Wednesday, July 31, 2019

Police culture

Police Culture Number 8 powerpoint (Definition)The knowledge, attitudes, expectations, behaviours and rituals that exist amongst police, or which more broadly, characterize a police force. Police Culture affects: how police see themselves and their role as police how they see the world around them, how they police (how policing is performed). Differences exist within and between police cultures. Police officers, as individuals, will not all equally adopt or adhere to the dominant police culture. Police culture cannot be divorced from the social, political, economic, legal and organizational context of policing. Police cultures can change.Police Culture: Characteristics Sense of Mission: the thin blue line' A crucial, dangerous but thankless Job ,Not Just a Job, but a way of life0 Policing thought of as protecting the weak from the strong (not at all political, relating to power within society). o ‘Us versus them' mentality evident Law enforcers and law abiders versus law breake rs Action Orientated: ‘Real Policing' Emphasis on ‘real policing as that which occurs in the public sphere and which involves dangerous or potentially dangerous situations and confrontations. ?(ie. responding to reports of rime, raids, shoot outs, car pursuits and so on).Greatest status attached to Homicide Squads and Tactical Response Units. Cynicism and Pragmatism Required to obey law, yet see law as limiting and naive Must go beyond the law, to do their Job and get results. Favour expedience over due process These characteristics of police culture have been related to various negative behaviours: Unlawful detentiono- The improper use of force0- Breaches of proper interview processes – Corruptiono- Dismissal of some crimes/victimso- Commission of some offences Isolation and Solidarity Feel different from other people based on work and work-related xperiences.Sense of isolation intensified by problems socializing with non-police due to others reactions, difficult ies turning off, shift work. Closest bonds forged with other police Very loyal to, and protective of, other officers MasculinistDominance of masculinist perspectives and practices. Reiner has described police culture as an ‘old – Ofashioned world of machismo'. ‘Real policing' associated with confrontation, physical strength, danger Male-dominated composition of police forces has contributed to this. Racism Widely documented evidence of suspicion, hostility and rejudice in police dealings with racial and ethnic minorities.Evidenced in well- known instances (ie. Rodney King) through to everyday policing practices. Once again partly attributable to historical composition of police forces. Also relates to their role acting on behalf of states to administer racially- Obased laws and policies (segregation, removal of indigenous children). 7. Conservatismo Social and politically conservative. Emphasis upon maintaining the status quo. Once again, partly a consequence of h istorical composition and role of police Approaches to policing and the community Number 9 Traditional Policing- (as developed with rise of modern police forces).Community Policing (developed over past 30, largely in response to concerns raised over the methods and outcomes ot traditional policing. ) Traditional Policing: Police seen as separate from the community ,Role of the police is to respond to crime. ,Police effectiveness is measured by changes in crime rates and arrest rates. Concerned primarily with the policing of public sphere, rather than private sphere. Use of force is viewed as legitimate and necessary to Opreservation of order – militarization of police over past 40 y ears with rise of law and order.Community Policing The development of community policing was based upon recognition that a lack of familiarity and respect between police and specific communities sometimes resulted in negative and repressive policing practices being used, and the fostering of mutua l suspicion and antagonism between police and communities. Young people? gays and lesbians, indigenous people, ethnic and racial minorities recognized as particularly affected. What is Community Policing? No universally accepted definition of community policing.As an approach to policing, it can best be described as onsisting of a broad range of strategies designed to improve policing by connecting police more closely to local communities and supporting relationships. Includes programs such as: 0 Neighbourhood Watch 0 Crime Stoppers00 Blue-light Discos School Education Programs Development of specific community policing units The appointment of Liaison Officers (such as: YLOs /0MLOs ) and committees involving police and community members . Formalised relationships with other community agencies0(for example, sexual assault and domestic violence services, ambulance services, welfare service).Reform of procedures for dealing with some types of ffences – SOCIT (Secual Offences an d Child Abuse Investigation Teams Increased police presence, visibility and availability (for example, police on bicycles, shop fronts) Use of media to involve public in policing and crime prevention Police organising and hosting activities and programs – particularly for young people (such as the Ropes Program) Police learning and demonstrating the ‘art of negotiation' with difficult groups Police taking a more gentle/balanced approach to policing Community Policing Compared to the traditional approach to policing, community policing Aims to be more pro-active and pre-emptive. More concerned with peacekeeping and conflict resolution than crime fighting0 Based on complexities of local context and on building relationships Envisages police as part of the community and as needing to be responsive and answerable to it. Police Culture Police Culture in the United States Team B: Sean Milton, Shane Hunter, Joshua Nine, Tim Eichler, and Jason Fougere CJA/214 November 20, 2012 Bernard Fitchpatrick Needs to be 1,050-1400 words Police Culture in the United States Analyze police culture, including the significance of stress in policing The study in police culture started in 1960 and the 1970’s by the work of Cain and Banton in the United Kingdom and Skolnick and Westlesy in the United States.Even though the study work wasn’t specifically concerned with police culture but rather sociological analysis of police officer and police work, it provided a wealth of material through the observation and analysis that was then later used to help formulate the theories of police culture. The characteristics of police culture have tended to remain static since the early days when first police researching program started. The literature on the police culture remained uncontenious for many years.Once the research started the results were rarely challenged and it is in only recent years that anyone has begun to see a body of work that is questioning these ‘core assumptions’ (Chan, 1997) about policing that has emanated from a culture analysis. It makes the police more then rather than less human than they have and reproduce their own culture. The police officer job is a very stressful job in many aspects, the occupational stressors as a cop rank most highly within the population were not specific to policing.The organization issues such as the demands of work impinging upon the life at home, lack of consultation and communication, the lack of control over workload, and the support and excess workload in general. The most recent study confirms previous findings of organization culture and workload as the key issues in officer stress. Given that the degree that symptomatology appears to be worsening, management action is required. Further research is indicated within the police population into a possible increased susceptibility in female officer proven by research.Analyze the culture for women and ethnic minorities in policing and how they can achieve equality in law enforcement Describe the internal and external mechanisms that control police discretion Conclusion * References * Grant, H. B. & Terry, K. J. 2012. Law Enforcement in the 21st Century, 3rd ed. Upper Saddle River, NJ. Pearson/Prentice Hall. * Walker, S. & Katz, C. M. 2011. The Police in America: An Introduction, 7th ed. New York, NY. McGraw-Hill. * University of Phoenix. (2011). CJ Interactive [Multimedia]. Retrieved from University of Phoenix, CJA214 website. * * * * Police Culture Police Culture in the United States Team B: Sean Milton, Shane Hunter, Joshua Nine, Tim Eichler, and Jason Fougere CJA/214 November 20, 2012 Bernard Fitchpatrick Needs to be 1,050-1400 words Police Culture in the United States Analyze police culture, including the significance of stress in policing The study in police culture started in 1960 and the 1970’s by the work of Cain and Banton in the United Kingdom and Skolnick and Westlesy in the United States.Even though the study work wasn’t specifically concerned with police culture but rather sociological analysis of police officer and police work, it provided a wealth of material through the observation and analysis that was then later used to help formulate the theories of police culture. The characteristics of police culture have tended to remain static since the early days when first police researching program started. The literature on the police culture remained uncontenious for many years.Once the research started the results were rarely challenged and it is in only recent years that anyone has begun to see a body of work that is questioning these ‘core assumptions’ (Chan, 1997) about policing that has emanated from a culture analysis. It makes the police more then rather than less human than they have and reproduce their own culture. The police officer job is a very stressful job in many aspects, the occupational stressors as a cop rank most highly within the population were not specific to policing.The organization issues such as the demands of work impinging upon the life at home, lack of consultation and communication, the lack of control over workload, and the support and excess workload in general. The most recent study confirms previous findings of organization culture and workload as the key issues in officer stress. Given that the degree that symptomatology appears to be worsening, management action is required. Further research is indicated within the police population into a possible increased susceptibility in female officer proven by research.Analyze the culture for women and ethnic minorities in policing and how they can achieve equality in law enforcement Describe the internal and external mechanisms that control police discretion Conclusion * References * Grant, H. B. & Terry, K. J. 2012. Law Enforcement in the 21st Century, 3rd ed. Upper Saddle River, NJ. Pearson/Prentice Hall. * Walker, S. & Katz, C. M. 2011. The Police in America: An Introduction, 7th ed. New York, NY. McGraw-Hill. * University of Phoenix. (2011). CJ Interactive [Multimedia]. Retrieved from University of Phoenix, CJA214 website. * * * *

Electronic civil disobedience Essay

Civil disobedience has been a large part of societies and the past generations that have existed. With the further dawning of the information technology era, civil disobedience has taken another form—electronic civil disobedience (ECD). Though ECD takes a rather non-violent means in advancing the interests of certain groups and positing challenges to the status quo of several institutions, ECD has nevertheless remained a crucial force in shaping the image of mankind in general and will remain to be a contributing element in the coming years—and beyond. A look into electronic civil disobedience: comparisons and analyses In contrast to computer criminality, electronic civil disobedience is a means merely designed to â€Å"attack the institutions† whereas the former is more inclined to obtain profit from â€Å"actions that damage an individual†. This standing distinction contests the probable argument that there is no solid, or at least an ideal difference between the two and that both are the same means in putting down the strength of an institution or of an individual. However, while computer criminality is, by the name itself, a crime punishable by existing and applicable laws under the jurisdiction of certain states, resistance via electronic means—the most common of which is through cyberspace—is deemed to be a means to challenge the existing authority, for instance, in pushing forth necessary changes that are being sought after by individuals. This measure is, apparently, still within the borders of the law and are, hence, legal. Electronic civil disobedience (ECD) is oftentimes carried out in a manner that is not violent or, at the very least, in ways that do not involve direct physical contact (â€Å"Electronic Civil Disobedience†). Although there can be indirect physical consequences that can be attributed to the means and ends that are involved with ECD, a large bulk of the essence of ECD rests on its forefront—resistance through the maximum utility of the intangible resources available. These resources are largely comprised of electronic information and invisible systems in cyberspace that do not require physical contact among the individuals that seek to advance their interests in the face of another individual or an existing authority. Though by and large much of the past generations—and even a considerable number of the present generation of citizens—have been closely attached to the physical means of civil disobedience such as in the literal sense of â€Å"taking-up the streets†, a shift in the manifestation of civil disobedience is greatly felt in the electronic realm. Since information technology’s presence has increasingly grown over the past few decades and since its developments have been continuous and have been exponential in refinement, the impacts of electronic civil disobedience has also risen in levels proportional to the booming of the information technology industry. As recent developments in the field of cyberspace expand abruptly, so are the probable means in which ECD can make itself successful in achieving it’s goals or, at least, in making its presence and mission felt across territorial boundaries of states (Cleaver). Moreover, this growth in information technology (IT) has also started to break down the physical barriers as well as the invisible fences that hold back attempts at pushing forth civil resistance or disobedience. The physical institutions that seek to eradicate or lessen the probability of occurrence of these civil resistances have slowly diminished its grip on its capability to harness barriers and put up defensive mechanisms that strain the success of resistance from citizens. At the height of the development communication tools, effective communication has spread like wildfire from among various areas in the globe. Cellular phone technology has amassed for the people easier means to effectively transmit messages across wide distances, thereby instituting a smoother flow of information relay. Group organization and mobilization is held at a unifying pace that easily penetrates the state borders and geographical barriers. This leads us to the notion that the as the advent of electronic communication—the internet and cellular phone technology to name a few—the expected rise in the efficiency and effectiveness of group mobilization and organization in the face of electronic civil disobedience is within reach. However, the abuse of ECD as in the case of civil disobedience (CD) is always a possibility to the extent that legal measures have also to be taken by the proper authorities so as to dismantle probable grounds for violent and unlawful measures in furthering the interests of several groups. ECD, for the most part, can be a ploy utilized by extreme groups that do not only seek refuge in the non-violent methods encapsulated within the essence of ECD but also seek unlawful ends through violent actions that spring forth from the devices and advantages brought up by the electronic media. Terrorists, for example, can opt to start their large scale plans of wreaking havoc in a populated society by getting a good hold of the electronic resources available almost everywhere. The September bombings of the World Trade Center in New York has devastated a number of lives and even up to this day the damage done can still be felt not only by those who were directly affected but also by the millions of people who fear the havoc of terrorism, especially in contemporary times where ECD is not something new. It would be interesting to note on the delimiting strands that segregate those that are purely in the form of ECD and those that hid behind layers of terrorist ploys. For the most part, ECD remains today as a growing tool used as a means in contesting the status quo by oppositional forces. This brings us to the security issues posited by the ECD that confront the targeted institutions by modern-day activists. Although security measures have been reinforced throughout the years with the further advancement in technology, cyberspace remains an open territory for civil activism—and hackers. Though there may be inconclusive findings that seek to establish a connection or an alliance between hackers and ECD groups, there remains the possibility that an actual connivance may actually exist, only that the alliance is hidden beneath the rubrics of the intangible world of technology. It may be an extreme thought to dwell on such a possibility. Nevertheless one cannot entirely dismiss its factual occurrence. In the context of the general population that subscribes to the established groups that further ECD, certain identifying marks have to be made so as to pinpoint the possibility of having a hacker among the number of activists that attempt at penetrating the electronic defense mechanisms of institutions. However, the rapid growth of the electronic resources and its availability prove to be one hefty factor to surmount by the institutions. Activism is all the more fueled by this growth and, thus, the efforts of the institutions are to be doubled or thickened accordingly if ECD is to be diminished. Quite on the other hand, ECD may not be diminished at all, nor can it be totally dissolved especially when the generation we have of today is one that is teeming with the abundance of electronic wealth (Wehling). It must be further realized that such an (ever increasing) abundance in the electronic resources found in cyberspace provides a fertile starting point for extreme organizations that might utilize ECD as an initial step towards electronic violence and as a front for the extensive damage that can be instigated through system crashes and data hostages. The person adept at information technology and electronic systems will readily convey that the probable damage of system crashes as well as data hostages are devastating in the sense that they do not only shaken the virtual foundations of institutions but also destroy the intangible interior foundations that build the electronic core of the institutions. Reparations may be met, though, but the time to successfully recover or at least partially get back on track is yet another factor that must be considered. Hence, security measures are as equally significant as the protection of the interests of these institutions, if not even far more important. Conclusion The impacts of ECD have been felt in many ways. As the growth in cyberspace continues to expand and exceed the standards set forth by previous generations in their attempt to resist the institutional forces and further the specific aims for taking up civil disobedience, ECD continues to be a driving force in directing the path of the electronic world. The presence of ECD in contemporary times will eventually stretch through time for as long as there remains a continued expansion in the domain of cyberspace and for as long as the interests of people are not met and properly addressed.

Tuesday, July 30, 2019

Prevention Of Elderly Abuse Neglect And Exploitation Essay

There is a growing concern over elderly abuse, neglect and exploitation as it has been lately estimated that its occurrence has increased over the past few decades.   The first reported estimate of elderly abuse stated that approximately 3% of elderly individuals in the United States have been abused (Pillemer and Finkelhor, 1988), which may be equated to approximately 2.5 million elderly individuals. Elderly abuse is closely linked to medical problems such as physical injuries, mental health disorders, poor management of chronic illnesses and disabilities.   The effects of elder abuse have been determined to be damaging.   Most of the abused elderly people are often brought to the emergency room for immediate medical attention for physical injuries.   A recent study conducted by Shields et al. (2004) over a 10-year period has indicated that more than 50% of deaths among the elderly are due to homicidal acts, while a 25% of the deaths were possibly due to elderly neglect.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Amidst the increasing number of elderly individuals being abused and neglected, there is an insufficiency of reaction amongst medical practitioners, including physicians and clinicians.   It has been estimated that only 2 to 10% of cases of elderly abuse are actually reported to the appropriate authorities.   These cases of elderly abuse involve physical and psychological abuse as well as financial exploitation. Neglect is also another condition that an elderly individual goes through yet is left unable to report such hardship to the appropriate agencies concerned.   Specific risk factors have been determined to be strongly associated with elderly abuse, including living with other people, as well as impairment of the elderly individual’s functional ability.   In addition, depression and excessive alcohol consumption also strongly influence the occurrence of elderly abuse.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A promising prevention strategy for elderly abuse, neglect and exploitation would then be to impose mandatory reporting of cases of abuse in tandem with annual or biannual monitoring of the conditions of an elderly individual.   Such mandatory act of reporting would thus put the people who are responsible for the care of an elderly individual to be responsible for any physical, mental, social or financial burdens that the elderly individual would experience. The people involved with the care of the elderly individual would include the children of the elderly person, as well as the physician, counselor and therapist of the elderly person.   It would also be good if the amount of time spent by each person with the elderly individual were determined, so that it would be easier to determine who spends the most time with the elderly individual.   Another method that could be incorporated into the mandatory reporting of elderly abuse is to conduct interviews with the elderly individual in order to determine if he has succumbed to memory loss or not. If the elderly individual is still cognitive enough to interactive with the interviewing officer, it would be helpful to ask the elderly individual if he is aware whether he still keeps some of his financial resources in his bank or some other place.   It would also be helpful if the elderly individual knew approximately how much money and other valuable items such as jewelry, real estate properties and automobiles he has so that there is an estimate of the resources the individual has.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The comprehensive interview of the elderly individual should thus be conducted every year in order to monitor how the elderly person if doing as time goes by.   In addition, the interview will also provide the social worker or any other interviewing official of the government to determine that conditions of the place where the elderly individual is living.   The medical records of the elderly individual should also be checked every year in order to determine whether the physical and mental condition of the elderly individual has been maintained or is deteriorating.   Should the condition of the elderly individual be deteriorating, the main cause of this change of condition should be investigated in order to prevent further damage to the physical and mental health of the elderly individual.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The intense monitoring of elderly individual may be tedious, costly and time-consuming, yet it protects these senior citizens from further abuse and neglect.   Time has shown that mandatory reporting of elderly abuse is not as effective as expected because most of the medical professionals do not participate or are not serious enough in reporting such conditions and the elderly people will continue to suffer.   The tandem implementation of mandatory reporting of elderly abuse with regular monitoring of the conditions of an elderly individual thus seems more feasible in protecting the health of elderly individuals. In addition, the regular monitoring of elderly individuals lessens the burden of physicians in reporting abuse and neglect of these senior citizens.   This proposed prevention strategy also provides a way for elderly individuals to speak out for themselves if they still can.   It is actually helpful and enlightening if the elderly individuals are given the opportunity to express their concerns, issues and problems with regards to their senior lives.   Should this proposed strategy be tested and later implemented, it may be possible to save more elderly individuals from unnecessary pain, depression and exploitation.   These seniors deserve to spend the rest of their lives in peace and harmony. References Kennedy RD (2005):   Elder abuse and neglect: the experience, knowledge, and attitudes of primary care physicians. Fam. Med. 37:481-5. Pillemer K and Finkelhor D (1988):   The prevalence of elder abuse: A random sample survey. Gerontologist.   28:51-7. Shields LB, Hunsaker DM, Hunsaker JC (2004):   Abuse and neglect: A ten-year review of mortality and morbidity in our elders in a large metropolitan area. J. Forensic Sci. 49:122-127.

Monday, July 29, 2019

The UK Housing Market Assignment Example | Topics and Well Written Essays - 1750 words

The UK Housing Market - Assignment Example There will be a realistic rise in the real estate prices i.e. the prices will not rise too fast.  There will be a realistic rise in the real estate prices i.e. the prices will not rise too fast.  (a) 5% tax on the sale price of each property means a considerable burden for the house-building firms. If such a tax is levied on house building firms, they are bound to pass it on to the retail buyers i.e. it will result is the increase in prices, which in turn means more costly proposition that will ultimately lead to decrease in demand. But some offers on the part of authorities like the offer of low-interest rates to the retail house buyer will help offset this decrease in demand (like in part-a above).  (b) If there’s a significant fall in the prices of construction material like bricks, mortar, and timber then that is definitely a piece of good news for the house building firms as well as the prospective buyers. This will make the housing market more lucrative and competi tive as this will lead to competition amongst the house building firms to offer best bargains to the buyers, which in turn will offer a range of choices for the buyer. This will ultimately result in a considerable reduction in prices. (c) The stamp duty is a must for any house property bought by any individual, as it is tax paid to the government. But supposing Gordon Brown makes an announcement on May 1, 2006, that stamp duty will be doubled w.e.f. then the very first impact it will have is a rush for registering the properties before June 1 and thereafter there’ll be a phase for a couple of months when there will be a fall in the number of property registrations. Thereafter it will not have much of an effect on the prices as such reason being it is not a factor directly affecting the existing prices, but it will lead to some lull in demand.  

Sunday, July 28, 2019

Business advise Essay Example | Topics and Well Written Essays - 250 words - 1

Business advise - Essay Example This massive drop in revenue may result in the hospital being unable to meet operational cost thus resulting in closure. The first solution to the problem is that the hospital can form its own ACO. Since the hospital has access to funding as a source of capital, it can easily raise money to set up an electronic record of patients (McCaffrey 217).The hospital has trained health professionals who can handle clients. This is extremely beneficial since to hospital will not need any additional funding as it makes use of resources already at its disposal. However, this is time consuming and since most of the patients around already belong to a functioning ACO, it would be very hard to convince them to join the new outfit. Second, the hospital can pot to buy some of the ACOs already in operation. The hospital would spend money on the acquisition only; the rest of the infrastructure is already in place. The challenge in this case would be convincing the doctors involved to selling their venture (McCaffrey 218).The option of buying into an already established ACO would be the most appropriate. Buying existing ACOs is a low level of risk because the system is already functional and has a client base ready to receive

Saturday, July 27, 2019

Accounting information system Essay Example | Topics and Well Written Essays - 1250 words - 5

Accounting information system - Essay Example n cases where they have accepted to donate, the organization simply collects the cheque or cash from the donors and issues an acknowledgement for receipt of the funds. Some of the donors are government agencies, corporate sector, trust and foundations. Additionally, the organization gets its finances from program fees and consultation fees. Therefore, the revenue cycle has limited actors and the processes are simple and few as well. For instance the process of obtaining revenue is through donations and fees charged for consultations and program fees. There are no products or services to be sold in exchange for money. Therefore processes such as order processing, billing, invoicing and deliveries are not there. The revenue cycle is initiated by developing a set of programs and projects that can be funded by the donors. The organization writes a proposal to the donors who will in turn give a feedback on whether they will support the proposal or not. The following are some of the processes inherent in the revenue cycle: i) Request Proposal: This is done by the projects and program development department. The proposal for the various projects and programs is developed and submitted to the various donors. The donors will go through the proposals and determine whether they will support the project or not. Proposal development is an intensive process that requires a team of experts. The final proposal is submitted by a projects coordinator who is in charge of all project activities in the organization. ii) Approval of program Proposal: Once the donors receive the proposal, they will scrutinize the contents of the program proposed and decide whether to fund it or not. They will then approve the program and pledge their support for the organization. The program proposal always has the estimated budget, the duration of the program and the expected start and end date. It also has additional details that include the financial and technical proposal. It must have the

Friday, July 26, 2019

Operation Management - Maritime, Oil Spills Research Paper

Operation Management - Maritime, Oil Spills - Research Paper Example Discussion Oil spillage has extreme negative impacts on the environment in terms of pollution. This affects the communities that heavily depend on water for their lively hoods and their survival. The most directly affected by oil spills are the marine plants and animals because they live in the same environment that spillage takes place. Spillage can be as a result of oil seeping from the underwater reservoir, accidents of ships carrying oil and also from land sources. The sea animals are subject to both indirect and direct repercussions of oil spillage. According to Neff (2002), some of the direct effects include; inhalation problems, which commonly affect whales, dolphins and sea turtles. These animals require oxygen for their survival. They animals usually come to the water surface constantly to inhale oxygen. The inhalation of dangerous materials can cause irritation, pneumonia or inflammation of their respiratory organs. Negative impacts can also be felt on their digestion mecha nisms where these animals are unable to either digest or absorb food. Human beings are also directly affected by oil spills. When oil spills, it creates a vapor in the air which is as a result of evaporation of oil in the air since oil is a semi –volatile product. ... Oil spill also affects mangrove trees whose rate of growth tends to be slow when their prop roots are covered with oil (Burger, 1994). Oil spillage has posed a very significant challenge on fisheries which also acts as a food reservoir. Oil spills has affected the genetics of some fish which has affected their egg bearing. Oil spillage may also lead to extinction of certain types of fish in the sea in the near future which may lead to the closure of fisheries if several types of fish become extinct in the sea. Oil spills may cause loss of color on fish and lead to their loss of weight the reasons that may cause fishing to be closed for some time because this fish will be unfit for human consumption thereby causing food shortage (Neff, 2002). Boats and other sea vessels are prone to destruction because of running on viscous and thick layers of oil which have resulted from oil leaked from pipes in the underwater. Some thick oil globules present in the water due to oil spillage may be s ucked in the boat’s systems, which definitely affect the functioning of the boat due to the fact that all systems draw water into the boat near the surface. For it to function well, a very strategic cleanup process is used to disperse and manage the mess. Many ships, boats and other sea vessels may tend to avoid their travelling schedules until the oil spillages under control thus causing congestion of traffic and goods to be transported (Burger, 1994). Trade may also be adversely affected by oil spillage due to various factors. One of factors may be due to interruption of transportation lines where boats and other marine vessels may fail to operate due to oil

Housewife to Career Term Paper Example | Topics and Well Written Essays - 1750 words

Housewife to Career - Term Paper Example Whatever a woman did, fell in the category of non remunerative work. Howsoever hard a woman worked and contributed towards the smooth running of the house, the society at large, did not appreciate that. And at the end of the day, the woman was still dependent on the man for any monetary support. Any misdemeanour by the man was pardoned because he is doing the most important thing; earning money. The woman was destined to live her life as a ‘dependent’ and at the whims and fancies of her spouse and family. Things had to change and they did. More and more women began to join the workforce. For some, it bolstered the family income, for others getting employment was breaking free from the humdrum of the daily life. Getting employed was kind of breaking the shackles and living a life of dignity. This transition from a housewife to a career woman has not been easy for various reasons. This paper details the problems women face, at home as well as in office, when they opt to work. It also puts forth data which establishes the presence of a glass ceiling in organizations that thwarts the progress of women. An attempt has been made to gauge the reality when it comes to the number of women actually making to the top of the corporate ladder. The first stumbling block on the road to progress is the mindset; the opinion that the other members of the family, especially the elders, have about the housewife no longer remaining a housewife and going out of the house to work. This orthodox mindset is an added mental pressure on the woman whose original responsibilities of managing the household remain with her, irrespective of the fact that she has now started working and started contributing towards the finances of the household. There is no denying the fact that women also have more personal and social pressures than men. If in a family where

Thursday, July 25, 2019

Contemporary Documentaries Essay Example | Topics and Well Written Essays - 2750 words

Contemporary Documentaries - Essay Example Ð ¡ontemporary documentaries inherently present a national identity. Such national identity indicated through the films depicts shared values including collective identity and instilling communal sense. For instance, The Two Escobars reflects effects of class stratification on imperative economic activities including sports. Sporting activities such as football can spur unity in a given nation when citizens initiate loyalty in supporting their national team. However, the documentaries may also reflect inherent challenges faced by the society in relation to leadership and economic disparities effects. Though band members in Metallica: Some Kind of Monster documentary can overcome financial challenges by recruiting a performance team, they face struggles in leadership, especially between Ulrich and Hetfield. The leadership struggles greatly affects their performance and Towles has to mediate. The aforementioned personal differences in the documentary reflect a modern society where specific organizations fail to deliver their mandate due to leadership issues mainly resulting from personal differences. Similarly, This is Spinal Tap struggles to promote their newly produced album under less innovative leadership that also faces financial challenges. The plight of poor marketing strategies and financial problems presents many challenges to the contemporary society especially corporate organizations. Various contemporary films including sports , mock, investigative, and rock documentaries possess various similar primary features that include informative and influential nature.

Wednesday, July 24, 2019

The Portrayal of Transsexualism in Media Essay Example | Topics and Well Written Essays - 750 words

The Portrayal of Transsexualism in Media - Essay Example Transgender people know that most of the outsiders consider them to be somehow impaired, or mentally ill. This opinion dictates the suspicious attitude towards those, who don't belong to the community. The transgender community positions itself as a group of people who have a complex of medical/psychological problems they help each other to solve. They also let the outer world know that they unite not to let the world offend or discriminate those, who belong to their community. Transgender community is centered on the idea that the members have to support each other to ensure their survival. Some researchers identify transsexuals as the representatives of the "third sex" (Shapiro, 1991), thus transgender people often feel that they differ from the rest of the world psychologically, socially, and culturally. Some historians said that transgender people have always existed, but they revealed themselves only in the 20th century. "The modern study of what might be called transgenderism began with Magnus Hirschfeld and the 1910 publication of his book, The Transvestites: An Investigation of the Erotic Desire to Cross Dress", - says Vern L. Bullough, the author of the study Transgenderism and the Concept of Gender (2000). After this study, many scientists contributed to creating the transgender scientific base, including Freud. People have been becoming more and more tolerable towards this minority throughout the 20th century. Transsexualism is an issue that is widely discussed in media nowadays. Transsexuals as a group have announced themselves relatively recently, thus there is still lots of misunderstandings about the nature of the desire to live like the representative of the opposite gender. Lots of Americans have wrong information about the issue of transexualism, that is why prejudicial stereotypes are developed in the U.S society. Unfortunately media is one of the main sources of those stereotypes. It is natural, as it is from the media that most U.S dwellers get the information about transsexuals, but when this issue is put in the wrong light in books, articles, or TV shows, it creates severe problems for transgendered people and their families. The transsexuals often have problems with medical care, and with legal forces. The thing is that the usual doctors and nurses, as well as policeman, have little understanding of what the transsexual are. They have their own stereotypes about transsexuals, and, as a result, the transsexuals are often discriminated by these specialists. (Conway, 2003).They also have problems registering marriage in some state. In Kansas and Texas, for example, transsexual marriages are sometimes declared invalid, and the judges even sometimes refuse to acknowledge that the operated person is a representative of the gender other than he was born in. (Minter, 2004). For example, some articles and books, especially those written by orthodox believers, promote an idea that transsexualism is a mental illness. Moreover, de-jure they are right, as in DSM-4 (Diagnostic and Statistical Manual of Mental Disorders) it is classified as an illness. This is one of the main reasons for which transsexual people suffer discrimination when trying to find a job, as most employers don't wont to hire a person who is "mentally

Tuesday, July 23, 2019

Strawberries Attributes and Promotion Strategies Research Paper

Strawberries Attributes and Promotion Strategies - Research Paper Example What image do you currently have in regards to strawberries? What are the positive and negative aspects of this image? 2. What features or attributes do you consider when choosing whether to purchase strawberries and why these features? 3. In what situations do people eat strawberries? 4. Why do you think some people do not purchase strawberries? What then would motivate them to purchase strawberries? 5. Are people willingly ready to purchase a punnet of strawberries? Do you always buy in punnets? And how often? 6. What values do you have in regards to eating strawberries? Do you think these values can attract other customers to eat strawberries? Respondent one I love strawberries. They are sweet and healthy for the body. My children love them also. Otherwise people do not eat the fruit because of the organic foods being introduced all over. The attributes I look for I the oduor of the fruit and its size. The fruit should have a sweet aroma and should be just ripe. I often buy berrie s that also well packaged by the local industries. People tend more often to eat strawberries during picnics and as a fruit at home. I always carry some during picnics. Some people tend to have different desires for fruits. I think some just dislike the fruit, the price is not consumer friendly or they eat it in other form like wines and jams. I think it is wise to create awareness of benefits of eating the fresh whole fruit in matters of health. Otherwise advertising would go a long way in achieving this and free samples. People always purchase punnets of berries. Personally I do that all the time. I value the health benefits of this fruit. Research has shown that it helps in fighting cancer and has a lot of nutrients. I think people should be made aware of this value. I believe it can change the whole outlook of strawberries. Respondent two I do eat strawberries as a fruit. I however, prefer other types of fruits. The strawberries are quite expensive compare to maybe eating a bana na. I look for big bunches that are freshly packaged; Plus of course the price of the entire package. People eating strawberries anytime at work, leisure, breakfast. Personally I eat them over lunch time. I think they don’t like the fruit otherwise the price is not as high as to discourage consumption. Otherwise with the issue of inorganic and organic foods they may also have had an issue. To motivate them to buy, promotions with free samples etc. should be done. People always buy punnets of strawberries. I value the fresh fruit in matters of nutrient content plus it is a good way to maintain weight. Respondent three I love strawberries because they are good for my health. I always smell the fruit; I read the package plus am very conscious regards to inorganic fruits. I prefer locally produced. During picnics, breakfast, lunchtime. People do not always purchase them because they do not understand the benefits of strawberries. Irregardless of the price I think the benefits out weigh the cost. People always buy them in punnets. I do that every day. I value the health benefits plus the taste of the strawberries. They look so good and taste so good. Health promotion should be done in regards to strawberries. Respondent four Strawberries are just fruits like any other fruit. I don’t consume it so often because of the upcoming brands of inorganic foods in the market. I check for locally produced strawberries that are fresh. During

Monday, July 22, 2019

ICAO personnel licensing Essay Example for Free

ICAO personnel licensing Essay APPLICATION OF ARTICLE 39 (b) [Q- b) If Article 38 has to be complied with regardless of the nature of the difference, and the State legislation is more demanding than the equivalent SARP, should this difference be endorsed on a flight crew license in accordance with Article 39 (b)? ] Article –39(b) provides us that a person holding a license but does not satisfy in full the criteria or conditions laid down in the international standard relating to the class of license or certificate that he holds shall have endorsed on or attached to his license mentioning the complete enumeration of the particulars in which he does not satisfy such conditions. But, there are not provision under Article –39(b) to endorsing the over criteria or extra quality in his license. As a result if Article 38 has to be complied with regardless of the nature of the difference, and the State legislation is more demanding than the equivalent SARP, this difference does not endorsed on a flight crew license in accordance with Article 39 (b). Q- C) Does Article 40 have to apply at all times? Article-40 tells us that about the Validity of endorsed certificates and licenses. It is clearly written that, on aircraft or personnel having certificates or licenses so endorsed shall participate in international navigation. Exception allowed with the permission of the State or States whose territory is entered. Use of any such aircraft, or of any certificated aircraft part, in any State other than that in which it was originally certificated shall be at the discretion of that State into which the aircraft or part is imported. In Abdul-Hussain and Others (1999), the appellants had sought to rely on the defense of duress of circumstance in answer to a charge of hijacking contrary to section 1(1) of the Aviation Security Act-1982. The Applets were Shiite Muslim from southern Iraq, who had fled to Sudan. They were over stayers in Sudan and feared being arrested and return to Iraq where they expected to be tortured and executed. To avoid this eventuality they hijacked a Plane at Khartoum Airport and forced a Pilot to fly to London where they sought Political Asylum. Court of Apple quashed their Conviction. In this case there were enough scope to apply Article-40 of Chicago Convention, but not at all applied. But all time the Article-40 is not applicable. I think it may be applicable in accordance with the situation that demands. Such a situation of 11th September, it demands to apply Article-40. At the same hijacking of Iraqi Aircraft and landing in US may not apply Article-40. It also ought not to apply Article-40 in natural calamities such as bad weather or Tsunami rescue initiative. The context of the International Civil Aviation Organization (ICAO) universal safety audit programme, that audit of civil aviation regulation in the United Kingdom took place in July 2000. The findings were generally positive. In the area of general aviation (i. e. non-public transport flying) many Standards and Recommended Practices (SARPs) contained in the relevant annexes to the Chicago Convention may not been implemented. In this Context, ICAO recommended that the UK should take steps to amend the legislation instead of notifying differences. UK policy with regard to the contents of ICAO annexes is that all Standards where appropriate; Recommended Practices will be reflected in national legislation and requirements. The non-compliances with the SARPs concern operational and equipment requirements not currently prescribed in the Air Navigation. The civil aviation legislation should be amended to remove areas of non-compliance with internationally accepted standards contained in the ICAO annexes applicable for the General Aviation operations. This Most important proposal involves amendment to Article 40, 41, 43, 45, 62, 129 and Schedule 4 and 5 of the Air Navigation Order d) If you argue for changes, prepare draft amendments to the relevant Articles of the Convention. Yes, I argue for Changes in Articles of Chicago Convention of ICAO. The Chicago Convention was under reality of the year 1944. A long time, more then a half-century has changed the national international politics, technological development and changes in life style. So I must think Articles of Chicago Convention required change as time demand. Modification must be in accordance with European Union European Convention of Human Rights. Articles 39 and 40 of the Convention are also relevant to the age limit of pilots-in-command engaged in commercial air transport operations. As they authorize international flights by flight crew those who do not meet all international licensing Standards or provided that an authorization is given by each State into which the aircraft is operated. In practice, it means that if a pilot in command is under the age specified in paragraph 2. 1. 10. 1 (60 years at present and 65 from November 2006) he/ or she cannot be prevented by reason of age from operating into any ICAO Contracting State. For further instance, once he has reached the specified age, that one may still operate as PIC, subject to certain conditions: 1. His/her national Licensing Authority permits it 2. Operations are undertaken only in national airspace untill and unless, 3. Another State has given specific authorization that such flights are permitted in its airspace. A State may wish to impose a lower maximum age limit than that specified by ICAO in 2. 1. 10. 1. It may do this for the licenses it issues, but, as stated above, it cannot prevent an aircraft operated by a PIC holding a licence from another State, who is below the ICAO upper limit, from operating in its airspace. For co-pilots, since paragraph 2. 1. 10. 2 is a Recommendation, not at all a Standard, the upper age limit is set by the national Licensing Authority which can choose to impose any national age limit on the licenses it issues, as there are no international restrictions based on age for co-pilots. Here I shall argue to amend Article-39 (b) and the Draft Amendment is as follows- Draft Amendment on Article-39 (b) of Chicago Convention of ICAO Existing Article –39(b) : ‘Any person holding a license who does not satisfy in full the conditions laid down in the international standard relating to the class of license or certificate which he holds shall have endorsed on or attached to his license a complete enumeration of the particulars in which he does not satisfy such conditions’ Limitations: The article addresed to endorse the disqualifications in the licence, but no option for endorsing over qualification then the standard. There is also no provition for penilizing for disqualificatio. Suggested Amendment: a) Any person holding license, there should be provision of endorsed or attached the complete enumeration of every particulars in which he satisfy or does not satisfy. b) For particular number of unsuccesfull attemps( 3 to 5 attemps), license should be withheld and sent Apprentice. c) For succesful attemps, license category should be upgreaded d) Nationality, race or color may not influence the whole process. e) Providing training for the recommended under Article 39 Conclution The objectivesICAO states that the aims and objectives of ICAO are to develop the principles and techniques of international air navigation and to foster the planning and development of international air transport. ICAO is composed of an Assembly, composed of representatives from all contracting States. The Assembly normally meets every 3 years, votes a triennial budget, and sets the work program for the next triennium. The governing body composed of 33 States, elected by the Assembly for three-year terms. (The U. S. has always been elected to the Council. ) The Council establishes Standards and Recommended ICAO, the International Civil Aviation Organization and is one of the specialized agencies of the United Nations has plaiyed its vital global role for safety of and development of standards for international civil aviation. In the todays global aviation environment, its important to keep in mind that the rights and obligations all countries throughout the world have agreed to observe in matters of civil aviation and ICAO defines rights. I have designed this document to present general overview information on ICAO Atricles as 38, 39 40 and its relevance to our Tropics. There are differnce on how the United States meets ICAOs standards related to aircraft airworthiness is also provided. The purpose of this document is to assist the personnel to understand ICAO act extraterritorially in a manner that might infringe on the rights of another ICAO contracting state. Referance : 1) Crimila Law , Michel J Alen , 7th Edition 2003. 2) Web: http://www. caa. co. uk/ 3. Web : http://www. icao. int.

Sunday, July 21, 2019

Current problems with harm reduction and future direction

Current problems with harm reduction and future direction Any individual hoping to investigate what the problems and limitations of harm reduction are as it stands now and the direction it should go in, must be aware of the development of harm reduction as a solution to drug use. The individual will also need to further investigate the benefits and advantages of harm reduction. Five areas are particularly important when examining what the problems and limitations of harm reduction are. How harm reduction is defined and how it has developed over the past twenty-five years, the importance of harm reduction in relation to drugs and addiction, what the problems and limitations associated with harm reduction are, what the benefits and advantages associated with harm reduction are and what future direction harm reduction should go in. Each of these areas all need to be understood, with the awareness that the advantages of harm reduction far outweigh the disadvantages, allowing it to remain the one of the most important solutions for dealing with drug use and drug users. Of critical importance when examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in, is to have some understanding of how harm reduction is defined and how it has developed over the past twenty-five years. Although very similar to one another, harm reduction and harm minimisation must be separated, with harm minimisation referring to Australias National Drug Strategy which includes supply reduction, demand reduction and harm reduction and harm reduction referring to programs designed to reduce harm (Australian National Council on Drugs 2004: 2). The term harm reduction itself can be defined as those policies and programs which seek to reduce or minimise the adverse health and social consequences of drug use without requiring an individual to discontinue drug use (Inciardi Harrison 1999: 3). By defining harm reduction in this way, it is able to recognise that many drug users are unwilling or unable to refrain from drug use and that there is a need to provide them with options which reduce the harms of continued use including overdose and the spread of disease (Inciardi Harrison 1999: 6). Not only does harm reduction aim at reducing the risks and harms associated with drug use it is also formulated around three central principles which have been proposed and developed by drug expert, Robert Westermeyer (Hanson et al. 2006: 534). The first is that excessive behaviours occur along a continuum of risk, in which moderate drug use has a lower risk of harm than that of extreme drug use (Hanson et al. 2006: 534). The second principal is that changing addictive behaviour is a stepwise process, complete abstinence being the final step, where in any move away from harms of drug use is a positive one (Hanson et al. 2006: 534). The final principal is that of sobriety simply isnt for everybody, which relates to the fact that some individuals are unable to cope with whatever circumstances they are in without drug use and that unfortunately drug use is a fact of life for some (Hanson et al. 2006: 534). Over the past twenty-five years, harm reduction has risen in prominence to become one of the central aspects of many drug policies and programs not only in Australia but around the world (Moore Fraser 2006: 3036). In the case of Australia harm reduction has been incorporated into the principles of harm minimisation which have been the framework for Australias National Drug Strategy since 1985 (Waller Rumball 2004: 40). Further adding to the rise in harm reductions popularity is acknowledgement that drug use and abuse is and has become a public health issue rather than a legal issue which can be solved with sanctions and prison (Inciardi Harrison 1999: 9). Not only has harm minimisation changed the way in which Australia deals with drug use and users but it has also changed many of societys attitudes and stereotypes about drug users (The Drug Prevention Network 2010). Rather society now thinks about the drug user in relationship to both the environment and circumstances in which they are using drugs and how best to reduce the harms of this drug use (The Drug Prevention Network 2010). Having gained an understanding of how harm reduction is defined and how it has developed over the past twenty- five years, the importance of harm reduction in relation to drugs and addiction can now be examined. It is also of crucial importance when examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in, is to have some understanding of the importance of harm reduction in relation to drugs and addiction. The term drug itself has been best defined as being any substance which when entered or absorbed into the body may modify, alter and change one or more of its normal physical or mental functions (Cornwell Cornwell 1993: 7). The benefits of employing such a broad definition in relation to harm reduction, is that it incorporates any substances which are considered to be drugs but it also includes those which are not normally thought of as being drugs, such as food or sex as drugs, which are often perceived and understood differently within society but may also cause harm to the individual (Cornwell Cornwell 1993: 7). As the term addiction itself is rather ambiguous and difficult to define, alternate terms have often been adopted in place of or associated with addiction particularly that of drug or substance dependence which often serves to be most useful, especially in relation to harm reduction, as harm reduction may not completely eliminate the dependence (Marlatt 2002: 200). The term drug dependence has been defined as, the continual or persistent use of alcohol or other such drugs regardless of the problems related to the use of the drug, the uncontrollable and repetitive use of the drug may also result in a build up of tolerance to its effect as well as withdrawal symptoms when its use is reduced or stopped (American Psychiatric Association 2000: 192). Drug dependence can also be further expanded to incorporate the persistent desire that an individual may have to use a drug in large amounts or over extended periods, irrespective of its harmful effects (American Psychiatric Association 2000: 194). The importance of harm reduction in relation to drugs and addiction is further highlighted by the use of harm reduction methods and strategies on individuals who have become addicted to a drug (DiClemente 2006: 231). Harm reduction aims at reducing and preventing the harms of addictive drug use rather than stopping the addiction itself, although efforts to help the addict practise safer or decreased drug use may often lead to a complete abstinence from the drug (DiClemente 2006: 232). Although harm reduction methods can be controversial, they are often very effective, particularly in decreasing the spread several diseases often associated with drug use and addiction including HIV and hepatitis C (DiClemente 2006: 232). With a deeper understanding of the importance of harm reduction in relation to drugs and addiction, it can now be understood what the problems and limitations associated with harm reduction are. Furthermore it is of crucial importance when examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in, is to have some understanding of what the problems and limitations associated with harm reduction are. There are several problems and limitations that are often associated with harm reduction, with the first of these being that harms are identified according to dominant middle class values (Miller 2001: 175). As harms are established according to these dominant values, they often do not take into account the values of those at greatest risk from harm, choosing rather to construct harm reduction strategies based upon the dominant values of society (Miller 2001: 176). Furthermore these same strategies are also based on cost efficiency, with economically beneficial strategies often being favoured over health or community beneficial ones (Miller 2001: 175). The next problem which will be examined is that, harm reduction often condones or encourages drug use even though it is attempting to reduce the risks (Abadinsky 2008: 417). As the main aim of harm reduction is to reduce the risks and not the use of drugs, messages may often be conveyed which condone the use of harmful drugs (Dale 2005). This criticism is particularly prevalent within school education as excessive education about the risks associated with drug use may instead create an aura of intrigue around the subject, which often appeals to a childs curiosity (Abadinsky 2008: 417). The third problem associated with harm reduction which will be examined is that, needle exchange schemes facilitate and make the transition to intravenous drug use easier and more appealing (Ghodse 2008: 264). These schemes actively provide drug users with easy access to injecting equipment, which makes the transition to injecting easier, which gives users less incentive to give up injecting and may al so persuade younger drug users to start injecting (Ghodse 2008: 265). The establishment of needle exchange facilities also create safe meeting spots for intravenous drug users, which strengthens both the social networks of users as well as the prevalence of intravenous drug use (Ghodse 2008: 265). The last problem associated with harm reduction which will be examined is that, harm minimisation fails to address the underlying reasons for drugs current legal status (Miller 2001: 173). As harm minimisation focuses on supply reduction, demand reduction and harm reduction it fails to examine the status of different drugs, choosing to rather label distinctions between them as irrelevant and unnecessary (Miller 2001: 173). Furthermore harm minimisation also fails to address the reasoning behind the massive profits which drug companies reap through the sale of drug substitutes particularly that of methadone, which indicates that the government also benefits financially from the sale of these substitutes (Miller 2001: 173). With a deeper understanding of what the problems and limitations associated with harm reduction are, it can now be understood what the benefits and advantages associated with harm reduction are. Equally, it is crucial when examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in, is to have some understanding of what the benefits and advantages associated with harm reduction are. Just as there are several problems associated with harm reduction, there are also many benefits and advantages which are associated with it too, with the first of these being that harm reduction maintains a value-neutral standpoint (Keane 2003: 228). As harm reduction acknowledges that there is no ultimate solution to drug problems, pragmatic and rational strategies and solutions can be constructed and assessed through the objective calculation of consequences (Keane 2003: 228). Further adding to the value-neutrality of harm reduction is its refusal to support or oppose any view about drug use and drug users, except to the extent that its aims are based around reducing the harms of drug use (Keane 2003: 228). The next benefit which will be examined is that, needle exchange schemes are becoming more and more successful and widespread within society (Ghodse 2010: 264). Following the establishment of needle exchange schemes, their main aim is at keeping injecting drug users from sharing needles and transmitting blood bore diseases particularly that of HIV and hepatitis C (AVERT 2010). By providing injecting drug users with access to sterile equipment, they are also given access to drug treatment services (AVERT 2010). Since the implementation of needle exchange schemes within Australia, studies have found that needle sharing has decreased dramatically, with 32,000 HIV and around 100,000 hepatitis C infections being prevented in the last decade (AVERT 2010). The third benefit which will be examined is that, harm reduction is extremely cost beneficial (Petersen McBride 2002: 126). These cost benefits are particularly evidenced in relation to needle exchange schemes, as it is much cheaper and easier to implement these schemes than it is to treat people who have contracted HIV and hepatitis C (Petersen McBride 2002: 126). Harm reduction strategies also demonstrate their cost benefits through the ease in which these strategies have been adopted and implemented into the National Drug Strategy since 1985 (Inciardi Harrison 1999: 181). The last benefit associated with harm reduction which will be examined is that, education about the risks of drug use has profound and long term benefits particularly amongst children (Abadinsky 2008: 270). Education often occurs in several forms with many of these having no effect or harmful effects in the uptake of drugs, it is often education which teaches about the risks associated with drug use that have the greatest and most beneficial effect (Abadinsky 2008: 270). By educating and providing information to children about the risks of drug use, particularly those of potential health consequences, negative attitudes often develop towards drug use which deter them from using drugs (Abadinsky 2008: 270). With a deeper understanding of what the benefits and advantages associated with harm reduction are, it can now be understood what future direction harm reduction should go in. It is also of crucial importance when examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in, is to have some understanding of what future direction harm reduction should go in. Although harm reduction has its problems and limitations, they are far outweighed by its benefits and advantages. In order for harm reduction to gain further strength and support it must continue in the same direction as it has been over the past twenty-five years, with an emphasis being placed upon retaining its value-neutrality where in does not support or oppose any one particular belief about drug use (Keane 2003: 228). Furthermore, in order for harm reduction remain as effective as it is, its main aim and priority must remain that of reducing the risks and consequences associated with drug use and the effect it may have on the individual and others within society (DiClemente 2006: 232). Although harm reduction must continue in the same direction, it must also gain improvement in several key areas particularly that of education about risks as well as the greater promotion of needle exchange schemes. Current education policies which aim at providing children with information and knowledge about the risks associated with drug use, often carry with them certain aspects of intrigue which appeal to a childs curiosity (Abadinsky 2008: 274). In order to improve and place a greater emphasis on education, campaigns such as just say no must be eliminated with an enhanced focus being placed upon imagery and documentaries which highlight the risks of drug use (Abadinsky 2008: 274). It is only by using imagery and presenting stories about these risks which have been experienced firsthand by many individuals, that education about the risks of drug use will improve and remove drug curiosity (Abadinsky 2008: 417). As effective as needle exchange schemes are, there is still much room for improvement, particularly in relation to the number and accessibility of these locations. The greatest downfall which faces needle exchange schemes is that they are not widely accessible throughout Australia, either because they have yet to be constructed or are unable to provide a suitable health services to injecting drug users (Hagan 2010). Government studies are also contributing to the need to increase and improve needle exchange locations, as almost 60,000 HIV and over 120,000 hepatitis C infections have been prevented over the past twenty years, which has also led to healthcare cost savings of over $1 billion (AVERT 2010). It is only by increasing and improving these facilities that the future spread of blood bore diseases will be reduced even further, as a direct result of implementing harm reduction strategies (AVERT 2010). With an understanding of what future direction harm reduction should go in, ind ividuals must remain aware that harm reduction must remain at the forefront of combating drug problems and issues, particularly in conjunction and alignment with harm minimisation. In conclusion, there are five particular areas that an individual should examine when investigating what the problems and limitations of harm reduction are as it stands now and the direction it should go in. They should gain an understanding of how harm reduction is defined and how it has developed over the past twenty-five years, along with the importance of harm reduction in relation to drugs and addiction as well as what the problems and limitations associated with harm reduction are and what the benefits and advantages associated with harm reduction are, which will allow them to understand what future direction harm reduction should go in. It is only by gaining an understanding into these areas that an individual can hope to be successful in examining what the problems and limitations of harm reduction are as it stands now and the direction it should go in.

Analysis of Web Service Efficiency

Analysis of Web Service Efficiency Abstract Web service standards used nowadays are Extensible Markup Language based and the important technology in communication between heterogeneous applications are over Internet. Thereby selecting an efficient web services among numerous options satisfying client requirements has become a challenging and time consuming road block. The path for the optimal execution of all the user request is done using the Hidden Markov Model (HMM). The results have shown how our proposed methodology can help the user to select the most reliable web service available. Our analysis is about creating a cost effective servicing mechanism for web services, if effectively implemented this concept will reduce the need for network engineers in maintenance of web services. As a result of the parallelism technique used in this analysis significant reduction in RT and increase in composition speed has been observed. Keywords: Hidden Markov Model (HMM), Extensible Markup Language, Web Services, Service Quality Architecture (SQA)   1. Introduction In the Service Web the feedback of customers constitutes a substantial component of Web Service trustworthiness and reputation, this in turn affects the consumer service uptake in the future. All that we presents here is an approach to predict and assess the various reputations that are prevalent in the services oriented environment that is prevalent. All the web services enable computer-computer (c2c) communication in a heterogeneous environment, hence they are very suitable for an environment such as the internet. People can use the standardized web service model for rapid design, implement and extended applications. Many enterprises and corporations provide different web services to be more responsive and cost-effective. All activities that are composite services in nature may be defined by the graphs of control flow and the after coming data graphs. As a service provider, the foremost importance is for the bound(upper), the mean RT of a request given some request load and some architectural environment. Furthermore, this computation should be only performed before the actual deployment and usage of the service. In exceptional cases of service thats of composite nature this performance of the service depends on only the hypotheses about all the invoked service that are elementary in nature. Component approaches another very important benefit is reuse. In the web service definition language all the service that are of elementary nature are conceptually limited to relatively very simple features that can be only modeled by a collection of operations that co exist. Moreover, in due to the application kind its very much necessary to combine a set of all the web services into a single composite web servic e. All of the proposed methodology exploits is the ideas from the Software Architecture- and Component-based approaches to software design. The process of web service selection and discovery of system is essential to provide the clients with proper results and that fulfills their requirements. Its impossible for anybody to fulfill the task without considering all the ranking relations that exist between thousands of various available candidates that have similar functionalities. Thus, ranking is a fundamental process of a Web service selection system, as this integrates all the results thats gathered from previous stages and presents them to those requested. This paper is focused on the various ranking process by considering users SQA requirements. Hidden Markov Model (HMM) A Hidden Markov Model is very well related to the study of how likely or unlikely things are going to happen in the graphical model that is available and well suited in dealing with a sequence of data that are related. The very basic way of thinking this is that we have a set of states, but the road block is we wouldnt know the state directly (this is the reason that makes it hidden). Instead of this, we can only make a state, but we are not in position to tell the state of proceedings for sure. Addition to this is that there are changes (from one thing to another) that is in between states. Each of the change (from one thing to another) between the states is also called as a chance. Sometimes these are known, sometimes they are not known. These states are very flexible instrument that can be put to use not just for clarification purpose but also for (division of something to smaller parts) the purpose and even to create or see or hear things that arent there data. The property of ge nerative works by training a model on this data and then randomly creating chances of (instance of watching, noticing or making a statement) and change (from one thing to another). In this way, you can create data using a hidden markov model. 2.1 Definition Our model of HMM is defined by specifying the following variables: X = {x1, x2, , xn} = set of states Z ={z1, z2, , zm} = the output alphabet à Ã¢â€š ¬(i) = probability of being in state xi at time t = 0 A = transitional probability = {aij}, where aij= P r[entering state xj at time t + 1 | in state xiat time t]. Note that the probabilities of going from state i to state j doesnt depend on the previous states at earlier times. B = output probability ={bj(k)}, where bj(k) = P r[zk at time t | in state xj at time t]. For the purpose of giving an example, lets say that we have two biased coins, which we are ipping, and an observer is seeing the results of our coin ips (not which coin were ipping). In fact, suppose that what we are actually doing can be described by Figure1.Here, the states of the HMM are q1 and q2 (the coins), the output alphabet is fH; Tg, and the transition and output probabilities are as labeled. If we let(q1)=1and(q2) = 0 then the following is a example of a possible transition sequence and output sequence for the HMM in the following diagram. We can easily calculate probabilities for the following events. 1. The probability of the above transition sequence: Pr[x1x1x1x2x2x1x1]= à Ã¢â€š ¬(x1)a11a11a12a22a21a11à ¢Ã¢â‚¬ °Ã‹â€  0.025 The probability of the above output sequence given the above transition sequence: Pr[HHTTTTH]|(x1x1x1x2x2x1x1)] = 2/3,2/3,1/3,5/ 6,1/3 ,2/3 à ¢Ã¢â‚¬ °Ã‹â€ 0.023 The probability of the above output sequenceandtheabovetransition sequence: Pr[(HHTTTTH)^(x1x1x1x2x2x1x1)] à ¢Ã¢â‚¬ °Ã‹â€  (0.025).(0.023) à ¢Ã¢â‚¬ °Ã‹â€  5.7 ÃÆ'- 10-4 2.2 HMM Applications Classification: speech recognition (time series), handwriting recognition (sequence of points), patterns and motifs in DNA (sequence of characters), analyzing video sequences. Modeling transitions: road snapping to work out which segment the user was most likely on (a sequence of points). Generation: text to speech (another time series application). Calculating the transition probability depends on the problem you are trying to address. In some cases (e.g. road snapping) you can compute it directly from the data. If you know the observation probabilities, then working out the transition probabilities is relatively easy (it comes down to finding the path that maximizes the observation probabilities and doing a count to get a measure of the transition probabilities). The most popular of all probability estimation approaches for HMM is the Baum-Welch algorithm, which allows the estimation of both observation and transition probabilities simultaneously. 3. Service Quality Architecture (SQA) The most important Service Quality Architecture that is used in this paper are RT, cost of execution, availability of space, all the reputation and the successful rate of execution. The RT can be defined in quite a few ways. For instance, RT can be stated as the time in between the sending of request and that of receiving the response. This is the period that involves all the receiving request of message time, QT(queuing time), ET(execution time) and receiving RT by the requester. Measuring these time sections is very difficult because they depend on network conditions. Alternatively, it can be measured as the time between receiving request by service provider and sending response to service requestor. This time it includes QT and ET only affected by the workload of the web service. This is the value that must be continuously updated in each and every web services because of the work load thats of changing nature and web service may change during the work time. Execution cost of this process is a fee received by the service provider from the service requestor during each and every execution. The fee for this is determined solely by the service provider and can change due to the web service providers financial policy at that moment. The availability is a very important degree, that is a web service is accessible and ready for immediate use at any given point. From service requester for each execution. This fee is determined by service provider and may change according to web service providers financial policy. Availability is the degree that a web service is accessible and ready for immediate use. 3.1 SQA Notations The Service Quality Architecture used in this paper is summarized in Table1: SQA Description RT It is the time between receiving and sending request EC Execution cost request Availability Up time Up time down time Reputation Repi Total no.of usage Successful ER No.of successful request Total no.of request Descriptions of notations used in this paper are as follow: m: number of tasks. n: number of candidate web services for each task. pi: i-th atomic process of a composition schema (1 à ¢Ã¢â‚¬ °Ã‚ ¤ ià ¢Ã¢â‚¬ °Ã‚ ¤ m). wsij: j-th candidate web service for the ith atomic process, (1 à ¢Ã¢â‚¬ °Ã‚ ¤ ià ¢Ã¢â‚¬ °Ã‚ ¤ m , 1 à ¢Ã¢â‚¬ °Ã‚ ¤ j à ¢Ã¢â‚¬ °Ã‚ ¤ n). d: index of SQA . wd: weight of the d-th SQA constraint defined by a client. Cond:permissiblevalueofthe d-th SQA (constraints). Aggd: aggregated value of the d-th S Q A of a composition plan. bij: binary decision variable (0 or 1). If bij=1 then j-th candidate web service is selected for i-th process. 3.1 Aggregation Value of SQA Generally, composition plans are constituted from serial, cycle, XOR-parallel and AND-parallel execution patterns. According to the definition of SQA, the aggregative value of web service composition is calculated regarding to its workflow pattern. The description and aggregation values of workflow patterns are discussed below. For the negative criteria, all the values are scaled to equation 2. For positive criteria, all the values are scaled to equation 1. In our paper the values of n SQA attributes of a service S as a vector: Qs = (Qs1, Qs2, ,Qsn) are modeled and all the value of SQA requirement requested by a consumer are vector Qr = (Qr1, Qr2,Qrn) are considered. All the consumers preference values thus are set on SQA attribute that are each in a vector pr = (pr1,pr2,,prn)where pri[1,n].Thus if a consumer has no preferences over an attribute, n will be considered the default preference value for that specific parameter. Related Works The times of server for the database of composite nature Web services have been examined in full detail, this follows the fork-join execution model. The proposal of the author here is that while performing a join operation or execution, the servers with slow RTs will be eliminated to maximize the performance of the server. All the work here is the more orientation towards examination of the fork-join model thereby to understand the resulting merger of data from various servers. All the work in this domain regarding the performance of the Web services is more inclined towards the composite web services and their RT. When the execution of a composite service that have been examined as a fork-join model. Thus here in the model of the states that a single application in the Internet that invokes many different Web services that are in parallel and thereby gathers their responses and from all the launched services to return thereby, all the results to a client are not affected in general. The perfect explanation of the fork and the join system, that is under some hypothesis is to be found. This hypothesis states that the number of servers that is equal to 2, when the job arrival is in the Poisson process and that the task are in exponential service time distribution in general. The great scientist Nelson and Tantawi proposed that an approximation in the case where all the number of servers is much greater or equal to that of 2 and a homogeneous and exponential servers. After which, a more general case that is presented is where the arrival and service process are general in nature. Particle Swarm Optimization (PSQ, Interactive Evolutionary Computation(IEC),) and Differential evolution (DE) are the major 3 evolutionary algorithm that are on focus in this paper. When IEC is the suitable algorithm for discrete optimization (DO), PSO and DE that offer the continuous optimization are more natural. In this paper we give an introduction to all the 3 similar type of EA techniques to highlight all the common procedures of computation. The most common one we have is the observations in the similarities and differences among the 3 algorithms that are based on various computational steps that are discussed here contrasting to their basic performances. Overall the summary of the literatures discussed is given on the location allocation, flexibility in job shop, multimode resource project that have scheduling road blocks and vehicle routing constraints. 4.1 Average RT Calculation The average RT calculation is a measure of the time that an Enterprise Server consumes in order to return the result that is correct and needed. The RT gets affected by numerous factors such as the quantity of user, bandwidth of network thats available at that point of time, average think time of the server and the basic request type submitted to the server. Here in this section, the RT refers to the average or mean RT. Each and every type of the request has own minimal RT. Even though, when during the evaluation or the testing of the system performance, RT is based on the analysis of average RT of all the requests that is sent to the server. More faster the RT of web service, the more requests/min are being processed overall. However, as the number of users on the system rises, the RT starts to rise proportionally, all though the number of request/min decreases. The below mentioned graph of the system performance of all the server indicates that after a point, the requests/min are inversely proportional to RT. The more sharper the downfall in the requests/min, the steeper the increase in RT. The below mentioned figure clearly point at peak load which is when there quests/min starts to fall. Before this point, RT calculations are not precisely done and was not necessary because they do not use the peak numbers in the formula. But from now on, this point in the graph, the admin is more precisely calculated RT by using maximum number of users and requests/min. The formula used above is calculated using the below method and notations. Tresponse, thats the RT(in seconds) at peak load: Tresponse = n/r Tthink No.of con-current users is denoted by n No. of requests/sec that the server receives is denoted by r The avg think time (in sec) is denoted by Tthink The think time is always included in the equation to get a precise and accurate RT result. If n is max, then the system supports at peak load is6,500/second. r is at peak load, then the system can process at peak load is 2,770/second. The avg think time, Tthink, is 5 sec/request. Therefore RT is calculated by the following formula: Tresponse = n/r Tthink = (5000/ 1000) 3 sec. = 5 3 sec. Thus, the RT is 2 seconds. Application Server performances critical factors are RT, along with throughput. Everything after the systems RT is being calculated at the peak load. 5. Proposed Methodology Optimal web service composition plan that is a composition plans of this road block is very large (nm), is proposed in our paper that presents an approach to find and improve GA that are presented, it quickly converges all the appropriate composition plan. The Tabu search that is being used for generating the neighbor plans and are simulated annealing the heuristic that is applied for accepting or rejecting the neighbor plan. In this phase, all the services thats located after the users requirement will be deleted. Thereby, the remaining services that fulfill the user request. Now among these services, a service with the higher score will be selected. We have proposed the Tabu search and the simulated annealing (SA) that is a constrained satisfaction based approach. Yet, the approach has a high possibility of not completing the local optimum because it is unable to work on more than 1 composition plan simultaneously. We presented an approach in which genetic algorithm is used to find the optimal composition plan. The SA method applies progressive updates to the further generation and the selection of chromosomes to increment the speed of the algorithm performance. Thus, Self-orchestration explains all the Interaction between and within the services that itself orchestrates, before doing anything it actually does the execution. One of the primary languages for the defining self choreographies is the Web Service Choreography Description Language. When this is used partial initialization of chromosomes to escape all the local optimums in general. After all, this proposed method will works on a test sample of composition plans, which is on the contrary to the Tabu method. The different composition approaches that describes the different composition models is provided, which are self-orchestration, self-choreography, self-coordination and part of the component. Self-Orchestration is a description of how the services that participate in the composition of interaction at the message level, including the various order in which iterations that possibly should be executed as well as the business logic. Fig 1: Values of All Web Services and Tasks 5.1 Proposed Design The following diagram shows the activity functions. By using the database it will show all the relevant content to the user. And it tells about the flow of activity of each object. Activity diagram is another important diagram to describe dynamic aspects of the system. Its basically a flow chart that represent the flow from one activity to next activity. In this case the following diagram consist of Server, User, database, checking various query and Sub query. Each actor will perform certain function to achieve the desired goal. First a user enters into a system by providing correct user name and password. After this we will be able to type the query. A use case diagram in its simplest form is a representation of a users interaction with the all the system and depicting the various specifications of a use case. This should be noted that the process of filtering all the web services consists of functional match making and non-functional matchmaking as well. In functional matchmaking, all the web services that have different functionalities from the client are filtered out fully and on the other hand, in non- functional matchmaking, the web services that dont have the appropriate quality are only eliminated. At this stage, the candidate web services for each task are selected. Now the details of the user are fetched into the web agent memory or a temporary storage allocation site. Further the web agents analysis the various web applications in order to finalize the optimal web servers and the resulting information are displayed with user comments and reviews. Fig 2: Flowchart The below diagram tells about the different sequence we are following to make a user to view his related content. In this diagram contain different object like User, database, Validate, relevant and web access. And it tells about the flow of sequence between the objects. A sequence diagram is a kind of interaction diagram that shows how processes operate with one another and in what order. It is a construct of a Message Sequence Chart. The user inputs the login details and connects through we access which are then linked to the time and review request. Now, web agent analysis the various requests from the web applications and provides the information regarding the time and review and gives the possible details to the user. Fig 3: Sequence Diagram In recent years, the application of web-based systems in institutions and government agencies is increasing. Introduction of web services is an effective approach in business structures to provide the required capabilities of service providers for services composition. Selecting the precise user service based on the users request is primarily based upon the service quality of the available web services. Several different methods have been suggested to solve the road block of web services composition based on qualitative characteristics. These methods can be divided into two types of exact methods and approximate methods. The first type is known as non-innovative methods which selects the best design from all available designs by examining and calculating the candidates routes and thus provide a more precise answer. In the second type or innovative methods, contrary to the first type, an ideal design that is close to the best and most accurate answer will be chosen. The below mentioned graph that actually compares the various web services that are available in that field and displays its performance based on RT and user reviews that are given. Fig 4: Resulting Graph Due to the importance of optimal composition of web services in recent years, a lot of works have been done in the field of each method. By studying various types of innovative algorithm, one can conclude that many road blocks still exist to solve in web services composition based on qualitative characteristics. For instance, each of these methods usually have local optimality road block alone or in genetic algorithm that are non complex and basic, the crossover type and the operation of mutation acts randomly and without any guidance, which leads to degeneration of the method. Therefore, efforts to improve efficiency such as using combined methods, operators like revolution operator or adding functions to improve were performed. These techniques are provided for better speed, faster convergence, and higher efficiency in large spaces. Based on the mentioned studies, there is no specific benchmark tool for evaluating the algorithm. Although some researchers used different simulation environments or different data to compare them with each other, the results show that different methods have different disadvantages and they do not have any specific standard. Skyline algorithm method and parallelism technique are used in this proposed method in order to provide the best composition with regard to the shortest RT in high scalability. Conclusion For the purpose of retaining their client all the web services first priority is maintaining Service Quality. This paper pays attention to the RTs of composite Web service that plays a very important role in attaining service quality in web services.. We propose a heuristic model for predicting RT of web service and thereby selecting an optimal web service at the runtime from the list of functionally similar web services. For the purpose of the probabilistic instances of Web Services. We have used Hidden Markov Model. Our model has been made with the assumption of Web Services that is deployed on a cluster of web servers and thereby sometime the delayer crash during WS invocation happens which is because the bad node in sever clustering responds to request of the user. By using HMM where ever needed we have predicted the probabilistic nature and predicted the behavior of these web servers and then selected the Web Services based on their optimal probabilistic value. An approach is proposed to solve the Service Quality Architecture aware Web Service selection road block. To avoid this problem, an SQA based algorithm is presented that will reveal all selection leading to the results thats very close to optimal, efficient solution. This process in arriving at the solution is also done at a rapid speed which is worth mentioning. 7. Reference SalehieTahvildari L. Selfadaptive software: Landscape research challenges. ACM Transactions on Autonomous and Adaptive Systems. 2009;4:1-42. T.Rajendran, P.Balasubramanie. An efficient architecture for agent-based dynamic web service discovery with SQA. Journal of Theoretical and Applied Information Technology; Islamabad Pakistan. 2010 May; 15(2). J.Cardoso, et al. Quality of service in workflows and Web service processes: Web Semantics Science, Services and Agents on the WorldWideWeb.2004; 1:281-308. CardelliniV, et al. MOSES: A framework for QOS driven runtime adaptation of service-oriented systems. IEEE Transactions on Software Engineering.2011. ErradiA, Maheshwari P. Dynamic binding framework for adaptive web services. Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services; 2008. LIU, Z., J. LI, J, LI, A. AN, J. XU, A Model for Web Services Composition Based on SQA and Providers Benefit, Proc. Int. Conf. on Wireless communications, networking and mobile computing, Beijing, China, (2009), pp.4562-4565. SIRIN,E.,B.PARSIA,D.WU,J.HENDLER,D. NAU, HTN Planning for Web Service Composition Using SHOP2, Web Semantics Vol.1, (2004), pp. 377-396. DAMBROGIO, A, A Model-driven WEB SERVICE DEFINITION LANGUAGE Extension for Describing the SQA of Web Services, Proc. IEEE Int. Conf. on Web Services, (2006), pp. 789 -796. LIANG, W.Y., C.C. HUANG, H.F. CHUANG, The Design With Object (DWO) Approach to Web Services Composition, Computer Standards Interfaces, Vol29, (2007), pp.54-68. FERCHICHI, S.E., K. LAABIDI, S. ZIDI Genetic Algorithm and Tabu Search for Feature Selection, Studies in Informatics and Control. 11.F.CURBERA., M. DUFTLER, R.KHALAF,W. NAGY, N. MUKHI, S. WEERAWARANA, unraveling web services, An introduction to SOAP, WEB SERVICE DEFINITION LANGUAGE and UDDI, IEEE Internet Computing , Vol.6 (2002), pp.86-93. 12. KOSHMAN.S, visual -based information Retrieval on the Web, Library and Information Science Research Vol.28 (2006), pp.192-207. 13.CHEN L.S, F.H HSU, M.C CHEN, Y.C HSU, Developing Recommender Systems with the Consideration of Product Profitability for Sellers, Information Sciences, Vol.178 (2008), pp.1032-1048. 14. CHEN Y, L.ZHOU, D.ZHANG, ontology-supported Web Service composition, An approach to service-oriented knowledge Management in Corporate Services , Database Management Vol.17 (2002), pp.67-84. 15.OSULLIVAN J, D.EDMOND, A.T HOFSTEDE, whats in a service? Disturbed and Parallel Databases Vol.12 (2002), pp.117-

Saturday, July 20, 2019

Living On Oak Road :: essays research papers

Living on Oak Road When I think of the sounds, sights, and smells of my house on Oak Road I get homesick. It makes me want to go back to the familiar area. My family and I moved here when I was just one year old. It was a small country town with only one store on the corner with clean air and very few cars on the road. We never had any worries as we walked to the corner store. The town always seemed very quiet and undisturbed. As times have changed and I am now eighteen years old, the small country town has been taken over. It has become a small city. Now fast food chains, hardware stores, drugstores, and small shopping centers, have buried the small country store six feet under. The air is no longer clean because of the hundreds and thousands of cars driving down Oak Road everyday. Another big change in the old country town is the noise. In the old days, you could walk outside and hear all the different sounds of the birds and or animals. You may even hear other children playing on their junglegyms. Every once in a while you could hear a few cars going by, where as in the present you will hear a few hundred cars in a few hours. Also you will hear the sounds of construction that seems to be happening everyday. You will also often hear the sounds of police and fire sirens racing down the road. You will also find that the smells often differ. On a Saturday afternoon you can walk outside and smell the fresh sent of cut grass, or just the smell of a hot summer day. By going up to the town car wash you can smell the strong sent of soap. But on other days there will be an awful stench in the air. The stench coming from burning leaves, busted sewer pipes, or just piled up trash. Even though the area may not be the best for