Wednesday, October 30, 2019

Why is there such an abundant use of irony in poe's the cask of Essay

Why is there such an abundant use of irony in poe's the cask of amontillado What thematic purposes does it serve - Essay Example The main character, Fortunato, is portrayed as an important and cultured man. His name can be interpreted as "the man of fortune", but the irony is that he is faced with bad luck to have wronged a man with a deathless memory and a commitment to "not only punish, but punish with impunity" (Poe 848). The irony is that Poe does not tell readers the exact offense he has committed, and can make no evaluation upon whether Montressor's revenge is justifiable. "Revenge is a dish best served cold" (Poe 541).Readers cannot analyze and evaluate Montressor's right for revenge. An abundant use of irony is evident in contrasting characters of Fortunato and Montressor. Poe does not directly state that Fortunato is nave or Montressor is a very cunning man. Readers can guess and predict that these characteristics are probably true. Fortunato's ability to assess and judge situations accurately is questioned at the beginning of the story when he insists upon leaving his family and friends to descend into a damp wine vault in order to answer Montressor's challenge at judging the worth of a cask of wine. Montressor describes: "Putting on a mask of black silk, and drawing a roquelaire closely about my person, I suffered him to hurry me to my palazzo" (Poe 848). His pride is great and he feels he alone is capable of making this evaluation; he pays a terrible price for this arrogance. The uniqueness of the short story is that Poe links two stylistic devices: humor and acute irony which leads to change from what is expected. As the two men proceed along toward Fortunato's ultimate resting place, Montressor's sarcastic remarks and exclamation add ironic details and black humor. He asks Fortunato about his health and long life, reveals his mason trowel when Fortunato mentions that he is a member of the secret Mason society, plays with the Fortunato by telling him that he intends to provide him "all the little attentions in my power" (Poe 852). Also, the irony is that Fortunato is dressed in the suit of a clown to join in the celebration of carnival. This detail gives some hints to readers about true nature and personality of this character. The irony is evident in the setting of the story. During the carnival season, Montresor encounters Fortunato and reports that he has purchased some Amontillado. It was about dusk, one evening during the supreme madness of the carnival season, that I encountered my friend. He accosted me with excessive warmth, for he had been drinking much" (Poe 846). Fortunato becomes anxious to sample the wine in question and deliver an opinion as to its merits; so he is easily led into a niche where he is fettered with chains and immured by Montresor, who has both a trowel and some fresh mortar handy. Fortunato, who has been drinking and coughing, quickly becomes sober and begs to be released, but to no avail. An abundant use of irony is evident when Poe unveils life and destiny of Montressor. Through this character, Poe's portrays a fanatical person who has spent the best part of his life first planning and then executing the murder of Fortunato. Fifty years later, Montressor is still thinking about the corpse that has been quietly

Monday, October 28, 2019

The Flower of Services for Gleneagles Hospital Essay Example for Free

The Flower of Services for Gleneagles Hospital Essay Gleneagles hospital Kuala Lumpur provides clear information about direction to service site on the websites. The address of Gleneagles hospital Kuala Lumpur is No 282 286 Jalan Ampang, 50450 Kuala Lumpur. Gleneagles hospital describes the location of the hospital where is located on Embassy Row on the main Jalan Ampang, Kuala Lumpur. The hospital location is central and easily accessible by the inner ring roads of Jalan Tun Razak and Jalan Ampang; the MRR (middle ring road) and AKLEH (Ampang-Kuala Lumpur Elevated Highway) by cars taxis or buses. Gleneagles Kuala Lumpur is near to Jelatek stop of Putra LRT station, it take less than 5 minutes by taxi to the hospital. The location map provided on the official website of Gleneagles. Gleneagles also provide information of regular visiting hours run from 9am to 10 pm. The visiting hours for Intensive Care (ICU) / Coronary Unit (CCU) / High Dependency Units (HDU) is 9. 00am to 2. 00 pm and 4. 00pm to 8. 00 pm. Gleneagles operates 24 hour daily for accident and emergency on the ground floor of the hospital. Gleneagles list out the price of executive screening programme such as basic screening for male and female is RM423, comprehensive screening for male and female is RM920, premium plus screening for male is RM1217, premium plus screening for female is RM 1364, etc. Gleneagles also provide information of prices for women wellness programme such as basic gynaecological screening cost RM115, breast screening cost RM192, etc. Gleneagles remind the customer to bring the following items to ensure a smooth admission: * passport/ identity card health insurance card and written letter of guarantee from health insurance company if the person is covered by insurances * doctor’s referral note, past or present medical records, x-rays, or prior test results (if the person physician has requested them) * Medications that have been prescribed to the person * A copy of your advance directives (if any) Gleneagles give warning to visitors, do not send flower to patient in ICU because ICU is a sterile place and should be kept free from possible contaminant. Order-taking The patients can book an appointment with Gleneagles through official website of Gleneagles. The patient need to fill in their particulars such as nationality, patient’s name, gender, date of birth, NRIC / Passport number, telephone number, mobile number, fax number, e-mail address, and patient’s current medical conditions / symptoms / diagnosis . The patient also needs to fill in preferred appointment period and time slot either morning or afternoon sessions. Lastly, Gleneagles require the person who book an appointment answers a question for additional information for Gleneagles and Gleneagles require these information to process the customer request. After complete fill in the details, the customer click submit button, the appointment is successfully book. Billing Gleneagles deliver the bill for individual who do medical services at their hospital. The bill contains information address of Gleneagles, bill number, bill date/time, bill prepared by who, account number, credit term and contact number. The bill also state clearly about the medical service charge such as charge for bed, CSSD, cath lab, medical record, laboratory, pharmacy, medical/surgery supply, equipment charge, nursing and doctor consultation / procedure charge. Payment The patients can make payment at registration counter when check out from hospital by using credit or debit card. Pre-payment is required for all check-up programs. Gleneagles also accept the cash for the payment and changes will give back to the customer for overpayment. The patient also can make payment for medical service provided through online to Gleneagles Hospital Kuala Lumpur SDN. BHD. cross account. For self-paying patients, 1. 5 percent interest will be charged per month is the amount due after 30 days. Gleneagles charge parking fee for the vehicles park inside the hospital. Gleneagles using machine at entry gate for gives the parking ticket to the driver who want parking inside the hospital. Therefore, the visitors and patient parking inside Gleneagles need pay the parking fee by insert cash into machine in order to drive out from the hospital.

Saturday, October 26, 2019

Animal Farm: The Animals Bad Memories Essay example -- Animal Farm Ess

Animal Farm: The Animals' Bad Memories   Ã‚  Ã‚  Ã‚  Ã‚  Almost all the animals had a very bad memory so they were not able to remember things of major signifigance. After a little while the pigs would mention the past and the animals would not remember what had happened so they would agree with the pigs. The the battle of cowshed, snowball was a very herioic animal in that battle but Neapolean said that that was not true that there memory had deceived them, that snowball was just trying to get them to trust him because he was in connection with Mr. Jones. Also the pigs had changed the commandments. When the animals saw the commandments when they have been changed the pigs convinced them that they were wrong. So even though some animals knew how to read they would not have remembered very clearly what the commandments really said.   Ã‚  Ã‚  Ã‚  Ã‚  The pigs where also very convinceing. They were alway able to get out of any situation. The best talker of all the pigs was Squaler. He was always able to convince that animals that what every they had done the do for the good of all the animals and not just for themselves. Just like when the pigs had taken the milk and apples for themselves, they said that they only took it was because they needed it and that if they did not have it they would not be able to help operate the farm, he also added that the pigs did not actually like the milk and apples but they had to eat it. They rest of the animals believ...

Thursday, October 24, 2019

One Flew Over The Cuckoos Nest Essay -- essays research papers

One Flew Over The Cuckoo’s Nest The significance of the title can be interpreted in this quote. The story is about a struggle in a psychiatric ward, where many “cuckoos'; reside, “Ting. Tingle, tingle, tremble toes, she’s a good fisherman, catches hens, puts ‘em in pens… wire blier, limber lock, three geese inna flock… one flew east, one flew west, one flew over the cuckoo’s nest… O-U-T spells out… goose swoops down and plucks you out.'; This is where the title comes from, the cuckoo’s nest being the psychiatric ward and McMurphy being the goose who plucks “you'; out. The author of this book is Ken Kesey, also author of Demon Box and Sometimes a Great Notion. Kesey was born in La Junta, Colorado. He graduated from the University of Oregon, and later studied a Stanford. Kesey was head of a group called The Merry Pranksters, who traveled around the country staging happenings. Kesey’s playful attitude is reflected in the main character, McMurphy, who is often pulling pranks in the psychiatric ward. The oppression of society is a big theme in the novel. The narrator (Chief Bromden) often reflects on how the Combine is taking over. The Big Nurse is never happy unless there is complete order in her ward. She often holds group meetings, in which she belittles her patients to where they are merely rabbits, and not men. Often, when a patient would act inflammatory, she would place him in Disturbed. There was always the threat of Electro-shock therapy, and even lobotomy. The only way to get out of the ward was if you gave up your personality and conformed to her rules. Most of the patients who are in the ward were forced there because of the oppression they faced outside of the hospital. Chief Bromden’s father was the chief of his village. The government was trying to push him off his land, and although he tried to maintain his way of life, his people were being bribed, and his wife would work on him too, until all he became was a drunk, inept man. Harding (another patient) comm itted himself because he couldn’t take society’s forefinger pointing at him, whilst millions chanted, “Shame, shame, shame!'; Even at the climax of the novel, McMurphy wasn’t acting on his own. “We could... ...night, have to crawl around on my hands and knees feeling underneath the springs till I find my gobs of gum stuck there. Nobody complains about the fog. I know why, now; as bad as it is, you can slip back I it and fell safe. That’s what McMurphy can’t understand, us wanting to be safe. He keeps trying to drag us out of the fog, out in the open where we’d be easy to get.'; – Chief Bromden commenting on the fog. This quote illustrates the fog, which symbolizes confusion and naivete of the patients. Ignorance is bliss to these people and it’s hard for McMurphy to understand that. “Old Rawler. Cut both his nuts off and bled to death, sitting right on the can in the latrine, half a dozen people with him didn’t know it till he fell off to the floor, dead. What makes people so impatient is what I can’t figure; all the guy had to do was wait.'; – Chief Bromden reflecting on the dead guy. This quote helps set the mood for the novel and many of the patients. They seem to possess a prison-like attitude, with scorn and cynicism. It also shows that the ward is not a nice place to live; kind of depressing.

Wednesday, October 23, 2019

Database: Entity-relationship Model

Appendix A: A Practical Guide to Entity-Relationship Modeling A Practical Guide to Entity-Relationship Modeling Il-Yeol Song and Kristin Froehlich College of Information Science and Technology Drexel University Philadelphia, PA 19104 Abstract The Entity-Relationship (ER) model and its accompanying ER diagrams are widely used for database design and Systems Analysis. Many books and articles just provide a definition of each modeling component and give examples of pre-built ER diagrams.Beginners in data modeling have a great deal of difficulty learning how to approach a given problem, what questions to ask in order to build a model, what rules to use while constructing an ER diagram, and why one diagram is better than another. In this paper, therefore, we present step-by-step guidelines, a set of decision rules proven to be useful in building ER diagrams, and a case study problem with a preferred answer as well as a set of incorrect diagrams for the problem.Database Management System a nd DataThe guidelines and decision rules have been successfully used in our beginning Database Management Systems course for the last eight years. The case study will provide readers with a detailed approach to the modeling process and a deeper understanding of data modeling. Introduction Entity relationship diagrams (ERD) are widely used in database design and systems analysis to represent systems or problem domains. The ERD was introduced by Chen (1976) in early 1976. Teorey, Yang, and Fry (1986) present an extended ER model for relational database design.The ERD models a given problem in terms of its essential elements and the interactions between those elements in a problem domain. The ERD can serve as the basis for databases, which store data about the problem domain, and which use, manipulate, and constrain that data. Experts in systems analysis and database design are adept at identifying user requirements and then translating them into corresponding components of the model. Many books and articles just provide a definition of each modeling component and give examples of pre-built ER diagrams. Beginners in data modeling have a great eal of difficulty learning how to approach a given problem, what questions to ask in order to build a model, what rules to use while constructing an ER diagram, and why one diagram is better than another. 213 Appendix A: A Practical Guide to Entity-Relationship Modeling Ahrens and Song (1991) present a set of requirements elicitation template sentences, structured English template sentences, and some decision rules for database modeling. This paper presents a set of heuristic rules which improve upon those presented by Ahrens and Song (1991), together with a detailed case study analysis.We include step-by-step guidelines, a set of decision rules proven to be useful in building ER diagrams, and a case study problem with a preferred answer as well as a set of incorrect diagrams for the problem. These guidelines and decision ru les have been successfully used in our beginning Database Management Systems course for the last eight years. The case study will provide readers with a detailed approach to the modeling process and a deeper understanding of data modeling. The Entity-Relationship Diagram The entity relationship diagram is a graphical representation of a conceptual structure of a problem domain being modeled.The ERD assists the database designer in identifying the data and the rules that will be represented and used in a database. The ERD is an implementation-independent representation of a problem domain and it facilitates communication between the end-user and the analyst. ERDs can be easily converted into a logical database structure that can be readily implemented in a particular commercial database management system. The basic components of the ERD are entities, properties of entities called attributes, and relationships between entities. Entities Entities are PRIMARY THINGS of a problem domain about which users need to record data.Ross (1988) provides a list of candidate entity types which could be included in the model. (1) People: humans who carry out some function Employees, Students, Customers (2) Places: sites or locations Cities, Offices, Routes (3) Things: tangible physical objects Equipment, Products, Buildings (4) Organizations Teams, Suppliers, Departments (5) Events: things that happen to some other entity at a given date and time or as in an ordered sequence Employee promotions, Project phases, Account payments (6) Concepts: intangible ideas used to keep track of business or other activities Projects, Accounts, Complaints 214 stepsAppendix A: A Practical Guide to Entity-Relationship Modeling These candidate entity types need to be evaluated against a particular domain being modeled. Some decision rules are discussed in a later section of this paper. Attributes Attributes are properties of entities or relationships. Entities have two types of properties: identi fying attributes and descriptive attributes. Identifying attributes uniquely determine each instance of an entity type. They are called entity identifiers or keys. For example, the attribute social security number would uniquely identify each member or instance of the entity type student.Descriptive attributes of student might include year, advisor, and grade point average. Each instance of an entity has a value for each attribute. Values for grade point average might include 2. 5, 3. 45, and 4. 0. Values for year might include 1991, 1992, 1993, and 1994. Only attributes that are meaningful in terms of modeling the problem under consideration are included in the ERD. For example, we would not include eye color in a student database. Relationships Relationships are another basic component of the ERD. A relationship is an association between or among things or entities.A relationship describes a meaningful interaction that needs to be remembered by the system. The degree of a relation ship indicates how many entities are participating in the relationship. A unary relationship describes an association of an entity with itself. A binary relationship, the most common instance, describes an association between two entities. A ternary (or n-ary ) relationship is an association between three or more entities. The ER methods that allow only unary and binary relationships are called binary models, while ER methods that allow any type of relationship are called n-ary models.For more thorough treatment of ternary relationships, see Jones and Song (1995, 1996) and Song and Jones (1995). Cardinality and Participation Constraints Cardinality is a constraint on the relationship between two entities. Specifically, the cardinality constraint expresses the maximum number of entities that can be associated with another entity via a relationship. For example, in a binary relationship (a relationship with two participating entities), we can have three possible cardinalities: oneto-o ne (1:1), one-to-many (1:N), or many-to-many (M:N).One-to-one cardinality says that, for entities customer and account, one customer can have at most one account and one account cannot be owned by more than one customer. One-to-many cardinality says that one customer can have many accounts, but one account cannot be owned by more than one customer. Many-to-many cardinality says that one customer can have many accounts and one account may be owned by many customers. 215 Appendix A: A Practical Guide to Entity-Relationship Modeling Participation is also a relationship constraint.Participation expresses the minimum number of entities that can be associated with another entity via a relationship. There are two values for participation: total or mandatory participation and partial or optional participation. If every instance of an entity must participate in a given relationship then that entity has total participation in the relationship. But if every instance need not participate in a g iven relationship then the participation of that entity in the relationship is partial. Given the relationship employee works for epartment, an employee has partial participation in that relationship if he or she need not work for a department. An employee has total participation in the relationship if he or she must work for at least one department. Similarly, a department has partial participation in the relationship if it can exist without having any employees. A department has total participation in the relationship if it must have at least one employee. Cardinality and participation constraints are business rules in the problem domain being modeled. These constraints represent the way one entity type is associated with another entity type.These constraints are also integrity constraints because they help to ensure the accuracy of the database. These constraints limit the ways in which data from different parts of the database can be associated. For example, let's say the cardin ality of the relationship between Customer and Account is one-to-one, as in Figure 1(a) below. If customer C1 is associated with account A3, then C1 cannot be associated with any other accounts and A3 cannot be associated with any other customers. 216 Appendix A: A Practical Guide to Entity-Relationship Modeling (a) One – to – One (1:1):One customer can have at most one account. One account cannot be owned by more than one customer. Customer 1 CA 1 Account ER Diagram C1 C2 C3 A1 A2 A3 Occurrence Diagram (b) One – to – Many (1:n): One customer can have many accounts. One account cannot be owned by more than one customer. Customer 1 C1 C2 C3 CA n A1 A2 A3 A4 A5 Account ER Diagram Occurrence Diagram (c) Many – to – Many (n:m): One customer can have many accounts. One account may be owned by many customers. Customer n C1 C2 C3 C4 C5 CA m A1 A2 A3 A4 A5 Account ER Diagram Occurrence Diagram Figure 1.CARDINALITY: The expression of the maximum numb er of entities that can be associated to another entity via a relationship. Occurrence Diagrams show the relationships between occurrences or instances of each entity. 217 Appendix A: A Practical Guide to Entity-Relationship Modeling Taxonomy in ER Modeling In an ER model, an entity is represented as a rectangle containing the name of the entity. The names of attributes are enclosed in an oval connected to the rectangle of the entity they describe. Attributes may be omitted from the diagram to avoid cluttering it and also in the early stages of development.Relationships are represented by diamonds between entities. The notation of the ERD, however, varies according to the modeling approach used. Binary models do not use the diamond to indicate a relationship, do not represent attributes of relationships, and do not allow ternary relationships, that is, relationships between three or more entities. Martin (1989), Bachman (1992), ERWin and IDEF1X (Bruce, 1992) use the binary modeling approach. Most text books use n-ary modeling, including Elmasri and Navathe (1994), Hawryszkiewycz (1991), Teorey (1994), Batini, Ceri and Navathe (1992), and McFadden and Hoffa (1994).A few notations are illustrated below. n Employee 1 Department a) Chen Employee Department b) Teorey n Employee 1 Department c) Elmasri ; Navathe Employee (0,1) works_for is_worked_for Employee works_for Employee p ——————–works_for Employee c has (1,n) Department d) MERISE Employee Department e) IE Department f) Bachman Department g) IDEF1X Department h) Shlaer & Mellor Figure 2. Various notations for ER Diagram representing â€Å"one employee works for zero or one department and one department has one or more employees†. 218 Appendix A: A Practical Guide to Entity-Relationship ModelingEach diagram in Figure 2 contains two entities: employee and department. In diagrams a, b, c, and d, the diamond indicates the relationship between the entities. T hese diagrams use n-ary modeling. Diagrams e through h are examples of binary modeling. They do not represent the relationship with the diamond shape. Instead, diagrams e, f, and h label the line between the entities with the relationship name. Attributes were not represented in the diagrams for simplicity. The various circles, lines, arrows, and letters on the diagram indicate cardinality and participation constraints.For a more complete treatment of various ER modeling methods, see Song, Evans, and Park (1995). ER Modeling How does one begin creating an entity relationship diagram? In this paper, we present step-by-step guidelines to build an ERD using n-ary modeling using Elmasri and Navathe's notation (see 2. c). In Table 1, we summarize a sequence of steps of database design using an ER model. Note that these steps are iterative. 1. Understand the problem domain. Analyze database requirements. †¢Write a summary specification in English, if not created yet. †¢What do w e need to store into the database? What queries and reports do we need to generate? †¢ What are important people, places, physical things, organizations, events and abstract concepts in the organization? 2. Design a conceptual schema by creating an ER diagram. (a) Identify entity types. Assign a singular noun to each entity type. (b) Identify relationships between (among) entities. Use a meaningful verb for a relationship name. (c) Draw an ERD without attributes. (d) Identify relationship cardinalities. †¢Mapping constraint (1:1, 1:N, N:M) †¢Participation constraint (Total, Partial) (e) Assign attributes to entity types and relationship types.Usually attributes come from nouns, adjectives or adverbs. (f) Select identifiers (primary keys) for entity types. †¢Weak entity: composite primary key. †¢Regular entity: choose/create a single attribute primary key. (g) Select the PKs of relationships. †¢If 1:1, then the PK of either side entity type may be select ed. †¢If 1:N, then the PK of N-side entity type must be selected. †¢ If M:N, then a composite PK consisting of PKs of two entity types must be used. †¢ If ternary, then a composite PK consisting of the PKs of at least two entity types.The actual PKs selected will vary depending on the cardinality. 3. Design a logical schema. (a) Translate the ERD into a relational schema 219 Appendix A: A Practical Guide to Entity-Relationship Modeling †¢If a relationship cardinality is likely to be changed; use stable method. †¢If a relationship cardinality is not likely to be changed; use mapped method. †¢ If a relationship cardinality is not likely to be changed and null values of foreign keys are significant; use mapped with total/partial method. (b) Check normalization (at least 3NF). (c) Create data dictionaries. A schema table †¢One table for each relation created in step (a) – Assign a domain type for each attribute. – Explain the meaning of a ttributes, if not intuitive. – Note other values such as range, null, PK, FK, indexed, source, owner (d) Do database prototyping & modify the design if necessary. (e) Summarize the design assertion (integrity, security). 4. Verify the design with users. Iterate the steps, if necessary. Table 1. Steps to DB Design Using ER Modeling First, it is important to study the problem domain at hand. Analyze database requirements.Write a summary paragraph for the problem domain, considering what data need to be stored and what queries and reports need to be processed. All the information necessary for the identified queries and reports must be included in the summary paragraph. Revise the summary paragraph considering database requirements. Second, from the summary paragraph, find nouns. They are candidates for entity types. To determine whether a noun should be designated as an entity, the following decision rules may be applied. Rule 1 Every entity type should be important in its own right within the problem domain.Rule 2 IF an object type (noun) has only one property to store THEN it is an attribute of another entity type ELSE it is an entity type. Rule 3 IF an object type has only one data instance THEN do not model as an entity type. Rule 4 IF a relationship needs to have a unique identifier 220 Appendix A: A Practical Guide to Entity-Relationship Modeling THEN model it as an entity type. The first three rules are used to evaluate object types or nouns, and the fourth rule is used to evaluate relationships or verbs. Example 1 Address is usually a property of another object type, like customer, vendor, or company.Its existence is less important and not meaningful in its own right within the problem domain. Address should be modeled as an attribute. Example 2 Suppose we are modeling the customers of a company and we want to include the city where each customer resides. If the name of the city is its only attribute, then, following Rule 2, model city as an attri bute not an entity. Similarly, consider the case of modeling employees and their departments. If the only important property of the department is its name, then Rule 2 tells us to model it as an attribute.However, if we need to store additional properties of each department such as projects or total sales, then we should consider modeling it as an entity. Example 3 Consider modeling the activities of a trucking company. Since there is only one instance of the trucking company, then, according to Rule 3, it is not necessary to represent it in our model as an entity. We note that it is not wrong to model this single instance noun as an entity type. We simply do not model it as an entity type at the conceptual level because it does not add any modeling power.We need the fourth rule because one fact can be stated in many different ways in English. In the fourth rule, distinguishing between entities and relationships depends on the function the component plays in the problem domain and h ow data will be stored about it. Example 4 Consider the three statements customer orders products, customer pays bills, and reviewer reviews papers. Even though orders and pays appear to represent relationships, we model them as entities since each instance would need a unique number for identification in real-world situations.Information would be stored in the database for each order and payment. Each review is not likely to need a unique identification number. Instead, we identify each review activity by a combination of Paper# and Reviewer#. Thus, by Rule 4, we model reviews as a relationship type. Once entities have been assigned, we proceed to identify relationship types between those entities. Verbs are useful candidates for relationships. The following question is useful for identifying relationships: â€Å"What sentences can be constructed of the form Entity Verb Entity? † For example, 221Appendix A: A Practical Guide to Entity-Relationship Modeling †¢Employee ha s children (Existence relationship) †¢Professor teaches students (Functional relationship) †¢Customer places order (Event relationship) Note that a relationship is not an action of a flow of data as in data flow diagrams. They are important interactions, between two or more entities, that need to be remembered by the system. In the above examples, we want to remember the facts that who is a child of which employee, which professor teaches which students, and which customer places which order. Also keep in mind that all relationships are bi-directional.We should be able to state the relationship in both directions. Expressing the relationships above in the opposite direction yields the following statements: †¢ Children belong to employee †¢ Students are taught by professor †¢ Order is placed by customer After an ERD has been built, the following rule can aid in validating the diagram. Rule 5 IF any verb refers to nouns which are not selected as entity types T HEN do not model it as a relationship type. If any verb in the ERD fails to follow Rule 5, then consider it again carefully before including it in the diagram.When entities and relationships have been identified, then the cardinality and participation constraints of the relationships can be analyzed. The following rules can help determine the cardinality and participation constraints for a given binary relationship. A B Rule 6 For each A, what is the maximum number of Bs that may be related to it? Rule 7 IF A can exist without being associated with a B THEN A has partial (optional) participation ELSE A has total (mandatory) participation. 222 Appendix A: A Practical Guide to Entity-Relationship Modeling Example 5 Consider the relationship Supplier Supplies Account.For each Supplier, what is the maximum number of Accounts that may be related to it? Let's say that in our problem domain, each Supplier may have many Accounts but each Account may have only one Supplier. By Rule 6, the ca rdinality constraint for Supplier:Account is 1:N or one to many. Figure 1 illustrates the cardinality constraints. Example 6 In determining the participation constraint of Supplier Supplies Account, we follow Rule 7: If Supplier can exist without being associated with Account, THEN Supplier has partial participation, ELSE Supplier has total participation.In our problem domain, Supplier may exist without being associated with Account. Therefore, Supplier has partial participation in the Supply relationship. However, since Account cannot exist without a Supplier; Account has total participation in the Supply relationship. Some basic naming conventions have been established to maintain accuracy and consistency in the database and to avoid redundancy. All entity names should be unique. Use singular nouns in the diagram for both entity and attribute names. Use verbs in the present tense for relationship names. Verbs should be meaningful.For example, avoid verbs like is, has, and do whene ver possible. Additionally, well-defined ERDs should satisfy the following basic rules: †¢ All entities and relationships should be connected. †¢ All entity names should be unique. †¢ Each entity must have at least one relationship. †¢ A relationship cannot be directly connected to another relationship. †¢ Every entity must have at least one unique attribute, which serves to identify each instance of that entity. Case Study The following example will illustrate our guidelines for modeling requirements of the problem domain with entity-relationship diagrams.Using the summary paragraph of the problem description below, we will progress through the steps described above. The nouns in the problem description appear in boldface and the verbs are italicized to aid in the following analysis. Summary Paragraph of Problem Description A database specialist wants to design a part of the database for a small drug store owner as follows: The owner wants to keep track of all the suppliers who supply anything to the store. For each supplier, the owner assigns a unique supplier number, and wants to keep the 223Appendix A: A Practical Guide to Entity-Relationship Modeling company name, address (number, street, city, state, zip), contact person's name, phone number, fax number, and a comment for each supplier. For each supply activity, an account is established to keep track of the date incurred, the total cost of the activity, due date for payment, outstanding balance after some payments, and any special comments related to the account. For each account, the owner may pay at several different times and in different ways (e. g. , cash, check, credit card).For each payment activity, the owner wants to keep the date of payment, amount of payment, method of payment (check: check number; credit card: credit card name, type, and number). Note that one supplier can supply many times and one payment can pay for several accounts of the same supplier. Entity Ana lysis After reading and understanding the problem statement, our first step is to identify entities for the ERD. To do that we examine the nouns in the problem statement. Nouns appear in boldface. We test each noun against our four criteria to determine whether or not it should be included as an entity type.Our first noun is owner. Recall that an entity type has more than one instance and more than one property. Since there is only one instance of owner, we do not model it as an entity type. Similarly, there is only one store, so we need not represent store as an entity type. The next noun, supplier, can be classified as an entity type. Several properties of supplier are listed in the problem statement. The statement also refers to more than one supplier. Therefore, according to Rules 1, 2, and 3, we model supplier as an entity.For each supplier, the owner wants to store the following properties in the database: supplier number, company name, contact person, address, phone number, f ax number, and comment. Each of these attributes except address has only one property to store so we model them as attributes. Address has its component properties number, city, state, and zip so one might be tempted to model it as an entity type. However, the role of address as a property of supplier supersedes the fact that address has properties of its own. In other words, address itself without supplier is not important in its own right.Therefore, by Rule 1, we model address as an attribute. Account is the next noun. Account has several properties to be stored in the database: date incurred, total cost, due date, account balance, and comments; and we will store information about numerous accounts. Therefore, we designate account as an entity. Its properties are modeled as attributes of account. Payment is clearly an entity, with multiple instances and various properties. The properties of payment: date of payment, amount of payment, and method of payment, are modeled as its attr ibutes.Cash, check, and credit card appear to be attributes of payment, but actually, they are not attributes themselves, but simply different values for the attribute method of payment. This distinction becomes clearer if we think about 224 Appendix A: A Practical Guide to Entity-Relationship Modeling storing data in the database. For each payment, one of the values cash, check, or credit card will be stored in the location containing data about the method of payment. Check number and credit card name, type and number may be modeled as attributes of Payment. Supplier Account Payment Figure 3. Entities to be included in the ERD.Relationship Analysis Our analysis of nouns in the problem statement has produced three entities: Supplier, Account, and Payment (Figure 3). Keep these entities in mind as we identify relationships between them. Let's examine the verbs in the problem statement as candidates for relationships in the diagram. Verbs appear in italics. Of the verbs in the problem statement: keep track, assigns, supply, established, and pay, only supply and pay are possible candidates for relationships between the entities account, supplier, and payment. Keep track and keep appear several times in the problem statement.These terms refer, not to a relationship between entities, but generally to storing data in the database. In other words, they are used to describe the problem domain, not an interaction that needs to be remembered by the system. Therefore, we do not model them as relationships. Established, in the statement an account is established, is an activity performed by the owner or the system itself. Similarly, owner assigns a unique supplier number reflects an activity by the owner. These two verbs do not represent relationships between any of our three entities. Thus, we are left with the verbs supply and pay.A supplier performs a supply activity. The result of a supply activity is an account. Therefore, a good candidate for the relationship betwee n supplier and account is supply. Stated in both directions, the relationship is Supplier supplies account and account is supplied by supplier. Rule 4 states that if a relationship needs to have a unique identifier, then model it as an entity. Each supply activity is unique, so we may be tempted to model supply as an entity. However, the data for each activity is stored using the entity account, so it is not necessary to create another entity which stores the same information.Each payment credits an account so pay is the relationship between payment and account. Expressing the relationship pay in both directions, we can say account is paid by payment and payment pays account. 225 Appendix A: A Practical Guide to Entity-Relationship Modeling Now we can draw the basic ERD (Figure 4). We include the entities Supplier, Account, and Payment, and the relationships Supply and Pay. Attributes may be added to the diagram at this point or omitted to avoid clutter. Supplier Supply Account Pay Payment Figure 4. ERD without attributes and constraintsAnalysis of Cardinality and Participation Constraints In order to identify the cardinality and participation constraints of each relationship in the ERD, we follow Rules 6 and 7 looking at the relationship first from the point of view of one entity and then from the other entity. In our ERD above, to determine the cardinality constraint of the relationship Supply, we begin by asking, â€Å"For each Supplier, what is the maximum number of Accounts that may be created? † From the problem statement, we know that one supplier can supply many times and an account is established for each supply activity.Viewing the relationship in the other direction, we ask, â€Å"What is the maximum number of Suppliers for which each Account may contain information? † From the problem statement we can assume that each account carries information for a single supplier, since accounts are established for individual supply activities. Th us, for each supplier, there may be many accounts and each account may have only one supplier. The relationship Supplier Supplies Account is a one-to-many relationship. The diagram is marked with a 1 on the side of the relationship Supply nearer to Supplier, and an N (for many) on the side nearer to Account (see Figure 5).To identify the cardinality of the relationship Payment Pays Account, we look at the relationship from both directions. We ask, â€Å"What is the maximum number of Payments we can accept for each Account? † The answer is clearly stated in the problem statement: For each account, the owner may pay at several different times and in different ways. From the opposite direction, â€Å"For each Payment, what is the maximum number of Accounts for which it may pay? † Again, we find the answer in the problem statement: One payment can pay for several accounts of the same supplier. In sum, each account 226Appendix A: A Practical Guide to Entity-Relationship Mod eling may receive many payments and each payment may pay for many accounts. Therefore, the relationship Payment Pays Account is many-to-many. This time, we mark our diagram with an M on one side of the relationship Pay and an N on the other side. (Note that the use of M or N is completely arbitrary. ) We go through a similar process to determine the participation constraint of each relationship, looking at the relationship from each direction. For the Supply relationship we ask, â€Å"Can a Supplier exist without generating Accounts? In the other direction, â€Å"Can an Account exist without having Suppliers supply merchandise? † The answers to these questions are not explicit in the problem statement. In a real world situation, the database designers would clarify questions like these with the owner. In this case, we will make assumptions from what we understand about the problem domain. Suppliers are generally fairly stable entities. A company maintains relationships with several regular suppliers regardless of whether they have outstanding accounts. On the other hand, an account is only created when a supplier supplies merchandise.Since suppliers can exist without having current accounts, Supplier has partial participation in the Supply relationship. Accounts, however, depend on suppliers for their existence. Thus, Account has total participation in the Supply relationship. To determine the participation of the entities Payment and Account in the Pay relationship, we ask, â€Å"Can a Payment exist without paying for an Account ? † and â€Å"Can an Account exist without receiving Payments against it? † A payment which pays for nothing is absurd. It cannot exist without an account. An account, however, may exist without receiving payments against it.Therefore, Payment has total participation and Account has partial participation in the relationship Pay. In representing the cardinality and participation constraints described above in our ERD, we will employ Elmasri and Navathe's (1994) notation. If an entity has partial participation in the relationship, then a single line is drawn on the line between that entity and the relationship. A double line indicates total participation. The cardinality constraint is represented by Look Across convention, while participation constraint is represented by Look Here convention.Figure 5 illustrates the final ERD with cardinality and participation constraints. 227 Appendix A: A Practical Guide to Entity-Relationship Modeling 1 Supplier Supply N Account M Pay N Payment Figure 5. ERD with cardinality and participation constraints. Errors in Modeling A common error that novice designers make is failing to recognize the boundaries of a problem domain. They fail to make a distinction between elements that comprise the content of the database and elements that are outside the scope of the database. For example, in the problem statement bove, a novice might want to model the verbs keep track or assigns or established as relationships (see Figure 6(a)). These verbs refer to implementing the database and not to its content. Keep track refers to storing data in the database, established refers to adding an instance of an entity to the database, and assigns refers to giving a value to an attribute of an entity. In deciding which elements to model, it is valuable to keep in mind the real world situation. Novice designers also frequently confuse entities with their attributes or properties, as in Figure 6(b).Occasionally, if properties are complex and play a significant role in the problem domain, then they may be modeled as entities. More often, however, properties of an entity should be modeled as attributes. In our problem statement, a novice user may decide to model address, a property of the entity supplier, as an entity. Modeling Address follows Rules 2 and 3 about identifying entities: it has more than one property and it has more than one occurrence. However, ad dress does not follow Rule1 in that it is not important in its own right.The role of address in the database is more accurate as an attribute of supplier, than as an entity with its own relationships. Other errors are modeling indirect or redundant relationships and inappropriately modeling object types as relationships rather than as entities. Given our problem statement, one may be tempted to model the relationship Payment Pays Supplier as in Figure 6(c) or Supplier Pays Account as in Figure 6(d) rather than Payment Pays Account. Figure 6(c) represents the association between payment and account indirectly. This indirect relationship can only exist after we have all the direct 228Appendix A: A Practical Guide to Entity-Relationship Modeling relationships as in Figure 5. In this case, the indirect relationship simply becomes redundant. Without the direct relationships, the indirect relationship cannot be added, because it cannot explain how a particular payment is distributed to mu ltiple accounts. Figure 6(d) represents the relationship Pay rather than the entity Payment. In either of these two cases, it is difficult to explicitly represent the fact that one payment can pay for several accounts of the same supplier. We can only tell implicitly by reading the check number for the various payments.If the payment is made in cash, there is no way to identify that it paid for more than one account. If the representation used in Figure 6(d) is used, then the attributes related to payments: date of payment, amount of payment, and method of payment, are now attributes of the relationship Pay. This representation can add unnecessary complexity to the model. Ordinarily, a relationship is uniquely represented by the identifiers of one or more of the entities which participate in it. If the relationship includes a time-dependent attribute like date of payment, then that attribute must also be included in the primary key for that relationship.Additionally, instances of da te of payment and amount of payment will require redundant representation because they will have to be included for each account covered by a payment. Finally, in business practice, each payment activity usually requires a unique identifier. Therefore, following Rule 4, it is more appropriate to model payment as an entity than as a relationship. As an entity, the representation is more straightforward and less likely to include redundant or inaccurate information. 229 Appendix A: A Practical Guide to Entity-Relationship Modeling a) Selection of wrong verb as relationship Owner (b) Attribute as entity Supplier Located_at Address Keeps_track Payment (c) Indirect relationship Payment Pays Supplier Establishes Account (d) Payment as relationship instead of entity Establishes Supplier Pays Account Figure 6. Errors in ERD Modeling. Limitations of Guidelines and Rules Two limitations of our guidelines are that they don't account for incomplete requirements analysis or for ambiguity in the problem description. If the problem description is incomplete, then the resulting analysis based on this approach will also be incomplete.We assume that the analysis is complete. If the problem specification is modified, the analysis and resulting ERD should be modified as well. In English, one concept can be represented in many different ways. For example, we can say that customer orders products or customer places an order to buy products. Order is used 230 Appendix A: A Practical Guide to Entity-Relationship Modeling as a verb in the first sentence and as a noun in the second. We minimize this problem by adopting Rule 4, which states that if a verb needs to have a unique identifier, we model it as an entity type rather than a relationship type.Conclusion We have discussed a set of decision rules which are useful in building ERDs and have illustrated the application of these rules using a single example. ERD constructs discussed here include Entities, Relationships, Attributes, Ca rdinality constraints and Participation constraints. To simplify our discussion, we didn't include other constructs such as Weak Entity, Ternary Relationship, and Generalization/ Specialization. Our rules are heuristics which we have found useful for most cases to build ERDs in the early stages of analysis.However, these rules may need some refinement in some problem domains and the rules should be adapted to the problem domain under consideration. References Ahrens, J. and Song, I. Y. (1991). â€Å"EER Data Modeling Aids for Novice Database Designers†. Proceedings of the 2nd International Conferences of the Information Resources Management, Memphis, TN, May 19-22, 1991, pp. 99-114. Bachman (1992). Bachman Analyst, Bachman Information Systems Incorporated. Batini, C. , Ceri, S. , and Navathe, S. (1992). Conceptual Database Design: An EntityRelationship Approach, Redwood City, CA: Benjamin/Cummings Publishing Company, Inc.Bruce, T. (1992). Designing Quality Databases with IDEF 1X Information Models. New York, New York: Dorset House Publishing. Chen, P. P. (1976). â€Å"The Entity Relationship Model – Toward a Unified View of Data†. ACM Transactions on Database Systems, 1 :1, pp. 9-36. Elmasri, R. and Navathe, S. (1994). Fundamentals of Database Systems, 2nd ed. , Redwood City, CA: Benjamin/ Cummings Publishing Company, Inc. Hawryszkiewycz, I. T. (1991). Database Analysis and Design, 2nd ed. , MacMillan Publishing Company. Jones, T. H. and Song, I. -Y. , (1995). Binary Representation of Ternary Relationships in ER Conceptual Modeling,† in 14th Int'l Conf. on Object-Oriented and EntityRelationship Approach, December 12-15, 1995, Australia, pp. 216-225. (Object- 231 Appendix A: A Practical Guide to Entity-Relationship Modeling Oriented and Entity-Relationship Approach, Lecture Notes in Computer Science, Springer-Verlag, Vol. 1021). Jones, T. H. and Song, I. -Y. , (1996). â€Å"Analysis of Binary/ternary Cardinality Combinations in Entity -Relationship Modeling,† Data & Knowledge Engineering Vol 19, No. 1, pp. 39-64. Martin, J. (1989).Information Engineering: Book II: Planning and Analysis, Englewood Cliffs, NJ: Prentice Hall. McFadden, F. , and Hoffa, J. (1994). Modern Database Management, 4th Ed. , Redwood City, CA: Benjamin/Cummings Publishing Company, Inc. Ross, R. G. (1988). Entity Modeling: Techniques and Application, Database Research Group, Inc. Shaler, S. and Mellor, S. J. (1988). Object-Oriented Systems Analysis: Modeling the World in Data, Englewood Cliffs, NJ: Yourdon Press. Song, I-Y. , Evans, M. , and Park, E. K. (1995). â€Å"A Comparative Analysis of EntityRelationship Diagrams,† Journal of Computer and Software Engineering, Vol. , No. 4 (1995), pp. 427-459. Song, I. Y. and Jones, T. H. (1995). â€Å"Ternary Relationship Decomposition Strategies Based on Binary Imposition Rules,† in 11th Int'l Conf. on Data Engineering, March 610, 1995, Taipei, Taiwan, pp. 485-492. Teorey, T. J. (1 994). Database Modeling ; Design: The Fundamental Principles, 2nd. ed. , Morgan Kauffman Publishers, Inc. Teorey, T. J. , Yang, D. , and Fry, J. P. , (1986). â€Å"A Logical Design Methodology for Relational Databases Using the Extended Entity-Relationship Model†. Computing Surveys, 18:12, June, pp. 197-222. 232

Tuesday, October 22, 2019

The Decline of Students Writing Skills Causes and Outcomes

The Decline of Students Writing Skills Causes and Outcomes The Decline of Students’ Writing Skills: Causes and Outcomes Writing is still the most common form of evaluating students’ achievements. You must write term papers, coursework, theses, and dissertations to prove that the teachers effort did not go to waste, and that you can acquire knowledge on your own. But something did go to waste, as more and more teachers begin to realize that they spend more time fixing grammar mistakes than focusing on the information related to topic of the work. So, what happened? If the problem keeps getting worse, maybe it’s high time to get to the bottom of it and find out the reasons for weak writing skills. Statistics on Student Writing Skills Numerous studies have been taken involving writing skills of grade-school to college age students. Annual reports from the National Center for Education Statistics show that the SAT mean scores in writing have dropped from 497 to 484 in 9 years (2006 – 2015). It’s already bad that the score is decreasing, but it also never stayed the same two years in a row during this period. Therefore, we can assume that the SAT result in writing will continue to decrease at the same rate. The same statistics show that SAT reading scores have also decreased in the same way. This also contributes to poor writing skills, particularly where analyzing and synthesizing sources is required. Causes of Students Poor Writing Skills Many teachers think that the main reason for poor writing is social media. Student paper writing seems to have shrunk to 140 characters in Twitter. But if you think about it, shouldnt these 140 characters teach young people how to express their thoughts concisely? Maybe the problem is not in the communication services that they use, but rather because they were never taught how to think and write properly. Actually, the basis of the problem lies in the limited skill set students get from secondary and high school education. They were not taught what they are required straight after entering college. Most of the time, high school students dont get to do anything more than argue an opinion in their essays. Analyzing and synthesizing information are neglected. Another point to consider is that more and more students are becoming reticent about sharing something personal, including their point of view on an essay topic. Possible Outcomes and Solutions Poor writing skills influence both employers and their prospective employees. Employers waste hundreds of dollars on training; that is, when they can attract applicants. If you’ve ever searched the job market, you’ve seen the error-filled job descriptions. Those vacancies are certainly not too appealing. On the other hand, if you’re a student looking for a job, writing skills are essential in writing a believable resume or cover letter. And in the future work place, you’ll have to write reports, business letters, and maybe even press-releases. This means you have to be prepared before you even start searching for a job. Writing is a way to communicate your thoughts, feelings and opinions. It’s an essential skill in everyday life, as well. Grade school should be the place to lay the basis for such skills. Considering that students come to colleges and universities unprepared, the grade school system should be altered to raise interest in writing and to develop the basic required knowledge for literacy. In the end, students should be encouraged to write rather than criticized. It’s one thing to evaluate grammar and structure, but if students feel like their personal opinions are evaluated, they’ll be hesitant to express them. Unfortunately, this is what grade school education is lacking today – freedom of expression.

Monday, October 21, 2019

Fourth Amendment - the Text, Origins, and Meaning

Fourth Amendment - the Text, Origins, and Meaning The Fourth Amendment to the United States Constitution is a section of the Bill of Rights that protects the people from being subjected to unreasonable searches and seizures of property by law enforcement officers or the federal government. However, the Fourth Amendment does not prohibit all searches and seizures, but only those that are found by a court to be unreasonable under the law. The Fifth Amendment, as part of the original 12 provisions of the Bill of Rights, was submitted to the states by Congress on September 25, 1789, and was ratified on December 15, 1791. The full text of the Fourth Amendment states: The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. Motivated by British Writs of Assistance Originally created to enforced the doctrine that â€Å"each man’s home is his castle,† The Fourth Amendment was written directly in response to British general warrants, called Writs of Assistance, in which the Crown would grant overarching, non-specific search powers to British law enforcement officials. Through Writs of Assistance, officials were free to search virtually any home they liked, at any time they liked, for any reason they liked or for no reason at all. Since some of the founding fathers had been smugglers in England, this was an especially unpopular concept in the colonies. Clearly, the framers of the Bill of Rights considered such colonial-era searches to be â€Å"unreasonable.† What Are ‘Unreasonable’ Searches Today? In deciding whether a particular search is reasonable, the courts attempt to weigh important interests: The extent to which the search intruded on the individuals Fourth Amendment rights and the extent to which the search was motivated by valid government interests, such as public safety. Warrantless Searches Not Always ‘Unreasonable’ Through several rulings, the U.S. Supreme Court has established that the extent to which an individual is protected by the Fourth Amendment depends, in part, on the location of the search or seizure. It is important to note that according to these rulings, there are several circumstances under which police may lawfully conduct â€Å"warrantless searches.† Searches in the Home:  According to Payton v. New York (1980), Searches and seizures conducted inside a home without a warrant are presumed to be unreasonable. However, such â€Å"warrantless searches† may be lawful under certain circumstances, including: If a responsible person gives the police permission to search the property. (Davis v. United States)If the search is conducted during a lawful arrest. (United States v. Robinson)If there is clear and immediate probable cause to conduct the search. (Payton v. New York)If the items being searched for are in plain view of the officers. (Maryland v. Macon) Searches of the Person:  In what is popularly known as its â€Å"stop and frisk† decision in the 1968 case of Terry v. Ohio, the Court ruled that when police officers see â€Å"unusual conduct† leading them to reasonably conclude that criminal activity may be taking place, the officers may briefly stop the suspicious person and make reasonable inquiries aimed at confirming or dispelling their suspicions. Searches in Schools:  Under most circumstances, school officials do not need to get a warrant before searching students, their lockers, backpacks, or other personal property. (New Jersey v. TLO)  Ã‚   Searches of Vehicles:  When police officers have probable cause to believe that a vehicle contains evidence of criminal activity, they may lawfully search any area of the vehicle in which the evidence might be found without a warrant. (Arizona v. Gant) In addition, police officers may lawfully conduct a traffic stop if they have reasonable suspicion that a traffic violation has occurred or that criminal activity is being carried out, for example, vehicles seen fleeing the scene of a crime. (United States v. Arvizu and Berekmer v. McCarty) Limited Power In practical terms, there is no means by which the government can exercise prior restraint on law enforcement officials. If an officer in Jackson, Mississippi wants to conduct a warrantless search without probable cause, the judiciary is not present at the time and cant prevent the search. This meant that the Fourth Amendment had little power or relevance until 1914. The Exclusionary Rule In Weeks v. United States (1914), the Supreme Court established what has been known as the exclusionary rule. The exclusionary rule states that evidence obtained through unconstitutional means is inadmissible in court and cannot be used as part of the prosecutions case. Before Weeks, law enforcement officials could violate the Fourth Amendment without being punished for it, secure the evidence, and use it at trial. The exclusionary rule establishes consequences for violating a suspects Fourth Amendment rights. Warrantless Searches The Supreme Court has held that searches and arrests can be performed without a warrant under some circumstances. Most notably, arrests and searches can be performed if the officer personally witnesses the suspect committing a misdemeanor, or has reasonable cause to believe that the suspect has committed a specific, documented felony. Warrantless Searches by Immigration Enforcement Officers On January 19, 2018, U.S. Border Patrol agents - without producing a warrant to do so - boarded a Greyhound bus outside the Fort Lauderdale, Florida station and arrested an adult female whose temporary visa had expired. Witnesses on the bus alleged that the Border Patrol agents had also asked everyone on board to show proof of U.S. citizenship. In response to inquiries, the Border Patrol’s Miami section headquarters confirmed that under the long-standing federal law, they can do that. Under Section 1357 of Title 8 of the United States Code, detailing the powers of immigration officers and employees, officers of the Border Patrol and Immigration and Customs Enforcement (ICE) can, without a warrant: interrogate any alien or person believed to be an alien as to his right to be or to remain in the United States;arrest any alien who in his presence or view is entering or attempting to enter the United States in violation of any law or regulation made in pursuance of law regulating the admission, exclusion, expulsion, or removal of aliens, or to arrest any alien in the United States, if he has reason to believe that the alien so arrested is in the United States in violation of any such law or regulation and is likely to escape before a warrant can be obtained for his arrest, but the alien arrested shall be taken without unnecessary delay for examination before an officer of the Service having authority to examine aliens as to their right to enter or remain in the United States; andwithin a reasonable distance from any external boundary of the United States, to board and search for aliens any vessel within the territorial waters of the United States and any railway car, aircraft, con veyance, or vehicle, and within a distance of twenty-five miles from any such external boundary to have access to private lands, but not dwellings, for the purpose of patrolling the border to prevent the illegal entry of aliens into the United States. In addition, The Immigration and Nationality Act 287(a)(3) and CFR 287 (a)(3) states that Immigration Officers, without a warrant, may â€Å"within a reasonable distance from any external boundary of the United States...board and search for aliens in any vessel within the territorial waters of the United States and any railcar, aircraft, conveyance, or vehicle.† The Immigration and Nationality Act defines â€Å"Reasonable distance† as 100 miles.   The Right to Privacy Although the implicit privacy rights established in Griswold v. Connecticut (1965) and Roe v. Wade (1973) are most often associated with the Fourteenth Amendment, the Fourth Amendment contains an explicit right of the people to be secure in their persons that is also strongly indicative of a constitutional right to privacy. Updated by Robert Longley

Sunday, October 20, 2019

THings fall apart achebe essays

THings fall apart achebe essays All the cultures in a bigger or smaller grade had always been under the possibility of colonization. Even today where there is a greater control and knowledge about the territories we still see some powerful country trying to colonize other. In the book by Chinua Achebe "Things Fall Apart" we see how the English people in the name of the Queen of England try to colonize small African villages. We been talking about colonization, but what is colonization? We can define colonization as the appropriation of lands that belong to someone else by force, and the introduction of the foreign culture to the one already existing there. In this book what Achebe wants to show us is that is possible to change a whole culture just by introducing a new one. If we analyze the book we see that the African village had its own structure and rules. Everyone in the village respected those rules even the most powerful men in the village. When Okonkwo shoots accidentally the old' s dead man daughter he has to leave the village, even thought he was one of the nine who run that village. There were no excuses, nor corruption, nor a way to escape, if someone did something wrong that someone have to pay no matter whom he was. He tries to show us how the original culture of the village was, how the women were treated and how men were in charge of everything. He shows us that the more you work and the more stronger you were the more important you were. We can see this very clear in the analogy of Okonkwo' s father and Okonkwo. His father hardly worked, he was not a strong man, and therefore he was not respected and owed lots of mone y to everyone in the village. On the other side Okonkwo was a warrior, hardworking man. Everyone in the village respected him and he was one of the wealthiest men also. This kind of culture and social life was very characteristic of African villages in colonization times. Achebe wants to show us how is that a culture can be changed...

Saturday, October 19, 2019

Argument synthesis and analysis Essay Example | Topics and Well Written Essays - 1750 words

Argument synthesis and analysis - Essay Example Makey Makey in a way demystified the computer. The hardware and engineering of a computer used to be intimidating that we thought it requires a high degree of understanding electronics and engineering and Makey Makey showed that it does not necessarily need to be so. One can make his or her pet a mouse or replace the keyboard with a banana. This innovation can in fact enable anyone to make his or her own customize computer depending on the application of their preference. If people chose to, they can now make a piano with bananas or stairs as their keyboard. This invention is already proven in the market and its application is clearly illustrated in the clip. Its claim to replace computer’s input devices such as keyboard and mouse can be done through the use of Arduino although Makey Makey can run through it without understanding what Arduino is. The technology behind Makey Makey is through a â€Å"printed circuit board with an  ATMega32u4 microcontroller running Arduino Leonardo bootloader. It uses the Human Interface Device (HID) protocol to communicate with your computer, and it can send keypresses, mouse clicks, and mouse movements† (Silver). This explains why a banana or a stairs can be used as a keyboard or piano because it replaces the keyboard and mouse with any object through the Human Interface Device (HID) protocol to communicate with your computer. It is done through the alligator pin where the object suddenly becomes a Human Interface Device. The technology behind also to make it responsive to human skin including animals, leaves, it used With regard to the use high resistance switching   with a â€Å"pull-up resistor of 10-50 mega ohms. This technique attracts noise on the input, so we use a moving window averager to lowpass the noise in software, saving money on hardware filtering. There are six inputs on the front of the board, which can be

Friday, October 18, 2019

Culture and Technology-Sheila Coursework Example | Topics and Well Written Essays - 2250 words

Culture and Technology-Sheila - Coursework Example The distributed teams are also affected by these two in different ways. This paper is going to discuss the influence of technology and culture on the performance of organizations. A general definition of culture is that it is a shared platform of characteristics, beliefs and interactions. What this definition implies is all members of a particular culture have same behaviors, beliefs and way of socializing with others. The people forming a particular culture can be those operating in the same working environment, or those that are from the same geographical region. Workers of an organization usually have a culture that guides their operation in the firm. Therefore, they became members of this organization’s culture. Since they are operating in the same culture, these workers have similar traits and ways of operation that are connected to the organizational culture (Daim, 2012). The culture in which a team or organization carries out its activities would always influence the performance of this team or firm. There are various ways through which the team performance can be affected by culture. Even though most of the effects are positive, some of them are negative effects. One way in which culture influences the performance of a team is by creating a specific code of conduct that would regulate the operations of team members or employees in an organization. The restriction on what people can do in the firm is very important when it comes to maintaining relevance among team members as they work. If members are always participating in relevant activities within the group, the performance of the team is expected to go up (Wai On, 2013). A good organizational culture is also responsible for teamwork and collaboration among team members and stuff in a business firm. A good culture will always advocate for members to work together towards achieving the goals of the team. Teamwork is one factor that contributes so much to the performance of the

Paul Samuelson, Abba Lerner and John Kenneth Galbraith in relation to Assignment

Paul Samuelson, Abba Lerner and John Kenneth Galbraith in relation to the idea of human flourishing - Assignment Example In one of his principles he stated that a government should maintain a reasonable level of demand at all times (Samuelson & Puttaswamaiah, 2002). In this consideration, he also added that in case of too little spending in the society; the government should reduce taxes or increase its own spending to correct the situation that also leads to unemployment. The other principle stated that by borrowing money when there is need to raise the interest rate and through lending money when there is need to reduce the rate of interest, the administration should be able to uphold the rate of interest that encourages the best amount of investment (Samuelson & Puttaswamaiah, 2002). All the two finance principles were summarized in his principles with the limiting the national debt principle so that all the needs of the people in the society are taken into consideration. John Kenneth Galbraith also had principles that argued and was based on understanding the trouble that exist currently within economics and economic policies. The works that were created by him were partly rooted to Marshall’s theory of the firm most of his principles were followed after the post war economy was dominated by bureaucratic corporations with more demand of consumers and also financiers. The principles he developed believed on expenditure as a factor that would be used to satisfy the needs of the consumer. The policies that are developed by the government are those focusing on consumer satisfaction.

Thursday, October 17, 2019

GE Essay Example | Topics and Well Written Essays - 1000 words

GE - Essay Example Diversification and market penetration are two strategies that have always played an important role in bringing growth in the business activities of an organization. Same is the case with General Electrics. By entering new markets and providing services designed around strategic problems faced by communities and market sectors, GE has expanded both effectively and efficiently. For any organization capturing emerging markets that have growing economies is an important business decision, which when taken at the right time, usually results in major benefits for organization. In 2003, Goldman Sachs economist, Jim O’Neill highlighted the growth in the economies of the four countries, namely, Brazil, Russia, India and China and predicted that the rapidly progressing economies of these countries will make them the world leaders by 2050. His report helped investing organizations, researchers and academics put more focus on these four countries in the future and shed light on the prospective prosperity that lay in investing in these rapidly growing countries. Currently, General electric is doing business in all four of the BRIC countries, but plans to increase its market share in these countries. The predictions that O’Neill made are dependent on a number of external issues that may eventually decide whether all of these four countries will make the progress that is thought that they will make or not. Similiarly, GE’s investment decisions in these countries will also be based upon the various risks and benefits that are associated with each country. China, being the third largest country in the world area wise and having the largest population on earth is slated to overtake all the G7 countries including America and become the world’s biggest economy by the year 2045. Experts have argued that the real ‘muscle’ in the BRIC name is due to China. With the economic and financial growth that china has experienced in the past decades, its increased

Difference between Leaders and Managers Assignment - 13

Difference between Leaders and Managers - Assignment Example Following these theories in leadership, leaders should depict voluntary action; this is the difference between leaders and managers. Leaders in the article are acting like managers, whose role is to control the employees. They fail in their roles as they are supposed to listen to their needs and look for a way forward to create an admirable working environment. The success of leaders has a different interpretation, as it is governed by many variables; this includes the leadership styles, aspects of the situation, and quality of followers (Bertocci 22). This means that they have to create a basis to enhance their relationship with employees. Â  In the recent business world, there is a need for an integrated education system, which will produce effective people in the job market. This is the main objective Ohio States studies. Through this kind of initiatives, business leaders in China will be in a position to relate professionally with both customers and employees, which is the most prominent object in any organization. With this, industries will eliminate strikes enhance increase their productivity (Bertocci 45).

Wednesday, October 16, 2019

GE Essay Example | Topics and Well Written Essays - 1000 words

GE - Essay Example Diversification and market penetration are two strategies that have always played an important role in bringing growth in the business activities of an organization. Same is the case with General Electrics. By entering new markets and providing services designed around strategic problems faced by communities and market sectors, GE has expanded both effectively and efficiently. For any organization capturing emerging markets that have growing economies is an important business decision, which when taken at the right time, usually results in major benefits for organization. In 2003, Goldman Sachs economist, Jim O’Neill highlighted the growth in the economies of the four countries, namely, Brazil, Russia, India and China and predicted that the rapidly progressing economies of these countries will make them the world leaders by 2050. His report helped investing organizations, researchers and academics put more focus on these four countries in the future and shed light on the prospective prosperity that lay in investing in these rapidly growing countries. Currently, General electric is doing business in all four of the BRIC countries, but plans to increase its market share in these countries. The predictions that O’Neill made are dependent on a number of external issues that may eventually decide whether all of these four countries will make the progress that is thought that they will make or not. Similiarly, GE’s investment decisions in these countries will also be based upon the various risks and benefits that are associated with each country. China, being the third largest country in the world area wise and having the largest population on earth is slated to overtake all the G7 countries including America and become the world’s biggest economy by the year 2045. Experts have argued that the real ‘muscle’ in the BRIC name is due to China. With the economic and financial growth that china has experienced in the past decades, its increased

Tuesday, October 15, 2019

Can freedom be measured Essay Example | Topics and Well Written Essays - 2000 words

Can freedom be measured - Essay Example Can freedom be measured? In some fashion, it would appear so, as many organisations and institutions attempt to quantify freedom utilising various matrices founded on specific criteria which is intended to define freedom. However, the operational definition of what legitimately constitutes freedom, in a fashion that would satisfy the majority, has yet to be developed which makes freedom measurement difficult to justify using existing criteria in various quantitative or qualitative measurement instruments. Hanke and Walters (1997) sees freedom as being invariably linked with political factors, such as the presence of democratic systems within a state and individual wealth. With this in mind, in democratic structures, many nation states attempt to create capitalistic systems, an economic and social system where various economic assets are owned and managed by private individuals, where capital gains are allocated to private ownership, and where pricing is determined by private business with very limited regulation of these capital assets by dominating or oppressive political actors (Degen 2008). If we are to view freedom from an economic perspective, then freedom can most assuredly be measured statistically. An individual attempting to measure freedom could potentially examine the distribution of wealth within a nation and determine whether the majority of wealth is held within elite ruling regimes with considerable power and authority or whether these assets are controlled by the majo rity of a citizenry. Utilising graphic representations, it would illustrate whether this economy being evaluated maintains significant capitalistic tendencies, as compared to other nations where assets are controlled by government, to determine whether this society is freer than another. Of course, such a statistical measurement would be dependent on wealth as a

Example of a Research Plan Essay Example for Free

Example of a Research Plan Essay Statement of the Problem The aim of the study is to identify the effect of different pH level of the Agar plate to the antibacterial activity of Santol (Sandoricum koet jape). Specifically, the study will seek for the answer of the question: 1.) Is there any difference on the No.of colonies after applying Santol (Sandoricum koet jape) extract on the Agar plate with pH level greater than seven (base)? 2.) Is there any difference on the No.of colonies after applying Santol (Sandoricum koet jape) extract on the Agar plate with pH level less than seven (acid)? Hypothesis 1.) There is no difference on the No.of colonies after applying Santol (Sandoricum koet jape) extract on the Agar plate with pH level greater than seven (base). 2.) There is difference on the No.of colonies after applying Santol (Sandoricum koet jape) extract on the Agar plate with pH level less than seven (acid). Research Methodology Materials and Equipment The study will make use of: Agar Plates, specifically Nutrient Agar, for different tests and as a controlled variable for the problem, Nutrient Broth, same purpose as the nutrient agar, Santol (Sandoricum koet jape) extract, Escherichia coli, for the gram positive, Bacillus , for gram negative, and Candida________ a test subject for the study. Also, the study will make use of litmus paper for measuring and maintining the pH level of the Agar plates. The study will also make use of spectrophotometry. Research Design The study will use Complete Randomized Design as a Research Design. Â  Control Group Design is two parallel experiments are set up, identical in all respects except that only one includes the treatment being explored by the experiment. The control group may have no treatment, with nothing happening to them, or they may have a neutral treatment. Statistical Tool The study will make use of ANOVA as its statistical tool. T-test can be use to compare two dependent samples/matched-pairs design experiments. The study will make use of two types of pH: Acidic and Basic. Each Agar Plate will be assign to one specific pH level. Inoculate the microbes in the Agar and in the broth. This can be done by streaking the loop containing the gram positive, gram negative, and the fungi . Data Gathering Procedure Prepare the Agar plate and the broth for the experimentation. The pH of the Agar and the broth must also be set. Place the agar filled petri dishes and the broth that have been inoculated in a dark, warm (86 F) place for a week for incubation. Apply the extract of Santol (Sandoricum koet jape) to each Agar plate and Nutrient Broth. Using the Colony Formation Unit (CFU), determine the number of colony inhibited. Record the data from the Agar plates and the Nutrient broth. Figure 3.1 Experimental Procedures Figure 3.1 Experimental Procedures shows the step by step procedure of the experiment. Starting from the preparation of the Agar plate with their assign pH level. The Agar plate will solidify at 32Â ºC- 40Â ºC but will melt at approximately 85Â ºC. Next is to inoculate the bacteria by streaking the loop containing the bacteria. After inoculating the bacteria, the agar plate must be incubated for one week. After the incubation of the agar plates, apply the Santol (Sandoricum koet jape) extract to the each agar plate. Each plate must receive equal amount of the extract. Using the Colony Formation Unit (CFU), determine the number of inhibited colony/ies and record the data. Data Classification pH Level of the Agar Plate| Number of Colonies| | Trial 1Mean of Three Repetitions| Trial 2Mean of Three Repetitions| Trial 3Mean of Three Repetitions| pH 5| | | | pH 6| | | | pH 7| | | | pH 8| | | | pH 9| | | | Figure 3.2 Interactions in Acidic, Basic, and Neutral Agar Plate Figure 3.2 shows the effect of pH levels less than seven (Acid) on the no. of colonies. pH Level of the Nutrient Broth| Number of Colonies| | Trial 1Mean of Three Repetitions| Trial 2Mean of Three Repetitions| Trial 3Mean of Three Repetitions| pH 1| | | | pH 2| | | | pH 3| | | | pH 4| | | | Figure 3.3 Interactions in Acidic Nutrient Broth Shows the effect of pH levels lower than seven (Acid) on the no. of colonies. pH Level of the Nutrient Broth| Number of Colonies| | Trial 1Mean of Three Repetitions| Trial 2Mean of Three Repetitions| Trial 3Mean of Three Repetitions| pH10| | | | pH11| | | | pH12| | | | pH13| | | | pH14| | | | Figure 3.4. Interactions in Basic Nutrient Broth Shows the effects of pH levels greater than seven (Basic) on the no. of colonies Bibliography * Anke, T. Weber, D. (2009). Physiology and Genetics: Selected Basic and Applied Aspects, Volume 15. Springer-Verlag: Heidelberg, Germany * Chapelle, F. (2001). Ground-water Microbiology and Geochemistry (2nd ed.). John Wiley Sons, Inc.: Canada. * Kubitzki, K. (2011). Flowering Plants. Eudicots: Sapindales, Cucurbitals, Myrtaceae. Springer-Verlag: Heidelberg, Germany. * Shahidi, F. Ho, C. T. (2000). Phytochemicals and Phytopharmaceuticals. AOCS Press: USA. * Storz, G. Aronis, R.H. (2000). Bacteria Stress Responses. ASM Press: USA. * Agars. Difco BBL Manual. http://www.bd.com/ds/technicalCenter/inserts/Agars.pdf, accessed January 17, 2008. * Agar Bottles Preparation Equipment Use. Science Stuff, Inc. http://www.sciencestuff.com/playground/agar_bottle.shtml, accessed January 14, 2005. Mott, et al. * Agar Bottles Preparation Equipment Use. Science Stuff, Inc. http://www.sciencestuff.com/playground/agar_bottle.shtml, accessed January 14, 2005. * Artificial Environments for Growi ng Bacteria. WW Bio Institute. http://www.woodrow.org, (www.woodrow.org/teachers/esi/2002/Biology/Projects/lab_skills/ls5/), accessed January 14, 2005. * Microbiology. MadSci Network. http://www.madsci.org/posts/archives/mar98/888937612.Mi.r.html, accessed January 25, 2005.

Monday, October 14, 2019

Mental health and health needs of asylum seekers and refugees

Mental health and health needs of asylum seekers and refugees INTRODUCTION 1.1 Background Asylum seekers and refuges is a growing problem affecting many European countries as well as the UK. In the recent years the number of asylum seekers and refugees entering UK has increased, attracting the attention of the media, politicians as well as ordinary people. It is a controversial subject leading to intense debate and discussions and unsurprisingly to different views and perspectives. The increase in the numbers seeking asylum has led to governments and the international agencies grappling with the problems of providing adequate humanitarian assistance in the third world and avoiding floods of asylum seekers arriving at their doorstep (Timothy et al 2009). This has also led to changes in asylum policies with the governments responding to the rising problem with a range of measures aimed at deterring asylum applications. Mental illness is one of the leading causes of illness around the world and estimated to affect up to a third of the British population. It is especially common amongst asylum seekers and refugees, which may be due to them having experienced loss, bereavement, torture, rape etc. Their mental health can then be exacerbated due to displacement and their situation in the UK. There is a lot of stigma attached to mental illness, and the mentally ill still face discrimination in many ways, which results in many not seeking treatment. The exact cause of mental illness is a subject doctors still argue about. Society has been known to play a key role, but recently there has been a growing concentration on the role of genes. 1.2 Who are Asylum-seekers? An asylum seeker is someone who has fled their country to find a safe place elsewhere. Under the 1951 Convention on Refugees, an asylum applicant must be able to demonstrate a well-founded fear of persecution in their country of origin for reasons of political opinion, religion, ethnicity, race/nationality, or membership of a particular social group (Burnett 2002). They must also be able to show that they are unable to obtain any protection or help from their own national authorities (Burnett 2002). The Refugee or Person in Need of International Protection (Qualification) Regulations 2006 updates parts of the convention. Asylum applications in the UK are sent to the Home Office. Over the last ten years there have been several pieces of legislation introduced which has created an ever changing climate of policy on refugees and asylum seekers. This is a result of the significant numbers of rejected asylum seekers who have had all means of support withdrawn from them and are now destitute in the UK. Asylum seekers represent a vulnerable population due to a host of pre- and post-migration risk factors. Pre-migration factors include torture and refugee trauma, which may result in mental and physical illness. Moreover, asylum seekers often come from conflict areas, without access to adequate health services. Post-migration factors also play a role for health. They include detention, length of asylum procedure, language barriers, and lack of knowledge about the new health care system. Destitute asylum seekers are those people who are unable to access support for their basic needs from the government or from their own resources. The position of rejected asylum seekers is appalling, with many unable to return to their country of origin for reasons beyond their control and yet they are not allowed to work and support themselves (Dumper et al 2009). Below is a table showing the various definitions of refugee status: Asylum seeker Someone who has submitted an application for protection under the Geneva Convention and is waiting for their claim to be decided by the Home Office. Refugee status Someone whos claim has been accepted and has been granted Indefinite Leave to Remain, and is also eligible for family reunion. Exceptional Leave to or Remain (ELE/ELR) The Home Office accepts that there are strong reasons that the person should not return to their country of origin. ELR is discretionary and for varying periods depending on the age of the applicant and other circumstances Refusal Someone whos application for refugee status has been rejected. 1.3 Reasons for seeking Asylum The causes of refugees and asylum flows are many from the effects of conflict and wars, political upheaval, to economic problems and search for a better life. These displaced people face many problems such as oppression, poverty and disease. Some of them have been held captive and tortured in their own countries; some have been prosecuted because of their political or religious beliefs and some because they belong to a minority ethnic group. 1.4 UK Asylum Policy Services offered to refugees and asylum-seekers in the United Kingdom are largely determined by national legislation that in turn informs policy and practice. The introduction of the National Asylum Support Service (NASS) at the end of the 1990s was accompanied by several Acts of Parliament that have been added to by further legislation, the most recent being the Asylum and Immigration Act 2004. While historically UK has a long tradition of providing refuge to people fleeing from prosecution, the Government has recently sought to affect the behaviour of asylum-seekers through legislation intended to discourage asylum-seekers from coming to the UK. For example the support withdrawn from asylum-seekers who have exhausted their claim is designed ultimately to either persuade people to return to their country or make it easier for the Home Office to remove them. In the same way, provision of support to asylum-seekers is often conditional on their agreeing to be dispersed to different parts of the country (Johnson 2003). 1.5 Statistics of asylum seekers in the UK The main source of data on the UK asylum process and flows of individuals through it is the Home Office RDS units. Throughout the asylum process, administrative data is entered into a number of computerised databases, which are supported by a small number of manual systems. The Case Information Database (CID) records information on applications, decisions, appeals, removals (including voluntary assisted returns), persons held in detention and persons leaving detention. The Asylum Seekers Support System Database (ASYS) records details of asylum seekers applying and receiving support (ICAR 2009). The UK received 25,930 applications for asylum in 2008, compared to 23,430 in 2007 making it an increase of 11%. The highest level of asylum applications, in the last decade, was in 2002, with levels falling significantly after that. It was not until 2008 when the number of applicants started increasing once again. The chart below shows the number of applicants received in the UK between 2000 -2008. The chart was taken from the Information Centre about Asylum Seekers and Refugees (ICAR) Statistics paper. Figure 1: Applications for asylum in the UK excluding dependents 2000-08 (ICAR 2009). The main countries of origin of asylum applicants in 2008 were Afghanistan (14%), Zimbabwe (12%), Iran (9%), Eritrea (9%), Iraq (7%) Sri Lanka (6%), China, (5%), Somalia (5%), Pakistan (5%) and Nigeria (3%) (ICAR 2009). The majority of people seeking asylum in UK are single men under the age of 40 who come from countries in conflict (Burnett et al 2001). Figure 2: Showing age and gender breakdown of UK asylum seekers (Refugee Council 2009) The above diagram shows the break down of the gender of principle applicants to the UK. Males under 35 are the majority, whilst females seeking asylum are only a ration of twenty percent. 1.6 Rational for the study Asylum seekers and refugees have been the subject of media as well as political attention for many years. However, they receive bad publicity and majority of the time are stigmatised. They are perceived to come to the UK to take advantage of the welfare system and to receive host of benefits and entitlements. However, this could not be more wrong as asylum seekers and refugees flee their country not because of choice but due to circumstances and a search for sanctuary and help. They are not allowed to claim benefits and are forced to live 30% below the poverty line (Kirklees Council 2007). Furthermore, most of the asylum seekers come from well off backgrounds; and it is only the rich and well off that are able to make the long journey, and hold skilled jobs in their native countries (FPH 2008). Asylum seekers and refugees are most vulnerable groups of people at risk of developing mental problems (FPH 2008). Although there is awareness that asylum seekers and refugees are more likely to experience psychological problems factors such as asylum and immigration policies as well as social and economic exclusion and racism all exacerbate their mental condition. Having experienced all kinds of atrocities from torture, rape, imprisonment, witnessing killings, loss etc., they are faced with further problems once arriving in the UK and their mental state further deteriorates. Although refugees and asylum seekers physical health needs are usually no greater than the host populations this is not the case in relation to mental illness. There are many gaps in our knowledge about the extent of mental health issues affecting asylum seekers and what should be done in addressing these concerns. There is hardly any scholarly literature available on this topic and the general population need to be more aware of the issues and challenges faced by asylum seekers, and what effect it has on their mental health. 1.7 Aims Chapter two 2.1 Method A review was carried out of studies investigating the mental health of asylum seekers. The results and findings of carefully selected and reliable studies, searched systematically from databases and published sources were summarised. Other sources included NHS, Home Office, charity organisations, books, newspapers and magazines, and finally a general internet search was conducted. The following electronic databases were used CINHAL, Medline, BMJ, Cochrane, Pubmed, Academic search complete, and psycho info. The task of reviewing was done very methodically, with step to step plan being implemented, which involved: * the way existing studies are found * how the relevant studies are judged in terms of their usefulness in answering the question. The following search was performed, searching the title, abstract and any subject heading fields in each database, for example asylum seekers, mental health, health effects of detention. Studies published in journals were selected that involved asylum seekers and mental health, irrespective of whether the research question was addressed directly. Abstracts were screened against set criteria, and if they met the criteria full copies were obtained and looked at and relevant information extracted. Cited references were also looked at. Chapter three Results and Analysis 3.1 Health needs of Asylum-seekers The basic health needs of refugees and asylum seekers are generally similar to those of the host population, although due to poor and lack of healthcare they may have many conditions untreated. Figure 3: Most common health issues affecting asylum seekers. (Wilson 2002). The above graph, taken from a report done by Northern and Yorkshire public health observatory (Wilson 2002) shows the most frequent health issues encountered by asylum seekers. The general/minor health issues includes coughs, colds, flu, viral infections etc. Mental health issues are the most common and include anything from depression, anxiety, stress, loneliness, to torture related psychological problems, post traumatic stress etc. (Wilson 2002). People seeking asylum come from different countries and cultures, and have had range of different experiences affecting their health and nutritional state. Once in the UK they face further problems affecting their health such as the effects of poverty, dependence and lack of cohesive social support. On top of this they face racial discrimination which can result in inequalities in health and also have an impact on opportunities in and quality of life. Their experiences also shape their acceptance and expectations of health care in the UK (Burnett et al 2001). Those from countries with not so well developed health care system may expect hospital referral for conditions that in the UK are treated in primary care. This can result in refugees and asylum seekers feeling disappointed and health workers feeling irritated and overwhelmed by the many and varying needs of asylum seekers (Burnett at al 2001). Most refugees experience difficulties in expressing health needs and in accessing health care. Poverty and social exclusion have a negative impact on health. Initially refugees and asylum seekers will need help to make contact with health and social support agencies. Professional interpreters are also essential, as they help to overcome both bi-lingual and inter-cultural communication and as a result able to understand the specific health needs of asylum seekers (Bhatia et al 2007). Although the health needs of asylum seekers and refugees should be a priority, the availability and capacity of healthcare services should also be considered. There is a general feeling amongst healthcare providers that the decision about where to disperse asylum seekers are based purely on the availability of accommodation and factors such as the capacity of healthcare services are not taken into account (Johnson 2003). However, healthcare providers agree that the presence of asylum seekers highlights existing weaknesses in healthcare provision and does not necessarily create new problems (Johnson 2003). Due to the complex and confusing legal status of asylum seekers, the majority of healthcare providers are unsure how asylum status relates to healthcare entitlements. NHS staff are usually ignorant about the rights and entitlements of immigrants, and are also not adequately trained (Johnson 2003). 3.2 Mental Health and its causes Mental Health is defined as a state of well-being in which every individual realizes his or her own potential, can cope with the normal stresses of life, can work productively and fruitfully, and is able to make a contribution to her or his community (WHO 2010). Mental Illness is defined as any disease of the mind; the psychological state of someone who has emotional or behavioural problems serious enough to require psychiatric intervention (Save the Children 2010). The very nature of seeking asylum or human rights protection in the UK means that a person has suffered in some way in their country of origin and is looking for protection and safety in the UK. Nearly all those seeking asylum have experienced some form of atrocities that mental health issues are almost always intrinsically bound with their personal circumstances and nature of their claim (Burnett et al 2001). However, due to the stigmas and taboos associated with anyone suffering from any problems of the mind most people do not mention their mental suffering (Save the Children 2010). Most see mental illness as an enduring problem from which there is no recovery. It is therefore evident that those dealing with asylum seekers must address mental health issues with each applicant, making it clear to them that there is support and treatment available to them. It is crucial that asylum seekers feel safe and supported in order for them to reveal details not only crucial to their claim but also crucial to letting the person assisting them identify and provide assistance for the persons particular need (Save the Children 2010). Majority of the asylum seekers will show signs and symptoms of psychological distress, but this does not necessarily mean that they are suffering from mental illness. Asylum seekers may show symptoms of depression and anxiety, panic attacks, poor sleeping patterns, nervousness and anxiousness (Burnett 2002). They may also develop behaviours to avoid stimuli that reminds them of past experiences, with some also experiencing memory and concentration problems (Burnett 2002). Such symptoms are often reactions to their past experiences and current situations. Many of them will have been forced to leave their family behind or may even not know the whereabouts of their family. Their state of mental health may worsen due to social isolation, poverty, hostility and racism, which all have a negative impact on their health (Burnett et al 2002). Arrival, detention and uncertainty, practical issues, e.g. housing, lack of employment, living in a climate of prejudice, family dislocation and reunion, domestic violence and living in the shadow of deportation are all reasons identified that contribute to the poor mental state of asylum seekers and refuges (Burnett 2002). Majority of the asylum seekers have suffered some sort of prosecution and harassment in their country of origin, enduring torture, rape or bereavement. They have also experienced the stress of flight and exile. Psychological morbidity has been extensively documented among refugee populations (Burnett et al 2002). The experience of detention compounds the misery of refugees. Captivity is stressful in any context, but is particularly debilitating when it occurs over an indeterminate period and to people who have had previously traumatic experiences of detention (Burnett 2002). Some asylum seekers show signs of anxiety, depression, guilt and shame as a result of the atrocities they may have suffered. Such symptoms are common responses to grief and distress and should not be viewed as psychiatric illness. Common experiences in asylum seekers and refugees after trauma include poor sleeping patterns, distressing dreams, headaches, palpitations, sweating, loss of concentration, jumpiness, low mood and frequent crying, irritability etc. Symptoms such as consistent failure to carry out daily tasks, frequent expressed suicidal thoughts and ideas, social withdrawal and self-neglect, and behaviour that is abnormal or strange are symptoms that may require specialist help (Burnett 2002). 3.3 Mental health of dispersed asylum seekers One of the major initiatives introduced by the Asylum and Immigration Act 1999 is the dispersal of asylum seekers requiring provision of long-term accommodation form London and the South-East to other parts of the UK (Cornelius 2007). This is due to the fact that long term accommodation is more readily available and cheaper and also to lessen pressure on services and resentment by local communities. However, it is believed that dispersal of asylum seekers is associated with higher rates of psychiatric disorder (Heptinstall et al 2004). Other issues such as loss of newly established support networks, racially motivated crime against dispersed asylum seekers are also common (Heptinstall et al 2004). Although most asylum seekers cope quite well with dispersal, there are those however that become distressed and show signs of dispersal-related mental disorder (Cornelius 2007). Supporting such individuals can be challenging for most mental health clinicians. Asylum seekers referred because of dispersal-related mental disorder can be divided into two broad categories: mild to moderate psychiatric disorder and severe psychiatric disorder (Cornelius 2007). The majority of affected individuals are likely to experience mild to moderately severe psychiatric disorder with no major risk concerns, whereas a small proportion of individuals may have severe psychiatric disorder such as psychosis or a severe depressive episode associated with risk of harm to self or others (Cornelius 2007). The differing severity, complexity and risk profile of these two groups suggest that mental health strategies for support are likely to be different (Cornelius 2007). Clinicians should undertake a detailed assessment of the needs and risk profiles of asylum seekers, with the aide of interpreters with knowledge of mental health issues. If the outcome of the assessment shows the individual to have forms of mild to moderate severe psychiatric disorder with no major risks then the mental health support should be focused on helping the individual accept and adjust to dispersal (Cornelius 2007). However, individuals may show signs of being acutely psychotic and severely disturbed with risk of harming themselves and others and such individuals should not be dispersed. There is evidence to suggest that abrupt cessation of psychiatric treatment can result in serious deterioration of the individuals mental health and compromise long-term recovery (Cornelius 2007). 3.4 Children and Adolescents Although the majority of asylum seekers and refugees are adults, there are however many children who arrive in the UK seeking refuge. While some arrive with family, there are those that arrive alone as unaccompanied asylum-seeking children. These children are likely, at an emotional level to have experienced some sort of terror, grief, shame, guilt etc. (Burnett 2002). They may have experienced imprisonment, beatings, rape, they may have witnessed others subjected to violence, or been subjected to torture due to their political or religious belief of their parents, their colour of skin, and may have lost or been separated from their family. All these experiences and events have different impacts on children. Refugee Children and asylum-seekers are more likely to develop psychological problems due to their experiences (Mind 2009). These children may experience both physical and psychological symptoms that trouble them such as sleep disturbances, feeling of loneliness, isolation, difficulty in learning and a general feeling of unhappiness and anger. They may experience anxiety, aggression, nightmares, poor concentration, withdrawal, and behaviour such as bed-wetting (Burnett 2002). Although unaccompanied children are most likely to suffer from mental health problems, children with families present may also suffer from mental health problems as a result of finding themselves feeling unsupported and having to fend for themselves due to absent parents as a result of work or other problems. Furthermore, parents dealing with their own emotional problems are unlikely to care for their children properly, which can result in psychological and physical problems (McCormack et al 2005). 3.5 Health implications of detained asylum seekers Health professionals world wide are concerned about the potential detrimental effects detention has on the mental health of the detainees (Procter 2005). An experiment carried out by Sultan and OSullivan in which they observed participants inside an immigration centre found that 32 of 33 detainees displayed symptoms of major depressive illness (Procter 2005). The majority also showed deterioration in their mental state as the length of detention increased. Detained children also showed signs and symptoms of mental distress, which included anxiety, disruptive conduct, nocturnal enuresis, sleep disturbances, nightmares, sleepwalking as well as cognitive development (Procter 2005). Once released the detainees mental illness is likely to deteriorate and it is known that adult asylum seekers who have been in immigration detention display a threefold increase in mental illness subsequent to their release (Procter 2005). Trauma, upsetting memories about detention, feeling of hopelessness and sadness are the common symptoms experienced by those detained. These symptoms were also present among detainees in an investigation carried out by Dudley (2003), who also found rioting, violence, and hunger strikes common inside immigration detention facilities with 264 incidents of self-harm reported over an 8-month period among detainees (Procter 2005). Once the detainees are released from immigration detention, they face new challenges and stresses in the context of existing mental health problems (Procter 2005). In another study carried out by Thompson and colleagues found that Tamil asylum seekers detained during 1997 and 1998 found the detainees experiencing high levels of depression, post-traumatic stress, anxiety, panic and physical symptoms compared to those asylum seekers living in the community (Steel et al 2004). This study found detention to be injurious to the mental health of asylum seekers with mental health deteriorating with increased length of detention. The study also indicated that adults and children are regularly distressed by memories of detention and feeling of immense sadness and hopelessness about being in detention. Parents of children also felt they were unable to care for or support and control their childrens behaviour (Steel et al 2004). Hundreds of children are detained in immigration centres every year in the UK because their families face deportation. Medical experts say this can have harmful health implications on the children. The Royal Colleges of Paediatrics, GPs and Psychiatrists say other countries have found alternatives to detention and want the British government to take a different approach to stop the physical and psychological damage suffered by children (Wilson 2009). These children are among the most vulnerable and detention causes unnecessary harm to their mental and physical health. The average stay of children at Yarls Wood, the UKs largest immigration removal centre, is fifteen days but a third are detained for more than a month. Detaining children for any length of time is a frightening experience that can have lifelong consequences (Wilson 2009). As well as the potential psychological impact, these children invariably experience poor physical health as they cannot access immunisation and preventative services (Wilson 2009). 3.6 Previous research/studies on health of asylum seekers Knowledge about asylum seekers health and access to health care services is still limited. Literature on asylum seekers health mainly concerns mental health problems and infectious diseases. Burnett Peel reviewed the literature and found that one in six asylum seekers had severe physical problems and two-thirds had experienced mental problems. Prevalent physical problems included tuberculosis, HIV/AIDS, hepatitis A and B, parasitic diseases, and non-specific body pains (Burnett et al 2001). Mental health problems include depression and Post Traumatic Stress Disorder, which are due to traumatic experiences, including torture. Asylum seekers are at the risk of having many and severe health problems of a varied nature. Literature on asylum seekers use of health care services and the barriers they face when seeking care is hard to find. Asylum seekers, however, find themselves in a difficult situation as they are residing in a country, sometimes for years while waiting for a decision in their case, without necessarily having the same legal rights as citizens. They may face limitations on access to health care compared with the citizens. This combined with the asylum seekers already vulnerable health and with possible restrictions on access to care may result in their health deteriorating (Burnett et al 2001). Studies carried out in the UK have found that one in six refugees has a physical health problem severe enough to affect their life with two thirds having experienced anxiety or depression. Medical screening of newly arrived asylum seekers exist in the majority of the EU countries as well as the UK. However differences exist in the way medical screening is carried out. In the UK medical screening is only carried out in the so-called induction or reception centres. Newly arrived asylum seekers who do not enter these centres access medical screening randomly. Medical screening may be available for asylum seekers living outside the centres, but using it depends on individual initiative and there might be a number of barriers. Medical screening programmes also differ in their content from one EU country to another. For example, TB screening was included in the screening programmes of all countries but one, whereas screening for mental health problems was carried out in less than half the countries (Norredam et al 2005). Overall, medical screening programmes appear to have two aims. One is to secure the well being of asylum seekers, and the other to guarantee the safety of the population in the host country. The content of the screening programmes is likely to depend on how the country priorities these aims. For example, screening for infectious diseases seems more related to the safety of the host population and mental health screening more to the well being of asylum seekers (Norredam et al 2005). Regarding access to health care, the study shows that access was restricted to only emergency care at the time of arrival in 10 countries (Norredam et al 2005). The results, however, do not show, if some countries offered alternative measures in case of chronic illness. The study also found that asylum seekers faced a number of practical barriers when seeking health care. Most of the barriers were concerned with immigrant populations in general, and are related to language, culture, and lack of information about the health care system in the host country. However, practical barriers specific for asylum seekers were also identified. The most severe of which include waiting for months or years on paperwork that will ensure access to health care, while only having access to emergency care in the meantime. The literature also shows that asylum seekers access to health care may be compounded by other barriers, such as confinement in detention centres, and dispersal policies leading to dis ruptive and compromised care (Norredam et al 2005). The study also shows how legal access to health care services have changed over time for asylum seekers in three countries. Asylum seekers rights to health care are immediately restricted to emergency care if their application is refused (Norredam et al 2005). Failed asylum seekers may also be stripped of the other rights in an attempt to force them out of the host country. Failed asylum seekers include persons who cannot return because their countries are deemed unsafe by UNHCR. UK is one of the countries using increasingly restrictive measures towards failed asylum seekers. Failed asylum seekers used to have free access to NHS, but since 2004 they cannot obtain free secondary health care (Norredam et al 2005). In another study in which the impact of detention on asylum seekers was examined, found that detainees are rendered hopeless and powerless in detention (Pourgourides 1997). The unknown duration and reasons for detention mean they are unable to make sense of their predicament and deal with it in a meaningful way. The unpredictable outcome of detention, in particular the fear of deportation is a constant cause of stress. Detention denies asylum seekers the resources to cope with adversity, blocks adaptation to the host society and impairs psychological healing (Pourgourides 1997). Depression, anxiety, demotivation and despondency are all responses to detention as well as misery and suffering (Pourgourides 1997). The study highlighted high levels of stress and distress amongst detainees. The detainees appear to be able to cope for the first month or two in detention but then after that they become increasingly frustrated, demotivated and apathetic. They start showing signs of psychological symptoms such as sleep and appetite disturbances, symptoms of post-traumatic stress, psychosomatic symptoms etc