Saturday, August 31, 2019

Managing human resources

Any person, who has a physical impairment that substantially limits one or more major life activities, has a record of such impairment or is regarded as having such impairment or is regarded as having such impairment. It involves heaving, mobility, visual impairment, chronic alcoholism, and chronic mental illness. From the article it is necessary to provide assistance to individuals with disabilities to lead a productive life. People with disabilities are of ten unable to obtain health care insurance that provides coverage of the services and supports to enable them to live independently and enter or rejoin the workforce. Personal assistance services such as attendant services, assistance with transportation to and from work, reader services, job coaches and related service may remove barriers between significant disability and work. A company should have a proper policy in dealing with employees with disabilities. They should be treated as equals at the workplace who also are able to deliver services like those ones without disabilities specialized training should be conducted by the company management to thoroughly equip those with disabilities in order to handle any type of job at the workplace. For individuals with disabilities the fear of losing health care and related services is one of the greatest barriers keeping individuals from maximizing their employment, earning potential and independence. On December 1999 President Clinton signed a law that encouraged states to adopt the option of allowing people with disabilities acquire medical coverage that is vital to enable such individuals to maintain employment. In short people with disabilities may have functional limitations that may create barriers in employment e.g. acquiring requisite education, experience and expertise to perform essential functions of a job but maybe unable to perform non-essential job like turning pages without assistance. Employers should assist qualified individuals with disabilities overcome particular barriers to their employment resulting from their functional limitations. Personal assistance services are form of assistance used by persons with disabilities to perform tasks that the person would perform for himself or herself if he/she did not have disability. Personal assistance services include assistance with services that include reading, communication and performing manual tasks e.g. assisting in bathing, eating personal hygiene and dressing. Job related assistance in the performance of such tasks as reading communication and performance of non-essential manual tasks; business related travel maybe considered reasonable accommodations. Many computer users with disabilities especially those with impairments have been left out in recent transition from traditional character based computing to the new graphical user interface (GUI). â€Å"The broad movement toward graphical applications using buttons that cannot be read aloud or translated into Braille has sparked widespread concern among the blind† writes David Wilson in the chronicle of higher education. Sears merchandise troop is establishing an example of act that provides a model for other organizations seeking to provide universal access to InfoTech for employees with disabilities. In 1992 it provided its staff with personal computers running applications in a local area network. Sears identified twelve associates with disabilities who needed accommodations to use the same standard computing resources. Sears goal was to provide universal access to the same technology and applications for all associates. Sears objectives were to allow associates with disabilities use the same G.UI environment and applications as their workgroups, enable adept manager plan and budget for addition of a qualified blind employee of dept of staff; all the company evaluate blind candidates for employment and advancement on equal footing with sighted candidates. The managerial function of staffing, according to G.A. Cole, management theory and practice, (1996) is defined as filling and keeping filled all the positions in the organization structure. This is done by identifying the workforce requirements, inventorying the people available and recruiting, selecting, placing, training and developing, promoting and compensating the job holders that they can accomplish their tasks efficiently and effectively staffing is therefore the process which starts with the human resources needs, recruiting new employees into the organization and continued through separation of employees in the organization and continued through separation of employees n the organization. Recruitment is a major staffing or procurement process. It deals with providing human inputs to the organization it makes it possible for organization to acquire the number and the type of the people necessary to ensure the continued operation of the organization. Recruitment is therefore the process of attracting potential job candidates to apply for vacant positions in the organization that is, it is a searching process. Sources of recruitments include; internal sources which involves recruiting from within the organization through promotion or deployment of qualified personnel. Interviews may also be conducted to select the candidates fro various types of jobs in the organization in the organization. Some of the advantages of sourcing from within the organization are that, it improves employees morale; the employer is in a better position to evaluate the presently employed than outside candidates promotes loyalty among employees for it gives them a sense of job security and opportunity for it gives them a sense of job security and opportunity for advancement, It is less, costly than going outside to recruit, also recruiting from within has little training needed by the employees who are currently serving in the organization, it also promotes a positive organizational culture for example organizational cohesiveness. Some of the disadvantages of recruiting from within are that it leads to in breeding that is organizational stagnation; there is possibility that internal sources may dry-up and may be difficult to find the required personnel from within. External sources of staffing refer to the supply of personnel manpower from sources outside the organization. The sources may include; new entrants to the labor markets for example fresh college graduates; retired experienced persons, presently employed persons from other organization or unemployed already in the labor market with a wide range of skills and ability. Some of the advantages of external sources of recruitment includes the fact that the external sources may provide personnel having skills, training or education required by the organization from external market sources an organization may acquire potential employees who are experienced, trained and does not require extra training for their job hence this may reduce the cost of training to the organization. Employee’s selection according to John Toye, Employment policy, (1975) is the process by which job candidates are assessed or screened to determine their suitability for a given job. The purpose of selection is to help employers secure for evaluating their suitability from the advertised positions. It involves a series of successive hurdles designed to eliminate unqualified applicant at any point in the process that is when facts come to light which may lead to the rejection of candidate. Not all selection process or steps, however, include many barriers. The complexity of any process usually increases with the level and responsibility of the position to be filled. Some of the steps involved in selection includes; preliminary   interviews; selection interviews; employment tests; assessment centers; medical examinations; reference checks and the final selection and the consequent approval by the top managers. According to G.A. Cole, managerial theory and practice (1996) job training can be defined as a short-term process by which skills and capabilities of non-managerial employees are improved, though a system and organized procedure so as to enable them to be more productive an their jobs. Thus, training is job centered or task oriented which is centered with importing specific skills to subordinate staffs. Job development is used with reference to training given to managers and executives in an organization; thus management or executive development is along-term educational growth process by which managerial person and gains and learns conceptual knowledge for general managerial or administrative purposes. The objectives of training and development are that; training improve technical capacity of an individual on job performance, improves health or safety of employees hence industrial, reduces sported work hence less scrap or material wastage. This reduces the cost of production, prepares personal for future jobs challenges an promotions, enables the employers adapt to a change to work method or procedures, enables two employers learn method of operating real machines and equipment ins talked by a organization example a computer. There are various methods of job training such as on-job training which entails looking what your colleague is doing. This is an internal training method commonest mode of training and the most appropriate method of training employees for the skills required for a specific job. This method is very cheap as the learner is in the wok place where he/she s expected to working in, the learner uses the equipment he is expected to use and also he/she is able to learn the rules, procedure under careful company eyes and is able and easier to size them up. Off the job training is done externally. It ensures that special training equipments are available and the training is of higher equipment are available and the training is of higher quality because it is offered by experts, specialists from outside, the trainee is able to learn in a planned stages using special exercise especially in difficult areas of the job. Off the job training is done lectures can be used where a large group is being trained for a short period of time. In order to improve the effectiveness of training, there must be specific objectives for training. An attempt should be made to determine the suitability of a trainee for potentiality and ability. The trainee must be assisted to see the need for the training. Attempts must be made to create organizational conditions that are good or conductive to learning. A good compensation to employees should be administered through wage and salary administration so as to improve the service delivery of employees. Salary and wage administration involves the direction of programs designed to implement payment of monetary/non monetary rewards to employees. The primary financial reward is pay in form of wages and salaries, sometimes referred to as compensation or remuneration. The objectives of employees compensations programs are designed to attract capable employees to the organization, to motivate them towards superior performance, retain their services over an extended period of time. Employee’s performance appraisal should be done to evaluate the performance and give the feedback on which performance adjustment can be made. REFERENCES 1. G. A. Cole Management Theory and Practice (1996) 2. John Toye Employment Policy, (1995) 3. www.annenberg.northwestern.edu/         

Friday, August 30, 2019

Themes in Yeats’ Poetry

Themes in Yeats’  poetry You can find many themes in Yeats’ poetry. Pick what suits your own study from the themes, comments and quotes listed below. There are 86 quotes used to illustrate themes on this page (although some of them are from poems outside the current OCR selection for AS Level). You will need only a short selection of these. 1. The theme of death or old age and what it leaves behind. Death of Patriotism, leaving selfishness as the norm: ‘Romantic Ireland’s dead and gone, It’s with O’Leary in the grave’ [September 1913] Death as useless sacrifice, Home Rule might be granted: ‘Was it needless death after all?For England may keep faith For all that is done and said’ [Easter 1916] A man in old age alienated vibrant youthfulness: ‘The young in one another’s arms, birds in the trees – Those dying generations – at their song’   [Sailing to Byzantium] Death of innocence: ‘ The ceremony of innocence is drowned’ [Second Coming] The self in old age, forsaken by beauty: ‘when I awake some day to find they have flown away’ [Wild Swans] Death chosen out of a sense of despair: ‘A waste of breath the years behind, in balance with this life, this death’ [Airman] Death and destruction during civil war: ‘A man is killed, or a house burned †¦ the empty house†¦Ã¢â‚¬â„¢ [Stare’s Nest] Demise of the Aristocracy and despair at the vanity of human grandeur: ‘We the great gazebo built’ [Memory] Old age and the remnants of a confined life: ‘Picture and book remain’ [Acre] In old age, contempt for the present, defiant admiration for ancestry: ‘Cast your mind on other days That we in coming days may be Still the indomitable Irishry’   [Under Ben Bulben] Facing death with contempt for overstated ceremony: ‘No marble, no conventional phrase’ [Under Ben Bulben] Death provides a sanctuary from conflict and hatred: ‘Savage indignation there Cannot lacerate his breast’ [Swift’s Epitaph] 2. The theme of disintegration, chaos, sudden change: They have gone about the world like wind’   [September 1913] ‘scatter wheeling in great broken rings Upon their clamorous wings’ [Wild Swans] ‘I have looked upon those brilliant creatures, And now my heart is sore. All’s changed’ [Wild Swans] ‘this tumult in the clouds’ [Airman] ‘All changed, changed utterly: A terrible beauty is born’   [Easter 1916] ‘Enchanted to a stone To trouble the living stream’ [Easter 1916] ‘Things fall apart; the centre cannot hold; Mere anarchy is loosed upon the world’ [Second Coming] ‘Consume my heart away; sick with desire And fastened to a dying animal It knows not what it is’   [Sailing to Byzantium] ‘A man is killed, or a house burned, Yet no c lear fact to be discerned’ [Stare’s Nest] 3.Yeats poetry explored nature under four headings: Transience in nature’s beauty: ‘A shadow of cloud on the stream Changes minute by minute’ [Easter 1916] ‘By what lake’s edge or pool Delight men’s eyes when I awake some day To find they have flown away? ’ [Wild Swans] ‘The salmon-falls, the mackerel-crowded seas, Fish, flesh, or fowl, commend all summer long Whatever is begotten, born, and dies’ [Sailing to Byzantium] ‘But a raving autumn shears Blossom from the summer’s wreath’   [Memories] Paradoxically, Yeats saw nature as immortal in comparison to humans: ‘Their hearts have not grown old; Passion or conquest, wander where they will, Attend upon them still. [Wild Swans] The radiance of nature’s beauty: ‘I hear lake water lapping with low sounds by the shore;’ [Inisfree] ‘The trees are in their autumn beauty, Th e woodland paths are dry, Under the October twilight the water Mirrors a still sky’   [Wild Swans] ‘The long-legged moor-hens dive, And hens to moor-cocks call’ [Easter] ‘An acre of green grass For air and exercise’ [Acre] The unattractive side of nature: ‘The bees build in the crevices Of loosening masonry, and there The mother birds bring grubs and flies’   [Stare] ‘while all about it Reel shadows of the indignant desert birds’ [Second Coming] 4. Yeats explored the theme of immortality in various spheres.You can contrast the following quotes and issues with the many quotes and references to mortality highlighted in the quotes for themes one, two and three above. Politics—in a paradoxical way the Rising has changed politics and this force for change has become an immortal and steadfast national symbol: ‘Now and in time to be, Wherever green is worn, Are changed, changed utterly: A terrible beauty is bornâ⠂¬â„¢ [Easter 1916] Natural beauty—the swans as a species are ageless in comparison to Yeats: ‘Their hearts have not grown old; Passion or conquest, wander where they will, Attend upon them still. ’ [Wild Swans] The cycles of history [perpetually repeating millennial patterns]: ‘And what rough beast, its hour come round at last, Slouches towards Bethlehem to be born? [Second Coming] The soul and art transcend time: ‘Once out of nature I shall never take My bodily form from any natural thing, But such a form as Grecian goldsmiths make to sing†¦ Of what is past, or passing, or to come’ [Sailing to Byzantium] 5. The quest for truth is fundamental, whether experienced through the emotional self, reason, imagination or at the expense of sanity. Intuitive truth: ‘I hear it in the deep heart’s core’ [Inisfree] The pursuit of national ideals at the cost of public ridicule: ‘â€Å"Some woman’s yellow hair Has madde ned every mother’s son†: They weighed so lightly what they gave’ [September 1913] Pursuit of beauty and truth by a questioning spirit: ‘Among what rushes will they build, By what lake’s edge or pool Delight men’s eyes when I awake some day To find they have flown away? [Wild Swans] Truth believed in by political fanatics: ‘Hearts with one purpose alone Through summer and winter seem Enchanted to a stone’ [Easter 1916] Truth that is fanatical and yet unemotional: ‘Too long a sacrifice Can make a stone of the heart’ [Easter 1916] Truth that is emotional, imaginative and philosophical: ‘A lonely impulse of delight Drove to this tumult in the clouds; I balanced all, brought all to mind’ [Irish Airman] Truth that is prophetic and yet based on historical cycles: ‘Surely some revelation is at hand; Surely the Second Coming is at hand’ [Second Coming] Cold, rational analysis of falsehood leading to t he truth: ‘We had fed the heart on fantasies, The heart’s grown brutal from the fare; More Substance in our enmities Than in our love’ [Stare] Truth attained through educating the imagination with art: ‘Nor is there singing school but studying Monuments of its own magnificence’ [Sailing to Byzantium] Truth that is philosophical, the wisdom of old age: ‘Dear shadows, now you know it all, All the folly of a fight With a common wrong or right. The innocent and the beautiful. Have no enemy but time’ [Memories] Truth that eludes reason and imagination: ‘Neither loose imagination, Nor the mill of the mind Consuming its rag and bone, Can make the truth known’ [Acre] Contrast between a passionate confession and political truths: ‘And maybe what they say is true Of war and war’s alarms, But O that I were young again And held her in my arms’ [Politics] Truth that is sentimental, defiant, emotional: ‘Cast your mind on other days That we in coming days may be Still the indomitable Irishry’ [Ben Bulben] 6. Yeats had various visions of the model Irish society.Primitive, Celtic, peasant and rural: ‘I will arise and go now, and go to Innisfree, And a small cabin build there, of clay and wattles made’ [Inisfree] Romantic, patriotic and heroic: ‘Yet they were of a different kind, The names that stilled your childish play, They have gone about the world like wind’ [September 1913] Pastoral and aesthetic: ‘But now they drift on the still water, Mysterious, beautiful’ [Wild Swans] Comely and simple: ‘My county is Kiltartan Cross, My countrymen Kiltartan’s poor’ [Irish Airman] Aristocratic, classical and youthful: ‘and speak of that old Georgian mansion, †¦ recall That table and the talk of youth, Two girls in silk kimonos, both Beautiful, one a gazelle’ [Memories] Heroic, feudal and ancestral: ‘Sing the peasa ntry, and then Hard-riding country gentlemen, The holiness of monks, and after Porter-drinkers’ randy laughter; Sing the lords and ladies gay That were beaten into the clay Through seven heroic centuries; Cast your mind on other days That we in coming days may be Still the indomitable Irishry’   [Under Ben Bulben’s Head] 7.Yeats explored conflicting dualities, often counterbalancing the ideal and the real: The beauty of nature versus the sombre monotony of city existence: ‘I hear lake water lapping with low sounds by the shore; While I stand on the roadway, or on the pavements grey’ [Inisfree] The meanness of municipal policy versus the generosity of patriots: ‘For men were born to pray and save: Romantic Ireland’s dead and gone’   [September 1913] Mortality of the self versus immortality of the swan species: ‘And now my heart is sore†¦ Their hearts have not grown old’   [Wild Swans] Major Robert Gregoryâ €™s ambiguous approach to fighting for his country; this involves inversion of emotion: ‘Those that I fight I do not hate, Those that I guard I do not love’ [Irish Airman] The immortality of political heroes versus the fickleness of politics: ‘Yet they were of a different kind, The names that stilled your childish play’ [September 1913] ‘Yet I number him in the song; He, too, has resigned his part In the casual comedy’   [Easter 1916] The inversion of the relationship between commitment and morality: ‘The best lack all conviction, while the worst Are full of passionate intensity’   [Second Coming] Soul versus Body and Nature versus Art: ‘O sages †¦be the singing-masters of my soul.Consume my heart away†¦ Once out of nature I shall never take My bodily form from any natural thing’   [Sailing to Byzantium] Love versus hatred, moral inversion: ‘More substance in our enmities Than in our love†™Â   [Stare] Time versus beauty: ‘But a raving autumn shears Blossom from the summer’s wreath†¦ The innocent and the beautiful Have no enemy but time’   [Memories] Love versus politics as a shaper of human destiny: ‘How can I, that girl standing there, My attention fix On Roman or on Russian Or on Spanish politics’ [Politics] The contemporary versus the historical, the plebs versus the aristocracy, the masses versus ancestors: ‘Base-born products of base beds †¦ Still the indomitable Irishry’   [Under Ben Bulben] Two contradictory positions on the duality of life and death, one neutral, the other favouring death as a refuge from the stresses of life: ‘Cast a cold eye On life, on death’ [Under Ben Bulben] ‘SWIFT has sailed into his rest; Savage indignation there Cannot lacerate his breast’   [Swift’s Epitaph] 8. Yeats made various protests against reality during his life: Alienation from city life in London: ‘While I stand on the roadway, or on the pavements grey’ [Inishfree] Despondency at short sighted and self-serving civic attitudes regarding the 1913 lockout and hypocritical religious devotion: ‘ You have dried the marrow from the bone?For men were born to pray and save: Romantic Ireland’s dead and gone, It’s with O’Leary in the grave’ [September 1913] Hurt at disrespect for the memory of political martyrs: ‘You’d cry, â€Å"Some woman’s yellow hair Has maddened every mother’s son†: They weighed so lightly what they gave’ [September 1913] Disillusionment at war: ‘Those that I fight I do not hate, Those that I guard I do not love;’ [Airman] Disgust at insincere nationalism, patriotic bluster: ‘Being certain that they and I But lived where motley is worn†¦ The casual comedy†¦Ã¢â‚¬â„¢Ã‚   [Easter 1916] Criticism of political fanaticism: ‘Too long a sacrifice Can make a stone of the heart. ’ [Easter 1916] Disillusion at war, lack of civic responsibility and an apocalyptic spiral: ‘Mere anarchy is loosed upon the world, The lood-dimmed tide is loosed, and everywhere The ceremony of innocence is drowned; The best lack all conviction, while the worst Are full of passionate intensity’ [Second Coming] Disenchantment at materialism, hedonism and neglect of art: ‘Caught in that sensual music all neglect Monuments of unageing intellect’ [Sailing to Byzantium] Anger at the inhumanity of political ideologies: ‘We had fed the heart on fantasies, The heart’s grown brutal from the fare: More substance in our enmities Than in our love’ [Stare] Rage at the pettiness of national politics: ‘for men were born to pray and save’ [September 1913] ‘Conspiring among the ignorant’ [Memories] Fierce resistance in old age to the demise of the mind: ‘Grant me an o ld man’s frenzy, Myself must I remake’ [Acre] Mockery of world affairs: ‘How can I, that girl standing there, My attention fix On Roman or on Russian Or on Spanish politics? ’ [Politics] Yeats Fascistic or class hatred against the Irish working class: ‘Scorn the sort now growing up All out of shape from toe to top, Their unremembering hearts and heads Base-born products of base beds’ [Ben Bulben] Dislike of pompous burials: ‘No marble, no conventional phrase’ [Ben Bulben] Contempt for materialistic and unthinking people: ‘Imitate him if you dare, World-besotted traveller’ [Swift]

Unknown

B. Sc. (H) Computer Science 3-YEAR FULL TIME PROGRAMME RULES, REGULATIONS AND COURSES CONTENTS DEPARTMENT OF COMPUTER SCIENCE FACULTY OF MATHEMATICAL SCIENCES UNIVERSITY OF DELHI DELHI – 110007 2010 Semester Systems at the undergraduate level Course of Study: B. Sc. (H) Computer Semester – I CSHT-101 Programming Fundamentals CSHT-102 Discrete Structures Digital Electronics Calculus and Matrices CSHT-203 Data Structures Semester – II CSHT-204 computer Systems Architecture English Calculus and Geometry using C++ Semeser – III CSHT-305 Algorithms CSHT-306 Systems Programmin g CSHT-307 File Structures and Database Basic Probability and Statistics Semester – IV CSHT-408 Operating Systems CSHT-409 Data Communica tion and Computer CSHT-410 Software Engineering Real Analysis / Differential Equations Semester – V CSHT-511 Theory of Computations CSHT-512 Microproces sors CSHT-513 Internet Technologie s Optimization I/ Real Analysis/To be decided by the student Semeser – VI CSHT-614 Computer Graphics CSHT-615 Information Security CSHT-616 Electives Statistical Methodology/ DE/To be decided by the student Electives: 1. Software Testing 2. Artificial Intelligence 3. Network Programming and Administration 4. Data Mining 5. Combinatorial Optimizations Proposed Structure and Syllabi for B. Sc. (H) Computer Science – July 2010 Semester I Coding Title L–T–P Credits Total Marks 100 Pre-requisites CSHT-101 Programming Fundamentals using C++ Discrete Structures Digital Electronics Calculus and Matrices Software Lab based on 101 Lab based on Digital Electronics 5 – 0-0 5 – CSHT-102 ** ** CSHP-101 5 – 0-0 5 100 – 0-0-8 4 100 Semester II Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-203 CSHT-204 ** ** CSHP-202 CSHP-203 Data Structures Computer Systems Architecture EL – II (Language) Calculus and Geometry Software Lab based on 203 Lab based on 204 5 – 0-0 5 –0-0 5 5 101 0-0-8 0-0-4 4 2 100 50 Semester III Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-305 CSHT-306 Algorithms Systems Programming 5-0-0 5 – 0 -0 5 5 101,203 101, 203 CSHT-307 ** CSHP-304 CSHP-305 CSHP- 306 Database Systems Basic Statistics and Probability Software Lab based on 305 Software Lab based on 306 Software Lab based on 307 5–0-0 5 100 101, 203 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester IV Coding Title L–T–P Credits Total Marks 100 100 Pre-requisites CSHT-408 CSHT-409 Operating Systems Data Communication and Computer Networks Software Engineering Real Analysis/ Differential Equations Software Lab based on 408 Software Lab based on 409 Software Lab based on 410 5 – 0-0 5 – 0-0 5 5 101, 203 CSHT-410 ** 5 – 0-0 5 100 101, 203 – CSHP-407 CSHP-408 CSHP-409 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 Semester V Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-511 CSHT-512 CSHT-513 ** CSHP-510 Theory of Computations Microprocessors Internet Technologies Optimization I/Real Analysis/* Software Lab based on 512 5 – 0– 0 5–0-0 5–0-0 5 5 5 01 204 409 0-0-4 2 50 CSHP-511 Lab based on 513 0-0-4 2 50 Semester VI Coding Title L–T–P Credits Total Marks 100 100 100 Pre-requisites CSHT-614 CSHT-615 CSHT-616 ** Computer Graphics Information Security Elective Differential Equations/ Statistical Methodology/* Software Lab based on 614 Softwar e Lab based on 615 Software Lab based on 616 5-0-0 5-0-0 5-0-0 5 5 5 – CSHP-612 CSHP-613 CSHP-614 0-0-4 0-0-4 0-0-4 2 2 2 50 50 50 †¢ To be decided by the student from any discipline * * Will be finalized after the syllabi by the respective departments (Electronics / Mathematics / Statistics / English) are made. CSHT-101 Programming Fundamentals (60 Lectures) Basic Computer Organization: Functional Units, basic I/O devices and storage devices; Representation of integers, real (fixed and floating point), characters (ASCII and Unicode); Basic operations of a programming environment. Problem Solving Approaches: Notion of an algorithm, problem solving using top-down design and decomposition into sub-problems, stepwise methodology of developing an algorithm, methodology of developing an algorithmic solution from a mathematical specification of the problem, use of recursion for problems with inductive characterization. Programming using C++: basic data types; constants and variables, arithmetic and logical expressions, assignment; input-output interface; control structures in conditionals, loops; procedural abstractions; strings and arrays; command line arguments; file handling; error handling. Introduction to the object-oriented programming paradigms; data abstraction and encapsulation — objects and classes; inheritance; polymorphism; Recommended Books: 1. B. A. Forouzan and R. F. Gilberg, Computer Science, A structured Approach using C++, Cengage Learning, 2004. 2. R. G. Dromey, How to solve it by Computer, Pearson Education 1982 3. E. Balaguruswamy, Object Oriented Programming with C++ , 4th Edition, Tata McGraw Hill 1997 4. G. J. Bronson, A First Book of C++ From Here to There, 3rd Edition, Cengage Learning 2005. 5. G. Seed, An Introduction to Object-Oriented Programming in C++, with applications in Computer Graphics Springer 2nd Edition 2001. CSHT 102 Discrete Structures (60 Lectures) Introduction: Sets – finite and Infinite sets, uncountably Infinite Sets; functions, relations, Properties of Binary Relations, Closure, Partial Ordering Relations; counting – Pigeonhole Principle, Permutation and Combination; Mathematical Induction, Principle of Inclusion and Exclusion. Growth of Functions: Asymptotic Notations, Summation formulas and properties, Bounding Summations, approximation by Integrals Recurrences: Recurrence Relations, generating functions, Linear Recurrence Relations with constant coefficients and their solution, Substitution Method, Recurrence Trees, Master Theorem Graph Theory: Basic Terminology, Models and Types, multigraphs and weighted graphs, Graph Representaion, Graph Isomorphism, Connectivity, Euler and Hamiltonian Paths and Circuits, Planar Graphs, Graph Coloring, Trees, Basic Terminology and properties of Trees, Introduction to Spanning Trees Prepositional Logic: Logical Connectives, Well-formed Formulas, Tautologies, Equivalences, Inference Theory Recommended Books: 1. C. L. Liu & Mahopatra, Elements of Discrete mathematics, 2nd Sub Edition 1985, Tata McGraw Hill 2. Rosen, Discrete Mathematics and Its Applications, Sixth Edition 2006 3. T. H. Coremen, C. E. Leiserson, R. L. Rivest, Introduction to algorithms, Prentice Hall on In dia (3rd edition 2009) 4. M. O. Albertson and J. P. Hutchinson, Discrete Mathematics with Algorithms 1988 Johnwiley Publication 5. J. L. Hein, Discrete Structures, Logic, and Computability, Jones and Bartlett Publishers, 3rd Edition, 2009 6. D. J. Hunter, Essentials of Discrete Mathematics, Jones and Bartlett Publishers, 2008 Digital Electronics In consultation with Department of Electronics) Number System and Codes: Decimal, Binary, Hexadecimal, Octal, BCD, Conversions, Complements (1’s and 2’s), Signed and Unsigned numbers, Addition and Substraction, Multiplication Gray and Hamming Codes Logic Gates and Boolean Algebra: Truth Tables, OR, AND, NOT, EXOR, Universal (NOR and NAND) Gates, Boolean Theorems, DeMorgan’s Theorems. Combinational Logic Analysis and Design: Standard representation of logic functions (SOP and POS), Minimization Techniques(Karnaugh Map Method: 4,5 variables). Multiplexers(2:1,4:1)) and Demultiplexers (1:2,4:1), Adder (half and full) and th eir use as substractor, Encoder (8-line-to-3-line) and Decoder (3-line-to-8-line) , Code Converters( Binary to BCD and vice versa). Sequential logic design: Latch, Flip flop, S-R FF , J-K FF, T and D type FFs, Clocked FFs, Registers, Counters (ripple, synchronous and asynchronous, ring, modulus), State Table, State Diagrams and Sequential Machines. A/D and D/A Converters: Successive Approximation ADC, R/2R Ladder DAC. Memories: General Memory Operation, ROM, RAM (Static and Dynamic), PROM, EPROM, EEPROM, EAROM. Suggested Books: 1. Digital Electronics, Principles and Applications, R. L. Tokheim, Tata McGraw-Hill. 2. Digital Principles, R. L. Tokheim, Schaum’s Outline Series, Tata McGraw-Hill. 3. Digital Systems, Principles and Applications, R. J. Tocci and N. S. Widner, Pearson Education Asia. 4. Digital Principles and Applications, A. P. Malvino and D. Leach, Tata McGraw Hill. 5. Digital Design, M. M. Mano, Pearson Education Asia. 6. Digital Fundamentals, T. L. Floyd, Pearson Education Asia. 7. Solved Problems in Digital Electronics, S. P. Bali, Sigma Series, Tata McGraw-Hill. 8. Digital Electronics, W. H. Gothmann, Prentice Hall of India. 9. Modern Digital Electronics, R. P. Jain, Tata McGraw-Hill. CSHT 203 Data Structures (60 Lectures) Introduction: Abstract Data Types, Arrays- Single and Multidimensional arrays, Sparse matrices. Linear structures: Stacks, Queues (linear as well as circular implementation), singly-, doubly-, and circularly- linked lists — Operations and applications. Recursion: Problem solving using recursion, run time stack in recursion, tail recursion, and its removal. Searching techniques: Linear search, Binary search and their efficiency, Skip Lists, Hashing. Tree Structures: Trees, Binary Trees, Complete Binary trees and almost complete Binary trees, binary search trees, Insertion, Deletion, Tree traversal algorithms, Threaded trees (recursive as well as Non recursive), applications of trees. Multiway trees – B-Trees and introduction to B+ Trees. Recommended Books: 1. A. Drozdek, Data Structures and algorithm in C++, 3rd Edition, Course Technology 2004. 2. Data Structures using C and C++, Tannenbaum, 2nd edition ** 1995 3. Data Structures and Algorithms in C++. Publication John Wiley 2003 4. S. Sahni, Data Structures, Algorithms and applications in C++, Publication Silicon Press 2004 5. B. R. Preiss, Data structures and algorithms with object oriented design patterns in C++, John Wiley and sons, 1998. CSHT 204 Computer System Architecture (60 Lectures) Basic Computer Organization and Design: Computer registers, bus system, instruction set, timing and control, instruction cycle, memory reference, input-output and interrupt, Interconnection Structures, Bus Interconnection design of basic computer. Central Processing Unit: Register organization, arithmetic and logical micro-operations, stack organization, micro programmed control. Instruction formats, addressing modes, instruction codes, machine language, assembly language, input output programming, RISC, CISC architectures, pipelining and parallel architecture. Memory Organization: Cache memory, Associative memory, mapping. Input-output Organization: Input / Output: External Devices, I/O Modules, Programmed I/O, Interrupt-Driven I/O, Direct Memory Access, I/O Channels Recommended Books: 1. M. Mano, Computer System Architecture, Prentice Hall of India Third edition / Pearson Education 1992. 2. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004. 3. W. Stallings, Computer Organization and Architecture Desiguing for Performance 8th Edition 2009, Prentice Hall of India. CSHT 305 Algorithms (60 Lectures) Introduction: Basic Design and Analysis techniques of Algorithms, Correctness of Algorithm. Algorithm Design Techniques: Iterative techniques, Divide and Conquer, Dynamic Programming, Greedy Algorithms. Sorting and Searching Techniques: Elementary sorting techniques – Bubble Sort, Insertion Sort, Merge Sort, Advanced Sorting techniques – Heap Sort, Quick Sort, Sorting in Linear Time Bucket Sort, Radix Sort and Count Sort, Searching Techniques, Medians & Order Statistics, complexity analysis; Lower Bounding Techniques: Decision Trees Balanced Trees – Red-Black Trees Advanced Analysis Technique: Amortized analysis Graphs: Graph Algorithms – Breadth First Search, Depth First Search and its Applications, Minimum Spanning Trees. String Processing: String Matching, KMP Technique Recommended Books: 1. T. H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Clifford Stein Introduction to Algorithms, PHI, 3rd Edition 2009 2. Sarabasse & A. V. Gelder Computer Algorithm – Introduction to Design and Analysis, Publisher – Pearson 3rd Edition 1999 CSHT 306 Systems Programming (60 Lectures) Introduction: Introduction to Systems Software and machine architecture. Assemblers: Example of an assembly language, programming in assembly language, assembler features and functions, Load and Go assembler, One-pass and two pass assemblers, Macros and macro processors. Compilers: Compiler functions and features, phases of compilation, optimization. Loaders and Linkers: Basic Loader functions and features, Relocation, Program Linking, static and dynamic linking. Recommended Books: 1. A. J. Dos Reis, Assembly language and computer architecture using C++ and JAVA, Course Technology, 2004 2. D. M. Dhamdhere Systems Programming and Operating Systems, Tata McGraw-Hill Publishing Company, Ltd; Second Revised Edition 1996 3. L. Beck, D. Manjula, System Software, An Introduction to Systems Programming, Pearson, 3rd Edition 1996. 4. S. Chattopadhyay, Systems Software, PHI 2007. CSHT 307 Database Systems (60 Lectures) Introduction: Characteristics of database approach, data models, database system architecture and data independence. Entity Relationship(ER) Modeling: Entity types, relationships, constraints. Relation data model: Relational model concepts, relational constraints, relational algebra, SQL queries, programming using embedded SQL. Database design: mapping ER model to relational database, functional dependencies, normal forms. Transaction Processing: ACID properties, concurrency control, recovery. Web based databases: XML documents and databases. Books Recommended: 1. R. Elmasri, S. B. Navathe, Fundamentals of Database Systems 6th Edition, Pearson Education 2010. 2. R. Ramakrishanan, J. Gehrke, Database Management Systems 3rd Edition, McGraw-Hill 2002. 3. A. Silberschatz, H. F. Korth, S. Sudarshan, Database System Concepts 6th Edition, McGraw Hill 2010. CSHT 408 Operating Systems (60 Lectures) Introduction: Basic OS functions, resource abstraction, types of operating systems – multiprogramming systems, batch systems , time sharing systems; operating systems for personal computers & workstations, process control & real time systems. Operating System Organization: processor and user modes, kernels, system calls and system programs. Process Management: System view of the process and resources, process abstraction, process hierarchy, threads, threading issues, thread libraries; Process Scheduling, non-pre-emptive and pre-emptive scheduling algorithms; concurrent and processes, critical section, semaphores, methods for inter-process communication; deadlocks. Memory Management: Physical and virtual address space; memory allocation strategies -fixed and variable partitions, paging, segmentation, virtual memory File and I/O Management: Directory structure, file operations, file allocation methods, device management. Protection and Security: Policy mechanism, authentication, internal access authorization. Recommended Books: 1. A Silberschatz, P. B. Galvin, G. Gagne, Operating Systems Concepts, 8th Edition, John Wiley Publications 2008. 2. A. S. Tanenbaum, Modern Operating Systems, 3rd Edition, Pearson Education 2007. 3. G. Nutt, Operating Systems: A Modern Perspective, 2nd Edition Pearson Education 1997. 4. W. Stallings, Operating Systems, Internals & Design Principles 2008 5th Edition, Prentice Hall of India. 5. M. Milenkovic, Operating Systems- Concepts and design, Tata McGraw Hill 1992. CSHT 409 Data Communication and Computer Networks (60 Lectures) Introduction to Computer Networks: Network definition; network topologies; network classifications; network protocol; layered network architecture; overview of OSI reference model; overview of TCP/IP protocol suite. Data Communication Fundamentals and Techniques: Analog and digital signal; data-rate limits; digital to digital line encoding schemes; pulse code modulation; parallel and serial transmission; digital to analog modulation-; multiplexing techniques- FDM, TDM; transmission media. Networks Switching Techniques and Access mechanisms: Circuit switching; packet switching- connectionless datagram switching, connection-oriented virtual circuit switching; dial-up modems; digital subscriber line; cable TV for data transfer. Data Link Layer Functions and Protocol: Error detection and error correction techniques; data-link control- framing and flow control; error recovery protocols- stop and wait ARQ, goback-n ARQ; Point to Point Protocol on Internet. Multiple Access Protocol and Networks: CSMA/CD protocols; Ethernet LANS; connecting LAN and back-bone networks- repeaters, hubs, switches, bridges, router and gateways; Networks Layer Functions and Protocols: routing; routing algorithms; network layer protocol of Internet- IP protocol, Internet control protocols. Transport Layer Functions and Protocols: Transport services- error and flow control, Connection establishment and release- three way handshake; Overview of Application layer protocol: Overview of DNS protocol; overview of WWW & HTTP protocol. Recommended Books: 1. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd 2007. 2. A. S. Tanenbaum: Computer Networks, Fourth edition, PHI Pvt. Ltd 2002. CSHT 410 Software Engineering (60 Lectures) Introduction: The Evolving Role of Software, Software Characteristics, Changing Nature of Software, Software Engineering as a Layered Technology, Software Process Framework, Framework and Umbrella Activities, Process Models, Capability Maturity Model Integration (CMMI). Requirement Analysis: Software Requirement Analysis, Initiating Requirement Engineering Process, Requirement Analysis and Modeling Techniques, Flow Oriented Modeling, Need for SRS, Characteristics and Components of SRS. Software Project Management: Estimation in Project Planning Process, Project Scheduling. Risk Management: Software Risks, Risk Identification, Risk Projection and Risk Refinement, RMMM Plan. Quality Management: Quality Concepts, Software Quality Assurance, Software Reviews, Metrics for Process and Projects. Design Engineering: Design Concepts, Architectural Design Elements, Software Architecture, Data Design at the Architectural Level and Component Level, Mapping of Data Flow into Software Architecture, Modeling Component Level Design. Testing Strategies & Tactics: Software Testing Fundamentals, Strategic Approach to Software Testing, Test Strategies for Conventional Software, Validation Testing, System Testing, BlackBox Testing, White-Box Testing and their type, Basis Path Testing. Recommended Books: 1. R. S. Pressman, Software Engineering: A Practitioner’s Approach (7th Edition), McGrawHill, 2009. 2. P. Jalote, An Integrated Approach to Software Engineering (2nd Edition), Narosa Publishing House, 2003. 3. K. K. Aggarwal and Y. Singh, Software Engineering (revised 2nd Edition), New Age International Publishers, 2008. 4. I. Sommerville, Software Engineering (8th edition), Addison Wesle, 2006. 5. D. Bell, Software Engineering for Students (4th Edition), Addison-Wesley, 2005. 6. R. Mall, Fundamentals of Software Engineering (2nd Edition), Prentice-Hall of India, 2004. CSHT 511 Theory of Computation (60 Lectures) Languages: Alphabets, string, language, Basic Operations on language, Concatenation, Kleene Star Finite Automata and Regular Languages: Regular Expressions, Transition Graphs, Deterministics and non-deterministic finite automata, NFA to DFA Conversion, Regular languages and their relationship with finite automata, Pumping lemma and closure properties of regular languages. Context free languages: Context free grammars, parse trees, ambiguities in grammars and languages, Pushdown automata (Deterministic and Non-deterministic), Pumping Lemma, Properties of context free languages, normal forms. Turing Macines and Models of Computations: RAM, Turing Machine as a model of computation, Universal Turing Machine, Language acceptability, decidability, halting problem, Recursively enumerable and recursive languages, unsolvability problems. Recommended Books: 1. Daniel I. A. Cohen, Introduction to computer theory – John Wiley (1996 2nd Edition). 2. Lewis & Papadimitriou, Elements of the theory of computation – II Edition PHI 1997. 3. Hoperoft, Aho, Ullman, Introduction to Automata theory, Language & Computation –3rd Edition 2006, Pearson Education. 4. P. Linz, An Introduction to Formal Language and Automata 4th edition Publication Jones Bartlett 2006 CSHT 512 Microprocessors (60 Lectures) Microprocessor architecture: Internal architecture, system bus architecture, memory and I/O interfaces. Microprocessor programming: Register Organization, instruction formats, assembly language programming. Interfacing: Memory address decoding, cache memory and cache controllers, I/O interface, keyboard, display, timer, interrupt controller, DMA controller, video controllers, communication interfaces. Recommended Books: 1. Barry B. Brey : The Intel Microprocessors : Architecture, Programming and Interfacing. Pearson Education, Sixth Edition. 2. Walter A Triebel, Avtar Singh; The 8088 and 8086 Microprocessors Programming, Interfacing, Software, Hardware, and Applications. PHI, Fourth Edition 2005. CSHT 513 Internet Technologies (60 Lectures) JavaScript: Data types, operators, functions, control structures, events and event handling. Java: Use of Objects, Array and ArrayList class , Designing classes, Inheritance, Input/Output, Exception Handling. JDBC: JDBC Fundamentals, Establishing Connectivity and working with connection interface, Working with statements, Creating and Executing SQL Statements, Working with Result Set Objects. JSP: Introduction to JavaServer Pages, HTTP and Servlet Basics, The Problem with Servlets, The Anatomy of a JSP Page, JSP Processing, JSP Application Design with MVC, Setting Up the JSP Environment, Implicit JSP Objects, Conditional Processing, Displaying Values, Using an expression to Set an Attribute, Declaring Variables and Methods, Error Handling and Debugging, Sharing Data Between JSP Pages, Requests, and Users, Database Access. Java Beans: Java Beans Fundamentals, JAR files, Introspection, Developing a simple Bean, Connecting to DB Recommended Books: 1. Web Enabled Commercial Application Development Using Html, Dhtml,javascript, Perl Cgi By Ivan Bayross, BPB Publications, 2009. 2. BIG Java Cay Horstmann, Wiley Publication , 3rd Edition. , 2009 3. Java 7 ,The Complete Reference, Herbert Schildt, 8th Edition, 2009. 4. The Complete Reference J2EE, TMH, Jim Keogh, 2002. 5. Java Server Pages, Hans Bergsten, Third Edition, O'Reilly Media December 2003. CSHT 614 Computer Graphics (60 Lectures) Introduction to Graphics systems, Basic elements of Computer graphics, Applications of computer graphics. Graphics Hardware: Architecture of Raster and Random scan display devices, input/output devices. Fundamental Techniques in Graphics: Raster scan line, circle and ellipse drawing, thick primitives, Polygon filling, line and polygon clipping algorithms, 2D and 3D Geometric Transformations, 2D and 3D Viewing Transformations (Projections- Parallel and Perspective), Vanishing points. Geometric Modeling: Representing curves & Surfaces. Visible Surface determination: Hidden surface elimination. Surface rendering: Illumination and shading models. Basic color models and Computer Animation. Books Recommended: 1. J. D. Foley, A. Van Dan, Feiner, Hughes Computer Graphics Principles & Practice 2nd edition Publication Addison Wesley 1990. 2. D. Hearn, Baker: Computer Graphics, Prentice Hall of India 2008. 3. D. F. Rogers Procedural Elements for Computer Graphics, McGraw Hill 1997. 4. D. F. Rogers, Adams Mathematical Elements for Computer Graphics, McGraw Hill 2nd edition 1989. CSHT 615 Information Security (60 Lectures) Introduction: Security, Attacks, Computer Criminals, Security Services, Security Mechanisms. Cryptography: Substitution ciphers, Transpositions Cipher, Confusion, diffusion, Symmetric, Asymmetric Encryption. DES Modes of DES. ,Uses of Encryption. ,Hash function,key exchange, digital signatures,Digital Certificates. Program Security: Secure programs,Non malicious Program errors, Malicious codes virus,trap doors,salami attacks, covert channels,Control against program Threats. Protection in OS: Memory and Address Protection, Access control, File Protection, User Authentication. Database Security: Requirements, Reliability, Integrity, Sensitive data, Inference, Multilevel Security. Security in Networks: Threats in Networks s Networks security Controls, detection systems, Secure e-mails firewalls, Intusion Administrating Security: Security Planning, Risk Analysis, Organisational Security Policy, Physical Security. Ethical issues in Security: Protecting Programs and data. Information and law. Recommended Books: 1. C. P. Pfleeger, S. L. Pfleeger; Security in Computing, Prentice Hall of India, 2006 2. W. Stallings ; Network Security Essentials: Applications and Standards, 4/E, 2010 CSHT 616 (i) Foundations of Software Testing Fundamentals of testing: Need for testing, process, The psychology of testing General testing principles, Fundamental test Testing throughout the software life cycle: Software development models, Test levels (Unit, Integration, System Acceptance testing), Test types (functional, non-functional, regression testing), Maintenance testing Static techniques: Static techniques and the test process, Review process (types of review, roles and responsibilities), Test design techniques: The Test Development Process, Categories of test design techniques, Specification-based or black-box techniques (Equivalence partitioning, Boundary value analysis, Decision table testing, State transition testing, Use case testing), Structure-based or white-box techniques (Statement testing and coverage, Decision testing and coverage, other structure-based techniques), Experience-based techniques, Choosing test techniques Test management: Test organization (test leader, tester), Test planning and estimation ( Test planning, Test planning activities, Exit criteria, Test estimation, Test approaches), Test progress monitoring and control (Test progress monitoring, test reporting, test control), Configuration management, Risk and testing (Project risks, Product risks), Incident management Web Application Testing Foundation: Basic test planning and testing methods for web applications, Introduction to gray-box testing and its application to testing web applications, Outline knowledge, methods and tools for testing web applications, Introduction to web testing tools and sources, Introduction to research tools on the Net. Tool support for testing: Types of test tool, Test tool classification, Tool support for management of testing and tests, static testing, test specification, test execution and logging, performance and monitoring, specific application areas, using other tools, Effective use of tools: potential benefits and risks Recommended Books: 1. 2. 3. 4. 5. Boris Beizer, â€Å"Software Testing Techniques†, Van Nostrand Reinhold Louise Tamres, â€Å"Software Testing†, Pearson Education Paul Jogerson, â€Å"Software Testing† CRC Press Roger R Pressman, â€Å"Software Engineering – A Practitioner’s approach† Mc Graw Hill Testing Applications on the Web, 2nd Edition by Nguyen, Michael Hackett, and Bob Johnson (Wiley, 2003 CSHT 616 (ii) ARTIFICIAL INTELLIGENCE Introduction: (60 Lectures) Introduction to Artificial Intelligence, Background and Applications, Turing Test and Rational Agent approaches to AI, Introduction to Intelligent Agents, their structure, be havior and environment. Problem Solving and Searching Techniques: Problem Characteristics, Production Systems, Control Strategies, Breadth First Search, Depth First Search, Hill climbing and its Variations, Heuristics Search Techniques: Best First Search, A* algorithm, Constraint Satisfaction Problem, Means-End Analysis, Introduction to Game Playing, Min-Max and Alpha-Beta pruning algorithms. Knowledge Representation: Introduction to First Order Predicate Logic, Resolution Principle, Unification, Semantic Nets, Conceptual Dependencies, Frames, and Scripts, Production Rules, Conceptual Graphs. Programming in Logic (PROLOG). Dealing with Uncertainty and Inconsistencies: Truth Maintenance System, Default Reasoning, Probabilistic Reasoning, Bayesian Probabilistic Inference, Possible World Representations. Understanding Natural Languages: Parsing Techniques, Context-Free and Transformational Grammars, Recursive and Augmented Transition Nets. BOOKS RECOMMENDED: 1. 2. DAN. W. Patterson, Introduction to A. I and Expert Systems – PHI, 2007. Russell & Norvig, Artificial Intelligence-A Modern Approach, LPE, Pearson Prentice Hall, 2nd edition, 2005. Rich & Knight, Artificial Intelligence – Tata McGraw Hill, 2nd edition, 1991. W. F. Clocksin and Mellish, Programming in PROLOG, Narosa Publishing House, 3rd edition, 2001. 5. Ivan Bratko, Prolog Programming for Artificial Intelligence, Addison-Wesley, Pearson Education, 3rd edition, 2000. 3. 4. CSHT 616 (iii) Network Programming and Administration Transport Layer Protocols: TCP, UDP, SCTP protocol. Socket Programming: Socket Introduction; TCP Sockets; TCP Client/Server Example ; signal handling; I/O multiplexing using sockets; Socket Options; UDP Sockets; UDP client server example; Address lookup using sockets. Network Applications: Remote logging; Email; WWWW and HTTP. LAN administration: Linux and TCP/IP networking: Network Management and Debugging. Books recommended: 1. W. Richard Stevens, Bill Fenner, Andrew M. Rudoff, Unix Network Programming, The sockets Networking API, Vol. 1, 3rd Edition, PHI. 2. B. A. Forouzan: Data Communications and Networking, Fourth edition, THM Publishing Company Ltd. 3. Nemeth Synder & Hein, Linux Administration Handbook, Pearson Education, 2nd Edition 4. R. Stevens, Unix Network Programming, PHI 2nd Edition CSHT 616 (iv) Data Mining Overview: Predictive and descriptive data mining techniques, supervised and unsupervised learning techniques, process of knowledge discovery in databases, pre-processing methods Data Mining Techniques: Association Rule Mining, classification and regression techniques, clustering, Scalability and data management issues in data mining algorithms, measures of interestingness Books Recommended: 1. Introduction to Data Mining, Pang-Ning Tan, Michael Steinbach, Vipin Kumar, Pearson Education. 2. Data Mining: A Tutorial Based Primer, Richard Roiger, Michael Geatz, Information; Pearson Education 2003. 3. Introduction to Data Mining with Case Studies, G. K. Gupta, PHI,2006. 4. Insight Into Data Mining: Theory And Practice, Soman K P,Diwakar Shyam, Ajay V, PHI, 2006 CSHT 616 (v) Combinatorial Optimization Introduction: Optimization problems, neighborhoods, local and global optima, convex sets and functions, simplex method, degeneracy; duality and dual algorithm, computational considerations for the simplex and dual simplex algorithms-Dantzig-Wolfe algorithms. Integer Linear Programming: Cutting plane algorithms, branch and bound technique. Graph Algorithms: Primal-Dual algorithm and its application to shortest path, Math-flow problems Dijkstra’s algorithm, Max-flow problem, matching problem, bipartite matching algorithm, non-bipartite matching algorithms. Books recommended: 1. C. H. Papadimitriou and K. Steiglitz, Combinatorial Optimization: Algorithms and complexity, Prentice-Hall of India, 2006 2. K. Lange, Optimization, Springer, 2004 3. Mokhtar S. Bazaraa, John J. Jarvis and Hanif D. Sherali, Linear Programming and Network Flows, John Wiley & Sons, 2004 4. H. A. Taha, Operations Research: An Introduction (8th Edition), Prentice Hall, 2006 Unknown Life is an experience that comes along with failure. Have you ever had the feeling like you haven't done your best at something or the feeling that you're disappointing the people you care about most? Well Eve had that feeling multiple times especially in middle school. In middle school Eve experience lots of failure; failure with friendships, relationships, and rejection. Failure to me is being unhappy with yourself and not doing what you believe in.My 8th grade year in middle school was a earning experience that came along with lots of failure. The beginning of 8th grade was the easiest part of middle school because there was no drama and less friends. As time went by I gained more friends and more pressure was put on my shoulders. I learned a lot about friendships and the meaning of them. Losing the friends that meant the most to me is one of my failures and something that was challenging. Friendships from the past have a huge impact on the friendships that Eve made today.In middl e school I was always open to meeting new people and starting new reined friendships with anyone but now I realize that I can't do that without getting to know the person first. During my years in high school Eve been more selective with how I choose my friends. Eve learned that in order to trust someone in full and to consider them a good friend, I would have to get to know that person first. Throughout my high school experience Eve gained many friends and learned to trust them. Whenever I had a problem, I would turn to them for advice. Their advice always helped me through my problems and anything else I needed.Throughout my experience in high school and middle school, Eve learned a lot about friendship and values. Eve been making better decisions for myself and how I have been choosing my friends. How I chose my friends will help me in college because Eve had experience with good friends and bad friends. My experience with friends at school is teaching me so much about life. Midd le school and high school has helped me with better decision making when choosing friends. I will use this decision making in college to help me build new friendships.

Thursday, August 29, 2019

Themes in Rita Hayworth and Shawshank Redemption Essay

Themes in Rita Hayworth and Shawshank Redemption - Essay Example One major theme that unfolds in this book is about the pain and burden of imprisonment and isolation. In this novel, Stephen King has mainly centered the plot on prison life, and inmates at Shawshank Prison. The prisoners in this prison are locked up. This therefore, could be either literally or metaphorically. Stephen King shows the aspect of isolation through the way he has portrayed the prison setting. The prison is enclosed with walls, showing that the inmates were confined inside the prison, thus, were isolated, and denied freedom like that in the life outside the prison walls. The recreation yard in the prison is also enclosed, as well as the cells, where each prisoner lived (King Web). The prison environment in this novel, thus, represents a different world, where the inmates have been forced into after being removed from the free world. They therefore, are confined in the prison, with no opportunity of going back to the outside world, unless their term is over. The lack of fr eedom and alienation from the mainstream society is disheartening to most prisoners, and this has detrimental psychological effects on the prisoners. The pain of imprisonment in this book is evident in the lives of the prisoners. These are faced with multiple challenges in the prison, and therefore, these leave them with endless pain, both physically and psychologically. The prisoners by virtue of being in prison, have to encounter violent and mean people and gangs among themselves, who torture them, both physically and psychologically. The â€Å"sisters,† which is a gang in the prison tortures other inmates by abusing them sexually. On the other hand, both the experience of isolation and imprisonment make most of the prisoners believe that they are incompetent in the outside world. Experiences in the prison have derailed the inmates psychologically, and taken away their confidence and self-esteem. Although some prisoners such as Elwood Blatch want to appear like strong and hardened, deep within, these fear if they will ever fit in life outside prison, and if they will adapt to that life after serving their jail term. Red is also shown as being afraid of coping with freedom in the outside world (King Web). Additionally, Stephen King in this novel developed the theme of hope and its power. Through the different events in this book, one realizes that the author attempts to show the audience that hope is powerful. The inmates at Shawshank have every reason to give up hope, but these have not lost hope. Therefore, it is the hope that they uphold, which is responsible for their continued living and survival. Even though the inmates are faced with the burdens that come with imprisonment and isolation, these have not given up life, nor attempted to take away their life. For instance, Andy comes out as a determined person, who fights to maintain his sense of self-worth and therefore, this virtue is sufficient for him to keep at bay any extreme sense of anger and frustration, which would result from the isolation and confinement he faces in the prison. He serves as the model of an ideal man to other prisoners , and also a epitome of hope, as characterized by his spirit, which never loses hope. Hope is also portrayed when Andy progressively tunnels the concrete wall of his cell, and finally crawls out of his cell into freedom. While outside prison, Andy writes a letter to Red, and reminds him that, â€Å"

Wednesday, August 28, 2019

Reaction Paper On The Picture Wind Chime After Dream By Pierre Huyghe Essay

Reaction Paper On The Picture Wind Chime After Dream By Pierre Huyghe - Essay Example This picture was taken from a horizontal close-up position, thus clearly capturing the tree trunks at horizontal positions and the suspended chimes at an elevated angle. From the photographer’s angle, one can see only six of the 47 chimes mounted on the trees. In addition to the mentioned contents, the root section of each tree is covered with dried vegetation as opposed to the rest of the lawn, which is covered with green grass. Tree trunks and branches are dark and gray while the leaves are greenish-yellow in color. Behind the trees are five whitish structures of what appears to be concrete pillars. Having acknowledged the visible contents Pierre Huyghe’s picture, subsequent sections of this report analyze individual elements of art as they appear on the portrait. Keen focus on each element forms the basis of critical analysis in the art. It is through appraisal of individual components of the picture that one conclude on the success or failure to meet its aesthetic objectives. Basically, elements of art include line, texture, shape, and color among others. Each of these elements plays a significant role in creating unique attributes of a portrait. Variation of lines and texture allows an artist to manipulate contents in order to achieve the desired meaning. Variation of lines and shape enables the audience to develop concrete perceptions of space. On the other hand, manipulation of texture and color unearths aspect of time, which enhances the creation of intended theme by an artist.... Tree trunks and branches are dark and grey while the leaves are greenish-yellow in color. Behind the trees are five whitish structures of what appears to be concrete pillars. Having acknowledged the visible contents Pierre Huyghe’s picture, subsequent sections of this report analyze individual elements of art as they appear on the portrait. Keen focus on each element forms the basis of critical analysis in art. It is through appraisal of individual components of the picture that one conclude on the success or failure to meet its aesthetic objectives. Basically, elements of art include line, texture, shape and color among others. Each of these elements plays a significant role in creating unique attributes of a portrait. Variation of lines and texture allows an artist to manipulate contents in order to achieve a desired meaning. Variation of lines and shape enables audience to develop concrete perceptions of space. On the other hand, manipulation of texture and color unearths a spect of time, which enhances creation of intended theme by an artist. These elements must appear in every piece of artwork, whether it is two-dimensional or three-dimensional. In this regard, Pierre Huyghe’s picture incorporates some of these elements in depicting the wind chimed field. Elements of Art in the Picture Line and Shape Pierre Huyghe’s wind chime picture adopts a combination of both horizontal and vertical line techniques. These two techniques cumulatively facilitate creation of a path where viewers can perceive the aspects of space. Horizontal lines in the picture delineate those sections of the lawn and trees which extends into the adjacent space outside the camera’s coverage. In this context, Pierre

Tuesday, August 27, 2019

The Strategic Verticals of Davivienda Assignment

The Strategic Verticals of Davivienda - Assignment Example The assignment "The Strategic Verticals of Davivienda" analyzes the existing issues regarding internal communication inefficiencies, lagging project duration for O&M department of Davivienda Bank by measuring each of mentioned problems and their impact on the operational efficiency of O&M department. External and internal environment scan in context to O&M department has been done by the researcher in order elaborate scope of the paper. The recommends strategies like implementation of virtual communication portal, enhancement in e-mail communication efficiency, establishment of department consisting of process specialist that would work with O&M department in integrated manner, providing communication training to O&M personnel, implementing ERP system within O&M department, conducting monthly cross-departmental meeting to top level management and CEO of Davivienda to improve overall competitiveness of O&M department. The recommendations should not only improve internal communication between O&M department but also work as strategic initiatives for Davivienda. Financial organizations like banks start their strategic planning from understanding the scope of the service offerings. Davivienda is a bank and it also focuses heavily on the service and product offerings. There is very little scopes exist for banks to standardize its product portfolio and service offerings rather banks need to adapt to changes in customer requirements and design product portfolio that can be relevant in changing business environment.... As the report is addressing to key people of the organization hence there is no point in putting company information in the report because it is expected that the key members of the organization such as CEO is completely aware of these information. In short, O&M department of the organization handles issues like coordinating with marketing department to perform operational initiatives, updating administrative reports regarding organizational hierarchy, preparing system manuals, preparing process reports for the entire administrative blocks in the bank. The O&M department works in close loop manner with operational verticals like Human Resources division, Audit section, Information Technology division and General Administration. Now, what is the objective of this paper? Well, to be precise, the report will suggest a strategic plan for O&M department and study will also review the strategic plans that have been discussed in the previous works and suggestion regarding implementation of contingency plans to mitigate the identified risks will also be important part of this paper. Backgrounds and Accomplishments Bouquet, Hebert & Delios (2004) pointed out that financial organization like banks start their strategic planning from understanding the scope of the service offerings. In similar context, Davivienda is a bank and it also focuses heavily on the service and product offerings while making strategic choices. According to Bouquet, Hebert & Delios (2004), there is very little scopes exist for banks to standardize its product portfolio and service offerings rather banks need to adapt to changes in customer requirements and design product portfolio that can be relevant in changing business environment. Roth and Menor

Monday, August 26, 2019

Economic Journal Essay Example | Topics and Well Written Essays - 2000 words

Economic Journal - Essay Example Another effect is that consumers would tend to consume less today and wait until the prices still lower in the future. People will think that if prices are low to day, it will still decrease further in the future. Inflation is indeed harmful to the economy especially when it is paired with unemployment. However, deflation can also be detrimental to the economy. Lower prices tend to make buyers postpone their shopping thinking that prices would still lower in the future. Although it may seem that this is not a bad thing, it can affect the demand and supply of commodities in the economy. Since the consumers don't want to spend, commodities will be oversupplied and supply will swamp demand. According to Paul Krugman, "deflation discourages borrowing and spending, the very things the depressed economy needs to get going." ("What is deflation, what are the risks of deflation, and how can the Fed combat deflation")Since people do not want to spend their money, there is a tendency for firms to incur losses. This will in turn affect the employees of the company and there is a tendency for wages to drop and increase unemployment rate. Also, since deflation makes it difficult for firms to repay their debts, bankruptcy is most likely to occur and jobs will be lost. Yes, lower prices at first might seem to be pro-poor or more of an advantage to those who cannot afford some commodities. But in the long run, households and the people in the economy are still the ones who will suffer since they might lose their jobs and can add up to the problem of recession. Author: Justin Fox Title: The Economy Really Is Fundamentally Strong Magazine: TIME Publication date: October 16, 2008 Summary: It is known to everyone that America is experiencing problems with their economy. That is why when presidential candidate John McCain said that the fundamentals of the US economy are strong, many eyebrows were raised and his opponent Barack Obama didn't miss the opportunity to mock his statement. McCain's running mate Sarah Palin defended that McCain was talking about their workforce and the ingenuity of the American people. She was actually right because the American workforce and their being skillful remain to be strong in the midst of economic meltdown. Many economists assert that it is productivity growth that signals the economic well-being of a country. Productivity growth refers to the economic output per hour worked. This productivity growth was actually the reason why America was able to rise during the Industrial revolution despite the stagnation. What really caused the productivity growth during the industrial revolution is the dependence of the US in technology, electricity, combustion engine, and communication. In the mid-1990s, the engine was replaced with computers and the internet. After that, productivity growth continued to fluctuate. High productivity growth does not guarantee a good economy but it makes it more possible to have economic growth. With all these talks about productivity growth, maybe McCain was right that the fundamentals of the American economy are still strong. Analysis: The workforce of a country is

Sunday, August 25, 2019

The effects of Globalisation Essay Example | Topics and Well Written Essays - 3000 words

The effects of Globalisation - Essay Example The effects of globalization on the European Union are diverse. But the future growth and sustainability of the EU is dependent on globalization. The reforms influenced by globalization in the European countries not only make the Union more transparent and effective but also help the European Union to establish itself as a strong global actor. The challenges faced in the global including the European Union like economic integration, economic migration, humanitarian crises, failing states, energy security, climate change, terrorism etc. are interdependent. The European Union identifies the importance of globalization and the impacts of the phenomenon on the various aspects of the economy. Therefore, it should focus on effective management of the globalization process in order to meet the arising challenges and prevent any backlash from the phenomenon. The effective management of globalization and its rules would help the European Union to act as global actor in the true sense. The int ernal policies and the association with the international organizations can help the Union in managing the process of globalization in the region and control its effects and impacts to a large extent.

Saturday, August 24, 2019

Db5 Research Paper Example | Topics and Well Written Essays - 250 words

Db5 - Research Paper Example The sales is expected to rise with hardwork from the group. The company will however have to input a lot into training the young workers. The experience levels of this group is far much below what an older generation can offer. As a result, the company will be forced to use more in terms of benefits. This category realize the least health problems and need for health benefits will not down the company. It is at this time that the company may introduce appropriate premium benefit services to enhance the future behavior of the employees. Having a balanced male to female ratio will mean the company deal with balanced gender related issues and it will not be weighed down (Kronenfeld, 2010). The case above comprises of a mixture of experienced and young employees. It is the most productive in terms of experience. However, such a combination is bound to pose challenges to the administration from the initial stages. It is true that there are instances of successful women input to companies. In fact, some researchers argue that women are the best managers of corporate affairs. However, the age bracket identified seem to be a productive age. This is the time the employees will request for more maternal leaves and benefits. This might impact negatively as the business will have to solicit for replacements. In addition, they will have to take care of health benefits of their employees (Kronenfeld, 2010). This is an aging demographic combination. It is full of experience and so good in nurturing new employees. The company will however have to deal with a lot of benefits demands. They have to prepare for retirement packages for their workers. Also, this generation is bound to experience more health related problems leading to more health benefits demands. This is likely to stain the resources (Kronenfeld, 2010). Some recommendations are also necessary to help the organization handle situations of benefits to her employees. StopNShopToday can introduce the following

Friday, August 23, 2019

Case study on chronic illness Essay Example | Topics and Well Written Essays - 250 words

Case study on chronic illness - Essay Example Americans have medical cover and face little dangers of controlling the diseases because the insured go for the checkups which are sponsored by the insurers. Members of the countries with low socioeconomic power are rarely informed of medical cover. Low income in them also imposes great challenges in them taking the cover. From the chapter read on Rosalie’s health, she has no medical cover (Moroflubkin & Pamala 2012). The Healthy people 2020 have a plan to take medical cover to support Rosalie for the rest of her life. She has to also remain on treatment while the medical policy matures. They also have a plan on how to educate her. Rosalie’s aunt will also get a medical cover since her income is low and in future she might not be able to meet her medical needs should they occur. WHO cares for the underprivileged people’s health: providing them with medicines, education, food and shelter. This way, I will also plan to provide the same to Rosalie and her aunt Rita. This will help relieve her of the burden bagging her life. If I had to respond to the call, I would inform the health care professionals to have regular checks on the health of the aging population to avoid high costs of treatment. I would also advise them to take early control measures like immunization on children in order to prevent future problems to the victims when they age (Toombs, David & Ronald 1995). If I had power of control over the resource, I would introduce free and compulsory immunization to the needy and carry out medical researches on people’s health in order to identify how and when to issue treatment to the needy (Dubey

Thursday, August 22, 2019

The Law on Recovery for Psychiatric Injury Caused by Negligence is Essay

The Law on Recovery for Psychiatric Injury Caused by Negligence is Strongly in Need of Reform - Essay Example This is because there must be actual psychiatric injury that is easy to prove which makes sorrow, grief and fear not sufficient to win a case. For a defendant to be established as negligent, the claimant must be able to prove three things.2 First aspect, the claimant must prove that the defendant owed the claimant a duty of care which is a responsibility to avoid sloppy actions that could cause damage to one or more persons. The duty of care is further explained as the responsibility of ensuring that you do not do any harm or fail to do something that may likely injure your neighbor. The law however does not give details on who the neighbor is supposed to be. This is one of the reasons that the law should be amended since it does not give a clear definition of who our neighbor is, if it is a person one closely relates to, people defined by property proximity or people you relate with everyday. The next factor considered in duty of care, the claimant must provide evidence that the def endant failed to grant the appropriate standard of care that a sensible person would have provided in similar circumstances.3 The standard of care is explained as a way of measuring how well and much care a reasonable person owes another. There are rules that come with this duty, whether the defendant is a learner, child or a professional because standards differ from one person to another. Some people’s standards of care are higher than others depending on your call of duty or even your line of work. Drivers and doctors, for example, have a higher standard of care toward other people than the reasonable human being because there are responsible to other people’s lives than themselves. It does not matter whether they are learners of profession since there standards of duty are set much higher than other professions. This law is determined by so many factors which makes it ambiguous to prove ones guilt or innocence. Example for people with the skill to do something that any reasonable person would not be able to do is charged with negligence for lack of standard to care of duty. There is also the situation where a child commits a deed with intention of harming others are judged as adults yet there are other rules applied to the same misconduct if the person is of a certain age group. There should be many factors when deciding reasonable standards of duty and care for reasonable people. Example, if there could have been prevention from both parties to avoid more harm and what cautions could be taken by reasonable persons. All the risks involved and the degree of the same by the claimant to reasonable person. Extent of the harm will also be well thought-out in court. The damage to the claimant will be taken into account as there may be two similar damages but of different magnitude which will be unfair to rule equally yet the extent of damage to one was more than the other. It is important to ensure that all the three consideration are taken into ac count so that all the claimants affected by psychiatric disorder caused by negligence are given a fair trial. The claimant must also verify that the events of the defendant were the reason of the plaintiff’s injuries or breakdown. Influencing the cause, known as getting facts, is time and again done by applying but for experiment. Damage would not have happened but for the defendant’s measures. If a driver takes a group of people on a road trip and fails to install seat belts in the car and they

Professional and Managerial Ethics Caselet Essay Example for Free

Professional and Managerial Ethics Caselet Essay Limaha Inc. is a world-renowned toilet manufacturer founded in 1967. Limaha led the innovation of advanced bathroom utilities and mainly caters to First Class airports and 5-star hotels. The recent Asian economy boom has led to increased demands of Limaha toilet bowls for the business expansion of their loyal clients. In response, the company has decided call for this unprecedented increase in production that must be met as soon as possible. Jenny Panaguiton, the purchasing manager of Limaha’s main office, was tasked to choose a supplier of premium porcelain to be used in the production of their patented No Pressure toilet bowls. This production will include a big production contract with a new posh hotel in the country’s capital whose construction is about to end with the installation of their bathroom fixtures. After careful analysis from 20 suppliers by the purchasing department, Jenny was presented and left to decide between two suppliers: O Mang China and Teddy B. Solutions. O Mang China offered superior porcelain at a high price. This price along with other costs necessary to deliver the porcelain to the production plants was estimated to exceed the company’s budget. Although Limaha can choose to go ahead and allocate more capital for this transaction, it could result to lower company profits if the previously agreed sales price of No Pressure toilet bowls is not increased. If Limaha decides to charge a higher price on their new product, there is a high possibility that the hotel client would back out from the contract and change to another toilet manufacturer for confirmed business ventures next year. Teddy B. Solutions, on the other hand, offered a lower price for the porcelain materials which is well within the company’s budget. Christopher Barrido, the company’s Vice President for Production even greatly encouraged Jenny on choosing Teddy B, as the really low price of the porcelain would bring significant favorable variances in their division’s costs. Not only would their division have a pretty image in front of the Board, there would even be a possible salary increase. He even promised Jenny of a bright future in the company if she makes the right decision. Jenny, however, doubts their VP’s motives, as Christopher would not normally recommend any supplier and would just leave the Purchasing Department on their decisions. She thinks Christopher’s actions have something to do with the generous gifts Christopher has been receiving recently from his long-time friend and classmate, Teddy B. Teddy B’s proposal is highly attractive when just considering the company’s profits. However, the production team who reviewed the samples from Teddy B showed results that were a far cry from O Mang’s porcelain. Materials from Teddy B produced inferior quality toilet bowls. The production team voiced out their concerns through Pie Bread, the production manager. Pie greatly discouraged the use of Teddy B materials to Christopher Barrido, arguing that the use of such materials would greatly affect their quality, and the name of Limaha Inc. could be tarnished through this. They were also very concerned that the hotel might withdraw previous arrangements with Limaha because of the fact that these inferior toilet bowls were simply not appropriate for the posh hotel. Christopher just won’t have any of Pie’s arguments. He argued that the employees under her department were only exaggerating about the quality of the samples. Teddy B has long been in the business of supplying porcelain, so he argued that the problem is not on the materials, but on the workers handling the production who are not being efficient enough to produce at the expected quality. Pie and Christopher’s debate had been long, and word travelled that Pie was even threatened of demotion if results with the Teddy B samples still would not improve. Needless to say, people from production are now pointing daggers to the purchasing department, as their decisions could cause them their jobs. And so Jenny tried to negotiate the price offer of O Mang China and asked for any other possible alternatives their company could have. Its owner, Osmong, however presented her a very outrageous offer. Osmong is her former lover from a very bad and traumatic relationship.  Osmong, feeling bitter, is still deeply in love with Jenny even after she broke up with him six months ago for a number of undisclosed reasons. Since the breakup, Jenny has vowed to never reconcile with this man again. In a desperate attempt to get Jenny back, Osmong offered to significantly reduce their price to go lower than that of Teddy B, if and only if, she agrees to go back together with him again. This new price would mean that there would be no need for a price increase on the No Pressure toilet bowl, and they could even attract more potential long-term customers because of their high-quality products at a really low price. To add to the list of her worries, Jenny received a note to come to a private meeting in a nearby cafà © with Bea Wing, Limaha’s Internal Auditor. The meeting had been really stressful, as the topic was Teddy B’s alleged recent romantic interest with Jenny. Teddy has been sending Jenny many gifts and invitations to dinners since the start of the year, and they had gone to a few dates. Jenny, however, just treated their relationship as platonic, and concluded that nothing can come out of their business meetings. Bea however would not believe any of it. Bea had been married to Teddy B for three years. Sadly, a gap in their relationship has formed due to their busy schedules. She noticed her husband’s special attention to Jenny, and thought that a possible divorce could be coming to her soon if Jenny continues to â€Å"lead him on† with her business partnerships. Bea thinks that this new materials supplying contract could be the last straw. She later vowed, that if Jenny makes one wrong move on choosing her husband and destroy her marriage, she would definitely destroy her life. Jenny was visibly shaken, given that Bea really has the power to do so, with a few alterations on her department’s financial statement, and some words with Board of Directors regarding her process of choosing the material suppliers. Jenny really has a lot riding in this decision. The company\ profits, the production employees, her personal relationships, her co-workers, and her own job are at stake in this one important decision of choosing the supplier of porcelain for the No Pressure toilet bowl model. She could not afford to lose her job now, given that it is the only way for her to pay for the medical bills of her five dogs in the hospital. This one decision could make  or break her life. Even more so, she’s not even sure if it is right. What do you think would be the best action to take?

Wednesday, August 21, 2019

The Healthcare Quality Strategy Nursing Essay

The Healthcare Quality Strategy Nursing Essay This essay will discuss a significant event in relation to the peoples priorities identified within the Healthcare Quality Strategy. It will also discuss my role as a student nurse in relation to a patient who is receiving palliative care. The essay will demonstrate my understanding and views on reflection and the issues surrounding my practice. I have chosen Gibbs (1988) reflective framework as it has a structured format and six steps which follow in order starting with a description of the event and ending with an action plan for future practice. The steps are Description, Feelings, Evaluation, Analysis, Conclusion and Action Plan (Gray, 2007). Reid, (1993) describes reflection as a process of reviewing an experience of practice in order to describe, analyse, evaluate and so inform learning about practice. In May 2010, the Scottish Government introduced the Healthcare Quality Strategy for NHS Scotland, their aim is to deliver the peoples priorities which are: firstly caring and compassionate staff and services, good communication and a clear explanation about conditions and treatments, effective teamwork between clinicians, patients and others, a clean and safe care environment, continuity of care and clinical excellence. Secondly, to bring together the patients priorities as well as the values of everyone working within the NHS Scotland. Thirdly, by applying these three interventions and putting them into practice improvements within priority areas of the Healthcare Quality Strategy will be met (Scottish Government, 2010, p.6). This reflective account will focus on the importance of communication and how it can affect individuals. It will identify if the priority was met in relation to my significant event and it will further clarify its importance (Scottish Government, 2010, p.6). Description Whilst on my Management Placement I met Janet, she is 65 years old and has been admitted to my ward for palliative care. She has end stage bowel cancer and is awaiting a bed at the local hospice. All names have been changed to protect her identity and maintain confidentiality (NMC, 2008). Janets GP has requested that she be admitted onto the ward as she is now confined to bed because of increased pain and a general deterioration of her condition (Dougan and Colquhoun, 2006). Feelings Whilst carrying out my training as a student nurse, I have met a number of palliative patients and I feel that I lack confidence when communicating with these patients and their families at this difficult time. However, whilst on this placement I was able to build up a good rapport with Janet and her family and this allowed me to provide good patient centred care (NMC, 2008). Therefore when dealing with Janet and her family at this difficult time I must treat Janet as an individual (NMC, 2008) and I must provide the best care for my patient and be caring and compassionate always (Scottish Government, 2010, p.6). I was privileged to have the opportunity to be involved in Janets care as well as working within a ward of clinical excellence (Scottish Government, 2010, p.6). Evaluation When caring for palliative patients a holistic approach with continuity of care is extremely important and all nurses have a central role in providing information, care and support (Kennedy and Lockhart, 2007). Excellent communication and good interpersonal skills are paramount when caring for Janet, it is important not only to establish Janets wants and needs but also her families. It is imperative when relaying any information to Janet or her family make sure they understand it, if not explain the information to them again (NMC, 2008). Also when dealing with members of the multi-disciplinary team, effective teamwork is imperative again providing Janet and her family with continuity of care and the clinical excellence they require from all staff. I feel the Quality Strategy aim was achieved, as all staff when looking after Janet dealt with her in a caring and reassuring manner at all times, in turn providing Janet with the best care, whilst she was on the ward (Scottish Government, 2010). Analysis Palliative care helps to improve the quality of life for patients and their families who have to come to terms with the difficulties associated with life threatening illness. It is about identifying the patients needs through accurate assessment, good symptom control and sensitive nursing care (Scottish Partnership for Palliative Care, 2012). When planning Janets care I must take a holistic approach and look at her physical, psychological, social, emotional and environmental needs. This included not only the patient, the hospital and any multi-disciplinary team members but also her husband and any other family members she would like involved (Dougherty and Lister, 2011). As Janets condition could change from day to day her care plan was reviewed on a daily basis and updated accordingly (Dougan and Colquhoun, 2006). Good communication is paramount when dealing with my patient, it is important to listen and support them and make sure any information they have been given, do they understand it, if not explain it to them again (NMC, 2008). It is also important to document any care given to the patient in accordance with the NMC guidance on record keeping (NMC, 2009). In addition to caring for Janet on the ward I was given the opportunity to go to the Hospice and meet with Janets palliative care nurse and also be included in her multi-disciplinary team meeting. This again highlighted the importance of good communication and good record keeping as all team members are aware of Janets circumstances and can pick up her file and know exactly what is happening with Janet at any given moment (Nice, 2004). This meant that when I was communicating with Janet and her family I was more confident and I was able to communicate in a language that they understood (Dunne, 2005). As well as building a trusting relationship between nurse and patient, good communication skills again helps to reduce fear and anxiety at this stressful time (Dunne, 2005). When dealing with patients who are receiving palliative care the peoples priorities are relevant. All nurses must be able to make the patient as comfortable as possible, be aware of their wants and needs and provide a safe and clean environment (Scottish Government, 2010, p.6). On reflection this event has brought further awareness of the level of involvement of staff members from nursing auxiliaries, nurses and consultants. This was shown by the number of multi-disciplinary meetings, assessments, re-assessments, written correspondence and working hours placed into looking after this patient (NMC, 2009). All staff members were committed to providing the correct input and treatment for this patient and to make her last few days as comfortable as possible (Scottish Government, 2008). Conclusion This reflection has demonstrated the difficultly in caring for palliative care patients. It requires a holistic approach to ensure that the patient and their family receive the best possible attention. Nurses have a duty to ensure that the care they deliver is of an acceptable standard (NMC, 2008). While participating in ward rounds I took on board the doctors instructions and carried out and prioritised the care of my patient, therefore making Janets stay in hospital as comfortable as possible. The code provides values, which can be adapted to any setting and as long as these are followed, nurses will be able to carry out their legal and professional duty of care (NMC, 2008). Action Plan Palliative care is a sensitive subject to deal with but I feel that as long as you treat the patient as an individual, listen to their wants and needs, then a positive outcome can be accomplished. Communication and good interpersonal skills are once again highlighted as an essential part of good nursing practice. I must be an effective communicator and be able to provide a high standard of care at all times and this is imperative when dealing with palliative care patients. I must keep my knowledge and skills up to date (NMC, 2008). Identify Steps Through experience of this placement and in relation to my transition from student nurse to staff nurse; the steps to facilitate an improvement and development would be to ensure effective communication with all staff and all members of the multidisciplinary team. This includes accurate record keeping and collection of all relevant information from the patient and their family in order to deliver safe effective patient care. It also promotes a positive nurse patient relationship and offers reassurance at this difficult time (Dunne, 2005). In addition palliative care does not only deal with cancer patients but with patients who have long term chronic illnesses such as multiple sclerosis, heart disease and respiratory problems, therefore palliative care is relevant today and also in the future because we will be caring for an ageing population (Scottish Partnership for Palliative Care, 2012) In conclusion and in relation to The Healthcare Quality Strategy I feel that Janet was looked after in a caring and compassionate manner at all times and the nursing auxiliaries and nurses looking after Janet worked well together putting her first and treating her with respect at all times (Scottish Government, 2010). Conclusion In conclusion and in relation to The Health Quality Strategy and my transition from student to nurse, Bowie (2010) states that positive practice should be highlighted as it allows others to learn from it and provides opportunities to improve the safety of patient care. Reflecting on these events has helped me to identify areas where practice needs improvement and given me a greater insight into my own role as a registered nurse.

Tuesday, August 20, 2019

Censorship of the Internet and Mass Media

Censorship of the Internet and Mass Media The conversation regarding censorship amongst states, meaning nations or countries in this context, has been a highly contested and conflicted debate for over a century.   According to The Merriam-Webster Dictionary, â€Å"censorship is suppression of speech, public communication, or other information, on the basis that such material is considered objectionable, harmful, sensitive,  politically incorrect  or inconvenient as determined by government authorities or by community consensus† (Merriam-Webster). Nearly all states, even those that are considered to be extremely free states, practice numerous forms of both direct and indirect censorship. Censorship is usually rationalized to protect from dangerous, obscene, and/or negative information from being released and exposed to certain audiences or the general public. It is important to be noted that self-censorship, where one or more individuals censor their own personal discourses and environments, is not the type of ce nsorship that pertains to this essay as it will focus on official acts of censorship. In her book, Censorship In America, historian Mary E. Hull defines official acts of censorship as official actions by a government or governing body that restrict access to certain information to their audience (Hull, 1).   For the purposes of this essay, the United States of America will be the main focus when discussing censorship and its effects and implications. If given the absolute power and ability, the censorship of the internet and mass media in America could produce detrimental effects amongst nearly all aspects of society. Therefore, it is of utmost importance that free, open, public, and uncensored access to the internet and medias across the United States of America must remain and be protected. Technology and increased globalization have interconnected states and their citizens more than ever which has led to the creation of the â€Å"global citizen†. Because of this, some governments have highly censored media within their states as freedom of speech and access to different thoughts and ideologies poses high risks. Across the globe, numerous non-governmental organizations research and work to determine the amount and ways-in-which information is censored in different states. Reporters Without Borders (RWB), a United Nations consultant, studies the freedom of expression and information in states and publishes their findings in the annual World Press Freedom Index. The World Press Freedom Index consults and surveys expert lawyers, sociologists, media professionals, and journalists on pluralism, media independence, environment and self-censorship, legislative framework, transparency, infrastructure, and abuses within their country. The 2018 report that surveyed one hundred and eighty states concluded that Norway, Sweden, and the Netherlands are the most free and/or least censored states while Syria, Eritrea, and North Korea are currently the most censored and least free states (RWB, 2018). For reference, Canada is the eighteenth most free state, the United Kingdom is the fortieth most free, and the United States falls as the forty-fifth most free state. The United States fell two places from 2017 to 2018 which can be attributed to the actions of President Donald J. Trump and his administration. Trump notoriously declared the press an â€Å"enemy of the American people†, which has triggered attacks against journalists and their credibility using the fallacious and often erroneous term â€Å"fake news† (RWB, 2018). Reports and research like this help truthfully determine the freedom of speech, press, and information across the globe from a nonbiased perspective.  ­ Censorship in The United States of America Censorship in the United State of America is a highly controversial topic given how prominent and institutional the liberty of freedom of speech and the press is engrained into legislature and society. The First Amendment to The Constitution states, â€Å"Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.† (U.S. Const. amend. I). The freedom of speech in America is not absolute as it does not protect hate speech or obscenity, meaning that strongly offensive speech or speech that promotes hateful acts based on bias can legally be censored as they are not protected forms of speech (Hull, 3). The First Amendment can be attributed as the foundation for the popular American motto and saying, â€Å"land of the free†. This nationalistic saying has permeated American society as many Americans pride themselves on the thought of America being thee land of freedom and justice despite numerous ranking and studies pointing otherwise (RWB, 2018). Since the creation and implementation of the First Amendment, numerous laws and rulings have been instituted and repealed in order to restrict the freedom of speech and press. Notably, the Sedition and Espionage Acts, imposed under President Wilson in 1917, declared it illegal and treasonous for citizens to speak against the United States government, military, and flag. This act attempted to bend the First Amendment, however, it was repealed in 1919 as it clearly violated the freedom of speech and press clause. In 1971, The Pentagon Papers, officially titled  Report of the Office of the Secretary of Defense Vietnam Task Force, were classified United States of America military and government documents that were leaked. The Pentagon Papers detailed the involvement of the United States in the Vietnam War from 1945-1967 (Hull, 27). These documents revealed that the United States had gone against legislation and made official decisions without the aid or input from Congress, which is legally required. They were leaked, according to Hull, because â€Å"critics charged that the government resorted to excessive classification of documents in order to conceal activity from the public, whereas the government maintained that it was acting in the interests of national security† (Hull, 29). This leak was taken to the Supreme Court of the United States and was ruled legal as the Supreme Court determined that the general public has the right to these documents despite the government’s attempt to censor the press. Although the First Amendment has been tested numerous times, it stands generally true that individuals in the United States of America are entitled to freedom of speech and press so long as it does not fuel the occurrence of legitimate crimes. Internet Censorship in the United States Within the past few decades, the rules and guidelines set by the First Amendment have made the waters murkier than ever when discussing censorship and the media.   The internet has made news and media more accessible than ever which enhances the effects, debatably both positive and negative, censorship can have. Given the capitalistic nature of the internet, major new sources occupy a massive section of the internet and tend to circulate only chosen specific media and news stories that fit their agenda, this is known as corporate censorship.  ­Project Censored, a news source that publishes important news and media that was not reported by the mainstream mass media, works to eliminate corporate censorship as they see it as a blockade towards democracy and free press. (Jensen, 2018). Although corporate censorship is highly problematic, it is protected by the First Amendment as companies and individuals have the right to broadcast what they see as fit. The Internet Must Remain Free from Censorship Internet Censors and Blockers In the United States, the First Amendment protects against and prohibits majority of internet censorship involvement from the federal, state, and local governments. However, private companies have more leeway in their actions to censor content, particularly in regards to public spaces. There tends to be a steep crossover between these private companies and the state as the government or government officials often support and fund companies whose interest align with theirs. This is a classic incident of corruption with the government finding a loophole to overstep their rightful bounds. Internet censorship is typically performed by content blockers and removers that are created, installed, and programmed to block all content deemed obscene or unfitting. The major problem of these programs is determining what content is and is not okay†¦a process that can be easily corrupted. In the words of Mary E. Hull, â€Å"What is indecent in one persons mind may be decent in anothers; thus, regardless of the censors motive, the result of censoring is the denial of anothers freedom to choose.† (Hull, 2). This exact problem was exacerbated in 1997 in a Virginia library that had installed a blocking program on its public computers. The intention of the program was to block and censor sexually explicit content from minors, which is perfectly legal and the decision was supported by the National Law Center for Children and Families (Hull, 35). However, this program, advertently or not, also blocked the American Association of University Women website and an AIDS website which is extremely problematic because this blocker is now restricting access and information from the public. The center of this controversy is not the use of a blocker, as individuals should have the right to knowingly censor content in private, but the fact that a publically funded device was censoring appropriate content. Given this incident occurred in 1997, it is unlikely that the censoring of those two specific websites was directly intentional, however, it remains unclear as numerous biases could lead a company to explicitly censor more than originally intended.   This incident, albeit small, shows how detrimental censorship of the internet can be and why the internet needs to remain publically uncensored.  Ã‚   It is extremely important that the First Amendment be rigorously upheld in the United States of America as it is the major piece of legislation that prohibits extreme censorship. For this reason, totalitarian control of the internet has not been observed in the United States but other countries can be used as examples of this. The People’s Republic of China is notorious for their strict censorship of the internet, especially social media, and suppression of news and information. According to the 2018 World Press Freedom Index, China is the one hundred and seventy-sixth (fourth worst) least free states as President Xi Jinping and the Communist Party implement extreme censorship and surveillance on the citizens (RWB, 2018). China has been very innovative to censor the internet by creating different apps and networking sites that resemble sites like Facebook and Twitter (Walker & Orttung, 77). China’s censored version of Twitter, called Sina Weibo, has a massive member base with over six hundred million users.   Key to their censorship is strict criminal punishments for publicizing thoughts, ideologies, and ideas that go against China and the Communist Party (Walker & Orttung, 78). China also restricts nearly all forms of media by requiring newspapers to register with the government and all television is broadcasted by government-run China Central Television. The extreme censorship in China has taken the voices away from the people and subjected them to only the thoughts and rhetoric provided by the government. This is extremely dangerous as nearly all forms of dissidence, personal expression, thought exploration, education, and legitimate news are deprived from the people so that they unintentionally surrender themselves to the country. In order for democracy and freedom to remain in the United States, it is absolutely essential that the internet and social media remain free from government interaction. The Importance of Social Media The growing accessibility and prevalence of the internet in daily lives has allowed for social medias to play pivotal roles in individuals’ personal lives, politics, and society as a whole. Both Facebook and Twitter have become major sources of news, information, and misinformation in America. Both of these sites have become hubs for people to share their personal opinions in reaction to the news, especially politics. Politics in America has become more polarized than ever which has increased greatly increased tensions and amplified party affiliations from the election of Barack H. Obama in 2008 to the election of Donald J. Trump in 2016. Misinformation, especially political misinformation, has become increasingly more prevalent and believed through platforms like Facebook and Twitter. Misinformation can be partially attributed to motivated reasoning, the illusion of objectivity, and partisan-driven motivated reasoning as they explain why voters cling to certain ideologies, misperceptions, and corrections (Thorson, 463; Berinsky, 7; Nyhan & Reifler). In short, motivated reasoning is a phenomenon where one will support a desired conclusion if they can rationalize it (Kunda, 482-483). A study researching the presence and diffusions on Twitter during the 2012 election showed that rumors were shared by polarized accounts that created â€Å"‘echo chambers’ defined by political homophily that were based on ideological attitudes not truth and merit† (Shin, Jian, Driscoll, & Bar, 1227). Social media sites harbor misinformation because they are highly polarized, therefore misinformation is more likely to become believed via motivated reasoning if it aligns with one’s belief system or party alliance. An extremely detrimental piece of misinformation began in 1988 when Andrew Wakefield published a report that incorrectly liked the Measles-Mumps-Rubella vaccine to autism. This link has been extensively discredited yet still persists and has caused numerous recent outbreaks of measles. In a study conducted by Mark R. Joslyn and Steven M. Sylvester, they found the individuals’ belief in this myth became politicized and lead to faulty governance and policies that allowed outbreaks to occur (Joslyn & Sylvester, 17). Although this report was false, it is important for it to be noted that social media has enough power to influence politics and government. Social media also becomes an accessible intermediate that exposes its users to current news, political beliefs, and ideologies. Numerous studies show that social media becomes an environment where individuals can find like-minded individuals and share their thoughts, however, those same factors also nourish misinformation.   As previously mentioned, Donald J. Trump coined the term â€Å"fake news† when referring to news that is not favorable toward him or his administration, regardless if the news is actually true or false. This term is extremely problematic because it discounts journalists providing truthful information while diminishing that problem that legitimately false news poses. False news tends to spread faster and quicker, however, eventually, it tends to reach a much smaller audience. In 2016, a tenth of conservative Republicans accounted for consuming sixty-five percent of fake news (Carey, 2018). In order to tackle this problem, Facebook has embedded a fact-checking service into flagged articles so the consumer knows it is misinformation before they choose to share it (Hunt). Fake news and â€Å"fake news† are both very real problems as legitimate journalism is of value and should be protected. Censorship is a dangerous tool that should be used in a very selective manner as it can deprive individuals of necessary information. In the United States of America, it is incredibly important that the First Amendment is upheld as it provides all citizens with a voice and platform to both share and receive thoughts, information, news, and ideologies. Free speech and free press absolutely has its downsides as dangerous misinformation can easily be shared and believed but the benefits of freedom of speech and press are so much greater. Protection of freedom of the internet is essential in order for the United States to remain a democratic, liberated, and just nation. References Berinsky, A. J. (2015). Rumors and Health Care Reform: Experiments in Political Misinformation. British Journal of Political Science,47(02), 241-262. doi:10.1017/s0007123415000186 Censorship [Def. 1]. (2018, April 25). In The Merriam-Webster Dictionary. Retrieved April 29, 2018, from https://www.merriam-webster.com/dictionary/censorship 2018 World Press Freedom Index(Rep.). (2018, April 25). Retrieved May 3, 2018, from Reporters Without Borders: For Freedom Information website: https://rsf.org/en/ranking/2018 Hull, M. (1999). Censorship in America : A Reference Handbook. Retrieved May 1, 2018, from http://web.b.ebscohost.com.ezp1.lib.umn.edu/ehost/ebookviewer/ebook/[emailprotected]essionmgr120&vid=0&format=EB&lpid=lp_I&rid=0 Jensen, C. (n.d.). Censored News Stories. Retrieved May 3, 2018, from http://projectcensored.org/about-us/ Joslyn, M. R., & Sylvester, S. M. (2017). The Determinants and Consequences of Accurate Beliefs About Childhood Vaccinations. American Politics Research. doi:10.1177/153267317745342 Kunda, Z. (1990). The case for motivated reasoning. Psychological Bulletin,108(3), 480-498. doi:10.1037//0033-2909.108.3.480 Nyhan, B., & Reifler, J. (November 30, 2016). Do People Actually Learn From Fact-Checking?Evidence from a longitudinal study during the 2014 campaign. University of Exeter. Retrieved April 17, 2018. Shin, J., Jian, L., Driscoll, K., & Bar, F. (2016). Political rumoring on Twitter during the 2012 US presidential election: Rumor diffusion and correction. New Media & Society,19(8), 1214-1235. doi:10.1177/1461444816634054 Thorson, E. (2015). Belief Echoes: The Persistent Effects of Corrected Misinformation. Political Communication,33(3), 460-480. doi:10.1080/10584609.2015.1102187 United States Constitution,  § Amendment I (1787). Walker, C., & Orttung, R. W. (2014). Breaking the News: The Role of State-Run Media. Journal of Democracy,25(1), 71-85. doi:10.1353/jod.2014.0015