Thursday, October 31, 2019

Lab 4 Infectious Bacterial Identification from DNA Report

4 Infectious Bacterial Identification from DNA - Lab Report Example It is difficult to identify bacterial pathogens using the common lab processes which include morphological methods and biochemical procedures (Reece et al 2012). Bacteria that are difficult to identify yield inconsistent results when analysts use these manual procedures of bacteria identification. However, the DNA sequencing method offers a better solution of identifying different types of bacteria. This report offers the procedure of identifying Burkholderia cepacia, a bacterium that causes cold in small children. Finally, add 1 cm3 of culture to all the DNA strands from different blood samples that have undergone the above procedures to identify the Burkholderia cepacia bacterium from other similar bacteria that cause cold. Pyrosequencing becomes possible in the DNA of different bacteria that cause cold in children when culture and Carlsbad solution is added to the sample DNA strands because of some bacteria’s ability to assume different colors when these solutions used in this analysis are added to them (Luna et al 2007). Therefore, Burkholderia cepacia stands out distinctively as purple which makes it easy to identify its species when considering the various bacteria that cause cold. DNA sequencing stands out to be the most effective method of identifying the many infectious bacteria that

Tuesday, October 29, 2019

Raid Research Essay Example for Free

Raid Research Essay The word RAID stands for redundant ray of independent disks. Raid is usually used in environments with servers or at a business with large file servers, transaction of application servers, where data accessibility is critical, and fault tolerance is required. There are 8 types of raids, Raid 0 is technically not a raid level because it offers no fault tolerance but, it operates by providing data stripping which takes the information and spreads it out over all the disk drives. However, if one drive fails than the entire raid fails. Raid 1 is also referred to as disk mirroring; it basically takes the information from one disk and stores it on multiple disks, this is great for fault tolerance because if one disk fails the information is on another disk. The only drawback to raid 1 is data access speed and the cost because there are more disks involved. Raid 5 is considerably the most commonly used Raid level simply because it provides both stripping and parity. The parity block is distributed to all of the drives making it easier to access the information or have a balanced access load. The parity in raid 5 is used if one of the drives happens to fail, to recover that drive which makes the raid 5 the most common however the only drawback to this raid level is that it has a relatively slow write cycle. Lastly, RAID level 6 which is very similar to raid level 5 but provides two parity functions rather than just one. A minimum of four disks is required to create RAID level 6. Raid level 0, even though it offers no redundancy, is still of use mainly to those who use applications that require high bandwidth such as data streaming or video editing software. Raid level 0 is also used because it’s most simple to implement. Raid level 1 is most expensive because it requires more disks to implement. It also requires heavy software manipulation and configuration to implement Raid level 1. If I were to purchase raid it would absolutely be raid level 0 simply because its easy to implement and it would be efficient for my personal usage.

Saturday, October 26, 2019

Management of Diabetic Foot Ulcers

Management of Diabetic Foot Ulcers Diabetic foot disorders are the rated as the number one cause of hospitalisation for diabetic mellitus patients in the United States and abroad. Among these disorders are, foot infection, ulcerations, cellulitis and gangrene. It is estimated that a 100 people per week lose a digit, foot or a lower limb due to diabetes mellitus8. Diabetic foot disorders and its long term complications account for direct medical budget of hundreds of millions of dollars annually, including lengthy hospital stay of patients and lengthened periods of disability. In the UK, diabetes cost the NHS over  £5 million pounds per annum and the cost of diabetic foot complications including amputations was  £252 million in 2003. Figures show that 1 in 10 foot ulcers result in the amputation of a foot or a leg. The most distinguishing foot complication of diabetes is the ulcer, which is of course a major risk factor for amputation. Mortality rates after amputation are as high as 50 percent in diabetic patients. Although the primary pathogenesis is neuropathy, immunopathy and vasculopathy (ischemia), diabetic foot ulcer is attributed to a number of other risk factors. Early detection of these risk factors as well as the foot ulcers themselves is crucial in the general management of diabetic foot ulcers and amputation prevention. Therefore, immediate and aggressive treatment of all diabetic foot ulcers can prevent worsening of the complication and the need for amputation. The objective of treatment as a result should be prompt intervention to allow good healing of the ulcer and once healed, to prevent its recurrence. However, the optimum care for foot ulcers rest upon the treatment teams understanding of the pathophysiology associated with diabetic foot ulcers, familiarity with current methods of treatment and the concept that the multidisciplinary team approach is the gold standard in preventing limb amputation. And above all, prevention of foot lesions should be ranked highest amongst all priorities. EPIDERMIOLOGY There is no concrete data illustrating the true picture of the incidence and prevalence of diabetic foot ulcers. However, majority of the information gathered about its aetiology is based upon national hospital discharge survey (NHDS) data, which does not include a vast number of patients with ulcerations treated on the outpatient basis. Cross-sectional and population-based studies help to approximate the distribution and frequency of diabetic foot ulcers, while prospective cohort studies and retrospective case-control studies are instrumental in detecting associated risk factors for the foot lesions. According to Reiber et als epidemiological review, chronic ulcers represented 2.7% of all diabetes related admissions and 46% of all admissions due to any ulcer condition. The 1983-1990 NHDS survey also revealed that the highest ulcer rates were found in individuals aged 45-64 years, with male preponderance over the female. The average length of stay (LOS) for diabetes pat ients discharged with ulcers was 59% more than in patients without ulcers, around 14 and 8 days, respectively. Numerous population-based studies record a yearly incidence of diabetic foot ulcers in the magnitude of 2% 3% in both type 1 diabetes mellitus (IDDM) and type 2 diabetes mellitus (NIDDM) patients, while the prevalence ranges between 4% and 10%. These studies also suggest a widespread trend for higher prevalence of ulcerations with increasing age and duration of diabetes. Once ulcerations have occurred, recurrence rate can get to 50% in 2 years and 70% in 5 years. Despite the fact that mortality linked with diabetic foot ulcerations has not been recorded, 70% to 80% of amputations of the lower extremity can be lead by foot ulcers. Amputation is one of the most common sequels in persons with diabetes mellitus now exceeds 100,000 per year in the United States and amputations involving the leg, foot or toe(s) are not uncommon. Approximately 15% of patients with diabetic foot u lceration will require amputations due to uncontrolled infection, gangrene or failure of the ulcers to heal. Unfortunately, there is a 3-year survival rate of 50% after the amputation of a lower limb, while the 5-year survival rate is approximately 40%. Subsequently, less than half of the patients who end up with lower extremity amputation (LEA) of one limb go on to develop a severe contralateral ulcer within a space of 2 years, thereby putting the future of the other limb at risk as well. AETIOLOGY/PATHOPHYSIOLOGY Several factors have been implicated in association with diabetic foot ulcers. These factors include the intrinsic complications of diabetes mellitus in affiliation with some extrinsic factors and together predispose the diabetic patient to the risk of developing foot lesions. The trilogy of peripheral neuropathy, peripheral arterial disease (ischemia) and susceptibility to infection (immunopathy) are the main predisposing factors for lesions on the foot. The impact of peripheral neuropathy may not be easily detectable, with little or no signs and symptoms. Notwithstanding, its pathology advances fast and the end stage of tissue necrosis quickly reached. Distal sensory neuropathy can be seen in 20% to 50% of patients with type 2 diabetes. This decreases the protective sensation in the feet, leading to abnormal spreading of foot pressure and shear stresses with subsequent callus formation. This in turn diminishes the patients ability to perceive minor trauma to the foot and this is de monstrable by vibration perception threshold (VPT) and insensitivity to a 10g monofilament, which conveys a 7-fold and 18-fold risk of foot ulceration respectively. Distal motor neuropathy precedes atrophy of the intrinsic and extrinsic musculature of the foot, with accompanying deformities of the toes and metatarsals heads on the plantar aspects of both feet and consequent bunions on the 1st and 5th metatarsal-phalangeal joints. However, these irregularities of the feet cause an increase in the foot pressures, particularly around the bony prominences, thus resulting in more calluses forming. These calluses then go on to further increase the local subcutaneous pressure, ultimately resulting into haemorrhage beneath the callus, a lesion known as the pre-ulcer is then formed. With progressive pressure mounting on the pre-ulcer, the overriding skin breaks down to produce an ulcer. In addition, distal autonomic neuropathy could as well spark a plantar ulcer directly by reducing sweating in the feet with consequent drying and cracking of the skin28.Peripheral arterial disease and impaired cutaneous circulation are also important risk factors for both ulcerations and LEA. Peripheral arterial ischemia sometimes produces ischemic ulcers, but these are rare occurrences i.e. (1% 2% incidence) than neuropathic ulcers (65%) or combined neuroischaemic ulcers (25%) 28. Transcutaneous oxygen tension (Tc pO2) levels less than 30mmHg and absence of peripheral pulses or past history of vascular surgery are strong separate predictors of ulceration. Diabetic foot infections often set in and complicate already settled foot ulcers. Although, infections play an integral part in the pathway to lower limb amputation, there is inconclusive data with regards to the position of susceptibility to infection in causing ulceration. Even though, most ulcers are caused by minor foot trauma, and in some cases the patient takes no notice of because of the sensory neuropathy. These minor injuries (i.e. extrinsic factors which include; wearing ill-fitting/brand new shoes, hot soaks occupational hazards and to a lesser extent self-induced trauma by cutting toe nails or calluses) constitute the leading cause of acute precipitant of diabetic foot ulcers. In addition, there are also a number of intrinsic factors which could predispose diabetics to developing foot ulcers and they include; longstanding diabetes, past history of ulcers or amputation, age, weight, retinopathy, nephropathy and structural deformities of the foot (i.e. Charcot foot) have al l been associated as risk factors for ulcerations. However, bad biomechanical function arising from the complications of diabetes generally leads to foot injuries in most diabetic patient. ASSESSMENT OF DIABETIC FOOT ULCERS A detailed and well organised evaluation of the lower extremities is crucial when commencing the treatment of a diabetic foot ulcer. Before carrying out the physical examination of the limbs, it is noteworthy to perform a quick inspection of the patients shoes for good fit, foreign objects and the wear and tear patterns. The clinical evaluation must include an appropriate assessment of the ulcers aetiology, its extent and depth, presence and severity of both local and systemic infection and peripheral vascular status. A comprehensive assessment of the patients general health and glycaemic control, extent of peripheral neuropathy, a careful, yet detailed dermatologic and musculoskeletal examination should also be included in the evaluation. These assessments determine the ulcers healing rate, potential progression to LEA, and the likelihood of reoccurrence. Therefore, they should be accomplished urgently in the ambulatory or hospital setting and require a multidisciplinary team approach, with possible consults to the infectious disease specialist, podiatry, vascular and orthopaedic surgeons. Bilateral lower limb pulses must be examined. When pulses are diminished or not palpable, Doppler segmental pressures to the toes or TcpO2 measurement are indicated and the vascular experts should be brought on broad. The neurological evaluation should assess the patients sensorium and deep tendon reflexes. The ankle and knee reflexes are tested with the aid of a simple neurological hammer, while the important aspects in the evaluation of the sensorium are: reduced sensation to pain, light touch, hot/cold and vibratory sensation. Pain sensation is easily assessed with a disposable needle. A piece of cotton ball, lambs wool or 10-g monofilament can be used to evaluate the light touch and a 128-Hz or 512-Hz tuning fork or biothesiometer are approved for vibratory evaluation. Cold perception is also assessed by submerging the metal arm of a neurological hammer into cold water and then placing it against the patients skin. Anatomical deformities such as hammertoes, previous foot amputation, or Charcot joints often produce high pressure areas which result in ulceration. The musculoskeletal evaluation cannot be done by visual inspection of structural findings alone, it must also include testing for muscle strength, weakness, atrophy and contracture. Assessment of joint range of movement and gait evaluation with computerised plantar pressure analysis will also be of great value in appreciating the abnormal dysfunction contributing to ulceration. Examination of the skin of both feet is also carried out with detailed attention to the quality and integrity of the skin around the interdigital areas. Changes in the colour of the skin often associated with spotted rashes and heel fissures are suggestive of a significant level of ischemia. Toenail changes and presence of subungual drainage are pointers to a proximal source of infection. Clinical assessment of the ulcer should include a detailed description of its appearance as well as the measurement of the ulcers diameter with a wound measuring guide. Outlines of the ulcer on a translucent film or plastic sheet can also promote this process. This must be documented and retraced at subsequent visits to assess the treatment process. The depth and extent of the wound should be carefully explored with a blunt sterile probe. Special care must be taken to probe for hidden sinus tracts and subcutaneous abscesses or to identify tendon, bone or muscle or joint involvement. Ulcer depth is a significant predictor of healing rate, possibility of concurrent osteomyelitis and the chances for amputation. The presence of infection is a huge cause of the need for hospitalization. Therefore, a general assessment with physical examination, laboratory investigations and radiographic studies is important in classifying infection as absent, mild, moderate or severe. This classification acts as a guide to determine or select the initial antibiotic therapy and to decide when to hospitalise the patient. Clinical signs of infection such as purulent discharge, odour, cellulitis, fever and leucocytosis must be documented. However, Leucocytosis and fever might not always be noticeable even in the presence of acute osteomyelitis. Approximately 54% of patients with diabetic foot infections had normal white blood cell count and no fever44. Bacteria cultures of anaerobes and aerobes (both gram positive and gram negative) should be obtained from the base of the ulcer, bone or blood or from all three depending on the clinical setting. This helps in clarifying the true hidden pathogens and may facilitate the decision to adjust initial antibiotic therapy. Physical examination of signs of infection in the patient centers on the presence or absence of systemic responses such as fever, tachycardia, sweats or hypotension and the appearance of the wound and adjacent tissues. Early signs of infection are evident by increased amount of exudates from the wound, base of the ulcer changes from pink granulation to yellowish- grey tissue, tenderness and induration around the ulcer. Infection should be considered severe when the patient present with systemic toxicity, signs of fascilitis or a rim of erythema around the ulcer greater than 2cm in diameter. Laboratory investigation to confirm the presence of infection should include white blood cell count and differential which could show leucocytosis or a shift to the left or both, erythrocyte sedimentation rate (ESR) which when elevated above 40mm/hr is a strong indicator of osteomyelitis28. In addition, glucose, bicarbonates and creatinine levels are tested to rule out possible hyperglycaemia, metabolic acidosis or azotemia from dehydration which strongly suggest the presence of a severe infection. Radiological evaluation should be obtained promptly to ascertain the presence of fractures, foreign objects or signs of osteomyelitis. Plain x-rays have a low sensitivity, thus they should be interpreted with caution as changes in the foot caused by Charcot foot could mirror those osteomyelitis when seen on a plain x-ray. However, a normal plain x-ray of the foot does not rule out osteomyelitis, a repeat should be requested 2 weeks later to exclude occult osteomyelitis. As indicated, other imaging modalities can aid in the diagnosis of osteomyelitis such as CT scans, magnetic resonance scan (MRI) or leukocyte scans and each having their own strengths and limitations. TREATMENT Management of the foot ulcer is mostly determined by its severity, vascularity and the presence of infection1. Recognition of its root cause will serve as a guide during the course of treatment. However, a multidisciplinary team consisting of specialist from podiatry, orthopaedic surgery, vascular surgery, the infectious disease service and diabetic education service should be involved in the management. The multidisciplinary team approach is due to the complicated nature of the disease itself as well as managing the various comorbidities associated with foot ulcers. In addition, the approach has been demonstrated in clinical trials to produce significant outcomes in terms of improvement and reduce the incidence of major amputations. The wound should be immediately relieved of all pressures, elevated and rested at first presentation. Effective local wound care must be carried out and ill- fitting footwear should be discarded and replaced with appropriate surgical or relief shoes for protection. And in cases where total nonweightbearing with crutches is impossible, a pressure felt padding or foam can be used in the surgical shoes. However, the total contact cast (TCC) is considered gold standard to protect neuropathic ulceration during ambulation due to its ability to eliminate high pressure areas under the foot. Adequate alternatives to the TCC are the Scotchcast Boot or removable walking braces. Treatment of hyperglycaemia, ketoacidosis, renal insufficiency and other comorbidities that may coincide in the ulcerated patient should be treated simultaneously with the foot lesion. Consultations to internal medicine, endocrinology and cardiology are generally frequent when managing acutely infected patient who need to be hospitalised. Such consultations are usually sought early in course of treatment to ensure good metabolic control. Diabetic foot infections are usually polymicrobial and as such initial antibiotic therapy should be broad-spectrum after obtaining good aerobics and anaerobic culture samples. Antibiotic therapy should be later modified according to the culture and sensitivity test and the patients clinical response to the initial therapy. Surgical debridement and drainage or local partial amputations are crucial adjuncts to antibiotic therapy. Underlying osteomyelitis usually present in moderate to severe infections and often requires aggressive bony resection of infected bone and joints accompanied by cultured -directed antibiotics for 4 6 weeks. Foot ulcer patients with underlying ischemia should undergo revascularization with angioplasty or vascular bypass procedure if its anatomically possible. Even with severe distal arterial obstruction, revascularization to return pulsation to the foot is a major part of the limb-salvage strategy and may be accomplished in such patients. However, where revascularization is not feasible or in cases of advanced infection or extensive necrosis, amputation at some level may be required. Wound care is also necessary after surgical or sharp debridement of all callus and necrotic tissue58. Practically, a warm, moist environment conducive for wound healing should be maintained.This can be arranged using saline wet/dry dressings or special dressings such as semipermeable films, hydrogels, calcium alginates and hydrocolloids. Tissue-engineering dermis is a more recent class of biologic dressing and has been tested to be more effective than saline dressings. There is little evidence to support the role of topical enzymes and should be avoided. Although the role of topical growth factors in the healing rate of ulcers is beneficial, however, they are expensive and should be limited to patients whose ulcers cease to improve after 4-6 weeks of adequate therapy. PREVENTION OF RECURRENCE AND AMPUTATION Prevention is regarded as a major aspect in avoiding ulcer relapse and diabetic lower limb amputation. Recurrence rate with diabetic foot ulcers and LEA are as high as 50% -70% over three years. Comprehensive intervention programs tailored to individual patients can lower these rates and can be accomplished with a multidisciplinary team approach. Control of both macrovascular and microvascular risk factors is also of great importance. Patient education and re-education plays a primary, yet active role in this program and involves instruction in foot hygiene, the need for daily inspection, proper footwear and the necessity of prompt treatment of new lesions. In addition, regular and frequent visit to a diabetic foot care program is crucial. The feet must be thoroughly inspected at every visit and should include debridement of calluses and ingrown toenails. This provides an excellent opportunity to back up self care behaviour as well as allowing early detection of new or imminent foot problems. Appropriate therapeutic footwear with pressure-relieving insoles and high toe box which protect the high risk foot are an essential element of the prevention program and have been associated with significant reductions in ulcer development. Subsequently, patients with major structural deformities may benefit from reconstructive surgery to prevent recurrent foot ulcers. Surgery may be especially suitable in patients who cannot be accommodated in therapeutic footwear. And because patients with healed ulcers are at risk for future ulceration, these preventive measures must be integrated into a long life strategy and treatment program. CONCLUSION Diabetic foot ulcerations, infections, gangrene and lower extremity amputations (LEA) are major causes of disability to patients with diabetes mellitus. And these often results in extensive periods of hospitalisation, substantial morbidity and mortality. Although not all such lesions can be prevented, it is certainly possible to reduce their incidence by proper management and prevention programs. A multidisciplinary team approach to diabetic foot disorders has been regularly proven to be the best method in achieving favorable rates of limb salvage in this high risk population. Foot care programs accentuating preventive management can reduce the incidence of foot ulceration through modification of self care practices, appropriate evaluation of risk factors and formulation of treatment protocols directed at patient education/re-education, early intervention, limb preservation and prevention of new lesions. The joint team of medical, surgical, rehabilitative and footwear specialist shou ld impart effective and coordinated services for acutely infected or ischemic inpatients as well as management for the outgoing patients. In general, the incidence and morbidity of diabetic limb amputations can be reduced if the above principles are embraced and integrated into everyday patient management protocol.

Friday, October 25, 2019

The Coach That Never Came :: essays research papers

The book, â€Å"The Coach That Never Came† was a very interesting book. In the beginning, John, Steve, Mike, and Craig were all talking about their new baseball coach that they were going to be getting that day. The boys had never heard of the man and no one in the town seemed to know who he was. The boys talk about their new coach all day while they are in school. After school was over that day, the boys went to the baseball field to prepare for their first day of baseball practice. Practice was to start at 3:30. It was 3:45 now, and their new coach hadn’t arrived yet. The boys, along with the rest of the team, waited around for awhile for their coach to come. After waiting for about an hour, they became curious and decided that they would go to Coach Anderson’s house to see why he wasn’t at practice. Craig said that he knew where the coach lived, because he had heard his mother talking on the phone about him. As the boys arrived at the house, they saw that the door was partially open, so they decided to let themselves in since no one answered the door when they knocked. As the boys entered the house, they couldn’t decide on which room they wanted to go in first. They quickly decided on that when they saw a person lying on the floor in the kitchen. The boys quickly ran out of the house and ran to Mike’s house to call the police. When the police arrived to Mr. Anderson’s house, they told the boys that their coach had a heart attack and died. The boys were very upset by this since they had never even met the man. Eventually, the story goes on and the boys get a new coach, but they never really get over what the found that day.   Ã‚  Ã‚  Ã‚  Ã‚  I feel that one of the main characters in this book would have to be Craig. He has black hair, green eyes and is of average height. Craig was just a usual guy until all of this happened to him. He received good grades in school, and was a great student. Craig’s parents were very proud of him and thought that he was the greatest son that anyone could ever have. Craig is a senior at Central High School, and was already crowned Homecoming King.

Wednesday, October 23, 2019

Research for a Database For a Travel Agents Essay

Introduction I have been given a task to make things easier for a travel agent called Type a Flight. Type a Flight is a travel agent which is situated in Warrington and it was established in 2005 and it also has about 500 customers. The company does all its work manually. They keep their documents in filing cabinets. So when customers call in to book flights then they have to look in the cabinets for a document. This is very time consuming and due to this problem they could loose a fantastic amount of customers because they will get tired on the phone. Filing cabinets also take up a lot of space. This is getting very difficult and time consuming as the number of customers is rising on a daily basis. One of the problems is that it takes time writing letters by hand .For this problem I have come to conclusion that I will create template letters for the company and these can be sent out to customers to tell the customers that their ticket is ready or for any reasons. The conclusion I have come to is that I am going to help the agency in every single way. My main aim is to make the agency more professional and more modern and make things easier for them. For me to do my task, I will need a computer and a few important application softwares with which I shall make a database, logo and other things. Research I had a look at a database which I was shown by my class teacher. It was called ‘Type of Flight’. In the database it had things like name, ID, gender, telephone number. Database: Type a Flight Comment: The logo is located on the centre of the switchboard. The logo is got to do with holidays and other things which the agency offers. Around the logo there are the buttons which will be needed. The database has things like name, town, address, telephone numbers, date of birth, gender postcode and other few things. The database makes things easier and quicker now. This was done by putting queries, forms and a switchboard. Tasks To do my task I have broke the task into the following five parts: 1. Getting information about the travel agency. 2. Design a logo and a slogan for the travel agency. 3. Create a database, Queries, Forms and switchboard. 4. Create a letterhead and design letter templates. 5. Writing reports at the end (User Guides). 1. Getting information about the travel agency a. I can do this task by going on the internet but I will not do it this way because on the internet it will not tell you how the agency works. b. I can also do this task by going around and asking a few people but will not use it because people might not have the correct and up to date information. c. I will do this task this by ‘Interviewing the agency manager’ because he will know the latest information and what problems there are in the agency. 1. What problems do you have in the agency? 2. How many customers does the agency have? Less than 100 100-250 250-500 More than 500 3. How are the documents of the customers stored? Filing Cabinet Other 4. What do you think of a computerized way to remove your problems? 5. Do your employees know how to use Microsoft Access? Yes No Do not know 6. Are your employees capable of using a switchboard? Yes No Do not know 7. Does the agency have letter templates? Yes No 8. Does the agency have a good logo? Yes No 9. Do the employees need a user guide? Yes No 10. What changes will the agency have if the computerized way was used? 2. Design a logo and a slogan for the travel agency a. I can do this task by using Microsoft Word but will not do it this way because it does not have many of the tools needed to make a logo but I can make the slogan on it. b. I can also do this task by using Adobe Photoshop but will not use it because the application is quite complicated for me. c. I will do this task this by using ‘Paint’ because It offers a good amount of tools which can be used to make a good logo and a slogan. 3. Create a database, Queries, Forms and switchboard a. I can do this task by using pen and paper but will not do it this way because it will be time consuming and many mistakes can be made. b. I can also do this task by using Open Office Base but will not use it because it is harder to use than Microsoft Access. c. I will do this task this by using ‘Microsoft Access’ because I can make databases, Queries, Forms and switchboards more quicker because I have used it many times before. 4. Create a letterhead and design letter templates a. I can do this task by using Microsoft Publisher but will not do it this way because it is a little hard to create a letter template but a letterhead can be produced easily. b. I can also do this task by using Paint but will not use it because it is not suitable for large amount writing. c. I will do this task this by using ‘Microsoft Word’ because this application is good for making letterheads and letter templates as it gives a step by step way of making it. 5. Writing reports at the end (User Guides) a. I can do this task by using WordPad but will not do it this way because it is not possible to put in arrows to make things clearer to people. b. I can also do this task by doing it on paper and there after scan it but will not use it because it may not be neat and professional enough. c. I will do this task this by using ‘Microsoft Word’ because I can take screen shots and then I can paste them onto the page. There after I will put in arrows and any other things if needed to label it clearly with information so that people fully understand. Input, Output, Process and Storage After my research and looking at the various tasks, I can establish what the input, output and storage of the system is. Ease of use The final product that I will make would consist of database, queries, forms and letterheads. It would be easy for the agency to use because I think the employees are more or less familiar with computers and using the applications needed. I will also supply them with a user guide. The user guide will be simple and very easy to use. It will have screenshots and clear labeling with arrows so if the employees get stuck any where then they could refer to the user guide which has clear instructions and easy step by step of using any application. After using the user guide the employees should have no doubt in using an application. Description of problem = 1 Plan of solution = 1 Methods = 1 Solution meets requirement = 1 Ease of use = 1

Tuesday, October 22, 2019

Current Issues in Nursing Essay Example

Current Issues in Nursing Essay Example Current Issues in Nursing Essay Current Issues in Nursing Essay Ph. D. and Ann L. Curley, Ph. D. , R. N. The challenges of operating 24/7, focusing on scheduling, training, and staffing. Despite projections that nursing is one of the top ten growth jobs for the next 15 years, our health care system is on the verge of an overwhelming nurse shortage and health care crisis. Adding to the problem is the fact that hospitals and many other health care facilities are extended hours operations that face unique challenges unknown to the 9-5 world. Hazards for nurses discussed in the book: * Health care shows the second highest turnover rate of all â€Å"extended hours† industries * Nursing is one of the ten industries with the highest levels of occupational injury or illness requiring days away from work. * The most prevalent injuries in nursing are musculoskeletal disorders and needlestick injuries. In 89% of needlesticks, the needle was contaminated. * Work related fatigue prompted nearly 20% of nurses to cite â€Å"having an accident while commuting back home† as one of the top three jobs related health and safety risks. * Nurses show high instances of sleep disorders severely affecting productivity. * High failure and short staffing severely affect quality of patient care. ?Problems With Nursing Informatics By: Heidi Cardenas Informatics is the process of advancing in a discipline with a combination of data, information and knowledge. Nursing informatics encompasses the devices, machines, resources, and methods of utilizing information, computers, and nursing science in nursing. Its a recognized specialty for registered nurses, but does present challenges that academics and medical practitioners are working to improve or eliminate. Significance * In 2007, the Healthcare Information and Management Systems Society Nursing Informatics Awareness Task Force estimated that 50 percent of a nurses time is spent on documentation. Because of explosive strides in information technology and the huge body of medical knowledge amassed, controlling medical errors and health care costs are paramount in the health care professions, including nursing. According to RN Journal, handwriting on a piece of paper has been largely replaced by reports from medical devices at the point of care, and nurses have to master electronic documentation. Function * Nursing documentation is complex and situation-dependent. With different technology and medical charting methods in use, consistent education and training on documentation is difficult to achieve, especially electronically. Considerations * There is no single device that generates a comprehensive patient record, stores it and makes it accessible to care providers in different locations. Bar codes on medicines, computerized physician order-entry, automated scheduling systems for nurse administrators, nursing student preparation for IT tools and HIPAA concerns are just a few of the problems in nursing informatics. Potential * Mobile devices, communication technologies, efficient applications, and enhanced workflow and documentation will be the norm going forward and in the future. Ideally, every nurse would learn a universal IT platform for all patient care, but that is an almost unobtainable goal with the rapid advances in research, medicine and information technology. One thing is certainnursing and information technology are integrally intertwined and will remain so in the future. ? Occupational Health and Safety Issues Among Nurses in the Philippines By: A. B. de Castro, PhD, MSN/MPH, RN, Suzanne L. Cabrera, MN, RN, Gilbert C. Gee, PhD, Kaori Fushijiro, PhD and Eularito A. Tagalog, RN, COHN Abstract * Nursing is a hazardous occupation in the United States, but little is known about workplace health and safety issues facing the nursing work force in the Philippines. In this article, work-related problems among a sample of nurses in the Philippines are described. Cross-sectional data were collected through a self-administered survey during the Philippine Nurses Association 2007 convention. Measures included four categories: work-related demographics, occupational injury/illness, reporting behavior, and safety concerns. Approximately 40% of nurses had experienced at least one injury or illness in the past year, and 80% had experienced back pain. Most who had an injury did not report it. The top ranking concerns were stress and overwork. Filipino nurses encounter considerable health and safety concerns that are similar to those encountered by nurses in other countries. Future research should examine the work organization factors that contribute to these concerns and strengthen policies to promote health and safety. ?The National Nursing Crisis: 7 Strategic Solutions By: Jaime Z. Galvez Tan M. D. , M. P. H. Introduction At the rate we are losing monthly our highly skilled nurses to the United States, the United Kingdom, Ireland and the Netherlands, and with the Philippine government, via the Department of Health raising its hands in helplessness, offering no strategic solutions in sight, expect a worsening of the health crisis already plaguing our country. It is not only the nurses the country is losing, our medical doctors are now enrolling in nursing schools offering an abbreviated course for doctors to become nurses. ? Ethical Dilemmas in Nursing By: Jenifer Wilson-Barnett Abstract. Nurses are increasingly realizing that they can offer relevant information and participate in decision-making involving ethical issues. However, inter-professional communications are frequently inadequate, and do not permit exchange of opinions. The consequences are often frustrating and upsetting for nurses whose care is affected by others policies. ? Unemployment * The Professional Regulation Commission estimates the number of jobless Filipino nurses to hit 298,000 this year, to include the 68,000 who took the local licensure exam in December. ? RN Heals Department Order No. 2012-0184 (DO 2012-0184). * The Order speaks of the following interesting points: * RNheals nurses are not ‘employed’ but rather are intended for learning and development. Nurses under the program are not regular employees but pre-service trainees. They are given stipend/allowances not salaries. * RNheals 4 tour of duty will be from January to December 2013. Nurses will be assigned in DOH Hospitals (Hospital Setting) or Rural Health Units (Community Setting). Stipend/allowance for RN Heals 2013 is still 8,000 per month with PhilHealth and GSIS Insurance. * Nurses are to be awarded with Certificate of Completion after satisfactorily completing the RNheals program. * RN Heals 4 Recruitment and selection period will be from October 29, 2012 to November 2012. * Application forms shall be submitted directly to CHDs for community setting and DOH Hospitals for hospital setting. * ONLY NURSES WITH PRC LICENSE are eligible to apply. * Nurses who have previously engaged in RNHeals are not qualified to re-enter the project. * In case of absences, a fixed amount of Php 363. 00 per day shall be deducted. * Stipend shall be given on or before every 10th and 25th day of the month. * Eight training hours per day shall be completed by the nurse.

Monday, October 21, 2019

Family Planning Research Paper Essays

Family Planning Research Paper Essays Family Planning Research Paper Essay Family Planning Research Paper Essay Camarines Sur Polytechnic Colleges Naga Campus FAMILY PLANNING PRACTICES OF COUPLES In Barangay Sto. Tomas, Camaligan Camarines Sur In partial fulfillment of the requirement in SOC. SCI 10, Society of Culture with Family Planning, HIV/AIDS Submitted by: Mayores, Dennis B. Olarve, Raymund Salveo L. Pacamarra, Hazel E. BSEd 3 – Physics Submitted to: Dr. Geronima Camano-Valenciano Professor October 4, 2010 TABLE OF CONTENTS Title Page Table of Contents CHAPTER I: Introduction CHAPTER II: Research Methodology CHAPTER III: Presentation of Findings, Analysis and Discussion CHAPTER IV: Summary of Conclusion and Recommendation BIBLIOGRAPHY APPENDICES Appendix A: Sample Questionnaire Appendix B: Letter of Permission to conduct survey Appendix C: List of Respondents Appendix D: Barangay Official of Sto. Tomas Appendix E: Documentation Appendix F: Curriculum Vitae CHAPTER III Presentation of Findings, Analysis and Discussion This chapter presents the overview of the results that was gathered from 40 respondents of Husband and Wife of their Family Planning Practices in Barangay Sto. Tomas, Camaligan Camarines Sur. Table 1: Educational Attainment of Respondents The table presents the Highest Educational attainment of Couples. 22. 5% said they reached Elementary level only, 40% said they reached High School, 35% said they reached the College Level and 2. 5% said they reached Vocational Course. Table 2: Married and Unmarried Couple The table presents the ratio of married and unmarried couple when they start living together. 36 respondents out of 40 said that they are married or 18 couples said they are married already while 4 respondents out of 40 or 2 couples are not married yet since they started living together. Table 3: Family Planning of Couples : The table presents the data gathered from three questions that answer if the Couple planned the no. of children to have, if the Couple talk about methods of Family Planning and if they consulted the Health Center for information about Family Planning. The result state that 40 respondents or 100% planned the no. of children they are going to have. The Couple that talked about Family Planning and consulted the Health Center is 75% while 25% answered no. Table 4: Use of Methods or Contraceptives between Couples The table presents the Methods or Contraceptives used of Couples. 17. % used Female Sterilization to stop bearing a child for mother, 2. 5% used Male Sterilization to stop giving birth to a child for Father, 12. 5% used Injection to avoid having a baby for few months, 12. 5% use male condom that is use before sexual intercourse, 2. 5% used the method of Rhythm Calendar that calculate what day in a month does a female is impossible to be pregnant, 2. 5% used traditional method tha t use herbal medicine, 5% used the Natural method and 32. 5% don’t or never used a method or contraceptive for Family Planning. Table 5: Medium that gives information for Family Planning The table shows the medium where couples see, hear, or read something that gives information about Family Planning. 33 respondents said they heard some from Radio, 38 respondents said they watched some from television, 18 respondents said they read it from newspapers, 9 respondents said they read it from Magazine, 7 respondents said they read some from Posters, and 6 respondents said they saw some from billboards. Table 6: Services or Information given from different Mediums. The table shows the information or services given by different medium (radio, television, newspaper, magazine, poster, and billboard). 6 respondents said the information was about Family Planning, 20 respondents said it was about the use of contraceptives or methods while 11 respondents said it was about vaccination. Table 7: Family Planning Effect The Table shows if Population growth can be controlled by the use of Family Planning between Couples and if abortion is a typr of Family Planning Method. 40 responden ts or 100% said that Family Planning can really help the control of Population growth and also 40 respondents or 100% said that abortion is not part of Family Planning Method. CHAPTER IV Summary of Conclusion and Recommendation CONCLUSION 1. Most of the couples finished college level before they started living as a couple but there are also couple that only reached the elementary level and decided to live with their partners. Studying is irrelevant for their parents don’t encourage them to pursue studies because of financial problem. That’s why they don’t know how can they took care of their children and how to plan a family because of lack of knowledge. In addition, they don’t have a high salary and can’t find a proper job. 2. Most of the couples started living together as married because they want it to be sure that they would be living together legally while only some are unmarried because they are quite young for their age. That explains how marriage is given importance before, but now, even if the girls got pregnant they are not still planning of getting married. 3. Couples normally planned on how many children are they going to have but this is usually not followed because of sexual desire of a person. Because not all are willing for family planning to be involved in their living as a couple. 4. Family Planning on later years was not yet organized that’s why old couples now are not aware and don’t even care to use methods or contraceptives regarding Family Planning. But some of them are willing to use these methods to control the population growth. 5. Information about family planning is not only given in the health center, because now there are many medium that shows the importance of family planning. It also leads to the discouragement of couples to consult to the health center because they can already find information they need in the radio, TV, newspapers, magazine, posters and even billboards. . Advertisements seen on TV or heard on radio and any other medium were more about Family Planning. Only few were about the use of contraceptives and Vaccination. It is because the Nation’s problem is population growth and advertisements can really help the citizen to get knowledge about proper family planning. 7. They all agreed that family planning is the be st way to success of each family. Because they can give their needs and wants of their children. But abortion is not an example of Family Planning because it is against the law of God. RECOMMENDATION Every person cannot control their sexual desire for their partners that’s why Family Planning method and use of contraceptives are imposed. But another reason for this is the lack of knowledge of the people or illiteracy. The government needs to put more focus on the education of citizens so that they would be taught of proper managing their lives as well as when to have a family and how to plan it. The government can give free seminar to those newly married couples and give information about the importance of Family Planning. Another thing to give prioritize are the citizens that live on rural areas where more uneducated and unemployed people are present. Because of this population explosion exists, that’s why more project about Family Planning for this place must be necessary. People are also conservative on the use of these methods and contraceptives, that’s why proper advertisements and information seen on TV or on any other medium must be made clear and simple so people won’t get the wrong interpretation about these things. Family Planning must be given emphasized and importance especially to couples for them to have the appropriate knowledge and how to use the methods involved in this and how to plan the number of children they can have. BIBLIOGRAPHY A. Books Omas-as, Roberta L. , et. al. , General Sociology:Family Planning Methods:Trinitas Publishing Inc. 2003. The New Websters International Encyclopedia. 2000 Srauss, James J. , The Media And Family Planning. Worth Publishers. Inc B. Unpublished Thesis Ross, Maricor G. , et. al. , â€Å"Socio Economic Profile of barangay San Felipe†. Camarines Sur Polytechnic Colleges, Naga City. October 2009. C. Internet aresearchguide. com/12biblio. html#4 jhuccp. org/research/download/tagalog. pdf D. Other Source LGU, Sto. Tomas, Barangay Sto. Tomas, Camaligan Camarines Sur Appendix A Camarines Sur Polytechnic Colleges Naga Campus Pangalan: ________________________________ Edad:______ father mother Trabaho:_________________________________ Bilang ng anak:________ Lugar: Barangay Sto. Tomas, Camaligan, Camarines Sur QUESTIONNAIRE about FAMILY PLANNING PRACTICES OF COUPLES Personal Data . Ano ang pinakamataas na antas sa pag-aaral ang naabot ninyo? ____________________________ 2. Ano po ang relihiyon ninyo? ____________________________ 3. Ilan po ba ang buwanang kinikita niyo para sa inyong pamilya? ____________________________ 4. Kayo po ba ay kasal na nang kayo ay magkaanak? ( )Oo( )Hindi 5. Kung Oo ilang taon na kayong kasal noon? ____________________________ 6. Ilang taon napo ba kayong nagsasama ngayon? __________________ __________ Awareness of Family Planning 1. Napagplanuhan po ba ninyo kung ilan ang magiging anak niyo? ( )Oo ( )Hindi 2. Napag-usapan ba ninyo ng inyong asawa ang tungkol sa mga pamamaraan at pagsasagawa ng pagpaplano ng pamilya? ( )Oo ( )Hindi 3. Kumunsulta na po ba kayo sa isang Health Center upang magkaroon ng impormasyon sa Family Planning? ( )Oo ( )Hindi 4. Gumamit po ba kayo ng mga method o contraceptives upang maiwasan ang pagkakaroon ng anak? ( )FEMALE STERILIZATION/TUBAL LIGATION: Ang mga babae ay maaaring mag-paopera/ magpatali para hindi na manganak ( )MALE STERILIZATION/VASECTOMY: ANG MGA LALAKI AY MAAARING MAG-PAOPERA PARA HINDI NA MAKAPAG-BIGAY NG ANAK ( )INJECTION/DMPA: ANG MGA BABAE AY MAAARING INIKSYONAN NG ISANG DOKTOR O NARS PARA HINDI MABUNTIS SA LOOB NG ILANG BUWAN ( )ORAL PILL: ANG MGA BABAE AY MAAARING UMINOM NG PILL ARAW-ARAW ( )MALE CONDOM: ANG MGA LALAKI AY MAAARING GUMAMIT NG KONDOM SA PAGTATALIK ( )FULL BREASTFEEDING OR LACTATIONAL AMENORRHEA (LAM) MAKAKAIWAS ANG MGA BABAE SA PAGBUBUNTIS HABANG NAGPAPASUSO NANG LUBOS ( )RHYTHM CALENDAR OR CALCULATION: SA PAMAMAGITAN NG KALKULASYON, RHYTHM, O CALENDARYO, ANG MAG-ASAWA AY IIWAS SA PAGTATALIK NG MGA ILANG ARAW SA ISANG BUWAN KUNG KAILAN ANG BABAE AY MAY MAS MALAKING POSIBILIDAD NA MABUNTIS ( )WITHDRAWAL: PAG-IINGAT NG LALAKI NA SA LABAS PALABASIN ANG PUNLAY ( )FEMALE CONDOM: ANG MGA BABAE AY MAAARING MAGLAGAY NG KONDOM SA LOOB BAGO MAKIPAGTALIK ( )DIAPHRAGM, FOAM, JELLY: ANG MGA BABAE AY MAAARING MAGLAGAY NG SPONGE, DIAPHRAGM, JELLY O CREAM SA LOOB BAGO MAKIPAGTALIK ( )TRADITIONAL METHODS: PAGGAMIT NG MGA HALAMANG GAMOT, SINTURON SA BAYWANG, ATBP. PARAAN ( )NATURAL FAMILY PLANNING ( )HINDI GUMAGAMIT 5. Nakakita/nakarinig/ nakabasa ba kayo ng patalastas/commercial o iba pang uri ng pagbibigay-alam tungkol sa FAMILY PLANNING sa ( )Radyo( )TV( )Dyaryo( )Magasin( )Poster( )Billboard 6. Kapag nakikita o naririnig mo ito, ano sa palagay ninyo ang klase ng serbisyong pangkalusugan o â€Å"health services† ang tinutukoy dito? ( ) Family Planning( )Contraceptive Method( )Vaccination 7. Naniniwala po ba kayo na ang kaalaman sa Family Planning ay makatutulong sa pagkontrol ng populasyon? ( )Oo ( )Hindi 8. Sa tingin niyo po ba, ang abortion ay isang Family Planning Method? ( )Oo ( )Hindi 9. Sa pangkaraniwan, kayo po ba ay sumasang-ayon o hindi sumasang-ayon sa paggamit/paggawa ng pamamaraan ng pagpaplano ng pamilya upang maiwasan ang pagbubuntis? ( )Oo ( )Hindi Appendix B September 28, 2010 Hon. JASMIN TRINIDAD Barangay Captain Sto. Tomas, Camaligan, Camarines Sur Dear Brgy. Captain Trinidad, Good Day! The undersigned students taking Bachelor of Science and Education are conducting a research on the â€Å"Family Planning Practices of Couples. † We selected your barangay as the best source of information about the matter. In this regard, may we ask permission to conduct interview to respondents of this Barangay that would greatly help us for our research. Thank you and more power. Very truly yours, The Third Year Students DENNIS B. MAYORES RAYMUND SALVEO L. OLARVEHAZEL E. PACAMARRA Noted: DR. GERONIMA CAMANO-VALENCIANO CSPC-Naga Campus, Professor Appendix C List of Respondents/ Couples Father Mother Antonino GonzalesMyrna Gonzales Arthur EspirituLorena Espiritu Benjamin GarciaAmalia Garcia Randy AyenMaricris Gonzales Rufino Sta. AnaErmina Sta. Ana Rufino Sta. Ana Sr. Asuncion Sta. Ana Noel AdversarioRose Adversario Rolando AliparMa. Gemma Alipar Romi CorpusMaria Flor Corpus Monico AlipanteRosa Alipante Rogelio RubioElizabeth Rubio Edgar RosarioCristina Rosario Joel AlbanielEvelyn Albaniel Emmanuel Del RosarioImelda Del Rosario Raul IsidroRuth Isidro Ronnie ReyesLinda Reyes Vicente ArroyoGermina Arroyo Conrado TrinidadLeticia Trinidad Domingo VillanuevaVictoria Villanueva Andres CelesteNelia Celeste Appendix D Barangay Officials of Sto. Tomas Barangay Captain Hon. Ma. Jasmin M. Trinidad Barangay Councilors Emnanuel A. Galias Ducenia A. Tolosa Maximo C. Corpus Jr. Manuel Javier H. Aurellano Nilo A. Almen Emmanel R. Abias Jovenial J. Flores SK Chairman Ma. Salone SC. Rubio Appendix E DOCUMENTATION THE RESEARCHERS, RESPONDENTS AND THE BARANGAY Appendix F Curriculum Vitae DENNIS B. MAYORES #25 Zone3, Brgy. Del Pilar, San Fernando Camarines Sur Mobile no: 09077436598 Email Address: [emailprotected] com PERSONAL INFORMATION Age: 18Date of Birth: March 5, 1992 Sex: MalePlace of Birth: San Fernando Civil Status: SingleFather’s Name: Melecio F. Mayores Nationality: FilipinoMother’s Name: Leonida B. Mayores EDUCATIONAL BACKGROUND College:Bachelor of Secondary Education Camarines Sur Polytechnic Colleges Penafrancia Ave. , Naga City 2008 – Present Highschool:San Fernando National High School Buenavista, San Fernando Camarines Sur 2004 – 2008 ElementarySan Fernando Central School Rizal, San Fernando Camarines Sur 1998 2004 RAYMUND SALVEO L. OLARVE 506 1ST st. Progress Homes Subd. Canaman Camarines Sur Mobile no: 09109696222 Email Address: [emailprotected] com PERSONAL INFORMATION Age: 17Date of Birth: June 2, 1993 Sex: MalePlace of Birth: Canaman Civil Status: SingleFather’s Name: Salveo S. Olarve Nationality: FilipinoMother’s Name: Nanette L. Olarve EDUCATIONAL BACKGROUND College:Bachelor of Secondary Education Camarines Sur Polytechnic Colleges Penafrancia Ave. , Naga City 2008 – Present Highschool:Camarines Sur National High School Penafrancia Ave. , Naga City 2004 – 2008 ElementaryTacolod Elementary School Annex Progress Homes Subd. , Canaman Camarines Sur 1998 2004 HAZEL E. PACAMARRA #015 San Jose, Camaligan Camarines Sur Mobile no: 09165235145 Email Address: [emailprotected] com PERSONAL INFORMATION Age: 18Date of Birth: May 30, 1992 Sex: FemalePlace of Birth: Goa, Camarines Sur Civil Status: SingleFather’s Name: Rannel V. Pacamarra Nationality: FilipinoMother’s Name: Mariam E. Pacamarra EDUCATIONAL BACKGROUND College:Bachelor of Secondary Education Camarines Sur Polytechnic Colleges Penafrancia Ave. , Naga City 2008 – Present Highschool:Sto. Tomas National High School Camaligan Camarines Sur 2004 – 2008 ElementaryCamaligan Central School Camaligan Camarines Sur 1998 2004

Sunday, October 20, 2019

movie research paper

movie research paper movie research paper Corina Gracia Comp 1 Professor Jackson March 20, 2012 The Book of Eli The Book of Eli is a Post-Apocalyptic action movie Written in 2007 by Gary Whitta and subsequently rewritten in 2008 by Tony Peckham. This movie has some details that make of this movie different, and interesting. With starring of Denzel Washington as Eli and Gary Oldman as Carnegie we would begin to feel, compassion and anger. The character Eli is a very strong person but he also is manner, and pacifist. In the case of Carnegie it is totally the opposite, he is a controller, abuser and is obsessed with a book in order to control the town. However, this two characters are very well development, throughout the movie they reveals their abilities, and limits to defend or obtain a mysterious book. The Book of Eli was filmed in New Mexico in 2009 and was directed by Allen and Albert Hughes. The movie took place in the future after a nuclear war. The war left the new world desolated. Many things from the â€Å"old world† were lost, such as knowledge of how to read or write, peace, j obs, and etcetera. Also money did not existed people interchange articles for favor or other goods. The water is a treasure and was very hard to find and obtain, and due to the lack of food, there were many cannibals in the region. That world was such a mess, it looked like a desert, and many things and buildings were destroyed. As a consequence, of the war ignorance was very present in young people. The â€Å"evil persons† wanted to take control over the world, but they need to have very mysterious and powerful book. Eli’s mission is to protect it from everything and everyone; even to kill if was need it. The story starts thirty years after a post-apocalyptic war, Eli was told by a voice to take the book and to deliver a copy to a safe location in the West Coast of the United States. Throughout the movie Eli show his survival abilities, and also why he was the chosen. Eli’s way to think was different, as is his way to live. He is a nomad person who chose to accept the mission. He has surprising abilities such as good listener and smeller, quick hand with knives, guns, and etcetera. In comparison with other characters he has something special and never seen in a post-apocalyptic, like the messiah type before. After the long walk of thirty years, Eli faces his opponent Carnegie who is the leader of the hijackers, he proclaims himself as the ruler of a dusty village. He knows perfectly about the power that the book has in order to bend the people to his will. What makes the movie more unique is the way that the twins, Allen and Albert Hughes made some comic book scenes when Eliâ €™s battle showed entirely in silhouette. The movie has an interesting sunburn browns and pale blues that creates a dry and dusty world under a merciless sky. Being a post-apocalyptic movie it has some biblical references in the book of genesis, psalms and revelations in some scene. In addition some scenes can also be referred to Moses when he was going to the Promised Land, and God sustained his people. In comparison with Jesus, his mission was to â€Å"be the one who save the new generation†. Another aspects of the movie are irony and personification; an example of irony was when Eli gives the mouse a piece of roasted cat. And an example of personification was at the end when Eli arrives to the West and the color change more vivid meaning the end of an era. Allen and Albert Hughes have not shot a film since 2001 with the movie â€Å"From Helen†. Both movies are violent and have bloody action scenes. On the other hand, it was wonderful to see two powerful actors on the same screenplay.

Saturday, October 19, 2019

A novel Essay Example | Topics and Well Written Essays - 1750 words

A novel - Essay Example When one reads her writings, one theme will stand out as the central theme and that is, ‘the love of God’. The phrase, ‘God is love’ is clearly felt from beginning to end of all her books. It is the context theme for all other themes in her writings. While she was young, one of her peers threw a rock on her face and critically injured her. But despite this injury, she neither lost her senses nor her character, meaning, the injury did not affect her brain. Since that injury, she has had a deep gratitude to God for sparing her life and also protecting her mental health. It was this incidence that introduced her to the love of God, and it was her desire to share with the world the love and goodness of God. Her knowledge of God’s love further increased when she read in the Bible that God sent his only begotten Son to die for our sins. With this extra knowledge of the love of God, she was motivated and inspired to reveal to the world through literature, th is precious love that had conquered her heart. She wrote volumes upon volumes of books about different subjects, but at the core of all those writings, the love of God was revealed. In her book ‘Steps to Christ’ she said, ‘God is love’ is written upon every opening bud, upon every spire of springing grass. The lovely birds making the air vocal with their happy songs, the delicately tinted flowers in their perfection perfuming the air, the lofty trees of the forest with their rich foliage of living green all testify to the tender, fatherly care of our God and to His desire to make His children happy. (White, 11) She continues to say that, nature and revelation alike testify of God's love. Our Father in heaven is the source of life, of wisdom, and of joy. Look at the wonderful and beautiful things of nature. Think of their marvelous adaptation to the needs and happiness, not only of man, but of all living creatures. The sunshine and the rain, that gladden and refresh the earth, the hills and seas and plains, all speak to us of the Creator's love. It is God who supplies the daily needs of all His creatures. (White, 9) These passages in her book clearly tell us that it was her earnest desire to reveal to the world God’s great love, and that this theme saturated all her writings regardless of the topic she was discussing. In her other book ‘Testimonies to the church’, she said that, all the paternal love which has come down from generation to generation through the channel of human hearts, all the springs of tenderness which have opened in the souls of men, are but as a tiny rill to the boundless ocean when compared with the infinite, exhaustless love of God. Tongue cannot utter it; pen cannot portray it. You may meditate upon it every day of your life; you may search the Scriptures diligently in order to understand it; you may summon every power and capability that God has given you, in the endeavor to comprehend the l ove and compassion of the heavenly Father; and yet there is infinity beyond. (White, 740) She continues writing that, you may study that love for ages; yet you can never fully comprehend the length and the breadth, the depth and the height, of the love of God in giving His Son to die for the world. Eternity itself can never fully reveal it. Yet as we study the Bible and meditate upon the life of Christ and the plan of redemption, these great themes will open to our understanding more and more. (White, 740) Once again, here is another clear proof that the love of God is the

Friday, October 18, 2019

Correlation between surfing culture, spirituality, and religion Research Paper

Correlation between surfing culture, spirituality, and religion - Research Paper Example Correlation between surfing culture, spirituality, and religion However, it is also practices in some specific lakes and rivers. There is therefore a correlations surfing and spirituality. Most surfers also state that they get a moment to connect with the Creator when they are at the ocean. Normally, surfers have to wait until waves begin flowing. It is at this moment that they get a chance to observe and marvel at the nature surrounding them. They enjoy the flora and fauna at the ocean and get to understand that they are a supernatural being that actually controls all these. This is also a time for introspection amongst many surfers. They get to connect with their inner being, including their role in the world. To them, creature are more than physical things, but also spiritual. However, it is not possible to talk about surfing and spirituality without mentioning media. The three parts of social cultures cannot be separated from each other. It is the media, which actually propagates the activity of surfing as well as religion. For instance, ther e are various electronic and print media, which have been involved in covering surfing activity. However, it is difficult for the media to report the surfers’ spiritual experiences. However, as it shall be demonstrated in the following research, many surfers who are interviewed indicate that they actually experience connection with supernatural being. Research question: Is there a relationship between media, surfing, and spirituality? Hypothesis In this researcher, the main hypothesis is that surfing is more than just an activity for entertainment. It has been used to draw surfers closer to their gods, as well as being able to find meaning in their lives. Through surfing, individuals are able to appreciate the fact that there is a supernatural being, which created all the wonders observed in the ocean. The researcher works under the assumption that there is a relationship between media and spirituality. Purpose of the study The study was carried out with a view to establish a correlation between surfing culture, spirituality, and religion. The three are important social phenomenon, which are difficult to be separated from each other. Media however, exists to complement the two activities. It allows the rest of the community members to appreciate the role of surfing in promoting spirituality. For instance, a number of films have been used to show the beauty of surfing. Several magazines have been published providing information about surfing and the experiences that the surfers go through. However, this study seeks to establish whether the assertion that the three cultural phenomenon are actually related. Literature review A research conducted by Moore (2011) indicates a correlation between spirituality and surfing. She carried a research entitled, ‘spiritual experience, and environmentalism.’ She focused her study on the surfing activities and scuba divers in New Zealand. In total, she had about 74 surfers and about 83 scuba divers. Her mai n aim was to establish whether there was any correlation between these water activities and spirituality. She had used the random sampling method to acquire a representative sample. According to her study, there was a close relationship between the two social cultures. Surfing, which is normally regarded as a profane activity has the potential to turn people towards sacredness. In this study for instance, about 70% of the interviewed members indicated that they had experienced some spiritual

Critical paper Essay Example | Topics and Well Written Essays - 1000 words

Critical paper - Essay Example (Lumpkin, 56). As from the book A Woman like Me Bettye, clearly show courage in pushing ahead nevertheless being abandoned by his best friend. A Woman like Me is a tour de force from one of the most outspoken female performers singing today and she is a force to be reckoned with. From the story, Bettye la Vette is able to deal and face the world with fear or danger without flinching Bettye in her life she faces more challenging events but with time .Some of the problems were as a result of friend influence they highly affected her behavioral changes. For instance Bettye La Vette after being in association with legends like Aretha Franklin, James Brown Otis Redding , and Marvin Gaye made her fade back into obscurity. As much of what threads on in the world about you due to what people think rather than actually what you are always be focused and keep the determination to success, also one need to present himself in the way he wants the world to observe the passion of pressing forward. (Lumpkin, 103) Being courageous and persistence one need to understand himself/herself better in terms of weakness and strengths as this will help you in winning over the obstacles on the way. Others pretend to be something they truly are not.   No matter which way you look at it, if you try to act like someone you are not, the truth will always appear in the end.   That is exactly what happened in Bettye. Previously, she pretended to be someone else but in real, she understands the true story of herself. (Candre, 98) Bettye La Vette emerged courageous and focused when she had the freedom to be associated with all types of individual from musicians to politicians from the book she clearly reveals herself as an individual who believes that no body as ever enjoyed the act of sex as she has done. For instance through the courage and the ability to keep her goals she was proud to present in the inauguration ceremony of United States of

Food, Inc Essay Example | Topics and Well Written Essays - 500 words

Food, Inc - Essay Example coli is the corn that the cows are fed. It is quite cheap and dangerous for health. The content of E. coli in the cow’s guts increases when they feed on the corns. In order to regulate the effect of increased E. coli level, the meat packers often tend to cleanse the meat by treating it with ammonia so that it becomes suitable for human consumption. Food borne illnesses resulting from the consumption of contaminated food are increasingly putting millions of Americans in hospitals every year. The number of Americans that are admitted into hospitals every year is 325,000 approximately and those who die because of the diseases caused by contaminated food consumption every year are about 5000 (The Center for Ecoliteracy 39). The toddler Kevin in Food, Inc. who is only two years old becomes sick because of Escherichia E. coli. Escherichia E. coli is a bacterial group which is found in the intestines of many birds, animals and also humans. Usually, many E. coli benefit us by decompos ing the food that we in-take and facilitate its digestion, though serious infections may be caused by some strains that may in turn, cause bloody diarrhea, cramps in the stomach, failure of kidney and sometimes, it may result into the death of the affected person. People may acquire the bacteria of E.

Thursday, October 17, 2019

Intimate Correlation of Media Art and Manufacturing Industry Dissertation - 1

Intimate Correlation of Media Art and Manufacturing Industry - Dissertation Example Manufacturers need to cater to the changing needs of their consumers in order for them to continue with their operations. They need to think of new innovations for their products for them to be globally competitive and for others not to outweigh what they have. It should not be a wonder why manufacturers with this line of thinking have owned the top positions for the best manufacturers in the world. Apple’s Legacy Apple for instance, has come a very long way in producing items that were really suitable for the different tastes of people. As their products continue to innovate, their ability to capture the hearts of the consumers also continue. With this, manufacturers within the same line of business such as Samsung are also following Apple’s steps in innovating their products and giving in to what the customers want. They always come up with ideas that would attend to the latest craze regarding the different gadgets, always leaving their consumers thirsty for more. Whi le it is enough to credit these manufacturers for their ability to innovate and think of new ways to sell their products, it cannot be denied that media art has also affected the success of these manufacturers very effectively. Anyone would be positive in saying that media art can really push consumers to purchase the products that they contain. Advertisements always make a huge impact to customers and it’s the easiest form of influence so that consumers can be attracted to the products. Apple has been in the top of Wall Street for the past years now, since its introduction of the Macintosh personal computers and the portable music players known as iPod. Nowhere in the world can you see anyone who owns any of these gadgets. The way on how these products attained success is a great illustration on how media art and innovation can really be a factor to the manufacturer’s success. Even the littlest image on a magazine, or a small advertisement in a billboards and everythi ng else, if it contains the most important feature that a product has, that would be a plus factor to the manufacturer’s ability to sell. Even as Apple continue to succeed, its owner, Steve Jobs overlooked the fact that he has competitors around. Koontz and Weihrich (2008, pp.331-333) shared what happened between Apple and Windows. Gates has offered Jobs to make the personalized software that he wants, but as soon as Gates took a hold of the Apple’s software, he took advantage of it, and thus, the birth of Microsoft Windows. This only proves that having the most efficient software and resources is not the only key to success in every company. There will always be those who will compete in order to get to the highest position. Microsoft was then successful in pirating Apple’s idea, but the success that the latter has made can still be apprehended for. According to Lussier and Achua (2010, pp.24-25), Apple’s success comes from trying to make things that wou ld be loved by everyone. There is no doubt at this point that everyone loves their products. Together with their brilliant minds, innovation and resourcefulness, media art can always be behind everything that they make. As stated earlier, the easiest way to reach people nowadays and to sell products is through advertising. Media art is a very effective tool in exposing your products in a very simple way. For as long as you know the details to include in the

Relationship between Terrorism and Religion Essay

Relationship between Terrorism and Religion - Essay Example Principally, this ideologically has driven our world since the twentieth century, and it is now making way to the twenty-first century. Also, now it appears to have settled in people in a more ‘religious accommodating’ manner. The final years of the twentieth century, in fact, already underwent an exceptional resurgence of historical religions in numerous parts of the globe, comprising the former USSR, Eastern/Central Europe, as well as China. It is not restricted to only the rebirth of historical religions or faiths, but also extended to the surfacing of neo-religious groups such as the New Age spirituality, as well as the surge of faithfully based experiences and practices ranging from medicine to meditation. These movements have made their way into societies and communities all through the globe where definite levels of freedom for spiritual and religious groups are present. Religious values and views play a significant role in the lives of individuals as they cope wi th issues affecting their communities. Religions educate people concerning ultimate views on believers’ lives. They also offer a core vision for people’s lives, which habitually shades its followers’ socio-political hopes, behaviors and engagements. Therefore, the significance of religion to terrorism cannot be overlooked. This paper will focus on the relationship between terrorism and religion based on what these three authors say in their writings: Brigitte Nacos, Martha Crenshaw and Richard Connerney. These articles are â€Å"The Making of Terrorists: Causes, Conditions, Influences;† â€Å"The Logic of Terrorism;† and â€Å"Islam† respectively.... The author also touches on the new-fangled and past/historical trends of terrorism. Extensively discussing the subject â€Å"What is terrorism?,† the author, a celebrated expert in this field, visibly discusses and explains terrorism’s numerous causes, strategies and actors, as well as counter- and anti-terrorist responses. This article, in addition, outstandingly examines terrorism’s relationship with religion, the public and the media. Highly readable and also comprehensive, â€Å"The Making of Terrorists: Causes, Conditions, Influences† introduces the readers to significant concepts and theories in the study of terrorism with its relation to religion and political turmoil. It also helps them challenge presumptions of this vital, as well as complex issue. Any macro level matter, according to Nacos (61), cannot be tackled without being receptive to realities of religion experienced by humans. Whether the hope of humanity will be formed by the ‘clash of ignorance,’ the ‘clash of societies,’ the clash of religions/faiths and traditions, or conflicts between the ‘West and the rest’ is difficult to predict. It might be an amalgamation of a number of the above because they are all intricately related (Nacos 61). Also, it might be caused by the surfacing of previously unclear issues or problems of polarization. Nacos gives the instance of the 9/11 attacks where Muslim terrorists from the Middle East decided to attack the famous American Twin Towers. In the past, there has always been a religious conflict between the people of the Middle East and the Americans. This was the main reason that according to Nacos (62) led to the bombing of the American Twin Towers. Therefore, Nacos concluded in her article that a

Wednesday, October 16, 2019

Food, Inc Essay Example | Topics and Well Written Essays - 500 words

Food, Inc - Essay Example coli is the corn that the cows are fed. It is quite cheap and dangerous for health. The content of E. coli in the cow’s guts increases when they feed on the corns. In order to regulate the effect of increased E. coli level, the meat packers often tend to cleanse the meat by treating it with ammonia so that it becomes suitable for human consumption. Food borne illnesses resulting from the consumption of contaminated food are increasingly putting millions of Americans in hospitals every year. The number of Americans that are admitted into hospitals every year is 325,000 approximately and those who die because of the diseases caused by contaminated food consumption every year are about 5000 (The Center for Ecoliteracy 39). The toddler Kevin in Food, Inc. who is only two years old becomes sick because of Escherichia E. coli. Escherichia E. coli is a bacterial group which is found in the intestines of many birds, animals and also humans. Usually, many E. coli benefit us by decompos ing the food that we in-take and facilitate its digestion, though serious infections may be caused by some strains that may in turn, cause bloody diarrhea, cramps in the stomach, failure of kidney and sometimes, it may result into the death of the affected person. People may acquire the bacteria of E.

Tuesday, October 15, 2019

Relationship between Terrorism and Religion Essay

Relationship between Terrorism and Religion - Essay Example Principally, this ideologically has driven our world since the twentieth century, and it is now making way to the twenty-first century. Also, now it appears to have settled in people in a more ‘religious accommodating’ manner. The final years of the twentieth century, in fact, already underwent an exceptional resurgence of historical religions in numerous parts of the globe, comprising the former USSR, Eastern/Central Europe, as well as China. It is not restricted to only the rebirth of historical religions or faiths, but also extended to the surfacing of neo-religious groups such as the New Age spirituality, as well as the surge of faithfully based experiences and practices ranging from medicine to meditation. These movements have made their way into societies and communities all through the globe where definite levels of freedom for spiritual and religious groups are present. Religious values and views play a significant role in the lives of individuals as they cope wi th issues affecting their communities. Religions educate people concerning ultimate views on believers’ lives. They also offer a core vision for people’s lives, which habitually shades its followers’ socio-political hopes, behaviors and engagements. Therefore, the significance of religion to terrorism cannot be overlooked. This paper will focus on the relationship between terrorism and religion based on what these three authors say in their writings: Brigitte Nacos, Martha Crenshaw and Richard Connerney. These articles are â€Å"The Making of Terrorists: Causes, Conditions, Influences;† â€Å"The Logic of Terrorism;† and â€Å"Islam† respectively.... The author also touches on the new-fangled and past/historical trends of terrorism. Extensively discussing the subject â€Å"What is terrorism?,† the author, a celebrated expert in this field, visibly discusses and explains terrorism’s numerous causes, strategies and actors, as well as counter- and anti-terrorist responses. This article, in addition, outstandingly examines terrorism’s relationship with religion, the public and the media. Highly readable and also comprehensive, â€Å"The Making of Terrorists: Causes, Conditions, Influences† introduces the readers to significant concepts and theories in the study of terrorism with its relation to religion and political turmoil. It also helps them challenge presumptions of this vital, as well as complex issue. Any macro level matter, according to Nacos (61), cannot be tackled without being receptive to realities of religion experienced by humans. Whether the hope of humanity will be formed by the ‘clash of ignorance,’ the ‘clash of societies,’ the clash of religions/faiths and traditions, or conflicts between the ‘West and the rest’ is difficult to predict. It might be an amalgamation of a number of the above because they are all intricately related (Nacos 61). Also, it might be caused by the surfacing of previously unclear issues or problems of polarization. Nacos gives the instance of the 9/11 attacks where Muslim terrorists from the Middle East decided to attack the famous American Twin Towers. In the past, there has always been a religious conflict between the people of the Middle East and the Americans. This was the main reason that according to Nacos (62) led to the bombing of the American Twin Towers. Therefore, Nacos concluded in her article that a

Group Signature Essay Example for Free

Group Signature Essay Group signature schemes allow a member of group to sign a message on behalf of the group anonymously and in unlinkable passion. However, a designated group manager can easily identify the signer. The signer of a valid group signature is needed to be a member of the group. These features are important in some specialized applications. This scheme is to be used in electronic business transaction. The scheme needed to satisfy six properties to be secured. These are unforgeability, anonymity, unlinkability, no framing, traceability and coalition-resistant. Mathematicians and computer scientist continues their studies to improve their proposed schemes. It is to satisfy the six properties with no doubt. Key words: group signature, unforgeability, unlinkability, no framing, traceability, coalition-resistant Group Signature Introduction The process, in which certain anonymity is needed to perform a task in spite of a collection of people or groups, is the based the concept of group signatures is born. Chaum and van Heyst first introduced this. The concept of group signature provides a member of group to sign certain messages anonymously and unlinkably on behalf of the whole group. On the other hand, a designated group manager has power to unveil the identity of the signer in cases of dispute. A group signature is verified through a series of algorithm to ensure that the signer is a member of that certain group. However, the group’s structure is still concealed and the signer can only be identified if the necessity occurs. With this features, the group signature scheme have potential application. Such applications are needed in electronic transaction that needed to be signed. The anonymity of the signer is essential to prevent others to see organizational structure of the signatory group. A group signature is needed to be secured to preserve the unlinkability and anonymity. A group signature scheme must satisfy the six properties. One is unforgeability. This is the property which ensures that only members of the group can sign on behalf of the group. This feature is necessary to make sure that invalid members or revoked members cannot sign on behalf of the group. This provides a way on which if there is dispute in a valid group signature, the group manager can easily find out who the signer is or it can be concluded that it is a member of the group when the message is signed. Number two is anonymity. This feature assures the members of the group that the identification of the signer will be hard except to the group manger. This is one of the main features of group signature. It conceals the identity of the signer. Consequently, it conceals the organizational structure of the group. The third one is unlinkability. This is feature which tells that determining whether two valid signatures were generated by a common member will be hard. This feature is necessary to go with anonymity of the signer. Since if you can identify two valid signatures coming from single member then it will easy to identify the signer. Number four is no framing. This is ensures that no member or the group manager can sign on behalf of other members. This is necessary to protect any member from a wrong identification when a dispute occurs. The fifth one is traceability. The traceability means that a group manager will be able to open a valid signature and determine the identity of member who signed it. It means that in a dispute, the group manager can easily identify the signer. Additionally, this property does not the possibility of not identifying the signer. The last one is coalition-resistant. This means a subset of members of the group or even the whole group cannot generate a valid signature on which the group manger cannot link on one of the members of the subset group. This ensures that a certain valid group signature can always be associated with a single member of the group not with subset of the group. There are many studies which ensure that the six properties are satisfied. There are many proposals of which contains algorithm that is claimed to satisfy the six properties. There are some summaries of articles of proposals and advancement in group signature. The reader would find these summaries of articles to contain dispute of other schemes. Security Remarks on a Group Signature Scheme with Member Deletion The Kim-Lim-Lee group signature scheme is scheme which claims to have a member deletion function, security and unlinkability. These claims are put into consideration because it is found to be unsecured and linkable. This will present some remarks which will prove the unsecurity and linkability of the Kim-Lim-Lee group signature scheme (Wang et al. , n. d. ). This scheme consists of different stages. These are system set up, join, delete, sign verify and open phases (Wang et al. , n. d. ). The system set-up is done by the membership manager in which he sets parameters and compute for secret and public keys. At the same time, the revocation manager selects his secret key and then computes and publishes his own public key (Wang et al. , n. d. ). At the join stage, the user who wants to join the group need undergo an interactive protocol on which he is assigned to a generated membership key and given the public key. Additionally, current members of the group update their membership key (Wang et al. , n. d. ). The deletion stage happens when a member is voluntary or involuntary leaving the group. The membership manger performs a series of algorithm and updates the group’s public key. He then computes fro the renewal public key. Here, the membership manager publishes the two new public keys. Then, every valid members of the group updates his secret property key (Wang et al. , n. d. ). In the sign stage, a member needed to sign some message. The member submits his membership key and his secret to generate the group signature (Wang et al. , n. d. ). The group signature generated in the sign stage is then subjected to verification. The verifier then uses a series of computation to verify the signature. The verification will yield a result which indicates if a valid member of the group signed it or not (Wang et al. , n. d. ). In the case of dispute, the open protocol is done. The open protocol is done to trace the identity of the signer. Only the group manager can do this (Wang et al. , n. d. ). The process of which the Kim-Lim-Lee group signature scheme under is found to be unsecured. This is due to proven accounts its security parameters is lacking in some cases. It is proven the two parameters used in the scheme are not sufficient to ensure absolute security (Wang et al. , n. d. ). The unlinkability claim of this scheme is also taken to account. The unlikability claim was proven wrong. The group signature scheme of Kim, Lim and Lee is prove to be linkable. It is proven that it easy to associate a given group signature to member of a group. This is due to invariance in the group signatures within time and even in all time periods. It means two signatures can be traced back to signer simple computational analysis (Wang et al. , n. d. ). A member deletion stage is then scrutinized by disproving the claim of which a deleted member cannot generate a valid group signature. The problem with this is identified in the process of the updating the members secret key. It is said a deleted member can simply update his secret along with other valid members since he can compute for a member secret in a given time. At the same time, a new member can get a version of his secret membership in the past time when is not yet a member (Wang et al. , n. d. ). Thus, the security of the Kim-Lim-Lee group signature scheme is proven to unreliable and unsecured. It is needed to revised and improved to satisfy the needs for a good group signature scheme (Wang et al. , n. d. ). An Efficient ID-Based Group Signature Scheme The ID-based signature scheme is proposed to be more efficient than other predecessors. The scheme is based on the process of the ID-based electronic signature. The identity-based signature uses publicly known identifier such as IP address, e-mail address and other identifiers. It is use to compute for public key component of the pair use for digital signatures, encryptions, and key agreement. The private key is computed by a trusted authority. This scheme is aimed to have better efficiency and to cope with large number of members in a group (Popescu, 2000, 29-35). The identity based signature scheme is done in several phases. The set-up process is done by the trusted authority which leads to the extract phase in which the user provide the ID. The ID becomes the public key and the trusted authority returns a private key which is needed to make for the signing protocol (Popescu, 2000, 29-35). The verification of an identity based signature is done by inputting the message with the signature, the parameters and a public key ID. The verify stage outputs the validity of the signature (Popescu, 2000, 29-35). There is another type of ID-based signature which is from the pairings on elliptical curves. This scheme is done to improve the efficiency of the ID-based signature processes. It is basically similar with the conventional one. However, the computations are different and more appropriate for large number of users (Popescu, 2000, 29-35). The scheme use in ID-based signature is put into the context of group signatures. The set-up procedures are similar with the ID-base signature but the group public key and the secret key is computed differently. Compared to other group signature schemes the set-up stage is done more efficiently (Popescu, 2000, 29-35). In the join stage, the user sends the ID to the group manager and the group manager computes for the membership certificate and secretly sends it to the new member in a secure private channel. This process is more efficient since the stages were reduced. However, the security is still intact because of the process in the set-up stage that lessens the work at other stages (Popescu, 2000, 29-35). The signing stage makes use of the public and private key pair which was generated by the user himself. The pair key is use to compute and generate the group signature. It is combined with a random number for it to be anonymous and unlinkable (Popescu, 2000, 29-35). The verify stage is split in the two parts. The first part is that it verifies if the signer is definitely a member of the group. If the signature generated by the group is valid and it is signed by a member of the group, the second stage commences. It is to verify that a member signed the group signature and not the group manager (Popescu, 2000, 29-35). The open stage is done when there is time that the signer needed to be identified. Like other schemes, the group manager can only do this. This process is very easy for the group manager since the manager knows the identity of the user who is associated with the group signature. This is because in the join stage the bind between the user and the manager was forged (Popescu, 2000, 29-35). The ID-based group signature scheme keeps the security properties of a good group signature in tact. The identity based signature guarantees some the properties and the added processes in the group signature scheme made other necessary security measures (Popescu, 2000, 29-35). The ID-based group signature from elliptic curves was derived from the identity based signature scheme. This scheme can handle a large number of members in a group without compromising the security and the efficiency of the process involved. However, the disadvantage is that the efficiency of the group signature is based on the efficiency of the identity based signature scheme it uses (Popescu, 2000, 29-35). Practical and Provably Secure Coalition-Resistant Group Signature Scheme Group signature concept is dual to the identity escrow which this scheme uses to create a coalition-resistant group signature scheme. The identity escrow can replace the membership certificate which other group signature uses. The use of identity escrow in group signatures can be regarded as group-identification scheme with revocable anonymity. This is scheme is just the second coalition-resistant group signature scheme which is an improve version of the first (Ateniese et al. , 2000, 255-270). This group signature scheme differs to other scheme in the efficiency of the join process. The user needs not to send his secret to the group manager not like other conventional schemes. The feature of which the user sends secrets to the group manager is found to be susceptible to attacks. This scheme eliminates such possibility and is proven to be coalition resistant even against adaptive adversaries (Ateniese et al. , 2000, 255-270). The model use by this scheme is somewhat similar to conventional group signature schemes. The group signature scheme undergoes several phases. These phases are the setup, join, sign, verify and in some cases open. Like the other group signature schemes every phase has algorithm need to be follow to ensure the properties to be intact (Ateniese et al. , 2000, 255-270). They only differ in the sign process as this scheme provides an interactive process between the signer and the verifier. The process is derived by replacing the call of the user to the hash function to the call to the verifier. The interactive protocol between the user and the verifier gives way to a more secure group signature (Ateniese et al. , 2000, 255-270). This scheme was proposed to have two major advantages over other conventional group signature schemes. One is the join process is more efficient than other scheme. This is since the new member just needed to provide proofs of knowledge of discrete logarithms in contrast with other schemes which requires new members to prove that a number is a product of two primes. The other advantage is that join process is more secure since it does not require the new member to send his membership secrets which is required in other schemes. Additionally, the property of being coalition resistant against adaptive is in fact an extra advantage (Ateniese et al. , 2000, 255-270). Generally, this scheme surpasses all other schemes created before it in terms of performance and security and it is proven to be coalition-resistant. It is because of the feature like spliting the group manager in two, a membership manager and a revocation manager (Ateniese et al. , 2000, 255-270). Group Signature Scheme with Revocation A number of group signature schemes had been proposed. However, these schemes don’t consider a growing membership or shrinking membership as well. In the real world, a member of a group can join, voluntary or be expelled from the group in any time. This done by other proposed schemes by not issuing changes to public keys and re-issuing group memberships. Thus, Popescu, Noje, Bede and Mang from the University of Oradea proposed a group signature scheme with revocation (Popescu et al. , 2003). There are other several group signature schemes that were proposed. However, these other proposed schemes lacked in efficiency and other others in security. There is a scheme which was proved to be efficient and secured but it requires time periods which any and all verifiers must know, thus requires more time in the verification stage (Popescu et al. , 2003). They proposed a group signature scheme in which every step or phase is different from other group signature schemes. It consists of different computational procedures (Popescu et al. , 2003). In the setup procedure, the group manager needs to undergo several steps which will yield the public key P, the secret key S and a group membership certificate consisting of two integers X and ? satisfying a certain equation which relates the two integers (Popescu et al. , 2003). In the join stage, a user wants to join a group. The scheme requires a secure and private communication between the group manager and the user to protect the anonymity of the user. The user chooses an element from a set formed by the parameters set by the group manager. From the chosen element the user will compute and send an ID which he needs to prove before he chooses a random number from a designated set. The group and the user computes and send computation results to each other until the user received his membership certificate. After this process, only the user knows his membership certificate and that the group manager only registers the ID of the user in the data base which was obtained in the first computation (Popescu et al. , 2003). The user is then allowed to sign to represent the whole group. At the signing process, the user can create a group signature inside a message by computation. The computation starts with the computation with his membership certificate. The user is the only one who knows his membership certificate so he remains anonymous to others. The group signature is then sent to the verifier for verification (Popescu et al. , 2003). In the verification phase, the resulting signature inside a message is verified through a series of computations in which the check the proof of equality between the double discrete logarithm of F (a part of the signature) and the discrete logarithm of D’s representation base on the element of the set that the group manager defined in the setup process. If it is equal the verifier concludes that the user who signed the group signature is a member of the group (Popescu et al. , 2003). When the time comes when it is needed to know who signs the message containing the group signature. He can do this by checking the correctness of the group signature. If it is incorrect, the group managers abort the process. Other wise, the group manager recovers a certain ID in the database and prove that the ID is relative to the D (a part of the group signature) (Popescu et al. , 2003). When a member of the leaves the group the group performs a series of algorithm which will result to the publication of the revocation status of a user in the Certificate Revocation List which was assumed to be available at all times in a well-known public servers. The CRL is also assumed to be signed by the issuer, the group manager or other trusted party (Popescu et al. , 2003). In this scheme, there are strong considerations in the security as provided different calculations that ensure the impossibility of some scenarios that compromises the anonymity of the members of the group. Furthermore, the cost of the revoke process is linear to the number of revoked members. Additionally, this scheme provides fixed signature size and constant work of the signers which makes it more practical than other group signature schemes. However, the opening process of this scheme can result to hundred of exponentiations per signature due to the proofs involving double discrete logarithms (Popescu et al. , 2003). Quasi-Efficient Revocation of Group Signatures This scheme is specified to address the inefficient and unsecured revocation methods use by other group signature scheme. The security of a group signature is not met if it uses an inefficient way of revocation. Additionally, the quasi-efficient revocation methods provide a practical public keys and signatures (Ateniese et al, n. d. ). The importance of a good revocation method is seen in groups with shrinking number of members. The security of the group is compromised if the revocation process is not well established since a revoked member can still sign in spite of the group (Ateniese et al, n. d. ). There are a number of group signature scheme which provides good revocation methods but they need to use synchronized clocks and the signature size is relative to the number of revoked members. The use of loosely synchronized clocks in revocation of membership needs to notify all existing members about the revocation. It modifies the membership certificate of all members and consequently, affects the size of group signature generated (Ateniese et al, n. d. ). This revocation method is made in line with the ACJT signature scheme. The revocation methods can only be done by revising the backward unlinkability to unconditional unlinkability. However, the easiest way of revocation is reissuing of the membership certificates and regenerating the public key. This costs a lot of work to the group manager and the members since they have to repeat parts of the join process. Additionally, the verifiers need to be informed of the changes. However, there is a way to eliminate this inconvenience by generating public keys and membership certificates automatically. This is will eliminate the interactive process between the manager and the members. On the other hand, it has impracticality in the process since it requires issuance of new certificates to existing members (Ateniese et al, n. d. ). The efficient way to overcome this problem is to avoid issuing new membership certificates in the event of revocation of a member. This is done in some scheme in which they use a Certificate Revocation List (CRL). However, the scheme’s group signature presented contains an encrypted version of the CRL. It is necessary to prevent the linking of the group signatures. However, the problem is resolved here by including the latest CRL to the group public key in which the unlinkability is preserved (Ateniese et al, n. d. ). The efficiency of this scheme is measured by the size of the signature, the signer cost, verifier cost, CRL size, and the CRL issuance cause. This scheme had passed all requirements since it minimizes the size of the signature as it fixed, the cost of the signer is constant, the verifier costs is also constant, the CRL size is inevitably rising but it is minimize and the CRL issuance cost is also unavoidable, however it is the least significant (Ateniese et al, n. d. ). The revocation method with the ACJT group signature scheme had been proven to be efficient and secured. This more practical than other group signature due to its features that fixes the size of the signature and requires constant work by signers. However, the ACJT group signature scheme requires the use of proofs-of-knowledge involving a double discrete logarithm (Ateniese et al, n. d. ). Conclusion These articles had proposed changes to other group signature schemes and some presented their own schemes. Generally, these articles aim to the advancement of the concept of group signature in relation to efficiency. The articles above had proposed methods of how to satisfy six properties needed fro a secure group signature scheme. These schemes are still subjected to further research to optimize its efficiency without compromising its security. References Ateniese, G. , Camenisch, J. , Joye, M. , and Tsudik, G. (2000). A practical and provably secure coalition-resistant group signature scheme. Advances in cryptography, CRYPTO, 1880, 255-270. Ateniese, G. , Song, D. , and Tsudik, G. (n. d. ). Quasi-efficient revocation of group signatures. The Johns Hopkins University University of California. Popescu, C. (2002). An efficient ID-based group signature scheme. StudiaUniv. Babes-Bolyai, Informatica, 47, 29-35. Popescu,C. , Noje,D. , Bede, B. and Mang, Ioan. (2003). A group signature scheme with revocation. University of Oradea. (Popescu et al. , 2003) Wang, G. , Bao, F. , Zhou, J. , and Deng, R. H. (n. d. ). Security remarks on a group signature scheme with member deletion. Infocomm Security Department, Institute for Infocomm Research.