Monday, December 30, 2019

The Cosmogonies of Genesis and the Laws of Manu - 2188 Words

Philosophy of Religion The cosmogonies of Genesis and the Laws of Manu The symbolic world views of how the world was created can be described through the cosmogonies of Genesis and the Laws of Manu. It is through these theories that one can learn how the universe came into existence. Many individuals consider a certain religion to be their ultimate realm of reality, and it is within religion that these symbolic world views come into play. The cosmogony of Genesis began along a sacred history of time where god created merely by speaking. In contrast, the Laws of Manu involve creation through thought. In Genesis, there is only one god and in Laws of Manu there is more than one god. Both cosmogonies have many similarities as they have†¦show more content†¦As Adam and Eve ate the fruit, they became naked and god cursed them by banishing them from the Garden of Eden and placing a guard around the Tree of Life. The serpent is pre-existent evil and is considered a proto, a type of Satan (devil). In the Laws of Manu, Ishvara is the lord who created this various creatures of the universe from his own body. Similar to Genesis, the water is pre-existent matter. Through thought and concentration, he first created the waters which is Devi, the goddess, and put his seed into them. It is like the concept of the spider which creates the web from within itself. The seed that was planted became the golden egg was like the sun, and from that cosmos, in other words the universe was born. From that egg, Brahma (the lesser god) was born and was known as the first creation. Ishvara in the Laws on Manu was the first cause, the efficient cause and the material cause. By Ishvara, the god, planting his seed in the goddess, Devi, the cosmic egg was created which was Brahma who was the creator within cosmos. He represents the symbol of creation and destruction as he is the creator, destroyer and the preserver. Ishvara is both transcendent and immanent, for he is independent from and exists within our universe. In Hindi theism, it is believed that god is greater than the universe, inShow MoreRelatedPhilosophy Essay1805 Words   |  8 Pagesï » ¿Question 1 Classified as Genesis this cosmogony in generalization covers and focuses mainly on the creation of the cosmos and is written and portrayed in a biblical format. Genesis in chapter one begins discussion of the â€Å"beginning† and how god (elohim) created the heaven and earth (cosmos). It is said that when the earth was shaped it was without form and emptiness and that darkness upon the face of the deep illustrated in the term chaos (Tehom). Eventually the spirit of god (elohim) cameRead MoreThe Biblical Cosmogony Is Based On The Provisions Of Genesis1282 Words   |  6 PagesThe Biblical cosmogony is based on the provisions of Genesis chapter one. The basis of this myth is the fact that the universe and all its constituents are creations of a supreme being, in this case called God. The myth clashes with scientific views such as evolution theories because it suggests that God created everything by word of mouth and the work of his hands. The religious creation theory is the f oundation of major spiritual convictions, which include Christianity, Judaic and Islam (Blumenthal

Sunday, December 22, 2019

Prison Assault And Its Mental And Physical Mischief

Name: Title: Institution: Abstract Prison Rape is no mystery in today s society. The American media has depicted prison assault as a joke in movies and in music, yet have not understood the degree of how risky this crime is. A few cops even utilize this system as an intends to get an admission from a suspect. A noteworthy obstruction in settling Prison assault is the famous under-reporting of the crime. Just sixteen percent of prison assault casualties report their exploitation. Purposes behind under reporting are apprehension of results, disgrace, blame, shame, and decline to remember agonizing subtle elements. This paper investigates prison assault and its mental and physical mischief to prisoners, as well as to society. Literature Review With more than 2.2 million individuals in guardianship at any given time, the U.S. detains a bigger extent of its populace than any other nation on the planet. This over-imprisonment has prompted congestion in confinement offices the country over, constraining prison and correctional facility executives to change over exercise centers into residences. Numerous offices additionally need legitimate conventions to guarantee that the individuals why should helpless misuse are isolated from the individuals why should likely confer demonstrations of sexual savagery (Moster Jeglic, 2009). There is late endeavors to put a stop to prison assault, for example, the Prison Rape Elimination Act of 2003 and The NPREC commission and alsoShow MoreRelatedA Stolen Community : Where Are The Victims?1466 Words   |  6 Pagesgetting got had a significant diminishing† (Counter traffickers 2015). I ve been held down like a bit of meat while creatures masked as men damaged me again again but i keep on staying . -Unknown However while I was free physically, my mental flexibility was evacuated very quickly. Fear of the brain is frequently the hardest thing to deal with. With day by day beatings, your psyche gets to be totally controlled, molded to react in a certain manner. Numerous traffickers clarified thatRead MoreAn Analysis of Forensic Psychology in the Film, Primal Fear2856 Words   |  11 PagesProsecutor. Vail took advantage of the situation by defending his client based on insanity. However, at the end of the film, there is a clear shocking twist, when Aaron congratulates his lawyer for his competence. Aaron sends apologies to Laura for the assault he caused. It dawns on Vail that Aaron was still recalling what Roy did, rather than forgetting the incident. Roy unknowingly revealed his guiltiness of killing the archbishop. It was evident that his presence in the court room was premeditated, andRead MoreBanning Assault Weapons Essay6739 Words   |  27 Pagesï » ¿Arguing a Position Essay: Banning Assault Weapons and Large Capacity Magazines The issue of banning assault weapons and large capacity magazines has been debated for years, but has never been discussed with such urgency as it is now. The issue is the banning of assault weapons in our society. Are we the kind of country that allows and encourages its citizens to own weapons of mass destruction? The moral issue we face is banning ownership of these weapons to ordinary citizens while protectingRead MoreJuvenile Justice : Helping Or Hurting The Future Generations Of America3014 Words   |  13 Pagesthat redefine bad behavior as criminality, and stricter rule implementation by police officers than had existed when same was controlled by school administrators. In Christle’s opinion, these policies combine to create the first step in the School-to-Prison pipeline, which has caused the entry of American children into the juvenile justice system to increase at an alarming rate over the last half-decade, and disproportionately affect minorities and disadvantage d students, who could benefit far more fromRead MoreCommunity and Population Health Task I4979 Words   |  20 Pagesinterviewed were more specific with their answers and felt it was important to maintain low stress lifestyles to promote good mental and physical health, to exercise to promote strong bones/balance, to perform mental exercises to help prevent the onset of dementia, and to regularly attend appointments. Both groups agreed that positive vs. negative attitudes directly affect physical health and one’s quality of life. When I asked both groups of their opinions regarding what age adolescents are consideredRead MoreChildren in Conflict to the Law12401 Words   |  50 Pagesrefers to a child who is vulnerable to and at the risk of committing criminal offenses because of personal, family and social circumstances, such as, but not limited to, the following: 1) being abused by any person through sexual, physical, psychological, mental, economic or any other means and the parents or guardian refuse, are unwilling, or unable to provide protection of the child; 2) being exploited including sexually or economically; 3) being abandoned or neglected, and afterRead MoreThe Growing Problem of White Collar Crimes in India19963 Words   |  80 Pagesfor conducting the proceedings of the summary trials. After Santhanam committee report was published it was very much advent that for the first time Anti White Collar legislations include Prevention of Food Adulteration Act because it is an act of mischief done by a person out of his occupational capacity and therefore it will also be termed as a White Collar crime. The main object of Prevention of Food Adulteration Act is to eliminate the danger to the human life from the sale of unwholesome articlesRead MoreIntroduction to Rizal Course11998 Words   |  48 Pagestheir children, but they never spoiled them. They were strict parents and they trained their children to love God, to behave well, to be obedient, and to respect people, especially the old folks. Whenever the children, including Jose, got into mischief, they were given a sound spanking. Every day the Rizal’s (parents and children) heard mass in the town church, particularly during Sundays and Christian holidays. They prayed together daily at home – the Angel us at sunset and the Rosary beforeRead MoreStephen P. Robbins Timothy A. Judge (2011) Organizational Behaviour 15th Edition New Jersey: Prentice Hall393164 Words   |  1573 Pages†¢ Discrimination 42 Biographical Characteristics 44 Age 44 †¢ Sex 46 †¢ Race and Ethnicity 48 †¢ Disability 48 †¢ Other Biographical Characteristics: Tenure, Religion, Sexual Orientation, and Gender Identity 50 Ability 52 Intellectual Abilities 52 †¢ Physical Abilities 55 †¢ The Role of Disabilities 56 Implementing Diversity Management Strategies 56 Attracting, Selecting, Developing, and Retaining Diverse Employees 56 †¢ Diversity in Groups 58 †¢ Effective Diversity Programs 58 Summary and Implications forRead MoreDeveloping Management Skills404131 Words   |  1617 PagesDifferences Important Areas of Self-Awareness 61 Emotional Intelligence 62 Values 65 Ethical Decision Making and Values 72 Cognitive Style 74 Attitudes Toward Change 76 Core Self-Evaluation 79 SKILL ANALYSIS 84 Cases Involving Self-Awareness 84 Communist Prison Camp 84 Computerized Exam 85 Decision Dilemmas 86 SKILL PRACTICE 89 Exercises for Improving Self-Awareness Through Self-Disclosure 89 Through the Looking Glass 89 Diagnosing Managerial Characteristics 90 An Exercise for Identifying Aspects of Personal

Saturday, December 14, 2019

Blood Bank Management Free Essays

Abstract The purpose of this study was to develop a blood management information system to assist in the management of blood donor records and ease/or control the distribution of blood in various parts of the country basing on the hospital demands. Without quick and timely access to donor records, creating market strategies for blood donation, lobbying and sensitization of blood donors becomes very difficult. The blood management information system offers functionalities to quick access to donor records collected from various parts of the country. We will write a custom essay sample on Blood Bank Management or any similar topic only for you Order Now It enables monitoring of the results and performance of the blood donation activity such that relevant and measurable objectives of the organization can be checked. It provides to management timely, confidential and secure medical reports that facilitates planning and decision making and hence improved medical service delivery. The reports generated by the system give answers to most of the challenges management faces as far as blood donor records are concerned. Chapter 1 1. 0 INTRODUCTION 1. 1 Background to the Study Blood Donor Recruitment (BDR) is the process of drawing blood from a voluntary Blood Donor (BD) for future blood transfusion, Wikipedia (2006). In Uganda, blood collection, safety and management is an activity that is carried out by Uganda Red Cross Society (URCS) in partnership with Uganda Blood Transfusion (UBTS). Founded in 1939, URCS is part of the world wide Red Cross Humanitarian Movement whose mission is to mobilize the power of humanity for improving the lives of the vulnerable in Uganda, Muller (2001). URCS fulfills this mission while adhering to the principles of impartiality, neutrality, independence, unity, universality and voluntary service for the Red Cross/Red Crescent Movement. It operates throughout Uganda with 45 branch offices. Besides providing adequate supply of blood for transfusion, URCS is involved in the first aid services, road safety, tracing, disaster mitigation/preparedness, mobilization for routine immunization, HIV homecare, youth empowerment and Community based HealthCare (CBHC). URCS had a manual system using paper cards to recruit BDs, collect/keep blood donor records and disseminate results to BDs who are scattered throughout the country. The paper card system (PCS) used to specifically capture personal data and medical history of the BDs. This information would be used in identifying/locating existing BDs, carrying out pre- donation counseling and taking blood results. Unauthorized persons however, easily accessed the paper system and hence making it impossible to keep secrecy and confidentiality expected of medical records. The security of the medical records was also not inadequate as any person could easily access them. Lukande (2003), states that such a system is time consuming, prone to errors of entry and analysis resulting from the fatigue of the users. The PCS at URCS had lead to accumulation of physical paper cards due to increasing number of blood donors, a situation that frustrated the system users because of the delays and at times failure to access historical records. The safe blood policy was lacking at URCS because the PCS could not cater for the key attributes of the policy. Gerard (2002), states that the main principles upon which the safe blood policy is based on are the informed consent, confidentiality and secrecy of the BDs. The Ethiopian Red Cross Society publication, Development in the 1990 states that information from blood donors should be completely confidential and if this is not assured, names of the blood donors should not be recorded at all and/or an alternative record identification should be used. Full implementation of the safe blood policy has called the use of information technology (IT) in providing working solution to the identified challenges. The associated problems with the PCS included delays in accessing historical records, inconsistencies and errors in data entry that stem right from acquisition of data from the blood donors because the exercise is of routine nature and very tedious to the system users. The automation of the system using modern IT has improved the quality of service. Secondly, with the use of IT, now relevant and timely blood donor reports can easily be generated and hence facilitating planning and decision-making. Scolamiero (2000), recommends blood donor services automated information system as a solution to routinely collected, accurate and readily available information in blood transfusion services. It is also important to note that the impact of information technology on organizations is increasing as new technologies evolve and existing ones expand. According to Clifton (1995), nearly all business executives say that information technology is vital to their business and that they use IT extensively. Certainly business executives main concern is planning, coordination and decision-making, therefore, the role of IT in enhancing management of blood donor records is of major importance. In all, the computerization of blood donor PCS at URCS came at the ripe time given the background to the situation. This is more so because the demand for safe blood in Uganda has increased due to soaring increase in total population. Therefore, modern means to manage the PCS using IT had to take route. 1. 3 General Objective The main objective of the study was to create electronic blood donor management information system in order to assist in the management of blood donor records, planning and share information in a more confidential, convenient and secure way using modern technology. [pic] 1. 3. 1 Specific Objectives To conduct a study on blood donor management To design an electronic blood donor management system To validate the design using a prototype 1. 4 Scope The study geographically limited itself at the URCS blood donation/collection centers. It focused more on the acquisition, distribution and management of blood units for BDR activities. The study specially emphasized the creation and implementation of an electronic management information system that automated blood donor data acquisition and dissemination of results. This in turn will ease and speeds up the planning, decision-making process because of the timely, secure, confidential and reliable reports. 1. 5 Significance of the Study This study is important to URCS and the blood donors because it aimed at addressing problems of security, secrecy and confidentiality of blood donor records. It also strived to check the delays, errors, inconsistencies in medical records and timely access to historical records all of which had far fetched impact on planning and decision-making. The study resulted into the following benefits: It has eased the control and distribution of blood in various parts of the country basing on the hospital demands. URCS can now create market strategies for blood donation, lobbying and sensitization of the blood donors. Automated data acquisition and quick access to medical records by the legal users of the system will be assured. [pic] It has eased the monitoring of the results and performance of the blood donation activity and hence relevant and measurable objectives of URCS are checked. It will continue to improve on the planning and decision-making process by providing to management timely, secure and confidential medical reports related to blood donation. It will also improve medical service delivery due to timely and easy generation of management reports by the relevant entities. The study will benefit the URCS management, who will find it easy to strategically plan, coordinate and take decisions concerning BDR activities. URCS counsellors on the other hand will be able to keep confidentiality of the donor’s results and disseminate blood results to donors with ease. Meanwhile that is the case, the automation of the data collection process will simplify the work of the data clerks. Equally important, the blood donormmobilizes will be have strong grounds for laying sensitization strategies between regions thatmyield more blood units and those with less. The study also has formed further environment of knowledge for students who may wish to take research in blood donor management. 2. Blood Donor Systems: Challenges and Successes The blood donation service involve a series of interdependent operations such as donor registration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. Most of the popular existing blood information systems in the western world today are mainly online systems. The systems interfaces do not meet fully the blood safe p olicy described in this study and as such not suitable for illiterate population. Most blood donors in Uganda are rural based where online systems ay not be the best. The level of computer literate among the blood donors in Uganda is growing because the majority of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. Some of the attributes on the interfaces used in the western world such as state and province are not applicable in Uganda. Tripura blood donor information system is a good example of the blood donorsystem that is not suitable for Uganda. Also some key attributes such as age and sessions in [pic] Uganda are lacking on most the interfaces viewed. The interfaces also are not user-friendly as there are many links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system. SIBAS complies with the client/server infrastructure, as does its client, and provides an integrated environment for those isolated but interdependent operation in the blood center. With the introduction of the SIBAS the blood service at Macau has been enhance in the following aspect. Operational efficiency- the processing time has been shortened in that blood donors need not fill in many regular items. On the other hand, the steps for donor cards are under full control and hence leading to donor satisfaction and confidence. There is also improved information consistency and validity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the integration of IS/IT in management of blood records. The Prathma Blood Center is a quest for modernizing blood banking. The entire function from blood donation to its testing and separation, storage, issue and usage have been integrated through a custom designed enterprise resource planning (ERP) software that minimizes human intervention and making it less error prone. The implementation of ERP in blood bank in India has registered many successes in medical data such as security, confidentiality, secrecy and quick retrieval of historical records all of which were challenges at URCS blood center. However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It requires transition, as it is resource constraining in terms of IT, other equipments and human resources. 2. 3 Blood Donor Systems: Challenges and Successes The blood donation service involve a series of interdependent operations such as donor registration, donor screening/evaluation, blood collection, blood screening, inventory management and blood dissemination. Most of the popular existing blood information systems in the western world today are mainly online systems. The systems interfaces do not meet fully the blood safe policy described in this study and as such not suitable for illiterate population. Most blood donors in Uganda are rural based where online systems may not be the best. The level of computer literate among the blood donors in Uganda is growing because the majority of them are school students. The main challenge remains customizing interfaces that are suitable for capturing basic donor information. Some of the attributes on the interfaces used in the western world such as state and province are not applicable in Uganda. Tripura blood donor information system is a good example of the blood donor system that is not suitable for Uganda. Also some key attributes such as age and sessions in Uganda are lacking on most the interfaces viewed. The interfaces also are not user-friendly as there are many links within the system that can easily confuse the system users and hence leading to data entry errors and boredom. At the Macau blood Transfusion Centre, system Integrado de Bancos de Sangue (SIBAS) works as its solution of computerized blood bank information system. SIBAS complies with the client/server infrastructure, as does its client, and provides an integrated environment for those isolated but interdependent operation in the blood center. With the introduction of the SIBAS the blood service at Macau has been enhance in the following aspect. Operational efficiency- the processing time has been shortened in that blood donors need not fill in many regular items. On the other hand, the steps for donor cards are under full control and hence leading to donor satisfaction and confidence. There is also improved information consistency and validity. The Indian case study of Prathma Blood Center, Gupta (2004), promises insights into the integration of IS/IT in management of blood records. The Prathma Blood Center is a quest for modernizing blood banking. The entire function from blood donation to its testing and separation, storage, issue and usage have been integrated through a custom designed enterprise resource planning (ERP) software that minimizes human intervention and making it less error prone. The implementation of ERP in blood bank in India has registered many successes in medical data such as security, confidentiality, secrecy and quick retrieval of historical records all of which were challenges at URCS blood center. However, full automation of all blood donation activities like the case cannot be done in Uganda due to limited resources. It requires transition, as it is resource constraining in terms of IT, other equipments and human resources. SYSTEMS ANALYSIS AND DESIGN 4. 1 Introduction Following the literature review, background information and correlative knowledge regarding this research project follows. In the first part of this chapter, the demand and requirements of the proposed system are discussed and analyzed through dataflow diagrams, the entity relations model and the data dictionary. According to this analysis, the specification of the system is defined. This provides the foundation for chapter 5 (Implementation and Testing). This chapter presents the various design techniques and processes available for building web based applications. It explains the design technique chosen, showing its advantages and disadvantages. 4. 2 A different approach for designing web based applications Traditionally, software has been broadly classified into different categories. Some of these categories include real-time software, personal computer software, artificial intelligence software and business software. Web-based systems and applications (WebApps) such as web sites and information processing applications that reside on the Internet or an intranet, require a somewhat different method of development than these other categories of computer software (Pressman, 2000) [xx]. This is because web based systems involve a mixture of print publishing, software development, marketing, computing, internal communications, external elations, art and technology. WebApps are network intensive,content driven, continuously evolving applications. They usually have a short development time, need strong security measures, and have to be aesthetically pleasing. In addition, the population of users is usually diverse. These factors all make special demands on requirements elicitation and modelli ng. 4. 3 Requirements and Analysis The requirement analysis stage of a software engineering project involves collecting and analyzing information about the part of the organization that is supported by the application. This information is then used to identify the users’ requirement of the new system (Conolly et al, 2002) [xx]. Identifying the required functionality of the system is very important as a system with incomplete functionality may lead to it being rejected. A description of the aim of the project is given here along with details of the functional and non-functional requirements for the system. The test sheets for evaluating the completed system are also presented. [pic] 4. 3. 1 Requirements The requirements of the Web-based management information system are to develop: †¢ a web based front end for entering donated blood details including the donor, his/her blood group, sex, age, and status of the donated blood †¢ a web based front end for searching the information relating to a given donor or a given blood group; †¢ a facility to still enter donor and donated blood information via Endnote and also maintain the Endnote database using those details entered via the web front end and †¢ a facility to produce summary information of donor and donated blood particulars and any other related activities. . 3. 2 Functional Requirements In this research project we aim at developing a system which should improve on the current one with a lot of functionalities and therefore the Major target or goal here is to: †¢ to develop a blood donor database that can support the five above mention sub- databases that is to say; DonorDB, Donation DB, DiseaseDB, Transfus ion DB and Statistical DB †¢ to develop a client interface that allows privileged users to carry out tasks such as inserting or modifying and deleting data in the database; to develop a searching functionality in order to allow normal and privileged users to search the details of a given donor, blood group, stakeholder and if necessary a type of disease common which causes one to need the donated blood †¢ to fully integrate the Web-based management information system to the World- Wide-Web and hence allow access from any Internet networked terminal and Web browser around the world; to develop a facility that can export details entered via the web front end to Endnote as well as import and confidential detail from the Endnote Database; †¢ to develop a functionality that produces summary information of required data to enhance decision making; †¢ to embed high security features in the Web DBMS to provide privacy, integrity; †¢ to allow privileged users to main tain the Web-based management information system by adding/deleting particulars, backing-up or resetting the database and extract online summary in the form of histograms for each donor and lists of free-format comments. Thus a graphical reporting tool should be provided for analyzing the data. †¢ and finally the system should be flexible enough to store data for several years and also be able provide sufficient User and Administration Guides. 4. 3. 3 Non-functional Requirements The system must be developed to suit the particular needs of a user-friendly environment. This means that the system must accommodate a clearly understandable user interface as well as clear online help documentation at any stage of the user interaction with the system. A fast response time in obtaining and providing information to the system may also prove to be a significant advantage. In addition to these requirements, the system should also embrace the following requirements:- Security: Each user is required to log in. The system should log staff that has been assigned user names and passwords. The system should be designed to make it impossible for anybody to logon without a valid username and password. Data encryption should be employed to keep the user login name and password secret. Reliability: The system would be used by about 50 staff working at the Red Cross head quarters and also some other many staff in the collaborating clinics and hospitals. The system should have little or no downtime and be able to handle multiple concurrent users. Ease of Use: The general and administrative views should be easy to use and intuitive. Online help and documentation should be provided. Performance: The system should have a quick response time. For the purpose of this research project, this would be defined as less than 5 seconds. System and Browser compatibility Testing: The system should be accessible on the following browsers – Microsoft Internet Explorer 5. 5+, NetScape Navigator 6. 0+ and Mozilla 1. 3+. System requirements: Red Cross society Uganda has a UNIX server. This system would be designed to run on a minimum hardware configuration of 500MHz x86 machines. Considering the vast hardware available at the society , this would not pose any problems. Server Software: Operating System: Windows XP PHP version: PHP 5. 0+ Web Server: Apache Web Server. 2. 0+ Database: MySQL 4. 01+ [pic] . 4 Access Level Analysis In order to take closer look into what the system should do and how, it was necessary to decompose the system’s functionalities based on the user type and levels of access. The three main user groups and access levels are: †¢ Global User Group (normal access level) †¢ The Red Cross User Group (privileged access level) †¢ The Administration (privileged access level) Theref ore, the requirements could be efficiently analyzed depending on the user group and the functionalities they should be allowed to perform. 4. 4. 1 Main System Page (Index) It is required for the system to provide a Main Page where any Global user (any user within and outside the Red Cross Organization) will be able to access. The main functionality of this page will be to allow any user to search the database by using information such as quantity of donated blood, available blood and the groups, or any other general information which may not be considered confidential. The search capabilities of the main page might not be limited to the exact blood donor, but may for example provide the means for displaying any information that might be relevant but not confidential. The Main Page should also include a Login facility for any privileged or normal user to be able to have access to more advanced functionalities of the System. 4. 4. 2 The Red Cross User Group When a Red Cross user has successfully logged into the system via the Main Page Login facility, it will be necessary for the system to display a specific menu with all available option that can be carried out. Therefore by taking into account the system requirements, it will be necessary to nclude options such as Enter donor details, Search donor, Use Endnote Facilities, Produce Summary Information as well as an option that will be related to the appropriate User Guide. A Logout option will also be appropriate for the Red Cross user to be able to logout when desired. 4. 4. 3 Entering-Amending Blood donor Details For a user to be able to amend and enter into the system’s database it will be essential to take into account that the blood donor system will be integrated to Endnote. Therefore, it will be essential for the system to provide to the user the exact fields as Endnote does for any particular type of details. In addition, when a particular of a given donor has successfully been submitted or amended into the database it will be essential for the system to display the appropriate message (i. e. Blood donor successfully entered into database). 4. 4. 4 Searching the Blood Donor Database The Searching Facility for the Red Cross user should not differ from the facility that will be provided on the Main Page of the system for all users. Therefore, the Red Cross user will be able to search any type of information in the database using the same way as specified for the Global User. 4. 4. 5 Producing Summary Information For this requirement it is essential to firstly understand why and when it will be used and to adjust the functionality to best suit these purposes. In order for the system to efficiently produce summary information it will have to provide a menu providing options such as Produce Annual Report, or Produce General Report etc. 4. 4. 6 Endnote Facilities In order for the system to be effective, it will be necessary for it to be integrated with the Endnote software. Therefore, it will be very significant to accommodate two options that will include Importing blood particulars from Endnote and Exporting blood particulars to Endnote. How this will be done will mainly rely on taking full advantage of particular Endnote filters that are provided for these reasons. 4. 4. 7 Administrator For maintenance purposes it will be of great significance to include advanced Administrator functionalities that can only be accessed by this particular user group. The most reasonable options for an administrator to perform may include tasks such as deleting donors (should not be provided to the Red Cross user group for security reasons), Backing-up and Restoring the database, Resetting the blood donors database etc. In addition to these functionalities the administrator may also be asked to perform tasks related to Red Cross or Global user (i. e. Entering new donors, Searching for a given donor or available blood group) and therefore any functionality provided by the system must be included in the administrator capabilities. .5 Task Structure Diagrams For the development of a more consistent and effective system, it was essential to firstly identify which information should be included accomplish this, it was first of great significance to group all the relevant tasks (system functionalities) depending on the users. The way the systems tasks could be efficiently identified was by using a special technique from the Discovery method called Task Structure Sketching (Simons, 2002). 4. 5. 1 The Red Cross User Red Cross User Functionalities Fig 4. 1: The Red Cros User Task Structure Diagram Insert New Data Edit data Search for Data Produce summary Use Endnote Search for a recipient Search donors Search for disease Export d donations Weekly report Produce annual reports Import donations Search for hospitals Edit clinics Update data Edit donors -recipients Edit diseases Insert new disease Insert recipients Insert donor The Administrator User Administrator Functionalities Fig 4. 2 The Administrator Task Structure Diagram Red Cross user Functionalities Delete data Backup data Reset database Backup database Restore Database Delete a phased out disease Delete donor Delete recipient The administrator can perform any task that are performed by the Red Cross User 4. 5. 3 The Global User Global User Functionalities Search database Login Search by recipients Search by donors Search y Year Login as Red Cross User Login as Administrator Want to donate blood – 4. 7 Web Engineering Web engineering is the process used to create high quality Web-based systems and applications (WebApps). Web engineering (WebE) exhibits the fundamental concepts and principles of software engineering by following a disciplined approach to the development of computer-based systems, emphasizing the same technical and management activities (Pressman, 2000) [xx]. The design and production of a software product (such as a web application) involves a set of activities or a software process (Sommerville, 2004) [xx]. A software process model is an abstract representation of a software process. Three generic process models usually adopted in projects are †¢ The waterfall model – This has distinct project phases, which can be easily monitored. These phases are requirements specification, software design, implementation and testing. †¢ Evolutionary development – An initial system is developed quickly from abstract specifications. This is later refined with the input of the user to produce a system that meets the users needs. It is an iterative model. Two refinements of this approach are the incremental and the spiral models. The incremental model of evolutionary development delivers software in small but usable â€Å"increments†, where each increment builds on those that have already been delivered. The spiral model couples the iterative nature of prototyping with the controlled and systematic aspects of the waterfall model. †¢ Component-based software engineering – This is based on the existence of a large number of reusable components and is best suited in an object-oriented environment. A process model helps address the complexity of software, minimize the risk of project failure, deal with change during the project and help deliver the software quickly. For this project two process models were considered: 1. Spiral model 2. A waterfall model. [pic] 4. A WebE Spiral model The spiral model shown in Fig 4. 4 is suggested by Pressman (2000)[xx]. The process consists of 6 main stages, outlined below: 1. Formulation: This is an activity in which the goals and objectives of the WebApp are identified and the scope for the first increment in the process is established. 2. Planning: This stage estimates overall project cost, evaluates risks associated with the development effort, prepares a detailed development schedule for the initial WebApp increment and defines a more coarsely granulated schedule for subsequent increments. Analysis: This stage is the requirement analysis stage for the WebApp. Technical requirements and content items to be used are identified. Graphic design requirements are also identified. Fig 4. 4: The WebE Spiral Model 4. Engineering: Two parallel set of tasks make up the engineering activity. One set involves content design and production, which is non-technical work. This involves gathering text, graphics, and other content to be integrated into the WebApp. At the same time, a set of technical tasks (Architectural design, Navigation design, and Interface Design) are carried out. . Page generation: This is the construction activity that makes use of automated tools for WebApp creation and the content is joined with the architectural, navigation and interface designs to produce executable Webpages in HTML. 6. Customer Evaluatio n: During this stage, each increment of the WebEprocess is reviewed. Powell (2002) [xx] presents a waterfall model for web engineering (Fig 5. 2). The advantage of this model is that it helps developers plan most of the work up front. 4. 9 Design Phase The design involves the production of technical and visual prototypes. This stage has some on-technical aspects such as gathering of web content. Powell (2002)[xx] points out that ontent gathering can be one of the biggest problems in web projects. This clearly is not the ase with this survey application as there is very little content required. For the server side rogramming and other technical aspects of the design emphasis will be laid on such design oncepts and principles as effective modularity (high cohesion and low coupling), nformation hiding and stepwise elaboration. The goal is to make the system easier to adapt, ehance, test and use (Pressman, 2000) [xx]. 4. . 1 Producing HTML There are basically 4 methods of producing HTML – 1. Coding by hand using a simple text editor 2. Translation in which content produced in a tool such as note pad is saved as aHTML document. 3. Using a tagging editor that helps fill in the required tags 4. Using a â€Å"What you see is what you get editor† (WYSIWYG) such as MS FrontPage or Macromedia Dream weaver ©. All these methods have their advantages and disadvantages. While coding by hand may be slow and error prone, it does provide great control over markup, as well as help address bugs and new HTML/XHTML elements immediately. At the extreme, â€Å"What You See Is What You Get† (WYSIWYG) editors provide visual representation of a page and require no significant knowledge of HTML or CSS. However hey often generate incorrect or less than optimal markup and tend to encourage fixed size resentations that do not separate the look and the structure (Powell, 2003) [xx]. Putting all hese into consideration, a tagging editor, HTML-kit © was chosen for this work. While tagging editors can be slow and require intimate knowledge of HTML and CSS, they provide agreat deal of control and are a lot faster than hand editing. [pic] 4. 10 Architectural Design WebApps fall into 4 main structures. They can be linear, grid, hierarchical, or networked (fig 4. 5). In practice most web sites are a combination of some of these structures. Fig. 4-5. Navigational Structures of websites/Web Applications ( Lemay, 2000) Considering the nature of this web application, a combination of both hierarchical and linear structures will be adopted. The actual survey web pages will have a linear structure while the Admin pages will have more hierarchical nature. 411 Database Design Database design involves the production of a model of the data to be stored in the database. A data model is a diagram of the database design that documents and communicates how the database is structured. The database design methodology followed in this project is that suggested by Connolly et al(2002)[xx]. Connolly presents quite a detailed guide to designing database but not all of those steps may apply here, as this project is not too complex. The design process is divided into three main stages – conceptual, logical and physical database design. The purpose of the conceptual database design is to decompose the design into more manageable tasks, by examining user perspectives of the system. That is, local conceptual data models are created that are a complete and accurate representation of the enterprise as seen by different users. Each local conceptual data model is made up of entity types, relationship types, attributes and their domains, primary keys and integrity constraints. For each user view identified a local conceptual data model would be built. (Connolly et al,2002) [xx]. In building the conceptual data model, a data dictionary is built to identify the major entities in the system. An entity relationship (ER) diagram is used to visualize the system and represent the user’s requirements. The ER diagram is used to represent entities and how they relate to one another. The ER diagram also shows the relationships between the entities, their occurrence (multiplicities) and attributes. Following the view integration approach, a different data model (ER diagram) is made for each user Data Dictionary Entity Name Description Donors A person who donates blood Recipients A person who receives blood Diseases The diseases which are found in the infected donated blood Blood group The blood that is donated by the donors Hospital/Clinic Hospitals to which donated blood is distributed Staff Red Cross staff District Districts from which donors and recipients originate from Table 4. 1: Data Dictionary 4. 11. 1 Conceptual Database Design In this stage, a local conceptual data model is built for each identified view in the system. Alocal conceptual data model comprises of entity types, relationship types, attributes and their domains, primary and alternate keys, and integrity constraints. The conceptual data model is supported by documentation such as a data dictionary. The entity types are the main objects the users are interested in. Entities have an existence intheir own right. Entity types are identified and their names and description are recorded in adata dictionary. Care is taking to ensure that all relationships in the users requirements specification are identified. An Entity-Relationship diagram is used to represent the relationship between entities. The multiplicity of each relationship is included. This is because a model that includes multiplicity constraints gives a better representation of the enterprise. Relationship descriptions and the multiplicity constraints are recorded in the data dictionary. Each model is validated to ensure it supported the required transactions. Entity name Attributes Description Data Type Size Nulls Multi Valued Donors donorId (PK) -dNames -sex – dob – distId (FK) – doreg Donor identification number Donor’s names Donor’s sex Date of birth District of origin Date of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No No No No No No No No No Recipients -rId (PK) -rNames -sex – dob – distId (FK) – doreg Recipient’s identification umber Recipients names recipient’s sex Date of birth District of origin Date of registration Text Text Text Date Int Date 8 30 6 30 3 30 No No No No No No No No No No No No Diseases -dId (PK) -dNames -drating Disease identification number Disease names Disease rating on how people are infected from it Text Text text 8 30 20 No No No No No No Blood b Group(PK) donorId (FK) rId (FK) status Blood group Donor identification number recipient identification number status of the donated blood whether infected or not Text Text Text text 2 8 8 15 No No No No No No No No Hospital/ Clinic hId (PK) hNames distId (FK) Hospital identification number Hospital name District identification Number text text int 8 100 3 No No No No No No Staff staffId (PK) staffNames sex dob department Staff identification number Staff names Sex Date of birth Department to which the staff belongs text text sex date text 8 50 6 15 100 No No No No No No No No No No District distId distName District number District name int text 3 100 No No No No Entity name Multiplicity Relationship Entity Name Multiplicity Donors 1 Donates Blood 1 Recipients 1 Receives Blood 1 Diseases Contained in Blood 0 .. * Blood 1 Donated by Donor 1 .. * Hospital/ Clinic 1 Receives Blood 1 .. * Staff 1 Registers Donors 1 .. * District 1 Has Recipients 1 .. * Table 4. 2: An extract from the data dictionary showing a description of the relationships between the entities. 4. 11. 2 Logical Database Design The process of logical database design constructs a model of the information used in an enterprise based on a speci fic data model, such as the relational model, but independent of a particular DBMS and other physical considerations (Connolly et al, 2002)[xx]. The logical database design consists of an ER diagram, a relational schema, and any supporting documentation for them. In the logical data model, all attributes of entities are primitive. Producing a logical data model involves normalization. The aim of normalization is to eradicate certain undesirable characteristics from a database design. It removes data redundancy and thus prevents update anomalies. Normalization helps increase the clarity of the data model. Integrity constraints are imposed in order to protect the database from becoming inconsistent. There are five types of integrity constraints – required data, attribute domain constraints, entity integrity, referential integrity and enterprise constraints. The resulting relations are validated using normalization. For this project, producing relations in third normal form (3NF) will suffice. Non-relational features, such as many-to-many relationships and some one-to-one relationships, are removed from the conceptual data model. The design is also reviewed to make sure it meets all the transaction requirements. [pic] 1.. * 1.. 1 1.. * 1.. * 1.. 1 1.. 1 registers Donors PK donorId Names sex dob FK distId doreg District PK distId distName Recipient PK rId rNames sex dob FK distId doreg Hospital PK hId (PK) hNames FK distId Staff PK staffId staffNames sex dob department Diseases PK dId dNames drating Blood PK bGroup FK donorId FK rId status Fig. 4. 6: The ER diagram 4. 11. 3 Physical Database Design Physical database design translates the logical data model into a set of SQL statements that define the database for a particular database system. In other words, it is the process of producing a description of the implementation of the database on secondary storage. It describes the base relations and the storage structures and access methods used to access the data effectively, along with associated integrity constraints and security measures. The target DBMS in this case is MySQL. The following translations occur: 1. Entities become tables in MySQL. 2. Attributes become columns in the MySQL database. 3. Relationships between entities are modeled as foreign keys. Donation Process View Video †¢ [pic] Getting Ready for Your Donation †¢ †¢ The Donation Process Step by Step †¢ †¢ After the Donation To get ready for your  donation: | |[pic] | |Make an Appointment | |It always helps us to know in advance when you are coming in to make a donation. | |[pic] | |Hydrate |[pic] | |Be sure to drink plenty of fluids the day of your donation. | |[pic] | | |Wear Something Comfortable | | |Wear clothing with sleeves that can easily be rolled up | | |above the elbow. | |[pic] | | |Maintain a Healthy  Level of Iron in Your Diet   Before | | |Donating | | |If possible, include iron-rich foods  in your diet, | | |especially in the weeks before your donation. | |[pic] | |Bring a List of Medications You Are Taking | |We will need to know about any prescription and/or over the counter medications that may be in your system. |[pic] | |[pic] |Bring an ID | | |Please bring either your donor card, driver’s | | |license or two other forms of identification. | |[pic] | | |Bring a Friend | | |Bring along a friend, so that you may both enjoy | | |the benefits of giving blood. | |[pic] | | |Relax! | | |Blood donation is a simple and very safe procedure| | |so there is nothing to worry about. | How to cite Blood Bank Management, Essay examples

Friday, December 6, 2019

Divide by Ed Sheeran free essay sample

Recently, I have been listening to a lot more pop music than I usually do. But more in particular, I’ve been catching myself listening to Ed Sheeran’s new album Divide on repeat. The album â€Å"Divide† by Ed Sheeran can appeal to people of all ages and music tastes. One thing I really appreciate about this album is how the songs all differ in genre and that no one song is like the other. I will be discussing 3 of the most popular songs from the Divide album which include: â€Å"Shape of You†, â€Å"Castle on the Hill†, and â€Å"Perfect†. The song titled â€Å"Shape of You† was the first song to be released as a single from the album, and it blew up. In fact, the song was so popular that it broke Spotify’s first-day records with 6.9 million streams, previously the record was help by One Direction’s â€Å"Drag Me Down† with 4. in the song he states: â€Å"So dont call me baby Unless you mean it Dont tell me you need me If you dont believe it So let me know the truth Before I dive right into you† Ed Sheeran remains on the top 10 artists, and he totally deserves it. He has worked since the young age of 14 to be where he is currently, making his artist industry continuing on to be 13 years long That right there is what I call hard work and dedication. In many eyes of his worldwide fans he can do no wrong, and that so might be. Ed’s album remains on the top 5 of my favorite albums. He has a way to make his songs, and voice soothing to listen to. His songs will make you sad, and his songs will also make you happy. His songs show the true feelings and meaning behind them, just listen closer to the lyrics. It’s amazing. I definitely recommend this album! Add it to your playlist, because you’re in for a lovely ride!

Thursday, November 28, 2019

advances in glazing materials essays

advances in glazing materials essays Current Options In Widows Energy Efficiency 5 Understanding How Energy Moves Through Windows 5 Tomorrows Options for More Efficient Windows 8 1. How energy flows through windows: Radiation 6 2. How energy flows through windows: Convection ..............................................6 3. How energy flows through windows: Conduction..............................................7 4. Three Routes to Switchable Windows. 10 Until recently, clear glass was the primary glazing material used in windows. Although glass is durable and allows a high percentage of sunlight to enter buildings, it has very little resistance to heat flow. During the past two decades, though, glazing technology has Research and development into types of glazing have created a new generation of materials that offer improved window efficiency and performance for consumers. While this new generation of glazing materials quickly gains acceptance in the marketplace, the research and development of even more efficient technologies continues. Gas Fill A heavier-than-air gas such as argon or krypton is used to fill the space between panes to slow heat transfer. Glazing The glass and/or plastic in a window unit that provides visibility yet blocks air leakage and some of the heat flow. Infrared Radiation Invisible radiation that humans perceived as heat. Low-e Coating Low-emissivity (low-e) coatings on glass surfaces reflect heat energy, but transmit visible light. Pyrolytic (Hard Coat) Low-e Durable metal oxides that are fused into the surface of window glass. Sputtered (Soft Coat) Low-e A coating on the inside pane of window glass in a sealed unit. It is made of reflective metal deposited in a vacuum. R-Value A measure of a windows resistance to heat flow. Total Solar Transmittance The total amount of all light spectra that is admitted by t...

Monday, November 25, 2019

Society Goes Pop essays

Society Goes Pop essays In the realm of the music industry, pop music reigns. It seems as if every week another pop star is born, and true music lovers observe these teenage sensations and ask what makes this guy or girl so much different from all the others? This is a question no one can really answer, because in the last decade or so there has been no difference. Pop music does not change. But this is where it gets interesting. Its not even about the music anymore. When listeners here pop music, they can automatically associate the genre with good looking teenage kids who may be able to carry out a note or two. This association sparks controversy. And controversy creates problems. Rarely do pop stars play instruments, and most are not very good vocalists. So, what does it take? What exactly does it take to become a pop star? It no longer matters if you have a good voice or any musical talent at all for that matter. In reality, you need no talent. If you have a bright smile and sex appeal, yo u are a potential pop star. Due to the medias superficial advertisement and lacking creativity of pop music, it cannot truly be appreciated let alone held on a pedestal above musicians trying to fulfill their dreams playing their own music and doing it well. American Idol. Everybodys eyes light up when they hear those words. Well allow me to share a personal account of the mayhem that this show became. I went over to my girlfriends house where her and her girlfriends were watching American Idol. Upon arrival, I stood at the front door, knocking for about fifteen minutes, and finally went around to the side and jumped up, banging on the window in order to break the trance this show had put on the group of girls. They did not even notice me knocking at the door which was directly next to the room they were all in. I walked in and no one even talked to me because they were so involved in thi...

Thursday, November 21, 2019

Lancome Brand Management in China & USA Dissertation

Lancome Brand Management in China & USA - Dissertation Example Existing surveys about Lancome were utilized to discover the differences in customer acceptance in the two countries. To countercheck the findings of surveys, online articles, annual reports of L’Oreal, the mother company of Lancome, and other reading materials were considered as references. Primary survey of 20 Chinese respondents and 20 American respondents revealed the impact or brand management, brand equity, and brand equity value in terms of 65% of total demand for luxury cosmetics among the Chinese and 50% for the Americans. Findings showed that other than differences in preferences about what is considered beautiful and the differences in attitude as well as behavior of consumers with regards to luxury cosmetics, indeed the brand management theory is practiced in both countries. It states people value quality, consistency with good experiences with a product, and would also appreciate gaining added value from the same brand. Its value is initially gained from discoveries of risks with using the product. Since there are more competitors in the USA which are also branded and known to be safe and the market is saturated, Lancome in the USA faces price competition, whereas in China, due to less competitors that are known to be similarly safe cosmetics and many more cities do not have such a quality cosmetic, Lancome China has been growing faster in spite of the much higher prices of its products. Lancome cosmetics in the USA are known as Privilege Cosmetics while in China, it is a luxury with the best quali ty – safest to use, best value, consistent and predictable with the many years of its existence. Chapter 1: Introduction 1.1 Background Globalization of businesses and the need for developed countries to look for new markets have been challenging marketing managers to find ways and means to penetrate economies for quality products to be appreciated, accepted, and established. One effective way has been brand marketing. France, the home of Lancome brand managed by its mother company L’Oreal, had formulated this luxury cosmetics since 1935. It was Armand Petitjean who invented it while L’Oreal decided to own it by 1964. The success of this brand in the world market has reaped for the company $5.5 billion worth of brand value, according to Forbes (2012). Lancome was named # 75 most powerful brand covering all products worldwide. As of 2012, its sales total had reached $ 3.8 billion. L’Oreal brand is # 25. Avon is # 70. These three are under the same consumer packaged goods industry. Lancome has outperformed Avon in China through brand marketing management strategies since Avon is more on direct selling which is said to be â€Å"25% about the brand and 75% about the sales channel† (Kowitt 2012, par. 9). In North America, L’Oreal’s Clarisonic cosmetic brand experienced a â€Å"double-digit growth† in 2012 (L’Oreal 2012). 1.2 Objectives The overall aim is to prove that the principles in brand

Wednesday, November 20, 2019

Field Inventory Assignment Essay Example | Topics and Well Written Essays - 1750 words

Field Inventory Assignment - Essay Example This essay stresses that different activities happen in this holy and secular places. For instance, the altar is holy, and it where the priest stands when presiding over the mass and all the Bible readings take place there. On the other hand, the unholy place is used for sitting and no serious activity takes place. In addition, in the altar and other holy places are religious objects, including crosses and sculptures of martyrs. These religious art objects to play different roles in the congregation and the Catholic Church, in general. For instance, the arts of martyrs remind the congregation the importance of faith. The cross reminds them of the death of Jesus Christ, who is also their Savior. This paper makes a conclusion that members of the congregation are expected to sing with others, pay attention and quiet as well as to keep a distance from holy places within the church. These rules come from the Catholic doctrine formed a long time ago at the beginning of Christianity. They are presented to Catholics through an initiation process known as catechism. During my time at the church, the priest discussed singing as an ethical principle as he encouraged people to sing. The project affected the author's understanding of Christianity and the society he is part because people do not pray the same. There are different forms of prayers as evidenced it the church he attended. Therefore, he has come to realize that we are different in terms of the way we conduct prayer services even though we come from the same society.

Monday, November 18, 2019

Censorship, The First Amendment, and Free Speech Essay - 2

Censorship, The First Amendment, and Free Speech - Essay Example Regulation of the general speech is censorship but regulation of evil and illegal speech is not censorship. The government should control some internet content such as hate sites, excessive violence, pornography and misuse of chat rooms (Kagan 12-46). The first step of controlling and regulating internet content is by proper enforcement of National laws. Laws are important since they are effective in controlling the harmful content in the internet. For example, the Communications Decency Act (CDA) and the Child Online Protection Act (COPA) efficiently help in regulating harmful internet content to children. The government should also pass a bill which restricts contents such as pornography, misuse of chat rooms, information stimulating excessive violence and hate sites (Akdeniz 2-12). Pornography is the major evil element in the internet. According to the annual review of Online Computer Library Centre (2001), there were about 74000 websites containing â€Å"adult content† which were generating more than $1 billion as a profit. Despite the wide-spread of pornographic material in the internet, most of them are legal except the child pornography, bestiality, sadomasochism and necrophilia. Therefore, the government should establish laws that restrict adults from holding or viewing pornographic materials (Akdeniz 2-12). The law should also ensure that internet users do not misuse chat rooms. The government law should restrict the hate sites and ban their creation in the internet. R v Graham case of 1999 is an example of how government can regulate internet content through the enforcement of the law. Secondly, the government can regulate and control the harmful and illegal internet content by developing active hotlines for reporting various cases involving illegal internet content. Hotlines are important in regulation since they enable the government to identify users who are

Saturday, November 16, 2019

Analysis Of Mlk Jrs Letter From Birmingham Jail Religion Essay

Analysis Of Mlk Jrs Letter From Birmingham Jail Religion Essay The Civil Rights Movement of the 1950s and 1960s was a time of great unrest. While the movement was felt across the south, Birmingham, Alabama was known for its unequal treatment of blacks and became the focus of the Civil Rights Movement. Under the leadership of Martin Luther King Jr., president of the Southern Christian Leadership Conference, African-Americans in Birmingham, began daily demonstrations and sit-ins to protest discrimination at lunch counters and in public facilities. These demonstrations were organized to draw attention to the injustices in the city. The demonstrations resulted in the arrest of protesters, including Martin Luther King. King was arrested in Birmingham after taking part in a peaceful march to draw attention to the way that African-Americans were being treated there, their lack of voter rights, and the extreme injustice they faced in Alabama. King immediately strives to justify the need for nonviolent direct action through his statement, Several months ago the affiliate here in Birmingham asked us to be on call to engage in a nonviolent direct action program if such were deemed necessary. What is direct action? Direct action is a form of political activism which may include sit-ins, strikes, and demonstrations. Kings explanation to the clergymen for protesting segregation began with an explanation of their actions, Nonviolent direct action seeks to create such a crisis and foster such a tension that a community which has constantly refused to negotiate is forced to confront the issue. In this case King was invoking the right of freedom of expression, not only freedom of speech but the freedom to assemble. The clergy and many of the citizens of Birmingham believed the demonstrations, sit-ins, and strikes, considered peaceful by King and his supporters, as a taunting and violation of the segregation laws in place in many of the southern states. Within the first paragraphs of his letter King rebukes the many injustices of his people in Birmingham. King responded with dismay at the clergys reference to him being an outsider. King stated that he had a reason for being in Birmingham and he was not an outsider as the clergymen claimed. He responded with a profound statement, Anyone who lives inside the United States can never be considered an outsider anywhere within its bounds. King explained that his purpose for being in Birmingham was due to the injustices within the city. He continued by comparing himself to the eighth century prophets in that he too was carrying a message the gospel of freedom. King explicitly compared himself to the apostle Paul whose travels were extensive in spreading the gospel of Christ. Just as Paul left Tarsus to spread the gospel of Jesus Christ, King left Atlanta for Birmingham. He claimed that his job as a Christian minister was to attack injustice wherever it appeared. Kings imprisonment could a lso be compared to the imprisonment of Paul. King answered the clergymens allegations that breaking the law was not the way to achieve the results Conversely, one has a moral responsibility to disobey unjust laws. I would agree with St. Augustine that, an unjust law is no law at all. King did not believe that they have broken the law. Kings response to the clergymen was that a law that is not morally sound is not a law. Kings statement supports the conservative theory of the Nature of Law in that law existed before man. The fundamental principles of law are to distinguish between that which is right and that which is wrong. Therefore, laws are made to protect the people not degrade and punish. King defined just and unjust law as follows: A just law is a man made code that squares with the moral law or the law of God. An unjust law is a code that is out of harmony with the moral law. To put it in the terms of St. Thomas Aquinas: An unjust law is a human law that is not rooted in eternal law and natural law. Any law that uplifts human personality is just. Any law that degrades human personality is unjust. King wrote that a law could be just on the surface and unjust in its application. The example given was how he had been arrested on the charge of parading without a permit. He explained that there is nothing wrong in having a law which requires a permit for a parade, but that it becomes unjust when it is used to maintain segregation and to deny citizens their First Amendment privilege. King connected the nonviolent civil disobedience or unjust laws to the revolutionary arguments of Thomas Jefferson. Kings writings include, law and order exist for the purpose of establishing justice, and when they fail in this purpose they become the dangerously structured dams that block the flow of social progress. In the Declaration of Independence, Jefferson argued that governments exist to protect basic human rights, deriving their just powers from the consent of the governed. King addressed civil disobedience, the active refusal to obey certain laws, demands and commands of a government or of an occupying power without resorting to physical violence, through his example of the refusal of Shadrach, Meshach, and Abednego to obey the laws of Nebuchadnezzar, on the ground that a higher moral law was at stake. Other examples of civil disobedience were incorporated into the letter. King wrote, civil disobedience was demonstrated by the early Christians who were willing to face lions and the chopping blocks rather than submit to certain unjust laws of the Roman Empire. King understood completely that his audience was not the clergymen alone. So, while appealing to the Christian and Biblical beliefs and principles of the clergy, he included non-Biblical examples of civil disobedience as well Socrates and the Boston Tea Party. King responded to the clergymens accusation that he was an extremist by countering with examples of extremists. King wrote, Was not Jesus an extremist for love: Love your enemies, bless them that curse you, do good to them that hate you, and pray for them which despitefully use you, and persecute you. Amos was an extremist for justice, Let justice roll down like waters and righteousness like an ever-flowing stream.' He continued providing examples of other extremists including the apostle Paul, Martin Luther, Abraham Lincoln, John Bunyan, and Thomas Jefferson. King was concerned with the oppression of the African American. He continued by writing of the yearning for freedom of the African American. He wrote, à ¢Ã¢â€š ¬Ã‚ ¦the United States Negro is moving with a sense of great urgency toward the promised land of racial justice. Using the analogy of the promise land was not accidental. The promise land was the Israelites land of freedom from their enslavement at the hands of the Egyptians.   King quoted Abraham Lincoln, This nation cannot survive half slave and half free, and Thomas Jefferson, We hold these truths to be self evident, that all men are created equalà ¢Ã¢â€š ¬Ã‚ ¦ Christianity played a major role in Kings response to the clergymen. He shared his disappointment with the church as a whole. King believed that he would find support for the cause of justice within the community of the church. He wrote of the strength of the early Christians and of their rejoicing for being deemed worthy to suffer for what they believed. He also wrote of the weakness of the contemporary church and the concerns he had about Christianity losing its meaning. King was so distraught over the actions of the church that he found himself asking, What kind of people worship here? Who is their God? And, while disappointed, he responded with statements of love and hope. As King concluded his letter he shared his belief that the struggle for freedom would be won, not only in Birmingham but across the nation, because the black mans destiny was tied up with the destiny of America and the goal of America is freedom. Kings letter from the Birmingham jail inspired a national civil rights movement. The goal was to completely end the system of segregation in every aspect of public life (stores, separate bathrooms and drinking fountains, etc.) and in job discrimination. The enactment of the Civil Rights Act of 1964, that banned discrimination based on race, color, religion, or national origin in employment practices and public accommodations, and the Voting Rights Act of 1965 reinforced the guarantees of full citizenship provided under the thirteenth, fourteenth, and fifteenth amendments. The passage of these two acts marked the end of the Jim Crow system in the South. The desegregation of public facilities was swiftly implemented. With the enforcement powers of the federal government enhanced, the desegregation of public schools was also initiated.

Wednesday, November 13, 2019

Essay --

The numbers of marine mammals present in waters under the jurisdiction of the United States has fluctuated over the past century. Declines have been credited to various causes, which are a mix of anthropogenic and natural processes. One major cause of marine mammal decline is whaling. Even though this practice has been prohibited, the effects of commercial whaling in the United States can still be seen today. The main whale species affected included North Pacific right whales (Eubalaena japonica), bowhead whales (Balaena mysticetus), humpback whales (Megaptera novaeangliae), blue whales (Balaenoptera musculus), and gray whales (Eschrichtius robustus). Sei whales (Balaenoptera borealis) and sperm whales (Physeter macrocephalus) were exploited in an increased fashion after World War II (Springer et al., 2003). Whaling did not only affect whale populations, but it also affects populations of seals, sea lions, and sea otters. This is hypothesized to be the result of top-down forces from whaling, forcing great whales to shift their food sources to these smaller marine mammals. During the Second World War, whaling of great whales was at its peak. These whales were used for oils for lubricants, food, and other needs of the people of the United States. However, this heavy use of great whale stocks forced killer whales (Orcinus orca) to begin feeding on smaller marine mammals, such as seals, sea lions, and sea otters (Trites et al., 2006). It is also thought that declines in these smaller marine mammals is due to a decline in nutritional limits in their habitats, competition with fisheries, as well as changing climates. The North Atlantic right whale (Eubalaena glacialis) has had a slow recovery since the cessation of commercial... ...ws and acts such as the Marine Mammal Protection Act, the Endangered Species Act, Fur Seal Act, Fish and Wildlife Coordination Act, and the Coastal Management Act, have all helped to prevent the stocks of these important organisms from declining even further. Even though these have been enacted, the general public still needs to be educated and made aware of the population trends of these animals, as well as their importance to the tropic systems surrounding our coastlines. Many individuals do not realize, for instance, that Sea Otters are a keystone species in kelp bed habitats, and without them, kelp forests would dwindle in numbers and the health of those ecosystems would decline rapidly. Kelp forests provide habitat for over a thousand species of animals, many of which are important for fisheries and without those forests, fish abundance would fall as well.