Monday, September 30, 2019

Social Health Care

Connecting Toward a Healthier Future Social technologies are affecting the way our world operates as they become more and more established and interconnected. Individuals are using Faceable, Twitter, Linked, and a wide variety of other forms of social media to communicate, connect, and share. The way many communicate with their family, friends, employers, and strangers has changed as social media has as well. Individuals can have closer contacts with those who live far away and stay up to date with those who they many not see everyday.As well as individuals ability to communicate more than they ever have before, the way they do things is changed due to social media and mobile technologies. More specifically, social technologies are affecting health care, connecting and collaborating to a healthier future. People worldwide are sharing information that can be accessed from any place, at any time. Not only is social media changing the nature of the way we access information, but it's a lso changing the speed of which we retrieve the information.Patients, doctors, and health care organizations can connect quicker and easier then they once could, roving important information to mass amounts of people at one time when needed, and sharing information creating a interconnected approach to health services. Individuals no longer have to wait in a doctors office for hours to find out the answer to a question they have as they can rely on social media; they can check their symptoms or type their question in on a website, such as www. WebMD. Com, and get instant answers from doctors without leaving their home.At the same time, individuals can post a question on a social media site and get answers and opinions from a large group of people including family, friends, doctors, and any one else who may stumble across the post. Social media has changed the way our world, and more specifically health care, connects to create a healthier future. Health care has gone through tremend ous amounts of changes since social media has emerged. At one time, patients were passive recipients of knowledge, relying solely on the information that one doctor has given them at any specific time.Results were not discusses and people would not go to others for advice or answers to medical questions or concerns they had. Today, however, through the use of social media, individuals are sharing more than they ever have, relying on the information from others, connecting and communicating for knowledge. After visiting a new doctor, having a procedure, or going for surgery, individuals can easily tell others about the experiences they had, sharing reviews of the doctor, and updates but posting and commenting on social media sites.Medications and treatments can also receive reviews by consumers, informing others of potential risks, benefits, and other concerns they may have. Patients can share health-related images ND videos and providers post quizzes to provide users with important information in an engaging way. PWS shares snapshots of recent activity, demonstrating how through social media users are asking questions such as, â€Å"when do you deliver your baby? – early, late, or on time? † receiving 61 likes and 766 comments (Anally, 2012. . This is a perfect example of how individuals today are using social media to get answers to the questions they have. Support groups for medical issues and health-related causes are being created, with awareness being spread through social media. As awareness is extending, so is the support received: information and input is shared and obtained through a mass number of people, called scrounging (courseware, n. D. ). When many people come together, great success is achieved.Websites such as The Foundation for Parade-Will Research is an example of a non-profit organization that has created a Faceable page made to bring individuals with Parade-Will, family members, and friends together to learn and share knowle dge (Howard, J. , Strong, T. , Johnson, S. , Viral, A, & porter, J. , 2014). This page delivers information, advice, suggestions, and arsenal stories about Parade-Will and how individuals are dealing with this medical disability. Different medications and treatment options along with the outcomes are shared, as well as school adaptations and success stories are shared among the group.The Faceable page creates awareness worldwide and receives support and pledges from many for research development. When someone joins a group where others experience similar issues a sense of community is built, sharing supporting, and helping others creating a healthier and happier population. Not only is there a Faceable page for Parade-Will, but there are also a wide variety of pages and sites through all forms of social media that offer support for those with medical exceptionalness and loved ones.There are also other ways to retrieve medical health care information through social media and mobile d evices, such as Telepathy Ontario. Telepathy is ministry of health and long-term care program, that is a free telephone service where you have access to a registered nurse 24 hours a day, 7 days a week. With mobile devices we have today, this means you can talk to a registered nurse at any time of any day, no matter where you are as Eng as you have a mobile device. The health professional will help you determine your first step in what to do when medical issues arise.After asking a series of questions, the nurse can help individuals determine whether self care is advised or if it's recommended you make a doctors appointment, visit a clinic, or go to a hospital emergency room. One will also be given numbers of community resources nearest to them, and answers to questions they may have. Telepathy is just one example Of a service provided due to the emergence of social media and mobile devices. Due to the rapid expansion of social media and mobile devices, there are many services emerg ing that connect us to create a healthier future. As application software has become very popular, so has the term â€Å"app. APS have appeared on smart phones, pods, pads, tablets, and computers. â€Å"App† was even coined the 201 0 word of the year by the American Dialect Society (Metcalf, A. 201 1). This comes no surprise as you can see the emergence of technology has even shaped the way society talks. If we look back to 1990, society begins talking about technology, with the â€Å"most likely word to succeed† being notebook PC, followed by the 1993 ‘ rod of the year† being information superhighway. The 1994 word of the year was cyber and 1 995 â€Å"word of the year,† as well as â€Å"most likely to succeed and most useful word's was World Wide Web.In 1998 the ‘rod of the yea' and â€Å"most useful word† was the prefix e- as in e-mail and e-commerce, with 1 ass's â€Å"most useful word† being dot-com. In 2002 the â€Å"most likely to succeed† word was blob and the most useful word was Google, as a verb, as it to Google someone. By 2009 the â€Å"word of the year† was tweet and 201 g's word of the year, app (Metcalf, A. 201 1). APS are available in nearly every subject, with the saying ‘there's an app to that,† applying to nearly anything today. This includes health, with a wide variety of health APS to help individuals get and stay healthy.For those with a child, loved one, or oneself who has a food allergy or restrictive diet, there are APS such as Foddering which allows them to check the ingredients and additives in each product (Hobbles, 2012). For keeping your body at a healthy weight there are a wide variety of diet APS, as well as fitness APS. Many diet APS allow you to input the food you eat and based off your body it ill tell you how much you should be having of each thing and how it is going to affect you. There are also a variety of fitness APS, with fitness plans, c alorie counters, and exercises for you to do.Calorie Counter and Diet Tracker by â€Å"My Fitness Pal† is an example of a combination of the TVÐ’Â »'0, as they affect each other. A healthy mind is also important when it comes to an individuals overall health, and for that there are APS such as Stress Check which tells you how you rate on the stress chart, and what to do to help reduce anxiety so you can have a healthier mind. Summary is an example of n app that can be used to help individuals of all ages, by letting you know when you do and do not need sun protection, such as sunscreen, hats, and light clothing, before going outside to help prevent skin cancer.To help prevent and detect another common form of cancer, birdwatchers and other similar APS have been created to help reduce the risk and provide early detection of breast cancer. This app provides a video on how to do a breast check, as well as sets up reminders in a calendar as to when to do it. For men there are similar APS for prostate exams and symptoms of when to visit the doctor. On top of all the more specific health APS, there is also an app called WebMD Mobile where individuals can check symptoms, get first-aid advice, or some medical advice all right from their phone (Hobbles, 2012).As we can see, there are APS for virtually anything, including health, that you have access to nearly every moment of everyday, creating a healthier, more connected population. On top of that, not only are all these APS helpful in keeping us healthy, but you can often find many of them (or similar APS with the same function) for free. This leaves us to see that individuals enjoy accessing information from home as well as connecting with others around the globe for answers. From here, a wide range of APS have been emerging, and continue to emerge based off the demands of society.We can see that individuals are using social media and mobile technologies to become a healthier, potentially happier populatio n, but who specifically is using these new technologies? Is it everyone, or just one group? Well, we can see that the longer technologies have been out and the more they advance, the more people are pursuing the use of them. However, the problem remains that not all of the population is. Seeing as the younger population has grown up with the advances in technology they are much more inclined to use and stay up to date with the technology we have today.As we look at the older population though, it seems as the older the individual is, the less likely they are to use technology as much as they could, however, it really depends on the lifestyle of which someone has had. An example of this is an 80 year old who has worked in a profession that relied on the advances of technology might be much more up to date and involved than a 55 year old who has never needed to use a computer or cell phone for their job, even Hough on average most 55 year olds are more engaged and aware than 80 year o lds.This poses a problem when not all parties are involved in social media when trying to communicate, as some individuals may miss out on important information and don't have the opportunity to put their input in, which becomes a large challenge when trying to follow an inclusive model. Not only are individuals using social media though; patients, doctors, hospitals, health insurance companies, drug companies, pharmacies, and work places are all using social media. We can see how this affects them by joking at PWS Global Network Chairman, Anally explains how â€Å"an insurer gained new member by hosting a contest to 5,10th-page like.The contest posted 321 likes, 5 shares, 16 comments,† and how a â€Å"pharmacy manufacturer alerted members about a product recall which resulted in 12 likes, 47 shares, 12 comments. † (2012) Everyone not on the bandwagon for social media is not the main disadvantage, however. The main problems have to do with the users who are engaged in these technologies. One problem is that not all information found on the internet, and more specifically through social media, is accurate. With everyone having the ability to post, we have a large portion of inaccurate information, that users have to watch out for.It can be nearly impossible at times to determine whether or not you are accessing information from a trustworthy source. At the same time, many post information about themselves on social media sites without realizing how dangerous it could be, and how virtually anyone can find out tremendous amount of information without ever meeting them. Once information has been put online, it no longer is your property, it becomes the social media site's property. For health care specifically, there is a struggle for patient confidentiality.Keeping confidential information private can be hard when on social media sites. At the same time, there is a struggle between relationships health care practitioners build with patients, to make patients feel more secure, but also have the confidentiality for these professionals to maintain their professionalism and not mix their work and their home life. The main problem with social media site is that individuals now share personal information with many across the world, which can make others feel purported, but it comes with risks of individuals using that personal information in dangerous ways.The emergence and growth of social technologies and mobile devices has changed health care worldwide, connecting and collaborating for a healthier future. The quality of medical care has been improved as there is more communication between patients and medical professionals, as well as communication and support between individuals. Important messages can be delivered quicker and easier than they once were, and information is much more accessible than it once was as well. There a a wide range of APS to help individuals get and stay healthy, as well as share their progress with othe rs.However, as with anything, there are disadvantages to social health care. Privacy and confidentiality is very hard to be kept when using social media, as is professionalism while still providing patients with friendly, secure relationships. Also, it can be hard to determine what information is accurate and what sources are trustworthy. Overall, social media is changing health care, creating many opportunities to build off of and engage all to create a healthier population connecting and collaborating to a healthier future.

Literature and Journalism Essay

American Heritage Dictionary of English Language Fourth Edition. New York Houghton 2009. American Heritage New Dictionary of Cultural Literacy Third edition New York Houghton Mifflin Co. 2006 Glencoe Literature; The Readers Choice Columbus Glencoe/McGraw-Hill 2003 Hudson,W. H An Introduction to the Study of Literature. Harrap 1963 Ousby, I. Cambridge Guide to Literature in English Cambridge Cambridge University Press 1996. Hornsby, A. S. Oxford Advanced Learners Dictionary of Current English. OUP 2005 MASENO UNIVERSITY FACULTY : ARTS AND SOCIAL SCIENCES. DEPARTMENT : LINGUISTICS, LANGUAGES AND LITERATURE UNIT CODE: ALI 805 UNIT TITLE: LITERATURE AND JOURNALISM TASK: Difference between Literature and Journalism PRESENTED BY: JULIE E. OGONYA REG. NO. : PG/MA/063/2009 PRESENTED TO: DR, KITCHE MAGAK DATE: NOVEMBER, 2009. MASENO INTRODUCTION Literature and journalism are two genres that are interrelated and intertwined because literature borrows heavily from journalism and journalism borrows heavily from literature as well. Sometimes it gets problematic distinguishing literature from journalism, more so with the emergence of narrative journalism. According to Oxford Advanced Learners Dictionary, literature refers to pieces of writing that are valued as works of art, especially novels, plays and poems (in contrast to technical books and newspapers, magazines, etc. ). The same dictionary defines journalism as the work of collecting and writing news stories for newspapers, magazines, radio or television. In this paper, an attempt is going to be made to show the differences between literature and journalism. Differences between Literature and Journalism. The difference between literature and journalism can be seen from the definitions of the two genres where literature is defined as â€Å"pieces of writing that are valued as works of art†. Art refers to â€Å"the use of imagination to express ideas or feelings† (Hornby, 2005). The key word is imagination. This means that in literature, language is used creatively with a lot of imagination in expressing ideas. Literature has been described as a mirror of the society and it reflects the happenings in that society. The reflections more often than not depend on the type of the mirror, whether concave or convex. Consequently, literature can distort reality. Journalism, â€Å"the work of collecting and writing news stories for newspapers, magazines, radio or television†, on the other hand, is a picture of the society. What we see is what we get since journalism is reportage. Mikkel Hivid has provided some guidelines on the difference between journalism and literature. In this paper most of the differences used will be from a paper he presented entitled Fiction, Facts and Storytelling and Roy Peter Clarke’s essay : Between Fact and Fiction: Navigating Treacherorous Waters. First, Hvid says that â€Å"the difference between literature and journalism is characterized by more than just the difference between fact and fiction. The two genres have different expressions, different criteria for the truth and relevance and different priorities. Journalism must be true but writers of fiction are allowed to lie†. In literature, the diction is characterized by the use of literary techniques like imagery, personification, irony, juxtaposition, sarcasm, similes and so on. These are used to make the message being communicated to be brought out more effectively. The language or expressions used will depend on the writer’s attitude towards the subject with which he will attempt to influence the reader; if he hates the subject, he will be sarcastic and the words he uses will be sarcastic or derogatory. This unflattering choice of words is likely to influence the reader to develop a negative attitude towards a subject too. For example, in Achebe’s book The Trouble with Nigeria, he is strongly convinced that the main problem with the country is poor leadership. He uses very emotive words. He says; The trouble with Nigeria is simply and squarely a failure of leadership. There is nothing basically wrong with the Nigerian character. There is nothing wrong with the Nigerian land or climate or water or air or anything else. He uses literary techniques like alliteration (simply and squarely), and repetition of the word wrong to create emphasis. Clarke says that literature and journalism have different criteria for the truth. The ethics of journalism indicate that the main distinction between literature and journalism is based on the contents. Journalists must present facts- whether they are using the genre of narrative journalism or any other journalistic genre. Journalists are required to research their stories (Hvid, 2000). Journalism must be true whereas writers of literature are allowed to lie. What the journalist writes must be true in the sense that it can be documented by reference to a named source or actual circumstances. For instance what Barrack Obama wrote in Dreams from My Father is true and can be documented. It is a story about his life; the places and even people mentioned in the book are real. Fiction writers invent and make up stories. Literature does not have to be true to any outside reality, Hvid adds. In literature, the setting, characters, events and action are all in the writer’s imagination in as much as they may reflect reality. Sometimes the setting and characters can be out of this world, for example in stories of fantasy that involves the mention of the supernatural as well as in science fiction. Journalists must research their stories. Writers of fiction are allowed to add, invent and construct their own worlds. In his essay, Roy Peter Clarke lists a range of ethical demands on the narrative journalist. You cannot add anything to your story which was not present in reality. This is because only the truth should be told in journalism. He adds that you cannot write different scenes into one, and you are not allowed to merge a number of real characters into one. You must respect the timing of real events. This is in line with the 5ws of journalism of who, what, where, why, when and how. All these must come out distinctly because journalism is fact and not fiction. In fiction, a character or a thing can be an archetype. There can only be one scene of an incident and hence cannot be written into one. He says that finally there is the ethical demand which is perhaps the most important even if it sounds mainly as a kind of request: you must strive to provide as honest and correct an account of the reality of the reality you describe as possible. Literary texts can be interpreted in a number of different ways. This is because when different readers read a text, their understanding is not the same and sometimes the writer’s intention may be missed. For instance, in Jonathan Swift’s essay: A Modest Proposal, the writer, did not intend his proposal of rearing babies for food to be taken literally. Some of his readers were very outraged at the idea of infanticide and cannibalism. Literature as a body consists of three main components (literary history): 1) A body of knowledge 2) A system of investigation 3) A collection of skills and techniques. It also consists of four main aspects 1) Creativity 2) Practical criticism 3) Literary history 4) Literary theory. There are different theories used to interpret literature. These components and theories are used by literary analysts to interpret literary texts. In journalism, the text does not necessarily require such effort in interpretation. A message in journalism quite often appears in the first paragraph of the text where the journalist makes the logical conclusion. The message is direct with no room for interpretation. Literature and journalism have different ideas about their readers about their readers and what you can demand from them. Journalism presents readers with a complete package they can immediately relate to. For instance, a newspaper headlines simply stating: Jealous Man Murders Wife and Lover in Drunken Rage. This does not require any knowledge of literary criticism and  theory to understand that drunken jealous men can easily murder their wives. Literature readers, on the other hand, have to interpret and analyse the text to find what it means for them. This is sometimes a next to impossible task as some literary texts abound in symbolism and very abstract ideas that are too difficult to decipher. In journalism it is unacceptable to present readers with such a dilemma as readers have a right to demand a clear message. Relevance of the text is another area of difference in literature and journalism as there are different criteria used to determine relevance in the two genres. We read literature to experience other worlds, lives and people. For example, David Yallop’s book In God’s Name is an eye opener into the intrigues of the Catholic Church and how a pope was murdered because he was a threat to some bishops who were perpetrators of a lot of evil in the church. The relevance of that text comes in when we examine it we find that the murder of Pope really concerned the people at that particular time in history and even to date. We read literature to experience other worlds, lives, and people. We mirror our own lives in those of the characters we meet in literature. Plato said that literature is a moral force and so the characters in literature with which we compare our own experiences help in building our character since as we compare our own experiences to theirs we gain greater insights into our own lives through what we call experience by. We love the character who is our hero and when that character suffers, we suffer with him and when he triumphs over evil, we celebrate his victory. Every character or happening helps us learn about our own lives. The text is true when it is true and meaningful to us. Truth and relevance are decided in the meeting between the reader and the text In journalism, we do not read texts in order to mirror our lives with those we read about. The characters do not necessarily help us learn about our own lives. Sometimes there are no main character with which we identify with. Truth is a condition of journalism and the article must be relevant. Its relevance is seen when it teaches the readers something new and important about the world they live in. When we read a literary text, we become part of the story; we take sides, laud or condemn a particular character. In other words, we read literature for experience. As Aristotle recommended, literature provides the reader with a cathartic effect. After experiencing literature, there is purgation of dangerous emotions. On the other hand, we read journalism to take something out of it. This is why journalistic articles are â€Å"news†. We get information from journalism. In literature, stories comprise of two main elements; background and action. There is use of description of background that is spiced up with action. In journalism, storytelling is told with three strands. These are background, action and facts as a mandatory component. The journalist may add anecdotes to make his story interesting but the most important ingredient is fact. Lastly, there is the use of what has been referred to as the frame and the content. Creative techniques are used on the frame of the story or in the introduction that leads into the main story whilst the story itself is presented as summary or direct quotes. Barrack Obama’s Dreams from my Father is a typical example of a work where this is used. This is sometimes referred to as the inverted pyramid . Conclusion In this paper, the differences between Literature and Journalism have been discussed. It has been realized that the differences between literature and journalism arise because of many factors like fact or fiction, reality and probability, the relationship between the reader and the text, the roles of journalism and literature and so on. Whereas the two genres are infact different, the reality is that there is a possibility of te two complimenting and supplementing each other since literature borrows from journalism and journalism borrows from literature and this results in a rich mix.

Saturday, September 28, 2019

Reflection Management Style Essay

The achievement of an organization depends on the effective management of the administrative team. The information obtained throughout this course for the management styles, good and poor qualities, and the different scenarios which managers may encounter will be reconnoitered. The results of a management quiz taken at the beginning of this course along with the results from a current quiz will be compared and the differences clarified. The course has enlightened the roles of management in the health organization and the extent of the accomplishments the management teams involvement can contribute. The management methods and styles reflect on an individual’s interpersonal and intrapersonal assessments of him or herself. A manager needs to analyze his or her goals within an organization to implement the motivation of others within an organization. As a manager, a person must realize that there will be conflicts, victories, and obstacles that may hinder his or her ideas or goals for the company. A consistent analyzes of an organization will assist in making the changes needed for success. Realizing that all managers are human, and human error may occur is a quality that managers and others need to consider. The best quality a manager can have is to be open-minded to ideas from others, be humble, and compassionate. In the health care industry there is an abundance of burnout, therefore for managers to reduce this in his or her organization she or he must be aware of the signs and implement a course of action to assist in the reduction. The motivation versus engaged is one of the valuable areas to consider when overseeing an organization. Engaged employees are more productive, focused, loyal, and contribute to the organization as a whole (Buchbinder, 2012). When individuals are involved in company decisions this assists in less burnout and turnover in the employees. One of the poorest qualities in a management team is not getting the input from the employees prior to making a vast change within an organization. The manager must be aware of how the employees feel about the change and compute the information to understand if the change is beneficial for the organization. However, some changes need to occur even though the employees do not encourage the change. This is why the manager needs to know how to relay the information  diplomatically, the reasons, how the change will be implemented, and the benefits of the change. If the manager does not inform the staff of what, why, or how then the organization could have devastating results in any scenario. Managers realize there are many scenarios to different areas of the organization. There is not a one-size-fits-all solution for organizational challenges. The plan of implementation must be customized to the group affected. The culture of most organizations is substantially diverse. This is why managers need the skills to understand, the knowledge to analyze scenarios, and the will to implement change. However, the manager is only as good as his or her employees. Results from the first management quiz displayed the need for improvement in team management (Center T. M., 2014). The challenge of realizing that others goals may not be the same as yours is a challenge, but realizing the needs of others and listening can assist in overcoming this obstacle. The results from the current quiz did not veer much from the first (Center M. , 2014). The skills of team management are an area needing the most improvement, and over time this will occur with practice and doing follow through will developing skills. Learning and overcoming challenges are important is a manager’s duties. Managers are always developing his or her professional lives, as well as his or her personal life. Self-motivation will assist in overcoming obstacles in one’s life. Managers are a valuable part of any organization, but without the skills to organize, motivate, and implement changes his or her contribution may hinder success in the organization. A person needs to realize the diversity in his or her employees, the culture of an organization, and the different scenarios he or she may encounter. Development of good qualities can assist in managing others. Some of these qualities include being open-minded, compassionate, and being humble. Developing skills in team management and motivation of others is a valuable asset to any manager. If managers understand the culture of an organization and relay this information effectively to the employees, the organization benefits from all venues encountered. References Buchbinder, S. B. (2012). Chapter 3 Management and Motivation. Introduction to Health Care Management, 2e, 2, 444-448. Jones and Barlett Publishers. Center, M. (2014). Qiuz Results 8-9-14. The Management Center. ManagementCenter.org. Retrieved August 9, 2014, from http://managementcenter.org/quiz/results/3013 Center, T. M. (2014). Quiz results 07-11-2014. The Management Center. ManagementCenter.org. Retrieved July 11, 2014, from http://managementcenter.org/quiz/results/2628

Friday, September 27, 2019

The New Testament and its influence on Homosexuality Term Paper

The New Testament and its influence on Homosexuality - Term Paper Example The Bible is a religious scripture and is the foundation of Christianity around the world. Bible ‘s new testament has laid down certain principles regarding the human lifestyle, ethical and moral standards one need to follow to prove to be god – loving person. Considering homosexuality, one can see that Bible points it to be a most abominable sin. Homosexuality is in no way regarded as a favorable sexual activity by Jesus or other prophets. Primarily, it is Moses who did condemn homosexuality and categorized it as a capital crime. Apart from him, Apostle Paul considered homosexuals worthy of death penalty. Even though homosexual behavior was seen among people of Bible era, these were practiced secretly,Homosexuality was seen as a social taboo and people looked at them as sinners and atrocious personalities.The New Testament specifically accepts a marriage between a man and a woman as a perfect sexual union. It is detestable to engage in sexual activity with same sex peop le as it is against God and nature. Bible recommends that by natural selection men are supposed to unite with women and anything against it is sin and unspiritual behavior. There are of evil nature and does not fit into the category of law – abiding citizens.Homosexual acts are considered to be extremely shameful according to Bible and these individuals are observed as immoral and sinners. The homosexuals were seen as indulgers of sin and were given death penalty or other punishments which were heinous. Homosexual acts are seen as ritual transgression and their blood is interpreted as guilty. Not only Bible, even Hebrew scripture view homosexuality as abomination. Both the parties involved in this unnatural act are given punishment without excuse. As prisons were absent in those days, capital punishment was the answer to all despicable crimes. It is described how Gods hate homosexuals and it is classified as a practice completely against natural law of God. 2â€Å"Whether or not a person accepts what the Bible says concerning this subject, he will have to

Thursday, September 26, 2019

The Eight and the Ashcan School Essay Example | Topics and Well Written Essays - 4250 words

The Eight and the Ashcan School - Essay Example It is not only that commercial and residential boundaries of New York changed but perceptions and public views were undergoing rapid changes. It was a favorable milieu for the formation of popular culture. New York was growing in size, its population was diversifying. Many ethnic groups mixed together contributing to creation of new forms of artist expression, reflecting changing social relationships. The early 20th century witnessed a radical change in American painting. This was not a change in attitude toward painting but in attitude toward life. It was a journalist's revolution originating from Philadelphia. New York City with financial growth explosion, office work for women and the sweatshops for immigrants – all these conditions brought young newspaper illustrators to develop their careers as fine artists in New York getting away from the conservative, static art establishment of Philadelphia. The rapidly changing scenes of New York as it is were captured by artists who are better known as "the Eight": Robert Henri, Arthur B. Davies, Maurice Prendergast, Ernest Lawson, William Glackens, Everett Shinn, John Sloan, and George Luks. â€Å"These artists framed a contemporary realism that explored the drama, humor and exoticism of life in the turbulent metropolis.† â€Å"The Ashcan school† which united "the Eight" and a number of other artists took roots in Philadelphia under the leadership of Henri. In Philadelphia, Henri's rebellious nature made him "a catalyst, an enthusiast ...".

MEDIA Essay Example | Topics and Well Written Essays - 500 words

MEDIA - Essay Example The audience tends to be neglectful of the wrong aspects of their behavior and approves of the behavioral model as such. Particularly, the youth blindly follows the role models. Media frequently highlights the negative aspects of the celebrities and often reveals the hidden controversies about them, which in turn causes the society to blindly imitate them (Oak). Although the controversies are projected with a view to create awareness in the people regarding what is happening around them. Paradoxically, this attempt is in turn generating more negativity in public. Media increases violence in the society: Media often becomes a good source of unique and innovative ideas for the pick pockets, thieves and robbers. Quite often, plays are based upon new ways of carrying out violence in the society, which potentially add to the skills and knowledge of the violence makers more than they educate the sufferers. In addition to that, media plays the role of slow poison for the society. Originally , people used to be very irritated by acts of violence, and used to protest against them in any way they could. With the passage of time, people have become immune towards the widespread violence in the society.

Wednesday, September 25, 2019

Project management---management of project organization Essay - 3

Project management---management of project organization - Essay Example These include space shuttle programs and humanitarian projects. In such projects anything can go wrong, therefore planning, execution, and management has to be as efficient as possible. The room for error in a space shuttle program is very small compared to that of, say, an agricultural project. In the former, everything from conceptualization to implementation has to be done to the highest standards, meaning more resources and personnel are required. In addition, much better management of those resources and personnel is vital. Professional bureaucracy best describes the organizational form of a research university (e.g. Harvard or USyd). This is because the characteristics of a professional bureaucracy correspond to the nature and structure of a research university. These characteristics are, as described by Minztberg, â€Å"decentralized and coordinated through standardization of skills. In its operating cores are a group of highly trained specialists/professionals who have considerable operating authority in their work. Much of the power rests with the professionals and they collectively control (as in professional partnership structure) the administrative apparatus (Strategic Apex). It is typically supported by relatively large number of staff to carry out routine tasks and to leverage the high- priced professionals in general. The employees typically operate in a complex and stable environment. It adapts to complexity through extensive training of staff while adapts to stability by developing standar d operating procedures. Age and size are not important design factors†. On the other hand, adhocracy best describes the organizational form of a project based organization. This is because the characteristics of a project based organization correspond to those as described by Minztberg, which are â€Å"typically operates in a complex and dynamic environment that demands innovative solutions. It relies on mutual adjustment for

Tuesday, September 24, 2019

Blighs Claims and Liabilities in Tort Case Study

Blighs Claims and Liabilities in Tort - Case Study Example Tort may include that this personal violation or wrong can be negligent or intentional such as battery or defamation of character. Torts can also be violations of personal property as well. Strictly speaking, torts are called civil wrongs as opposed to criminal wrongs. However, torts like battery can be both a tort and a crime and the defendant can face both civil and criminal penalties. Torts may be committed with force or without force to the person or to the property in possession. Tort laws have been enacted to provide relief for the damages incurred and deter others from committing the same injurious acts. Under most tort laws, a person can sue for an injunction to stop the continuation of an injurious act or for monetary damages. Under Tort law, a person can also sue for loss of earnings capacity, pain and suffering, and reasonable medical expenses in the present and projected into the future. Some of the more specific torts include trespass, assault & battery, negligence, products liability, and intentional infliction of emotional distress. Tort liability fall into three categories: intentional, negligent and liability. (i) Negligence: Negligence is a tort which depends on the existence of a breach of duty of care owed by one person to another. In order to claim damages under 'negligence', the following conditions must have been satisfied. In the above case, the de... b) The defendant breached the duty of care c) Breach causing harm in fact d) The injury / loss was caused by the breach and damages need to be awarded e) Breach being a proximate or not too remote a cause, in law In the above case, the defendant Mr. Hood had negligently left the keys in the ignition, because of which, Mr. Fletcher took the cruiser without Mr. Hood's permission and hit Mr. Bligh's barge. This has resulted in damage to the property of Mr. Bligh. If Mr. Hood had properly locked it, and had not left the keys in the ignition itself, the damage wouldn't have happened. As such, 'negligence' has provided a cause of action against Mr. Hood. In Donoghue v. Stevenson's case , Mrs Donoghue could sue the manufacturer of Ginger Beer for negligence, since he had not exercised due care in checking the contents of Ginger Beer which had decomposed snail in it. (ii) Vicarious Liability: It is not sure whether Mr. Fletcher is an employee of Mr. Hood. If he is an employee of Mr. Hood, Mr. Bligh can claim damages from Mr. Hood under Vicarious liability as well. "Since his employee harmed the barge of Mr. Bligh in the course of his employment, he is required to bear responsibility for it. In one of the tort cases, the conductor of a bus drove the bus negligently and injured a pedestrian. The court ruled that the owner of that bus is liable for conductor's irresponsible act, since the accident happened during the course of employment. (iii) Intangible Economic Interests / Monitory loss: Because of the above act of Mr. Fletcher, the barge was damaged and took a day to repair. As a result, Mr. Bligh was unable to use it to carry on his transport business and lost a day's profit, there being no other barge available. Mr. Bligh, can claim the monitory loss

Monday, September 23, 2019

'Discipline & Punish (Foucault, 1975) is not just a history of the Essay

'Discipline & Punish (Foucault, 1975) is not just a history of the emergence of the prison but a history of the emergence of a - Essay Example Thus, Discipline and Punish could be deemed as Foucault’s critique not only on the effectiveness of prison in attaining its key objective—the disciplining of the prisoner by subjecting him to conditions that are marked by extreme surveillance and control—but also on the true reason for the emergence of various social structures today such as the government, school, and other institutions (Mc Gaha, 2000). Precisely, it is Foucault’s belief that such systems had only been created to cater the elite group (which I shall explore in more detail in the next part of the paper) that bolstered his onslaught on the basic foundations of human civilization. Specifically, by recognizing the essence of prison and other social institutions as merely ‘instruments’ used by the elite to maintain and enhance their power in society, Foucault was able to question essentially the possibility of attaining human freedom in modern-day society. In a deeper regard, I co uld surmise that Foucault’s attacks on social structures could be attributed to his anarchistic mindset (though not explicitly revealed in any of the texts) as he clearly disregarded the need for such systems. Therefore, human freedom must be seen as the act of ‘letting one be’ and not ‘following what and how one must be’. His precise bastardization of naturals or ideals (as will be discussed later on) could clearly provide an ideological nexus between his anarchistic mindset and his post-modern orientation. If seen in this context, Foucault’s take on the human essence (for the lack of a better term) is slightly existentialist. In this paper, I like to delve further into Foucault’s Discipline and Punish by dividing the discussion into four parts. The first part shall emphasize on the short history of the penal system, which could be traced back to 17th century. Through this part, I aim to highlight on the fact that the development of th e penal system had shifted the punishment from physical to mental. The second part will be dedicated to reinforcing the concepts of power and control as the main thrust for the creation of modern social institutions. This will infuse the significant role of the elite in the formation of such institutions. The third part shall zero in on Foucault’s conceptualization of human freedom as hardly attainable given the flaws in modern day systems today. By having this part, I am to provide a reasoning that encapsulates Foucault’s socio-political ideologies Evolution of Punishment and the Rise of the Penal System Following the flow of discussion in Discipline and Punish, Foucault opted to start (in a more detailed light) with a detailed discussion on public tortures and executions that transpired during the17th and 18th centuries. Presenting explicitly the execution of the Damiens, Foucault (1976) narrated, â€Å"after these tearings with the pincers, Damiens, who cried out p rofusely, though without swearing, raised his head and looked at himself; the same

Sunday, September 22, 2019

Operation Management Essay Example for Free

Operation Management Essay Purpose: The purpose of this assignment is to provide students with an understanding of the role and importance of operations management in the efficient and effective production of goods and services. It will enable students to realise that the ‘proper’ organisation of productive systems, and their interfaces with internal as well as external customers and suppliers, is essential if goods/services are to be produced on time, to cost and within the laws and regulations. Scenario. Impressive Burgers was established 10 years ago with the goal of providing fast take away food to their customers quickly and of a higher quality to that of their rivals. Each restaurant offered a simple menu structure with a choice of four set meal options. 1. Burger, Chips Soft Drink 2. Cheeseburger, Chips Soft Drink 3. Chicken Burger, Chips Soft Drink 4. Vegetarian Burger, Chips Soft Drink Customers were offered a choice of size of each meal: Regular, Medium or Large. The size of the chips and drinks portions varied but the burger size remained the same. Using this format they were able to serve each customer their order within 4 minutes from a ordering at the till to receiving their complete order to take away. Each restaurant places their orders with the suppliers directly based on the manager’s prediction for demand based on the reports generated by the restaurants own till system. These orders arrive in one shipment once every other week. The company has grown to a chain of restaurant operations and the management introduced a number of changes to the format 12 months ago in an effort to increase each business at each restaurants. The number of set meal options available on the menu was increased to offer more options to the customer and to attract customers seeking healthier options. The menu options were increased by a further three options: 5. Chicken Nuggets, Chips Soft Drink 6. Chicken Salad, Garlic Bread, Soft Drink 7. Hot Dog, Chips Soft Drink In addition to these set menu additions the company also offered the option of changing the chips option on the set meals for either a Side Salad or for Potato Wedges. The restaurants themselves have not changed and the number of staff and machinery has remained at the same levels before the menu changes. Since these changes were implemented there has been a dramatic increase in turnover and the number of customers that are visiting each of their restaurants. However, overall profit has declined dramatically over the last 12 months and the company predicts that if it continues the company will report its first loss in its history within the next 6 months. The company is considering expanding its operations by opening a number of new outlets but want to identify the problems to the issues they are currently facing. The company has begun to investigate why the mixed fortunes have arisen and has identified a number of issues. Serving times have increased dramatically and it now takes an average of 9 minutes for a customer to be served and the number of customer complaints has increased. The main complaints include rude and agitated staff and incorrect or incomplete orders. The total value of stock held at each restaurant has increased by an average of 20% and waste has dramatically increased. The CEO of Impressive Burgers is worried about the current development and has recruited you as Operations Manager with the responsibility of rectifying the situation that the company is currently facing. Your first assignment as Operations Manager is to produce a formal report to the management which includes the following tasks: |Outcome |Assessment Criteria | |No(s) | | |1. Understand the nature and |explain the importance of operational management |1. 1 | |importance of operational | | | |management |explain the need to produce safely; on time; to cost; to | | | |quality and within the law | | | | |1. 2 | | | | | | | | | | |explain the link between operations management and | | | |strategic planning | | | | |1. 3 | | | | | | |produce a systems diagram to illustrate a typical | | | |business | | | | | | | | | | | | |1. 4 | |2 Understand the link between |explain the ‘Three Es’ (economy, efficiency and effectiveness) | | |operations management and | |2. 1 | |strategic planning |explain the tension between cost minimisation and quality | | | |maximisation |2. 2 | | | | | | |evaluate the significance of the five performance objectives | | | |that underpin operations management | | | | | | | | |2. 3 | | | | | | |explain linear programming | | | | |3. 1 | |3 Understand how to organise a typical production process | | | | |evaluate critical path analysis and network planning | | | | |3. 2 | | | | | | |explain the need for operational planning and control | | | | |3. 3 | | | | | | | | | | |produce a set of clearly defined operational outcomes | 4. 1 | |4 Be able to apply relevant | | | |techniques to the production |produce a network plan and indicate the resultant critical path| | |of an operational plan for a | |4. 2 | |typical business | | | | |explain how quality could be defined and maintained |4. 3 | |Assignment Tasks: | | | | | | |Assessment | | |Criteria | |You are required to produce a formal and written report to cover the underlisted tasks. | | | | | |Task 1 | | |Explain the importance of operational management in an organization such as Impressive Burgers and explain ‘Three Es’ (economy, | | |efficiency and effectiveness and its relevance in the industry in which Impressive Burgers operates. |1. 1,2. 1 | | | | |Task 2 | | |Critically evaluate Impressive Burgers’ approach to expanding their operation. | | | | | | | | | | | | | | | | | | |1. 2,1. 3,1. 4 | | | | |Task 3 | | |Discuss the reasons behind the problems the company is facing and make suggestions for rectifying the situation. | | | | | | | | | | | | | | | | | | | | | | | | | | | |3. 1,3. 2,3. 3 | | | | |Task 4 | | |Considering the effects on the operations, identify ways in which the overall operation could be improved and expanded further. | | | | | | | | | |4. 1,4. 2 | | | | Grading Criteria The assignment will be graded into Pass, Merit and Distinction against the following criteria: Pass: A pass grade is achieved by meeting all the requirements defined in the unit outcomes. Grading Criteria The assignment will be graded into Pass, Merit and Distinction against the following criteria: Pass: A pass grade is achieved by meeting all the requirements defined in the unit outcomes. |Merit Distinction | |M1 |Identify and apply strategies to find appropriate solutions | | |Identify areas relevant for each task in the assignment and respond accordingly and professionally | |M2 |Select and apply appropriate techniques | | |Evidence of processing and synthesised complex information/data. | | |Appropriate learning methods/techniques have been applied | | |Report should have proper citations and reference list to all sources including your field-visit observations, books, magazines and other | | |material used for research | | | | |M3 |Present and communicate appropriate findings | | |Present your views coherently and logically | | |Demonstrate real situations in your assignment | | | | |D1 |Use critical reflection to evaluate own work and justify valid conclusions | | |Justify your ideas in a professional manner. | | |Propose realistic ideas for the future based on the current status | | |Learner presented CONCLUSIONS for all tasks/areas | |D2 |Take responsibility for managing and organizing activities | | |Show that you did the assignment alone and in accordance with the time. | | |Assignments referred will automatically achieve the minimum grade too for improper handling of task | |D3 |Demonstrate creative thinking | | |Demonstrate that you followed all the guidelines while doing the assignment and have utilised adequate and relevant words for the specific. | | |business environment | | |Apply innovation and creative thought in your work. | |Required Evidence | |†¢ Report (Your report should be approximately 1800 words and you are likely to be penalized if it exceeds 2000 words. If you feel it is essential to | |include detailed information, put it in an appendix and refer to this appendix in the text. Your sources of information should be clearly identified) | | | |Reading Research Resources | |Lecture slides | |F Rowbotham et el (2007) Operations Management in Context | |S Brown et al (2000), Strategic Operations Management, Butterworth Heinemann. | |L Galloway L et al (2000), Operations Management in Context, Butterworth-Heinemann. | |J Heizer and B Render (2003), Operations Management, Prentice Hall. | |N Slack et al (2000), Operations Management, Pitman. | |D L Waller D L (1999), Operations Management — A Supply Chain Approach, Thompson | |Newspapers, trade journals, magazines | | | |Guidelines for Presentation | |All assignments must be word-processed using Times New Roman (12 point) and stapled in the top left hand corner. | |Page numbers must be included at the bottom of each page. | |Secondary sources should be acknowledged using the Harvard Referencing | |Students are requested to attach the ‘assessment activity front sheet’ on the top of each report with all personal information (name, and student number | |etc. ) accurately presented. | |Every report must have a front page showing the title, class and name | |The length of writing will be limited to about 1800-2000 words. | |Note: Assignment that did not follow this ‘Guidelines for presentation’ will not be accepted. | | | |Plagiarism Policy The college has strict penalty for plagiarism and the assignment will be cancelled if the assignment is observed for this. The definition| |and scope of plagiarism are presented below: Plagiarism occurs when a student misrepresents, as his/her own work, the work, written or otherwise, of any | |other person (including another student) or of any institution. Examples of forms of plagiarism include: | |†¢ The verbatim (word for word) copying of another’s work without appropriate and correctly presented acknowledgement; | |†¢ The close paraphrasing of another’s work by simply changing a few words or altering the order of presentation, without appropriate and correctly | |presented acknowledgement; | |†¢ Unacknowledged quotation of phrases from another’s work; | |†¢ The deliberate and detailed presentation of another’s concept as one’s own. | | | |All types of work submitted by students are covered by this definition, including, written work, diagrams, designs, engineering drawings and pictures. |

Saturday, September 21, 2019

History And Evolution Of RFID Technology Information Technology Essay

History And Evolution Of RFID Technology Information Technology Essay Chapter 1 Radio Frequency Identification or RFID is the fastest growing technology in the world today. RFID is an automatic identification method that can remotely retrieve data using devices called RFID tags or transponders. RFID in wireless communication has evolved to the great advancement of wireless technology. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. The technology which enables the electronic labeling and wireless identification of objects using radio frequency communications is RFID. RFID is also a subset of the broader area of automatic identification and data capture (AIDC) technologies. The advancement in different applications of RFID are emerging from current research ideas to concrete systems. RFID and mobile telecommunications are the services that provide information on objects equipped with an RFID tag over a telecommunication network. Tags are stationary and Readers are in mobile phone (mobile). RFID readers can simultaneously scan and also identify hundreds of tagged items. Diffusion of radio frequency identification (RFID) promises to enhance the added value of assistive technologies of mobile users. Visually impaired people may benefit from RFID- based applications that support users in maintaining spatial orientation through provision of information on where they are, and description of what lies in their surroundings. To investigate this issue, we have integrated our development for mobile device. With a complete support of RFID tag detection, and implemented an RFID enabled location-guide. The guide is an ecological guidance in mobile technology. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. RFID is the base technology for ubiquitous network or computing and to be associated with other technologies such as telemetric, and sensors. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID technology is similar to the bar code identification systems we see in retail stores every day. However one big difference between RFID and bar code technology is that RFID does not rely on the line-of-sight reading that bar code scanning requires to work. 2.0 PROJECT OVERVIEW: The study of this project describes about the application of RFID in cinemas. The main study of the project is to check the authorized member or not enter the cinema using RFID application. We must check whether the person is authorized or not through RFID technology .In this project each person have one RFID card with the ticket when the person purchases the ticket so that person has right to enter the cinema .After entering the cinema the person can check the status whether it is screen1 or screen2 through RFID. Here RFID will read the data from card and compare data base and display the data. If the person is authorized means cinema(screen1 or 2) will open through door shepherd(stepper motor).Otherwise it will give message as this is not appropriate screen please check the other screen and it give a buzzer. Aims and Objectives: The main aim of the project is to explore the application of RFID in wireless communications. The main objectives are to develop a new application using the existing applications of RFID. DELIVERABLES: CHAPTER 2 Definition: The technology which enables the electronic labeling and wireless identification of objects using radio frequency communications is RFID. RFID is also a subset of the broader area of automatic identification and data capture (AIDC) technologies. RFID is an application of object connected data carrier technology with attributes that are complementary to other machine-readable data carrier technologies. RFID technologies provide strong potential for improving efficiency, productivity and/or competitiveness. RFID market increasing significantly, yielding lower costs and higher performance. RFID is about identifying and handling items Physical Materials Components and sub-assemblies Products Containers Physical carriers People Locations HISTORY AND EVOLUTION OF RFID TECHNOLOGY: Radio Frequency Identification or RFID is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. It was not until the 1980s that RFID applications began to appear in commercial applications, such as railroad freight car tagging, the tagging of cattle and rare dog breeds, key less entry systems and automatic highway toll collection. As there is improvement in the technology there has been reduction in the cost and size, and it has gained wide acceptance in warehouse management and manufacturing. First application to identify planes in world II using radar. 60s -Electronic article surveillance (EAS) used to identify whether an item has been paid or not using a 1 bit tag. 80s first automated toll payment systems. RFID has been used in mobile technology through which there had been a great advancement in this field. Korea is widely known that it has established one of the most robust mobile telecommunication networks. Korea has recognized the potential of RFID technology and has tried to converge with mobile phone. Convergence of three technologies: Radio frequency electronics: The research in the field of radio frequency electronics as applied to RFID was begun during World War 2 and continued through the 1970s. The RF electronics and antenna systems employed by RFID interrogators and tags have been made possible because of radio frequency electronic research and development. Information technology: The research in the field of information technology started in the mid 1970s and roughly continued through 1990s. interrogator and the host computer employ this technology. Networking of RFID systems and RFID interrogators has been made possible by research in this field. Material science: some of the breakthroughs in material science technology made the RFID tags cheaper to manufacture. By overcoming this cost barrier goes a long wayin making RFID technology commercially viable. Mile stones in RFID and speed of adoption: The development of RFID technology can be defined by the following time based summaries shown below: Pre- 1940s: Different scientists like faraday, Maxwell, hertz had yielded a complete set of laws of electromagnetic energy describing its nature. In the beginning of 1896 Watson, Baird and many others sought to apply these laws in radio communications and radars. So including RFID work done in this era form the building blocks upon which many technologies have been built. 1940s World war 2: Many advancements and improvements have been taken place during World War 2. Scientists and engineers continued their research increasingly in these areas. In 1948 Harry stockman published a paper on reflected power which is the closest thing to the birth of RFID technology. 1950s- Early exploration of RFID technology: Different technologies related to RFID were explored by researchers during 1950s. The US military began to implement early form of aircraft RFID technology called identification, Friend of Foe, or IFF. 1960s- Development of RFID theory and early field trials: RF Harrington did a lot of research in the field of electromagnetic theory and it is applied to the RFID. Passive data transmission techniques utilizing radar beams and interrogator- responder identification system introduced by Vogel man and J.P vindings. In the late 1960s sensormatic and checkpoints were founded to develop electronic article surveillance (EAS) equipment for anti-theft and security applications. These are 1-bit systems that mean these only detect in the presence of RFID tags rather than identifying them. Later EAS is the first widespread use of RFID. 1970s: Early adopter applications and an RFID explosion: There is a great deal of growth in RFID technology in 1970s based on the witnesses. All the academic institutions, companies and government laboratories are involved in RFID. In 1975 short range radio- telemetry for electronic identification using modulated backscatter was released. Big companies such as Raytheon, RCA started to develop electronic identification technology and by 1978 a passive microwave transponder is accomplished. Later the US federal administration convened a conference to explore the use of electronic identification technology in vehicles and transportation application too. By the end of the decade research in computers and information technology which is crucial to the development of RFID hosts, interrogators and networks has started as evidenced by the birth of PC and the ARPANET. 1980s- commercialization: This year brought about the first widespread commercial RFID systems. Personnel access systems, key less entry are some of the examples. In Norway the worlds first toll application was implemented and later in Dallas. In 1980s the implemented RFID systems were proprietary systems. So there is little competition in the RFID industry and that results in high cost and impeded industry growth. 1990s- RFID enters the main stream: In 1990 RFID finally started to enter the main stream of business and technology. In the middle of the year RFID toll systems operate at highway speeds. This means the drivers could pass through toll points un impeded by plazas or barriers. This results in the deployment of RFID toll systems in United States. TIRIS system was started by the Texas instruments which developed new RFID applications for dispensing fuel such as ski pass system and vehicle access systems. In the early 1990s the research in the information was well developed and evidenced by proliferation of PCs and internet. The materials technology advances and many of them related to semiconductor chip makers such as IBM, INTEL, MOTOROLA and AMD put cost effective tags on the horizon. At the end of the year large scale smart label tests had started. 2007 and Beyond: Item level tagging is implemented when there are no checkout scenario at large super markets. High value and high risk goods are the first to benefit from item level tagging. For example goods like pharmaceuticals and firearms. Smart shelves for select categories started to appear and smart appliances with embedded RFID technology come into the market place. OVERVIEW OF RFID TECHNOLOGY: Wireless radio communication technology is used by the RFID system to uniquely identify the people or tagged objects. RFID system consists of three basic core components RFID tag RFID Reader Controller TAG: Tag can also be called as transponder which consists of a semi conductor chip and sometimes a battery. The life time of a battery in a active tag is limited by the number of read operations and the amount of energy stored. http://www.tutorialsweb.com/rfid/rfid-1.gif READER: Reader can also be called as interrogator or a read/write device, which consists of antenna, an RF electronics module and a control electronics module. http://hackedgadgets.com/wp-content/RFID_Reader_preliminaryCons.jpg CONTROLLER: Controller can also be called as host which acts as a work station running data base and control which is often called as middle ware software. FUNCTION OF RFID TAG: Tag stores the data and transmits data to the interrogator. The electronic chip and antenna present in tag are combined in a package to form a usable tag as a packaging label fixed to a box. The chip contains memory where the data stored is read or written too in addition to other important circuitry. Tags are of two types Active tags Passive tags [RFID-tags.bmp] Active tags: Tags are said to be Active if they are having an on-board power source called battery. When the tag requires transmitting the data to the interrogator, tag uses the source to derive the power for the transmission. This is same as the mobile phone which uses a battery so that the information is transmitted over longer ranges and communicates with less powerful interrogators. These tags have large memories up to 128 Kbytes. The life time of battery in the active tag can last from two to seven years. Passive tags: Tags which contain no on-board power source are called passive tags. To transmit the data they will get the power from the signal sent by the interrogator. Passive tags are of low cost and typically smaller to produce than active tags. Differences between Active tags and Passive tags: Active tags are self powered where as Passive tags is not having their own power source. The maximum distance that the Passive tags generally operate is 3 meters or less where as Active tags can communicate with 100 meters are more away. Passive tags require more signal from the reader than the Active tag. Active tags are better suited than passive tags when the collection of tags needs to be simultaneously read. The reader talks first in the passive tag, the RFID tag is a server where as in the case of Active tags communications can be initiated by either the tag or the reader. FUNCTION OF RFID READER: RFID readers convert the returned radio waves from the RFID tag into a form that can be passed on to controllers, which can make use of it. The RFID tags and readers should be tuned to the same frequency in order to communicate. 125KHZ frequency is most commonly used or supported by Reader. FUNCTION OF A CONTROLLER: The brains of any RFID system are RFID controllers. Controllers are used to network multiple RFID interrogators combined and to process the information centrally. In any network the controller should be a application software or workstation running data base. Controller uses the information gathered by the interrogators when new inventory is needed in retail application and alert the suppliers. FREQUENCY: Frequency of operation is the key consideration as the television broadcast in a VHF or a UHF band. RFID Frequency Table In RFID there are two types of bands low frequency and high radio frequency bands in use Low frequency RFID bands: Low frequency (LF): 125-134 kHz High frequency (HF): 13.56 MHz High frequency RFID bands: Ultra- high frequency (UHF): 860-960 MHz Microwave: 2.5GHz and above Frequency plays a prominent role because several characteristics of an RFID system are affected by the choice of frequency. CHARACTERISTICS OF AN RFID SYSTEM: The following are the characteristics of an RFID system: Read range Interference from other radio systems Data rate Antenna size and type Read range: For the lower frequency bands the read ranges of passive tags are not more than couple feet because of poor antenna gain. The electromagnetic wavelength is very high at lower frequencies. At high frequency there is increase in the read range especially where active tags are used. Here because of high frequency bands that leads to health concerns in human, most regulating bodies. So the range of these high frequency systems reduced from 10 to 30 feet on average in the case of passive tags. Interference from other radio systems: The fact is that LF frequencies do not experience path loss and the operating systems in the LF band are particularly vulnerable. The radio signals operating at same LF frequency will have high strength at the antenna of a RFID interrogator, which can translate into interference. Data rate: RFID systems have low data rate operating in the LF band. With frequency of operation there is increase in the data rate reaching the Mbit/s range at microwave frequencies. Antenna size and type: The size has to be made larger than UHF for the antennas of LF and HF systems to achieve comparable signal gain. Te type of antenna is decided by the frequency of operation. Loop type antennas are used at LF and HF and they are also called as inductive coupling and inductive antennas. Capacitive coupling is used at UHF and microwave frequencies and dipole type antennas are used. RFID SMART LABELS: The next generation of bar code is the RFID smart labels. Smart label is nothing but a RW transponder that has been incorporated in a printing packaging label. These smart labels are quick to read, easily applied, unconstructive, disposable and cheap. There are some measures by which RFID smart labels not stack up to bar codes such as technological maturity, price and ease of implementation. The benefits of smart labels over bar code systems started to outweigh the short comings and the cost of implementing smart label solutions a cost effective technology. SMART LABELS vs. BAR CODES: Bar coding system uses laser light as a data carrier where as RFID and smart labels uses radio waves to carry information. Bar code is referred as optimal technology and RFID is called radio frequency or RF technology. COMPARISION OF RFID TO BARCODES: Memory size/ Data storage: Bar codes hold only limited amount of data. It holds just a few bytes as data storage that is only 8 numerical characters. They are UPCE symbols. The data matrix of the bar code system permits the storage of 2000 ASCII characters on a two dimensional tag and these are these are used rarely. RFID tags can hold far more information. Here RFID tags made with smaller memories to hold a few bytes but the present technology puts the upper limit at 128K bytes. Read/write: once they are printed barcodes cannot be modified again therefore bar coding is called RO technology. RFID tags such as smart tags have a specified addressable, writable memory which can be modified thousand times over the life of the tag and this is why RFID technology is more powerful. CHAPTER 3 LITERATURE REVIEW 1. INTRODUCTION:- Radio Frequency Identification or RFID is the fastest growing technology in the world today. RFID is an automatic identification method that can remotely retrieve data using devices called RFID tags or transponders. This introduction of RFID into the mobile communication field has made the world a smaller place to live in. RFID readers can simultaneously scan and also identify hundreds of tagged items. Diffusion of radio frequency identification (RFID) promises to enhance the added value of assistive technologies of mobile users. Visually impaired people may benefit from RFID- based applications that support users in maintaining spatial orientation through provision of information on where they are, and description of what lies in their surroundings. To investigate this issue, we have integrated our development for mobile device. With a complete support of RFID tag detection, and implemented an RFID enabled location-guide. The guide is an ecological guidance in mobile technology. RFID is the base technology for ubiquitous network or computing and to be associated with other technologies such as telemetric, and sensors. The term RFID is used to describe various technologies that use radio waves to automatically identify people or objects. RFID technology is similar to the bar code identification systems we see in retail stores every day. However one big difference between RFID and bar code technology is that RFID does not rely on the line-of-sight reading that bar code scanning requires to work. 2. BACKGROUND OF PROJECT: Radio Frequency Identification or RFID is a technology that has existed for decades. At a simple level, it is a technology that involves tags that emit radio signals and devices called readers that pick up the signal. 80s first automated toll payment systems. RFID has been used in mobile technology through which there had been a great advancement in this field. Korea is widely known that it has established one of the most robust mobile telecommunication networks. Korea has recognized the potential of RFID technology and has tried to converge with mobile phone. 3. AIMS AND OBJECTIVES: The main aim of this project is to explore the application of RFID in wireless communications using RFID tags, readers , the computer and the internet. The specific objectives include; Study of existing applications of RFID. Expanding the application of RFID in wireless communications. Using the internet to further enhance the employee management system. 4. RFID APPLICATION FIELDS: Transportation, materials management, and security and access control. Currently, there are a variety of other applications for RFID in agriculture, construction, and athletics. Major RFID application domains include monitoring physical parameter, such as temperature or acceleration during fragile or sensitive products delivery, monitoring product integrity from factory to retail locations, utilizes for home and office automation. Now a day we have passive or active inexpensive RFID that makes these kind of sensors practical for tourist applications. For example, a museum explosion can place tags attached to each point of interest so that tourists can receive information about explosion in the right moment at right place. 5. FUTURE OF RFID TECHNOLOGY: RFID is said by many in the industry to be the frontrunner technology for automatic identification and data collection. The biggest, as of yet unproven, benefit would ultimately be in the consumer goods supply chain where an RFID tag attached to a consumer product could be tracked from manufacturing to the retail store right to the consumers home.   Many see RFID as a technology in its infancy with an untapped potential. While we may talk of its existence and the amazing ways in which this technology can be put to use, until there are more standards set within the industry and the cost of RFID technology comes down we wont see RFID systems reaching near their full potential anytime soon and RFID is expected to be the base technology for ubiquitous network or computing and to be associated with other technology such as telemetric, and sensors. 6. CHALLENGES OF MY RESEARCH: To develop an application of RFID where there is less human attention and to prevent more fraud. Developing an RFID solution that can interoperate with emerging standards for communication protocols, hardware platforms, and software interfaces. Implementing an RFID solution that is cost effective, leverages their existing supply chain investments, and gives them clear a return on investment (ROI). Preparing for the vast amounts of data generated by RFID. 7. PROBLEMS WITH RFID: Problems are divided into two parts 1. Technical problems 2. Privacy and ethics problems 7.1 Technical problems: Problems with RFID Standards RFID systems can be easily disrupted RFID Reader Collision RFID Tag Collision 7.2 Security, privacy ethics problems: RFID tags are difficult to remove 8. RESEARCH METHODS Conducting of a detailed survey of the various existing applications of RFID and monitoring systems used in the locality: At this stage the study of applications of RFID is to develop a real time application. The study about this will also determine the workers and employer attitude towards the monitoring system being used. To conduct this research a questionnaire will be formulated and distributed to various organizations in the locality. 9. RFID READER AND TAG COMMUNICATION FLOW DIAGRAM: 10. DESIGN OF RFID MONITORING SYSTEM: The design solution for the employee monitoring system based on a selected land size of 500 meters by 500 meters with ten buildings, 3 of which are administrative, 3 are production centers, 2 are general purpose building, 1 is a mess and 1 is the car park area. The designer will determine the best places to install the RFID receivers. It is assumed that the workers will be carrying RFID tags in form of a card. When a worker enters the gate, the receiver at the gate takes his number, records it and stores this value in a database. The time of entering is also noted and entered in the database. When he/she goes to his area of work, say, the production area the receiver there takes his number and stores it plus the time he has entered. Based on all the data collected, the developed software produces a summary of the time and place the worker has visited in the firm. Visitors are also given special tags. 11. PREVIOUS WORK: RFID is a rapidly developing automatic wireless data collection technology. Firstly we have multi-bit functional passive RFID systems with the range of several meters. Recently it has experienced a tremendous growth due to developments in integrated circuits and radios and due to increased interest from the retail industrial and government. Key volume applications of RFID technology in markets such as access control sensors and metering applications, payment methods, document tracking. Previously they were using radars to warn off approaching planes while they were still miles away however it is impossible to distinguish enemy planes from allied ones and after that crude method is implemented by germans for identifying the planes. So with the increasing technology further research of RFID is done using RFID tags and readers which is similar to barcode. VARIOUS EXISTING APPLICATIONS OF RFID: The following are some of the applications of RFID: Vehicle anti theft system uses radio frequency identification system. Application of RFID technology on tires tracking. Application of RFID in automotives. Supply chain management uses RFID in retail industries. Mobile health care service system using RFID. Application of RFID in animal tracking. Application of RFID in asset tracking. BRIEF STUDY OF THE APPLICATIONS OF RFID: Vehicle anti theft system uses radio frequency identification system: As there are many car and light van thefts which are increasing alarmingly all around the world the new guide lines were implemented by the insurance companies, are being set for vehicle manufacturers to make their products secure. A new passive anti theft security system (PATS) is developed by ford registration and identification system (TIRIS) which is a radio frequency technology which meets the new requirements. Working: There is a tamper-proof link between the drivers key and the ignition system. This system is based upon the tamper-proof electronic link. Each key has a tiny transponder which electronically links it to a specific vehicle. The tag which can be called as a transponder contains a unique identification code that is accessed by the radio signal from a transceiver unit in the car whenever someone tries to start the vehicle. Unless there is a proper ignition key with a transponder present the engine will not start, even if the ignition key is broken or bypassed. This is based up on RFID technology which adds a new level of theft protection to vehicle security systems which does not require any effort from the drivers. .

Friday, September 20, 2019

The Compass of Pleasure by David J. Linden | Review

The Compass of Pleasure by David J. Linden | Review The Compass of Pleasure Omobolanle Ajose Humans have a complicated relationship to pleasure which we spend a considerable amount of time pursuing. Certain forms of pleasure such as rituals involving prayer, music, dance, and meditation are accorded special status. Intrinsic pleasures that can be initiated or increased by artificial activators like cocaine, heroin, or modest doses of nicotine or alcohol, are located in our brains transmitting a pleasure buzz from a wide variety of ex ­periences. I chose the book, The Compass of Pleasure because neuroscientist David J. Linden the author, explored the dark side of pleasure. He explained how the human brain can turn pleasures into addictions and habits so overpowering and pervasive that people will sacrifice almost anything just to get a fix. This kind of behavior makes us wonder why anyone would ruin their health, neglect their family, and spend themselves into poverty all in pursuit of an addiction. Linden says it all comes down to a single neuro-chemical dopamine. The terms I learned while reading this book includes: Stoic, meaning ability to endure pain or hardship without showing feelings or complaints. Painasymbolia, also called pain dissociation which is a condition in which pain is experienced without unpleasantness.Ventral tegmental area (VTA), which is a collection of neurons situated at the center of themidbrain that sends dopamine releasing axons to other regions of the brain such as the amygdala, anterior cingulate cortex, dorsal striatum and hippocampus. Neuroleptics, meaning dopamine receptor antagonists. Linden (2011), describes most experiences in our lives that we find as transcendent, whether illicit vices, socially sanctioned ritual or social practices as meditative prayer to activate an anatomically and biochemically defined pleasure circuit in the brain. He used past research studies as references. Two postdoctoral fellows at McGill University conducted experiments that involved implanting electrodes in the brains of rats to activate their pleasure circuits. The electrodes were placed in positions that stimulated the medial forebrain bundle, the axons that excite the dopamine neurons of the ventral tegmental area (VTA). The electrode locations that produced the strongest pleasure were those that most effectively activated the dopamine neurons of the VTA. Another experimental design from the book focused on the stimulation of the brain of a homosexual psychiatric patient using surgically implanted electrodes. Before the patients brain stimulation, he was made to view a film that featured sexual intercourse between a male and a female. He was sexually indifferent and angry about being made to view the film. After the pleasure circuit self- stimulation, he agreed to view the film again during which he became sexually aroused, had an erection and masturbated to orgasm. After he was discharged from the hospital, he had a sexual relationship with a woman for several months. During this period, his homosexual activity was reduced but did not stop completely. In humans, rats, and other mammals, the reward circuit is interwoven with brain centers involved in decision making, planning, emotion and memory storage. When we find an experience pleasurable, it sets in motion several processes such as liking the experience and we associate both external and internal cues with the experience. These associations allow us to predict how we should behave to repeat or assign a value to pleasurable experience so that in future we can determine how much effort we are willing to expand and the risk we are willing to take to get them. Linden (2011) defined addiction as persistent, compulsive drug use in the face of increasingly negative life consequences. He explained that the scientific definition of addiction is actually rooted in the brainsinabilityto experience pleasure and that the dark side of pleasure is addiction. Addiction is associated with long-lasting changes in the biochemical, electrical, and morphological functions of connections within the medial forebrain plea ­sure circuit. These changes underlie many of the dark sides of addiction, including progressive tolerance, craving, withdrawal and relapse. Therefore, pleasure, addic ­tion and memory are closely related, and directly interconnected. Psychoactive drugs can be used in different social contexts; as medicine, religious sacrament, pure recreation, or to define oneself as part of a subgroup. Across cultures and over thousands of years of human history, people have consistently found ways to alter the function of their brains. Psychoactive drugs like cocaine, alcohol, and opiates strongly activate dopamine action in VTA target regions. Pleasure is central to some but not all psychoactive drugs. Certain foods and certain drugs can activate the pleasure circuits. While obesity results from food addiction, food addiction shares many properties and biological substrates with drug addiction, including a strong heritable component and triggering by stress. Orgasm is another pleasure buzz that may be weaker than cocaine but stronger than food. ( Cite page here) It is a multifaceted experience with dissociable sensory and affective, emotional, and rewarding components. It is fiery, transcendent and unique. Orgasm strongly activates the dopamine-using medial forebrain pleasure circuit. Drugs that modulate dopamine signaling in the brain can regulate libido and orgasm. Epileptic seizures or brain stimulation with electrodes can produce orgasms that are devoid of pleasure or emotional feeling. Gambling addiction is associated with reduced activation of the medial forebrain pleasure circuit. Genetic variants that suppress dopamine signaling, particularly in the medial forebrain, are associated with high rate of gambling addiction. For people who carry these gene variants, their muted dopamine systems lead to blunted pleasure circuits, which in turn affects their pleasure-seeking activities. Intensive exercise can bring about short term euphoria, reduction of anxiety, and increases in pain threshold. Long term painful stimulus is associated with increased dopamine. Interestingly, charitable giving produces an activation of the pleasure circuit. The interaction of pleasure and associative learning in the medial forebrain pleasure circuit yields both beneficial and detrimental rewards. The ability of experience to produce long-term changes in the pleasure circuit enables arbitrary rewards and abstract ideas to be felt as pleasurable, a phenomenon that ultimately underlies much of human behavior and culture. This same process is responsible for transforming pleasure into addiction. Reading the compass of pleasure gives an insight on the function of the neurotransmitter dopamine in the brain and how the dopamine systems in the brain play an important role in pleasure seeking and addictive behaviors. I also learned that dopamine is responsible for most of our immoral behaviors and secret cravings. It is responsible for love, lust, adultery, motivation, attention, and addiction. The denial of pleasure can yield spiritual growth. In practice, one can see beyond a persons behavior, personal history, and environment to understand what goes on in the brain when uncontrollable habits such as addiction present themselves. Understanding the interaction between the pleasure circuits and dopamine in the brain help us as health care professionals to understand that addicts are not weak, defective human beings lacking in willpower but are rather people with brains that are chemically deficient. According to Lundy-Ekman (2013, p.239), Parkinsons disease is the death of dopamine producing cells in the sustantia nigra. Occupational therapy improves mobility and functional status in people with Parkinsons disease. Intense resistance training produces greater muscle hypertrophy and functional gains than are produced by standard exercise. According to Linden (2011, p. 127), there are variations in genes turning down the functions of dopamine signaling within the pleasure circuit. These variations in genes let people seek pleasure through different activities. These activities may be meaningful to a client while others may be addictions they may want to stop. Understanding the biology of pleasure circuits may help clinician’s such as occupational therapist better understand what an individual deems meaningful or pleasurable. Knowledge of forms of pleasure such as rituals, routines , music, dance and even meditations that are of meaningful to a client obtained during an occupational profile, helps therapist in planning interventions for clients. On the other hand, the therapist can also help create therapeutic interventions to help with addictions. Linden (2011, p.150), further explained that exercises has an anti-depressive effect, shows long term improvement in mental functions and slows cognitive decline that accompanies normal aging. Occupational therapists work with a variety of population and this piece of information makes it interesting to know that range of motion exercises and other forms of exercises provided during therapy may be able to improve mental functions and slow cognitive decline in normal aging. Dopamine and serotonin are important neurotransmitters in the brain that influence many behaviors and movement patterns such as walking and coordination. Dopamine levels are associated with many neurological conditions such as Parkinson’s disease, psychosis and even attention deficits hyperactive disorders. Too much or too little dopamine can interfere with cognition, behavior, or motor skills. In practice, occupational therapists work with clients with various neurological conditions by evaluating and analyzing the client, the environment and their meaningful occupational performance. Having insight into a clients deficits and its effect on occupational performance is important to therapist because it helps the therapist to be able to plan and provide therapeutic interventions aimed at improving cognition, coordination, mobility and functional status in clients. References Lundy-Ekman, L. (2013). Neuroscience: Fundamentals for Rehabilitation. St. Louis, Mo: Saunders/ Elsevier Inc. Linden, D. J. (2011). The Compass of Pleasure: How our Brains make Fatty Foods, Orgasm, Exercise, Marijuana, Generosity, Vodka, learning, and Gambling Feel so Good. New York, NY: Penguin Group Inc. Sturkenboom, I., Thijssen, M., Gons-van, J. E., Jansen, I. (2011). Guidelines for Occupational Therapy in Parkinsons Disease. Retrieved July 14, 2014, from National Parkinson Foundation: http://www.parkinson.org/NationalParkinsonFoundation/files/a5/a5c7ef92-a101-4485-96b2-7d81b31a42c9.pdf

Thursday, September 19, 2019

Colonialism and Imperialism - European Ideals in Heart of Darkness and

Hollowness of European Ideals Exposed in Heart of Darkness and The Hollow Men       Kurtz occupies a peculiar position in Conrad's Heart of Darkness and T.S. Eliot's "The Hollow Men." "Mr. Kurtz, he dead" is the epigraph to "The Hollow Men." Eliot draws an obvious allusion to Kurtz, the morally hollow man in Heart of Darkness. Left to his own devices, Kurtz commits appalling acts such as shrinking human heads and performing terrible sacrifices. Kurtz is armed with only the dubious sense of moral superiority of his culture and the desire to civilize the natives (Dahl 34). This front quickly crumbles when faced with the noble yet savage ways offered by Africa. The crumbling front only leaves a hollow void of desired ideas and morals. This hollowness is what Eliot builds on to develop his own idea of hollowness. Kurtz is an apt example of the hollowness of European ideals that Eliot wanted to expose. T.S. Eliot's "The Hollow Men" uses Conrad's Kurtz to enforce the idea of hollowness found in contemporary Western thought, because Kurtz is a "model European" and rep resents the ideas of the modern Western Everyman.    Kurtz is a prototypal European thinker and citizen. He is the product of idealistic, progressive, and optimistic thought (Dahl 34). Kurtz is a Renaissance man, being a musician, a painter, a journalist, and a "universal genius" (71). So well does Kurtz perform all his duties, Marlow never figures out Kurtz's true occupation. Marlow can envision Kurtz as a "painter who wrote for the papers" as well as a "journalist who could paint" (71). Kurtz's universal talent extends to the field of politics, where he could have been a "splendid leader of an extreme party," in fact of any party (71). Kurtz was highly respected... ...rmany and later in Vietnam and Cambodia (Anderson 404). In all likelihood, Heart of Darkness was just a prelude to the atrocities that could be committed with the continuance of European thought as it was. Eliot explicitly says one of the themes to Part V is "the present decay of Eastern Europe" (Roessel 55). Eliot built on this theme of moral hollowness in "The Hollow Men," by having Kurtz and his actions be representative of contemporary European thought.    Works Cited Anderson, Walter E. "Heart of Darkness: The Sublime Spectacle. University of Toronto Quarterly 57(3) (1998): 404-421. Dahl, James C. "Kurtz, Marlow, Conrad and the Human Heart of Darkness". Studies in the Literary Imagination 1(2) (1968): 33-40. Roessel, David. "Guy Fawkes Day and the Versailles Peace in 'The Hollow Men'. English Language Notes 28(1) (1990): 52-58.      

Wednesday, September 18, 2019

Informed Consent Essay -- Medical Care

Informed consent is the basis for all legal and moral aspects of a patient’s autonomy. Implied consent is when you and your physician interact in which the consent is assumed, such as in a physical exam by your doctor. Written consent is a more extensive form in which it mostly applies when there is testing or experiments involved over a period of time. The long process is making sure the patient properly understands the risk and benefits that could possible happen during and after the treatment. As a physician, he must respect the patient’s autonomy. For a patient to be an autonomous agent, he must have legitimate moral values. The patient has all the rights to his medical health and conditions that arise. When considering informed consent, the patient must be aware and should be able to give a voluntary consent for the treatment and testing without being coerced, even if coercion is very little. Being coerced into giving consent is not voluntary because other s people’s opinions account for part of his decision. Prisoners and the poor population are two areas where coercion is found the most when giving consent. Terminally ill patients also give consent in hope of recovering from their illness. Although the possibilities are slim of having a successful recovery, they proceed with the research with the expectation of having a positive outcome. Although the physician provides adequate information to his patient, how can he ensure that his patient properly knows everything and is capable of making the decision? Prisoners and the poor population are simply two groups that are easily coerced into giving consent to medical research. Although prisoners give consent, I don’t believe many are voluntarily giving consent, but... ...on from your patient that could possible alter his decision. The patient should have rights to know all information and statistics about the doctor and the success rate of all treatment options revealed. The information, in which, the doctor reveals or does not reveal fall under the category of reasonable clinician standard. Reasonable clinician standard is inconsistent with informed consent because the focus is on the physician rather than the patient’s best interest. Works Cited Davis, John K. "Precedent Autonomy and Subsequent Consent." Ethical Theory and Moral Practice 40.3 (2004): 267-91. Gert, Heather. "Avoiding Surprises: A Model for Informing Patients." The Hastings Center Reports 32.5 (2002): 23-32. Nelson, Robert, and Jon Merz. "Voluntariness of Consent for Research: An Empirical and Conceptual Review." Medical Care 40.9 (2002): 69-80.

Tuesday, September 17, 2019

How Does Harper Lee Portray Atticus Finch as a Good Parent?

Mufasa, the father of Simba, from Disney’s The Lion King is a perfect example of many desirable qualities. Whenever Simba needs someone to comfort him, Mufasa knows what to do to make Simba feel better. Likewise, when Simba acts out of hand, Mufasa knows when he should reprimand Simba and when Simba is just being a goofy cub. Mufasa comes off as strong, brave, wise, patient and, most importantly, a model of a respectable parent. Just like Mufasa, Atticus Finch also possesses many desirable qualities such as patience, understanding, and bravery.In TKaM, Harper Lee uses the character of Atticus Finch to illustrate the qualities of good parenting. Atticus realizes that losing his temper with Jem and Scout over small incidents is not part of the qualities of good parenting because, throughout TKaM, he does not lose his patience with his children. While on the other hand, there is suspicion that Bob Ewell does the opposite by beating Mayella Ewell, his daughter. From the beginning itself, Harper Lee makes it clear, through a conversation between Miss Maudie Atkinson and Scout, that Atticus does not treat his children like Bob Ewell does.Miss Maudie explains to Scout that most people have split personalities; one for at home and one for in public. Scout cuts her off by saying, â€Å"Atticus don’t ever do anything to Jem and me in the house that he don’t do in the yard† (46). Scout defends Atticus because she gets into trouble quite a lot, but, even then, Atticus would never lift a finger against her or Jem. Not only does Atticus rarely ever have a fit over Jem and Scout, but he also can maintain his composure and patience with them. Scout, like most young children, always wants her opinions heard until she either receives an explanation or has her way.An example of this would be Scout’s first day of school where she finds herself frustrated from her teacher constantly reprimanding her. When she gets home, Scout recaps the day for At ticus and tells him that her teacher does not want Atticus to read with her at home. She channels her anger by complaining about her distaste for school while Atticus patiently hears her out and replies by calmly saying, â€Å"If you’ll concede the necessity of going to school, we’ll go on reading every night just as we always have. Is it a bargain? (31) Atticus could have easily lost his temper with Scout, but, instead, he appealed to her interests. This shows that Atticus likes to make his children happy and that, as a parent, he knows when he must be angry, and when he must show compassion. Showing Atticus as a father who does not lose his patience with his children over silly things is just one of the many ways that Lee portrays Atticus as a good parent. Atticus wants Jem and Scout to grow up with good morals, and one way he does this is by exposing them to an important quality, bravery.An example of this is when Atticus goes against the townspeople’s belie fs by accepting the case of Tom Robinson. This results in negative comments towards Atticus’ family, and his children have to put up with it. One insult from Mrs. Dubose makes Jem so mad that he destroys her Camilla bushes, and his punishment is to read to her for a month. Old and addicted to morphine, Mrs. Dubose wants to try to overcome her addiction before she dies. Sadly, Mrs. Dubose passes away shortly after Jem’s punishment ends and, in an attempt to explain why he made Jem read to Mrs.Dubose, Atticus says, â€Å"†¦I wanted you to see what real courage is, instead of getting the idea the courage is a man with a gun in his hand†¦Mrs. Dubose won†¦ She was the bravest person I ever knew† (112). Atticus, as a respectable parent, wants Jem to see that true bravery is facing up to life’s problems and fixing them in the best way possible. In the same way, Atticus shows his children the meaning of bravery when he turns the other cheek to Bob Ewell. Even though Bob Ewell has won the case, he wants to make his distaste for Atticus clear.So Bob Ewell spits in Atticus’ face and says that he will get him, even if it takes him the rest of his life. The children hear of this incident through Miss Stephanie and are concerned about Atticus’ safety. When they question Atticus about it, Atticus does his best to comfort them by saying, â€Å"We don’t have anything to fear from Bob Ewell, he got it all out of his system that morning† (218). Knowing that Atticus, their parent and example, can be brave at a time like this gives Scout and Jem the encouragement to let go of their worries and not let the tension in town affect them.Lee has Atticus expose his children to true bravery through Mrs. Dubose and Bob Ewell to show that Atticus does have good parenting qualities. Through Atticus Finch, Harper Lee illustrates the qualities of good parenting in TKaM. Such as when Scout explains to Miss Maudie that Attic us would never raise a finger against either her or Jem because he does not act differently in public than at home. Also, when Scout whines, Atticus does his best to please her because he understands that losing his temper will not help the problem.In addition to that, Atticus exposes his children to true bravery through Mrs. Dubose by showing them to face up to their problems. In the same way, when Atticus turns the other cheek to Bob Ewell, he teaches his children to be brave and not let anything negative affect their lives. Atticus Finch, just like Mufasa from The Lion King, is a patient, wise, and brave father, and he definitely does portray the qualities of admirable parenting.