Wednesday, December 25, 2019

Leonardo Da Vinci s Ideas And Paintings Changed The...

My Thesis: Leonardo Da Vinci’s ideas and paintings changed the world, and the way it thinks. Da Vinci, made all sorts of contraptions, all we have are his designs, we have tested them for the most part, and have found they are successful. He has helped us realize that thinking outside the box isn’t exactly a bad thing. He’s made all sorts of wonders, and beautiful paintings for which we may never understand. Which is the definition of art. Mystery (not literally.). Mystery drives us, we like to find out things, not just handed to us. Leonardo Da Vinci did just that. He didn’t give us anything but a breathtaking fresh taste of art. And of course his inventions. We couldn’t even find his inventions. Just his drafts/sketches. His anatomy blew our minds. Because he found stuff out that we found out maybe 200-300 years later. Some of his havent even been made yet. Now here’s a bit of info on the fellow. Born on April 15, 1452, in Vinci, Italy, Leonardo da Vinci was the definition of a â€Å"Renaissance man.† Possessor of a curious mind and keen intellect, da Vinci studied the laws of science and nature, which greatly informed his work as a painter, sculptor, architect, inventor, military engineer and draftsman. His ideas and body of work—which includes Virgin of the Rocks, The Last Supper and Mona Lisa—have influenced many artists and made Da Vinci a force to be reckoned with of the Italian Renaissance. His early rise even caught us by surprise. Because, he essentially out didShow MoreRelatedLeonardo Da Vinci Essay1995 Words   |  8 Pagesthe world that have inspired, influenced and revolutionized the modern world as Leonardo da Vinci has. His works in Arts, Science, Engineering and many others has influenced many people in their respective fields. His works in Engineering such as the designing of a machine that can fly has gone on to influence the Wright brothers who invented the airplane. His research in Anatomy and other biological works has made pathways for surgeons, doctors, and many scientists in their research. Leonardo DaRead MoreThe Lady With An Ermine1141 Words   |  5 Pagesportrait of Cecilia, with no animal. In the second attempt, Leonardo included a small grey ermine. In the third and final version, a large white ermine replaced the grey ermine. This progress really shows why Leonardo da Vinci had so much trouble finishing his paintings. Also, originally the backg round was blue, but in 1800, Prince Adam Czartoryski bought the piece for Princess Izabella. She did not like the painting very much. â€Å"If it s a dog, it s a very ugly one† she remarked. Taking a disliking toRead MoreEvolution Of Human Thought And Emotion2187 Words   |  9 Pagesobserved in the natural world. People strive to create that which they do not already see or possess; even a simple painting of a bowl of fruit is meant to dramaticize elements such as its shadows and colors, make them bolder and more beautiful. Aristotle’s definition of art as a subconscious desire to imitate the world, copy a subject and then smooth out its imperfections with creativity and manipulate the image until subjective perfection is achieved, is a logical idea that when applied to mostRead MoreTwo Great Renaissance Artists2585 Words   |  11 PagesArtists The Renaissance period is known as a period of the rebirth of Greek ideas. The works of this time were more individualized and the artists had more artistic freedom then were allowed in the Medieval or middle Ages. Two of the greatest individuals of the Renaissance time period were Leonardo Da Vinci and Michelangelo. Not only was Da Vinci a great artist, he was also the best in many fields other than art. â€Å"Leonardo is often viewed as the archetype of the Renaissance Man because of hisRead MoreThe Italian Renaissance1558 Words   |  7 Pageslife and values dominated by the Church toward the philosophical principles of humanism. The Italian people, especially the educated middle class, became interested in individual achievements and emphasized life in this world, as opposed to preparation for life in the next world, which was stressed by religion in the Church. They believed strongly in the potential for individual accomplishment in the arts, literature, politics, and pers onal life. Individuals began to be encouraged to excel in a wideRead MoreEssay on Dbq Mini Q Renaissance Hq Student Fi2066 Words   |  9 Pagesrenai ssance means rebirth or revival. In world history, the Renaissance is used to describe a period in Europe that began around the year 1400 and lasted until about 1700. Thanks in large part to the scientific and cultural advances made during this time , people saw them ­ selves in a new way. The impact of the Renaiss ance was powerful and has endured for centuries. This Mini-Q asks you to explore how this exciting and important era changed the concept of what it means to be human. The Documents:Read MoreA Reflection On Reading Visual Culture2407 Words   |  10 Pagesbe used to describe what kind of emotion it is portraying, colour can change the emotion and meaning of a representation simply by just being there. A good example of the power that colour has can be seen in the painting by Raphael Sanzio called School of Athens (1510-1511). In this painting, Plato and Aristotle are at the centre, both wearing fashionable robes. Plato’s robe can be seen as different colours: Red which symbolises excitement, passion and energy and pink which symbolises acceptance (IncredibleRead MoreThe Renaissance Of The Middle Ages1991 Words   |  8 Pagesrestrictive ideas of the Middle Ages. Renaissance, the term comes from the French translation of the Italian word â€Å"rinascita†, which means â€Å"rebirth† or the extreme and large amounts of changes that took place during the 15th and 16th centuries. The Renaissance is what brought forth the death of the Middle Ages and its what embodied the modern values of the new world for the first time. Many would describe this time as a cultural rebirth because through these centuries the entire world of art and literatureRead MoreHow Did the Period of Renaissance Alter Man’s View of Man? Essay1057 Words   |  5 Pagesin all fields of science, and inventions. How did the period of time we know as, â€Å"The Renaissance†, change or alter man’s view of man? Well, we know that in the Middle Ages, the Church had authority over most people, and people had very few rights. In 1400’s, the Middle Ages had ended and then began the Renaissance. The Renaissance was a monumental change in Europe which lasted for 300 years. Humanity as we know it was changed drastically by this rebirth of Europe, and truly enlightening time periodRead More36 Point Tok Essay1908 Words   |  8 Pageswas studied again. Painting, sculpture and architecture were influenced by the Latin and G reek culture, so that â€Å"paintings became more realistic and focused less often on religious topics.†[2] Furthermore, the name ‘rebirth’ was not given for nothing, it was a repetition. One might say that history is not always on the move, it just reiterates. Scientist observe nature and try to explain what they see with the help of theories. The nature itself does not change, but the way they look at it is

Tuesday, December 17, 2019

F. Scott Fitzgerald s The Great Gatsby - 957 Words

Jay Gatsby is scrutinized over and over for his role in F. Scott Fitzgerald’s The Great Gatsby. His actions and character traits result in his character being deeply investigated by many literary scholars and critics worldwide. To the reader, Gatsby is a somewhat mysterious man for most of the novel. Other characters discuss Gatsby and speculate about how he became wealthy until Fitzgerald reveals towards the end of the novel that Gatsby is a crook and makes all of his money as a part of Meyer Wolfsheim’s illegal operations. This fact, however, does not explain all of Gatsby’s mysterious traits. Gatsby’s traits result from his idealistic hope. Gatsby is such a hopeful man and has such idealistic views for his future that it leads him†¦show more content†¦Fitzgerald reveals to the reader Gatsby’s notes on his daily routine from his younger days. Gatsby originally modeled his life after Benjamin Franklin and aimed to attain his goals through good habits, hard work, and good morals. Essentially, Gatsby was trying to follow the American Dream to attain wealth. This idealistic hope and courage is a predominant trait that shows in Gatsby throughout the novel. In the novel, Gatsby shows hope for a new, better life with Daisy Buchanan. A specific event that personifies Gatsby’s hope occurs when Nick Carraway watches Gatsby on his balcony looking over at East Egg, where the Daisy and Tom reside. Fitzgerald even includes a symbol of Gatsby’s hope in the green light that shows from the Buchanan’s dock. This green light represents the hope Gatsby has for this new life with Daisy. Gatsby’s idealistic view also shows through his actions. Gatsby attempts to do everything he can to attain his goal of having Daisy to himself. Unfortunately for Gatsby, his innate hope eventually will lead to his downfall. Gatsby’s idealistic views impact his character in many ways. One main side effect of Gatsby’s desire is his dishonesty. As a result of all the goals he has set for himself in his life, Gatsby becomes dishonest and cunning. Originally, Gatsby seems to have been a righteous but ambitious young man, as shown through his daily routine. Once he realizes that he is not able to accomplish his goals by having good habits, hard work, and good

Sunday, December 8, 2019

Major Cultural And Societal Influence On Health †Free Samples

Question: Discuss about the Major Cultural And Societal Influence On Health. Answer: Introduction The Canadian Paediatric Society defines culture as a constantly evolving pattern of customs, ideas, and behaviours in a particular society by a particular people. Culture influences health and it affects perception of illness. Societal influences also affect the extent at which diseases develop. This reflective journal examines the major cultural and societal influences on health based on the lecture notes on the history and philosophy of natural medicine(Canadian Paedriatic Society, 2017). I was fascinated to learn the importance of traditional healers in traditional medicine and the immense impact that they had on the early society. They were depended on in the past, same way healthcare providers are depended on today. Moreover, I am fascinated by the ability of traditional healers to identify various plants as medicine or animals to provide medicine. It is important to appreciate the holistic approach adopted by the communities that combined traditional herbalism with spirituality as something new to be learnt. Furthermore, I learnt that culture and religion penetrated into the various aspects of existence and traditional medicine was never left out. Spirits used by traditional healers were ever consulted, various spirits were always at work at various times and they created harmony with ancestors in order to heal people. Impact on understanding medicine. Colonialism came to Africa, it had a major impact on the social, cultural and political ways of the people. The colonialists brought new socio-cultural customs such as new medicine in the name of hospitals. The new medicine clashed with the traditional medicine that was already present. Cultural ways changed, therefore, changing the traditional methods that were used in medicine such as indigenous herbs as they introduced new medicine to fight diseases. This outlines the history of natural medicine. Cultural effects on healing. It was fascinating to learn that culture was based on religious and magical beliefs. Religion was important in traditional livelihood. Moreover, it was important to learn the advent of diseases in traditional medicine. People believed that diseases emerged due to conflicts with gods or demons. Furthermore, they believed that evil demons and angered gods caused diseases. Therefore, they had to put in place mechanisms to avoid angering the gods. Traditional healers had to cast away evil spirits as a measure to prevent diseases. It is important to learn that early civilization started in Egypt and the Egyptians had doctors. The Egyptian culture had a belief in gods and goddesses who were consulted during healing. The healing practice was a combination of religion and hospitals. Pries combined with doctors to treat people through empirical and religious means. They conducted prayers to gods and the goddesses of healing. In addition, they cursed evil spirits and threatened them. A good initiative in understanding medicine and health in the past. Conclusion Cultural and societal influences on health have had major impacts on understanding the history and philosophy of natural medicine. It was important to learn how cultural values and societal influences contributed to understanding the origin of diseases. Furthermore, they also outlined the healing practices in traditional medicine since healing was a practice that depended on culture. The society and culture have influenced traditional medicine thus making it possible to understand history and philosophy of natural medicine.. References Canadian Paedriatic Society. (2017). Culture and Health. Retrieved October 14, 2017, from https://kidsnewtocanada.ca/culturei=/influence Hernandez, L. (2006). The Impact of Social and Cultural Environment on Health. Washington: National Academic Press.

Sunday, December 1, 2019

The Bell Jar (1285 words) Essay Example For Students

The Bell Jar (1285 words) Essay The Bell JarThe Bell Jar Essay submitted by Jen Peoples lives are shaped through their success and failure in their personal relationships with each other. The author Sylvia Plath demonstrates this in the novel, The Bell Jar. This is the direct result of the loss of support from a loved one, the lack of support and encouragement, and lack of self confidence and insecurity in Esthers life in the The Bell Jar. It was shaped through her success and failures in her personal relationships between others and herself. Through life, we often lose someone we loved and cared deeply for and supported us through life. This is demonstrated by the loss of a loved one when Esthers father died when she was nine. My German speaking father, dead since I was nine came from some manic-depressive hamlet in the Prussia. (Sylvia Plath page 27.) Esthers fathers death had showed that she was in need of a father figure for love, support and to act as a model for her life. Esther grew up with only the one influence of a parent, her mother. We will write a custom essay on The Bell Jar (1285 words) specifically for you for only $16.38 $13.9/page Order now Often times the loss of a friendship can be a great loss of support and confidence within our lives because we can lose them forever. This is demonstrated when Buddy Willard Esthers boyfriend break up. He told me that his annual fall chest x-ray showed he had caught tuberculosisin the Adirondacks (Sylvia Plath pg. 58.) Buddy and Esther break up due to the fact that he was not very honest with her in many ways. He did not have the courage to admit to a certain side of his character and not only that Buddy was diagnosed with an illness but he had other relationships aside from Esther. Therefore Esther experienced another loss of a loved one. Within life, we gain the support from someone that helps us get through life but often times leaves us when we need them most. This is proven when Doreen; Esthers co-worker at the modeling magazine begins to lose contact with Esther through life Doreen is dissolving none of them mean anything anymore (Sylvia Plath pg.17) Doreen begins to lose contact with Esther throughout life, just when Doreen had opened new doors to her. Esther was coming through a very difficult time in life, when Doreen started drifting away from Esther. Once again, Esther experienced the loss and support of a great friend and advocate. Ones life is made up by framework. You gather friends and folks together and in this framework it clarifies your identity. You articulate and express opinions. You articulate and express opinions. In framework and talk, you develop behavior patterns and priorities and define framework in terms and languages. Esther did all this in her life. But then she forgot who she was. She forgot her framework of reference and she talks about success and failures and despair. Individuals, need encouragement and support from loves ones to guide one through life. This is seen in the lack of support and encouragement displayed when Esthers mother fails to support and encourage Esther with her aspirations. No matter what Esther had wanted to do with her life, her Mother had always wanted her to learn the skills of shorthand because she would always have that skill in her life and also that was the one thing her Mother had experienced in life. As a result, her Mother failed to enhance Esther with her aspirations that she wanted from life. We need the sustenance and assurance from not only loved ones in life, but also from others. This is demonstrated when Jay Cee, Esthers present boss asked Esther what she wanted to do with her life. Esther did not have any solid idea as to what she wanted to do with her life. Youll never get anywhere like that. (Sylvia Plath page 27) Esther did not know what she especially wanted with her life. Jay Cee stated to Esther that not having an idea of what she wants, will not get her very far because Esther is lacking a few skills. Consequently, Esther lacked the support and helpfulness from her friend and colleague. .u01018b15aebc9be4385922b91762ca30 , .u01018b15aebc9be4385922b91762ca30 .postImageUrl , .u01018b15aebc9be4385922b91762ca30 .centered-text-area { min-height: 80px; position: relative; } .u01018b15aebc9be4385922b91762ca30 , .u01018b15aebc9be4385922b91762ca30:hover , .u01018b15aebc9be4385922b91762ca30:visited , .u01018b15aebc9be4385922b91762ca30:active { border:0!important; } .u01018b15aebc9be4385922b91762ca30 .clearfix:after { content: ""; display: table; clear: both; } .u01018b15aebc9be4385922b91762ca30 { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u01018b15aebc9be4385922b91762ca30:active , .u01018b15aebc9be4385922b91762ca30:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u01018b15aebc9be4385922b91762ca30 .centered-text-area { width: 100%; position: relative ; } .u01018b15aebc9be4385922b91762ca30 .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u01018b15aebc9be4385922b91762ca30 .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u01018b15aebc9be4385922b91762ca30 .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u01018b15aebc9be4385922b91762ca30:hover .ctaButton { background-color: #34495E!important; } .u01018b15aebc9be4385922b91762ca30 .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u01018b15aebc9be4385922b91762ca30 .u01018b15aebc9be4385922b91762ca30-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u01018b15aebc9be4385922b91762ca30:after { content: ""; display: block; clear: both; } READ: THE POWER OF SPEED ENERGY CONFIDENCE AND STRENGTH EssayThroughout life one also needs the motivation and provisions from those that influence ones lives. This is demonstrated by Esthers Class Dean who upheld Esther through her high school years. I had a way of persuadinginteresting experiment. (Sylvia Plath page 29.) Her Class Dean supported Esther in her way of thinking and her thrive for learning which in turn, she was awarded for her learning by receiving many scholarships. Therefore, Esther had the support of her Class Dean in order to help her strive for excellence in life. Before anything or anyone can have a framework, support or a foundation is needed. Esthers Mom was her primary foundation. Raised her as a single parent from age of nine until adulthood. She guided her through her goals to success, and strengthen her through her failures with support. Jay Cee, Esthers, mentor, understood her strengths and weaknesses. She could provide Esther with every opportunity but failed to realize Esthers insecurity; lack of self confidence and therefore was unable to handle Esther to put her strengths and framework into positive energy to hold up support. Through life, one does have an advocate. The Class Dean always recognized her thirst for knowledge and supported her in any direction Esther wished to learn. Whether she wrote poetry, studied a language or followed a certain course, this Class Dean always gave her the strength to succeed in her goals with a foundation. All people have strength and weaknesses. Through some of our weaknesses we experience it because of a lack of self confidence. This is proven when Esther wanted to do many things with her life but was not really confident in herself and her work. What do you have in mind I knew it was true. (Sylvia Plath pg 29). She wanted many things in life but really and truly wanted to be a writer or an editor but did not have the poise in herself and did not have the confidence to do the work she wanted to do. Therefore, Esther did not have the self assurance to fulfill her aspirations in life. Esther had submitted an essay in order to get into a writing course at a particular college. you didnt make that writing course I had expected it. (Sylvia Plath page 93) After finding out that she had not made the writing course, Esther thought to herself; that even before entering the essay, she knew she would not make the course. Proving that even before entering her essay for the college, she had no c onfidence in being accepted. After building confidence within herself, Esther decided to write an autobiography using herself as the heroine but she felt that she could not write a novel based on life because she felt she had not experienced it. How could I write about lifebaby or even seen anybody die. (Sylvia Plath pg. 99) Thus, this proves that Esther did not even have the self confidence within herself to follow through with her own ambition of becoming a writer. During a journey through life one starts with a foundation to build on and decide on framework of ones life. In order to sustain and maintain life one needs a basis of love, support, food for thought and life to breath, expression and experience. If an individuals life is shaped and directed by the successes or failures of human relationship, without substance, one might as well seal up their life with a vacuum lid and live in a glass jar. English Essays

Tuesday, November 26, 2019

Teddy Bear essays

Teddy Bear essays Theodore Roosevelt, 26th President of the United states Was the youngest President in the nations history. he took office at the age of 42. Roosevelt had been vice President for only six months when president William McKinley was assassinated. He vigorously led Congress and the American public toward progressive reforms and a strong foreign policy. He took The view that the president as a "steward of the people" should take whatever action necessary for the public good unless expressly forbidden by law or the constitution. "I did not usurp power, " he wrote, "but i did greatly broaden the use of executive power." Roosevelt's youth differed sharply from that of the log cabin Presidents. he was born in New York city on October 27,1858 into a wealthy family, but he too struggledagainst ill health. When Theodore was about 12, his father told him that he would need a strong body to give his mind a chance to develop fully. The next year, while on a trip to Maine, Theodore was tormented by two mischievous boys. He felt ashamed because he was not strong enough to fight back. Roosevelt's father built a gymnasium in the family home, and Theodore exercised there regularly. He overcame his asthma and built up unusual physical strength. Roosevelt studied under tutors until he entered Harvard University in 1876 at the age of 18. He earned good grades in college. Roosevelt graduated from Harvard in 1880. In October 1879, Roosevelt met Alice Hathaway Lee. Roosevelt courted Alice during his senior year at Harvard. They married on his 22nd birthday. A double tragedy struck on Feb. 14, 1884. Alice Roosevelt died two days after the birth of a daughter. On the same day, Roosevelt's mother died if typhoid fever. Roosevelt spent much of the nex ...

Friday, November 22, 2019

Nervous Tissue Glial Cells Structure and Function

Nervous Tissue Glial Cells Structure and Function Neuroglia, also called glial cells, are cells of the nervous system. They compose a voluminous support system that is essential to the proper operation of nervous tissue and the nervous system. Unlike neurons, glial cells do not have axons, dendrites, or conduct nerve impulses. Neuroglia are typically smaller than neurons and are about three times more numerous in the nervous system. Glia perform a plethora of functions in the nervous system. These functions include providing support for the brain, assisting in nervous system repair and maintenance, assisting in the development of the nervous system, insulating neurons, and providing metabolic functions for neurons. Types of Glial Cells and Their Function There are several types of glial cells present in the central nervous system (CNS) and peripheral nervous system of humans. Six main types of neuroglia include: AstrocytesAstrocytes are found in the brain and spinal cord and are 50 times more prevalent than neurons. Not only are astrocytes the most abundant neuroglia, but they are also the most abundant cell type in the brain. Astrocytes are noted for their star-shape. They reside in endothelial cells of the CNS that form the blood-brain barrier. This barrier prevents some substances from entering the brain and permits others entry. The two main categories of astrocytes are protoplasmic astrocytes and fibrous astrocytes. Protoplasmic astrocytes are found in the gray matter of the cerebral cortex, while fibrous astrocytes are found in white matter of the brain. The primary function of astrocytes is to provide structural and metabolic support for neurons. Additionally, astrocytes aid in signaling between neurons and brain blood vessels. This allows blood flow to increase or decrease depending on neuron activity. Other functions of astrocytes include glycogen storage, nutrient provision, ion co ncentration regulation, and neuron repair. Ependymal CellsEpendymal cells are specialized cells that line the cerebral ventricles and central canal of the spinal cord. They are found within the choroid plexus of the meninges. These ciliated cells surround the capillaries of the choroid plexus and form cerebrospinal fluid (CSF). Functions of ependymal cells include CSF production, nutrient provision for neurons, filtration of harmful substances, and neurotransmitter distribution.MicrogliaMicroglia are extremely small cells of the central nervous system that remove cellular waste and protect against microorganisms (bacteria, viruses, parasites, etc.). Microglia are thought to be macrophages, a type of white blood cell that protects against foreign matter. They also help to reduce inflammation through the release of anti-inflammatory chemical signals. Microglia also function to protect the brain when neurons become injured or diseased by disabling the malfunctioning neurons.Satellite CellsThese glial cells cover and protect neur ons of the peripheral nervous system. They provide structure and metabolic support for sensory, sympathetic, and parasympathetic nerves. Sensory satellite glial cells are involved in the development of chronic pain. OligodendrocytesOligodendrocytes are central nervous system structures that wrap some neuronal axons to form an insulating coat known as the myelin sheath. The myelin sheath, composed of lipids and proteins, functions as an electrical insulator of axons and promotes more efficient conduction of nerve impulses. Oligodendrocytes are found in the brains white matter, while satellite oligodendrocytes are found in gray matter. Satellite oligodendrocytes do not form myelin.Schwann CellsSchwann cells are neuroglia that wrap around some neuronal axons to form the myelin sheath in peripheral nervous system structures. Schwann cells help to improve nerve signal conduction, assist in nerve regeneration, and aid in antigen recognition by T cells. Schwann cells play a vital role in nerve repair. These cells migrate to the site of injury and release growth factors to promote nerve regeneration. Schwann cells then myelinate the newly generated nerve axons. Schwann cells are being heavily researched for their potential use in spinal cord injury repair. Oligodendrocytes and Schwann cells indirectly assist in the conduction of impulses as myelinated nerves can conduct impulses quicker than unmyelinated ones. Interestingly enough, the white matter in the brain gets its color from the large number of myelinated nerve cells that it contains. Other Animal Tissue Types Neuroglia are just one type of tissue found in animal organisms. Other tissue types include: Nervous Tissue: This is the primary tissue of the central nervous system. It is composed of neurons and is responsible for controlling body functions. Epithelial Tissue: This tissue covers the outside of the body and lines organs. It provides a protective barrier against germs. Connective Tissue: As the name suggests, connective tissue supports and connects tissues to other underlying tissues. Muscle Tissue: The primary tissue responsible for movement, muscle tissue is capable of contraction. Sources: Purves, Dale. â€Å"Neuroglial Cells.† Neuroscience. 2nd Edition., U.S. National Library of Medicine, 1 Jan. 1970, www.ncbi.nlm.nih.gov/books/NBK10869/.Sofroniew, Michael V., and Harry V. Vinters. â€Å"Astrocytes: Biology and Pathology.† SpringerLink, Springer-Verlag, 10 Dec. 2009, link.springer.com/article/10.1007/s00401-009-0619-8.

Thursday, November 21, 2019

Chemistry of Hazardous Materials Case Study Essay

Chemistry of Hazardous Materials Case Study - Essay Example three main illustrations explain that the tanker is transporting hazardous substance that can negatively affect the health and safety of the safety workers and the members of the public. Hazardous material is considered substances, which potentially damage the well being and health of individuals and also the environment. The hazardous substance in the case is in liquid form; this is illustrated through the dripping liquid, from the tanker valve, that is red to yellow in color. Liquid hazardous materials have identifiable characteristics. They are flammable; hence, they ignite easily and burn rapidly if exposed to ignition source. The materials can also be spontaneously ignitable. This implies heat concentration due to oxidation and microbial activities can ignite the material. Corrosive liquid materials damage skin tissues during contact. Toxic characteristics are applicable to substances that cause negative health effects and even death of the individuals exposed to it. DOT provides guidelines for transporting the hazardous materials. The liquid being transported in the case is Thionyl Chloride. The color of this liquid is red to yellow. The NFPA diamond symbol for the liquid is 4, 0, 2 and W that is slashed. The symbol implies that; the substance reacts violently with water, and hence safety caution should be observed by the health and safety team. The action plan for handling the accident situation entails adequate health and safety planning by the professional team. The team should start by ensuring public safety by protecting the accident scene. Members of the public should not be within close proximity to the accident scene. This measure prevents corrosion and irritation effects that people may experience. The safety personnel should wear protective equipments when accessing the accident scene. The safety materials include; special clothing and gas masks. The gas masks prevent the inhalation of harmful fumes that may irritate the respiratory tract. The

Tuesday, November 19, 2019

KapYong Battle April 1951 The Korean War Term Paper

KapYong Battle April 1951 The Korean War - Term Paper Example The battalion was not the regular army of Canada but it was sent by the Canada at relatively time of peace and its main intention was to perform the garrison duty. However, the Stone used his wartime expertise and provided training to his men and enabled them to contribute against the renewed Chinese offensive force. The Canadian battalion was then attached to the 27th British Commonwealth Infantry Brigade during which it remained engaged in different battles and skirmishes. These fights added to their confidence and they learnt to fight on the harsh and hilly terrain of Korea. They became part of the UN force and marched north in order to fight the Chinese force and North Koreans in order to remove from the South Korea. Though the Chinese were considerably greater in number as compared with the battalion but the Canadian battalion consisted of volunteers resisted and fought with them will their full potential and didn’t allowed the Chinese force to attain their war objective by overcoming the Canadian battalion. The training provided by Jim Stone and effective communication and coordination between the members of the battalion and their leaders resulted in their success in the battle. The following essay aims to examine the contribution of battalion in the war that did not had proper training and war equipment to fight against the Chinese force in the Kap’Yong battle but they succeeded to defeat the huge Chinese army. The basic objective of the essay is to examine the effectiveness of the decision of Canada not to use its regular army but to deploy the volunteers that proved to be the most effective and efficient war force sent by Canada throughout the Korean War. The battalion was equipped with some excellent attributes that allowed them to succeed against Canada. They overcame and adopted the circumstance of war and show dedicated commitment to their leader. The essay describes the initial strategies and war tactic employed by the Lieutenant Co lonel Jim Stone who struggled very hard and efficiently to accomplish his mission of defeating China and not to let it invade the city of Seoul. The decision of Canada to create special battalion for the war was a different but successful step. The battalion comprised of two third volunteers that take some unconventional moves in the war and bravely fights against the Chinese force. It has been unveiled that Canada decision of using volunteer force in the Kap’Yong battle was an important and successful war strategy that allowed the army to hold their position. Kap’Yong Battle – Historical Background The battle of Kap’Yong began on the 22nd of April and lasted till the 25th of April 1951. The Chinese People’s Liberation Army was fighting with the UN forces comprising of the forces sent by Australia, Canada and Britain. The Chinese soldiers were almost five to one UN force but the outnumbered UN force prevailed and Chinese forced had to take backward steps after the Kap’Yong battle. The Chinese were better than the UN force in many ways because they were well equipped with the war weapons and war training. They were also huge in numbers due to which it was expected that the Chinese would be able to successfully overcome the UN force at Kap’Yong but it was due to supportive contribution of the Canadian battalion that these Chinese were failed at this spot and Seoul was protected by the UN forces. The ground for the

Sunday, November 17, 2019

Labour party Essay Example for Free

Labour party Essay ‘To what extent is the Labour party still committed to its original principles?’ The Labour party has often been referred to as a ‘socialist’ party. However, this is misleading. For most of its life – dating back to the eighteenth century, the Labour party has always had less ‘radical’ ideologies than socialism and British ‘socialism’ has always been more moderate than elsewhere in Europe. However, the Labour party abandoned a number of its previous principles in favour of new ones, in order to move to the centre ground and enable the party to compete with the Conservatives. It seems that this was ultimately, a successful strategy as it resulted in Labour winning three general elections and beating the Conservatives. Some people are now of the opinion that the Conservatives have, in fact, moved closer to the centre-ground in order to compete with the New Labour party. Within true socialism, there is the idea that the economy should be based upon ‘production for use’; everything produced is just enough to satisfy human need and demand. Socialism also works to reduce or remove hierarchy. The most radical form of Socialism has been ‘Marxism’. Marxists hold the desire to completely destroy capitalism and its political system. It has been said that Marxism is more like communism than socialism. Although Labour has never been revolutionary, it has always argued that its version of socialism can be achieved in a peaceful way, through parliamentary means. All but the more moderate socialists have viewed social class as a crucial aspect of society. Some socialists assume that the majority of people define their position in society in terms of their social class. This was referred to as ‘class consciousness’ by Karl Marx and the idea is that people tend to develop common interests and purpose with fellow members of their class. For example, a number of people within the middle classes feel they need to protect private property interests, as well as feeling the need to promote and protect business and to keep tax as low as reasonably as possible. The working classes, however, are more concerned with issues such as the welfare state, industrial relations, fair wages, good working conditions and policies that promote equality. In most cases, business classes oppose higher wages, mainly due to the fact this conflicts with the need to make profits and generate funds for further investment. Until about the 1930’s, the British Labour party adopted this ‘class position’ as the Labour has always been forced to consider interests of all the classes in British society, in all of its policies, not just those of the working class. To some extent, the reason for this is the need of electoral support the party has always needed. For a large part of the twentieth century, approximately one third of the British public voted conservative and this meant that, electoral reckoning determined, the Labour party could not win by gaining votes of the other two thirds of the working class alone. Collectivism refers to two main ideas – the first being that people tend to prefer to achieve goals collectively as opposed to independently and secondly, action is more likely to be taken by people in organised groups than a sum of many different individual actions. Collectivism is the political principle of centralized social and economic control. One main example of collectivism practised by the British Labour party in the 1940’s was the nationalisation of several large British industries. These industries included the railways, coal, steel, electricity and gas, as well as telecommunications. Nationalisation was a collectivist enterprise and its purpose was to, firstly, prevent the industrial muscle of private industries exploiting its workers, and secondly, ensuring the industries were run in the interests of the community rather than just the owner. After 1997, for the majority of the time, Labour followed the principles of the ‘Third Way’. Yet, today, many argue that it has gradually shifted towards a ‘New Right position’ – that is, even further away from its original socialist values. The term ‘new’ Labour tends to be used to describe the change in Labour party policies, ideas and goals that occurred as a result of the modernisation process. This was started in the late 1980’s and was accelerated under Tony Blair, in opposition and in government. The differences between ‘new’ Labour and ‘old’ Labour tend to be defined by vital policy movements. This includes the abandonment of nationalisation and the recognition of the ‘rolled back’ state, which was inherited from the conservatives. An emphasis on low inflation, for example, demonstrated the wider role. Since 1997, the Bank of England has started setting interest rates; cuts in income tax and have started to refuse to return to the more ‘sharply progressive’ income tax rates of the 1970’s; cuts in some benefits and eagerness to push forward with market reforms of the welfare state. ‘New’ Labour can also be distinguished from ‘old’ Labour in terms of a weaker association with the trade union movement and a reduced reliability on working class votes. During its early years, New Labour was a party very much dedicated to reforming and modernising, but it was not a fundamental one. It did not make any significant changes to the policies put forward but the Conservatives, however, it did seek to improve the way in which policy was executed and it has also attempted to make government action more susceptible to the needs of the disadvantaged and minorities in society. Its principle reforms, therefore, have been to the public services and to the welfare state. Over time, the party seems to have turned rapidly to consolidation rather than reform. New Labour tends to focus now on improving the delivery of the policies it has already implemented.

Thursday, November 14, 2019

Country Report: Philippines Essay -- essays research papers fc

  Ã‚  Ã‚  Ã‚  Ã‚  Improving conditions for the entire world may seem like a daunting task. It may be more beneficial to look at a single piece of the puzzle and its experience of improving conditions. Narrowing the field of study to a single country allows for a more detailed analysis of the path taken to achieve improved conditions for the single country. Improving the conditions of a country through a process of change is called development. Measuring development in a single country allows us to understand some of the policy, historical trends and natural conditions that are better for development. By looking at the Philippines background, recent political and economic issues, and the economic performance of the past and perspective future, a better understanding of development will be achieved.   Ã‚  Ã‚  Ã‚  Ã‚  The Philippines became known to the western world in the early 1500’s with the arrival of Ferdinand Magellan. In 1565 Spain officially colonized the area under Miguel Lopez. Spain controlled the area for over 300 years before, with the help of America, Spanish control was lost and an American-Philippine joint rule occurred. The colonial system had two major influences on the path of development that the Philippines took. The manorial system set up by Spanish colonialists brought a strong divide in the wealth of the country that is still seen today and the religious influence of the Roman Catholic Church makes the Philippines the only country in Asia that is predominately Christian. Over ninety percent of the population is Roman Catholic or Protestant (ACTD Berkly). These influences took the development path through a constant fight of poverty and western ideas.   Ã‚  Ã‚  Ã‚  Ã‚  The isolation provided by a mountainous terrain and an island country was used by the United States to keep influence on the area until occupation during World War II. After the defeat of Japan, the Philippines gained their independence on July 4th, 1946. The country experienced dictatorial rule until President Marcos was ousted in a snap election held in the beginning of 1987. Soon after, the Constitution was written and ratified on February 11th, 1987 (CIA Philippines). This point marks the beginning of an important institutional strength in the form of democratic rule. The Freedom House measuring political rights and civil libe... ...elopment. The future of development for the Philippines would be most effective by focusing on the reduction of poverty and income inequality. Bibliography 2002 World Fact Book: Philippines, updated March 19th 2003: Central Intelligence Agency, [April 1st, 2003]. Available from World Wide Web: http://www.cia.gov/cia/publications/factbook/geos/rp.html. Academic Talent Development Program, U.C. Berkley, 1996-2003, [April 1st, 2003].   Ã‚  Ã‚  Ã‚  Ã‚  Available through World Wide Web. http://www-atdp.berkeley.edu/9931/jvillatl/history.html. The Philippines Economy, The Economist, August 10th, 2003: The Economist Print Group, [April 1st, 2003]. Available from World Wide Web. http://www.economist.com/countries/Philippines/. World Development Report 2000/01: Attacking Poverty, International Bank for Reconstruction and Development, 2000: Oxford University Press, [April 1st, 2003]. Available through Lexus-Nexus. A World Free of Poverty, World Bank Report, 2002: The World Bank Group, [April 1st, 2003]. Available from World Wide Web: http://lnweb18.worldbank.org/eap/eap.nsf/87d06ef07cb6cd69852567c90077a6de/d18a645fa0f6e39b852567cb000e55e2?OpenDocument.

Tuesday, November 12, 2019

Food Adultration

Food adulteration Adulteration is the act of making any commodity impure by mixture of other ingredients. This mixture may corrupt the nature of the original to the extent of destroying its identity, or it may merely lower the value or effectiveness of the finished product. Adulteration of foods and beverages has been performed with the same aim—increasing profits for the manufacturer or merchant—since early times, when laws in ancient Greece and Rome addressed the coloring and flavoring of wine. England has had laws against adulteration of beer, bread, and other commodities since the 13th century, culminating in the Adulteration of Food or Drink Act of 1872 with its stiff penalties. The law was modernized with the 1955 Food and Drug Act. Adulteration not only functions to defraud consumers but it can also pose a health threat. In the case of illegal drugs sold on the street, adulteration is generally in the form of inert or harmless compounds, but deadly poisons, such as sodium cyanide, have sometimes been sold as heroin. Adulteration is not the only source of poor-quality or dangerous foods and drugs: The ingredients of junk foods need not be adulterated to ensure a virtual absence of nutritional value; potentially hazardous medicines will have more adverse effects if unadulterated. The consumer movement of recent times has focused not only on adulteration, but also on the nature of various unadulterated ingredients. For hundreds of years, governments have had an interest in regulating food processing to ensure the safety and wholesomeness of the foods consumed by their citizens. The earliest known food law was written in Japan in AD 702. In Britain, the first Pure Food Laws were enacted during the 1860s to combat adulteration, the secret use of additives to stretch wholesome foods with cheaper, no nutritious (and sometimes dangerous) ingredients. This practice became common during the Middle Ages (5th century to 15th century), when cities began to grow and urban populations no longer got their food directly from the farm, creating an opportunity for deception by middlemen. Today, several United States government agencies carry out inspections and enforce a comprehensive system of regulations governing food processing, packaging, and distribution. The FDA is responsible for monitoring and inspecting most all other food products. The FDA enforces the Food, Drug, and Cosmetic Act of 1938, which prohibits the shipping of adulterated or mislabeled products in interstate commerce. FDA inspectors visit food processing plants and warehouses to monitor all phases of processing, packaging, and distribution. Samples of food products are analyzed by FDA chemists to ensure the foods are wholesome and unadulterated and do not contain harmful substances, such as levels of pesticides above the limits set by the Environmental Protection Agency (EPA). In 1958, amendments to the Food, Drug, and Cosmetic Act gave the FDA authority to regulate the use of additives in foods. The Delaney Clause, which was part of those amendments, prohibits approval of additives that cause cancer in human or animal tests. Some people have criticized this clause for being too inflexible, because some studies show very small increases in cancer risk and some studies that show a risk of cancer in animals may not be relevant to humans. Since 1969, the FDA has set standards for inspection of retail food stores, restaurants, and cafeterias, although local health departments are responsible for carrying out those inspections.

Saturday, November 9, 2019

Internet security Essay

In the developed and developing world, the use of the internet has increased in popularity. The use of the internet has become the preferred mode of communication and resources for various players like industries, corporations, telecommunications, and governments and in business. In business, the internet has facilitated financial transactions that have greatly changed the face of business making it fast and simple and in conformation to the global village the technology has created. With the increased use of the internet, there has been a corresponding increase in cyber crime from criminals who are seeking either financial gains or other advantages for example military. The frequency of these attacks is very high and the levels of sophistication used are great . This makes it difficult for many organizations to determine new threats, their risk factors and ways of dealing with the menace (Cetron, et al, 2009). Many times it is difficult for the organizations to determine which attacks to deal with first and how to allocate resources to deal with them. In the commercial sector, attacks on electronic financial transactions have resulted in great financial losses and corresponding reductions in user confidence. Electronic transactions consist of funds transfers, data interchange, trade confirmations and benefits transfers. Many crimes that occur have plagued the industry for years like theft, service denial, extortion demands or fraud. Technology has however; greatly magnified the ability of major crimes to be committed in a matter of seconds. Electronic security is an industry that is growing and becoming globalised. This industry offers services in the categories of assessment, access and utilization. To demonstrate the severity of attacks on April, 2009, Chinese and Russian spies managed to infiltrate the United States of America electrical grid and inserted disruptive software into the system (Cetron, et al, 2009). An attack which occurred prior to this one on September 2008 would have caused the collapse of the global economy were it not for intervention. Unidentified hackers robbed the lucrative American financial market accounts a total of five hundred and fifty million dollars in a little less than two hours. If the accounts would not have been closed by the Treasury Department they would have lost almost six trillion dollars. This would have caused the global economy to collapse in approximately twenty four hours. One security threat is phishing. Phishing involves the acquisition of sensitive information like passwords, credit card details, usernames and pin numbers. It makes its presentation as being a legal entity. The unsuspecting victims are lured by receiving communications which purport to be from a popular website or payment processors. It is usually done through instant messaging services or emails (Shu-Min & Shann-Bin, 2006). These communications directs the users to enter their details at a fraudulent website which bears a great semblance to the authentic one. Phishing attacks were observed on two popular brands which provide payment services for banks globally in the United States of America in February 2010. The fraudsters created phishing sites in English and other languages, the most popular being French. These websites targeted customers by sending spam mails with the subject proving the card number and claiming that there was a risk of fraudulent transactions taking place. This attack was created using two types of phishing websites. The first utilised Uniform Resource Locators which were created with domain names with many top level domain variants. The most popular domain which was utilised was . cz which represented the Czech Republic. Upon entering their sensitive information into a card holder page for the false verification, the page redirected to the real website. The second attack utilised Uniform Resource Locators with Internet Protocol domains which were hosted on servers based in the United States (Glaessner, 2002). The Uniform Resource Locators’ strings were very long, typically with more than seven hundred characters. The pages asked for sensitive data but had an auto signed debit card or credit card number. This auto signing was done by placing stolen numbers of cards obtained from earlier attacks on the form. Upon receipt of information the page was redirected to a blank page. Cross site scripting is a form of phishing that occurs in programs or websites that allow user input. If the input data is not properly sanitized the program may then process thee input or execute the codes which the original program was not to do. This has been used to redirect users to fake websites. Users are advised not to click on suspicious links in emails and to check the Uniform Resource Locator’s of the website to authenticate brands. It is also advised that one should type the brand domain name directly into the browser address instead of following links. The use of security software has also been recommended. Pharming involves redirecting the redirection of websites traffic and taking it to a false website. Pharming is done by either converting the hosts file on the victims’ computer or exploiting Domain Name Systems servers’ software (Basu, 2009). These Domain Names Systems servers main task is to convert internet names to their real addresses. A compromised server therefore does not direct traffic to legitimate websites. Highly vulnerable sites of compromised are near internet leaves. If wrong entries on a computer’s host file are made it results in circumvention of name lookup using its own name to Internet Protocol mapping, this makes it a popular target for malware. Once it is rewritten a user can be redirected to a fake copy. The better targets for pharming are desktop computers as they receive poor administration in comparison to most other internet services. Host file compromises can compromise the network router. Many routers specify Domain Name Systems to clients on the network and wrong information here spoils the entire local area network. A compromise in routers is very hard to detect. Pharming also occurs by infecting the victim’s computer with malware or a virus. This causes the redirection of a website to a fake one. An unsuspecting user may enter information site unaware. To avoid pharming, users are advised to search for details that prove that the website is authentic. Typing the sites address into the browser bar also offers some protection. Use of an antivirus to reduce virus infiltration into the computers is also recommended. Vigilance is important in warding off attacks. Trojan horses are also a great threat to internet security. Trojan horses present themselves as valuable software which is available for downloading on the internet. This fools many people into downloading the virus in the presumption that it is another application. A Trojan horse is usually separated into parts which are the client and the server. The client is usually disguised as important software and is situated in some sharing networks like peer to peer or uncertified websites for downloads. As soon as the client Trojan is executed in the computer, the attacker who is the person operating the server has great control over the computer and can destroy it depending on his purpose. The spread of the Trojan horse virus can occur through email attachments using various spamming techniques. Malware creators spread the virus through chat software like Skype and Yahoo Messenger. The virus may also infect other machines by distributing copies of itself to those in the address book of the infected computer. There are many types of Trojan horses. Remote access Trojans give attackers complete control of he victim’s computer and access to any information stored in the files. Password Trojans copy all passwords and look for passwords as they are keyed into a computer and send them to a certain email address. Key loggers log the keystrokes used by victims and send the log information to the attacker and can be configured to online and offline modes of recording. Destructive Trojans cause destructions to files and deletes them completely from infected computers. They are able to delete all system files of a computer (Basu, 2009). While there are other types of Trojans not mentioned here, it should be noted that a Trojan may work with a combination of some of the functionalities explained. To best avoid a Trojan hose virus attack, one should open email attachments or files received from strange senders. Installing and updating an antivirus program is also helpful. For secure electronic online transactions certain criteria have to be addressed and met. There must be secure access control which determines who has access to a system and be able to deny access to intruders. Proper authentication of users and message integrity must also be established. Privacy of the parties involved must also be safeguarded and maintained (Shu-Min & Shann-Bin, 2006). Non-repudiation must be ensured where the sender cannot deny (falsely) sending a message. The use of online signatures has also been manipulated to commit fraud. Electronic signatures are a recognized electronic way of showing that a person has accepted the contents of a message sent electronically. These signatures are increasingly being used in electronic commerce and have evolved into digitized signatures which are encrypted and more secure than a simple electronic signature. While they are themselves subject to fraud the purpose of their creation was to combat fraud (Hansen, 1995). Electronic signatures are based on legal principles which have to be understood by the institutions which wish to use it. The use of digital signatures is a code that authenticates the origins of a document. A well done electronic signature causes the signer to be uniquely identified. It also causes the document to be locked using encryption technology and is electronically stamped throughout the process with time and date. It also stores the document for access without fear of being lost or its existence denied. The security of electronic financial transactions can also be enhanced by the use of digital certificates against phishing and pharming. To avoid manipulation of transactions in signature based online banking, utility of Class-3 electronic card readers should be explored. Virus scanners should be used to protect from Trojan horses. Care when downloading software should be exercised. With the mass adoption of technology, countries around the world are increasingly using technological based solutions to address their needs and carry out their functions. The use of the internet has created a highly competitive market. While cyber crime has not infiltrated or integrated itself equally in many countries it is an industry that is growing very fast and deserves much global attention (Shu-Min & Shann-Bin, 2006). As earlier discussed, it has the potential of destroying whole markets and creating great havoc. Attempts to control cyber crime have not been concerted. Many challenges have arisen in trying to control this threat. Technology is a fast changing and cyber crime has achieved very high levels of sophistication. Cyber criminals have designed malware which are virtually undetectable and are difficult to diagnose. It has proved challenging to design and keep up with these creations (Glaessner, 2002). Due to the high levels of vulnerability to cyber attacks there is an urgent need to formulate clear policies. These policies should include guidelines on how to cyber crime is to be dealt with. This should include coming up with laws that will outline prosecution of cyber criminals due to the potential of these criminals to create damage and go unpunished and detected. Users of the internet and the various services it offers should also assume personal responsibility for their own safety (Cetron, et al, 2009). Studies have shown that the ‘human factor’ is largely the cause of the success of cyber crime rather than advancements in technology. In the United States, despite various public campaigns on internet security, people continue to be reckless with their personal information. This leaves them very vulnerable to attacks by cyber criminals. Predictions have been made that incidences of cyber crime will continue to increase. Users should therefore be very vigilant in monitoring their information. Software to combat cyber crime is available and users should take the initiative to acquire this software to alert them of suspicious websites or claims. They should also regularly update their software like antivirus which is highly dynamic due to the creation of new viruses and malware that occurs at a very high rate (almost daily). In conclusion, electronic financial transactions have created great savings in terms of financial savings for both providers and users and reduced the wastage of time. The use of this technology has correspondingly exposed its users newer forms of crime and every effort must be made to combat cyber crime.

Thursday, November 7, 2019

Definition of Secession

Definition of Secession Secession was the act by which a state left the Union. The Secession Crisis of late 1860 and early 1861 led to the Civil War when southern states seceded from the Union and declared themselves a separate nation, the Confederate States of America. There is no provision for secession in the U.S. Constitution. Threats to secede from the Union had arisen for decades, and during the Nullification Crisis three decades earlier it appeared that South Carolina might try to break away from the Union. Even earlier, the Hartford Convention of 1814-15 was a gathering of New England states which considered breaking away from the Union. South Carolina Was the First State to Secede Following the election of Abraham Lincoln, southern states began to make more serious threats to secede. The first state to secede was South Carolina, which passed an Ordinance of Secession on December 20, 1860. The document was brief, essentially a paragraph which stated that South Carolina was leaving the Union. Four days later, South Carolina issued a â€Å"Declaration of the Immediate Causes Which Justified the Secession of South Carolina from the Union.† South Carolinas declaration made it abundantly clear that the reason for secession was the desire to preserve slavery. South Carolina’s declaration noted that a number of states wouldnt fully enforce fugitive slave laws; that a number of states had â€Å"denounced as sinful the institution of slavery†; and that â€Å"societies,† meaning abolitionist groups, had been allowed to operate openly in many states. The declaration from South Carolina also referred specifically to the election of Abraham Lincoln, stating that his opinions and purposes are hostile to slavery. Other Slave States Followed South Carolina After South Carolina seceded, other states also broke from the Union, including Mississippi, Florida, Alabama, Georgia, Louisiana, and Texas in January 1861; Virginia in April 1861; and Arkansas, Tennessee, and North Carolina in May 1861. Missouri and Kentucky were also considered to be part of the Confederate States of America, though they never issued documents of secession.

Tuesday, November 5, 2019

Add a MySQL Column Using the Add Column Command

Add a MySQL Column Using the Add Column Command The command add column  is used to add an additional column to any given MySQL table. To do this, you must specify the column name  and type. Note:  The  add column  command is sometimes referred to as  additional column  or  new column. How to Add a MySQL Column Adding a column to an existing table is done with this syntax: alter table add column [new column name] [type]; Heres an example: alter table icecream add column flavor varchar (20) ; What this example would end up doing is adding the column flavor to the table icecream, just as it says above. It would be in the database varchar  (20) format. Know, however, that the column clause is not required. So, you could instead use add [new column name]..., like this: alter table icecream add flavor varchar (20) ; Adding a Column After an Existing Column Something you may prefer to do is add a column after a specified existing column. So, if youd like to add the column  flavor  after one called  size, you could do something like this: alter table icecream add  column flavor varchar (20) after size; Changing a Column Name on a MySQL Table You can change a columns name with the  alter table  and  change  commands. Read more about that in the How to Change a Column Name in MySQL tutorial.

Sunday, November 3, 2019

Literature on the Environment; the city as text - graffiti as writing Thesis

Literature on the Environment; the city as text - graffiti as writing - Thesis Example An analysis of graffiti as a form of communication will reveal the language of the art as it speaks for the youth of a city in both pictorial and symbolic forms. Graffiti is most often associated with the emergence of artistic expressions that were applied to public surfaces. The growth of its popularity since the 1960’s was associated with counterculture activities, but by the 1980’s graffiti artists began to find prominence in art galleries with their work reproduced on canvas and sold as graffiti art. Artists such as Keith Hring and Jean-Michel Basquiat became important artists in the period from their artworks that were defined by the graffiti movement and its defining elements. Graffiti becomes an aesthetic that has definition according to theorists such as Phase2 and Rammellzee and is expanded to include work that is not defined by the location of the work on public surfaces (Chang 153). Graffiti can be termed as a type of writing that is based on signatures and styles and those who go out into the city and communicate using this form of writing call themselves writers. The linguistics are created through a focus on the use of the city as a blank page on which their story is told through symbols and images. This essay will explore the origins of graffiti and the reactions by the public to the evolution of this form of communication, its exclusive nature as it speaks directly to those who know the language and its inclusive nature as it speaks to anyone near enough to see the message, whether it is understood for its actual intent or interpreted through a lens without street knowledge. This essay will focus on the notion of graffiti writing as literature, part of a vital need by city dwellers to write their name and story on the space that surrounds them, recreating the visual construction of the city as a huge text, ever changing and often undecipherable to the unin itiated. In order to explore the idea of graffiti as literature, an

Thursday, October 31, 2019

The geographical history of Map making Research Paper

The geographical history of Map making - Research Paper Example This paper seeks to explore the science of map making with respect to its rich history culminating to modern maps. A map is a diagrammatic representation of a part of the world using from a bird’s point of view to provide guidance to the user on designated landmarks and geographical locations. In this respect, maps indicate the location of important elements in a specified part of the world such as political boundaries, natural resources, roads, topography, as well as economic activities. The science, study, and the art of making maps are descriptive of cartography, which involves examining the information conveyed, and its effective application. The importance of maps cannot be understated as they serve to provide guidance and direction to an area of interest. In this regard, exploration of new areas is easily facilitated by studying maps relevant for direction to various regions. This ensures safety of individuals involved, as they are aware of their surrounding keeping away from potential harm such as cliffs, raging waters, and hot deserts, which facilitates effective tourism. Similarly, geographical illustrations indicate flight patterns that ensure safety in air travel. Notable also is the role of maps in illustrating weather patterns, which is critical for individuals in the vicinity. To this effect, warning can be delivered effectively to residents in the event of eminent weather catastrophes. Maps also serve to safeguard infrastructure through effective planning and engineering. For instance, utility companies such as gas and electricity own maps indicating their infrastructure network, which is critical in the management of cities. This ensures that developers are aware of the network and thus work around it to preserve its integrity and avoid economic repercussions. The most remarkable role of maps, to both ancient civilisations and modern society, is demarcation of borders at national and international levels. This is critical to enhance peace and foster cohesion amongst different cultures in the world. Maps provide a unique opportunity to establish territorial boundaries that fundamental in defining jurisdiction with regard to legal systems and economic activities. International boundaries are often vocal in determining trade among nations, which serves to influence prices of various products such as oil in the world. In addition, maps are of economic importance owing to illustrated trade routes and cargo tracking, which provides essential information to various business parties. In essence, maps are important tools that facilitate understanding and navigation of the world around us. Depending on the application, various kinds of maps exist to illustrate different aspects of the world’s phenomenon. Physical maps indicate identifying physical features of the land with respect to terrain, topography (elevation), rivers, lakes, seas, and oceans. These find effective application among explorers in their navigation an d among policy makers as they plan development projects. Similarly, movement maps are highly specialised to indicate transport networks such as road maps in order to guide users on how to get a round. Distribution maps highlight the presence or absence of a desired interest in an area; for instance, the maps can be used to illustrate demographics or the availability of natural resources in a region. Political maps highlight national and int

Tuesday, October 29, 2019

Skulls identification Essay Example | Topics and Well Written Essays - 500 words

Skulls identification - Essay Example It also has larger teeth than those of modern humans and the jaw also lacks the projecting bony chin that is found in Homo sapiens. They had large supraorbital height since they had large orbits which suggest they had large eyes and visual cortices. Nuchal area height is small and this is as a result of the high condylar position. Condylar position is quite high and the reason as to why there is imbalance of the head. The taxonomic status of the Mystery skull # 2 is Homo erectus. This is so because the skull has a large face with low, sloping forehead and a massive brow ridge. It also has a broad and flat nose. The skull is also broad and long with sharp angles at the rear unlike the curve found in modern humans. The bones of the skull are very thick and formed a small central ridge, also called midline keel, along the top of the skull. The jaws are large and thick without pointed chin. The molar teeth have large roots which are decreasing towards a modern size. Other than the mentioned, the mystery skull #2 has a rounded skull, a steeper face, and smaller teeth that justify that it matches those of Homo erectus. In Homo erectus, the supraorbital height was enlarged though smaller than that of newly found skull which indicted they had small eyes. They have a well-developed opened masticatory apparatus which clearly define the nuchal area height. Though it had well developed nuchal musculature, th e balance of the head was still less perfect that it is today on modern humans. Condylar position is higher compared to that of Australopithecus aficanus because it has well developed nuchal area that can balance the head. The taxonomic status of the Newly Found skull is Australopithecus aficanus. This is so because the jaws and teeth are midway those of humans. The incisor and canine teeth are shorter and smaller. The gap (diastema) amid the canines and next teeth also shows that the Newly Found skull matches Australopithecus

Sunday, October 27, 2019

Case study: The Treatment of Depression

Case study: The Treatment of Depression Although depression has been recognized as a clinical syndrome for over 2000 years, as yet, no completely satisfactory explanation of its puzzling and paradoxical features has been found. There are still major unresolved issues regarding its nature, its classification and its etiology. (Beck and Alford, 2009, p3) However, the importance of depression is recognised by everyone in the field of mental health. According to Kline, more human suffering has resulted from depression than from any other single disease affecting mankind. (Kline, 1964) Hammen (Hammen,1997,p3) states that the term depression is used in everyday language to describe a range of experiences from a slightly noticeable and temporary mood decrease to a profoundly impaired and even life-threatening disorder. The severity of depression is generally defined according to the number of symptoms present, the severity of the symptoms and the severity of the associated functional impairment or distress. (Whisman, 2008, p66). This is done by health professionals using the Diagnostic and Statistical Manual of Mental Disorders (DSM-IV), a publication where each mood disorder is characterised by a unique set of symptoms or diagnostic criteria which are split into 4 areas: Affective Behavioral Cognitive Somatic The Cost of Depression Government advisor, Lord Layard, worked on a report back in 2004 that outlined mental illness as the biggest social problem facing Britain today. (Layard, 2004) The report pointed to the Psychiatric Morbidity Survey, which suggested that one in six British people would be diagnosed with depression or anxiety at some point in their lives. Yet only one in four of people with emotional disorders receive proper treatment. It imposes heavy costs on the economy (some 2% of GDP) and on the Exchequer (again some 2% of GDP). There are now more mentally ill people drawing incapacity benefits than there are unemployed people on Jobseekers Allowance. Mental illness matters because it causes massive suffering to patients and their families, because it prevents them contributing fully to society, and because it imposes heavy costs on taxpayers. (Layard, 2004). A UK wide strategy to help people with depression was required. The vehicle for this was through the NHS. In September 2007, the UK government launched the biggest state-funded mental health initiative ever. It pledged  £170 million to create a ground-breaking therapy service in Britain, according to health minister Alan Johnson. The service was to include 3,500 extra psychological therapists trained in CBT to be found and trained by 2011. (Evans, 2007). What is CBT? CBT (Cognitive Behavioral Therapy) is the treatment of choice within the NHS for depression. According to The Royal College of Psychiatrists (2010); CBT is a form of psychotherapy which involves: How you think about yourself, the world and other people How what you do affects your thoughts and feelings CBT was developed by Dr Beck, a psychiatrist at the University of Pennsylvania in the early 1960s. Dr Beck had previously studied and practiced psychoanalysis. He designed and carried out a number of experiments to test psychoanalytic concepts on depression. Fully expecting research would validate these fundamental precepts, he was surprised to find the opposite. Beck Institute website (1999-2009) This research led him to begin to look for other ways of conceptualizing depression. Working with depressed patients, he found that they experienced streams of negative thoughts that seemed to pop up spontaneously. He termed these cognitions automatic thoughts, and discovered that their content fell into three categories: negative ideas about themselves, the world and the future. He began helping patients identify and evaluate these thoughts and found that by doing so, patients were able to think more realistically, which led them to feel better emotionally and behave more functionally. (Beck Institute 1999 2009). According to the NHS Choice website (2010) Cognitive Behavioral Therapy differs from most other types of psychotherapies because it is: Pragmatic Highlight structured Focused on current problems Collaborative Cognitive behavioral treatments are developed with particular cognitive contents in mind they are disorder specific. (Scott, 2009, p2) Depression: Cognitive Therapy For people with persistent subthreshold depressive symptoms or mild to moderate depression, consider offering one or more of the following interventions, guided by the persons preference: Individual guided self-help based on the principles of cognitive behavioural therapy (CBT) Computerised cognitive behavioural therapy (CCBT) A structured group physical activity programme Drug treatment Do not use antidepressants routinely to treat persistent subthreshold depressive symptoms or mild depression because the risk-benefit ratio is poor, but consider them for people with: a past history of moderate or severe depression or initial presentation of subthreshold depressive symptoms that have been present for a long period (typically at least 2 years) or subthreshold depressive symptoms or mild depression that persist(s) after other interventions. For Those with Moderate or Severe Depression: For people with moderate or severe depression, medical practitioners are advised to provide a combination of antidepressant medication and a high-intensity psychological intervention (CBT or IPT). (NICE Guidelines 2009) The Royal College of Psychiatrists (2010) highlight the medication used within the NHS for the treatment of depression to include: Tricyclics MAOIs SSRIs SNRIs NASSAs Although medication can help lift the patients mood, it does not tackle any underlying problems they may be experiencing. There are also various known side effects to the medication including abdominal pain, nausea, headache, suicidal thoughts, constipation, blurred vision to name but a few. People react differently to different drugs, so until they try them they are unable to know if they will have a negative impact on them. Psychological therapies can help patients to explore what may have contributed to their depression in the first place, and what might be keeping them depressed. (Depression Alliance UK, 2010) CBT can be done individually or with a group of people. It can also be done from a self-help book or computer programme. Unfortunately, in many parts of the country, there are long waiting lists for CBT and sometimes people end up going to private therapists instead of waiting to see an NHS appointed therapist. The Benefits of CBT in the Treatment of Depression The Royal College of Psychiatrists (2009) state that: CBT is one of the most effective treatments for conditions where anxiety or depression is the main problem. It can help patients break the vicious cycle of altered thinking, feeling and behaviour. It is the most effective psychological treatment for moderate and severe depression. It is as effective as antidepressants for many types of depression. This is also supported by Townend, Grant, Mulhern and Short (2009, p 254) who state that CBT remains the psychological therapy with the widest and broadest evidence base. This is also backed by (Gabbard, Beck and Holmes, 2007, p115), CBT has been demonstrated to be an effective treatment for depression in the large number of studies that have accumulated since the original study by Rush et al (1977). They go on to say that CBT produces a greater improvement in symptoms than no treatment or waiting list controls (Dobson 1989) and demonstrates equivalent efficacy as pharmacotherapy for depression. This is also further supported by (Freeman and Power, 2007, p30) who state, There have been numerous randomised clinic trials that support the efficacy and effectiveness of cognitive therapy for depression, across a variety of clinical settings and populations (for review, see Clark, Beck and Alford 1999; De Rubeis and Crits-Christophe 1998; Dobson 1999; Robinson,Berman and Neimeyer 1990) (Freeman and Power, 2007,p30). According to (Ingram, 2009, p174) In the acute treatment phase, combination therapy, consisting of medication and CBT, has been found to be superior to either medication or CBT used alone for patients with more severe, recurrent or chronic forms of depression. (Gabbard, Beck and Holmes, 2007, p115), state that One of the main potential benefits of CBT for depression is that it reduces relapse / recurrence to a greater extent than antidepressant medication. Today, CBT remains the gold standard for the treatment of depression with psychotherapy (Wasmer-Andrews, 2009, p3). The Limitations of CBT in the Treatment of Depression However, although highly praised, CBT does have its limitations and indeed its critics. In terms of limitations, these are set out below: To benefit from CBT, the patient needs to commit themselves to the process. A therapist can help and advise, but cannot make someones problems go away without the patients co-operation (NHS Choices, 2010). Therefore, the patient needs to be open to CBT and play their part in their recovery, including taking a full part in each therapy and doing their homework in order to recover from depression. This is also highlighted by the Royal College of Psychiatrists (2009) who state that CBT is not a quick fix. A therapist is like a personal trainer that advises and encourages but cannot do it for a patient. If a patient is feeling low, it can be difficult for them to concentrate and get motivated. (Royal College of Psychiatrists,2009) Because of the structured nature of CBT, it may not be suitable for people who have more complex mental health needs or learning difficulties. (NHS Choices, 2010) This is further supported by (Wasmer-Andrews, 2009, p3) who states that CBT has limitations for treating certain groups, including people with treatment-resistant depression and those with both depression and a personality disorder. Critics of CBT argue that because the therapy only addresses current problems and focuses on very specific issues, it does not address the possible underlying causes of mental health conditions, such as an unhappy childhood. (NHS Choices, 2010). This is something that could be achieved using a Diagnostic Scan under hypnosis, if hypno-psychotherapy could be used instead. CBT focuses on the individuals capacity to change themselves (their thoughts, feelings and behaviours), and does not address wider problems in systems or families that often have a significant impact on an individuals health and wellbeing. (NHS Choices, 2010) The Royal College of Psychiatrists (2009) state that For severe depression, CBT should be used with antidepressant medication. When a patient is very low, they may find it hard to change the way they think until the antidepressants have started to make them feel better. Critics of CBT in the Treatment of Depression Critics of CBT, as with all clinical theories, vary depending on the thoughts of the analyst. Townend, Grant, Mulhern and Short (2009, p 254) point to many of these discussions. Specific issues have been raised over the necessity of, for example, challenging thoughts in CBT (Longmore and Worrell, 2007); and cognitive interventions in severe depression (Dimidjian et al, 2006). Additionally, there is still ongoing discussion (e.g. Gilbert and Leahy, 2007) about the nature an impact of the therapeutic alliance as causes of the changes seen in CBT. Weiner, Freedheim and Stricker (2003) point out that Although the scope and efficacy of CBT are impressive, much work needs to be done. In particular, future efforts of CBT clinical researchers must demonstrate the effective of treatments outside research centres as well as turn more attention towards disorders overlooked by CBT (e.g. personality disorder). Kotler and Shepard (2008) highlight that human beings are multi-faceted, with feelings as well as thoughts. It is suggested that CBT puts undue emphasis on thought processes to the exclusion of many legitimate feelings, thereby contributing to repression and the denial of feeling. They go on to highlight some other criticism leveled at CBT as follows: CBT is less effective with some kinds of clients those who have a problem with overintellectualising or those who dont have the capacity to reason logically, or clients with minimal intelligence (e.g. young children, very old people, schizophrenics and those with other personality disorders). Many CBT therapists complain of boredom and burnout from continuously repeating the same arguments and processes with all clients. CBT is difficult for some people for some professionals to practice if they are not outgoing and assertive and dont enjoy vigorous debate and confrontation. Because the therapists role is so verbal, active and direct, the client may feel overpowered, dominated and not responsible for the outcome. (Kotler and Shepard, 2008) The Debate There is much debate on the subject of CBT as a treatment for depression within the NHS. Oliver James article (James, 2006) sumarises much of this debate. He indicates that Depression and anxiety costs the (British) economy  £17 billion per year. Being cheap, quick (15 20 sessions) and simplistic, CBT appeals to the Government. In fact, in June 2006, Professor Richard Layard labeled the government happiness tsar claimed that CBT can lift at least half of those affected out of their depression or their chronic fear. (James, 2006) Another attraction for the government is that CBT aims to get you to a point where you can do all this on your own and tackle problems without the help of a therapist. (NHS Choices, 2010). Thereby, it is argued that using CBT could reduce the future costs of treatment in current users. In addition, there are also now computerised CBT approved for use by the NHS Beating the Blues which has been approved for the treatment of depression. (NHS Choices, 2010). Again, this is a cost effective treatment for some people who find they prefer using a computer rather than talking to a therapist about their private feelings. (NHS Choices, 2010) In a follow up article, in March 2009 (James, 2009) resurrected the debate when he reported that CBT is not a real cure, just a form of personal spin. He went on to argue that work by eminent US psychologist, Professor Drew Weston found that after two years, two thirds of those who had CBT for depression has relapsed or sought further help. It is important for patients to keep practicing their CBT skills, even after they are feeling better. There is some research that suggests CBT may be better than antidepressants at preventing depression coming back. (The Royal College of Psychiatrists, 2009) James (2009) went on to argue that If given no treatment, most people with depression drift in and out of it. After 18 months, those given CBT have no better mental health than ones who have been untreated. On the other hand, in the same article by James (2009), Derek Draper a CBT practitioner and author states that CBT draws on the obvious truth that how we feel is inextricably linked to the way we think and behave. It isnt remotely sinister and is rather simple and it works. Many of my patients have been helped by CBT. New Research According to the Royal College of Psychiatrists website (2009) Cognitive behavioural therapy (CBT) is most effective in patients who have had four or more prior episodes of depression, according to new research from The Netherlands. The study, published in the December issue of the British Journal of Psychiatry, suggests GPs could use the number of prior episodes to determine which patients are likely to benefit most from therapy and prescribe treatment accordingly). In another recent study, a comparison of a cognitive behavioural therapy (CBT) website with an information website for depression has found that after 6 months only the CBT website was significantly effective in reducing symptoms. After 1 year, both interventions were significantly better than no intervention (control condition). Research has shown that internet-delivered brief CBT may be effective in reducing depression, but it has not been clear whether these gains are maintained over time. The aim of this Australian study, published in the February 2008 issue of the British Journal of Psychiatry, was to see whether the benefits of internet-delivered brief psychoeducation and CBT were still there 6 and 12 months later, compared with a control condition, in which participants were asked questions about their lifestyle. Summary In summary, CBT is the treatment of choice in the NHS for moderate to severe depression and having reviewed all of the benefits and limitation, read from the critics and the ambassadors, the writer feels that there is still much to learn and evaluate in the treatment of depression. Whilst the results so far have appeared to show that CBT is very effective in the treatment of moderate to severe depression, there are large groups of people that will not benefit from this treatment, e.g. young children, those with personality disorders, late-life depression suffers. The writer suggests that there is not a universally acceptable treatment for all that some treatments will work for some people with some therapists and other treatments will work for others with another therapist the willingness of the client to seek help, play their part in their recovery alongside their chosen therapy will help some of the people, some of the time. But what about in the longer term ? Is this a sticking plaster over a gaping wound ? CBT can help in the here and now, but relapses can occur as the root of the problem if it is in the past is not usually discussed in a CBT session, which is focussed on the present. While the costs of depression to individuals, families and businesses are huge, the writer feels that the government, through the NHS has made very positive steps to try to assist people living with depression by welcoming the use the talking therapies. As more studies are commissioned in the future, new information will be gained and new decisions made based on this. For the moment, embracing the talking therapies is a very good step in the right direction and it is hoped that other therapies will continue to be evaluated so that patients of the future would have a choice of talking therapies, including CBT, but also others like life coaching, NLP and hypno-psychotherapy. Word count (3,337)

Friday, October 25, 2019

Dred Scott v. Sanford :: American History, Slavery, Freedom

Dred Scott, an African American man who was born into slavery, wanted what all slaves would have wanted, their freedom. They were mistreated, neglected, and treated not as humans, but as property. In 1852, Dred Scott sued his current owner, Sanford, about him, no longer being a slave, but a free man (Oyez 1). In Article four of the Constitution, it states that any slave, who set foot in a free land, makes them a free man. This controversy led to the ruling of the state courts and in the end, came to the final word of the Supreme Court. Is he a slave or a free man? Being born into slavery meant that Dred Scott had been exchanged from owners to owners (Knappman 16-17). His first owner, the Blows, died, and before their death, they sold Scott to Dr. Emerson. Dr. Emerson soon gave Scott away to his wife’s brother, Sanford (Knappman 16-17). Scott tried to buy his freedom away from Dr. Emerson’s wife but she just wouldn’t accept (Dred Scott Decision 1). Since Scott moved from place to place as a slave, he was able to go to Illinois, which was a free state (Richie 40). Because of the Constitution, Scott used his rights to sue Sanford claiming that he was a free man (Richie 40). With this in mind, it lead to arguments about both parties, the prosecuted and the defendant. With the help of the antislavery lawyers, they were able to assist the prosecution, Dred Scott, with his court case (Dred Scott Decision 1). Unfortunately, in the first trial, Scott lost due to the reason of not having enough evidence (Dred Scott Decision 1). Scott, determined to get his freedom, was given the chance for a second trial (â€Å"Dred Scott Case Collection†). Their main argument, about Sanford violating his Fifth Amendment rights, made them win their case in their second trial (Justia 1). The Fifth Amendment mentions that a person’s life, liberty, or property cannot be taken away without due process of law. They were taking away Scott’s liberty, but he deserved to be free because he was taken to a free state (Dred Scott Decision 1). Does this whole controversy end there? With Sanford losing in the second trial, it did not just end there. Sanford’s sister, Mrs. Emerson, appealed and because of that, it went to the Missouri Supreme Court (â€Å"Dred Scott Case Collection†).

Thursday, October 24, 2019

Benzathine Benzylpenicillin

There are many people around the globe who would benefit from an injectable drug designed to release small amounts of medication over the course of a month. This is particularly necessary for people suffering from bacterial meningitis as they are required to receive injections on a regular basis. Additionally, there are countless other populations that would benefit from the availability of injectable medication. This type of medication dispension is useful for third world populations since they don’t have access to doctors on a regular basis.An injection that lasts for one month would ensure that these people were receiving necessary medication on a regular basis. At the same time, an injectable form of medication increases patient compliance since they are only responsible for getting the injection once a month instead of on a more regular basis. Similarly, injectable forms of medication allow patients to receive constant therapeutic levels of drug maintenance that ensures t hey get well.Finally, making medication available in injection form eliminates the need to refrigerate drugs and also reduces the number of trips a patient must make to a clinic to receive necessary medication. Therefore, this researcher aims to look at benzathine benzylpenicillin and its usefulness as an injectable drug. The lab already purchases benzathine benzylpenicillin but it is not in pure form. As a result, the job of this researcher would be to coat the benzathine benzylpenicillin with different polymers in order to slow down the dissolving process.If successful, this process would improve the lives of sick people all over the world who are required to receive frequent doses of penicillin. Penicillin is known to be unstable in liquid formations (Ogunleye, et al, 2004). Therefore, the first goal this researcher would have is to work with one type of polymer that uses heat rather than water. This polymer will be used to coat the penicillin so particles will not clump up. It i s essential to develop a way to keep penicillin particles from clumping so they can be released on a consistent basis after the initial injection.Further, benzathine benzylpenicillin will be injected using a needle and PVA is hydrophilic so clumping must be avoided in order to successfully inject the medication. The polymer this researcher will use is called polyvinyl alcohol. Establishing a way to prevent penicillin from clumping will contribute much to the research being conducted around the possibilities and benefits of using injectable benzathine benzylpenicillin. The second aim this researcher has is to develop a way to slow down the dissolving process of the benzathine benzylpenicillin in order to ensure that it releases constant dosages for an entire month.The main goal in slowing the dissolving process is to achieve a minimum level of concentration in order for the drug to be effective at a low level for a very long time. Discovering a way to slow this process is essential f or may patients, particularly those suffering from bacterial meningitis because benzathine benzylpenicillin cannot be given orally as the gastric acid and absorption of the intestinal tract is too slow to deem the oral form of the drug effective (Shaheen, 2004).There are several steps this researcher will take in preparing penicillin to be coated in order to make an injectible form of benzathine benzylpenicillin successful and worthwhile. After successfully determining the polymer concentrations that would be most effective, this researcher would use a fluid bed coater to apply the polymers to the penicillin. A fluid bed coater looks like an upside down bottle where the drug particles are dried as they travel in a clockwise circular motion. The penicillin will go into the machine and the polymers will go into a spray gun.The penicillin will be blown up into the upside down bottle and as it passes the spray gun it will be coated with the two different polymers. The inside of the bott le is hot so that the penicillin can dry before being sprayed with the polymers subsequent times. This process goes on until the researcher stops the machine. This allows the researcher to control how much polymer is allowed to coat the penicillin. The final step in this process is a dissolution test on the polymer coated penicillin. This researcher will place the penicillin in water (used as a medium of blood) and stir until dissolved.Then, this researcher will use a visible spectrospectry to determine the concentration of the drug in the water. This process allows the researcher to figure out how much of the drug was dissolved based on the amount of polymer coating the penicillin. In order to calculate the exact concentration, a sample of the water is placed in a cubbet and a UV light is shined on the sample. Concentration rates are determined based on how much light is able to come through, what type of light is coming through and the wavelength of the light coming through.Any gi ven molecule has a characteristic spectrum for a specific concentration of the drug, so by looking at the spectrum you can find drug concentration. This researcher is right for the job based on an in depth understanding of benzathine benzylpenicillin and the process it must go through to become safe and effective as an injectible drug. Additionally, this researcher is enthusiastic about the possibilities such an injectible drug will have to positively impact the lives of many people required to take constant doses of medication.The penicillin family of medication is an important tool in the arsenal for fighting illness (Wright, 1999). They are of low toxicity, they are highly effective and they are easily distributed through the body (Wright, 1999). This work won’t be accomplished quickly and there will be challenges along the way. However, this researcher is willing to persevere in order to discover new and innovative ways to make drug administration easier and more effectiv e for people required to take benzathine benzylpenicillin.When a correct mixture of polymers is discovered and dissolution is slow, this researcher will consider the project a success. Ogunleye, D. S. ; Kolawale, J. A. ; Okaroh, I. & Okeniyi, S. O. Effects of Thawing Methods on the Stability of Cloxacillin Sodium and Benzathine Benzyl Penicillin Injections. Nigerian Journal of Health and Biomedical Sciences 2004, 3, 51 – 55. Shaheen, Rubina. Penicillins. Indian Journal for the Practicing Doctor 2004, 1, 11 – 12. Wright, Alan J. The Penicillins. The Mayo Clinic Proceedings, 1999, 74, 290 – 307.