Monday, December 30, 2019
Topic 1: What are the capabilities and limitations of intelligence in supporting homeland security efforts? Former Secretary of Homeland Security Michael Chertoff once said, Ã¢â¬Å"Intelligence analysis lies at the heart of everything we do,Ã¢â¬ (Blum, 2016). In the post 9/11 world, this seems like common sense. But prior to that horrific day, the world of intelligence was different from the one that law enforcement officers know now. One of the common themes of the assessment of the attack on September 11, 2001 was the lack of communication and information sharing between agencies. In the time prior to 9/11, the lack of ability for information to be shared between agencies was tantamount to crippling. Since the inception of the Department of Homeland Security (DHS) agencies have experienced an unprecedented ability to cooperate with other departments in both vertical and horizontal sharing practices, allowing for greater distribution of information, and the ability to Ã¢â¬Ëpaint a better pictureÃ¢â¬â¢ of intelligence and all of its possibilities. The gathering of intelligence is ke y to operational execution, the process involved in accruing it must be constantly reevaluated in order to maintain effectiveness through collaboration skills across agencies within the US government. The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act was the catalyst of change for the United States and its homeland security practices.Show MoreRelatedCapabilities And Limitations Of Intelligence1249 Words Ã |Ã 5 PagesCapabilities and Limitations of Intelligence Homeland security works around the clock to provide safety for not just our country, but for the entire world. Over the years there have been constant improvements to homeland security. The capabilities of intelligence gathering have been bolstered by the numerous agencies at different levels of our government, coordination between agencies, and even the very strategy used to analyze the data. Fusion centers were created to improve the efficiency of theRead MoreThe Capabilities And Limitations Of Intelligence1917 Words Ã |Ã 8 PagesWhat are the capabilities and limitations of intelligence in supporting homeland security efforts? The United States national security to be successful depends on collecting vital intelligence to help prevent potential threat. For government officials to gather important information involves agencies from the Office of the Director of National Intelligence (DNI). U.S. Intelligence Community which is under the DNI is a coalition of 17 agencies and organizations, including the ODNI, within the ExecutiveRead MoreCapabilities And Limitations Of The Ic Hls System Of Theu.s.1735 Words Ã |Ã 7 PagesCAPABILITIES LIMITATIONS OF THE IC HLS SYSTEM OF THE U.S. During the last fifty years, the global community has made extraordinary advancements in technology, public health, and human rights. The launching of the first satellite into orbit, creating new tools to combat infectious diseases, and expanding basic global human rights through treaties, protective actions, and billions of dollars in aid, have paved the way for coming generations to continually build a positive future. However, developmentsRead MoreIntelligence, Terrorism, And Terrorism1481 Words Ã |Ã 6 Pages It was apparent that the attacks of September 11, 2001 were lack of intelligence. Since then, the U.S. has given great emphasis of intelligence to prevent terrorist events such as 9/11 from happening again. Homeland security has emplaced variety of efforts in order for the U.S. to address safety and security issues as well as in addressing the ever-growing threats of terrorism both physical and cyber. Gathering intelligence is vital in preventing and responding to acts of terrorism and otherRead MoreIntelligence And The Homeland Security1205 Words Ã |Ã 5 PagesPaper 1: What are the capabilities and limitations of intelligence in supporting homeland security efforts? While the Department of Homeland Security (DHS) is one, centralized agency, securing the homeland involves the cooperation and collaboration of many, different agencies and organizations ranging from local law enforcement to national agencies such as the NSA, CIA, and FBI. Each of these agencies contributes to the development of homeland security intelligence. By carefully analyzing andRead MoreIntelligence Sharing And The Capabilities Of The Homeland Security Enterprise Essay1670 Words Ã |Ã 7 PagesIntelligence Sharing and the Capability of the Homeland Security Enterprise What are the capabilities and limitations of intelligence in supporting homeland security efforts? Since the deadly terror attacks of 9/11, intelligence gathering for homeland security has improved immensely. One of the most important developments in our law-enforcement structure that has enhanced our intelligence is the creation of fusion centers. Fusion centers are Ã¢â¬Å"state and major urban area focal points for the receiptRead MoreArtificial Intelligence Vs. Ai1364 Words Ã |Ã 6 PagesARTIFICIAL INTELLIGENCE or AI is a machine or a computer that learns from the surroundings and the mistakes it has committed in the past and then uses its logical processing system to evolve into an improved machine or a computer. Artificial Intelligence can be broadly classified into two categories namely; I. Specialized AI. II. General AI. I. Specialized AI: The computers, sophisticated machineries, automated systems for specific tasks are specialized AIs. Specialized AI is developed to serveRead MoreThe Intelligence Community Of The United States1091 Words Ã |Ã 5 PagesThe intelligence community of the United States is a large, robust and bureaucratic system. From this community though, the national objectives of the United States are supported through their gathering and analytical capabilities. The following paper will highlight the intelligence agencies of the Federal government as well as state and local agencies that make up the intelligence community. Within these entities are programs that develop intelligence for use in protecting the homeland as wellRead MoreTransformational Leadership Style For Producing Positive Changes And Strengthening Organizations982 Words Ã |Ã 4 Pagesorganization. Organizational commitment results from employees being satisfied and devoted to the vision of the company. Another important tra it of a transformational leader is emotional intelligence. It is necessary in relationship building and managing emotions in situations. Recognizing the limitations of transformational leadership and understanding the assets of various leadership styles will help a leader determine which style is most suitable for the occasion. Dimensions of TransformationalRead MoreIntelligence Of Mexican-American And Mexican Students.1102 Words Ã |Ã 5 PagesIntelligence of Mexican-American and Mexican Students At Laredo Community College where we have both Mexican-American and Mexican students which we see the difference of intelligence. Those students show the difference of their abilities regarding the Texas Success Initiative which have different rates of passing. The intelligence capabilities of both Mexican-American and Mexican students are different in three levels and the methodology of testing. Mexican Students The Mexican culture is
Sunday, December 22, 2019
King Sejong, the everlasting light of Korea, the greatest King of all Korea. Considered one of the greatest kings in Korean history, Sejong invented Hangul, the Korean alphabet. While King Sejong was in throne, the Joseon Dynasty enjoyed the most fortunate and happy age ever. There were many reasons as to why King Sejong created the great country of today which is korea. Many sources say that due to the sorrow of the loss of his beloved father, King Taejong, in which it is he who found the Joseon Dynasty, that King Sejong was able to create the laws upon law, medical science discoveries, and even hangul, the korean alphabet. Other sources say that because of his love for the people and his country that he made these wonderful discoveries.Ã¢â¬ ¦show more contentÃ¢â¬ ¦King Sejong, according to Ã¢â¬Å"the Cultural work of Sejong the Great, (Gari Ledyard)Ã¢â¬ there is very little knowledge about king Sejong early life and his education according to Ã¢â¬Å"King Sejong the Great (the Everlasting Light of Korea)Ã¢â¬ , since early childhood, sejong had always loved to read. Once he had a book, he would read it again a hundred times, and some books, such as chwajon (a biography by Tso Chu-ming) and Chosa (Ode of Lamentations by Kulwon), he read over two hundred times until he had learned them by heart. Seeing his sonÃ¢â¬â¢s devotion to reading and study, King Taejong grew anxious for his health and forbade him to read during the night. When his reading continued, King Taejong sent an attendant to confiscate and hide all the books in his room. Disheartened, King Sejong began to search, and found one book that has escaped the attendantÃ¢â¬â¢s notice called Kuso Sugan (Ou-SuÃ¢â¬â¢ letters) lying behind a screen. Overcome with joy he picked it up and proceeded to read it several hundred times. When he learned of this, his father King Taejong said,Ã¢â¬ why do you let your body suffer so, as if you were a scholar preparing for the state examination?Ã¢â¬ Eve n so King SejongÃ¢â¬â¢s desire to learn grew even stronger when he became king and began to attend the Kyong-yon, where he learned and discussed Confucian classics and historical texts with the countryÃ¢â¬â¢s most
Saturday, December 14, 2019
INTRODUCTION The act of the National Revenue Authority came into being on 13 September 2002. The National Revenue Authority has a mandate to administer and collect all taxes, revenues and all penalties as stated in the NRA act. The purpose of the National Revenue Authority is to serve as a central body for the collection and assessment of national revenue. We will write a custom essay sample on The Impact of Donor Funding on Nra- Sierra Leone or any similar topic only for you Order Now The implementation procedures and policies by the National Revenue Authority will ensure that revenues are collected efficiently by enforcing specified laws through the provision of robust administration. However, the capacity of the NRA was inadequate to efficiently perform its mandates and mobilize the revenue needed for the socio-economic development. Against this background, several donor organizations including Dfid opted to support the capacity building drive of the NRA. This study focuses on Dfid as one of the major donors supporting the NRA. I will attempt to analyze the impact of Dfid intervention in NRA, with specific focus on staff capacity and revenue mobilization. IMPACT OF DONOR FUNDING ON THE OPERATION OF NATIONAL RENVENUE AUTHORITY With Dfid funding in July 2009, to strengthen the performance of NRA through ensuring compliance with international trade agreements, improving business processes and developing staff capabilities. Crown Agents was contracted to provide technical assistance to the National Revenue Authority (NRA) in the Modernization Plan to target a benchmark wherein the institution (NRA) transforms into modern and effective medium through which to secure vital state revenues and to ensure that the newly implemented Goods and Services Tax (GST) is viable and robust wherein NRA will have in place effective compliance management procedures. This reform program has designed to deliver efficient and equitable customs and tax administration procedures to target international practice. Through its continuing support program to NRA, the Department for International Development (Dfid) has pledge its assurance to achieve the overarching poverty alleviation and the reduction of dependency on foreign aid through the effective collection of revenue which has gradually increase domestic revenue to build the nation from 65% dependency on foreign donors in 2000 to 40% in 2010. The modernization program carried out by crown agent sponsored by Dfid encompassing the following areas: ? Integrated Revenue Management Program- This area focuses on Customs Modernization, Administrative Reform on Domestic Taxes, and the Implementation of Goods and Services Tax (GST). It also looks at the review of laws, procedures and structures to bring them in line with International best practice and to improve NRAÃ¢â¬â¢s revenue collection base. This modernization component will involve capacity building in improving taxpayers audit and compliance management and assist in the establishment of a new Domestic Taxes Department that will merge GST and Direct Tax operations. Human Resource and Institutional Development Program- This modernization program is aimed at developing the human and institutional resource base of NRA by equipping it with modern performance management systems and procedures. Information systems should be enhanced under this program, change management strategies and improved monitoring and evaluation systems throughout the organization. ? Taxpayer Information and Educational Program- This modernization program is aimed at changing the taxpaying culture in Sierra Leone through better information to the public and by assisting individual taxpayers to understand their tax obligations. Consolidation of the Strategic Management Program- This modernization program focuses on the development of the NRAÃ¢â¬â¢s Strategic Management capacity and institutional footprint with international procedures and policies. Having gone through this modernization program, Dfid contracted another agency known as United Nations Conference on Trade and Development (UNCTAD) in the provision of ASYCUDA to: ? Abolish the bureaucracy and administrative hard work for both the business community and NRA. ? Reduce the time used in processing and clearing of imported consignments under the previous manual system. Reduce revenue leakages and increases the collection of revenue ? Create transparency in the Customs administration of imports and exports departments in Sierra Leone. ? Assists the Customs Officers in providing consistent, fair and equitable treatment of all traders in applying the legal and regulatory framework ? Create equality and fairness among traders about response service and obligations. ANALYSIS ON THE IMPACT OF DONOR FUNDING ON THE OPERATION OF NATIONAL RENVENUE AUTHORITY Having looked at the impact of donor funding on the operations of National Revenue Authority (NRA). Their involvement in developmental activities in strengthening the performance of NRA through ensuring compliance with international trade agreements is far yet to be achieved base on the modernization plan, but having said this, progress is on the way which has created an impact on the operations of the institution. Analyzing further, as to what the donor funds have done in the operation of National Revenue Authority may be highlighted below. ? Enable senior management to focus on the Ã¢â¬Å"strategicÃ¢â¬ issues, which will inevitably arise within individual Program and the overall Plan itself, leaving tactical decisions to middle managers. Minimize leakage and other revenue losses by reducing discretion, curbing smuggling, and instituting systems and control. ? Increase revenue collection by improving on the efficiency of the current revenue administration and then expand the revenue base by tapping into new taxpayers, facilitate trade, take advantage of opportunities and deal w ith challenges in the revenue administration environment. ? Reduce existing arrears to 5% using persuasion where necessary or litigation ? Improved and enhanced tax administration by computerization of operational and administration system. Develop and implement a robust monitoring and evaluation system ? Effectively monitor and control bonded warehouses to ensure compliance with laws and regulations, and verify inventories and internal controls on a quarterly basis. National Revenue Authority benefiting from donor partners has created an impetus on its operations. Therefore, having implemented all the modernization plans will help NRA to increase their revenue collection base by strengthening the capacity of staffs. The introduction of GST under the integrated management program as one of the modernization plan has help NRA to increase the Domestic Revenue which has reduced the dependency of foreign donors in our economy. The launching of ASYCUDA will reduce the bureaucratic and administrative work on both NRA and the community in reducing the time spent on processing and clearing of imported consignments under the previous manual system. ASYCUDA will reduce revenue leakages and increase revenue collection and transparency in the Customs administration of imports and exports departments in Sierra Leone. CONCLUSION Donor funding has increasingly affected the operation of National Revenue Authority in diverse ways and as a result, to that, revenue generation has increase tremendously, which has reduced the dependency on foreign donors. Modernization plan is a funded program by Dfid but contracted Crown Agent in the implementation of the plans and they further contracted UNCTAD in the provision of ASYCUDA in reducing revenue leakages and the increases revenue base. It further reduced the bureaucratic and administrative work on both NRA and the community. References: Revenue and tax Policy Unit- MOFED Modernization Unit- NRA Website How to cite The Impact of Donor Funding on Nra- Sierra Leone, Papers
Friday, December 6, 2019
Question: Describe about the Authentic Learning for Young Gifted Children. Answer: Context: According to (Gulikers, Bastiaens and Martens, 2005), the teachings regarding the authentic learning environment leads to larger performance and also helps in improving the intrinsic motivation of the students. Authentic learning environment offers a platform for the students to grow their knowledge and skills that would be useful in their life. According to (Reid and Romanoff, 2016), in the extensive Mecklenburg school, thousands of children are identified as gifted and are also tackling the real world problems. The reflective and authentic performances assessments are done by the teachers, students and community members in order to show the students that they understand truly. The gifted students have extraordinary problem solving skills in intelligences. The formats for gifted program are widely varied at 83 elementary schools. Early identification along with intervention is necessary for their growth and development. There is no formal consensus on the definition of young gifted children (Sternberg Davidson, 2005), yet there are some traits that all young gifted children share with. Young gifted children usually display significant advancement in various domains such as superior memory, creativity, strong reasoning, strong visual-spatial capacity, early language and intensive vocabulary, vivid imagination, independent investigations, desire to search for personal identity and social connections, capacity of analysis, synthesis and evaluation by using higher order thinking (Gardner; 1999; Harrison, 2004) though a single gifted child may not demonstrate all of these characteristics. They tend to display great curiosity and a variety of interests with an inquisitive mind to learn and to explore. They show strong analytical and meta-cognitive skills, enjoying problem solving, preferring complex tasks, and actively engaging in planning, monitoring and evaluating in the learning process (Steiner Carr, 2003; Kanevsky, 2011). As per the research undertaken by Adel son, McCoach, Gavin (2012), the set of courses and the instructional changes that are depicted in this case helps in modifications with emphasizing on the steps which are undertaken for the purpose of employing the open-ended problems for the purpose of creating the initial stimulus for the purpose of learning. The effectiveness seems to be developed with focusing on the field testing related to the student creativity and productivity, personal and social development of student and the students self-efficacy (Sousa, D., 2009). Authentic learning will allow the students experiment themselves and giving an opportunity to fulfil their curiosity. All this poses a challenge to the teaching practices in the traditional classroom where students play a passive role and focus on abstract and decontextualized concepts of little apparent relevance, (Hill Smith 2005,p. 22) and where limited opportunities are provided for the children to plan their learning activities, to collaborate with team members and to reflect on their own learning process. Students are not reduced to mere collectors of facts and procedures, but actively construct knowledge connected to the real-world matters and problems of their interest (Eiserman, Lai, Rushton, 2015). In the authentic activities, learners are given opportunities to collaborate with their team members, develop higher-order thinking skills, apply interdisciplinary knowledge to produce beyond domain-specific learning outcomes, integrate assessments and reflections seamlessly within the learning activities, use different resources and view the tasks form different perspectives, which can lead to competing solutions and diversified outcomes(Herrington, et al. 2002). As refined and further developed by Hill and Smith (2005), the Theory of Authentic Learning is characteristic of 10 linked factors: mediation, embodiment, distribution, situations, motivation, multiple illiteracies, identity, career planning, human relationships and teac hing attitudes. In such an environment, culture, cognitive and affective, context and collaboration are interrelated; curriculum, instruction and assessment interact with each other and teachers guide students and create for them a variety of authentic learning opportunities to connect them to the complex real world (Kuo, Maker, Su, Hu, 2010). As per the analysis made by the Van Tassel-Baska, Feng, Evans, (2007), depicts the changes of various perceptions which are depicted for monitoring the gifted programs in order to create an open world. The numerous dynamic tests are created in this research for specifying the aspects of the particular curriculum and the non verbal tasks for the establishment of cognitive changing ability is generated in order to increase the general capacity of the students (VanTassel-Baska, Feng, Evans, 2007). Purpose and Research Questions: The purpose of the study is to explore authentic learning approach applied for the education of young gifted children. The research questions are as follows: What are the needs of the young gifted children? What curriculum design can be adopted to help to satisfy the needs of these young gifted children? How does authentic learning theory function to meet the needs of the young gifted children and the corresponding curriculum design? Theoretical Framework A constructivist epistemology will be applied to view learning as an active process in which students are engaged in the construction of meaning and knowledge in the authentic learning environment and teachers foster motivated students with developmental appropriate curricular and provision for the young gifted children. Essay Page 2 Methodologies Qualitative methodologies will be applied to the research of exploring the topic of authentic learning for the young gifted children in depth and in detail and to benefit from the fruitfulness and often greater depth of understanding we can derive from qualitative procedures. (Berg, 2007, p2). A portfolio of two models will be established based on an extensive literature review and further modified based on on-going research observations and results to address two interrelated aspects of the research: an authentic learning model and a teacher development model. The 10 linked factors from the Theory of Authentic Learning by Hill and Smith (2005) will be incorporated into the authentic learning model and the hermeneutics method will be applied to further reframe it in the context of the young gifted children. Two classes of gifted children from 5-6 years old as well as their teachers will form the exemplars of the research. Triangulation will be applied by multiple stakeholders, data a nd methodological sources to achieve credibility and confirm ability of the date collected. The evidence can be teacher observation and notes in classes, research team participant observation, videotapes of students, in-depth interview with teachers and students, a survey with parents, student products, student weekly reports, and peer/self evaluation questionnaires. The teachers participation will be documented and evaluated, which will provide feedback to the teacher development model to strengthen their skills so as to ensure dependability and transferability of the data and research(VanTassel-Baska, 2013). The research project is viewed from a developmental perspective; the teacher acts like the action researcher and all stakeholders feedback will be incorporated into the two models on an on-going basis to build up developmental appropriate practices. Due to the young age of the research subjects, the research will be conducted under a full ethical review. The researcher will collect information and data from the teachers, people of school boards and principals. The researcher will conduct interview with them in order to determine and analyze their perspectives and perception towards Authentic learning for the young children (Flick, 2009). With the help of qualitative analysis, the researcher will be able to understand their views towards Authentic learning for young children as well as the necessary steps that has been taken for the development of authentic learning (Myers, G, T., 2016). It will also help to evaluate the learning model and teacher development model that will be adopted for the development of young gifted children. The research will apply discursive approach to explore their efficiency level while interacting with the participants. The focus of the strategy will vary from the use of language at micro level to social processes, practices and experiences of the participants at the macro level. The discursive research wil l help to determine the language and culture of the participants which is important during the interview process (Scruggs and Mastropieri, 2006). The documentary analysis is the social research method which is an important tool for research to analyze and interpret information and data. The information and data collected from the participants will be analyzed with the help of documentary analysis. The interview process will help to gather data and information about teacher development model and authentic learning model (ihmgwalior, 2016). Contribution to Advancement of Knowledge: Authentic learning approach provides an effective and efficient solution to address the concerns and characteristics of the education of the young gifted children. Authentic learning has been addressed in the settings of higher education, secondary education, and technology education and for children with academic abilities at the lower end of the spectrum, yet very little empirical ( Note: Is it suitable to use this word if I use qualitative methodology in this research?) or theoretical research has been conducted in the field of giftedness education(Williams, 2009). And up till now no research has been done regarding how the authentic learning approach functions in the setting of young gifted children, which makes this study a pioneer in the research area, endowing it with far reaching meanings and significance. Background and Experience: As a first year PhD student, I am currently taking courses such as Curriculum Design with my supervisor, whose expertise and research strength include qualitative methodology, theory of authentic learning, multiple intelligences, problem/project-based learning and curriculum theory and development. I have a diversified, multi-disciplinary and interdisciplinary background in both the academic and professional domains at the higher level in education, language and literature, management, project management, culture and technology with several Masters degrees and working experiences in the federal government and educational sectors. My experience of being a gifted student myself and mom of a young gifted child also provides me with some insight and perceptions in the research area. The researcher will conduct documentary analysis and data collection process in order to determine and evaluate the research topic. Bibliography and Citations Adelson, J., McCoach, D., Gavin, M. (2012). Examining the Effects of Gifted Programming in Mathematics and Reading Using the ECLS-K.Gifted Child Quarterly,56(1), 25-39. Al-Hroub, A. (2011). Developing Assessment Profiles for Mathematically Gifted Children with Learning Difficulties at Three Schools in Cambridgeshire, England.Journal For The Education Of The Gifted,34(1), 7-44. Berg, Bruce L. (2007). Qualitative Research Methods for the Social Sciences, Sixth Edition, Pearson Education Inc. Dean, G. (2008).English for gifted and talented students, 11-18. London: Sage. Eiserman, J., Lai, H., Rushton, C. (2015). Drawing out understanding: Arts-based learning and gifted children.Gifted Education International. Flick, U. (2009).An introduction to qualitative research. Los Angeles: Sage Publications. Gardner, H. (1999). Intelligence Reframed: Multiple Intelligences for the 21st Century, Basic Books, New York. Gulikers, J., Bastiaens, T. and Martens, R. (2005). The surplus value of an authentic learning environment.Computers In Human Behavior,21(3), 509-521. doi:10.1016/j.chb.2004.10.028 Harrison, C. (2004). Giftedness in Early Childhood: The Search for Complexity and Connection, Roeper Review, 25, 78-84. Herrington, J., Oliver, R., Reeves, T. C. (2002). Patterns of Engagement in Authentic Online Learning Environments, Australian Journal of Educational Technology, 19, 59-71. Hill, A.M. Smith, H. A. (2005). Research in Purpose and Value for the Study of Technology in Secondary Schools: A Theory of Authentic Learning, International Journal of Technology and Design Education15, 19-32. Kanevsky, L. (2011). Deferential Differentiation: What Types of Differentiation Do Students Want?, Gifted Child Quarterly, 55, 279299. Kuo, C., Maker, J., Su, F., Hu, C. (2010). Identifying young gifted children and cultivating problem solving abilities and multiple intelligences.Learning And Individual Differences,20(4), 365-379. Reid, C. and Romanoff, B. (2016). Repr 21 October 1997, https://web.csulb.edu/~arezaei/ETEC444/discussion/assessing%20gifted.pdf Scruggs, T. and Mastropieri, M. (2006).Applications of research methodology. Amsterdam: Elsevier JAI. Sousa, D. (2009).How the gifted brain learns. Thousand Oaks, Calif.: Corwin. Stein, G. Poole, P. (1997). Meeting the Interests and Needs of Gifted Children: A Strategy for Teaching and Learning, Early Child Development and Care, 130, 15-19. Steiner, H. H. Carr, M. (2003).Cognitive Development in Gifted Children: Toward a More Precise Understanding of Emerging Differences in Intelligence,EducationalPsychologyReview, 15, 215246. Sternberg, R.J. Davidson, J. E. (2005). Conceptions of Giftedness, 2nd Ed, Cambridge University Press, Cambridge, UK. VanTassel-Baska, J. (2013). Performance-Based Assessment: The Road to Authentic Learning for the Gifted.Gifted Child Today,37(1), 41-47. VanTassel-Baska, J., Feng, A., Evans, B. (2007). Patterns of Identification and Performance Among Gifted Students Identified Through Performance Tasks: A Three-Year Analysis.Gifted Child Quarterly,51(3), 218-231. Williams, C. (2009). Interactive Writing as Informed Assessment with Highly Capable Young Children.Gifted Education International,25(1), 14-21. ihmgwalior,. (2016).RESEARCH METHODOLOGY.www.ihmgwalior.net. Retrieved 25 October 2016, from https://www.ihmgwalior.net/pdf/research_methodology.pdf Myers, G, T.,. (2016).Research Methodology by Numbers a teaching tool.Ejbrm.com. Retrieved 25 October 2016, from https://www.ejbrm.com/issue/download.html?idArticle=258
Friday, November 29, 2019
Darwinism Darwin doesn't work here any more Richard Milton spent some twenty years studying the geology and palaeontology of the British Isles before writing Shattering the Myths of Darwinism. It was the absence of transitional fossils?that first made me question Darwin's idea of gradual change. I realised, too, that the procedures used to date rocks were circular.?Rocks are used to date fossils: fossils are used to date rocks. From here I began to think the unthinkable: could Darwinism be scientifically flawed? I became an almost daily visitor at the Natural History Museum, looking more closely again at all the famous evidence I had been taught about:?the evolution of horses, Archaeopteryx -- half-reptile, half-bird -- the peppered moth, the?Galapagos finches and all the other totems of Darwinism. One after another they crumbled as I subjected them to even routine journalistic scrutiny.?At first I thought I must be mistaken -- then I began to discover one by?one the many scientists around the world who had already realised the emperor has no clothes, but who cannot speak out without jeopardising their careers and even their jobs. At this point my long years as a journalist took over and I started turning over stone after stone and making one amazing discovery after another. Human Sexuality
Monday, November 25, 2019
Themes of Toni Morrison essays Incorporating jazz music with the lives of African-Americans during the 1920s, Toni Morrisons Jazz is a wonderful story about slavery and spirituality. Jazz is an extension of Morrisons previous novel, Beloved, which was about the lives of African Americans during the late 1800s. Jazz explores the topics of love, passion, tragedy, jealousy, and survival. Toni Morrison goes above and beyond other authors by integrating all different subjects into one story, and by presenting some important messages to her readers that no one else would. Toni Morrison was very successful in incorporating spirituality, hope, and the will to survive hard times, making her novel thought provoking and inspiring. Jazz is about a middle-aged couple who migrated to Harlem from the South in the early 1900s. Joe Trace was a waiter and a cosmetics salesman, and his wife, Violet, was a hairdresser. In the book, Morrison describes the cruel life that black farmers endured during that time. At first, Joe and Violet are excited about the idea of living in New York. However, after the move, some things happened that were far from enjoyable. An example of this is when Joe had met a girl named Dorcas whom he had fallen in love with. But when Dorcas tries to leave Joe, he kills her. Throughout the book there is a continuous mix of happiness and tragedy, making the emotions of the reader change almost every time they turn the page. Toni Morrison wrote this novel in order to get others to understand just how hard it was for African-Americans to live back in the 1900s because of the prejudice they were faced with. Toni Morrison goes above and beyond other authors by integrating all different subjects into one story, and by presenting some important messages to her readers that no one else would Despite having different characters and a new location, Jazz is definitely a continuation of the story, Beloved. This is known because Be...
Thursday, November 21, 2019
Measurement and Scaling Concepts - Essay Example To Joppe (2000), validity determines what is intended to measure or how truthful the research results are, while Wainer and Braun (1998) further describe validity in quantitative research as, the Ã¢â¬Å"construct validityÃ¢â¬ . This Ã¢â¬Å"constructÃ¢â¬ is considered as the initial concept, question, notion, or hypothesis which determines the kind of data that is to be gathered and the manner on how it is to be gathered. Researchers can normally determine validity through asking a series of questions, as well as what will often come across from the answers in the study of others (p. 1). Reliability on the other hand, is the measure whether the research is repeatable; it determines to which extent a measure is comparatively free of random error or is consistent to the specified scores assigned to objects or events (Dipboye, Smith, & Howell, 1994). Kirk and Miller (1986) identified that there are three types of reliability which relate to: (1) the extent to which a measurement, agreed repeatedly, remains the same (2) measurementÃ¢â¬â¢s stability over time; and also (3) the similarity of measurements in a given time period (pp. 41-42). Charles (1995) added that, reliability can also mean a high degree of stability, which can be verified through replication of outcomes. In the business sector, according to Miglautsch (2005), any conceptual definition is referred to as an thought or abstraction of techniques as well as practices which include the limitations related to the adoption or application of the definition. Possibly, no one definition will entirely describe the concept, as dissimilar definitions are used for diverse purposes. A "good" conceptual definition should be used in a clear, precise, and complete manner as much as possible. In addition, Operational definition provides the variable/s the meaning based on how study is utilized to a particular study. In view of the fact that the meaning of the study rests on the manner as to
Wednesday, November 20, 2019
Swot analysis of BP - Essay Example The company is responsible for converting natural resources into power energy. Now British Petroleum is trying to find fuel resources that reduce carbon footprint and greenhouse gases. The company is trying to accomplish its sustainability mission by finding alternative fuel resources like wind power, solar power, fossil fuels, hydrogen, and natural gas. On the basis of market capitalization British Petroleum is the second largest operating oil and gas company of United State and has number of strengths. First, the strength of the company lies in its successful operations and ability to generate high revenue. Just after a year of the most annihilating oil explosion occurred at British PetroleumÃ¢â¬â¢s oil resource in the Gulf of Mexico, the company successfully earned profit of $5.3 billion Stonaker, (2011). This shows the strength of the company because it recovered very soon. It has been argued by many researchers that the oil spill occurred due to mismanagement and poor safety precautions but the quick recovery and ability to bounce back shows how efficient the company is in its operations. Second, important strength of BP is its increasing demand. Bob Dudley in his speech said that the demand of British PetroleumÃ¢â¬â¢s products is continuously increasing day by day due to our efficient production and supply, and our search for oil and gas reserves is one of our greatest strength. He further said, 96% of our demand growth comes from developing countries like India and China, this shows we are still market leader in oil and gas industry around the globe. One, criticism on Mr. DudleyÃ¢â¬â¢s speech is that he disguised the potential problems that BP is facing in setting up its operations in emerging countries due to their poor law and order situation and terrorism. Petroleum is leading deep-water company because it possesses largest deep-water oil spills and these oil spills
Monday, November 18, 2019
Comparing Malcolm X and Dr. Martin Luther King, Jr - Essay Example This saying can easily be proven when we want to discuss two people who represented the same ideology in history such as Malcolm X and Dr. Martin Luther King, Jr., who both represented the liberation and freedom of the Black race in America. Indeed, as much as there were some aspects of similarities in the way they went about advocacy programs, there also exists so much lines of differences for what they lived for (Haberman, 1972). In this paper, Malcolm X is compared with Dr. Martin Luther King, Jr. to understand the various perspectives from which each of them approached the fight for the protection of human rights, which they both loved to do greatly. The perspectives from which the comparison shall be taken from are in the areas of political goals, economic issues, and strategic approaches. Political Goals Politically, it has been noted that both King and Malcolm were pressing to achieve the same goal, which was the goal of all inclusiveness in the running and administration of p ublic political office. It is not surprising therefore that at a time that not much of open air and public politicking was associated with acts of religiosity both men came out of their shelves to strongly campaign for political equableness (Malcolm, 1964). In line with the above, it can also be established that politically, both Malcolm and King had a goal of proving to the world that service to God could not be complete and appreciated if social and economic equality was not achieved for all people regardless of their racial background. This is because in their private practice as ministers of the Gospel, both men understood the oneness in GodÃ¢â¬â¢s creation and view of humankind, where there was not supposed to be discrimination of people based on whether they were Jews or Gentiles (King, 1967). With this biblical understanding of the view of God about all men, the leaders wanted there to be a political reflection of such whereby people will not be judged based on the color of their skin but the content of their character as King declared. Economic Issues Economically, both Malcolm X and Dr. Martin Luther King, Jr. had a common goal of liberating the oppressed and abused American from poverty. This is because through words and deeds, Malcolm and King showed that they lived for an era and moment in time when the poverty that the various forms of discrimination had brought on people could be minimized (Haberman, 1972). However in terms of approach to economic issues, the two men have been identified to have had two contrasting perspectives and opinions as to how the approach should be. For instance it has been said that Malcolm had a realization that even though economic liberation and the eradication of poverty among the discriminated, such the African-American people was necessary, it was also very necessary that the African-American people built self-consciousness and pride for themselves (Malcolm, 1963). What this means is that Malcolm saw the answer t o economic liberation in the African-American people themselves, through their attitude towards self-consciousness, rather than through
Saturday, November 16, 2019
Problem Solving Process Wheel (PSP) Model TABLE OF CONTENTS THE MODEL (NAME DESCRIPTION) THE REASONS OUTCOMES PROBLEMS IDENTIFIED SOLUTIONS FOR THE PROBLEM EFFECTIVNESS OF THE MODEL REFERENCES THE MODEL (NAME DESCRIPTION) The model that I have chosen to address the given problem is Victor NewmanÃ¢â¬â¢s PROBLEM SOLVING PROCESS wheel (PSP) model with that of the IDEAL framework model. The PSP model involves problem solving process that is divided into 8 steps. These eight points can be used as reference to manage the problem in hand. The psp model breaks down the problem into eight areas which then can be handled more efficiently and easily. The model is primarily divided into three areas as shown in figure- The FOUNDATION region comprises of three steps Identifying the problem Gathering the data Analysis of Data. The GENERATION region having two steps- Generating different solutions Selecting solution The EXECUTION region comprising of Ã¢â¬â Plan Test and rehearsal Action The following steps have been shown in the diagram- THE REASONS As I was going reading through net and various other sources I could related the fact that this model is similar to scenario where the captain in chopper has advantages as he can have a aerial view of the battlefield. That is it provides a opportunity to see big picture and manage our resources of time people and attention .The model helped me manage my tactics with background of a strategic model. So it enables me to give my attention on a particular area while simultaneously keeping in check the overall strategy. Its a combination of simplicity and accessibility. The model helps looks beyond the conventional techniques of problem solving to the underlying process. The eight identified stages explain how to recognize which technique is appropriate to which stage. Also I have chosen IDEAL framework along with this model though in very little percentage, because this framework gives systematic analysis which is required in the given problem and also it involves anticipation. OUTCOMES The first phase is the foundation phase in this model. Foundation phase involves the identified problems which in the given problem are that the staff is huge and most members are not aware of GROUPWISE. A small proportion of the staff is also not familiar with e-mail, they are novices. Also small number of staff shares computers. The data gathered from the given problem states that there is approximately a staff of 1200 .Most staff is familiar with Pegasus. Half of staff are academic, half are administration and management. There are three campuses of WINTEC in Hamilton, 1 in Auckland, 1 in Thames and 1 in Te Kuiti. Now comes the generation part where various solutions are generated. Planning has been carried out carefully keeping in mind the minutest of details which have been discussed further in solving the problem section where varies ways of addressing the problem have been taken up. Though action will taken first before testing and rehearsing as only after action we will be able to analyze the pros and cons of solution. PROBLEMS IDENTIFIED Problems that can identified from the given case is that there are- In total 6 campuses where installation of Group wise electronic diary application is required. There is good number of staff of 1200,most of them have never use the application. They are familiar with Pegasus. The staff members but covers all levels of computer expertise, from total novice to high power users fully experienced in programming, web designs, database management etc.. The semester teaching terms for the institute run from early February until late November with breaks in April, June and September. Summers school runs from late November to late January . No adequate number of systems for staff to work on Lack of internet excess major problem SOLUTIONS FOR THE PROBLEM With help of psp model and the now coming to generation phase Ã¢â¬â First the staff of 1200 should be divided into sub categories of the pro users and amateurs/novice users. That is division of staff in terms of two groups which comprises of a first group that has high power users fully experienced in programming ,web designs and database management. This group Ã¢â¬ËAÃ¢â¬â¢ should be further divided into groups of database managers, web designers and programmers. The web designers will design a website for WINTEC so that various systems in different campuses can remain in contact. The programmers will design programmes so that data base of each member can be maintained along with salaries and fees respectively and other basic details .the last group will be of data managers will collect and maintain data from the program designed by programmers. The Group Ã¢â¬ËBÃ¢â¬â¢ will have those who are new to system, emails amateurs etc. this group will be further divided equally in number across all campuses. Each group will have minimum of two managers who will come from Group A to teach the basics of system emails etc to them on regular basis and monitor their report. Further division of the computer lab spaces into different categories according to usage will be there . An ordinary lab set-up where general software including documentation tools that do not require much computing power will be there. In this way the staff members who have never used GroupWise and those not aware of basics shall be able to learn and contribute. All the lab spaces should be equipped with adequate number of systems as there are less number of systems as staff has to share with each other which may be of inconvenience plus time hampering Each campus lab will have a server which system which will be connected to the server of system in the other campus. That means there will be 6 servers in the network of WINTEC. Installation of wifi routers in each campus should be made mandatory with high security concerns because GroupWise will be web based so as to make it accessible to whole of the staff. This will solve the problem of lack of internet access problem. The integrity and security brief for the net access will require a setup that would allow student and staff access from their labs by connecting through the campus network but restrict general student access and prevent any campus IT traffic running over the link. This concern will also be kept in mind. Next big problem comes of installing and setup of the systems and soft ware across the campuses. Keeping in mind that regular teaching is not disturbed in campus which will include providing non disturbance atmosphere to the academic staff aswell.so all the installation setup should start April as this is the first month of break period and after that there are regular breaks in month of June which comes after May and then in September so starting installation in month of April will give adequate time to start process and work in full swing without hindrance as campus will be closed for students ,creating a win win situation for both students and academic staff and the installers. Though the work will slow down in May but again it can be started with full swing in June which is again a off month. as summer school runs from November to January, this April period will be the apt time to start installation across the campus of GroupWise application. In this way the WINTECH will have it campuses transformed its computer lab to a place not simply where students and staff could learn how to use software tools, but as somewhere where they can experience the GroupWise. EFFECTIVNESS OF THE MODEL It is important that the model which is selected for analyzing and addressing the problem is simple yet effective in use. The PSP model has been very responsive to my needs of the given problem.the quality of the model to map problems and attack them has rendered the problem a easy hand. Problem solving is usually very stressful. One is required to remember the process sufficiently as well as to picture it in oneÃ¢â¬â¢s head and interpret it. The eight step model provides easy way to given problem with giving ample space to plan and implement as well as develop ideas. Its effectiveness can be seen in the model working where one can draft initial problem, gather and analyze some data and confirm it. The models has steps in which data is gather and analyzed, which is important because often problem is overlooked when gathering of data is there which usually has step of taking action unlike this model which involves analysis. The IDEAL framework was no matter how little but was taken into consideration because the problem required to take in to account the systematic analysis as installation was to be carried out in efficiently smoothly and cost effectively. REFERENCES Basic points and ideas from: https://www.msu.edu/~dwong/CEP991/CEP991Resources/Johnston-DeweySciAesth.pdf http://www2.gre.ac.uk/about/schools/business/about/departments/sms/staff/victor-newman generating a solution and points from: http://www.microsoft.com/casestudies/Microsoft-System-Center/University-of-Incheon/Using-a-Computer-Lab-as-the-Starting-Point-for-Students-Cloud-Computing-Experience/710000000867 model description and EFFECTIVNESS points were taken from: http://books.google.co.in/books description also taken from: http://www.ashgate.com/isbn/9780566075667
Wednesday, November 13, 2019
Ronald Frank2004-05-03T00:58:00 Beyond the Urals Semyonov, Yuri. Siberia: Its Conquest and Development. Baltimore: Helicon Press, 1963. 414. What would motivate men to venture into some of the harshest areas on Earth, often with a small amount of supplies and an overwhelming chance of not returning alive? Plenty, argues Yuri Semyonov, Ã¢â¬Å"plenty of freedom, plenty of natural resources, and little authorityÃ¢â¬ (86). Yet, Siberia: Its Conquest and Development if far from a simple retelling of several adventure tales. What the author presents is a comprehensive history of Siberian exploration spanning roughly 500 years, complete with thorough analysis of the political, cultural and economic factors that were at play throughout. Semyonov begins with a brief introduction of Russian history prior to ErmakÃ¢â¬â¢s journey, discussing key forces ultimately responsible for SiberiaÃ¢â¬â¢s conquest. All the important expeditions from Ermak, to Deshnev, to Bering are discussed in great detail. Certainly the story of Ermak drowning in his heavy armor has not gone untold; throughout the book Semyonov gives both historical facts and traditional legends in order to create a more complete picture. Siberia covers a broad range of geographical locations, including Siberia, Alaska, and even touches on Hawaii and Japan. In effect, any area related to Siberian conquest is given attention. Yet, just as the title would have you believe, Siberia: Its Conquest and Development, at its heart is still...
Monday, November 11, 2019
A Responds to a Short Story Entitled Ã¢â¬Å"We Might As Well Be StrangersÃ¢â¬ by M. E Kerr Sofyan Widianto 0909032 English Literature Indonesia University of Education 2012 Based on my understanding to the short story Entitled Ã¢â¬Å"We Might As Well Be StrangersÃ¢â¬ written by M. E Kerr, after close reading and deep thinking to the short story I bravely assume that the short story shows the independency of a woman. The independency of a woman is shown through the main character in this story. The main problem in this short story discusses about Alison that isdescribed as a teenage girl who is lesbian to Laura, her best friend.It will be explained in the textual evidences below. Ã¢â¬Å" No, thatÃ¢â¬â¢s first. Frist am going to say that there was no need to announce it. You think I donÃ¢â¬â¢t know whatÃ¢â¬â¢s going on with you and Laura? I donÃ¢â¬â¢t need eyes in the back of my head to figure that outÃ¢â¬ . Ã¢â¬Å"I canÃ¢â¬â¢t do anything about it, can I? I see it ev ery time you bring her here. I would like to believe itÃ¢â¬â¢s a stage youÃ¢â¬â¢re going trhought, but from what IÃ¢â¬â¢ve read and heard it isnÃ¢â¬â¢tÃ¢â¬ . The certain conversations above are the speech that are told by AlisonÃ¢â¬â¢s mother that indicate that Alison is a lesbian.ItÃ¢â¬â¢s also supported by the speech of Alison Grand mother. We can see on the textual evidance below. Ã¢â¬Å"So you donÃ¢â¬â¢t have to tell me about what it feels like to be an outsider. You donÃ¢â¬â¢t have to tell me about prejudice. But, Alison, I thank you for telling me about your self. IÃ¢â¬â¢m proud that you told me first. Ã¢â¬ Both of speech acts told and emphasize implicitly about Alison identity as a lesbian. As the explanations before that in this story Alison represent the independency of a woman, Alison decides to choose her own way to be a lesbian.It is shown in the conversation between she and her mother. We can see it from the Alison speech trough the conversation b etween she and her mother. Ã¢â¬Å" mom itÃ¢â¬â¢s not a choice. Was is a choise when you felt in love with Dad? Ã¢â¬ Ã¢â¬Å"most definetly i chose him! Ã¢â¬ We can see that Alisson starts to chalange her mother about a logical opinion about love. Lets see the other interesting on the conversation below. Ã¢â¬Å" So what if the world was different, and men loved men and women loved women, but where still you? What would you do?My mother shrugged. Ã¢â¬Å"Find another world, I guess. Ã¢â¬ Ã¢â¬Å"So thatÃ¢â¬â¢s what I did. I found another WorldÃ¢â¬ . From the speech from Alisson above it obviously shows the independency of her to make a descion to her own life. She says that words to her mother explicitly. For me, that speech is the most powerful evidence of Alison, and it indicates the independency of her. From the explanation above i bravely conclude that the potray Alison in this short story represents the independency of women to decide and to choose what women really w ant to do.
Friday, November 8, 2019
Informative Essay Sample on Personal Conflict Resolution While anomalies and there occurrence is an inevitable phenomenal in life. Early childhood exposure plays a fundamental role in conceiving and curtailing these problems and alterations that are manifested deep and wide in our contemporary society. We face disagreements in all aspects of our lives; in social institutions, between friends or individuals, in our own homes and the neighbourhoods and many walks in our very existence. Richards, .H, K, (2005) Conflict emanate from petty issues triggered by misconceptions, or where warring factions are perpetrating malicious if not mischievously ulterior motives. Anathemas in life are also evident in scenarios where people meeting on a common table have vested interest in achieving particular objectives, for instance the recent bouts by parliamentarians in Bolivia could only magnify the impossibilities of arriving their destined purpose amicably, hence resorting to conflict. Sklair Ritchie (2003) In circumstances where truth is crucified, conflict is ultimately the end result. However, conflicts evolve in myriad dimensions; some could easily be resolved or rather ignored by the mere fact that they lack substantial basis. Ross Weber (1998) most conflict could only be settled before the court of law and such like conflict are rather more complex and require much attention and they are also costly. The forward statement in a conflict scenario is not procrastination; the best prescription for this disease is through resolving, either by consensus building among other strategies. Conventional wisdom is inclined on the school of thought that conflict labors so much energy with the magnanimity so burdensome to disintegrate the social fabric of any civilized society. Since problems in life threaten our very existence, itÃ¢â¬â¢s better to take time to comprehend and evaluate the cause and the impact of a problem; with the right approach in implementing the same, the vice can not evade the justice to be contained. Richards, .H, K, (2005) Managing Conflict When caught up in a dispute, I begin with identifying and defining the anomaly in modes that are neutral; i.e. by muting all the criticism and disdains and also avoiding personal feelings and emotions Ross Weber (1998). I employ open forum approach, which is inclined towards letting other people speak out their opinions, this gives me an opportunity to digest and understand the other side of the coin my side and the truth itself. We have to engage in close talk where both parties have to pose questions expecting particular responses just to confirm the discussion is not falling on deaf ears. Sklair Ritchie (2003) In such like cases, I have had different perception towards the conflict. The irony here is that conflict resolution requires some soberness since most people who cry foul are actually the same proponents the permit most conflicts. So in this amicable discussion, a mutual agreement is a certain outcome package. Ross Weber (1998) : Arriving at a solution entails an open deliberation of the personal convictions. In most cases I prompt my opponent to state what he conceives fit regarding the contentious issue, at this juncture I do extent and olive branch to engage in active listening while critically making the analysis of the same and also formulating my on chain of solutions. This boils down to a conclusive motion aimed at bearing fruits after a cross examination of both our two different perceptions with a consideration of the truth itself. Solutions proportional to our needs and interest is definitely arrived at with little or no friction at all. Richards, .H, K, (2005). What makes any agreement palatable between different entities is the ability to achieve a lasting solution that is agreeable or common and beneficial between two parties. In this case, our solutions are mooted on the basis that is mutually compliant Ross Weber (1998). I avoid to reprimand and shove my perceived policies down my opponentÃ¢â¬â¢s throat. Instead I champion integrity in bountifully finding a liberal verdict to a conflict through merging of both our views as right and well founded precepts. If the worst comes to the worst I have always inaugurated the third party; like a counsellor and as soon as the climax is reached weÃ discuss the implementation aspect of it. Ross Weber (1998) this is also prompted by a vivid evaluation that comes later, geared towards revising arising weaknesses in the agreements. The rationale portrayed in this paper hinges on the notion that personal problems and major conflict in life need to be affirmed as unavoidable realities that critically masquerade as anomalies yet they truly foster progress. Sklair Ritchie (2003) it is however, health to have wrangles in order to chart a way forward with amicable solutions. It also imperative to not that change are immutable laws of nature that enhances progress, in a nut shell we need to accept that problems and life are inseparable entities that should positively, stimulate and transform the way by which we perceive and interpret situations for the ultimate good of humanity.
Wednesday, November 6, 2019
The world came close to nuclear war during the thirteen days of the Cuban Missile Crisis in October 1962. President John F. Kennedy learned from satellite images that Soviets had installed nuclear missiles in Cuba, just 90 miles off the coast of the United States. The president was so concerned because he knew this could result into a nuclear war. If the Russians or Cubans got involved in a confrontation with the Americans they could use the missiles to attack America, which would cause millions of deaths. The president had to be very cautious in his decision. He gathered some of his best men and came up with three plans. Some advisors thought it wasnÃ¢â¬â¢t a big deal and that no action was necessary. Others thought a confrontation with Premier Khrushchev would be good, others thought an air attack on the missiles would stop the problem. Most of the men thought a blockade of all the nuclear weapons entering Cuba was the smartest thing to do. On September 11, 1962 Premier Nikita Khrushchev stated that under no circumstances would missiles be sent to Cuba. On Tuesday, October 16, the American government realized that it had all been lies, one gigantic fabric of lies. The CIA had produced detailed photo showing Soviet nuclear missile installations under construction on the island of Cuba, ninety miles off the Florida coast. One photograph showed missiles pointing at American cities. If these were fired within a few minutes eighty million people would be dead. Soviet leader Nikita Khrushchev hoped to make his generals happy by placing missiles in Cuba. It was a cheaper way to provide some deterrent against a feared U.S. attack than to build many new intercontinental ballistic missiles that could be launched from the Soviet Union. The Soviets were putting these missals in Cuba because they planned for an attack from the US. In 1962, the Soviet had less than fifty missiles that could hit the United States. We had more than five... Free Essays on Cuban Misile Crisis Free Essays on Cuban Misile Crisis The world came close to nuclear war during the thirteen days of the Cuban Missile Crisis in October 1962. President John F. Kennedy learned from satellite images that Soviets had installed nuclear missiles in Cuba, just 90 miles off the coast of the United States. The president was so concerned because he knew this could result into a nuclear war. If the Russians or Cubans got involved in a confrontation with the Americans they could use the missiles to attack America, which would cause millions of deaths. The president had to be very cautious in his decision. He gathered some of his best men and came up with three plans. Some advisors thought it wasnÃ¢â¬â¢t a big deal and that no action was necessary. Others thought a confrontation with Premier Khrushchev would be good, others thought an air attack on the missiles would stop the problem. Most of the men thought a blockade of all the nuclear weapons entering Cuba was the smartest thing to do. On September 11, 1962 Premier Nikita Khrushchev stated that under no circumstances would missiles be sent to Cuba. On Tuesday, October 16, the American government realized that it had all been lies, one gigantic fabric of lies. The CIA had produced detailed photo showing Soviet nuclear missile installations under construction on the island of Cuba, ninety miles off the Florida coast. One photograph showed missiles pointing at American cities. If these were fired within a few minutes eighty million people would be dead. Soviet leader Nikita Khrushchev hoped to make his generals happy by placing missiles in Cuba. It was a cheaper way to provide some deterrent against a feared U.S. attack than to build many new intercontinental ballistic missiles that could be launched from the Soviet Union. The Soviets were putting these missals in Cuba because they planned for an attack from the US. In 1962, the Soviet had less than fifty missiles that could hit the United States. We had more than five...
Monday, November 4, 2019
Electronic Medical Records - Essay Example The objective is to bring out essentials from business hype. These are rated reasonably well in forums (Health Technology Review) While EMR as a terminology gets routinely mixed up with Electronic Health records (EHR's), it is clarified early on that EMR's are different from EHR's. Electronic Medical Records are legal sources of information owned by Physicians and are fed to higher level systems like EHR. So, in our study a Centricity EMR would exchange patient information securely with an EHR like Veterans Health Information Systems and Technology Architecture (VistA) EMR's can be standalone "In Patient" or "Ambulatory systems" facilitating seamless exchange of information. They could be integrated with Practice Management Systems for use in a small practice or scaled adequately for a multi specialty practice. A comparative analysis as in the next section brings out key similarities and features of 3 different EMR systems. eClinicalWorks (eCW) is a leading Scalable Web based EMR system that has capabilities to work in small, mid and large setups. It is extensible and could be integrated with Practice Management systems. As a leader in "In Patient" and "Ambulatory EMR" systems that enhances a physician's ability to exchange information, eCW also decreases a provider's overhead. Physicians could ePrescribe medicines, avoid duplicate prescriptions, reduce costs related to chart pulls, transcriptions, etc. More importantly it offers patient care with accurate information that could be exchanged seamlessly and securely beyond the walls of a clinic or hospital. As per latest information eCW is used by 25000 providers and is well poised to leverage any regulations that may arise from stimulus packages arising out of "The American Reinvestment and Recovery Act of 2009 and the HITECH Act". It is a CCHIT2008 certified product in both ambulatory and child health for its EMR Version 8.0. It complies effectively w ith submission of reports on clinical quality measures. As per usage reports (health technology review), eCW is easy to familiarize with and takes about less time. It supports remote connections to access charts through Virtual Private Network. It can operate in connected and disconnected modes leveraging the latest in technologies. Wireless operations are supported at a provider's desk. A business optimizer helps to generate accurate reports. The user interface is intuitive and easy to navigate. Another competing EMR product is from NextGen Health Information Systems. While this EMR system also meets fundamental meaningful usage criteria like CCHIT certification, ePrescription, secure exchange of patient information and clinical quality measures, it stands out with respect to many others in its use of pre-defined templates catering to multiple practice specialties. This provides additional quality with respect to maintaining standard documentation formats for patient information exchange. Also ePrescription module validates with patient allergies, their existing medications and alerts physicians appropriately. True to its name, NextGen Advantage offers recording facilities for health care outcomes and assists in "Pay for Performance" programs. Its custom work flow
Saturday, November 2, 2019
FINAL DAIVS - Essay Example The deployment of intelligence officers as undercover agents may yield valuable information. The investigations are supposed to be carried out in North Korea shipping terminals, and airports. Though it is a dangerous undertaking, South Korean intelligence can be used. This is because the Koreans have similar culture and language thus detection would not be easy. In addition to human intelligence, signal intelligence can be useful this entails detection of signals of communication between North Korea and Iran. This would enable the agents to know the shipping lines, date and time. As such interception can be easy. Signal interceptors can be schemed to tap signals emanating from North Korea key leaders and also Iran leaders, especially the military leaders. To make sure that the technology is not transported by land, the agency is supposed to alert the various governments involved along the transport corridor to Iran. By doing this, the threat of land transport could be minimized. Agents working on the ground should also have a backup plan in case the plan fails. There should be reinforcement in case their cover is blown. An effective backup may be the US Navy which can extract the persons from danger. Moreover, the navy can also be instrumental in sea interceptions. 2. You lead an analysis team for Army Intelligence. Your team has been assigned the task of determining what conditions will be like in Afghanistan after we draw down our troops, and also to determine if the Strategic Partnership agreement President Obama just signed will hold. Describe what your analysis will cover and what key questions your team needs to answer. What assistance will you need and from what other members of the IC? Afghanistan is a highly tribal country with armed groups read to destabilize the country. Since the ouster of the Taliban, the US troops, alongside NATO has been instrumental in maintaining peace. Afghanistan has a democratically elected government; however, it is
Thursday, October 31, 2019
Sales & Purchasing - Case Study Example This paper reflects on a sales report and an action plan by John Ziegler, a newly promoted sales manager working for Arapahoe Pharmaceutical Company based in Dallas. The market territory occupied in Dallas by Arapahoe pharmaceutical is very ripe with a high number of health facilities and physicians. The amount of physicians contacted by the company throughout the year totaled to fifteen thousand and one hundred, 15,100 as shown in table 2 above. This reflected in the enterprise performance in the total number of sales attained for the year. Totals sales for the year reached an impressive figure of three million, five hundred and fifty-nine thousand, 3,559,000. Sales numbers of this magnitude indicate the excellent effort made by the companyÃ¢â¬â¢s sales department. It is appropriate to note the significant improvement of sales representativesÃ¢â¬â¢ performance from the previous year. Arapahoe pharmaceuticalÃ¢â¬â¢s annual sales increased from two million, eight hundred and fifteen thousand, 2,815,000, for the last year. This indicates an improvement of over twenty-five percent, 25.3% (Summer, 2013). Marty Nakai topped the sales representativesÃ¢â¬â¢ performance list by managing to sell products worth six hundred and twenty-five thousand, 625,000. Dick McClure, Bill Morrison and Tom Jones were other top performers each managing to sell products worth over five hundred and fifty thousand. Peggy Doyle was bottom of the performance list. This is because she was new and had only been active for four months. Another rookie sales representative was Larry Palmer, who managed to sell products worth one hundred and eighty-one thousand after being active for a period of eight months. Jared Murphy managed to sell products worth three hundred and seventy-five thousand for the whole year. Almost all sales people performed well in terms of sales during the year (Summer, 2013). All member of Arapahoe Pharmaceutical Company sales team improved on
Monday, October 28, 2019
Rewards of Teaching ( A Reflection of Experience) Essay Ã¢â¬Å"Never in my wildest dreams have I dreamt of becoming a teacher.Ã¢â¬ This was my introductory line when I delivered my impromptu speech in front of a group of teachers who took masterÃ¢â¬â¢s class at Xavier University. Along with this line were scenarios flashing back. . . My elementary and high school teachers tagging along not just big bags full of teaching materials but with commercial stuff to help augment the meager income they received in doing the taxing and heart quenching job of teaching. They were to me, missionaries who painstakingly labored their way out just to reach out to the young populace in far flung areas and made education available despite low salaries and in limbo benefits. Teachers were images of sacrifice, of service, and of deprivation to financial stability. They are sacrificial lambs in many occasions and situations which call for heroism. They are full of passion and are too busy to be in fashion and I could see how laborious their work was. These were reasons why I told myself that I should not become one. But fate has it all that brought me to my most dreaded profession. Situations and conditions pre-determined my destiny and it took me awhile to realize that it was never an accident that I matriculated education during college and that I was meant to become a teacher for life. It was during my early years of teaching when I truly realized that indeed teaching has never been an easy task. It is always paralleled with drawbacks, challenging responsibilities and unswerving demands of the job. It is twinned with orders, circulars, and memorandums which are bound to be followed and implemented. It is in fact, a profession which requires a certain degree of commitment, patience, service-orientation, level-headedness, and docility of heart to perform the tasks/responsibilities expected of it. In teaching, the teachers are duty bound to obey (sometimes blind obedience is deemed necessary) any policy and to perform its vast and enormous culpability. That is why teachers are always at risk and are prone to various stressors which in many cases have caused frailty. A lot of factors are to be considered in order not be weighed down by its pressures. Often times, the call of duty impede our personal desires and whimsical pleasures. The deadlines we have to meet, the requirements we have submit, the lessons and strategies we have to prepare, the clienteles we have to face, the co- workers we have to deal and the superiors we have to obey orders with are the myriad responsibilities a teacher has to perform. But my number of years in teaching has aligned my thoughts and has shaped my emotions. The day to day experiences and encounter with children has proven me wrong that despite the demands and challenges, there is fulfillment in teaching. There is a sense of pride and joy in knowing that children under your care have been formed into a total person and have become successful and great assets in the society where they belong. When students come back and say their pieces of sincere thank you, a certain feeling of elation is somehow felt bringing to mind the fruition of what I have labored for. With this thought, an inmost joy is felt knowing that I had my share in the most noble profession and mission of molding the hearts and minds of the children and above all, I have my share in building a nation with a promising future Ã¢â¬ ¦ Furthermore, there is a rewarding feeling, knowing that, what I do in the service of the youngsters is my way of serving my creator, the Greatest Author and Teacher of all times. And in faith I know that my sacrifices will never be in vain in the eyes of my Master Teacher my unseen partner. My only prayer is to bloom in this vineyard where He has planted me and not to grow weary despite the tests that He prepared for me! Now I realized that, Ã¢â¬Å"never in my wildest dreams have I dreamt of becoming a teacherÃ¢â¬ because I was molded and predestined to be. HE is my potter and IÃ¢â¬â¢m just a clay.
Saturday, October 26, 2019
Applications of 3D Printing Technology Lara Soueid Abstract What if we could simply print a bone when we have a shattered one? This has now become possible due to the three-dimensional (3D) printing innovation. 3D technology In our days, technology is advancing at a very rapid pace. Out of the many recent innovations is the three dimensional (3D) technology. It has been exploited in various industries such as the movie production, television, computers, and printers industries. This technology has just recently been introduced into the medical field, more specifically, the 3D printers (Walker A, 2013). There are various medical applications of the 3D printers; some of these are to print prosthetic limbs, and implants. So far, there are many advantages, yet also a few disadvantages to the latter. The three dimensional technology relies on the fact that we see things in 3D by our eyes in our daily, that is we visualize objects by their width, length and depth (3deyehealth.org June12, 2014). The process by which our eyes perceive three dimensional images from two highly similar overlaid images was first described by Sir Charles Wheatstone in 1838 (Sniderman Z, 2011). Another name for 3D is stereoscopy; it explains how our eyes and our brain create an impression of a third dimension. Our eyes are approximately 50-75mm apart, hence each eye perceives a slightly different image which the brain merges using some high powered geometry which is basically the 3D concept (Sniderman Z, 2011). Modern 3D technology is trying to replicate what the brain does to merge the images. This technology tricks the brain in order to perceive two different images from the same source (Wong KV, Hernandez A, 2012).There are multiple uses of the 3D technology, mainly architecture, the movie industry, printing and gaming (Sniderman Z, 2011). 3D printing has recently been on the rise, these machines are able to make anything from simple materials. By doing so they replace traditional factory production lines and make everything in life much easier, a person can easily print a cup or chair, or even a house (Walker A, 2013). 3D printing technologies There are various 3D printing technologies being used, namely selective laser sintering (SLS), fused deposition modeling (FDM) and stereolithography (SLA) (Pravas VS, 2013). The SLS printers use a very powerful laser in order to heat and bind the printing material into the required 3D object by scanning the cross sections generated from the 3D digital file. When each cross section is scanned, the powder bed is automatically lowered one layer thickness and new material is placed above it. The object is surrounded and supported by the same powder it is made from. This process is repeated until the object is complete (Deckard C, Beaman J, Bourell D, 2012). Figure 1: Selective Laser Sintering process, Martello.co.uk, June 12, 2014. The second type is the FDM printers, these printers use a process by which thick filaments are melted and forced through a heated nozzle which forms the object. Once the first layer is formed, the base is lowered and the second layer begins forming and fusing with the first layer. However unlike the SLS, these printers require two different materials, the thick filaments in order to make the object and a support material which surrounds and supports the object while it is being made (Deckard et al., 2012). Figure 2: Fused Deposition Modeling process, 3dprinterplans.info, June 12, 2014. The last type of printers are the SLA printers, these printers use liquid photopolymer resin as the basic material. Photopolymers are materials that are sensitive to light, once exposed to ultraviolet (UV) light, they will immediately harden. The UV laser beam traces a cross section of the object onto the resin, which immediately curs when it is exposed to the light (3ders.org, March 14, 2013). The base then lowers and the top is coated with more resin which again gets exposed to UV light hence hardens and mends to the lower layer. This process is repeated until the object is completed (Deckard et al., 2012). Figure 3: Stereolithography printing process. Pravas VS, 2013. The latter are all additive manufacturing processes which require the help of computers. The 3D object blueprint to be printed must first be modeled three dimensionally on a computer software, most commonly using the computer aided design (CAD) software. Magnetic Resonance Imaging (MRI), as well as computed tomography (CT) scan can also be used (Pravas VS, 2013). The CAD file is converted into a Standard Tessellation Language (STL) file which transforms the geometry into small triangles, a header, or a triplet list of x, y and z coordinates. This file is then sliced into cross sections exactly as the printer will print, this file is called a G-Code file which can now be directly interpreted by the printer (Wong KV, Hernandez A, 2012). Table 1: Comparison of 3D printing processes. (3dprinteplans.info, June 12, 2014) There are various applications to 3D printing, such as architecture, automotive, engineering, fashion and numerous others. However the most important applications are the use of 3D printers in medicine to produce implants and prosthetics (3dprinterplans.info, 2014, June 12). Throughout the world, poverty is increasing and living costs as well as the medical costs are also increasing. A prosthetic arm for an amputee would cost on average $3,000 to $30,000 depending on the patientÃ¢â¬â¢s age, activities, profession and his health hence making it impossible for anyone except the rich population to be able to buy a prosthetic arm or foot (Turner R, 2009). Lucky for the third world countries people, as well as the middle class people, a novel technology will solve the latter issue. The innovation of the 3D printers has and will change many lives. The process of printing a prosthetic hand relies on the FDM technology. The material used is most often high-performance thermoplastics which are biocompatible, and the average price of a 3D printed prosthetic arm is about $200 (Stratasys Ltd, 2014, June 12). The 3D production of prosthetics is not only cheaper, faster and more practical, it is a revolution which allows every amputee of living a normal life again. The main problem in producing a prosthetic arm or leg is the need of a blueprint or prototype. The patientÃ¢â¬â¢s limb is scanned using a CT scanner or a laser-based scanner, this image is then converted into a G-Code file which can be directly printed by the printer in order to produce a new very similar limb (Andrews TM, 2013). There was also a problem of printing the socket (the part that will be attached to the amputated limb) accurately (Stratasys Ltd, 2014, June 12). However this has all been solved by the open end prototypes and blueprints available for everyone to use (Stratasys Ltd, 2014, June 12). Sydney Kendall is a thirteen year old girl from St.Louis, her right arm was amputated due to a boating accident when she was six years old. Senior students in the Washington University in St.Louis studying biomedical engineering printed a prosthetic arm using plastic as the raw material for Sydney. The total cost was only $200. This prosthetic is powered by a battery and controlled by an accelerometer allowing her to move her prosthetic fingers (Washington University in St.Louis Newsroom [WUSTL], 2014). The most recent 3D printed prosthetic hand is the Ã¢â¬Å"Flexy-handÃ¢â¬ , produced by Gyrobot Ltd by Steve Wood. This prosthetic arm looks very similar to a natural human hand and it operates like one too. He has used Filaflex flexible filaments which form tendons that are activated by a motor that allows the prosthetic hand to operate very much like a normal human hand. (Krassenstein E, 2014) Maxillofacial prosthetics are also being produced by 3D printers. Usually the conventional maxillofacial prosthetics production requires that an impression from the trauma site is taken, then a plaster positive should be formed, a mould should be made and the specific shape must be carved in the wax, lastly it must be casted in silicone. This is very laborious, time consuming and expensive to be done. Using the 3D technology, the patientÃ¢â¬â¢s face should be 3D-scanned, this image will then be converted to the appropriate file to print the perfectly fitting prosthetic part (Wainwright O, 2014, June 12). 3D-printed titanium shoulder and collar bone implants were successfully implanted into three different patients suffering from cancerous bone tumors in XiÃ¢â¬â¢an, China. The bone design was printed using the selective laser sintering technique which fused titatium powder into the exact shape of the patientÃ¢â¬â¢s bone. The implants do not cause infections and are very durable and resistant (Zeng C, 2014). This has also been done in the United Kingdom for a cancer patient (Moore G, 2014). Soon, 3D printing will replace manufacturing industries and save millions of lives. Various kinds of implants such as knee caps, skulls, auditory devices, and jaw bones have already been produced by a 3D printer and have successfully been implanted. There are 2 astonishing cases whose patients have been given a second chance to live due to 3D printers. The first case is Stephen Power, he is a survivor of a motorbike accident that shattered his face. His face was reconstructed at Morrison Hospital in Swansea, however, his entire face was reconstructed using custom made 3D printed models, plates, implants and guides. The surgical team used CT scans to create symmetrical 3D models of PowerÃ¢â¬â¢s skull which they then printed, implanted, and held in place using a printed titanium implant (Griffith H, 2014). The second case is of a 22 year old woman from the Netherlands who had her skull replaced by a 3D printed skull implant. She suffered from a chronic bone disorder which increases the thickness of her skull, neurosurgeons at the University Medical Centre Utrecht pr inted a perfectly fitting durable plastic skull implant (University Medical Center Utrecht [UMCU] research news, 2014). Dr.Bon Verweij of the UMCU says: Ã¢â¬Å"Its now three months after the operation. The patient has fully regained her vision, she has no more complaints, shes gone back to work and there are almost no traces that she had any surgery at all. The printing process of prosthetics and implants requires hours to a few days maximum. There arenÃ¢â¬â¢t any documented reactions to the prosthesis or implants, they are cheaper, more durable, more resistant, less laborious and they are FDA approved (Pollack SK, Coburn J, 2013). However the main disadvantage is the expensive price of the printer and the designing program. Most prototypes are open ended and available online for modification and many hospitals and universities now have 3D printers (Stratasys Ltd, 2014, June 12). With the increasing popularity and availability of 3D printers, we are finally ableto create prosthetics and implants under $1000. Even though alternative production methods are present, they are not available to the people that need them most due to their high cost. They are cheap, fast, References 3deyehealth organization team. Seeing in 3D. Retrieved June 12, 2014, from www.3deyehealth.org 3dprinterplans team. (2014, May 6). How To 3D Print Ã¢â¬â BeginnerÃ¢â¬â¢s Guide To 3D Printing. Retrieved 2014, June 12, from http://3dprinterplans.info/how-to-3d-print-beginners-guide-to-3d-printing/ Andrews TM. (2013, August 23). Can we really 3D print limbs for amputees? The atlantic magazine. Retrieved 2014, June 12, from http://www.theatlantic.com/health/archive/2013/08/can-we-really-3-d-print-limbs-for-amputees/278987/ Deckard C, Beaman J, Bourell D. (2012, December 7). [Interviews in the University of Texas]. Retrieved 2014, June 12, from http://www.me.utexas.edu/news/2012/0712_sls_history.php#ch4. Griffith H. (2014, March 12). Pioneering 3D printing reshapes patientÃ¢â¬â¢s face in Wales. BBC news. Retrieved 2014, June 12, from http://www.bbc.com/news/uk-wales-26534408 Krassenstein E. (2014, March 10). The Flexy-Hand Ã¢â¬â The Most Innovative, Useful, Realistic Looking 3D Printed Prosthetic Hand Yet. 3D print blog. Retrieved 2014, June 12, from http://3dprint.com/1500/the-flexy-hand-3d-printed-prosthetic/ Moore G. (2014, February 11). Surgeons have implanted a 3-D printed pelvis into a U.K. cancer patient. Fierce Medical Devices Newsletter. Retrieved 2014, June 12, from http://www.fiercemedicaldevices.com/story/surgeons-have-implanted-3-d-printed-pelvis-uk-cancer-patient/2014-02-11 Pollack SK, Coburn J. (2013, August 15). FDA goes 3-D. FDA voice. Retrieved 2014, June 12, from http://blogs.fda.gov/fdavoice/index.php/2013/08/fda-goes-3-d/ Pravas VS. (2013). 3D Printing Ã¢â¬â Ã¢â¬ËModern Manufacturing Rapid PrototypingÃ¢â¬â¢. Engineers Garage. Retrieved 2014, June 12, from http://www.engineersgarage.com/articles/what-is-3d-printing-modern-manufacturing-and-rapid-prototyping?page=1 Scheineder Prototyping Limited members. Rapid Prototyping Stereolithography (SLA) Models. Retrieved 2014, June 12, from http://www.martello.co.uk/rapid_prototyping.htm Sniderman Z. (2011, February 07). How Does 3D Technology Work? The Innovative Entertainment Series Ã¢â¬â Dolby. Retrieved 2014, June 12, from http://mashable.com/2011/02/07/how-does-3d-work/ Stratasys limited. FDM technology case studies. Retrieved 2014, June 12, from http://www.stratasys.com/resources/case-studies/medical Turner R. (2009, May 30). Prosthetics costs. Retrieved 2014, June 12, from http://www.disabled-world.com/assistivedevices/prostheses/prosthetics-costs.php University Medical Center Utrecht newsroom. (2014, March 27). University Medical Center Utrecht Ã¢â¬â Netherlands. Retrieved 2014, June 12, from http://www.umcutrecht.nl/research/news/2014/03/3d-printed-skull-implanted-in-patient.htm Wainwright O. Faces to order: how 3D printing is revolutionizing prosthetics. The guardian. Retrieved 2014, June 12, from http://www.theguardian.com/artanddesign/architecture-design-blog/2013/nov/08/faces-3d-printing-prosthetics Walker A. (2013, June 21). 3D printing for dummies: How do 3D printers work? The independent newspaper. Retrieved 2014, June 12 from http://www.independent.co.uk/ Washington University in St.Louis Newsroom. ( 2014, May 7). WUSTL students print pink prosthetic arm for teen girl. Retrieved 2014, June 12, from http://news.wustl.edu/news/Pages/26901.aspx Wong KV, Hernandez A.( 2012). A Review Of Additive Manufacturing. ISRN Mechanical Engineering. Volume 2012. Article ID 208760. Retrieved 2014, June 12, from http://dx.doi.org/10.5402/2012/208760. Zeng C. (2014, June 3). In China, worldÃ¢â¬â¢s first successful 3D-printed shoulder and collar bone implants. 3ders organization newsroom. Retrieved 2014, June 12, from http://www.3ders.org/articles/20140603-in-china-world-first-successful-3d-printed-shoulder-and-collar-bone-implants.html
Thursday, October 24, 2019
The Link between TV Violence and the Violence of Children Ã Ã Ã Ã Ã Children watch a lot of television.Ã TV has even become a babysitter. Ã There is more violence portrayed on television than in earlier years.Ã Crime has increased steadily over the years as well.Ã Many children have been involved in violent crimes in recent years, and there is a link between violence on television and the increase in crime. Ã As early as 1960, Leonard Eron and L. Rowell Huesmann, researchers in Columbia County, Ã New York, discovered a connection between violence on TV and how aggressively children behaved. Children seeing violence on TV, beginning as young as eight years old, exhibited more aggressive behavior.Ã As they grew older, still watching violence on TV, the aggressive behavior continued. There seemed to be a cumulative effect in the children's behavior.Ã Being aggressive as a child is a good indicator as to the type of behavior that will be exhibited as an adult.Ã Several studies followed participants over three decades and revealed that those people, who showed the most aggressive behavior at age eight, had continued to be aggressive and had the most arrests for violent crimes (Mortimer, 1-4). Ã At the Indiana University Center for Adolescent Studies, researchers asked kids what causes fights. The kids said gossip and bullying.Ã The survey showed that those kids who exhibited the highest bullying behavior also watched violence on TV, fought, misbehaved at home as well as in the community, and were disciplined forcefully by their parents.Ã The bullies had fewer adult role models and less contact with adults. Also, not possessing the social skills for coping with co... ...ne. proquest.umi.com. 3 Oct. 2000. Levin, Diane E., and Nancy Carlsson-Paige. "Disempowering the 'Power Rangers'." Education Digest 61.9 (1996): 1-5. Online. ehostvgw1.epnet.com. 3 Oct. 2000. Mortimer, Jeffrey. "How TV Violence Hits Kids." Education Digest 60.2 (1994): 1-4. Online. ehostvgw1.epnet.com. 3 Oct. 2000. Richey, Warren. "Group Enlists Parents to Fight TV Violence." Christian Science Monitor 88.245 (1996): 1-2. Online. ehostvgw1.epnet.com. 3 Oct. 2000. Institute on Media and Family in Minneapolis", which can be accessed on the Internet at www.mediaandthefamily.org "TV Violence and Kids." Education Digest 62.1 (1996): 1-4. Online. ehostvgw1.epnet.com. 3 Oct. 2000. Zuckerman, Mortimer B. "The Victims of TV Violence." U.S. News & World Report 115.5 (1993): 1-2. Online. ehostvgw1.epnet.com. 3 Oct. 2000. Ã Ã Ã Ã Ã
Wednesday, October 23, 2019
Ã¢â¬Å"Once upon a time,Ã¢â¬ began Bonnie, Ã¢â¬Å"there were a young girl and boyÃ¢â¬ ¦Ã¢â¬ She was immediately interrupted. Ã¢â¬Å"What were their names?Ã¢â¬ Ã¢â¬ Were they slaves?Ã¢â¬ Ã¢â¬ Where did they live?Ã¢â¬ Ã¢â¬ Were they vampires?Ã¢â¬ Bonnie almost forgot her misery and laughed. Ã¢â¬Å"Their names wereÃ¢â¬ ¦Jack andÃ¢â¬ ¦Jil . They were kitsune, and they lived way up north in the kitsune sector around the Great CrossingsÃ¢â¬ ¦Ã¢â¬ And she proceeded, albeit with many excited interruptions, to tel the story she had gotten from the star bal . Ã¢â¬Å"So,Ã¢â¬ Bonnie concluded nervously, as she opened her eyes and realized that she'd attracted quite a crowd with her story, Ã¢â¬Å"that's the tale of the Seven Treasures, and Ã¢â¬â and I suppose the moral is Ã¢â¬â don't be too greedy, or you won't end up with anything.Ã¢â¬ There was a lot of laughter, the nervous giggling of the girls and the Ã¢â¬Å"Haw! Haw haw!Ã¢â¬ kind of laughter from the crowd behind them. Which Bonnie now noticed was entirely male. One part of her mind started unconsciously to go into flirt mode. Another part immediately squashed it. These weren't boys looking for a dance; these were ogres and vampires and kitsune and even men with mustaches Ã¢â¬â and they wanted to buy her in her little black bubble dress, and as nice as the dress might be for some things, it wasn't like the long, jeweled gowns that Lady Ulma had made for them. Then they had been princesses, wearing a fortune's worth of jewels at their throats and wrists and hair Ã¢â¬â and besides, they had had fierce protection with them at al times. But now, she was wearing something that felt a lot like a baby-dol nightgown and delicate little shoes with silvery bows. And she wasn't protected because this society said you had to have men to be protected, and, worst of al Ã¢â¬ ¦she was a slave. Ã¢â¬Å"I wonder,Ã¢â¬ said a golden-haired man, moving through the girls around her, al of whom hurried out of his way except Mouse and Eren, Ã¢â¬Å"I wonder if you would go upstairs with me and perhaps tel me a story Ã¢â¬â in private.Ã¢â¬ Bonnie tried to swal ow her gasp. Now she was the one hanging on to Mouse and Eren. Ã¢â¬Å"Al such requests must go through me. No one is to take a girl out of the room unless I approve,Ã¢â¬ announced a woman in a ful -length dress, with a sympathetic, almost Madonna-like face. Ã¢â¬Å"That wil be treated as theft of my mistress's property. And I'm sure we don't al want to be arrested as if we'd been caught carrying off the silverware,Ã¢â¬ she said and laughed lightly. There was equal y light laughter among the guests as Well, and movement toward the woman Ã¢â¬â at a sort of mannerly run. Ã¢â¬Å"You tel real y good stories,Ã¢â¬ Mouse said in her soft voice. Ã¢â¬Å"It's more fun than using a star bal .Ã¢â¬ Ã¢â¬Å"Mouse, here, is right,Ã¢â¬ Eren said, grinning. Ã¢â¬Å"You do tel good stories. I wonder if that place real y exists.Ã¢â¬ Ã¢â¬Å"Well, I got it out of a star bal ,Ã¢â¬ Bonnie said. Ã¢â¬Å"One that the girl Ã¢â¬â um, Jil , put her memories in, I think Ã¢â¬â but then how did it get out of that tower? How did she know what happened to Jack? And I read a story about a giant dragon and that felt real too. How do they do it?Ã¢â¬ Ã¢â¬Å"Oh, they trick you,Ã¢â¬ Eren said, waving a dismissive hand. Ã¢â¬Å"They have somebody go someplace cold for the scenery Ã¢â¬â an ogre probably, because of the weather.Ã¢â¬ Bonnie nodded. She'd met mauve-skinned ogres before. They only differed from demons in their level of stupidity. At this level, they tended to be stupid in society, and she'd heard Damon say with a curled lip that the ones that were out of society were hired muscle. Thugs. Ã¢â¬Å"And the rest they just fake somehow Ã¢â¬â I don't know. Never real y thought about it.Ã¢â¬ Eren looked up at Bonnie. Ã¢â¬Å"You're an odd one, aren't you, Bonny?Ã¢â¬ Ã¢â¬Å"Am I?Ã¢â¬ Bonnie asked. She and the two other girls had revolved, without letting go of hands. This meant that there was some space behind Bonnie. She didn't like that. But, then, she didn't like anything about being a slave. She was starting to hyperventilate. She wanted Meredith. She wanted Elena. She wanted out of here. Ã¢â¬Å"Um, you guys probably don't want to associate with me anymore,Ã¢â¬ she said uncomfortably. Ã¢â¬Å"Huh?Ã¢â¬ said Eren. Ã¢â¬Å"Why?Ã¢â¬ asked Mouse. Ã¢â¬Å"Because I'm running through that door. I have to get out. I have to.Ã¢â¬ Ã¢â¬Å"Kid, calm down,Ã¢â¬ Eren said. Ã¢â¬Å"Just keep breathing.Ã¢â¬ Ã¢â¬Å"No, you don't understand.Ã¢â¬ Bonnie put her head down, to shade out some of the world. Ã¢â¬Å"I can't belong to somebody. I'm going crazy.Ã¢â¬ Ã¢â¬Å"Sh, Bonny, they're Ã¢â¬â Ã¢â¬Å" Ã¢â¬Å"I can't stay here,Ã¢â¬ Bonnie burst out. Ã¢â¬Å"Well, that's probably al to the good,Ã¢â¬ a terrible voice, right in front of her, said. No! Oh, God. No, no, no, no, no! Ã¢â¬Å"When we're in a new business we work hard,Ã¢â¬ the Madonna-like woman's voice said. Ã¢â¬Å"We look up at prospective customers. We don't misbehave or we are punished.Ã¢â¬ And even though her voice was sweet as pecan pie, Bonnie somehow knew that the harsh voice in the night shouting at them to find a pal et and stay on it, had been this same woman. And now there was a strong hand under her chin and Bonnie couldn't keep it from forcing her head up, or from covering her mouth when she screamed. In front of her, with the delicate pointed ears of a fox, and the long sweeping black tail of a fox but otherwise looking human, looking like a regular guy wearing jeans and a sweater, was Shinichi. And in his golden eyes she could see, twisting and turning, a little scarlet flame that just matched the red on the tip of his tail and the hair that fel across his forehead. Shinichi. He was here. Of course he could travel through the dimensions; he Stillhad a ful star bal that none of Elena's group had ever found as well as those magical keys Elena had told Bonnie about. Bonnie remembered the horrible night when trees, actual trees, had turned into something that could understand and obey him. About how four of them each grabbed one of her arms and legs and pul ed, as if they were planning to pul her apart. She could feel tears leaking out behind her shut eyelids. And the Old Wood. He'd control ed every aspect of it, every creeper to trip you, every tree to fal in front of your car. Until Elena had blasted al but that one thicket of the Old Wood, it had been ful of terrifying insect-like creatures Stefan cal ed malach. But now Bonnie's hands were behind her back and she heard something fasten with a very final-sounding click. NoÃ¢â¬ ¦oh, please noÃ¢â¬ ¦ But her hands were definitely fixed in place. And then someone Ã¢â¬â an ogre or a vampire Ã¢â¬â picked her up as the lovely woman gave Shinichi a smal key off a key ring ful of identical keys. Shinichi handed this to a big ogre whose fingers were so large that they eclipsed it. And then Bonnie, who was screaming, was quickly whisked up four flights of stairs and a heavy door thunked shut behind her. The ogre carrying her fol owed Shinichi, whose sleek scarlet-tipped tail swung jauntily from a hole in his jeans, back and forth, back and forth. Bonnie thought: That's satisfaction. He thinks he's won this already. But unless Damon real y had forgotten her completely, he would hurt Shinichi for this. Maybe he would kil him. It was an oddly comforting thought. It was even ro Ã¢â¬â No, it's not romantic, you nitwit! You have to find a way to get out of this mess! Death is not romantic, it's horrible! They had reached the final doors at the end of the hal . Shinichi turned right and walked al the way down a long corridor. There the ogre used the key to open a door. The room had an adjustable overhead gaslight. It was dim but Shinichi said, Ã¢â¬Å"Can we have a little il umination, please?Ã¢â¬ in a false polite voice, and the other ogre hurried and turned the light up to interrogation-lamp-in-your-face level. The room was a sort of bedroom-den combination, the kind you'd get at a decent hotel. It had a couch and some chairs on the upper level. There was a window, closed, on the left side of the room. There was also a window on the right side of the room, where al the other rooms should be in a line. This window had no curtains or blinds that could be drawn and it reflected Bonnie's pale face back at her. She knew at once what it was, a two-way mirror, so that people in the room behind it could see into this room but not be seen. The couch and chairs were positioned to face it. Beyond the sitting room, off to her left, was the bed. It wasn't a very fancy bed, just white covers that looked pink, because there was a real window on that side that was almost in a line with the sun, sitting as it always was, on the horizon. Right now, Bonnie hated it more than ever before because it turned every light-colored object in the room pink, rose, or outright red. The bow at her own bodice was deep pink now. She was going to die saturated with the color of blood. Something on some deeper level told her that her mind was thinking of such things as distractions, that even thinking about hating to die in such a juvenile color was running away from the bit in the middle, the dying bit. But the ogre holding her moved her around as if she weighed nothing, and Bonnie kept having little thoughts Ã¢â¬â were they premonitions? Oh, God, let them not be premonitions! Ã¢â¬â about going out of that red window in a sitting position, the glass no impediment to her body being thrown at a tremendous force. And how many stories up were they? High enough, anyway, that there was no hope of landing withoutÃ¢â¬ ¦Well, dying. Shinichi smiled, lounging by the red window, playing with the cord to the blinds. Ã¢â¬Å"I don't even know what you want from me!Ã¢â¬ Bonnie found herself saying to Shinichi. Ã¢â¬Å"I've never been able to hurt you. It was you hurting other people Ã¢â¬â like me! Ã¢â¬â al the time.Ã¢â¬ Ã¢â¬Å"Well, there were your friends,Ã¢â¬ murmured Shinichi. Ã¢â¬Å"Although I seldom wreak my dread revenge against lovely young women with red-gold hair.Ã¢â¬ He lounged beside the window and examined her, murmuring, Ã¢â¬Å"Hair of red-gold; heart true and bold. Perhaps a scoldÃ¢â¬ ¦Ã¢â¬ Bonnie felt like screaming. Didn't he remember her? He certainly seemed to have remembered their group, since he'd mentioned revenge. Ã¢â¬Å"What do you want?Ã¢â¬ she gasped. Ã¢â¬Å"You are a hindrance, I'm afraid. And I find you very suspicious Ã¢â¬â and delicious. Young women with red-gold hair are always so elusive.Ã¢â¬ Bonnie couldn't find anything to say. From everything she'd seen, Shinichi was a nutcase. But a very dangerous psychopathic nutcase. And al he enjoyed was destroying things. In just one moment there could be a crash through the window Ã¢â¬â and then she'd be sitting on air. And then the fal would begin. What would that feel like? Or would she already be fal ing? She only hoped that at the bottom it was quick. Ã¢â¬Å"You seem to have learned a lot about my people,Ã¢â¬ Shinichi said. Ã¢â¬Å"More than most.Ã¢â¬ Ã¢â¬Å"Please,Ã¢â¬ Bonnie said desperately. Ã¢â¬Å"If it's about the story Ã¢â¬â al I know about kitsune is that you're destroying my town. And Ã¢â¬â Ã¢â¬Å"She stopped short, realizing that she could never let him know what had happened in her out-of-body experience. So she could never mention the jars or he'd know that they knew how to catch him. Ã¢â¬Å"And you won't stop,Ã¢â¬ she finished lamely. Ã¢â¬Å"And yet you found an ancient star bal with stories about our legendary treasures.Ã¢â¬ Ã¢â¬Å"About what? You mean from that kiddy star bal ? Look, if you'l just leave me alone I'l give it to you.Ã¢â¬ She knew exactly where she'd left it, too, right beside her sorry excuse for a pil ow. Ã¢â¬Å"Oh, we'l leave you aloneÃ¢â¬ ¦in time, I assure you,Ã¢â¬ Shinichi said with an unnerving smile. He had a smile like Damon's, which wasn't meant to say Ã¢â¬Å"Hel o; I won't hurt you.Ã¢â¬ It was more like Ã¢â¬Å"Hul o! Here's my lunch!Ã¢â¬ Ã¢â¬Å"I find itÃ¢â¬ ¦curious,Ã¢â¬ Shinichi went on, Stillfiddling with the cord. Ã¢â¬Å"Very curious that just in the middle of our little dispute, you arrive here in the Dark Dimension again, alone, apparently without fear, and manage to bargain for a star bal . An orb that just happens to detail the location of our most priceless treasures that were stolen from usÃ¢â¬ ¦a long, long time ago.Ã¢â¬ You don't care about anybody but yourself, Bonnie thought. You're suddenly acting al patriotic and stuff, but in Fel Ã¢â¬Ës Church you didn't pretend to care about anything but hurting people. Ã¢â¬Å"In your little town, as in other towns throughout history, I had orders to do what I did,Ã¢â¬ Shinichi said, and Bonnie's heart plunged right down to her shoes. He was telepathic. He knew what she was thinking. He'd heard her thinking about the jars. Shinichi smirked. Ã¢â¬Å"Little towns like the one on Unmei no Shima have to be wiped off the face of the earth,Ã¢â¬ he said. Ã¢â¬Å"Did you see the number of ley lines of Power under it?Ã¢â¬ Another smirk. Ã¢â¬Å"But of course you weren't really there, so you probably didn't.Ã¢â¬ Ã¢â¬Å"If you can tel what I'm thinking, you know that story about treasures was just a story,Ã¢â¬ Bonnie said. Ã¢â¬Å"It was in the star bal cal ed Five Hundred Stories for Young Ones. It's not real.Ã¢â¬ Ã¢â¬Å"How strange then that it coincides so exactly with what the Seven Kitsune Gates are supposed to have behind them.Ã¢â¬ Ã¢â¬Å"It was in the middle of a bunch of stories about the Ã¢â¬â the Dz-Aht-Bhi'iens. I mean the story right before it was about a kid buying candy,Ã¢â¬ Bonnie said. Ã¢â¬Å"So why don't you just go get the star bal instead of trying to scare me?Ã¢â¬ Her voice was beginning to tremble. Ã¢â¬Å"It's at the inn right across the street from the shop where I was Ã¢â¬â arrested. Just go and get it!Ã¢â¬ Ã¢â¬Å"Of course we've tried that,Ã¢â¬ Shinichi said impatiently. Ã¢â¬Å"The landlady was quite cooperative after we gave her someÃ¢â¬ ¦compensation. There is no such story in that star bal .Ã¢â¬ Ã¢â¬Å"That's not possible!Ã¢â¬ Bonnie said. Ã¢â¬Å"Where did I get it, then?Ã¢â¬ Ã¢â¬Å"That's what I'm asking you.Ã¢â¬ Stomach fluttering, Bonnie said, Ã¢â¬Å"How many star bal s did you look at in that brown room?Ã¢â¬ Shinichi's eyes went blurry briefly. Bonnie tried to listen, but he was obviously speaking telepathical y to someone close, on a tight frequency. Final y he said, Ã¢â¬Å"Twenty-eight star bal s, exactly.Ã¢â¬ Bonnie felt as if she'd been clubbed. She wasn't going crazy Ã¢â¬â she wasn't. She'd experienced that story. She knew every fissure in every rock, every shadow in the snow. The only answers were that the real star bal had been stolen, or Ã¢â¬â or maybe that they hadn't looked hard enough at the ones they had. Ã¢â¬Å"The story is there,Ã¢â¬ she insisted. Ã¢â¬Å"Right before it is the story about little Marit going to a Ã¢â¬â Ã¢â¬Å" Ã¢â¬Å"We probed the table of contents. There is the story about a child andÃ¢â¬ Ã¢â¬â he looked scornful Ã¢â¬â Ã¢â¬Å"a sweetshop. But not the other.Ã¢â¬ Bonnie just shook her head. Ã¢â¬Å"I swear I'm tel ing the truth.Ã¢â¬ Ã¢â¬Å"Why should I believe you?Ã¢â¬ Ã¢â¬Å"Why does it matter? How could I make something like that up? And why would I tel a story I knew would get me in trouble? It doesn't make any sense.Ã¢â¬ Shinichi stared at her hard. Then he shrugged, his ears flat against his head. Ã¢â¬Å"What a pity you keep saying that.Ã¢â¬ Suddenly Bonnie's heart was pounding in her chest, in her tight throat. Ã¢â¬Å"Why?Ã¢â¬ Ã¢â¬Å"Because,Ã¢â¬ Shinichi said cool y, pul ing the blinds completely open so that Bonnie was abruptly drenched in the color of fresh blood, Ã¢â¬Å"I'm afraid that now we have to kil you.Ã¢â¬ The ogre holding her strode toward the window. Bonnie screamed. In places like this, she knew screams went unheard. She didn't know what else to do.