dead. The brain stem, the part of the brain that controls the major organs of the body, still works, though.

Saturday, October 12, 2019

Siddhartha Gautama :: essays research papers

Siddhartha Gautama Siddhartha Gautama was born about 563 BC in what is now modern Nepal. His father, Suddhodana, was the ruler of the Sakya people and Siddhartha grew up living the extravagant life on a young prince. According to custom, he married at the young age of sixteen to a girl named Yasodhara. His father had ordered that he live a life of total seclusion, but one day Siddhartha ventured out into the world and was confronted with the reality of the inevitable suffering of life. The next day, at the age of twenty-nine, he left his kingdom and new-born son to lead an modest life and determine a way to relieve universal suffering. For six years, Siddhartha meditated under a bodhi tree. But he was never fully satisfied. One day he was offered a bowl of rice from a young girl and he accepted it. In that moment, he realized that physical hardships were not the means to freedom. From then on, he encouraged people not to use extremes in their life. He called this The Middle Way. That night Siddhartha sat under the bodhi tree, and meditated till dawn. He cleared his mind of all worldly things and claimed to get enlightenment at the age of thirty-five, thus earning the title Buddha, or "Enlightened One." For the remainder of his eighty years, the Buddha preached the dharma in an effort to help other people reach enlightenment. When Siddhartha is a Brahmin, he believes in the existence of many gods, and performs sacrifices to them. After a while he realizes this is meaningless and decides to leave his family and community and become a Samana. As a Samana, he tries to destroy himself in may ways. He feels if he kills himself, with its passions and emotions, he will find the great secret. Siddhartha doesn't spend much time as Buddha, although he has an important revelation. He discovers he can't find peace by learning from a master. He finds the only way to have peace with the world is by finding it for himself. When Siddhartha leaves Buddha, he is enthralled with the world. He starts paying more attention to the world because he knows he must get experience for himself. As he walks he comes upon a town. He stays and becomes a merchant. At first he looks at his actions as a game. After a while he becomes more serious. He starts drinking and gambling and becomes lazy. Siddhartha sees this and decides to leave the town.He wanders through a forest and comes upon a

Friday, October 11, 2019

The Effect of Computer Technology on the Academic

The Constructivist Approach Constructivist This approach represents a combination of both genetic pre-programming and environmental adaptation or experience where the child actively constructs a version of reality from his/her unique experiences. The process of constructing knowledge is an active one (going out and interacting with the environment and constructing it yourself). Learning is a function of the natural and continual variability in the world and variable action upon it. Constructivist would argue that in a school class not all children learn the same thing.The important thing for educators is to ascertain what each child knows and then plan learning programmed for each child or follow the hill's lead. Conflict Fourth (1995) recognizes the importance of learners actively constructing their knowledge as suggested by the theoretical viewpoint of constructivism. Looking at children's conflict (which has its roots in Paginating thinking (Littleton 1995)) and disagreements (whe re children consider the other's point of view), Fourth (1995) concluded that children's disagreements: can be viewed as a legitimate source of collaboration; can be both constructive and productive in the learning process. Appear to hold an important role in active learning.Thus, by seeing an alternative way of tackling a problem, each individual makes cognitive gains which can subsequently influence problem solving. All three constructivist theorists, Pigged Weights and Burner, agree that the child is both determined and a determiner of knowledge and understanding. However, they place different emphasis on the direction of the relationship. [contents I CLC home page I references ] The Effect of Computer Technology on the Academic Performance of Based Students By Conrad

Thursday, October 10, 2019

Cyp 3.1 Support Children and Young People’s Health and Safety

1. 1 There are many different factors to take into account when planning healthy and safe indoor and outdoor environments and services. The factors to take into account when planning indoor healthy and safe environments and services include: Floor area: The floors should be even and easily cleaned and free of clutter and debris that could cause a trip or fall. All mats etc should have gripper underneath so as not to cause a fall. Lighting and air condition: There should be there should be sufficient lighting and air circulation, for eg: on a hot day windows should be opened. Secure hazards around the area in question: Making sure all hazards in the environment are correctly taken care of for eg: depending on child age plug sockets should have covers and stairs have safety gates, all hazardous products and substances are correctly labelled and stored away from reach, medication locked in a secure location. Emergency planning: Making sure that all escape routes are known and instructions are clear and fire exits are not blocked. That fire extinguishers are all clearly labelled. Telephone numbers are to hand if necessary. The factors to take into account when planning outdoor healthy and safe environments and services include: Gaining consent: Written consent for a child/young person to attend the planned event. Individual needs: Evaluating each individual needs for eg a wheelchair user might have difficulty on sand, deaf and hard of hearing individuals would have difficulty at the cinema. If an individual has incontinence needs. Medication users and nutritional needs also have to be assessed and taken into account. Environmental issues: Take into account the weather, if the weather is due to be hot sun cream, hats and water would need to be taken. On cold wet and windy days coats, waterproof clothing and shoes would need to be taken. Emergency planning: Taking along a first aid kit and emergency numbers of contacts and general practitioner. CYP 3. 1 Support children and young people’s health and safety 1. 2 Health and safety is extremely important in the work place. To be able to monitor and maintain a health and safety programme within the workplace a programme of safety issues and checklist need to be negotiated. The negotiated terms and plans put in place are extremely essential to efficiently monitor and maintain health and safety. For worker to then enforce this programme training must take place. It is during the training process that workers will be made aware of and risks and hazards and encouraged to work safely having been shown the safe practices. This training of the practices of health and safety will encourage and ensure that this programme of safety measures are correctly practiced. To ensure this process the programme will need to be monitored. To make sure that the programme is maintained especially to a high standard regular inspection must take place alongside refresher training and testing. Once all workers have been trained in the practice of health and safety there needs to be encouragement given and regular information or practice updates. Daily handover or pre-shift meetings could be used to give information or weekly meetings. A safety tip board could be used; promotions could be used to encourage workers to practice safe work practices. CYP 3. 1 Support children and young people’s health and safety 3. 3 An example from my own practice of risk management whilst supporting children or young people would be whilst preparing a meal with the individuals. Firstly a check would be made to ensure that the individual is able to participate in the activity. Once this was established checks would be made to ensure that there are no food allergies. Basic Hygienic rules of the kitchen would be used such as, hand washing, preparing the area to be used. Whilst cooking especially whilst using Sharpe instruments such as knives care and attention would be practiced and correct chopping boards used for different foods. All pans being used on the hob would be placed with the handle to the rear of the oven to ensure that they could not be knocked over, and safety measures such as making sure oven gloves were used to handle any hot items such as pan handles and oven trays. To ensure that the food was correctly cooked, recipe cards or books etc would be strictly adhered to. Food would be checked to ensure correctly cooked for eg: using food thermometer. If the food was not to be eaten straight away correct measures would be used to store it, especially in the refrigerator. The kitchen would be cleaned and inspected after the event. CYP 3. 1 Support children and young people’s health and safety 4. 1 Accidents Any accident’s that occur should be logged in the accident book and all details filled in i. e. the person or persons in volved in the accident, any injury to the person involved, where the accident took place and the time the accident took place. Any medical attention if needed should also be logged in the book. It is also essential to contact the parents or guardians of the person or persons involved in the accident to be contacted, as well as your supervisor. Incidents In the case of incidents for example if a child or young person gets lost or runs away you should immediately contact the police. You would need to give a full description of the child or young person and what clothing they were wearing and any medication they may be taking at that time. You would also need to inform their social worker and parents of the incident. Emergencies In the case of an emergency such as a fire you should sound the fire alarm and exit the building by the nearest fire exit and make your way clear of the building and contact the fire emergency services immediately. You should only tackle the fire yourself if you feel competent in doing so. Illness In the event of a child or young person becoming ill you should phone for medical advice making shore u let them know of any medication the child or young person may be taking at that time. Also contact the parents and your supervisor to let them know what is happening and when you get back to your work place record what has happed in the log book. CYP 3. 1 Support children and young people’s health and safety 4. 2 Recordings All recordings of accidents, incidents, signs of illness and other emergencies should be logged in the accident book and your supervisor should be notified. Reporting You should report all accidents, incidents, injuries and signs of illness to your employer and depending on the accident, incident, injury and signs of illness seek the correct medical advice.