Wednesday, November 27, 2019

Problems And Preventions Of Ebola And AIDS Essays - Ebola, RTT

Problems and Prevention's of Ebola and AIDS Research Paper #4 Thursday, April 18, 1996 Viruses have become of great concern all across the world in the last few decades. The most common and the most talked about killer virus is AIDS, a virus that starts out as HIV and then proceeds to develop into a immune breaker that ultimately kills its human host. So far, there is no cure for AIDS, and most unfortunately the numbers of deaths from AIDS only continues to grow. However, another virus has gained much public and national attention. That virus is called Ebola. It is thought that Ebola's effect on humans is restricted to Zaire, Africa. Viruses that kill people in large masses is a major threat to mankind; the only hopes of destroying the viruses is dependant upon technology. AIDS is a deadly disease that most people understand as a sexually transmitted disease. In fact, the virus can be transmitted sexually, but it can also be transmitted through blood transfusions. The fact that it can be transmitted sexually causes a great problem. Everyday, enormous amounts of people have sex--some people with different partners. People may have less sex than before because of the threat that the virus poses, but it has already started, and cannot be stopped until a cure is found. Unlike Ebola, AIDS was not detected as early as one would have hoped. The AIDS virus can stay dormant for over a decade before it is noticed as a real problem (Shenon 8). During that decade, the virus can spread like a wild fire. One person contracts the virus, transmits it to another, and another, and so on. As Shenon explains, AIDS became recognized as a real problem in the early seventies and was mostly concentrated in the United States and in Africa, but surprisingly it reached Asia a decade afterward. He goes on to explain that AIDS has spread exponentially in Asia. Thailand, recognized for its proliferation of prostitutes and illegal promotion of sex with children, could be held responsible for the tremendous outbreak of the virus in Asia, explains Shenon. He also points out that now that the virus has already broken out, Asia has the best AIDS prevention agenda in the world (8). For now the best prevention of AIDS that is available is education and protected sex. Until a cure is found for the ruthless virus, this is the only means of prevention that is available to the public. Ebola is one of the most rapidly fatal viruses on the planet and is believed to have begun somewhere in Zaire, Africa (Altman 3). There is no positive explanation as to how the virus is spread. When the virus is contracted by humans it causes hemorrhagic fevers and becomes extremely transmittable (A Case of Deadly Virus 4). Like the AIDS virus, Ebola has no cure. The only advantage of prevention that Ebola has over AIDS is that it does not stay dormant for decades therefore, it can be isolated much quicker. Being able to isolate the virus in one town or country makes the termination of it much easier. It seems inevitable that the two most deadly viruses in the world are contracted by the idea of self preservation. As stated earlier, AIDS is transmitted sexually, and Ebola is widely spread through the consumption of chimpanzee meat that is a common delicacy in Asia (A Case of Deadly Virus 4). Just as sex is an act that is very widespread all around the world, eating chimpanzee meat in Asia is som ething that is very common. It is very hard to stop the spread of a disease when it is spread by something that seems "second nature" to a person. The action that probably ultimately stopped the virus from spreading to neighboring countries is the fact that the CDC (Center for Disease Control) and the WHO (World Health Organization) were prompt to go the scenes of outbreak and begin studying the virus (A Case of Deadly Virus 4). When just one man became infected with the disease in the western Ivory Coast, the WHO were on the case to examine the problem (A Case of Deadly Virus 4). Unfortunately, the people that are trying to stop the spread of the virus and those who are close with the victims are those people that have the greatest chance of being infected (Altman 3). After a great deal of studying the ways that the virus is spread, it became evident that there are other ways to become

Saturday, November 23, 2019

Age of Majority in Canada

Age of Majority in Canada The age of majority in Canada is the age at which a person is considered by law to be an adult. A person younger than the age of majority is considered a minor child. The age of majority in Canada is determined by each province and territory in Canada and varies between the ages of 18 and 19. At the age of majority, the responsibility of parents, guardians, or child protective services generally ends. However, child support is determined by the court or agreement for each case and therefore may continue past the age of majority. Upon reaching the age of majority, the new adult now has the right to vote. Other rights may be achieved at younger ages, while some are reserved for ages past the age of majority. Age of Majority by Province or Territory in Canada The age of majority in the individual provinces and territories of Canada is as follows: Alberta:  18British Columbia:  19Manitoba:  18New Brunswick:  19Newfoundland and Labrador:  19Northwest Territories: 19Nova Scotia:  19Nunavut:  19Ontario: 18Prince Edward Island:  18Quebec:  18Saskatchewan:  18Yukon Territory: 19 Legal Age in Canada The legal age is set for various rights and activities and is also known as the age of license. It may or may not match the age of majority in a province or territory. Even when it does, there may be other conditions such as mental capacity that can restrict some individuals.  Legal ages also often  differ as to whether the individual needs the consent of a parent or guardian or not for an activity. It is important to check the laws and regulations of each jurisdiction to find the applicable legal age for an activity. Because the age of majority varies between 18 and 19, nationwide programs such as sweepstakes often limit entry to age 19 for consistency. Criminal responsibility begins at age 12 in Canada, with individuals protected by the Youth Criminal Justice Act until age 17. By age 14, a youth could be sentenced as an adult. The right to work begins at age 12, with the consent of a parent or guardian. At age 15, the individual can work without the need for consent. However, a person is not entitled to a full minimum wage until age 18. Joining the armed forces is allowed with parental consent at age 17 and without consent at age 19. The legal age is as low as 12 for the right of consent for being adopted, working with the consent of parent or guardian, or name changes with permission of the parent or guardian. Age of Consent for Sexual Activity in Canada The general age of consent in Canada in 16. However, there are exemptions for close-in-age sexual activity, which depend on the age of the younger partner. At age 12 and 13, an individual can consent to activity with a person no more than two years older. At age 14 and 15, a person may consent to activity with another person less than five years older.

Thursday, November 21, 2019

Discuss critically distinctions between Islamic finance regulation and Essay

Discuss critically distinctions between Islamic finance regulation and conventional financing of commercial credit - Essay Example Islamic financing was first introduced in the UK in 1990 and has since developed to such an extent that the UK hosts the largest share of Islamic assets (valued at US$18 billion) among all Western countries and is eight worldwide.6 As of 2008, there were five â€Å"stand-alone† Islamic banks in the UK and more than 20 conventional banks offering Islamic products.7 This paper provides a critical analysis of the distinctions between Islamic finance regulation and conventional financing of commercial credit. The modernized form of Islamic finance began in Egypt during 1963 when the Mitt Ghamr savings system was introduced as a â€Å"social banking initiative†.8 By 1975 the first commercial Islamic banks were established: Islamic Development Bank and the Dubai Islamic Bank. The Islamic banking sector grew at a steady pace and by the 1990s there was a growing demand for Islamic financial products in investments and loans. In more recent years, the growth in demand and supply of Islamic financial products has been more expansive. Between 2006 and 2008, Islamic financial assets experienced a growth rate of 30%. As a result, Sharia compliant banking products have been described as the worlds â€Å"fastest growing financial sector†.9 There are at least 614 â€Å"registered Islamic finance institutions† in 47 countries with Islamic assets increasing from US$150 billion during the 1990s to approximately US$700 billion by 2007.10 The growth and expansion of Islamic banking and financial products have been impressive. Holden reports that over the last thirty years or so, Muslims all over the world have demonstrated a propensity for withdrawing billions of dollars from conventional banking systems and transferring them to Islamic banking and financial systems. In addition, conventional banks have shown an increasing willingness to offer Islamic banking and financial products and services.11 Islamic banking is defined as a â€Å"system of

Wednesday, November 20, 2019

Talent Management Strategy Term Paper Example | Topics and Well Written Essays - 1500 words

Talent Management Strategy - Term Paper Example Conversely, it is through courtesy of proper talent management strategies that organizations have sprang from small corporate fledglings, to reputable multinationals. The blueprints of proper talent management may be seen in the ensuing discourse. Introduction The organization in point is a profit-making business entity which deals in food and beverages. The organization is still in the process of growth and development as it comprises 200 employees, of which 20 are identified as leaders and may be called Swift Foods Ltd. In itself, talent management denotes the anticipation of essential human capital that an organization may need at a given time, then setting a plan and then carrying out that that plan to meet organizational needs. So sacrosanct is talent management in aiming at specific performance target that it has become the science of employing strategic human resources [HR] to strengthen organizational value and to help the organization reach its value. Determining the Key Com ponents of Talent Management, Including Identifying, Assessing, and Developing Talent There are several components of talent management. The first component involves identification. ... Apart from academic credentials, Swift Foods Ltd may use overall individual performance of the potential recruit in the interview, experience and letters of recommendation, among others. Academic credentials for instance will help Swift Foods Ltd ascertain formal skills and expertise an individual candidate possesses, in light of the office to be filled, while experience will help the organization determine the degree of the candidate's ability to perform. Testimonials for instance will help ascertain the behavioral predisposition that a given candidate possesses, in relation to the role that he is to discharge. All these factors will be important in identifying talent since talent is an element compounded by other desirable attributes such as personal traits, skills and abilities. The second component of talent management is the assessment of talent. This involves, setting performance target for an employee and then analyzing his actual performance against the already-set target. It is from this juncture that measures may be taken to uphold and enhance the talent that is extant and to inculcate upon the employee, new talents that are desired in the organization. To develop talent, there are several strategies and approaches that may successfully apply. Swift Foods Ltd can use the compensation management system, where it maintains competitive remunerations while managing payroll costs, total compensation, compensation for planning and awarding and pay-for-performance arrangements. Going by the recommendations that Fayol (2010) makes, the organization can also use global human resources that help maintain and manage core elements of the global workforce- county-specific attributes also included. Swift Foods Ltd may

Sunday, November 17, 2019

Feminism and Vogue Cover Essay Example for Free

Feminism and Vogue Cover Essay 1. Theories * Concept of gender * Before 1970s: No concept of Gender * 1970s: Concept of Gender over determinism * 1990s: Diversity of Sex * Sexual desire is not natural instinct but product of society language (for example the re-production, instinct,..) * The society code of desire * â€Å"Feminist argue that media images of women are always directed at men and that women are encouraged to look at themselves and the other women the way men do† (Betty Friedan, 1963) * â€Å"Masculine Standards† are forced on women and used to evaluate women. * The nature and extent of hegemonic towards clothing and fashion * The magazine’s conceptions of women’s roles as expressed in its fashion photography fit a model of conflicted hegemony characteristic of American media and popular culture. * Fashion photographs generate enormous dissatisfaction among women because they create unrealistic expectation that most women are unable to break. * Fashion is a form of hegemonic oppression  an obligation weigh heavily on female 2. Analysis: Cultural Context * Cultural context Hegemonic and the power of fashion and clothing are expressed by choosing an influencing top singer Rihanna – the World’s sexiest woman according to Esquire magazine (2011) * Affect strongly to readers/buyers. It influents readers to follow the trend. * Overview Beautiful model Super make-up Beautiful/trendy dress Tone red-hot Simple color: focusing on the model * Detailed view: Posture: leaning away posture of the body, only show the face straight (intentionally turning her body inside) - raise the curiosity, create  the attractiveness, and hide away the imperfect part of her body. Make-up: extra make up especially focus on the lips (notice that Rihanna has beautiful full lips) (focus on the beautiful point of the model to gain attraction), also create the red hot ton-sur-ton with the dress. Clothes: tight to the body, show all the body line Show a lot of naked parts of the body, especially the sexy parts of a woman’s body (half of her breast and legs are showed) Action: pulling up her dress a little bit - sexually attractiveness is showed. (This could be understood that because the masculine standard is forced on women, therefore women found this is attractive. Only men want to see sexual poses and women are target, women are the physical attributor of sexuality) Masculine standard: short hair, strong facial expression, tattoo on the shoulder. Wild background (outside) Color: simple colors. Simple colors show mature. Only focus on red and the background’s color which is, somehow in the same tone color with the eyes - emphasize the focus to Rihanna’s eyes Stereotype: There are 2 stereotype facial expressions of the model on magazine cover 1. Exaggerated manner of smiling 2. Vacant gaze, directed at an unseen object. * These stereotypes of facial expression represent the subject is passive, alienated and not in control of the situation. * Because in this magazine cover, the facial expression is the 2nd type so they make the focus on the eyes. *Moreover, the lips of the model are a little bit open which shows sexual desire and insecure feeling. Headlines: The headline is the biggest and on top because it caused attention and Vogue is considered to be the most famous magazine about fashion - women get attracted by the name and will want to buy. Tittles: in white and only the main focus to attract women are in large font. What attract women? See the largest title under Rihanna’s name: I love to have fun. When this tittle is located in the sexy hot picture, ‘have fun’ sounds sexually. And that’s why it attracts women. * Women also want to have fun in ‘sex’ because it is always considered that man is the subject and woman is the object in sex so women  want to find joy of the other way around OR it can also be understood that women have the masculine standard force on them so they want to see what man want to see. Survey: What is the first thing that drags your attention when you look at the cover of this magazine (Vogue cover November 2012) * Although it is a woman magazine but focus on what man want, not what woman want. How magazine affects: The thinking that girls with big breast and small belly and long legs and full lips,†¦.are the beautiful girls comes from the media, actually the magazine’s concept. Beauty concept or sexual desire as well are all because if the society Sadism Cover Girls * What is Sadism? How is it represented in society? Sadism refers to the pleasures received by infliction of pain and suffering on another person for reasons of sexuality. Sadists paly a dominant role and get contentment by observing the masochist suffer. This caused by arousing incidents of sexual satisfaction and is represented through forms of sexual role play. Such examples including master and slave or teacher and student relationships * How Vogue creates a sadistic impression on its readers? Components that determine sadism. 1. Title â€Å"I love to have fun† sexually explicit headline. 2. Cover story is based on Rihanna, a sex symbol   3. The theme â€Å"Red Hot† sounds more sexually explicit in tone 4. Rihanna`s dress is revealing, pulling her dress up and strapless top 5. Rihanna`s pose is very sexual, her face shows emptiness and desire on her face * In the covers impress the sadistic pressure of people? 1. No need of help in mastering love moves that women can resist Since, the cover represents a girl that is beyond reach in real life, it completes the fantasy. This would help the men create confidence in them and be aroused into mastering love moves. 2. It doesnt create an intention but to help a man feel less guilty. It is fantasy and does not exist in real life. This helps men feel less guilty about their sexual fantasies 3. Women take satisfaction, parading all manner of fineries (clothes, furniture, travel destinations) that a successful woman might buy, or at least admire. While it surely exists to sell ads, t does remarkably well in exploiting ambition, and creating insecurity.

Friday, November 15, 2019

Types of Tonsillitis: An Overview of Causes and Treatments

Types of Tonsillitis: An Overview of Causes and Treatments There are 2 main types of tonsillitis: acute and chronic. Acute tonsillitis can either be bacterial or viral in origin. Subacute tonsillitis is caused by the bacterium Actinomyces. Chronic tonsillitis can last for long periods of time if not treated, and is mostly caused by bacterial infection. Symptoms of tonsillitis include a severe sore throat, (which may be experienced as referred pain to the ears), painful/difficult swallowing, coughing, headache, myalgia (muscle aches), fever and chills. Tonsillitis is characterized by signs of red, swollen tonsils which may have a purulent exudative coating of white patches (i.e. pus). Swelling of the eyes, face, and neck may occur. In some cases, symptoms of tonsillitis may be confused with symptoms for EBV infectious mononucleosis, known colloquially as mono(US) or Glandular Fever (elsewhere). Common symptoms of Glandular Fever include fatigue, loss of appetite, an enlarged spleen, enlarged lymph nodes, and a severe sore throat, sometimes accompanied by exudative patches of pus. It is also important to understand that symptoms will be experienced differently for each person. Cases that are caused by bacteria are often followed by skin rash and a flushed face. Tonsillitis that is caused by a virus will develop symptoms that are flu-like such as runny nose or aches and pains throughout the body. Even though the infection will not cure immediately, tonsillitis symptoms usually improve 2 or 3 days after treatment starts. Acute tonsillitis is caused by both bacteria and viruses and will be accompanied by symptoms of ear pain when swallowing, bad breath, and drooling along with sore throat and fever. In this case, the surface of the tonsil may be bright red or have a grayish-white coating, while the lymph nodes in the neck may be swollen. The most common form of acute tonsillitis is strep throat, which can be followed by symptoms of skin rash, pneumonia, and ear infection. This particular strand of tonsillitis can lead to damage to the heart valves and kidneys if not treated. Extreme tiredness and malaise are also experienced with this condition with the enlargement of the lymph nodes and adenoids. Chronic tonsillitis is a persistent infection in the tonsils. Since this infection is repetitive, crypts or pockets can form in the tonsils where bacteria can store. Frequently, small, foul smelling stones (tonsilloliths) are found within these crypts that are made of high quantities of sulfur. These stones cause a symptom of a full throat or a throat that has something caught in the back. A foul breath that is characterized by the smell of rotten eggs (because of the sulfur) is also a symptom of this condition. Other symptoms that can be caused by tonsillitis that are not normally associated with it include snoring and disturbed sleep patterns. These conditions develop as the tonsils enlarge and begin to obstruct other areas of the throat. A persons voice is generally affected by this type of illness and changes in the tone of voice a person normally has. While a person may only become hoarse, it is possible for laryngitis to develop if the throat is used too much while the tonsils are swollen or inflamed. Other uncommon symptoms that can be experienced with tonsillitis include vomiting, constipation, a tongue that feels furry or fuzzy, difficulty opening the mouth, headaches and a feeling of dry or cotton mouth. Causes Under normal circumstances, as viruses and bacteria enter the body through the nose and mouth, they are filtered in the tonsils. The tonsils work by surrounding them with white blood cells which causes the body to develop a fever that can become extremely high in children. Should the infection become serious, the tonsils will inflame and become painful. The infection may also be present in the throat and surrounding areas, causing inflammation of the pharynx. [2] This is the area in the back of the throat that lies between the voice box and the tonsils. Tonsillitis may be caused by Group A streptococcal bacteria, resulting in strep throat. Viral tonsillitis may be caused by numerous viruses such as the Epstein-Barr virus (the cause of infectious mononucleosis) or adenovirus. Sometimes, tonsillitis is caused by a infection of spirochaeta and treponema, in this case called Vincents angina or Plaut-Vincent angina.[5] Although tonsillitis is associated with infection, it is currently unknown whether the swelling and other symptoms are caused by the infectious agents themselves, or by the host immune response to these agents. Tonsillitis may be a result of aberrant immune responses to the normal bacterial flora of the nasopharynx. The viruses that cause tonsillitis are often the ones that frequently affect the respiratory system or breathing. Most cases are caused by a virus and will only require treatment of sore throat remedies that can be bought over the counter. Bacteria-caused tonsillitis, however, is treated with prescribed antibiotic medication to reduce the risk for further complications. Tonsillitis most often affects children whose tonsils are responsible for fighting infections. This is also true because as we age, our tonsils become less active. Rare cases have been diagnosed with fungi or parasites being the cause. This generally takes place in persons with weakened immune systems. There is no research to state that smoking cigarettes causes tonsillitis, however it is widely accepted that smoking weakens the immune system. Also, children and adults who live in a smoke-prone environment may be exposed to factors that could result in a tonsillectomy. Treatment Treatments of tonsillitis consist of pain management medications and lozenges. If the tonsillitis is caused by bacteria, then antibiotics are prescribed, with penicillin being most commonly used. Erythromycin and Clarithromycin are used for patients allergic to penicillin. In many cases of tonsillitis, the pain caused by the inflamed tonsils warrants the prescription of topical anesthetics for temporary relief. Viscous lidocaine solutions are often prescribed for this purpose, and anaesthetic throat lozenges containing benzocaine, lignocaine, benzydamine and flubiprofen are widely avaliable without prescription. Ibuprofen or other analgesics such as aspirin or paracetamol can help to decrease the edema and inflammation, which will ease the pain and allow the patient to swallow liquids sooner.[6] When tonsillitis is caused by a virus, the length of illness depends on which virus is involved. Usually, a complete recovery is made within one week; however, some rare infections may last for up to two weeks. Chronic cases may indicate tonsillectomy (surgical removal of tonsils) as a choice for treatment. Additionally, gargling with a solution of warm water and salt may reduce pain and swelling. If you are suffering from tonsilloliths (Tonsil stones) try to avoid dairy products like milk, ice cream, yogurt etc. Complications An abscess may develop lateral to the tonsil during an infection, typically several days after the onset of tonsillitis. This is termed a peritonsillar abscess (or quinsy). Rarely, the infection may spread beyond the tonsil resulting in inflammation and infection of the internal jugular vein giving rise to a spreading septicaemia infection (Lemierres syndrome). In chronic/recurrent cases (generally defined as seven episodes of tonsillitis in the preceding year, five episodes in each of the preceding two years or three episodes in each of the preceding three years), or in acute cases where the palatine tonsils become so swollen that swallowing is impaired, a tonsillectomy can be performed to remove the tonsils. Patients whose tonsils have been removed are certainly still protected from infection by the rest of their immune system. Bacteria feeding on mucus which accumulates in pits (referred to as crypts) in the tonsils may produce whitish-yellow deposits known as tonsilloliths. These may emit an odour due to the presence of volatile sulfur compounds. Hypertrophy of the tonsils can result in snoring, mouth breathing, disturbed sleep, and obstructive sleep apnea, during which the patient stops breathing and experiences a drop in the oxygen content in the bloodstream. A tonsillectomy can be curative. In very rare cases, diseases like rheumatic fever or glomerulonephritis can occur. These complications are extremely rare in developed nations but remain a significant problem in poorer nations Bronchitis Bronchitis is an obstructive respiratory disease that may occur in both acute and chronic forms. Acute bronchitis: Inflammation of the bronchial passages most commonly caused by infection with bacteria or viruses. Acute bronchitis is generally a self-limiting condition in healthy individuals but can have much more severe consequences in individuals who are weakened with other illness or who are immunocompromised. Symptoms of acute bronchitis often include productive cough, dyspnea and possible fever. Chronic bronchitis: Chronic bronchitis is a chronic obstructive pulmonary disease that is most frequently associated with cigarette smoking (approximately 90% of cases). Chronic bronchitis may also be caused by prolonged exposure to inhaled particulates such as coal dust or other pollutants. The disease is characterized by excess mucus production in the lower respiratory tract. This mucus accumulation can impair function of the ciliated epithelium and lining of the respiratory tract and prevent the clearing of debris and organisms. As a result, patients with chronic bronchitis often suffer repeated bouts of respiratory infection. Chronic bronchitis sufferers are often referred to as blue bloaters as a result of the cyanosis and peripheral edema that is often present. Manifestations of chronic bronchitis Productive, chronic cough Production of purulent sputum Frequent respiratory infections Dyspnea Hypoxia, cyanosis Symptoms of cor pulmonale Fluid accumulation in later stages Treatment of chronic bronchitis Cessation of smoking or exposure to irritants Bronchodilators to open airway passages Expectorants to loosen mucus Anti-inflammatories to relieve airway inflammation and reduce mucus secretion Prophylactic antibiotics for respiratory infections Oxygen therapy Bronchial asthma Asthma is a condition characterized by reversible bronchospasm and chronic inflammation of airway passages. The incidence of asthma has been steadily increasing in recent years. Although the exact etiology is still uncertain, there appears to be a definite genetic predisposition to the development of asthma. A key component of asthma appears to be airway hyper reactivity in affected individuals. Exposure to certain triggers can induce marked bronchospasm and airway inflammation in susceptible patients. Individuals with asthma appear to produce large amounts of the antibody IgE that attach to the mast cells present in many tissues. Exposure to a trigger such as pollen will result in the allergen-binding mast cell-bound IgE, which in turn causes the release of inflammatory mediators such as histamine, leukotrienes and eosinophilic chemotactic factor. Some Potential Asthma Triggers Allergens Pollen, pet dander, fungi, dust mites Cold air Pollutants Cigarette smoke Strong emotions Exercise Respiratory tract infections Clinical Classification of Asthma Mild intermittent Attacks occur 2 times per week or less Mild persistent Attacks occur more than 2 times per week Moderate persistent Attacks occur daily or almost daily and are severe enough to affect activity Severe persistent Attacks are very frequent and persist for a long period of time; attacks severely limit activity The response of a patient with asthma to these triggers can be divided into an early phase and a late phase. Early phase of asthma: The early phase of asthma is characterized by marked constriction of bronchial airways and bronchospasm that is accompanied by edema of the airways and the production of excess mucus. The bronchospasm that occurs may be the result of the increased release of certain inflammatory mediators such as histamine, prostaglandins and bradykinin that, in the early stages of asthmatic response, promote bronchoconstriction rather than inflammation. Late phase of asthma: The late phase of asthma can occur several hours after the initial onset of symptoms and manifests mainly as an inflammatory response. The primary mediators of inflammation during the asthmatic response are the white blood cells eosinophils that stimulate mast cell degranulation and release substances that attract other white cells to the area. Subsequent infiltration of the airway tissues with white blood cells such as neutrophils and lymphocytes also contributes to the overall inflammatory response of the late phase of asthma. Manifestations of asthma Coughing, wheezing Difficulty breathing Rapid, shallow breathing Increased respiratory rate Excess mucus production Barrel chest due to trapping of air in the lungs Significant anxiety Staging of the Severity of an Acute Asthma Attack Stage I (mild) Mild dyspnea Diffuse wheezing Adequate air exchange Stage II (moderate) Respiratory distress at rest Marked wheezing Stage III (severe) Marked respiratory distress Cyanosis Marked wheezing or absence of breath sounds Stage IV (respiratory failure) Severe respiratory distress, lethargy, confusion, prominent pulsus paradoxus Complications of asthma Possible complications of asthma can include the occurrence of status asthmaticus, which is a life-threatening condition of prolonged bronchospasm that is often not responsive to drug therapy. Pneumothorax is also a possible consequence as a result of lung pressure increases that can result from the extreme difficulty involved in expiration during a prolonged asthma attack. Marked hypoxemia and acidosis might also occur and can result in overall respiratory failure. Treatment of asthma The appropriate drug treatment regimen for asthma is based on the frequency and severity of the asthma attacks and may include the following: Avoidance of triggers, and allergens. Improved ventilation of the living spaces, use of air conditioning. 2. Bronchodilators (Examples: albuterol, terbutaline) Short acting Î’-adrenergic receptor activators. May be administered as needed in the form of a nebulizer solution using a metered dispenser or may be given subcutaneously. These drugs block bronchoconstriction but do not prevent the inflammatory response. 3. Xanthine drugs (Example: theophylline) Cause bronchodilation but may also inhibit the late phase of asthma. These drugs are often used orally as second-line agents in combination with other asthma therapies such as steroids. Drug like theophylline can have significant central nervous system, cardiovascular and gastrointestinal side effects that limit their overall usefulness. 4. Anti-inflammatory drugs (Corticosteroids) Used orally or by inhalation to blunt the inflammatory response of asthma. The most significant unwanted effects occur with long-term oral use of corticosteroids and may include immunosuppression, increased susceptibility to infection, osteoporosis and effects on other hormones such as the glucocorticoids. 5. Cromolyn sodium Anti-inflammatory agent that blocks both the early and late phase of asthma. The mechanism of action is unclear but may involve mast cell function or responsiveness to allergens. 6. Leukotriene modifiers (Example: Zafirlukast) New class of agents that blocks the synthesis of the key inflammatory mediators, leukotrienes. Emphysema Emphysema is a respiratory disease that is characterized by destruction and permanent enlargement of terminal bronchioles and alveolar air sacs. Well over 95% of all patients with emphysema were chronic cigarette smokers. Although the exact etiology of emphysema is still uncertain, it appears that chronic exposure to cigarette smoke causes chronic inflammation of the alveolar airways, which results in infiltration by lymphocytes and macrophages. Excess release of protease enzymes such as trypsin from lung tissues and leukocytes can digest and destroy the elastic walls of the alveoli. Alveolar air sacs become enlarged and distended as their structure is affected and their elasticity lost. Levels of a protective enzyme ÃŽÂ ±-1-antitrypsin have been shown to be lacking in certain individuals who are chronic cigarette smokers. This enzyme inactivates destructive protease enzymes in lung tissue. In fact, a rare form of emphysema occurs in individuals who are not cigarette smokers but who have a genetic lack of ÃŽÂ ±-1-antitrypsin. Manifestations of emphysema: The major physiologic changes seen in emphysema are a loss of alveolar (lung) elasticity and a decrease in the overall surface area for gas exchange within the lungs. Manifestations include the following: Tachypnea (increased respiratory rate): Because the increased respiratory rate in these individuals is effective in maintaining arterial blood gases, one does not usually see hypoxia or cyanosis until the end stages of the disease. Patients with emphysema are often referred to as pink puffers because of their high respiratory rates and lack of obvious cyanosis. Dyspnea Barrel chest from prolonged expiration Lack of purulent sputum Possible long-term consequences, including cor pulmonale, respiratory failure Chronic bronchitis Emphysema Mild dyspnea Dyspnea that may be severe Productive cough Dry or no cough Cyanosis common Cyanosis rare Respiratory infection common Infrequent infections Onset usually after 40 years of age Onset usually after 50 years of age History of cigarette smoking History of cigarette smoking Cor pulmonale common Cor pulmonale in terminal stages Types of Emphysema Cough Reflex The bronchi and trachea are so sensitive to light touch that very slight amount of foreign matter or other causes of irritation initiate the cough reflex. The larynx and carina (the point where the trachea divides into the bronchi) are especially sensitive, and the terminal bronchioles and even the alveoli are sensitive to corrosive chemical stimuli such as sulphur dioxide gas or chlorine gas. Afferent nerve impulses pass from the respiratory passages mainly through the vagus nerves to the medulla of the brain. There, an automatic sequence of events is triggered by the neuronal circuits of the medulla, causing the following effect. First, up to 2.5 liters of air are rapidly inspired. Second, the epiglottis closes, and the vocal cords shut tightly to entrap the air within the lungs. Third, the abdominal muscles contract forcefully, pushing against the diaphragm while other expiratory muscles, such as the internal intercostals, also contract forcefully. Consequently, the pressure in the lungs rises rapidly to as much as 100 mm Hg or more. Fourth, the vocal cords and the epiglottis suddenly open widely, so that air under this high pressure in the lungs explodes outward. Indeed, sometimes this air is expelled at velocities ranging from 75 to 100 miles per hour. Importantly, the strong compression of the lungs collapses the bronchi and trachea by causing their non-cartilaginous parts to invaginate inward, so that the exploding air actually passes through bronchial and tracheal slits. The rapidly moving air usually carries with it any foreign matter that is present in the bronchi or trachea. CO Poisoning Carbon monoxide (CO) is a colorless, odorless gas that is produced during the combustion of fuels such as gasoline, coal, oil, and wood. As you know, CO is a poison that may cause death if inhaled in more than very small quantities or for more than a short period of time. The reason CO is so toxic is that it forms a very strong and stable bond with the hemoglobin in RBCs (carboxyhemoglobin). Hemoglobin with CO bonded to it cannot bond to and transport oxygen. The effect of CO, therefore, is to drastically decrease the amount of oxygen carried in the blood. As little as 0.1% CO in inhaled air can saturate half the total hemoglobin with CO. Lack of oxygen is often apparent in people with light skin as cyanosis, a bluish cast to the skin, lips, and nail beds. This is because hemoglobin is dark red unless something (usually oxygen) is bonded to it. When hemoglobin bonds to CO, however, it becomes a bright, cherry red. This color may be seen in light skin and may be very misleading; the person with CO poisoning is in a severely hypoxic state. Although CO is found in cigarette smoke, it is present in such minute quantities that it is not lethal. Heavy smokers, however, may be in a mild but chronic hypoxic state because much of their hemoglobin is firmly bonded to CO. As compensation, RBC production may increase, and a heavy smoker may have a hematocrit over 50%.

Tuesday, November 12, 2019

Seminar Report P Soc 5

P SoC A Device Study SEMINAR REPORT Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in ELECTRONICS AND COMMUNICATION ENGINEERING of MAHATMA GANDHI UNIVERSITY By JINJU P. K (65232) Department of Electronics and Communication Engineering Rajagiri School of Engineering and Technology Rajagiri Valley, Cochin – 682 039 2010-2011 DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING CERTIFICATE Certified that the seminar presented titled â€Å" PSoC-A Device Study† is a bonafide report of the seminar done by JINJU. P. K (65232) of eighth semester Electronics and Communication Engineering in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Electronics and Communication of the Mahatma Gandhi University, Kottayam, during the academic year 2010-2011. Project Guide Head of the Department RONI ANTONYASHA PANICKER Internal ExaminerExternal Examiner Place : Kakkanad Date : ACKNOWLEDGEMENT To discover, analyze and to present something new is to venture on an unknown path towards and unexplored destination is an arduous adventure unless one gets a true torchbearer to show the way. I would have never succeeded in completing my task without the cooperation, encouragement and help provided to me by various people. Words are often too less to reveal my deep regards. I take this opportunity to express my profound sense of gratitude and respect to all those who helped me through the duration of this project. I acknowledge with gratitude and humility my indebtedness to Mr. Rony Antony , Lecturer, Electronics & Communication Department, RSET, under whose guidance I had the privilege to complete this project. I wish to express my deep gratitude towards him for providing individual guidance and support throughout the project work. I convey my sincere thanks to Asha Paniker , Professor & Head of Electronics & Communication Department, RSET for her encouragement and cooperation. I would also like to thank all staff members and my co-students who were always there at the need of the hour and provided with all the help and facilities, which I required for the completion of my project. My greatest thanks are to all who wished me success especially my parents. Above all I render my gratitude to the Almighty who bestowed self-confidence, ability and strength in me to complete this work for not letting me down at the time of crisis and showing me the silver lining in the dark clouds. ABSTRACT With a unique array of configurable digital and analog blocks, the Programmable System-on-Chip (PSoC) is a true system-levelsolution, offering a modern method of signal acquisition, processing, and control with exceptional accuracy, high bandwidth,and superior flexibility. Its analog capability spans the range from thermocouples (DC voltages) to ultrasonic signals. Designerscan easily create systemlevel designs, using a rich library of prebuilt components, or custom verilog, and a schematic entry tool that uses the standard design blocks. This seminar is based on the analog , digital , program and debug subsystems ofPsoC 5 device. . CONTENTS 1. INTRODUCTION02 2. BLOCK DIAGRAM03 3. HARDWARE IMPLEMENTATION04 4. 1 IR TRANSMITTER CIRCUITRY†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 04 4. 2 IR SENSOR CIRCUITRY07 4. 3 CIRCUIT DIAGRAMS15 4. SOFTWARE IMPLEMENTATION17 5. 4 MPELAB IDE17 . 5 PROGRAM25 5. PCB DESIGN28 5. 1 PCB SCHEMATIC†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 28 5. 2 PCB BOARD†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 29 6. RESULS & CONCLUSION31 7. REFERENCES32 APPENDIX 1. INTRODUCTION With a unique array of configurable digital and analog blocks, the Programmable System-on-Chip is a true systemlevel solution, offering a modern method of signal acquisition, processing, and control with exceptional accuracy, high bandwidth, and superior flexibility. Its analog capability spans the range from thermocouples (DC voltages) to ultrasonic signals. PSoC 5 (CY8C55xxx, CY8C54xxx, CY8C53xxx, CY8C52xxx) families are fully scalable 8-bit and 32-bit PSoC platform devices that share these characteristics:  ¦ Fully pin, peripheral compatible  ¦ Same integrated development environment software  ¦ High performance, configurable digital system that supports a wide range of communication interfaces, such as USB, I2C, and CAN  ¦ High precision, high performance analog system with up to 20-bit ADC, DACs, comparators, opamps, and programmable blocks to create PGAs, TIAs, mixers, etc.  ¦ Easily configurable logic array  ¦ Flexible routing to all pins  ¦ High performance, 8-bit single-cycle 8051 (PSoC 3) or 32-bit ARM Cortex-M3 (PSoC 5) core . 1 OBJECTIVE * 8051 or Cortex-M3 Central Processing Unit (CPU) with a nested vectored interrupt controller and a high performance DMA controller * Several types of memory elements including SRAM, flash, and EEPROM * System integration features, such as clocking, a featurerich power system, and versatile programmable inputs and outpu ts 2. TOP LEVEL ARCHITECTURE 2. 1 CPU SYSTEM 2. 1. 1 PROCESSOR The PSoC 5 CPU subsystem is built around a 32-bit three stage pipelined ARM Cortex-M3 processor running up to 80 MHz. The PSoC 5 instruction set is the same as the Thumb-2 instruction set available on standard Cortex- M3 devices. Three stage pipelining operating at 1. 25 DMIPS/MHz. This helps to increase execution speed or reduce power. * Supports Thumb-2 instruction set: * The Thumb-2 instruction set supports complex operations with both 16- and 32-bit instructions * Atomic bit level read and write instructions * Support for unaligned memory access * Improved code density, ensuring efficient use of memory. * Easy to use, ease of programmability and debugging: * Ensures easier migration from 8- and 16-bit processors * Nested Vectored Interrupt Controller (NVIC) unit to support interrupts and exceptions: * Helps to achieve rapid interrupt response Extensive debug support including: * Serial Wire Debug Port (SWD-DP), Serial Wire JTAG Debug Port (SWJ-DP) ? Break points ? Flash patch ? Instruction tracing ? Code tracing 2. 1. 2 INTERRUPT CONTROLLER The CPU subsystem includes a programmable Nested Vectored Interrupt Controller (NVIC), DMA (Direct Memory Access) controller, Flash cache ECC, and RAM. The NVIC of bot h PSoC 3 and PSoC 5 devices provides low latency by allowing the CPU to vector directly to the first address of the interrupt service routine, bypassing the jump instruction required by other architectures. The PSoC 5 interrupt controller also offers a few advanced nterrupt management capabilities, such as interrupt tail chaining to improve stack management with multiple pending interrupts providing lower latency. Supports 32 interrupt lines * Programmable interrupt vector * Configurable priority levels from 0 to 7 * Support for dynamic change of priority levels * Support for individual enable/ disable of each interrupt * Nesting of interrupts * Multiple sources for each interrupt line (can be either fixed function, UDB, or from DMA) * Supports both level trigger and pulse trigger * Tail chaining, late arrivals and exceptions are supported in PSoC ® 5 devices 2. 1. DMA CONTROLLER The DMA controller allows peripherals to exchange data without CPU involvement. This allows the CPU to run slower, save power, or use its cycles to improve the performance of firmware algorithms. * Uses the PHUB for data transfer * Includes 24 DMA channels * Includes 128 transaction descriptors (TD) * Eight levels of priority per channel * Transactions can be stalled or canceled * Each transaction can be from 1 to 64 KB * Large transactions can be broken into smaller bursts of 1 to 127 bytes. * Each channel can be configured to generate an interrupt at the end of transfer 2. 1. 4 CACHE CONTROLLER In PSoC 5 devices, the flash cache also reduces system power consumption by reducing the frequency with which flash is accessed. The processor speed itself is configurable allowing for active power consumption tuned for specific applications. * Instruction cache * Direct mapped * 128 bytes total cache memory * Registers for measuring cache hit/miss ratios * Error correction code (ECC) support * Error logging and interrupt generation * Designed to put flash into sleep automatically to save power 2. 2 MEMORY The PSoC nonvolatile subsystem consists of Flash, bytewritable EEPROM, and nonvolatile configuration options. The CPU can reprogram individual blocks of Flash, enabling boot loaders. An Error Correcting Code (ECC) can enable high reliability applications. A powerful and flexible protection model allows the user to selectively lock blocks of memory for read and write protection, securing sensitive information. The byte-writable EEPROM is available on-chip for the storage of application data. Additionally, selected configuration options, such as boot speed and pin drive mode, are stored in nonvolatile memory, allowing settings to become active immediately after power on reset (POR). 2. 2. 3 NON VOLATILE LATCH A Nonvolatile Latch (NVL or NV latch) is an array of programmable, nonvolatile memory elements whose outputs are stable at low voltage. It is used to configure the device at Power on Reset. Each bit in the array consists of a volatile latch paired with a nonvolatile cell. On POR release nonvolatile cell outputs are loaded to volatile latches and the volatile latch drives the output of the NVL. FEATURES * A 4Ãâ€"8-bit NV latch for device configuration * A 4Ãâ€"8-bit Write Once NV latch for device security 2. 2. 4 SRAM PSoC ® 3 and PSoC ® 5 devices include on-chip SRAM. These families offer devices that range from 2 to 64 kilobytes. PSoC 3 devices offer an additional 4 kilobytes as a trace buffer. * Organized as up to three blocks of 4 KB each, including the 4 KB trace buffer, for CY8C38 family. * Organized as up to 16 blocks of 4 KB each, for CY8C55 family. * Code can be executed out of portions of SRAM, for CY8C55 family. * 8-, 16-, or 32-bit accesses. In PSoC 3 devices the CPU has 8-bit direct access to SRAM. * Zero wait state accesses. * Arbitration of SRAM accesses by the CPU and the DMA controller. * Different blocks can be accessed simultaneously by the CPU and the DMA controller. 2. 2. 5 FLASH PROGAMMING MEMORY PSoC 3 and PSoC 5 include on-chip Flash memory. These two families offer devices that range from 16 to 256 kilobytes. Additional Flash is available for either error correction bytes or data storage. PSoC 3 and PSoC 5 Flash memory have the following features: * Organized in rows, where each row contains 256 data bytes plus 32 bytes for either error correcting codes (ECC) or data storage. * For PSoC 3 architecture: CY8C38 Family, organized as one block of 64, 128, or 256 rows. * For PSoC 5 architecture: CY8C55 Family, organized as either one block of 128 or 256 rows, or as multiple blocks of 256 rows each. Stores CPU program and bulk or nonvolatile data * For PSoC 5 architecture: CY8C55 Family, 8-, 16-, or 32-bit read accesses. PSoC 3 architecture has only 8-bit direct access. 2. 2. 6 EEPROM PSoC 3 and PSoC ®5 devices have on-chip EEPROM memory. These two families offer devices that range from 512 bytes to 2 kilobytes. * PSoC 3 and PSoC 5 EEPROM memory have the following features: * Organized in rows, where each row contains 16 bytes * Organized as one block of 32, 64, or 128 rows, depending on the device * Stores nonvolatile data * Write and erase using SPC commands Byte read access by CPU or DMA using the PHUB * Programmable with a simple command/status register interface EEPROM memory provides nonvolatile storage for user data. EEPROM write and erase operation is done using SPC commands. It may be read by both the CPU and the DMA controller, using the PHUB. All read accesses are 8-bit. 2. 2. 7 EMIF PSoC 3 and PSoC 5 architectures provide an external memory interface (EMIF) for connecting to external memory devices and peripheral devices. The connection allows read and write access to the devices. The EMIF operates in conjunction withUDBs, I/O ports, and other PSoC 3 and PSoC 5 components to generate the necessary address, data, and control signals. The EMIF does not intercept address data between the PHUB and the I/O ports. It only generates the required control signals to latch the address and data at the ports. The EMIF generates a clock to run external synchronous and asynchronous memories. It can generate four different clock frequencies, which are the bus clock divided by 1, 2, 3, or 4. The EMIF supports four types of external memory: synchronous SRAM, asynchronous SRAM, cellular RAM/PSRAM, and NOR Flash. External memory can be accessed via the 8051 xdata space or the ARM Cortex-M3 external RAM space; up to 24 address bits can be used. The memory can be 8 or 16 bits wide. 2. 3 SYSTEM WIDE RESOURCES 2. 3. 1 CLOCKING SYSTEM The clock system has these: * Four internal clock sources increase system integration: * 3 to 67 MHz Internal Main Oscillator (IMO)  ±1% at 3 MHz * 1 kHz, 33 kHz, 100 kHz Internal Low Speed Oscillator (ILO) outputs * 12 to 67 MHz clock doubler output, sourced from IMO, MHz External Crystal Oscillator (MHzECO), and Digital System * Interconnect (DSI) 24 to 67 MHz fractional Phase-Locked Loop (PLL) sourced from IMO, MHzECO, and DSI * DSI signal from an external I/O pin or other logic as well as a clock source * Two external clock sources provide high precision clocks: * 4 to 33 MHz External Crystal Oscillator (MHzECO) * 32. 768 kHz External Crystal Oscillator (kHzECO) for Real Time Clock (RTC) * Dedicated 16-bit divider for bus clock Eight individually sourced 16-bit clock dividers for the digital system peripherals * Four individually sourced 16-bit clock dividers for the analog system peripherals * IMO has a USB mode that auto locks to the USB bus clock, requiring no external crystal for USB. (USB equipped parts only) 2. 3. 2 POWER SUPPLY AND MONITORING PSoC 3 and PSoC 5 devices have separate external analog and digital supply pins, labeled respectively Vdda and Vddd. The devices have two internal 1. 8V regulators that provide the digital (Vccd) and analog (Vcca) supplies for the internal core logic. The output pins of the regulators (Vccd and Vcca) have very specific capacitor requirements that are listed in the datasheet. These regulators are available: * Analog regulator for the analog domain supply * Digital regulator for the digital domain supply * Sleep regulator for the sleep domain * I2C regulator for powering the I2C logic * Hibernate regulator for supplying keep alive power for state retention during hibernate 2. 3. 3 WATCH DOG TIMER The Watchdog Timer (WDT) circuit automatically reboots the system in the event of an unexpected execution path. This timer must be serviced periodically. If not, the CPU resets after a specified period of time. Once the WDT is enabled it cannot be disabled except during a reset event. This is done to prevent any errant code from disabling the WDT reset function. To use the WDT function, the user is required to enable the WDT function during their startup code. The WDT has the following features: * Protection settings to prevent accidental corruption of the WDT * Optionally-protected servicing (feeding) of the WDT * A configurable low power mode to reduce servicing requirements during sleep mode * A status bit for the watchdog event that shows the status even after a watchdog reset 2. . 4RESET POWER ON RESET Power on Reset (POR) is provided primarily for a system reset at power up. The IPOR will hold the device in reset until all four voltages; Vdda, Vcca, Vddd, Vccd, are to datasheet specification. The POR activates automatically at power up and consists of: An imprecise POR (IPOR) – is used to keep the device in reset during i nitial power up of the device until the POR can be activated A precision POR (PRES) – derived from a circuit calibrated for a very accurate location of the POR trip point. The power on RESET clears all the reset status registers WATCHDOG RESET Watchdog Reset (WRES) detects errant code by causing a reset if the watchdog timer is not cleared within the userspecified time limit. The user must always set the WRES initialization code. This was done to allow the user to dynamically choose whether or not to enable the watchdog timer SOFTWARE INITIATED RESET Software Initiated Reset (SRES) is a mechanism that allows a software-driven reset. The RESET_CR2 register forces a device reset when a 1 is written into bit 0. This setting can be made by firmware or with a DMA. The RESET_SR0 [5] status bit becomes set on the occurrence f a software reset. This bit remains set until cleared by the user or until a POR reset. EXTERNAL RESET External Reset (XRES_N) is a user-supplied reset that causes immediate system reset when asserted. XRES_N is available on a dedicated pin on some devices, as well as a shared GPIO pin P1[2] on all devices. The shared pin is available through a customer-programmed NV Latch setting and supports low pin count p arts that don't have a dedicated XRES_N pin. This path is typically configured during the boot phase immediately after power up. 3. CONCLUSION

Sunday, November 10, 2019

Grapes of Wrath Essay

The exodus of the Joad family from Oklahoma to the promised land of California. They were cheated by tradesmen along Highway 66, harassed by border guards at state boundaries, and on arrival were burned out of their makeshift camp by police deputies. One dark night the Joads wandered into Weedpatch Camp, a government refuge for migratory farm workers, where they found clean beds, indoor privies, food, friendship, and hope. â€Å"Oh! Praise God,† whispered Ma Joad. â€Å"God Almighty, I can’t hardly believe it! † pronounced Tom. (p. 390) Their praises were addressed to Providence, but were intended for Washington. Here, they believed, for the first time in their lives, was hard visible proof that their government, whatever and wherever it was, really cared about them and the hundreds of thousands of people like them–landless, homeless, penniless victims of a fickle climate, an unstable economy, and a pernicious way of life. Between the Lesters of Georgia and the Joads of Oklahoma, a profound change of spirit had come upon the land. The great revolution of the twentieth century, not only in the United States but also in the emerging nations abroad, is the kindling of an extravagant hope that the human condition of man can and should be improved, through the harnessing of the power, resources, and machinery of government, not in some distant millennium, but during the lifetime of those now living. The effective response of modern governments to this enormous challenge depends not only on the dreaming of dreams and the preaching of hope, but also on the capacity to convert the pictures in men’s heads into the realities in their lives. 4. Considering the characters in the novel, which actions do you find admirable, and why? Which do you find reprehensible, and why? Admirable A considerable indecisiveness emerges from the novel about how radical the problem is: whether the circumstances of class war exist likely from the interchapters or whether there is a clear-cut villain in the Farmers’ Association with no broader implications—likely from the chapters and their limited point of view. The problem is partly compounded by the pragmatism of the Joads themselves, in many ways admirable in the face of degenerating circumstances but also dangerous in their willingness to lower their expectations: at the beginning Ma Joad dreams of a white house in California after a few months on the road, she hopes they may one day afford a tent that does not leak; Rose of Sharon plans early in her pregnancy a comfortable future for her child at the end she is sulking for a little milk so that her baby may be born alive. The disadvantages of nonteleological thinking are apparent when the result is a perpetual readjustment to straitened conditions: while we are told that the metaphysical grapes of wrath are ripening for the vintage, what we see among the poor is stoicism, sacrifice, and one supreme act of charity. Reprehensible Rose of Sharon and Connie think only of themselves and of now they will break from the group, and when difficulties arise Connie wishes that he had stayed in Oklahoma to man a tractor driving the people from the land. Later, alone, Rose of Sharon complains of her plight and frets about the coming child, and instead of sharing the family responsibility she adds to family worries. Uncle John is similarly preoccupied with his guilt and his personal problems and is almost useless to the group, picking cotton at only half the rate of the other men. Both he and Al withhold money from the family treasury. Noah, thoughtless of the others, wanders away. Connie, leaving a pregnant wife, also deserts. Even the children show a teasing selfishness. Ruthie eats her crackerjacks slowly so that she can taunt the other children when theirs is gone, and at croquet she ignores the rules and tries to play by herself. 5. Describe the role women play throughout the novel The seemingly gratuitous details of the truck driver and the woman driver may intentionally suggest Steinbeck’s awareness that men are often destructive while women are usually more protective: Tom Joad has just been revealed as having committed manslaughter; later we shall see that Ma Joad and Rose of Sharon try to preserve the family and nurture life. Ma Joad would be womanly and maternal in any station. If she had been a duchess, she would have labored with heroism for the integrity of the family and would have had a comprehensive vision of the serious social obligations of her class. The scene of her farewell to Tom†¦ is of the pure essence of motherhood. The pathos is profound and free from a taint of sentimentality. The courage and devotion of the woman are sublime In Ma Joad, Steinbeck created one of the most memorable characters in American fiction of the twentieth century. It is her courage which sustains the family through the almost overwhelming distresses suffered during their epic migration to the West. She voices the author’s belief in the common folk’s invincible will to survive. Ma is a tower of strength to her group, like Pilar in Hemingway’s For Whom the Bell Tolls though less articulate. She is a kind of pagan earth mother, kind to her father-in-law and her mother-in-law, anxious to let her husband Pa lead the family but quickly assuming the reins when he lets them slip through weakness and lack of understanding, firm but sympathetic with her children, friendly with deserving strangers. Ma holds her family together far longer than anyone else in the group could have done. She suffers intensely when she sees Grampa die, then Noah disappear, then Granma die, and then Tom obliged to hide and then go away. But she almost never reveals the degree of her misery. She knows that while she holds, the unit will hold unless man’s inhumanity to man and nature’s indifference put pressure upon her which simply cannot be endured. She goads Pa into near frenzy, knowing that it will make him stronger. She threatens to slap Rose of Sharon at times, but when the poor, pregnant, abandoned girl needs comfort, Ma is there with it in full measure. She knows that she can rely on Tom, not Al. She lets Uncle John have money for one quick drunken spree, knowing that without it he might crack. References Steinbeck John, (1939) The Grapes of Wrath New York: Viking.

Friday, November 8, 2019

Resistance and Opposition in the GDR

Resistance and Opposition in the GDR Even though the authoritarian regime of the German Democratic Republic (GDR) lasted for 50 years, there had always been resistance and opposition. In fact, the history of socialist Germany started out with an act of resistance. In 1953, only four years after its creation, the Soviet Occupiers were forced to take back control over the country. In the Uprising of June 17th, thousands of workers and farmers put down their tools in protest of new regulations. In some towns, they violently drove the municipal leaders from their offices and basically ended the local reign of the â€Å"Sozialistische Einheitspartei Deutschlands† (SED), the GDR’s single ruling party. But not for long. In the larger cities, such as Dresden, Leipzig, and East-Berlin, large strikes took place and workers assembled for protest marches. The Government of the GDR even took refuge to the Soviet Headquarters. Then, the Soviet Representatives had enough and sent in the military. The troops quickly suppressed the uprising by brutal force and restored the SED Order. And despite the dawn of the GDR was coined by this civil uprising and despite there always being some kind of opposition, it took more than 20 years, for the Eastern German Opposition to take a clearer form. Years of Opposition The year 1976 turned out to be a crucial one for the opposition in the GDR. A dramatic incident awoke a new wave of resistance. In protest against the atheist education of the country’s youth and their oppression by the SED, a priest took to drastic measures. He set himself on fire and later died of his injuries. His actions forced the protestant church in the GDR to re-evaluate its attitude towards the authoritarian state. The regime’s attempts to play down the priest’s acts triggered even more defiance in the population. Another singular but influential event was the expatriation of the GDR-Songwriter Wolf Biermann. He was very famous and well-liked both German countries, but had been forbidden to perform due to his criticism of the SED and its policies. His lyrics kept being distributed in the underground and he became a central spokesperson for the opposition in the GDR. As he was allowed to play in the Federal Republic of Germany (FRG), the SED took the opportunity to revoke his citizenship. The regime thought that it had gotten rid of a problem, but it was deeply wrong. Numerous other artists voiced their protest in light of the expatriation of Wolf Biermann and were joined by a lot more people from all social classes. In the end, the affair led to an exodus of important artists, heavily damaging the GDR’s cultural life and reputation. Another influential personality of the peaceful resistance was the author Robert Havemann. Being freed from death row by the Soviets in 1945, at first, he was a strong supporter and even a member of the socialist SED. But the longer he lived in the GDR, the more he felt the discrepancy between the SED’s real politics and his personal convictions. He believed, that everyone should have the right to his own educated opinion and proposed a â€Å"democratic socialism†. These views got him expelled from the party and his ongoing opposition brought him a string of intensifying punishments. He was one of the strongest critics of Biermann’s expatriation and on top of criticizing the SED’s version of socialism, he was an integral part of the independent peace movement in the GDR. A Struggle for Freedom, Peace, and the Environment As the Cold War heated up at the beginning of the 1980s, the peace movement grew in both German Republics. In the GDR, this meant not only fighting for peace but also opposing the government. From 1978 on, the regime aimed at completely imbue the society with militarism. Even kindergarten teachers were instructed to educate the children in vigilance and to prepare them for a possible war. The Eastern German peace movement, that now also incorporated the protestant church, joined forces with the environmental and anti-nuclear movement. The common enemy for all of these opposing forces was the SED and its oppressive regime. Sparked by singular events and people, the opposing resistance movement created an atmosphere that paved the way for the peaceful revolution of 1989.

Wednesday, November 6, 2019

Behavioral Science Essay Example

Behavioral Science Essay Example Behavioral Science Essay Behavioral Science Essay 595,000 people, most likely men, women, handicapped, aged, kick, prisoners of war, forced laborers, camp inmates, critics, homosexuals, Jews, Slavs, Seers, Germans, Czech, Italians, Poles, French, Ukrainians, and many others. (1992) Or. Josef Mangle, nicknamed The Angel of Death, and other Nazi doctors had a chance to study science without the hindering voices of humanitarianism. The death camps tortured men, women, and children with medical experiments previously designated for only animals. Victims were exposed to experimental surgeries, injected with lethal germs, and made to endure sex change operations. Often times, victims limbs and organs were removed to study their reactions. Mangle injected chemicals into the eyes of children in an attempt to change their eye color. He carried out twin-to-twin transfusions, stitched twins together, and castrated or sterilized them. Eugenics had come to fruition and science, the new religion, had reared its ugly head for all to see. By the end of WI, the stench of death grew thicker with the discovery Of Germanys racial hygiene. The sheer magnitude of bodies was enough to send any eugenicist backbreaking. As quickly as it had exploded, the flames of eugenics were extinguished. The public, in view of this social anathema, felt utterly disturbed and disgusted. Support for eugenics programs fell to a silence in the Western World; a price that would force many scientists to resent their burden of Hitler. The Slim peppery Slope It is said, you can kill a man, but you cannot destroy what he stands for. In much the same way, the ideology of eugenics has survived the holocaust. For years, it has lurked in the periphery of science and news media; but, as the resonating effects of WI have begun to wear off, technology has restored faith in science. Once again, American culture finds itself particularly susceptible to the dangerous ideology of behavioral genetics. The haunting words Of Gallon still echo a clear progression of academia, practical policy, and then national consciousness as a new religion (Caving-Coffee, 2000). Already, America is taking steps toward the catastrophe of history repeating itself. At the heart of American consciousness is a belief that hard work and perseverance can overcome any disadvantage of wealth or class. The history of the U. S. Is filled with entrepreneur tales of the American dream. In fact, many individuals have risen from poverty to gain prosperity, wealth, and political power. Those who prosper, by either personal achievement or airtight, have difficulty accepting the problems that social order may provide for those in deficiency. Consequently, many of these conservatives believe that social stratification is a natural result of variation in talent and character (Miller, 1996). In view of Americas Social policies, conservatives can become resentful and even racist. Conservatives within the academic world have nurtured eugenics back from the ashes. With the help of an ancient foundation, The Pioneer Fund, the new movement has been able to break ground in modern research. In 1 937, Harry Guilin and eugenic colleagues formed the foundation as a tool to promote horses of black inferiority (Miller, 1983). Under the guise of behavioral science, millions of dollars have been donated to help the eugenic cause Once again reach fruition. Thomas Boucher, a leading psychologist at the University of Minnesota, has received large sums of money from the Pioneer Fund to research the traits of twins separated at birth and reared apart. According to Buckboards results, intelligence turned out to be 70 percent genetic. Previous research in twin studies had included unethical experimentation (Josef Mangle) and even deception (Sir Cyril Burt). Crucial experimentation such as this is often prone o fraudulent claims. Strangely enough, Boucher did not release the methodology of his findings; so, no other scientists could examine how he found these high results. By doing this, Boucher has guaranteed that no one can disprove him. Authors Richard Hermiston and Charles Murray made a similar claim in their pioneer funded book, The Bell Curve. The book claims that inherited intelligence is the main determiner of a persons potential. Hermiston and Murray take the complex idea of intelligence and presume to measure it objectively through written tests. They conclude from their finding hat whites are genetically more intelligent than blacks are; this idea parallels that of the Pioneer Fund. Accordingly, there is no amount of social progress that can change the genetic inferiority of certain races. Through a book of statistics and scientific jargon, the have-knots are once again told that their lives are futile. The book conveniently explains much of the economic inequality in American society, while simultaneously guaranteeing that only intelligent types can understand it. For those that can understand it, the message is clear: reduce the number of children born to low IQ mothers. The kook does well to euthanize low-end society and it provides a suggestion for an easy cleanup. According to Hermiston and Murray, low IQ accounts for poverty, class status and criminal activity. By eliminating welfare and tightening immigration (sound familiar), you eliminate the members at the bottom of society and the poverty and delinquency along with them. In eugenic fashion, The Bell Curve captivated the nation and gained exposure on major media outlets such as Nightline, New York Times, and Rolling Stone magazine. Another major publication, Crime and Human Nature, by Hermiston and Wilson looked into criminal behavior. Hermiston and Willows research characterized a criminal stereotype. In a whopping generalization, they were able to define typical age, sex, intelligence, personality, and even body structure of a criminal. This data predicted what a defective criminal looks like. The movie Minority Report expands upon this very design, judging and convicting people before they commit a crime. How ever unlikely it is for science fiction to become a reality, it is hard not to acknowledge American cultures fascination with genetic criminal behavior. This fascination has resulted in a recent government program called the Violence Initiative. It has dumped millions of dollars into research focused on the biological roots of violence. Dry. Frederick Goodwin, now head of the National Institute of Mental Health (NIMH), Was once the head Of the Violence Initiative; however, he stepped down after a stint of racial statements. While explaining the program, he declared that the Violence Initiative was designed to try to find out who might be more likely to go on to becoming labeled eventually as delinquent or criminal (Bringing, 1993). The demographic here is unfortunately children. Today, parents throughout America are told that the problems their children eve adjusting at home and school are biologically based. Already millions of children are behaviorally controlled by means of psychotropic drugs such as Rattail, Dexedrine, and Derail. With society focus on drugs and the huge resulting drug industry, it is no surprise that dangerous research with children has been approved. In 1998, researchers in New York selected 100 African American and Latino boys to test their violent behavior. The boys were chosen because their older brothers had been through the criminal justice system. The recently recalled drug fingernail was given to the children in he hopes that the drug which triggers the brain to release serotonin, could lessen aggression (Learn, 1998). The study exploited the children with their use of stereotypes and generalizations, but this was not the first time male aggression had been studied. On Seep. 7, 1968, an English medical journal Lancet held an article on the 47-SEXY eukaryote. This genetic condition bestowed upon its owner an extra Y-chromosome (instead of the common 46-XX). Since the Y chromosome was known to be responsible for the development of male physical traits, it was thought that the extra Y might account for extra maleness. To many scientists, this meant more aggressive, irresponsible, and criminal behavior that is specific to men. The author, Nielsen, claimed that the prevalence Of SEXY within the prison system is 25-60 times higher than general population levels. The study, based upon conjecture and small sample size, was found to be completely erroneous; but nonetheless, the findings excited the science world and mesmerisms the public. Quite suddenly and absolutely, anyone with SEXY was characterized as a criminal. The media only reinforced this sentiment by featuring serious criminals presumed to have the genetic defect. Despite falsifying evidence against the SEXY criminality, American cultures interest and belief in the issue has not been destroyed. The American media often report researchers findings long after they have been disproved. Since so much of the modern world relies on science and technology, many people have been bred into a type of blind faith in its decisions. The SEXY situation is a good example of science leading society astray. The erroneous findings of few lead to the characterization and maltreatment of many. American culture stands at a pivotal point within contemporary law and public policy as the behavioral emetics movement threatens to invade. In recent news, eugenics has been seen. A program in Southern California was formed to help stop defectives from propagating. The program offered drug addicted women with a history of bearing children $200 for voluntary sterilization or long-term birth control. The program, called CRACK (Children Requiring a Caring Community), advertised their proposal by sending out fliers with the message, Dont let pregnancy ruin your drug habit (Riposte and Watt, 1998). This program was designed specifically to keep the drug addicts down, while ensuring they do to reproduce. Another contemporary issue has been the resurfacing of euthanasia. Dry. Jack Savoring used the dubious justification of terminally ill people to reject life-prolonging treatment in his assisted suicides. Through much of the controversy surrounding his case, euthanasia was able to once again gain support and become a common banrod. The recent case of Terrier Achieve has illustrated the persistence of the conservative front. Caviars court ordered death was a result of a modern utilitarian ethic that challenges public policy and criminal law in a progressively eugenic outlook. Already Americas closest allies, Great Britain, have begun to tackle the issue of genetic informations influence on criminal law. The Minefield Council on Bioethics in London reported that the use of genetic information be considered when sentencing convicted offenders. They state that: [T]he criminal justice system should be open to new insights from disciplines that it has not necessarily considered in the past. The regular exchange of ideas in this area between researchers in behavioral genetics, criminologists and lawyers could be an effective means of ensuring that legal concepts of accessibility are assessed against current evidence from the behavioral and medical sciences. (Minefield, 2002) This effectively treats criminals different depending on which genes they have, a trait that is out of their control. Despite the uncertain nature of the evidence, genetic use is snowballing toward public law and policy. The field of genetics has given society other law concerns as well. Ideas such as embryo and stem cell research, assisted reproduction, cloning, and DNA prevarication are all new ethical issues that culture will be forced to deal with. Currently, well-informed scientists build their influence for these arguments hill the common nonprofessional becomes another unwitting pawn. The slim peppery slope to full-scale eugenics and possible Nazism comes ever closer. Western culture may be capable of accepting another national consciousness. Many people envision a eugenic future for society that should have happened long ago. They claim that the early eugenic movement was merely a mishap, a product of ignorance and prejudice. A series of resentful statements by noteworthy scientists have tried to debunk the stigma associated with eugenics so that it might again thrive. Scientist Marion Van Court claimed, the Nazis pseudoscience perversion of the eugenics concept had the greatest influence on public opinion, promulgating the notion of eugenics as the ideology of racism and genocide (Van Court, 1982). Van Court fails to see that eugenics is associated with these ignorant notions because the science itself is inherently discriminatory. Others publicly advocate a new eugenics consciousness. Raymond B. Chattel, a renowned psychologist, claimed in an interview that at present, we have unemployment On rather a large scale in most industrialized countries Which can be eliminated only by elimination of emetic lag on the culture (The Eugenics Bulletin, 1984). Chattel, well known for his book Beyond, described the need for a new evolution in religion that would allow eugenic morals and values. Chattel represents classic Coalition eugenics that require a restructuring of civic laws to increase the distance between people of dissimilar race (Miller, 1997). Another significant racist view comes from Dry. William Pierce. Besides founding his own organization for the propagation of the white Anglo race, Pierce has written fictional accounts of what the future holds under a racist eugenic movement. He contends that a systematic extermination of inferior individuals is necessary for the evolution of humankind. It is impossible to deny the proliferation of racist ideology within the scientific community. They seek to carry society into the third and last stage of Gallons model of eugenic success. Conclusion Behavioral geneticists have become the astrologers of the modern era. They have defined behaviors inconsistently, yielded unreliable and non- reproducible results, and used fraudulent methodology that questions their integrity. The field succeeds only in individual cases that typically apply to society through generalization, prejudice, and bigotry. As is usually the case, the heart of the problem has to do with how society uses the results (Learn, 1998); however, behavioral geneticists should be held accountable. The fields reductionism approach limits its thinking to only the tiniest parts, so that they often fail to see the importance of viewing things as a whole. Nevertheless, there should be a realization that scientists have a duty to exercise self-restraint in pressing further those scientific activities that may result in dangers for the whole of humankind (Stone, 1973). As the history in his paper has clarified, the behavioral genetic field is filled with errors, bad intentions, and explosive atrocities. Gallons eugenic ideology gave white Anglo-Saxons a sense of purity and superiority that fueled the flames of Hitters genocide. The total number of sterilizations and deaths the field is responsible for is in the millions. Its blackened history should be enough to stifle its progress, but the field continues to thrust forward. In recent times, Buckboards twin studies, Hermistons academic backing, and the Violence Initiatives governmental support have allowed genetic studies on children ND a continued focus on behavioral genetics.

Sunday, November 3, 2019

Anemias Essay Example | Topics and Well Written Essays - 250 words

Anemias - Essay Example ; swollen hands and feet (hand-foot syndrome); frequent infections caused by weakened immune system; developmental delays, slowed growth, and delayed puberty; impaired vision (Mayo Clinic staff, 2011r) Aplastic anemia is ultimately caused by damage to the bone marrow, which shuts down or slows production of new blood cells. Can be caused by medications or an auto-immune disorder, but is often idiosyncratic (Mayo Clinic staff, 2011m) Fatigue; shortness of breath; irregular or rapid heartbeat; pale skin; frequent infections; unexplained bruising; prolonged bleeding from cuts, bleeding gums, and frequent nosebleeds; skin rash; dizziness; headache(Mayo Clinic staff, 2011n) The most difficult type of anemia to treat is aplastic anemia. This is due to the fact that in a large number of cases, the cause of aplastic anemia is unknown. Without knowing the cause, it cannot be effectively treated beyond symptomatic treatment through the use of blood transfusions. In other cases, the aplastic anemia is due to a life-saving medical treatment such as chemotherapy, or is the result of an auto-immune disorder. In both of those cases, the cause of the anemia really cant be removed and so the patient continues to suffer the anemia. Thankfully, aplastic anemia is extremely rare, so the chances of dealing with a patient suffering from untreatable deadly aplastic anemia are very slim (Mayo Clinic staff, 2011m). Mayo Clinic staff. (2011g, March 4). Iron Deficiency Anemia - Tests and Diagnosis. Mayo Clinic. Retrieved May 22, 2012, from http://www.mayoclinic.com/health/iron-deficiency-anemia/DS00323/DSECTION=tests-and-diagnosis Mayo Clinic staff. (2011h, March 4). Iron Deficiency Anemia - Treatments and Drugs. Mayo Clinic. Retrieved May 22, 2012, from http://www.mayoclinic.com/health/iron-deficiency-anemia/DS00323/DSECTION=treatments-and-drugs Mayo Clinic staff. (2011j, March 4). Vitamin Deficiency Anemia - Symptoms. Mayo Clinic. Retrieved May 22, 2012, from

Friday, November 1, 2019

General Motors Research Paper Example | Topics and Well Written Essays - 500 words - 2

General Motors - Research Paper Example companies trailed voluntary petitions for assistance under Title 11 of the United States of Bankruptcy code as per Chapter 11 reorganization (United States Environmental Protection Agency, 2010). In this scenario GM, had filed a motion to gain approval by the Bankruptcy court, which led to the creation of NGMCO, Inc. However, after the purchase of â€Å"Old GM† by NGMCO, it was again renamed as General Motor Company. This evolution of new operations advocated in favor of the fact that the bankruptcy conversion was guided by the concept of â€Å"pre-packaged† Chapter 11 reorganization (Stoll & Terlep, 2009). GM’s filing for bankruptcy in 2009 indeed marked one of the darkest falls in the automobile history. Although the turn of events that led to GM’s bankruptcy had been predictive, critics were of the view that the sole reasons for the automobile giant’s fall was hidden in its managerial faults as well as sudden upsurge of the global economic downturn. As mentioned in The Economists (2009), â€Å"The collapse of General Motors into bankruptcy is only the latest chapter in a long story of mismanagement and decline†. According to the reports, there were various reasons behind the bankruptcy of GM. One of the major reasons of the bankruptcy was argued to be its mismanagement of finances and poor liquidity structure. Critics also argued that ineffective forecast of the external business environment affected the efficiency of the company in the global market, where its stagnancy in brand exposure also hampered its long run sustainability. In addition, the company also failed in taking requisite measures to file for bankruptcy, which affected its stakeholders’ interests to a substantial extent (Carty, 2009). Most effective course of action to solve the problem. As can be observed from the above context, the primary problem inherent to GM’s failure was related to its managerial deficiencies. In this regard, application of the cognitive theory could have been