Wednesday, October 30, 2019

The theme of the short story Young Goodman Brown by Nathaniel Essay

The theme of the short story Young Goodman Brown by Nathaniel Hawthorne - Essay Example Usually, this kind of negative response did have a deadly result on the disrespected woman. It has been noted that the stories that were penned down before 1842 had a female character that was destroyed only by accident and not by intention alone. The story has shown the transformation of a man from his normal state to that of an abnormal one where he abandoned meeting with anyone and then in the end coming back to his life and restoring normal relationships with all that were important to him and more than that, his wife. A number of authors have made note of the fact that Browns departure from faith and reliance was not an act on purpose since Brown actually planned on returning to her after the forest trip. But there is a belief that the very act of the man leaving the woman shows the males indifference to the security related with their females. Thus it is viewed as the women are in reality viewed as somewhat a kind of sexual beings and men as sexually frozen pieces. The mans lack of sexual desire is what has been truly killing the woman of late and it basically allows for the man to continue living in a hollow life. This is true that this does not necessarily mean the real nature of women but about the way in which men imagine of them. Hawthornes men are obsessed with females but the only way they can make any connection with women is through fantasy or by performing some fantasy-related activities that are not considered appropriate by the female populace. The family ties play a huge role here as husband and wife are considered as the two wheels of a car, the car being the home in this point. These two have to gel together emotionally as well as physically in order to make their individual lives easy and the people who are attached with them within the household. Family ties definitely help the Young Goodman Brown as the writer has suggested that in the long run, it is the family which plays its due

Monday, October 28, 2019

What Are the Benefits and Limitations of Using Second Life in Education Essay Example for Free

What Are the Benefits and Limitations of Using Second Life in Education Essay What are the benefits and limitations of using Second Life in Education? Use of the internet has increased exponentially in recent years, in both developed and developing countries, and educators are searching for ways of utilising the new technology and environment to enhance teaching and learning experiences. Second Life (SL) is a world which exists online. The world is complete with schools, universities, businesses and even criminal activity. As the use and popularity of SL grows, so too does the research regarding its viability as an educational tool. Both the apparent benefits and limitations have been considered in a variety of research papers (Baker, Wentz Woods, 2009; Taylor Chung, 2008). In order to determine whether SL is a useful option for educational institutions, the following aspects will be considered as part of this review: features of online learning, technical considerations and the overall potential uses. Some important features of online learning discussed by the authors include accessibility, popularity, and community. Access to online learning is an important aspect to consider, for both teachers and students. The flexibility of the online environment means that this type of technology can potentially be accessed at many different times and a variety of different places (Baker, Wentz and Woods, 2009). According to Baker et al. (2009), lecturers can make use of the technology by delivering their information via avatars. Taylor and Chung (2008) also consider the popularity of SL, and how this may encourage users to participate in online educational content. Indeed, as Baker et al. (2009) also suggest, students can be not only participants but can also â€Å"create their own content† (p. 60). They add that it is possible for students to meet together, attend discussion online and interact with tutors in an informal and relaxed way, as well as encouraging students who may otherwise be shy to have a ‘voice’. In this way they are building and sharing within their own communities and taking responsibility for their own learning. However, as Taylor and Chung (2008) assert, although SL might be popular, colourful, visual and interactive, students may not enjoy learning in this way, and using SL instead of more traditional methods may actually cause students to forget what they have learned. The authors suggest that the enjoyment of using an avatar and playing in SL may mean students do not focus on the aims of the lesson or lecture. Furthermore, Baker et al. (2009) suggest that there may be limitations of online interaction compared to face-to-face interaction. It is thus important for teacher to consider these issues before using SL. Not only that, there are also a few technical considerations such as cost and time, using SL and also technical knowledge been mentioned by the authors. Baker et al. (2009) claim that the cost of using SL could be differ. Anyone can use it for free yet there are also some charges for people to have a virtual land in SL. According to Baker et al. (2009), people need to consume time to get used to SL. There are initial times to create an avatar, control it, and communicate using computer. Taylor and Chung (2008) clarify that in order to get the benefits; people have to invest money and time for the programming content. Being failed to control avatar, learners might become de-motivated and not willing to use it. By using SL, Baker et al. (2009) remind teachers to consider the objective of online teaching, thinking if it is appropriate for the class or not, can they or the learners be familiarized with the technology and even developed new class management techniques. In fact, Baker et al. 2009) point out that the technical requirement of using SL is higher than basic requirement. Also, there might be some potential issues such as slow connection, slide show’s problem, and security issue. Taylor and Chung (2008) add that there are not a lot of document storages and the computer might get slow due to many graphics. In addition, the authors also insist that there are some overall potentials like new technology, uses in present fields and potential issues using SL in education and training purposes. Baker et al. 2009) reveal that SL is a new technology which launched in 2003, yet some educators already investigating the uses of SL in teaching and learning purposes. Its dominant is SL is not a game like Active Worlds, MMPORGs, and Whyville; it’s a space for social communication. There are some possible issues that people need to be careful as it may have serious effects. Students need to be informed the appropriate usage of the new technology–SL in learning. Besides that, they need to be taught the proper way to behave themselves and protect their privacy while using SL.  Furthermore, an emergency plan should be planned so that when the technology having problems and not performing well, students will not lost temper and cause severe impacts. Taylor and Chung (2008) suggest that SL is a powerful tool in helping training and development sectors. Nevertheless, they also discover that IBM still remains using text-based collaboration which leads to the efficacy of SL. It still has some difficulties to an effective transmission for instruction and content management. As a result, there are lots of potential to be found in the human-computer interaction, usability and instructional design. Through the articles reviewed it seems that the benefits and drawbacks of using SL are equal. Although SL can helps people in learning, people still have to pay much more efforts on it. To get used to SL, people have to spent money, time, and think out the appropriate way to use it wisely. Obviously, SL has the potential to facilitate people’s learning. In fact, to use it or not depends on the further research whether the benefits can overcome the limitations or not.

Saturday, October 26, 2019

Similarities And Differences Of Characters In The Sound And The Fury :: Sound Fury Characters

The Sound and the Fury is a compelling story that shows different aspects of a family that is slowly deteriorating. William Faulkner made it clear that one of the most important aspects of this novel is the theme of loss. Faulkner gave the views of four different individuals who all had one main obsession, their sister Caddy, who in a way symbolizes the loss that each person endures and the deterioration of the south. Caddy, who did not have a part in the novel to tell her side of the story, was viewed very differently by each of her brothers. This novel tells a story of the Compson family on their way of distinction. The story begin with Benjamin who is mentally challenge tells the first section of the story; this is one of the most difficult chapters of the book that is very difficult to comprehend for the simple fact that Benjamin has no motion of time. Therefore he constantly goes back in forth with the present and past. In order to fully understand the chapter, you must slowly comprehend when he is speaking of the past and when he is speaking in the present. All his memories have to do with Caddy. She was the one who gave him order. His life was based around Caddy because she was the mother figure in his life. She was the one that gave Benjamin the love he needed. There was a point in the novel were Luster was taking Benjamin and he started to cry hysterically because Luster took him on an unfamiliar route; Jason found out he hit Luster and told him to never do that again or he’ll kill him because Benjamin lost the order he lived with. Without the familiarity of his surroundings th ere would not be any meaning to his life. The only thing he has left in his life is the memories he had with his sister. When Caddy ran away Benjamin lost the order in his life and the loved he needed. The second chapter was told by Quentin, which was much easier to comprehend than the first chapter and he tells his perspective of events that happened in his past that he hasn’t quite gotten over. Quentin had a close bond with his sister Caddy. Quentin cares about the old southern code of honor.

Thursday, October 24, 2019

The Many Benefits of Medicinal Marijuana Essay -- Argumentative Persua

The Many Benefits of Medicinal Marijuana When the religious leaders of Nicholas Copernicus' time excommunicated him for his radical studies, they ignorantly dismissed a brilliant idea. The idea that the earth revolved around the sun inherently brought controversy upon the traditional styles of science. A controversy our leaders need to examine is the medical use of marijuana. Instead of banning marijuana and ignoring the public voice, our representatives need to examine the facts and effects of marijuana for medical use. Like Copernicus' idea that revolutionized science, changing the way we treat our sick and suffering will benefit our society. The effects of legalizing marijuana for only medical purposes will stop unnecessary legal action and it will change the way doctors treat a number of serious ailments. At the turn of the century, rumors equated marijuana "as a substitute for the opiates and alcohol", thus leading to The Marijuana Tax Act of 1937. It was instated with little public notice and without research on the effects of the drug. The Act led to further myths such as the "gateway" term, which describes marijuana as a drug that leads to more dangerous drug abuse. Since the time our representatives took the uneducated initiative to ban the drug for medical purposes, it has been tested and found innocent of addictive qualities (Bonnie and Whitebread 4). "The best established use of smoked marijuana is an anti-nauseate for cancer chemotherapy. During the 1980's, smoked marijuana was shown to be an effective anti-emetic in six different state-sponsored clinical studies involving nearly 1,000 patients" (Randall 217-243). According to Peter McWilliams, an AIDS and cancer patient, marijuana gave him the most rel... ...nd Consulted Bonnie, Richard and Whitebread, Charles. The Genesis of Marijuana Prohibition. Schaffer Library of Drug Policy. Available: http:www.druglibrary.org/schaffer/Library/studies/vlr/vlr2.htm IOM report sends mixed signals on use of marijuana as medicine. Alcoholism and Drug Abuse Weekly: LEXIS NEXIS. Available: http:web.lexis-nexis.com/universe/document?_ansset=GeHauKO_ Marijuana is a Medicine English Medical Marijuana Flyer. Avaliable: http://medicalmarijuana.org/engflyer.htm ON THE RIGHT; political update. National Review. Available: http://web.lexis-nexis.com/universe/document?_ansset=GeHauKO- The Medical Use of Marijuana NORML. Available: http:natlnorml.org/medical/index.html Woodward, Wc. C. American Medical Association Opposes the Marijuana Tax Act of 1937. Available: http://www.pdxnorml.org/AMA_opposes_1937.html

Wednesday, October 23, 2019

Cognetive psychology

This is False; Jane Eliot simply asked her previous students if they thought the exercise would be good for students or teachers and her students answered that it would be good for both. She never expressed that all teachers should do her experiments. 4) This is True. 5) This True. part 3. 1) This quotation is from â€Å"The Limitless Heart† written by Fenton Johnson.This quotation is expressing how people are so willing to hold in their emotions, hiding heir true feelings. I was emotional caught with Johnson statement â€Å"This much he and I share: as a gay man who grew up in the rural South, I am no stranger to hiding. † This quotation is meaningful because there is always someone in every culture who doesn't want the same life or have the same believes as their family, but they have to hide it because they do not want to be hated by the people they love the most. ) This quotation is from † Male-Female Conversations is Cross-cultural Communication† writte n by Deborah Tannen. I would agree with Tannen's statement because in every culture, women want nothing more than to be heard, especially by their husbands because it shows that they care and understand the emotions their wives are going through. 3) This quotation is from â€Å"Wounds that Never Heal† written by Mariama L. Barrie. Barrie is expressing the pain not only she felt, but the pain of all the women in her tribe during their genital mutilation.She expressed that women ho perform these procedures are unaware of the dangers they put the little girls through, with a wound that may heal psychically but never emotionally. 4) This quotation is from â€Å"Ethnocentrism† written by William B. Gudykunst. I agree with Gudykunst statement about everyone being ethnocentric because we are all raised differently, causing us to have a specific preference of acting a certain way or doing a specific thing. It is natural and unwilling tor us to Judge others based standards and cultural experience. Part 4. on our own

Tuesday, October 22, 2019

Breast Cancer And The Detection Of Breast Cancer With Mri Essays

Breast Cancer And The Detection Of Breast Cancer With Mri Essays Breast Cancer And The Detection Of Breast Cancer With Mri Paper Breast Cancer And The Detection Of Breast Cancer With Mri Paper When we hear the word cancer, most of us are much worried. Cancer is one of the life threatening diseases and breast cancer is one type of cancer that mostly affects women. In fact research has found that breast cancer is the most common cause of cancer in women and the second most common cause of cancer death in women in the particularly in the United States (Kriege, et al. 2004). Detecting breast cancer has been a serious concern. Today with the increased awareness of breast cancer risk, women over the age of 40 are undergoing mammography for screening, leading to detection of cancers in earlier stages and a consequential improvement in survival rates. Even with high awareness breast cancer remains the most common cause of death in women between the ages of 45 and 55. In a breast cancer patient, cancer usually forms in the ducts and lobules (National Cancer Institute, 2007). If we look into the causes of breast cancer, much of the research has found that genetic and/or hormonal factors are the main risk factors for breast cancer. It is estimated that about 50 percent of breast cancers associated with genetic risk factors are linked to a mutation of the BRCA1 or BRCA2 genes. This study also suggests that women with multiple relatives who developed breast or ovarian cancer at a young age and those who are found to carry BRCA mutations face a decision about whether to have prophylactic surgery or undergo a lifetime of intensive screening (Center for the Advancement of Health, n. pag, 2007). With the help of proper diagnosis of the stages it is possible to detect the extent to which a particular cancer has spread and this in turn helps the physicians to take decisions concerning treatment options. Breast cancer treatment depends upon several factors, including the type of cancer and the extent to which it has spread. In general treatment for breast cancer may involve surgery, radiation therapy, hormonal therapy, and/or chemotherapy. When compared to the earlier decades studies have suggested that the advances in screening, diagnosis, and treatment has decreased the death rate for breast cancer by about 20% (Stoppler, 2007). Methods of Diagnosis of Breast Cancer There are several techniques available for the detection of breast cancers. In general, for any women without any symptoms the screening for breast cancer normally begins with X-ray mammography to look for tumors and cysts. It can be said that high-quality mammography is an effective and economic technology currently available for breast cancer screening. In recent years, the technique involved in mammography is digitalized. This is a technique for recording x-ray images in computer code instead of on x-ray film. The images are displayed on a computer monitor and can be magnified before they are printed on film. Images can also be manipulated; the radiologist can magnify or zoom in on an area. Computer-aided detection (CAD) is another technique that involves the use of computers to bring suspicious areas on a mammogram to the radiologist’s attention. It is used after the radiologist has done the initial evaluation of the mammogram. In the year 1998, the FDA approved a breast imaging device that uses CAD technology (National Cancer Institute Fact Sheet, 2007). Ultrasound is also used to screen breast cancers. It is also called sonography in which the imaging technique uses high-frequency sound waves that cannot be heard by human beings bounces off tissues and internal organs. As a result their echoes produce a picture called a sonogram. Ultrasound imaging of the breast is used to differentiate between solid tumors and fluid-filled cysts. This technique can also be used to evaluate lumps that are difficult to see on a mammogram. Ultrasound in come cases is used as part of other diagnostic procedures, such as fine needle aspiration. In this procedure the tissue or fluid is removed with the help of a needle for examination called the biopsy (National Cancer Institute Fact Sheet, 2007). Magnetic Resonance Imaging (MRI) is another imaging procedure that uses a magnetic field and pulses of radio wave energy to make images of organs and structures inside the body (Center for the Advancement of Health, 2007). In magnetic resonance imaging (MRI), a magnet linked to a computer creates detailed pictures of areas inside the body. The advantage with this technique is that it does not use radiation. Each MRI produces hundreds of images of the breast from different directions side-to-side, top-to-bottom, and front-to-back which is then interpreted by a radiologist. MRI of breast is done in the following manner. First the patient is asked to lie on her stomach on the scanning table. The breast hangs into a depression or hollow in the table, which contains coils that are able to detect the magnetic signal. The table is then moved into a tube-like machine that contains the magnet. Once an initial set of images are taken, the patient may be given a contrast agent intravenously. The contrast agent is not radioactive in nature and it is just used to improve the visibility of a tumor. After this additional images are then taken to view the tumor clearly (National Cancer Institute Fact Sheet, 2007). In general, breast MRI is not used for routine breast cancer screening, but in recent years clinical trials are being performed to determine if MRI is helpful for screening certain women, such as young women at high risk for breast cancer. It is found that MRI cannot always precisely distinguish between malignant cancer and benign (noncancerous) breast conditions. Additionally, it also cannot detect microcalcifications like ultrasound (National Cancer Institute Fact Sheet, 2007). Researchers have found that MRI is used mainly to evaluate breast implants for leaks or ruptures, and also to assess abnormal areas detected by a mammogram or are felt after breast surgery or radiation therapy. However it can be used after breast cancer is diagnosed to measure the extent of the tumor in the breast. MRI is also sometimes useful in imaging dense breast tissue, which is often found in younger women, and in viewing other breast abnormalities that can be felt but are not visible with conventional mammography or ultrasound (National Cancer Institute, 2007). Reasons for not using MRI for detection of breast cancer are many. For instance, because the mammograms are much less expensive than Magnetic Resonance Imaging (MRI), mammograms are preferred by many. Secondly, since MRI compress the breast to show all of the information in one view, they are a less effective tool, particularly when the breast is dense or in young woman. MRI provides multiple slices of high-resolution images of breast tissue, creating a three-dimensional picture (Optical Society of America, 2007). Recently researchers at Dartmouth College and Dartmouth Medical School combined two techniques, magnetic resonance imaging (MRI) and near-infrared optics, which they found to be potentially more precise method for diagnosing breast cancer. In this new technique MRI is used to produce an image of the breast, providing adequate information on its structure, shape and composition. Additionally, the near-infrared light technique provides information on how the tissue is functioning, for instance, by finding out if a region contains a large amount of blood and is consuming oxygen rapidly then the patient may be suffering from cancer as early cancers typically consume oxygen. The researchers are hopeful that this dual-procedure of combining MRI with near-infrared light technique will be a key to learning which tissues are malignant even before performing a biopsy (Optical Society of America, 2007). The disadvantage with MRI is that it is extremely sensitive in detecting early cancer, but unfortunately because of its hypersensitivity it also picks up many breast changes that are not cancer, leading to a high incidence of negative biopsies and creating unnecessary stress on people. In other words, the false positive rate is high and may be unacceptable for low risk women (Anne Arundel Medical Center, 2004). There are also studies that point out that MRI can detect cancers that may be missed in a routine mammogram. For instance, a study in the March 29, 2007, published in the New England Journal of Medicine followed 969 women who had a recent diagnosis of breast cancer in one breast. They found that MRI was able to detect breast cancer in the second (contra lateral) breast of some of these women even when mammogram had been read as normal (Kriege, et al. 2004). Specifically, 121 of these women had a suspicious or positive MRI, even though their mammogram showed negative results. Later when all of these MRI positive women had biopsies, 30 were found to be positive for cancer. Therefore, it can be said that MRI is useful when it comes to detecting early breast changes even when mammograms are not able to detect it. In case if the 30 women not had an MRI, the cancer in their other breast would not have been detected and their surgery and treatment might have been inadequate. Though these positive cases were detected it was found that even in very high-risk women who already had cancer the majority (91 of them) had false positives. This shows that the false positive rate in a normal group of women may be even higher. The good news is that the women in the study who had a negative MRI were followed for another year and continued to have no cancer occurrence or reoccurrence in their second breast. In other words MRI had a negative predictive value of 99 percent (Young, 2007; Reichman, 2007). Studies conducted by Brem et al. (2007) compared the sensitivity and specificity of breast-specific gamma imaging (BSGI) using a high-resolution breast-specific gamma camera and MRI in patients with indeterminate breast findings. They found that there was no statistically noteworthy disparity in sensitivity of cancer detection between BSGI and MRI. However, BSGI demonstrated a greater specificity than MRI, 71% and 25%, respectively. Therefore this study suggested that BSGI has equal sensitivity and greater specificity than MRI for the detection of breast cancer (Brem et al. 2007). Breast magnetic resonance imaging (MRI) has been proposed as an additional screening test for young women at high risk of breast cancer in whom mammography alone has poor sensitivity. A study conducted by Lord et al. (2007) found that the effectiveness of MRI depend on assumptions about the benefits of early detection from trials of mammographic screening in older average risk populations. He also stated that the extent to which high risk younger women receive the same benefits from early detection and treatment of MRI-detected cancers is yet to be established (Lord et al. 2007). A study conducted by Drew et al. compared MRI with mammography, sonography, and physical examination in preoperative patients (Drew, et al. 1999). They found that the sensitivity for detecting multifocal breast cancer was 100% for MRI and 18% for standard modalities. A major criticism of MRI has been its lack of specificity, which varies in the literature from 31% to 91% (Flamm, 2005). MRI when it is compared mammography has a specificity of 93% to 99%. Besides it was found that patients diagnosed positive with MRI had to conform it through a biopsy that added to the overall cost of treatment and is a burden. While MRI is effective in detecting breast cancer, its specificity for screening is much lower than that of mammography. The need for additional imaging ranged from 8% to 17% in MRI screening studies, and the biopsy rates ranged from 3% to 15% (Kriege, et al. 2004). Studies have found that the rate of false-positive results is higher in women who undergo screening compared with a high-risk population. An American Cancer Society review found that the higher rate of biopsies and additional studies was acceptable in women with a high risk of breast cancer but inappropriate in low-risk women (Saslow, et al. , 2007). In conclusion, it can be said that MRI cannot be the used as an effective tool to detect breast cancer since there are several studies that support this fact. Besides, several negative cases being shown as positive cases of breast cancer that creates unnecessary anxiety in people. References Anne Arundel Medical Center, (2004) MRI helps find breast cancer in high-risk women more evidence point to MRI usefulness, Breast Health, September 2004. Retrieved November 4, 2007, from askaamc. org/neighbors/news/index. php? id=16032 Brem, R. F. , Petrovitch, I. , Rapelyea, J. A. , Young, H. , Teal, C. , Kelly, T. (2007) Breast-specific gamma imaging with 99mTc-Sestamibi and magnetic resonance imaging in the diagnosis of breast cancer- A comparative study, The Breast Journal 13 (5), 465–469. Center for the Advancement of Health (2007, July 2). MRI plus X-ray mammography doubles breast cancer detection in women at high risk. ScienceDaily. Retrieved October 28, 2007, from sciencedaily. com/releases/2007/07/070702084039. htm Drew P. J. , Turnbull L. W. , Chatterjee S. , Read J. , Carleton P. J. , Fox J. N. , Monson J. R. , Kerin M. J. (1999) Prospective comparison of standard triple assessment and dynamic magnetic resonance imaging of the breast for the evaluation of symptomatic breast lesions. Ann Surg. ;230(5):680–685. Flamm C. R. , Ziegler K. M. and Aronson N. (2005) Technology evaluation center assessment synopsis: use of magnetic resonance imaging to avoid a biopsy in women with suspicious primary breast lesions. J Am Coll Radiol. ;2(6):485–487. Optical Society of America (2007, April 15). Breast cancer diagnosis from combined MRI-optics method. ScienceDaily. Retrieved November 4, 2007, from sciencedaily. com/releases/2007/04/070413122515. htm Kriege M. , et al. (2004) Magnetic resonance imaging screening study group. Efficacy of MRI and mammography for breast-cancer screening in women with a familial or genetic predisposition. N Engl J Med. ; 351(5):427–437. Lord, S. J. , Lei, W. , Craft, P. , Cawson, J. N. , Morris, I. , Walleser, S. , Griffiths, A. , Parker, S. and Houssami. N. (Sept 2007)A systematic review of the effectiveness of magnetic resonance imaging (MRI) as an addition to mammography and ultrasound in screening young women at high risk of breast cancer (Report). European Journal of Cancer 43. 13: 1905 (13). National Cancer Institute, (2007) Breast cancer, Retrieved on 27 October 2007 from cancer. gov/cancertopics/types/breast National Cancer Institute Fact Sheet, (2007) Improving methods for breast cancer detection and diagnosis, Retrieved on 4 November 2007 from cancer. gov/cancertopics/factsheet/Detection/breast-cancer Reichman, J. (2007) Breast cancer detection: MRI vs. mammogram? Retrieved October 28,

Monday, October 21, 2019

The Iran-Iraq War of 1980-1988

The Iran-Iraq War of 1980-1988 The Iran-Iraq War of 1980 to 1988 was a grinding, bloody, and in the end, completely pointless conflict. It was sparked by the Iranian Revolution, led by Ayatollah Ruhollah Khomeini, which overthrew Shah Pahlavi in 1978-79. Iraqi President Saddam Hussein, who despised the Shah, welcomed this change, but his joy turned to alarm when the Ayatollah began calling for a Shia revolution in Iraq to overthrow Saddams secular/Sunni regime. The Ayatollahs provocations inflamed Saddam Husseins paranoia, and he soon began calling for a new Battle of Qadisiyyah, a reference to the 7th-century battle in which the newly-Muslim Arabs defeated the Persians. Khomeini retaliated by calling the Baathist regime a puppet of Satan. In April  1980, Iraqi Foreign Minister Tariq Aziz survived an assassination attempt, which Saddam blamed on the Iranians. As Iraqi Shias began to respond to the Ayatollah Khomeinis call for revolt, Saddam cracked down hard, even hanging Iraqs top Shia Ayatollah, Mohammad Baqir al-Sadr, in April of 1980. Rhetoric and skirmishes continued from both sides throughout the summer, though Iran was not at all militarily prepared for war. Iraq Invades Iran On September 22, 1980, Iraq launched an all-out invasion of Iran. It began with airstrikes against the Iranian Air Force, followed by a three-pronged ground invasion by six Iraqi Army divisions along a 400-mile-long front in the Iranian province of Khuzestan. Saddam Hussein expected ethnic Arabs in Khuzestan to rise up in support of the invasion, but they did not, perhaps because they were predominantly Shiite. The unprepared Iranian army was joined by the Revolutionary Guards in their efforts to fight off the Iraqi invaders. By November, a corps of some 200,000 Islamic volunteers (untrained Iranian civilians) were also throwing themselves against the invading forces. The war settled into a stalemate throughout much of 1981. By 1982, Iran had gathered its forces and successfully launched a counter-offensive, using human waves of Basij volunteers to drive the Iraqis back from Khorramshahr. In April, Saddam Hussein withdrew his forces from Iranian territory. However, Iranian calls for the end to monarchy in the Middle East convinced reluctant Kuwait and Saudi Arabia to begin sending billions of dollars in aid to Iraq; none of the Sunni powers wished to see Iranian-style Shia revolution spreading southward. On June 20, 1982, Saddam Hussein called for a ceasefire that would return everything to the pre-war status quo. However, Ayatollah Khomeini rejected the proffered peace, calling for Saddam Husseins removal from power. The Iranian clerical government began to prepare for an invasion of Iraq, over the objections of its surviving military officers. Iran Invades Iraq On July 13, 1982, Iranian forces crossed into Iraq, heading for the city of Basra. The Iraqis, however, were prepared; they had an elaborate series of trenches and bunkers dug into the earth, and Iran soon ran short on ammunition. In addition, Saddams forces deployed chemical weapons against their opponents. The ayatollahs army was quickly reduced to complete dependence on suicide attacks by human waves. Children were sent to run across mine-fields, clearing the mines before the adult Iranian soldiers could hit them, and instantly become martyrs in the process. Alarmed by the prospect of further Islamic revolutions, President Ronald Reagan announced that the U.S. would do whatever was necessary to prevent Iraq from losing the war with Iran. Interestingly enough, the Soviet Union and France also came to Saddam Husseins aid, while China, North Korea, and Libya were supplying the Iranians. Throughout 1983, the Iranians launched five major attacks against the Iraqi lines, but their under-armed human waves could not break through the Iraqi entrenchments. In retaliation, Saddam Hussein sent missile attacks against eleven Iranian cities. An Iranian push through the marshes ended with them gaining a position just 40 miles from Basra, but the Iraqis held them there. The Tanker War In the spring of 1984, the Iran-Iraq War entered a new, maritime phase when Iraq attacked Iranian oil tankers in the Persian Gulf. Iran responded by attacking the oil tankers of both Iraq and its Arab allies. Alarmed, the U.S. threatened to join the war if the oil supply was cut off. Saudi F-15s retaliated for attacks against the kingdoms shipping by shooting down an Iranian plane in June  1984. The tanker war continued through 1987. In that year, U.S. and Soviet naval ships offered escorts to oil tankers to prevent them being targeted by the belligerents. A total of 546 civilian ships were attacked and 430 merchant seamen killed in the tanker war. Bloody Stalemate On land, the years 1985 to 1987 saw Iran and Iraq trading offensives and counter-offensives, without either side gaining much territory. The fighting was incredibly bloody, often with tens of thousands killed on each side in a matter of days. In February of 1988, Saddam unleashed the fifth and deadliest missile attack on Irans cities. Simultaneously, Iraq began to prepare a major offensive to push the Iranians out of Iraqi territory. Worn down by eight years of fighting and the incredibly high toll in lives, Irans revolutionary government began to consider accepting a peace deal. On July 20, 1988, the Iranian government announced that it would accept a UN-brokered ceasefire, although Ayatollah Khomeini likened it to drinking from a poisoned chalice. Saddam Hussein demanded that the Ayatollah revoke his call for Saddams removal before he would sign the deal. However, the Gulf States leaned on Saddam, who finally accepted the ceasefire as it stood. In the end, Iran accepted the same peace terms the Ayatollah had rejected in 1982. After eight years of fighting, Iran and Iraq returned to the antebellum status quo - nothing had changed, geopolitically. What had changed was that an estimated 500,000 to 1,000,000 Iranians were dead, along with more than 300,000 Iraqis. Also, Iraq had seen the devastating effects of chemical weapons, which it later deployed against its own Kurdish population as well as the Marsh Arabs. The Iran-Iraq War of 1980-88 was one of the longest in modern times, and it ended in a draw. Perhaps the most important point to be drawn from it is the danger of allowing religious fanaticism on one side to clash with a leaders megalomania on the other.

Sunday, October 20, 2019

How to Use and Where to Find a Helpful and Simple IEEE Format Example

How to Use and Where to Find a Helpful and Simple IEEE Format Example Students who choose computer science classes should be familiar with the IEEE reference style and format their assigned paper accordingly. You need to master it, no matter if you study programming, information technologies, web communication, computer science, management, or similar disciplines. Find a good IEEE format example to make things easier. It will provide you with useful information and a list of helpful suggestions and guidelines to write your next text correctly. What is the IEEE format? This question is often asked by confused students who need some guides. The IEEE is a professional organization that supports different IT and engineering fields, and it has established its own writing manual to let both professionals and students in relevant areas organize their references and writing works. Read this important journal to get a clearer idea of basic rules. Check out a brilliant IEEE format example to understand that this style consists of two crucial elements: References; In-text direct and indirect citations. What are in-text citations? They are brief quotes taken from both secondary and primary sources, and you need to number them in square brackets. Each number identifies a complete citation listed in your bibliography or works cited list, but many students call such citations references. A list of references is in their numerical order. The IEEE manual is lengthy and complex, and that’s why you should read this brief guide because it will help you save time in the end. ORDER PAPER IN IEEE FORMAT How to cite in the IEEE format? Each reference must have its corresponding IEEE citation in the main body of your research paper or academic essay. What is the difference between indirect and direct in-text citations? The main difference is that direct citations duplicate original quotes, while the indirect ones are the same ideas paraphrased by you. Each time you want to add a citation, insert a specific number within square brackets to help readers find complete references on your reference page. Make sure that it’s a separate section of your assignment. A complete IEEE format reference contains the information necessary to help other people find more details about your discussed subject with ease, including: Publication places and dates; Full titles; Authors’ initials and surnames; Some smaller details, such as page numbers or volumes. Corresponding numbers should show up before every reference. How to create IEEE citations? In-text citations shouldn’t necessarily contain such details as quotes pages, authors’ names, or publication dates, and you can mention sources using special numbers in a bracket line. It must match a complete citation in your bibliography. Insert in-text citations to back up major arguments in the main body (before any punctuation and with a space before opening brackets). Number all sources in the order you mention them. After referencing and assigning numbers to them, feel free to use the same corresponding numbers each time you need to quote these sources in your paper. If you cite many sources simultaneously, apply the best approach and provide every number separately (in brackets and use dashes or commas between numbers). Most experts apply the same formatting approach. How to write your reference page? Based on IEEE formatting requirements, a page that contains your full bibliography is called a reference list or page, and you need to put in at the end of your writing project. The basic goal that it serves is to provide full citations for each source that you use to describe in-text citations. Add all references in their numerical sequence. Don’t forget to include their bracketed numbers at the beginning. Follow these simple rules: Word "References" is the title of this page (you can either align it left at the top or put it in the center); Use a hanging indent for each reference with numbers in brackets to identify the right numerical order; The titles of your cited sources, including magazines, newspapers, articles, or others, should be in quotation marks; The titles of all works should be in italics; List surnames and initials as authors’ names. PLACE YOUR ORDER HERE Where to find excellent examples? The IEEE updates its writing manual on a regular basis. You should visit its official website to know all the changes made to such vital format elements as: Footnotes; Abbreviations; Punctuation; Section headings; Biographies; Tags Equations and numbers; Capitalization. How to style and cite references? There are some basic rules that remain the same, regardless of new editions, and they concern: Direct quotes; Findings, data, tables, and graphics. Place a text from your sources in quotation marks. Add quotations to original sources, summarize or rewrite them, and come up with citations when making a summary of or restating data from them, including claims, ideas, verdicts, and research. Cite your original sources when adapting, referring to, and taking any information from them to format your academic paper successfully and earn high grades. Why is citing essential for your academic performance? Some students don’t gain the point of citing. It’s an important element of academic writing for different reasons: Plagiarism is a big problem, and incorrect citing equals to it; Formatting plays a huge role in final grades; Full references help readers to conduct their research and learn more about specific problems; It’s unethical to steal the words of other authors. You shouldn’t count on your good marks if you fail to cite your sources of information based on IEEE formatting rules. What if you need expert help? Turn to our team of qualified and experienced writers because they will help you format all papers and do other things for you.

Saturday, October 19, 2019

The Rule of Saint Benedict Essay Example | Topics and Well Written Essays - 3000 words

The Rule of Saint Benedict - Essay Example One of the reasons why it was and remains so popular is its objectivity, which makes it much more sustainable than related precepts especially because it allows for a moderate line between the zeal of individual devotion and institutionalism1. The rule was essentially designed to create an environment in which the needs of monks in communities could be provided to foster a deeper understanding into human nature, providing spiritual mentorship, support the monk’s ascetic endeavors and develop spiritual growth. This paper will endeavor to analyze the text by primarily focusing on; the historical context in which the Rule emerged, the factors that drove Saint Benedict to write it, his secondary sources of information and the role the rules played and continue to play in religious and non-religious discourse. For as long as it has existed, the rule has been used by Benedictine monks and to many scholars, saint Benedict is considered to be the originator of western monasticism alth ough historians had suggested that he probably had no outward intention of starting a religious order. Among the many advantages of these rules is that they allow of communities of monks to be autonomous and thus operate without outside influence or direct co-operation. Consequently, communities that apply these rules have enjoyed a variety of benefits from the accruing independence such as the development of close internal bonds and more contemplative lifestyles without outside distraction. While the book is quite explicit on some of it requirements, it is not iron clad and it allows the Abbott to use his discretion when circumstances demand it.2 The lessons, according to Benedict were not meant to dictate but provide a guide of those wishing to spend their lives in holy contemplation especially beginners. Overview The rule has seventy-three chapters and these are divided into edicts about the duties of the abbot, regulation of worshiping God, chastisement and consequences for brea king rules, the core management of the monastery and miscellaneous rules. It prologues with a hortary preface through which Saint Benedict lays down the basic tenets of the religious life and the renunciation of an individual’s will to take up a life of Christ In his summation, the rules will serve as the foundation for the formation of a school in which salvation shall the taught as a science. Through their perseverance in the monastery for the duration of their natural lives, monks will be deemed as qualified to be partakers of the kingdom of Christ Owing to the scope of the rules, it is not possible to summarize it explicitly by the chapter since that would require an entire paper of considerable length. Nevertheless, several of the rules, which have a bearing on the historical context to the text, will be briefly discussed herein. Benedict makes it clear that the rule is only relevant to two classes of monks, those are the Cenobites, Hermits, and it precludes the Gyrovagi and Sarabites who did not follow any specific code and were, in Benedict’s opinion a disgrace to the monastic profession. He emphasizes on the authority of the abbot who all the monks must obey without question and in the selfsame way requires the abbot is an honorable and godly individual. Concerning the personal lives of the monk, the rules demand that they must live frugally and what little they have such as extra clothes should be

Friday, October 18, 2019

Flipgrid in Turkish Language Classes Article Example | Topics and Well Written Essays - 250 words

Flipgrid in Turkish Language Classes - Article Example As such, Flipgrid creates a social and interactive learning environment for foreign languages and it allows teachers to assess student performance. Each week involves five hours of instruction. Flipgrid is useful as it involves an interactive environment with question grids to enhance learning (Flipgrid 2014 b). The frequency of questions varies; Weekly questions are asked at the end of each week after 5 hours of weekly Turkish language instruction. End of Unit questions is different from weekly questions as they are more summative in nature (Flipgrid 2014 b). Â  Learners can practice their conversational Turkish skills on Flipgrid through face-to-face videos that strengthen speaking skills. In a class of 10 students of Turkish B1, students were often asked varied questions about their learning experience and were asked together collaborative as couples or in two groups of 5 students each. The interviews conducted on 20th December 2014 contained open and closed-ended questions allowing the students to have liberty in their responses. The responses were subsequently written and analyzed. Â  Flipgrid allows students to share their responses as well thereby creating an interactive collaborative space that encourages learning. As such, it creates a social learning environment and social presence has been shown to improve student performance and learning as well as instructor satisfaction (Swan and Richardson 2003, 68). Â  It is extremely useful for Turkish language learning as it can better train the tongue for pronouncing foreign languages (Waid 2014). This way the teachers are able to achieve their learning objectives. A teacher can hold discussions by providing a prompt grid to which students respond via video. Â  

Valuation of TESCO PLC Essay Example | Topics and Well Written Essays - 5000 words

Valuation of TESCO PLC - Essay Example Tesco has also entered the US market in 2007 under the name Fresh and Easy and is planning to invest about $500 million for starting a network of 150 stores in the US West Coast. Its retail operations include groceries and food items which accounts for almost 80% of its sales and also has a very profitable online trading business. The company also sells non food items like clothing, electronics, pharmaceuticals, books, insurance, alternative medicines, certain legal services, petrol etc. In terms of turnover Tesco Plc is the fourth largest retailer in the world, the 1st three positions being held by Wal Mart, Carrefour of France and The Home Depot of the USA respectively and ranks 59 in the Fortune Global 500 according to CNNMoney.com. The group has around 3000 stores and employees around 400,000 people worldwide. It is at present the largest employee in Britain in the private sector. The turnover of the company for the twelve months ending December 2007 was  £46 billion and it has increased profit every year except in 1987. As in the case with most fast growing companies Tesco has had its share of accusations and criticism which includes undercutting the competition, exploiting suppliers and workers and of employing child labor in certain markets. Early Days and later expansion: In 1919 John Edward Cohen started a small grocery shop in East London with a thirty pound stipend he received from the Royal Flying Corps. One of the products he sold was a private brand of tea named Tesco, derived from the name of his supplier Mr. T E Stckwell (the first three letters of his name TES and CO from his surname) and he used this as the name of the his store which he opened in 1929 in North London. The company was incorporated as a private limited company in 1932 named Tesco Stores Ltd. His business flourished and a new headquarters was built on a

Thursday, October 17, 2019

Foreign Direct Investment Essay Example | Topics and Well Written Essays - 4250 words

Foreign Direct Investment - Essay Example IFIs have been in existence courtesy of political and economic interests. Faster economic integration, through the elimination of cross-border barriers between the member countries, raises the possibility the spread of economic crisis across the region in the event of a policy failure and the role of international financial institutions in future to alleviate the problem. This is especially true because IFIs have not acted fast or adequate enough to enable countries avoid or manage the impacts of financial crises (Marktanner and Salman 4479). The International Monetary Fund (IMF) and the World Bank are prominent IFIs, which provide financial services across the world. They were both set up at Bretton Woods in 1944 to control the post-war global economy. The establishment of IMF was inspired by the desire to manage the modalities of fixed exchange rates across states and to help nation-states ease budget shortfalls, while the World Bank’s scope at its inception was to enable na tions achieve post-war reconstruction efforts. Since then, the roles of both institutions have changed significantly following a swift evolution of the scope and mandate of international economy. These international changes have sparked concerns relating to the significance of the two international financial institutions. ... Nonetheless, the United States’ stance on the balance of payments weakened drastically in the 1960s as a result of heavy military budgets and soaring inflation rates. As a result, the suspension of the United States convertibility to gold in early 1970s led to the disintegration of the monetary system agreed upon at Bretton Woods. And for four decades now, all nations have set up internal mechanism to guide exchange rates. These range from fixed currency exchange rates to controlled floats and liberal floating systems. Benefits of IFIs Despite the shortfalls, IFIs are advantageous because the credit risk often comes out in adverse cases. As a result, the establishment of IFIs to cater for the financial needs of governments cannot be rivalled by the private sector. IFIs offer financial services at highly reduced costs, and do not exert a lot of pressures upon the loaner. This means IFIs operate in an even-handed manner, without passing extra costs to the loaner (Marktanner and Salman 4482). As the economy is mostly forced to factor in the political effects, this risk is invisible in the operation of IFIs. These organizations represent the qualified source of finances and may provide financial services at, or below the market interest rate, this being allowed even in the scenarios where global capital market reigns. In the event that the global capital markets remain steadfast, the ensuing scenario often manifests in the missing certitude in loaning each country, which essentially takes place due to the essence of the management of the economy. The challenge that a government may not have the capacity to handle the duty service is much reduced in a national economy that has

How too conduct an accident investigation in the workplace Essay

How too conduct an accident investigation in the workplace - Essay Example Once at the scene take photographs and examine the site thoroughly for any possible causes of the accident or underlying causes that may have attributed to the event. For example if the site itself is an open plan work-room, describe the layout of the room with the position of all furniture, noting whether it was fixed or movable and in what condition it is in. Take a note of all, if any, cables and wiring and their location in regards to the accident, also note the type of lighting in the room, and if there are any bulbs or lights not working in case the room dimmed enough to cause an accident. Note what type of flooring the room has, if it carpeted or tiled and if there are any frayed or loose edges, or if the floor is made of polished wood or linoleum, if so is it polished enough to cause a person to slip. Is there any possibility of spilt liquids or leakages from over head pipes or under floor pipes. Once the site has been investigated and thoroughly examined the next stage is to interview the injured person or persons and any witnesses present or involved in the accident, including those who had a role after the event. Keep a copy of the report to hand, but as the injured party to describe the event prior to and leading up to their having the accident.

Wednesday, October 16, 2019

Foreign Direct Investment Essay Example | Topics and Well Written Essays - 4250 words

Foreign Direct Investment - Essay Example IFIs have been in existence courtesy of political and economic interests. Faster economic integration, through the elimination of cross-border barriers between the member countries, raises the possibility the spread of economic crisis across the region in the event of a policy failure and the role of international financial institutions in future to alleviate the problem. This is especially true because IFIs have not acted fast or adequate enough to enable countries avoid or manage the impacts of financial crises (Marktanner and Salman 4479). The International Monetary Fund (IMF) and the World Bank are prominent IFIs, which provide financial services across the world. They were both set up at Bretton Woods in 1944 to control the post-war global economy. The establishment of IMF was inspired by the desire to manage the modalities of fixed exchange rates across states and to help nation-states ease budget shortfalls, while the World Bank’s scope at its inception was to enable na tions achieve post-war reconstruction efforts. Since then, the roles of both institutions have changed significantly following a swift evolution of the scope and mandate of international economy. These international changes have sparked concerns relating to the significance of the two international financial institutions. ... Nonetheless, the United States’ stance on the balance of payments weakened drastically in the 1960s as a result of heavy military budgets and soaring inflation rates. As a result, the suspension of the United States convertibility to gold in early 1970s led to the disintegration of the monetary system agreed upon at Bretton Woods. And for four decades now, all nations have set up internal mechanism to guide exchange rates. These range from fixed currency exchange rates to controlled floats and liberal floating systems. Benefits of IFIs Despite the shortfalls, IFIs are advantageous because the credit risk often comes out in adverse cases. As a result, the establishment of IFIs to cater for the financial needs of governments cannot be rivalled by the private sector. IFIs offer financial services at highly reduced costs, and do not exert a lot of pressures upon the loaner. This means IFIs operate in an even-handed manner, without passing extra costs to the loaner (Marktanner and Salman 4482). As the economy is mostly forced to factor in the political effects, this risk is invisible in the operation of IFIs. These organizations represent the qualified source of finances and may provide financial services at, or below the market interest rate, this being allowed even in the scenarios where global capital market reigns. In the event that the global capital markets remain steadfast, the ensuing scenario often manifests in the missing certitude in loaning each country, which essentially takes place due to the essence of the management of the economy. The challenge that a government may not have the capacity to handle the duty service is much reduced in a national economy that has

Tuesday, October 15, 2019

Chapter 6- selection employee Assignment Example | Topics and Well Written Essays - 750 words

Chapter 6- selection employee - Assignment Example Issuing application forms, this helps one to know the qualifications of the applicant using documentation, the put in information about their past and present job experiences, their personal information like age, addresses, likes, and marital status. The application forms can also be used as evidence incase documentation is needed. Most employers use application forms during interviews as basis questions such as the former employees and working experience. I would also recommend that the dean employ the use of interviews in the process of finding a good candidate for the post of Human Resource professor, this would be very effective if he followed the right procedure in the interview. Using the candidate’s application form during the interview would be very effective in clarification on some pieces of information that one may not get right. Interview is also effective in getting information about the applicant; this is the information that was not contained in the application form. There is also the possibility of using ability tests on the applicants, these kind of tests are use to determine the applicants abilities and skills in certain fields, this is very effective since it helps to know some added information about the applicant. This might some co-curricular skill that they may possess, these tests can be issued inform of pencil and paper tests or job tests, those that may include more of physical input. However, this depends on certain factors, for example, in the case of a human resource officer, and one applicant is elderly and obviously not as strong as their young and energetic counterpart, I would not advice the dean to employ the use of job tests that require so much physical input since it may favor one of the applicants. The pass mark in this type of job application can be lowered or heightened depending on the number of applicants and their scores. One should be very careful when giving out this kind of job application method; it is advis able that they have very clear skills of judgment, in the case of a HR professor; the applicant should have exemplary socialization skills, speech, listening, conflict resolution, and mediation. These would be an added advantage in the job. In this case, I would advise the dean to employ the use of pencil and paper test, or in the case of job tests, I would ask them to solve different types of disputes among the students and judge who is the most effective in it. For the post, I would recommend an applicant who is joyful and does not drug their personal problems to work since it may alter with their work, especially because it involves constant interaction with people. Temperamental people would not be recommended for this job. As much as the use of interview is recommended in job applications so that the employer should have good personal exchange with the candidate, it has its shortcomings, these shortcoming s mainly come with the interviewer. The interviews in most cases lack sub jects and structure, such shortcomings may bring about mistakes such as difference in the questions asked to the applicants which may then cause rate error, whereby it is hard to weigh the amount of marks one should offer on certain questions, and since the questions were different to every employer, it may cause biasness. It may also be different to come up with the most appropriate person for the job since most of the interviewers have different opinions about the performance of the candidate. Some people tend to like certain

Pablo Casals Essay Example for Free

Pablo Casals Essay Pablo Casals, one of the most recognizable cellists in history, was born December 29, 1876. His career was unsurpassed by any other cellist during the first half of the twentieth century. He is known for the multiple recordings throughout his career which included solo, chamber, and orchestral music, as well as recordings while conducting. For most cellists his most notable accomplishment was his recordings of the incomparable Bach Cello Suites which were recorded from 1936 to 1939. His early years in his native Catalonia, Spain were spent being educated in music by his father who was a parish organist and choirmaster. As would be clearly seen in his later years, his understanding of music was amazing. Today his master classes on the cello are available for cellists to observe on YouTube. His ability to demonstrate proper tempo and rhythm as well as the use of dynamics is still a benefit even in the age of famous cellist, YoYo Ma His father’s techniques included he and his brother listening to, and name notes on the piano by ear. Although his father’s methods may have seemed extreme, they served only to further young Pablo’s musical ability. By the age of four he was playing the flute, piano and violin and by age six was proficient enough to perform a public solo on the violin. It is amazing to know that his first exposure to any cello like instrument was that of a street performer that had been fashioned from a broom handle! His first personal experience with the cello was much like my own. At fourteen I asked for a cello and was allowed by my father to borrow a very broken down cello. Casals was given an instrument made from a gourd by his father as his first cello. When he was eleven he heard some travelling performers and saw a real cello for the first time. After that, the cello was his instrument of choice. Although I play other instruments, as Casals did, it was hard to deny that I wanted to be known as â€Å"a cellist†! The Cello Suites composed by J. S. Bach were discovered by Casals in 1890 in a second hand music store. He was thirteen at the time and spent the next thirteen years practicing and perfecting them and then finally performing them in public. He graduated with honors from Escola Municipal de Musica in Barcelona, having made impressive progress, at age nineteen. His professional career began when he moved to Paris in 1895 and played second cello in a theater orchestra. In 1895 he returned home to Catalonia and was appointed to the faculty of his own Escola Municipal de Musica. He was also made principal cellist in the orchestra of Barcelonas opera house, the Liceu and in 1897 he performed as soloist with the Madrid Symphony Orchestra, and was awarded the Order of Carlos III from the Queen of Spain. His later career found him conducting master classes, as mentioned earlier, throughout the world. Some of the master classes were actually televised in the 1960’s and are still available for budding cellists. It was at this point in his career that he created unique versions of the six Brandenburg Concerti. To add this to his already amazing recordings of the Bach Suites truly showed the depth of his musical abilities! In addition to performing remarkable renditions of famous pieces he was a wonderful composer in his own right. One of his most notable works was La Sardena, composed for a cello ensemble. The completion of his composing career was a piece titled â€Å"Hymne of the United Nations† which he performed in 1971, at a special event, for the United Nations shortly before his 95th birthday. Looking back with appreciation to a man who died many years before I was born, I am humbled by his talent and personality. He had the opportunity to perform before queens, presidents and dignitaries. His performances took him around the globe and his influence is felt to this day. His unique recordings and master classes continue to inspire and delight cellists and cello music lovers alike. In 1963 the world lost PabIo Casals at the age of 96 while residing in Puero Rico where he was buried. I am happy to say that I have been fortunate enough to observe a number of his master classes and hear recordings done almost a century ago that have stood the test of time.

Monday, October 14, 2019

Multi-keyword Ranked Search Over Encrypted Cloud Data

Multi-keyword Ranked Search Over Encrypted Cloud Data Now a days cloud computing has become more popular, so more information possessors are actuated to their information to cloud servers for great convenience and less monetary value in data management. However, sensible information should be encrypted before outsourcing for public. In this paper the problem of a secure multi-keyword search on cloud is solved by using encryption of data before it actually used. Which are continuously supports dynamic modify operation like insertion and deletion of the documents. Keywords: Cloud Computing, Ranked based search, Download frequency, Multikeyword search, Encrypted cloud data, Synonym query. Introduction Cloud computing has become new model which handles large resources of computing. Services provided by the cloud computing is storage and on demand services, both the individuals and organizations are motivated to the cloud. Instead of purchasing software and hardware devices. Cloud provides secure online storage and there is no loss of data, the data is available at anytime and anywhere. Paper shows the general approach for data protection is to encrypt the data by using AES algorithm. The simple method for downloading data is decrypts it locally, because consumers want to search needed data rather than all. In this way it is essential to investigate a productive and successful search benefit over encrypted outsourced information. The current search approaches like ranked search, multi-keyword search that empowers the cloud clients to locate the most pertinent information rapidly. It likewise decreases the system activity by sending the most important information to client asks. However, in genuine search situation it may be conceivable that client searches with the equivalent words of the predefined keywords not the correct keywords, because of absence of the clients correct information about the information. LITERATURE SURVEY Zhangjie Fu, Xingming Sun, Nigel Linge and Lu Zhou [2] proposed a successful way to deal with take care of the issue of multi-keyword ranked search over encrypted cloud information supporting synonym queries. To address multi- keyword search and result positioning, Vector Space Model (VSM) is utilized to build document index that is to  state, each document is communicated as a vector where each dimension value is the Term Frequency (TF) weight of its comparing keyword. Another vector is additionally produced in the question stage. The vector has a similar dimension with document index and its each dimension value is the Inverse Document Frequency (IDF) weight. At that point cosine measure can be utilized to register comparability of one document to the search inquiry. To enhance search proficiency, a tree-based index structure which is an adjust paired tree is utilized. C. Wang, N. Cao, J. Li, K. Ren, and W. Lou [3] developed the Ranked search that increases system usability by returning the relevant files in a ranked order.(e.g., keyword frequency). In this state-of-the-art searchable symmetric encryption (SSE) security definition used for increasing its efficiency. They have also proposed the existing cryptographic primitive, order preserving Symmetric encryption (OPSE) for searching matching files. W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou [5] proposed a method to address the problem of similarity-based ranking is privacy-preserving multi-keyword text search (MTS) scheme. They also presented the search index based on the vector space model, i.e., cosine measure, and TF IDF weight to achieve high level of search accuracy and to support a multi-keyword queries with search ranking functionalities. PROBLEM STATEMENT Many associations and organizations store their more significant data in cloud to protect their information from infection and hacking. The advantage of new computing is it looks deeply for cloud clients. Rank search enhances framework ease of use by ordinary coordinating records in a ranked arrange with respect to certain importance criteria (e.g. Keyword and download frequency). As straight forwardly outsourcing significance scores will trickles a great deal of delicate data against the keyword security, to solve this problem we proposed asymmetric encryption with ranking consequence of query information which will give just expected information. Proposed System Fig. 1. System Architecture of Multi-Keyword Ranked Search Over Encrypted Cloud Data. Keyword Expansion To enhance the accuracy of search results, the keywords are removed from outsourced content documents required to be stretched out by regular synonyms or comparable words, as cloud customers, searching information may be the synonyms of the predefined keywords. Upload Encrypted Data After expansion of keywords the data owner assist data with encrypting the document utilizing AES Algorithm and after that upload the encrypted document to the cloud for storage reason. This permits data owner to store their secret key in extremely secure way without presenting it to the clients of framework. For this, secret key is put away again in encrypted frame. Search Module This module helps clients to enter their query keyword to get the most important documents from set of uploaded documents. This module recovers the documents from cloud which coordinates the query keyword. Rank Generation In data recovery, a positioning capacity is as a rule used to assess relevant scores of coordinating documents to a demand. The rank capacity in view of the term recurrence (TF) and converse document recurrence (IDF) is utilized as a part of expanded organize i.e. TF-IDF. Additionally this framework gives client most mainstream documents for their keywords by examining history of most downloaded documents for specific inquiry keywords. Download Ranked Results Clients can download the resultant arrangement of documents just if he/she is approved client who has allowed consent from data owner to download specific document. Owner will send encrypted secret key and session key to client to decrypt the document. Methodologies AES algorithm AES is an iterative instead of Feistel cipher. It depends on substitution-permutation network. It contains an arrangement of linked operations, some of which include supplanting inputs by particular yields (substitutions) and others include rearranging bits around (permutations). Strangely, AES plays out every one of its calculations on bytes instead of bits. Steps for AES algorithm: Create a random key for symmetric encryption of user facts. Encrypt the records the use of this random key. Encrypt the random key the use of asymmetric encryption. Send the encrypted message and the encrypted key to the receiver of searched results. Henceforth, AES treats the 128 bits of a plaintext obstruct as 16 bytes. These 16 bytes are organized in four columns and four rows for preparing as a matrix. TF-IDF TF: TF (t) = (Number of times term t appears in a document) / (Total number of terms in the document). IDF: IDF (t) = log_e (Total number of documents / Number of Documents with term t in it). CONCLUSION The multi-keyword ranked methodology results in the more effective search handle which diminishes the network traffic and download bandwidth. It gives back the precisely matched documents, and also the records which incorporate the terms semantically significant to the question keyword. It offers fitting semantic separation between terms to achieve the question keyword expansion. The encryption has been executed to ensure the security also, efficiency of information, before it is outsourced to cloud, and gives protection to datasets, indexes and keywords. REFERENCES [1] Zhihua Xia, Xinhui Wang, Xingming Sun, Qian Wang,A Secure and Dynamic Multi-keyword Ranked Search Schema over Encrpted Cloud Data, IEEE Transactions On Parallel And Distributed Systems,Vol:PP No:99 ,Year 2015 [2] Zhangie Fu, Xingming Sun, Nigel Linge, Lu Zhou, Achieving Effective Cloud Search Services: Multi-Keyword Ranked Search Over Encrypted Cloud Data Supporting Synonym Query, IEEE Transactions On Consumer Electronics, Vol 60, No. 1, February 2014 [3] C. Wang, N. Cao, J. Li, K. Ren, and W. Lou, Secure ranked keyword search over encrypted cloud data,Proceedings of IEEE 30th International Conference on Distributed Computing Systems (ICDCS), pp. 253-262,2010. [4] Q. Chai, and G. Gong, Verifiable symmetric searchable encryption for semi-honest-but-curious cloud servers, Proceedings of IEEE International Conference on Communications (ICCà ¢Ã¢â€š ¬Ã… ¸12), pp. 917-922, 2012. [5] W. Sun, B. Wang, N. Cao, M. Li, W. Lou, and Y. T. Hou, Privacy preserving multi-keyword text search in the cloud supporting similarity based ranking, ASIA CCS 2013, Hangzhou, China, May 2013, ACM pp. 71-82, 2013.

Saturday, October 12, 2019

e-mail and electronic mail :: essays research papers

The Hacker It was a lonely Saturday night. The wind was howling through the branches of the old oak tree outside my window. The branches swayed back and forth, creating faint tapping and screeching sounds on the glass. And so, I sat†¦ It was a night like any other; my music playing in the background and the room was illuminated only by the changing shades of green from my lava lamp. I waited. Suddenly, a came from the system unit of my computer, signalling that it was ready. I sat in my big leather chair, leant forward, and logged on. Immediately, the computer went through a series of programmes, checking the system was operating correctly, and so on. The status bar reached 100% and the computer was now ready for action. I sat with the bright glare in my eyes. The once room, once light by a perpetually changing shade of green, was now light up with a brilliant sky blue. â€Å"Good evening, Dave. Would you like me to log on to the Internet?† It was a synthesised voice coming from the computer. It was a voice interface I had made by piecing together things my girl friend had said. I had it on the computer to remind me of her, and to give me hope that one day I would see her again. â€Å"Hmm†¦yeah, log me on.† I said. My voice was grotty and weak. Although I had a voice interface, I rarely spoke, even though I used my computer 24/7, I’d normally use the keyboard and mouse. Still, having a voice interface was pretty nifty, but I couldn’t help but think that one day, it may not recognise my voice†¦.it was getting worse by the day. The modem clicked. â€Å"Log on complete. Have a nice day.† It said. I almost broke down. I hadn’t heard this voice for some time†¦.it brought back memories. I had forgotten what she sounded like†¦She? My god! I’d started to think that this machine was my girl friend. ‘The late nights must be getting to me.’ I thought â€Å"Thanks.† I said. I could hardly stand it†¦it felt like there was a rock in my throat; you know the one I mean? When you’re upset and you feel like your going cry? Well, anyway, I cracked my knuckles, for no reason what so ever, knowing full well it could give me premature arthritis.

Friday, October 11, 2019

Comparing Women in House on Mango Street and Woman Hollering Creek Essa

Ethnic Identity of Women in House on Mango Street and Woman Hollering Creek  Ã‚      The novels The House on Mango Street (Cisneros 1984) and Woman Hollering Creek (Cisneros 1992) relate the new American through the eyes of Cisneros. The women in both novels are caught in the middle of their ethnic identity and their American identity, thus creating the "New American." Cisneros moved between Mexico and the United States often while growing up, thus making her feel "homeless and displaced" (Jones and Jorgenson 109). The House on Mango Street characterizes a community of girls and women restricted in their movements within the barrio. The roles of these girls and women are translated through the eyes of a child. When women in the barrio are confined, they can become a victim of abuse due to male domination. Women are confined to interior spaces in addition to their domestic roles as daughters, wives, and mothers. They live inside the barrio, but desire to escape and live outside the barrio. In addition, women can escape their restricted lifestyle by receiving an education. Esperanza, the child narrator is the only one who escapes this ethnic lifestyle (Mullen 6). In The House on Mango Street, the vignette "My Name," Esperanza was named after her great grandmother, desires a life outside her interior walls of the barrio. Esperanza’s name means hope in English, while it means sadness and waiting in Spanish. Her great grandmother was wild as a young lady, but was tamed by her Mexican husband. Cisneros states, "She looked out her window her whole life, the way so many women sit with sadness on an elbow . . . I have inherited her name, but I don’t want to inherit her place by the window" (11). Esperanza is proud of her namesake... ...il 1991. 22 Oct. 2000 False&origSearch=true&u=CA&u+CLC&u=DLB>. Mullen, Harryette. "A Silence Between Us Like a Language: The Untranslatability of Experience in Sandra Cisneros’s Woman Hollering Creek." Gale Literary Databases Summer, 1996. 22 Oct. 2000 Galenet.com/servlet/GLD/hit?c=1&secondary=false&orig SearchTrue&u=CA&u+CLC&u=DLB>. Olivares, Julian. "Sandra Cisneros’ The House on Mango Street and the Poetics of Space." Gale Literary Databases 1998. 14 Oct. 2000 <> Servlet/GLD/hits?c=6&secondary=false&origSearch=true& u=CA&†¦=>. "Sandra Cisneros." Contemporary Artists. Vol. 64. 1998. Wyatt, Jean. "On Not Being La Malinche: Border Negotiations of Gender in Sandra Cisneros’s Never Marry A Mexican and Woman Hollering Creek." Gale Literary Databases Fall 1995. 22 Oct. 2000 .    Comparing Women in House on Mango Street and Woman Hollering Creek Essa Ethnic Identity of Women in House on Mango Street and Woman Hollering Creek  Ã‚      The novels The House on Mango Street (Cisneros 1984) and Woman Hollering Creek (Cisneros 1992) relate the new American through the eyes of Cisneros. The women in both novels are caught in the middle of their ethnic identity and their American identity, thus creating the "New American." Cisneros moved between Mexico and the United States often while growing up, thus making her feel "homeless and displaced" (Jones and Jorgenson 109). The House on Mango Street characterizes a community of girls and women restricted in their movements within the barrio. The roles of these girls and women are translated through the eyes of a child. When women in the barrio are confined, they can become a victim of abuse due to male domination. Women are confined to interior spaces in addition to their domestic roles as daughters, wives, and mothers. They live inside the barrio, but desire to escape and live outside the barrio. In addition, women can escape their restricted lifestyle by receiving an education. Esperanza, the child narrator is the only one who escapes this ethnic lifestyle (Mullen 6). In The House on Mango Street, the vignette "My Name," Esperanza was named after her great grandmother, desires a life outside her interior walls of the barrio. Esperanza’s name means hope in English, while it means sadness and waiting in Spanish. Her great grandmother was wild as a young lady, but was tamed by her Mexican husband. Cisneros states, "She looked out her window her whole life, the way so many women sit with sadness on an elbow . . . I have inherited her name, but I don’t want to inherit her place by the window" (11). Esperanza is proud of her namesake... ...il 1991. 22 Oct. 2000 False&origSearch=true&u=CA&u+CLC&u=DLB>. Mullen, Harryette. "A Silence Between Us Like a Language: The Untranslatability of Experience in Sandra Cisneros’s Woman Hollering Creek." Gale Literary Databases Summer, 1996. 22 Oct. 2000 Galenet.com/servlet/GLD/hit?c=1&secondary=false&orig SearchTrue&u=CA&u+CLC&u=DLB>. Olivares, Julian. "Sandra Cisneros’ The House on Mango Street and the Poetics of Space." Gale Literary Databases 1998. 14 Oct. 2000 <> Servlet/GLD/hits?c=6&secondary=false&origSearch=true& u=CA&†¦=>. "Sandra Cisneros." Contemporary Artists. Vol. 64. 1998. Wyatt, Jean. "On Not Being La Malinche: Border Negotiations of Gender in Sandra Cisneros’s Never Marry A Mexican and Woman Hollering Creek." Gale Literary Databases Fall 1995. 22 Oct. 2000 .   

Handwashing Related Literature

There are grave consequences when people do not wash their hands or wash them improperly. It is known that hands are the main media for contaminants getting to people, whether the infections are airborne, oral or tactile. Infectious diseases that are commonly spread through hand to hand contact include the common cold, and several gastrointestinal disorders such as diarrhoea (WaterAid, 2006). Human hands usually harbour microorganisms both as part of a person’snormal microbial flora as well as transient microbes acquired from the environment (Lindberg et al, 2004).According to Kartha (200! ), many people consider handwashing a waste of time. However, they are unaware that hands are hosts to many bacteria and viruses that can cause infectious diseases. Every human being comes in contact with germs and bacteria in their daily life. These harmful microorganisms are present all around – on door knobs, faucets, light switches, tables, and railings. People touch these things during the day while doing their routine work without much thought, and then touch their face, eyes, nose, and sometimes eat food too.Through these acts, the microorganisms get into the body, causing several diseases. People, who are careless at washing hands, risk catching flu, or cold, or any gastrointestinal illness (Kartha, 2001). Mayo Clinic (2009) also asserted that as people touch one another, surfaces and objects throughout the day, they accumulate germs on their hands. In turn, they can infect themselves with these germs by touching their eyes, nose or mouth. Hands serve as vectors transmitting pathogens to foodstuffs and drinks and to the mouths of susceptible hosts (Huttly, 1997).Many food borne diseases and pathogenic microorganisms are spread by contaminated hands. If pathogens from human faeces enter a person’s mouth, they will cause diarrhoea. School going children are exposed to greater risks of diarrhoeal disease by consuming contaminated water and food (Dasg upta, 2005). Students in schools or colleges are more likely to take meal and water without washing hands and may be exposed to risk of infection (Tambekar et al, 2007). If proper treatment is not given, this can prove fatal, particularly to children (WHO, 2006).In Ghana, funeral celebrations are very important social functions at which hundreds of people gather. From experience, one important activity during such gatherings is handshaking. Indeed, it is considered offensive and disrespectful for cultural values when one does not proffer his hand for shaking. It is however unfortunate that when people are served snacks and food during such occasions, handwashing facilities are not made available. People therefore eat with unwashed hands.The advent of some serious gastrointestinal illnesses (for example, cholera) had been traced to such gatherings. Handwashing defined Handwashing is defined as the act of cleansing the hands with water or other liquid, with or without the inclusion of soap or other detergent, for the purpose of removing soil or microorganisms (Biology-online, 2011; Medconditions, 2011). 2. 6. 1 Attitudes of handwashing Handwashing has been an age old practice globally. It is carried out for varied reasons, including religious, cultural, health and moral reasons.Attitudes towards handwashing are very important. They go a long way to determine the practice of handwashing and its effect on health. In a study by Hoque et al (1995), 90 women from randomly selected households in rural Bangladesh were observed washing their hands after defaecation. Thirty-eight percent of the women used mud, 2% used ash, 19% used soap, and 41% used water only without a rubbing agent. A total of 44% of women washed both hands, while 56% washed only their left hands.About 78% of the women dried or wiped their hand on their clothes and the rest let them air dry. According to SHEWA-B (2007), in Bangladesh (and in some regions of the sub-continent), observations on handwash ing practices identified that handwashing with water alone before food preparation and eating was quite common (47 – 76%), but washing hands with soap or ash was observed =2% of the time. Washing of both hands with soap or ash was more common after defaecation (17 – 18 %), after cleaning a child’s anus (22 – 24%) or after handling cow dung (12 – 20%).Findings also showed that availability of handwashing materials such as soap, ash or mud at the site of handwashing was low, with approximately 30%, and =1% of households having the specified material. Water availability was high. Hand drying was observed to take place before preparing food, after defaecation, after eating and before serving food. A high proportion of females did not dry their hands after handwashing. A staggering one out of three Americans skips handwashing after going to the bathroom.Only 30% of people who have coughed or sneezed into their hands wash their hands afterwards. Kids are even worse. In a survey of junior high and high school boys and girls, only 58% of girls and 48% of boys washed up after using the rest room (Wisegeek. com, 2011). Worldwide rates of handwashing with soap are very low. While many wash their hands with water, only a small percent use soap at critical times. In Ghana, for example, the rates for handwashing with soap after defaecation is 3% and after cleaning up a child is also 3% each (PPPHW, 2010). 2. 6. Economic considerations Efforts to modify human behaviour are complex. People can only expect to be successful if there is an understanding of what motivates, facilitates, and hinders adequate handwashing behaviour (Curtis et al, 1997; O’Boyle et al, 2001). Curtis et al (2001) noted that modern methods of promoting handwashing can be effective and cost-effective on a large scale. Studies suggest that soap is widely available, even in poor households in developing countries, although it is mostly used for bathing and washing c lothes (Borghi et al, 2002).In rural India and Bangladesh, soap is often considered a beautifying agent or for the physical feeling of cleanliness which it gives, rather than being associated with the removal of microorganisms or health benefits (Hoque and Briend, 1991; Hoque et al, 1995). In low income communities, soil, mud or ash may be used as a zero cost alternative to soap for handwashing (Zeitlyn and Islam, 1991). Hoque et al (1995) again reported that altogether, 81% of non-soap users stated that they might use soap, but were unable to afford it. Critical times for handwashingA defensive strategy is important when trying to avoid infecting oneself with an illness lying in wait (Wisegeek. com, 2011). According to Mayo Clinic (2009), frequent handwashing is one of the best ways to avoid getting sick and spreading illness. Although it is impossible to keep hands germ-free, washing hands frequently can help limit the transfer of bacteria, viruses and other microbes. It is possib le that people do not wash their hands as often as they should. Handwashing prevents both diarrhoea and respiratory infections effectively whendone properly and at critical times.The critical times must be observed and conscious efforts made to clean hands at such times. A number of sources (Mayo Clinic, 2009; ASH, 2011, All Family Resources, 1999 and CDC, 2010) agree on a number of critical times when hands must be washed. The critical times include: ? Before preparing food; ? Before eating; ? Before treating wounds or giving medicine; ? Before touching a sick or injured person; ? Before inserting or removing contact lenses; ? After preparing food, especially raw meat or poultry; ? After using the toilet/bathroom; ? After changing a diaper; After touching an animal, or animal toys, leashes or waste; ? After blowing your nose, coughing or sneezing into your hands; ? After touching a sick or injured person; ?After handling garbage or something that could be contaminated, such as a cl eaning cloth or soiled shoes; ? Whenever hands look dirty. Some include also washing hands after handling money (ASH, 2011), before going home, immediately one gets home, on arrival at the workplace (All Family Resources, 1999), after combing hair (USDA, 2011) and after smoking (Earth’s kids, 2011). . 6. 4 Process of handwashing Though people know the importance of handwashing, not many know how to do it properly. Handwashing does not mean just running water over your palms. It has to be done very carefully and in detail (Kartha, 2001). Mayo Clinic (2009) suggests the following steps: ? Wet hands with (running) water; ?Apply cleansing agent; ? Lather well; ? Rub hands vigorously for at least 10 to 20 seconds, remembering to scrub all surfaces, including the backs of hands, wrists, between fingers and under fingernails; ? Rinse well; Dry hands with a clean or disposable towel or dryer. The above steps have been advocated by several sources as well. These include ASH (2011); Al l Family Resources (1999); CDC (2010); Kartha (2001); Wisegeek. com (2011) and Gavin (2011). 2. 6. 5 Correct length of time Equally important is the length of time that hands are to be washed. The key is to lather up hands and rub vigorously for at least 15 to 20 seconds. Some suggest singing ‘Happy Birthday’ or the ABCs to keep a child washing hands for the correct amount of time (Wisegeek. com, 2011).Earth’s Kids (2011) suggested that children sing a fun song while washing hands to mark the time of 15 – 20 seconds, so that they know how long they wash. Gavin ((2011) said to use soap and lather up for 20 seconds. Mayo Clinic (2009) noted that wet, soapy hands should be rubbed together outside the stream of running water for at least 20 seconds. CDC (2010) suggested scrubbing hands for 20 seconds, and while singing ‘Happy Birthday’ twice to get to 20 seconds. PPPHW (2008) also suggested singing any local fun song that would make up to 20 secon ds while hands are being rubbed together after applying cleansing agent.According to ASH (2011), hands must be rubbed together for at least 10 seconds while singing ‘Happy Birthday’ once for a perfect length of time. Rub hands vigorously until a soapy lather appears and continue for at least 15 seconds (All Family Resources, 1999). Mohave County Information Technology (2001) also recommends rubbing hands briskly for at least 20 seconds. From the foregone discussions it can be seen that rubbing hands together vigorously for anytime between 10 to 20 seconds or more should be adequate for pathogen reduction on the hands. Quantity of water needed for rinsing handsAccessible and plentiful water has been shown to encourage better hygiene, particularly handwashing (Curtis and Cairncross, 2000). Also, interventions to improve water quality at the source along with treatment of household water and safe storage systems have been shown to reduce diarrhoea incidence by as much as 4 7% (WHO, 2008). Hoque et al (1995), in a study, observed that as many as 74% of the 90 women rinsed their hands with 0. 7 litre of water or less. They however recommend that rinsing with 2 litres of clean water was protective, although such volumes may be difficult tosustain in the absence of on-plot access to water.Since pathogens removed during handrubbing have to be rinsed away, there must be a reasonable flow of water (Standard Operating Procedures, 1997). Mayo Clinic (2009) suggested the use of running water for rinsing hands. Water scarcity has an impact on hygiene practices such as handwashing. It could lead to person-to-person transmission due to inadequate personal and domestic hygiene. Water scarcity can therefore result in faecal-oral, skin and eye infections (Cairncross, 2011). Temperature of waterContrary to popular belief, scientific studies by Michaels et al (2002), and Laestadius and Dimberg (2005), have shown that using warm water has no effect on reducing the micro bial load on hands. Hot water that is comfortable for washing hands is not hot enough to kill bacteria. Microorganisms proliferate much faster at body temperature (37 degrees C). However, warm, soapy water is more effective than cold, soapy water at removing the natural oils which hold soils and bacteria (US Food and Drugs Administration, 2006). All Family Resources (1999) indicated that warm water should always be used for handwashing.ASH (2011), Kartha (2001), Wisegeek. com (2011) and Gavin (2011) also suggested the use of warm water for handwashing. CDC (2010) said that clean running water that was warm or cold could be used. The temperature of water has not been shown to be important in handwashing (Standard Operating Procedures, 1997). Efficacy of cleansing agents in microbial reduction Esrey et al (1991) have suggested that reducing the rate of pathogen ingestion causes the incidence of severe infections to begin to fall before that of mild ones. The reduction in the severity of infection is the ultimate purpose of handwashing.Therefore microbial reduction on hands would reduce the ingestion of pathogens since the hands have been proved to be the main transport route for gastrointestinal diseases, respiratory tract infections, skin infections (eg. impetigo) as well as eye infections (eg. conjunctivitis). This makes the agent employed in handwashing a necessary factor. Water only Pure water has a pH of seven, which makes it neutral. It is also known as a universal solvent. A number of studies (Cairncross, 1993; Ghosh et al, 1995; Khan, 1982; Oo et al, 2000) suggested that handwashing with water only provides little or no benefit.The application of water alone is inefficient for cleaning skin because water is often unable to remove fats, oils and proteins, which are components of organic soil (Standard Operating Procedure, 1997). Kalanke (Mali) (2011) noted that handwashing with water alone does not remove many germs. Hoque and Briend (1991), on the contra ry, showed that whilst less effective than when using a rubbing agent such as soap, mud or ash, some reductions in contamination were found when washing with water alone.Data on the effectiveness of handwashing with soap-based formulations, compared with water alone, in the removal of bacteria and viruses (Ansari et al, 1989; Mbithi et al, 1993) suggest that, in most (but not all) cases, liquid soap-based formulations were more effective than water only. However, the authors concluded that the differences were not statistically significant. Ash Hoque and Briend (1991) indicated that the use of alternative rubbing agents (mud or ash) provided the same benefits as soap.Again, Hoque et al (1995) also found that the use of ash and soap all achieved the same level of cleanliness. Ash, however, is considered less pleasant on the hands compared with soap or soil (Hoque and Briend, 1991). Despite the positive lifesaving potential of handwashing with soap (ash), proper handwashing is not bei ng practiced regularly by children in schools and homes (WASH United, 2010). Citrus lime fruit Scientifically known as Citrus aurantifolia, there are two natural groups of the citrus lime fruit – acid (sour) limes, and acidless (sweet) limes.The ‘West Indian’ lime, also called Mexican and Key lime is round, small-fruited, moderately seedy and highly polyembryonic; it has a thin, smooth rind, greenish flesh and a citric acid content ranging from 7% to 8%. It is usually grown as a seedling, as no satisfactory rootstock is known, but in Ghana it is grown on Rough lemon stock (Samson, 1986). Soap A number of studies indicate that washing hands with soap is the critical component of the handwashing behaviour (Cairncross, 1993; Ghosh et al, 1997; Khan, 1982; Oo et al, 2000). Kartha (2001) noted that the most essential thing required to wash hands is soap.Again, studies have shown that hands can carry faeces to surfaces, to foods, and to future hosts, and handwashing wi th soap is effective in removing pathogens (Han et a. , 1986; Kaltenthaler et al, 1991; Ansari et al, 1991). Improvements in access to safe water and adequate sanitation, along with the promotion of good hygiene practices (particularly handwashing with soap), can help prevent diarrhoea (Black et al, 2003). PPPHW (2011) affirmed that promoted on a wide enough scale, handwashing with soap can be thought of as a ‘do- it-yourself’ vaccine. Choice of soapDebate has been ongoing about the best type of soap to be used in handwashing. A study by Aiello (2007) indicated that plain soaps are as effective as consumer-grade antibacterial soaps in preventing illness and removing bacteria from the hands. Mayo Clinic (2009) admonished people to keep in mind that antibacterial soap is no more effective at killing germs than is regular soap. Using antibacterial soap may even lead to the development of bacteria that are resistant to the products’ antimicrobial agents – maki ng it harder to kill these germs in the future.Commenting on favoured features for soap, women in Ghana cited a range of attributes – smell, cost, texture and durability, and its capacity to be used for multiple purposes. For the women, the most important attribute was the smell of the soap, andthe most popular scents were mild lime and lemon. Concerning cost, cheaper soaps were preferred, although women were sometimes willing to pay more if the soap was larger or they thought it would last longer. Commenting on texture / durability, associated with cost, women preferred harder bar soaps or liquid varieties as they thought they lasted longer.So strong was the preference for hard soaps that many stored soap in cool or sunny or airy places to harden them before use. Some women thought liquid soap more economical since only a peanut size was adequate for each hand wash. Many women preferred laundry bar soap because it could be used as a multipurpose soap such as for laundering, bathing and washing dishes at the same time (PPPHW, 2010). The act of handrubbing It has been suggested by Hoque et al, (1995) that the key component of the handwashing process is the mechanical rubbing of the hands.They noted that the trend towards better results from handwashing with both hands, increased frequency of rubbing and an increased volume of rinsing water all support the prime importance of scrubbing / frictional motion and consequent washing out of loose bacteria with water. Although results of studies carried out suggest that the use of a rubbing agent is important, the authors suggested that the nature of the rubbing agent is a less important factor. Soap, they indicated, was more effective than soil and ash because soap users tend to rub their hands more and use more water to rinse away the soapy feeling on them.CDC (2011) advised people to rub hands together vigorously to make a lather and to continue scrubbing for 20 seconds because it takes that long for the soap and scrubbing action to dislodge and remove stubborn germs. Beneficial effects of handwashing Handwashing has been regarded as a key infection-control practice since Semmelweis suggested its introduction in health care settings (Semmelweis, 1847 in Koo, 2008). The handwashing behaviour has been shown to cut the number of child deaths from diarrhoea (the second leading cause of child deaths) by almost half and from pneumonia (the leading cause of child deaths) by one-quarter (WHO, 2008).The strong causal relationship between hand hygiene and gastro-intestinal disease risk has also been demonstrated by meta-analysis of community based interventions. Curtis and Cairncross (2003) estimated a reduction of 42 – 47% in diarrhoeal diseases associated with handwashing. Fewtrell et al (2005) showed a 44% reduction in diarrhoeal illness associated with handwashing. In a study, Aiello et al (2008) estimated that handwashing with soap combined with education could produce a 39% reduction in gastrointestinal illness. All the three meta-analyses were carried out using data from studies conducted in both developed and developing countries.In a review of hand hygiene studies involving respiratory tract infections, Rabie and Curtis (2006) reported that hand hygiene (handwashing, education and waterless hand sanitizers) can reduce the risk of respiratory infections by 16%. Aiello et al. (2008) also estimated that the reduction in respiratory illness associated with the pooled effects of hand hygiene (handwashing with soap, use of alcohol handrubs) was 21%. A study conducted by Luby et al (2005) reported the impact of handwashing with soap on pneumonia in children under five, in squatter settlements in Karachi, Pakistan.The results indicated a 50% reduction in pneumonia in the intervention compared with the control group. Luby et al noted that a link between handwashingand the prevention of pneumonia in developing countries is plausible on the basis that, in developing co untries it is known that viruses cause pneumonia. Another study found that children under 15 years living in households that received handwashing promotion and soap had half the diarrhoeal rates of children living in control neighbourhoods (Luby et al, 2004).Because handwashing can prevent the transmission of a variety of pathogens, it may be more effective than any single vaccine. Handwashing can also prevent skin infections (eg. impetigo), eye infections (eg. conjunctivitis), intestinal worms, Severe Acute Respiratory Syndrome (SARS), and Avian Flu. It benefits the health of people living with HIV/AIDS. Handwashing is effective in preventing the spread of disease even in overcrowded, highly contaminated slum environments (PPPHW, 2008).