Friday, November 29, 2019

Public Policy Essay Example

Public Policy Essay Final Paper Brittany Baity PPA603: Government Budgeting (MBQ 1118A) Instructor:   Chiji Ohayia June 06, 2011 Public policy is the study of policy making by governments. A governments public policy is the set of policies (laws, plans, actions, behaviors) that it chooses. (Lee, Johnson, Joyce, 2008) Since governments claim authority and responsibility (to varying degrees) over a large group of individuals, they see fit to establish plans and methods of action that will govern that society. I will discuss the possible funding options for reducing Georgia’s sex offender rate, evaluate how public policy decisions affect the receipt of revenues, and develop a revenue policy that aligns with community values. It is a parent’s nightmare: a son or daughter is abducted, sexually assaulted and murdered by a predator that had been lurking, undetected, in their community. In 2006, President George W. Bush signed the Adam Walsh Child Protection and Safety Act, which mandated the maintenance of a national registry of sex offenders, greatly expanded the legal definition of sex offenses and sex offenders, and established Project Safe Childhood program within the U. S. Department of Justice, Project Safe Childhood includes grants to states to help combat Internet predators as well as to help fund civil commitments, and aims to coordinate federal, state and local efforts to vigorously investigate and prosecute crimes against children, including sexual assault, child pornography, and kidnapping. Brown, 2009) Since the mid 1990’s, sex offenders policy in Georgia has become increasingly more punitive and restrictive. (Williams, 2011) Anyone convicted of a sex crime is required to register as a sex offender. This person will have his or her personal details and crimes committed listed on Web-based notification sites for the remainder of his or her life, and will have restrictions on where he or she can live and will be recommended to a treatment center following release from prison. The core assumption that most children are sexually assaulted by strangers who are repeat offenders has not been supported by research. We will write a custom essay sample on Public Policy specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Public Policy specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Public Policy specifically for you FOR ONLY $16.38 $13.9/page Hire Writer A statistical report published by the Georgia Department of Justice in 2000 revealed that only seven percent of offenders who sexually assaulted juveniles aged 0 to 17 were strangers to their victims; the vast majority of juveniles were assaulted by an acquaintance e. g. family friend, babysitter, neighbor, teacher, coach, or religious leader. This report also included that sexual assault of children ages twelve and under has been characterized by subjective assessments or typical high profile crimes for too long. Brown, 2009) Those who argue that current policies are based on inaccurate assumptions about the perpetrators or sexual assaults against children are often quickly silenced by those who point to the horrific crimes committed by a few sadistic repeat offenders. Many experts agree that current sex offender policies—including registration, community notification, mandatory sentencing, civil commitment, and GPS tracking aimed at convicted sex offenders—do nothing to protect children from the individuals who are most likely to sexually assault them. Studies show that there are more than 500,000 registered sex offenders in the United States, and there are an estimated 100,000 sex offenders who are missing from the system. (Brown, 2009) Loopholes in this current system have allowed some sexual predators to evade law enforcement and place our children at risk. Some may wonder why there is such a focus on sex offenders. Why is there such a focus on pedophiles and sex offenders and rapists? The reason is, if Georgian’s look at the statistics it has the highest recidivist offender rate of any crime, even higher than murderers and armed robbery. As a society, people must share revulsion for what these criminals do to our children. The crimes are so terrible, that people are uncomfortable talking about them, but if people are to make real progress such as organizing community meetings, law enforcement become more aggressive and also create more victim groups. The Government created a Project Safe Childhood which is a program to protect children from rapist and sex offenders. The Project Safe Childhood will make a ground for a national zero-tolerance culture. The Project Safe Childhood program is a strong three-legged stool: one leg is the federal contributions led by the United States Attorneys around the country, another is state and local law enforcement, including the Internet Crimes Against Children task forces funded by the Department’s Office of Justice Programs and the third is non-governmental organizations, like the Financial Coalition Against Child Pornography and the National Center for Missing and Exploited Children. [NCMEC] (Geffner, 2008) Under the Project Safe Childhood structure, state, local and federal partners are seeking the toughest sentences possible. The Government has made half a million dollars available for the Project Safe Childhood program. This program intends to bring state and local law enforcem ent together with federal prosecutors from their regions. Cooperative law-enforcement work on the registry has already led to some great stories of success. The first case brought under the Adam Walsh Child Protection and Safety Act involved a fugitive who was arrested by the Social Security Administration for allegedly using a false name and another man’s Social Security number as he tried to set up a new identity for himself. It turns out that this individual was convicted for assaulting a police officer and possession of sexually exploitive material in Idaho in 2003 and he was wanted on a probation violation in another state for failing to register as a sex offender. He had done so at his first address, but did not re-register when he moved and then fled the state. Deputy U. S. Marshals working with the Social Security Administration and the local U. S. Attorney’s office built a case against the man and he was charged via criminal complaint for failing to register as a sex offender. The charges were brought in October 2006, making this the first case charged under the new act. (Geffner, 2008) The importance of the civil rights movement, Martin Luther King said that â€Å"History will have to record that the greatest tragedy of this period of social transition was not the strident clamor of the bad people, but the appalling silence of the good people. † (Schuster, 2010)As a community we must seed our communities with our knowledge and our passion. Remember that this communication starts with each other, the Project Safe Childhood partners. U. S. Attorney’s offices need to be calling their state and local partners constantly. When working together several of these problems will begin to cease. Politicians, child advocates, and journalists denounce current sex offender laws as ineffective and flawed, yet are rarely able to articulate exactly why new laws are needed. Instead, they cite each news story about a kidnapped child or web predator as proof that more laws are needed, as if sex crimes would cease if only the penalties were harsher, or enough people were monitored. The fact that rare crimes continue to be committed does not necessarily imply that current laws against those crimes are inadequate. By that standard, any law is ineffective if someone violates that law. (Geffner, 2008) Nearly all of the sex offender policy issues currently debated including registration, community notification, residency restrictions, civil commitment, classification of juveniles as sex offenders, mandatory sentencing, the death penalty, and castration all involve achieving an effective balance of public safety, maintaining individual civil liberties, and a just and efficient allocation of resources. Those who participate in the public discourse on sex offender policy share a desire to protect children and reduce sexual assault but differ greatly in their opinions about the rights of offenders and their assessment of just and effective punishment and management of sex offenders. Many lawmakers and political pundits argue that sex offenders’ rights are forfeited when they commit crimes against children. They support their arguments by citing cases in which repeat offenders have assaulted and murdered children after they have been released from prison; for such offenders, these commentators argue, no punishment is too harsh and no price is too high. On the other side of the debate, civil libertarians and victims’ rights advocates, mental health professionals, defense attorneys, and members of the law enforcement community assert that there are too many restrictions place on too many offenders. Furthermore, opponents of stricter policies argue that such measures result in unfairly harsh penalties for individuals including juveniles, teens who engaged in consensual sex, and those arrested for public urination and indecent exposure. These individuals are labeled as sex offenders but pose no threat of violence to their communities. Public safety and federal, state, and local budgets would be better served, by targeting only those sex offenders who commit forcible sex crimes or demonstrate a tendency toward violence. A case which illustrates the complexities of the debate over whether current sex offender policies are just and effective is that of Genarlow Wilson, who was sentenced to 10 years in prison without possibility of parole in 2005 after he was videotaped having consensual oral sex with a 15-year-old girl at a 2003 New Years Eve party in Georgia. Oral sex between teens constituted aggravated child molestation and carried a mandatory sentence under a Georgia state law in effect in 2003. The Georgia law was changed in 2006, and now consensual oral sex between teens is a misdemeanor punishable by a maximum of one year behind bars with no requirement to register as a sex offender. (Williams, 2011) Mandy of the most thoughtful commentators on the prevention of sexual violence urge a public health approach to the problem of sexual violence. Sexual violence, like the classic infectious diseases, smallpox, measles, has widespread negative effects on our society. The public health approach, a systematic application of scientific learning aimed at understanding and addressing root causes, could help effectively reduce sexual violence in the same way that it has controlled many infectious diseases. The public health approach entails a systematic method of analysis, a way of seeing the problem in a larger, more contextualized framework. It divides interventions into three categories: primary, secondary, and tertiary. Primary prevention efforts focus on stopping sexually abusive behaviors before it starts. The public health approach is aimed at changing the conditions that produce the problem. Secondary programs focus on those at high risk for offending as well as stopping recent sexual offenders from re-offending. Tertiary prevention involves trying to stop future violence by those who have a history of offending behaviors. (Brown, 2009) The public health approach uses systematic and empirically based information for deciding how best to attack a public health problem like sexual violence. It consciously looks beyond individual characteristics or offenders to identify causes that exist at a societal of community level. These classic steps that enabled public health to conquer infectious disease aim to address violence comprehensively. The first step is ongoing systematic collection, analysis, and interpretation of data on the incidence, prevalence, and risk factors. The second step is identifying causes through research, and the third step is the development and evaluation of programs. Finally, the public health model engages in dissemination and implementation communicating which preventive programs work based on evaluation of data and putting these programs into practice. The public health approach helps us understand the difference between thinking about a problem like sexual violence at the scale of individuals and thinking about it from the perspective of the population as a whole. The public health approach allows us to see that there is collective risk as well as individual risk, and that the worst of the worst account for only a fraction of the collective risk posed by sexual violence. The public health approach, by insisting on empirically based policies for reducing exual violence. Unlike the conventional narrow and politicized approach that values only punishment, public health advocates understand the need for a comprehensive approach addressing all levels of prevention: primary, secondary, and tertiary. (Schuster, 2010) The predator laws exemplify an approach that is 180 degrees from these public health principles. The predator laws were not based on research. They make no pretense of attacking the root causes of sexual violence or changing the conditions that produce it. Rather, they take a simple containment approach to those who are already identified as dangerous offenders. Far from being comprehensive, they focus only on a small part of the problem, a part that is far removed from the root causes or the experiences of most victims of sexual violence. There has been little research about the effectiveness of the predator law approaches and little reason to believe that they have reduced the scope of sexual violence in any meaningful way. The public health approach allows people to see what a focus on identified individual offender’s hides: the value and necessity of primary prevention, because most sexual violence does not show up in the criminal justice system, most will remain unaddressed by secondary and tertiary interventions. Primary prevention is proactive, while the secondary and tertiary methods are reactive. Primary prevention aims at addressing sexual violence before it happens. Secondary and tertiary approaches become applicable only after an offender has begun abusing victims. Although primary prevention programs are in their infancy, and their effectiveness is as yet unproven, they have a number of attractions. They are relatively cheap and can reach large numbers of people. They aim to change root causes of sexual violence by addressing attitudes, beliefs, and behaviors and thus stop sexual violence before it begins. Secondary and tertiary approaches, in contrast, do not address new entrants into sexual offending, but confine their attention to those who have already offended. Another key advocate of public health approaches is Kathleen Basile, an official with the Centers for Disease Control and Prevention. Basile states that â€Å"more attention should be given to primary prevention of sexual violence if real gains are to be made in decreasing this problem. † Basile argues that â€Å"national campaigns against sexual violence in the media could affect rates of sexual offending by gradually influencing societal norms that condone sexual aggression. † She cites campaigns regarding the use of utomobile seat belts, â€Å"largely because the norms about wearing seat belts have changed through public awareness combined with changes in laws. † Smoking cessation campaigns provide another example of the larger society getting involved in preventing a widespread problem. She also stated that â€Å"the same societal urgency needs to be established around decreasing sexual violence perpetration by involving the public in large-scale sexual viol ence preventive efforts. † (Brown, 2009) Primary prevention programs are largely in the developmental stage. Restorative justice approaches seek to facilitate offender reintegration while emphasizing the importance of accountability and community safety. The restorative justice movement argues that restorative approaches produce greater prospects of safety, because they place offenders within a web of relationships that helps ensure accountability is on redressing harm to the victim. These programs operate at both the internal and external levels, providing â€Å"opportunities for hop and recovery† and a feeling of acceptance, along with the kinds of family and community connections that enable the community to exert its normal forms or control. The key is the ability for these programs to accommodate and promotes both â€Å"accountability and understanding. † The laws have failed so miserably, reform of statutes of limitations is needed for all victims, past and present. The solution needs no task force or further study. It is clear: statutes of limitations for sexual abuse of children need to be abolished. Murder has no statute of limitations because the victim can never speak for himself or herself. Child abuse is a little different. It involves a heinous crime, a powerless and vulnerable victim incapable of speaking for himself or herself and the murder of the victim’s very childhood and soul. On July 20, 2005 the U. S. Department of Justice launched the National Sex Offender Public Registry (NSOPR), a searchable Web site that links state and territory sex-offender public registries and allows users access to public information on sex offenders throughout the country. NSOPR, which currently links to 22 state registries, offers information on almost 200,000 registered sex offenders nationwide. America’s communities have long awaited a national site to search for sex offenders. NSOPR was built in partnership with federal, state, and private sector partners. (Brown, 2009) NSOPR allows states to maintain control over their own data. States are actively participating in this unprecedented public safety opportunity in large part because they retain control over their public sex-offender data, rather than submitting it to a costly or difficult-to-maintain national repository. By design, once a query has been entered, NSOPR simply delivers users to the state site hosting the information. NSOPR is cost-effective for both citizens and states. Unlike some Web sites that claim to offer national sex-offender information, NSOPR does not require users to submit extensive personal information or to pay a fee to access the information they seek. Equally important, states bear no cost to link to the site, which has cost the Department of Justice and its partners just under $1 million to design and deliver. From a technology standpoint, NSOPR bandwidth, as well load capacity, will be added to enlarge the tunnel through which queries travel, allowing searches to reach state public sex-offender registries more quickly. NSOPR currently gives concerned citizens easy-to-use and free access to information on two out every live registered sex offenders in the United States. In the absence of an informed public debate on the re-entry of those who have been convicted of sex crimes, fear-based laws are being enacted across the country. Recent trends have made community re-entry across the country. Recent trends have made community re-entry the trigger point for society’s most venomous and simplistic responses toward people with a history of sexually offending. Ironically, the re-entry process also has the potential to become one of the best forums for creating the conditions for a safer community and preventing the sexual abuse of children. In many instances, the general public and policy-makers continue to hold beliefs that are not based on the current research. As a result, laws have several assumptions embedded in them that impact re-entry negatively and are not supported by the scientific evidence. As a culture, we have historically opted for silence and denial rather than to educate ourselves with accurate information about child sexual abuse or even about sexuality in general. The current vituperative and punitive tone evidenced in the media and policy discussions begs the question of whether or not those with sexual behavior problems feel they can come forward and seek help. Creating the conditions for openness about sexually disordered and sexually exploitive behavior includes addressing the need for factual information. The state-by-state sex offender registries were meant to assist law enforcement and probation and parole officers in the supervision of those who have been convicted of sex crimes, not to create conditions of greater danger to community members. The Georgia Legislature’s passage of harsh new restrictions on registered sex offenders prompted Stop It Now! Georgia’s public education is a critical first step in protecting children from child sexual abuse. In accordance with O. C. G. A.  §Ã‚  42-1-12, the Georgia Bureau of Investigation (GBI) is the central repository for Georgias Violent Sexual Offender Registry. Williams, 2011) The Georgia Bureau of Investigation makes every effort to ensure that the information contained in the Georgia Sex Offender Registry is accurate. As the information is provided by other agencies and entities and is continuously changing, the GBI makes no promise or any express or implied guarantee concerning the accuracy of this information. The G eorgia Public Policy Foundation (GPPF) is a free-market think tank based in Atlanta, Georgia, USA. The President and Chief Executive Officer is Rogers Wade. Its board of directors currently includes twenty seven men and women from around the state. The foundation were established in the fall of 1991. The mission of the foundation is to be the most respected and influential source of public policy research, analysis and education in Georgia. The foundation states its belief that good public policy is based upon fact, an understanding of sound economic principles and the core principles of our free enterprise system economic freedom, limited government, personal responsibility, individual initiative, respect for private property and the rule of law. In 2004, the foundation was ranked in the November-December issue of James Magazine for being No. 1 for highest integrity and No. 3 for most knowledgeable among business organizations or state associations. (Williams, 2011) At its best, community re-entry becomes a cooperative process with a role for all of use to play in preventing future sexual assaults, whether as a private citizen, a publi c official, or agency professional. True primary prevention demands that each of us be accountable for educating ourselves with a clear understanding of the facts, so we as American citizens can take the necessary actions in our personal and professional lives to prevent the sexual abuse and sexual exploitation of children. To conclude, Public policy is policies making by governments. A governments public policy is the set of policies (laws, plans, actions, behaviors) that it chooses. Since governments claim authority and responsibility (to varying degrees) over a arge group of individuals, they see fit to establish plans and methods of action that will govern that society. Georgia has several different programs that benefit victims and their families after being victimized. The federal government funds these programs and makes them available to everyone in the community. People have to become more aware of sexual offenders in our community. This is a crime that continues to rise if the Public does not take action to i t immediately. Reference Page: Brown, Mark 2009. Dangerous Offenders: Punishment and Social Order. New York: NY Geffner, Robert 2008 Identifying and Treating Sex Offenders: Current Approaches, Research, and Techniques. Binghamton, NY; The Haworth Maltreatment ; Trauma Press Lee, R. D. , Johnson, R. W. , ; Joyce, P. G. (2008) Public budgeting systems (8th ed. ). Sudbury, MA: Jones and Bartlett Schuster II, W. Michael 2010 For the Greater Good: The Use of Public Policy Considerations in Confirming Plans of Reorganization New York: LFB Scholarly Publishing, LLC Williams, Cathy The Georgia Public Policy foundation retrieved from http://www. gppf. org/ on June 5, 2011

Monday, November 25, 2019

Free Essays on Loren D. Everton-- WWII Flying Ace

Loren D. Everton A pilot from VMF-212 who saw early service with -223, 'Doc' Everton had been flying for 12 years, since the age of 17. Because of his flying and leadership skills, Col. Bauer sent him with the other seven -212 pilots that went with -223 to Guadalcanal on August 20, 1942. As they came in, Captain Everton was struck by the deceiving beauty of the Island, and how inviting-looking green meadows could really be soggy marshes. The Marines already on the ground welcomed the fliers as saviors. "It looked so damn good to see something American circling in the sky," one of them said. Nonetheless, while Everton was busy with getting his tail wheels changed, from hard carrier types to softer ones better suited to grass strips, someone made off with his food supplies. He was directed to a coconut grove and to set up his campsite with captured a Japanese tent, blanket, and bedding. The only tent he could find had a roof, but no sides. That night the Battle of Tenaru started, and Doc was up all nig ht with a .45 in one hand and a helmet in the other. It might have been the next morning when Captain Smith came by holding a map, explaining that the Japs were landing and that Everton was to lead a flight of Wildcats to investigate and "make his own judgement about strafing or returning." They flew out and found the Jap landing craft on the wooded shore. They shot them up with the concentrated firepower of their six .50 caliber machine guns. The effect was wonderful and terrible, as the heavy slugs literally tore the soldiers apart. Everton and his three other planes strafed the men and the boats until the Marine Raiders finished the battle and "there were no more targets available." It was an ideal demonstration of the power of ground and air forces in cooperation. On August 26, the detached pilots of -212 scored six kills, three of them going to Doc Everton. Everton, Smith, Lt. Corry, and Tex Hamilton intercepted a flight of e... Free Essays on Loren D. Everton-- WWII Flying Ace Free Essays on Loren D. Everton WWII Flying Ace Loren D. Everton A pilot from VMF-212 who saw early service with -223, 'Doc' Everton had been flying for 12 years, since the age of 17. Because of his flying and leadership skills, Col. Bauer sent him with the other seven -212 pilots that went with -223 to Guadalcanal on August 20, 1942. As they came in, Captain Everton was struck by the deceiving beauty of the Island, and how inviting-looking green meadows could really be soggy marshes. The Marines already on the ground welcomed the fliers as saviors. "It looked so damn good to see something American circling in the sky," one of them said. Nonetheless, while Everton was busy with getting his tail wheels changed, from hard carrier types to softer ones better suited to grass strips, someone made off with his food supplies. He was directed to a coconut grove and to set up his campsite with captured a Japanese tent, blanket, and bedding. The only tent he could find had a roof, but no sides. That night the Battle of Tenaru started, and Doc was up all nig ht with a .45 in one hand and a helmet in the other. It might have been the next morning when Captain Smith came by holding a map, explaining that the Japs were landing and that Everton was to lead a flight of Wildcats to investigate and "make his own judgement about strafing or returning." They flew out and found the Jap landing craft on the wooded shore. They shot them up with the concentrated firepower of their six .50 caliber machine guns. The effect was wonderful and terrible, as the heavy slugs literally tore the soldiers apart. Everton and his three other planes strafed the men and the boats until the Marine Raiders finished the battle and "there were no more targets available." It was an ideal demonstration of the power of ground and air forces in cooperation. On August 26, the detached pilots of -212 scored six kills, three of them going to Doc Everton. Everton, Smith, Lt. Corry, and Tex Hamilton intercepted a flight of e...

Thursday, November 21, 2019

The Alliance between General Motors and PSU Peugeot Citroen Essay

The Alliance between General Motors and PSU Peugeot Citroen - Essay Example This paper illustrates that competition is forcing rival firms to join hands for developing a better position in the market and also enhance their resource base. The number of alliances, partnerships, ventures, and mergers have increased in the last decade in the corporate sector. However, Hoffmann mentioned that creating alliances is a complex process which can also result in negative outcomes if the allies do not measure the variables of the process in a proper manner. General Motors and PSU Peugeot Citroen have created a customized approach for following up with their alliance plan and created a separate committee for members by selecting key personnel of both the organizations to manage the alliance activities. The researcher is a member of the committee and hence will reflect on the plans and activities being performed within the alliance.The alliance between General Motors and PSU Peugeot Citroen was formed mainly with the view of developing a better resource base for the opera tions of both the companies on the global scale. The strategic alliance between the companies is expected to build their organizational capabilities in response to the challenges faced by the firms in the global marketplace. One of the most crucial considerations which urge firms to engage in mergers and alliances is to reduce the cost of operations. The organizational processes related to the formation of an alliance are structured by the top management of the companies. In the case of GM and PSU Peugeot Citroen, Weinmann and Thomas mentioned that this alliance will lead to the union of the American and European automobile industry and enhance the scope of a production process for the firms as well as will create more options for the customers in all the marketing zones of the concerned organizations. In the context of specific objectives, GM is focused on designing new and innovative production process whereas PSU Peugeot Citroen will utilize the market base of GM for entering the major markets of Asia and America.   The planning stage of the alliance as reported in various media means has highlighted that organizational needs of the allies have been accurately shared and balanced by the firms. This has reduced the liability of the allies and also boosted the level of trust among the partners.  

Wednesday, November 20, 2019

Postwar Urban Development in the Golden Horseshoe Research Paper - 1

Postwar Urban Development in the Golden Horseshoe - Research Paper Example Even though there were challenges in the urban development of Golden Horseshoe during the postwar period, there is a key contribution of demographic policies, which facilitated the rapid urban growth. Urban developments and expansion are due to planning policies, which are vital because they ensure that there is no exploitation of natural resources in the area. Urban housing is very strategic in the development process. Creation of a good security network should be embraced. Back ground information Postwar period are always difficult times in history of many countries. It is the most dangerous, when the resources and population are reduced during the war. In this respect, policies that conform to population trends are instrumental in planning any urban developments agenda. Demography reflects all the changes that occur in population growth. It covers some specific geographical location, gender concerns, age, education attainment, household income, and other valuable personal belongings. This research focuses on the housing developments policies, population variations, suburbanization, and impacts of immigration policies on the urban development and finally, the rise and dominance of the metropolis within Ontario. Population Increase and its Effects The Golden Horseshoe population is dense which makes up one fourth of the total population in Canada. The total population of the Greater Golden Horseshoe was 8.1 million individuals according to census results of 2006 (MacFarlane 65). By the year 2031, the population is projected to grow up to about 12 million (MacFarlane 66). This shows that the expected growth rate per year is about 12.5 %.

Monday, November 18, 2019

If all the links in the Internet were to provide reliable delivry Essay

If all the links in the Internet were to provide reliable delivry service, would the TCP reliable delivery service be redundant, - Essay Example 2007). For instance, if workstation 1 is downloading a file from Workstation 2, after receiving a data packet, computer 2 sends an acknowledgement for receiving a packet to workstation 1. However, if workstation 1 do not receives an acknowledgement from workstation 2, TCP regenerates the packet again and send it to Workstation 2. In this way, the transmission is reliable and data is transmitted an in efficient manner. In a real world scenario, an executable file that is downloaded from the Internet must be complete in size in order to be operational and TCP is up for this task. Whereas, if any chunk of the executable file fails to download, it will not work and become corrupted. Whereas, User Datagram Protocol (UDP) a connection less protocol that is operational on a layer 4 of the OSI model. Likewise, UDP is not a reliable protocol for data transmission that supports transaction oriented services (User Datagram Protocol. 2007). However, UDP can be advantageous for application such a s live video streaming, VoIP services etc. likewise, if any frame is missed from a video, the video will still carry on resulting in high availability. Moreover, the response of UDP is faster, as no acknowledgment is made for every packet. Many of the functions of an adapter can be performed in software that runs on the node’s CPU. What are advantages and disadvantages of moving this functionality from the adapter to the node? As shown in fig 1.1, data link layer pertaining to the sender is responsible for hardware encapsulation. However, the source end is responsible for hardware valuation. Similarly, network layer pertaining to the sender is responsible for performing Network address translation (NAT). NAT is a method of mapping IP addresses from one group of users to another, at the same time ensuring transparency. Likewise, NAT is also used for privacy issues i.e. it cannot be used from the outbound network for security purposes (Network Address Translation. 2007). Moreov er, the receiver’s end on the network layer ensures network valuation, as shown in Fig 1.1. Moreover, the transport layer of both the sender and receiver’s end conducts port encapsulation and port valuation. Furthermore, session layer is responsible for establishing and terminating data sessions, followed by the presentation layer that ensures data compression and sequencing for both the sender’s and receiver’s end. However, there is a visible communication between the smallest program generating sequence and the amount of compression achieved (Sayood 2005) lastly, the presentation layer network interaction. Figure 1.1 A primary disadvantage comprises of computing a datagram from the application layer that relies on resources pertaining to central processing unit and memory integrated in a dedicated hardware i.e. Ethernet Adapter. However, an advantage would be to get more control of an application interacting with users that will work with dedicated hard ware resulting in a complex task. Moreover, software approach is more efficient for upgrading technology, as hardware upgrades only require a hardware replacement. Likewise, new hardware upgrades provide adequate abstraction for ensuring user protection. As illustrated in Fig 1.1, software based deployments require a large amount of metadata to analyze the requirements. As network access layer enforces overheads

Saturday, November 16, 2019

Endocrine System Communication

Endocrine System Communication Explain the importance of intercellular communication and describe the mechanism involved. Intercellular communication is important because it assist the nervous system to elongate the long-term process of growth, development, or reproduction. The endocrine system uses chemical messengers to relay information and instructions between cells. One of the mechanisms involved in intercellular communication is know as direct communication this communication is rare but is important when it occurs. This is when two cells of the same type and the cells must be in extensive physical contact. The cells are so close they function as one. The majority of the communication is known as paracrine communication which is where the cell continuously exchanges chemical messages between each other so they are in sink with one another. Compare and contrast the modes of intercellular communication used by the endocrine and nervous systems and discuss the functional significance of the differences between the two systems. The nervous system performs short term â€Å"crisis management† and the endocrine system regulates long-term, ongoing metabolic processes. The endocrine system uses endocrine communication which helps regulate hormones through the circulatory system and the nervous system dose not have the capability to do this. Another significant difference is synaptic communication, the nervous system uses this form of communication of neurons to release neurotransmitter at a synapse very close to a target cell that bears the right receptors. This form of communication allows the body to react quickly to situations to escape from harm. Explain the general mechanisms of hormonal action and identify which hormone types work through each mechanisms. A hormone receptor is a protein molecule to which a particular molecule binds strongly. Each cell has receptors for responding to several different hormones, but cells in different tissues have different combinations of receptors. For every cell, the presence or absence of a specific receptor determines the cells hormonal sensitivities. Hormone receptors are located either on the cell membrane or inside the cell. The mechanisms of hormonal action are that receptors for catecholamines, peptide hormones and eicosanoids are in the cell membrane of target cells. Thyroid and steroid hormones cross the cell membrane and bind to receptors in the cytoplasm or nucleus, activating or inactivating specific genes. Describe the control of endocrine organs. The endocrine organs are controlled by three mechanisms of the hypothalamic control. One is the secretion of regulatory hormones to control activity of anterior lobe of pituitary gland. Two the production of ADH and oxytocin. And finally is the control of sympathetic output to adrenal medullae. Explain the structural and functional relationship between the pituitary gland and the hypothalamus. The pituitary gland releases nine important peptide hormones that all bind to the membrane receptors and use cyclic-AMP as a second messenger. The pituitary gland hangs inferior to the hypothalamus which all the anterior lobe of the pituitary gland to help in the function of the hypophyseal portal system. By the hypothalamus secreting specific regulatory hormones it controls the production of hormones in the anterior lobe. This whole system works to secret hormones from the hypothalamus through the pituitary gland in a network of capillaries that are connected. All this ensures that all the hypothalamic hormones entering the portal vessels will reach the target cells in the anterior lobe of the pituitary gland before entering general circulation. Predict how alternations in hormone production, delivery, or reception by target tissues would affect its action and blood concentration levels. Describe the factors that could determine a cells hormonal sensitivity. Cells sensitivity is determined by two factors down-regulation and up-regulation. Down regulation is a process in which the presence of a hormone triggers a decrease in the number of hormone receptors. This process is when levels of particular hormones are high, cells become less sensitive to it. Up-regulation is a process in which the absence of a hormone triggers an increase in the number of hormone receptors. In this process the levels of a particular hormone are low, cells become more sensitive to it. Identify the hormones produced by the anterior and posterior lobes of the pituitary gland and specify the functions of those hormones. The anterior lobe produces seven hormones: Thyroid-stimulating hormone (TSH) targets the thyroid gland and triggers the release of thyroid hormones. As circulation concentrations of thyroid hormones rise, the rate of TRH and TSH production decline. Adrenocorticotropic hormone (ACTH) stimulates the release of steroid hormones by the adrenal cortex and targets cells that produce glucocorticoids. Gonadotropins regulate the activities of the gonads. Follicle-stimulating hormone (FSH) promotes follicle development in females and, in combination with luteinizing hormone, stimulates the secretion if estrogen by ovarian cells. In males, FSH stimulates sustentacular cells, specialized cells in the tubules where sperm differentiate. Luteinizing hormone (LH) induces ovulation, the production of reproductive cell in females. Also promotes the secretion, by the ovaries, of estrogen and the progestin, which prepare the body for pregnancy. In male hormone is sometimes called interstitial cell- stimulating hormone (ICSH), because it stimulates the production of sex hormones by the interstitial cells of the testes. Prolactin (PRL) works with other hormones to stimulate mammary gland development. Growth hormone (GH) stimulates cell growth and replication by accelerating the rate of protein synthesis. The posterior lobe produces two hormones: Antidiuretic hormone (ADH) is released in response to a variety of stimuli, most notably a rise in the solute concentration in the blood or a fall in blood volume or blood pressure. A rise in the solute concentration stimulates specialized hypothalamic neurons. Oxytocin (OT) stimulates smooth muscles contraction in the wall of the uterus, promoting labor and delivery. After delivery this hormones stimulates the contraction of myoepithelial cells around the secretory alveoli and the ducts of the mammary gland, promoting the ejection of milk. Discussion the results of abnormal levels of pituitary hormones Abnormal levels of pituitary hormones can have a cast and complex impact on the growth, fertility, and function on the human body via the effect of the hormones on their target organs. Diseases anywhere from asthma to growth problems can occur. Identify the hormones produced by the thyroid gland, specify the functions of those hormones, and discuss the causes and results of abnormal levels of thyroid hormones. The thyroid gland produces thyroglobulin, tyrosine, and thyroxine. The functions of these hormones are: Thyroid hormones enter target cells by means of an energy dependent transport system and they affect almost every cell in the body. Thyroid hormones bound to cytoplasmic receptors are held in storage until intracellular levels of thyroid hormone decline. Thyroid hormones bound to mitochondria increase ATP production. Thyroid hormones bound to receptors in the nucleus activates genes that control energy utilization. The calorigenic effect: the cell consumes more energy resulting in increased heat generation. In growing children, thyroid hormones are essential to normal development of the skeletal, muscular, and nervous systems. The thyroid gland is primarily responsible for a strong, immediate, and short-lived increase in the rate of cellular metabolism. The major factor controlling the rate of thyroid hormone release is the concentration of TSH in the circulating blood. The causes of abnormal levels of thyroid hormones can create an iodide deficiency because in the U.S. we consume more than they daily amount needed. Thyroid hormone production declines, regardless of the circulating levels of TSH. Describe the functions of the parathyroid hormones, and the effects of abnormal functions of each hormone. Parathyroid hormone has four major effects: 1. It stimulates osteoclasts, accelerating mineral turnover and the release of Ca2+ from bone. 2. It inhibits osteoblasts, reducing the rate of calcium deposition in bone. 3. It enhances the reabsorption of Ca2+ at the kidneys, reducing urinary losses. 4. It stimulates the formation and secretion of calcitriol at the kidneys. The effects of calcitriol complement or enhance those of PTH, but one major effect of calcitriol is the enhancement of Ca2+ and PO43- absorption by the digestive tract. The parathyroid glands, aided by calcitriol, are the primary regulators of blood calcium I levels in healthy adults. When the parathyroid calcium levels become abnormal there are two disorders that can occur. Hypoparathyroidism the gland secretes low calcium concentrations in body fluid. Hyperparathyroidism is when calcium concentrations become abnormally high. Identify the hormones produced by the adrenal cortex and medulla and specify the functions of each hormone The adrenal cortex secrets the hormones adrenocortical, mineralocorticoids, glucocorticoids and androgens. The adrenocortical steroids or corticosteroids are vital: if the adrenal glands are destroyed or removed, the individual will die unless corticosteroids are administered. Mineralocorticoids increase renal reabsorption of Na+ and water which accelerates urinary loss of potassium. Glucocorticoids release amino acids from skeletal muscles and lipids from adipose tissue; promote liver formation of glucose and glycogen; promotes peripheral utilization of lipids; anti-inflammatory effects. Androgens are not important in men; encourages bone growth, muscle growth, and blood formation in children and women. The adrenal medulla secrets epinephrine and norepinephrine. These hormones increase cardiac activity, blood pressure, glycogen breakdown, blood glucose levels; releases lipids by adipose tissue. Also this is where the fight or flight syndrome is sparked. Discuss the results of abnormal levels of adrenal hormone production When the adrenal hormone becomes abnormal it produces several different disorders. The first is hypoaldosteronism; the zona glomerulosa fails to produce enough aldosterone, generally either as an early sign of adrenal insufficiency or because the kidneys are not releasing adequate amounts of rein. A rare but serious disorder can occur called Addisons disease which results from inadequate stimulations of the zona fasciculata by the pituitary hormone ACTH or, more commonly, from the inability of the adrenal cells to synthesize the necessary hormones, generally from adrenal cell loss caused by autoimmune problems. Another disease is Cushings disease which results from overproduction of glucocorticoids. There is another aspect of abnormal production of adrenal hormones that affects men and womens sexual characteristics called adrenogenital syndrome. In women, this condition leads to the gradual development of male secondary sex characteristics, including body and facial hair patters. In male to causes an increase of estrogen resulting in larger breast tissue or other female secondary sex characteristics. Last but not least there is a disorder of the adrenal medulla called pheochromocytoma which is an overproduction of epinephrine that causes a tumor that produces catecholamines in massive quantities. Describe the functions of the hormones produced by the pineal gland. It contains pinealocytes, which synthesize the hormone melatonin. The suggested functions of the pineal gland is that it inhibits reproductive functions, protects against damage by free radicals, and sets circadian rhythms. Identify the hormones produced by the pancreas and specify the functions of those hormones. The pancreas contains both exocrine and endocrine cells. Cells of the endocrine pancreas form clusters called pancreatic islets (islets of Langerhans). The pancreatic islets release insulin and glucagons. Insulin is released when blood glucose levels rise, and it stimulates glucose transport into and utilization by, peripheral tissues. Glucagon is released when blood glucose levels decline, and it stimulates glycogen breakdown, glucose synthesis and fatty acid release. Discuss the results of abnormal levels of pancreatic hormone production. When the pancreatic hormones produce abnormal levels of insulin and glucose it causes an individual to be diabetic. Diabetes mellitus is characterized by glucose concentration that is high enough to overwhelm the reabsorption capabilities of the kidneys. Glucose appears in the urine, and urine production generally becomes excessive. Describe the functions of the hormones produced by the kidneys, heart, thymus, testes, ovaries, and adipose tissue. Control of the heart, kidneys, thymus, gonads, and adipose tissue. The kidneys release erythropoietin and calcitriol into the red bone marrow, intestinal lining, bone and kidneys. All of the hormones releases are to stimulate red blood cell production and calcium and phosphate absorption and it also stimulates calcium ions from bone; inhibits PTH secretion. The heart controls the hormones natriuretic that targets the kidneys, hypothalamus and adrenal gland. These hormones increase water and salt loss at kidneys; decrease thirst; and suppress secretion of ADH and aldosterone. The adipose tissue contain two hormones that support to different functions, first is leptin which targets the hypothalamus for suppression of appetite; permissive effects on GnRH and gonadotropin synthesis. Second is resistin that targets cell throughout the body that suppresses insulin response. Last but not least are the gonads with the hormones androgens, inhibin, estrogen and progestin. All these hormones are targeted by the pituitary glands to support the reproductive organs in males and females. In males the interstitial cells of the testes produce androgens. Testosterone is the most important sex hormone in males. Sustentacular cells in the testes support the differentiation and physical maturation of sperm. Under FSH stimulation, these cells secrete the hormone inhibin, which inhibits the secretion of FSH at the anterior lobe. The female body develops oocytes in the follicles; follicle cells produce estrogens, especially estradiol. After ovulation, the remaining follicle cells reorganize into a corpus luteum. Those cells release a mixture of estrogens and progestins, especially progesterone. Explain how hormones interact to produce coordinated physiological responses. Hormones interact to produce coordinated physiological responses in four ways: 1. antagonistic (opposing) effects 2. synergistic (additive) effects 3. permissive effects, in which one hormone is necessary for another to produce its effect 4. integrative effects, in which hormones produce different, but complementary, results Identify the hormones that are especially important to normal growth, and discuss their roles. There are several hormones that are important for normal growth: GH, insulin, PTH, calcitriol, reproductive and thyroid hormones. The circulation concentrations of these hormones are regulated independently. Changes produce unique individual growth patterns. Growth Hormone (GH): effects are most apparent in children where GH supports muscular and skeletal development. In adults GH assists in the maintenance of normal blood glucose concentrations and in the mobilization of lipid reserves. Thyroid hormones: if these hormones are absent during fetal development or for the first year after birth, the nervous system will fail to develop normally and mental retardation will result. If T4 concentrations decline before puberty, normal skeletal development will not continue. Insulin: without insulin the passage of glucose and amino acids across cell membranes will be drastically reduced or eliminated. Parathyroid Hormone (PTH) and Calcitriol: promote the absorption of calcium salts for subsequent deposition in bone. Without adequate levels of both hormones, bones will be weak and flexible. Reproductive Hormones: the sex hormones (androgens in males, estrogens in females) stimulate cell growth and differentiation in their target tissues. Differential growth induced by each hormone accounts for gender-related differences in skeletal proportions and secondary sex characteristics. Define the general adaptation syndrome. Any condition that threatens homeostasis is a stress. Our bodies respond to a variety of stress-causing factors through the general adaptation syndrome (GAS), or stress response. The GAS can be divided into three phases: the alarm phase the resistance phase the exhaustion phase Reference page: S.Schaffer. Chapter 18. The endocrine system. Retrieved January 20, 2008 from http://www.harford.edu/faculty/SSchaeffer/Endocrine%20Outline.doc Martini. Chapter 18. The endocrine system. Retrieved January 20, 2008 from http://www.miramar.sdccd.cc.ca.us/faculty/kpetti/Bio160/Martini7DetailLectOutlines/18-Detailed_Lect_Out_LO.pdf.pdf

Wednesday, November 13, 2019

The Roman games :: History

The Roman games Question : Who were the spectators at Roman games? Discuss the relationship between them and the performers they watched. Gladiator fights were first introduced to Rome in 264 BC, when the sons of Junius Brutus paid honor to their father's funeral by showing three pairs of gladiators fight. This ritual caught on and was performed to honor significant men. As the years passed, the ceremonies became more promoted and emperors began to present the games to symbolize their power. The citizens of Rome loved to go to these bloody warfares. In the city of Rome, these events were held in the Colosseum. An arena so large that it could hold 50,000 spectators and host fights between men and animals. Gladiatorial games occupied a central role in society. Sponsored during the republic by rich magistrates and later in the Empire by the Emperors themselves, the games have long been called an election tool. The games in Rome are known today as the bloodiest exhibitions of public entertainment known to mankind. Men, Women and children flocked to the Colosseum to watch the bloodthirsty fighters murder one another. The spectators came from all over the Roman Empire and various other regions, like Africa. The games became a way of entertaining the wealthy, as well as the common people. "Gladiator", comes from the latin word "gladius", for sword. They were primarily made up of slaves, criminals, prisoners of war or even volunteer free men. The crimes that could lead one to the arena included treason, robbery, and murder, among others. Some free men became gladiators of their own free will in hopes of gaining notoriety and patronage amongst the wealthy citizens. By the end of 50 BC almost half of the gladiators fighting in the Colosseum were free men. The gladiators competed against one another for the sake of public entertainment at festival games. Although some gladiators fought wild animals, the combats usually featured a pair of male human contenders. They fought in diverse styles depending on their background and how much training they had endured. Originally as captured soldiers, they were made to fight with their own weopons. There were also strong sexual references to the gladiator. The word gladius, for sword, was used to mean penis, their helmets were also, occasionally, shaped in the form of a phallus. Even the dead, defeated gladiator, had something sexual about him.

Monday, November 11, 2019

Colorflex and Temperature Measurement in Coffee Production

Coffee industry represents the colour of roasted java as a individual value such as SCAA or HCCI colour criterion. PT. ACI uses Colorette 3b with a graduated table of 0 to 200 to stand for the colour between visible radiation into dark. This instrument can non mensurate the debasement of java colour during roasting which has a wider colour scope. This survey applied the ColorFlex that is designed with CIE criterion colour measuring by using a particular visible radiation beginning and a standard perceiver angle. The samples were measured with the standard visible radiation beginning of Daylight ( D65 ) and the normal observer angle of 100. In some instances, the colour is frequently represented as chrome values but in this survey we used the colour difference ( & A ; Delta ; E ) which was calculated from the CIEL*a*b* co-ordinate to stand for the java colour. The CIEL*a*b* is calculated with following equation. where Ten, Y, Z as the Tristimulus values ;are changeless values of 94.811, 100, and 107.3 severally matching to the light and observation angles. The co-ordinate of L* describe the degree of brightness, a* is the colour strength of ruddy ( + ) to green ( – ) , and b* describe the strength of yellow ( + ) to blue ( – ) . The & A ; Delta ; E is defined as follows. where the indexes of 2 and 1 represent the object being measured and the mention. By presuming a black organic structure as mention ( the colour values are severally close to nothing ) , the & A ; Delta ; E is merely determined by the colour of the object. Therefore, eq.5 can be written as follows. Fig. 3 presents the relationship between the & A ; Delta ; E measured by the ColorFlex with colour value provided by Collorete 3b for the same sample. The consequence indicates a additive relationship ( high value of correlativity coefficient ) between both graduated tables and hence, this ColorFlex can be applied to mensurate the colour of roasted java. The experimental information for each measuring can be illustrated in Fig. 4. The figure presents informations of detector response, grain colour, and points of three roast-degrees ( light-medium-dark ) for each measuring. The response of detectors was so processed into olfactory property forms captured at 3 min interval harmonizing to the observation clip of the colour parametric quantity. After that, the olfactory property form was analyzed to the colour and temperature informations. The same method was applied to the olfactory property form at the three critical points. The effectual detector responsewas presented as a series of an effectual electromotive force detector at t-time after it was subtracted with an initial electromotive force for a mention. In this instance, the response of each detector in the first measuring ( t=180 s ) was considered as the mention. Thecan be written as follows. PCA is a statistical method that is widely used for analysing the distribution of an experimental information. PCA is besides known as the Karhunen-Loeve or Hotelling transmutation which is one based on statistical analysis of extraneous transmutation for change overing a set of experimental informations which may incorporate of correlative variables into a set of new informations which contain of non linearly correlative variables known as chief constituent ( Personal computer ) . Personal computer on the first sequence contains the greatest variant value of the experimental information followed by the 2nd Personal computer, the 3rd, and so on. Mathematically, PCA algorithm can be solved by the method of Covariance. The algorithm is besides described in [ 15 ] [ 14 ] . The covariance matrix of an experimental information is defined as follows. where Ten is the matrix of the experimental informations with size of M x N, M is the figure of informations variable ( e.g. figure of detectors ) and N is the figure of the information, I and J are the index of the informations variable and the figure of experimental informations,is the norm of the informations for each variable,is a individual vector of the form informations containing of the M variable, andis the nothing mean informations. Based on Eq. 8, the covariance matrix of C is an extraneous matrix with size of M x M. PCA algorithm dramas to happen the characteristic root of a square matrix () and eigenvector () of the matrix, which can be described as follow. Eq. 9 can be solved by the Jacobian method. The obtained characteristic root of a square matrix represents the figure of discrepancies of informations stored in each corresponding eigenvector. The eigenvector is besides called as a characteristic vector being used to transform the observation informations. Vector Personal computer as the consequence of this transmutation can be calculated by the undermentioned equation. where I is the index of the input vector variable, J is the index of Personal computer matching to the sequence of the characteristic vector. The distribution of the experimental informations can be visualized by plotting the Personal computers on the Cartesian vector graph for either 2D or 3D. The distribution of the experimental information is visualized on the graph with the degree depending on the sum of discrepancy from the selected Personal computers. In many instances, the usage of the top of 2 or 3 Personal computers already represents more than 80 % of the discrepancy of the analyzed information, and so that the distribution have reflected the existent distribution of the informations. Fig. 5 presents the deformation of java grain colour ( a ) and roasting temperature ( B ) as map of roasting clip. The colour profile tends to travel down demoing the colour debasement from the yellow-green colour for green bean into the brownish colour for roasted bean. This alteration indicates an addition in degree of roasted java along with the length of the procedure. In add-on gives information that shows the colour alteration of a downward tendency, the chart besides provides scope of the colour values at each trying. From the consequence, it appears that the scope colour value of the grain in the early stages tends to be little for all replicates. The longer roasting clip be givening to widen the scope of colour values indicates a difference degree of adulthood of the roasted java. A similar consequence is besides performed by the profile of temperature. In the early stages, the roaster membranophone was set at the same temperature of 2000C before the java sample was inserted . The temperature will drop about 40-500C in the beginning of roasting and so easy traveling up once more as the clip of roasting occur. This is apprehensible because of the dramatic differences between roaster room temperature with the get downing java grain. At that point, the heat will be absorbed rapidly into the java grains. Although the warming component stays on but this soaking up is greater than the supply of thermal. In short, this temperature is profiled by a lessening in the initial stages so the procedure will slowly rise until it reaches a temperature of 2000C. In line with old consequences with the ascertained scope of temperature values for each sampling clip, it is seen an addition in the scope of values. This shows that even though the procedure fixes the initial conditions of roasting, uses top-quality java bean, and adjusts an equal blower gap but the ripeness of the java grains is non equal for each sampling clip among experiment reproductions. These consequence s prove that the both parametric quantity can non be used to reflect the joint degree though with homogenous stuffs. Furthermore, in existent conditions, the java grains as natural stuff in industry are obtained from providers with heterogenous for footings of quality, shelf life, wet content, and denseness. Therefore, the both parametric quantities have restriction to be used as an index of the degree of roasted java.

Friday, November 8, 2019

Digestion and Absorption Essays - Digestive System, Hepatology

Digestion and Absorption Essays - Digestive System, Hepatology Introduction The key issue in the digestion and absorption of fats is one of solubility. Lipids are hydrophobic, and thus are poorly soluble in the aqueous environment of the digestive tract. The digestive enzyme, lipase, is water soluble and can only work at the surface of fat globules. Digestion is greatly aided by emulsification, the breaking up of fat globules into much smaller emulsion droplets. Bile salts and phospholipids are amphipathic molecules that are present in the bile. Motility in the small intestine breaks fat globules apart into small droplets that are coated with bile salts and phospholipids, preventing the emulsion droplets from re-associating.The emulsion droplets are where digestion occurs. Emulsification greatly increases the surface area where water-soluble lipase can work to digest triacylglycerol. Lipase is a pancreatic enzyme that catalyzes the breakdown of fats to fatty acids and glycerol or other alcohols. Lipase is primarily produced in the pancreas, but is also in th e mouth and stomach. Most people produce enough pancreatic lipase. But people with cystic fibrosis, Crohn's disease, and celiac disease may not have enough lipase to get the nutrition they need from food. Lipase is an enzyme which catalyzes the degradation of triglycerides. More generally known as Lipoprotein Lipase(LpL). This is a catabolic reaction. Lipases catalyse the breakdown of fats and oils into fatty acids and glycerol in the small intestine, with an equation of ; Fats (lipids) Fatty acid and glycerol. Lipase hydrolyses the fat in milk to fatty acids which react with sodium carbonate to lower the pH of the mixture. This pH change is observed by using phenolphthalein. Procedure (a) Firstly , label three test-tubes 1-3. (b) Next , using a pipette or syringe, place 5 ml milk in each tube. (c) Rinse the pipette and use it to place 7 ml dilute sodium carbonate solution in each tube. This solution is to make the mixture alkaline. (d) Rinse the pipette or syringe and use it to place 1 ml 3% bile salts solution in tubes 2 and 3 only. (e) Use a dropping pipette to add phenolphthalein solution to each tube until the contents are bright pink. About six drops will be sufficient and equal quantities should be added to each tube. Phenolphthalein is a pH indicator. In alkaline solutions (above pH10) it is pink; in 'acid' solutions (below pH 8.3) it is colourless. (f) In a spare test-tube, place about 15 mm of 5% lipase solution and, using a test-tube holder, heat the liquid over a small Bunsen flame until it boils for a few seconds. Cool the tube under the tap and, using the graduated pipette or syringe, transfer 1 ml of the boiled liquid to tube 2. (g) With the pipette or syringe, place 1 ml unboiled lipase solution in tubes 1 and 3. (h) Note the time. Shake the tubes to mix the contents, return them to the rack and copy the table below into your notebook, observing the tubes from time to time. (i) Note the time required for the contents of each tube to go white and then complete the table of results. Results Tube 1 (Lipase only): took 6 mins 42 secs to turn from pink to clear/white Tube 2 (Boiled Lipase, Bile salts): remained pink after 15 minutes Tube 3 (Lipase and bile salts): 2 mins and 11 secs Discussion The result obtained is different because all three test tubes are tested with different condition and materials. From the result function of bile salts is known and what will a boiled lipase will result. Test tube 1 shows the change in phenolphthalein after 4 minutes, where you used no bile. This is the time it takes for lipase to break down ordinary fats to fatty acids and glycerol (the production of the acids causes the colour change). Test tube 2 doesnt show any changes for 15 minutes due to boiled lipase which is used to show the denaturing effect of heat on enzymes (which are proteins). Heating the lipase destroyed its structure, which in turn prevents its action. This means that no fats are converted, even in the presence of bile but emulsification still occurred in this tube. Test tube 3 took 2 minutes plus to change colour because the

Wednesday, November 6, 2019

Ensure Safety And Security Within Suburbs Social Policy Essays

Ensure Safety And Security Within Suburbs Social Policy Essays Ensure Safety And Security Within Suburbs Social Policy Essay Ensure Safety And Security Within Suburbs Social Policy Essay The sense of security and wellbeing that gated communities provide for their occupants far out-weigh any negative effects on the broader urban community. Discourse this claim. Contemporary gated communities were ab initio found in the United States, and have spread throughout the universe to guarantee safety and security within suburbs, chiefly dividing the rich from the hapless. As Minton ( 2009, p.61 ) inside informations, gated communities are non merely an American phenomenon, they flourish in states with utmost wealth inequalities and societal divisions, such as South America, South Africa and parts of south-east Asia, India and China, where societies were exposed to extreme capitalist economy. A gated community is a signifier of residential community or lodging estate incorporating purely controlled entrywaies, and are frequently characterised by a closed margin of walls and fencings. In some cases within the confines of these communities, there may be fitness Centres, shopping Centres, pools, lakes or other recreational activities. These bastioned enclaves are frequently occupied by the upper-class who wish to see a peaceable scene, accompanied by a sense of security. Gated communities can be found all over the Earth and can be established for several different grounds dependent upon the location, societal economic position every bit good as its yesteryear and present political history in some instances. For illustration, gated communities in South Africa will function a different intent than those located in America or Australia. One factor that is common amongst most community gardens is that they provide a higher criterion of place quality and stricter edifice codifications that promote uniformity in design ( Jurgens A ; Gnad 2001, p.351 ) . The pick of an person to busy a belongings in a gated community reflects certain issues that may be associated with the country such as offense, larceny, traffic, and in some cases a loss of sense of community. These communities besides create a scarceness consequence, with by and large merely a few places going available for sale at the same clip. Some residents may have one belonging s for personal usage, every bit good as having several others to lease out for and investing. There are a figure of grounds why persons feel the demand to travel into gated communities. Blakely and Snyder survey ( cited in Grant A ; Mittelsteadt 2004, p.915 ) , identified three types of gated communities ; lifestyle, prestigiousness and security zone communities. These classs represent the ideal types that serve peculiar markets. The lifestyle typology of gated communities emphasizes common comfortss and caters to a leisure category with shared involvements. This type of enclave may appeal to those who have entered retirement and necessitate certain age related composites. They besides frequently feature golf classs or state nines. The gated community that is referred as holding a prestigiousness label by Blakely and Snyder ( Grant A ; Mittelsteadt 2004 ) reflects desire for image, privateness and control. They reflect wealth and category within the greater community. This type of community focal points on exclusivity over community, and merely contains minimum shared installations. The prestigiousness enclave will by and large be used by the rich and celebrated or the upper in-between category of society, that wish to hold restricted entree with the extra pick of restrained security. These enclaves are frequently located in premier existent estate locations. The concluding type of community that Blakely and Snyder ( Grant A ; Mittelsteadt 2004 ) refer to as security zones, reflect countries that are associated with heavy offense, and are normally located within less developed and less socio economic communities. These bastioned suburban communities reflect a strong sense of fright and, as Durington ( 2009, p.73 ) inside informations, are characterised by a figure of security setups including roar Gatess, high walls, razor wires, electric fencings, ever-present guards and are connected with armed response security companies. The one job that is associated with high security zones is that they cause a break to the traffic flow that was one time able to go freely through these suburbs, therefore impacting the broader urban community negatively. In less developed parts of the universe such as South Africa, the usage of a gated community is different to the manner that a more developed part uses them for. In a survey conducted by ( Jurgens A ; Gnad 2001, p.339 ) there are a figure of graphs bespeaking the development of offense in South Africa over about a 25 twelvemonth period. It displays three graphs, the first indicating assault and robbery, the 2nd indicating colza and slaying, and the 3rd depicting break-in and a larceny of motor vehicles. All the graphs from the survey display an upward, increasing tendency, bespeaking that the figure of violent incidents happening is obviously non worsening. Now more than of all time, South Africans are experiencing a sense of insecurity. Well over half of the population in South Africa experience very insecure in their night-time residential country and merely a one-fourth feel very safe in their daytime residential countries ( Lemanski 2005, p.400 ) . These consequences collected from a figure of studies indicate why there is an increasing tendency of gated communities emerging in South Africa and developing states. Blakely and Snyder s ( 1997 ) theory of the different types of gated communities in the US, can be built upon, and the type of enclave referred to as a security zone can be applied to the state of affairs that is present in South Africa. An addition in politically motivated agitation of the black population against the apartheid system in the mid 1980s has triggered a paranoia of personal insecurity and political uncertainness every bit good as the development of assorted building steps designed to protect citizens in preponderantly white metropoliss ( Jurgens A ; Gnad 2001, p.339 ) . This sense of insecurity has encouraged the production and outgrowth of gated communities in South Africa. A bulk of the dwellers in these enclaves are occupied by the white upper category demographic, nevertheless as the research conducted by Taleb ( Durington 2009, p.74 ) provinces, Durban is alone, and has one of the lone gated communities populated to a great extent by Indians. By holding a racia l and cultural mix within a community can impact the community negatively, and can take to differences or force within a community therefore, get the better ofing the intent of why they were originally established. Gated communities in South Africa are frequently used to suit the on the job category or people who play of import functions within the authorities, or in some cases even going concern work forces who require a safe and unafraid topographic point for adjustment. The tendency of gated communities emerging has created increased occupation chances for the wider populace. It has been implied ( Grant and Mittelsteadt 2004 ) that developers see gated undertakings as an of import niche selling scheme in a competitory environment, by aiming consumers that are seeking for community, individuality, and security. It besides produces chances for companies involved in private security and substructure such as security guards, fence, Gatess, and so on. Whilst the constabulary can be trusted and effectual in most of the developed parts around the Earth, this is non the instance with topographic points such as South Africa. Basically, as Durington ( 2009, p.77 ) stated there is a general perceptual experience that the constabulary are non effectual in forestalling offense and that they are reactive instead than proactive. Due to scarce Numberss, the constabulary are by and large more occupied by life endangering offenses, instead than policing a gated comm unity. This is why there is a strong demand for private security within South Africa. The internal administration within a secure enclave is critical for its operation and the proprietors of belongings within a compound are obliged to stay by behavior regulations, which is the Sectional Titles Act of 1986 ( Jurgens A ; Gnad 2001, p.350 ) . This act implements regulations curtailing residents to modify their edifices in certain ways. Once an dweller purchases a belongings they are required to follow the regulations and ordinances. They are besides required to pay for the extra comfortss associated within the community such as disposal, nurserymans and security, and to boot as Webster and Lai ( Grant A ; Mittelsteadt 2004, p. 923 ) indicate, in some 3rd universe states, the private enclaves may supply H2O or other vital services which are non available from public governments. The usage of fright in the media is used as an plus in Durban, South Africa. As Durington ( 2009 ) provinces in his reading, sensational headlines depicting offense narrations fuel newspaper gross revenues and thrust place purchases in secured estates . Many occupants of gated communities live in one belongings but ain several more as investings which are frequently leased out to the populace. These fear tactics are working as people put their safety and wellbeing foremost in their lives. These tactics are besides being used all around the universe, and are normally used in political runs. The function and map of a gated community in more developed western states differs greatly, in contrast to those associated with the underdeveloped universe. Having a high security zone is still of import but is non every bit critical as many western states have stable authoritiess and lower offense rates which are less barbarous. Many of the enclaves which are established in wealthier states tend to fall into the typography that Blakely and Snyder s survey ( cited in Grant A ; Mittelsteadt 2004 ) refer to as lifestyle and prestige gated communities. The primary focal point within these enclaves is on the exclusivity, community, shared installations and leisure instead than security guards being on patrol around the streets. In Australia, some of the characteristics that attracted occupants to gated communities was the handiness to public conveyance and installations such as pools, tennis tribunals, paseos, every bit good as restricted entree to the enclaves understating the hazar d of autos rushing or as Kenna ( 2010 ) describes vehicles hooning past occupants houses. Concentrating on an Australian context, the sense of security that is wanted by occupants does nt necessitate to be to the same extent of that in South Africa. Australia faces junior-grade offenses such as graffito, hooliganism, housebreakings. Kenna ( 2010 ) continues to explicate that there was a drug flop in Macquarie Links, a gated community, which is located in the Sydney metropolitan part around 30 km south-west of Sydney Central Business District ( CBD ) . This is uncomparable to the offenses which occur in less developed parts of the universe where force, colza, auto jackings, slaying and assault are following an increasing tendency. On a local graduated table Adelaide contains gated communities as good. Some may non look to hold a direct correlativity to the specific features of what is described as a gated community, such as incorporating a noticeable fencing and gate, but they are still exclusionary infinites, with restricted traffic flow and incorporate a community atmosphere. Mawson Lakes can be described as a gated community within Adelaide, South Australia. It contains one primary entryway with Mawson Lakes printed upon a welcoming wall and creates a distinguishable barrier of the enclave by strategic arrangements of trees environing the propinquity. Whilst there is no prevailing gate excepting the general public upon come ining, the Mawson Lakes web site ( 2011 ) inside informations that it contains installations such as shopping composites, eating houses, unfastened infinites, athleticss and recreational activities, every bit good as a robust public transit system. These are all characteristics that Bla kely and Snyder ( Grant A ; Mittelsteadt 2004 ) refer to as the features that contribute to doing a gated community. Many of the bastioned enclaves established around Australia use a different method of disincentive to seek and avoid unwanted individual from come ining upon natural inherent aptitude. Alternatively of environing the enclave with blazing security mechanisms, the expressed show of wealth can be used as an effectual hindrance impeding the person s determination devising procedure by uncertainty as to rights of entree ( Rofe 2006, p.316 ) . Chiefly this technique is used to make a segregation with the external populace and to make an exclusionary infinite chiefly for those who are involved within the communities such as Macquarie Links and Mawson Lakes. Some other Techniques that can be used to carry through this sense of an exclusionary infinite is the usage of lakes or rivers environing an enclave instead than a fencing. This can be seen in many constitutions located around the West Lakes precinct in South Australia, where the traffic flow is limited due to complex street programs wit h many dead terminals to promote one primary entry and issue point to entree the development. With gated communities comes some minor negatives which impact the greater urban community more than those who are populating within the enclave. Obviously, gated communities have a really unsafe societal consequence. Gating Acts of the Apostless as a boundary line between the public and private systems and helps to break up a metropolis, and as stated by Grant A ; Mittelsteadt ( 2004, p.926 ) in the largest enclaves, occupants may virtually splinter from public life outside . In many instances the general populace are denied entree to public substructures and infinites when the Gatess are locked. Additionally, there are divisions between those outside and those inside the Gatess. As the article,Effectss of Gated Communities on the Surrounding Community( 2010 ) explains, economic disparities can happen within a secured community due to the money circling within the Gatess doing less opportunity for growing and development for the outside community, which may do several arguments to originate. These bastioned enclaves can besides hold a negative impact on belongings values around the neighbouring belongingss. The ground why these gated communities are so hard to seek blessing for is due to a figure of grounds, many of which affect the general populace. Some of the grounds are due to the limitations that affect public traffic, obstructions for fire brigades and exigency services, waste aggregation, and public public-service corporations such as H2O and electricity supply ( Jurgens A ; Gnad 2001, p.343 ) . Additionally, the general populace has expressed their concern in several topographic points about the image of gated communities. A bulk of the population see gated communities as, ugly or primitive, along with being a violation of public infinite, and doing isolation from one s neighbors, and it has been expressed that people walking about certain gated communities can experience under threat ( Hirt A ; Petrovic 2010, p.16 ) . An addition in the sense of insecurity in certain parts of the universe has driven the development of gated communities. These bastioned enclaves bring significant benefits for those involved and merely impact the broader urban community on a minor graduated table. In the development states, with high barbarous offense rates, gated communities can be in many instances the difference between life and decease. These enclaves use major security setup to protect those who are within the walls. If the residents are willing to pay for the sense of security, they should non be criticised for making so. However, in developed states, where there are chiefly petty offenses such as graffito, hooliganism or robberies, such as Australia, gated communities should be kept to a bare lower limit. In the Australian context, these enclaves should non let to be surrounded by a big fencing, coercing more sub developments to be established, instead than specific gated communities. There is non a signific ant sum of offense that warrants these types of enclosed communities to be developed within Australia. The benefits associated with gated communities in high offense rate, and low socio economic countries decidedly outweigh the negatives that are placed upon the wider urban community and should be permitted to be established where necessary.

Monday, November 4, 2019

How was the Cuban Missile Crisis perceived in the USA and Cuba Essay

How was the Cuban Missile Crisis perceived in the USA and Cuba - Essay Example The U.S. and Cuban governments were each compelled to action by the fear of each other. Both countries posed a threat, real and implied, to the other. Nuclear bomb paranoia swept the post World War II world. In no place or time was this fear more apparent than during the Cuban Missile Crisis. During the 1962 crisis, Fidel Castro, Nikita Khrushchev and John Kennedy jockeyed for the upper hand, each employing bold moves that brought the world to the brink of possible annihilation. Prior to the Cuban Revolution in the mid to late 1950’s, the tropical island of Cuba was a favored tourist attraction of U.S. citizens. The United States government held substantial control in Cuba’s economic and political dealings. However, Castro, a leading political figure in Cuba, refused to be controlled by the United States. The United States government suspected that when Castro assumed power on January 1, 1959, his communist government would pose a close threat to America. Castro further raised concerns when he seized property belonging to prosperous Cuban Nationals and foreigners in an attempt to improve conditions for working-class Cubans. Many of these properties belonged to businesses owned by U.S. companies and individuals. U.S. suspicions and concerns were heightened in December, 1960 when Castro officially and openly aligned Cuba with the Soviet Union. Less than one month later, in early January, 1961, the U.S. severed diplomatic relations with Castro and imposed a trade embargo on Cuba that remains in effect to this day. The embargo stopped the flow of oil to Cuba and the sale of its major cash crop, sugar, from Cuba.

Saturday, November 2, 2019

Analyses of the Articles about Animal Ethics Research Paper

Analyses of the Articles about Animal Ethics - Research Paper Example Animals do not have rights since they do not have moral reasoning and moral judgment. Use of animal as research subjects in medical research has been condemned widely criticized and condemned on two grounds: that it wrongly violates the animal rights and that it wrongly imposes much avoidable suffering on sentient creatures. According to Cohen (575), these arguments are not valid the first one relies on an understanding of rights which is mistaken, and the second is based on calculations of sequences which is mistaken. A right is a claim that can be exercised by one party against another (Cohen 576). The target of the right claim can be a human being, community or even the entire humankind but not to animals. For, any genuine right to be fully comprehended the person who holds the claim against the other party must be known and to what it is a right. Rights arise, according to Cohen (576), and they can be â€Å"intelligently defended, only among beings†¦.† Only human beings can make claims and rights beings claims, animals do not have rights since they can not make any moral claim against any person or group. The attributes of human beings from which, moral capability arises, have been discussed by philosophers at all times; ancient and modern, the inner consciousness of a free will. Animals do not have the ability to reason using a free will, and this denies the animals rights. Human beings defend other human beings lives and animals’ by treating them, and this can only be done through the use of animals in research. According to Cohen (579), â€Å"every disease eliminated, every vaccine developed†¦virtually every modern medical therapy is due†¦ to experimentation using animals.† For human and animal welfare to be enhanced, research has to be done using the animals. The article the case for the use of animals in biomedical research, by Carl Cohen, looks at the importance of animals in biomedical research to both animals  and humans, as well. This paper fully supports Cohen in his argument about animals not having rights, his definition of rights.Â