Monday, September 30, 2019

The City vs. the Country: Preserving the Memories in a Fast-Paced World

Romantic poets of the past attempted to portray the idea that emotion is more important than reason.   Perhaps they are reacting to the new emphasis of reason and rationalism and feared that people might forget the more esoteric benefits of nature and emotion and reflection.In William Wordsworth’s â€Å"Lines Composed a Few miles Above Tintern Abbey,† the city and the country are contrasted for the reader through the use of reflective imagery and symbolism in an effort to reconnect the reader with these passions and to encourage his use of memory to summon strength.Wordsworth believed, as did all romantic poets, in writing from the heart.   Thus his poem is a reflection of his two visits to Tintern Abbey, a former medieval church.   The beauty of this natural surrounding is the subject of the poem.His first solitary visit occurred five years earlier than his second visit with his sister.   He hopes to give her an escape from her grief and sadness in the future b y providing her with the memories of this visit.  Ã‚  Ã‚   In addition, the reader can be seen as an extension of the sister, the symbol of all people who need to find solace in nature and the love and peace it produces.The second visit, for Wordsworth, is different from the first.   Upon his first visit, he recalls his initial passion about nature which he has since lost.   He recalls his love of nature and the comfort it had given him in lines 23-28:Here he gives his sister, and the reader, a look into his feelings about the view that he has missed.   He notes that he was not ‘blind’ to the view, but has called upon it while in the noisy and tiring cities.   Here, life in the city is presented negatively, as being an oppressive and unhealthy environment, while the natural, peaceful environment of Tintern Abbey is calming, soothing, and healing.Life for the speaker now, as a city dweller, is symbolized in line 39 as a â€Å"heavy and weary weight† and refers to his life there as one â€Å"of joyless daylight; when the fretful stir / Unprofitable, and the fever of the world, / have hung upon the beatings of my heart† (lines 52-55).   This gives the city life an essence of disease and pain while his second visit to the abbey gives him the rushing hope â€Å"That in this moment there is life and food / for future years† (lines 64-65).

Sunday, September 29, 2019

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.

Saturday, September 28, 2019

Impact of Culture on Business Management Japan Essay

Impact of Culture on Business Management Japan - Essay Example Japan is an economic super power nonetheless so one needs to look beneath the surface and see why their productivity is highest in the world and how they are able to flex their economic muscles so well despite being such a tiny nation. Japan is an Island country separated from rest of Asia which enabled it to develop a unique culture quite different even from China form which it has borrowed heavily. This culture can be defined in nutshell as closely knit (team spirit), (elders), sincerity towards work, networking (trust only in known names) and deferring to seniority. Team spirit is the guiding force in all facets, from the family to all rungs of the corporate ladder even politics. Goel observes that to get ahead one has to get along. A nail that sticks out gets pounded down is an oft repeated saying in Japan. The group is more important than an individual; individuals are defined by the group. ( http://www. uwf.edu/ lgoel/documents/ AObservationsonJapanese Culture Pol . pdf). They are taught to be considerate to others feelings and take lot of care to make all around them comfortable. They take their work very seriously. Punctuality in starting work and formal atmosphere is the norm everywhere. It is rare to hear laughter or see backslapping except during breaks. Working late is a routine which many a times is not even reported or paid for. With computerization most of them carry work home almost everyday. Loyalty and fidelity towards the employer is taken for granted and it is common for them to work for the same firm for their entire life. They do not like to deal with complete strangers so usually shokai-sha (introducer) is the go between. Thus having a known person for introduction goes a long way in trust building. They place high value on seniority, more senior the introducer better impact it carries. Shokai-sha is even present during the contract signing ceremony. Business Communication and Management Style- Both the countries have totally different business communication and management styles which are the result of their opposing cultures and work habits. Japanese mistrust of strangers shows in the number of questions and take time taken to reach a decision. It is important to remember that to get them to compromise one has to show willingness to compromise too. Politeness is never abandoned; harmony is never threatened even in case if something disagreeable needs to be communicated, silence reigns and a lot of pondering is done for a long time. Usually the subject gets changed and diverted to trivial social chit chat. Decisions are reached only after consensus has been reached amongst all the team members so they like to break meetings to have private words with each other. Patience needs to be cultivated for interacting with the Japanese. Business structures in Japan like in other walks of life like political, academic and religious spheres is like that of the parent and child. In this the superior (parent) takes care of the subordinate, who is supposed to be obliged and repay it. Corporations often pay for personal needs like housing, excursions, outdoor activities of their employees and their families in return for life long employment. They don't like to break harmony or say no on the face directly for the fear of humiliating the other person, so they come across as "reserved, cautious,

Friday, September 27, 2019

Glyconutrients Essay Example | Topics and Well Written Essays - 2500 words

Glyconutrients - Essay Example N-acetylneuraminic acid Breast milk Important for brain development and learning lowers the LDL and inhibits strains of influenza A and B, bacteria and other pathogens Glyconutrients Food sources Main feature Effects of individuals well being as claimed by drug companies Xylose Grains- wheat, rye and barley Carrot, beet, cauliflower, broccoli, kale, lettuce, parsley, rhubarb, Brussels sprouts, red cabbage and asparagus Used as a substitute for sucrose and corn sweeteners Antibacterial, antifungal and prevent cancer Galactose Dairy products, legumes, algae, many fruits and vegetables Found in combination with glucose to form a disaccharide called lactose Inhibit tumour growth, enhances healing of wounds , decrease inflammation and triggers long-term memory formation Glucose Milk, mushrooms, various fruits and vegetables and grains Ubiquitous saccharide Memory enhancement, proper calcium absorption Table 2. Concentration of glycoprotein on different tissues. The graph shows the specific activity of radio labelled glycoprotein administered to rats at 1 and 8 hrs expressed as d.p.m/gm wet weight of tissue. As noted , "only the liver and intestines decrease whereas all the other organs show a 2- to 6-fold increase in specific activity" (Alton et al 1997 Figure 7). Table 3. "Peripheral neutrophil counts and other therapy parameters during discontinuation and resumption of fucose therapy. Peripheral neutrophil counts, fucose doses, serum fucose levels, body temperature, and C reactive protein (CRP) were recorded for each time point as indicated." (Luhn et al. 2001, Figure 1) LIST OF FIGURES Figure 1. Functions of the Glycoprotein (Nature 1995 cited in GoGlyco 2005) Figure 2. Illustration of...2001, Figure 1) As evidenced by the increasing literature, one of the "hottest" new fields of medical and nutritional break through is glycobiology. Glyconutrients are monosaccharides or carbohydrates that are attached to proteins or lipids and are collectively called glycocongugates. These glycocongugates, found in surface of cells play an important role in biological activities and any imbalance of these glyconutrients would then result to disease. Controlled clinical studies in humans and animals utilizing state-of-the-art analytical and diagnostic are presented in this report showing that glyconutrients 1) play important roles in both normal physiology and disease, 2) can be effectively assimilated when provided as dietary supplements, 3) have biological activities that are beneficial or potentially therapeutic for certain diseases and 4) are safe when provided in the diet. However, the claim of drug companies that glyconutrients "heals" diseases is still vague; more research still needs to be conducted. Glycobiology, dubbed by Science Magazine (2001) as the Cinderella, is now the new wave moving through the walls of modern medicine and science.

Thursday, September 26, 2019

Personal Statement for Admission to UCSD Example | Topics and Well Written Essays - 1000 words

For Admission to UCSD - Personal Statement Example I did not have the usual experiences that children have. I never asked my mom to buy anything special for me because I knew how hard she was working just to put food on the table. During middle school, when my mom gave me lunch money each day, I chose not to buy anything. In fact, when I came home, I put the money back into her purse without her knowing about it. When I was 14 year-old, I found my first job doing construction work. As soon as I finished school, I grabbed a quick bite to eat and went straight to my job; I wouldn’t get home until 11 p.m. While I was there, I mopped, painted, and operated jackhammers and drills to break up concrete. The job was physically hard; at times I was left with dry blood around my finger nails. Moreover, my feet hurt so bad due to the cheap shoes I was wearing, but I did not let my mom notice how difficult life was for me. I did not give up on my schoolwork because school was incredibly important to me. The reason is that I wanted somethi ng better for my family! I did not want my would-be kids to experience what I did. However, attaining an education in Baghdad was difficult due to the limited resources we had; there were no internships, field trips, labs, technology, or anything like that. To make it even worse, the standard of education deteriorated after the war because everyone was scared to go to school; even the teachers did not care about their students. I had no choice but to come to the United States to seek for a better future. When I was 16, I heard about the UN refugee agency. I applied right away and explained that I wanted a better future. As soon as I realized that I might be coming to the United States, I began improving my English skills; I started working twice as hard in school. A couple of years after I made an application to the UN refugee agency, I was accepted and received a flight appointment. I first came to the U.S. in 2009. In two months after I arrived I got my first job where I was event ually promoted to the position of manager. After this, I was able to buy my first car and put some money aside for my savings. The reason why I am writing this personal statement to apply to UCSD is because I want to accomplish the dream that I have always wanted for myself and my family. Coming to the U.S. was the proudest moment in my life; it helped give me a different perspective on things. Furthermore, it made me see how important education is. I now have confidence in myself and I realize that I can do anything in this world: there is nothing that I cannot achieve. What is your intended major? Discuss how your interest in the subject developed and describe any experience you have had in the field - such as volunteer work, internships and employment, participation in student organizations and activities - and what you have gained from your involvement. Ever since I was a small child wandering around aimlessly at the clinic of our neighborhood dentist, I found myself constantly gazing at the anatomical diagram of the human body that hung on the front door. This was the same diagram that all the other kids were scared to look at. All that blood, flesh, and bones did not intimidate me; it actually perked up my interest. I have always been extremely fascinated by the human body and how it functions. After the war began in Baghdad in 2003, there were a couple of explosions in the neighborhood next to my family. These

Wednesday, September 25, 2019

SHORT written assignment Example | Topics and Well Written Essays - 250 words

SHORT written - Assignment Example Trojans for example are capable of disabling antivirus software and removing firewalls exposing your computer to serious risks. Spywares are capable of causing your computer to crash as well as collecting personal information and changing configuration settings. These threats are designed to gather information from users that are mainly used to commit fraud and identity theft (Turner & Gelles 2003). There are various methods can be used by organizations to identify threats and act on them before they can cause damages. Primarily, the organization can establish a corporate policy to only allow approved devices on the network and to have those devices running on the latest version of antivirus. Secondly, the policy should allow only the administrators to install and run applications. Thirdly, the organization can invest in software tools that aid in auditing computer activity and detecting the presence of tampering and damage. Lastly, the organization should make computer security education a prerequisite to any computer user. This will help users to know how best to protect their systems and detect any unusual

Tuesday, September 24, 2019

Euthansasia Essay Example | Topics and Well Written Essays - 1000 words

Euthansasia - Essay Example The thing that was brought to notice from the acceptance of euthanasia in some regions like Oregon (United States) can be considered as the harsh truth. The practice of euthanasia even results in assistance of death to those who aim for suicide even though their ailment is chiefly depression and not painful physical condition. Several other wrong practices find their way under the roof of euthanasia, which becomes crucial to be addressed with prominence of attention. Holy Bible, the most important religious book of Christians directs the thoughts and believes of a person the acceptance of God as the power who alone should hold the right to take away life. Thus, euthanasia, a practice by means of which assisted suicide is provided to the patients in terminally ill position is not within the acceptance boundaries of ethics as presented in the holy Bible. As per Bible and believers of bible only Almighty Father hold the right to take away the life from the human body. Thus, acceptance of euthanasia or assisted suicide essentially leads to the violation of the laws of the Bible. Christians who hold strong believe in Holy Bible and its teachings present themselves with the situation in which respect for the holy words should be given and following of the teachings should be strictly adhered. Thus, the acceptance of assisted suicide for the terminally ill patients also should not be practiced as per Christianity. We hereby discuss few papers on euthanasia that has been published on the basis of studies carried out on the topic of euthanasia.Euthanasia- In the light of scientific research Haverkate (1998) and colleagues performed a study to describe the presence of and compliance with guidelines in the cases of euthanasia and intensifying of the alleviation of pain and symptoms. The study also held its focus to the understanding of the opinions of physicians about written guidelines. In addition, the relationship between meeting of the requirements for prudent practice and presence of and compliance with guidelines or euthanasia was studied (Haverkate, 1998). Interview was used as the method of data collection. And the results revealed that in case of meeting the requirements for prudent practice, there existed no significant differences between cases of euthanasia in which EAS (euthanasia or assisted suicide) guidelines were present and the ones in which there were no such guidelines. In addition, the presence of guidelines seemed to project better adherence to consultation and other essential actions. However, it is essential note that the study had a limitation, fo r the collection of data was based on the self-report of physicians and the content of guidelines was not verified. We therefore prose that well-designed, large sample sized research studies should be conducted so as to further assure the results as revealed from this study. In another study, Rurup (2005) and colleagues attempted to learn more about the characteristic patients who request for euthanasia or physician assisted suicide and the effect of physicians decision. It was concluded from the study that being tired of living could play a crucial part in the desire of euthanasia in the patients. The tired of living phenomenon can exist irrespective of whether the patient is suffering from a major disease or not. It was noted that the high occurrence of symptoms in the absence of classifiable sever disease

Monday, September 23, 2019

Gender, Globalization and Aesthetic Surgery in South Korea Essay

Gender, Globalization and Aesthetic Surgery in South Korea - Essay Example is influenced by a hybrid of intersecting factors like negotiation between national and global standards of beauty, national identity, official and unofficial religious discourses, caring for oneself, aging, quest for social status and traditional attributes as opposed to the generally held notion that cosmetic surgery is only two-fold; as a feminist issues and as undesired effect of influence from westernization. The authors present this argument by questioning the previous research done on the field of cosmetic surgery. The author has used different types of evidence to support his central argument. The major types of evidence used are statistical and judgment evidence. Statistical evidence is used to annul the notion that cosmetic surgery is a feminine issue. Drawing from official statistics, the author reveals that male patients make 10% of the total cosmetic surgery patients. Furthermore, according to Morgan (1991:30), the number is higher ranging between 30 and 40%. The most interesting thing with the convectional research is that, despite the increased number of male patients seeking the services of cosmetic surgeons, men have been left out of the discussion making the issue sound solely feminine. Judgment evidence has been used to dispel the notion that Korean cosmetic patients are exclusively influenced by western effects. The authors have been able to make concrete inferences by drawing on the official facts and figure. Cosmetic surgery has been taken to signify a strong sense of indigenous identify as an individual has a mixture of both global and national beauty attributes. Furthermore, taking a few beauty aspects from different cultures demonstrates access to wider cosmopolitan identify with a more global perspective also informed by the local knowledge of concepts and beauty. The authors have presented a well-researched and coherent piece of work. This work is well informed and largely avoids cases of bias by many instances of statistical evidence.

Sunday, September 22, 2019

High School vs College Essay Example for Free

High School vs College Essay The transition from high school to college is not only an exciting and challenging time, but also a great milestone in one’s life. There are several differences between the lives of high school and college students. Some individuals will be able to jump right in and adjust to this change seamlessly, while others may take years to adapt, or never even grab hold of the whole college experience at all. High school and College are both educational grounds for a student to grow and enrich their lives with knowledge. Both are like puzzle pieces: on one side they fit together, but on the other side they are something completely different. High school is a continuation of elementary and middle school, wherein students learn what is expected of them in regards to the standard of education set by the government. Up until the age of eighteen, students have no choice but to attend school as it is required by law. During school hours there are rules and regulations which one must follow, or be reprimanded otherwise. There is also a strict schedule that students must follow. Along with basic classes, there is also social learning that takes place at the same time. Students must still understand how to react to certain situations, such as if it is rude to talk over someone else who started talking first. High school also presents a wide variety of activities and field trips. With four years of experience and routine, adolescents become sufficiently acclimated to high school. College, contrarily, is a new experience all together. Individuals are not legally required to attend college, but those who choose to do so have the opportunity to select which university he/she wishes to attend. Acceptance is not always guaranteed, of course. If one is accepted, one can pick and choose which classes to take. Aside from core curriculum, these classes usually correspond to a specific degree that a student declares, allowing  one the opportunity to build their school schedule around their otherwise busy lives. People can really see the distinctive differences these two phase in life; however, there are also some similarities you will carry on during your transition into college lives. Friends from your high school will always be there for you especially when you keep a constant connection between them. Studying habits such as cramming for test or homework, creating during a test or copying another student’s homework, breaking the rules and disciplinary sanctions are still evident in both high school and college. We all know that everyone goes through high school and college. We can compare that college is much more challenging and complex than high school. This is a higher level of learning, thus, requiring more time, effort as well as devotion to studies. Even though college is very tiring at times, I still believe that college is much more enjoyable and exciting. To have that kind of freedom in your schedule is very rewarding; however, proper judgment is a must since we are all mature students now. High School students don’t need to pay tuition; government-funded. Don’t need to pay for residence, rent or other accommodation such (e.g. can live at home for free don’t need to pay for books) books are provided by school in high school. Student has fewer assignments on average of 1-3 assignments per week. Student don’t nee Body Paragraphs (A) College (B) High school (1) Cost Topic sentence College is more expensive than high school because of tuition, living expenses, and books. tuition: $1,500 $2,000 per term must pay for residence, rent, or other accommodation if living away from home o e.g. rent can be $400-$600 per month; residence $2,000 per term must pay for books: $300-500 per term don’t need to pay tuition; governmentfunded don’t need to pay for residence, rent, or other accommodation o e.g. can live at home for free don’t need to pay for books o e.g. books provided by school (2) Workload Topic Sentence The workload in college is more challenging than the workload in high school. more assignments: average of 3-5 assignments per week more time and effort needed to complete assignments successfully o e.g. because assignments are more challenging, they take on average 2-8 hours to complete assignments worth greater percentage of final grade o e.g. every assignment worth an average of 25-50% of final grade fewer assignments: average of 1-3 assignments per week less time and effort needed  to complete assignments successfully o e.g. assignments are less challenging and can be completed quickly before class assignments were a lower percentage of final grade o e.g. every assignment worth an average of 5-20% of final grade (3) Social Aspects Topic Sentence College offers more activities, sports, and clubs than high school. can play on varsity sports teams or make use of athletic facilities o Hockey, volleyball, football o Work out in gym, pool, and weight room can attend pub nights at on- campus pub o special Halloween, Christmas, and Valentine’s Day pub nights can get to know fellow students through social activities, such as Orientation week there are many sports teams, but no varsity teams o hockey, volleyball, football o no workout facilities, pool, or weight room there are no pubs on-campus at high school because too many students are underage. in order to meet a variety of students, must participate in activities outside of class e.g. no orientation week Thesis Statement: College is more expensive, presents more academic challenges, and offers a more social environment than high school. Concluding Sentence: When college and high school are contrasted on the basis of financial, academic, and social aspects, it becomes clear that college is more costly, more academically challenging and more socially stimulating that high school environment.

Saturday, September 21, 2019

Emergency Response Plan Essay Example for Free

Emergency Response Plan Essay The rationale for an emergency response plan on a construction site is to have a well organized plan of action in place to be prepared to immediately respond to various types of emergencies. The environment of construction sites can change constantly which is why it’s important to plan carefully before projects begin and make adjustments if necessary. As our text states, preparation involves planning, practicing, evaluation and adjusting to specific circumstances (Goetsch, 2003). Proper preparation and response helps the situation to be quickly controlled and could prevent panic, decrease the possibility of injury, death and damage. The Emergency planning and community Right to Know Act provides information about hazardous chemicals available to a community where they are being used so residents can protect themselves in case of an emergency. The Emergency planning and community Right to Know Act has four components that include: emergency planning, emergency notification, toxic chemical release reporting and information requirements. There must be one person in charge and everyone involved must know that person is. There should be a designated person or people trained to administer first aid and first aid kits should be stocked and readily available. An emergency action plan (EAP) should include various plans for each anticipated emergency, that should include the following components: procedures, coordination, assignments and responsibilities, accident prevention strategies and schedules. They should be customized by location and should include a map, organizational chart, local coordination information and local training schedules. There should be an emergency response team (ERT) to handle general and localized emergencies, facilitate evacuations and shutdowns, protect and salvage company property and work with local authorities. There should also be a trauma response team (TRT) should consist of health and safety personnel who have had special training or credentialed counseling to help employees with what they have experienced after being involved in an emergency situation. TRTs are able to recognize symptoms of employees who need professional care and refer them to qualified care providers (Goetsch, 2003). Works Cited Goetsch, D. L. (2003). Construction Safety and Health. Upper Saddle, NJ: Pearson Ed,

Friday, September 20, 2019

Examples of Displacement in Literature

Examples of Displacement in Literature Place and displacement are always featured in post-colonial writings, whether its Derek Walcotts poem A far cry from Africa or powerful novels for example Heart of Darkness. This feature opens up a broader concept where post-colonial crisis of individuality comes into reality. When a novel carries elements of place and displacement, the theme of alienation is always reflected, this originates from a sense of displacement. The sense of displacement may have derived from migration, enslavement or even alterity which may be put forward by similarities or differences between different cultures. This concept was heavily reflected in Heart of Darkness by Joseph Conrad and Season of Migration to the North by Tayeb Salih. Both writers seem to be telling a tale about colonisation with their own interpretation of different experiences. Salihs novel revolves around the story of brilliant Mustafa Saeed, the novel indicates journey to the heart of light. Whereas, Conrads novel is a complete rever sal to Kurtzs journey to Congo and connotes a journey to heart of darkness. Both novels focus on geographical locations which have in some way shaped the individuals in the novel and perceived their emotions such of loathing and despair. It seems that both writers are searching for a true identity and avoiding the conflicts of other cultures. Their search is in the end a pointless and time wasting experience; nevertheless their experience of colonialism was all about corruption and greed. The concept of displacement is discovered by us (the readers) when Conrad instigated racism towards the Africans which was quite transparent. In contrast, Salih bravely expressed himself being misogynist, which is rather controversial in todays society-since men and women come across as being equal. The representation of the two continents in these novels is displayed in diverse ways to each other. In Conrads novel, the narrator expresses his opinion of River Thames being mournful gloom, brooding motionless. His description of England but darkness was here yesterday clearly reflects Conrads view as to how Romans once colonised England. The description gives an impression of England being wild: Here and there a military camp lost in a wilderness like a needle in a bundle of hay-cold, fog, tempests, disease, exile and death- death skulking in the air, in the water, in the bush. The metaphor is cleverly used here for camps being lost and its impossible to find them because of fog and exile. Here we discover Conrads first description of displacement from the evidence (as stated above). When Romans first arrived, England was seen as a displacement for people living there. In contrast Tayeb Salihs narrator describes Europe (where he studies) thus: I had lost for a time in a land whose fishes die of the cold. This clearly evokes a feeling of displacement he felt when he was in Europe-the feeling and emotions he got when he came back are complete reversal and it was an extraordinary moment of feeling for Europe. Later in the novel we come across the narrators feeling of alienation which evoked from displacement the trial into a conflict between two worlds, a struggle of which I was one of the victims. Here the narrator seems to be tied up between two worlds and trying to suggest that where he studied (Europe) is a different world to where he was born; his village. However, when he returns to his village, he seems to remember Europe, one possible reason could be he becomes attached to that world. This is quite evident in the novel I am from here- is not this reality enough?. I used to treasure within me the image of this little village, seeing it wherever I went with the eye of my imagination. Earlier in the novel his description of the village has drastically changed, because of the experiences that he came across in the village Over there is like here, neither better nor worse the narrator seems to come to a conclusion that world is the same theres no difference Europe is the same as his village. The concept of European being the dominant and powerful one is established in Edward Saids Orientalism (Is knowledge based idea in particular knowledgeknowlege and ideasisead of Asian cultures andnad languages.) In his book Said presents an argument argue of East being generated by western/European scholars who represent those cultures from a colonial point of view. Salih gives an impression of Africa is what Europeans make it. Which I think is a valid impression and its clearly evident in Conrads novel: They [the slaves] were dying slowly it was very clear. They were not enemies, they were not criminals, they were nothing earthly now inefficient, and were then allowed to crawl away and rest. These moribund shapes - Marlows description of African men and they are not treated humanely, thus Marlow describes them as less human. In one of his chapter he brilliantly says Orientalism was ultimately a political vision of reality whose structure promoted the difference between the familiar (Europe, West, us) and the strange (the Orient, the East, them). This is true to an extent if we base it upon both novels. When featuring the element of place and displacement in a colonial novel, it is always essential that the values of the place are considered; what effect do those values have on the character. In Heart of Darkness, Conrad mainly presents the values of Africa through the character and what view does the narrator have. In chapter one Conrad presents the narrators view of Africa They were dying slowly-it was very clearnothing but black shadows of disease and starvation (pg20). The whole passage gives an impression of African men as than human, as they the are mistreated and overworked slaves. Similar approachapproch is also seen further in the novel He was usefulthe evil spirit inside the boiler will get angrySo he sweated and fired up and watched the glass fearfully (pg 45). In this passage Conrads narrator, Marlow still doesnt consider them equally and compares them with animals a dog in a parody. The reason being for this is the man had no knowledgeknowlege of machinerymachinary bec ause for them its something new, thus they are dependent on thethr white men to train them. The white man took takes advantage of their lack of capacitycapcity and scares him by referringreferrring to the evil spirit. Not only the narrator in The Heart of Darkness doesnt respect the values of Africa nor the natives living there, the character of Kurtz, who is portrayed as a powerful, corrupt man, takes full advantage of these less capable men and treats them as slaves. Kurtz doesnt respect the Africans and treats them like childrenchidren who needs correction or help with anything He began with the argument that we whites, from the point of development we had arrived atBy simple exercise of our will we can exert a power for good (pg 61). Kurtz got the idea that before he went to Africa, the natives were living as uncivilised people which was then corruptedcorrpted by Kurtzs mission. On another surface level Kurtz, this wrotewuote also gives an impression of him believes that white men can revolutionisedrevolutioned Africa and bring goodness to the country as well as making African men more capable. Thus the Africans will see the white men as Gods showing them the path, which they will follow. Conrad seems to dismissdimiss the values of Africa and thus portrays the role of white men ruling over Africans at the time of when the novel was written. Africans were treated as slaves by the Europeans and white race at the time of slavery and the periodperoid of slavery was started long ago, during the 15th century. Throughout the novel Conrad refers to the natives as Savages, which shows his brutality towards them. This approachapproch was very evident in the novel when he refers to the Africans as Well if a lot of mysterious niggers armed with all kinds of fearful weapons (pg 23), another example unless the body of a middle-aged negro, with a bullet-hole. (pg 24) Both these quotes are very harsh and suggest that Conrad is being very racist towards the Africans. At the time, native Africansafricans were used to hearing such insulting names and because they werent treated equally as white men, this made them more weaker and less capable to stand for their self. Furthermorethemsel ves. Furtehrmore, the audience wouldnt find this racist besides England would expect something far more racism than this, as they ruled over them for hundredshunderds of years. This issue was consideredcondidered by many African Professors and one of the most effective approachesapproch to Conrads racism was seen by Chinua Achebe, Nigerian novelist and professor of African Literature. Achebe called Joseph Conrad a bloody racist (Knowles Moore 299), which he moderated in later printed versions to a thoroughgoing racist (Image 257). His view is contradictory, as some would agree with him. Simply because Conrad was very direct when he was referring to the Africans with the racist word, from the point of view of Africans he would definitelydefinately be classed as a racist. Achebe also said in his lecture that Marlow represents Africans as a part of the wilder- ness. He reduces them to fragmented body parts, limbs or rolling eyes (254). On the other hand, Marlow finds that an African who does something more than materializematerialise out of the evil jungle to scare him resembles a dog in a parody of breeches (Heart 38; Image 254). To an extent his argumentsar ugemts are clearly valid ones, the image of Africans portrayedportaryed by Conrad is very brutal and showssowss the narrators hostilityhostality towards Africans. On the other hand, from the point of view of Europeans Conrad would bebeen seen as racist. They would argue argure that Conrad only portrayed the events that occurredoccured during the time and at that time people wouldnt consider this as racism. However, from a point of view of 21st century generation, this would be considered as racism, such deference is more serious and sensitive;, people would be more careful and consider the affect of the word before saying it. In Salihs novel, Season of Migration to the North deals withiwth the values and culture of Sudan and how the narratornarrotor and other characterschracters develop their connection with the country they were born in. In the novel, Salih presents the NorthernNothern and Southern Sudan as very different to each other. The Northern Sudan is modernizedmordernised, in that theretheere are many facilities such afacelities sucha s hospitals, schools and other modern infrastructures. Thismordern indrsstructures. Which is contrasted with the narrators village in SouthernSouthewrn Sudan, where theres hardly a school for children. This conflict of Sudan is reflectedrefelcted in the novel by TayebTayed Salih and the novel givens an impression of traditional tradional Sudanese values being replaced by materialistic things and technology. Furthermore, in 1956 Sudan gained its independence and tension was on its peak between the north and the south due to differencesdiffernces in religion and ethnicity. In 1983, the war brakes out againagin between the Muslim north and Christian south. Now the Southern SudaneseSudanease have gained their independence and are allowed to choose between unity and secession. The second narrator, Mustafa Saeed like the first narrator feels alienatedaliented when hes in Europe to complete his study and I, over and above everything else, am a colonizer, I am the intruder whose fate must be decided (pg 94) like the narrator, Mustafa Saeeds comment evokes a feeling of displacement. This raises an argument that is Europe a hostile place for anyone like the narrator and Mustafa Saeed or whether its just your personal experience. ReferringReferrring to the values Sudan, Salih clearly reflectsreflets these values and tradition through the characters. Mustafa SaeedsSaeeds wife Hosna portraysportays the character of typical loyal wife, who keeps the tradition of a Muslimmuslim wife After Mustafa Saeed, she answered with a decisiveness that astonished me, I shall go to no man . Her character is completelycompletly opposite to Jean Morris, to whom Mustafa Saeed married and then killed her. Her character reflectsreflecst the values and culture of England or what he sees in her I was pleased she laughed so freely. Such a woman- there are many of her types in Europe- knows no fear; they accept life with gaiety and curiosity. And I am a thirsty desert, a wilderness of southernsourthern desires. This statement stereotypes the women and the way they approach men and Mustafa Saeed gives an impression of women being objectsojects in his eyes. Thus he compares himself to a prey, on a look out for any women. Furthermore, h es suggesting that he comes from a place which wild and full of desires and in this case his desires are sexual ones. These two women are complete reversal to each other, one is loyal portraysportays the value of Sudan and other portrays the careless European woman. The values of Europe are very differentdiffernt to Sudan, however it doesnt seem to be affecting Mustafa Saeed and yet he goes further with his desires. Frantz Fanons Black skin White masks is about the search of true identity, race and skin color.colour. There is a fact: White men consider themselves superior to black men. There is another fact: Black men want to prove to white men, at all costs, the richness of their thought, the equal value of their intellect. In his book he presents his personal experience and comments on other theories of psychologists.psychiologists. Fanon presented the idea that a person is criticizedcritised because of their native culture, they then become victims of inferiority complex, when they are put in the middle of a superior culture. Thus he believesbelievs that black men have to adopt white masks in order to become part of the superior culture. According to him, the best way to achieve this is to speak the language of that culture and by speaking the language, you need to understand the values and adopt the culture.cultre. So did Mustafa Saeed put on a white mask? To an extent, its its clearly evide nt from his desires which are not the values of Sudan. It seems that Mustafa Saeed valued the white culture so much above his original culture. However, this is arguable, as he might be trying to become part of what he believesbeleives a superior culture; thus he adopts its its language as well as culture. Next point: Marlow similarly adopts the culture of Africa or Kurtzs. Like Kurtz at the end he becomes corrupted and lies. Structure, language, form used in HOD and SOM to create effect Critical conclusion on both novels/or any parallelsparalells

Thursday, September 19, 2019

Dairy Products: An Important Source of Calcium Essay -- Exploratory E

Dairy Products: An Important Source of Calcium Out of the sources of calcium available, dairy products most aptly provide the necessary calcium with the least amount of side effects. Using dairy products as a calcium source cuts out the need to research which type of calcium is being supplied because all dairy products contain elemental calcium (Got Calcium?). A benefit of elemental calcium is an increased ability to gauge how much calcium is being absorbed (Calcium Supplemental Guidelines). This is because the elemental calcium in dairy products is more easily absorbed (Got Calcium?) Dairy products’ calcium is also less susceptible to complications with other ingested substances such as food or medications (National Osteoporosis Foundation). Removing these possible complications also removes some of the concern of short-term health risks associated with calcium. Studies have also indicated that elemental calcium does not increase some long-term health risks as calcium citrate or calcium carbonate (which are both fo und in calcium supplement pills) might (Harvard School of Public Health). All of these benefits make dairy products a safe and reasonable choice for supplying calcium needs. There are many types of calcium available, and with all of them a certain amount should be ingested each day. Though calcium requirements vary by age and gender, the average person needs about 1000 mg of calcium a day (Nutrition). This helps to keep up with bone growth and repair, and keep up with the loss of calcium through shed materials (National Osteoporosis Foundation). Without continually resupplying the body with calcium severe health problems can ensue (National Osteoporosis Foundation). This resupplying can be done usi... ...without an abundance of time to carefully watch calcium intake and calcium safety, dairy provides the best option. It is a reliable source that can be easily attained without much variation and will dependably be ingested. Works Cited Calcium Supplement Guidelines http://ag.arizona.edu/pubs/health/az1296.html Dietary Supplement Fact Sheet: Calcium http://ods.od.nih.gov Got Calcium? http://www.ext.nodak.edu/extpubs/yf/foods/fn587.pdf. Harvard School of Public Health http://www.hsph.harvard.edu/nutritionsource/calcium.html National Osteoporosis Foundation http://www.nof.org/prevention/calcium_supplements.html Perchlorate Material Safety Data Sheet http://msds.pdc.cornell.edu/msds/MSDSDOD/A264/M131746.htm#Section11 Tests on milk, lettuce find perchlorate is widespread http://www.sacbee.com/content/businass/story/1161626231p-1250598

Wednesday, September 18, 2019

Global Warming and Greenhouse Gas Emissions :: Global Warming Climate Change

Global Warming and Greenhouse Gas Emissions Overall, emissions of CO2 increased by 0.3% to 6.8 tons per person in the United States. Emissions of greenhouse gases other than carbon dioxide, which account for 17% of total greenhouse gas emissions, declined by 0.6%. Emissions from the industrial sector declined 1.3% even though the U.S. economy grew 3.9% in 1998. However, CO2 emissions from transportation grew by 2.4% while CO2 emissions of regulated utilities expanded by 3.2% as a result of a hotter than normal summer. Overall, 1999 U.S. greenhouse gas emissions were about 10.7 percent higher than 1990 emissions, which are estimated at 1,655 million metric tons carbon equivalent. The 1.1-percent average annual growth in U.S. greenhouse gas emissions from 1990 to 1999 compares with average growth rates of 1.0 percent for the U.S. population, 1.5 percent for energy consumption, 2.2 percent for electric power generation, and 3.1 percent for real GDP Table ES2. U.S. Emissions of Greenhouse Gases, Based on Global Warming Potential, 1990-1999 (Million Metric Tons Carbon Equivalent) Gas 1990 1991 1992 1993 1994 1995 1996 1997 1998 P1999 Carbon Dioxide 1,351 1,338 1,365 1,397 1,422 1,435 1,484 1,505 1,507 1,527 Methane 182 183 183 178 179 179 173 172 168 165 Nitrous Oxide 99 101 103 103 111 106 105 104 103 103 HFCs, PFCs, and SF6 24 22 24 24 25 29 33 35 40 38 Total 1,655 1,644 1,675 1,702 1,737 1,748 1,796 1,816 1,818 1,833 P = preliminary data.Note: Data in this table are revised from the data contained in the previous EIA report, Emissions of Greenhouse Gases in the United States 1998, DOE/EIA-0573(98) (Washington, DC, October 1999).Sources: Emissions: Estimates presented in this report. Global Warming Potentials: Intergovernmental Panel on Climate Change, Climate Change 1995: The Science of Climate Change (Cambridge, UK: Cambridge University Press, 1996). Energy End-Use Sector Sources of U.S. Carbon Dioxide Emissions, 1990-1999 Sector Million Metric Tons Carbon Equivalent PercentChange 1990 1999 1990-1999 1998-1999 Transportation 431.8 496.1 14.9% 2.9% Industrial 454.8 481.2 5.8% 0.2% Commercial 207.7 243.5 17.2% -0.4% Residential 254.2 290.1 14.1% 0.4% Note: Electric utility emissions are distributed across sectors. Total carbon dioxide emissions from the residential sector increased by 0.4 percent in 1999 (Table 6). Year-to-year, residential sector emissions are heavily influenced by weather. For example, in 1996, a relatively cold year, carbon dioxide emissions from the residential sector grew by 5.9 percent over 1995. In 1997, they declined by 0.

Tuesday, September 17, 2019

Research on Hijra Community

Hijra community INTRODUCTION: We know a community is a group of people who work with one another building a sense of trust, care, and support. In Bangladesh Hijra community is a strong community, although they are the most neglected people in our society. Higras are the people who are neither male nor female. In our society they are not treated as human being but hijras claim that they are more capable than men or women. Because they are the combination of both male and female, they are capable of doing the work, which is preferable by men and women.Their demand from society is not so much; they just want to be treated as normal human being and the basic human needs. SUMMARY: 1 (MOVIE: COMMON GENDER) The movie is a reflection of androgen’s life cycle. Androgens were look like men but dressed up like women. So that people teach them and never showed a minimum respect for them. There was one leader of their community who instructed others. One of the characters of this movie was â€Å"Shusmita†. Her parents left her to the hijra community because they think that it was very ashamed things for them that their child was hizra.Shusmita had a male friend named â€Å"Shonjoy† who was also betraying her. After that she felt that there was no meanings of her life for exist. Then she committed suicide. Another character of this film was â€Å"Babu†. The hizra community called her â€Å"Bably†. She always missed her family but if she came home she has been beaten by her brother. Here it is clear that people always keep negative impression about them no matter how hizra communities behave. They collect money from market to survive because societies people never give them work. The most painful part of the movie was people don’t want to entomb hizra with them.This movie focused that androgen people could never have the respect either mortal life or eternal life. SUMMARY: 2 [LIVING ON THE EXTREME MARGIN SOCIAL EXCLUSION OF THE TRANSG ENDER POPULATION (HIJRA) IN BANGLADESH] In childhood if a boy prefers to play with girls, wear female clothing, and household chores then the family members are not take it negatively. Gradually family members notice something goes wrong with their child. Family members felt uncomfortable when the society started to realize the feminine behavior of the boy and comment roughly. There are some families whom are left their child to maintain the social status.But some family kept them. The boy gradually grown up but he cannot change himself because he starts to discover himself that he neither boy nor a girl but a mix of both. He falls into identity crisis as they find feminine emotions trapped inside a manly body. They don’t treat as human because they don’t have any rights, like they cannot take part in the burial of their parents. Lots of situation like this force him to join a hijra community. Over there they find friends like them, so they don’t feel loneliness anymore, and the guru of the community became their parents.She named them newly like â€Å"Salam† become â€Å"Salma†. They get their livelihood and security with and through the community. SUMMARY: 3 They swing between both sexes: hijras as â€Å"asexual others† There are two types of gender male and female, which are classified by our society. But there is another type called â€Å"Hijra† whom is clam that they are third gender. Hijra of Bangladesh defines them as human who are neither male nor female. They can be easily identified by their get-up, language and a very different style of clapping. They developed a distinctive lifestyle gradually.They formed as a community with strong sense of social solidarity. Hijra society of Bangladesh divided into several bands but there is a strong unity and coordination among them. Through every community have separate area, they often visit another community and they welcomed with warmly and greatly treated beca use hijra society is very hospitable. Hijras are mostly illiterate, jobless and homeless. They can barely manage food for survival or see a good doctor for checkup. They have no stable flow of income. In India hijra have a high income rather than Bangladesh.But in our country hijras are fighting hard to survive. They sing and dance for new born baby; they also collect money from market places. If our mainstream society accepts them as normal human being they can seek for new sources of income. QUESTIONNAIRE 1. Where they live? 2. Do you have any community? 3. How they come into the community? 4. Who bring you to the community? 5. Do you have any leader? 6. How a group leader is selected? 7. What is your role? 8. What is your leader’s role? 9. What are their occupation / how they survive? 10. Do you maintain any selected area for collecting money? 1. Did your family still communicate with your? 12. How do you communicate with others? 13. How you get the news of new hizras? 14. What are the requirements to enter the community? 15. If anyone faces any problem, how they solve the problem? 16. Do you have solved the problem by yourself (individual) / other members help you? 17. What is the strength of your community? 18. What they demand from the society? 19. How can you serve the society/ country? 20. Do you have any social or political backup? 21. Which religion do you belong? Do you still maintain it? How? 2. Do you face any problem to maintain it? What are those barriers? Case study: 1 Putuli was another member of Rayer Bazaar hijra community. She told us that she came into this community when she was nine years old. Because of her hormone problem her family left her there. Although her mother loved her lot but unable to stop her father to relinquish her from the family. She told us that still she wanted to stay with her family but when she go for her family they behaved very rude with her. They don’t even touch her and made face like they have se en a alien.Then she told us about their leader on the Rayer Bazaar hijra community who takes care of her as like her child. The leader decided the role of each member and the leader was selecting by concerning their age no matter how active she works. She told us that they dance and sing on society’s birthday party and marriage ceremonies but basically they collect money from market to survive. Then she told that the existence of the society is very tough and painful for her because she always asked herself that who wanted to bag people for money or forced them for giving money for free, her answer is may be no one.It proves that she also have a very strong self-respect. They just don’t understand that it is not any diseases but hormone problem so why people looking at them very oddly with negative point of view. One of the most important things about their community was although they know that they were HIJRA but they didn’t like that word. Then she smilingly t old us that she can handle any kind of problem easily because she has the ability of both male and female. She and her friends can maintain any situation by herself without any help of other by showing their disability approach or brain.This was the main strength of their community that without any political or social backup they live their life with each other. There are different kinds of hijra of their community who belong various religions like Hindu, Muslim, Christian, and Buddha etc. They celebrate their religious occasion like other people of society. Case Study-2 Bala is a Hijra (androgen), who is a member of Rayerbazer hizra community. The size of the community is large, where 65 people live together. They have a leader in this community who is the eldest person of the community, they call her khala, and she plays a vital role in the community.She did not born in the community, she was borrowed from her family when she was 6 years old. Her family doesn’t try to bring her back or stay connected with her. They don’t take any baby because they think if their next baby born as hijra. She told the community has a strong network through they get the news of new hijras. Hijras are easily identifiable because of their nature and attitude. Where all the members along Bala collect money shops and give them all to khala, khala ensure the livelihood for all the members. The brotherhood is so strong between them, if anyone faces any problem everyone comes forward to help.The strength of the community is one for all, all for one. But they never have the happiness of family. They want life partners but that is quite impossible. Her demand from the society is everyone should treat them like a normal human being. Sometime they committed suicide because they cannot handle the way they are treated. She don’t like to collect money from other, she claims that â€Å"I can do any work, like others I also have hands and those are strong. We are not usel ess; we can contribute for the country. We just need opportunity. † They work as the entertainer of the society. But they don’t want to be the clown of the society.They don’t want to live by begging from others. She don’t like the way people look at her. People called her Hijra, which is very painful to her. She wants to known by her name. She came from a Muslim family and still maintains her religion. Like her other members of different religion live together without facing any problem. Case Study-3 Hanna is a member of Keranigonj Hijra community. First time when I saw her she was in a barber shop. She seemed very friendly. I took a short discussion with her. The community where she lives is not a large one. The community is leaded by her guru.She come into this community when she was 12 years old. Her family was ashamed of her. She left her family because of the torture of her father and some of the members of that community offer to join them. Here she found family, friend, food and shelter. After 13 years she is holding a important position in the community. They basically collect money from the local markets and shops. They also participate in the dance of marriage and puja. When they got any information about new born baby they go and dance for money. When I asked about the problem that she faced, she replied there is problem in every aspect of the life of a hijra.One of the problems is people react very oddly when they saw a hira. She said they look like they saw an alien on the street. She handles this problem very interestingly; that she thinks that she is a beauty queen and no one can took their eyes off her. Although they are very confident about themselves but they need the support of their community to survive in the society. People don’t respect them as human being but they have more attachments and feelings, moreover they are very religious. As they are also living human being, they want the basic human needs fr om society.They want to get out of their traditional lifestyle. They want to live in normal human society as a normal human being. They want to work for the society as well as for the country. They are strong and there is no doubt about it, because their community is surviving without any political and social backup. CONCLUSION: Above all it can be say that hijra community who demand themselves as third gender also part of our society. They want nothing but the minimum respect for them and basic rights by which they can survive. If our society provides them chance to do something for betterment they can prove themselves as an asset.We all should help them to develop their community as well as our society by providing the facility which they deserve. It is the right time to change our point of view to them so that they can turn their weakness into strength by serving our country and never hesitate to think that they are also a part of our society. Government should also help them by making laws and policies by serving them with their rights. REFERENCE: †¢http://www. ncbi. nlm. nih. gov/pmc/articles/PMC2928103/ †¢http://www. transgenderasia. org/paper_swinging. htm †¢Movie : common Gender †¢Survey Questionnaire

Monday, September 16, 2019

Reproductive Health Bill Essay

RH Bill would be a beneficial law to the country. It will further implement the population control of our country, strengthen the health of the people, specifically, the women, and educate the citizens, especially the teenagers, regarding sexuality, responsible family planning, maternal care and such. Responsible Parenthood and Reproductive Health Act of 2012, commonly known as Reproductive Health Bill, provides access to responsible family planning methods such as contraceptives, birth control pills, IUDs and other related family planning devices. It also strengthens the over-all health of the countrymen, especially women, with the widespread distribution of the said devices. Furthermore, it provides education concerning sexuality, population limitation and responsible parenthood. With the third and final reading of this bill, it had been recently passed into law last December 17, 2012. Thirteen senators and one-hundred thirty three congressmen voted in accordance to the said bill. This law had always been a controversial issue in our county. Endless debates, divided into pros and antis, were disseminated among the region. Pros argued that nonstop births due to lack of education concerning sexual and reproductive health and family planning causes people to put their health and future at stake. In addition, they have deficient income which causes the family not to receive their basic needs which are education, food, shelter and full support for their futures. This overpopulation will in turn be a hindrance to the country’s progression. On the other side, continuous opposition of the antis, led by Catholic Bishops’ Conference of the Philippines, regarding immorality of the alleged law contradicts their religious beliefs. According to them, this law allows pre-marital sex before marriage with the prevention of pregnancy. This corrupts the morality of the soul of each individual, based on the Church’s teachings. However, the real issue does not reside in our personal interests and beliefs. The future of our country and the next generation is being risked if we will put first into account our religious principles. We need action. Our country has already suffered and engulfed enough from poverty. This poverty can only be resolved with the control in population, education and assurance of the health of the citizens. Reproductive Health Bill will definitely be the answer to our country’s dilemma for years. Reproductive Health Law will be a practical solution for the country’s drawbacks to economic progress. How? First, population limitation will be instigated throughout the country. Currently, Philippines is ranked 12th as the most populated country in the world. Actually, our country is fortunate because it is surrounded with abundant water and land resources, just sufficient for our needs. However, with exponentially increasing population every year, the supply of these resources will keep on diminishing. If this continues, we will experience the never-endi ng cycle of poverty. As I research, I found out that Thailand, one of our neighboring countries, had a population of 65.5 million while our country had 92.3 million. We had an estimated GDP per capita of $4,214, while Thailand’s GDP per capita is twofold of ours, $9,396. It may be concluded that population is also one of the factors that will affect the economic development of our country. The more the population is, the lesser the chances to prosper. Given that the highest population growth rate is among the poor because of lack of education about family spacing and insufficient income, it will be expected that the other children will not be provided with right education and other appropriate needs. With these, they will not contribute well in the labor force of our country. And if ever they were able to work, their mere involvement is not enough to acquire their needs. This law aims to achieve their desired fertility goals depending on their needs, principles and beliefs. With the right family s ize, parents can feed and support their children. Also, with the use of the legally and medically safe contraceptives, birth control will be a tool to terminate overpopulation, which will eventually help our country to advance economically. In addition, by means of this law, proper maintenance of the over-all health of the citizens will also be upheld by the government. Government will support and promote reproductive health services, maternal care, particularly, for the women, and of course, responsible parenthood for the parents. Problems regarding reproductive health services were cited by Sen. Pia Cayetano, chair of the Senate committees on health and demography and youth, women and children. Many poor mothers were having difficulty to avail contraceptives because local government units have passed laws forbidding the use of contraceptives. As stated by her, these were one of the reasons why these mothers are forced to send the child to relatives, giving up their children to a rich neighbor and leaving their child in a basket in front of the door of the church. This bill would be a great help especially to the poor because it provides access to â€Å"medically-safe, legal, affordable and quality† natural and modern family planning methods (sec. 2). In addition, studies show that contraceptives lower the rates of abortion, infertility, complications during childbirth, unwanted pregnancy and prevention of sexually-transmitted diseases. Due to these, people will be productive and be a great contribution to the country’s economic progress. Lastly, education concerning sexuality, responsible family planning and other reproductive health issues will be included in the process. Before, the Philippine Catholic Bishops disagree to have sex education in schools. They said that it is the responsibility of the parents to educate their children about it. However, do parents really understand the concept of sex? Will it be effective to teach their children about it if sex is a taboo because of our conservative culture? If the parents were not knowledgeable enough about sex, it will lead to confusion and curiosity of the children. Naturally, parents will teach their children not to have sex before marriage, but due to our modern societ y, the children will be tempted to do it. So, why not educate them beforehand in an effective way? This law, as stated in Sec. 12, will provide Reproductive Health Education in an age-appropriate manner taught by adequately trained teachers starting from Grade 5 up to Fourth Year High school. It will benefit the youth to have this education because the period of adolescence usually starts at the age of a 5th grader. Empirical studies conducted by the United Nations and other countries show that there are numerous benefits to the youth when Reproductive Health education would be part in their school curriculum. Proper sexual values would instill in the minds of the young which will lead to discipline and abstinence in having sexual intercourse. Several sexual partners will be avoided and eventually will prevent the spread of sexually transmitted diseases. Likewise, they will also be knowledgeable enough how to prevent early pregnancy. With the right learning and values, they will in turn be an asset for the welfare of the cou ntry. â€Å"Doesn’t every woman deserve the right to have a safe pregnancy and a baby that’s born healthy? I believe this is a very basic human right,† Katya Matanovic said. Indeed, Responsible Parenthood and Reproductive Health Act of 2012 will be an advantage to our country. It encourages population control, supports proper reproductive health care of the residents and provides education to the citizens, especially the youth, who will soon be the strength of our country someday. With the passing of this law, people should maximize the benefits given by this law. The problems involving serious population growth, deaths due to childbirth and pregnancy complications and deficit education regarding the true concept of sex will soon be solved by this law.