Wednesday, July 31, 2019

Freud and Tillich Essay

S. Freud’s The Future Illusion and P. Tillich’s Religion as a Dimension in Man’s Spiritual Life carry on about an important question of what religion really is, what is its meaning in a cultural, psychological and scientific aspect and how it relates to a society and an individual. In this paper I will try to prove through an analysis and comparison of both texts that although their approach to the subject is different they both regard religion as an important aspect of human life. Freud in Illusion touches on things that to some may be an unquestionable truths; a meaning of life, a reason to be a good citizen – a good human being. Freud strips religion of its â€Å"holiness† but not of its power over a culture and a human life. He argues that religion in its essence is nothing more than an illusion – a wishful thinking based on a subconscious hope for a reward (the afterlife). According to Freud, religion is an aspect of culture – civilization, defending us against nature and each other. Civilization is a necessity that was socially constructed in order to explain and control the unknown and scary forces of the world but more importantly to cage our primal desires of: incest, murder, cannibalism which lay deeply in our unconscious. Therefore, to save humanity civilization created laws. At first the forces of nature were given human characteristics to make the assimilation easier and simpler to comprehend. The so called totemism was clear and understandable serving a purpose of control and protection from the environment and ourselves. But who would obey the laws if there was no fear of punishment for doing wrong and a reward for doing good. That is when religion came in handy. Now the gods have been replaced by science and a singular God (a father), who became more sophisticated than his predecessors, promising compensation for all the hard aches. Freud claims, that religion isn’t the essence of morality, that society didn’t adapt to the Ten Commandments but the other way around. It served as a tool supporting the reasonable laws of civilization, making living in society more bearable seen through perspective of fulfillment in the afterlife. Therefore, its function plays a crucial role in sustaining society and preventing civilization from destruction by individuals acting on their animalistic instincts. If a person is being left to his own devices without laws, regulations and fear of punishment he will act egocentrically causing chaos and destruction for the entire population. However, the more educated the society becomes, the more it expects from religion. Its promises are less reliable than scientific evidence and once the fruit of knowledge becomes accessible to masses the trust in religious explanation declines. This may cause danger and a cultural collapse if people’s belief in God fails, it threatens not only religion but the original source of common law – civilization. They realize there is no need to be afraid of punishment any longer, therefore, who or what would stop them? What may seem as a law of God is actually in the best interest of human social existence, otherwise civilization would not have survived. The creation of rational attitude of not killing got ascribed to God, despite rationalizing it as a purely human creation that relates to all rights and cultural institutions. Freud claims, that people will not need religion when they realize that those rules were not created to rule them but to serve in their best interest. Men act under the influence of impulses and desires, therefore, rational explanation is not powerful enough, nevertheless, Freud thinks that with the progress of science there will be less demand for the illusion and eventually no religion at all. Tillich on the other hand has a more romanticized view on the aspect of religion. He admits that the word itself gets misinterpreted and abused in many ways, therefore, decides to call it the ultimate concern. For Tillich religion is something much more personal, intimate, it is a sphere in human spiritual life (inner) that is being filled accordingly to ones needs. He doesn’t insist that the ultimate concern must relate directly to God, on the contrary it can be anything as long as it is: ultimate, infinite and unconditional. He says that there is more to a human being than flesh and blood, to be fully satisfied one must find and nurture his faith. The spiritual life, the inner needs are equally as important as satisfying human physiology. Tillich despises theologians who stay faithful to the approach that religion is a gift from God, something sacred and pure because it was not created by any mortal but God himself, that religion is not a matter of choice. He also disagrees with the scientific approach regarding religion as nothing more than a stage in human development, socially constructed based on rituals and tradition. According to Tillich, dimension of man’s spiritual life is something uniquely human that it is inherent, and we can not get rid off because it’s already within us, it is a part of who we are. Therefore, religion as an ultimate experience can not be ascribed to one particular realm of human life; knowledge, aesthetic, morality and most importantly emotion all express the ultimate concern. Therefore, the ultimate concern isn’t something one could grasp and reassemble to pieces in order to understand it better. The task of religion is to fulfill our inner needs in all four aspects, as any human can not survive without food, water and shelter. We can not be fulfilled as humans if our spiritual life isn’t satisfied, therefore, no man can be happy without religion. As easy as one may think that finding out what the ultimate concern is it is actually quite complicated. Because for those who truly believe and don’t deny the existence of God it is even harder to rich that fulfillment than for those who strive for answers. The ultimate concern is simply a human’s true nature, it is a part of you that can not be forgotten, diminished or simplified into an institutional religion and its doctrines, the ultimate concern fulfills your spirit making a man’s life meaningful. Both Freud and Tillich discuss the matter of religion as an important aspect of human life. Freud claims that religion is an illusion, nothing more than a fairytale for kids who long for a happy ending, a compensation for the crappy life we all have to deal with . Where Tillich approach differs from Freudian perspective like day to night. Nevertheless, both scholars claim the necessity for religious experience as long as according to Tillich an individual fulfills his inner spiritual needs and according to Freud if it guards societies from killing each other.

International Data Communications Essay

Just like in end terminal / customer premise equipment (CPE) distribution, countries in European countries experience new applications and data services relatively in the same time with other regions like Asia and North America (USA and Canada). Figure 1 shows the current figure of telephone users in the world based on regions. Figure 1 Main telephone lines per 100 inhabitants (1994 -2004) Source: ITU. â€Å"The Digital Divide at a glance. † 2005. Retrieved December 10, 2007 from http://www.itu. int/wsis/tunis/newsroom/stats/ In terms of mobile service penetration rates, Europe is the leader since it currently composes of more than 570 million mobile subscribers and a mobile penetration of over 70%. It leaves other regions behind in mobile penetration rate in which Africa only accounts for 9%, America records 42%, and 19% in Asia Pacific. The high penetration rate has put mobile subscribers in Europe to surpass those in fixed phone lines. This situation also holds true for data communication in the region in which according to ITU (2005), the region has penetration rate above 50%, especially in Western Europe while the rest past of the region only records 20% of Internet penetration rate. However, like its Asian counterparts, some countries in Europe also experiences uneven users since in Russia, for instances, vast majority of subscribers located in large urban centers. 1. M-Commerce: Opportunities and Challenges Moreover, the advancement of telecommunications and internet technologies has created new model of commerce, the borderless commerce or e-commerce. The terminology refers to cross-nations or even cross-continents trade and commerce. This development goes further as Internet is accessible not only via desktop computers but also via mobile devices like PDAs and mobile phones. The benefit of using mobile commerce (m-commerce) is attractive. Say, a woman is shopping at a mall and decides to buy some clothes. Unfortunately, when she is at a cahier, she finds that her debit card has no enough balance to pay the clothes or her credit cards are out of limit. In this situation, she called her husband to transfer some money to her account. Although her husband is in a meeting that is far from a bank, he is still able to do the fund transfer by using his mobile phone and log into a bank’s mobile portal. Finally, in few minutes, the woman’s bank account has enough balance to pay the clothes. Similarly, mobile phones can also act as a virtual debit card when it is used as a payment method for vending machines. The method of this transaction is by sending sms (short message services) from users’ mobile phones and typing the short number that is displayed in the vending machines. When the server of the vending machines received this sms, they ask the telecommunication carrier to deduct some amount of money from the person’s prepaid balance or to add a transaction into his next billing statement.

Tuesday, July 30, 2019

Exercise 7 Respiratory System Mechanics

EXERCISE 7 Respiratory System Mechanics O B J E C T I V E S 1. To explain how the respiratory and circulatory systems work together to enable gas exchange among the lungs, blood, and body tissues 2. To define respiration, ventilation, alveoli, diaphragm, inspiration, expiration, and partial pressure 3. To explain the differences between tidal volume, inspiratory reserve volume, expiratory reserve volume, vital capacity, residual volume, total lung capacity, forced vital capacity, forced expiratory volume, and minute respiratory volume 4. To list various factors that affect respiration 5. To explain how surfactant works in the lungs to promote respiration 6. To explain what happens in pneumothorax 7. To explain how hyperventilation, rebreathing, and breathholding affect respiratory volumes T he physiological functions of respiration and circulation are essential to life. If problems develop in other physiological systems, we can still survive for some time without addressing them. But if a persistent problem develops within the respiratory or circulatory systems, death can ensue within minutes. The primary role of the respiratory system is to distribute oxygen to, and remove carbon dioxide from, the cells of the body. The respiratory system works hand in hand with the circulatory system to achieve this. The term respiration includes breathing—the movement of air in and out of the lungs, also known as ventilation—as well as the transport (via blood) of oxygen and carbon dioxide between the lungs and body tissues. The heart pumps deoxygenated blood to pulmonary capillaries, where gas exchange occurs between blood and alveoli (air sacs in the lungs), oxygenating the blood. The heart then pumps the oxygenated blood to body tissues, where oxygen is used for cell metabolism. At the same time, carbon dioxide (a waste product of metabolism) from body tissues diffuses into the blood. The deoxygenated blood then returns to the heart, completing the circuit. Ventilation is the result of muscle contraction. The diaphragm—a domeshaped muscle that divides the thoracic and abdominal cavities—contracts, making the thoracic cavity larger. This reduces the pressure within the thoracic cavity, allowing atmospheric gas to enter the lungs (a process called inspiration). When the diaphragm relaxes, the pressure within the thoracic cavity increases, forcing air out of the lungs (a process called expiration). Inspiration is considered an â€Å"active† process because muscle contraction requires the use of ATP, whereas expiration is usually considered a â€Å"passive† process. When a person is running, however, the external intercostal muscles contract and make the thoracic cavity even larger than with diaphragm contraction alone, and expiration is the result of the internal intercostal muscles contracting. In this case, both inspiration and expiration are considered â€Å"active† processes, since muscle contraction is needed for both. Intercostal muscle contraction works in conjunction with diaphragm muscle contraction. 87 88 Exercise 7 (a) Atmospheric pressure Parietal pleura Thoracic wall Visceral pleura Pleural cavity Transpulmonary pressure 760 mm Hg 756 mm Hg 4 mm Hg 756 760 Intrapleural pressure 756 mm Hg ( 4 mm Hg) Lung Diaphragm Intrapulmonary pressure 760 mm Hg (0 mm Hg) (b) F I G U R E 7 . 1 Respiratory volumes. a) Opening screen of the Respiratory Volumes experiment. (b) Intrapulmonary and intrapleural relationships Respiratory System Mechanics 89 Respiratory Volumes Ventilation is measured as the frequency of breathing multiplied by the volume of each breath, called the tidal volume. Ventilation is needed to maintain oxygen in arterial blood and carbon dioxide in venous blood at their normal levels—that is, at their normal partial pressures. [The term partial pressure refers to the proportion of pressure that a single gas exerts within a mixture. For example, in the atmosphere at sea level, the pressure is 760 mm Hg. Oxygen makes up about 20% of the total atmosphere and therefore has a partial pressure (PO2 ) of 760 mm Hg 20%, close to 160 mm Hg. ] Oxygen diffuses down its partial pressure gradient to flow from the alveoli of the lungs into the blood, where the oxygen attaches to hemoglobin (meanwhile, carbon dioxide diffuses from the blood to the alveoli). The oxygenated blood is then transported to body tissues, where oxygen again diffuses down its partial pressure gradient to leave the blood and enter the tissues. Carbon dioxide (produced by the metabolic reactions of the tissues) diffuses down its partial pressure gradient to flow from the tissues into the blood for transport back to the lungs. Once in the lungs, the carbon dioxide follows its partial pressure gradient to leave the blood and enter the air in the alveoli for export from the body. Normal tidal volume in humans is about 500 milliliters. If one were to breathe in a volume of air equal to the tidal volume and then continue to breathe in as much air as possible, that amount of air (above and beyond the tidal volume) would equal about 3100 milliliters. This amount of air is called the inspiratory reserve volume. If one were to breathe out as much air as possible beyond the normal tidal volume, that amount of air (above and beyond the tidal volume) would equal about 1200 milliliters. This amount of air is called the expiratory reserve volume. Tidal volume, inspiratory reserve volume, and expiratory reserve volume together constitute the vital capacity, about 4800 milliliters. It is important to note that the histological structure of the respiratory tree (where air is found in the lungs) will not allow all air to be breathed out of the lungs. The air remaining in the lungs after a complete exhalation is called the residual volume, normally about 1200 milliliters. Therefore, the total lung capacity (the vital capacity volume plus the residual volume) is approximately 6000 milliliters. All of these volumes (except residual volume) can be easily measured using a spirometer. Basically, a spirometer is composed of an inverted bell in a water tank. A breathing tube is connected to the bell’s interior. On the exterior of the inverted bell is attached a pen device that records respiratory volumes on paper. When one exhales into the breathing tube, the bell goes up and down with exhalation. Everything is calibrated so that respiratory volumes can be read directly from the paper record. The paper moves at a pre-set speed past the recording pen so that volumes per unit time can be easily calculated. In addition to measuring the respiratory volumes introduced so far, the spirometer can also be used to perform pulmonary function tests. One such test is the forced vital capacity (FVC), or the amount of air that can be expelled completely and as rapidly as possible after taking in the deepest possible breath. Another test is the forced expiratory volume (FEV1), which is the percentage of vital capacity that is exhaled during a 1-sec period of the FVC test. This value is generally 75% to 85% of the vital capacity. In the following experiments you will be simulating spirometry and measuring each of these respiratory volumes using a pair of mechanical lungs. Follow the instructions in the Getting Started section at the front of this lab manual to start up PhysioEx. From the drop-down menu, select Exercise 7: Respiratory System Mechanics and click GO. Before you perform the activities watch the Water-Filled Spirometer video to see the experiment performed with a human subject. Then click Respiratory Volumes. You will see the opening screen for the â€Å"Respiratory Volumes† experiment (Figure 7. 1). At the left is a large vessel (simulating the thoracic cavity) containing an air flow tube. This tube looks like an upside-down â€Å"Y. † At the ends of the â€Å"Y† are two spherical containers, simulating the lungs, into which air will flow. On top of the vessel are controls for adjusting the radius of the tube feeding the â€Å"lungs. This tube simulates the trachea and other air passageways into the lungs. Beneath the â€Å"lungs† is a black platform simulating the diaphragm. The â€Å"diaphragm† will move down, simulating contraction and increasing the volume of the â€Å"thoracic cavity† to bring air into the â€Å"lungs†; it will then move up, simulating relaxation and decreasin g the volume of the â€Å"thoracic cavity† to expel air out. At the bottom of the vessel are three buttons: a Start button, an ERV (expiratory reserve volume) button, and an FVC (forced vital capacity) button. Clicking Start will start the simulated lungs breathing at normal tidal volume; clicking ERV will simulate forced exhalation utilizing the contraction of the internal intercostal muscles and abdominal wall muscles; and clicking FVC will cause the lungs to expel the most air possible after taking the deepest possible inhalation. At the top right is an oscilloscope monitor, which will graphically display the respiratory volumes. Note that the Yaxis displays liters instead of milliliters. The X-axis displays elapsed time, with the length of the full monitor displaying 60 seconds. Below the monitor is a series of data displays. A data recording box runs along the bottom length of the screen. Clicking Record Data after an experimental run will record your data for that run on the screen. A C T I V I T Y 1 Trial Run Let’s conduct a trial run to get familiarized with the equipment. 1. Click the Start button (notice that it immediately turns into a Stop button). Watch the trace on the oscilloscope monitor, which currently displays normal tidal volume. Watch the simulated diaphragm rise and fall, and notice the â€Å"lungs† growing larger during inhalation and smaller during exhalation. The Flow display on top of the vessel tells you the amount of air (in liters) being moved in and out of the lungs with each breath. 2. When the trace reaches the right side of the oscilloscope monitor, click the Stop button and then click Record Data. Your data will appear in the data recording box along the bottom of the screen. This line of data tells you a wealth of information about respiratory mechanics. Reading the data from left to right, the first data field should be that of the Radius of the air flow tube (5. 00 mm). The next data field, Flow, displays the total flow volume for this experimental run. T. V. stands for â€Å"Tidal Volume†; E. R. V. for â€Å"Expiratory 90 Exercise 7 Reserve Volume†; I. R. V. for â€Å"Inspiratory Reserve Volume†; R. V. for â€Å"Residual Volume†; V. C. for â€Å"Vital Capacity†; FEV1 for â€Å"Forced Expiratory Volume†; T. L. C. for â€Å"Total Lung Capacity†; and finally, Pump Rate for the number of breaths per minute. 3. You may print your data at any time by clicking Tools at the top of the screen and then Print Data. You may also print the trace on the oscilloscope monitor by clicking Tools and then Print Graph. 4. Highlight the line of data you just recorded by clicking it and then click Delete Line. . Click Clear Tracings at the bottom right of the oscilloscope monitor. You are now ready to begin the first experiment.  ¦ A C T I V I T Y 2 6. Click Clear Tracings before proceeding to the next activity. Do not delete your recorded data—you will need it for the next activity.  ¦ A C T I V I T Y 3 Effect of Restricted Air Flow on Respiratory Volumes 1. Adjust the radius of the air flow tube to 4. 00 mm by clicking the ( ) button next to the radius display. Repeat steps 2–5 from the previous activity, making sure to click Record Data. How does this set of data compare to the data you recorded for Activity 2? The breathing isn't as strong ________________________________________________ the flow and tidal volume have decreased ________________________________________________ Is the respiratory system functioning better or worse than it did in the previous activity? Explain why. functioning worse, it isn't moving as much air or expanding ________________________________________________ the lungs as far because of the decreased space for intake ________________________________________________ and output of air 2. Click Clear Tracings. 3. Reduce the radius of the air flow tube by another 0. 0 mm to 3. 50 mm. 4. Repeat steps 2–6 from Activity 2. 5. Reduce the radius of the air flow tube by another 0. 50 mm to 3. 00 mm. 6. Repeat steps 2–6 from Activity 2. What was the effect of reducing the radius of the air flow tube on respiratory volumes? furthur decrease of flow and tidal volume ________________________________________________ ________________________________________________ What does the air flow tube simulate in the human body? trachea ________________________________________________ ________________________________________________ Measuring Normal Respiratory Volumes 1. Make sure that the radius of the air flow tube is at 5. 00 mm. To adjust the radius, click the ( ) or ( ) buttons next to the radius display. 2. Click the Start button. Watch the oscilloscope monitor. When the trace reaches the 10-second mark on the monitor, click the ERV button to obtain the expiratory reserve volume. 3. When the trace reaches the 30-second mark on the monitor, click the FVC to obtain the forced vital capacity. 4. Once the trace reaches the end of the screen, click the Stop button, then click Record Data. . Remember, you may print your trace or your recorded data by clicking Tools at the top of the screen and selecting either Print Graph or Print Data. From your recorded data, you can calculate the minute respiratory volume: the amount of air that passes in and out of the lungs in 1 minute. The formula for calculating minute respiratory volume is: Minute respiratory volume tidal volume bpm (breaths per minute) Calculate and en ter the minute respiratory volume: _7,500________ Judging from the trace you generated, inspiration took place over how many seconds? __2 seconds_____________ Expiration took place over how many seconds? What could be some possible causes of reduction in air flow to the lungs? obstruction, inflammation from illness or allergic ________________________________________________ reaction ________________________________________________ ________________________________________________ 7. Click Tools > Print Data to print your data. _____2 seconds____________ Does the duration of inspiration or expiration vary during yes ERV or FVC? _____ Respiratory System Mechanics 91 FIGURE 7. 2 Opening screen of the Factors Affecting Respiration experiment. Express your FEV1 data as a percentage of vital capacity by filling out the following chart. (That is, take the FEV1 value and divide it into the vital capacity value for each line of data. ) Factors Affecting Respiration Many factors affect respiration. Compliance, or the ability of the chest wall or lung to distend, is one. If the chest wall or lungs cannot distend, respiratory ability will be compromised. Surfactant, a lipid material secreted into the alveolar fluid, is another. Surfactant acts to decrease the surface tension of water in the fluid that lines the walls of the alveoli. Without surfactant, the surface tension of water would cause alveoli to collapse after each breath. A third factor affecting respiration is any injury to the thoracic wall that results in the wall being punctured. Such a puncture would effectively raise the intrathoracic pressure to that of atmospheric pressure, preventing diaphragm contraction from decreasing intrathoracic pressure and, consequently, preventing air from being drawn into the lungs. Recall that airflow is achieved by the generation of a pressure difference between atmospheric pressure on the outside of the thoracic cavity and intrathoracic pressure on the inside. ) We will be investigating the effect of surfactant in the next activity. Click Experiment at the top of the screen and then select Factors Affecting Respiration. The opening screen will look like Figure 7. 2. Notice the changes to the FEV1 as % of Vital Capacity Radius FEV1 Vital Capacity FEV1 (%) 5. 00 4. 00 3. 50 3. 00 3541 1422 822 436 4791 1962 1150 621 1. 35% 1. 37% 1. 39% 1. 42%  ¦ 92 Exercise 7 quipment above the air flow tube. Clicking the Surfactant button will add a pre-set amount of surfactant to the â€Å"lungs. † Clicking Flush will clear the lungs of surfactant. Also notice that valves have been added to the sides of each simulated lung. Opening the valves will allow atmospheric pressure into the vessel (the â€Å"thoracic cavity†). Finally, notice the changes to the display windows below the oscilloscope screen. Flow Left and Pressure Left refer to the flow of air and pressure in the left â€Å"lung†; Flow Right and Pressure Right refer to the flow of air and pressure in the right â€Å"lung. Total Flow is the sum of Flow Left and Flow Right. A C T I V I T Y 4 3. Click Flush to remove the surfactant from the previous activity. 4. Be sure that the air flow radius is set at 5. 00 mm, and that P ump Rate is set at 15 strokes/minute. 5. Click on Start and allow the trace to sweep the length of the oscilloscope monitor. Notice the pressure displays, and how they alternate between positive and negative values. 6. Click Record Data. Again, this is your baseline data. 7. Now click the valve for the left lung, which currently reads â€Å"Valve closed. † 8. . Click Start and allow the trace to sweep the length of the Click Record Data. oscilloscope monitor. Effect of Surfactant on Respiratory Volumes 1. The data recording box at the bottom of the screen should be clear of data. If not, click Clear Table. 2. The radius of the air flow tube should be set at 5. 00 mm, and the Pump Rate should be set at 15 strokes/minute. 3. Click Start and allow the trace to sweep across the full length of the oscilloscope monitor. Then click Record Data. This will serve as the baseline, or control, for your experimental runs. You may wish to click Tools and then Print Graph for a printout of your trace. 4. Click Surfactant twice to add surfactant to the system. Repeat step 3. When surfactant is added, what happens to the tidal volume? It increases the amount of air being inhaled ________________________________________________ As a result of the tidal volume change, what happens to the flow into each lung and total air flow? ________________________________________________ they all increase Why does this happen? urfactant decreases teh surface tension of water in the ________________________________________________ fluid that lines the walls of the alveoli ________________________________________________ Remember, you may click Tools and then either Print Data or Print Graphs to print your results.  ¦ A C T I V I T Y 5 What happened to the left lung when you clicked on the valve button? Why? The lung deflated due to the change in the intrapleural ________________________________________________ pressure ________________________________________________ ________________________________________________ What has happened to the â€Å"Total Flow† rate? t reduced ________________________________________________ by half 0 What is the pressure in the left lung? ___________________ no Has the pressure in the right lung been affected? _________ If there was nothing separating the left lung from the right lung, what would have happened when you opened the valve for the left lung? Why? Both lungs would have collapsed due to pressure ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ Now click the valve for the left lung again, closing it. What happens? Why? nothing , there is excess air remaining in the lung ________________________________________________ ________________________________________________ Click Reset (next to the Flush button at the top of the air flow tube). What happened? the lung reinflated ________________________________________________ Describe the relationship required between intrathoracic pressure and atmospheric pressure in order to draw air into the lungs. intrathroacic pressure must be greater or lower than ________________________________________________ atmospheric pressure to draw air in and out of the lungs _______________________________________________ Effect of Thoracic Cavity Puncture Recall that if the wall of the thoracic cavity is punctured, the intrathoracic pressure will equalize with atmospheric pressure so that the lung cannot be inflated. This condition is known as pneumothorax, which we will investigate in this next activity. 1. Do not delete your data from the previous act ivity. 2. If there are any tracings on the oscilloscope monitor, click Clear Tracings. Respiratory System Mechanics 93 FIGURE 7. 3 Opening screen of the Variations in Breathing experiment. Design your own experiment for testing the effect of opening the valve of the right lung. Was there any difference from the effect of opening the valve of the left lung? no ________________________________________________ Remember, you may click Tools and then either Print Data or Print Graphs to print your results.  ¦ Variations in Breathing Normally, alveolar ventilation keeps pace with the needs of body tissues. The adequacy of alveolar ventilation is measured in terms of the partial pressure of carbon dioxide (PCO2). Carbon dioxide is the major component for regulating breathing rate. Ventilation (the frequency of breathing multiplied by the tidal volume) maintains the normal partial pressures of oxygen and carbon dioxide both in the lungs and blood. Perfusion, the pulmonary blood flow, is matched to ventilation. The breathing patterns of an individual are tightly regulated by the breathing centers of the brain so that the respiratory and circulatory systems can work together effectively. In the next activity you will examine the effects of rapid breathing, rebreathing, and breathholding on the levels of carbon dioxide in the blood. Rapid breathing increases breathing rate and alveolar ventilation becomes excessive for tissue needs. It results in a decrease in the ratio of carbon dioxide production to alveolar ventilation. Basically, alveolar ventilation becomes too great for the amount of carbon dioxide being produced. In rebreathing, air is taken in that was just expired, so the PCO2 (the partial pressure of carbon dioxide) in the alveolus (and subsequently in the blood) is elevated. In breathholding, there is no ventilation and no gas exchange between the alveolus and the blood. Click Experiment at the top of the screen and select Variations in Breathing. You will see the next screen, shown in Figure 7. 3. This screen is very similar to the ones you have been working on. Notice the buttons for Rapid Breathing, Rebreathing, Breath Holding, and Normal Breathing—clicking each of these buttons will induce the given pattern of breathing. Also note the displays for PCO2, Maximum PCO2, Minimum PCO2, and Pump Rate. 94 Exercise 7 A C T I V I T Y 6 How does the rebreathing trace compare to your baseline trace? (Look carefully—differences may be subtle. ) ________________________________________________ Why? _______________________________________________ ________________________________________________ Click Clear Tracings to clear the oscilloscope monitor.  ¦ A C T I V I T Y 8 Rapid Breathing 1. The oscilloscope monitor and the data recording box should both be empty and clear. If not, click Clear Tracings or Clear Table. 2. The air flow tube radius s hould be set to 5. 00. If not, click the ( ) or ( ) buttons next to the radius display to adjust it. 3. Click Start and conduct a baseline run. Remember to click Record Data at the end of the run. Leave the baseline trace on the oscilloscope monitor. 4. Click Start again, but this time click the Rapid Breathing button when the trace reaches the 10-second mark on the oscilloscope monitor. Observe the PCO2 levels in the display windows. 5. Allow the trace to finish, then click Record Data. What happens to the PCO2 level during rapid breathing? it decreased ________________________________________________ Why? co2 was removed more than during normal breathing ________________________________________________ ________________________________________________ Remember, you may click Tools and then either Print Data or Print Graphs to print your results. Click Clear Tracings before continuing to the next activity.  ¦ A C T I V I T Y 7 Breath Holding 1. Click on Start and conduct a baseline run. Remember to click Record Data at the end of the run. Leave the baseline trace on the oscilloscope monitor. 2. Click Start again, but this time click the Breath Holding button when the trace reaches the 10-second mark on the oscilloscope monitor. Observe the PCO2 levels in the display windows. 3. At the 20-second mark, click Normal Breathing and let the trace finish. 4. Click Record Data. What happens to the PCO2 level during breath holding? t rose ________________________________________________ Why? co2 exchange could not take place ________________________________________________ ________________________________________________ Rebreathing Repeat Activity 6, except this time click the Rebreathing button instead of the Rapid Breathing button. What happens to the PCO2 level during rebreathing? it increase ____________________________________ ____________ ________________________________________________ Why? there was more co2 in the inhaled air ________________________________________________ ________________________________________________ What change was seen when you returned to â€Å"Normal Breathing†? the rate and depth of breathing increased ________________________________________________ ______________________________________________  ¦ Remember, you may print your data or graphs by clicking Tools at the top of the screen and then selecting either Print Data or Print Graph.  ¦ A C T I V I T Y 9 Comparative Spirometry In Activity 1, normal respiratory volumes and capacities are measured. In this activity, you will explore what happens to these values when pathophysiology develops or during episodes of aerobic exercise. Using a water-filled spirometer and knowledge of respiratory mechanics, changes to these values in each condition can be predicted, documented, and explained. Did the total flow change? just a little ________________________________________________ Why? increase pump rate ________________________________________________ ________________________________________________ Respiratory System Mechanics 95 FIGURE 7. 4 Opening screen of the Comparative Spirometry experiment. Normal Breathing 1. Click the Experiment menu, and then click Comparative Spirometry. The opening screen will appear in a few seconds (see Figure 7. 4). 2. For the patient’s type of breathing, select the Normal option from the drop-down menu in the Patient Type box. These values will serve as a basis of comparison in the diseased conditions. 3. Select the patient’s breathing pattern as Unforced Breathing from the Breathing Pattern Option box. 4. After these selections are made, click the Start button and watch as the drum starts turning and the spirogram develops on the paper rolling off the drum across the screen, left to right. 5. When half the screen is filled with unforced tidal volumes and the trace has paused, select the Forced Vital Capacity button in the Breathing Pattern Options box. . Click the Start button and trace will continue with the FVC maneuver. The trace ends as the paper rolls to the right edge of the screen. 7. Now click on the individual measure buttons that appear in the data table above each data column to measure the lung volume and lung capacity data. Note that when a measure button is selected, t wo things happen simultaneously: (1) a bracket appears on the spirogram to indicate where that measurement originates on the spirogram and (2) the value in milliliters appears in the data table. Also note that when the FEV1 measure button is selected, the final column labeled FEV1/FVC will be automatically calculated and appear in the data table. The calculation is (FEV1/FVC) 100%, and the result will appear as a percentage in the data table. What do you think is the clinical importance of the FVC and FEV1 values? ________________________________________________ Why do you think the ratio of these two values is important to the clinician when diagnosing respiratory diseases? _______ demonstrates how the lungs are functioning ________________________________________________ FEV1 /FVC 100% 80% ______________________ 96 Exercise 7 Emphysema Breathing In a person with emphysema, there is a significant loss of intrinsic elastic recoil in the lung tissue. This loss of elastic recoil occurs as the disease destroys the walls of the alveoli. Airway resistance is also increased as the lung tissue in general becomes more flimsy and exerts less mechanical tethering on the surrounding airways. Thus the lung becomes overly compliant and expands easily. Conversely, a great effort is required to exhale as the lungs can no longer passively recoil and deflate. A noticeable and exhausting muscular effort is required for each exhalation. Thus a person with emphysema exhales slowly. . Using this information, predict what lung values will change in the spirogram when the patient with emphysema breathing is selected. Assume that significant disease has developed, and thus a loss of elastic recoil has occurred in this patient’s lungs. 2. Select Emphysema from the drop-down menu in the Patient Type box. 3. Select the patient ’s breathing pattern as Unforced Breathing from the Breathing Pattern box. 4. After these selections are made and the existing spirogram screen clears, click the Start button and watch as the drum starts turning and a new spirogram develops on the paper rolling off the drum. . Repeat steps 5–7 of the Normal Breathing section in this activity. 6. Now consider the accuracy of your predictions (what changed versus what you expected to change). Compared to the values for normal breathing: reduced Is the FVC reduced or increased? ______________________ reduced Is the FEV1 reduced or increased? _____________________ fev1 Which of these two changed more? ____________________ Explain the physiological reasons for the lung volumes and capacities that changed in the spirogram for this condition. _______________________________________________ ________________________________________________ ________________________________________________ 1. Using this information, predict what lung values will change in the spirogram when the patient who is having an acute asthma attack is selected. Assume that significantly decreased airway radius and increased airway resistance have developed in this patient’s lungs. 2. Select Asthmatic from the drop-down menu in the Patient Type box. 3. Select the patient’s breathing pattern as Unforced Breathing from the Breathing Pattern box. . After these selections are made and the existing spirogram screen clears, click the Start button and watch as the drum starts turning and a new spirogram develops as the paper rolls off the drum. 5. Repeat steps 5–7 of the Normal Breathing section in this activity. 6. Now consider the accuracy of your predictions (what changed versus what you expected to change). Compared to the values for normal breathing: reduced Is the FVC reduced or increased? _____________________ reduced Is the FEV1 reduced or increased? _____________________ fev1 Which of these two changed more? ___ ________________ Explain the physiological reasons for the lung volumes and capacities that changed in the spirogram for this condition. ________________________________________________ ________________________________________________ How is this condition similar to having emphysema? How is the fvc is less reduce than emphysema and it different? ______________________________________ the fev1 is more reduced, the fcv/fev1 % is also reduced ________________________________________________ Emphysema and asthma are called obstructive lung diseases as they limit expiratory flow and volume. How would a spirogram look for someone with a restrictive lung disease, such as pulmonary fibrosis? decreased fev1/fev ________________________________________________ What volumes and capacities would change in this case, and would these values be increased or decreased? normal or above normal volume ________________________________________________ ________________________________________________ In an acute asthma attack, the compliance of the lung is decreased, not increased as it was for emphysema, and air flows freely through the bronchioles. Therefore, will the FEV1/ FVC percentage be less than normal, equal to normal, or higher higher than normal? ______________________________________ Acute Asthma Attack Breathing During an acute asthma attack, bronchiole smooth muscle will spasm and thus the airways become constricted (that is, they have a reduced diameter). They also become clogged with thick mucous secretions. These two facts lead to significantly increased airway resistance. Underlying these symptoms is an airway inflammatory response brought on by triggers such as allergens (e. g. , dust and pollen), extreme temperature changes, and even exercise. Similar to emphysema, the airways collapse and pinch closed before a forced expiration is completed. Thus the volumes and peak flow rates are significantly reduced during an asthma attack. However, the elastic recoil is not diminished in an acute asthma attack. Respiratory System Mechanics 97 Acute Asthma Attack Breathing with Inhaler Medication Applied When an acute asthma attack occurs, many people seek relief from the symptoms by using an inhaler. This device atomizes the medication and allows for direct application onto the afflicted airways. Usually the medication includes a smooth muscle relaxant (e. . , a beta-2 agonist or an acetylcholine antagonist) that relieves the bronchospasms and induces bronchiole dilation. The medication may also contain an antiinflammatory agent such as a corticosteroid that suppresses the inflammatory response. Airway resistance is reduced by the use of the inhaler. 1. Using this information, predict what lung values will change in the spirogram whe n the patient who is having an acute asthma attack applies the inhaler medication. By how much will the values change (will they return to normal)? 2. Select Plus Inhaler from the drop-down menu in the Patient Type box. 3. Select the patient’s breathing pattern as Unforced Breathing from the Breathing Pattern box. 4. After these selections are made and the existing spirogram screen clears, click the Start button and watch as the drum starts turning and a new spirogram develops as the paper rolls off the drum. 5. Repeat steps 5–7 of the Normal Breathing section. 6. Now consider the accuracy of your predictions (what changed versus what you expected to change). Compared to the values for the patient experiencing asthma symptoms: Has the FVC reduced or increased? Is it â€Å"normal†? ________ no no Has the FEV1 reduced or increased? Is it â€Å"normal†? _______ fev1 Which of these two changed more? ____________________ Explain the physiological reasons for the lung volumes and capacities that changed in the spirogram with the application of the medication. _________________________________ ________________________________________________ How much of an increase in FEV1 do you think is required for it to be considered significantly improved by the not sure medication? _______________________________________ when the feve1 is closer to normal? ________________________________________________ a. In moderate aerobic exercise, which do you predict will rv change more, the ERV or the IRV? _____________________ b. Do you predict that the respiratory rate will change yes significantly in moderate exercise? ____________________ c. Comparing heavy exercise to moderate exercise, what values do you predict will change when the body’s significantly increased metabolic demands are being met by the not sure respi ratory system? _________________________________ ________________________________________________ d. During heavy exercise, what will happen to the lung volumes and capacities that have been considered thus far? hey will increase ________________________________________________ e. yes Will the respiratory rate change? If so, how? _________ 1. Select Moderate Exercise from the drop-down menu in the Patient Type box. The existing spirogram clears. 2. Click the Start button and watch as the drum starts turning and a new spirogram develops. Half of the screen will fill with breathing volumes and capacities for moderate exercise. 3. When the trace pauses, click on the individual measure buttons that appear in the data table above each data column to measure the lung volume and lung capacity data. . Select Heavy Exercise from the drop-down menu in the Patient Type box. 5. Click the Start button and the trace will continue with the breathing pattern for heavy exercise. The trace ends as th e paper rolls to the right-hand edge of the screen. 6. Now click on the individual measure buttons that appear in the data table above each data column to measure the lung volume and lung capacity data. 7. Now consider the accuracy of your predictions (what changed versus what you expected to change). Which volumes changed the most and when? ___________ Compare the respiratory rate during moderate exercise with that seen during heavy exercise. __________________  ¦ Breathing During Exercise During moderate aerobic exercise, the human body has an increased metabolic demand, which is met in part by changes in respiration. During heavy exercise, further changes in respiration are required to meet the extreme metabolic demands of the body. Histology Review Supplement For a review of respiratory tissue, go to Exercise H: Histology Atlas & Review on the PhysioEx website to print out the Respiratory Tissue Review worksheet.

Monday, July 29, 2019

Political Ideologies in Conflict Essay Example | Topics and Well Written Essays - 1500 words

Political Ideologies in Conflict - Essay Example Socialism’s key theme is based on the community’s power, instead of individual effort (Alesina & Rodrik 465). On the other hand, equality denotes the creation of a society that is fairer and everyone is a participant and is accorded an opportunity to realize their potential. Equality aims at getting rid of discrimination and prejudice so as to offer fair, diverse and personal services to the society (Alesina & Rodrik 471). It aims at eliminating discrimination based on gender, age, religion, race and ethnicity. Ideology entails a set of ideas reflecting a nation’s, people’s or society’s beliefs. This paper will discuss the role of equality in socialist ideology. Socialism and equality are inseparable. Early socialism (also known as Utopian socialism) criticized the capitalist society, condemning it and pushing for its destruction (Nozick 16). It struggled to make the rich realize the immorality caused by exploitation. The desire for a new system and order contained the emergent factors of socialist ideas and represented the reaction of the working masses’ wishes of emancipation and, concurrently, their political and ideological powerlessness. Over many years, socialist ideologists tried to authenticate the ideal of a fair society with no exploitation and class oppression (Giacomo & Gruner 90). They advocated for equality. In socialism, equality is addressed in four forms; economic, foundational, formal and equality of opportunity (Blanchflower & Freeman 439). Foundational equality addresses the fact that God created all people as equal human beings. This is further explained to clarify that not all have the same abilities and talents , rather, because of the common humanity, their moral worth is equal (Alesina & Rodrik 479). Formal equality addresses the aspect of citizens and the law. It provides that State institutions are obliged to accord its citizens equal treatment, and that the institutions should themselves remain subject to the law as a way of defence against possible dictatorship of the State. Equality of opportunity fights discrimination in education, employment, housing or social services because of race, colour or sex (Giacomo & Gruner 84). Finally, economic equality intends to eliminate disproportions in the distribution of wealth, income disparities, and the gap between the poor and the rich (Blanchflower & Freeman 440). Socialists view social inequality as a disproportion of economic advantages within a society (Giacomo & Gruner 86). They believe humans must be accorded equal opportunity to prosper in the society. However, humans are not treated equally in all senses. To this end, socialists decl are inequality an evil that should be eliminated. In particular, wealth inequality is so evil among socialists that it justifies the forceful repossession from those who have it in abundance for fairer redistribution to the poor (Blanchflower & Freeman 446). Socialism is outstanding for its sustenance for social equality. Parliamentary socialists approved equality of opportunity as a substitute to equality of outcome because it signifies an unassuming level of outcome through the redeployment of wealth (Alesina & Rodrik 481). They base their support for equality on several factors. They argue that it is a more significant variety of equality than equal opportunities or formal

Sunday, July 28, 2019

GLOBAL ECONOMY Essay Example | Topics and Well Written Essays - 250 words

GLOBAL ECONOMY - Essay Example The four tigers stipulated trade rules for all the member state while the ASEAN 4 implemented a system they called the ASEAN way. The system embraces freedom of domestic legislation while adhering to the ASEAN community (Hirst 2002). The four Tigers first had a strong foreign funding especially from the USA that gave South Korea and Taiwan a strong support. It was due to its geopolitical interests in the region while the ASEAN four countries mostly depended on financial policies; government funding and remittance’s from their economies to further develop their economy. They differed in the source of funding. ASEAN 4 countries mostly relied in export of lower categories of value added goods that have slower growth like apparel clothing, organic chemicals, but have slowly grown into electronics, telecommunication equipment and machinery especially Malaysia and Philippines. It is in contrast to 4 Tiger nations that have a broader range of export categories with most reliance on electronic and machinery. Export policies of the two regions differ from each

Saturday, July 27, 2019

Marketing Strategy for Burke Museum Assignment Example | Topics and Well Written Essays - 4500 words

Marketing Strategy for Burke Museum - Assignment Example The report will also define the segments which need to be addressed by the museum in order to enhance its business. The later part of the report explains the marketing plan which needs to be implemented by the Museum which would be helpful to achieve targets, and finally it concludes with the sales forecast and the Marketing Mix. Although museum visiting trends patterns are substantial in Australia, still there are many factors which will play an important part in the acceptance of the Museum in a society where visiting library is a preferred leisure activity for people. Museums play an important role in providing the people with entertainment in their leisure time. In order to enhance their market share Museums should focus on implementing new marketing strategies in order to attract more customers and increased market share (Peschiutta, 2001). Many established museums and cultural organisations cannot only rely on income generated; the public funds are decreasing with an increase in the attendance of people visiting these museums. With the increasing demands of greater accountability from government and funding bodies the planning and implementation of successful marketing strategies has become more important (Laczniak and Murphy, 1977). Weak or no marketing practice can lead to a big trouble for even a well-established Museum. The challenges facing the Museums are to adopt appropriate marketing strategies and technologies in order to make its presence well felt by the customers to generate and get as much. Burke Memorial Museum, Loch Street, Beechworth, Victoria 3747. Over the past several decades the Historical Burke Museum has served the purposes of research and education of the local community related to the history of Australian culture. Furthermore, without neglecting the necessity to provide knowledge, education, and entertainment through a highly aesthetic presentation, the museum's directorate is also seeking to blend the new concepts of muse ology and the scientific theories regarding the interpretation and presentation of material and immaterial cultural heritage in a way that the modern visitor can understand. Privately founded Museum has a total of 7 staff members with 15,000 objects in the collection and a current income of approximately 136.500,00 AUS$. The Museum is now aiming at increase in the revenue at least to 800.000,00 AUS$ in order to bear the expenses in new building. To achieve the purpose it is important to plan a marketing strategy, which can eke the management in acquiring the desired target. Mission Statement of Burke Museum: Burke Museum aims to: - Collect, keep, and preserve objects from the area of Victoria as well as related evidence of the life of the local people in the pre-industrial and early industrial period - Help the local people to become aware of their cultural identity and its history - Promote education - Introduce visitors from Victoria and all over Australia to local culture. 1.2 Objectives: The museum's broad objectives are: - To increase visitor numbers by a policy of communication, public relations, and

Friday, July 26, 2019

Islamcis Essay Example | Topics and Well Written Essays - 1750 words

Islamcis - Essay Example In this section Edward Said highlights that west considers the orient as a place out of historical evolution. He points out that westerners portray India or Egypt in the same way today as they did one fifty years back as if societies here are static while west is progressing. He further points out that west created an image of east which was based upon colonial mindset in which they showed east as a mystic, ancient and non-progressive society and this attitude is prevalent in all sections of society may it be literature, science or social norms. In this section Edward Said furthers the debate with a sustained argument that history of imperial conquest is at the back of Orientalism. He explains that British and French rules the colonies for a long time and they only developed that much understanding of these societies as was required to rule over them and a human approach to understand the locals was never made. He further explains that this imperialism is not only material but also ideological in form and traces the seeds of ideological imperialism at Napoleon’s invasion of Egypt in 1789. He also stresses that American Imperialism is different from the British or French on account of two factors; Americans imperialism is indirect whereas British and French ruled thee societies directly and American Imperialism is more politicized because of the presence of Israel in the region. Section four of the movie elaborates American Imperialism in deeper details. Here, Said argues that the way Islam is projected in western media is a big problem. Muslims are shown as villains in movies, cartoon and news media and a sense is created that somehow they have to be crushed. He argues that terrorism is only one factor but US has practically sanctioned Anti Arab Racism and situation has only deteriorated in recent decades. He also refers to his book covering Islam and points

Thursday, July 25, 2019

Assignment Example | Topics and Well Written Essays - 1000 words

Assignment Example There are certain numbers of characteristics that are involved with the effectiveness of entrepreneurs, such as self confidence, sense of ownership, continuous learning skills, communication abilities, goal and system oriented cognitive skills, and dedication towards the objectives with an optimistic point of view among others. According to the concept of Peter Drucker, entrepreneur can be regarded as the person who essentially looks for changes and attempts taking appropriate actions on it developing those changes as a prospect of growth and success (Marks and Hunter, 2011). Among the various notable entrepreneurs of this era, Lord Alan Sugar has been one. Born in the not so famed East London, he rose up to the occasion to be a member at House of Commons and to hold 89th place in Sunday Times Rich List of 2011. Amstrad has been his most successful venture. The paper on entrepreneurship should also mention about the Virgin group Chairman Richard Brasnon, the 4th richest person of UK. Virgin Megastores, Virgin Atlantic Airways, Virgin Mobile and the expanded Virgin Records are few of his successful ventures. 1.2. Critically Evaluate Entrepreneurialism as an Agent of Change in Both Public and Private Health and Social Care Sector. In the modern day context of healthcare and social organizations, the entrepreneurs are highly inclined towards gaining increased revenue or profit for the organization. However, social enterprises, now-a-days, entail with certain significant attributes related to the governmental public policies. The enterprises of the globalised world focusing on a developed entrepreneurship are different from traditional and socio-economic approaches which motivated the European countries to adopt developed legal frameworks. The contemporary scenario of the healthcare organizations is highly required to be conscious with regards to the environmental changes and implement suitable plans and strategies for the organization concentrated on its social be nefits. Significant plans along with the appropriate strategies are more effective for the organization to put up internal strengths along with external opportunities taking into account the surmounting peripheral threats as well as interior weaknesses possessed by the concern. For instance, in the context of health and social care divisions of UK, it has been observed that the current circumstances have perpetually increased the requirements for more efficient and cost control strategies. The reasons behind such inclination relate with the reduction in government’s financial support to the sector, involvement of private firms as well as expansion of National Health Service (NHS) (Department of Health, 2009). Therefore, in the modern phenomenon, the UK based healthcare organisations within the private sector as well as public sector continue to strive for achieving the competitive advantages through cost-limitation and growth sustainability. The strategic decisions are the cr ucial factors which can encompass a long term effect on the prospects of an organization with regards to its utilization of the resources,

Theory of change and growth paper, combined with the movie Essay

Theory of change and growth paper, combined with the movie - Essay Example This theory of change and growth is based within an eclectic mix of theories from different paradigms within psychology. The theory works on the idea that cognitive change and emotional growth and understanding, along side support and motivation from an empathetic and compassionate therapist and the involvement of the client’s partner and immediate family members, will create an environment where the client can heal, and move past their problems or difficulties. It is an integration of the principles of cognitive behavioural therapy, emotion focused therapy, and structural family therapy. For the client to be able to effectively move away from their personal and family problems and to understand the problems, its causes and effects, they must firstly be able to admit to the problem in the first place. Denial is not possible if therapy is to be successful. The eclectic theory first focuses on the client, using a theory based in cognitive behavioural therapy. Cognitive behavioral therapy has been shown to an effective treatment for many disorders, including depression, panic disorders, alcoholism and substance abuse (Wakefield, Williams, Yost & Patterson, 1996). Changing behaviour is a complex psychological process. For change to occur therapy and its preceding theory must give the client the ability to become who they really are, and not what they think they are. The therapy needs to enable the client to understand how their cognitive beliefs of themselves and their world, affect their reactions to situations and events. Cognitive behavioural therapy suggests that you can change how you think or change cognitive processing, which in turn will change what you do - or your behavior. Within an eclectic theory of change, if the therapist firstly helps the client to start to change their cognitive malfunctions, thereby changing their sense of self, by taking the client from the emotional

Wednesday, July 24, 2019

Assignment 1.. IDENTITY Essay Example | Topics and Well Written Essays - 1000 words

Assignment 1.. IDENTITY - Essay Example defined as an animal that can say ‘I’, that can be aware of himself as a separate entity.† In this case man has to make decisions in relation to his awareness of himself and his surrounding neighbours as different persons. Thus, Fromm (1966) posits that the need for relatedness, rootedness and transcendence forms a very strong identity background that is vital and is often imperative for every man to be able to identify himself in society. Different people often hail from different cultural backgrounds hence the notion of identity helps these people determine their way of behaviour in relation to others with a different identity. In simple terms, identity can be referred to as the collective aspect of the set of characteristics by which an individual or any other thing is definitely recognizable or known. The underlying principle is the sense of being a unique individual, distinct from others or of belonging to a certain group which obviously has different values from another group. There are several factors that are taken into consideration in the creation of identity. These include shared culture, shared values, shared symbols as well as class and gender structures in some instances. All these factors often give rise to what is termed collective identity. According to Popper (1963), collective identity would therefore, refer to a certain group of people who share the same cultural values and behaviour as well. Thus, in light of the above argument, Mukherjee’s case is not in any way totally divorced from the notion of identity. Basically, she identifies herself with the Hindu culture which defines the identity of the people in Calcutta, India in several ways. First and foremost, she grew up in a patriarchal society where man was always above woman. In this case, all decisions of substance were the sole responsibility of men. The neighborhood was also absolutely Hindu where identity was fixed and often derived from their own religion, language and caste.

Tuesday, July 23, 2019

Most human behaviour and most of our decisions are rational. Discuss Essay

Most human behaviour and most of our decisions are rational. Discuss - Essay Example The latter is viewed as being a model that is extremely descriptive (Newell & Lagnado & Shanks, 2007. 33). Rational intently, is the word that describes people who engage in decision making. It must be known that at the same time, human beings are adaptive and goal oriented in all their actions. The factors, which often make them not make decisions that are rational, are emotional architecture and human cognitive. The latter is often experienced when human beings are in a situation whereby, they have to make decisions, which are extremely important. Many people make irrational decisions when under duress. It is important to avoid making irrational decisions during such times but to maintain calm until such a point that rational decisions is practical. Anger management is an important tool in decision making for it ensures rational rather than irrational decisions are made. Politics is an area where people have to constantly make decisions, which are rational. This is in accordance to a model that is utility classic expected. Evidence that supports this model is of a scientific nature. It has been proven through research, that decisions which are rational are not always possible. A person’s environment plays an essential role in determining whether people make decisions that are rational (Hastie & Dawes, 2001. 42). There is a misconception, which exists between the decision maker responsible for making choices and the environment where decision making occurs. A factor, which may take the form of incentives, can either be negative or positive and it affects decision making. The existence of techniques that are statistical as well as standardized, enable people to distinguish between factors, which are random, and those that are systematic. In turn, it is possible for rationality to be present in making decisions. According to Jonathan Baron (2008. 65), when people are

Monday, July 22, 2019

Remote Monitoring and Control System Essay Example for Free

Remote Monitoring and Control System Essay Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr Abstract Thanks to the rapid development of information technology and the growth of the Internet through high speed networks, network environments have even been changed from office oriented environments based on business industries and public institutions to the interconnection of digital electronics in home networks. Home network based applications are very diverse and the remote monitoring and control areas have been studied. Recently, ZigBee has become one of the most promising technologies for home networks. ZigBee is a specification for a suite of networking, security and application software layers using small, low-power, low data rate communication technology based on IEEE 802.15.4 standard for personal area networks. Moreover, owing to the rapid growth of mobile technology, highperformance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose the design and implementation of a remote monitoring and controlling system using ZigBee networks. This system targets a home network. Web services and a smartphone are used for the client system to monitor and control the home. Keywords: remote monitoring, ZigBee networks, remote control, smartphone, web service 1. Introduction Thanks to the rapid development of information technology and growth of the Internet through high speed networks, network environments have even been changed from office oriented environments based on business industries and public institutions to the interconnection of digital electronics in the home networks. Home network based applications are very diverse and the remote monitoring and control areas have been studied. Recently, ZigBee has become one of the most promising technologies for home networks. ZigBee is a specification for a suite of networking, security and application software layers using small, low-power, low data rate communication technology based on IEEE 802.15.4 standard for personal area networks. There have been various studies on ZigBee based home networks. To realize remote home automation based on ZigBee, implementation issues of home gateway and device nodes are proposed in [1]. It presents hardware platform consideration and software implementation for each of them. Similarly, hardware design issues are discussed for various home devices such as wireless communications transceiver modules base, USB expansion base and control switches for electrical appliances in a room [2]. Also, an effective architecture for dynamic integration of ad hoc ZigBee home network devices into OSGi (Open Service Gateway Initiative)-based home gateways is discussed. An ad hoc ZigBee home network device is represented by a device proxy service in the proposed architecture so that it can be dynamically registered, discovered, accessed and unregistered just like a common OSGi service [3]. [4] gives a way to construct ZigBee wireless sensor networks and implement remote monitoring and control by a GSM module. [5] describes the structure composition of the smar t home system based on ZigBee and gives a system design concept and implementation approach. Moreover, owing to the rapid growth of mobile technology, highperformance smartphones are widespread and in increasing cases they are utilized as a terminal device. In this paper, we propose design and implementation of a remote monitoring and controlling system using ZigBee networks. This system is targeting the home network. Web service and a smartphone are used for the client system to monitor and control the home. The remainder of this paper is organized as follows. In Section 2, IEEE 802.15.4 and ZigBee specifications are discussed as background technologies. Section 3 describes design issues of remote monitoring and controlling systems. Next, implementation results are included in Section 4. Finally, we conclude this paper in Section 5. 2. Background Technologies 2.1. IEEE 802.15.4 IEEE 802.15 is a working group for the standardization of WPAN (Wireless Personal Area Network). IEEE 802.15.4 is one of the seven task groups which are included in it. The first edition of the 802.15.4 standard was released in May 2003. IEEE 802.15.4 specifies the physical layer (PHY) and media access control (MAC) for low-rate WPAN. WPANs are used to convey information over relatively short distances. It focuses on low-cost, low-speed ubiquitous communication between devices. Unlike wireless local area networks (WLANs), connections effected via WPANs involve little or no infrastructure. This feature allows small, power-efficient, inexpensive solutions to be implemented for a wide range of devices. The basic framework conceives a 10-meter communication range with a transfer rate of 250 kbit/s. Important features include real-time suitability by reservation of guaranteed time slots, collision avoidance through CSMA/CA and integrated support for secure communications. Devices also include power management functions such as link quality and energy detection [6]. Several standardized and proprietary network layer protocols run over 802.15.4-based networks, including IEEE 802.15.5, ZigBee, 6LoWPAN, Wireless HART, and ISA100.11a. Potential application areas include the following: sensors, actuators, interactive toys, remote control, industry networks, home automation and so on. 2.2. ZigBee ZigBee is a standards-based technology that addresses the unique requirements of most remote monitoring and control and sensory network applications. ZigBee builds upon the physical layer and medium access control defined in IEEE 802.15.4 for low-rate WPANs. The specification goes on to complete the standard by adding four main components: network layer, application layer, ZigBee device objects (ZDOs) and manufacturer defined application objects which allow for customization and favor total integration. The initial markets for ZigBee included Consumer Electronics, Energy Management and Efficiency, Health Care, Home Automation, Telecommunication Services, Building Automation, and Industrial Automation. The core ZigBee specifications define smart, costeffective and energy-efficient mesh networks. It is a self-configuring, self-healing system of redundant, low-cost, very low-power nodes. ZigBee is available as two feature sets, ZigBee PRO and ZigBee. Both feature sets define how the ZigBee mesh networks operate [7]. 2.3. Home Network Technologies A home network is a residential local area network (LAN) for communication between digital devices typically deployed in the home, usually a small number of personal computers and accessories, mobile computing devices, mobile phones, digital TVs, PDAs and so on. An important function is the sharing of Internet access, often a broadband service provisioned by fiber-to-the-home or via Cable Internet access, Digital Subscriber Line (DSL) or mobile broadband by Internet service providers (ISPs). In a broader sense, it includes software and services for integration and operation of information appliances in addition to wired or wireless network devices. Home networking technologies can be classified into two kinds: wired and wireless. The telephone, power-line, Ethernet and IEEE 1394 exist as wired home network technologies. As wireless home network technologies, wireless LAN, HomeRF, HyperLAN, Bluetooth, UWB (Ultra Wide Band) and ZigBee are representative. Since wireless networking solutions based on the spread of mobile devices have emerged they can be applied to home networks also. 3. Design of Remote Monitoring and Controlling System This section deals with the design of remote monitoring and controlling systems. To design a system, we considered a home automation network. The system architecture is presented in Figure 1. Figure 1. System Architecture The system consists of a real-time home monitoring sub-system and a light control subsystem. A home server with a home camera caters for home status through video to client. It also works as a home gateway to provide interoperability between the heterogeneous ZigBee and Internet and local and remote control over the home’s light devices through the light control sub-system. A client can access the home server through a web service or smartphone. The client can monitor home status through a real-time monitoring sub-system and control the lights through the 3.1. Real-time Monitoring Sub-system The real-time monitoring sub-system captures images of the area of the home to be monitored and serves the client who accesses the server through the web or a smartphone. Figure 2. Operation Processes of Real-time Monitoring Sub-system Figure 2 shows the operation process of the real-time monitoring sub-system. The server finds a video device and captures images. Then, it generates captured data and transforms the data format for RTP communication. After that, it generates the session manager and streams media data to the client. A client using the web or a smartphone generates the session manager and connects to the server. Then, it receives media data and displays the video. In this way, the client can monitor the in-home status in real-time. 3.2. Light Control Sub-system Light control sub-system is composed of a server which works as a gateway, ZigBee coordinator, end-device, switch node and a light as shown in Figure 3. The operation of the sub-system is as follows. ï‚Ÿ A client program maintains a user interface which contains an on/off control panel. ï‚Ÿ A server which works as a gateway receives control commands from the client and relays the command to the ZigBee coordinator through the RS-232C serial communication. ï‚Ÿ The coordinator relays the control command which is received form the server to the end device through RF communication. ï‚Ÿ The end device receives the command from the coordinator and controls the port of the switch node. The switch node controls the switch of the light. ZigBee based remote controlling can be applied in several ways. In this paper, we considered a simple light control and adopted it for a remote control sub-system. 4. Implementation Results In this section we discuss implementation results of a real-time remote monitoring and controlling system. The server contains a web-cam and the monitoring and controlling programs are implemented using Java. Web-based remote monitoring with video capture, data encoding and RTP communication are implemented using JMF (Java Media Framework) which is a multimedia extension API of Java. A client using web service can access the server after user authentication. Of the ZigBee networks, we use two Chipcon CC2420DB evaluation boards with CC2420s (IEEE 802.15.4 radios) accompanying Z-Stack [8, 9, 10]. One is configured as a coordinator and the other is configured as an end-device. When the coordinator starts, it initializes all internal ports and waits for control commands from the home server. If the home server sends a control command to the coordinator through the serial communication, the coordinator receives the command and sends it directly to the end-device through RF communication. The end device receives the control command from the coordinator and controls the switch node. Figure 4. Implementation Result using Web Service Figure 4 shows the implementation results using web service. A client can access the server after user log-in. The client can monitor the rooms status and control the lights. In the figure, the client turns off the light. The implementation results using a smartphone are shown in figure 5. The client program is implemented on the android platform. Figure 5. Implementation Result using Smartphone As shown in the results, a client can monitor the in-home status in real-time and send light control commands using the control button on the smartphone. 5. Concluding Remarks Recently, the home environment has seen a rapid introduction of networked digital technology. This technology offers new and exciting opportunities to increase the connectivity of devices within the home for the purpose of home automation. Moreover, with the rapid expansion of the Internet, there is the added potential for the remote control and monitoring of such networked devices. ZigBee has become one of the most promising technologies for home networks. ZigBee is a specification for a suite of networking, security and application software layers using small, low-power, low data rate communication technology based on IEEE 802.15.4 standard for personal area networks. Moreover, owing to the rapid growth of mobile technology, highperformance smartphones are widespread and in increasing cases they are being utilized as a terminal device. This paper proposes design and implementation of a remote monitoring and controlling system based on ZigBee networks. Real-time remote monitoring is implemented with JMF which is a multimedia extension API of Java. The remote controlling is implemented using ZigBee networks. The client program in a smartphone is implemented on the android platform. Clients can monitor their homes and send light control commands using the web or a smartphone. This system can be applied in many areas such as elderly protecting systems, cultural heritage or forest fire monitoring systems, managing systems for agricultural cultivation and so on. As a future work, we consider expansion of the system using various sensors and actuators. References [1] Z. Shunyang X. Du, J. Yongping and W. Riming, â€Å"Realization of Home Remote Control Network Based on ZigBee†, Proceedings of the 8th International Conference on Electronic Measurement and Instruments, (2007), August 16-18, Xian, China. [2] A Fang, X. Xu, W. Yang and L. Zhang, â€Å"The Realization of Intelligent Home by ZigBee Wireless Network Technology†, Proceedings of the 2009 Pacific-Asia Conference on Circuit, Communications and System, (2009), May 16-17, Chengdu, China. [3] Y. Ha, â€Å"Dynamic Integration of Zigbee Home Networks into Home Gateways Using OSGi Service Registry†, IEEE Transactions on Consumer Electronics, vol. 55, no. 2, (2009). [4] J. W. H. Qin, â€Å"The Design of Wireless Intelligent Home System Base on ZigBee†, Proceedings of the 11th International Conference on Communication Technology, (2008), November 10-12, Hangzhou, China. [5] D. Yan and Z. Dan, â€Å"ZigBee-based Smart Home System Design†, Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, (2010), August 20-22, Chengdu, China. [6] IEEE 802.15.4: Wireless medium access control (MAC) and physical layer (PHY)specification for low-rate wireless personal area networks (WPANs), (2006). [7] ZigBee Specification,(2008), Document 053474r17,ZigBee Alliance. [8] Figure 8 Wireless, ZigBee Implementer’s Guide, (2005). [9] Figure 8 Wireless, Z-Stack User’s Guide for the CC2420DB Board, (2005). [10] Figure 8 Wireless, Z-Stack/Z-Tool Serial Port Interface, (2005).

Sunday, July 21, 2019

Reversible Data Hiding on Color Images

Reversible Data Hiding on Color Images REVERSIBLE DATA HIDING ON COLOR IMAGES USING DIFFERENCE HISTOGRAM MODIFICATION Subash David A   Abstract: Data embedding is done by processing these selected coefficients of the modified subband histograms. We present a high capacity reversible watermarking scheme using the technique of difference average value coefficients of image blocks by using the tool Matlab. This scheme takes advantage of difference average value coefficients, which permits low distortion between the watermarked image and the original one caused by the LSB bit replacement operations of the watermarking technique specifically in the embedding process. By the proposed approach, compared with the conventional one-dimensional difference-histogram and one-dimensional prediction-error-histogram-based RDH methods [3] [20], the image redundancy can be better exploited and an improved embedding performance is achieved. Keywords: DPM, Histogram, LSB, Matlab, RDH, Watermarking, I.INTRODUCTION For most image data hiding methods [1], the host image is permanently distorted and it cannot be restored from the marked content. But in some applications such as medical image sharing multimedia archive management and image trans-coding any distortion due to data embedding is intolerable and the availability of the original image is in high demand. To this end, a solution called â€Å"reversible data hiding† (RDH) is proposed, in which the host image can be fully restored after data embedding. RDH is a hybrid method which combines various techniques to ensure the reversibility. Its feasibility is mainly due to the lossless compressibility of natural images. Many RDH methods [10] have been proposed in recent years, e.g., the methods based on lossless compression, difference expansion (DE), histogram shifting (HS), and integer transform [5], etc. Many researchers’ algorithm plays as an important work of RDH. In DE algorithm, the host image is divided into pixel pairs, and the difference value of two pixels in a pair is expanded to carry one data bit. All these methods aim at increasing the embedding capacity (EC) as high as possible while keeping the distortion low. This method can provide an embedding rate (ER) up to 0.5 bits per pixel (BPP) and it outperforms the previous compression based works. For the proposed method, by considering a pixel-pair and its context, a local image region is projected to a two-dimensional space to obtain a sequence of images that consisting of difference pixel variant pairs. Then, a two-dimensional difference histogram is then generated by counting the difference-pairs. Here, the DPM is an injective mapping defined on difference-pairs, and it is a natural extension of expansion embedding and shifting techniques used in current histogram-based methods. Finally, reversible data embedding is implemented according to a specifically designed difference-pair-mapping (DPM). By using the two-dimensional difference-histogram and this specific DPM, compared with the conventional one-dimensional histogram based methods, more pixels are used for carrying data while the number of shifted pixels is reduced as well, and thus an improved embedding performance is thus achieved. A new reversible authentication technique for images embeds a significant amount of data while keeping high visual quality. In order to verify the integrity of the image, we use a cryptographic hash function. The hash code is combined with a binary logo image by a bit-wise exclusive LSB replacement [9] or as well as difference pixel pair matching based on histogram matching technique in the difference image from the original image. On the other hand, a half the number of pixels of the image are added or subtracted by 1. Thus, the classification of pixels and also the terminal classification of the zeroth pixel and the last pixel are compared and shown together. II.PROPOSED WORK 2.1. Reversible Data Hiding The reversible data hiding [1] [7] in encrypted image is investigated. Most of the work on reversible data hiding focuses on the data embedding/extracting [20] on the plain spatial domain. But, in some applications, an inferior assistant or a channel administrator hopes to append some additional message, such as the origin information, image notation or authentication data, within the encrypted image though he does not know the original image content. And it is also hopeful that the original content should be recovered without any error after image decryption and message extraction at receiver side. This presents a practical scheme satisfying the above-mentioned requirements. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. Most of the existing watermarking algorithms are lossy. Permanent distortion is introduced into the host image during the embedding process and results in Peak Signal-to-Noise Ratio (PSNR) loss. In some applications such as legal, military and medical imaging, permanent loss of signal fidelity is not allowed. This highlights the necessity of lossless/reversible data hiding which can recover the original host signal perfectly after the watermark extraction. However, the payload of the reversible watermarking is typically lower than that of lossy watermarking algorithms. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key. In the scheme, the data extraction is not separable from the content decryption. In other words, the additional data must be extracted from the decrypted image, so that the principal content of original image is revealed before data extraction, and, if someone has the data-hiding key but not the encryption key, he cannot extract any information from the encrypted image containing additional data. In applications that image downsizing is required; the embedded information is extracted from the received image using lossless data hiding extraction method before the transcoding process. A â€Å"thin edge† location map is formed as side information for the image enhancement process. During image resizing, we divide the image into N x N blocks (for simplicity, assume N is a positive integer larger in value. To share medical images with some concomitant data, one approach involves adding, when allowed by the image file format, some extra header information. Unfortunately, header files are prone to manipulation and information loss may occur during file format conversion. Most data contained in the header of a Digital Imaging and Communications in Medicine (DICOM). fig 1: Input Original Image In the presented experimental results, the algorithm is applied to each color component of three 512 Ãâ€" 512 RGB images, for all images such as Baboon, Lena, and Fruits setting T1 = T2 = T3 in all experiments. The embedding capacity depends on the nature of the image itself. In this case, the images with a lot of low frequencies contents produce more expandable triplets with lower distortion than high frequency images such as Baboon. In particular with Fruits, the algorithm is able to embed some amount of bits with a PSNR rate in dB, but with only reduced bits image quality increases at some amount of PSNR value in dB. Location Mapping: The number of subgroup points, depth of wavelet transforms and overflow/underflow book-keeping data are the necessary side information that should be embedded into the high frequency transformation coefficients besides the hidden data. Below mentioned figure shows the embedding image retrieving process. In the first block the integer wavelet transform is applied on the original image. Then the coefficients of high frequency subbands are used for constructing the subgroups. fig 2: Location Mapping Then the data and side information is hidden. The stego image carrying hidden data will be obtained after inverse integer wavelet transform. In image recovery system, the integer wavelet transform is applied on the stego image. Then by using the side information level of wavelet applying and the points of high frequency sub bands are used to construct the subgroups. In this step the data is retrieved. Then each subband histogram is inverse modified according to its subgroup points. Embedding the normal image by considering the pixel values achieved the concept of data hiding, secret data communication, etc. We need an image, an audio; a text file, a web source to be hidden or these sources can also be used to hide a particular data or any types of files. Data hiding, secret data communication, encrypting the data plays an important role in making telemedicine applications, secrecy in defense communication, etc. Each subband histogram is modified according to its subgroup coefficients. Now the subbands are ready for data embedding. The data embedding stage hides the data by subband coefficient processing. This type of flow is called reversible data hiding. The reverse process can take the same flow of getting the image as input and doing some of watermarking procedure to hide the secret data. fig 3: Image in which the secret data is kept hidden Hiding Retrieving back the Hidden Web Source: Each and every data (any data can be hidden for instance image, audio, text file, web source, etc.) Here we have done with some updations in making the data hiding process with the new algorithm of histogram and data hiding which is used for hiding a web source and retrieving it back. These use the algorithm of reversible data hiding and that the web source link will be saved in a particular place and it can be hidden in an image. Then after that the process of decrypting the watermarked image will be carried out. Herewith below shown are the retrieved image and the web source. fig 4: Extracted Original Image A sorting technique is used in this method to record prediction-errors based on the magnitude of local variance, and a pixel will be prior embedded if it has a small local variance. This method performs well and it is superior to some typical RDH schemes. fig 5: Retrieved web link source from the Watermarked image Now the inverse formula of data embedding is applied. After that inverse integer wavelet transform is applied to obtain the image. Now the side information tells us that the Overflow/Underflow post processing is required or not. The original image is obtained after this step. In the histogram modification process, the watermark is embedded into the modified difference image. The modified difference image is scanned. Once a pixel with the difference value of -1 or 1 is encountered, we check the watermark to be embedded. III.CONCLUSION DISCUSSION: This work is an attempt to employ higher dimensional histogram as a hierarchical watermarking process along the pair mapping histogram level. Compared with the previously introduced one-dimensional histogram based methods, our technique exploits the image repetition as far as good and it achieves an improved performance. Since only one pixel of a pixel-pair is allowed to be modified by 1 in value. This issue should be investigated in the future. Moreover, utilizing more suitable two-dimensional histogram and designing more meaningful Difference Pair Mapping (in arrangement of pixels) to achieve the best embedding performance is also a valuable problem. If the bit to be embedded is 1, we move the difference value of -1 to -2 by subtracting one from the odd-line pixel or 1 to 2 by adding one to the odd-line pixel. This correlation makes the pair easier to satisfy smaller thresholds and, hence, to produce a large portion of selected expandable pairs. The major drawback of reversible data hiding algorithm, is the size of the binary map. IV.REFERENCES: [1] Y. Q. Shi, â€Å"Reversible data hiding,† in Proc. IWDW, 2004, vol. 3304, pp. 1–12, ser. Springer LNCS. [2] Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, â€Å"Lossless data hiding: fundamentals, algorithms and applications,† in Proc. IEEE ISCAS, 2004, vol. 2, pp. 33–36. [3] G. Coatrieux, C. L. Guillou, J. M. Cauvin, and C. Roux, â€Å"Reversible watermarking for knowledge digest embedding and reliability control in medical images,† IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158–165, Mar. 2009. [4] M. Fontani, A. D. Rosa, R. Caldelli, F. Filippini, A. Piva, and M. Consalvo, â€Å"Reversible watermarking for image integrity verification in hierarchical pacs,† in Proc. 12th ACM Workshop on Multimedia and Security, 2010, pp. 161–168. [5] S. Lee, C. D. Yoo, and T. Kalker, â€Å"Reversible image watermarking based on integer-to-integer wavelet transform,† IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 321–330, Sep. 2007. [6] R. Li, O. C. Au, C. K. M. Yuk, S. Yip, and T. Chan, â€Å"Enhanced image trans-coding using reversible data hiding,† in Proc. IEEE ISCAS, 2007, pp. 1273–1276. [7] K.-L. Chung, Y.-H. Huang, P.-C. Chang, and H.-Y. Liao, â€Å"Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC,† IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 11, pp. 1643–1647, Nov. 2010. [8] J. Fridrich, M. Goljan, and R. Du, â€Å"Lossless data embedding—new paradigm in digital watermarking,† EURASIP J. Appl. Signal Process., vol. 2002, no. 2, pp. 185–196, Feb. 2002. [9] M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, â€Å"Lossless generalized- LSB data embedding,† IEEE Trans. Image Process., vol. 14, no. 2, pp. 253–266, Feb. 2005. [10] J. Tian, â€Å"Reversible data embedding using a difference expansion,† IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890–896, Aug. 2003. [11] A. M. Alattar, â€Å"Reversible watermark using the difference expansion of a generalized integer transform,† IEEE Trans. Image Process., vol. 13, no. 8, pp. 1147–1156, Aug. 2004. [12] W. L. Tai, C. M. Yeh, and C. C. Chang, â€Å"Reversible data hiding based on histogram modification of pixel differences,† IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906–910, Jun. 2009. [13] Z.Ni, Y.Q. Shi, N. Ansari, andW. Su, â€Å"Reversible data hiding,† IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354–362, Mar. 2006. [14] S. K. Lee, Y. H. Suh, and Y. S. Ho, â€Å"Reversible image authentication based on watermarking,† in Proc. IEEE ICME, 2006, pp. 1321–1324. [18] M. Fallahpour, â€Å"Reversible image data hiding based on gradient adjusted prediction,† IEICE Electron. Express, vol. 5, no. 20, pp. 870–876, Oct. 2008. [19] W. Hong, T. S. Chen, and C. W. Shiu, â€Å"Reversible data hiding for high quality images using modification of prediction errors,† J. Syst. Software, vol. 82, no. 11, pp. 1833–1842, Nov. 2009. [20] D. M. Thodi and J. J. Rodriguez, â€Å"Expansion embedding techniques for reversible watermarking,† IEEE Trans. Image Process., vol. 16, no. 3, pp. 721–730, Mar. 2007.

Domestic Violence and Health Promotion for Mildura

Domestic Violence and Health Promotion for Mildura In Australia, every 1 in 4 persons are affected by domestic violence, with Mildura ranking the second highest place for family violence in Victoria (Domestic violence resource centre Victoria, 2016). Domestic violence is a pattern of abusive behaviour through which a person seeks to control and dominate another person, in which they may have relations with. It is not only physical, but can take on many other forms including sexual, emotional, social, spiritual and economic abuse that can be equally harmful. Violence against women is far greater with 17 per cent of all women and 5 per cent of men experiencing violence by a partner since the age of 15 (Phillips, 2017). 85-90% of incidents of domestic violence occur with children present, and impacts over one million Australian children a year (Sutherland, 2015). Victims suffer long term physical and psychological harm that can lead to negative behaviours such as drug and alcohol use, inherited grief and trauma, poverty and loss of traditional male and female role models within the community. Research has shown that the biggest contributor to domestic violence in regional Australia is the negative attitudes of men towards women, within a community that values traditional patriarchal gender roles, combined with increase alcohol consumption and the vulnerability of women and children (Sutherland, 2015). This essay will explore potential and past health promotion strategies for domestic violence that would be beneficial to implement within Mildura, how they align with the Ottawa charter, health promotion values and principles, and the contribution of occupational therapists. Health promotion strategies Mandatory school-based health programs School-based programs provide the strongest evidence of effectiveness in relation to violence prevention programs (Flood, Fergus, Heenan, 2009).ÂÂ   As a primary prevention plan, mandatory school based programs that take on a holistic approach through educating and advocating against domestic violence within both school and communities has demonstrated effectiveness in reducing family violence. Student-oriented activities including creation of DVDs, rap songs and other forms of media that raise awareness of domestic violence can be presented at different community events. Students are not only educated about negative effects of domestic violence, but they are influenced to feel responsible to advocate against it through community displays of their school work. The Victorian Health Promotion Foundation identified two programs in particular that were successful in influencing and empowering students to reshape their attitudes about this issue (Flood et al., 2009).ÂÂ   Positi ve Relationships and successful lives ran by Mallee sexual assault unit, was conducted within a mainstream secondary college, a specialist school for students who have an intellectual disability, and a local Indigenous KODE school. Students participated in a range of media based activities, in which they presented at community forums. Flood, Fergus and Heenan (2009) depicted that this program was successful due to: allowing students and the community to work together to advocate against domestic violence, the inclusion of indigenous and specialist schools, and being student-driven content that could be used in other prevention programs across the states. In addition, solving the Jigsaw, a program ran within schools of Loddon Mallee region educated children to understand the role of power and control over others to the culture of violence. They were to identify types of power, abuse and violence and acknowledge how violence should not be kept a secret. Milne (2006) stated in her clinical review that it challenged societys ideology e.g. gender issues, self-regard, culture of violence and providing confronting material that children can relate to. Children felt connected within the group, and at ease showing care to one another. It encouraged them to identify what actions were portrayed as violent, how to respond to situations and to speak out about their experiences. Both programs were successful in influencing students to view violence as unacceptable, and motivated them to seek help if needed. Behaviour change programs A behaviour change program that aims to change mens patriarchal ideology that men can take control over women, through teaching them to respond differently to trigger situations as well as counselling for alcohol driven domestic violence should be implemented in Mildura. Education and training can help perpetrators recognise their behaviour is abusive, and explore the use of non-violent strategies that promote intimate relationships built on respect, trust, and equality. A program in regional NSW called Taking Responsibility, has proven to have successful outcomes for men who wish to be better their relationships with partners and/or children. The program was evaluated using follow up interviews of men and partners of the men attending the program. Intended positive outcomes were achieved and expressed through quotations of the participants, and benefits included that men had learnt to change their attitudes towards women, and new ways to express their feelings instead of violence. M en felt they were accepted back by their partners which restored intimate partner relationships and strengthened family bonds. In addition, implementing cognitive-behavioural approaches has also proven successful in reducing alcohol related domestic violence. 53% per cent of women that have been physically assaulted by a male (in the past twenty years) reported that alcohol or drugs had been involved in their most recent incident (Phillips, 2017). Satyanarayana et al (2016) found that teaching cognitive-behavioral techniques including relaxation, anger management, assertiveness training and cognitive restructuring, is able to decrease alcohol consumption amongst men, and resulted in their partners having less depression, anxiety and stress from the DASS scores following intervention Mixed gender community sports programs A strategy that takes on a socio-environmental approach, is the use of well-known sports players to advocate against domestic violence through promoting positive relationships between girls and boys during mixed gender sports programs within the community. AFL football players can volunteer to participate within local football clubs to educate children about domestic violence, teaching them about what it is and why it is not acceptable, how to respond or avoid potential situations that could lead to violence, and access to help such as websites or phone lines. As children may view these players as role models, they will be more influenced to listen to them when out on the field.ÂÂ   An 8 week trial program called Equal Playing Field ran by the Rugby League used sport to minimise violence and assaults in less advantaged communities. This was first implemented for children in Papua New Guinea, and due to the high success rates, a school in Wollongong called Berkeleys Illawarra Spo rts High decided to also run the program. As a result, there were many positive reviews from both students, parents and the community when the well- known rugby players volunteered to educate the boys and girls during games of rugby. The mixed gender teams were encouraged to show good sportsmanship and positive behaviour and actions towards each-other, and acknowledge that violence between men and women within the home is not acceptable (Huntsdale, 2017). A similar program called Kicking goals for Healthy Relationships, created through the partnership of VicHealth and the Australian football league also depicted to be successful in engaging local rural communities and football clubs to promote respectful relationships between men and women (Loxton, Hosking, Williams, Brookes, Byles, 2008). Activities advocated and supported change in football club practises and policies to ensure safe, supportive and inclusive environments for women Both programs demonstrated the importance of usin g primary prevention interventions in highly masculinised environments (in this case sporting clubs), as boys attitudes are often shaped by other men they view as role models. The Ottawa charter and related health promotion values and principles The ability to create supportive environments and simultaneously strengthen community action is greatly shown in both Mandatory school based programs and community sports programs. These programs encourage people to care for each other through educating both students and the community to build healthy and respectful relationships with each other, and encourages change in attitudes towards domestic violence. This also strengthens the community actions as they are empowered to take ownership of these strategies such as advocating against domestic violence through displaying school work, or gathering at community sports events to advocate against domestic violence (The world health organisation, 2017). Through using methods such as education to empower youth to view domestic violence as unacceptable, both strategies align with Ottawa charter reorient health services as they focus strongly on primary promotion and preventative measures rather than secondary/tertiary. Establishing a policy where school based programs for domestic violence are made mandatory for all schools also aligns with building healthy public policy. It also greatly respects cultural diversity as students and/or schools from different culturally backgrounds i.g the local indigenous KODE school can implement the program. The community sports program mediates the ability for capacity building through collaboration and coordination of multiple parties within the community including local sports clubs and their teams, parents and AFL members. Therefore using pre-existing skills and resources within the community, not only encourages their participation, but also empowers them to feel responsible for this program which will help it remain sustainable in the long run. The behaviour change program supports Ottawa charter development of personal skills as it provides education and training for perpetrators of violence to develop skills, which enable them to have more control over their actions, so that they can respond appropriately to triggers that in the past would result in violence. This program takes on a holistic health approach through targeting perpetrators rather than the victims of domestic violence, in which far more programs for victims exist. Therefore, rather than focusing on treating consequences of domestic violence (i.e illness/injury) it takes into account the broader determinants of the people involved, such as their motivation for violence Occupational Therapy and health promotion Occupational therapists in Australia and worldwide can play a huge role in contributing to health promotion. They have the potential to raise awareness of domestic violence due to first- hand experience, however as there is little research available in occupational therapy literature, it is very difficult to single out well-known health promotion strategies. Some researchers have realised this, and conducted a systematic review of past programs/interventions implemented by occupational therapists who worked with victims of domestic violence. Carlson and Streit (2010) found that O.Ts have worked in more secondary/tertiary prevention settings, and key areas where they have added value in addressing domestic violence included advocating the importance of social support systems, providing training for emotional and financial troubles, as well as education on safety. Ramsay et al (2009) and Gutman et al (2004) depicted the important of occupational therapists using advocacy to connect those who were experiencing or had experienced domestic violence with social supports around the community and giving them resources that can help them become independent. It was found that women who were able to use community resources to find shelters or programs where other women in similar situations were found, was beneficial in stopping or preventing domestic violence. Through providing a range of support systems women learn to become re-engaged within their daily occupations and increase community participation. A stress management program for abused women promoted improvement in emotional well-being (Gutman et al, 2004). Women experience stress due to emotional issues surrounding the violence including feelings of helplessness and believing they deserved. Through learning strategies to manage stress, many participants were able to generalise learnt strategies outside the clinic, and increased their participation in previous activities that they were not able to do beforehand. Gutman et al (2004) also illustrated the importance of safety education, to decrease risk of partners becoming victim to domestic violence. Occupational therapists worked with woman to develop a safety plan: identifying a safe place to escape and connections to support systems so they could safety escape violent situations. Employment skills were the focus of an intervention designed by Helfrich and Rivera (2006), which supported women who had left their violent partners. Group sessions taught victims how to search for, apply for, and maintain a job, including how to write resumes, where and how to apply, completing mock interviews, and ways to advance in a job. Feedback given by participants were mostly positive and felt that they had learnt necessary skills to obtain a job within their community. Common challenges for occupational therapists It is somewhat difficult for occupational therapists to take particular health promotion approaches to address domestic violence. More than half of occupational therapists work in hospitals or outpatient settings where they fill secondary or tertiary health promoting roles through empowering people through education, training and equipment. Their aim being that their clients can develop the necessary skills to manage their chronic disease or injury and prevent further deterioration and potential secondary conditions. If occupational therapists turned to a more upstream primary prevention approach, it would be difficult to maintain the quality of services in the traditional downstream approach, and thus time constraints is also a pressure to adopt preventative health promotion role alongside their current remit (Scriven, Atwal, 2004). Occupational therapists, like any health profession, need to work with not only the health conditions of the community, but also their attitudes and social/cultural norms which can be barriers to implementing new programs. Communities that support or encourage the use of violence will make it very difficult for occupational therapist to implement a program advocates against domestic violence. For example intimate partner violence is accepted across India, Nigeria and China, where men have the right to discipline female behaviour. Sub groups of communities, can also have differing views of family violence, for example the indigenous communities or isolated rural areas within Australia may accept violence as a part of their culture, compared to the majority of the population who condone it (World Health Organisation, 2009). Lack of partnerships to establish a health promotion strategy is also a limitation for occupational therapists. Evidence has shown that occupational therapists often use concepts and medical terminology that can be misunderstood and possibly misconstrued in health promotion partnership arenas (Wilcock 1999, Townsend 1999). It is also found that it is easier for an occupational therapist to implement secondary health promotion such as cognitive behavioural training for perpetrators of violence rather than working towards implementing primary preventative approaches that rely on other organisations. In conclusion, with domestic violence being a significant issue in Mildura, health promotion strategies such as mandatory school based programs, behaviour change programs for perpetrators and community sports programs can influence members of the community to construct or change their attitudes towards domestic violence, to foster for healthy and respectful relationships. Occupational therapists face many challenges in the area of health promotion, as its harder for them to adopt an upstream primary preventative approach, due to time constraints and demands for secondary/tertiary care, as well as difficulty building partnerships and working with the differing cultural and social attitudes of specific communities. Furthermore, for occupational therapists wanting to become more engaged with health promotion, they need to be prepared to go extra lengths to gain power and respect from others, and have specific skills and resources to be able to facilitate for an upstream approach, to pre venting domestic violence in Mildura.