Monday, September 30, 2019

Dillemas of social control Essay

Everybody envisions a safer place and a peaceful state. However, recent events in the 21st century have extremely instilled fear and doubt to the people of the world. At present, it seems that the world has turned back to the dark ages of barbarian’s gambit of annihilation and it is challenged by mad men of chaotic beliefs and distorted ideals. Thus, it is no wonder that our everyday lives are confronted with the paranoia of deceit. Basically, the aging society is currently manifesting its senile nature which is represented by men who wander in its fragile state. These men who make the society senile and fragile are characterized by greed and dogmatic ideologies that have resulted in human carnage, famine, and plagues of war. One wonders, what does it would take for the government to sanctify the protection of its people? Do the people desire to be protected or are they the ones who protect? These questions are profoundly manifested in the long debates of legislations specifically on counter-terrorism. Fortunately, there are still a few good men in pursuit of a better and safer place and a peaceful state. In this regard, this paper will focus on America’s public policies that addresses the trauma and torments of terrorism that shocked America in the 9/11 tragedy. In addition, the paper will also discuss how the governments of the world interact with the foreign policy on counter-terrorism and how the implementation of such a policy would affect the way of life. The overall discussion of this paper will use a two-prong approach by discussing selective literatures and apply the ethical parameters of Clark Cochran, Lawrence Mayer, T. Carr and N. Joseph Cayer in their book, ‘American Public Policy: An Introduction’. Literature Review The post 9/11 tragedy is a continuing challenge to American people that seeks justice and determination of further knowing the treacherous powers that be. It is not only America that suffers the trauma of the human carnage of the 9/11 tragedy but all of the allied governments and United Nations’ members as well. The political experts, policy makers, and various intelligence agencies perceive terrorism as a social ill and more than just a phenomenon. It is also evident that the ultimate target of terrorists is the United States, being the world’s most powerful country, and this was proven during the 9/11 attacks. Moreover, the threats of terrorism beset the US’ homeland defense and crosses international borders to implement defense strategies with allied countries that are also potential targets of terrorist attacks. In short, terrorism can truly be considered a serious global threat. According to the report of the US National Counterterrorism Center (USNCC), approximately 14,000 terrorist attacks occurred in various countries during 2006 and resulted in over 20,000 deaths. As compared to 2005, attacks in 2006 rose by 3,000 (a 25% increase) while the death toll rose by 5,800 (a 40% increase), which was also the case last year and was by far the largest number of terrorist incidents that occurred in the near East and South Asia. In addition, the USNCC (2007) disclosed that the two regions of East and South Asia were the locations of 90% of the nearly 300 high-casualty attacks in 2006 that killed ten or more people while only a total of five high-casualty attacks occurred in Europe-Eurasia, East Asia-Pacific and the Western Hemisphere (USNCC, 2007). The research paper of Rohan Gunaratna of the International Centre for Political Violence and Terrorism Research (ICPVTR) in 2006 has reported expanded terrorists’ bailiwicks across the world. Based on his report, al-Qaeda and Taliban camps in Afghanistan trained between 70,000 and 120,000 Muslim youths to fight in the Philippines (Mindanao province), Indonesia (Maluku and Poso provinces), Myanmar, China (Xinjiang province), Kashmir, Bosnia, Kosovo, Chechnya, Dagestan, Nagorno-Karabakh, Algeria, Egypt, Jordan, Yemen and other countries. It is clear that the expansive mode of the terrorists pose risk and threats to Southeast Asian countries. In addition, the carnage of terrorism would plunge the poor countries into insurmountable human casualties and ultimately result in the devastation of their economies. It may be then perceived that al-Qaeda is being condoned by its Islamic cohorts that could greatly influence the vast Muslim communities around the world. These perceptions attribute to the alarming concern of imminent danger that al-Qaeda which could continuously conduct its terrorist assaults basedon its political-Islamist-religious platform of Jihad (holy war). Stages of Policy Analysis: The Framing of a National Policy Turning our grief into courage is a credo that basically calls for national recovery amidst terrorist threats that has enabled the Americans to overcome their grief and become courageous to surpass the inimical challenge. Indeed, America turned its grief into courage as manifested in condemning the ultimate cohort of terrorism in the US war in Iraq. The Iraq war has highlighted the US’s capabilities to disarm Saddam Hussein’s weapons of mass destruction and liberate the people from the tyrannical regime and set a new Iraqi government. The US government has realigned its governmental functions to respond to its vulnerability to the continuing threat of terrorism and shared its burdens with allied governments. The framing of the national policy for an efficient homeland defense system has paved the way for the enactment of the Intelligence Reform and terrorism Prevention Act of 2004 (IRTPA ), which an act to reform the intelligence operational framework for efficient capability. According to Terri Everret’s paper, â€Å"Procuring the Future: 21st Century IC Acquisition,† in January 8th 2008, IRTPA yielded a strategic defense program through the Office of the Director of the National Intelligence (ODNI). The main purpose of the ODNI program, according to Everret, is to avert conflict and preserve peace while specifically focusing on: (1) military, (2) proliferation, (3) foreign policy, (4) economics, (5) terrorism, narcotics, international organized crimes, (6) technology, and (7) regional conflict. Furthermore, the ODNI program empowers the IRTPA to support the enactment of US Foreign Intelligence Surveillance Act (FISA) of 2007 which modernized the National economic programs for Fiscal Year 2008. The overall representation of this development supports the US Counterintelligence Strategy of 2007 basically empowers the homeland defense system. Defining of a Policy From the previous discussions of issues as presented with a brief review of literatures and statistical data, it has been cited that the need of the US government and its people is to materialize and put into national perspective the country’s security. In this aspect, the effectiveness, applicability, and efficiency to enact the US security and defense policy will be examined through the concept and ethical parameters based on the book, American Public Policy: An Introduction. i) According to the American Public Policy: An Introduction, the analysis of a policy requires the interpretation and examination of the fundamental conditions and rationale to enact a policy. Based on the book, â€Å"policy analysis is not value neutral but wants to discover the significance and importance to public values†. In short, public policy is characterized by objectivity of reasoning and intention for a public interest. Furthermore, according to Cochran, et. al, a public policy must be dealt with classifications of purposes, types, and goods. In other words, the objectivity and rationality are combined factors that exemplify the importance, adequacy, applicability, and affectivity of the public policy to the life of the people and well-being of the state. This analysis also coincides and adheres to the moral and social values. In this regard, one example is the threat on terrorism to American people which does not only address the enactment of IRTPA and other programs on State security but also embraces all forms of terrorism-related violence occurring within a domestic domain that may be inflicted by a common crime or street crime, which is commonly called community crimes. ii) The classification of the policy is mainly to deter crime and enact on crime through imposing the punishment or penalty as provided by the rules of court and the due process of law. Another example of terrorism-related violence is the magnitude or scope of implication or damage by size and by number of casualties within household or community, especially when children and women are the victims of crimes. These also include multiple murders with mutilation of the bodies, rape, burglary and arson, which are also considered as heinous crimes. It may be interpreted from the point of view of securing the state that the subsequent enactment of the Intelligence Reform and Terrorism Prevention Act of 2007, the Foreign Intelligence Surveillance Act (FISA) of 2007, and the Counterintelligence Strategy of 2007, focuses on counter-terrorism. On the other hand, the enactment of the National Strategy for Homeland Security of 2007 embodies and embraces all of the provisions from previous policy enactments, which could be interpreted as reinvented applications and coherent enforcements within the domestic system of governance and national policy environment. In short, the scope of the applicability the National Strategy for Homeland Security of 2007 addresses the framework policy. Defining the Ethical Parameters Classification and Purpose for a Safer and Peaceful State i) Classifying a public policy in a category of securing the public is being defined by the magnitude of application to preserving peace and order. Based on the book, American Public Policy: An Introduction, the enactment of a security policy would secure the interstate (domestic) and intrastate (foreign community) domains from the common crimes committed by the citizens of the state and the vulnerability of the state from external attacks being specifically characterized by terrorists. Moreover, according to the book, the underlying claim on which classification of a public policy is relevant for the serious deficiencies in the ability of federal law enforcement authorities to recognize and respond to terrorist threats which is primarily due to the fact that individuals are often labeled suspicious on the basis of ideological, rather than behavioral grounds. It is evident that the classification of a policy to protect and secure the public would likewise define where and whom the policy should cover. ii) The purpose is the deliberate intention of a policy to objectively address the circumstance or phenomenon affecting the well-being of the state in order to preserve the interest of the people. In this case, the interest of the people to live in a better, safer, and peaceful world is being threatened by terrorism. The purpose to live in a better, safer and peaceful state has deliberately and intentionally emanated from the rationale of the government to enact a policy that defines the purpose to protect, preserve, and uphold the sovereignty of people against forces of destruction. According to US President George Bush, the purpose of enacting the US Homeland defense system is aligned with the interstate and intrastate security strategies and is a shared responsibility across the entire nation that has been developed for national culture preparedness [of the local tribal state and federal governments] and crosses international borders for collaborating secured international communities. Perspectives of A Safer and Peaceful State i) Based on Cochran, et. al’s book, â€Å"enacting a public policy must be determined by the type of application and the goods it would impart to people and society†. The community represented by families must enjoy a safer and peaceful life to manifest a better living condition categorized by abundance and prosperity. From this statement, the book promotes a liberating concept of a safer and peaceful state reflective of a crime-free community and is being protected by a public policy that promulgates crime sanctions and the imposition of punishments upon committing a crime. The implementation of the US Homeland defense system, through various policies or State Acts previously discussed in this paper, point out the perspective of a safer and peaceful state, and wholly emphasize a call for national recovery in socio-economic-political aspect. This is also linked to the efforts of the state to secure the lives of the people as well as to preserve the economic resources which could make the world a safer and better place to live in. ii) Cochran’s, et. al. concept and ethical parameters applies in the overall perspectives of the US policy and State Acts for a safer place and peaceful state. In addition, perspectives in the point of view of interstate (domestic) domain protection on combating vulnerability and preempting terrorist aggression from intrastate (foreign) domain can be applied. The US Homeland defense system could be a fortress that shields the American community from terrorism, and while having that shield, the US manages to enforce its strategies in its counter-terrorism efforts across borders. Furthermore Based on Cochran et. al’s book, a policy flows from analysis which is not value neutral but wants to discover the significance and importance to public values. Therefore, the US Homeland defense system has enabled an interstate (domestic) and intrastate (foreign) policy that defines the importance of the public values, which affirms and represents the various concept and ethical parameters stated in the book, American Public Policy: An Introduction. Conclusion It is safe to say that the US government made a safer place for the American people, as manifested by its empowerment of Homeland defense and attainment of security measures. However, the militarism aspect in countering terrorism has somehow inflicted a wound on the flesh of sovereign people. In this connection, it can be perceived that it is also important to rectify the human errors committed in enforcing counter-terrorism measures that add the cost of human toll. The US security policy from its interstate and intrastate scope has its dimensional perspective in achieving a better place. In addition, the â€Å"sharing of responsibility and burdens† amongst nations could be the pursuance of a world order. The creation and execution of the security and defense policies basically represents conceptual frameworks and ethics presented in the book, American Public Policy: An Introduction. However, it is not clear how the realities of implementation could be measured based on the lives of people in international communities. Furthermore, a safer place is perceived as a continuing perseverance in enacting state policies. It is also the moral basis of the existing policies. In short, public policy that can promote a peaceful State is a policy that may genuinely harness the defense and security of people and the State itself. Works Cited Cochran, Mayer, Carr and Cayer. â€Å"American Public Policy: An Introduction†. 2006. Thompson/Wadsworth Publishing, 8th Edition. ISBN: 0-534-60163-4. Rohan Gunaratna. â€Å"Terrorism in Southeast Asia: Threat and Response†. 2006. Center for Eurasian Policy Occassional Research Paper, Series II (Islamism in Southeast Asia), No. 1. , Hudson Institute. 17 March 2008 from http://www. hudson. org/files/pdf_upload/terrorismPDF. pdf. Terri Everett. â€Å"Procuring the Future 21st Century IC Acquisition†. (2008). DNI Senior Procurement Executive, Office of the Director of National Intelligence. 17 March 2008 from http://www. fas. org/irp/dni/everett. ppt. US Department of State. â€Å"National Strategy for Homeland Security†. 2007. Retrieved 17 ` March 2008 from http://www. state. gov/journals/. US National Counterterrorism Center. â€Å"Report on Terrorist Incidents-2006†. (2007). Retrieved 17 March 2008 from http://www. wits. nctc. gov/reports/crot2006nctcannexfinal. pdf.

Sunday, September 29, 2019

Family Affairs Essay

For this paper, I selected two works of literature, â€Å"The Love of My Life,† and â€Å"Everyday Use. † â€Å"The Love of My Life† by T. Coraghessan Boyle deals with teenage love that transition into turmoil. â€Å"Everyday Use† by Alice Walker revolves around the social and economic differences between generations. Throughout this paper, I will be comparing the economic, educational, and social cultures of the families presented in each story. While both stories take very different paths, both illustrate the depth of which family members will go for one another. There are several relations exemplifying social comparisons. Jeremy and China are both young souls venturing out to learn the life lessons of the surrounding world. Mama, Maggie and the pretentious Dee have very conflicting views of the world. One of the social differences the families face is the contrast in age differences. Jeremy and China are from the same generation. They share many of the same views and perspectives on events and situations around them. In â€Å"Everyday Use†, there are two different generations that have conflicting views. This internal conflict between Mama and Dee is the leading comparison of their story. Jeremy and China, have an external force applying conflict onto their relationship. Their poor choices have led them down a path in which strife and confrontation are inevitable. One is shown this when Jeremy and China are arguing in the hotel room over the handling of their situation (Boyle 561). Conversely there is an internal conflict between Mama and Dee. Walter shows Dee never brings anyone home due to her embarrassment of her family (Walker 315). In both situations, conflicts pull the families apart but their love for each other holds them together through their difficult situations. The economic differences are the most apparent difference between the two families. Jeremy and China both come from upper middle class families. Boyle speaks of their playing tennis and watching football on a 36 inch TV in the kitchen (Boyle 556). In â€Å"Everyday Use†, Mama goes into detail about the description of their house. She states that it does not have windows, but it has hide shaped holes in the make shift walls (Walker 316). The economic differences between the two families are clear. The family with a stable financial background could easily avoid the type of strife Jeremy and China are faced with. Along that same pattern of thought, there should be some level of ignorance for one’s actions within Mama’s family. Ignorance is exemplified by Jeremy and China with their lack of regard for their actions, while Dee shows a sense of pride for her heritage for the first time in her life. This shows an interesting conflict between the relationship of economic stability and the choices one makes. Simply put, there is not a simple choice. This is compelling because those of privilege often find themselves in situations of despair due to the poor choices they make. Another striking and illumination difference is the education of these families. Jeremy and China are heading off to college to further their young minds. However, this gives one a sense that they should be more aware of the consequences their actions may bring. This however is not the case. Jeremy and China both set off on a path of self-gratification and leave little room for reasoning and foresight. One is drawn to the conclusion that China and Jeremy are intelligent young adults. They both have been accepted to respectable universities, and China is striving to outshine others with a higher GPA (Boyle 559). Contrary to China and Jeremy, Mama states that she is not very well educated. Mama did not receive an education past the second grade due to her school’s closing (Walker 316). However, her daughter Dee is off at college taking her education to a level her mother couldn’t achieve. The education gap between mother and daughter leads to both the conflict and the sympathy between the two. The educational comparison between these two families goes against today’s social expectations. The more educated family goes down a terrible life altering path, while the less educated family has a conflict over quilts. Usually one finds those with less education in situations where foresight and planning would prevent their problem, but in these stories, it is just the opposite. A more in-depth look at the social constraints facing our two families in question reveals several insights. You have one group that is provided for in every way they need. They are given all the tools they need to succeed in life. They come from a background of money and privilege. All of their basic needs and desires are taken care of with minimal effort on their part. The other group is one more of a post-civil rights movement in which education and luxury were not easy to come by. This group also spans a generational gap that is not present in their counter parts. Given the nature in which hard work and sacrifice was all Mama knew, she passed that on to her daughter while unknowingly protecting them from the ill-faded temptations of the privileged Jeremy and China. Taking a look at how the society views those with privilege and education, one often hears â€Å"I can’t believe something like that would happen to them. † Yet those same people hear of the less privileged having the same types of problems. They instantly jump to blaming their upbringing or surrounding. In Jeremy and China’s case, if their privileged lives meant a better education and upbringing, they should have foreseen trouble. Similarly, the hard work and sacrifice instilled by Mama into Dee led her to reach out and gain an appreciation for her family and heritage that she never had before. After looking at the differences between the economical, educational, and social cultures of our two families, it is apparant many different factors go into the possible outcome of one’s path. Above all else, it comes down to a choice. Jeremy and China made a choice just like Mama and Dee made a choice. The surrounding factors play only a small fraction into the outcome when the right choices are made. Whether one pick’s â€Å"Everyday Use† by Alice Walker or â€Å"The Love of My Life† by T. Coraghessan Boyle, changing the choices our protagonists would completely change the outcome of each story. Just because one is privileged doesn’t mean one will make the right decisions. The power of a choice lies within a person’s willingness to overcome economical, educational, and social perils. Work Cited Walker, Alice. â€Å"Everyday Use. † Making Literature Matter: An Anthology for Readers and Writers. 5th ed. Ed. John Schilb and John Clifford. Boston: Bedford, 2012. 314-21. Print. Boyle, T. Coraghessan. â€Å"The Love of My Life. † Making Literature Matter: An Anthology for Readers and Writers. 5th ed. Ed. John Schilb and John Clifford. Boston: Bedford, 2012. 556-69. Print.

Saturday, September 28, 2019

Communication Research Assignment Example | Topics and Well Written Essays - 750 words - 2

Communication Research - Assignment Example This is where the all the data comes from.> Might be helpful to the class if you mentioned why Qual research doesn’t do sampling? Qualitative research doesn’t do sampling because unlike in quantitative research which rely heavily on sample size as the key drivers for statistical analysis, qualitative research rely more on observation and the interpretations are mostly value-bound. Qualitative research is subjective in nature while quantitative research is objective. Given the context and implications of the use of sampling in a research study, it is important to ensure that the sample size chosen is appropriate and adequate in order to derive effective results from the study. Since the analysis of the data relies heavily on the sampling methods used as well as on the sample size it is highly crucial to ensure that the chosen method is apt for the research study. However determining an appropriate sample size is highly tedious process and the researchers are generally found to be vulnerable to random sampling errors. These sampling errors encountered by researchers refer to ascertaining the appropriate sample size and disregarding the response and non-response bias Yes. Response bias means when the respondents answer in accordance with what they perceive the researcher expects them to answer rather than relying on their own personal beliefs. Non-response bias occurs in statistical surveys and refers to the difference between the answers provided by the respondents and those likely to be provided by potential respondents who did not participate in the study (Wunsch, 1986). The key advantages of sampling is that it allows the researchers to use numbers as a tool to assign value to a given phenomenon and derive meaning out of the numerical data, collected by them (Keyton, 2011). Quantitative research enables the researchers to use/ select smaller groups or

Friday, September 27, 2019

Defeat at Shiloh Essay Example | Topics and Well Written Essays - 500 words

Defeat at Shiloh - Essay Example In discussing the mentioned battle, this essay shall focus on Purdy's engagement, the arrival of the Confederates and the movement from Corinth. Preparations for what was later to be known as the Battle of Shiloh began in February 1862. In the wake of the Confederate loss of both Fort Henry and Forte Donelson, the Confederate General Alber Sydney Johnston withdrew to Tennessee for reorganization purposes. Recognizing that the Confederates were planning for action, Major General Ulysses Grant moved his army to West Tennessee, occupying Pittsburg Landing by March 1862. Directly following, orders were issued to Major General Don Carlos Buell to join Grant and, with their joint armies, undertake a seizure of the Memphis and Charleston Railways (Veit). The plan, as explained by Suhr was to cut off Confederate supplies and, to all intents and purposes, encircle and suffocate the Confederate forces. Even as the Union army was proactively planning to offset what they had determined to be Confederate preparations for offensive, and take the offensive themselves, the Confederate General, Johnston, was preparing for an offensive on Grant's forces, scheduled for April 4th, 1862 (Bagby).

Thursday, September 26, 2019

A cross-country analysis of the impact of political stability on Essay

A cross-country analysis of the impact of political stability on economic growth - Essay Example This analysis will then be followed by an in-depth examination of these four diverse countries, each representing different regions of the world. Finally, this essay will demonstrate that political stability must be present for an economy to be healthy and is a necessary condition for the promotion of strong and continued economic growth. How does one define political stability? Theoretically speaking, the term is notoriously difficult to define and definitions will necessarily vary (see Ake 271-283; Fosu 329-348; Pasos 70-86; Goldsmith 471-480). Nonetheless, it is integral that the concept of political stability be defined for the theoretical purpose of this essay. Leon Hurwitz explored four conceptions of political stability and defined it as: 1) the absence of violence, 2) the duration of government, 3) the existence of a legitimate political regime, and 4) the absence of structure change (149-163). Since this definition is comprehensive it will guide the political component of this essay as well as complement the economic systems analysis of our four case studies. What sort of factors influence economic growth? The economic growth of a country is routinely measured by an aggregate indicator such as Gross Domestic Product (GDP), which represents the increase in goods and services produced by an economy. Economic growth can also be measured in GDP per capita, an indicator of the average annual income of an individual within a given economy. Annual economic growth and national productivity are influenced by a variety of factors including international terms of trade (imports vs. exports), the national unemployment rate and inflation rates (Henderson 338). Canada, Iraq, the United Kingdom and Somalia represent a fascinating cross-section of countries with which to analyze the effect of political stability on economic growth. From a

Wednesday, September 25, 2019

Theater Article Example | Topics and Well Written Essays - 250 words

Theater - Article Example Alas!  There emerges an energetic, fresh and composed man dressed up in black overall, pair of trousers, and socks. His black Spanish cape sits firm and symbolic on his head. His hands clutched around his crotch as he walks majestically to center stage, staring at the ground a little worried. Behind him follows a nonchalant woman dressed up in a grey dress. The man takes a turn and stands on some pulpit looking at the sky in awe. The woman scales up the single staircase and sits comfortably on the traditional chair. Another man in white, gray official and tie emerges at the entrance, gently scrubs as he gazes at the entrance board. He then walks to center stage, stands there shortly. He turns to a second woman behind him. They approach each other with intense passion, almost kissing†¦, but then the woman withdraws and runs to the back of the stage as a group of elegantly dressed female dancers storm the stage. They go round the man and take positions on stage, start dancing ma rvelously after signal from the lady queen who sits on the staircase as the woman on the traditional chair comes up. The dance surges in intricate patterns. One dancer woes the official man to join the dance but he is adamant. Finally, the female dancers win him over. They sit down and watch as the man starts to dance alone impressively on

Tuesday, September 24, 2019

Write a Constitution Essay Example | Topics and Well Written Essays - 500 words

Write a Constitution - Essay Example The first area of consideration is the means of introducing laws. All group members will be given the chance to propose new laws or regulations at the meetings. This is similar to the United States system that allows Congressmen to introduce laws ("How a bill," 2012). In terms of repealing laws, individuals also have the option of introducing measures to repeal laws or regulations that had previously been passed. Once a law has been introduced by one of the group members there will then be a discussion about the specific law. Proponents and opponents of the law will be given a chance to speak about the reasons they support and don’t support it. After these discussions have taken place group members will be given a chance to vote on whether the law should be passed or rejected. Through majority vote the law will either be passed or denied. All members of the creative writing student organization will be treated as intellectual equals. This is an idea adopted from the United States Constitution ("Constitution of the," 2012). This, however, does not extend to decision-making power and group responsibilities. In these regards, the club will be divided through officer positions. There will be a President of the club that is responsible for organizing the meetings and setting the specific agenda for the day. The Secretary of the club will be responsible for taking notes about the meetings and reciting these notes at the new meetings. The Treasurer of the club will be responsible for financial matters, most notably those that involve the club’s literary magazine. Finally, all general members or officers of the club will be able to introduce ideas or general concepts to the specific project the group is focusing on. The emphasis on intellectual equality is a major consideration within the group. Many organized group e nvironments form and allow a select number of voices to dominate the discussion. Rather than allowing such forms of group dominance, the

Monday, September 23, 2019

Quality Management In Health Care Research Paper

Quality Management In Health Care - Research Paper Example The growing predominance of chronic illness and the search for less costly delivery settings, post-acute and long-term mental and physical health care services are increasingly important. ( Huq & Martin, 2005) Expenditures for nursing homes and home health care have grown as a percentage of NHE from 8% or $48.9 billion in 1988, to 13.2% or $171.5 billion in 2000. Medication is one of the most important tools for the healthcare and psychological field in the United States used to help treat people with mental health problems and psychological abnormalities. (Carson, K. D., Carson, Roe, C. W., Birkenmeie & Phillips, J. C., 1999). During the past decade, mental health researchers and professionals have seen a rise in the number of prescriptions being given to mental health patients in the United States, especially to children. Keeping that in mind, it has been tried to find if overmedicate these mental health patients in the U.S? Nursing homes are the principal institutions for long-term care delivery to patients with mental health issues. In 2000, there were 17 thousand federally qualified nursing homes in the United States. Medicaid is the primary payer for nursing home services, accounting for 68% of nursing home patients in 1999. Medicare covers only a small percentage of nursing home services, accounting for 9% of patients in 1999. (Grol, R., 2001) In contrast to hospitals, two-thirds of all of the nursing homes are under private, for-profit ownership. Hospitals and inpatient care have long been a central feature of the U.S. health care services industry. (Huq, Z., & Martin, T., 2005) With the development of antibiotics and improved surgical techniques and anesthesia in the mid-20th century, the hospital became the hub for the practice of medicine, earning its designation as â€Å"the physician's workshop.†

Sunday, September 22, 2019

English as a Second Language to the Learners Essay - 1

English as a Second Language to the Learners - Essay Example Two specific programs on ESL are arranged at schools namely ‘ESL targeted support program’, and ‘ESL new arrivals program’ through three phases and students at the end of the third phase are expected to ‘have extended their English language and literacy skills’ (NSW Department of Education and Training, 2004, p. 10). The program uses three modes -Direct, Collaborative, and Resource. The article helps one to use ESL scales in the assessment of the programs and undertaking necessary remedial measures. Further, the article helps the students and schools in the enrolment process of ESL programs. To sum up, this article is a pole star for students, teachers, and schools in Australia and New South Wales in ESL programs. Dr. Tina Sharpe (2004) elaborates on the specialties of ESL teachers and the article establishes a number of distinctions between a mainstream teacher and an ESL teacher. According to her, ESL teachers differ from other teachers in many ways as they have ‘the knowledge about the process of acquiring a second language’ (Sharpe, 2004, p.1). ESL teachers are aware of the learning environment of the students and they implement the target language with its cultural significance. ESL teachers provide opportunities to use language for a variety of purposes and work. Only a specialist teacher can employ the expertise regarding the process of acquiring a new language. An ESL teacher is different from a mainstream teacher, in the decisions about the topic content, resources, sequence of activities, modification of learning activities, identification of assessment opportunities and finally in evaluation and planning. To conclude, this article helps one to realize the significance o f specialized ESL teachers in transacting the language. Cummins (1996) deals with the language proficiency both in communicative skills and in an academic situation. Two misconceptions handicap students who seek to study ESL- first, the fear of incapability for logical thinking and second, the conversational skills are interpreted as overall proficiency.

Saturday, September 21, 2019

Medmira Case Essay Example for Free

Medmira Case Essay MedMira Case Course: Marketing Planning What changes in the environment made it possible to consider the launch of an OTC Aids Test? Be specific. MedMira is known by developing and manufacturing quality diagnostics to prevent and control the spread of infectious diseases. All tests used a flow-through membrane technology and were fast and easy to use. Medmira was distributing rapid HIV tests in Canada, United States, South Africa, Latin America and China, and selling them to hospitals, pharmacies and aid groups. One of the focuses of MedMira was to expand to Over-the-Counter market as there happened some changes that made it possible to consider this attempt: New infections were happening and about 3.1 million people were dying from HIV. This adds a higher preoccupation to the government and specialists on the health sector and pressure to arrange a solution. During the 80’s, there were few available treatment and when people knew they had the virus they would see it as a death sentence. Nowadays this idea is disappearing as technology is more advanced, it is a â€Å"more manageable illness† and there is an increase of information available about HIV. Due to legal approval of the tests, MedMira was able to distribute rapid HIV tests in Canada, United States, China and European Union. This is a step closer of entering the OTC market. Rapid testing was expected to grow between 20 to 30 per cent of the market. This expected growth was also related to a higher approval by governments as there were changes in the society acceptance and technological improvements on this area. Comparison factor as Medmira’s first rapid HIV test for OTC, Miracare, had a big success in China and this could happen in the rest of the world. Due to this accomplishment, international demand for this product has increased. Prepare a SWOT analysis for MedMira Aids Test. The following SWOT analysis contains the most significant and strategically important internal and external conditions that MedMira faces. The Internal is divided into strengths and weakness and the external is divided into opportunities and threats: Internal Strengths: -HIV test market leader -Easy use Weakness: -Ethical concerns -Cannibalization of revealing G2 External Opportunities: -Partnership with HA -Open door for testing other diseases -Growing rapid test market Threats: -Ethical concerns -Possible partnership of HA with competitors -Entry costs MedMira has some internal strengths by being a HIV test market leader, specially selling to hospitals, and suitable for at-home use. The Aids test is also easier to use and faster on getting the results relative to the competition, result of this was a higher international recognition. Relative to weakness aspects, there are some ethical concerns such as the possibility of testing without another person’s authorization that is a negative aspect. Apart from this, in case MedMira is able to enter the OTC market, there is a possibility of cannibalizing the sales of Reveal G2 to laboratories and hospitals, as the products would be considered as â€Å"substitutes† as they practically have the same objective. One of the opportunities is the partnership with Home Access and develop a revised  version of HA’s Consumer Advocate System. This partnership would eliminate the ethical concerns MedMira couldn’t address and would also help to remain competitiveness, build a barrier to entry of other firms on the phone support system and reduce courier costs. Another opportunity is if MedMira could enter the OTC market, it would be an open door for rapid tests of other infectious diseases that are worth millions. For last, the development of the rapid test market is a favorable trend to higher sales and profits, which is seen as a good opportunity. If Home Access, which possesses a patent on phone support system, joins with one of the competitors, MedMira will eventually lose competitiveness with this partnership, being one of the main threats. For last, entry costs on the OTC market are high and it is not clear if the company could afford the expansion at this moment. To conclude this analysis, the partnership would have a positive impact in the society. Because if consumers are able to buy rapid tests, this could prompt people to be tested earlier in a faster, easier and more accessible way, which would reduce the instances of transmission.

Friday, September 20, 2019

Software Process Development: Water Fall Model and the RAD

Software Process Development: Water Fall Model and the RAD Software Process Development Abstract Choosing the best suited Software development system (SDS) for any particular project is the first and foremost thing to do. If this step goes wrong or selecting an unsuited SDS for the project may lead to unsuccessful or incomplete or may be delayed to the time expected. Till now many surveys and investigations are done on finding new processes, rectifying the problems in the pervious projects, etc. the new processes every time comes with a new way of implementation of the software development process. In this project I am investigating on the basic implementation of the SDS with the water fall model and the rapid application development (RAD) model. For this a detailed study of the both the models are done, and then finding out which software development model is best suited for the development of windows applications. For this comparison the yahoo messenger (a windows application) is used as an example. Introduction Software development has become very difficult due to changing requirements, lack of standards, unpredictable schedules, and due to the insufficient training and more than that by the lack of effort by the professionals. After a lot of research, it was clear that the problem is with the process that is used for the software development, rather than the technology, which cause number of the problems in software development and in the maintenance phase. A new terminology is introduced with five levels of the SEI which is known as capability maturity model (CMM). Most of the software life cycle includes six processes they are: requirements engineering, design, programming, integration, delivery, and maintenance. Each of these phases in brief: Requirements Engineering In this phase first all the requirements that are required by the client a0re designers of the site collectively. Then the technique of rapid prototyping in which a prototype program is built that can illustrates the functionality of the desired software model. Using this prototype, clients can understand better how the final product would be, how would be the functionality and from that they can find out whether this is what they really need. If the requirements engineering process is not done properly, the resulting software product will not be useful to the client and it may not run correctly. Design In this process, the analysts and developers decide how to construct the software with the requirements specifications agreed in the requirements specification document. This way of designing is called stepwise refinement, and this allows the developers to control the complexity of the software. After completing the design, it is recorded in design specification document. Programming In this phase, programmers are divided into groups who write the actual code of the software. Before coding starts, the software is divided into separate units called modules. This modularization is done to reduce the complexity of the programming process. This is also responsible for proper documentation that describing the code and for testing the code to ensure that the code is free of bugs. Integration In this phase, the individual modules of the software are combined to form the complete software product. As the modules are developed separately, testing is very important in this integration process. Even when the design is good, some times incompatibilities between modules are likely to exist. All these problems are identified and corrected to complete the integration. Delivery In this phase, the developers deliver the completely working software product to the clients. Usually the clients will test the software to determine whether all the specifications agreed upon in the requirements specification document are fulfilled or not. If the client is satisfied with the software he accepts the software and installs it or else gives back for modifications. Maintenance In this phase, the software undergoes many changes after delivery in order to change the features or to fix the bugs, add new functionality, port the software to new platforms. Its not true that the work is over after delivering the product to client. Actually more work is to be done, after delivering the product, in this maintenance phase. From the investigation done the experts it is surprised to discover that of all the processes, the maintenance phase has the more cost of the life cycle. The diagram below shows the expected costs that are likely to be spending on each of the processes in the software life cycle. As maintenance cost is more, many developers started to use the design approaches that result in software, which is easier to maintain. History of Software Process Models The Software Engineering Institute was established at Carnegie Mellon University in Pittsburgh, Pennsylvania in 1984, under a Department of Defense contract. The mission of this institute is to provide the leadership in advance state of the practice of software engineering that helps to improve the quality of systems that are developed which depend on software. After two years the software process work has began. One of those results was the software process maturity model. In the year of 1987, the Software Engineering Institute and MITRE Corporation produced the first questionnaire on the maturity of a software in general, a set of question that has the options as yes-no are prepared that address organization, management issues and the technical software development process. In the next few years, the Software Engineering Institute developed two methods that are used for the questionnaire to test and conclude the report of an organizations software process. After many reviews, the Capability Maturity Model (CMM) for software was developed which replaced the software process maturity model in the year 1991. The CMM gives the detailed information of the levels of the firms that best suites for the general software process practices that are followed by the firms which are divided into five maturity levels. The questionnaire that are to be satisfied by the firms at there CMM levels , once the current level of operation is attained using the maturity, for further improvement of a companys software process involves in the implementation of the software engineering practices that are needed to reach each of the five levels in an order from the lowest to the highest level. Water Fall Model The water fall model is first and the basic model of software development. From this basic model only all other models were developed. The necessity of developing the water fall model was, until it was developed there was no model or software process work flow model. Thats the reason the water fall was the basic model for software development. Water fall model is divided into separate phases of software development. The phases in Waterfall model are: Requirement Specifications phase, Software Design, Implementation and Testing Maintenance. . All these phases are cascaded to each other so that second phase is started as and when defined set of goals are achieved for first phase and it is signed off, so the name Waterfall Model. All the methods and processes undertaken in Waterfall Model are more visible. All possible requirements of the system to be developed are analyzed in this phase. Requirements are set of functionalities and constraints that the end-user (who will be using the system) expects from the system. The requirements are gathered from the end-user by consulting the customer who have requested for the product. These requirements are analyzed for their validity and the possibility of incorporating the requirements in the system to be development is also studied. Finally, a Requirement Specification document is created which serves the purpose of guideline for the next phase of the model. Next comes the system and software design phase. In this phase, before starting for actual coding, it is highly important to understand what we are going to create and what it should look like? The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture. In this phase the estimation of cost for developing the product is also analyzed depending on the requirements. The system design specifications serve as input for the next phase of the model. The next sequential phase is the implementation (coding) and unit testing the software. On receiving system design documents, the work is divided in modules/units and actual coding is started. The system is first developed in small programs called units, which are integrated in the next phase. So that it would be easy to develop the code by dividing the work into small units. Then each unit of work that is divided from the total work is developed individually by each developer and tested for that particular unit of work is done properly or not. This type of testing the individual unit code is called unit testing. In the next upcoming phases the small units of code is to be integrated into one single code and should be tested for the over all functionality. As specified above, the system is first divided in units which are developed and tested for their functionalities . These units are integrated into a complete system during Integration phase and tested to check if all modules/units coordinate between each other and the system as a whole behaves as per the specifications. After successfully testing the software, it is delivered to the customer. The maintenance phase is the most important and it is almost 70% of total software process life cycle. This phase of is virtually never ending phase (Very long). Generally, problems with the system developed (which are not found during the development life cycle) come up after its practical use starts, so the issues related to the system are solved after deployment of the system. Not all the problems come in picture directly but they arise time to time and needs to be solved; hence this process is referred as Maintenance. On the time ruin the problems may occur and the code may not accept the new type of data, and then there is the need to change the part of the code or correct that part of code. Due to some disadvantages of the water fall model later some other models are developed. The disadvantages are The main drawback of the waterfall model is the difficulty of accommodating change after the process is underway. One phase has to be complete before moving onto the next phase Inflexible partitioning of the project into distinct stages makes it difficult to respond to changing customer requirements. Therefore, this model is only appropriate when the requirements are well-understood and changes will be fairly limited during the design process. Few business systems have stable requirements. The waterfall model is mostly used for large systems engineering projects where a system is developed at several sites. Rapid Application Development (RAD) RAD is a software development process initiated by James Martin in 1980s. It is a very high level of application development techniques that uses prototype, iterative customization and CASE tools. RAD is a software development methodology that focuses on building applications in a very short amount of time, traditionally with compromises in usability, features and execution speed. Figure-Traditional RAD The traditional RAD software development cycle follows a rigid sequence of steps with a formal sign-off at the completion of each. RAD is not appropriate for all projects. This is bet suited for the projects that can be divided into small chunks and where scope is small. RAD has many core elements which make it unique are prototyping, iterative development, time boxing, team members, management approach and RAD tools. Prototyping: This part of the RAD can be done by the Computer Aided Software Engineering that focus on capturing requirements, converting them to a data model, converting the data model to a database, and generating code all in one tool. Iterative development: Iterative development means creating increasing functional versions of a system in short development cycles. Each version is reviewed and approved by the client to produce requirements that feed the next version. This process is repeated until all functionality has been developed. Time boxing: Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. Team members: The RAD methodology recommends the use of small teams that consist of experienced, versatile, and motivated members that are able to perform multiple roles. As the client plays a vital role in the development process, dedicated client resources must be available during the initial Joint Application Development (JAD) Management approach: Active and involved management is required to reduce the risks of lengthened development cycles, client misunderstandings, and missed deadlines. In addition to enforcing a strict timeline, management must focus on team member selection, team motivation, and on clearing media or political obstacles. Coding phase: Developing Code in RAD process model takes very short span. At the time of development of these types of projects the there is no need or no time to make the code future enhancements. So the code developed using this process is not the most reliable code. Testing phase: In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing of all the models that are working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Advantages: Speed and quality are the main advantages of Rapid Application Development, while potentially reduced scalability and feature sets are the disadvantages. The main goal of RAD is the speed delivery of the product using CASE tools, which helps in converting the requirements to code automatically. The speed delivery is the main feature of RAD because the product has the competitors and demand in the market. The software developed by the RAD has versions and each version is better, has new features or at least overcomes the defects of the previous versions. Disadvantages: Scalability and the reduced features are main drawbacks of the RAD Due to very less time using the time boxing the development of the product that can construct the advanced features is not possible. By using time boxing we have very less time to develop much more features and more enhanced features. Yahoo Messenger The versions of yahoo messenger that are developed with the features are: Version 3.0: Yahoo Messenger 3.0 (1.3 MB) The first basic yahoo messenger was version 3.0 with basic features of chat, webcam, file transfer and emoticons that can incorporate in between the text in chat box. Version 3.5: Yahoo Messenger 3.5 (1.9 MB) This version has the new features of mail updates of the user account and the option of my display image. This feature enables the user to show his picture to the person with whom he/she chatting. Version 4.1: Yahoo Messenger 4.1 (2.3 MB) In this version the send contact details, message archive are introduced. Send contact details option enables the user to send the messenger list in his account to others. If message archive option is set then all the conversations done by the account user can be stored in the local system where person chats. Version 5.0: Yahoo Messenger 5.0 (2.2 MB) This version has the new feature of photo share through which two persons can share the pictures by just dragging and dropping the pictures into the sharing box. This is the great feature that had made yahoo! messenger more popular. Version 5.5.1228: Yahoo Messenger 5.5.1228 (2.6 MB) This version has the option to change the skins and the option to join the chat rooms all over the world. Version 6.1922: Yahoo Messenger 6.1922 (4.5 MB) This version ahs the feature of play game with the other person in the chat. And the other new feature is buzz which alerts the with a sound. The chat box is provided with the text format tool bar. Version 7.0: Yahoo Messenger 7.0 (8.2 MB) This version has the drastic changes and much new features than the previous versions. The IM environment option that changes the backdrop of the chat box. Version 7.426: Yahoo Messenger 7.426 (8 MB) This version has the new feature called the voice chat. With this option a person can record his voice message and send it to this other person in the chat. This feature revolutionized the yahoo! Messenger and made popular. Version 7.437: Yahoo Messenger 7.437 (8 MB) In this version we have the plug-ins of yahoo! Games, yahoo! Music and yahoo! Weather. These features enable the users to play the games, listen to music and see the weather report in certain areas all over the world. Version 7. 5.0.647: Yahoo Messenger 7.5.0.647 (7.7 MB) This version has very slight difference than its pervious versions with only new feature that is calling pc-to-pc using the VOIP protocol that is developed for voice transmission over Internet. Version 8.0.0.506: Yahoo Messenger 8.0.0.506 (10 MB) This is the very advanced version of the yahoo messenger, which has an option sending the SMS to the mobile directly to the person who has signed in into his mobile device. And the persons who are have the account into the messenger list. The new and smart tool is the audibles tool bar for chat box, which has many prerecorded audibles in different languages and different animated pictures speaking out those audibles. This is how the 11 versions of yahoo! Messenger is developed using RAD. And many other versions are upcoming using this method of software developing such as yahoo! Messenger 8.0(Beta), which is under testing phase. With in 8 years the yahoo had developed 8 versions of Yahoo! Messengers with versions numbered from 3.0 to 8.0.0.506 with pc -to-pc talk and SMS to mobile. Developing Yahoo! Messenger with Water Fall Model The first and the foremost is that in water fall model all the requirements are taken at a time. The design and coding is done in the most common way i.e. from the design phase itself it is designed. Requiremental Analysis and Design: The requirements of the yahoo messenger are the login window, chat window, the server side application for maintenance. All these are the requirements that are required for the development of yahoo messenger. The client application requirements are Login window Frame window Chat window Manage Contacts Authentication message window Then after the language in which the coding is to be done is decided. Data base for the server side application should be developed; the entire design depends on the data base that is structure to store the data of every client. The design of the yahoo messenger is taken up by the minimum and basic requirements. The design is made normally with out nay future plans. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. Context diagrams: A context diagram is a data flow diagram, with only one massive central process that subsumes everything inside the scope of the system. It shows how the system will receive and send data flows to the external entities involved. Class Diagrams: Class diagrams are widely used to describe the types of objects in a system and their relationships. Class diagrams model class structure and contents using design elements such as classes, packages and objects. Class diagrams describe three different perspectives when designing a system, conceptual, specification, and implementation. These perspectives become evident as the diagram is created and help solidify the design. Data Flow Diagrams: A data flow diagram (DFD) is a graphical representation of the flow of data through an information system. A data flow diagram can also be used for the visualization of data processing. It is common practice for a designer to draw a context-level DFD first which shows the interaction between the system and outside entities. This context-level DFD is then exploded to show more detail of the system being modeled. Implementation and Coding: In this phase the actually the code is developed. Before that the total code is divided into independent modules, so that the coding becomes easy. So the coding part is divided into modules such as Integration and Unit testing : After the coding is done for individual modules such as data base structure, frame work and the data base or server connectivity module are integrated into one module of code for the code to work with all the functions full. Then this code is tested after the integration is done, to check weather the code is working collectively after integrating the all the modules into one single code. In the testing phase the developed software or website is tested in two ways i.e. alpha testing and beta testing. Alpha testing is the testing done by the developers before delivering the product. This alpha testing can be done in two ways i.e. white box testing and the black box testing. The testing for all the modules is done to check weather all the code is working properly or not and to ensure that each function is fully operational while at the same time searching for the errors in the code is called white box testing. Testing the internal and primitive operations and to sure that all are working according to the specification is called black box testing. Testing done by the customer to check weather all the specification requirements are working properly is called beat testing. If any problem occurs, then the error is set up and just added to the code at the appropriate position. Maintenance Phase: This is phase in which the maximum amount of resources are used. In this water fall model the yahoo messenger requires many changes in the features for adding new features such as the voice chat, video conference, pc to pc call etc. For all these new features the present code is not venerable to add the new models or to integrate, so that the reason why all the code is developed again with new features in the water fall model which consumes more time and resources. Developing Yahoo! Messenger with RAD Instant messenger is first lunched by yahoo named as Yahoo! Messenger on 21 July 1999. The first version of yahoo messenger is version 3.0 for MAC operating system with the features of webcam, file transfer, emoticons. The important requirement of an instant messenger is chat, and this chat is enabled between system to system because the messenger chat box communicate between two systems using there MAC (Message Authentication Code) address. Windows Application version of instant messenger and web messenger are the products of yahoo. Analysis Phase In this phase the requirements such as software hard ware requirements are analyzed and listed for the usage of the development of the product. The main problem is that the windows application cannot be directly connected to the remote database (for authentication, chat, offline message). For that the web service is the best solution that can connect database remotely and can call the methods in the remote classes. Because the web service transmits the data from the remote database, and it is in very robust form to destroy. Then its is to be decided in which platform the project should be developed either in java or Microsoft .net or etc. in some cases the customer itself asks the product to be done in a particular platform. If the customer did not ask for any particular platform we can chose the platform on our own. Estimation of cost is made in this phase itself. The total cost estimation for development, maintenance, etc. the cost for development is calculated in man hours of work. Requirement analysis: Actually the requirement of an software include the requirements of the customer that he want in the software and the other software and hardware requirements that are needed for the software development. The features of the yahoo instant messenger are enhanced form version to version. There are many version of yahoo messenger from version 3.0 to version 8.1. in each version the new changes and features had been added such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile etc. For developing software or windows application or a web application we need software to develop such as C++, VC++, Java or Microsoft Visual Studio etc. For instant messenger we need to develop a windows application that can be run at the clients pc and we a need a web service to communicate the client-client transaction. The windows application cannot directly communicate with the remote database and cannot communicate with the other client without a web reference. So web service is used a web service for checking the authentication of the users account and his details. The first version of the Yahoo! Messenger 3.0 has only few features such as chat, web cam, emoticons. In the later version the features such as voice chat, pc-to-pc call, plug-ins, IM-Environment, SMS to Mobile added. But all these features are not added at time. They are all added for the future versions of 3.0 to 8.1. With all these requirements a prototype model is prepared. And for designing the software that prototype model should be approved by the client. Hardware Requirements For developing an instant messenger an ordinary system is sufficient. But to make the instant messenger work we need a server that acts as web service for the instant messenger to communicate between the users of the instant messenger. The uninterrupted internet connection to the server is very much important so that no users finds incontinent to work. And steps need to be taken for a fast recovery at the time of crashing of the server. Design phase First the total development of the yahoo messenger is divided into modules. Then the software diagrams are drawn for the convenient for the developing the code. First the context diagram is drawn for the project. Then comes the data flow diagrams in which the flow of the data in the project is shown. The next diagram is the ER-Diagram in which the all the parameters of the total project are represented in diagrams. This diagram is very much useful in developing a database in which a column is made for every single column in the database. In this database the data should be maintained in the tables. And these tables should have the primary keys and foreign keys (primary keys of other table in the current table is called foreign key). In this design phase it self the use case diagrams, activity diagrams and sequence diagrams are developed. Then the use case diagrams which sub parts or modules of the project. Depending on these all diagrams the total project is divided into small modules and these modules are distributed to each team for development. Time boxing is adding features to future versions of the software and developing it no time. It is very important aspect of RAD to complete the job in less time and get the best product out than other competitors. In the design phase a first a prototype model is prepared with all the requirements that are analyses in the requirement analysis phase. And for designing the software that prototype model should be approved by the client. The total project is divided in small chunks so that it would be easy to develop the software in no time. The design phase has many sub phases, they are Software development diagrams: These diagrams are very important and help a lot in the development of the project. The diagrams are Context diagrams, Entity relationship diagrams, Data flow diagrams, Use case diagrams, Collaboration diagrams, Sequence diagrams. All these diagrams act as a blue print of the development of the project and will be very useful at the time of the software development. Development Diagrams The UML diagrams play an important role in the software development diagrams. These diagrams illustrate the clear cut idea of the software that is being developed. Use case Diagrams: Use cases describe the behavior of the system when one of these actors sends one particular stimulus. This behavior is described textually. It describes the nature of the stimulus that triggers the use case; the inputs from and outputs to other actors, and the behaviors that convert the inputs to the outputs. The text of the use case also usually describes everything that can go wrong during the course of the specified behavior, and what remedial action the system will take. The use case diagram gives the details of the requirements, options in the product specified by the client. These requirements dont change whatever the software development procedure used, so that use case diagram is same as that of the diagram that uses water fall model for software development. why in water fall model there is only one main class and all the other sub classes or child classes are developed under it. When a product is developed in .net, default folder AppCode is created in which all the class files, script files are developed. In the figure shown below the the authentication, chat address book, preferences are separate classes developed under the AppCode. Database Design: The design of database consists of making the data tables that are used in the project. Designing the tables includes deciding the primary keys and foreign keys in the tables and the data types of the columns of the tables. After completing all these diagrams and the database design, the project is divided in chunks and distributed among the team members for development of the project. RAD is best

Thursday, September 19, 2019

Social Order in P.D. James’ A Mind To Murder Essay -- P.D. James A Min

P.D. James’ A Mind To Murder - Social Order    One of the basic assumptions underlying any detective novel is a sense of social order. The novelist assumes that the reader agrees that killing people is wrong; it does not matter if the victims are exemplary citizens or odious individuals, it is the mere act of snuffing out another’s life that is against the social order. In P.D. James’ A Mind To Murder, Nurse Marion Bolam’s murder of her stuffy and self-righteous cousin Enid illustrates a situation where the nurse and her invalid mother had suffered from her cousin’s stinginess; James gives us a clear look at the murderer’s fear that if Enid had been given time to change her will as she had threatened to do, the Marion and her mother would never get the money to which they considered themselves entitled. However, James urges us to understand, this does not matter. Murder, for whatever reason it is committed, is still murder, and it is always wrong.     However, the murder of Enid Bolam is not the only violation of the social order which James describes in this book. Chief amongst his other villains is Peter Nagle, the young and attractive porter at the Steen Clinic. Peter is also a gifted painter, and is only working at the clinic to pay his living expenses while he waits for a prestigious arts grant to come his way.   However, Peter is infected with the arrogance of those who feel that their talent entitles them to liberties unavailable to the rest of society. He lives in a magnificent studio apartment, and owns only the very best painting equipment. He obviously cannot afford this on a clinic-porter’s salary, so he figures out a way to, with Marion Bolam’s help, blackmail former patients into paying him fifteen pounds... ...r, who wasn’t really at fault in any of this, has gone to live in a nursing home where she will be well-cared for, since her daughter obviously won’t be there to do it.        This isn’t a perfect solution, but it isn’t a   perfect   world, and it would be false to P.D. James’ premises to assume that everything can be returned to a state of Eden. However, James seems to feel that we as social beings have an obligation to keep everything as close to an ideal social paradigm as possible. Only in this way will everyone be in a position to achieve maximum happiness. The narcissism of Peter Nagle serves as a sober warning that we are not put on earth to ride roughshod over everyone else in our selfish search for happiness, but that happiness is a social construct in which everyone should reap equal benefit and for which everyone should assume equal responsibility.

Wednesday, September 18, 2019

War :: essays research papers fc

Recent photographs of Iraqi Prisoners Of War (POWs) being humiliated and abused by United States armed forces have caused uproar and disgust throughout the world. The sole purpose of any war is to win; either through destroying the enemy, or the achieving a specific goal. Why then should coalition forces be held to a higher standard in regard to treatment of POWs than the rest of the world? To fully explore this question we must understand the history of POWs, and the role that the United States plays in world affairs. During the 1991 Gulf War, pictures of American pilots beaten and bleeding were shown to the world. Civilized nations were outraged. As Major Rhonda Cornum told of being molested, Colonel Jeff Tice told of being electrocuted, and other American and British pilots read scripted statements on television (PBS), civilized nations were appalled. Throughout the years, prisoners have been interrogated and mistreated by their captors. Vietnamese soldiers housed prisoners in substandard shelter or even pits throughout their country. The most famous POW camp was known as the â€Å"Hanoi Hilton†. Here, POWs where beaten, tortured and humiliated for years. Brainwashing techniques were perfected by North Korea during The Korean Conflict. World War I POWs were forced into labor camps or systematically murdered through â€Å"death marches† where guards would force prisoners to march until they died from exhaustion in an effort to reduce the number of prisoners in the camps. World War I I POWs were killed, or used for medical experiments. The United Sates Department of Defense recognizes table below outlines the prominent type of torture administered during each of the official US Wars (DoD, 47). After the wars ended, and it was discovered just how badly the POWs were treated, civilized nations convinced themselves that torture and abuse were the acts of uncivilized nations ruled by madmen. Principal Wars in which the US Participated Official War  Ã‚  Ã‚  Ã‚  Ã‚  Torture technique Revolutionary War  Ã‚  Ã‚  Ã‚  Ã‚  Murder, destruction of property War of 1812  Ã‚  Ã‚  Ã‚  Ã‚  Rape, theft, Arson Indian Wars  Ã‚  Ã‚  Ã‚  Ã‚  Scalping, murder, rape Mexican War  Ã‚  Ã‚  Ã‚  Ã‚  Murder Civil War  Ã‚  Ã‚  Ã‚  Ã‚  Hanging, destruction of property Spanish-American War  Ã‚  Ã‚  Ã‚  Ã‚  providing only saltwater to drink-causing dehydration and hallucinations World War I  Ã‚  Ã‚  Ã‚  Ã‚  Sleep deprivation, murder World War II  Ã‚  Ã‚  Ã‚  Ã‚  (sexual) enslavement, medical experiments, death marches Korean War  Ã‚  Ã‚  Ã‚  Ã‚  re-education, Bataan Death March, physical torture Vietnam War  Ã‚  Ã‚  Ã‚  Ã‚  cutting off various body parts to get other prisoners to talk, Sleep deprivation, bamboo under fingernails Gulf War-1991  Ã‚  Ã‚  Ã‚  Ã‚  Electrocution, humiliation, beatings, Sleep deprivation Gulf War-2003  Ã‚  Ã‚  Ã‚  Ã‚  Religious and sexual abuse, humiliation, beatings, sleep deprivation The United States has, from the onset of the Civil war, led the moral and ethical charge for proper care and treatment of prisoners of War.

Tuesday, September 17, 2019

Does the term “Bible Belt” still remain true for Southern states? Essay

Does the term â€Å"Bible Belt† still remain true for Southern states? Did Facing the Giants depict religious life in the South accurately? From before I can remember, I was attending church and a part of children’s musicals. Church is like a second home and a huge aspect of my life. Religion is a common ground for many Southerners, and is a place to gather and catch up with one another, while in other parts of the country it tends to be a touchy topic. Religion is one of many aspects that developed the South into what it is known for today. Facing the Giants, by Alex Kendrick, effectively represents the role of religion in the South through the literal translation of the Bible, the role it continues to play in daily lives, and how the South still embodies religious aspects. Facing the Giants is a biblically based movie made by Sherwood Baptist Church of Albany, Georgia about religion and football. The film stars Coach Taylor, a mediocre football coach, for Shiloh Christian Academy Eagles. Everything is falling apart for Coach Taylor: his car continually breaks down, he is the reason his wife cannot become pregnant, and he is on the verge of being fired. With all of these things confronting him, he turns to the Bible, puts his life in God’s hands, and his life dramatically changes . He and the football team decide they are going to play football to glorify God and not necessarily to win; thus, whether they win or lose, they will glorify God. This change impacts the players, which in turn impacts the school, and a revival transpires. The Eagles play their next football game and win. They continue to win and make it to the semi-final round of the state playoffs. Sadly they lose in the semi-finals to the Panthers but still gl... ...characteristic traits of religion in the South and does a great job at giving insight to the significance and importance it has in the culture. As times are shifting and cultures are changing, the one thing that remains constant in the South is religion. Works Cited Facing the Giants. Dir. Alex Kendrick. Perf. Alex Kendrick, Shannen Fields, and Jason McLeod. Sony, 2006. DVD. Hook, Wade F. "Religious Regionalism: The Case Of Lutherans In The South." Review Of Religious Research 27.1 (1985): 77. Academic Search Premier. Web. 6 Feb. 2012. Wilson, Charles Reagan. "Religion In The Southern States: A Historical Study." Religious Studies Review 16.3 (1990): 205-210. ATLA Religion Database with ATLASerials. Web. 6 Feb. 2012. Wilson, Charles Reagan and Mark Silk. Religion and Public Life in the South in the Evangelical Mode. Oxford: AltaMira Press, 2005. Print.

Monday, September 16, 2019

Ada Research Paper

DORRIS 1 Dominique Dorris Meyers BASK Reading October 25, 2012 Americans With Disabilities Act The Americans with Disabilities act is a law that was created by the US congress in 1990 and signed into law by George W. Bush on July 26, 1990. The ADA is civil rights act that prohibits discrimination on people with disabilities. In 1975 the Education for All Handicapped Children Act was passed. Before this act was passed only one out of five children with disabilities attended a public school, according to the U. S. department of Education (L. S).There was a Civil Rights Act of 1964 created that made discrimination based on race, religion, sex, and other characteristics illegal. The original intent of the law was to create a civil rights law for people with disabilities that would be permanent, would not be able to be weakened, and would stop all discrimination. The ADA was suppose to be a flexible set of laws that could only be strengthened and never weakened. Title 1. 1 of the American s with disabilities act is employment, and explains how people shall not discriminate against qualified individuals with disabilities. Title I prohibits employers with fifteen or more employers from discriminating against qualified individuals with disabilities in a job application procedures, hiring, DORRIS 2 advancement, compensation, job training, and other conditions and privileges of employment simply because they have disabilities† (K, S). Title 1. 2 of the ADA discusses public entities and public transportation. It prohibits discrimination by all public entities. This includes physical access for Accessible Design. Public entities and transportation have to have accessible utilities for disabled people.Title II applies to public transportation provided by public entities through regulations by the U. S. Department of transportation. Title II also applies to all state and local public housing, housing assistance, and housing referrals. Title 1. 3 of the ADA prohibits dis crimination of disability in the activities of places of public accommodation. This law indicates that all restaurants, movie theatres, buildings, etc. are accessible for people with disabilities. Title III has had more effect on the lives of Americans with Disabilities than any other ADA title.Individuals with and without disabilities should be accessible to do the same things throughout life. Title 1. 4 of the ADA is Telecommunications. â€Å"The law requires that all telephone companies that provide telephone voice transmission services, whether interstate or intrastate, also provide telephone relay services that allow people who are hearing or speech impaired to place and receive calls through devices to or from people who do not use such devices† (American Rehabilitation). This act led to installing public teletypewriter machines and other TDDs. TDD’s are the telecommunication devices for the deaf.For blind people they will change all written texts into voice mess ages and will change all voice recordings into texts for the deaf. DORRIS 3 The last title of the ADA is miscellaneous provisions. Title V includes technical provisions and this law applies to and person that prevents an individual from exercising his or her rights. This is any form of retaliation including threats, intimidation, or interference is not allowed if it is intended to interfere in a negative way. Any person who exercises their rights under the ADA or helps someone else in exercising their rights is protected from retaliation.Since the Americans With Disabilities Act of 1990 was created, there have been a lot of changes made that have positively affected people with disabilities. â€Å"This long awaited piece of federal legislation was expected to protect individuals with disabilities from discrimination in employment opportunities and ensure and access to various social institutions† (Bowman). The ADA helped people with disabilities get jobs, make social places a nd transportation accessible for them and even created phone operator systems to help translate messages to deaf and blind people.The Americans With Disabilities Act made disabled individuals feel accepted and they were not discriminated anymore in things they wished to do. Contrary to the positive outcomes of the ADA there were also still downfalls for people who had disabilities. â€Å"Pro-business conservative commentators mentioned that the Americans With Disabilities Act was an expensive headache to millions†(Doherty 18). Because of all the changes that had to be made to make things accessible for people with disabilities it ended up being very costly for everyone. Even though the ADA was created some cases of disabilities were not DORRIS 4 covered. Some courts even found that individuals with serious conditions such as diabetes and cancer were not covered by the ADA† (B,L). Unfortunately some bars and clubs were not changed to fit the needs of people with disabili ties. Even though the Americans with Disabilities act had many positive affects, some individuals still unable to do certain things. After researching about the Americans With Disabilities Act of 1990, I think that it was a great idea to create such an amazing act. I feel as if people with disabilities should be able to do as much as they can in order to live a happy and normal life just like everyone else.Even though there are downfalls of the ADA individuals have a lot more rights then they ever had several years ago before the act was established. If I was disabled I would want to be able to live my life just like every other person, and the ADA helped people feel that they could. The most interesting and best idea that the ADA had was title 1. 4 telecommunications. This was an amazing idea and helped both the deaf and blind. DORRIS 5 Work Cited Page Bowman, L. (2011). Americans with disabilities act as amended: Principles and practice. New Directions For Adult & Continuing Educa tion, (132), 85-95. oi:10. 1002/ace. 434 Doherty, Brian. Reason, Aug-Sep 95, Vol. 27 Issue 4, p. 18 Kopels, S. (1995). THE AMERICANS WITH DISABILITIES ACT: A TOOL TO COMBAT POVERTY. Journal Of Social Work Education, 31(3), 337-346. LAFEE, S. (2011). The Americans With Disabilities Act at 20. Education Digest, 76(7), 51-55. The Americans with Disabilities Act of 1990. (cover story). (1990). American Rehabilitation, 16(2), 2. The Americans with Disabilities Act of 1990. (October 2012). Retreived October 23, 2012, from http://en. wikipedia. org/wiki/Americans_with_Disabilities_Act_of _1990

Areas of learning and development Essay

1.1 Explain each of the areas of learning and development and how these are interdependent There are seven areas of learning and development set out by the EYFS, each are important and interconnects there are three prime and four specific areas. The prime are the main area of development from birth to 2 years and important for firing children’s curiosity and enthusiasm and helping them to form relationships. The prime areas are: Personal, Social and emotional development Physical development Communication and language The four specific areas compliments and supports the prime areas from 2-5 years, but the prime are the foundation for successful learning. The specific areas are: Literacy Mathematics Understanding the world Expressive arts and design The EYFS learning and development (Page226 in children and young people is workforce). Educational programme must involve activities and experiences for children in the following aspects: Aspects of personal, social and emotional development involves helping children to develop a positive sense of themselves and others; forming positive relationship and develop respect for others; to develop social skills and learn to manage their feelings; to understand appropriate behaviours in groups; and to have confidence in their abilities. Aspects of physical development involves providing opportunities for young children to be active and interactive; and to develop their co-ordination control, and movement. Children must also be help to understand the importance of physical activity and to make healthy choices in relation to food. Aspects of communication and language development involves giving children Opportunities to experience a rich language environment, to develop their confidence and skills in expressing themselves and to speak and listen in a range of situations. Aspects of literacy development involves encouraging children to link sounds and letters and to begin to read and write. Children must be given access to a wide range of reading materials. Aspects of mathematics development involves helping children to solve problems and to thinking logically, use everyday language  to talk about size weight; recognise create and describe patterns; explore characteristics of objects and shapes and measures. Understanding the world development involves helping children to gain an understanding of the world around them ; knowing about similarities and differences between themselves and others, and among facilities communities and tradition, recognise that a range of technology is used in places such as homes and schools. Expressive arts and design development involves increasing their interest in creativity, representing their own ideas, thoughts and feelings through design and technology, art, music, dance, role play and stories. The EYFS describes the seven areas of learning separately but it is important to recognise their interdependence. This means that good quality activities will cover more than one area of development and neglecting one area of development is likely to create difficulties later.(e.g) Personal, social and emotional development is like a treat throughout all area if this area is not well supported, children will find it hard to concentrate, play alongside others or make progress in other areas. 1.2 Describe the documented outcomes for children that form part of the relevant early years framework. To be able to measure that each child has the access to a quality early years education regardless of where they live, circumstances or family background the EYFS designed a series of outcomes to document each area of learning. These are called the Early Learning Goals, this is targets for children to meet throughout their early years and at the end of the reception year. These goals are important as they form the building blocks for children’s later education. It is important that practitioners recognise that may of the Early Learning Goals are also associated with children’s development and so while it is reasonable to expect children to meet them at the end of the reception year, they are not meant to be used as outcomes in nurseries or pre-school. It is also worth nothing that some children will for a variety of reasons not meet all of the Early Learning Goals as they may have specific health or learning difficulties or because they are simply young than their peers. 1.3 Explain how the documented outcomes are assessed and recorded The purpose and aim of the EYFS is to help young children achieve the five every child matters outcomes. There are four themes that underpin all the guidance A unique child Positive relationship Enabling environments Learning and development This guidance support each child’s learning and development and help practitioners to support children’s learning development, by closely matching what they provide to child’s current needs. An on-going formative assessment is at the heart of effective early years practice. In my setting we constantly observe our key children as they act and interact in their play. We then plan activities through these observations and things learnt from parents about what the chid do at home. Using examples of the development columns â€Å"unique child† the observation is assess to see what the child can do and what the next step is to help their development pathway. This recorded through observation sheets (long-incident and planned) also weekly planning, summative assessment and monthly learning journal sheet given to parents to see what the child does at home. This cycle is continually throughout the child’s time in the nursery and makes up their learning journal that goes with them to reception. 2.1 Use different sources to plan work for an individual child or group While playing outside I notice that one of my key children had an interest in collecting cocus and putting them in the back of his car. 2.2 Engage effectively with children to encourage the child’s participation and involvement in planning their own learning and development activities. The ways in which ‘a child engage with other, people and their environment – playing and exploring, active learning and creating and thinking critically –underpin learning and development across all areas and support the child to remain an effective and motivated learner. From observation 2.1 I planned an activity to help child A to learn how to count by doing a nature walle around the nursery to collect cocus. Counting them at the end to see how many each child collected. 2.3 Support the planning cycle for children learning and development. The EYFS is very clear, that observation must form the basis of planning for individual children there are two specific legal requirements in this respect which are found in welfare requirement relating to the organisation of the setting. Providers must carry out sensitive observational assessments in order to plan to meet the children’s individual needs. Providers must plan and provide experierices which are appropriate to each child’s stage of development as they progress towards the early learning goals. It is important that plans reflects children’s interests and needs. Observe and collect information. Record what you know and see about children’s strengths, interest, capabilities and cultures. Question Analyse- Interpret and make meaning of information collected and evidence documented. link evidence to learning development. Outcomes Plan, Act and Do Design learning experiences and learning environments. Discuss learning and next steps with children’s families and other professionals. The planning cycle is used to support assessments for learning which is designed to discover what children know and understood, based on what they make, write draw, say and do. 3.1 Explain how practitioners promote children’s learning within the relevant early years framework. The EYFS emphasise a personal approach to learning, this is because all children develop at their own rate and in different ways. In my setting we observe each child and make observations so that we can see patterns of the child’s interests as well as to see how they are developing. This allows us to analyse whether the child is within their age and stage of development. As such this enables us to plan appropriately for the child, seeing whether they are within the developmental pathway. This allows us to work in partnership with parents giving them the opportunity to be apart of weekly planning, assessments and giving their input. 4.2 Explain the importance of engaging with a child to support sustained shared thinking. The importance of engaging with children is that it  enhances the child’s learning encounter encouraging, helping them to learn new words extended conversations and helps children to extended conversation to develop their own ideas, while chatting to them to promote their development. Sustained share thinking helps children to reach conclusions and explore concepts at a deeper level. During this period, children are also processing information more effectively and often make connections with things that they have already learnt. This â€Å"joining up† of ideas and concepts is extremely valuable. Children have to be extremely interested in an activity or something that has occurred to sustained shared thinking. We also have to be ready to follow up on things that children find fascinating or intergrading. Recognising the potential for sustained shared thinking is therefore essential.

Sunday, September 15, 2019

World Heritage Side

Introduction World Heritage is the diversity of the planet, and the achievements of its peoples. They are cultural or natural sites, monuments, cities or geographical habitat places of beauty and wonder; mystery and grandeur; memory and meaning (WiseGeek, 2012). In short, they represent the best Earth has to offer. The World Heritage Sites are registered and deserved of protection and preservation by the UNESCO. The idea of cultural and natural conservation to preserve the world significance is necessary for everyone.Each country has set up the program for the world heritage preservation. Not only it is considered to be the benefit of the international countries for preservation but also all people should help to take care of and make public relations to foreigners to visit the valuable site. Because it can build income into the country and it is deemed to announce the significance of each country around the world. Therefore, each country should preserve and protect their own heritag e and proud of it.The world heritage sites are considered as the natural and cultural significance. There is the international program for selecting the cultural and natural sites which are unique and some of them would be obtained funds to reform or improve each site. The fund promotes technical and financial assistance to World Heritage sites, including the enhancement of heritage sites in compliance with the Convention and the development of management plans.Each country must take the Tentative list and the file is evaluated by the International Council on Monuments and Sites and the World Conservation Union. Then, the Committee will make their decision for cultural and natural criteria and they will divide the countries into five zones to set a breakdown of the sites. This Graph of the world heritage [pic] |Country |Natural |Cultural |Mixed |Total | |North America &Europe 73 |432 |11 |513 | |Asia Pacific |51 |142 |9 |203 | |Africa |35 |43 |4 |82 | |Arab States |4 |63 |1 |68 | |L atin America & The |32 |62 |3 |97 | |Subtotal |196 |742 |28 |966 | |Less duplication |13 |17 |0 |30 | |Total |188 |745 |29 |962 | (Data source from wikipedia) At present, there are 962 properties are listed; 745 cultural sites, 188 natural sites and 29 mixed properties.The sites are designated as having â€Å"outstanding universal value† under the Convention Concerning the Protection of the World Cultural and Natural Heritage. This convention, which was adopted by UNESCO in 1972, provides a framework for international cooperation in preserving and protecting cultural treasures and natural areas throughout the world. There are three types of sites: cultural, natural, and mixed. Cultural heritage sites include hundreds of historic buildings and town sites, important archaeological sites, and works of monumental sculpture or painting. The ratio of cultural to natural sites on the World Heritage List is roughly 3 to 1. Several new sites are added to the list at the middle of each year.World Heritage designations often boost local economies by encouraging tourism; in addition, UNESCO funds numerous efforts to preserve and restore sites in developing nations subject to unusual levels of pollution, natural hazards, or other problems may be placed on the associated List of World Heritage in Danger until improvements are made. There are two world heritage sites which will be studied for this research; Kakadu National Park in Australia and the Great Wall of China. The first one was classified as the mixed world heritage site because this national park represents unity of archaeology and ethnology. It is located in the north of Australia and it had been living areas for more than 40,000 years ago. (Thai World Heritage Information Centre, 2012) Many beautiful arts were found such as mural painting, rock engraving, and archaeological sites with the record of history and living things’ life style.The evidences have been emerged since the era of hunting prior t o the era of aborigines. Therefore, it is the symbolic sample with complicated ecosystem in plain and lowland areas including it is a habitat for plants and rare regional animals. There are many plants and animals so this national park has diversity of plants and many species of land and marine animals such as bird, ant, insect, turtle, dugong, etc. This area is also benefits for hundred of aboriginal people so it is very interesting to study their lives and cultures as well. Since this national park is archaeological areas so to analyze and get important evidences for this prominent place is very necessary.Many valuable things found are excavated and identified such as stone tools, axes, polished stone, and the sites of rock painting for 18,000 years ago. It was proposed as the cultural property on the World Heritage List in 1981. Until many academicians supported and preserved this national park by establishing a fund of documentary evidence and served as important sources of info rmation. The second one is the Great Wall of China. It was established in c. 220 B. C. The Qin Shi Huang dynasty (Rosenberg, 2012) graciously pleased to join all parts of an old fort together in order to protect invasion. The construction had been continued until the Ming dynasty (1368-1644). (Rosenberg, 2012) Then, the Great Wall of China became the world's largest military object.The historical and strategic importance is accompanied with architectural features. Its total length is more than 20,000 kilometers. Before construction of bricks, it was constructed by rock, soil, and wood and some places used granite or mud. At present, the Great Wall of China is the largest construction in the world and longest time for building and it was also given a name of the largest grave. It is because almost million labors and prisoners were fettered at their necks among bad weather condition for long time so thousands of them died and buried under the wall. This research indicates the worthy e lements including historical and cultural information.However, at moment tourists are facing some problem to reach the Great of Wall, for example, the remoteness of the sites made it more difficult for tourists to travel to them (Vazifdar 2012). Therefore, we should more consider its benefits and elaborately introspect how the difficult methods of the Great Wall of China building and study in-depth information, we will know that China has the regulations on the protection of the Great Wall and systematical management. The regulation has well regulated visitors' and local residents' behaviors on the Great Wall. When they visit the wall, tourists must observe his or her obligations to protect it. The regulation has 31 articles in all regarding to every uncivil behavior those tourists or local residents may practice on the wall (Travelchinaguide, 2012).Further study, research and fieldwork should be promoted in heritage conservation and preservation and both public and private sectors should cooperate with local and international partners. In addition, coordinating with its UNESCO partner and World Heritage Centre, will facilitate the exchange of research, scholarship, technical expertise, and student training in historic preservation and cultural resources management related to UNESCO World Heritage Sites. The important principles should be setting up innovate policies, practicing in the field of historic preservation, and emphasizing on sustainable development for a dynamic environment. The beneficial knowledge will be expanded through many researched with faculty and scholars working in fields related to heritage studies and preservation.In addition, the systematical design and management to prepare for work in the conservation are very essential because we can take account into restoration, adaptive reuse of historic buildings, landscapes and cultural artifacts. World Heritage Studies is a unique and innovative program that takes up the technical, socio-econo mic, cultural, ecological and political challenges related to the protection of World Heritage. Then, we can develop concepts and strategies for the preservation and future use of World Heritage Sites including the planning and work for infrastructure to promote a gentle and sustainable tourism, the establishment of participatory structures to involve and educate local populations, and decision-makers.We work as educators at heritage sites and museums developing new concepts of presentation beyond the traditional exhibition thus stressing the future-oriented aspects of heritage. In conclusion, this research was to study the protection and preservation of World Heritage Sites. World Heritage belongs to all humanity and the rights of the global collective must replace the old individual rights. To persuade the public, a new revolutionary way of thinking or systems thinking should replace the contrary old thoughts and ways. The key elements approach to the protection and management of World Heritage Sited are designation of specific assets within World Heritage Sites (listed buildings, schedule ancient monuments, parks and gardens, conservation areas, areas of outstanding national beauty, etc. , consideration in the determination of planning applications, policy inclusion should be conducted by local authorities in their local plan to protect the outstanding universal value, authenticity and integrity of World Heritage Sites, an agreed management plan should be available for each world heritage site, local commitment, a stakeholders steering group and support from the key partners, and effective coordination, normally by a dedicated coordinator. (Department for Communities and Local Government) The establishment of various forms display and transfer knowledge for new interpretations of World Heritage. A further field of employment is the work of specialists in national and international educational institutions, especially in the field of adult education. A new i mage of World Heritage will be contributed to widening the access to this topic for broader segments of society. Photo references: [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] [pic] ReferencesDepartment for Communities and Local Government (2012). Protection of World Heritage Sites. Retrieved from www. bath-preservation-trust. org. uk/index. php? s. Encyclopedia Britannica (2012). Kakadu National Park. Retrieved from http://www. britannica. com/search? query=Kakadu+National+Park+ Rosenberg, M (2012). The Great Wall of  China :The Ancient Great Wall of China is a World Heritage  Site. Retreived from http://geography. about. com/od/specificplacesofinterest/a/greatwall. htm Thai World Heritage Information Centre. (2012). Asia and the Pacific. Retrieved from http://www. thaiwhic. go. th/heritageList. aspx? region=Asia%20and%20the%20Pacific Travelchinaguide. com.Regulation on Great Wall Protection (2012). Retrieved from http://www. travelchinaguide. com/china_great_wall/wall protection/law/ University of Technology (2012). World Heritage Studies. Retrieved from http://www. enqa. net/humanities-arts/world-heritage-studies-brandenburg-university-of-technology/view-details. html Vazifdar, L (2012). UNESCO World Heritage Sites in China Threatened Due to Tourism. Retrieved from http://www. travelerstoday. com/articles/2700/20120814/unesco-world-heritage-sites-china-threatened-tourism-great-wall. htm WiseGEEK (2012). What is a world Heritage Site?. Retrieved from http://www. wisegeek. com/what-is-a-world-heritage-site. htm