Monday, September 30, 2019

European Union Bringing Peace To Europe

The wars bore the modern nations of Europe such as England, France, Germany, Russia, and Italy. Afterwards, they developed their own cultures, which are nationalities, languages, traditions and histories. Due to this characteristic mixed with these various cultures and its nation- centred international politics system of Europe, there rarely was period that ceased from wars in Europe.Furthermore, two world wars in XX century caused the collapse of all Europe's peace and prosperity and Europe, as a result, was no longer the centre f the world. The world power was already moved on the U. S. A and the U. S. S. R. For this reason, people of Europe started to perceive the need of its combination and the European Union was made to restore political peace and economic prosperity of Europe (Nugent, 2006). At this point, it is needed to ask that the European Union has truly fetched peace and prosperity to Europe.It strongly appears to me that the European Union has contributed to political st ability and economic growth to Europe. To demonstrate it, this essay will deal with the following aspects of the historical fforts and intergovernmental agreements which the European Union has made to contributed to political stability and economic growth of Europe in XX century. ‘Main Body Above all, it is essential to define the mutual relation between political peace and economic prosperity. These two important factors which can decide the rise and fall of each country tend to move together.It means that it is hard to say that there is prosperity without peace or peace without prosperity. For a recent example, economic status of Ireland was almost the lowest in the European Union in the past ut now is definitely regarded as a wealthy country in the European Union. This remarkable economic rise led to synchronize the decrease of al large number of armed conflicts in Northern Ireland, one of the most unstable areas in Northern Europe. In other words, this means that it is cle ar that political stability of a country was highly dependent on economic prosperity (Strong, 2006).Therefore, peace and prosperity are achieved separately rather simultaneously. Equally, it is needed to approach to political peace and economic prosperity of Europe in this way. Peace and prosperity of Europe through the European Union have not gained respectively but coincidently. The first significant movement that brought peace and prosperity to Europe was the treaty of ‘The European Coal and Steel Community. After the Second World War, it was widely diffused to aim at ‘United Europe' for its peace and prosperity seeing Europe impoverished by war.Robert Schuman, the French Foreign Minister at that time, suggested epoch-making idea about creation of the consolidated organisation that Jointly supplies and controls strategically important esources such as coal and steel. This is called ‘The European Coal and Steel Community (ECSC)' and it became the cornerstone of t he European Union (http:// europa. eu/ecsc/results/index_en. htm). It was obvious that this ECSC treaty brought rise of living standards to overall European society with high economic growth of each country, based on common market, common goal and common organisation.In C provided witn not only co-operation ot the tield ot Coal and S but also political stability of Europe still surrounded with fear of war. It means that it ecame possible to check each other between nations of Europe by Joint distribution and Joint control of Coal and Steel, which is indispensible for war. The second important movement with respect to peace and prosperity of Europe is the Single European Act of 1986 (SEA). In the period of 1971-86, Europe was in heavy economic recession.This stagnation could be regarded as a result that EC members did not successfully cope three serious incidents such as the collapse of the Bretton Woods system, the oil crisis, and the resulting bad economic results' (qiftq, 2005:476 ). Afterwards, in 1985-91, The European Union accomplished prompt growth in the process of economic integration of Europe. However, there was the budgetary crisis, which was an obstruction to progress economic integration of Europe. It was fortunately settled by Mitterrand's consent in 1984 about sharing a great amount of the expenses with respective to the Common Agricultural Policy (CAP) budget.Consequently, these successive events extended into the creation of the Single European Act of 1986 (ibid). Beyond all, the main issue of the SEA was the accomplishment of internal single market of Europe. The SEA became the opportunity to support institutionally development of the internal single market and deregulation. Through the SEA, the integration process of European community was changed qualitatively. Internal single market is qualitatively different concept from free trade zone between nations or geographical extends of trade.In other words, this internal single market means that each government should be pushed to adopt common standards such as technology, regulations, and norms and so on. It means that all European countries should be responsible for mutual economic benefits. More importantly, needless to say each government, European commission and supranational capitals, this progress was supported by public opinion and even many trade unions such as public consensus (Benink, 1992). It means that the SEA brought economic growth to Europe and, at the same time, drew a conclusion, national consensus which can be developed to political stability.As a consequence, it is seen that peace and prosperity of Europe were not achieved separately. They mostly come together. The third remarkable movement related with peace and prosperity of Europe is the Maastricht treaty of 1992. This treaty brought the most innovative outcome. The Economic and Monetary Union of 2000 was inaugurated. This was definitely the climax of exertion of European Communitys countries that ha d accelerated European monetary integration for around 30 years and also the turning point in history, which proceeded to new stage of European integration (Grieco, 1995).As a result of this treaty, European single currency, the Euro was launched in 1999. By launching the Euro, it was vanished to lose the benefits due to extreme fluctuations in the exchange rate and became clear to know prices of other ountries' merchandise. In addition, there was no longer exchange fee. These advantages of the Euro led to more active international trade between European nations and ultimately brought the economic prosperity of Europe. Moreover, in the Maastricht treaty, the Common Foreign and Security Policy (CFSP) was launched.The CFSP included all areas related to Joint security, Joint defense and diplomacy of the European Union. Despite that militarily importance of the United States of America was relatively reduced by extinction ot the USSR's threat, it was still seen that European nations was dependent on the USA. This was mainly because the NATO, which still had important role in European security due to disability regarding dispute resolution of European nations, was practically moved by the USA.In this circumstance, a bond of sympathy that Europe needed its own military strength to cope Jointly increasing international terrorism and geopolitical conflicts began to be naturally formed. Subsequently, the Common Foreign and Security Policy (CFSP) was initiated according to the Maastricht treaty (Hurd, 1994). The purposes of the CFSP were to safeguard the common values, fundamental interests and independence of the Union and to develop and consolidate democracy and the rule of law, and the respect for human rights and fundamental freedoms. (Nugent, 2006:90). Hence, it can be told that the Maastricht treaty consequently begot peace and prosperity of Europe by pursuit of two objectives such as The Economic and Monetary Union and the Common Foreign and Security Policy. conc lusion To sum up, by examining three significant treaties in this essay, it becomes self- vident that the European Union has constantly pursued peace and prosperity of Europe by advancing the treaties and implementing them and they have finally built the new framework of peace and prosperity of Europe.Additionally, it is also crucial to comprehend that political peace and economic prosperity are concurrently fulfilled. It is true that the European Union has kept a large number of difficulties to stabilise national status for decades. Nevertheless, it is undoubtedly certain that the European Union will be a high-quality model of many areas where peace and prosperity need.

Sunday, September 29, 2019

Drama coursework Essay

The two pieces I have chosen to compare are; ‘Twelfth Night’, written by Shakespeare and another piece ‘Complications’, devised by my group about confusion. I recognise that ‘Twelfth Night’ being such an old play has been presented and performed in various ways and I am focusing on just one film and play therefore some of the information may be irrelevant to some particular portrayals of the play. The pieces show similar story lines however being set in to very different eras they also show some vast differences. Our modern version of the piece was set in the 21st century; and ‘Twelfth Night’ was set in the 16th century (Shakespearean times). This already implies that both plays will show very different views and perceptions to the characters, their personalities and approaches, also they may show different reactions to situations. Both pieces are about two siblings and confusion of them and who they are. In ‘Twelfth Night’ both characters knew of their existence however at that time did not recognise each other and did not know who they were, however in our piece both characters although knowing each other did not know of their relationship with one another (being twins). ‘Twelfth Night’ forced the ‘sister’, Viola to dress up as a man in order to get a job to seek her brother however, in the modern version, sexism is not an issue now as they are both girls and they are both accepted for their diverse characters. Nowadays parents in a relationship both parents are often of the same status and importance, for example: job recognition, how they are treated by society; something that was not common in the past. In focus of culture, ‘Twelfth Night’ portrays Viola and Sebastian of having alike behaviour, this could be due to the fact that they were brought up together in the same circumstances however the behaviour of the two sisters in our play are completely opposite. One character is quiet and does not argue back whereas the other sister argues and is very feisty. The characters in our play ‘confusion’ are also brought up with different types of parents; one set of parents quiet and calm towards each other, the other a single mother in a ‘high flying’ job. This contrasts with ‘Twelfth Night’ as there women could not get a job and this mother has a great busy job, continuously dressed in suits. Even now; business people are still stereotypically thought of as being men however it has evolved considerably in the last 20 years. In our play there is the role of ‘the other women’ whom the father went off with when the original mother and father split up. This would be frowned upon in the 16th century as they are expected to put up with any grief or misery they encounter, not saying that all of them were unhappy; however now in the 21st century it is seen as acceptable and people believe that nobody should be treated differently and have more priority in a relationship and it is about both people regardless of their sex. People in the 16th century were expected to live with their husbands and act under and listen to whatever they said however now times have developed and changed considerably; women are much more independent; even though most society portrays a certain perspective there are always the odd character, in ‘Twelfth Night’ Olivia shows great independence and has the confidence to live her life alone however as society views women differently and inferior she felt the need to dress up as a man in order to get a job; and in ‘complications’ the ‘other woman’ shown is not as independent as the original mother. ‘Twelfth Night’ is a comedy, some characters more comical than others as with any drama; however our play ‘Complications’ although some comical events occur the drama is more of a serious nature, it was a play that showed the change of two young girls; when they found out that their parents had lied to them and there was more to them than what they were presented, for example the existence of their other twin and mother and father. In the plays there were some unrealistic scenarios given for example; if you saw your sister that you had spent your whole childhood with, dressed up as a boy you would be able to tell; as in ‘Twelfth Night’ and it is not very likely that your divorced parents would meet up and the father would not notice the same house when approaching it. Although not always realistic both story lines are effective and do have other meanings throughout them and still keep us gripped to the situation happening. Costumes in both plays are not similar but do reflect the times they were devised in. ‘Twelfth Night’ has costumes such as tights and long socks for men, something that you would not see in modern times and tight dresses for the women, finished with a big hairstyle and occasionally a hat; although this is seen now the dresses would not curve in as much at the waist nowadays. Mostly the people are dressed similarly to their stereotypical characters, following traditions of men in shirts and trousers, the butlers dressed in suits; similarly to modern times; maids dressed in petticoats, hair in a bun, and slightly ‘tatty’ clothing. In ‘Complications’ the children both dress according to their personal interests; this meaning one dressing in black, ‘punk’ clothing, the other in simple clothing without a particular ‘statement’ which is common in modern children. The mother; a high flying business woman, clothed in posh suits and her mobile phone an accessory to her outfit; the other mother and father mostly stick to jeans and smart clothing as well. That is another difference; in the 16th century a women would not be seen in trousers, a very common item of clothing nowadays. It is seen that the clothing worn by the characters also reflect their statuses and personalities. The themes in both plays are that two siblings are split up and at the end unite together; this is identical in both pieces. They also both use butlers of similar characteristics, although the sister whom the butler works for in ‘Complications’ is rather unpleasant to the butler, the well behaved, polite twin sister is very kind to him; similar to in ‘Twelfth Night’ in which Olivia and her butler get along however many of the other characters have a problem with him. In conclusion one could say that both drama performances have similarities and differences but it is what makes them both individual pieces, they also show different aspects of life and show different events very effectively. For example; ‘Twelfth Night’ shows many comical events as when Malvolio gets taken into a mental institute after being tricked by the other characters, and in ‘Complications’ when the twin living with the ‘step-mother’ confronts her, it is a very emotional scene but it is one that could happen in real life.

Saturday, September 28, 2019

Fifth Business Essay Example | Topics and Well Written Essays - 1000 words

Fifth Business - Essay Example The snowball that hit Mary Dempster caused the premature birth of Paul and the insanity of Mary. This episode in his childhood had brought Dunstan an unending guilt that had enveloped him all through his life. There were several people whom Dunstan had met that helps him understand his roles as well as let himself loose of the burden of guilt he had felt since that eventful day with Staunton and Mary Dempster. Myth finds a place in the heart of Dunstan and teaches him to grow. Magic is the escape of yore that Dunstan seeks and successfully rediscovers. Religion, myth, and magic are intertwined in Dunstan Ramsay's life, crucial for the completion of Ramsay as a person through the wonder they inspire. (http://www.geocities.com/echomyst/literature/fifth_business.html, para 1) Being a saint and being a mad person depend entirely on how people thought of one's personality. The religious practices and influences of one person according to his or her beliefs affect how people would see one's perception towards him or her. Dunstan Ramsay's taking full responsibility of Mary Dempster had taught him the saintly versions of life. She had shown him several miracles that had brought him closer to her that he regarded Mary as more than his friend, but a spiritual guide - a fool-saint who has nurtured his soul. His feelings towards him were even more than the maternal love he had felt towards his own mother. The miracles that Mary had shown her were those when she brought his brother back to life, that she appeared to him in his own war (World War I) related illness, and that she converts a dirty tramp into a minister - Surgeoner, whose life Mary changed forever and now heads the Lifeline Mission. (http://www.geocities.com/fossilfreak/books/fifth.html, para 3 & 15) However, Dunstan attitudes towards Mary were contrasted by the society such that they regard her as a "mad" woman that even her husband sees her a his "heavy cross." He had a totally different view of Mary's personality even though his innocence ked him to see her sexuality as "madness," he was still able to accept her as a "wise woman" and as a "saint." ("Dialectic") This situation in the novel only shows that a saintly representation of someone else to another person may sometimes be a madness to other people as dictated by his or her religious beliefs and the people he or she is associated with. Furthermore, these representations or views towards other people changes as one encounters other situations that might lead him to discovering new worlds of manly desires and characters. Conclusion There is therefore a thin line separating personal mythologies such as being a saint and being a mad person as perceived by other people. These perceptions are based on how one's personality is able to influence the life of another in a way that would relieve the burdens that a person carries in his life and grow maturely as a person. (http://www.geocities.com/fossilfreak/books/fifth.html, para 23) Works Cited: Dialectic, Morality and Deptford Trilogy. http://www.lib.unb.ca/Texts/SCL/bin/get.cgidirectory=vol12_1/&filename= LoVerso.htm. December 12, 2006. _______. http://www.geocities.com/echomyst/literature/fifth_business.html. December 12, 2006. Fifth Business Introduction The various religions present in the society encompass various beliefs as well. But

Friday, September 27, 2019

Sergei Diaghilev, Ballet Russes and 19th Century Art Essay

Sergei Diaghilev, Ballet Russes and 19th Century Art - Essay Example However, prominent artists from other European countries also received positive reception among mainstream audiences. For instance, Sergei Diaghilev, a Russian impresario, was one of the artists that influenced 19th century European art through his ballet company, Ballet Russes. The performances of Ballet Russes with Diaghilev helped shape 19th century art forms including music, ballet, and costume design. With the Ballet Russes, Diaghilev advances European art, music, and theater bringing to the international scene. Accordingly, this paper aims to discuss the life and works of Diaghilev as a major influence in the development of 19th century art, particularly through the Ballet Russes. Sergei Diaghilev and the Ballet Russes Sergei Diaghilev revived the Russian ballet dance with his Ballet Russes, and he established the repute of Russian Ballet worldwide with the said troupe. With the Ballet Russes, Diaghilev was able to drive artistic transformations in Russian ballet, particularly from changing the traditional dance steps and setups to modern ones. Diaghilev was born in St. Petersburg and spent his childhood there while taking academic and art classes in St. Petersburg University. Much of the influences of Diaghilev’s works take shape from his childhood experiences, particularly through his inclination to performing arts as a youth.... The first members of the troupe were professional dancers trained in the Tsar’s Imperial Ballet. With the Ballet Russes, Diaghilev was able to gather prominent choreographers during those times, including Vaslav Nijinsky, Fokine, Massine, and Joan Miro (Bloom paras. 1-7). Aside from associating with choreographers, Diaghilev also collaborated with world renowned musicians, such as Strauss, Schumann, Stravinsky, Milhaud, and Ravel, in creating the musical pieces for the Ballet Russes (Gottlieb para. 2). In the visual arts and costume design, the Ballet Russes also receives support from popular artists including Picasso, Rouault, and Derain. Seeing the performances of Ballet Russes, both Russian and French nobles took passion in supporting the efforts of Diaghilev in promoting the troupe to both local and international mainstream audiences. Impact on 19th Century Art Visual Diaghilev’s credit in the visual arts comes from his efforts at collaborating with painters, interi or designers, and other visual art enthusiast to develop and create artworks. He sought the service of well-known artists, and collaborated with them in designing the stage and costumes for the Ballet Russes. Specifically, famous visual artists such as Picasso and Derain took part in creating the stage set-up, costumes, visual materials, and posters of Ballet Russes’ performances. According to Lille, Diaghilev’s Ballet Russes allows artists from different art trends, such as Fauvism, Cubism, Dadaism and Surrealism to show their works (para. 2). Consequently, the performances of Ballet Russes serve as an exhibit featuring the works of various artists including painters, composers and choreographers. For instance, in

Thursday, September 26, 2019

Research Method Paper Example | Topics and Well Written Essays - 2250 words

Method - Research Paper Example Accordingly, it has been recognized that various short term financial instruments provides the options that help to minimise the possible loss from the transaction. The purpose of the study is to investigate the affect of fluctuation of exchange rates in the revenue of businesses especially in USASuperCars context. Moreover, the aim of the study is also to investigate the risks that the bank will undertake to measure adverse effect of exchange rate fluctuations. Correspondingly, the paper intends to analyse the current financial position of the USASuperCars. Additionally, an assessment is conducted with the aim of having a better understanding about the involvement of the bank in operating its businesses. The USA Sports Cars engaged in selling of luxury sports cars and the HSBC bank as the sources to measure the exchange rates in order to measure the fluctuation rate. Moreover, the fluctuations may either increasing or decreasing in the given time span. Thus to conclude table has also been drawn in order to reflect from Japan, UK, Canada, USA and South Africa among others to show the quantity of cars sold during the period. Furthermore, current exchange rates are also taken into consideration to measure the profit and loss for the HSBC. USASuperCars is the luxury sports car manufacturer and distribution company. The company is recognised as a global organisation having distribution channel around the world. Besides, high transaction in the global market has led to high reliance of the company over the international currency markets volatility and fluctuations. The prime aim of the company is to provide luxury cars to millions of inhabitants across a world. Company fixes the selling prices in terms of local currencies on the basis of the exchange rate that is prevailing during the delivery time. In the current scenario, the company experienced difficulties with respect to uncertainty in the exchange rates. The company is required to select

Wednesday, September 25, 2019

The Challenges, Obstacles and Barriers to Start-ups amongst the Young Essay

The Challenges, Obstacles and Barriers to Start-ups amongst the Young Entrepreneurs in the 21st Century Enterprise - Essay Example However, the gap between the young and old entrepreneurs differs greatly not only in terms of their real-life experiences when it comes to managing a business but also in having a better chance of getting bank loans for their start-up capital (Muffatto and Giacon, 2012, p. 685). In most cases, the process of identifying and learning more about the challenges, obstacles and barriers that can impede the potential of young entrepreneurs in starting-up a business can be considered as the first step towards narrowing the gap between the old and young entrepreneurs. Therefore, by learning more about the weaknesses of the young entrepreneurs, the UK government together with the community members and the local universities can play a significant role in empowering the young entrepreneurs through self- awareness (Lorrain and Laferte, 2006). The young entrepreneurs are enterprising people below the age of 35 (Kelley, Singer and Herrington, 2011; Lorrain and Laferte, 2006). According to Blundel and Lockett (2011, p. 5), entrepreneurs are â€Å"those person who seek to generate value through the creation or expansion of economic activity, by identifying and exploiting new prodcts, processes, or markets†. On the other hand, social enterprises are â€Å"organizations seeking business solutions to social problems† (Thompson & Doherty, 2006). ... The young entrepreneurs are enterprising people below the age of 35 (Kelley, Singer and Herrington, 2011; Lorrain and Laferte, 2006). According to Blundel and Lockett (2011, p. 5), entrepreneurs are â€Å"those person who seek to generate value through the creation or expansion of economic activity, by identifying and exploiting new prodcts, processes, or markets†. On the other hand, social enterprises are â€Å"organizations seeking business solutions to social problems† (Thompson & Doherty, 2006). As part of identifying and examining the challenges, obstacles and barriers that most of the young entrepreneurs in the 21st century enterprise are experiencing when starting-up a business, this study will purposely examine the situation of the young entrepreneurs in a public, private, and not-for-profit organization. In support of the main discussion, examples will be considered in determining how the young entrepreneurs can overcome these obstacles. Challenges, Obstacles a nd Barriers of the 21st Century Enterprise that are Affecting the Young Entrepreneurs A lot of past and current literature tackles the issue with regards to the challenges, obstacles and barriers that can hinder young entrepreneurs from setting up their own business. Based on the research study that was conducted by Lorrain and Raymond (1991), â€Å"one of the major problems encountered by the young entrepreneur is the lack of credibility given by the business and government representatives, on account of their young age†. Furthermore, support that young entrepreneurs will receive from their friends, family members, and the community as a whole can also affect the professional

Tuesday, September 24, 2019

DQ52 Essay Example | Topics and Well Written Essays - 500 words

DQ52 - Essay Example The business needs to understand its overhead and should be looking at this from a fixed cost perspective. If the wage rates are fluctuating in this or different departments, the element of fixed costs is removed and makes this practice unpredictable for maximizing the reporting of financial health. Measuring overhead has to do with the health of the operating environment which relies on understanding costs that are generally not variable. These costs can include administration, groundskeeping, machining and assembly (Horngren et al, 2008). When looking at administration overhead, it is going to be practical to want to know if their wages are fixed. If wage rates continue to fluctuate, deciding where to allocate the total overhead costs is going to be highly difficult if the goal is to maximize financial reporting data to show better corporate health at the accounting level. For example, the monthly or weekly groundskeeping maintenance required could be looked at as a fixed cost, especially if contracted at x dollars per month/week. This overhead cost would be a necessity as part of operations and could be predicted for financial reporting based on the contract cost negotiated throughout the business operating year. Direct-labor cost would be an appropriate cost allocation opti on here if the wages, such as for administration, remained constant. This method would also give the senior business leaders more accurate overhead costs, if they were needed, for strategic review or for assessing the health of certain divisions. Direct labor costs should be seen as costs which are directly incurred by the organization and should have an element of predictability surrounding them. It would be a guess that most real-life organizations do not have varying wages for certain things such as administration, unless they had structured some sort of bonus system where wages were subject to bi-annual

Monday, September 23, 2019

Differential-Amp Circuits Lab Report Example | Topics and Well Written Essays - 750 words

Differential-Amp Circuits - Lab Report Example From figure 2, the input signal was equal to the output signal (unity amplification), and in the same phase (the non-inverting amplifier); both the upper and lower Op Amps were buffer circuits. The value of output was 19.9V because the Op Amp was not ideal. V1a = V1d = 0.2V; V1b= 0V; V3a = 1.16V; V3b = -0.96V; V3d = 2.12V; Afd = 10.6; Afd % Error = 4.4%; R4 = 0.97kâ„ ¦; R5 = 0.97kâ„ ¦; Average of R5 and R4= 0.97kâ„ ¦; R6 = 9.80kâ„ ¦; R7 = 9.84kâ„ ¦; Average of R7 and R6 = 9.82kâ„ ¦ For better suppression or reduction of common mode gain, there was a potentiometer connected to the LM1458C op amps. The potentiometer maintained output voltage at OV when differential input voltage is not applied. The nulling potentiometer improved common-mode gain of small input voltage by availing even smaller input voltages, V1a=0.2V was suppressed to V3a=1.16V as seen in figure 3. A bridge was made for the generation of two different voltages. There was a difference in between measured and calculated voltages due to tolerance or level of uncertainty. The differential gain was obtained through the connection of bridge to respective inputs of the amplifier. The output voltages at the connected bridge were nearly similar to the unconnected bridge; this is because they are connected to the Op Amp inputs that have input resistance of not less than several hundred kâ„ ¦ (LM1458C has 2Mâ„ ¦); V1a was equal to V1b with voltage of 0.197V which corresponded to output 21.3V. The measured differential gain was 107.878. There was minimal signal picked as observed from the oscilloscope, this was due to drifting and DC offset. This problem was caused by low-frequency DC signal; since DC is zero frequency. We could have constructed a high pass filter with very low cutoff frequency so that the Electro Cardiogram’s signal not to degrade. So both large capacitor of more than 1Â µF and large resistor of more than 1Mâ„ ¦ should have been put in place. The instrumentation

Sunday, September 22, 2019

Romeo and Juliet Essay Example for Free

Romeo and Juliet Essay Yesterday evening, terror had struck the streets of Verona when there was a brawl between the Capulets and the Montagues. The end result was two fatalities and one missing person. Tybalt Capulet, nephew of the Lord Capulet’s wife, was allegedly slain by Romeo Montague, son of the great Lord Montague. Mercutio, kin to Prince Escalus, was the other casualty. He was allegedly slain by Tybalt, using Romeo as a shield when trying to break them up. Benvolio, of the Montagues, was an eye-witness to the terrible scene and was interviewed for hid full report on what happened. According to him, Tybalt wanted to fight Romeo, but Romeo declined and tried to mediate the situation also making alleged suggestions that they were related. And Mercutio, who had some violent tendencies, decided that he would fight Tybalt himself. But, in Romeo’s attempt to solve the problem, he got in between the two of them and Tybalt ended up stabbing Mercutio. He died on the spot. Then, Romeo’s anger got the best of him and he killed Tybalt for killing his best friend. Then, he just decided to flee the scene so he wouldn’t get caught. However, Lady Montague had her own side of the story she said â€Å"Benvolio is a Montague; he is not telling the truth. There must have been twenty guys fighting against Tybalt. Romeo must not live! † Lord Montague had said during his interview, â€Å"Romeo and Mercutio were best friends, he was doing what the law would have done to Tybalt, and he killed him. † A few weeks ago, the Prince declared that if he heard of one more fight between the two infamous families, there would be a death sentence. You would think that with this warning, the families would consider changing their violent ways. We got a few comments from the Prince, saying that the families will pay for the unfortunate events of the terrible night and an immediate exile against Romeo was declared. He clearly stated â€Å"If those who kill are given mercy, that’s as much as giving permission for murder. † As for now, our deepest sympathies go out to the kin of the fatalities.

Saturday, September 21, 2019

Physical Therapy Assistant Essay Example for Free

Physical Therapy Assistant Essay Under the observation of a Physical Therapist, a Physical Therapist Assistant (PTA) works to help patients recover from injuries or disabilities within the body. A few exemplifications of their line of work include balance training, exercise, electrical stimulation, massage, ultrasound therapy, and mechanical traction. However, seeing as they are still just assistants, PTA’s must very thoroughly document and report everything they do and turn in their paper work to their overseeing therapist. Although the position is one of a mere apprentice, they are not required to hold a license, but there are several other qualifications needed. Education is the first step to certification. A basic two-year Associates degree is needed. This can be obtained through Murray State College in Tishomingo, Oklahoma. There are two different components that fit into the degree: classroom studies and clinicals. Under the education part of the degree, you would take several courses during your two year term, including rehabilitation, psychology, physiology, kinesiology, and terminology, and anatomy. Other courses include orthopedics, advanced physical therapy procedures, and pathology. Overall, sixty hours of educational course credits are needed. In the second section of studies, you are required to have working experience in the field. These clinicals occur within the second year of your education. Whether it is in a treatment center of some sort or a professional Physical Therapy business matters not, only that you have the experience needed, and in most cases, 2,000 working hours. Seeing as this would put you directly in contact with other people in a medical field, you would be trained in cardiopulmonary resuscitation (CPR) and the basics of first aid. On a side note, since you are in the occupation of physical therapy assistance, you yourself as the therapy assistant should be in good or excellent condition. Oftentimes, the assistant has to work with the patients and help them with mobility, therefore, there is a high necessity to have a physically maintained body as well. After you have secured your Associates degree and completed your physical therapy assistant program with credits, you have become eligible to apply for and take the National Physical Therapy Examination (NPTE). This test is administered by the Federation of State Boards of Physical Therapy. One way that you can help prepare yourself for the exam is by joining professional organizations. Not only would the groups make you look good, they would also offer many network opportunities and benefits in the future. Earning credentials also allows for more preparedness. For example, joining the American Physical Therapy Association (APTA) requires a substantial number of extra experience hours and approximately a year of work before admission. This would give someone a very good head start when it comes to studying for the test. Once you feel prepared enough, you may take your exam. If passed, the graduate may then carry on with their certification of completion for the Physical Therapy Assistant. With this license, you can now go out into the medical field, get your own job as a certified physical therapist assistant, and thrive with the degree and job you love.

Friday, September 20, 2019

Analysing The Hellenization Of Christianity Religion Essay

Analysing The Hellenization Of Christianity Religion Essay At the time of the Early EkklÄâ€Å"sia there was an ongoing conflict between Hebrew Judaism and Hellenic Judaism. The Maccabean war of independence, fought through to 139 BCE, wasnt just about foreign rule, but also about those Jews embracing Hellenism, a civil war, as it were, between Orthodox and Hellenistic Judaism. Hellenic Judaism was the fusing and harmonization of Greek philosophy and Judaism, where the practices of both Jewish exegesis and Stoic philosophy were followed. Those propagating this Hellenistic Philosophy included the Jewish philosopher Philoi of Alexandria (20 BCE 50 CE ). Hellenistic Philosophy, as espoused by Philo, was enthusiastically received by the early Gentile Christians, some of whom saw him as a cryptic Christian. Some today believe his concept of the Logosii as Gods creative principle influenced early Christology.iii Mainstream Judaism rejecting Hellenistic currents eventually (at the Council of Jamnia in 90 CE) prohibited the use of the Septuagintiv, leaving the Masoreticv as the only authoritative Hebrew text of the Jewish Bible. Antecedent to this, the Apostolic Decree of circa 48 CE (Acts 15) allowing converts to forgo circumcision made Christianity a more attractive option for interested Pagans than Pharisaic/Rabbinic Judaism which, in response to this quickly-growing Netzarim Judaism, instituted an even more stringent circumcision procedure in response. Hellenistic Judaism continue in existence until Constantine adopted Christianity as the official State religion. Remaining currents of Hellenistic Judaism in all probability, as would be expected, merged into gnostic movements in the early centuries CE. The Hellenization of Christianity was a complex interaction between Hellenistic philosophy and early Christianity during the first four centuries of the Common Era. The initial conflict between these two modes of thought is recorded in scripture; in Pauls encounters with Epicurean and Stoic philosophers in Acts 17:18, his diatribe against Greek philosophy in 1st Corinthians 1:18-31, and his warning against philosophy in Colossians 2:8vi. Over time, however, as Christianity spread throughout the Hellenic world, an increasing number of church leaders were educated in Greek philosophy. The dominant philosophical traditions of the Greco-Roman world at the time were Stoicism, Platonism, and Epicureanism. Of these, Stoicism and particularly Platonism were readily incorporated into Christian ethics and theology. Philos blend of Judaism, Platonism, and Stoicismvii strongly influenced Christian Alexandrian writers like Origen and Clement of Alexandria, as well as, in the Latin world, Ambrose of Milan. Clement of Alexandria, early Christian writer of the second and early third century, demonstrated Greek thought in writing: Philosophy has been given to the Greeks as their own kind of Covenant, their foundation for the philosophy of Christ the philosophy of the Greeks contains the basic elements of that genuine and perfect knowledge which is higher than human even upon those spiritual objects. (Miscellanies 6. 8) The Church historian Eusebius, c. 263-339 CE, suggested, essentially, that Greek philosophy had been supplied providentially as a preparation for the Gospel. Augustine of Hippo, who ultimately systematized Christian philosophy, wrote in the 4th and early fifth century: But when I read those books of the Platonists I was taught by them to seek incorporeal truth, so I saw your invisible things, understood by the things that are made. (Confessions 7. 20). This Greek pagan philosophy, now deeply entrenched and mixed within Christian theology, has persisted through the centuries becoming the foundation of Western thought and culture. Many today often blindly view the founding fathers of the United States as purely Christian. One of the most common statements from the Religious Right is that they want this country to; return to the Christian principles on which it was founded. However, even a little research into American history will show that this statement is unfounded and based on a false premise. The men responsible for building the foundation of the United States had little use for Christianity, and many were strongly opposed to it. They were men of The Enlightenment, not men of Christianity. They were Deistsviii who did not believe the bible was inspired truth. Indubitably, the US Constitution is a masterpiece of civil law providing for, among other things, the protection of religious beliefs against Governmental intrusion allowing the free exercise thereof, while at the same time wonderfully preventing the establishment of religious domination via state sanctioned religion. It was the latter of these two concepts that most concerned the signers of the Declaration of Independence and Framers of the Constitution, with but tolerance of the former. They wanted to ensure that no single religion could make the claim of being the official, national religion, such as was the case in England. The cultural climate of the time was one in which freedom from the religious domination of the Church of England and Catholicism was desired by the masses, which provided a perfect habitat for those of the Enlightenment. The 1796 treaty with Tripoli states that the United States was in no sense founded on the Christian religion. This was not an idle statement, meant to satisfy Muslims they believed it and meant it. This treaty was written under the presidency of George Washington and signed under the presidency of John Adams. None of the Founding Fathers were known atheists. Most were Deists, which is to say they thought the universe had a creator, but that he does not concern himself with the daily lives of humans, and does not directly communicate with humans, either by revelation or by sacred books. They spoke often of God, (Natures God or the God of Nature), but this was not the God of the Bible. They did not deny that there was a person called Jesus, and praised him for his benevolent teachings, but they flatly denied his divinity. These Founders of the Constitution were students of the European Enlightenmentix. Thomas Jefferson author of the Declaration of Independence and the Statute of Virginia for Religious Freedom, third president of the United States, historian, philosopher, plantation owner, and founder of the University of Virginia voiced the aspirations of a new America as no other individual of his era. He also in his writings voiced his beliefs: As you say of yourself, I too am an Epicurian. I consider the genuine (not the imputed) doctrines of Epicurus as containing everything rational in moral philosophy which Greece and Rome have left us. Epictetus indeed, has given us what was good of the stoics; I take the liberty of observing that you are not a true disciple of our master Epicurus, in indulging the indolence to which you say you are yielding. One of his canons, you know, was that the indulgence which prevents a greater pleasure, or produces a greater pain, is to be avoided. Jeffersons letter to William Short, from Monticello, October 31, 1819. But while this syllabus is meant to place the character of Jesus in its true and high light, as no impostor himself, but a great Reformer of the Hebrew code of religion, it is not to be understood that I am with Him in all His doctrines. I am a Materialist; he takes the side of Spiritualism; he preaches the efficacy of repentance towards forgiveness of sin; Jeffersons letter to William Short, from Monticello August 4, 1820. That being said, it is easy to see that the aforementioned tolerance of religious freedom, was in reality a bulwark for the benefit of The Enlightenment, not the Pious, and in this age that bulwark being no longer necessary is coming to an end. For two-hundred plus years we, in this United States of America, have enjoyed freedom of Religion so that those of the Enlightenment could enjoy their freedom from Religion. But figuratively speaking, the air of tolerance toward Judeo-Christian beliefs is wisping away, leaving the putrid stench of moral corruption and malicious bigotry toward anyone who identifies with Yeshua and the God of Abraham, Isaac and Jacob. But know this, that in the last days grievous times shall come. For men shall be lovers of self, lovers of money, boastful, haughty, railers, disobedient to parents, unthankful, unholy, without natural affection, implacable, slanderers, without self-control, fierce, no lovers of good, traitors, headstrong, puffed up, lovers of pleasure rather than lovers of God; holding a form of godliness, but having denied the power thereof [emphasis  added]: from these also turn away. (2Timothy 3:1-5). Like the parable of the Kingdom of Heaven of Matt 13; at the founding of the United States of America two seeds were sown. Two hundred years later in these last days the two seeds have grown to maturity. And now the tares are fully distinguishable from the wheat. For the American believers there has been a two-hundred year bastion of grace, to grow into the maturity of the Word, and to shine above the philosophies of this world. And now you see, God had afforded us a little more time in these last days to fulfill His purposes. Not waring in the flesh but; pulling down imaginations and every high thing that exalts itself against the knowledge of God, and bringing into captivity every thought into the obedience of Christ (2Cor. 10:5 MKJV) . For so is the will of God, that with well doing ye may put to silence the ignorance of foolish men: As free, and not using your liberty for a cloak of maliciousness, but as the servants of God. (1Peter 2:15-16 ASV).

Thursday, September 19, 2019

Changing roles of women :: essays research papers

Honey, I’m Home   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"Honey, I’m Home† now doesn’t even have a gender orientation to it, but only 30 years ago it referred to the â€Å"bread-winner† (the man of the house) coming home after a long day of work greeting his wife. This idea of male dominance is shown in the text Mirror on America, in the picture where the groom is holding his wife who is drastically smaller than him, showing some sort of dominance a male has over a female (63). It is also shown in the picture where the man looks like he came home from a long day of work and waiting for his wife to serve him dinner (62). Nowadays it’s a little different most women are employed full-time and have to come home to clean and cook for their families. Unfortunately, things are almost exactly the same the if not harder for women because now they not only have to cook and clean, but they also have to work.   Ã‚  Ã‚  Ã‚  Ã‚  Dave Barry, the author of the essay â€Å"The Ugly Truth about Beauty†, in the text Mirror on America believes women are too concerned with the way they look. He implies that women are never satisfied with their look, while all men â€Å"think of themselves as average looking† (35) . Women feel they have to strive to enhance their looks because the image society portrays of â€Å"beauty† is far from the average woman’s features. The author relays this message when he talks about supermodel Cindy Crawford giving out makeup tips:   Ã‚  Ã‚  Ã‚  Ã‚  Cindy had all these middle-aged women applying beauty products to their faces;   Ã‚  Ã‚  Ã‚  Ã‚  she stressed how important it was to apply them in a certain way, using the tips of   Ã‚  Ã‚  Ã‚  Ã‚  their fingers. All the women dutifully did this, even though it was obvious to any   Ã‚  Ã‚  Ã‚  Ã‚  sane observer that, no matter how carefully they applied these products, they   Ã‚  Ã‚  Ã‚  Ã‚  would never look remotely like Cindy Crawford, who is some kind of genetic   Ã‚  Ã‚  Ã‚  Ã‚  mutation. (35) Unfortunately, everyone even me has been affected by society’s view on beauty. I believe my view on â€Å"beauty† is very similar to that of most men. I believe a person’s beauty is easily enhanced by their personality.   Ã‚  Ã‚  Ã‚  Ã‚  The character and personality of a person is determined by their experience, background and childhood. Children are influenced greatly by their surroundings as well as their role models whether they are good or bad role models to have. The insecurities women have about their looks are due to their upbringing.

Wednesday, September 18, 2019

The novel The Adventures of Huckleberry Finn, written by Samuel L. Essa

The novel The Adventures of Huckleberry Finn, written by Samuel L. Clemens, whose pen name was Mark Twain, presents the evils of southern societies during the pre-Civil War period in America. The novel The Adventures of Huckleberry Finn, written by Samuel L. Clemens, whose pen name was Mark Twain, presents the evils of southern societies during the pre-Civil War period in America. Clemens, a well-respected author, "began writing The Adventures of Huckleberry Finn in 1876 and, after several stops and starts, completed it in 1883" (19). This novel revolves around the theme of slavery versus freedom, and was published at a time when most southern landowners still "owned" slaves. Huck Finn is a novel that incorporates the struggles of a young boy, Huck Finn, with that of a cruel, careless world, on his travel down the Mississippi River in attempt at finding his own identity. In this essay, I will present textual evidence that proves that the Seven Deadly Sins are directly associated with the types of evil in the novel, making Huck's world one of violence, terror, and death. The Seven Deadly Sins will be discussed according to their significance throughout the novel, beginning with: 1.) Pride; 2.) Avarice and Sloth; 3.) Gluttony and Wrath; and 4.) Envy and Lust. Clemens' main character, Huck Finn, experiences a great deal of violence throughout the novel as a direct result of the most significant Deadly Sin, Pride. Huck's father, Pap, is a drunkard who continuously exemplifies the sin of Pride. Pap finds extreme Pride in the "white man" with the legality of slavery. An example of his Pride is seen when an inebriated Pap verbally attacks free blacks in the States. He states, "It was 'lection day, and I was... ...usion, the Seven Deadly Sins of Pride, Avarice, Sloth, Gluttony, Wrath, Envy, and Lust are significant in the novel with making Huck's world full of violence and death. The deadly sins committed throughout the work produce an undesirable life for society, and much less for a child of Huck's age. The wondrous adventure that Huck assumes he will take on at the beginning of the novel, becomes no match to the evils that the young boy will view on his journey. The Seven Deadly Sins are all directly linked to the evils that Huck experiences. Huck's eventful, yet horrific adventure becomes the base for which he is forced into manhood. The Adventures of Huckleberry Finn takes the audience from "the endless summer of childhood pleasures.", found in Clemens' The Adventures of Tom Sawyer to the "violence, terror, and death that lurk at the edges of the village"(19).

Tuesday, September 17, 2019

Steve to Stephanie Essay

1) How can Henrietta help Steve transition in a company where not everybody is supportive? Henrietta can help Steve transition in a number of ways. Because the idea of switching gender is abstract idea, not every person will be accepting of it. In fact most people will be unaccepting of it being that they are morally agaist the idea of switching gender. Just as people are hesitant to accept gays, the dominant male female role stereotypes have been long ingrained in most cultures and most people accept them as â€Å"normal†. I believe the first thing that must be done to help Steve and LaSalle with the gender transition is to educate people about the process. People need to be aware of the reasons someone would choose to do this so they can understand why and possibly make some sense of it on their own. However the timing of this education needs to be carefully planned as to what the company and Steve believe is best. After education the Human Resource team should be leveraged to carefully monitor the situation and help those who are struggling to accept Steve’s life choice. 2) Does Steve’s transition risk integration of CatalCon, or any stakeholder relationships? Be Specific! Yes Steve gender transition will more than likely affect CatalCon and Lasalle’s integration for a number of reasons. First being that Steve’s sales partner Alex already has a bad opinion of Steve due the fact that Steve was given the Sale’s Director position over Alex. Alex being the number two at CatalCon before the acquisition believes he is much more qualified for the position though his 20 years of experience. Because there is already residual resentment the news of this gender transition angers Alex because he believes it is morally wrong and doesn’t believe in such a thing. Also he thinks that many of the shareholders and customers who are mostly conservative will not like this announcement. Alex believes they will lose business because of this and there is nothing the company can to stop it because they cannot fire Steve due to gender discr imination state laws. Also Alex is a very respected sales man and losing him would be detrimental to the CatalCon acquisition. He is needed for his understanding of CatalCon products that sales people from LaSalle will just not have due to lack of experience. 3) How far should firms go to protect and accommodate employee differences in the workplace? The firm has an obligation to protect Steve’s privacy, as this is a medical issue. So while they might want to settle things in ways that will make the majority happy, there are laws that force you to look out for the little guy. Any firm has a human resource team that is obligated to mediate employee disputes. But no matter what type of employee is the majority they must take actions to provide an equal and safe working environment for everyone. I believe that Henrietta made a mistake sending out a memo to specific people in the firm. Memos can be misplaced and seen by the wrong eyes. This could lead to a privacy lawsuit and should be avoided by waiting to announce sensitive material until a time that is right for the subject and the firm. Some employees may have issues other than medical that need to be met such as religious differences and cultural differences where dress code must be bent. I believe if there are differences that need to be accommodated for they most likely have laws that protect those differences. Therefore you will have some sort of guidelines as to how you many attempt to accommodate them.

Monday, September 16, 2019

Violent and Vulgar Rap Lyrics

VIOLENT AND VULGAR RAP LYRICS What happened to censorship? â€Å"Then shall we allow our children to listen to any story anyone happens to make up, and so receive into their minds ideas that often the very opposite of those we shall thing they ought to have when they are grown up? † Plato, The Republic While Plato may not have had rap music to contend with, he posed a question that could be a leading concept for a society concerned with the impact of today’s music on its kids.In truth, Plato would note a archetype shift from a culture that put their family’s social, emotional, and spiritual well being as primary; to a society that is enslaved to whoever or whatever nets the mighty dollar gets to make decisions regarding what is right for our youth. Let us begin with censorship. Most freedoms are taken for granted, because they always seem to be in effect. Censorship keeps freedoms in check, or so it should. There are some things that are not suitable for the whol e population. Children should not be exposed to vulgar or violent media.The young impressionable minds of our youth should not be exposed to media that promotes relaxed morals, risky sexual behavior, substance abuse, and the glorification of being a violent criminal. There are a lot of arguments regarding censorship, pro and con. I am willing to bet that those opposed to censorship of vulgar music do not have small children, specifically daughters. There are a lot of reasons to support censorship to protect our youth and our future. But those in control, those making major profits from the offensive media, only have their fat bank accounts to protect-not our precious children.On the following pages, I am going to submit some evidence that shows what effects rap music has had on our youth. I am also going to show you some examples of how this insult to our children’s minds, growth and healthy development has been allowed to continue. And finally, since the power’s that be are so hard to stop-I am going to propose a solution that we, as citizens, parents, and teachers can do to help gain some of our power back in educating our youth. The federal government and the states have long been permitted to limit obscenity or pornography. (Deflem) ] While the Supreme Court has generally refused to give obscenity any protection under the First Ammendment, pornography is subject to little regulation. However, the exact definition of obscenity and pornography has changed over time. In fact, federal obscenity law in the U. S. is highly unusual in that not only is there no uniform national standard, but there is an explicit legal precedent (the â€Å"Miller test†) that all but guarantees that something that is legally obscene in one jurisdiction may not be in another. In effect, the First Amendment protections of free speech vary by location within the U. S. , and over time.The â€Å"Miller Test† has 3 basic guidelines for the trier of fact: (a). W hether ‘the average person, applying contemporary community standards would find that the work, taken as a whole, appeals to the *prurient interest, (b). Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law. (c). Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value. (The First Amendment, Miller vs Californie,1973) An great example of the ambiguity of the Miller Test was during the 2Live Crew obscenity trial in 1991.Legal scholars have argued against each and every decision the Judge Gonzales made when he used to Miller Test during the first trial when he ruled in favor of the plaintiff and found 2Live Crew guilty of violating obscenity laws. First, it was argued that the Judge’s determination of the relevant community and its standards was overtly subjective. The Judge decided upon a geographical concept of community, but this was inappropriate because the fact that people live in close physical proximity does not automatically suggest that they share common values.Judge Gonzalez was also inconsistent in determining, on the one hand, that the considered community is generally more tolerant than others, and, on the other hand, that he could rely on his personal knowledge of the community standards which he never defined, of which he did not say whether they could change over time, and of which he did not determine the defining criteria. Second, the three standards of the Miller test (prurient interest, patently offensive, lacking serious value) were not met.With regard to determination of the album’s prurient interest, it was argued that there was no clear intention on the part of 2 Live Crew to lure hearers into sexual activity, and, referring to the profit-making motive of the rap band, Judge Gonzalez ignored that motive was irrelevant in aesthetic maters. Next, the patently offensive character of the â€Å"Nastyà ¢â‚¬  album was decided upon as the result of a misinterpretation of the lyrics, based upon Gonzalez’ arbitrary determination of â€Å"the† community standards. Actually, the lyrics of 2 Live Crew’s music should not be taken literally as they are comedic parodies in a culturally specific language.Also, music does not appeal to the intellect but to human emotions and imagination. Finally, the Judge’s ruling that â€Å"Nasty† did not have any serious artistic value was by definition mistaken since the â€Å"as a whole† test fails automatically in the case of a recording which after all always has some serious elements (the Judge never heard all the songs). Judge Gonzalez particularly failed to take into account Professor Henrey Louis Gates’s testimony which indicated the specific artistic style of the â€Å"Nasty† recording.Long pointed to the call and response style, the tradition of â€Å"doing the dozens† (a word game with insults), and the meaning of â€Å"boasting† as part of this type of rap music. Judge Gonzalez thus completely ignored the specific African American cultural values that are manifested by the album. Gates testified on behalf of Navarro, arguing that the material that the county alleged was profane actually had important roots in African-American vernacular, games, and literary traditions and should be protected. [ (Deflem) ] What a slipper slope.Not to mention â€Å"the prosecution suffered a setback when Judge June L. Johnson of Broward County Court agreed with the defense that a transcript of the tape contained comments that might distract the jurors and said that it could not be admitted as evidence†. [ (RIMER) ] When Joanne Cantor was asked to comment on Freedom of Speech issues at a Madison Civics Club dinner on October 12, 2002 this is what she had to share, â€Å"Many people have noted that corporate interests control what gets discussed in the media, and one place where this is obvious is the controversy over the media's effects on children.Research shows that violent television, movies, videogames, and even commercials can produce serious harmful effects on children, such as promoting violent behaviors and inducing intense anxieties. Parents need this information so they can make informed choices about their children's viewing, but the media use their corporate power to censor information that might damage their profits. At the same time, these corporations raise First Amendment concerns when solutions that might help parents are proposed. † Here are the examples of what she was referring to: 1.In 1997, I participated in a taping of The Leeza Show. On that show, parents were highly critical of the TV industry's new age-based rating system that was supposed to help them block harmful content using a device called the V-chip. NBC, which opposed making changes in the rating system, refused to let that program air. And five years later, they still have not gone along with the compromise that the other stations adopted. 2. After the National Institute on Media and the Family released a list of the 10 most violent video games, they were sued by the manufacturer of one of the games on the list.Although the lawsuit was eventually dropped, the costly process caused the organization's liability insurance to double, and they were subsequently lucky to get any insurance at all. 3. The Center for Successful Parenting produced a documentary on the effects of media violence for Court TV, a cable channel that is owned by Time-Warner. Before the program could air, the producers were told to remove the mention of Time-Warner's products. They were also required to include remarks by lobbyist Jack Valenti, who claimed that the research showing harmful effects was inconclusive. (Joanne Cantor) ] These are just a few of many examples of corporate interests using their muscle to restrict the free flow of information to parent s. They say that it's up to parents, not the media, to raise their children. But they make harmful products, which come into our homes automatically through television and radio and the internet. They market them to children too young to use them safely, and they try to keep parents in the dark about their effects. There are many studies that show the effects of violent and vulgar lyrics on our youth.The studies are too numerous to dispute and the results are pretty much the same. Teen pregnancy, STD’s are on the rise and although some studies indicate a drop in crime- they don’t’ show you the rise in crime in offenders under the age of 19, which is significant. I don’t want to go into all the statistics and the sources. I want to focus, instead, on the plan to use knowledge to empower ourselves and our youth-It’s called Media Literacy. The impact of media is critical, especially when it comes to the socialization of our children. Dr.Renee Hobbs wr ites that, â€Å"Media messages are representations of social reality, defined as perceptions about the contemporary world, which are shared among individuals. Messages also represent the social realities of times and places far removed, and help us make sense of the past, present and future. People need the ability to judge the accuracy of particular messages, which may or may not reflect social reality† (Handbook of Research on Teaching Literacy Through the Communicative and Visual Arts, 1998). few understand that media literacy consists of teaching about media as well.So the problem is clear: our students are growing up with media messages, messages that fill the bulk of their leisure time and provide them with information about who to vote for and what consumer decisions to make. Yet students receive little to no training in the skills of analyzing or evaluating these messages, many of which make use of language, moving images, music, sound effects, special visual effects and other techniques that powerfully affect our emotional responses. Educator’s are still focusing on historical context of the past, when cultural survival depended upon the mastery of the printed word.While these skills are even more important today, language is only one of a number of symbol systems which humans use to express and share meaning. Changes in communication technologies over the past 100 years have created a cultural environment that has extended and reshaped the role of language and the written word. Over the past decade, there's been a lot of discussion about how to best help teachers, parents and students be more critical consumers of the media. Quite logically, this response has been called â€Å"media literacy. Media scholar David Considine describes media literacy: â€Å"In an age when most Americans get most of their information from television, not textbooks, pictures not print, we need a wider definition of what it means to be literate. [Media lite racy], then, is an expanded information and communications skill that is responsive to the changing nature of information in our society. It moves from merely recognizing and comprehending information to the higher order critical thinking skill implicit in questioning, analyzing and evaluating that information† (Telemedium, Fall 95).Because the presence of media has become so accepted, we mistakenly presume that consumers of media are able to decode, deconstruct and digest media messages. Most of us received considerable teaching on how to interpret the written word, but we've had zero preparation for â€Å"reading† media messages. In an age when most Americans get most of their information from television not textbooks, pictures not print, we need a wider definition of what it means to be literate. Many of us grew up hearing the proverbs and adages like these: You Can't Judge a Book By Its Cover, A Picture is Worth a Thousand Words.These words are even truer today in a n age not only of computers and telecommunications but of virtual reality and imageneering. Today's technologies represent a startling fusion of sight and sound that frequently make it difficult for us to discern illusion from reality, fact from fiction. Special effects like those seen in movies like â€Å"JFK† and â€Å"Forrest Gump† merge the past with the present, color with black and white, the dead with the living, fact with fiction in such a way that the real truth can often be confused with the reel truth.Censorship and the welfare of our youth can not compete with big business, all we can do is try to arm ourselves and our children with the knowledge and understanding to correctly comprehend the messages that are being spewed from the media. With that power we may not be able to control what our children hear and see, but we can protect them with the knowledge of the motives of the messages. BIBLIOGRAPHY Deflem, Mathieu. Rap, Rock, and Censorship: Popular Cultu re and the Technologies of Justice. Paper presented at the annual meeting of the Law and Society Association, Chicago, May 27-30.Chicago, 1993. Joanne Cantor, Pd. D. â€Å"Who's Freedom of Speech is it Anyway? † Madison Civic's Club. Madison: Joanne Cantor, Ph. D, 2002. Kirchheimer, Sid. WebMD Health News. 3 March 2003. 1 April 2011. Piotrowski, by Tom. â€Å"Media messages†¦ more than meets the eye? † The Center for Parent/Youth Understanding (2003). RIMER, SARA. â€Å"New Yorimesk T. † 17 october 1990. New York Times Archives. 22 April 2011 .

Sunday, September 15, 2019

Gender Wage Discrimination in Pakistan

| Gender Wage Discrimination in Pakistan| Evidence from Pakistan 2008/09 and 2010/11| | | | Table of Contents Introduction2 Literature Review2 Methodology3 Variables Used – Characteristics of Workers5 Results7 Discussion7 Bibliography8 Appendix A9 Selectivity Bias Logit Regression Results:9 Introduction This paper explores the dynamics of gender wage discrimination in Pakistan for two data sets; Labour Force Survey for the year 2008/09 and 2010/11. We will explore whether or not women are discriminated against, as it has been suggested for a predominantly Islamic country like Pakistan.Labour theory addresses many reasons for wage discrimination. For the purposes of this research we will concentrate on ‘employer wage discrimination’. Following this our research will be aimed at discovering if women are paid less than their male counter-parts especially with the same set of characteristics. For this purpose we will use the Oaxaca-Blinder method to calculate the coef ficient for discrimination across genders. Literature Review The basis of this paper is the work done by Oaxaca and Blinder in 1973 about wage discrimination models.In the paper ‘Interpreting the Decomposition of the Gender Earnings Gap’ (Giaimo R. 2007) this method has been applied to find out how different characteristics change the discriminatory behaviour of employers in Italy. Oaxaca’s method for calculating discrimination was further adapted in the paper ‘Gender Wage Discrimination at Quantiles’ (Javier Gardeazabal 2005), and was used to calculate discrimination coefficients for quintiles. In a study conducted in India (Tilak 1980), it was found that the incidence of unemployment was higher for women than for men with the same characteristics.In this study the only characteristic that was taken was education. This is a different angle to look at discrimination from what this paper will do. Rather than looking at the unemployed, this paper will see the women in the labour force and if they face discrimination with respect to their wages. However, the underlying aim and also the hypothesis formed are the same. The paper ‘Wage Differentials and Gender Discrimination: Changes in Sweden 1981-98’ (Mats Johansson 2005) explored the wage gaps between men and women in Sweden.They found that the wage gap was 14%-18% during the 1990’s. Their study also indicated that this difference could not be explained by applying the job requirements and qualifications to women’s wage function. The conclusion was that there is undoubtedly some other factors other than the characteristics of the workers that determined the wages in the Labour Market. Methodology This paper calculated a coefficient for Gender Wage Discrimination from the Oaxaca-Blinder decomposition. D= Xf? m-Bf+ ? m(Xm-Xf) Here ‘? ’ is a vector of characteristics of workers.Therefore, the first part of the equation shows the wage differenti al between males and females on the basis of characteristics. Second part of the equation normalizes characteristics, for females in this instance, and then subtracts the wage differential based on characteristics, to give us the overall differential based on discrimination. As a control, we also work out the converse of this Oaxaca Blinder Decomposition as follows; D= Xm? m-Bf+ ? f(Xm-Xf) To control for selectivity bias, we have also used the ‘Heckman Procedure’.A multi-variable Logit model was run and three variables (Lambda1, Lambda 2 and Lambda3) were calculated to act as control for variables missed in our model. This discrimination coefficient has been calculated for two data sets using characteristics such as age, marital status, education level, province, region, professional trainings and status in the family. These characteristics have been selected after being shown significant as the determinant of wage. Natural log of wages was the dependant variable in the following regression; Table [ 1 ]: Wage Determinants – LFS 2008/09Table [ 2 ]: Wage Determinants – LFS 2010/11 Our results are much better for the data set of 2010/11. The signs of education are expected. For the data set of 2008/09, signs for education are positive which does not support theory. Even after efforts to remove multi-colinearity, they still show positive signs. Most of the variables in the regression are also insignificant. However, when we take the data for LFS 2010/11, and correct it for selectivity bias, we get much better results. Most of the variables are significant as well as show the correct signs. The same algorithm was applied to both the data sets, and the same variables have been taken). Results of Logit models for correcting selectivity bias are attached in Appendix A. Variables Used – Characteristics of Workers Summary tables from LFS 2010/11 1. Age * Theory suggests that this is one of the most important determinants of peopleâ€⠄¢s decision to work. 2. Marital Status * This variable was taken as a dummy variable in the regression. * It is a significant variable in the decision to work, especially in developing economies like Pakistan. 3. Province This is also taken as a dummy. The Baluchistan province was omitted from this analysis. However, the calculations of the Oaxaca Blinder method take this omitted variable into account. This is because the method takes the vectors of the estimated regression equation. 4. Region * Whether a person is from a Rural or urban background has impact on the opportunities and the job growth pattern. 5. Education Level * This is linked directly with the variable wage. * This is again taken as a dummy variable, and higher education was omitted from the regression. 6. Migration (Rural-Urban) Although not a very significant variable in our regression, there are other empirical studies that have shown how the migrated families have better opportunities for work than those who do not. 7. Literacy * This is a dummy variable, and is significant in our analysis. 8. Selectivity Bias Variables * These are Lambda’s in the model. And have been calculated using the Heckman Procedure for controlling selectivity bias. Results To find the discrimination coefficient a matrix exercise was done in Stata using the data from LFS 2007/08. This presented the following equation; D= Xf? m-Bf+ ? Xm-Xf D=10. 030812+-7. 4166332 D= 2. 614212 The discrimination coefficient for LFS 2010/11 was calculated as follows: D= Xm? m-Bf+ ? fXm-Xf D=0. 11964462+0. 31341527 D= 0. 43305989 Just looking at the numbers we can say that discrimination have gone down significantly over the last two years. Whether this is actually the case, or this is just due to the problems in the data, we cannot be sure. However, we think that the result for 2010/11 is a better estimate overall. The results show that women are at a significant disadvantage in Pakistan’s Labour Force. These results are quite expected.However, we also need to take the problems in data collection and measurement into account. Many of the cottage and small scale industries are not counted in the LFS and they are a prime source of employment for women in Pakistan. Discussion There are many limitations of this study. First of all this can be made more powerful if panel data is used, however, there are no sources of such data. Secondly, an easy method of expanding this study would be to do an inter year comparative study. There are more limitations that are related directly to the data that we have used.Many questions have been raised about the methodology and the authenticity of the data in Labour Force Survey of Pakistan. However, this limitation is beyond our control. There have also been questions raised about the Oaxaca-Blinder method of calculating wage discrimination. While we have attempted to review paper that have used this technique and have achieved good results, there are still many questi ons about the technique, still. There are few policy implications that we can derive from these results, especially if we look at the significance levels in the data for 2008/09.However, this paper does prove to some extent that there is a problem of gender wage discrimination is Pakistan. We can attribute a lot of this to social factors as well; women do not want to work in most professions, so we can also argue that there may be a case for discrimination by the employees rather than the employers. Bibliography Giaimo R. , Bono F. , Lo Magno G. L. â€Å"Interpreting the Decomposition of the Gender Earning Gap. † University of Palermo Journal, 2007. International Standard Industrial Classification of all Economic Activities (ISIC-Rev. 2, 1968). ILO. 2012. http://laborsta. lo. org/applv8/data/isic2e. html (accessed 2012). Javier Gardeazabal, Arantza Ugidos. â€Å"Gender Wage Discrimination at Quantiles. † Journal of Population Economics, 2005. Mats Johansson, Katarina K atz, Hakan Nyman. â€Å"Wage Differentials and Gender Discrimination: Changes in Sweden 1981-98. † Acta Sociologica, 2005. Stat. Stata. 2012. http://www. stata. com/meeting/5german/SINNING_stata_presentation. pdf. Tilak, Jandhyala B. G. â€Å"Education and Labour Market Discrimination. † Indian Journal of Industrial Relations , 1980. Appendix A Selectivity Bias Logit Regression Results: LFS 2008/09 LFS 2010/11

Saturday, September 14, 2019

Intellectual Property Right Essay

1. Do you think that the international business community is being too lax about the abuse of intellectual property right? Are international companies simply afraid to speak out for fear of jeopardizing access to attractive markets? In our opinion, the international business community is not being too lax about the abuse of intellectual property right. It is because there is a great incentive to abuse intellectual property rights since it provided legal right to the inventor of the product. Those countries are not neglecting the anti-piracy regulations and any other legal rules related to intellectual property rights but they cannot control the increase of production and distribution of counterfeit products that spread widely especially in Asian nations. Because of that, local governments of those countries are having difficulty to handle and manage the actual infringement situations. Actually, it is hard for a country that lax antipiracy rules to fight against the piracy cases since it can damage the business relations with others. We do not think that they afraid to speak out for fear of jeopardizing access to attractive markets but it is due the fact that sufficient safeguards and proper actions for piracy have not been taken so far and some areas of law need to be reinforced. Based on many cases regarding piracy, intellectual property laws and regulations are fine but poor enforcement is to blame for high rates of piracy and some nation’s regulatory body allow a counterfeiter to remove an infringing trademark and still sell the substandard goods. This proves that some countries take it lightly as they find the situation is common and they have no advantage to against it.

Friday, September 13, 2019

Blod Bank

2 Scope1 1. 3 Definitions, Acronyms, and Abbreviations1 1. 4 References1 1. 5 Overview1 2. General Description2 2. 1 Product Perspective2 2. 2 Product Functions2 2. 3 User Characteristics2 2. 4 General Constraints2 2. 5 Assumptions and Dependencies2 3. Specific Requirements2 3. 1 External Interface Requirements3 3. 1. 1 User Interfaces3 3. 1. 2 Hardware Interfaces3 3. 1. 3 Software Interfaces3 3. 2 Functional Requirements3 . 2. 1 Functional Requirement or Feature #13 3. 2. 2 Functional Requirement or Feature #23 3. 5 Non-Functional Requirements4 3. 5. 1 Performance4 3. 5. 2 Reliability4 3. 5. 3 Availability4 3. 5. 4 Security4 4. Analysis Models4 4. 1 Sequence Diagrams5 4. 3 Data Flow Diagrams (DFD)5 4. 2 State-Transition Diagrams (STD)5 1. Introduction This SRS provides requirements and proposed solution of the Blood Bank Management System used in blood banks. This software works in a Client Server environment with the server storing the data and clients connecting to the server for all types of transactions. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate, specific requirements and other supporting information. This document is intended for both the stakeholders and the developers of the system. This document is intended for developers, project coordinator, project guide, users and testers. The developer can use the document to view the analysis and design part, to understand requirements specification. The project coordinator can use this document to review the idea of project whether it is innovative and usable or not. The project guide can use this document to analyze and manage the flow of project development. The tester can use this document to get clear idea about system, to understand the exact input domain of system and to generate respective test cases for the testing purpose. 1. 1 Purpose This Software Requirements Specification provides a complete description of all the functions and specifications of the Blood bank Management System software. The purpose of this document is to present a detailed description of the Blood Bank System. This document is useful for Blood Bank employees who use this system on the daily basis. This document will also serve as a reference to incorporate any changes made in the system to the future. It will also prove to be useful to the managerial staff which is responsible for the smooth functioning of the counter transactions that are performed on daily basis. This document is primarily intended to provide a detailed specification of the functional requirements for developers of the product. It also provides an overview of the product for the users. It will explain the purpose and features of the system, what the systems do and the constraints under which it will operate. This SRS document contains the complete software requirement for Post Office Transaction System and describes the design decisions, architectural design and the detail design needed to implement the system. It provides the visibility in the design and provides information needed for software support. 1. 2 Scope This software is used by System Administrator, Supervisor, Assistant and Lab technicians. The system is designed to provide user authentication by maintaining the user database which contains all the details of user along with login details such as username and password. Each user has a different level of operation for the authentication purpose. The solution will provide a well-organized and coordinated system where the blood and donor records are managed more efficiently with better security. The major goal of the system is to provide synchronized and centralized donor and blood stock database to the blood bank. It also improves the efficiency of blood stock management by alerting the blood bank administrator. System will provides traceability of donor in case of emergency. It also provides performance evaluation using report generation. 1. 3 Definitions, Acronyms, and Abbreviations This subsection should provide the definitions of all terms, acronyms, and abbreviations required to properly interpret the SRS. This information may be provided by reference to one or more appendixes in the SRS or by reference to other documents. 1. 4 References 1. www. bharatbloodbank. com 2. www. bloodbankindia. com 1. 5 Overview This document contains a brief history and insight into the problem as well as what the system is designed to do, the scope of the solution. It gives a brief summary of whom the system is targeted at, its capabilities, and its positioning in the device development process. It also explains requirements of the system and also where exactly the user and stakeholders are placed in the scheme of things. It elaborates on security issues, hardware and software requirement and also the priorities of various functionalities. The document helps the user to understand the Blood Bank System. The first part of the document provides the purpose, objectives and scope of the proposed system. It includes important definition, the problem statement specify the needed details to avoid any kind of ambiguity from user’s perspective. The document also states the feature set and capabilities of the system. The document also highlights the feature of proposed system and the advantages over the existing system. The document also highlights the various issues, error handling and the modification to be done in the system. The document is helpful to the user as it gives them opportunities to state what they expect from the system. In addition, the hardware specification required for the system is also mentioned. The user can read the document and make sure that his machine is equipped to run the system to avoid any inconvenience The user should make use of the document to understand the system better. The rest of this document provides a full description of the project for the blood bank. It lists all the functions performed by the system. It gives the details of each of the system functions and actions in full for the software developer’s assistance. It also gives the overview of the problems currently faced by the system and provides solutions for the same. 2. General Description The project deals with the problem of automated management system that is keeping track of the actual amount of blood stock in the blood bank and to minimize human errors. The solution will provide a well-organized and coordinated system for blood bank where the blood and donor records are managed more efficiently with better security and added automation functions in alerting the administrator when the blood quantity is below par level and about the expired samples. In addition, the administrator can also trace back the donor responsible in case of reactive sample in blood transfusion and blood screening result. This system also creates a convenient and paperless environment for the blood bank in managing donors and processing blood stocks. The registration time for old donor is shortened as the records are retrievable from the system. Also the performance evaluation is possible using report generation facility. 2. 1 Product Perspective This system keep the track of all the actual amount of the blood stock in the blood bank to minimize the human errors. 2. 2 Product Functions 1. System will also maintain Blood Stock records and Discard register. 2. System will provide levels of operators for authentication purpose. 3. System will provide an authentication form where the users will fill the details. 4. System will process the request of login. 5. System will check for the entered details in the login database. 6. If the entered username and password are valid then the system will grant access to the user else will display an error message. 7. System will provide five interfaces such as Testing Interface, Blood Stock Interface, Issue Interface, Donor Registration Interface and Statistics Interface. 8. Donor Registration Interface will take all the personal and medical details of donor and generate a unique id for each donor. 9. If the donor already has an id then will retrieve its details. 10. In Testing Interface, if the results are positive then discard register is updated with sample details. 11. If the results are negative Blood Stock Repository is updated with sample details. 12. In Blood Stock Interface, system will generate unique bag numbers for each product. 13. It will generate alerts when the blood quantity is below par level and about the expired samples. 14. The System will move expired sample details to discard register and update blood stock repository. 15. In Issue Repository, system will check blood stock repository for availability. 16. If stocks are available then system will place an issue order. 7. It will generate a label which includes bag number and details of sample. 18. In Statistics analysis, system will generate various reports. 19. The whole transaction of the blood will be recorded in a system 20. The software will perform the stock management bill generation. 21. All the transaction of the blood will be updated within a small period of time. 22. The software will generate all the annual record of the blood bank.. 23. It will also maintain the record of the blood donor. 24. It will also maintain the record of the rejected blood and the rejection for the blood rejection. 2. User Characteristics The user must have the basic knowledge of the computer system. It is not necessary that the user must have the knowledge of the computer hardware. System administrator, supervisor, assistant and lab technicians. 2. 4 General Constraints * Blood bank employees ,donors 2. 5 Assumptions and Dependencies * The System will not allow any user with invalid username and invalid password. * The system should not provide administrative privilege to any customer. 3. Specific Requirements The systems should satisfy the below given requirements. 1. Operating System: Windows XP Professional 2. Database Management System (DBMS): MySQL 5. 0 3. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. 3. 1 External Interface Requirements System Interfaces The systems should satisfy the below given requirements. 4. Operating System: Windows XP Professional 5. Database Management System (DBMS): MySQL 5. 0 6. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. User Interfaces User Type| Intended Interaction| 1. DONOR REGISTRATION a. New donor b. Regular donor| * The system will take all the personal and medical details of donor and generate an unique id for the donor. * The system will take donors id as input, validate it and retrieve all its details including last donations. | 2. Administrator Login | * This login page will take input as username and password from the administrator * The system will validate the inputs and provide access to the system with more privileges to system and administrator| Testing | * This will take the input as blood group, donor id, date of collection; test carried out and its result. If the test results are positive then sample details are moved to discard register otherwise to blood stock repository. | Blood stock| * It will take all the details of the samples including blood group, its product details, date of collection, date of preparation, date of expiry, result of testing and generate a bag number. * It will generate alerts when the blood quantity is below par level and about the expired samples. * The expired sample details are moved to discard register and removed from blood stock repository. | Issue| * It will take input as product name, quantity, blood group and validate it with blood stock repository. If the stock is available then issue order will be placed. * It will generate a label which includes bag number, details of sample etc. | Statistics Display Page| * The administrator has access to this page. It displays all statistical data regarding the various issue orders placed, blood stock repository and testing screening. * Report generation. | 3. 5 Non-Functional Requirements Goal – To provide authentication to donors. Objective 1 – Create unique id for donor’s. a. Accept donor personal and medical information for new donors. b. Generate unique id for each donor. Objective 2 – Process authentication request. a. Accept donor id in case of regular donor. b. Retrieve donor’s profile. Goal – To manage Blood Stocks. Objective 1 – Process blood stock details. a. Accept product details like collection date, expiry date, blood group etc. b. Generates a unique bag number. Objective 2 – Establish connection with Issue interface and testing interface. a. Validate stock details for issue. b. Update blood stock repository after testing is negative. Goal – To generate reports and label. Objective 1 – To generate report. a. Generate product statistics b. Generate yearly, monthly reports and provide it to the administrator. Objective 1 – To generate labels for issue. a. Generate labels for the issue order placed. b. Provide it to the customer along with the date of delivery 3. 5 Non-Functional Requirements 7. 1. 1 Availability * For the customers, the services available are: Registration as a donor, placement of issue order. * For the administrator, the services available are: Manipulation of databases, change the functionalities provided by the system and monthly and yearly reports generation. . 1. 2 Security * This system maintains consistency and security as the blood stock details can’t be modified by the administrator or the other user. The system analyses the issue order placed by the customer and accordingly fulfills it. The system will also provide authentication by using username and password. * The donor’s database will have its own security to prevent unauthorized write/de lete access. The donor’s details will not be disclosed while issuing. 3. 8 Logical Database Requirements The databases used by the system are * Donor database Blood stock database * Discard database * Account database User database: The purpose of this database is to store the required information of the donors and their id’s. This database will be used for traceability of donor. The donors will fill their information while registration. Their credentials will be saved in this particular database. Blood Stock database: This database is used to maintain blood stock information. It maintains the details of valid samples. Discard database: This database is used to store details of blood samples which have to be discarded. This will contain information of expired samples and those samples which reacted positively in testing screening. Accounts database: The purpose of this database is to store the account details regarding issue of blood sample and to maintain the history of all the previous transactions. This database will be used by the administrator so that he can calculate the total cost of the issue orders placed. Accessing capabilities: 1. Only administrator can set the role of users and their access capabilities 2. No user can access anything outside its accessing capability . Blod Bank 2 Scope1 1. 3 Definitions, Acronyms, and Abbreviations1 1. 4 References1 1. 5 Overview1 2. General Description2 2. 1 Product Perspective2 2. 2 Product Functions2 2. 3 User Characteristics2 2. 4 General Constraints2 2. 5 Assumptions and Dependencies2 3. Specific Requirements2 3. 1 External Interface Requirements3 3. 1. 1 User Interfaces3 3. 1. 2 Hardware Interfaces3 3. 1. 3 Software Interfaces3 3. 2 Functional Requirements3 . 2. 1 Functional Requirement or Feature #13 3. 2. 2 Functional Requirement or Feature #23 3. 5 Non-Functional Requirements4 3. 5. 1 Performance4 3. 5. 2 Reliability4 3. 5. 3 Availability4 3. 5. 4 Security4 4. Analysis Models4 4. 1 Sequence Diagrams5 4. 3 Data Flow Diagrams (DFD)5 4. 2 State-Transition Diagrams (STD)5 1. Introduction This SRS provides requirements and proposed solution of the Blood Bank Management System used in blood banks. This software works in a Client Server environment with the server storing the data and clients connecting to the server for all types of transactions. It will explain the purpose and features of the system, the interfaces of the system, what the system will do, the constraints under which it must operate, specific requirements and other supporting information. This document is intended for both the stakeholders and the developers of the system. This document is intended for developers, project coordinator, project guide, users and testers. The developer can use the document to view the analysis and design part, to understand requirements specification. The project coordinator can use this document to review the idea of project whether it is innovative and usable or not. The project guide can use this document to analyze and manage the flow of project development. The tester can use this document to get clear idea about system, to understand the exact input domain of system and to generate respective test cases for the testing purpose. 1. 1 Purpose This Software Requirements Specification provides a complete description of all the functions and specifications of the Blood bank Management System software. The purpose of this document is to present a detailed description of the Blood Bank System. This document is useful for Blood Bank employees who use this system on the daily basis. This document will also serve as a reference to incorporate any changes made in the system to the future. It will also prove to be useful to the managerial staff which is responsible for the smooth functioning of the counter transactions that are performed on daily basis. This document is primarily intended to provide a detailed specification of the functional requirements for developers of the product. It also provides an overview of the product for the users. It will explain the purpose and features of the system, what the systems do and the constraints under which it will operate. This SRS document contains the complete software requirement for Post Office Transaction System and describes the design decisions, architectural design and the detail design needed to implement the system. It provides the visibility in the design and provides information needed for software support. 1. 2 Scope This software is used by System Administrator, Supervisor, Assistant and Lab technicians. The system is designed to provide user authentication by maintaining the user database which contains all the details of user along with login details such as username and password. Each user has a different level of operation for the authentication purpose. The solution will provide a well-organized and coordinated system where the blood and donor records are managed more efficiently with better security. The major goal of the system is to provide synchronized and centralized donor and blood stock database to the blood bank. It also improves the efficiency of blood stock management by alerting the blood bank administrator. System will provides traceability of donor in case of emergency. It also provides performance evaluation using report generation. 1. 3 Definitions, Acronyms, and Abbreviations This subsection should provide the definitions of all terms, acronyms, and abbreviations required to properly interpret the SRS. This information may be provided by reference to one or more appendixes in the SRS or by reference to other documents. 1. 4 References 1. www. bharatbloodbank. com 2. www. bloodbankindia. com 1. 5 Overview This document contains a brief history and insight into the problem as well as what the system is designed to do, the scope of the solution. It gives a brief summary of whom the system is targeted at, its capabilities, and its positioning in the device development process. It also explains requirements of the system and also where exactly the user and stakeholders are placed in the scheme of things. It elaborates on security issues, hardware and software requirement and also the priorities of various functionalities. The document helps the user to understand the Blood Bank System. The first part of the document provides the purpose, objectives and scope of the proposed system. It includes important definition, the problem statement specify the needed details to avoid any kind of ambiguity from user’s perspective. The document also states the feature set and capabilities of the system. The document also highlights the feature of proposed system and the advantages over the existing system. The document also highlights the various issues, error handling and the modification to be done in the system. The document is helpful to the user as it gives them opportunities to state what they expect from the system. In addition, the hardware specification required for the system is also mentioned. The user can read the document and make sure that his machine is equipped to run the system to avoid any inconvenience The user should make use of the document to understand the system better. The rest of this document provides a full description of the project for the blood bank. It lists all the functions performed by the system. It gives the details of each of the system functions and actions in full for the software developer’s assistance. It also gives the overview of the problems currently faced by the system and provides solutions for the same. 2. General Description The project deals with the problem of automated management system that is keeping track of the actual amount of blood stock in the blood bank and to minimize human errors. The solution will provide a well-organized and coordinated system for blood bank where the blood and donor records are managed more efficiently with better security and added automation functions in alerting the administrator when the blood quantity is below par level and about the expired samples. In addition, the administrator can also trace back the donor responsible in case of reactive sample in blood transfusion and blood screening result. This system also creates a convenient and paperless environment for the blood bank in managing donors and processing blood stocks. The registration time for old donor is shortened as the records are retrievable from the system. Also the performance evaluation is possible using report generation facility. 2. 1 Product Perspective This system keep the track of all the actual amount of the blood stock in the blood bank to minimize the human errors. 2. 2 Product Functions 1. System will also maintain Blood Stock records and Discard register. 2. System will provide levels of operators for authentication purpose. 3. System will provide an authentication form where the users will fill the details. 4. System will process the request of login. 5. System will check for the entered details in the login database. 6. If the entered username and password are valid then the system will grant access to the user else will display an error message. 7. System will provide five interfaces such as Testing Interface, Blood Stock Interface, Issue Interface, Donor Registration Interface and Statistics Interface. 8. Donor Registration Interface will take all the personal and medical details of donor and generate a unique id for each donor. 9. If the donor already has an id then will retrieve its details. 10. In Testing Interface, if the results are positive then discard register is updated with sample details. 11. If the results are negative Blood Stock Repository is updated with sample details. 12. In Blood Stock Interface, system will generate unique bag numbers for each product. 13. It will generate alerts when the blood quantity is below par level and about the expired samples. 14. The System will move expired sample details to discard register and update blood stock repository. 15. In Issue Repository, system will check blood stock repository for availability. 16. If stocks are available then system will place an issue order. 7. It will generate a label which includes bag number and details of sample. 18. In Statistics analysis, system will generate various reports. 19. The whole transaction of the blood will be recorded in a system 20. The software will perform the stock management bill generation. 21. All the transaction of the blood will be updated within a small period of time. 22. The software will generate all the annual record of the blood bank.. 23. It will also maintain the record of the blood donor. 24. It will also maintain the record of the rejected blood and the rejection for the blood rejection. 2. User Characteristics The user must have the basic knowledge of the computer system. It is not necessary that the user must have the knowledge of the computer hardware. System administrator, supervisor, assistant and lab technicians. 2. 4 General Constraints * Blood bank employees ,donors 2. 5 Assumptions and Dependencies * The System will not allow any user with invalid username and invalid password. * The system should not provide administrative privilege to any customer. 3. Specific Requirements The systems should satisfy the below given requirements. 1. Operating System: Windows XP Professional 2. Database Management System (DBMS): MySQL 5. 0 3. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. 3. 1 External Interface Requirements System Interfaces The systems should satisfy the below given requirements. 4. Operating System: Windows XP Professional 5. Database Management System (DBMS): MySQL 5. 0 6. Peer to peer connection. This can be done by connecting both the systems using a cross cable and giving different IP addresses to them. User Interfaces User Type| Intended Interaction| 1. DONOR REGISTRATION a. New donor b. Regular donor| * The system will take all the personal and medical details of donor and generate an unique id for the donor. * The system will take donors id as input, validate it and retrieve all its details including last donations. | 2. Administrator Login | * This login page will take input as username and password from the administrator * The system will validate the inputs and provide access to the system with more privileges to system and administrator| Testing | * This will take the input as blood group, donor id, date of collection; test carried out and its result. If the test results are positive then sample details are moved to discard register otherwise to blood stock repository. | Blood stock| * It will take all the details of the samples including blood group, its product details, date of collection, date of preparation, date of expiry, result of testing and generate a bag number. * It will generate alerts when the blood quantity is below par level and about the expired samples. * The expired sample details are moved to discard register and removed from blood stock repository. | Issue| * It will take input as product name, quantity, blood group and validate it with blood stock repository. If the stock is available then issue order will be placed. * It will generate a label which includes bag number, details of sample etc. | Statistics Display Page| * The administrator has access to this page. It displays all statistical data regarding the various issue orders placed, blood stock repository and testing screening. * Report generation. | 3. 5 Non-Functional Requirements Goal – To provide authentication to donors. Objective 1 – Create unique id for donor’s. a. Accept donor personal and medical information for new donors. b. Generate unique id for each donor. Objective 2 – Process authentication request. a. Accept donor id in case of regular donor. b. Retrieve donor’s profile. Goal – To manage Blood Stocks. Objective 1 – Process blood stock details. a. Accept product details like collection date, expiry date, blood group etc. b. Generates a unique bag number. Objective 2 – Establish connection with Issue interface and testing interface. a. Validate stock details for issue. b. Update blood stock repository after testing is negative. Goal – To generate reports and label. Objective 1 – To generate report. a. Generate product statistics b. Generate yearly, monthly reports and provide it to the administrator. Objective 1 – To generate labels for issue. a. Generate labels for the issue order placed. b. Provide it to the customer along with the date of delivery 3. 5 Non-Functional Requirements 7. 1. 1 Availability * For the customers, the services available are: Registration as a donor, placement of issue order. * For the administrator, the services available are: Manipulation of databases, change the functionalities provided by the system and monthly and yearly reports generation. . 1. 2 Security * This system maintains consistency and security as the blood stock details can’t be modified by the administrator or the other user. The system analyses the issue order placed by the customer and accordingly fulfills it. The system will also provide authentication by using username and password. * The donor’s database will have its own security to prevent unauthorized write/de lete access. The donor’s details will not be disclosed while issuing. 3. 8 Logical Database Requirements The databases used by the system are * Donor database Blood stock database * Discard database * Account database User database: The purpose of this database is to store the required information of the donors and their id’s. This database will be used for traceability of donor. The donors will fill their information while registration. Their credentials will be saved in this particular database. Blood Stock database: This database is used to maintain blood stock information. It maintains the details of valid samples. Discard database: This database is used to store details of blood samples which have to be discarded. This will contain information of expired samples and those samples which reacted positively in testing screening. Accounts database: The purpose of this database is to store the account details regarding issue of blood sample and to maintain the history of all the previous transactions. This database will be used by the administrator so that he can calculate the total cost of the issue orders placed. Accessing capabilities: 1. Only administrator can set the role of users and their access capabilities 2. No user can access anything outside its accessing capability .