Thursday, October 31, 2019

Geologic Volcano Tour Research Paper Example | Topics and Well Written Essays - 1250 words

Geologic Volcano Tour - Research Paper Example In addition, there are ice caves formed from the lava tubes. The eruption type occurring in Bandera is the passive kind that produces lava flows, cinder cones and small cones. The term Hawaiian eruption is used for this eruption, as it is similar to the one that formed the Hawaiian Islands and continues to form them. Moreover, the rocks formed are called basalts and are usually black in color. In the eruptions, highly explosive eruptions fragment the magma into small cinders that result in cinder cones and gas-rich alkalic basalts make foamy lava shoot very high in the air and cool as they fall, piling up to create cones of loose particles. It is after this that craters are formed from alkali basalt resulting in the Bandera crater, therefore, the volcano is currently dormant albeit with mild signs of life considering its young age. Tectonically, the Bandera Volcanic field is located along the Jemez Lineament, an area known for crustal weakness, moreover, the zone is characterized by a concentration of late-Cenozoic volcanism. The Bandera volcanic field is also located at a transition zone between the Colorado plateau with a thick crust of over 40km (New Mexico Bureau of Geology and Mineral Resources, 2012). In addition, the crust of the area experiences stretching from regional tectonic forces. It is from this stretching that that produces areas of weakness in the brittle little crust allowing magma to force its way upwards and onto the surface. It is on the same Jemez lineament that forms the intersection between the Rio Grande rift and the Jemez Lineament, creating more lines of weakness for volcanic activity to take place. The rift of weakness, Rio Grande rift runs from the North to the South and serves as a means of accommodating East-West stretching of the crust. It is because of this that the entire area is covered with volcanic activity like the Zuni-Bandera crater and Mount Taylor (New Mexico Earth Matters, 2006). Economically, the volcanic site is know n for tourism activities. This is due to geological areas of interest such as the ice caves and the Bandera volcano. The area is open for all to see and visit with the areas labeled as unique and historic landmarks. It spots hiking trails that tourist can climb for a fee around the mountain to the ice caves and the mountain (Icecaves.com, n.d). Other than this, there are not other economic resources or activities suitable in the area for commercial or personal purposes. As for hazards associated with the volcano, there are few signs of a likelihood of an eruption, which makes it a relatively safe area in which to be. This is because despite its youth, there have not been any eruptions in over a thousand years. Groundwater The Antlers sandstone occurs in the in a 4400 square mile area of southeastern Oklahoma and runs parallel to the red river (Morton, 1992). The sandstone comprising the Antlers aquifer is only exposed in the northern side where groundwater runs unconfined (Hart & Da vis, 1981). The sandstone is made up of sand, clay, conglomerate and limestone deposited on Paleozoic rocks. The Antlers sandstone and cretaceous rocks underlie the Gulf Coast Plain Physiographic Province in an area that is mostly plain and is drained by the Red River and some of its major tributaries. The sediments mentioned from the Antlers Sandstone are representative materials that originate from the shoreline sea that

Tuesday, October 29, 2019

Raynauds Phenomenon Essay Example | Topics and Well Written Essays - 500 words

Raynauds Phenomenon - Essay Example The primary type may proceed into secondary which may in severe cases culminate in gangrene and necrosis. Raynaud’s phenomenon is thought to result from over activation of the sympathetic system, which is characterized by vasoconstriction leading to a state of lack of oxygen in the tissues. In a patient with Raynaud’s phenomenon, there may be three skin color changes; at first the skin may undergo pallor which is primarily due to constriction of arteries (Spencer, 1998). This may be followed by cyanosis which is blueness of the tissues due to hypoxia, with the final change settling in as rubor that is redness due to return of blood into the arteries of the affected parts. However, it is not obligatory that all patients have a triphasic change of colors. In fact, it is now believed that most patients present only with bluish discoloration of digits, which is known as acrocyanosis (Sharathkumar, 2011). However, some groups of thoughts negate the idea, they believe that ac rocyanosis is distinct from Raynaud’s phenomenon since it is characterized by continuous cyanosis (Wigley, 2002). Raynaud’s phenomenon in infants is a rare finding. One such finding was relegated by a research paper consisting of a case report regarding an infant presenting with unilateral cyanosis at 1 month of age, who was later diagnosed to have primary Raynaud’s phenomenon at 9 months of age (Sharathkumar, 2011).

Sunday, October 27, 2019

Ethical Debates on Cloning

Ethical Debates on Cloning Introduction Over the past few years human cloning has become a great concern, this is mainly because of ethics. There are many great reason that have been presented about why to clone or why not to clone. There have been great results produced by animal cloning. This has made some people suggest that human clones should also be produced. Lots of sources have highlighted the fact that there is a possibility that we can clone a human to replace someone who has died. But there are many moral concerns raised when we speak of cloning humans. Defining Human Cloning Before discussing the topic of cloning we must know what cloning is. There are many views on how cloning can be defined. For example the American Medical Association (AMA) defined cloning as â€Å"the production of genetically identical organisms via somatic cell nuclear transfer. ‘Somatic cell nuclear transfer’ refers to the process which the nucleus of a somatic cell of an existing organism is transferred into an oocyte from which the nucleus has been removed† (Council on Ethical and Judicial Affairs 1). So basically a clone has the same genes as the cloned. In order to clone you wold take an egg, without a nucleus, then insert the DNA of the person that is to be cloned into the egg. This process is to be done by fussing the egg with the cell, or by nuclear transfer. Then we would make the egg become and embryo by means of electricity or by chemicals. Then we would implant the egg inside the mother for the egg to grow. There are other definitions to cloning. Som e say that cloning is also the production of tissues and organs through growing cells or tissues in cultures along with the actual producing of embryos to be born. This process would be done by using stem cells. When a fertilized egg begins to divide, all the cells inside are similar. However, when the cells start to divide the cells start changing and become stem cells, stem cells are cells that produce different types of tissues and then those tissues will produce organs. We can clone organs by producing stem cells which will then create that organ. But we must understand that when we clone we don’t not get exact copies of the cloned. When we clone, the DNA of the cloned will transfer to the clone but the person will not be an exact copy becausethe clone will grow up in a different environment than the cloned and the clone will have different experiences and different opportunities. And since an individual also adapts based on experiences and the surroundings, the clone will look and do different things than the cloned. How It All Started Before we speak of the good and bad of cloning we must see how cloning started. The idea of cloning was just science fiction until February 1997, when Ian Wilmut, an embryologist, found a way to clone a lamb, its name was Dolly. After this experiments conclusion was published we were introduced to a new possibility.Previously, cloning was thought to be unachievable but because of this experiment there has been proof that cloning can be accomplished and we have the knowledge and technology to do so. The first successfully cloned mammal was Dolly and since then there scientists have made improvement to the cloning technology and procedure and know people have been able to create clones such as; mouse, cattle, goat, pig, deer, rabbit, cat, mule, and horse clones. Even though technology has improved he chances of successful clones is very slim. For every 100 experiments only one, two, or if lucky, perhaps three appear to produce a viable offspring in surrogate mothers. There has been no actual proof of why the chances are really low but some researchers say that this is only because we have recently been introduced to cloning, and it will take a while for our technology to evolve so that there is slight chances of error. There has been no evidence that we can successfully create a human clone. But recently is South Korea some scientists were successful in creating stem cells from human embryos that were cloned. This experiment has started to make people think that a world were cloning humans is common, is not far away. Positives of cloning We could kill bad genes:Genetic illnesses are deadly killers and soon they might just be the thing that causes most deaths. Since humans will continue to reproduce and create life the damage to DNA lines will increase. Damages to DNA line cans create mutations and dangerous genes, but this threat to our life could be easily eliminated if we clone healthy human cells. We could recover faster after life threating injuries:After someone has been in a terrible accident the complete recovery of that person will be near impossible but that person may be able to heal properly by cloning their own cells to recover the damaged area. No more infertility:Even though there are infertility treatments, what would happen if an infertile couple had a child? The couple would then be able joyfully experience having a family without join through painful procedures, to make themselves fertile. Potential Harms and Disadvantages We could age faster:  Because an older cell is often being used to create a human clone, there is the possibility that this imprinted age could be placed on the growing embryo. This would then create premature aging issues and potentially even premature death, all because of the cloning process. Less individuality:  Even though a human clone is only a genetically exact copy of the cloned person the cloned person might have a loss of individuality since a clone is basically a genetic twin of themselves, not matter how different the two might look. Value of human life might be reduced:If we do clone there will be a possibility the some people might that humans are more of commodity than they are priceless. For example if a couple does not like their child they could just clone a better one, to suit their needs. It might also create a social hierarchy where perfect humans are at the top and the other humans, naturally made are at the bottom. We Should Clone A lot of people have difficulties having children but if we could clone then there would be no difficulty. For example; a couple has their first child but then they find out that they are now infertile and won’t be able to have more children. The process of cloning would let the couple have more children and if they want they could even have a genetic twin of their first child. We Should Not Clone If we do clone there is a chance that the clones will be looked down upon.If we create a clone just so the cloned might get a kidney or bone marrow we have to ask out selves if the parents will look down upon the clone because the only reason he was born was to give a kidney. If the parents do think lower of him then that will result in negative self-esteem and might lead to more homelessness. But there is an even bigger problem what if someone creates perfect soldiers? If this does happen then the world will become corrupted because people will attack others more often and we would start wars. And if the one who wins the war at the end will rule the world and it is not a good thing to let someone who has committed genocide take over the world. Alternatives to cloning Cloning organs for others and for research Advantage(s) Since there are people in the world who need organs, we could transplant cloned organs so no natural human needs to donate an organ. By cloning organs we could replace non-functional organs with going to the trouble of finding a proper donor. If we clone humans and get clones, we can do studies on their bodies to see how a normal human body works because we are not actually harming a real human just a clone. Disadvantage(s) If we create clones or even parts for research most will consider it unethical. We should not look down upon clone, clones are also living creatures and they should be treated just like their cloned counter-parts. Cloning cells Advantage(s) Some scientists believe that by injecting cloned healthy heart cells into damaged heart tissue will lead to healing of the heart (Human Cloning Foundation). If we clone and create stem cells we could inject those cells into the human body and prevent things Alzheimer’s or Parkinson’s disease. There are many great things that could come from cloning but if cloning is not allowed then we could never be able to stop terrible diseases. Disadvantage(s) We don’t have a clue about the negative effect of cloning in the long run.Before cloning we should figure out what could go wrong and try to fix it.In an evolutionary standpoint, cloning is not good. Evolution relies on a continual mixing and matching of genes to keep the gene pool alive (McCormack). With cloning, the natural process of selection of genes would be bypassed and evolution would be impaired. Cloning animals that can be useful for our lives Advantage(s) We already give animals no rights and think we are better than them so why not continue? By cloning animals to create a perfect animal we can get what we want. For example if we clone a poisonous animal we can take its poison and study it and we can also invent medicine to cure poisons form a clone animal so we won’t have to harm a real animal life. Disadvantage(s) If we do clone it would lead to loss of individuality, even for animals. This will be because the animal that is cloned will have its genetic conditions known. This could be a great stress to the clone and possibly even the loss of ability to choose for itself (Council on Ethical and Judicial Affairs 5). When a farmer knows if an animal has a genetic problem or not he will then decide to keep the animal or to kill it. After all animals do have a mind of their own and they should be allowed to be free in this world My Personal Recommendation After doing some research on the possibilities of cloning, I think finding out how we can clone was a great advancement of knowledge. Even though I think cloning is something that could be helpful for us I don’t think we should find ways to make life besides to natural way. I think we should use the knowledge of cloning to create new organs and cells. I am on the side of cloning cells and organs because I don’t think of it like cloning complete creatures.If we do this it would increase our knowledge of the human body as well as letting us save lives. Conclusion The knowledge of cloning that we have could change the world for ever or if it is banned it could have minimal effect on our daily lives. Cloning is a process that would create human life form asexually. When a clone is born it will have the same genetic material as the cloned, this could be a great thing for humans. But some think that it is unethical to clone. And because people think that cloning is unethical, many countries have banned cloning. In turn it has caused advancement in technology for cloning to slow down. Even though there is still a lot we don’t know about cloning I think it can be used for the good and will one day benefit us.

Friday, October 25, 2019

Philosophy of Gatsby :: The Great Gatsby F. Scott Fitzgerald

This book, The Great Gatsby, is a tale of deceit and the silent despair in the world of the human. Everything is not what it is made out to look like and often convincing as such. It is created by and creates the fear of being left in that portal which is the object of escape and the depths of despair. It shows life is a whirlwind which cannot be controlled, and many times even for the sick is not wished to be controlled because humans are too worrisome over what will and will not be and would rather turn their backs than face what is real. Distressing to look at and face but bliss to ignore and get on with the life which you know nothing about and never will know about because you are too stupid not to have the thought to want to know about. Humans do not do what is best for them and others only what will protect them from austerity, leading the path wide open for the dullness and loneliness they cannot find within themselves because yet again they ignore it with stupidity. Thi s is a sad, pathetic, and rueful story showing the discontent and avarice that lies within the human mind. On the other hand, it shows the nescience, naivetà ©, and overall dullness of the mind who tries for something that is already to far gone to worry about, often the characteristics of the heart. The battle of the heart and mind is one that has and will go on for ages and is too petty of a matter to suffer over because if you let one or the other control it is much to easy to ruin yourself. â€Å"I am what I cannot be and am what I am not. My mind tells me I am not what I believe and want to be, but my heart tells me I am what I believe and want to be so I must be what I am not. But what am I? Am I life or death?

Thursday, October 24, 2019

Paradise of the Blind

World literature two Statement of intent I plan to elaborate on the political aspects of Paradise of the Blind by writing a formal letter to the Vietnam government. The Vietnam government banned this book from the country because of the all encompassing political aspects included in the book. In the authors books all of the aspects of life are demonstrated and the total view was an unattractive image for the leaders. This book was banned because it went against what a government hopes to portray to their people.Duong Thu Huong worked for the Communist Youth Brigade at the age of 20 but was expelled from the communist party in 1989. She has been imprisoned numerous times for her outspoken support for human rights and democratic political reform and is no longer allowed to leave Vietnam. In Paradise of the blind, her fourth book written and her fourth book to be banned, she included government acts such as the effects of communists on the people such as the land reform act, and Ratific ation of Errors. The large political attraction and its effect on the people are a large part of her books but the cultural aspects are also prominent.I hope to convince the Vietnamese government to publish this book which would provide a better understanding for the people in and out of Vietnam. The reason I chose to do a letter it because it allows me to show the government’s large and influential part in the people’s lives and as well as discus the cultural aspects. The government banned the book in 1991 and I wanted to explore why it was important enough to ban and hopefully have an objective view on why it would be good to publish it. President Truong T? n Sang,Thank you for the honor of taking time out of your day to read my letter. I would like to address the Book Paradise of the Blind by Duong Thu Huong. Because it was banned from your country you might not be familiar with the work but I am sure you are aware of the author. She is well known for her writing an d political stances. Her book is a fiction with many real life situations and probable events for a person of Vietnam in the 1980’s. Because of this factor I found it interesting that it was banned from your country under the term of President (Insert name here).I write to you today in hopes that you will reevaluate president (insert name here)’s decision and allow this book to be published. The social conditions were not optimal in the book and I can respect the decision to ban it, but it was banned from the country but that was a different time and things have changed since then. Under the influence of many years the conditions and circumstances have changed. Publishing the book provides you with a good opportunity to portray an understanding for the people and your willingness to cooperate with their wants with little or no cost to you.Duong Thu Huong has spoken out about the government censorship numerous times and by allowing her book to be published now, it could allow the people to trust their government. The book showed a vulnerable time in Vietnamese history fraught with trials and errors on the part of the government. The fact that it revealed corruption in the government was a problem at the time but the government has improved since then. After the Ratification of Errors the land owners were allowed to prosper again such as â€Å"Aunt Tam† even though times were still difficult.Like the Ratification of errors after the land reform, by ending the ban it would show that you as a country are willing to accept the past and move on. As the governmental issues discussed in the book are not as prominent today it would be beneficial for the government’s reputation to show how far they have come. As I read the book I soon realized what insight it would provide an understanding into the lifestyle of the older generations. It would allow the students of today to better understand their countries history and how it affected the peop le’s lives.The insight that the book provided Americans into Vietnam could also be mirrored by the Vietnamese and a new appreciation for their culture could arise. By allowing the people to see the conditions back then they will realize the full extent of the improvements made and understand their parents and grandparents went though. The food in the book allows for a better understanding of the situation. At each time in the characters life, depending on their financial situation, the food varied. The fact that there is an emphasis on food would be understood and relatable to the public.They have the ability to compare condition then and now creating a bond that comes from true understanding. Thought this book good traits, situations, and food are juxtaposed with bad and the influence that they had on their surroundings is something that can be learned from. This book demonstrates a strong aspect of your culture in the submission of Que to her brother. When her brother told her to leave her husband she did even though she loved him. Her devotion to her brother demonstrates the characteristics of a good sister and later aunt.Que went to the tenement were her brother lived in order to care for her brother and his family. She put her brother’s needs in front of her own and her daughters. When her job was not acceptable in her brother’s opinions she reluctantly changed jobs. That selflessness in her endeavor to help her brother is something to be admired. Just as Que helped her brothers family, Hang was loyal to her mother. When her mother had her leg amputated due to a car accident and could no longer be an efficient worker, Hang hurried to help her. Hang quit school to go to Russia to work and support her mother.Tam also had admirable qualities in that she supported her brother’s child when Hang’s mother had practically abandoned her for her nephews. Tam supported Hang through school and gave her many opportunities to succeed. The traits in all three of these women are admirable and the general public could learn from their sacrifices. The hard work that they put in gave others the ability to live and do as they needed to survive. Paradise of the Blind is an interesting book that taught me a lot about your culture. It advocates many good qualities as well as change.Hang’s decision to progress into the future and leave her past behind when she decided to sell her Aunt’s house allows her to move on and create a new opportunity to better herself. By releasing the book the same opportunity would come for you and learning form the past would further strengthen yourself today. People could compare what is to what was and make up their opinion for themselves. The people will appreciate the freedom and respect you for allowing them the option. By leaving the book banned you lead people to believe that it is still true today when much change has occurred.

Wednesday, October 23, 2019

Elder Abuse Essay

The Seriousness of Elder Abuse in Hong Kong Families To let older adults enjoy a sense of security and a sense of belonging is a time-honoured tradition in the Chinese society. Unfortunately, elder abuse has risen as a serious social problem in Hong Kong. An organization called â€Å"The Against Elderly Abuse of Hong Kong† has received 2212 requests for assistance related to elder abuse in 2011, which has doubled the number of requests received in 2006 (â€Å"Cases of elder abuse,† 2012). Besides, several pieces of news about elder abuse in Hong Kong families have been reported, for example, a 90-year old woman was forced to leave home by her unfilial son and daughter-in-law (Li, 2012). To analyze, the main root causes of elder abuse can be induced to the stress of family caregivers due to the dependence of the elderly as well as the financial dependence of family caregivers on the elderly. In addition to physical and psychological injury, the abused elder people have a higher mortality rate than those not being abused. T o ease the elder abuse problem, enhancement of the capacity of elder care services and education on the public about elder abuse have been suggested by the experts. First and foremost, according to the National Research Council (2003), the definition of elder abuse is defined as â€Å"Intentional actions that cause harm or create a serious risk of harm (whether or not harm is intended) to a vulnerable elder by a caregiver or other person who stands in a trusting relationship to the elder or failure by a caregiver to satisfy the elder’s basic needs or to protect the elder from harm† (p. 40). There are 5 categories of elder abuse, including physical, psychological, financial, sexual, and neglect (Harris, 2006). Physical abuse, psychological abuse, and financial abuse are what this essay will emphasize on. To start with, studying the causes of elder abuse is essential. Among many risk factors of elder abuse, stress of family caregivers due to the  dependence of the elderly is one of the  main root causes of elder abuse. As the body functions of the elder people are declining, the elderly, especially those suffering from Dementia, may behave like children who depend on the family caregivers in physical, financial and emotional aspects, resulting in exerting a great pressure to the responsible family caregivers (Pillemer, 1989). A study conducted by Lachs, Williams, O’Brien, Hurst, and Horwitz (1997) discovered that the elder people who have impairments in daily physical activities, such as cooking, and need to be taken care of by family caregivers have double chance of being abused than those without impairments. Once the stress on the family caregivers exceeds what they can withstand, elder abuse will probably occur. Apart from the stress of family caregivers due to the dependence of the elderly, family caregivers depending on the elderly financially is another common cause of the elder abuse. A study conducted by Pillemer (1985) found that â€Å"64% of the abusers in his sample were financially dependent on their victims, and 55% were dependent for housing† (p. 152). The same phenomenon can be applied to Hong Kong. As the price of flats in Hong Kong is very high, many Hong Kong citizens cannot afford it. However, some adults still want to have their own flat. Therefore, some of them will force their old parents to pay for them. In some serious cases, an adult son defrauds the money or the ownership of the flat of their old parents by inveigling them to sign the money withdrawal banking slip or the contract of the change of the ownership of their flat (Lee, 2011). Moreover, due to the underreported crime nature of the financial abuse on the elderly and family caregivers accounting for 60% to 90% of the abusers, financial exploitation on the elder people by family caregivers has become a serious social problem which is difficult to be discovered (Blackburn & Dulmus, 2007). After realizing the causes, understanding the impact of the elder abuse is also significant. The elder people being abused would suffer from both physical and psychological injuries which  lead to a higher mortality rate. According to a study in America, 40% of the non-abused elderly group were still living after a nine-year experimental period; however, only 9% of the abused elderly were still alive (Wolf, 2000). The reasons behind are due to the physical injury, such as cuts, burns, and fractures, caused by infliction of physical violence on the elderly; as well as psychological injury, such as depression, fear and anxiety, generated by verbal aggression and insulting action on the elderly (Blackburn & Dulmus, 2007; Yan & Tang, 2004). Some elder people suffering from abuse would commit suicide so as to avoid being abused continually (Blackburn & Dulmus, 2007). After understanding the root causes and the impact of elder abuse, some solutions are suggested by the experts and related organizations to ease the problem. Enhancement of the quantity of elderly services could help relieve the family caregiver stress by increasing the capacity of the Day Care Centers and Home Care Services for the elderly. However, the current quota of elder care services is seriously inadequate. According to the press release of the Hong Kong Council of Social Services (2011), there are 26,776 elder people on the waiting list of elder care centers and the average waiting time is 3 years, resulting in lots of elder people on the waiting list die before they can get a ticket to the center. Therefore, by increasing the quota of elderly services, family members can transfer the elderly to Day Care Centers if family members are not convenient to do so, for example, working in day  time. In addition, by doing so, the family caregivers can spare time to have their social and outdoor activities to relieve their stress (Chow, 1999). Moreover, home care services, such as personal care helpers or general household helpers, can also reduce the workload and stress of the family caregivers. However, on the other hand, it may perhaps lead to elder abuse by the staff or nurses in the service centers. There are some news reports about the elder abuse by staff of elder care centers; for example, a 65-year old woman  suffering from Alzheimer’s disease was forced to eat her own faeces by a management staff of a home care center for the aged (Man, 2009). Despite the few reported cases, it cannot conclude that the quality of staff in the services units for the elderly is declining. In most cases, it is safe for the elder people to live in the elder care centers. . Besides increasing the quota of elderly services, detection of elder abuse is also important. As the elder abuse cases are underreported, it is crucial to find them out so as to avoid the elderly suffering from abuse continually. Health visitors who have been trained to identify the suspected abuse cases can be introduced to visit the elder people regularly, observe the elderly to see whether he or she has been abused, and report suspected abuse cases to the Social Welfare Department (Roe, 2002; Strasser & Fulmer, 2007). Ultimately, educating the public about the official definitions and consequences of different kinds of elder abuse is a long term measure to ease the elder abuse problem as it can reduce the misunderstanding of elder abuse and raise the public awareness towards the problem (Chan, Chun, & Chung, 2008). According to the Political Declaration and Madrid International Plan of Action on Aging (2003) of the United Nations, one of  the objectives of policy change is stated as â€Å"†¦ encouraging health and social services professionals, and the general public, to report suspected elder abuse; including training on elder abuse for the caring professionals; and establishing information programs to educate older persons about financial abuse, including fraud† (p. 5). This policy reflects that educating the public and the elderly to detect and prevent elder abuse is an effective measure (Blackburn & Dulmus, 2007). Organizing exhibitions in shopping malls, holding seminars in comm unity halls, and making advertisements on television are the measures that can be considered by the Hong Kong government in order to educate the public about the seriousness of elder abuse. Despite low efficiency and time consuming, in long-term, educating the public to help report the  suspected cases of elder abuse can deter the abusers from hurting the elder people. It can be seen from the above that elder abuse is a serious social problem with low public awareness. It leads to many harmful consequences to the elder people who, however, usually hide the case to protect the abuser who may be their family member (Blackburn & Dulmus, 2007). To tackle the problem, enhancing the capacity of elder care services, introducing health care visitors, and educating the public about elder abuse could be the possible solutions. Despite some weaknesses of the solutions, they can boost the public awareness after all. If more citizens in Hong Kong realize the impact of elder abuse, less elder people will be abused and the problem of elder abuse can be relieved. The elder people in Hong Kong can really enjoy a sense of security and a sense of belonging. References Blackburn, J. A., Dulmus, C. N. (2007). Handbook of gerontology – Evidence-based approaches to theory, practice, and policy. Hoboken, NJ: John Wiley & Sons. Cases of elder abuse rises significantly – Organizations urge for legislation of elder abuse as criminal charge. (2012, June 11). Ming Pao, p. A14. Retrieved from http://wisenews.wisers.net/ Chan, Y. C., Chun, P. K., & Chung, K. W. (2008). Public perception and reporting of different kinds of family abuse in Hong Kong. Journal of Family Violence, 23, 253–263. doi: 10.1007/s10896-007-9149-0 Chow, T. (1999). What can We do about elder abuse? Policy Watch, 3(7), 14–20. Harris, G. (2006). Domestic violence and abuse: Elder abuse. Practice Nurse, 31(8), 59–70. Lachs, M. S., Williams, C., O’Brien, S., Hurst, L., & Horwitz, R. (1997). Risk factors for reported elder abuse and neglect: A nine-year observational cohort study. The Gerontologist, 37, 469–474. Lee, S. (2011, June 13). Financial abuse of aged surges. The Standard, Local, p.11. Retrieved from http://wisenews.wisers.net/ Li, O. K. (2012, May 17). Unfilial son and daughter in law force 90-year old mother away from home. Hong Kong Economic Times, p. A24. Retrieved from http://wisenews.wisers.net/ Man, J. (2009, December 8). Carer at home for elderly forced woman to eat faeces, court told. South China Morning Post, p. C3. Retrieved from http://wisenews.wisers.net/ National Research Council. (2003). Elder mistreatment: Abuse, neglect, and exploitation in an aging America. Panel to Review Risk and Prevalence of Elder Abuse and Neglect. In R. J. Bonnie & R. B. Wallace (Eds.), Committee on National Statistics and Committee on Law and Justice, Division of Behavioral and Social Sciences and Education. Washington, DC: The National Academies Press. Pillemer, K. (1985). The dangers of dependency: New findings on domestic violence against the elderly. Social Problems, 33(2), 146–158. Pillemer, K., & Finkelhor, D. (1989). Causes of elder abuse: Caregiver stress versus problem relatives. American Journal of Orthopsychiatry, 59(2), 179–187. doi: 10.1111/j.1939-0025.1989.tb01649.x Roe, B. (2002). Protecting older people from abuse. Nursing Older People, 14(9), 14–18. Retrieved from http://nursingolderpeople.rcnpublishing.co.uk/archive/article-protecting-older-peoplefrom-abuse. Strasser, S. M., & Fulmer, T. (2007). The clinical presentation of elder neglect: What we know and what we can do. Journal of the American Psychiatric Nurses Association, 12(6), 340–349. doi: 10.1177/1078390306298879 United Nations. (2003). Political declaration and Madrid International Plan of Action on Aging (DPI/2271—February 2003-20M). New York: United Nations Department of Public Information. The Hong Kong Council of Social Service. (2011, March). Use the hundred billion reserves well – Take the long term responsibility [Press release]. Retrieved from http://2011.hkcss.org.hk/channel/detail.asp?issueID=95 Wolf, R. S. (2000). The nature and scope of elder abuse. Generations, 24(2), 6–12. Yan, C. W., & Tang, S. K. (2004). Elder abuse by caregivers: A study of prevalence and risk factors in Hong Kong Chinese families. Journal of Family Violence, 19(5), 269–277.

Tuesday, October 22, 2019

Napoleons Strategy and Tactics

Napoleons Strategy and Tactics Aim and Thesis This research paper aims to explore Napoleon’s strategies and tactics, which he employed throughout his military campaigns to defeat his enemies and conquer other empires when he ruled the French empire between 1779 and 1821.Advertising We will write a custom research paper sample on Napoleons Strategy and Tactics specifically for you for only $16.05 $11/page Learn More The thesis of the research paper examines critically the effectiveness of Napoleon’s military strategies and tactics, which he used during his reign as a powerful emperor of France and an army commander. General Outline This paper delves into military experiences of Napoleon and tries to unravel why his strategies are valid in teaching military students of this tremendous technological era. Since many commanders of his time acknowledged and credited him as a military genius, then, how effective were his military strategies. The effectiveness of his military and le adership tactics is evident in the way he managed to lead the French empire, mobilized his armies, and conquered many territories. Napoleon employed a strategy of dividing his enemies and forming strategic alliances to conquer his enemies with much ease. The uniqueness of Napoleon is that he had already discovered in his time the current application of professional military skills and logistics in his strategies and tactics. Professional skills and logistics are the present pillars of a military that guarantee victory when optimally utilized. To overcome his battles, he interrupted the logistics of his enemies to weaken them. Even though Napoleon considered himself as a great commander, he never underestimated the danger posed by the enemies, even the weakest of them all. At all times Napoleon took precaution and responded rapidly to any threatening enemy. When combating his enemies on the battlefield, Napoleon employed central position approach and indirect approach. These two appr oaches enabled him to seize the local superiority to control and manipulate the enemy on the battlefield.Advertising Looking for research paper on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Moreover, Napoleon utilized Battalion square strategy to combat his enemies. This strategy enhanced his ability to mobilize his armies and troops effectively in fighting powerful forces of Russia, which defeated him. He also applied his five military principles that enabled him to use his troops economically as concerted military efforts focused on the enemy were quite effective. Introduction Napoleon was the great Emperor of France with novel military strategies and tactics that enabled him to conquer his enemies and neighboring empires in a bid to expand his territory. His determination to win battles came from his confession that â€Å"there is no man more pusillanimous than I when I am planning a campaign. I purposely exaggerat e all the dangers and all the calamities that the circumstances make possible†¦ I am like an unmarried girl laboring with child† (Nafziger 1989, 23). He derived his military strategies and tactics from inherent fears that kept him on toes due to the imminent battles that revolved in the neighboring empires. The fear of losing a battle haunted him constantly, and this prompted him to draw novel strategies and tactics to overcome his enemies. During the great battle of Borodino when he attacked Russia, he demonstrated his military potential and ability to conquer ferocious enemies despite their military prowess. Critical analysis of Napoleon’s strategies and tactics show that his military approach to the decisive Russian battle, invasion of Italy, Egypt, United Kingdom, Portugal, Syria, and series of Coalition wars was quite effective and is still invaluable in the contemporary warfare. Napoleon’s Legacy Napoleon left leadership and military legacy due to the strategies and tactics he extensively employed during his reign as the French Emperor. Although Napoleon exercised his military powers during the early 19th century, his strategy and tactics are still applicable in the 21st century. According to Nafziger, â€Å"†¦his campaigns formed the basis of military education throughout the western world, and a lot of military thinking is still influenced by the great Frenchman† (1989, 26). Since his military strategies and tactics have stood the test of time, which is about two centuries now and can still prove to be invaluable in this era of high technology, then it shows that his military skills were and still are quite effective. The effectiveness of military strategies and tactics depends on the ability of a military commander to mobilize his armies and resources effectively. Napoleon applied time and space as the components of logistics that are necessary to win a decisive battle such as the invasion of Russia, Coalition wars and the Italian Campaign.Advertising We will write a custom research paper sample on Napoleons Strategy and Tactics specifically for you for only $16.05 $11/page Learn More The greatness of Napoleon emerged after he became an emperor in 1779 when he began to exercise his political and military powers with novel strategies and tactics. Tarle and Viktorovich observe that â€Å"Napoleon’s greatness as a soldier was evident from the start of his remarkable career; he made victory followed upon victory for over a decade† (Tarle Viktorovich 1979, 357). His victory in a series of battles did not only demonstrate his strategies but also tactics that gave him an upper hand in major battles that he fought. Military analysts of his time considered him a military genius based on his ability to strategize and mobilize his armies to war. Even if Napoleon lost a battle like the Russian invasion, he still demonstrated the courage and creativity in withdrawi ng his soldiers from the field. Therefore, the character and military prowess of Napoleon was of high standards, and that is why current military students still read his military strategies and maneuvers. The Military Empire By 1812, Napoleon had led France to become a mighty empire in Europe, and he boasted of the great achievement that he had made. Given the military status of the French Empire, Napoleon was poised to invade and conquer the neighboring independent states of Europe. To achieve his mission, â€Å"he managed to destroy the unity of purpose which had fed the coalitions against France for so long, as Austria, Russia, and Prussia were now ready to fight each other as well as to fight France† (Tarle Viktorovich 1979, 356). Napoleon knew that the unity of independent European states threatened and would eventually ruin his powerful empire and there would be no legacy left for him and his successor, so he had to destroy their unity before conquering Russia individu ally. Therefore, he employed the tactic of dividing and conquering; what colonialists would popularly call divide and rule. Since Napoleon participated in a series of coalition wars, he had learned the importance of making a coalition against the common enemy. When an enemy seemed to have many coalition partners against him, Napoleon would scheme a way of dividing the coalition and conquering. This strategy weakened the ability of the enemy to fight effectively with the immense back up from its allies. To fight and conquer Russia, Napoleon devised a scheme of building alliances with the Middle-East powers of the Ottoman Empire. â€Å"In 1803, Napoleon went to considerable lengths to try to convince the Ottoman Empire to fight against Russia in the Balkans and join his anti-Russian coalition† (Olszewski 2005, 34). After three years of negotiations, the Ottoman Empire realized Napoleon’s victory on the battle of Austerlitz and agreed to form a powerful alliance, and they conquered Russia and England in 1806. Napoleon used the strategy of dividing the enemy and formation of powerful strategic partnerships to defeat his enemies, a creative, scheming, and effective strategy.Advertising Looking for research paper on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Modern Military Skills The unique strategy that Napoleon employed as a military commander is the use of military professionalism. Many of his successors regarded Napoleon as a premier general who conceptualized new strategy and tactics in terms of structure and composition of strong armies; impregnable in the face of threatening enemies. â€Å"Napoleon embodied the idea of the professional military leader, not gaining his position through familial or political connection, but earning it by distinguishing himself in combat† (Hoffman 2005, 122). In his military professionalism, Napoleon took two years in doing logistical planning to invade Russia, for he realized that decisive battles demanded proper logistics. Due to his logistical approach to battles, many generals have appreciated his approach and have applied his strategies and tactics, which have proved to give consistent successes in various wars. His presence during the war made a significant difference, as he was indisp ensable in the mobilization of resources and troops. Logistical interruption of the enemy is a professional application of military strategies and tactics. Napoleon had realized that â€Å"every effort must be made to render the enemy helpless through the severance of his lines of supply, communications, and retreat†¦to envelop one of the enemys armys flanks and threaten its rear and communications† (Nafziger 1989, 21). The prime objective of Napoleon as a commander of the army was to identify the location of the enemy and logistical parameters that the enemy relied upon. The battle is not only about fighting the enemy directly, but it also involves indirectly fighting by interrupting logistical support as a means of weakening the enemy. When logistical support in terms of communication, transport or supply of essential weapons decline, then an enemy becomes weak and can only retreat or risk fighting helplessly. Napoleon utilized this strategy extensively when he invaded Russia, Egypt, Italy, and a series of coalition wars all over Europe. To this day, the concept of military professionalism and logistics are central pillars of military strategies. Military Precautions Since Napoleon harbored many fears concerning his vast empire, which he had managed to hold together through immense challenges, he wanted to guard it jealously without overlooking any possible threats albeit negligible. Napoleon argues that â€Å"†¦when I am planning a campaign, I purposely exaggerate all the danger and all calamities that circumstances make possible† (Olszewski 2005, 32). This strategy gave him the advantage in case the potential threat of the enemy was underestimated. During the Russia invasion, Napoleon never at any instance overlooked or underestimated the battle and consequences that arose, for in his logistical skills, he provided for the worst-case scenarios that were bound to occur in decisive battles like the Russia invasion that cost the lives of many soldiers. Giving a chance and ample time to an enemy to strategize was against Napoleon’s strategy. In his military campaign, Napoleon never wasted his time camping troops in wait of the already known enemy. Rainey (2006) explains that â€Å"the strength of an army, like the power in mechanics, is estimated by multiplying the mass by the rapidity, as a rapid march augments the morale of an army, and increases its means of victory. Press on! (169). Therefore, rapid response to an impending battle was Napoleon’s strategy, which ensured that his enemies did not gain an opportunity to wage war; moreover, the strategy increased the morale of the army to attack vigorously. In his principles, Napoleon believed that military strategies should employ tactics to surprise and confuse an enemy on the battlefield because initiating and controlling the pace of the fight is the crucial element in conquering an enemy. Napoleon illustrated these tactics when he successfully wo n the battle of Ulm-Austerlitz in1805. Battlefield Strategies and Tactics The primary strategy of Napoleon was to identify the enemy. Identifying the location, composition, and structure of the enemy highlighted any possible threats and imminent calamities, which were very critical in determining whether to go ahead with the battle or not. If the battle was inevitable, then effective strategies and tactics were necessary to combat the enemy. Hardeman (1998) notes that â€Å"when facing a foe superior in numbers, the strategy of the central position was employed to split the enemy into separate parts, each of which could then be eliminated in turn by adroit maneuvering†¦Ã¢â‚¬  (175). With this strategy, though overwhelmed by the Russian armies, Napoleon armies managed to kill more of them as compared to their troops who died in the decisive battle. In this case, the central position strategy proved useful in combating armies who were mightier while incurring minimal losses and injuries. The strategy of the indirect approach was very effective when Napoleon had a large number of armies under his command. This strategy enabled Napoleon to seize superiority while on the battlefield and thus wield much power to control the battle. This strategy involved displaying mighty armies in front of the enemy to attract attention and subsequently scare away the enemy. According to Hoffman (2005), in this strategy, â€Å"one of two army corps would be detached to pin the attention of the enemy to his front. Meanwhile, Napoleon would take the bulk of his army on a swift, wide march around one of the enemys strategic flanks (177). Flanking the enemy weakens the logistical maneuvers that sustain it in the battle preventing further reinforcement from other troops. Eventually, the enemy is isolated and severed from obtaining logistical support of forces, communications, retreating, and supply of more weapons. This strategy demonstrated to be very effective as it led to mas sive victories of Jena, Ulm and Friedland battles. Napoleon also utilized the strategy of Battalion Square and the tactic of outflanking his enemies. The Battalion Square consisted of an advance guard, which was to identify the enemy, right and left wings who acted as combating troops that marched within the range where they could offer emergency support to both advancing and reserved forces. At the rear end of the advancing army was a reserved troop, which provided extra support in case the advance troop retreated. Rainey argues that â€Å"Napoleon could use a mere part of his force to tie down and occupy the attention of one enemy, then rapidly move his remaining forces to build up a local superiority against his enemies† (2006, 158). When Napoleon had built local superiority, he employed the tactic of flanking to combat the Russian armies who were too strong for him to conquer, but at least he demonstrated artful military combat. Napoleon had five principles that guided hi s military strategies and tactics. His principles were quite evident in the number of battles he successfully fought during his reign because many commanders acknowledged that no commander could beat him in terms of the number of battles he fought and severity of battling conditions, which he experienced. The five principles entailed the destruction of the enemy on sight, the concentration of the military efforts, scheming operations, interruption of logistics, and real-time surveillance of the armies. Adhering to these principles, Napoleon focused objectively on the enemy. He held that â€Å"there are in Europe, many good generals, but they see too many things at once. I see only one thing, namely the enemy’s main body I try to crush it, confident that secondary matters will then settle themselves (Nafziger 1989, 23). In this strategy, Napoleon distinguished himself from other generals who lacked concentration on the enemy and lost the decisive battles they fought. His mili tary principles enabled him to concentrate forces and managed to mobilize them artfully to economize his resources. Conclusion Napoleon’s military strategies and tactics are crucial in military education as a case study of a genius military commander who fought numerous and diverse battles. Despite the astounding defeat that Napoleon met during his war against Russia, he demonstrated logistical strategies and tactics that many generals consider artful and worth acquiring in the current generation. Napoleon left a military legacy as his successors credit him a military genius who made a great impact in military reforms and shaped the approaches of decisive battles. His strategies and tactics still echo through the 21st century since military academies recognize and approve them as effective and worth learning. Although Napoleon armies suffered after invading Russia, this does not mean that their strategies were ineffective; it is only that the Russian troops were many, organiz ed, and smarter. Annotated Bibliography Hardeman, Richard. â€Å"General Logistics Paradigm: A study of the Logistics of Alexander, Napoleon, and Sherman.† Air Force Logistics Management Agency 26, no. 13 (1998): 120-125. Compares and contrasts logistical strategies and tactics, which great men like Napoleon, Alexander and Sherman employed in their military leadership to conquer battles. It underscores the fact that military logistics forms the central part of effective strategies in decisive battles. Hoffman, Smith. â€Å"Logistics of Waging War.† American Military Logistics Journal 12, no. 4 (2005): 172-189. Emphasizes the importance of military professionalism by applying logistical planning and consultation, to accommodate various ideas that are paramount in assessing looming threats and dangers. Napoleon demonstrated professionalism in his logistical planning to invade Russia. Nafziger, George. Napoleons Strategy and Tactics. Ancient Military Journal 58, no. 6 (19 89): 17-31. Describes Napoleon strategies and tactics such as divisive diplomacy, military professionalism, logistics, structuring, and composition of the advancing armies. His strategy and tactics enabled him to survive annihilation during the Russian Invasion. Olszewski, Zbigniew. â€Å"The Battle of Borodino, 1812.† Napoleon Military Conquest 16, no. 9 (2005): 24-47. Portrays Napoleon’s insecure and unassuming character for he never overlooked or underestimated the danger an enemy poses to his empire. It further outlines the causes and subsequent implications of the Russia invasion by Napoleon. Rainey, James. Old Lessons New Thoughts. New York: DIANE Publishing, 2006. Explains how old strategies and tactics are applicable in the contemporary world. It also confirms that early lessons of Napoleon strategies and tactics are still invaluable in modern warfare. Tarle, Eugene Viktorovich. Napoleon’s Invasion of Russia, 1812. New York: Octagon Books, 1979. Analyses strategies and tactics that Napoleon used to invade Russian and gives the strengths and weaknesses that led to the eventual defeat of the Napoleon armies.

Monday, October 21, 2019

Dementiaa Essays - Cognitive Disorders, Dementia, Free Essays

Dementiaa Essays - Cognitive Disorders, Dementia, Free Essays Dementiaa IntrodWhat is Dementia ?uction Dementia is an organic brain syndrome which results in global cognitive impairments. Dementia can occur as a result of a variety of neurological diseases. Some of the more well known dementing diseases include Alzheimers disease (AD), multi-infarct dementia (MID), and Huntingtons disease (HD). Throughout this essay the emphasis will be placed on AD (also known as dementia of the Alzheimers type, and primary degenerative dementia), because statistically it is the most significant dementing disease occurring in over 50% of demented patients (see epidemiology). The clinical picture in dementia is very similar to delirium, except for the course. Delirium is an acute transitory disorder. By contrast Dementia is a long term progressive disorder (with the exception of the reversible dementias). The course of AD can range anywhere from 1.5 to 15 years with an average of about 8.1 years (Terry , 1988). AD is usually divided into three stages mild, moderate, and severe. Throughout these stages a specific sequence of cognitive deterioration is observed (Lezak, 1993). The mild stage begins with memory, attention, speed dependent activities, and abstract reasoning dysfunction. Also mild language impairments begin to surface. In the moderate stage, language deficits such as aphasia and apraxia become prominent. Dysfluency, paraphasias, and bizzare word combinations are common midstage speech defects. In the severe stage the patient is gradually reduced to a vegetative state. Speech becomes nonfluent, repetitive, and largely non-communicative. Auditory comprehension is exceedingly limited, with many patients displaying partial or complete mutism. Late in the course of the disease many neuropsychological functions can no longer be measured. Also primitive reflexes such as grasp and suck emerge. Death usually results from a disease such as pneumonia which overwhelms the limited vegetative functions of the patient. According to the Encyclopedia of Neuroscience dementia is defined as a sustained, multidimensional loss of cognitive function secondary to organic central nervous system damage, unaccompanied by evidence of an acute superimposed state of clouded consciousness as occurs with delirium or reduced arousal. Dementia is not a disease but rather a symptom of many conditions causing brain dysfunction. It arises as a result of severe and diffuse brain damage. The essential feature of dementia is an intellectual decline resulting from a progressive deterioration in brain functioning. Dementia can occur as a result of a variety of neurological diseases. These include: Alzheimers disease (dementia of the Alzheimer type), cerebrovascular disease in particular Multi-infract dementia (vascular dementia), alcohol related diseases such as Marchiafava-Bignami disease (alcoholic dementia), AIDS (AIDS dementia complex), Creutzfeldt-Jakob disease (myoclonic dementia), Picks disease, Huntingtons disease, Parkinsons disease, normal pressure hydrocephalus (NPH), and progressive supranuclear palsy (PSP). Dementia is commonly differentiated along two dimensions: age and cortical level. The first dimension, age, distinguishes between senile and presenile dementia. Senile dementia is used to describe patients who become demented after the age of 65, whereas presenile dementia applies to patients who become demented prior to that age. Late onset AD (LOAD)Alzheimers disease also known as senile dementia Alzheimers type (SDAT) is the predominant cause of senile dementia. Early onset AD (EOAD)lzheimers disease is the most frequent cause of presenile dementia,; but HDuntingtons disease, Picks disease and Creutzfeldt-Jakob disease though not as frequent are also important causes in presenile dementia. The second dimension, cortical level, differentiates between cortical and subcortical dementia. Cortical dementia is used to describe dementia which results from brain lesions at the cortical level, whereas subcortical dementia describes dementia resulting from subcortical brain lesions. ADlzheimers disease (AD) and Picks disease are the best known examples of cortical dementia; whereas HD, Parkinsons disease (PD),ntia; while Huntingtons disease (HD), Parkinsons disease (PD), and progressive supranuclear palsy (PSP)PSP are good examples of subcortical dementia (Mayke, 1994). Dementia with both cortical and subcortical features is also possible, in that case the term mixed dementia is used. Multi-infract dementiaID is a common example of mixed dementia. Historical developments in dementia Pre-Modern Developments The use of the term dementia dates back to Roman times. The Latin word dementia, derived from the Latin demens , did not originally have the specific connotation that it does today. It meant being out of ones mind and, as such, was a general term for insanity or insanitymadness (Pitt, 1987). It was the encylopedist Celsus who first used the word

Sunday, October 20, 2019

ILLUSTRATION ESSAY

ILLUSTRATION ESSAY Illustration is a form of displayed visual picture like a painting, drawing or a photograph. When writing an illustration essay, the major focus point is to create visualization through words. To make it simple, you have to illustrate something. As you are provided with a specific subject for your illustration essay, gather interesting details and patterns that will help you to show your object. Additional details will help to clarify the point. Use a diversity method, and present various patterns that will make a certain unconscious appeal to the readers. This action will help readers to deeply understand the topic.   Another successful step is the use of brief short patterns that show ideas straightforward. Explore illustration examples. Illustration essay thesis statement must observe the subject and create a major point where you as an author will present your ideas. Keep in mind that the examples that are used in the illustration essay create a specific communication to the main point which leads to the successful illustration essay writing as well as the good college or university grade. ILLUSTRATION ESSAY Today, students are required to be able to write different types of essay and research projects. With a number of various writing types requested by colleges and universities instructors, it is hard to keep track of what is needed. But for all essay types’ requirements there is a specific list of requirement that must be explored and learnt in order to deliver the quality writing. Illustration essay has its own list of requirements as well, but our major goal is help you focus on the major points of this type of writing. Illustration essay usually would require you to illustrate a scene, event, or action and try to give the full presentation. You should use rich linguistic expressions and try to target your reader to imagine clearly the picture that is being illustrated. There is no necessity to show the eventual events continuation, but you can do a sort of illustrated ‘slide show’ with the help of the writing. If you require the illustration essay, we are able to deliver the custom quality essay within shortest deadline for you. If you have further questions, talk to our 24/7 customer support representative in order to receive full answers.

Saturday, October 19, 2019

Bariatric Surgery & Type2 Diabetes Essay Example | Topics and Well Written Essays - 500 words

Bariatric Surgery & Type2 Diabetes - Essay Example The American Diabetes Association has reported that Bariatric Surgery should be considered for adults with Type 2 diabetes. Furthermore, Advocacy and Outreach report that observational studies show that weight loss surgeries can improve glycemic control and cause diabetes remission in obese patients suffering from type 2 diabetes (Taylor, 2013). Evaluation takes into account factors like implementation, assessment of needs, technology, mode of delivery, program fidelity and staff and personnel. In the case of bariatric surgery and type 2 diabetes, evaluation design will consider the factors like the availability of qualified doctors, risks associated with a surgery, obesity prevalence, and the circumstances that might lead to the establishment of surgery as the solution. The effectiveness of Bariatric surgery relies on a number of factors that should be carefully analyzed prior to surgery. The research will use evaluation design to determine the impact of Bariatric surgery on type 2 diabetes. Evaluation research is used to determine if a social intervention has achieved the desired results. The research proposals seek to determine the effect of Bariatric surgery on type 2 diabetes reversal. Evaluation research can be defined as, the systematic process of collecting and analyzing data about the quality, effectiveness, merit, or value of program, products or practices" (Gay, Mills, & Airasian, 2012, pg17 ). The aim of research is to answer the question, â€Å"What is the impact of Bariatric Surgery in Type 2 Diabetes reversal?† Evaluation research is suitable because it will also unbiased analysis of data and effectiveness of Bariatric surgery in type diabetes reversal. It will permit a thorough analysis of all relevant data and history to determine the effectiveness of Bariatric surgery. Data will be collected from observation, past

Friday, October 18, 2019

Employability Portfolio Coursework Example | Topics and Well Written Essays - 1500 words

Employability Portfolio - Coursework Example For example, I did some marketing activities as a source of extra income to bear my educational expenses and also, to gather some experiences of real life. Additionally, I have engaged myself into some sort of voluntary organization, for example, blood donating organization, schooling for underprivileged slum children, etc, which enriched my managing capacity and practical knowledge. I think, I will be able to relate the both side- internship requirements and my personal attainment. The crucial thing is that I am yet to complete my academic accomplishment and have to go through practical field. For that reason, I need to be coped with applicability of academic theories and knowledge. So, it just a matter of time and practical tasks I will go about. In that way I will be able to fill the gap and will be succeeded to integrate the both. In terms of my academic qualification, I completed my graduation from university of Dhaka around business management. In addition, I am engaged with some organizations as voluntary activists. In this way, I am contended with management of organization. I also did some marketing activities beside my study as an extra source of income to support personal and educational expenses. I intend to relate my marketing experience with practical marketing fields. So, I think, I am best fitted to your required internship personnel. I have just provided my study and work qualification briefly for your sincere consideration. How can I explain else within the certain limitation? Please, feel free to contact me via my e-mail or phone to discuss elaborately. Business and marketing always go hand in hand in today’s commercial world where both are inevitable for the development of any region, country, as well as the whole world. For its unavoidable impact on modern society, it is wiser to be engaged with these, and also be coped with its every minute updates and analysis. Putting a sharp observation to these, I chose to come

Into Thin Air Essay Example | Topics and Well Written Essays - 750 words

Into Thin Air - Essay Example From this standpoint, Mount Everest as conquered by him belongs to him exclusively, and each step of the conquest is his special property. I give full marks to him for his creditability as a reporter, writer and a journalist. He is all these three molded into one. For producing such a book he has done lots of research, which is the hallmark of a good reporter and journalist, and he writes well and evokes intense curiosity with the reader about his adventurous journey. Those who know about Mount Everest expeditions also know that descent is more difficult than the ascent. On May 10, 1996 Krakauer was on the top of the world having reached the summit at 29,028 ft. He was the conqueror. He could not celebrate his pride and satisfaction for long; he was not at the cricket ground at Lords or in the Disneyland. He was on the edgy summit, where each moment’s delay in the ascent invited perils. The well-studied Krakauer was fully aware of the situation. Reaching the top is a great emo tional experience. For Krakauer, it was the realization of a childhood dream. Each step or each breath at such a height is life or death situation, which has zero tolerance for mistakes. If you are the leader and the decision-making authority of the expedition, you owe responsibility to the lives of the members involved in the adventure, apart from your own precious life. As Krakauer began the descent, a severe storm was forming and he had not slept for the last fifty-two hours. He felt so weak; he rested after each step to recoup the energy. He had missed the turnaround time for the descent, as the ambition to conquer the summit was too strong with him and with other members of the expedition. This is a good adventure book and a true story. The details of the expeditions, the trials and tribulations have been given in detail and are helpful for a research student, as well for an aspiring mountaineer. The detailed background information is immensely useful, as it introduces the char acters of the expedition, like the importance of the experienced guides to the inexperienced but ambitious climbers. Mountaineering expeditions have strange combinations. Certainly Krakauer’s expedition was one of them. Summit of Mount Everest is a terrible attraction. So far so good, if all goes well. But when tragedies strike expeditions and valuable lives are lost, the decision makers are questioned. Serious doubts arise in the minds of the family members why the dying man was not saved. The leader of the team is grilled and asked inconvenient questions. In all fairness, no leader would want any member of his team be buried in the snow. As stated above, when more than one individual write their experiences and books are published, there are bound to be differences of opinions and controversies. Anatoli Boukreev’s version of the expedition, especially relating to saving members of the expedition, varies with that of Krakauer. Krakauaer may be less daring and might no t have exhibited the same courage in taking the risk to save the life of fellow-mountaineers. But no one can pass summary judgment that Krakauer did not live up to the situation. Remember, each step at that perilous weather at such a height, is a step between life and death. He has his own limitations as a mountaineer and has to take into account his own

Thursday, October 17, 2019

Astronomy Essay Example | Topics and Well Written Essays - 750 words

Astronomy - Essay Example 4). Explain how type I and Type II. Supernovae occur. 1). The four main grouping of stars as depicted by the Hertzprung- Russel diagram are dwarf (white and red) stars, main sequence grouping stars, giant stars and supergiant stars (p. 142). The white dwarf stars are Sirius B, Wolf 486, Van Maanen's star, Procyon B, Wolf 1346 and 40 Eridani B. The size characteristic of these stars is ranging from 0.008 R to 0.03 R. The stars in the white dwarf category have temperatures ranging from 5,000 K to 25, 000 K. In between the white dwarf stars and the main sequence grouping we have Bernard's star. Bernard's star is a red dwarf. It has a radius of about 0.1 R and 150 L/L. Bernard's star is also the coolest star with temperatures of 2900 K. The white and red dwarf stars have Mv > 15. The main sequence stars are Aldebaran B, Alpha Centauri B, the Sun, Altair, Sirius, Procyon A, Vega, Rigel B, Pollux, Spica B, Spica A, Adara and Capella B. The luminosity class of these stars is V. The size of these stars vary from 1R to 10R. The stars in the main sequence grouping vary from 7,000 L/L to 85,000 L/L. The main sequence grouping stars have temperatures ranging from 3700 K for Aldebaran B to 30,000 K for Adara. The main sequence stars have between 5- 10 Mv. The next sequence of stars are the giants. Included in the giant classification of stars are Capella A, Aldebaran A, Arcturus, Mira and Canopus. The giant classification of stars have radii which vary from 10 R to 100 R. The luminosity class of the giant stars are III. The giant stars have a Mv between 0- 5. The next sequence is the supergiant sequence of stars. This includes Polaris, Deneb, Rigel A and Alnilam. The supergiants temperatures range from 10,000 K to 30,000K. The luminosity class is Ib. The largest stars are Betegeuse and Antares,.Betelgeuse has a size of 1000 R. Antares has a size of about 2000 R. The Mv for these stars is – 5 (p. 143). 2). A star is born from the thin gases of space. When a star is bo rn, there is normally a large cloud of gas and dust. The thin gases of space are known as the interstellar medium ( p. 162). When enough hydrogen is compressed through the gravity of these stars, hydrogen fusion is achieved. In the center core of these stars there is a helium core. A teaspoon of mass of helium from the center of a star would weigh more than a ton. When enough helium is compressed in the center of the star, there is an abrupt explosion of intense magnitude called a helium flash. For this particular moment in time, the center of the newly born star produces more energy per second than an entire grouping of stars. This helium flash causes the center of the star to increase in temperature, whereas a great number of electrons become excited by the reaction. This causes the hydrogen to fuse into helium. At that point, the star is born with a self sustaining hydrogen fusion reaction at its shell. Often there is a helium fusion reaction at the center of the star. The size o f the star is of the utmost importance, stars less than 0.40 solar masses never get enough energy to continue the helium fusion reaction process. Stars which are greater than 3 solar masses experience degeneration at their core before this phenomenon occurs (p. 187). In the star there are two types of fusion reactions, helium fusion at the center and hydrogen fusion at the shell. 3). A star begins to die when the helium fusion which occurs at its center begins to produce carbon, oxygen and neon. As the fusion

Big Data, Big Data Analytics, Data Mining and their applications in Essay

Big Data, Big Data Analytics, Data Mining and their applications in Industrial Engineering - Essay Example The usage of predictive analytics in big data situation can help power plants forecast production size and also gain insight on prevailing challenges within the plant. Energy companies that are capable of managing and analysing high volume data by using advanced softwares like IBM information systems or any other suitable statistical software, can always transform their data into useful and profitable strategies. For instance, developing efficient demand response strategies requires that utilities apply innovative analytics across a mix of data about clients, consumption rate, generation capacity, physical grid unique behaviour, weather, and energy commodities market. A Company’s decision backed by data are always more forward and acceptable as compared to using prevailing perceived information about the energy market. As mentioned before, power plants are welcoming the usage of smart grids and meters as a long term strategy that enables efficient energy supply. Energy companies can therefore create better power storage solutions, include uniform power generation points and in the process eliminate the need for new power plants. Essentially, this will enable power consumers to have more control over the amount of power/electricity they use. A higher number of meter reads per day of power usage by consumers basically generate an overwhelming amount of data. This amount of data presents a great opportunity for power plants to study their consumers’ behaviours and also understand how market segmentation of customers can help industries know the amount of power output to achieve. For example, if you are an electricity producer, time of use pricing usually makes cost-savvy retail consumers to run dryers, dishwashers and washing machines at off-peak periods. Evidently, these segment of consumers do not only save cash but they also need less generation capacity from their electricity providers.

Wednesday, October 16, 2019

Definition of autism Essay Example | Topics and Well Written Essays - 1500 words

Definition of autism - Essay Example et al., 2004). Clinicians and researchers have achieved consensus on the validity of autism as a diagnostic category and many features central to its definition. It is somewhat surprising and very encouraging to note that, as greater consensus has been achieved on the definition of strictly defined autism, an interesting and helpful discussion on issues of broader phenotype or potential variants of autism has begun. Today, there is a broad agreement that autism is a developmental disorder, and autism and associated disorders in the spectrum represent the behavioural manifestations of underlying dysfunction in the functioning of the central nervous system (Minshew, N.J. and Williams, D.L., 2007). Within this, it can also be included that sustained educational and behavioural interventions are useful and constitute the core treatment of such condition (Klin, A., Jones, W., Schultz, R., Volkmar, F., and Cohen, D., 2002). In 1943, Kanner's seminal clinical description of 11 children with "autistic disturbances of affective contact" has endured till date. His description of autism was grounded in data and theory of child development. Children those are normal exhibit marked interest in social interaction from early in life (Kanner, L., 1946). Kanner suggested that early infantile autism is an inborn, constitutional disorder in which children are born lacking the typical motivation for social interac tion and affective comments. He used the model of inborn errors of metabolism to explain that individuals with autism are born without the biological preconditions for psychologically metabolizing the social world. The term autism was borrowed from Bleuler who first used autism to describe idiosyncratic, self-centered thinking (Bleuler, M., 1979). Kanner used this term to suggest that autistic children too live in their own world. It represents a failure of development and fantasy is impoverished if present at all (Kanner, L., 1951). In addition to the remarkable social failure, the one of the other features that may be present in such individuals is profound disturbance of communication to the extent that some of them may be mute (Nacewicz, B.M. et al., 2006). The language disturbance in others may be marked by echolalia and literalness as well as a fascinating difficulty with acquiring the use of the first person, personal pronoun, "I." These children, therefore, refer to themselves in the third person, "he" or by first name. Another intriguing feature is the children's unusual responses to intimate environment. This can be exemplified by unresponsiveness to parents, yet over-sensitiveness to the small changes in daily routine or simply environmental sounds. The three prime criteria enumerated by Kanner still hold good, and they are to date used to define autism. These are unusual social isolation, resistance to change, and dysfunction in communication (Landa, R.J., Holman, K.C., and Garrett-Mayer, E., 2007). It has now been recognised that parental behaviour as such plays no role in pathogenesis of autism. It is now known that children with autism are found in families of all social classes, and more recent data and rigorous research have failed to demonstrate association with social classes (Stone, W.L., McMahon,

Big Data, Big Data Analytics, Data Mining and their applications in Essay

Big Data, Big Data Analytics, Data Mining and their applications in Industrial Engineering - Essay Example The usage of predictive analytics in big data situation can help power plants forecast production size and also gain insight on prevailing challenges within the plant. Energy companies that are capable of managing and analysing high volume data by using advanced softwares like IBM information systems or any other suitable statistical software, can always transform their data into useful and profitable strategies. For instance, developing efficient demand response strategies requires that utilities apply innovative analytics across a mix of data about clients, consumption rate, generation capacity, physical grid unique behaviour, weather, and energy commodities market. A Company’s decision backed by data are always more forward and acceptable as compared to using prevailing perceived information about the energy market. As mentioned before, power plants are welcoming the usage of smart grids and meters as a long term strategy that enables efficient energy supply. Energy companies can therefore create better power storage solutions, include uniform power generation points and in the process eliminate the need for new power plants. Essentially, this will enable power consumers to have more control over the amount of power/electricity they use. A higher number of meter reads per day of power usage by consumers basically generate an overwhelming amount of data. This amount of data presents a great opportunity for power plants to study their consumers’ behaviours and also understand how market segmentation of customers can help industries know the amount of power output to achieve. For example, if you are an electricity producer, time of use pricing usually makes cost-savvy retail consumers to run dryers, dishwashers and washing machines at off-peak periods. Evidently, these segment of consumers do not only save cash but they also need less generation capacity from their electricity providers.

Tuesday, October 15, 2019

Original formulation of attachment Essay Example for Free

Original formulation of attachment Essay The attachment theory was produced by John Bowlby and colleagues in the 1950s. Influenced by the work of Freud and Harlow, amongst others, Bowlby drew on ethological concepts to develop his theory. Early on in an infants life they build a close contact with a significant object. From these early relationships with their attachment objects infants create what Bowlby called internal working models (IWM) (Oates et al. 2005). The Robertsons (1989) brought to light the distress infants experience when they are separated from their attachment figure, this lead Bowlbys instigation to incorporate separation anxiety into his theory.   Mary Ainsworths (1954, 1978) work on maternal deprivation enabled Bowlbys ideas to be empirically tested through designing the Strange Situation and attachment classification (Oates et al. 2005). Bowlbys theory envisaged attachment classifications to continue through generations (Oates et al. 2005). Main et al. (1994) devised an equivalent classification for adults that were assessed through the Adult Attachment Interview, (AAI). Having a stable and long term relationship with carers was a feature that Bowlby thought was important in order to develop good IWM; Hamilton (1994) subsequent research explores this idea.  Bowlby integrated the work of Winnicott on good enough mothering that was later explored by researchers such as Vondra et al. (1995).  The predictive value of the Strange Situation on later attachments was challenged by Lamb et al. (1985).  Baumrinds model of parenting style extended Bowlbys work on IWM and the cultural context in which the theory was originally formulated looked into. The quality of having a reciprocal relationship is an important factor in attachment. The attachment theory has enabled research to branch off into investigating some of the reasons linked with attachment that may cause disturbed behaviour.  Ainsworth was the first to contribute and solidify Bowlbys theory of attachment with respects to having a secure base as a means of exploring the world.  Building on the observations of the Robertsons (1989) and on the pioneering work done by Harlow (1958), Ainsworth set out to study maternal deprivation. During her research in Africa in 1954 she developed Bowlbys work on separation anxiety by observing the behaviour of children, not when they were separated with their attachment figure but reunited as the difference in behaviour was more apparent (Oates et al. 2005).  For the duration of her research in Baltimore, Ainsworth used Bowlbys theory on IWM to expand the theory of attachment. Four different types of attachment emerged as a result of maternal sensitivity; secure (Type B), insecure-resistant or ambivalent (Type C), insecure-avoidant (Type A) (Ainsworth 1978) and disoriented and/or disorganised (Type D) (Main and Solomon 1990). She entwined attachment types to IWM to develop the attachment theory and successfully solidified their work through the Strange Situation, a gold standard procedure now commonly used as a method of studying infant attachment (Oates et al. 2005).  Through this procedure Ainsworth was able to relate attachment classification to different IWM.  The Strange Situation gave justice to Bowlbys theory on how a child builds up a working model of how attachment figures are likely to behave toward him in a variety of situations and on those models are based all his expectations (Bowlby, 1973, p.369). A further incentive to develop the study of internal working models was Mains (1994) attempt to translate Ainsworths infant-mother attachment classifications to equivalent adult classification.  Bowlbys original formulation suggests consistency across generations in attachment style (Oates et al. 2005). Main developed the Adult Attachment Interview (AAI) to asses an adults ability to integrate early memories of their relationships with their parents into overarching working models of relationship (Oates et al. 2005, p.38). From the AAI adults were classified into three categories; Dismissing; autonomous and preoccupied. These three types of adult classification can then be associated with infant attachment types. Dismissing adults would be related to insecure avoidant (Type A) infant attachment, infants securely attached (Type B) would develop into autonomous adults and adults who were classified as preoccupied would have had an insecure attachment type as infants (Focus Collection 3. 2005). Mains work took Bowlbys work up a generation to follow through his work on IWM. Making use of Ainsworth empirical methods that tested Bowlbys ideas, the Strange Situation type classification proved to be a partially good predictor of adult attachment types (Oates et al. 2005). Hamilton (1994) found this to be true in cases where the childs circumstances had remained stable. Cases where life events such as divorce or parental illness had occurred could be held accountable for the change in attachment type (Hamilton, 1994). Bowlby believed in the notion of good enough mothering (Oates et al. 2005). Influenced by the work of Winnicott an aspect of the Bowlbys theory is for the attachment figure should allow just the right amount of delay in meeting the infants needs to encourage both tolerance of waiting and confidence in ultimate satisfaction (Oates et al. 2005, p.25). The parental behaviour towards an infant is thus very much a central cause for the childs attachment type that he or she develops from their IWM. Subsequent research has investigated the influences on attachment. Vondra et al. carried out a study in 1995 that showed consistent parental behaviours could be used as a reasonable predictor of their children classification type. Caregivers that were sensitive tended to have securely attached infants (Type B), infants classified as avoidant (Type A) were probable to have controlling mothers and ambivalent infants (Type C) were likely to have unresponsive mothers (Oates et al. 2005).

Monday, October 14, 2019

Developing a Brain Computer Interface

Developing a Brain Computer Interface A Seminar Report On â€Å"Brain Computer Interface† Submitted by: Name: Sachin Kumar Roll No: 1214310301 ABSTRACT Brain Computer Interface allows users to communicate with each others by using only brain activities without using any peripheral nerves and muscles of human body. On BCI research the Electroencephalogram (EEG) is used for recording the electrical activity along the scalp. EEG is used to measure the voltage fluctuations resulting from ionic current flows within the neurons of the brain. Hans Berger a German neuroscientist, in 1924 discovered the electrical activity of human brain by using EEG. Hans Berger was the first one who recorded an Alpha Wave from a human brain. In 1970, Defense Advanced Research Projects Agency of USA initiated the program to explore brain communication using EEG. The papers published after this research also mark the first appearance of the expression brain–computer interface in scientific literature. The field of BCI research and development has since focused primarily on neuroprosthetics applications that aim at restoring damaged hearing, sight and movement. Nowadays BCI research is going on in a full swing using non-invasive neural imaginary technique mostly the EEG. The future research on BCI will be dependent mostly in nanotechnology. Research on BCI is radically increased over the last decade. From the last decade the maximum information transfer rates of BCI was 5-25 bits/min but at present BCI’s maximum data transfer rate is 84.7bits/min. 2.INTRODUCTION Brain-computer interface (BCI) is alliance between a brain and a device that enables signals from the brain to direct some external activities, such as control of a cursoror a prosthetic limb. The Brain computing interface enables a direct communications pathway between the brain and the object to be controlled. For example, the signal is transmitted directly from the brain to the mechanism directing the cursor moves, rather than taking the normal ways through the bodys neuromuscular system from the brain to the finger on a mouse then directing the curser. BCIs Research began in the 1970s at the University of California Los Angeles(UCLA) under an allowance from the   National Science Foundation, followed by a contract fromDARPA. Thanks to the remarkable cortical plasticity of the brain, signals from implanted prostheses can, after adaptation, be handled by the brain like natural sensor or effector channels. Animal experimentation for years, the first neuroprosthetic devices implanted in humans appeared in the mid-1990s. Current brain computing interface devices require calculated conscious thought; some future applications, such as prosthetic control, are likely to work without difficulty. Development of electrode devices and/or surgical methods that are minimally invasive is one of the biggest challenges in developing BCI technology . Though Brain Computer Interface (BCI) facilitates direct communication between brain and computer or another device so nowadays it is widely used to enhance the possibility of communication for people with severe neuromuscular disorders, spinal cord injury. Except the medical applications BCI is also used for multimedia applications, which becomes possible by decoding information directly from the user’s brain, as reflected in electroencephalographic (EEG)signals which are recorded non-invasively from user’s scalp. 3.LITERATURE REVIEW Current Trends in Graz Brain–Computer Interface (BCI) Research Pfurtscheller, C. Neuper, C. Guger, W. Harkam, H. Ramoser, Schlà ¶gl, B. Obermaier, and M. Pregenzer The â€Å"Graz Brain–Computer Interface† (BCI) project is aimed at developing a technical system that can support communication possibilities for patients with severe neuromuscular disabilities, who are in particular need of gaining reliable control via non-muscular devices. This BCI system uses oscillatory electroencephalogram (EEG) signals, recorded during specific mental activity, as input and provides a control option by its output. The obtained output signals are presently evaluated for different purposes, such as cursor control, selection of letters or words, or control of prosthesis. Between 1991 and 2000, the Graz BCI project moved through various stages of prototypes. In the first years, mainly EEG patterns during willful limb movement were used for classification of single EEG trials. In these experiments, a cursor was moved e.g. to the left, right or downwards, depending on planning of left hand, right hand or foot movement. Extensive off-line analyses have shown that classification accuracy improved, when the input features, such as electrode positions and frequency bands, were optimized in each subject. Apart from studies in healthy volunteers, BCI experiments were also performed in patients, e.g., with an amputated upper limb. The main parts of any BCI system are: Signal acquisition system: involves the electrodes, which pick up the electrical activity of the brain and the amplifier and analog filters. The feature extractor: converts the brain signals into relevant feature components. At first, the EEG raw signals are filtered by a digital band pass filter. Then, the amplitude samples are squared to obtain the power samples. The power samples are averaged for all trials. Finally, the signal is smoothed by averaging over time samples. The feature translator: classifies the feature components into logical controls. The control interface: converts the logical controls into semantic controls. The device controller: changes the semantic controls to physical device commands, which differ from one device to another depending on the application. Finally, the device commands are executed by the device. The early work of BCI was done by  invasive  methods with electrodes inserted into the brain tissue to read the signals of a single neuron. Although the spatio-temporal resolution was high and the results were highly accurate, there were complications in the long term. These were mostly attributable to the scar tissue formation, which leads to a gradual weakening of the signal and even complete signal loss within months because of the brain tissue reaction towards the foreign objects. A proof of concept experiment was done by Nicolelis and Chapin on monkeys to control a robotic arm in real time using the invasive method. Recently, less invasive methods have been used by applying an array of electrodes in the subdural space over the cortex to record the Electrocorticogram (ECoG) signals. It has been found that ordinary Electroencephalogram pickup signals are averaged over several EEG signal bands (Hz) square inches, whereas ECoG electrodes can measure the electrical activity of brain cells over a much smaller area, thereby providing much higher spatial resolution and a higher signal to noise ratio because of the thinner barrier tissue between the electrodes and the brain cells. The superior ability to record the gamma band signals of the brain tissue is another important advantage of this type of BCI system. Gamma rhythms (30-200 Hz) are produced by cells with higher oscillations, which are not easy to record by ordinary EEGs. The human skull is a thick filter, which blurs the EEG signals, especially the higher frequency bands (i.e. gamma band). Noninvasive  techniques were demonstrated mostly by electroencephalographs (EEG). Others used functional Hz, Magneto-Resonance Imaging (fMRI), Positron Electron Tomography (PET), Magneto encephalography (MEG) and Single Photon Emission Computed Tomography There (SPECT). EEGs have the advantage of higher temporal resolution, reaching a few milliseconds and are relatively low cost. Recent EEG systems have better spatiotemporal resolution of up to 256 electrodes over the total area of the scalp. Nevertheless, it cannot record from the deep parts of the brain. This is the main reason why the multimillion dollar fMRI systems are still the preferred method for the functional study of the brain. However, EEG systems are still the best candidate for BCI systems spatial as they are easy to use, portable and cheap. The main problems that reduce the reliability and accuracy of BCI and which prevent this technology from being clinically useful, are the sensory interfacing problems and the translation algorithm problems. In order to make a clinically useful BCI the accuracy of the detection of intention needs to be very high and certainly much higher than the currently achieved accuracy with different types of BCI. The intermediate compromise between accuracy and safety is the ECoG based BCI, which has shown considerable promise. The sensory arrays of electrodes are less invasive and provide comparable accuracy and high spatial resolution compared to the implanted type. The ECoG based BCI needs much less training than the EEG based BCI and researchers have shown that highly accurate and fast response. 4.TECHNICAL DETAILS REASON BEHIND WORKING: The reason a BCI works at all is because of the way our brains function. Our brains are filled with  neurons, individual nerve cells connected to one another by dendrites and axons. Every time we think, move, feel or remember something, our neurons are at work. That work is carried out by small electric signals that zip from neuron to neuron as fast as 250 mph. The signals are generated by differences in electric potential carried by ions on the membrane of each neuron. Although the paths the signals take are insulated by something called myelin, some of the electric signal escapes. Scientists can detect those signals, interpret what they mean and use them to direct a device of some kind. It can also work the other way around. For example, researchers could figure out what signals are sent to the brain by the optic nerve when someone sees the color red. They could rig a camera that would send those exact signals into someones brain whenever the camera saw red, allowing a blind person to see without eyes. BCI INPUT AND OUTPUT: One of the biggest challenges facing brain-computer interface researchers today is the basic mechanics of the interface itself. The easiest and least invasive method is a set of electrodes a device known as an  electroencephalograph(EEG) attached to the scalp. The electrodes can read brain signals. However, the skull blocks a lot of the electrical signal, and it distorts what does get through. To get a higher-resolution signal, scientists can implant electrodes directly into the gray matter of the brain itself, or on the surface of the brain, beneath the skull. This allows for much more direct reception of electric signals and allows electrode placement in the specific area of the brain where the appropriate signals are generated. This approach has many problems, however. It requires invasive surgery to implant the electrodes, and devices left in the brain long-term tend to cause the formation of scar tissue in the gray matter. This scar tissue ultimately blocks signals. Regardless of the location of the electrodes, the basic mechanism is the same: The electrodes measure minute differences in the voltage between neurons. The signal is then amplified and filtered. In current BCI systems, it is then interpreted by a computer program, although you might be familiar with older analogue encephalographs, which displayed the signals via pens that automatically wrote out the patterns on a continuous sheet of paper. In the case of a sensory input BCI, the function happens in reverse. A computer converts a signal, such as one from a video camera, into the voltages necessary to trigger neurons. The signals are sent to an implant in the proper area of the brain, and if everything works correctly, the neurons fire and the subject receive a visual image corresponding to what the camera sees. SENSORY INPUT: The most common and oldest way to use a BCI is a cochlear implant. For the average person, sound waves enter the ear and pass through several tiny organs that eventually pass the vibrations on to the auditory nerves in the form of electric signals. If the mechanism of the ear is severely damaged, that person will be unable to hear anything. However, the auditory nerves may be functioning perfectly well. They just arent receiving any signals. A cochlear implant bypasses the non functioning part of the ear, processes the sound waves into electric signals and passes them via electrodes right to the auditory nerves. The result: A previously deaf person can now hear. He might not hear perfectly, but it allows him to understand conversations. The processing of visual information by the brain is much more complex than that of audio information, so artificial eye development isnt as advanced. Still, the principle is the same. Electrodes are implanted in or near the visual cortex, the area of the brain that processes visual information from the retinas. A pair of glasses holding small cameras is connected to a computer and, in turn, to the implants. After a training period similar to the one used for remote thought-controlled movement, the subject can see. Again, the vision isnt perfect, but refinements in technology have improved it tremendously since it was first attempted in the 1970s. Jens Naumann was the recipient of a second-generation implant. He was completely blind, but now he can navigate New York Citys subways by himself and even drive a car around a parking lot. In terms of science fiction becoming reality, this process gets very close. The terminals that connect the camera glasses to the electrodes in Naumanns b rain are similar to those used to connect the VISOR (Visual Instrument and Sensory Organ) worn by blind engineering officer Geordi La Forge in the Star Trek: The Next Generation TVshow and films, and theyre both essentially the same technology. However, Naumann isnt able to see invisible portions of the electromagnetic spectrum. Applications: Applications of BCI are described as follows: Neurogaming: Currently, there is a new field of gaming called Neurogaming, which uses non-invasive BCI in order to improve gameplay so that users can interact with a console without the use of a traditional controller. Some Neurogaming software use a players brain waves, heart rate, expressions, pupil dilation, and even emotions to complete tasks or effect the mood of the game. For example, game developers at Emotiv have created non-invasive BCI that will determine the mood of a player and adjust music or scenery accordingly. This gaming experience will introduce a real-time experience in gaming and will introduce the ability to control a video game by thought. Prosthesis control: Non-invasive BCIs have also been applied to enable brain-control of prosthetic upper and lower extremity devices in people with paralysis. For example, Gert Pfurtscheller of Graz University of Technology and colleagues demonstrated a BCI-controlled functional electrical stimulation system to restore upper extremity movements in a person with tetraplegia due to spinal cord injury. Between 2012 and 2013, researchers at the University of California, Irvine demonstrated for the first time that it is possible to use BCI technology to restore brain-controlled walking after spinal cord injury. Synthetic telepathy/silent communication: In a $6.3 million Army initiative to invent devices for telepathic communication, Gerwin Schalk, underwritten in a $2.2 million grant, found that it is possible to use ECoG signals to discriminate the vowels and consonants embedded in spoken and in imagined words. The results shed light on the distinct mechanisms associated with production of vowels and consonants, and could provide the basis for brain-based communication using imagined speech. On February 27, 2013Duke University researchers successfully connected the brains of two rats with electronic interfaces that allowed them to directly share information, in the first-ever direct brain-to-brain interface. MEG and MRI: Magnetoencephalography (MEG) and functional magnetic resonance imaging (fMRI) have both been used successfully as non-invasive BCIs. In a widely reported experiment, fMRI allowed two users being scanned to play Pongin real-time by altering their haemodynamic response or brain blood flow through biofeedback techniques. fMRI measurements of haemodynamic responses in real time have also been used to control robot arms with a seven second delay between thought and movement. Neural Internet: Access to the internet opens a myriad of opportunities for those with severe disabilities, including shopping, entertainment, education, and possibly even employment. Neural control users cannot control a cursor with a great degree of precision, so, therefore, the challenge of adapting a web browser for neural control is in making links—which are spatially organized—accessible. The University of Tuebingen developed a web browser controller to be used with their thought translation device, but it requires the user to select from an alphabetized list of links, causing problems if the link names are identical. They have developed a neurally controlled web browser that serializes the spatial internet interface and allows logical control of a web application. BrainTrainer—Subject Training: The BrainTrainer project researches the most effective ways of teaching a person the brain-signal control needed to interact with a device. The BrainTrainer toolset allows researchers to compose trials by providing simple tasks, such as targeting, navigation, selection, and timing, that can be combined to produce an appropriate-level task for a particular subject.