Tuesday, October 29, 2019

Summary about the book Boston tea party Essay Example | Topics and Well Written Essays - 1000 words

Summary about the book Boston tea party - Essay Example The story talks about how the United States of America walked its way into the top of the western hemisphere and settled in a country that has become the most powerful nation in the world. Philbrick explained in this book that the issue of race, religion and violence has always taken center stage in American polity. Nathaniel Philbrck uses the account of William Bradford and Benjamin Church to describe the story of the Mayflower. The book is the story of a ship and its journey on a large and stormy sea into a land that nothing much was known about. Mayflower talks about how the Pilgrims came to settle in New England, the risky ocean crossing that they embarked upon and the sharing of the first Thanksgiving. He gives the true story of the Pilgrims and their tragic but heroic experience at the ocean. Philbrick described how a group of Pilgrims endured the raging of the storms in order to find a very suitable place to worship. The Mayflower ship clumsily moved through winds and storms f or sixty-five days. According to Philbrick, â€Å"For sixty-five days, the Mayflower had blundered her way through storms and headwinds, her bottom a shaggy pelt of seaweed and barnacles, her leaky decks spewing salt water onto her passengers’ devoted heads.† (3). There were 102 humans and 2 dogs in the ship and Phulbrick explained that they were not the usual group of colonists that people are familiar with. They were neither noblemen or servants, but a group of men, women and children who were ready to sacrifice their lives in order to have the assurance that they could worship their God as they pleased. The arguments that the Pilgrims put forward for embarking on such a deadly voyage was that God was in support of their emigration to America (Philbrick 259). Philbrick dedicated a chapter to Thanksgiving with a good account of the events of the feast that lasted for days. The people that took part in the Thanksgiving feast were 100 Pokanoket Indians and 50 colonists. Philbrick noted that the Pilgrims did not originally arrive at Plymouth Rock as people have been made to believe. They first arrived at an Indian graveyard, the Pokanoket tribe had been hit by a strange plague that weakened majority of their population and they did not have the strength to fight against the Pilgrims. The Pokanoket tribe had no other choice than to make peace with the Pilgrims. It is clear from the description of Philbrick that the Thanksgiving feast did not take place in November, but by the end of September or October. There is a possibility that the men that took part in the Thanksgiving feast went fowling for their Thanksgiving feast. The Thanksgiving feast that took place at the fall gave the Americans a glimmer of hope as the events that took place during this period gave signs that things would turn out for their good (Philbrick 104-108). The book talks about how the Pilgrims or people that could be described as religious refugees landed in Plymouth Harbor du ring a period of catastrophe for the Native Americans. The Native Americans had to struggle with an alien disease that was brought into their lands by the European fishermen and this drastically reduced their population. Philbrick talked about the relationship between the Pilgrims and the Wampanaoags. The Pilgrims were led by the belligerent military officer, Miles Standish while the Wampanaoags were led by the enigmatic and scheming Chief Massasoit. The Wampanaoags were

Sunday, October 27, 2019

Health and Safety in Health and Social Care Case Study

Health and Safety in Health and Social Care Case Study Health and Safety in Health and Social Care Work place Acknowledgements In to the part of acknowledgement section of this assignment author can say that this paper is a compact study about the activities of health and social care center as well as their operations. In this paper author gave a brief discussion about the matters which are directly engaged to the health and social care service center. Hare author discussed about the various operative methods of the operations of health care center. Every date of this paper was collected from the web based journal, various articles, as well a health care related blogs. Into the second steps legislation parties play their role in health and social care center. In this stage of organizational structure parties of legislation basically makes the rules of the organization. Legislation parties basically deals with the code of conduct of the health and social care center. An organizational requirement means the required constitutions of the health and social care organization. Some basic requirements always are pr esent into the every organization. According to the requirements of the organization various needs and demands arise for the betterments of treatments facility of health and social care services. Care worker are the key parties which parties basically deals with the service providing related jobs. They are the parties in these steps who are responsible for providing the services to the patients. Support authority will be responsible to give better supportive requirements to operate the organizations in a proper manner. The basically responsible every kind of utility support as well as technological based support. The management committees of health and social care center firstly responsible for every kind of supervisor related task which are accomplished by the services worker who deliver the main service. Various legislative parties also play a direct vital role for delivering quality services as well. Effective mode of communication in this regard must be a important factor for th e betterment of quality services. Effective way of communication makes it easier to operate the service center with a specific manner. Proper utilization of utilities duties and responsibilities put the service quality into a good situation. Good quality service always be in the first priority in regards of the health and social service center as well. Contents (Jump to) Title Pagenumbers Introduction 4 Case Study-1 In health and social care organizations: review systems, policies and procedures used in communicating and maintain health and safety at work in accordance to legislative requirements. 5 From this case study 1 above; analyze health and safety priorities that are important to Mr W’s health and wellbeing. In relation, analyzer the impact of one aspect of health and safety policy on MR.W and health and safety practice 5 Draw your organizational chart using this as a guide; assess the responsibilities in a specific health and social care workplace for management of health and safety in relation to organizational structures 67 Using the case study 1 above, Produce a risk assessment based on your work and analyzer how information from these are used in identifying service-user’s needs and organizational decision-making. 8 Case Study-2 Using the above case study 2, Discuss how you would address this situation (i.e. the dilemma) in line with implementing systems and policies for health and safety issues and evaluate your own contribution to promote Health Safety of service-user. 9 Give examples of non-compliances around Health and Safety Policies in the home and analyse the effect in health and safety workplace. 10 Give examples of two Health and Safety policies, analyzer their effectiveness in promoting positive and healthy practice. Explain how the organizational policies and practices are supervised and reviewed. 10 References 11 Introduction: Health and social care services center always being a challenging sector. This sector must have to be dynamic as because service continuously getting more complex and dynamic as well in this sectors. In to the workplaces of health and social care services center better working environment plays a vital role in terms of delivering better quality services in to a specific manner. Working environment with poor or improper safety and security system always being a clumsy environment. People will always be de-motivated to work in such kind of working environment. As because of poor safety and security system employee and all staff will be more injured will be sicker. Because of this only reason small inconvenient will turn into a huge or big or dangerous consequences. As a result illness, low productivity, de-motivation these kinds of issues will arise into the work places. In this regard we can definitely say that safety legislations will very much indeed into the workplace as well as he alth and social care center. The management committees of health and social care center firstly responsible for every kind of supervisor related task which are accomplished by the services worker who deliver the main service. Various legislative parties also play a direct vital role for delivering quality services as well. Effective mode of communication in this regard must be a important factor for the betterment of quality services. Effective way of communication makes it easier to operate the service center with a specific manner. Proper utilization of utilities duties and responsibilities put the service quality into a good situation. Good quality service always be in the first priority in regards of the health and social service center as well. Case Study1 The review systems of policies and procedures used in communicating and maintain health and safety at work in accordance to legislative requirements in terms of health and social care organization: Health and social care service center always being a challenging organization. We said this challenging as because of it is the places where various patients continuously come for their treatment. Working environment with poor or improper safety and security system always being a clumsy environment. People will always be de-motivated to work in such kind of working environment. As because of poor safety and security system employee and all staff will be more injured will be sicker. Because of this only reason small inconvenient will turn into a huge or big or dangerous consequences. As a result illness, low productivity, de-motivation these kinds of issues will arise into the work places. In this regard we can definitely say that safety legislations will very much indeed into the workplace as well as health and social care center. Implementation of the legislation into the health and social care center knows no bounds. Requirements needed for example proper communication; various ris k assessments, effective responsibilities, proper legislative requirements as well as perfect utilization of technologies. Health and safety priorities that are important to Mr. W’s health and wellbeing. In relation, analyze the impact of one aspect of health and safety policy on MR.W and health and safety practice. According to the case study one he we can say that from all preferences health and safety priorities would be the more important in this situation of Mr. W. After reading the case study one we know that Mr. W leaves a lonely life. Every object around his leaving places are scattered. According to the wellbeing of Mr. W firstly steps should be taken to clean up the environment around him. We already know that he got a dog which always remains with him. A strategy that means a policy should be taken for the improvement of Mr. W healthier position. Health and social care authority can play important role in this regard. In case study one we can understand that Mr. W is in a poor condition with poor psychiatric illness. And also he leaves into the home with his dog only. In this regard his Psychiatric condition will be in a harmful condition. In this regard friendly and supportive attitude will be more effective. First of all Mr. W have to be understand that health and social care agents came here for the betterment of his health. Draw your organizational- chart using this as a guide-assess the responsibilities in a specific health and social care workplace for management- of health and safety in relation to organizational structures. Organizational Structure is an important part for every organization. A good and appropriate structure will be more effective for the betterment of service. In regards of health and social care service. A good organizational structure always plays a vital role for every organization. According to my own view the organizational chart of a health and social care are as follows Government first of all is always be an important part of health and social care service related center. Basically they are the key factors which always make the supportive conditions. Also Government played a direct role in terms of making the all kinds of key decision. Into the second steps legislation parties play their role in health and social care center. In this stage of organizational structure parties of legislation basically makes the rules of the organization. Legislation parties basically deals with the code of conduct of the health and social care center. An organizational requirement means the required constitutions of the health and social care organization. Some basic requirements always are present into the every organization. According to the requirements of the organization various needs and demands arise for the betterments of treatments facility of health and social care services. Care worker are the key parties which parties basically deals with the service providing related jobs. They are the parties in these steps who are responsible for providing the services to the patients. Support authority will be responsible to give better supportive requirements to operate the organizations in a proper manner. The basically responsible every kind of utility support as well as technological based support. Using the case study 1 above, Produce a risk evaluation based on your work and analyze how information from these are used in identifying service-user’s needs and secretarial administrative. According to the case study one risk evaluation methods and analyze the information based on the health and social care structure are as follows: Organization name: Home Care Center What are the hazards? might be harmed and how? What are you already doing? Do you need to do anything else to manage this risk? Action by whom? Action by when? Complete Where +How Psychiatric related Environmental Supportive legislative Improper evaluation of strategy and supervise Taking action from previous fault. With proper strategy Alternative Strategy of evaluation Legislative and supportive authority 01/10/2014 Supportive parties Nurses utility From the above chart here we try to show the demo of a action might be taken by the health and social care center. Case Study-2 Using the above case study 2, Discuss how you would address this situation in line with implementing systems and policies for health and safety issues and evaluate your own contribution to promote Health Safety of service-user. According to the situation of case study-2 we can understand the Mr. H attacked by severe diseases. He also wants to leave a independent life with a peaceful manner into his home. We already know that he also got a nurse for the treatment of his daily life as well. According to the statement of case study 2 Mr. H love to visit newspaper store in every morning to read his favorite newspaper as well but the matter for fact is mr. H doesn’t have any road awareness. In this situation nurse can play a vital role. As because of he don’t have any road awareness In this regard he need a supportive nurse to supervise or the support during the time of visiting the outside of home. Give examples of non-compliances around Health and Safety Policies in the home and analyze the effect in health and safety workplace. Non compliences issues some times arise in the heath and social care service center. A strategy that means a policy should be taken for the improvement of Mr. W healthier position. Health and social care authority can play important role in this regard. In case study one we can understand that Mr. W is in a poor condition with poor psychiatric illness. And also he leaves into the home with his dog only. In this regard his Psychiatric condition will be in a harmful condition. In this regard friendly and supportive attitude will be more effective. First of all Mr. W have to be understand that health and social care agents came here for the betterment of his health. A strategy that means a policy should be taken for the improvement of Mr. W healthier position. Health and social care authority can play important role in this regard. In case study one we can understand that Mr. W is in a poor condition with poor psychiatric illness. And also he leaves into the home with his dog only. In t his regard his Psychiatric condition will be in a harmful condition. In this regard friendly and supportive attitude will be more effective. First of all Mr. W have to be understand that health and social care agents came here for the betterment of his health. Non-compliance factors engaged directly or indirectly with the health and safety policy of home and residential cares center as well Give examples of two Health and Safety policies, analyze their effectiveness in promoting positive and healthy practice. Explain how the organizational policies and practices are supervised and reviewed. The policy and procedure must have to be more supervised and proper manner according to the health and social care center activities with a specific manner. Health and safety related factors would be more supervised as because of deliver proper treatment of patient’s healthier position Health and social care service center always being a challenging organization. We said this challenging as because of it is the places where various patients continuously come for their treatment. Working environment with poor or improper safety and security system always being a clumsy environment. People will always be de-motivated to work in such kind of working environment. As because of poor safety and security system employee and all staff will be more injured will be sicker. Because of this only reason small inconvenient will turn into a huge or big or dangerous consequences. As a result illness, low productivity, de-motivation these kinds of issues will arise into the work places. In thi s regard we can definitely say that safety legislations will very much indeed into the workplace as well as health and social care center. Implementation of the legislation into the health and social care center knows no bounds. Requirements needed for example proper communication; various risk assessments, effective responsibilities, proper legislative requirements as well as perfect utilization of technologies. References Websites Wikipedia https://barbradozier.wordpress.com Health service .com Books Watterson A (2003) Public Health in Practice; ISBN 0-333-94617-0 Paperback Health Promotion in Multicultural Populations- A Handbook for Practitioners and Students Second Edition Health and Safety Executive (2001) – health and Safety in Residential Care Homes (HSE Books) ISBN: 0717620824. Morath JM and Turnbull JE (2004) – to do no harm ensuring patients safety in health care organisations (Jossey Bass Wile ) ISBN: 078796770X. Sprenger (2003) – Health and Safety Management (Highfield) ISBN: 1871912040.

Friday, October 25, 2019

Birth Control Availibilty :: Contraceptives, Birth Control Essays

Some believe contraceptives should be available at cost to those who can afford them, available to legal adults who cannot, and/or available to students through public schools. Some religious traditions, based on their view of reproduction, oppose birth control availability for everyone. There are religious traditions that oppose women's autonomy, and as such, are especially opposed to contraceptives for women. Some who oppose sex outside of marriage believe that distribution of condoms in schools encourages adolescent sexual activity. Those who oppose abortion but not birth control often favor condom distribution to reduce pregnancies. The government is interested in preventing the spread of sexually-transmitted diseases and reducing the number of unwanted pregnancies and children who are wards of the state or supported by state funds. One reason that many students are not sexually active, is because of the lack of protection or the embarrassment of buying protection at a local dru g store. And while this would mean sex without protection to many young adults, there are a lot who would refrain from experimenting with sex because of not having protection. By putting a condom dispenser in high school bathrooms, this gives that percentage of teens nice, easy, and anonymous access to condoms. Thus possibly resulting in an increase of sexually active students. Why not leave condoms at the local drug stores, and make it as hard as possible to comfortably buy protection. The embarrassment alone, might keep a few teenagers from having sex.   Ã‚  Ã‚  Ã‚  Ã‚  Not only would putting condom dispensers in high school allow anonymous purchasing of protection, but it might also promote sex to the crowd of people that should not even know what sex is. Imagine walking into the bathroom one morning and there against the back wall is a condom machine.

Thursday, October 24, 2019

Ethics and Values in sport Essay

My name is Monique Stanley, I have been recently appointed Assistant Club Development Officer in the local Sports and leisure department. My role is varied and challenging with major focus on Ethics and Values in sport and the ever increasing role sports plays in many aspects of society. This includes; * Ensuring local sports clubs are aware of the need to be equitable and ‘child friendly’ * Helping clubs develop codes of practice that govern all members * Ensuring all clubs are aware of the principles, values and ethics associated with sport * Helping organisations access funding opportunities * Ensuring barriers to participation are reduced for all sedctors of society Sport plays an important role in the development of young people, it has been proven when sports and physical activities are included in Education. Children learn new skills in life, for example building confidence, accepting rules,making decisions, team working,communication skill,leadership,discipline and one I find important in sport ‘ Fair Play’. I could go on giving more skills sports develops, but i have just pointed out a few. Ethics in the sports environment is described as rules (i.e. Code of Conduct) that should be followed by all participants in sports. Ethics promote discipline and keep sporting environments fair and fun. Ethics give an equal opportunity for everyone. Values in sport is your involvement and belief that sport should be enjoyable and respectful. Respect is important in sport as you should always respect the rules, the officials,the other people participating and yourself. You should always treat others how you would like to be treated No matter what their Race, Disability, Gender, or Age. Ethics and Values are important because they rule out Right from Wrong. If your club has a strong commitment towards values and ethics in sport then it will become a bigger more enjoyable and comfortable enviroment for participants.This will interest more and more young people it will also bring the club more revenue for more sports facilities. So having stong commitment towards Ethics and Values pays off. The consequences of not giving sufficient attention to Ethics and Values can be a major disadvantage, as it can lead to young people leaving your club, your club will not be promoted well, therefore the club will lose out by money and participants, therefore the facilities will be poor and it could even result in the club being closed down. Ethics and Values are a part of the sporting world.

Wednesday, October 23, 2019

Ascorbic Acid Determination

Determination of Vitamin C (Ascorbic acid) concentration in some of Commercial Products, by Redox Titration Mouhannad AL. -Hachamii Sadiq J. Baqir Saadon A. Aowda Fatima A. Hussein, Dep. of chemistry, college of science, Babylon University Muhammed K. Alasedi Ministry of Health Hilla city, Babylon Abstract The goal of this search is to determine the concentration of vitamin C (Ascorbic acid ) in some of a Commercial Products, Vegetables and Fruit Juices by Redox Titration.A redox titration, involving an Iodometric method, has been used to do the analysis.L-Ascorbic acid was first isolated as a pure substance by Albert Azent-Gyorgi and Charles Kingin 1928 [Paulling ,1970] , an anti-oxidant and free radical scavenger, is found ubiquitously in fruit and vegetables such as citrus fruits (oranges, lemons, limes, tangerines etc. ), melons, tomatoes, peppers, broccoli, green leafy vegetables such as spinach, potatoes and turnips, its quantitative determination is especially important in the production of wine, beer, milk, soft drinks and fruit juices, where it can be a quality indicator [Gerrior & Zizza,1994] .Given the essential role played in the human diet and necessary to growth and repair of tissues in all parts of human body . It is necessary to form collagen an important skin proteins ,scar tissue ,tendons, ligaments, and blood vessels. vitamin C is essential for the healing of wounds, and for the repair and maintenance of cartilage, bones and teeth [Mcevoy ,1993] . Since vitamin C is easily oxidized, storage and cooking in air leads to the eventual oxidation of vitamin C by oxygen in the atmosphere.In addition, ascorbic acid is water-solubility vitamin means that a significant amount of vitamin C present in a food can be lost by boiling and then discarding the cooking water [Mcevoy ,1993]. The formula for ascorbic acid is C6H8O6 , It occurs as a white or slightly yellow crystal or powder with a slight acidic test , Ascorbic Acid is freely soluble in water; spa ringly soluble in alcohol; insoluble in chloroform, ether, and benzene [Moffat,1986]. The structures for the reduced (ascorbic acid) form and for the oxidized form (dehydroascorbic acid) are shown below: [pic]The amount of ascorbic acid can be determined by a redox titration with a standardized solution of iodine. The iodine is reduced by the ascorbic acid to form iodide. As shown in the other half of this redox equation. [pic] The titration end point is reached when a slight excess of iodine is added to the ascorbic acid solution [Bailey ,1974;Brody,1994;Pauling ,1976;Kalluer,1986]. Vitamin C deficiency leads to scurvy, a disease characterized by weakness, small hemorrhages throughout the body that cause gums and skin to bleed, and loosening of the teeth. Vitamin C can not synthesized through body cells, nor does it store it.It is therefore important to include plenty of vitamin C-containing foods in daily diet. vitamin C toxicity is very rare, because the body can not store the vi tamin however ,amounts greater than 2000 mg/day are not recommended because such high doses can lead to stomach up set and diarrhea. The minimum daily requirement is 30 mg. Well-balanced diets provide adequate amounts of the vitamin as measured by the Recommended Daily Allowance (RDA) of about 75 mg per day for adults (aged 15 or older), less for children, and more for pregnant and lactating women.The National Academy of Sciences recommends the consumption of 60 mg of ascorbic acid per day. . the Federal Food and Drug Administration has adopted the recommended dietary allowance (RDA) of 60 mg/day A very small daily intake of vitamin C (10-15 mg/day for an adult) is required to avoid deficiency and stave off scurvy. However, there has been, and continues to be, vigorous debate on what the optimum daily intake of vitamin C is. Some have argued that 200 mg/day is an optimal daily intake for adult humans.Others have suggested 1-2 g/day is best, this despite studies that show that the bl ood is saturated with vitamin C at 100 mg/day, and any excess is excreted in the urine [RDA,1995; RDA,1987; Browne. ,1993; FAO/WHO,2002; Levine et al. ,1999; Levine et al. ,1995;Teoh ,1975]. |Recommended daily dietary intake of vitamin C: | | |AUSTRALIA milligrams |U. S. A. illigrams | |Infants: |30 |35 | |Children: |30-50 |45 | |Adult men: |30 |60 | |Adult women: |30 |60 | |Pregnancy (2nd and 3rd |60 |80 | |trimesters) | | | |Lactation: |60 |100 | I2 is not standard solution ,so it may be standardized with thiosulphate solution . Experimental Procedure for determination of [Bailey ,1974; Brody, 1994; Pauling,1976; Kalluer,1986]. 1. Preparation of 0. 005 mol L? iodine solution: Accurately weight two gm of KI and 1. 3g of I2 , dissolved to aless amount of water , shake until dissolving .Transfer iodine solution to a 1L volumetric flask , making sure to rinse all traces of solution in to the volumetric flask using distilled water , completed the volume up to the mark. 2. Preparation o f 0. 5% starch indicator solution: Soluble starch (0. 25gm) to a 100 mL conical flask or beaker and 50 mL of distilled water was added . Solution heated with stirring at 79 0C for 5 minutes , careful must be taken not to exceed the stated temperature. Allow solution to cool to room temperature. 3. Preparation of food/drink sample: Industrial Packaged fruit juices {Orange , Pineapple, Lemon ,Tmrhend and Apple (Miso), Pepsi (khaleek kadha), Red grapes(Niktar), Seven up (Kufa), Pomegranate (Linda) , Tmrhend (Toti), Orange (Dalia), and Granules peach (Rani) } may also need to be strained through cheese cloth if it contains a lot of pulp or seeds. †¢For analysis of vitamin C powders ( Tanc lemon , Tanc orange and livans powders ) dissolved 1 gm in 100mL of distilled water (in a volumetric flask). †¢ For analysis of vitamin C tablets ( Kruger and joiure tablets), dissolved a single tablet in 200 mL of distilled water (in a volumetric flask). †¢ Juice squeezed from fresh fru it (Diala orange , Hilla orange, Egypt orange ,allalinki ,pomegranate and apple Juices ) should be strained through cheese cloth in order to remove seeds and pulp which may block pipettes. Juice squeezed from fresh vegetables ( Tomato ,Onion ,Celery ,Option ,Potato and Lettuce juices ) should be strained through cheese cloth in order to remove seeds and pulp which may block pipettes. †¢Sample of fruit or vegetable (100gm) blended in a food processor together with 50 mL of distilled water. After blending, strain the pulp through cheese cloth, washing it 0mL in a volumetric flask. 4. Aliquot of the sample (20 ml) solution prepared above transfrred into a 250 mL conical flask , about 150 mL of distilled water and 1 mL of starch indicator solution. 5. Sample were titrated with 0. 005 mol L? 1 iodine solution. The endpoint of the titration is identified as the first distinct trace of a dark blue-black colour due to the starch-iodine complex. 6.Titration were repeated with further al iquots of sample solution until concordant results (titres agreeing within 0. 1 mL) were obtained. Results and discussion:- In this research estimating vitamin C in industrial juices (Orange , Pineapple, Lemon, Tmrhend and Apple (Miso), Pepsi (khaleek kadha), Red grapes (Niktar), Seven up (Kufa), Pomegranate (Linda) , Tmrhend (Toti), Orange (Dalia), fruits (Dalia) and Granules peach (Rani)), Kruger and joiure tablets, and Tanc lemon , Tanc orange and livans powders, and natural juices for fresh fruits (Diala orange , Hilla orange, Egypt orange ,mandarin ,pomegranate and apple Juices ) and fresh vegetables ( Tomato , Onion Celery ,cucumber ,Potato and Lettuce juices). It was calibrated using redox way by iodine calibration using starch as indicator , iodine was an adequate oxidizer used for this purpose.Table (1) show the in industrial juices estimated concentration and the proportion of vitamin C. Table (1):The results were obtained below, represent the vitamin C content in some ind ustrial juice in quantity mg / 100 ml and percentage %. |Amount calculated |Industrial product name |Chain | |mg / 100 ml | | | |11. 9 |Orange (Miso) |1 | |49. 4 |pineapple(Miso) |2 | |15. 4 |lemon (Miso) |3 | |14. 2 |Tmrhend (Miso) |4 | |13 |Apple (Miso) |5 | |19 |Pepsi (khaleek kadha) |6 | |35. |Red grapes(Niktar) |7 | |25. 88 |Seven up (Kufa) |8 | |28 |Pomegranate (Linda) |9 | |25. 77 |Tmrhend (Toti) |10 | |19.. 995 |Orange (Dalia) |11 | |13. 33 |fruits (Dalia) |12 | |53. 2 |Granules peach (Rani) |13 | |13. 33 |lemon (Tanc) |14 | |6. 665 |orange (Tanc) |15 | |13.. 33 |orange (livas) |16 | |69.. 95 |vitamin C (Kruger tablets) |17 | |19.. 995 |Vitamins (joiure tablets) |18 | Scheme (1) . Vitamin C content in some industrial juice (mg/100ml) .The result in table (1) and scheme (1) showed the highest concentration of vitamin C in industrial juices found in granules peach juice where concentration is (53. 32) mg / 100 ml and lowest in orange juice (Miso),hitting (11. 49) mg /100 ml ,e ither powder Limon Tanc, the presence of vitamin C according to bulletin declared on the product is 100 %,but the results show that we have reached 89. 9 % and its concentration was (3. 33) mg/100 ml, where results appeared supposed to be the weight of vitamin C (667) mg of origin (45) mg ,results show that this weight (599. 85) mg of origin (45) mg . While orange Tanc powder result of vitamin C amount to 44. 6 % with the amount according to bulletin declared as the products of 100 %,where it should the weight of vitamin C (667) mg of origin (45) mg ,results show that this weight (299. 9) mg of origin (45) mg .Vitamin C tablets – type Krueger according to bulletin declared only that all (1) gm contains (45) mg of vitamin C, but the results we obtained the concentration is (69. 95) mg in (1) gm ,an increase of about (25) mg. Either vitamins fruits tablets – type junior according to bulletin declared only that all (1) gm contains (8. 8) mg of vitamin C but we have receiv ed is (19. 995) mg in (1) gm, an increase of more than double. Where the study showed that the Tmrhend juice (Miso) was vitamin C focus as the results we obtained (25. 7) mg/100 ml ,but according to the bulletin attached descent rate and quality (1. 68) mg/100) ml ,either alimonadah juice (Miso) was its focus as the results we obtained (15. 4)mg/100 ml, but according to the bulletin attached descent rate and quality (0. 1) mg/100 ml. comparing these results with a focus located on the packaging these juices, showing clearly that there was a difference in the percentage concentrated of company to company, And also because of industrial juices and wrong storage methods. The handling and preparation of food products adversely affect the quality of vitamin C in food. since it vulnerable to heat ,oxygen and acid, temperate and alkalinity mediums.With regards to the manufacture of juices, the keepers airtight containers made of sheet metal or glass do not cause the lose of what remains of vitamin C as a result of manufacturing processes only about 10 % while keeping cardboard containers, whether with paraffin layer or polyethylene, they lead to the loss of around 75 % of the past three weeks, even if keeping it in the fridge because these containers do not prevent the access of oxygen to juice and oxidize it, in addition to the work of the upper-packaged juice or occupied by air to oxidize the proportion of juice again, while the addition of carbon alkalinity of the damage vitamin juice damage entirely. Table (2) shows the estimated in natural juice concentration and the proportion of vitamin C .Table (2) :The results were obtained below, represent the vitamin C content in some natural juice in quantity mg / 100 ml . |Quantity Standard |Amount calculated |Natural juices name |Chain | |According to |mg / 100 ml | | | |international | | | | |standards | | | | |mg / 100 mg | | | | |42-50 |98. 64 |Diala orange |1 | |42-50 |107. 1 |Hilla orange |2 | |42-50 |73. 315 |Egyp t orange |3 | |37. |71. 4 |Mandarin |4 | |52. 8 – 72 |63 |pomegranate |5 | |6 |51. 5 |Apple |6 | |13. 6 – 17 |20. 6 |Tomato |7 | |50 |47. 6 |Onion |8 | |14 |22. 1 |Celery |9 | |27 |35. 7 |Cucumber |10 | |11 – 20 |47. 6 |Potato |11 | |75 |83. |Lettuce |12 | | | | | | Scheme (2) : Vitamin C content in some natural juices . In table (2) and scheme (2) the results showed the highest concentration of vitamin C found in orange juice, hitting (107. 1) mg /100ml of juice ,the lowest level was found in tomato juice, when it reached (20. 6)mg /100 ml of juice. Results showed also the presence of vitamin C concentration (107. 1) mg /100ml in naturally orange juice (Hilla),98. 64 mg / 100 ml (Diala) and 73. 315 mg / 100 ml (Egyptian) ,while the concentration of vitamin C in Hilla orange highest from Diala orange which highest more than the Egyptian orange.—– [pic] [pic]

Tuesday, October 22, 2019

Sexism is Manifest in Magazines Essays

Sexism is Manifest in Magazines Essays Sexism is Manifest in Magazines Essay Sexism is Manifest in Magazines Essay Everyday, we face advertisements that use the sexuality of individuals to sell products.   Advertising degrades a woman’s worth in society and uses her body to sell items such as cars, jewelry, and beverages.   Those most often exploited are our mothers, daughters, and sisters. Beautiful women, scantily dressed give us incentive to buy products, whenever the incentive is to be with these females, or as in most cases, to be like them.   Because of this is exploitation, women believe they have to live up to an unachievable standard of beauty.   If they fail to reach these ideas, they are made to feel worthless.The ideal woman is based on flawlessness: no lines, wrinkles, blemishes, and scars-no pores.   She is human.   This look can only be achieved cosmetically, and is the only standard of beauty in our culture (Kilbourne). â€Å"Deep in many girls hearts lies an impossible standard-long blonde hair, long, long legs, a slim, tall body, and p erpetual youth.   Call it Barbie† (Winegar 1 E).   Dr. Lesley J. Dlugokinski, a clinical psychologist from Oklahoma City, suggests that many of the messages linking a woman’s value to her beauty are deeply rooted in Western Culture, beginning with ancient myths and fairtales like â€Å"Sleeping Beauty† (qtd. in Kinka).So much emphasis placed on appearance that a woman’s lovability and desirability rely on it.   An advertisement for a weight loss clinic reads: â€Å" I’d probably never be married now if I hadn’t lost forty-nine pounds’-which one woman said was the best advertisement for fat she’d ever seen†.   Such advertisements only reaffirm that being beautiful is a result of the products we buy, not who we are inside.   Physical appearance seems to define a woman’s worth.In most advertisements, the woman’s body is used as an object, and whatever her body is like, it will not do; it must change.à ‚   Every part of the body must be altered.   For many women in America, how they look often determines how they feel about themselves, impacting their self-esteem.   â€Å"The message regarding†¦physical beauty is so pervasive that even women with wonderful talents, attributes, skills and intellect don’t feel those are enough† (Winegar   1-E).   Women are judged solely on appearance and are put into competition with each other’s looks; if a woman does achieve the desire look, she loses love of other women.â€Å"The essential selling traits used in the portrayal of women are alluring, decorative, and traditional† (Courtney 9).   The trend of using women for allurement or decoration is found mostly in advertisements for beverages and automobiles.   The sexual implications are more than obvious in selling a product that has nothing to do with sex.   These types of advertisements are found throughout mainly men’s magazines, selling â€Å"manly† products.Advertisers subliminally integrate sexual ideas into the selling of products.   They realize that many times that people do not read the copy, so they use photographs to exploit sexuality in males and females in the shape of the products or the way the models are positioned.   An advertisement for Love’s Baby Soft perfume reads: â€Å"Because innocence is sexier than you think†.   In the advertisement, an adult woman is presented as a child.   She is dressed as a little girl, but she is sitting with her legs apart, skirt slightly raised.   She has a visible cleavage and is sucking in a lollipop.   The shape of the perfume bottle is clearly phallic, and the implicit meanings in the advertisement tell women not to be mature or grown up and to stay passive, powerless, and dependent (Kilnourne).On the other hand, some advertisements, even try to cover the fact that they are bluntly using sexuality to sell their products.   In some advertisements, women are naked, wearing only the product for sale. The use of their bodies to sell these products, which have nothing to do with being naked, is disgusting.   Their sexuality is only being used to catch the eye of the consumer.Feminine things are constantly devalued, which causes women to devalue themselves and men to devalue women.   Women are being devalued each time an advertisement depicts a woman as an object.   â€Å"Turning a human being into an object is the first step in justifying violence toward that person† (Kilbourne).   Men are portrayed as violent and brutal in advertisements, and their body language sends a message to tell all men to be in control, and always uses power, threat, and intimidation.   A billboard for a Rolling Stones album cover reads, â€Å"I’m black and blue from the Rolling Stones, and I Love It† (Kilbourne).   Such advertisements give the implication that women love and deserve to be beaten.   An even more appalling advertisement for men’s boots headlines, â€Å"Treat’em good and they’ll treat you good† (Kilbourne).   It shows a woman straddling a man’s leg, pulling his boot off.   The copy read, â€Å"Some men treat their boots better than their women; not all together admirable, but certainly understandable† (Kilbourne).   Battery of women is presented as a joke.   People who are opposed to violent and sexist advertisement must organize to remove them, and the products they sell from our lives.Four general stereotypes of women are; â€Å"a woman’s place is in the home; women do not make important decisions or do important things; women are dependent and need a man’s protection; and men regard women primarily as sex objects† (Courtney 7).   Even though in 1987, one third of all women in the labour force were the sole supporter of their families, advertisements like the following for Braemar sweaters ma de a joke of a woman in the work place.   The advertisement shows a woman in a skirt, blouse and a Braemar sweater.   The copy reads, â€Å"Phoebe chose to work, not because she had to, but because it gave her a place to wear her Braemar sweaters† (Kilbourne).   Such sacrum of women in the work place only destroys what has taken so long to get even to this level.   The women’s movement is constantly being mocked and patronized in advertisements.The most prevalent problem in advertising’s ideal of   women is weight.   After seeing hundreds of advertisements featuring ultra-thin, waif-like models each day, women feel contempt, loathing, and disgust for their bodies.   Joan Dickerson, author of Some Thoughts on   Fat, claims   that â€Å"we’re all supposed to strive for a long and thin ideal, but who exemplifies this ideal?   A man, of course; specifically a young man†Ã‚   (Winegar 1-E).   Young women especially, are judging them selves based on what they see in the mirror.   One in five college-age women have eating disorders, and eighty to eighty-five percent of the consumers of diet programs are women.   The idea for women as displayed in advertisements weights twenty-five percent less than average woman (Winegar 1-E ).Since more and more women’s groups protest their exploitation in advertising, a small trend toward lessening these advertisements is coming about.   However, because of this, men are being exploited instead.   An example is a television commercial for Diet Coke in which female office workers â€Å"gawk† out the window at a shirtless male construction worker.   Because it is not politically correct to use women as object’s now, â€Å"men are the babies†¦it’s pleasing to the eye to show men’s pecs, since you can’t show women’s breast† (Dunn B-6).   Although this does seem to be a trend, it will take time before men reach the level of exploitation that women have faced for decades.After seeing thousands of exploitive advertisements every year, we become callus to the psychological effects they have on us as consumers.   No one’s body, male or female, deserves to be treated as an object, but should be held in high esteem and respect.   This respect should not be limited to those who are thin or beautiful or white or heterosexual.   Advertising that depicts this standard pollutes our minds and only we as consumers, by standing up against such unrealistic ideals, can stop the pollution.

Monday, October 21, 2019

Self Esteem and Culture in a Learning Environment

Self Esteem and Culture in a Learning Environment Learning process functions in a dynamic but systematic process that is greatly influenced by the main objective, sub objectives, and the environment in which learners are subjected to in the process of knowledge acquisition. According to Slavin (2006):Advertising We will write a custom essay sample on Self Esteem and Culture in a Learning Environment specifically for you for only $16.05 $11/page Learn More Students differ. They differ in performance; level, learning rate, and learning style. They differ in ethnicity, culture, social class, and home language. They differ in gender. Some have disabilities, and some are gifted or talented in one or more areas. These and other differences can have important implications for instruction, curriculum, and school policies and practice. (p. 98) Thus, the educator should be attached to the lesson objective and learn from the students especially on cultural differences and language in order to create a friendly and inc lusive environment. Reflectively, the conceptual idea of this treatise is an in-depth analysis of the aspects of social environment and objective and their influence on quality of learning, self-evaluation, goal setting, decision making, and inclusive education as means of building confidence and self esteem among learners irrespective of cultural background (Slavin, 2006). In addition, the treatise describes practical approaches employed by instructor to build confidence in a class of learners from diverse backgrounds. In the elementary class video, the instructor is keen on approaches used in affirming confidence among learners. Since this class consist of relatively young population from diverse background, the teacher adopts inclusive methodology and encourage total participation by assigning duty to the seemingly minority group. Notably, inclusion of bright color in the learning process is apparent to attract attention of the young learners who prefer practicality as opposed to theorizing of the objective. Besides, it is apparent that the instructor is aware of the level and cultural diversity of the class and uses simple sentences in presenting new ideas and appealing for participation by assigning duties. Observation and Description Group Characteristics As observed in the elementary class video, the class is of medium size consisting of learners in elementary level of learning. Apparently, the class is balanced in terms of gender and draws learners form different background such as Latino, Pilipino and main stream American culture. The course resonates on the facets of active participation education in which every learner is expected to present a practical approach in translating theory into actuality. This lesson involves use of papers of different colors. Each learner is given four papers; three white and one green.Advertising Looking for essay on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More b.) As observed in the video, the tone of the instructor uses simple language and stresses on emphasis for every statement uttered. Through repeated use of the phrase â€Å"okay†, the tone appeals rather than command the learner on instructional methods. Since the class consists of different culture, the instructor uses a neutral accent with slight incorporation of Latino pronunciation and slow pace of speech so as to include the slow learner and special needs student. Analysis, Explanation, and Reasoning Confidence building The observed teacher is keen on the intensity of grammar used in imparting knowledge in a diversely cultured class. In order to build confidence and affirm positive self esteem, the instructor pronounces instructions slowly and repeatedly. Reflectively, this approach is essential in creating a tension free learning environment as slow learners are given equal opportunity to grasp concepts at minimal level of strain. In addition, the observed teacher is keen on diversity of her class and applies inclusive instructional methods (Slavin, 2006). To achieve this, she concentrates on making every student participate directly and actively. Moreover, in distribution of materials, the instructor allows a learner to issue materials, which in itself, is a means of creating an environment of confidence in others. In order to ensure that the learner is up to instructor’s goals, she is keen on following up progress of the learner. Thus, pleasure and self elegancy created promotes invention and participation as the learner develop sense of appreciation for attention given. The level of Engagement As observed in the video, the level of student engagement can be described as interactive. Reflectively, the learner is involved in lesson activities and is expected to have creative input at the end of the lesson (Slavin, 2006). The engagement is noted in resource materials distribution and gauge on level attentiveness as the instructor conf irms from the learner his/her progress with a previous assignment before proceeding to the next. Connection to Effective Teaching Practices As observed in the video, the main teaching strategy adopted by the instructor is participatory learning. This strategy is inclusive of the need for active participation by the learner who is encouraged and motivated to optimally function actively in class activities without fear of developing inferiority complex problem. In a relatively diverse class such as one in the video, fear and low self esteem is a common occurrence especially when the minority or special needs learner has to cope with his/her normal counterparts. Subsequently, limited space for activating positive self esteem may result into lack of confidence and diminished courage to practice inquisitive learning.Advertising We will write a custom essay sample on Self Esteem and Culture in a Learning Environment specifically for you for only $16.05 $11/page Learn Mor e Fortunately, the instructor is aware of this and is successful in applying inclusive participatory approach in imparting knowledge. As a matter of fact, the learner is given an opportunity to contribute and special attention to gauge progress. Before proceeding to the next concept, the instructor ensures that the learner is at par with lesson objective. Characteristic of a class room environment with learners of diverse background, inclusive education offers the best alternative in active learning process. Since participatory learning triggers creativity and inquisition, interaction with peers create a comfortable room for boosting self esteem irrespective of physical or cultural variations which may exist. As the learner interacts with peers, confidence in expression and self ingenuity naturally surface. The key aim of a lesson objective is ensuring that the learner is in a position to accurately and practically apply acquired knowledge within accepted facets of interpret ation. In this scenario, this aspect is inspired by the instructor who acts as a guide and a learner of cultures at the same time. In the process of learning from the student, the instructor creates room for free expression and flexibility to accept diversity as strength. Generally, use of interactive and inclusive strategies offers comprehensive approach in understanding acculturation and impact of the same on learning as a process and a system. In the process of internalizing competency, secondary aspects of inclusive learning through direct participation facilitates formal and informal establishment of a risk-free classroom environment as involvement functions on equitable treatment. In addition, at macro level, inclusive learning process reinforces positivity in self expression, interaction and presentation of set goals, evaluation criteria, and personal reflection without feeling neglected. Evaluation Effectiveness of Strategies Applied Reflectively, the instructor has successf ully applied inclusive participatory approach as an education strategy. Despite divergence in acculturation, the learner is active and participates fully among peers. Besides, the instructor has created a free learning environment where the learner is empowered to respond without feeling inferior. For instance, before proceeding to next concept, the learner is given ample time to interpret the previous one. Since the objective of this lesson is to understand cultural diversity and creation of self esteem, the success is measured by active participation and self expression by the learner who is attentive across the lesson.Advertising Looking for essay on education? Let's see if we can help you! Get your first paper with 15% OFF Learn More As a matter of fact, the learner is keen and follows up instructions issued by the instructor to the latter as shown in the video. Use of bright colors for elementary level in participatory learning boost interest, maintain attention, and facilitate concentration as noted. The process of evaluation is as a result of informed perception of the ideal learning environment and prior experience as guided by lesson planning rubric. As a teacher, the basis of lesson planning and execution is due to the need for inclusive interactive learning process and simplification of concepts in line with the level of learning. In order to comprehensively interpret the concepts presented in the video, the analysis operated on the assumption of personal involvement. Therefore, prior knowledge of instructional delivery methods and techniques of maintaining maximum concentration informed the above analysis. Conclusively, knowledge imparting strategies should operate within reliable and suitable epoch in o rder to create free learning environment, instill confidence in the learner, and improve quality of output in line with objectives of a lesson. Irrespective of academic level, inclusive participatory instructional methods is essential. Reference Slavin, R. E. (2006). Educational psychology: Theory and practice. Boston: Pearson Education.

Sunday, October 20, 2019

A College Essay Coachs Take on the College Admissions Scandal

A College Essay Coachs Take on the College Admissions Scandal The college admissions scandal that has been all over the news has inspired me to break my recent blogging silence. The greed and lack of integrity exhibited by employees of top universities disturb me greatly. Since I am a Yale graduate, I have received a couple of apologetic letters from President Salovey; I hope that the school’s promise to be more vigilant in its admissions process holds true. Since I am a college admissions essay coach, I had the opportunity to be interviewed by the media. Both USA Today and Rob Hart of WBBM talked to me about ethics in college admissions. Here are the article and radio clip for your reading and listening pleasure: USA Today:  Do all students cheat on their college applications? No, consultants say, but there are plenty of problems. I get calls from people who want me to write essays for them, and I won’t do that, said Brenda Bernstein, who runs The Essay Expert. This student is being judged on their own ability. But there are services that do that. And some sell academic essays as well. WBBM Newsradio Show: Essay Coach Talks Best Practices For College Applications The Dual Life of a Resume Writer and College Essay Coach What strikes me, in particular, is that many people conflate the ethics of writing a professional’s resume with the ethics of writing a student’s college essay. I keep explaining to reporters and others why they are not the same. One of my resume writer colleagues posted this comment about the college admissions scandal to my Facebook page: Just to be devils advocate here, I dont see the difference between writing essays with information students have given about THEIR story and writing a resume for someone who tells you his / her story about his / her career. We dont put on the bottom of their resumes that it was written by us. Most executives have their executive assistants write their letters for them. Is that cheating by the executive (we have all seen where an executive calls his assistant into the office to take a memo)? Like I said, just playing devils advocate.  :-) My response: There is no assumption or requirement that resumes be written by the job applicant. In fact, many hiring managers say they *prefer* a professionally written resume. Theres also no rule that a student cant get some coaching and editing help on their essay. English teachers and guidance counselors have been doing this for years. Whats important to me is that the essay is truthful, at the level the student is capable of writing, and in the students voice. What I would add to the above is that there is most definitely a rule that students must write their own application essays. Admissions committees judge them for the quality of their writing and how they express themselves, because they are going to be required to use those skills in their college careers. By contrast, an executive wont be expected to write a good resume as part of his or her job. Moving Toward Truth Integrity My job as a college essay coach is to help a student tell the truth – not the version of the truth they think an admissions committee wants to hear. I can’t tell you how many times I’ve asked an applicant, â€Å"Is that really true?† and gotten the response, â€Å"Well not completely. But it seems like that’s what I should have gotten out of it.† Again and again, I point the writer to the truth, which is always more interesting than the picture perfect story they thought they should tell. As a resume writer, too, my job is to tell the truth. The facts speak louder than any flowery language we could write to make something sound better than it is. We stick with the facts. The cheating uncovered in the recent college admissions scandal goes far beyond helping students think through the best way to tell their story. It goes way past the level of supporting an executive by presenting her accomplishments powerfully in writing. I hope the world recognizes this difference. More important, I fervently wish that parents, college admissions advisors, university administrators and sports coaches choose to act with integrity as they shepherd young adults into what could be the most important four years of their lives.

Saturday, October 19, 2019

Describe and explain the different stages of American policy toward Essay

Describe and explain the different stages of American policy toward China during the Cold War - Essay Example The first years of the Cold War are notoriously difficult to pinpoint since although the United States was against communism in the earlier years of the 20th century, it was allied with the Soviet Union during World War II in defeat of Germany and Japan. Therefore it is most common to claim the beginning of the Cold War as occurring in those years after World War II when the United States explored its options in terms of dealing with all communist countries (Wala 168). With specific reference to China, the United States spent the early 1950's deciding how to proceed with a Chinese nuclear disarmament plan. The following decade was dedicated to the war between North and South Vietnam, a conflict that gave further rise to unfriendly relations between the United States and China. While China supported the communist regime of North Vietnam, the United States supported South Vietnam in its efforts to establish a democracy. The Vietnam War was in essence a mirror of the non-violent conflict raging between the United States and China, and both countries saw the war as a way to manifest its own beliefs and prove one way or the other that theirs was the superior political strategy. In fighting for South Vietnam and providing troops with arms, the United States hoped to instill democracy in the nation and actually win over communism. The Chinese government felt exactly the same way about its involvement with North Korea and the installation of a communist government. The Vietnam War marked the pinnacle of the hostilities between the United States and China during the first stage of the Cold War period (Wiest 19-23). China and the Soviet Union were close allies immediately following the Second World War, and while the USSR took a central role in the spread of communist ideals on the international level, China's responsibility was to spearhead and Eastern revolution whereby all of Asia was hoped to be made communist (Ross 71-80). The influence of China was difficult to ignore both for the USSR and the United States simply because it was such a massive, populated country. When China became allied with the USSR, the United States government was confronted with the realization that it might be overwhelmed by the combined political and military influence of these communist states, and so when the opportunity came to ally itself with China, America took it. In the early 1970's US President Nixon took advantage of the wish of the Chinese government, headed by Mao Zedong, to establish more friendly relations with the United States. Despite the communist status of China, the major irritation to the democratic American government was the continued success of the communist Soviet Union and therefore Nixon and Zedong understood how an alliance could benefit them (Harding 391-395). Both America and China were experiencing issues with the Soviet government at this time, and although China and the USSR were both communist countries, the former had decided to change the focus of its political and economic appeal. This rapprochement is considered one of the contributing factors in the eventual collapse of the Soviet Union and the end of the Cold War. In 1979 China and the US announced a full return to their diplomatic relations, and on this milestone US President

Friday, October 18, 2019

Business Ethics Essay Example | Topics and Well Written Essays - 2000 words - 3

Business Ethics - Essay Example The origins of the Kantian theory are from the Principles of Morals and Legislation in the year 1863. According to Kantian theory, there should be an attempt to make the world a better place and then to pursue the greatest good for an entire mass. Utility is to generate favourable impacts on the intrinsic values like, pleasure, preferences, ideas and happiness. According to Kant, the ethical values are recognized and are essential for identifying the second test of universalizabilty because more than often values are recognized in contradictions (Dimitriou et al, 2011). The rational beings are recognized as the individuals with the potentiality of the defining motives which are universally acceptable and widely recognized. The Kantian theory has provided me with significant inputs which have acted as a catalyst in the improvisation of my existing behaviour and performance in the existing organization. It has helped me to understand the significant difference between morality assumpti ons and rational choices (George, 2011). There have been various instances in my life where the solutions have stemmed out of Kantianism theory and have offered powerful moral insights and also, have helped in the reduction of the moral disagreements (Holme, 2008). The conflicts arising out of difference of opinions were resolved due to Kantianism theory (Pollock, 2011).The conflicts arising between family members due to difference in personal opinions, were settled with the guidance of Kantianism theory. The conflicts triggered by moral disagreements arising out of personated choices have been solved with the help of the guiding perspective of Kantianism theory. This thesis is utilized to refute idealism theories and states that these values within the ethical systems are of much worth. The theory lays emphasis on the fact that most of the moral values and ethical standards practiced by the society are justifiable. The unethical conduct practices in the organization are due to the failure of implementation of the moral values and standards. The permanent values cannot be embedded into the systems and is found to provide fruitfulness to the ethical theories and systems. The only minuscule difference is that it identifies the difference between the precepts behind the ethical principles and standards. However, this theory has various loopholes and lacks to serve the purpose of a guide. It is possible that an individual can face such a situation in any organization and thus, the employees can monitor the ethical system themselves. Utilitarianism Theory The Utilitarianism theory was evolved by Jeremy Bentham and suggests that a movement should focus on the right action which would serve the benefits of the mass. An action is either right or wrong, but if the action serves the welfare of a majority of the people, then it is following the guided path of the Utilitarianism concept (Roff, 2013). It is a technique which determines the moral value of an action. It help s us in judging the possibility of effects of our actions from the past on that of our present (Roff, 2013). The basic intention of this theory helps to unfold the reasons behind the implementation of moral values and ethics in a society or company. It is a systematic process to justify the moral standards of

The Management of Patients With Dual Diagnosis Research Paper

The Management of Patients With Dual Diagnosis - Research Paper Example Ms M is a 26-year-old patient who is referred for nursing care by her advisor at work. This followed significant changes in her normal behaviour. The patient history demonstrates that Ms M stays late without any sleep and wakes up earlier than anybody within her neighbourhood. Her employee is also concerned by the fact that she started submitting her work late regardless of her usual behaviour in the past when she used to meet all work deadlines. In addition, the workmates have noticed that Ms M is more enthusiastic and energetic in the morning than before. Ms M’s sister whom they stay with reports that she suddenly becomes irritable and has been talking about becoming a model despite the fact that she never had an interest in modelling before. Ms M also admits that she has trouble concentrating at work and that sometimes she feels lonely. From the case study, it is evident that Ms M is exhibiting multiple symptoms which reflect the complexity of her problems and needs. Ms Mâ €™s symptoms are becoming a problem that is likely to cause her to be terminated from work. This is revealed by the loss of concentration at the workplace and failure to meet deadlines as she is required. In addition, Ms M is faced with a social problem at her workplace. This is disclosed by the fact that she reveals her loneliness when at work. In addition, she needs understanding from her colleagues at the workplace who are unable to comprehend the sudden changes in her behaviour. Moreover, Ms M has a problem with sleep which illustrates that she is not having adequate rest at night. The sudden episodes of energy and enthusiasm that Ms M demonstrates in the mornings reveal an underlying problem.

Compare and contrast the regional variations that are prevalent in the Research Paper

Compare and contrast the regional variations that are prevalent in the Romanesque Church architecture of Lombardy, Germany and the Low Countries, and Tuscany Give examples - Research Paper Example This style of construction and building can be identified in almost all parts of Europe. The most notable buildings that are still standing presently are the churches, with some of these being the large cathedrals and abbey churches (Jackson 32-34). According to Fletcher (25-27), the church was the ultimate emblematic structure of the Romanesque architecture, and since they were constructed to meet specific needs of liturgy, their construction was depended on the needs. These churches had similar architectural designs that included the thick walls semi-circular arches, towers, roofs and round arches in arcades, doors, windows and vaults (Jackson 36). However, these churches differed in the ground plans, the shape and position of towers, shape of columns, piers and the east end, and the building materials (Fletcher 28). This paper seeks to give the similarities and differences between the Romanesque Church architecture of Germany and the Low Countries, Lombardy and Tuscany. The Romanesque architects constructed myriad buildings with most of them being abbey and village churches, castles and cathedrals (Itcher 23). All these churches were constructed to shelter, welcome and hold the faithful in an environment that was dignified and gave a sense of depth and an ambulatory apse (Flecher 31). The Romanesque churches were built with an interior that was complex and with a densely molded material typified by strong chiaroscuro differences that strengthened the plastic outlines of the columns and heightened the sense of encrusted distinctive thickness and spatial depth (Jackson 44-45). From a structural standpoint, this was successful due to the implementation of the system of anchorages taken as longitudinal units; they were made to be spatial bodies that were added to the next one in a symmetrical manner (Icher 49). The buildings had an isolated crossing that was a normal aspect

Thursday, October 17, 2019

Installation Architecture Paper Research Example | Topics and Well Written Essays - 1000 words

Installation Architecture - Research Paper Example The installation architecture depends on space to depict its dimension. The argument that architecture is intended to create space hence, those elements that frame space such as walls and divisions on the screen makes it is true. The elements of installation that makes it architectural include site-specificity, temporality, cerebral, interaction, photo record and process. In installation arts, space has a vital functionality since it establishes the level of impact of objects on the spectators. In installation arts, the views have no option of moving around the objects in the hall. The viewers are compelled to move through the objects in the hall. In this case, the space provides the dimension on which the spectator will observe the object movements on the screen and the walls. In case the observers move around the items in the wall, they obtain a three-dimensional view hence, can connect several elements of installation arts and develop a concrete perception about the event. The spa ce is a complex factor in installation arts because it determines all dimensions around the object. Space occupied by the object and the distance between the object and screen controls the reference of the presentation and the exposure of light around the objects. The lights promote the dimension within the hall, division or the floor space. The lights elongate the blind spot of an individual and improve the clients view behind the main object. Walls allow for the exposure of the piece of art in desirable sizes and foster appropriate perceptions among the viewers. The walls provide the setting on which the changing images form their background hence; other decorations on the wall can enhance the presentation. Installation arts may consist of walls that are parts of the performance. The claim that there are no spectators in installation arts is fundamental because the spectators are actively involved into performance due to their reactions. The actions taken by the spectators are cau sed by the prompts they obtain from the stimuli from the images on the walls. The divisions promote the architecture in installation arts by displaying linked objects in a comprehensive consequence. Site-specificity in installation arts requires the connection between the object and its surrounding space. Installation art incorporate the inclusion of items in a space such as walls. The space determines the dimension onto which an object is observed. An object that is flat on the screen may be perceived as a two-dimensional image. Contrarily, an object with a distant background triggers the perceptions of three-dimension among the viewers. Gramazio & Kohler: Digital Materiality, there is a stronger relationship between the constructed assembler and precision material and the space onto which it is installed. There is a symbiotic relationship between the assembler and the truck. The element is therefore, specific to the site. Retrieved on April 14 from http://www.core.form-ula.com/wp- content/uploads/2009/09/screen-shot-2009-09-29-at-113505-am.png The temporality aspect of the architectural installation relies on the physical relationships to the worldly objects. Time is critical in architectural installation since the objects viewed on the walls and perceived for various dimensions and meanings lose value within a period. The conventional belief that the world is a produce of time is real in temporality. The walls and the number of

Student action plans Essay Example | Topics and Well Written Essays - 500 words

Student action plans - Essay Example According to Holling (1), everything is dependent on everything else. In other words, every organism has a significant role in the ecosystem. For instance, lions kill herbivores for food. On the other hand, these animals feed on grass. Hence, if they were left to reproduce without killing some, pasture land would now be barren. This would then lead to extreme erosion and siltation of water beds, hence endangering marine life. Due to this, I think that the maintenance of ecological integrity is moral and necessary for the survival of all living organisms. Research shows that human activities are the leading cause of environmental degradation. In my case, for instance, the use of petroleum energy in vehicles leads to the loss of a non-renewable resource. Furthermore, vehicles burn up the petroleum oil and release greenhouse fumes into the atmosphere. This leads to negative impacts on the environment, such as global warming. This, in turn, leads to changes in climate, either longer dry spells on extreme rainy seasons that cause havoc to the environment. Such climate changes affect farmers all over the world, who depend on good weather conditions for survival. This, subsequently, results into increased food insecurity and mortality rates. Furthermore, the fumes that vehicles release cause air pollution. People become more prone to respiratory diseases, whereas those already with such experience a lesser probability of cure. In fact, I think that my only positive impact on the environment is in my planting of flowers and trees in my home place. However, this cannot cause a reasonable change in the ecosystem. Thus, everyone has to contribute to the sustenance or renewal of ecological integrity in the world. One way is to encourage everyone in the neighborhood to plant trees. Trees provide a water-catchment area that ensures the survival of soil microorganisms as well as marine organisms. In addition, I can also

Wednesday, October 16, 2019

Installation Architecture Paper Research Example | Topics and Well Written Essays - 1000 words

Installation Architecture - Research Paper Example The installation architecture depends on space to depict its dimension. The argument that architecture is intended to create space hence, those elements that frame space such as walls and divisions on the screen makes it is true. The elements of installation that makes it architectural include site-specificity, temporality, cerebral, interaction, photo record and process. In installation arts, space has a vital functionality since it establishes the level of impact of objects on the spectators. In installation arts, the views have no option of moving around the objects in the hall. The viewers are compelled to move through the objects in the hall. In this case, the space provides the dimension on which the spectator will observe the object movements on the screen and the walls. In case the observers move around the items in the wall, they obtain a three-dimensional view hence, can connect several elements of installation arts and develop a concrete perception about the event. The spa ce is a complex factor in installation arts because it determines all dimensions around the object. Space occupied by the object and the distance between the object and screen controls the reference of the presentation and the exposure of light around the objects. The lights promote the dimension within the hall, division or the floor space. The lights elongate the blind spot of an individual and improve the clients view behind the main object. Walls allow for the exposure of the piece of art in desirable sizes and foster appropriate perceptions among the viewers. The walls provide the setting on which the changing images form their background hence; other decorations on the wall can enhance the presentation. Installation arts may consist of walls that are parts of the performance. The claim that there are no spectators in installation arts is fundamental because the spectators are actively involved into performance due to their reactions. The actions taken by the spectators are cau sed by the prompts they obtain from the stimuli from the images on the walls. The divisions promote the architecture in installation arts by displaying linked objects in a comprehensive consequence. Site-specificity in installation arts requires the connection between the object and its surrounding space. Installation art incorporate the inclusion of items in a space such as walls. The space determines the dimension onto which an object is observed. An object that is flat on the screen may be perceived as a two-dimensional image. Contrarily, an object with a distant background triggers the perceptions of three-dimension among the viewers. Gramazio & Kohler: Digital Materiality, there is a stronger relationship between the constructed assembler and precision material and the space onto which it is installed. There is a symbiotic relationship between the assembler and the truck. The element is therefore, specific to the site. Retrieved on April 14 from http://www.core.form-ula.com/wp- content/uploads/2009/09/screen-shot-2009-09-29-at-113505-am.png The temporality aspect of the architectural installation relies on the physical relationships to the worldly objects. Time is critical in architectural installation since the objects viewed on the walls and perceived for various dimensions and meanings lose value within a period. The conventional belief that the world is a produce of time is real in temporality. The walls and the number of

Tuesday, October 15, 2019

Gegheis Khan Term Paper Example | Topics and Well Written Essays - 2000 words

Gegheis Khan - Term Paper Example He was successful in uniting many of the dispersed tribal groups and made the Mongol empire the largest during his life period. Major portions of central Asia and China were under the control of Mongolia during his tenure as the greatest Mongolian leader of all time. No other king or emperor in the history was successful in conquering major portions of Asia as did by Gegheis Khan. In fact Mongol Empire was the second largest Empire in the history of the world. Even though his life and contributions are well known to the world at present, details about his death and his burial place are still unknown to the world. This paper analyses his life, conquest and the ways or strategies through which he expanded the Mongol empire. One of the major problems associated with getting more details about Genghis Khan and his war tactics and contributions, is the fact that his history was not written by anybody during his life period. In fact the only book wrote about him was published around hundre d years after his death. Thus, exact date of birth of Genghis Khan is still unknown even though different historians marked it in different years like 1155, 1162, and 1167. In Mongolia, his birth year is accepted as 1162 even though the controversies regarding his birth date still persists elsewhere. He was born in a noble clan and his father was the clan leader, respected by all the members of his clan. Shortly before he was born, his father, Yesugei, killed a man from an enemy tribe. Yesugei and his wife named their first son Temujin after that vanquished rival. At the time of Temujin's birth, most Mongols were nomadic hunter gatherers who herded sheep and horses. They travelled in clusters of tribal clans and subclans (Wilmore, p.18) Mongolians including the females were excellent horse riders and hunters. In majority of their wars, they used their horse riding expertise and hunting skills judiciously and earned many famous victories. Since ancient Mongolia was a place of differe nt clans and ethnic groups, bloody clashes between different ethnic groups were common in there. Genghis Khan’s clan was one of the most powerful clans in Mongolia and it succeeded in uniting other clans under their wings. The inborn or inherited talents for conducting wars helped them immensely in expanding their territories. When Temujin reached his 10 years of age, his father was killed in a fight by another enemy clan. As per the existing traditions in his clan, he should have become the leader of his clan after the death of clan leader; his father. However, the he was too young to assume the clan leadership and the members of his clan had chosen another person as their leader by expelling him and his family. It was difficult for a young person like Temujin to lead a peaceful life after the expulsion from his own clan. Threats from enemy clans were always in place and Temujin struggled to save his life. Temujin was a brave boy and he was not ready to give up. He fought ha rd for his own survival and his family’s survival. Each battle of survival made him tougher and tougher and educated him many survival principles. He was decided to regain his lost place as his clan leader and the first fight conducted by Temujin was for his clan leadership. Slowly Temujin’s bravery and leadership skills were accepted by his clan and they made him the unquestionable leader of their clan. Immediately after assuming the leadership

Monday, October 14, 2019

Literature Review About Meter Reading Techniques Computer Science Essay

Literature Review About Meter Reading Techniques Computer Science Essay In this chapter we will explore more about how meter reading is done, the different type of techniques that exist to read meters, and automatic meter reading; specially the use of Bluetooth technology for automatic meter reading. A world wide view will be explored before we look to the context of Mauritius. Meters A meter is a device that can detects and displays the exact quantity of an element, substance or any quantifiable matter, may it be electrons, water, gas, glucose and many others. There are many uses of meters and in many different sectors of our world. For example, in health sector; meters are used to measure the level of glucose in the blood, to measure pulse rate, and many others. The utility sector, like gas, water or electricity companies, uses a very large numbers of meters. These companies have to monitor the usage of the resources used by their customers so that they can be charged for the amount they have used. There are also other meters like: gauss meters, geomagnetic meters, microwave meters, and many more. As we have seen, there are many sectors in which meters are being used; we cannot focus our attention in all of them. So, we will concentrate our effort in the utility sector, more specifically the one for electricity companies. Why this choice? Because Energy sector is a driving force in our world and that many developments and advances are thanks to electricity. So from here on we will focus our attention on that specific domain. Types of meters There are many types of meters depending on the area of use. The main types of electric meters are: Electromechanical Induction Meter (Standard Meter): It is a meter which counts the number of turns an aluminium disc does. The amount of electricity used is directly proportional to the number of revolutions of the aluminium disc. The electricity is measured in kilowatt-hours and the rate of charge remains constant all over the day. These types of meters are commonly used on single phase alternating current supply. Electronic Meters: These meters have an electronic display and make use of wireless technologies like Bluetooth, GSM and GPRS to transfer information about electrical consumption. They have inbuilt automatic sensors which helps to detect electrical energy theft or meter tampering. Prepaid meters: are like the standard meters; the only difference is that, instead getting a bill at the end of the month, it is a pay as you use service. I.e. the consumer pays in advance for the electricity consumption. Smart meter: These meters record the amount of electricity consumption for a certain period of time. The recorded data is then sent to the utility company for monitoring and billing purposes. Smart meters can transfer data from and to the meter, i.e. it is a two way communication. Meter reading Electric meters measure electricity mostly in kilowatt hour (kWh). One kilowatt hour is equal to the amount of energy used by a load of one kilowatt over a period of one hour, or 3,600,000 joules. The meter reading process is done periodically, so that consumers can be billed for that period of time. There are different methods used by different companies for metering. There are two ways that can be identified. Namely: the traditional way and new techniques. The traditional way, which uses the standard meter, can be described as: The meter reader goes to the consumers place. There, the meter reader reads the current value on the meter and note it down on the bill for the previous electricity consumption period. The bill is then given to the consumer. The meter reader will then enter the current value in the companys system, so that the consumer can be billed for that current period. The new techniques, which uses, electronic and smart meter are as follows: The meter reader makes use of new technologies to read the meter value, and meters have an electronic display. There are many different new techniques used for meter reading, and they will be further elaborated below. Automatic meter reading (AMR) Automatic meter reading (AMR), is the technology where data about consumption and the status of the meter device is collected automatically. The data is sent to a central database for it to be analysed and billing purpose. Meters for water, gas, and electricity can use the AMR technique. With the uses of AMR, there can be one way or two-way communication. In the one way communication, query is done only to know the reading value from the meter. Whereas in the two way communication; functions can also be implemented to the meter. Techniques for automatic meter reading There are several techniques for automatic meter reading; some of them are listed below. Touch Technology In the touch technology, a meter reader have a device, it may be a handheld computer or specialised data collection device. When the meter reader in close range to the meter; the latter press a button. A signal is sent firm the device to the meter and the reading of the meter is saved on the device. That saved data is downloaded to a data collection computer for billing purpose. This technique is also referred as on-site AMR, as the meter reader needs to go on site to read the meter reading. Radio Frequency Network As its name suggest, the network uses radio wave to communicate with the meters. There are automatic reading systems which uses the radio based technology such Wi-Fi, ZigBee, Bluetooth and many others. Some of them are listed below. Handheld: a meter reader collects meter reading from meters which support AMR system. The meter reader carries a portable computer with a radio frequency receiver and transceiver which reads the meter readings value. [2] Mobile: it is also referred to as drive-by is a technique where the meter reading device is installed in a vehicle. The meter reader needs only to drive the vehicle along the path where the meters are found and the meter reading value is read automatically by the device installed in the vehicle. [2] Fixed network: it is a method where there is a network which is installed permanently to read meter reading. The network consists of many repeaters, collectors and a lot of other equipments so that values read are transferred to a central database. This method does not need the intervention of any human to read the metering value. Some time a hybrid AMR system is implemented so that when the fixed network goes down, the mobile system come into action. [2] Assessing the traditional meter reading and AMR The advantage and disadvantage of both traditional meter reading and AMR techniques are listed in the table below. Traditional Meter Reading Advantage Disadvantage Creation of job, as more people are needed to perform meter reading Social contact with consumers There can be error when reading the value. Difficult to detect fraud on meters. Some people consider the meter reader as an intruder in their privacy. Security of the person performing the reading the person may be attacked by dogs Table 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1: Traditional Meter Reading Automatic meter reading Advantage Disadvantage Enable theft detection. More accurate meter reading. Reduce operating cost. There is no need to enter consumers property (except for exceptional cases). If the system is down, billing will be affected. The use of radio waves can be a source of concern to a minority of people Table 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2: AMR Existing system using Automatic Meter reading There are many AMR systems implemented in many in different countries and using many of the different techniques listed above. Some of the existing AMR systems are listed: New Mexico Gas Company is using the AMR service. This has greatly helped to improve the working of the company. [4] The Ontario government introduced legislation on Nov. 3, 2005 to start the process of getting smart meters into every home and small business in the province by 2010. [5] Meridian Energy has started replacing traditional electricity meters with new smart electricity meters which will set a new benchmark for electricity retailing in New Zealand [6] Existing system of Bluetooth enable meter reading There are some companies which are using Bluetooth enabled meter for the reading of their meters, and there are some supplies of Bluetooth enabled meters. The topic is further developed below. Existing system Cambridge Consultants has delivered a prototype design of a Bluetooth-based radio module to the leading utility metering company, Actaris. Based on a single-chip Bluetooth device, the module provides new opportunities to drive down the cost of remote metering, allowing meters to be wireless-enabled at very low cost and opening the door to high-integrity consumer-activated schemes. Consumers with Bluetooth mobile phones, laptops or PDAs would have the option of taking meter readings themselves and communicating them to the utility company over the internet or GSM. [7] Bluetooth enabled meters suppliers There are many suppliers of Bluetooth enabled meters. Some of the suppliers are listed below. Landis+Gyr, is a company which design and manufactures electricity meters. This company have also design a Bluetooth reading system where they can read meters using Bluetooth. [8] Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1: Bluetooth reader [8] Metex Corporation limited is a company which is manufacture meter readers, and the company has meters with Bluetooth technology. These meters can be used in an AMR system. [9] Current situation in Mauritius In Mauritius, we have the Central Electricity Board (CEB), Central Water Authority (CWA) and Waste Water Authority (WMA) as the main utilities companies. All these utilities companies are using the traditional way for their billing purposes. .I.e. a meter reader will go home by home and read their respective standard meter. The CEB is doing research on how to implement automatic meter reading and they have some electronic meters for testing purposes. CEB has also intention to implement prepaid meters. The AMR system on which CEB is experimenting consist of meter which has a modem. Then a communication is set with the modem and concerned data is read. That data is used for the billing purpose. As mentioned, the system is still at a testing phase, so a lot are still need to be done. To be able to implement AMR system all standard meters need to be changed to AMR supported meters, and meter readers need to be trained to be able to use the new system. Bluetooth Technology What is  Bluetooth? Bluetooth  is a wireless technology for short range communications which was developed to replace the cables connecting devices, may it be fixed or portable ones. Such devices are; mobile phones, printers, cameras, desktop computer, and many others. The Bluetooth  technology is a low power, low cost and maintains high levels of security. Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. [10] The Bluetooth Special Interest Group (SIG), an organization of several companies work together to maintain and develop the Bluetooth technology. [10] The name Bluetooth comes from Danish King Harold Bluetooth. He was influential in uniting warring factions in parts of what is now Norway, Sweden and Denmark. [11] Bluetooth technology can withstand interference from wireless technologies which uses the 2.4 GHz spectrum. Adaptive frequency hopping (AFH) of Bluetooth technology detects other devices in the spectrum and avoid the frequency they are using. [11] According to Martin Reynolds, an analyst with Gartner Groups Dataquest, The thing about Bluetooth is that it really will ship in the billions of units once it gains momentum. Its really a multibillion-dollar market. [12] Bluetooth Logo Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2: Bluetooth logo [13] Bluetooth range Bluetooth radio waves use certain amount of energy and can goes up to a maximum of certain diameter. The table below show Bluetooth class and its limit up to where it can go. Class Power use (mW) Range (approximate) in meters 1 100 100 2 2.5 10 3 1 1 Table 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ3: Bluetooth class range BLUETOOTH Network There are two type of network: Piconet: is made up of one master and one or more slaves but only up to a maximum of seven active slaves at a time. The device initiating the connection automatically becomes the master and is the master of the piconet. Slaves may not communicate directly with each other; they can only communicate with the master and transfer data when they are granted transmission time by the latter. Slaves synchronize their frequency hopping with the master using the masters clock and Bluetooth address. Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ3: Typical piconet [14] Scatternet: Multiple piconets with overlapping coverage areas form a scatternet. Each piconet may have only one master, but slaves may participate in different piconets on a time-division multiplex basis. A device may be a master in one piconet and a slave in another or a slave in more than one piconet. Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ4: Typical scatternet [15] Bluetooth protocol stacks The Bluetooth protocol stack allows Bluetooth devices from different manufactures to work with one another. Some of Bluetooth protocol stacks   LMP (Link Management Protocol); configure and control links to other devices.   L2CAP (Logical Link Control Adaptation Protocol); links upper layer protocols over the Baseband and the passing on of quality of service information. RFCOMM (Cable replacement protocol): protocol provides emulation of serial ports over the L2CAP protocol.   Service Discovery Protocol; provide a way for discovering services provided by or available through a Bluetooth device. It also allows applications to know about the characteristics of the services which are available.   HCI (Host/Controller Interface); access the hardware status and control register. It also provides a command interface to the Link Manager and Baseband Link Controller. Bluetooth radio is a transceiver which transmits and receives modulated Bluetooth radio waves for the devices. Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5: Bluetooth protocol stacks [15] Bluetooth profiles Bluetooth profiles help two devices which have the same profile to communicate with each other. Each Bluetooth device must support at least one profile. There are a wide range of Bluetooth profiles that explain many different types of applications. Generic Access Profile (GAP): Provides the basis Bluetooth functionality for all profiles. Some of the functionalities are like setting up L2CAP links, handling security modes and discoverable modes. Serial Port Profile (SPP): Provides serial port (RS-232) emulation based on the RFCOMM part of the Bluetooth stack. Dial Up Networking Profile (DUNP): Defines how to a Bluetooth device can be used as a Dial Up Networking gateway FAX Profile: Defines how a Bluetooth device can be used as a FAX gateway Headset Profile: Defines what is required to transfer audio e.g. a wireless Bluetooth headset LAN Access Point Profile: Defines how a Bluetooth device can be used as a LAN access point Generic Object Exchange Profile (GOEP): Provides support for the OBjext EXchange (OBEX) protocol over Bluetooth links Object Push Profile: Defines how to exchange vCard and vCalendar objects, based on the GOEP File Transfer Profile: Defines functionality of how to navigate through folders and copying, deleting or creating a file or folder on a Bluetooth device, based on the GOEP. Figure 2à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ6 : Bluetooth Profiles [16] THE ADVANTAGES OF BLUETOOTH Short transmission range up to a maximum of 100 meters with class 1. Low Power: Bluetooth takes relatively low power, thus it is suitable for devices with restricted battery capacity. Interoperability: as it have standardised protocols. Robustness: capable of operating in an environment strongly where there are many other radio waves Technologies for developing the system There are many phase for the development of a system and there are many tools available for their development. Two categories can be identified for a system; hardware and software. The hardware part is the part that can be hold by hands and move if it is portable. The software part can be seen as the one who make the hardware works correctly. Without the software, the hardware cannot be used fully. Programming language There are a series of programming languages that are available to programmers to code systems. Each programming language has an area of application where it is better. Some of the programming languages are listed below. Java Java is cross platform and GNU General Public License  programming language. Java is an object-oriented, class-based, general-purpose, and concurrent language. It is intended to let application developers write once, run anywhere. Java programming languages is used in many systems ranging from applications software to web applications. Java can be use for Bluetooth programming. Java Communication Process (JCP) developed JSR 82, Java API for Bluetooth, so that Bluetooth enabled devices can be code easily using J2ME. Integrated development environment (IDE) help to code with java, some examples are: NetBeans The NetBeans IDE is written in Java and needs JVM run. It can run on different operating system like Windows, Mac OS, Linux, and Solaris. A JDK is required for the functionality of Java development. Netbeans also has a GUI design tool that help developers to design GUIs. Eclipse Eclipse was mostly written in java and can be used to develop java application. There are a lot of plug-in which helps to for development. J2ME J2ME is Java platform used to code embedded devices, like mobile phones. Java ME source code is licensed under the GNU General Public License. J2ME can be use to code systems with wireless connection. C programming language C is a general-purpose computer programming language that can run on many platforms. C can be use for developing portable application software. Python Python is a multi-paradigm programming language and it is cross platform, i.e. it can work on different operation systems. Python can be use for Bluetooth programming. Visual Basic.Net (VB.Net) Visual basic is implemented on .Net framework. VB.Net was designed by Microsoft and it is an object oriented language. Relational Database Management System (RDMS) Some of RDMS are listed below: MySQL MySQL is a relational database management system which is released under the GNU General Public License. It offers multi-user access to databases and it is cross platform software. PostgreSQL PostgreSQL is an object-relational database management system (ORDBMS) and it is released under PostgreSQL License. Thus it can be modified and distributed in any form desired. Web Server A Web server is responsible to process users request and reply back. The replies are mainly HyperText Markup Language (HTML) documents. Web servers are mainly used t host Web sites. Apache HTTP Server Apache HTTP Server is a Web server which is licensed under Apache License 2.0, which means that it is an open source HTTP server. It is platform independent, highly secure and efficient. Internet Information Server (IIS) IIS was created and is owned by Microsoft. There is need to buy it license to use it. Web Development Tools There are many server side scripting languages that are used. Some of them are listed below: PHP PHP (Hypertext Preprocessor) is a general-purpose scripting language that was designed for web development so as to have dynamic web pages. PHP can work on most servers and operating system. ASP.NET ASP.NET allows programmers to build dynamic web pages, web services and web application. It is a web application framework developed and marketed by Microsoft. Hardware Some of the hardware that can be used is listed below. Mobile phone Mobiles phones have become a common electronic device. It offers many options than just make call and send messages. Nowadays we can access the Internet via mobile phones, and there are many applications that where developed on mobile phone. New generation mobile phones are equipped with camera and Bluetooth. Laptop/ Computers Computer is like the tool that enables programmers to work. All most all programming languages, not to say all, can work on computers. They are also equipped with many wireless devices like Wi-Fi and Bluetooth. Embedded devices There are embedded devices that are designed specifically to do certain things. Some examples are: MP3 player, washing machines, Bluetooth meter reader, and many others. Evaluation of Tools Programming language The programming language is what will help to make the software. Each programming language has positive and negative points depending on the type of software that need to be developed. The pros and cons of certain programming languages are listed below. J2ME Pros Cons Offer better networking capability Available on various platforms J2ME applications are portable Rich user interface Robust security features. There is a wide range of mobiles which support Java, thus having wide range of mobile phone that can be used. Midlet cannot access all native resources without authorization. Application need to adapt for phones which have different CLDC, MIDP, JSR and Bluetooth. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ4: J2ME Java Pros Cons Java code can work on many different platforms. Java is secure, robust and reliable. Java provides use of multithreading. Java is object oriented and allows creation of modular programs and reusable code. Java have an API for Bluetooth programming Java is slower and consumes more memory when compared to languages such as C or C++. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5: Java Web Servers Web servers are what will enable the data to be access over a network in a convenient way. There are a lot of web servers, some of them are described below. Apache Pros Cons Apache is open and thus can be customised easily according to requirements Multi-platform. It runs on a wide variety of operating systems, including all variants of UNIX, Windows 9x/NT, and Mac OS Apache is not regularly updated Requires more technical knowledge to install and configure Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ6: Apache IIS Pros Cons GUI mode installation. Works with a wide range of operating systems and browsers. Source code is proprietary. Can only work within Windows environment. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ7: IIS Web Development Languages Web development language will be used to code for application at server side. There is a wide pool of language that is available. Some of them are listed below with their some of their pros and cons. PHP Pros Cons PHP is free and easy to use. PHP help to interact with database easily. Can support many operating systems, like Windows, Linux and Mac OS. PHP engine need to be installed on server to use PHP. Debugging can be lengthy for complex program. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ8: PHP ASP.NET Pros Cons ASP.NET code is compiled at server before being sent to the browser; thus faster. ASP.NET pages are simple to write and can cope with heavy traffic without affecting performance adversely ASP.NET runs on only windows platform. ActiveX objects are platform specific, thus it will not work easily on many Web servers. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ9: ASP.Net RDBMS Relational Database Management System (RDMS) will be used to store all data. It is very important as all sensitive data will be there and data will be used to do billing purpose. MySQL Pros Cons Easy to use. Free and Open source system. Runs on a range of different platforms. Can handle large sets of data. It is secure. Passwords are encrypted Recovery of database is not guaranteed in case of a power cut. Operates over known IP ports which facilitate the task of intruders Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ10: MySQL PostgreSQL Pros Cons It is a free and Open source software PostgreSQL can work on different platform PostgreSQL is very scalable and extensible It is slow compared to MySQL Lacks binary distribution for all the supported platforms. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ11: PostgresSQL Choice of Final Tools Java is appropriate for the desktop application as it can work on many different platforms and have an API for Bluetooth. J2ME is used for the mobile application development as many mobile phones can support java and have an API for Bluetooth. Bluecove API for Bluetooth programming as it is open source and support java. PHP will be used for the web application as it is free and easy to interact with database. MySQL is more suitable for database system as it is free and work well with Web servers. Design The design section gives an overview of the structure of the software and architecture of the system. It also includes the data involved, the interfaces between system components, algorithm and protocol to be used for the system implementation. System Design Issues Several system design issues like performance, quality of service, fault tolerance, and security, which are important in the design of a system, are discussed below. Performance Issues The performance issues are concerned with the limitation of computers in term of processing power and communication capacities. These issues can be described in the followings ways: Responsiveness: It is how fast the system processes given input to give an output. The use of threading allows multiple tasks to process simultaneously. Threads can be used for processor intensive process. Threads can be implemented in Java Environment. Applications running on networks depend greatly on the load and performance of servers and also the network load itself. Server and network load balancing can be used to prevent them from being overloaded. Such technique is beyond the scope of this project. When using the Internet, there is a probability of communication delays and data being corrupted, this beyond of ones control. Throughput: It is of the system corresponds to the amount of data transmitted between the client and server in a given time interval. On a wireless network is takes a long time to establish connection between the server and the client and the latency time of HTTP is significantly high. So, the number of HTTP round trips in the application must be kept to the strict minimum. Robustness Robustness is the ability of the system to operate in the presence of incorrect input or cope with errors when the system is running. Validations check like length check and data type check can be used to prevent wrong input and catch errors where shared resources are being accessed. Interactivity Interaction with the system can be in many different ways. Data or command input to the system will make it produce certain result. Some of the ways that can interact with the system are listed below. The use of graphical user interface (GUI) to facilitate user to communicate with the system. Providing options and menus where possible instead of typing data. Users using the mobile application need to enter data via phone keypad. Use of meaningful icons, so that user can interact quickly with the system. Flexibility The web application can support multiple users at a time and can receive and process multiple requests a time. The system must be able to cope if there is significant increase in the number of users and additional resources can be added if needed to. Portability The mobile application can be run on Java enabled mobiles phones which support MIDP 2.0. The web application can run on multiples types of servers. Limit size of JAR file The mobile application has limited resources to use. So the application is obfuscated to reduce its size. The obfuscation process helps to remove unused classes and libraries. Error, Exception Handling and Fault Tolerance The application should continue to work correctly in presence of software, hardware and network faults. Errors will be caught in try-catch blocks to alert user of the error. Security Security is one of the focal point of a system. There is no system on earth which can be tagged as impenetrable. What can be done is, to make the system less vulnerable to attacks. The system needs to protect data from unauthorized users. The ways to protect the system is listed below. Users need a username and password to be able to access the system. User will be identified and authenticated before they can use the system. The database will be protected with password. Architectural Design In this section, the different components of the system are illustrated and how they interact between them. Overall Architecture The system is made up of three main components: the meter, the mobile application and the server application. The mobile application will be used to read a value via Bluetooth from the meter and will send that value via mobile network operator to the server. The connection between the mobile and the server is done via wireless connection such as GPRS, WAP, EDGE or Wi-Fi. The meter will be a simulated meter on a laptop that will be accessed via Bluetooth by a mobile application. The server will be used to host the web site and connect to the database. That database will be used to store all information needed. The figure below shows the overall architecture. Figure 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ7: Overall architecture Detailed architecture Figure 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ8: Component diagram <