Tuesday, December 31, 2019

Why lb Is the Symbol for Pounds

Have you ever wondered why we use the symbol lb  for the pounds  unit? The word  pound is short for pound weight, which was libra pondo in Latin. The libra part of the phrase meant both weight or balance scales. The Latin usage was shortened to libra, which naturally was abbreviated lb. We adopted the pound part from pondo, yet kept the abbreviation for libra. There are different definitions for the mass of a pound, depending on the country. In the United States, the modern pound unit is defined to be 2.20462234 pounds per metric kilogram. There are 16 ounces in 1 pound. However, in Roman times, the libra (pound) was about 0.3289 kilograms and was divided into 12 uncia or ounces. In Britain, there has been more than one type of pound, including the avoirdupois point and Troy pound. A pound sterling was a tower pound of silver, but the standard was changed to the Troy pound in 1528. The tower pound, merchants pound, and London pound are all obsolete units. The Imperial Standard Pound is defined as having a mass equal to 0.45359237 kilograms, which matches the definition of the international pound, as agreed upon (although not adopted by the U.S.) in 1959. Sources Fletcher, Leroy S.; Shoup, Terry E. (1978). Introduction to Engineering. Prentice-Hall. ISBN 978-0135018583.United States National Bureau of Standards (1959-06-25). Notices Refinement of values for the yard and the pound.Zupko, Ronald Edward (1985). Dictionary of Weights and Measures for the British Isles: The Middle Ages to the 20th Century. DIANE Publishing. ISBN 0-87169-168-X.

Monday, December 23, 2019

A Brief Note On Alzheimer s Disease ( Ad ) - 2624 Words

Sanya Bhambhani Conducting Research in Neuroscience Literature Review Introduction Alzheimer’s disease (AD) is a neurodegenerative disorder affecting approximately 5.1 Americans, and has become one of the most common chronic diseases in developed countries. Consequently, a more comprehensive understanding of the etiology of the disease and possible treatment for AD has become a public health concern. An increasing body of evidence supports a strong and causal association between cardiovascular disease (CVD), its risk factors, and AD, along with its precursor, cognitive decline. Individuals with CVD are at a significantly higher risk of developing dementia and AD. A growing number of studies suggest that cardiovascular disease and cardiovascular risk factors contribute to the early onset of Alzheimer’s and its symptoms. It is possible that lifestyle adjustments or pharmacological interventions which decrease vascular disease may also hold promise for decreasing the affliction of AD and cognitive decline. This review discusses the accumulating body of e vidence relating CVD, CVD risk factors, and Type 2 Diabetes to AD, along with possible mechanisms describing such associations. Cardiovascular Disease An accumulating body of evidence studying both clinical and subclinical CVD has shown a consistent link between poor cardiovascular health and cognitive impairment. For example, in the Rotterdam study (Breteler et al., 1994), of the 4971 subjects who participated in the study,Show MoreRelatedA Brief Note On Alzheimer s Disease ( Ad ) Essay1606 Words   |  7 PagesAlzheimer’s disease (AD) is a neurological disorder commonly found in elderly individuals. It affects about 6-8% of people over the age of 65, and this number is expected rise in the coming decades (Gà ©linas et al., 1999). AD is a neurodegenerative disease that cause the deterioration of higher mental functions, this includes the deterioration of memory, cognitive tasks, and eventually motor and sensory skills. However, motor and sensory skills decrease much later in the development of AD. This is becauseRead MoreA Brief Note On Alzheimer s Disease ( Ad ) Essay882 Words   |  4 PagesBackground Alzheimer’s Disease (AD) is the most common type of dementia. AD is initially presented as short term memory loss, forgetfulness, and decrease ability to learn and retain new information. It is a slow and progressive disease. There are two types of AD, sporadic AD which is more common in patients who are 65 or older and familial AD. Amyloid precursor protein, presenilin-1 and presenilin-2 mutations are associated familial AD. Causes A cholesterol transport protein Apolipoprotein E is linkedRead MoreSymptoms Of Alzheimer s Disease2043 Words   |  9 PagesAlzheimer’s disease. It took an emotional toll on me and my family members. I believe Alzheimer is much harder on me and my loved ones than on my grandfather; because he was unaware of what was going on. It’s painful watching my grandfather degrade and get worse each and every day. The worst thing is that he doesn’t even know who I am anymore. In this paper I will discuss certain risk factors, background of Alzheimer’s, Background of Alzheimer’s Alzheimer’s disease was first identifiedRead MoreTreatments for Alzheimers Disease Essay1893 Words   |  8 PagesAlzheimer’s disease (AD) was named after Dr. Alois Alzheimer who described the symptoms in a woman in Germany in the 1907 but it was not until the 1970’s that AD was considered to be a major disorder and AD continues to be a major health concern worldwide (Reger, 2002). The onset of symptoms is usually between 40 and 90 years of age, although onset before 65 years of age is considered to be the early onset form of the disease and onset at 40 is very rare (Reger, 2002). Characteristics of AD are extracellularRead MoreThe Marketing Research of Brainquiry33782 Words   |  136 Pagesresearch provides detailed information related to Belgian psychologists that were found. The same counts for golf clubs. Extra information about Belgium includes Word documents containing information about Belgian ADHD support groups and Alzheimer s disease support groups, additional to this PDF files include information about patients with Mental Health problems in Belgium. These .pfd files are taken from Belgian federal statistics website. Unfortunately, not much information was not found

Sunday, December 15, 2019

Microprocessor and Interfacing Free Essays

string(187) " the control register and all ports are set to the input mode e\) A0 and A1 \( Address pins \): These pins in conjunction with RD and WR pins control the selection of one of the 3 ports\." UNIT II- Peripherals and Interfacing PIO 8255 The parallel input-output port chip 8255 is also called as programmable peripheral input-output port. The Intel’s 8255 is designed for use with Intel’s 8-bit, 16-bit and higher capability microprocessors. It has 24 input/output lines which may be individually programmed in two groups of twelve lines each, or three groups of eight lines. We will write a custom essay sample on Microprocessor and Interfacing or any similar topic only for you Order Now The two groups of I/O pins are named as Group A and Group B. Each of these two groups contains a subgroup of eight I/O lines called as 8-bit port and another subgroup of four lines or a 4-bit port. Thus Group A contains an 8-bit port A along with a 4-bit port. C upper. PIO 8255 †¢ The port A lines are identified by symbols PA0-PA7 while the port C lines are identified as PC4-PC7. Similarly, GroupB contains an 8-bit port B, containing lines PB0-PB7 and 4-bit port C with lower bits PC0- PC3. The port C upper and port C lower can be used in combination as an 8-bitport C. †¢ Both the port C are assigned the same address. Thus one may have either three 8-bit I/O ports or two 8-bit and two 4-bit ports from 8255. All of these ports can function independently either as input or as output ports. This can be achieved by programming the bits of an internal register of 8255 called as control word register ( CWR ). PIO 8255 †¢ The internal block diagram and the pin configuration of 8255 are shown in fig. †¢ The 8-bit data bus buffer is controlled by the read/write control logic. The read/write control logic manages all of the internal and external transfers of both data and control words. †¢ RD, WR, A1, A0 and RESET are the inputs provided by the microprocessor to the READ/ WRITE control logic of 8255. The 8-bit, 3-state bidirectional buffer is used to interface the 8255 internal data bus with the external system data bus. PIO 8255 †¢ This buffer receives or transmits data upon the execution of input or output instructions by the microprocessor. The control words or status information is also transferred through the buffer. †¢ The signal description of 8255 are briefly presented as follows : †¢ PA7-PA0: These are eight port A lines that acts as either latched output or buffered input lines depending upon the control word loaded into the control word register. †¢ PC7-PC4 : Upper nibble of port C lines. They may act as either output latches or input buffers lines. PIO 8255 This port also can be used for generation of handshake lines in mode 1 or mode 2. †¢ PC3-PC0 : These are the lower port C lines, other details are the same as PC7-PC4 lines. †¢ PB0-PB7 : These are the eight port B lines which are used as latched output lines or buffered input lines in the same way as port A. †¢ RD : This is the input line driven by the microprocessor and should be low to indicate read operation to 8255. †¢ WR : This is an input line driven by the microprocessor. A low on this line indicates write operation. PIO 8255 †¢ CS : This is a chip select line. If this line goes low, it enables the 8255 to respond to RD and WR signals, otherwise RD and WR signal are neglected. †¢ A1-A0 : These are the address input lines and are driven by the microprocessor. These lines A1-A0 with RD, WR and CS from the following operations for 8255. These address lines are used for addressing any one of the four registers, i. e. three ports and a control word register as given in table below. †¢ In case of 8086 systems, if the 8255 is to be interfaced with lower order data bus, the A0 and A1 pins of 8255 are connected with A1 and A2 respectively. RD 0 0 0 0 RD 1 1 1 1 RD X 1 WR 1 1 1 1 WR 0 0 0 0 WR X 1 CS 0 0 0 0 CS 0 0 0 0 CS 1 0 A1 0 0 1 1 A1 0 0 1 1 A1 X X A0 0 1 0 1 A0 0 1 0 1 A0 X X Input (Read) cycle Port A to Data bus Port B to Data bus Port C to Data bus CWR to Data bus Output (Write) cycle Data bus to Port A Data bus to Port B Data bus to Port C Data bus to CWR Function Data bus tristated Data bus tristated Control Word Register PIO 8255. †¢ D0-D7 : These are the data bus lines those carry data or control word to/from the microprocessor. †¢ RESET : A logic high on this line clears the control word register of 8255. All ports are set as input ports by default after reset. Block Diagram of 8255 (Architecture) ( cont.. ) †¢ 1. 2. 3. 4. †¢ It has a 40 pins of 4 groups. Data bus buffer Read Write control logic Group A and Group B controls Port A, B and C Data bus buffer: This is a tristate bidirectional buffer used to interface the 8255 to system databus. Data is transmitted or received by the buffer on execution of input or output instruction by the CPU. Control word and status information are also transferred through this unit. †¢ Block Diagram of 8255 (Architecture) ( cont.. ) Read/Write control logic: This unit accepts control signals ( RD, WR ) and also inputs from address bus and issues commands to individual group of control blocks ( Group A, Group B). †¢ It has the following pins. a) CS – Chipselect : A low on this PIN enables the communication between CPU and 8255. b) RD (Read) – A low on this pin enables the CPU to read the data in the ports or the status word through data bus buffer. †¢ Block Diagram of 8255 (Architecture) ( cont.. ) WR ( Write ) : A low on this pin, the CPU can write data on to the ports or on to the control register through the data bus buffer. ) RESET: A high on this pin clears the control register and all ports are set to the input mode e) A0 and A1 ( Address pins ): These pins in conjunction with RD and WR pins control the selection of one of the 3 ports. You read "Microprocessor and Interfacing" in category "Papers" †¢ Group A and Group B controls : These block receive control from the CPU and iss ues commands to their respective ports. c) Block Diagram of 8255 (Architecture) ( cont.. ) †¢ Group A – PA and PCU ( PC7 -PC4) †¢ Group B – PCL ( PC3 – PC0) †¢ Control word register can only be written into no read operation of the CW register is allowed. a) Port A: This has an 8 bit latched/buffered O/P and 8 bit input latch. It can be programmed in 3 modes – mode 0, mode 1, mode 2. b) Port B: This has an 8 bit latched / buffered O/P and 8 bit input latch. It can be programmed in mode 0, mode1. Block Diagram of 8255 (Architecture). c) Port C : This has an 8 bit latched input buffer and 8 bit out put latched/buffer. This port can be divided into two 4 bit ports and can be used as control signals for port A and port B. it can be programmed in mode 0. Modes of Operation of 8255 (cont.. ) †¢ These are two basic modes of operation of 8255. I/O mode and Bit Set-Reset mode (BSR). †¢ In I/O mode, the 8255 ports work as programmable I/O ports, while in BSR mode only port C (PC0-PC7) can be used to set or reset its individual port bits. †¢ Under the I/O mode of operation, further there are three modes of operation of 8255, so as to support different types of applications, mode 0, mode 1 and mode 2. Modes of Operation of 8255 (cont.. ) †¢ BSR Mode: In this mode any of the 8-bits of port C can be set or reset depending on D0 of the control word. The bit to be set or reset is selected by bit select flags D3, D2 and D 1 of the CWR as given in table. I/O Modes : a) Mode 0 ( Basic I/O mode ): This mode is also called as basic input/output mode. This mode provides simple input and output capabilities using each of the three ports. Data can be simply read from and written to the input and output ports respectively, after appropriate initialisation. D3 0 0 0 0 1 1 1 1 D2 0 0 1 1 0 0 1 1 D1 0 1 0 1 0 1 0 1 Selected bit s of port C D0 D1 D2 D3 D4 D5 D6 D7 BSR Mode : CWR Format PA 8 2 5 5 PCU PCL PA6 – PA7 PC4 – PC7 PC0-PC3 PB PB0 – PB7 8 2 5 5 PA PCU PCL PB PA PC PB0 – PB7 All Output Port A and Port C acting as O/P. Port B acting as I/P Mode 0 Modes of Operation of 8255 (cont.. ) †¢ 1. The salient features of this mode are as listed below: Two 8-bit ports ( port A and port B )and two 4-bit ports (port C upper and lower ) are available. The two 4-bit ports can be combinedly used as a third 8-bit port. Any port can be used as an input or output port. Output ports are latched. Input ports are not latched. A maximum of four ports are available so that overall 16 I/O configuration are possible. All these modes can be selected by programming a register internal to 8255 known as CWR. 2. 3. 4. †¢ Modes of Operation of 8255 (cont.. †¢ The control word register has two formats. The first format is valid for I/O modes of operation, i. e. modes 0, mode 1 and mode 2 while the second format is valid for bit set/reset (BSR) mode of operation. These formats are shown in following fig. D7 1 D6 X D5 X D4 X D3 D2 D1 D0 0- Reset 0-for BSR mode Bit select flags D3, D2, D1 are from 000 to 111 for bits PC0 TO PC71- Set I/O Mode Control Word Register Format and BSR Mode Control Word Register Format PA3 PA2 PA1 PA0 RD CS GND A1 A0 PC7 PC6 PC5 PC4 PC0 PC1 PC2 PC3 PB0 PB1 PB2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 0 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 PA4 PA5 PA6 PA7 WR Reset D0 D1 D2 D3 D4 D5 D6 D7 Vcc PB7 PB6 PB5 PB4 PB3 8255A 8255A Pin Configuration = D0-D7 CS RESET 8255A A0 A1 RD PA0-PA7 PC4-PC7 PC0-PC3 PB0-PB7 Vcc WR GND Signals of 8255 3 Group A control 1 D0-D7 Data bus Buffer 8 bit int data bus 4 Group A Port A(8) PA0-PA7 Group A Port C upper(4) Group B Port C Lower(4) PC7-PC4 PC0-PC3 2 RD WR A0 A1 RESET CS Block Diagram of 8255 READ/ WRITE Control Logic Group B control PB7-PB0 Group B Port B(8) D7 D6 D5 Mode for Port A D4 PA D3 PC U D2 Mode for PB D1 PB D0 PC L Mode Set flag 1- active 0- BSR mode Group – A 1 Input PC u 0 Output 1 Input PA 0 Output 00 – mode 0 Mode 01 – mode 1 Select of PA 10 – mode 2 Group – B PCL PB Mode Select 1 Input 0 Output 1 Input 0 Output 0 mode- 0 1 mode- 1 Control Word Format of 8255 Modes of Operation of 8255 (cont.. ) b) Mode 1: ( Strobed input/output mode ) In this mode the handshaking control the input and output action of the specified port. Port C lines PC0-PC2, provide strobe or handshake lines for port B. This group which includes port B and PC0-PC2 is called as group B for Strobed data input/output. Port C lines PC3-PC5 provide strobe lines for port A. This group including port A and PC3-PC5 from group A. Thus port C is utilized for generating handshake signals. The salient features of mode 1 are listed as follows: Modes of Operation of 8255 (cont.. ) 1. 2. 3. 4. Two groups – group A and group B are available for strobed data transfer. Each group contains one 8-bit data I/O port and one 4-bit control/data port. The 8-bit data port can be either used as input and output port. The inputs and outputs both are latched. Out of 8-bit port C, PC0-PC2 are used to generate control signals for port B and PC3-PC5 are used to generate control signals for port A. he lines PC6, PC7 may be used as independent data lines. Modes of Operation of 8255 (cont.. ) †¢ The control signals for both the groups in input and output modes are explained as follows: Input control signal definitions (mode 1 ): †¢ STB( Strobe input ) – If this lines falls to logic low level, the data available at 8-bit input port is loaded into input latche s. †¢ IBF ( Input buffer full ) – If this signal rises to logic 1, it indicates that data has been loaded into latches, i. e. it works as an acknowledgement. IBF is set by a low on STB and is reset by the rising edge of RD input. Modes of Operation of 8255 (cont.. ) †¢ INTR ( Interrupt request ) – This active high output signal can be used to interrupt the CPU whenever an input device requests the service. INTR is set by a high STB pin and a high at IBF pin. INTE is an internal flag that can be controlled by the bit set/reset mode of either PC4 (INTEA) or PC2(INTEB) as shown in fig. †¢ INTR is reset by a falling edge of RD input. Thus an external input device can be request the service of the processor by putting the data on the bus and sending the strobe signal. Modes of Operation of 8255 (cont.. Output control signal definitions (mode 1) : †¢ OBF (Output buffer full ) – This status signal, whenever falls to low, indicates that CPU has written data to the specified output port. The OBF flip-flop will be set by a rising edge of WR signal and reset by a low going edge at the ACK input. †¢ ACK ( Acknowledge input ) – ACK signal acts as an acknowledgement to be given by a n output device. ACK signal, whenever low, informs the CPU that the data transferred by the CPU to the output device through the port is received by the output device. Modes of Operation of 8255 (cont.. ) †¢ INTR ( Interrupt request ) – Thus an output signal that can be used to interrupt the CPU when an output device acknowledges the data received from the CPU. INTR is set when ACK, OBF and INTE are 1. It is reset by a falling edge on WR input. The INTEA and INTEB flags are controlled by the bit set-reset mode of PC 6and PC2 respectively. 1 0 1 0 Input control signal definitions in Mode 1 1/0 X X X 1 X X X X 1 1 X D7 D6 D5 D4 D3 D2 D1 D0 1 – Input 0 – Output For PC6 – PC7 PA0 – PA7 INTEA PC4 PC5 STBA IBFA D7 D6 D5 D4 D3 D2 D1 D0 PB0 – PB7 INTEB PC 2 PC1 STBB IBFB PC3 RD PC6 – PC7 INTRA I/O PC0 INTR A Mode 1 Control Word Group A I/P RD Mode 1 Control Word Group B I/P STB IBF INTR RD DATA from Peripheral Mode 1 Strobed Input Data Transfer WR OBF INTR ACK Data OP to Port Mode 1 Strobed Data Output Output control signal definitions Mode 1 1 0 1 0 1/0 X X X 1 X X X X 1 0 X D7 D6 D5 D4 D3 D2 D1 D0 1 – Input 0 – Output For PC4 – PC5 PA0 – PA7 INTEA PC7 PC6 OBF ACKA D7 D6 D5 D4 D3 D2 D1 D0 PB0 PB7 INTEB PC PC2 1 OBFB ACKB PC3 WR PC4 – PC5 PC0 INTRA I/O INTRB Mode 1 Control Word Group A Mode 1 Control Word Group B Modes of Operation of 8255 (cont.. ) †¢ Mode 2 ( Strobed bidirectional I/O ): This mode of operation of 8255 is also called as strobed bidirectional I/O. This mode of operation provides 8255 with an additional features for communicating with a peripheral device on an 8-bit data bus. Handshaking signals are provided to maintain proper data flow and synchronization between the data transmitter and receiver. The interrupt generation and other functions are similar to mode 1. †¢ In this mode, 8255 is a bidirectional 8-bit port with handshake signals. The RD and WR signals decide whether the 8255 is going to operate as an input port or output port. Modes of Operation of 8255 (cont.. ) †¢ 1. 2. 3. 4. 5. The Salient features of Mode 2 of 8255 are listed as follows: The single 8-bit port in group A is available. The 8-bit port is bidirectional and additionally a 5-bit control port is available. Three I/O lines are available at port C. ( PC2 – PC0 ) Inputs and outputs are both latched. The 5-bit control port C (PC3-PC7) is used for generating / accepting handshake signals for the 8-bit data transfer on port A. Modes of Operation of 8255 (cont.. ) †¢ Control signal definitions in mode 2: †¢ INTR – (Interrupt request) As in mode 1, this control signal is active high and is used to interrupt the microprocessor to ask for transfer of the next data byte to/from it. This signal is used for input ( read ) as well as output ( write ) operations. †¢ Control Signals for Output operations: †¢ OBF ( Output buffer full ) – This signal, when falls to low level, indicates that the CPU has written data to port A. Modes of Operation of 8255 (cont.. ) ACK ( Acknowledge ) This control input, when falls to logic low level, acknowledges that the previous data byte is received by the destination and next byte may be sent by the processor. This signal enables the internal tristate buffers to send the next data byte on port A. †¢ INTE1 ( A flag associated with OBF ) This can be controlled by bit set/reset mode with PC6 . †¢ Control signals for input operations : †¢ STB (Strobe input ) A low on this line is used to strobe in the data into the input latches of 8255. Modes of Operation of 8255 (cont.. ) †¢ IBF ( Input buffer full ) When the data is loaded into input buffer, this ignal rises to logic ‘1’. This can be used as an acknowledge that the data has been received by the receiver. †¢ The waveforms in fig show the operation in Mode 2 for output as well as input port. †¢ Note: WR must occur before ACK and STB must be activated before RD. WR OBF INTR ACK STB IBF Data bus RD Mode 2 Bidirectional Data Transfer Data from 8085 Data towards 8255 Modes of Operation of 8255 (cont.. ) †¢ The following fig shows a schematic diagram containing an 8-bit bidirectional port, 5-bit control port and the relation of INTR with the control pins. Port B can either be set to Mode 0 or 1 with port A( Group A ) is in Mode 2. Mode 2 is not available for port B. The following fig shows the control word. †¢ The INTR goes high onl y if either IBF, INTE2, STB and RD go high or OBF, INTE1, ACK and WR go high. The port C can be read to know the status of the peripheral device, in terms of the control signals, using the normal I/O instructions. D7 1 D6 1 D5 X D4 X D3 X D2 1/0 D1 1/0 D0 1/0 1/0 mode Port A mode 2 Port B mode 0-mode 0 1- mode 1 PC2 – PC0 1 – Input 0 – Output Port B 1- I/P 0-O/P Mode 2 control word PC3 PA0-PA7 INTR INTE 1 PC7 PC6 OBF ACK STB IBF 3 I/O INTE 2 RD WR PC4 PC5 Mode 2 pins How to cite Microprocessor and Interfacing, Papers

Friday, December 6, 2019

Employees Perceive HRM Practices

Question: Discuss about the Employees Perceive HRM Practices. Answer: Introduction Human Resource Management has become one of the most important branches of an organization in the current world, where the need for recruitment and retention of talent is the key factor for success. With the increasing number of graduates, globalization and inter-continental studies, it has is necessary that the organizations around the globe have the facility to filter and select the right candidates for a job, retain these candidates and take care of all their grievances. HRM is also responsible for the performance of an employee during their time in the organization, which includes training and development activities that help the employee grow and increase their value within the organization. To achieve all the above there are several practices adopted around the globe. Some of the top practices are discussed below. Best HRM Practices This is a system rather than a task and hence has to be set in place. Best practices in performance management are Helping an employee understand what is expected of them in the beginning of a performance cycle (Caligiuri, 2014) One on One with manager to set clear goals and timelines Monthly review of goals and milestones reached Managerial feedback regularly (Alfes, 2013) Clear analysis of goals post performance cycle Identifying key success and setbacks to appraise the employee Recognize and reward top performances at team and organization level Help the employee to develop a plan that would overcome their previous set backs (Xing, 2016) Limitations: Some of the limitations could be that the employee goals are not aligned with organizational goals which would make goal setting difficult. Managers have to view each employee by their individual potential rather than a percentage resource (Ahlvik, 2015). If expectations are not clearly set, employee may work for the wrong goals in a cycle. Training and Development Professional growth is a result of training and development that is provided over the years to an employee as a part of their tenure in an organization. Several employees value growth opportunities rather than monetary gain and hence it is necessary to have a strong training and development initiative in place. Demand based training: Certain projects require new and novice skills and based on these demands training can be arranged to a certain number of individuals as they are costly. These training would make the employee feel special and at the same time increase the value of the organization (Veloso, 2015). Required Training: Each quarter HR takes feedback from the employee to understand the training that the employees expect to learn. Based on the highest demand a particular training is provided through external agencies if required. Internal Trainings: As a boost to the existing employees, several key employees are given the opportunity to train new skill recruited (Cooke, 2014). Compensation Strategies Compensation is crucial in retaining employees. Below are some of the compensation strategies that turned out be some of the best practices Seniority based compensation: A percentage hike of salary is paid as a tribute to the loyalty of the employee there by recognizing employees who are dedicated to the company (Pillai, 2016) Performance payout: It is a variable pay usually given per quarter recognizing the efforts of employees Overtime and Shift pays: paid for extra effort put in by the employee Shares: Company shares are given as a part of the package thereby reaping the benefits of a profitable organization which also boosts the morale of the employee (Donate, 2016) Talent Acquisition and recruitment This is where the HR management communicates with the world outside in search of potential candidates. The world today is facing a workforce meltdown, where the number of young recruits are few in comparison to the retiring candidates (Furusawa, 2016). In a condition as such it is necessary that the right talent for each job is identified and are recruited by offering the right compensation. The need to recruit High Skilled Knowledge Workers is at a zenith and talent acquisition is one of the major HRM practice (Giauque, 2013). This is the most tedious task for a HR management and hence has several ways to identify and recruit talent in the organization Method Advantages Limitations Referrals: This method usually uses the contacts of existing employees to find the right candidates and pays a bonus to the employee who helped identify the talent (Theriou, 2014) Low cost even when bonus is given Employees would know if a candidate would fit into the organizational culture Boosts the morale of the referring employee Arguments over the selection of candidates between employees and HR if a candidate is not chosen Chances that employee would refer not so talented sources Social Media and Internet. Posting ads and using sources such as LinkedIn Negligible Cost High number of audience Global reach Cannot be used in case the organizations are searching for employees who are not computer literate Screening could be difficult because of the volume Search Agencies High number of potential applicants Costly Campus Recruitment Best for entry level jobs Excellent PR for the organization Ambitious and passionate candidates can be picked Costly Time Consuming Job Fairs Easy to locate employees looking for immediate recruitment (Bjrkman, 2014). High Diversity Costly Open House The employer calls for applications. Hence has candidates that are interested in joining this particular organization. High number of positions can be easily filled Costly Candidates who are not looking for this particular organization may not be aware of the recruitment Need for high number of interviewers Time Consuming Banners, signs and advertisements Good PR Costly Restricted to Geographical locations Conclusion HRM plays a key role in any organization and several practices available worldwide are selected based on the organizational values. Each of these practices is unique and employee beneficial to ensure that the organization grows to work with talent and right minded people References Ahlvik, C., Bjrkman, I. (2015). Towards explaining subsidiary implementation, integration, and internalization of MNC headquarters HRM practices.International Business Review,24(3), 497-505. Alfes, K., Truss, C., Soane, E. C., Rees, C., Gatenby, M. (2013). The relationship between line manager behavior, perceived HRM practices, and individual performance: Examining the mediating role of engagement.Human resource management,52(6), 839-859. Bjrkman, I., Ehrnrooth, M., Mkel, K., Smale, A., Sumelius, J. (2014). From HRM practices to the practice of HRM: setting a research agenda.Journal of Organizational Effectiveness: People and Performance,1(2), 122-140. Caligiuri, P. (2014). Many moving parts: Factors influencing the effectiveness of HRM practices designed to improve knowledge transfer within MNCs.Journal of International Business Studies,45(1), 63-72. Cooke, F. L. (2014). Chinese multinational firms in Asia and Africa: Relationships with institutional actors and patterns of HRM practices.Human Resource Management,53(6), 877-896. Donate, M. J., Pea, I., Sanchez de Pablo, J. D. (2016). HRM practices for human and social capital development: effects on innovation capabilities.The International Journal of Human Resource Management,27(9), 928-953. Furusawa, M., Brewster, C. (2016). IHRM and expatriation in Japanese MNCs: HRM practices and their impact on adjustment and job performance.Asia Pacific Journal of Human Resources. Giauque, D., Anderfuhren-Biget, S., Varone, F. (2013). HRM practices, intrinsic motivators, and organizational performance in the public sector.Public Personnel Management,42(2), 123-150. Theriou, G., Chatzoglou, P. (2014). The impact of best HRM practices on performanceidentifying enabling factors.Employee Relations,36(5), 535-561. Pillai, R. P., Abraham, C. (2016). Comparative Analysis of the HRM Practices between Hospitality and Healthcare Sectors in South Kerala.SDMIMD Journal of Management,7(2), 11-19. Veloso, A., Tzafrir, S., Enosh, G. (2015). How employees perceive HRM practices: Differences between public and private organizations.Human resource management challenges and changes, 19-36. Xing, Y., Liu, Y., Tarba, S. Y., Cooper, C. L. (2016). Intercultural influences on managing African employees of Chinese firms in Africa: Chinese managers HRM practices.International Business Review,25(1), 28-41.

Friday, November 29, 2019

Aging as a Social Process

Aging is one of the important social issues that society should be concerned about. Aging refers to the gradual changes that happen with time in the life of an individual (Kaplan, 2006, p. 196). A multifaceted process involves changes in terms of psychological, physical, and social changes.Advertising We will write a custom report sample on Aging as a Social Process specifically for you for only $16.05 $11/page Learn More Various dimensions during old age change as one continues to live. For instance, wisdom and knowledge of the world’s events expand with aging while time to react to certain situations declines. However, it is also true that old people may continuously grow in terms of their physical, social, and mental capabilities. Aging is therefore an imperative aspect in the lives of people, as it is an indication of the natural modifications happening to human beings. It also defines collective and ethnic patterns of the society. Society is able to grow and progress because of the values and conventions that the elderly pass on to the upcoming generations. Aging is categorized as chronological, which is time bound (Leahy, 2006, p. 21). All people must pass through the state that is measured from the time an individual is born. Social aging is based on culture, and concerns believes and perceptions of people when they age (Leahy, 2006, p. 21). Biological aging concerns physical states. An old person exhibits some physical characteristics such as wrinkles on the face, grey hair, and weak body. It is also important to note that, regardless of people being old, they may have different physical and mental capabilities. Various governments have different ways of classifying old people. They also have different policies to look after them. Population aging arises due to increased rate of migration, decrease in birth rate, and the increase in life expectancy due to low death rate (Kaplan, 2006, p. 196). Aging has significant i mplications to the society. Their needs are different from those of young people. For instance, they do not involve in criminal activities. Sociology is an important field that studies behaviors and the way human beings live and coexist with one another. It is therefore a very essential area when it comes to understanding the society. Aging is one of the important characteristics that are part of the society.Advertising Looking for report on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More People or every society has a share of the aging people. Therefore, aging is an important aspect in sociology. One of the sociological theories that fits or applies to aging is the social conflict theory. The theory postulates the civilization results from fighting for power and that various groups must struggle to gain access to the limited resources (Ritzer Goodman, 2004, p. 32). The society is also structured to benefit the few while the majority is not considered. These kinds of inequality lead to conflicts that in turn lead to social misunderstandings. This theory helps people understand the society in a bid to trigger change. In most cases, old people have been secluded and are not involved in critical decisions making of the society. Therefore, it is important for the society to support these people besides providing them with the needs that they require. For instance, they are entitled to good health, opinion, and good life. This is the only way that the society can be able to alleviate these inequalities. Structural functionality is yet another theory that is in line with aging. Old people should be included in the functions of the society to promote stability and solidarity (Ritzer Goodman, 2004, p. 34). This will ensure that the society functions fully and as a whole, as every person’s views, opinions, and needs will be considered. Aging is one of the issues that the society knows though it does not give it its due attention. Various issues are known about aging. One of the things that are known about it is that it is an inevitable result of the time spent on earth. People perceive aging as a process that arises to those people who have stayed for longer period. Secondly, it is the duty of the society to accord respect to the elderly people. People who are disrespectful to the elderly in society are not received well. Furthermore, most of the aging people are viewed to have a high level of wisdom and ones who are aware of the cultural aspects by which the society should abide (Kaplan, 2006, p. 196). Therefore, in most cases, the society consults such people for advice. During conflicts, they are used as arbitrators due to their knowledge and skills. On the other hand, most people do not know that elderly people require good care.Advertising We will write a custom report sample on Aging as a Social Process specifically for you for only $16.05 $11/page Learn More Many people have failed to provide both material and financial support to the aging people because they believe that they have the ability to look after themselves. Another thing that people do not know is that aging is one of the causes of death for elderly people. Their bodies do not function as required. Therefore, they end up developing diseases, which claim their lives quickly. Sociological research is important in these areas. In a broad sense, research is essential because it helps one to have different views and perspectives on different things that happen in people’s lives. Sociological research is important because it helps in highlighting the various issues pertaining to aging. Elderly people have various characteristics. Therefore, it helps to understand the way they behave and ways in which they can be helped to co-exist well with other people in society. For instance, it may help to improve the lives of the elderly by investigating on problems tha t they go through. There are practical implications of sociological inquiries. Some of these implications might be positive while others are negative. For instance, when an inquiry is carried out about the problems that the elderly face such as stigmatization, the findings can be used to create awareness to educate the larger society on the need to embrace and accept the old people in the society. Therefore, such initiative may lead to unity and cohesion among people in the society. Reference List Kaplan, M. (2006). Aging as a Social Process: Canadian Perspectives, 4th edition. American Review of Canadian Studies, 36(1), 196-198. Leahy, S. (2006). Simone Signoret: Aging and Agency. Studies in the Literary Imagination, 39(2), 21-42. Ritzer, G., Goodman, D. (2004). Sociological Theory: Sixth Edition. London: McGraw Hill.Advertising Looking for report on social sciences? Let's see if we can help you! Get your first paper with 15% OFF Learn More This report on Aging as a Social Process was written and submitted by user Ahmad Q. to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Online Essays

Online Essays Students are having a lot of problem in writing an essay nowadays. With the increasing burden of homework and sometimes, part-time jobs, the students cannot possibly write their own essays. There are students who do not have the ability or time to write their essays themselves. They do not know how to write and what to put into writing. Many students look for essays online. If they copy from a book or website, it is plagiarism. So, what do they do? The answer comes in the form of the numerous online essay writing companies that help students who need guidance in writing their essays. However, this method also has a drawback. Several companies that claim to provide online essays for sale are fraud. They ensnare the students into their traps, loot their money, and waste their time. This is probably one of the few reasons why students are afraid of taking help from online essay writing companies. These companies may spring up anywhere and make false promises for the sake of earning money. They trap students, who are inexperienced in recognizing such online custom essay services. However, we cannot let this reason become a hurdle in their way for essay writing. One can easily save money and prevent the risk by identifying these companies, but how to recognize them? The following points will help you to distinguish between real and hoax companies: 1.  Is the company making too many promises? If so, there is a chance that the company is a fake one. Fraud companies usually make too many promises, as they do not have to fulfill them. 2.  Is the company making too many offers? If the company you are asking for essay assistance is making too many offers, and is trying to give you high (and probably false) hopes, there is a chance that the company is a fraud. 3.  Is the company undertaking too much? If so, think again. The company might be a fraud because many hoax companies promise to do unbelievably large online essays in a short period of time, and ask a lot of money for it, which they usually get. 4.  Is the company willing to give its telephone number and/or address? Fraud custom essay companies have robbed over millions of people, and they definitely do not want to be tracked. A company that does not give full information to the customer about itself has an 80 percent chance that it is a fraud. 5.  Do the company support staff/employs directly talk to you? If no, the company might be a fraud. Fraud companies are normally run by only a few people and do not have many employs. For more information on how you can save yourself from the curse of these fake companies, you can contact our online custom essay writing service where you can get online college essays, online school essays, online high school essays provided by professional online essay writers.

Thursday, November 21, 2019

Does the Internet make us smarter Essay Example | Topics and Well Written Essays - 1250 words - 1

Does the Internet make us smarter - Essay Example However, the various faces of the internet today are used by all kinds of people; both professionals as well as amateurs in every field. This has brought people to debate about the topic whether or not the internet actually makes an individual smarter, which has been further discussed within the scope of this paper. According to a news report, it was stated that ‘amid the silly videos and spam, the internet has been able to create a new reading and writing culture’, thus leading to making a person smarter. As per this report, the demerits of the internet have been highlighted in the form of the social networking websites as well as random videos that take up most of the time of a person browsing through the web. These appear as popups and distract a person from the work that he is actually supposed to do. For example, a student sitting down to finish a homework assignment would easily be distracted by websites like Facebook while trying to search for information for his work. This usually results in him spending three to four hours on the internet, wasting time looking at other people’s profiles and gallivanting across videos here and there. If this distraction was not present, it would have taken him an hour and not four of them to complete his work on an average basis. How ever, the internet still provides for a reading and writing culture because search engines help people to stumble upon interesting websites with good information. These days, most newspapers and magazines have also gone the ‘e-way’, that is, printing their news articles online instead of on paper in order to contribute to the environment in their own personal way. Thus, the information from these pieces of news is available to people around the world; where a man in one country was only reading the newspaper belonging to his country, he now has access to news from around the world. In much the same way,

Wednesday, November 20, 2019

Immigration Essay Example | Topics and Well Written Essays - 2750 words

Immigration - Essay Example Wood (2004) sees domestic violence as a ‘crime that does not recognize racial, cultural, or socioeconomic barriers’. In brief, economic, cultural or political development of a given community does not automatically ensure the protection of the rights of women against being the victims of various types of gendered violence. Although domestic violence and other types of violence on women are prevalent among almost all the social groups, its nature and degree are different from community to community. Thus, the violence on immigrant women is so rampant and involves issues and concerns that are radically different from those pertaining to other social sections. It means that the social settings in which an immigrant woman is uniquely placed makes her more vulnerable for being the victim of various types and degrees of sexual and gendered violence than other sections of women citizenry. In addition, the conditions of undocumented immigrant women are even more exploitative and oppressive as they are systemically exempted from the cover of the law of the land. The introduction of Violence Against Women Act (VAWA) in 1994 has marked a turning point on the legal debate over the issue of increasing violence on immigrant women and its social consequences. The merits and drawbacks of the VAWA are on the focus of attention since its very introduction. Demands for amendments to the VAWA have been raised from around the corners for not only making it more effective but also casting off its perceived and real ills. Even, it is possible to identify a ‘VAWA discourse on the violence on immigrant women’ that encompasses almost all the possible aspects of the concerns pertaining to the human rights of immigrant women. The purpose of this paper is to overview the issues of immigration and the violence on immigrant women and analyzes it as a policy matter that must address unique social, political, economic, and cultural factors and include

Monday, November 18, 2019

Introduction to Mechanical Engineering Essay Example | Topics and Well Written Essays - 2250 words

Introduction to Mechanical Engineering - Essay Example Mechanical engineering is among the oldest engineering branches. The branch has also been named as the ‘mother’ branch of engineering. One appealing characteristic of mechanical engineering is the extreme broadness and diversity of its application base. Nearly all inventions made in the ancient times and most in this modern era are attributed to one or more applications of mechanical engineering (ASME International). Mechanical engineers are usually involved in concepts like thermodynamics, kinematics, robotics, fluid mechanics, structural analysis among others. The above concepts are used in the designing process of state-of-the-art units of manufacturing, aerospace and aircraft parts, a range of industrial machinery and various motor vehicle types. Mechanical engineers have a large contribution to the development of different power-plant equipment, engines, complex and simple machinery and cooling and heating systems. Apart from designing mechanical systems, mechanical engineers are also involved in maintaining, testing and manufacturing them (Wickert 2). The abovementioned are the conventional responsibilities and roles of mechanical engineers. ... list of 36 technical divisions, ranging from aerospace engineering and sophisticated energy systems to textile engineering and solid-waste engineering. Due to the diverse nature of mechanical engineering, professionals are involved in designing and building of devices and machines which allow people to survive and work under water, on the ground, in the air and in space. They manufacture machines which can extend people’s abilities, health and living standards, and impact their living environment. Naturally, the availability of materials for tackling their tasks determine most of the things these professionals can or cannot achieve. This is the reason why engineers work closely with material scientists with the aim of tailoring the mechanical as well as electrical and chemical characteristics of materials to explore the possibility of making new applications (Wickert 7). The job profile of mechanical engineering is ever increasing and this calls for professionals to venture in to marketing and financial features of product development as well as into management of both people and resources. In general, mechanical engineering provides a wide range of job choices to students seeking a stable and interesting career. Beginning Your Journey into Mechanical Engineering The first step to take in order to become a mechanical engineer is passing in chemistry, mathematics and physics. To qualify for enrollment into a mechanical engineering programme in a college, one should score at least 50 to 60 percent in the three subjects. After this, one is expected to sit for entrance examinations like The Joint Entrance Examination for IITs (IITJEE) to be admitted to different IITs among others. There are numerous engineering colleges in the world where one can get enrolled into a

Saturday, November 16, 2019

Risk Assessment And Treatment Of Paedophiles Criminology Essay

Risk Assessment And Treatment Of Paedophiles Criminology Essay An essential aspect of dealing with paedophiles, for the government and the public as well, is risk assessment. This means calculating the probability of the occurrence of a harmful behavior and its impact on the target and all that will be affected (Kemshall, 2001). The assessment is based in observing and evaluating the factors that are indicators of the likeliness of offending or re offending as well as those propensities that endure in known or probable offenders. There are two approaches to risk assessment: the actuarial, a statistical calculation of probabilities, and the clinical, based on the observation of factors that proved to have resulted in sex offences. Actuarial methods The most well established scales of actuarial tools are: The Rapid Risk Assessment for Sex Offence Recidivism (RRASOR) Static 99 The Risk Matrix 2000 (RM 2000) and The Sex Offence Risk Appraisal Guide (SORAG). The RRASOR (Grubin, 1998) comprises of the evaluation of prior sexual arrests age targeting male victims relation of the victims to the offender. RRASOR succeeds in identifying large groups of low risk offenders with low probability of recidivism and small groups of high risk offenders with high probability of recidivism. Static 99 is a combination of RRASOR and SACJ and considers static risk factors. It has a strong validity for male sex offenders who have been already served in prison. The items of Static 99 are: male victims never married offences that didnt involve contact victims that are unrelated victims that are strangers other sex offences other than sexual current types of violence more than 4 sentencing dates age that vary between 18 and 24.9 years. The Prison, Probation and Police Services in England and Wales use the Risk Matrix 2000. Its uniqueness compared to the other tools is that it can be used for whichever type of violence, sexual or non sexual. The RM 2000 has two stages. Stage 1 age at the commencement of risk number of appearances in court for sex offence related issues number of appearances in court for other offences than sexual Evaluation of these factors leads in placement in four groups: low, medium, high or very high risk. Stage 2 history of offences against male victims history of stranger sexual offence victim history of non contact sexual offences lack of long term intimate relationship If any subject has one of these factors, moves up one group on the previous ranking. If all four factors are present, the subject moves two groups upwards. The Sex Offence Risk Appraisal Guide (SORAG) was developed in Canada by a sample of inmates of a high secure psychiatric hospital. It is used widely to predict violence committed by sexual offenders but it is also quite popular on non psychiatric offenders. It comprises of 14 items: living with biological parents until the age of 16 maladjustment in elementary school history of alcohol related problems evidence of sustained intimate relationship criminal activity with absence of violence criminal activity with violence prior convictions regarding sexual offences convicted sexual offences against girls under 14 years failure in achieving conditional release age at index offence personality disorder criteria from DSM-III are met schizophrenia criteria from DSM III are met evident deviant sexual preferences evident psychopathy. Clinical methods Clinical methods are conducted in psychiatric hospitals by interviewing and evaluating the responses of known sex offenders. They are not considered as reliable as the actuarial methods, yet they can provide structured behavioural rating scales as aid to the actuarial tools (Kemshall, 2001). Clinical methods can estimate successfully the impact of environmental factors on harmful behavior. Clinical methods can be categorized in unstructured and structured methods (Shaw, 2011). The psychoanalytic approach proposed by the unstructured model relies heavily on the human factor and so, it is considered to be outdated and highly subjective. On the other hand, the structured models are well respected and, subsequently, used as they combine psychoanalysis with statistical tools. The structured clinical methods that are most frequently used are: Psychopathy Checklist Revised (RCL-R) Historical, Clinical, Risk 20 (HCR 20) Sexual Violence Risk 20 (SVR 20) Structured Assessment of Violence Risk in Youth (SAVRY). Managing risk In order to manage the risk posed to society by sex offenders there have been established agencies all over the United Kingdom. For risk management to e effective there has to be a solid information base and strong coordination between all the participants involved in the task of control and prevention of sex offences. It is an ongoing procedure that must be kept up to speed with the developments, apply new strategies and measure the efficacy of the actions taken. In Scotland the Multi Agency Public Protection Arrangements (MAPPA) has been established since the Management of Offenders Act 2005. The aim of MAPPA is to aid the work of criminal justice organizations in association with social services, so as they can reduce the acts of sex offenders and prevent recidivism of know offenders (MAPPA Annual Report 2009/2010). In England and Wales the Probation Service uses the Offender Assessment System to estimate the likelihood of re offending and re conviction. The Offender Assessment System uses the gathered information to alert the Multi Agency Public Protection Arrangements (MAPPA). MAPPA was established under the umbrella of the Criminal Justice Act 2003 Treatment of paedophiles Since the causes of paedophilia are yet unknown, it is a difficult task to determine the right course of treatment. At the moment, as there is no cohesive approach for the definition of paedophilia or its causes, there is a lack of the necessary consistency to the corresponding actions in regard of treating paedophiles as well. It is open to debate whether paedophiles exhibit mental disorder and if they are in need of treatment or their actions are of a sane person and are in need of punishment (Gordon Grubin, 2004). However, the main common goal for all the approaches of treatment is to reduce the danger of recidivism (Perkins et al, 1998). Treatment of paedophiles has changed its course many times over the years. The surgical castration(Perkins et al, 1998) that was used as a means of treating paedophiles and other convicted sex offenders, was abandoned by the 70s (Gordon Grubin, 2004), as hormonal therapy was gaining ground. Hormonal treatment included giving oestrogens but had high rates of side effects, such as thrombosis of carcinogenesis. Oestrogens gave their place to cyproterone acetate and medroxy progesterone acetate (Gordon Grubin, 2004). The drug treatment managed to reduce recidivism as only 15% of the users relapsed as opposed to the 68% of the non users (Perkins et al, 1998).Currently, dynamic psychotherapy is widely used for sex offenders (Gordon Grubin, 2004). The first step towards treatment is for the sex offenders to admit to their guilt. This is important as the treatment will try to persuade the offender to understand and empathize with the victim, while the psychological and physiological characteristics of paedophilia will be quelled. However, those who do not admit guilt can still be included in the treatment, although it will be an even more demanding task. At the same time, monitoring high risk factors and using a support system can avert re offending behavior (Hanson Harris, 2000). Most of the attempts in treating paedophiles involve the restoration of the cognitive process. The distortion of cognition is considered to be a coping mechanism, that the offenders tend to develop before or after they offend (Sheldon Howitt, 2007). The cognitive behavioural therapy is used to help paedophiles find a way to avoid sexual arousal from abnormal situations (Perkins et al, 1998). What is necessary for those who provide the treatment is to understand that each individual sex offender has different treatment needs and that a combined methods approach is more likely to be successful. The Sex Offender Treatment Programme (SOTP) is a well established programmed of treatment for sex offenders and is widely used around the world. It is being managed by the Prison Offending Behaviour Programmes Unit and has been developed by the British Prison Service. The most significant criteria, SOTP is based upon, are application of treatment methods that have proved to be effective, an empirically based model and treatment in accordance to the severity of each case (Perkins et al, 1998). Reintegration of Paedophiles Although still in a small scale, there have been schemes towards reintegrating released paedophiles. Starting by forming and application in Canada and the United States, schemes, such as the Stop It Now Program, started to be applied also in the United Kingdom and Ireland (McAlinden, 2006). The Stop It Now Program offers a professional assistance to those who have offended, those who are close to offending and those who suspect that there has been foul play in their environment. The most widely used program in reintegration of sex offenders is the Circles of Support and Accountability that has been running in England for a few years. In this program the offender is the core of a circle of volunteers. These volunteers help the offender in solving practical job and boarding related issues. At the same time they hold the offender accountable for his actions and behavior in general, while at the time they are obligated to report any suspicion of re offending to the authorities. Although the pilots are ready to be executed, they are not yet active. In some areas the difficulties lay in funding the project and in other cases it is extremely difficult to find volunteers (Armstrong et al, 2008). Due to the obstacles these schemes keep finding suggestions are made that the particular programs or other initiatives could work under the umbrella of inter agency risk assessment and management procedures (McAlinden, 2006). In addition to the pre existing policies, this kind of schemes can help the goal of making re integration more effective. Public disclosure High profile cases, such as the Sarah Payne abduction and murder by a known paedophile, resulted in the name and shame campaign from the media and especially the News of the World. The campaign started with the initiative of the newspaper (Moyes, 2000), promoting the naming of all convicted paedophiles, and received much attention from the public and the authorities as well. The publics wishes, accentuated by the media pressure, for disclosure for all sex offenders were met by the government to a pilot scheme where anyone could report someone else with access without supervision to their child. The scheme was implemented by Home Office in 2009 in four police areas in England and one area in Scotland and by 2010 it was set to run nationally. However, as other schemes, it didnt find the anticipated participation (Kemshall et al, 2010), pointing out in a divergence between what the government provided and what the public actually demanded for (Kemsall Weaver, 2012). The reasons for this were multiple. Primarily, the public perceives these kinds of schemes, run through the police, as an increase in policing the everyday life, when they should be assumed by other agencies. Moreover, they are thought as a way to push the responsibility onto the public instead of the proper authorities (McCartan, 2010). It has also been established (McCartan, 2010) that the public views sex offenders as a complex issue, with child sex offenders being the most dangerous, so there is the need of differentiation in disclosure schemes. Publicizing the schemes is an important tool for the successful implementation of them. They are to be explicitly explained to the public so as to be efficient (Kemshall Weaver, 2012). In addition to this, public needs evidence that the schemes are actually beneficiary and result in child protection (Kemshall et al, 2010).

Wednesday, November 13, 2019

Essay --

With energy demand projected to almost double in the Asia and Pacific region by 2030, there is a necessity for innovative ways to generate power while at the same time reducing pollution and greenhouse gas emissions. The United Nations Secretary-General made sustainable energy one of the five key priorities which include developing sustainability guidelines and criteria for bioenergy production and use; mapping landscapes to determine bioenergy potential in developing countries; and promoting investment in bioenergy. United Nations reiterated that universal access to energy, improved efficiency and enhanced deployment of renewable sources are achievable, and the is leading a â€Å"Sustainable Energy for All† initiative led by the Secretary-General to make them achievable. (UN Foundation,2013) Vital trends relevant to biomass energy project development are the power infrastructure and the project finance market. (Minnich, 2010) The first deals with emerging economies, particularly in Asia-Pacific nations such as the Philippines, are continually challenged by inadequate power supply to meet demands. The problem is exaggerated in nations where rural electricity is limited by geographical barriers or political challenges. Hence, many nations have established models for independent power producers that promote smaller, private owned power plant developments while guaranteeing connectivity to the national power grid. These applications, typically limited in size, from 1 to 50 MW approximately, create many opportunities for small power producers. In regions where agriculture is the major industry or in countries with national bio-fuel policies, the availability of biomass fuel sources and the promise of independent power producer policy may... ...- East Asia Pacific mentioned â€Å"Cross region and collaboration is very important in order to share lessons in the successful implementation of SEF. It is important for IFC and FIs to share experiences on implementing and financing these projects for this is important way to improve how we do business. Each country or bank is unique yet fundamental procedures such as understanding the clients’ needs, knowing the market are matched with how we could address it by keeping open mind and being adoptable†. Permata Bank formed the BPI - Permata Bank Knowledge Exchange in May 2012 as a platform for IFC, Permata and BPI to engage in knowledge sharing. The results of the exchange will become the benchmark in project financing renewable energy in the region the replication of the SEF model, originated from Russia, Europe and China, and adopt it for South East Asian nations.

Monday, November 11, 2019

Cognitive and psychodynamic approach to psychology

The Difference Between The Cognitive Approach And The Psychodynamic Approach To PsychologyPsychologists introduced a figure of diverse attacks in order to understand human nature and behavior. There are different ways of explicating phenomena, which is why there are different attacks. These different attacks include Cognitive and Psychodynamic. The Cognitive attack began to revolutionize psychological science in the late fiftiess and early 1960s.Piaget is the best known cognitive development research worker who suggested that, believing progressed through qualitative alterations due to the increasing adulthood of encephalon. He is remembered for his surveies of cognitive development in kids ( 1896-1980 ) . The cyberspace site, quotes.net quotation marks Jean Piaget as stating â€Å"The chief end of instruction is to make work forces who are capable of making new things, non merely of reiterating what other coevalss have done† Cognitive psychologists are interested in how people understand, diagnose and work out jobs. Cognitive research chiefly focuses on how our encephalons procedure information and the research tends to take topographic point in the research lab than in real-life scenes. The cognitive attack provinces that cognitive upsets have been learned, and so can be unlearned. Harmonizing to Albert Ellis, when we think positively and do determinations based on grounds, we behave rationally, and as a consequence we are happy, competent and effectual. On the other manus, prolonged irrational thought can take to psychological jobs and unnatural behavior. Attribution theory suggests that when we are disguised with person ‘s behavior, we try to work out in our heads why the individual is moving Wyrd. Harmonizing to Kelley ( 1967, 1973 ) , when we are doing these ascriptions, we work out in phases, First, we try to make up one's mind whether the person is to be blamed for his actions, secondly, whether person else is responsible and thirdly, whether the state of affairs itself has influenced the individual to act in such a manner. Unlike cognitive attack, the psychodynamic attack focuses on the three parts of head which are witting, unconscious and preconscious and the three constituents of personality which are id, self-importance and superego. Conscious are ideas and perceptual experiences while unconscious are wants and desires formed in childhood. It was chiefly initiated by Sigmund Freud, a Viennese physician who specialised in neurology. All psychodynamic theories stem from depth psychology. Freud foremost developed the basic thought that understanding behavior requires insight into the ideas and feelings which influence our actions. Hill ( 2001 p.72 ) quotes Sigmund Freud as stating â€Å"I set myself the undertaking of conveying to illume what human existences maintain hidden within them† . Freud ‘s apprehension of the head was mostly based on interpretative methods. Freud argued that, childhood experiences play a important portion in grownup development including the development of grownup personality. Every kid must go through through the alleged psycho-sexual phases ; how a kid experiences these phases plays a important function in the development of his/her personality.Methods Of ProbeCognitive developmental psychologists have used methods such as observation eg Piaget day-to-day observation of kids playing and experimentation eg experiments comparing the ability of two different age groups to go through preservation trials. Piaget was looking at the sort of errors that kids of different age group make. Piaget ‘s theory provides elaborate description of development but does non truly explicate decently. By concentrating on the kid ‘s errors, he might hold overlooked more of import abilities that kids do possess. Psychodynamic psychologists nevertheless used clinical instance surveies, dream analysis and free association to research their theory. Freud used to look into his patients in item and deeply analyse and interpreted all they said and did. Carl Gustav Jung ( 1875-1961 ) was the first favorite adherent of Freud. Jung disagreed with Freud that dreams are ever disguised wish fulfillment ensuing from the past fortunes alternatively Jung suggested that dreams reflect current pre-occupations.Strengths And Failings Of Psychodynamic ApproachStrengths:Psychodynamic attack reminds us that, early childhood experience can hold an impact on people throughout their live without them being cognizant that it is go oning. Therefore, the attack accepts that everyone can endure mental unwellness through no mistake of their ain. It besides offers a ‘cure ‘ for abnormalcy through depth psychology by explicating the implicit in causes in the unconscious, doing them witting, and let go ofing the patient from the emotional hurting caused by the childhood injury. Many people would hold that, unconscious procedures do hold an consequence on human behavior, and Freud ‘s work on how defense mechanism mechanisms protect the self-importance is particularly utile. Freud instance surveies like `Little Hans` and `Anna O` detailed aggregation of informations provided scientific support for his theory and depth psychology has tremendous explanatory power and has something to state on a immense assortment of of import subjects. The failings of psychodynamic attack are that, it can non be scientifically observed or tested. In fact, it has ne'er been disproved by any trial. There is no manner of showing if the unconscious really exists and verify if a pent-up memory is a existent or false memory unless independent grounds is available, in that context, most of psychodynamic theories are taken on religion. Freud over emphatic sexual causes and harmonizing to Breuer, Freud was prone to â€Å"excessive generalisation† . A healer must analyze and construe any grounds recovered by a psychoanalyst from a patient, this leaves open the possibility of serious misunderstanding or prejudice because two healers may construe the same grounds in wholly different ways. Finally, the psychodynamic attack ignores possible account of unnatural behavior by other psychological attacks. As for the cognitive attack, it concentrates on current information-processing by the encephalon, it does non depend on the past history of the client, and for illustration, retrieving pent-up memories from the unconscious. It besides had practical applications and deductions for the society. Cognitive research workers normally conduct scientific and nonsubjective research to back up their theories, nevertheless, it has been accused that the cognitive psychologists ignored the immense complexness of human operation by comparing to computing machine working. It besides ignores the emotional life of worlds.ComparisonThe psychodynamic attack provinces that, behaviour is non learned but caused by forces in the unconscious unlike the cognitive attack which states that behavior is learned as we process information and mental alterations in of import ways over clip. Psychodynamic attack considers behaviour as predetermined. They point out that different parts of the head are in changeless d ynamic battle with each other, so persons have no control over their behaviors but the cognitive attack see behavior as non predetermined. It states that we ever have power to alter knowledge. Psychodynamic attack is regarded as unscientific because it can non be measured or manipulated, whereas cognitive attack is regarded as scientific since it considers the encephalon is similar to a computing machine where information can be manipulated. Unlike cognitive attack, psychodynamic attack chiefly focuses on early childhood behaviors. The chief differences are the attack in which each theory takes in finding the cause of mental unwellness or mal adjusted behaviour eg psychodynamic position focuses more so on unconscious procedure while cognitive position focuses more so on mental procedures.SimilaritiesEach theory is used to specify the outlook of work forces, explain mental unwellness and find a manner to command if necessary. Each theory on its ain manner focuses on the human head and its reaction to its environment. They both have trouble in corroborating their research.Mentions · Hill G. 2001 As Level Psychology through Diagrams Oxford University imperativeness. hypertext transfer protocol: //en.wikipedia.org/wiki/Psychology hypertext transfer protocol: //www.associatedcontent.com/article/21688/psychodynamic_humanistic_and_cognitive.html? cat=58 hypertext transfer protocol: //www.ngfl-cymru.org.uk/vtc/ngfl/psychology/psy_1.doc â€Å" Jean Piaget. † Quotes.net. STANDS4 LLC, 2009. 14 November. 2009. hypertext transfer protocol: //www.quotes.net/quote/16376

Saturday, November 9, 2019

Free Essays on Dr. Faust

Dr. Faust Christopher Marlowe's play Dr. Faustus is the story of the struggle of one man who is battling with himself over what he values most in life, and to what extent he will go to obtain his desires. There are two levels at which Faustus is in battle with during the play. He is in a physical battle with Satan, and he is in a psychological battle with himself over what is right and wrong. The battles over what are exactly good and evil and what a person values in their life are the two underlying struggles in this work. Faustus is a very educated and high member of society, but he was born in a lower class and has struggled all his life to be a wealthy person. He attains this opportunity to become wealthy when he learns how to call upon Satan, and he makes a deal with the devil to attain all the riches in life for his soul. Through out the play Faustus struggles with this decision and changes his mind back and forth with the devil to go back on the deal. Faustus is a human character theref ore he is tempted as all humans are and will be lead astray by false promises of happiness attained by wealth and knowledge. Dr. Faustus is a play dealing with the psychological effects that comes with the acquirement of wealth and knowledge in a non-ethical manner. The obvious elements of a psychological battle are in the characters of the good and bad angels, and the story line that a man sells his soul to the devil in return for riches on earth. The good angel is the trademark of the good thoughts and the Superego in the story, and the bad angel is the trademark of all that is evil and the ego in the story. The good angel is always giving Faustus the opportunity to repent and come back to God, and that God will forgive him and allow him to enter into heaven. "Never too late, if Faustus will repent...Repent, and they shall never raze thy skin". The good angel is arguing with the bad angel while Faustus is contemplating repenting his sins s... Free Essays on Dr. Faust Free Essays on Dr. Faust Dr. Faust Christopher Marlowe's play Dr. Faustus is the story of the struggle of one man who is battling with himself over what he values most in life, and to what extent he will go to obtain his desires. There are two levels at which Faustus is in battle with during the play. He is in a physical battle with Satan, and he is in a psychological battle with himself over what is right and wrong. The battles over what are exactly good and evil and what a person values in their life are the two underlying struggles in this work. Faustus is a very educated and high member of society, but he was born in a lower class and has struggled all his life to be a wealthy person. He attains this opportunity to become wealthy when he learns how to call upon Satan, and he makes a deal with the devil to attain all the riches in life for his soul. Through out the play Faustus struggles with this decision and changes his mind back and forth with the devil to go back on the deal. Faustus is a human character theref ore he is tempted as all humans are and will be lead astray by false promises of happiness attained by wealth and knowledge. Dr. Faustus is a play dealing with the psychological effects that comes with the acquirement of wealth and knowledge in a non-ethical manner. The obvious elements of a psychological battle are in the characters of the good and bad angels, and the story line that a man sells his soul to the devil in return for riches on earth. The good angel is the trademark of the good thoughts and the Superego in the story, and the bad angel is the trademark of all that is evil and the ego in the story. The good angel is always giving Faustus the opportunity to repent and come back to God, and that God will forgive him and allow him to enter into heaven. "Never too late, if Faustus will repent...Repent, and they shall never raze thy skin". The good angel is arguing with the bad angel while Faustus is contemplating repenting his sins s...

Wednesday, November 6, 2019

The Hour of the Star by Claris Lispector

The Hour of the Star by Claris Lispector Introduction Whenever we encounter a book for the first time, our initial perception can so easily be colored, even distorted, by conscious or unconscious prejudices. In some moments though, we do find ourselves delving into a text with an almost open mind; with hardly the slightest inkling of what to expect.Advertising We will write a custom essay sample on The Hour of the Star by Claris Lispector specifically for you for only $16.05 $11/page Learn More This specialness is most rewarding when we find ourselves surprised beyond measure; we disbelief, we exclaim, we are carried away, we are moved. I first read â€Å"The hour of the Star† in such a manner, completely bereft of expectation, and so indelible has its effect been that I’ve since invariably owned a copy. Discussion Lispector’s power over us, for me at least, lies in the characterization of the narrator and the motivation that informs the almost obsessive relationship that he ha s with his subject: Macabea. Because of her seemingly self-willed refusal to know, Macabea leads Rodrigo, along with us, to invaluable insights. Rodrigo is urbane and cosmopolitan. He is a sensitive character, one who is aware of the fundamental concerns of the present day though not overly engrossed in them. He seems to have a balanced, plausible, if not reliable, conceptualization of reality. He leads something of a contented life though unhappy with the lack of success in his writing career. But he is jolted by the coming of Macabea into his life and he is suddenly preoccupied with her obvious otherness, and because of her, the meaning of being, the existence of God and the prospects of death. Rodrigo is primarily driven to study and write about Macabea by her seeming the very antithesis of who he is. At first, it is the look of damnation on her face that got him interested in her. As he gets to know her, he is irked, irritated, by her apparent nonchalance towards reality. This i s so much so that he can only refer to her as ‘the girl from the Northeast’ at the beginning of the novella. Macabea, on the other hand, is not a retard but she seems to suffer from a thoroughly inhibited intellectual capacity. This is however not what interests Rodrigo.Advertising Looking for essay on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More It is rather that this incapacity to engage reality in any meaningful manner seems almost self-willed. She has no ambition. She is painfully naà ¯ve. She is happy to not know. But she still manages to seem unaware of the presence happiness and consequently, its absence in her own life. Rodrigo’s eventual fascination with Macabea is not merely as a result of her being different from him but rather because he finds himself utterly incapable of comprehending her. It is part of our nature: to be obsessed with the arcane and mysterious. In giving Ma cabea a voice, Rodrigo becomes so engrossed that he begins to have softer feelings for her. He has to understand her and in doing so, he is forced to explore himself, his feelings and his beliefs. He ends up becoming so immersed in his subject that he even begins to doubt himself, whether it is actually him doing the writing or if there is possibility of the existence of another agent in him. By the end of the book, ‘the girl from the Northeast’ has become ‘Maca’ to Rodrigo (Lispector 92). Conclusion Lispector is so good at conjuring this awe for Macabea that we find ourselves getting carried away, genuinely needing to know who Macabea exactly is. But she dies and all one is eventually left with, like Rodrigo, is just self reflection. Lispector, Claris. The hour of the star. New York: New direction publishers. 1986. Print.

Monday, November 4, 2019

Physical Assesment Case Study Research Paper Example | Topics and Well Written Essays - 1000 words

Physical Assesment Case Study - Research Paper Example Client was awake, alert and coherent. Physical assessment revealed erythematous plaques covering both cheeks, and at the bridge of her nose, without affecting the nasolabial folds or any other part of her body. Aside from that, her head was found to be normocephalic with no signs of trauma or other deformities. She had clear white sclera and clear conjunctiva; her pupils were reactive to both light and accommodation. Erythema was noted on the posterior wall of her pharynx, and ulcers were found on both of her buccal mucosa. Her neck showed no swelling or bumps, and no traces of lymphadenopathy or thyromegaly. Patient had no trouble achieving full range of motion in her joints with no obvious swelling or deformities. Patient’s vital signs showed a normal heart rate at 62 beats per minute, normal respiratory rate at 12 breaths per minute, a normal blood pressure of 112/66 mmHg, and an elevated temperature of 100.3 degrees Fahrenheit. Interview and Health History Patient reported that the rash was first noticed after a week outdoor hiking and camping in the Appalachians. She denies exposure to any new skin products, usage of medications, environmental exposure, and food allergies. She has not taken any medication for the rash. She denies experiencing headache, sore throat, ear pain, nasal congestion, chest pain, shortness of breath, cough, pain during urination, urination and diarrhea. She reports no stiffness in the joints or difficulty in getting up in the morning. The only surgical procedure that the patient has undergone was a tonsillectomy at age 9 due to her chronic strep throat infection. Other than that, she has not had any other diseases needing hospitalizations as an adult. An investigation into her family history revealed that her mother had rheumatoid arthritis She does not engage in smoking or recreational drug use, but admits to taking a glass of wine almost every night with dinner. Nursing Care Plan Based on the information, the patientâ€⠄¢s main concern is the rash on her face and what it means. Considering the location, the shape, and the other symptoms, it could be a malar rash pointing to Systemic Lupus Erythematosus, but since it is yet to be diagnosed, the more pressing concern is her fatigue. This can be caused by not enough energy being produced to cope with the inflammation going on with her rash, the erythematous posterior wall of her pharynx, and her fever. Her weight loss could also be an effect of this. Fatigue is defined as â€Å"an overwhelming sense of exhaustion and decreased capacity for physical and mental work at the usual level† (Doenges, Moorhouse, & Murr, 2010). The patient verbally reports feeling fatigue after the rash appeared (Sommers, Johnson, & Beery, 2010; Smeltzer & Bare, 2011; WebMD, 2011). In a nursing care plan to take care of the client’s fatigue, the desired outcomes would be that the client will: - Report improved sense of energy - Identify the basis of fatigue and individual areas of control - Perform ADLs and participate in desired activities at level of ability - Participate in recommended treatment program with sufficient energy (Source: Doenges, Moorhouse, & Murr, 2010; Sommers, Johnson, & Beery, 2010) Nursing interventions to help with the patients fatigue are: Intervention: Identify the presence of physical and/or psychological conditions (e.g. infection, nutritional deficiency, depression, trauma, autoimmune disorders, substance use/abuse,

Saturday, November 2, 2019

Discuss the role of technology in translation and its effect on the Essay

Discuss the role of technology in translation and its effect on the translation process - Essay Example Early researchers (Weaver 1949; Booth 1953; Dostert in IBM 1954) were excited about MT for its technological potential. They marveled at the prospect of one day automating translation thereby providing an alternative to human translation. Translators, on the other hand, felt their craft was being undervalued and depreciated. They retaliated with feelings of fear and anxiety. As it became evident that machines would not soon take the place of human translators, attention shifted to forms of computer-assisted translation (CAT) technology. Kay (1980) and Belby (1982) in particular motivated research for computer aids to assist the translator. Books by Bowker (1998) and Somers (2003) contain articles about many aspects of computer technology for translation while Astemuhl (2001) and Bowker (2002), as well as parts of Sofer (2004), target the professional translator interested in acquiring the necessary technological skills. In addition to an increased focus on computer assistance for translators, the rise of globalization further increased the need for efficient computer support in view of making translation quicker and more cost efficient. One the best examples is Sprung (2000). The change in focus from replacing to assisting translators marked the beginning of a shift from technology-centered to human-centered applications in the translation industry. Whi le a theoretical framework has been well been documented by psychologist Donald A. Norman (1998), truly human-centered technology has yet to come. Considering the changes the translation industry has experienced over the past 50 years, the objective of this paper is to asses the role of the technology in translation and its effect on translation process. In this context I will start by defining machine translation (MT) and computer-assisted translation (CAT), evaluate their impact on translation process and finally will discuss Toredo as a means to complete my translation project that I recently done. Computer-based translation technology roughly falls into two categories, Machine Translation (MT) and Computer Assisted Translation (CAT). Broadly speaking, MT is "the application of computers to the task of translation texts from one natural language to another". MT is mostly associated with stand-alone systems that seek to automate the entire translation process. CAT, on the other hand, are software programs designed to assist or aid the human translator by automating certain translation sub-processes such as terminology search and the reuse of previous translations. MT and CAT have no clear-cut boundary but rather belong to a continuum with varying levels of computer automation and human involvement. This process has been illustrated in the figure 1 below. Toady a translator working with word processing software and assessing various electronic resources such as online dictionaries may still be considered to producing 100% human translation. The key criterion is whether any part of the target text is automatically generated. There are many computer tools available to translators and almost as many ways to classifying them. Some tools consist of generic applications that have been adopted in many areas including the translation industry. Others focus specifically on the needs of translators and offer ways to run the business and support the