Saturday, August 22, 2020

Module 4 - Case Training and Appraisals Essay Example | Topics and Well Written Essays - 500 words

Module 4 - Case Training and Appraisals - Essay Example also, advancement of aptitudes in the long run making business pioneers having remarkable business keenness with the capacity to move individuals and set them up for future difficulties. The order of Human Resource Management presented different strategies for overseeing representative execution, these apparatuses went from execution evaluations dependent on rating scales to target setting and later on execution reviews were presented. A fundamental component of these evaluations was the presentation input given to the representative after the genuine examination dependent on which improvement endeavors were arranged by the occupant upheld by the Human Resource division (Greenhaus et al., 2009). The dispersion of remunerations after the exhibition examination or coming about advancements made this territory a significant viewpoint for the representative henceforth the human component of biasness weakened the customary evaluation process. To evade the shades of malice of biasness generally showed by the manager and coming about contradictions from the subordinates, execution input was taken from different sources and 360 degree criticism method was embraced by various associations. The 360 input process uncovers the vulnerable sides in conduct attributes of the subject by gathering unknown criticism from numerous sources generally named as administrator (s), subordinate(s), companions and clients. The procedure gives a compelling record of one’s execution, featuring the advancement territories without much biasness and since the criticism is originating from various sources there is a lesser likelihood that the subject would differ with the outcomes. The procedure itself is made out of three phases, readiness and commencement, assortment of criticism and improvement stage. The primary stage incorporates distinguishing proof of working connections inside the association deciding the significant factor of ‘who would rate who’, conduct groups are related to each having a lot of examining inquiries alongside rating measures;

Thursday, July 16, 2020

How Psychologists Explain Altruistic Helpful Behaviors

How Psychologists Explain Altruistic Helpful Behaviors Theories Social Psychology Print How Psychologists Explain Altruistic Helpful Behaviors By Kendra Cherry facebook twitter Kendra Cherry, MS, is an author, educational consultant, and speaker focused on helping students learn about psychology. Learn about our editorial policy Kendra Cherry Reviewed by Reviewed by Amy Morin, LCSW on November 30, 2019 facebook twitter instagram Amy Morin, LCSW, is a psychotherapist, author of the bestselling book 13 Things Mentally Strong People Dont Do, and a highly sought-after speaker. Learn about our Wellness Board Amy Morin, LCSW Updated on February 08, 2020 Camille Tokerud Photography / Getty Images More in Theories Social Psychology Behavioral Psychology Cognitive Psychology Developmental Psychology Personality Psychology Biological Psychology Psychosocial Psychology Altruism involves acting out of concern for the well-being of other people.  In some cases, these acts of altruism lead people to jeopardize their own health and well-being to help others. In many cases, these behaviors are performed unselfishly and without any expectations of reward. Other instances, known as reciprocal altruism, involve taking actions to help others with the expectation that they offer help in return.?? What is it that inspires people to give their time, energy, and money for the betterment of others, even when they receive nothing tangible in return? What Is Altruism? Altruism is the unselfish concern for other peopleâ€"doing things simply out of a desire to help, not because you feel obligated to out of duty, loyalty, or religious reasons. Everyday life is filled with small acts of altruism, from holding the door for strangers to giving money to the homeless. News stories often focus on grander cases of altruism, such as a man who dives into an icy river to rescue a drowning stranger or a generous donor who gives thousands of dollars to a local charity. While we may be familiar with altruism, social psychologists are interested in understanding why it occurs.?? What inspires these acts of kindness? What motivates people to risk their own lives to save a complete stranger? Prosocial Behavior and Altruism Altruism is one aspect of what social psychologists refer to as prosocial behavior. Prosocial behavior refers to any action that benefits other people, no matter what the motive or how the giver benefits from the action.?? Remember, however, that pure altruism involves true selflessness. While all altruistic acts are prosocial, not all prosocial behaviors are completely altruistic. For example, we might help others for a variety of reasons such as guilt, obligation, duty, or even for rewards. Explanations for Why Altruism Exists Psychologists have suggested a number of different explanations for why altruism exists, including the following. Biological Reasons Kin selection is an evolutionary theory that proposes that people are more likely to help those who are blood relatives because it will increase the odds of gene transmission to future generations.?? The theory suggests that altruism towards close relatives occurs in order to ensure the continuation of shared genes. The more closely the individuals are related, the more likely people are to help. Neurological Reasons Altruism activates reward centers in the brain. Neurobiologists have found that when engaged in an altruistic act, the pleasure centers of the brain become active. One 2014 study published in the journal Social Cognitive and Affective Neuroscience found that engaging in compassionate actions activates the areas of the brain associated with the reward-system including the dopaminergic ventral tegmental area and the ventral striatum.?? The positive feelings created by compassionate actions then reinforce altruistic behaviors. Environmental Reasons A Stanford study suggested that interactions and relationships with others have a major influence on altruistic behavior.?? Psychologists have long debated whether some people are just born with a natural tendency to help others while others are not, a theory that suggests that altruism may be largely controlled by genetics. The study called this theory into question, finding that socialization had a serious impact on altruistic actions in one- and two-year-old children. Kids who observe simple reciprocal acts of altruism were far more likely to exhibit altruistic actions, whereas friendly but non-altruistic modeled actions did not show the same results.   Such research suggests that modeling altruistic actions can be an important way to foster prosocial and compassionate actions in children. Why Being Good to Others Is Also Benefits You Social Norms Societys rules, norms, and expectations can also influence whether or not people engage in altruistic behavior.?? The norm of reciprocity, for example, is a social expectation in which we feel pressured to help others if they have already done something for us. For example, if your friend loaned you money for lunch a few weeks ago, youll probably feel compelled to reciprocate when they ask if you if they can borrow $100. They did something for you, now you feel obligated to do something in return. Cognitive Reasons While the definition of altruism involves doing for others without reward, there may still be cognitive incentives that arent obvious. For example, we might help others to relieve our own distress or because being kind to others upholds our view of ourselves as kind, empathetic people.?? Other cognitive explanations include: Empathy:  Researchers suggest that people are more likely to engage in altruistic behavior when they feel empathy for the person who is in distress, a suggestion known as the empathy-altruism hypothesis.?? Researchers have found that children tend to become more altruistic as their sense of empathy develops.Helping relieve negative feelings:  Other experts have proposed that altruistic acts help relieve the negative feelings created by observing someone else in distress, an idea referred to as the negative-state relief model. Essentially, seeing another person in trouble causes us to feel upset, distressed, or uncomfortable, so helping the person in trouble helps reduce these negative feelings. Comparing the Theories The underlying reasons behind altruism, as well as the question of whether there is truly such a thing as pure altruism, are two issues hotly contested by social psychologists. Do we ever engage in helping others for truly altruistic reasons, or are there hidden benefits to ourselves that guide our altruistic behaviors? Some social psychologists believe that while people do often behave altruistically for selfish reasons, true altruism is possible. Others have instead suggested that empathy for others is often guided by a desire to help yourself. Whatever the reasons behind it, our world would be a much sadder place without altruism. Can People Learn to Be Heroes?

Thursday, May 21, 2020

Simulation of Heap File Operations - Free Essay Example

Sample details Pages: 11 Words: 3227 Downloads: 4 Date added: 2017/06/26 Category Finance Essay Type Argumentative essay Did you like this example? Simulation of Heap File Operations Synopsis (Abstract) The Project demonstrates the simulation of heap file operations and its cost management, by displaying the time taken to complete the selected operations. Various operations such as scanning, insertion, deletion and searching are performed for heap file in this project. In heap file, all the records are stored in chronological order, i.e. Don’t waste time! Our writers will create an original "Simulation of Heap File Operations" essay for you Create order the data is stored as and when it comes in the last, i.e. at the end of the file. There is no sorting applied to the heap files. Due to this, heap file is the most efficient file organization system for applications which have more and more number of insertions and very less deletions and searching. For Deletion, the required page is searched by scanning the whole file. The whole file has to be scanned as the data is not in sorted order and the file can be found anywhere in the file. The record to be deleted is identified using RID (Record Identifier). Once a record is deleted, the data below it shifts up a place in database to accommodate the empty space in middle. Hence all the empty spaces are available at the end of the file in heap file organization. Searching in heap files can be done in 2 ways, Searching with equality and Searching within range. In search with equality, a particular record is to be searched based on the equality condition. In searching within range, a range is given and the records between that ranges is displayed. In heap file organization, only insertion is the most efficient and faster operation. Rest all operations takes a lot of time as they have to scan the whole record due to its unsorted data. Hence heap file organizations are best used in applications which have large number of insertions and very less number of deletions or searching. Examples for the applications can be any statistical information collecting application, such as traffic monitoring or population statistics. Where insertions can be per minute or per day, and fetching or searching can be per day or per year. Heap file is the simplest method for storing data base file. Every operation has different method to calculate cost model. For calculation of cost model, we used four parameters B, R, C, D. B denotes number of pages fully occupied page, R denotes number of records, D denote average time to perform read and write operation, C denotes average time to perform da tabase operation. The methodology is simple for heap file organization. For simulation purpose and to show how the heap file organization works, MySql database has been used. The data is inserted always at the end. For this, No primary key is assigned, hence data is not sorted and inserted always at the end of the table. Any deletion in the table, all the data below it shifts up. For any scanning or searching operation, we have to scan the whole table. To achieve this. We have used simple MySql queries with java programming language, which is connected to MySql using JDBC connectivity drivers. For the front end design, NetBeans IDE have been used. NetBeans provides various inbuilt packages which can be used for the efficient work on databases. Like DBUtils have a tool which converts resultset table data into the Jtable of NetBeans. The cost model is calculated using java programming languages basic time calculation tools. The main outcome of the project is that, we have achiev ed the proper working of all the basic operations of heap file organizations such as insertions, deletions, searching and scanning. And all these operations are handled through the well-designed front end. And the cost model of these operations are also calculated and displayed to the user in the front end as and when any operation is performed. Chapter 1: Introduction 1.1 Pre-amble: The Background work for the heap file organization is very less, as this file organization is not very efficient for most of the daily used application. All the daily used application requires more and more of searching, fetching and deletion of data, which works really slow in heap file organization due to its unsorted nature. Hence the heap file canà ¢Ã¢â€š ¬Ã¢â€ž ¢t be used for most of the day to day applications. But it can be used in statistical applications such as population survey, traffic monitoring etc. where data insertions are far more than deletions or searching. Basically these a pplications donà ¢Ã¢â€š ¬Ã¢â€ž ¢t have proper user interfaces defined to them as they concentrate more on data than user interface. They donà ¢Ã¢â€š ¬Ã¢â€ž ¢t have the mechanism to calculate the cost incurred for the operations on insert, delete and searching. Hence, in our application we created an application with well-designed User interface which can store data in the heap file and calculate and show the cost incurred for the various operations. It will also show the contents of the Database in real time as and when the data is inserted or deleted. 1.2 Literature Review: 1.3 Problem Statement: Simulate and show how the data is stored in a heap file organization by performing basic operations. Basic operations to be performed on a heap file includes insertion, deletion, searching with equality and searching within range, and scanning. Calculate the cost model for each and every operation. Represent the cost model in a graph for bulk record insertions. 1.4 Methodology Adopted: To simulate and show how the data in inserted and stored in a heap file, we have used MySql database. In MySql , we have created a table without any primary key, as a primary key sorts the data as per the tuples in that column , and hence it does not satisfies the heap file structure. The front end is designed in NetBeans and coded using java programming language. The front end is connected to back end using the Java Data Base Connectivity (JDBC), which is a standard API that allows java programs to access database management systems. TheJDBCAPI consists of a set of interfaces and classes written in the Java programming language. 1.5 Technical Features: Simulate and shows the working of heap file organizations, i.e. shows how the records are stored in database in a heap file. Shows in real time in the front end that the insertion always happens at the end of the file and no sorting mechanism is involed. Shows how the deletion is performed in a heap file, i.e. after scanning the whole file for a particular Record Identifier (RID). Shows how searching with equality and searching within range works through front end visualization. NetBeans IDE is used for the front end design. MySql is used for the database management system. JDBC is used for connecting the java programming language used in NetBeans to the MySql. Chapter 2 : Project Description In this simplest and most basic type of organization,records are placed in the file in the order in which they are inserted, so new records are inserted at the end of the file. Such an organization is called a heap or pile file. This organization is often used with additional access paths, such as the secondary indexes. It is also used to collect and store data records for future use. Inserting a new record is very efficient. The last disk block of the file is copied into a buffer, the new record is added, and the block is then rewritten back to disk. The address of the last file block is kept in the file header. However, searching for a record using any search condition involves a linear search through the file block by blockà ¢Ã¢â€š ¬Ã¢â‚¬ an expensive procedure. If only one record satisfies the search condition, then, on the average, a program will read into memory and search half the file blocks before it finds the record. For a file of b bl ocks, this requires searching (b/2) blocks, on average. If no records or several records satisfy the search condition, the program must read and search all b blocks in the file. To delete a record, a program must first find its block, copy the block into a buffer, delete the record from the buffer, and finally rewrite the block back to the disk. This leaves unused space in the disk block. Deleting a large number of records in this way results in wasted storage space. Another technique used for record deletion is to have an extra byte or bit, called a deletion marker, stored with each record. A record is deleted by setting the deletion marker to a certain value. A different value for the marker indicates a valid (not deleted) record. Search programs consider only valid records in a block when conducting their search. Both of these deletion techniques require periodic reorganization of the file to reclaim the unused space of deleted records. During reorganization, the file blocks a re accessed consecutively, and records are packed by removing deleted records. After such a reorganization, the blocks are filled to capacity once more. Another possibility is to use the space of deleted records when inserting new records, although this requires extra book keeping to keep track of empty locations. We can use either spanned or unspanned organization for an unordered file, and it may be used with either fixed-length or variable-length records. Modifying a variable length record may require deleting the old record and inserting a modified record because the modified record may not fit in its old space on disk. The cost model of a heap file can be calculated using 4 variables, i.e. B, R, C, D. B denotes number of pages fully occupied page, R denotes number of records, D denote average time to perform read and write operation, C denotes average time to perform database operation. Let us see the theoretical cost model calculations in a heap file with respect to differe nt operations: Scan: The cost is B (D+RC) because we must retrieve each of B pages taking time D per page, and for each page, process R records taking time C per record. Search with Equality Selection: Suppose that we know in advance that exactly one record matches the desired equality selection, that is, the selection is specified on a candidate key. On average, we must scan half the file, assuming that the record exists and the distribution of values in the search field is uniform. For each retrieved data page, we must check all records on the page to see if it is the desired record. The cost is O.5B (D + RC). If no record satisfies the selection, however, we must scan the entire file to verify this. If the selection is not on a candidate key field (e.g., Find employees aged 18), we always have to scan the entire file because records with age = 18 could be dispersed all over the file, and we have no idea how many such records exist. Search with Range Selection: The entire file must be scanned because qualifying records could appear anywhere in the file, and we do not know how many qualifying records exist. The cost is B (D + RC). Insert: we assume that records are always inserted at the end of the file.  ¥e must fetch the last page in the file, add the record, and write the page back. The cost is 2D +C. Delete: We must find the record, remove the record from the page, and write the modified page back. We assume that no attempt is made to compact the file to reclaim the free space created by deletions, for simplicity. The cost is the cost of searching plus C + D. We assume that the record to be deleted is specified using the record id. Since the page id can easily be obtained from the record id, we can directly read in the page. The cost of searching is therefore D. If the record to be deleted is specified using an equality or range condition on some fields, the cost of searching is given in our discussion of equality and range selections. The cost of deletion is also affected by the number of qualifying records, since all pages containing such records must be modified. The NetBeans provide various tools to design an efficient front end, and java programming provides large number of interfaces and classes to perform operations on databases using JDBC. The resultsets are used to take results from database and display it in the front end. And NetBeans have a package called DButils which helps in converting the ResultSet table data into the NetBeans table data. An SQLresult setis a set of rows from a database, as well as metadata about the query such as the column names, and the types and sizes of each column. Depending on the database system, the number of rows in theresult setmay or may not be known. In short, the overview of Heap file in points: Simplest and most basic method insert efficient, with new records added at the end of the file, providing chronological order retrieval inefficient as searching has to be linear deletion is accomplished by marking selected records as deleted requires periodic reorganization if file is very volatile (changed frequently) Advantages efficient for bulk loading data efficient for relatively small relations as indexing overheads are avoided efficient when retrievals involve large proportion of stored records Disadvantages not efficient for selective retrieval using key values, especially if large sorting may be time-consuming not suitable for volatile tables Chapter 3: Software Requirement Specification This chapter deals with the software and hardware requirements for our application. All applications have their own software and hardware requirements based on the work they perform and tools they use. The Hardware requirements gives the minimum amount of hardware required to run the application efficiently without any hitches. The hardware requirements include processor, ram, Hard Disk space etc. The software requirement gives the details about the required tools, languages, database management systems and their versions which are compatible for this application. 3.1 Introduction: 3.2 Hardware and Software Requirements: Hardware Requirements: Processorà ¢Ã¢â€š ¬Ã¢â‚¬Å" Dual Core (minimum), Quad Core (Recommended). RAM à ¢Ã¢â€š ¬Ã¢â‚¬Å" 1gb (minimum), 2gb (Recommended). Storage à ¢Ã¢â€š ¬Ã¢â‚¬Å" 500mb (minimum), 750mb (Recommended). Software Requirements: Ubuntu 14.04 LTS Netbeans 6.7 or higher. Java Programming Language (openjdk-6). JDBC Connector. DBUtil package in NetBeans. 3.3 Functional Requirements: Introduction : The most basic functional requirement to show the working of heap file is data. Every application needs data to act upon. Here we will have student records to be inserted into a heap file. There will be a field to get student id for equality search and lower and upper limits for range search. There will be buttons to select any particular operation to be performed. There will be table views in front which show the real time output of how the data is stored in the database. Input: The inputs are Student Id, Student Name, Semester and marks. All these details are inserted with every student record. All these inputs are provided at the front end i.e. User Interface provided by the Application. For searching with equality, we will need a student id as an input to search the student with that particular student id. For searching within range, we need upper limit and lower limit of the range, to get all the records which comes within that range. There will be separate buttons for all the operations, clicking on the button will perform a particular operation Processing: Once the inputs are given, the inputs are processed from the front end and passed to the database through Sql queries. The queries are created in java programming languages and passed to MySql through JDBC connector/Driver. For all the operations, cost will be calculated as soon as the operation is performed. Output: After processing, the output is generated at the front end which shows the real time working of the database and where the recently added data is stored (i.e. at the end of the file in our heap file application). It will also show the cost model calculated during the processing time for that particular operation. 3.4 External Interface Requirements: Java Database Connectivity(JDBC): The JDBC have pre-defined interfaces and methods to perform various operations on database management systems. Queries are prepared using the statements and those statements are used to execute the query with methods like executeQuery(). ResultSets is a set of rows from a database, as well as metadata about the query such as the column names, and the types and sizes of each column. Depending on the database system, the number of rows in theresult setmay or may not be known. DataBase Utility(DBUtil): The ResultSet returns the contents of the database table in rows and colums. To convert the table details stored in ResultSet into the table model of NetBeans, an external package is implemented called DBUtil. DButil consists of a method called ResultSetToTableModel(arg), which takes one argument of ResultSet type. 3.5 Performance Requirements: The Performance of our application is totally dependent on the basis of the operations performed on it. If the operations include large number of insertions, this application provides the fastest and efficient way for it. But if there are more number of deletion and searching operation, the performance of this application may reduce as compared to the insertion operations. All this is due to the structure of Heap files, where insertions are performed faster, as the records are stored at the end of the file and it doesnà ¢Ã¢â€š ¬Ã¢â€ž ¢t have to follow any sorted mechanism. Whereas any deletion or searching operation requires the whole file to be scanned to search for the desired record. 3.6 Design Constraints: Primary key not to be used, as it will sort the file on which it has been used. Deletions and searching operations should be performed rarely. Chapter 4: Design Specification 4.1 Architectural Design: 4.2 System Design: 4.3 Detailed Design: Chapter 5: Testing and Results 5.1 Testing: Unit Testing: Unit testingis a softwaretestingmethod by which individual units of source code, sets of one or more computer program modules together with associated control data, usage procedures, and operating procedures are tested to determine if they are fit for use. In out applications, all the operations performed on heap file such as insertion, deletion etc are all created in separate units. Each of which is tested separately if they are fit to be used or not. Integration Testing: Integration testing(sometimes calledintegrationandtesting, abbreviated IT) is the phase in softwaretestingin which individual software modules are combined andtestedas a group. In our application, after unit testing, we integrate all those units i.e. operations into one application and check if they working fine together. 5.2 Results: 5.3 Conclusion: This application demonstrates the simulation of how the data is organized in heap file organizations and how various operations are performed on it. This application also calculates the cost model and shows how much time a particular operation took, to perform the given task. The heap file organization gives best and efficient results for insertions. Whereas deletion and searching takes more time insertion takes. Hence, this application proves that heap files are best for the applications where insertions are too many and deletions/searching is too less, for example, in statistical applications such as population survey, traffic monitoring etc. This application provides a user friendly front end to see the real time working of heap files and how the inserted data is arranged in a heap file to make user understand the concept of heap file in a better way. References Annexure Department Of MCA, RVCE1

Wednesday, May 6, 2020

Provision of Care for Patient with HIV - 553 Words

Provision of Care for Patient with HIV: As a global epidemic, HIV has created several challenges for doctors and health care facilities since it represents an overwhelming public health crisis. While there are various factors that contribute to its spread, initiatives to combat the virus are usually influenced by the availability of human and financial resources. In the past few years, several measures have been undertaken to help curb the spread of the virus and its effects on patients. These initiatives are primarily divided into two categories i.e. provision of care to patients and treatment of the virus. One of the major ways in which HIV patients are provided with care is through policy and programming that is centered on HIV and AIDS-related care (Ogden, Esim Grown, 2006, p.333). Generally, caring for a patient with HIV needs significant time and resources, which has contributed to the shift of clinical care to the home and community. The provision of care for patient with HIV includes a series of various steps in the care continuum in the home and the community. The first step is follow-up care that is built on strong routine screening processes, which help in early identification of infected persons (â€Å"Connecting HIV Infected Patients to Care†, 2009). Regular screening contributes to early diagnosis and treatment that can considerably enhance the health of the infected patients and prevent new infections. The second step is connecting to care through properShow MoreRelatedThe American Nurses Association Code Of Ethics922 Words   |  4 PagesAccording to this case, a patient, who has not told his family that he has been living with HIV and AIDS for 14 years, has been admitted to the hospital for pneumonia. Before he fell into a coma, he disclosed to doctors that he did not want his family to know that he has HIV or AIDS. However, he does have a durable power of attorney, his brother, who has arriv ed at the hospital. Unfortunately, whether the doctor decides to uphold the patient’s request to keep the patient’s information quiet or decidesRead MorePolicies, Finance, Global Prevention Initiatives And Ethical Principles797 Words   |  4 PagesEthical Principles Implementation of the Ryan White CARE Act of 1990 assures, people with human immunodeficiency virus (HIV) and acquired immune deficiency syndrome (AIDS), and their families access to quality treatments (Akukwe, 2001). On July 2010, President Obama announced the National HIV/AIDS Strategy to reduce HIV incidence, optimizing better health outcomes, and to reduce HIV-related instances (Department of Veterans Affairs National HIV/AIDS Strategy Operation Plan, 2011). To accomplish theseRead MoreHuman Immunodeficiency Virus And Acquired Immune Deficiency Syndrome Essay1691 Words   |  7 Pagesconjunction with how it can be transmitted, so basically if it is highly contagious and most importantly, if any cure has been established for it. Human Immunodeficiency Virus and Acquired Immune Deficiency Syndrome(HIV/AIDS) is one of the most difficult epidemics to control. This is because, the HIV virus attacks the very cells designed to control and as such, can avoid exposure to treatments which is the major reason why a cure for it hasn’t been found. Owing to the lack of their knowledge of the severityRead MoreThe Impact Of Nurses And Advanced Practice Registered Nurses925 Words   |  4 Pagesare the first health care professionals that patients meet in a health care setting. The nurses have a major impact on the patients. A condition like Human Immunodeficiency Virus (HIV) infection and Acquired Immuno Deficiency Syndrome (AIDS) has a major stigma with it. In the past, the stigma of HIV/AIDS was higher among people due to the cultural, social, and religious reasons. The AIDS certified registered nurses and other nurses can help reduce the stigma towards the patients. Organizations likeRead MoreAnalyzing The Past, Present And Future Of The Congressional Attempt At The Health Care Reform1704 Words   |  7 Pagesthe health care reform. Originally presented to congress was the Health Security Act in 1993, which was not enacted until June 2014. The Health Security Act started the foundation for patient privacy and the security of an individual’s health information. As the years passed the Health Security Act became quickly outdated and needed to be updated to complement the sudden progression of current technology advances. Congress was presented the Kennedy-Kassebaum Act, which defined patient rights andRead MoreHiv Viral Suppression Of More Than 200 Copies / Ml Of Blood Is Not The Gold Standard1285 Words   |  6 PagesAlthough a HIV viral suppression of less than 200 copies/mL of blood is not the gold standard at most sites. the rate is measured via the same definition across HHS agencies and programs. This includes HRSA and its HAB (2015) under which the RWHAP Part C falls, the Centers for Disease Control and Prevention, and CMS through â€Å"Medicaid, Medicare Physician Quality Reporting System, Physician Feedback/Quality and Resource Use Reports, [and a] Physician Value-Based Payment Modifier† (National QualityRead More The Patient Protection And Affordable Care Act900 Words   |  4 PagesThe patient Protection and Affordable Care Act (PPACA) is the most debatable act which was signed into law on March 23rd, 2010 by President Obama (Obamacare Bill: Full PPACA Related Laws, n.d.). According to Affordable Care Act and the IAFF (2014), PPACA has three main objectives: expand access to healthcare coverage, shield patients against illogical actions by health insurance companies, and cut healthcare costs. The United States (U.S.) is the only advanced country that spend twice as muchRead MoreThe Electronic Health Record And The Movement Toward The Digital Age1716 Words   |  7 Pagesreduce disparities of patient data of the positive HIV population. The course outcomes that my paper will address are the rules and regulations regarding privacy, confidentiality, and compliance with special attention to the HIPAA Privacy and Security rules on our local, state, federal and various regulatory agencies, a nd the enforcement authority of these agencies for patients with positive HIV. I plan to recognize the ethical issues and barriers for patients with HIV and the use of the computerizedRead MorePatients Claims Of Denial Of Services Essay1352 Words   |  6 PagesPatients’ Claims of Denial of Services in Healthcare Facility The Office for Civil Rights of the U.S. Department of Health Human Services enforces federal laws that prohibit discrimination by health care and human service providers. Both Section 504 of the Rehabilitation Act of 1973 Title II of the Americans with Disabilities Act of 1990 prohibit discrimination against qualified persons with HIV other disabilities. Section 504 prohibits discrimination by health care and human services providersRead MoreThe Importance of the Health Workforce to Health Care1353 Words   |  5 PagesWorld Health Organisation recommends a ratio of 2.3 health care workers per 1,000 populations as a minimum to meet the millennium development health goals (WHO, 2012). Uganda’s ratio currently stands at approximately 1.8/1,000 (MoH, 2011). Although this ratio represents a considerable improvement for the last 5–10 years, it is still clear that the absolute number of health care workers in Uganda is too low. In Malawi the physician to patient ratio sto od at1:16,000 (MOH, 2011). Globally, population

Economic Indicators of Oman Free Essays

Topic: analysis of economic indicators of oman INTRODUCTION Oman,  officially called the  Sultanate  of Oman  is an  Arab  state in southwest Asia on the southeast coast of the  Arabian Peninsula. It is bordered by the  United Arab Emirates (UAE) to the northwest,  Saudi Arabia  to the west and  Yemen  to the southwest. The coast is formed by the  Arabian Sea  on the southeast and the  Gulf of Oman  on the northeast. We will write a custom essay sample on Economic Indicators of Oman or any similar topic only for you Order Now Oman is an absolute monarchy in which the  Sultan of Oman, named Sultan Saeed bin Qaboos,  exercises ultimate authority but its  parliament  has some legislative and oversight powers. In November  2010, the  United Nations Development Programme  (UNDP) listed Oman, from among 135 countries worldwide, as the nation most-improved during the preceding 40  years. According to international indices, it is one of the most developed and stable countries in the  Arab. Oman is a middle-income economy that is heavily dependent on dwindling oil resources. Because of declining reserves and a rapidly growing labor force, Muscat, the capital of Oman has actively pursued a development plan that focuses on diversification, industrialization, and privatization, with the objective of reducing the oil sector’s contribution to GDP to 9% by 2020 and creating more jobs to employ the rising numbers of Omanis entering the workforce. Tourism and gas-based industries are key components of the government’s diversification strategy. By using enhanced oil recovery techniques, Oman succeeded in increasing oil production, giving the country more time to diversify, and the increase in global oil prices through 2011 provided the government greater financial resources to invest in non-oil sectors. | 2000| 2001| 2002| 2003| 2004| 2005| 2006| 2007| 2008| 2009| 2010| 2011| 2012| Unemployment| –| –| –| –| –| –| –| –| –| –| –| –| –| Inflation| – 1. 2| -0. 8| -0. 3| 0. 2| 0. 8| 1. 9| 3. 2| 6. 0| 12. 1| 3. 9| 3. 2| 4. 1| –| GDP growth annual (%)| –| –| 2. 6| 0. 3| 3. 4| 4. | 5. 5| 6. 8| 12. 8| 1. 1| 4. 0| 5. 5| –| GDP real growth (%)| 4. 6| 7. 4| 2. 2| 1. 1| 1. 2| 5. 6| 6. 6| 5. 6| 6. 4| 2| 4. 2| 5. 5| –| Reserves (billion US $)| –| –| 3. 173| 3. 593| 3. 597| 4. 358| 5. 014| 9. 523| 11. 582| 12. 203| 13. 025| 14. 366| –| Tax/GDP (%)| –| –| –| –| –| 19. 50| 20. 30| 21. 60| 21. 60| 21. 60| 21. 60| 22. 0| –| Trade/GDP (%)| –| –| 77. 4| 82. 9| 90. 6| 89. 9| 88. 8| 96. 9| 96. 2| 94. 1| –| –| –| External Debt (billion US $)| 4. 8| 4. 5| 5. 3| 5. 7| 5. 97| 4. 81| 4. 36| 4. 26| 5. 3| 6. 88| 7. 06| 8. 83| 9. 5| Saving/GDP (%)| –| –| 40. 2| 39. 4| 38. 1| 50. 5| 49. 0| 47. 2| 51. 0| –| –| –| –| Real Interest Rate(%)| –| –| 10. 8| 1. 0| -2. 9| -11. 1| -4. 8| 0. 6| -16. 4| 40. 4| -10. 0| -9. 7| | Exchange rate ($)| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| 0. 38| ECONOMIC INDICATORS OF OMAN Analysis of the Economic Indicators of Oman 1. Unemployment: percent of the labor force that is without jobs Oman has a population of 2. 981 million, which is rising at around 3. 4% a year. Its labor force is just shy of 1 million. There are no up-to-date unemployment figures available for Oman. Unemployment was estimated at 15% in 2004, but it has been dropping as the ‘Omanization’ program continues to roll out, and is forecasted to drop below 10% within the next five years. The policy of Omanisation aims to replace expatriate workers with locals. 2. Inflation: as measured by the consumer price index reflects the annual percentage change in the cost to the average consumer of acquiring a basket of goods and services that may be fixed or changed at specified intervals, such as yearly. Despite high liquidity, inflation remained low in the range of -1% to 1. 9% during 2001 to 2005, but flared up to an annual rate of (12. 6%) in 2008 compared to a (5. 9%) in 2007 due to high import prices for goods priced in Euro, Japanese Yen and British Pound sterling, and the depreciation of the US Dollar against the world major currencies. Oman’s monetary policy focuses on controlling inflation, which has remained generally modest, partly reflecting the openness of the economy. The government controls the prices of many goods and services through subsidies. Moreover, the government does not resort to monetization of its budget deficits, so there is little inflationary pressure from this source. CPI inflation came down to a manageable rate of 3. 5% in 2009 due to wise monetary and fiscal policies of the government. Omani Riyal is pegged to the US Dollar and as the USA is an important source of imports for Oman, it protects prices from some of the pressures of imported inflation from the USA. The yearly rates of consumer price inflation are expected at (3. 9%) and (2. 9%) in 2010 and 2011, respectively. 3. Gross domestic product: GDP is the sum of gross value added by all resident producers in the economy plus any product taxes and minus any subsidies not included in the value of the products. It is calculated without making deductions for depreciation of fabricated assets or for depletion and degradation of natural resources. A surge in oil prices since 2003 has resulted in a strong growth of Oman’s economy, which has grown almost two and a half times in size during 2002 to 2008. Nominal GDP grew strongly at the rate of 44% to US$60 billion in 2008 compared to US$41. billion in 2007. Nominal GDP shrank by (-10. 9%) to $53. 4 billion in 2009 due to the global financial and economic crisis and the slump in the world oil market. However, nominal GDP is likely to expand by 16. 6% and 8. 9% to US$62. 3 billion and $67. 8 billion in 2010 and 2011, respectively. In real terms, the economy grew at the rate of 3. 4% in 2009 compared to 6. 2% in 2008. The economy is expected to pick up a nd expand at the rate of 4. 7% each in 2010 and 2011 on the back of the expected global economic recovery and increased world oil demand. 4. Total reserves Reserves comprise holdings of monetary gold, special drawing rights, reserves of IMF members held by the IMF, and holdings of foreign exchange under the control of monetary authorities. The gold component of these reserves is valued at year-end (December 31) London prices. Data are in current U. S. dollars. Since 1973 the Omani Riyal (RO) has been pegged to the US dollar. After 10. 2% devaluation in January 1986, it has remained at the level of RO: US$2. 60, which is likely to continue in the medium-term. A relatively low inflation and increasingly tight fiscal policy have helped the government maintain this peg. Total reserves excluding gold stood at US$11. 5 billion at the end of 2008 compared to US$9. 5 billion at the end of 2007. Foreign reserves stood at US$ 11 billion in 2009, which are expected at $11. 1 billion and $11. 5 billion by the end of 2010 and 2011, respectively. 5. Tax/GDP Tax revenue refers to compulsory transfers to the central government for public purposes. Certain compulsory transfers such as fines, penalties, and most social security contributions are excluded. Refunds and corrections of erroneously collected tax revenue are treated as negative revenue. Tax as a percentage of GDP is quite low throughout the years because resources are in abundance to generate wealth, hence revenue from tax is low. 6. Trade/GDP Trade is the sum of exports and imports of goods and services measured as a share of gross domestic product. A high portion of gdp is being utilized in trade. OMAN’S MAIN ITEM OF EXPORTS: petroleum, fish, metals, textiles OMAN’S MAIN ITEM OF IMPORTS: machinery and transport equipment, manufactured goods, food, livestock, lubricants 7. External Debt This entry gives the total public and private debt owed to nonresidents repayable in foreign currency, goods, or services. These figures are calculated on an exchange rate basis, i. e. , not in purchasing power parity (PPP) terms. Higher oil prices resulted in huge trade and current account surpluses during 2005 to 2008. A surplus on current account stood at US$ 5. 47 billion (9. 1% of GDP) in 2008 compared to US$2. 59 billion (6. 2% of GDP) in 2007. The economy realized a marginal surplus of $0. 14 billion (0. 3% of GDP) in 2009 due to the global crisis and the slump in the world oil market. However, the economy is expected to realize higher surpluses of $1. 48 billion (2. 4% of GDP) and $2. 4 billion (3. 2% of GDP) in 2010 and 2011, respectively on the back of likely recovery in the global oil market. Bearing in mind the considerable remittances by foreign workers, profit remittances by the foreign partners of Petroleum Development Oman (PDO), as well as those of private sector foreign companies in Oman, there will be a strong positive impact on current account balances. 8. Saving/gdp: shows the ratio of savings and gdp. 9. Real interest rate Interest rate is the cost of borrowing and real interest rate is interest after deducting inflation as measured by the GDP deflator. In 2009, due to the world oil crisis Oman’s economy shrank and therefore its external debt increased as a result there was increase in the cost of borrowing. Therefore the real interest rate rose up to 40% in 2009, also keeping in mind a lower inflation rate of 3. 9%. 10. Exchange rate Exchange rate refers to the exchange rate determined by national authorities or to the rate determined in the legally sanctioned exchange market. It is calculated as an annual average based on monthly averages (local currency units relative to the U. S. dollar). From 1973 to 1986, the rial was pegged to  U. S. dollar  at 1 rial = 2. 895 dollars. In 1986, the rate was changed to 1 rial = 2. 6008 dollars,  which translates to approximately 1 dollar = 0. 384497 rial. The Central Bank buys U. S. dollars at 0. 384 rial, and sell U. S. dollars at 0. 385 rial. Now it is the third highest. Oman has a strong currency which may have the following disadvantages assuming all factors remaining constant: 1. The lower price of imports leads to consumers increasing their demand and this can cause a large trade deficit. Exporters lose  price competitiveness  because they will find it more expensive to sell in foreign markets and face losing market share – this can damage profits and employment in some sectors and industries. 2. If exports fall, this causes a reduction in aggregate demand and reduces the short-term rate economic growth as measured by the % change in real GDP. 3. Because investment is partly dependent on the strength of demand, if exports fall, then so will business confidence and capital investment. SOURCES: 1. http://www. gulfbase. com 2. http://www. indexmundi. com 3. http://www. worldbank. org/ How to cite Economic Indicators of Oman, Essay examples

Saturday, April 25, 2020

So Whats It All About Essays - Heinrich Himmler, The Holocaust

So What's It All About SO WHATS IT ALL ABOUT? Susan Griffins Our Secret is a study in psychology. It is a look into the human mind to see what makes people do the things they do and in particular what makes people commit acts of violence. She isolates the first half of the twentieth century and in particular the era of the Second World War as a basis for her study. The essay discusses a number of people but they all tie in to Heinrich Himmler. He is the extreme case, he who can be linked directly to every single death in the concentration camps. Griffin seeks to examine Himmler because if she can discern a monster like Himmler than everyone else simply falls into place. The essay also tries to deduce why something like the Holocaust, although never mentioned directly, can take place. How can so many people be involved and yet so few people try to end it. Griffin questions the cause of violent tendencies. Is it the way one is raised? To answer this question, she looks at Himmlers childhood. He was raised in a stern and regimented manner with his father controlling every aspect of his life. His father ruled even an act as simple as keeping a journal. Griffin writes, The very act of keeping a journal, I sensed, would help me into this life that would now be my own (Griffin 407). She is speaking of the benefits of keeping a journal and how it can act as a way to express your feelings and that it can be an outlet for your emotions. Himmler did not have this luxury. Gebhard writes the first entry in his sons diary, to show the boy how it is to be done. July 13 Departed at 11:50 and arrive safely on the bus in L. We have a very pretty house. In the afternoon we drink coffee at the coffee house (Griffin 407). As we can see, Himmler is not even allowed to write as he wants but instead is taught to record the facts and nothing more. This was n ot a source of anger for Himmler but rather began the shaping process of his life. The earliest entries in this diary betray so little. Like the words of a schoolboy commanded to write what the teacher requires of him, they are wooden and stiff. The stamp of his fathers character is so heavy on this language that I catch not even a breath of a self here. (Griffin 407-408) He became a man who thought not for himself but preferred to have others give him commands. That is why he rose to power in the Nazi party, he did not question orders but rather thrived on them. Following Hitler with unwavering loyalty, he is known as der treur Heinrich, true Heinrich. He describes himself as an instrument of the Fuhrers will (Griffin 421). Did the violence in Himmler stem from his adoration of his brother, the perfect physical specimen. Heinrich tried his whole life to be like his older brother, strong and masculine. So much so that while serving as Reichsfuhrer he devised a set of standards for the Aryan Race to live up to. One could argue that these standards were modeled after his brother. Himmlers belief in physical superiority led to the suppression and deaths of many who did not measure up which is ironic because Himmler himself was frail and did not meet any of his own standards. Influenza struck Himmler as a child which prevented him from becoming strong as an adult. Compared with his brother he is weak. He sees his brother and how popular he is. This led Himmler to associate the two together. Strength became synonymous with popularity and then with power. While in the Nazi party, Himmler surrounded himself with people who were fit. He was the one they went to for orders and he had power over them. For once in his life, Heinrich Himmler, the frail and weak man, controlled the physically fit. He was in control for the first time in his life and it was time for revenge. Himmler inflicted on the Jews, Gypsies, and homosexuals what was inflicted on

Wednesday, March 18, 2020

Port Security

Port Security Despite the tremendous efforts in the field of port security, U.S. ports remain vulnerable to the threat of the terrorist attacks due to the complexity of their functional systems and the wide range of stakeholders responsible for the different aspects of safety measures development and implementation.Advertising We will write a custom essay sample on Port Security specifically for you for only $16.05 $11/page Learn More The following discussion will analyze and critique the safety and emergency management structures in the port environment. In addition, it will address the supporting plans and programs and the legislative policies developed to prevent and respond for a WMD attack at a major port. The safety and emergency management structure found in the port environment can be evaluated as quite effective with some considerable issues that still remain. The weak points include the following omissions: (1) vessel identification system is not available for e very port; (2) omissions are identified in port security assessment procedures; (3) security issues related to foreign vessels; (4) IT technical issues in the port security systems; and (5) inconsistence of emergency management practices in some ports to the general guidelines and regulations provided by the government (U.S. General Accounting Office, 2003a; U.S. General Accounting Office, 2003b). The supporting plans and programs typically found in a major port operation complex structure of ports amount to ensuring that the brought to ports cargo is safe (U.S. General Accounting Office, 2005). The major components of these plans and programs include the principle of â€Å"reporting about every cargo assessment result within the 24-hours period† and â€Å"integrated training for all port security workers to ensure their professionalism as for the technical aspect of protection systems† (U.S. General Accounting Office, 2004). Evaluating the legislative policies develop ed to prevent, prepare for, respond to, and recover from a WMD attack at a major port, considerable progress since the year 2001 is noted. Legislators did not fail to notice the limitations the port security systems had. Since the terrorist attack on September 11, 2001, the government systematically draws closer to the exalted objective to secure safety in ports. The remarkable achievements include refining the Automated Targeting System regulations and designing the national standards for the port security workers’ attestation (Congressional Research Service, 2004; U.S. General Accounting Office, 2004). However, as far as I am concerned, the current legislative security policies are insufficient to secure and protect US ports due to the complicated system of port authority distribution between the public and private stakeholders, and interference from multiple governmental and private agencies. The reality of a terrorist nuclear threat to America’s seaports is high. T he situation is getting worse because of the sheer size of cargo being operated in ports every day and absence of the well-designed system of the central authority overseeing the maritime system (Cruise et al., 2013).Advertising Looking for essay on political sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a final point, the vulnerability of the U.S. ports to the terroristic threats remains of high concern to the government and commercial institutions due to a variety of complex issues connected with the port security. The most complicated issues relate to the complexity of ports authority. Analysis of facts demonstrates that there are too many stakeholders involved in the process of port security control. These stakeholders have problems with implementing the unified security systems developed by the governmental agencies and, as a result, some of the major ports appear vulnerable to a WMD attack due to the existing un ifying protection violations. References Congressional Research Service. (2004). Border and transportation security: Overview of congressional issues. A Report to Congress. Web. Cruise, R. J., DErman, V. J., Grillot, S. R. (2013). Protecting Our Ports: Domestic and International Politics of Containerized Freight Security. New York, N.Y.: Ashgate Publishing, Ltd. U.S. General Accounting Office. (2003a). Homeland security: Preliminary observations on efforts to target security inspections of cargo containers. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2003b). Maritime security: Progress made in implementing maritime transportation security act, but concerns remain. U.S. General Accounting Office. Web. U.S. General Accounting Office. (2004). Homeland security: Summary of challenges faced in targeting ocean-going cargo containers for inspection. U.S. General Accounting Office. Web.Advertising We will write a custom essay sample on Port Security specif ically for you for only $16.05 $11/page Learn More U.S. General Accounting Office. (2005). Homeland security: Process for reporting lessons learned from seaport exercises needs further attention. U.S. Government Accountability Office. Web.

Sunday, March 1, 2020

Natural Mosquito Repellent Recipe

Natural Mosquito Repellent Recipe Its easy to make your own natural mosquito repellent. You can control exactly what goes into the product so you wont need to worry about any unwanted chemicals. Natural Mosquito Repellent Safety There are a couple of different formulations you can use for your natural mosquito repellent. In general, what you are doing is diluting an essential oil that the mosquitoes find distasteful or which confuses them so they cant find you to bite you. The oils dont mix with water, so youll need to add them to other oils or to alcohol. Its important to use an oil or alcohol that is safe for your skin. Also, dont go overboard with the essential oils. The oils are potent and could cause skin irritation or another reaction if you use too much. If you are pregnant or nursing, do not use any mosquito repellent, natural or otherwise, until after youve gotten it cleared by your physician. Natural Mosquito Repellent Ingredients If you are making large amounts of mosquito repellent, a good rule of thumb is to mix the repellent so its 5-10% essential oil. That means you should mix one part essential oil with 10-20 parts carrier oil or alcohol. For a smaller batch use: 10-25 drops (total) of essential oils2 tablespoons of a carrier oil or alcohol The essential oils that work well against mosquitoes are: cinnamon oillemon eucalyptus oilcitronella oilcastor oil Safe carrier oils and alcohols include: olive oilsunflower oilany other cooking oilwitch hazelvodka Natural Mosquito Repellent Recipe Mix the essential oil with the carrier oil or alcohol. Rub or spray the natural insect repellent onto skin or clothing, using care to avoid the sensitive eye area. Youll need to re-apply the natural product after about an hour or after swimming or exercise. Unused natural insect repellent may be stored in a dark bottle, away from heat or sunlight.

Friday, February 14, 2020

English Education Essay Example | Topics and Well Written Essays - 1000 words

English Education - Essay Example An interesting dimension to this trend in education is how students choose their schools. One would find, for instance, that parents take a greater role in their children’s schooling, especially in regard to university and skills education, in their desire for a better life and chances for their children. For example, Doria, (2005) talked about the case of Australia: A â€Å"factor that influences students to study in Australia is that the country is comparatively safe, it has a clean environment, and living here is affordable.† (20) Students are swayed by attractive university marketing, say, one that promotes the high quality of education and the relative appearance of the school campuses. Scholarship offerings, which the U.S.A. is known for, is also important factor in the students’ choices of schools. (Doria 2005, 9- 20) Another issue in studying abroad concerns immigration opportunities. For parents, if their children study, say, in Australia, there is a possibility of obtaining Australian citizenship for all families and that, in itself, is a worthy return for the investment. In addition, many students look for career opportunities by studying abroad where they can develop their mental abilities, cultural perspective and in learning another language. Some of them want to get away from restrictive customs (Doria 2005, 19). The result of this new phenomenon in education is that overseas students are forcing changes in the curricula of universities by requiring emphasis on the methodology of teaching, special programmes and also result in confronting the slowing down of communication classes due to language-skill and cultural barriers. In preserving the quality of education including improving the standard of English courses, universities have to focus on developing teacher abilities and changing styles of educational

Saturday, February 1, 2020

Truth-Telling and Confidentiality (TT&C) Precis Assignment Essay

Truth-Telling and Confidentiality (TT&C) Precis Assignment - Essay Example Secondly, he points out that we maintain our privacy so as to keep some aspect of our behavior or life a secret because if other people knows about these secrets it might be embarrassing for them. The third reason to maintain our privacy as he points out, mostly relates to an individual’s medical records. It is important to keep an individual’s medical record private in order to protect that individual from dealing with the consequences of making such record public. The last reason that Rachels points out, for maintaining our privacy is to protect individuals from giving too much information to corporate or institution that are just looking for a specific detail about the individual’s life (Rachels 156). However, Rachels argues that the reasons he has pointed out here does not give the complete understanding of why privacy is important for two reasons: First, they all bases on the unusual situation in which an individual has something to hide and might harm him if let out. Second, in another perspective, the invasions of privacy that result in harm or an embarrassment is objectionable because our sense of privacy cannot just be justified in terms our fear of embarrassment or harm (Rachels 157). He gives his account on the importance of privacy basing on social relationship and an individual’s appropriate behavior. He states that privacy is only important if we are to maintain our social relationship with different kinds of people that we would like to socialize with, since our relationship to other people mostly depends upon how we act towards them (Rachels 157). He further states that people vary the way they behave towards each other according to the social responsibility t hey have towards them. Similarly, Rachel further reiterates the importance of privacy basing on the individuals privacy and his or her personal relationship. According to this account, he argues that the ability of an individual to control who

Friday, January 24, 2020

juvenile delinquency :: essays research papers

Can more than one theory be used to explain crime? Absolutely. From a liberal viewpoint, there exist two fundamental theories to explain the causal factors behind juvenile delinquency. Those theories are Social Deviance Theory and Developmental Theory. Young people become socially deviant by non-conforming. They become juvenile delinquents, and turn against the very system that is trying to help them. Society has made many laws and many standards have been set. The social deviant does not follow those rules and regulations. He/she lives a life of crime instead. An overview of approaches explains deviant behavior. Social Deviance Theory can be further broken down into five theories including anomie, differential association, social control theory, conflict theory, and labeling theory. Social Deviance Theory is an important explanation in the theory of crime. Without this explanation, it would be impossible to explain a great deal of the factors involved in juvenile delinquency. Socia l Deviance Theory and Development Theories are the umbrellas under which other theories used to explain juvenile delinquency fall. Depending on the criminal and the type of crime committed, different theories are used. Youth violence in our country has risen dramatically in the past decade. The number of violent arrests of youth under the age 18 has increased dramtically: 36 percent between 1989 and 1993, more than 4 times the increased reported for adults. During that period, juvenile arrests for homicide increased by 45 percent, while adult homicide arrests increased by only 6 percent (FBI, Uniform Crime Reports, 1994). Among teenagers 15 to 19 years old, the escalation of gun violence is particulary alarming: one of every four deaths of a teenager is attributable to a firearm injury. The number of juvenile violent crime arrests will double by the year 2010 if current arrest and population trends continue. Can our communities bear another 260,000 such arrests each year?

Thursday, January 16, 2020

Analysis of Genre, Stardom, Authorship and Gender Theory Essay

â€Å"Apparently no strictly logical distinctions can capture the variety of factors which create the genres we have† (Nicholas and Price, 1998) This quote demonstrates the complexity of allocating a particular genre to a film, as various aspects need to be considered. Although concrete groupings such as horror, science-fiction, crime and drama exist, the majority of movies contain more than one aspect which renders them difficult to categorise. For example, the difference between an ‘action’ and a ‘thriller’ film can be very fine. Should the length of footage of fight scenes determine them? Should the scale and intensity of adrenaline felt by the audience throughout the story line be considered? Apart from the concrete distinctions between fiction and non-fiction, many subcategories are used. Some genres are based on literature, such as ‘melodrama’ and ‘comedy’; others on the plot, for example the ‘war film’; and still others on media such as ‘the musical’. Furthermore, some genres are categorised by their budgets, censorship rating, racial identities, location, status amongst many others (Stam, 2000). Genres are a way of characterising a film in the simplest way, interpreting and judging without evaluating them. This allows viewers an easier choice when choosing which film to watch since the field has been narrowed down for them. Patterns such as in the plot, theme, and cinematographic technique and which branded star is used in the film are some of the ways the genres are often grouped. These are very commonly broadened because of the other forms of genre groups sometimes jumping in and out of a film are known as sub-genres. In the second edition (Nathan Abrams, 2010) of ‘Studying Film’ it is pointed out that not only are repetitions a requirement in identifying particular film genres, but so are their differences. Viewers take into account not only similarities but also variances between previous films they have seen. Thus when comparing a few films of the same genre, it is important to note that in spite of the recurring themes, each film will have its own individual plot. The use of genres and ‘putting films in boxes’, as it were, can lead to problems for the movie industry as story lines become repetitive, predictive and formulaic, perhaps causing some viewers to no longer hold the genre in such high regard. For this reason it is imperative that difference be a vital ingredient within categories as well as between them to provide more variation, innovation and flexibility within their general parameters. Films are automatically divided up using the genre categorisation, for example when you walk into a DVD store and looking for a film, they’ll be physically divided up through their classifications; Horror, Sci-fi, Crime, Drama, Action, Thriller, Social Realism and more. They might also classify the films by their rating, which in a sense is also a measurement of genre. Whether the film is a U classification for children, a rated 15 film or even a rated 18 film, these sub genres always crop up in promotional campaigns are also known for being genre specific; trailers in the cinema are also grouped together, like when watching a comedy, the trailers being shown in the previews will also be comedy. There are just a few examples as to how genre is divided without making overly noticeable to the audience. Martin Loop (cited in Barry, 2007) argues that genre in Hollywood does not really exist since so many films that are apparently made by an ‘auteur’ were simply influenced by society, and that Directors use different elements from different genres and the trends at the time to make their films. Taxi Driver narrates the story of Travis Bickle, an ex-marine unable to sleep at nights, so he decides to get a job as a night-time taxi driver. Played by Robert de Niro, Travis begins to date a woman working in the presidential campaign office of Charles Pallantine, but after taking her to watch a porn film they split up. Travis becomes increasingly paranoid and results in him buying an arsenal of weapons. After meeting a young prostitute ‘Iris’ played by Jodie Foster, he soon decides to make it his mission to save her from the life she leads. Thwarted in his attempt to assassinate Charles Pallantine, Taxi Driver’s climax occurs when Travis shoots and kills Iris’s pimp Matthew, played by Harvey Keitel and his henchmen. After the massacre Travis finds himself wounded and attempts to shot himself but comes short of bullets. The film ends with Travis being portrayed as a hero in the media for saving Iris’s life and taking her back to her parents. Travis’s search for to find meaning in his life is what motivates and drives the narrative forward. Taxi Driver is almost based exclusively on restricted narrative through the subjective consciousness of the narration of Travis filtering the narrative information through a single character. The camera emphasizes this by keeping a closed door to what is happening around him to a certain extent and seems to follow him almost obsessively as the film progresses. Has its genre made it more of a success? Maybe Taxi Driver being in the ‘Drama/thriller’ genre has enabled it to cross over two genres thus attracting a greater audience. Films are different from books or poems in that they are not simply constructed by a single person but require input from various people including a director, a producer, a screenwriter, actors and studio representatives to name a few. The notion of auteur theory, (translated from the French meaning ‘author’) in the filmmaking industry has therefore been heavily contended (Simpson, 2012). Andrew Sarris, the leading American proponent of the theory claimed in the 1950s and 60s that great filmmaking inspires the type of artistic expression and creativeness one would expect from a major literary author. For this reason we should be able to herald directors as ‘auteurs’, crediting them with ownership of the whole works. Critics maintain, however, that this notion completely ignores the rest of the film crew. A single ‘author’ does not appear to ascribe to movies due to the multiple actors involved. If each role plays an integral part in the process from beginning to end, how can one role claim the title of sole ‘author’? Furthermore, on what basis could ‘authorship’ be claimed? The tendency has been towards extending the title to the director; however perhaps not every director can be considered an ‘author’ if their work is not worthy. Sarris’ arguments have since been used to defend film as equivalent to the other arts; an important development considering earlier perceptions of the industry to be ‘less worthy’ of an artistic status. In this way perhaps in order to qualify as an ‘art’, a film needs an author. This label is particularly important for intellectual property rights and for status and identification. Nevertheless, the notion of ‘authorship’ also causes problems in other art forms; a composer is considered the true owner of the music he writes, but what about the music when it is used in performance at a concert or in a theatre piece? Having briefly outlined genre and authorship and their surrounding issues, this paper will seek to compare the theories to the film of Taxi Driver (1976)by Martin Scorcese to see how well they hold up and whether Martin Scorcese can shed further light on how genre and authorship should be  defined in the movie-making business. http://www. cs. grinnell. edu/~simpsone/Connections/Film/Author/index. html http://www. filmreference. com/encyclopedia/Academy-Awards-Crime-Films/Auteur-Theory-and-Authorship. html Studying film 2nd Edition, Nathan Abrams, Ian Bell, Jan Udris, Bloomsbury, 2010 Film History and Introduction, Kirsten Thomson, David Bordwell, McGraw-Hill, 1994

Wednesday, January 8, 2020

Romeo - A Character Profile From Romeo and Juliet

One of the original star-crossd lovers, Romeo is the male half of the ill-fated pair who drive the action in the Shakespearean tragedy, Romeo and Juliet. Much has been written about the origins of the character, as well Romeos influence on other young male lovers throughout Western literature, but rather than a role model to be emulated, Shakespeares Romeo is an enduring example of young love gone horribly wrong.   What Happens to Romeo The heir of the House of Montague, Romeo meets and becomes enamored with Juliet, the young daughter of the House of Capulet. Most interpretations of the story estimate Romeo to be about 16 years old, and Juliet to be just shy of her 14th birthday.  For reasons unexplained, the Montagues and Capulets are bitter enemies, so the young lovers know their affair will anger their families, however, the titular couple isnt interested in family feuds, and instead, they choose to pursue their passion.   While Romeo and Juliet secretly marry with the help of his friend and confidant, Friar Laurence, the two are doomed from the start. After Juliets  cousin Tybalt kills Romeos friend Mercutio, Romeo retaliates by killing Tybalt. For this, he is sent into exile, returning only when he hears of Juliets death. Unbeknownst to Romeo, Juliet—who is being forced to marry Paris (a wealthy suitor favored by her father) against her will—has come up with a scheme to fake her own death and be reunited with her true love. Friar Laurence sends a message to Romeo informing him of her plan, but the note never reaches Romeo. Romeo, truly believing Juliet is dead, is so heartbroken, he kills himself in a fit of grief, at which point, Juliet awakens from the sleeping draught shes taken to find Romeo is no more. Unable to bear the loss of her love, she too, kills herself—only this time, for real.   Origins of the Romeo Character Romeo and Juliet make their first appearance in Giulietta e Romeo, a 1530 story by Luigi da Porto, which was itself adapted from Masuccio Salernitanos 1476 work Il Novellino. All of these works can, in some way or other, trace their origins to Pyramus and Thisbe, another pair of ill-fated lovers found in Ovids Metamorphoses. Pyramus and Thisbe live next door to each other in ancient Babylon. Forbidden by their parents to have anything to do with one another—thanks again to an ongoing family feud—the couple nevertheless manages to communicate through cracks in the wall between the family estates. The similarities to Romeo and Juliet dont end there. When the Pyramus and Thisbe finally arrange a meeting, Thisbe arrives at the predetermined spot—a mulberry tree—only to find it being guarded by a menacing lioness. Thisbe runs away, accidentally leaving her veil behind. Upon arriving, Pyramus finds the veil, and believing the lioness has killed Thisbe, he falls on his sword—literally. Thisbe returns to find her lover dead, and then she too dies of a self-inflicted wound from Pyramus sword.   While Pyramus and Thisbe may not have been Shakespeares direct source for Romeo and Juliet, it was certainly an influence on the works from which Shakespeare drew, and he used the trope more than once. In fact, Romeo and Juliet was written in a concurrent timeframe to A Midsummer Nights Dream, in which Pyramus and Thisbe is staged as a play within a play—only this time for comedic effect. Was Romeos Death Fate? After the young lovers die, the Capulets and Montagues finally agree to end their feud. Shakespeare leaves it mostly to his audience to decide whether or not Romeo and Juliets deaths were predestined as part of the legacy of their families longstanding enmity, or if perhaps the conflict might have been ended by more peaceful means had the families been willing to embrace love rather than hate.