Monday, September 30, 2019

Qualitative Cation Tests Essay

Lab Report Assistant This document is not meant to be a substitute for a formal laboratory report. The Lab Report Assistant is simply a summary of the experiment’s questions, diagrams if needed, and data tables that should be addressed in a formal lab report. The intent is to facilitate students’ writing of lab reports by providing this information in an editable file which can be sent to an instructor. Observations Questions A. Write net ionic equations for all reactions that produce a precipitate. Ag+(aq.) + Cl-(aq.) —-ïÆ'   AgCl (s) 2 Ag+(aq.)+ 2OH- —ïÆ'   Ag2O (s) + H2O(l) 2 Ag+(aq.)+2NH3+ H2O(l) —ïÆ'   Ag2O (s)+ 2NH4+ (aq.) Pb2+(aq.)+2Cl- (aq.) —-ïÆ'   PbCl2(s) Pb2+(aq.)+2OH-(aq.) —-ïÆ'  Pb(OH)2 (s) Pb2+(aq.)+ 2NH3(aq.)+ H2O(l) —ïÆ'   Pb(OH)2 (s)+ 2NH4+ (aq.) Cu2+(aq.) +2OH-(aq.) —-ïÆ'   Cu(OH)2 (s) 2Cu2+(aq.)+SO42- (aq.) +2NH3(aq.)+2 H2O(l) —–ïÆ'   Cu(OH)2.CuSO4(s) +2NH4+ (aq.) Zn2+ (aq.)+ 2OH- (aq.) —-ïÆ'   Zn(OH)2 (s) Zn2+ (aq.)+2NH3(aq.)+ H2O(l) —ïÆ'   Ag2O (s)+ 2NH4+ (aq.) Fe3+ (aq.)+ 3OH- (aq.) —-ïÆ'   Fe(OH)3(s) Fe3+ (aq.)+ 3NH3(aq.)+ 3H2O(l) —ïÆ'   Fe(OH)3(s)+ 3NH4+ (aq.) Pb2+(aq.)+ CrO42-(aq.) PbCrO4(s) 2Cu2+(aq.)+[Fe(CN)6]4- (aq.) —–ïÆ'  Cu2[Fe(CN)6] (s) Zn2+(aq.) + S2-(aq) —–ïÆ'   ZnS(s) 4Fe3+ (aq.)+3[Fe(CN)6]4- (aq.) —-ïÆ'  Fe4[Fe(CN)6]3 (s) Ca2+(aq) + ( COO)22-(aq) —–ïÆ'   Ca(COO)2 (s) B. Identify the cations that precipitate with hydrochloric acid and dissolve in the presence of ammonia. Ag+ C. Identify the cations that precipitate with hydrochloric acid and do not redissolve in the presence of ammonia. Pb2+ D. Identify the cations that precipitate upon addition of two or three drops of sodium hydroxide but redissolve upon addition of excess sodium hydroxide. Pb2+,Zn2+ E. Identify the cations that precipitate upon addition of two or three drops of sodium hydroxide and are not affected by additional sodium hydroxide. Ag+,Cu2+,Fe3+ F.Identify the cations that precipitate upon addition of two or three drops of aqueous ammonia but redissolve upon addition of excess aqueous ammonia. Ag+,Cu2+,Zn2+ G. Identify the cations that precipitate upon addition of two or three drops of aqueous ammonia and are not affected additional aqueous ammonia. Pb2+,Fe3+ H. What simple test would distinguish Ag+ and Cu2+ ? Upon addition of two or three drops of aqueous ammonia, Ag+ produces brown ppt, which is soluble in the excess reagent, resulting in clear, colorless solution. Upon addition of two or three drops of aqueous ammonia, Cu2+ produces blue ppt, which is soluble in the excess reagent but produces dark blue solution.

Sunday, September 29, 2019

Etop Analysis

12 | Annual Report 2009-10 CORPORATE SOCIAL RESPONSIBILITY REPORT ‘What is that life worth which cannot bring comfort to others' – Dr. S K Burman Founder, Dabur India Ltd This noble thought by its founder has been the driving force behind Dabur India Ltd's community initiatives. At Dabur, we firmly believe that an organisation's true worth lies beyond its business, and is best reflected by the service it renders to the community and the Society. Businesses have a responsibility to subserve larger societal goals as they have the ability to contribute significantly and impactfully to sustainable and inclusive development.Corporate Social Responsibility (CSR) is not a public relations exercise for us. Dabur defines CSR as conducting business in ways that provide social, environmental & economic benefits for the communities and geographies where we operate. The greatest value is in making a difference in lives of people. Dabur's CSR initiatives are driven by Sustainable Deve lopment Society or SUNDESH, which aims to reach out to the weaker and more vulnerable sections of our society. Today, SUNDESH operates in Ghaziabad & Gautam Budh Nagar districts of Uttar Pradesh and in Rudrapur district of Uttarakhand.Over the years, it has contributed to many worthy causes, addressing children's literacy, improving healthcare services, skill development, and environment. To cite a few examples, almost 2,000 women have been offered skill development training and they are now supplementing their household income. Our self-help groups too have benefited many, with repayment of bank loans at almost 100%. It is highly encouraging to see that our small steps and efforts have helped many an illiterate kids see a school from inside, helped unemployed youth set up small businesses, made healthcare accessible to many†¦ n short, brought smiles on the faces of scores of families. Health Services The objective of rural health care is to mobilize the community and build awa reness, equipping them with adequate information, skills and confidence to access health services. SUNDESH provides health services across villages. It extends primary health services to the poor and the marginalised rural people at a reasonable cost. It focuses on community-oriented healthcare and works towards empowering every individual with essential knowledge and skills, which would enable them to lead a healthy life.Services provided to the rural people through this programme include: OPD & Diagnostic Facilities: The number of patients at the Health Post has been growing substantially every year, reflecting the increasing faith of the rural community in our medical facilities. Till date, 61,628 patients have benefitted through OPD services. It also provides diagnostic facilities like urine and pregnancy test, haemoglobin, blood sugar and doppler test to the poor rural populace at nominal rates. Mother & Child Healthcare: This initiative is aimed at reducing infant and maternal mortality rates, besides improving the quality of life of the villagers.Given the fact that pregnancy and child-birth related deaths are high in India, SUNDESH is focused on promoting and motivating expecting mothers to go in for institutional deliveries. Dabur India Limited | 13 It is the number of children who have benefitted from our education-related initiatives till date, with 830 children having joined formal schools Eye Care Camps: SUNDESH takes care of the elderly by holding eye care camps at its Health Post and in villages. Cataract cases are even operated free of cost. Prevention of female foeticide: SUNDESH has organised workshops in Ghaziabad on prevention of female foeticide.Anganwadi workers were sensitized to make the community aware about the importance of girl child and improve the girl-boy ratio in the region. AIDS awareness: An awareness drive on HIV/AIDS was undertaken with CARE India Trust and UP State AIDS Control Society. This sought to reduce Sexually Transm itted Infections/HIV transmission among high-risk migrants in urban areas of Ghaziabad district in Uttar Pradesh. Education & Literacy The educational initiatives of SUNDESH for underprivileged children include nonformal education [6-14 years non-school going], special school for working children [8-13 years], emedial education [6-14 years school-going], besides holding classes for women between the age of 18 and 45 years. This programme's success is reflected in the fact that a host of mothers are now following their daughters and seeking admission at our adult education centre. Non-formal Education: SUNDESH holds classes for underprivileged children between 6 and 14 years of age. After completing their basic education, these children, who have either never had a chance to see a school from inside or are school dropouts, are then encouraged to get enrolled in formal schools.Income Generation Programmes Capability enhancement programmes have been introduced offering vocational train ing in cutting & tailoring, machine & hand embroidery, bee keeping, mushroom farming, mehandi application and vermi-composting. Still a long way to go†¦ Dabur believes in having a long-term relationship with communities in and around its operational area, and in providing sustenance to regions that remain isolated and neglected. A beginning has been made but there are still miles to go before the huge disparity is bridged and a better future delivered to both the rural and urban poor.

Saturday, September 28, 2019

The conventions of a romantic comedy on a midsummer night's dream by Essay

The conventions of a romantic comedy on a midsummer night's dream by william shakespeare - Essay Example Because of this love, Hermia refuses to get married to Demetrius, despite pressure from the father. In fact, Hermia plans to elope with Lysander to secretly get married to Lysander. Another instance of love is between Helena and Demetrius who were once engaged. In a bid to win the love of Demetrius, Helena tells him of the action that Lysander and Hermia intend to undertake (Quinton and William, 4). Another major convention depicted in this romantic comedy is the need of the lovers to overcome obstacles. The love between Hermia and Lysander is faced with an obstacle. The main obstacle in this love is the father of Hermia who favors Demetrius as opposed to Lysander. The penalty for defying a father is death, or condemnation as unmarried woman to a convent. Another instance is when Hermia challenges Helena to a fight, because of jealousy. This is with the belief that Helena was trying to take the love of Lysander away from her. This is after Puck put the love portion on the eyes of Lysander, making him fall in love to Helena. Another instance where love had to overcome an obstacle is the love between King Oberon, and the young Indian boy (Quinton and William, 9). It was the desire of King Oberon to transform the boy into a knight, a situation that his queen, Titania refused. The forced the king to make Queen Titania fall in love with Bottom, a ridiculous creature. Eventually King Oberon through this action managed to have the boy, and transform him into a knight. Another romantic convention contained in this comedy is that it contains miraculous or supernatural creatures. The creatures in this short story are fairies who on most occasions are involved in blessing sleeping couples. The king of these fairies is King Oberon, and his Queen Tatania. There is also Puck, the fairy servant of King Oberon, and Bottom, a miraculous creature whose head was transformed by Puck to look like that of an ass. Furthermore, happy endings are always brought about by

Friday, September 27, 2019

THE PAYG SYSTEM Essay Example | Topics and Well Written Essays - 500 words

THE PAYG SYSTEM - Essay Example The tax tables under PAYG system are structured to result in a refund when an Income tax return is processed. This refund culture encourages strong compliance with annual returns. PAYG also provides flexibility, ability to alter the taxation payments based on the current income received. PAYG has removed lack of equity in payment timing between individuals and companies. Henceforth, tax payers need to file only one form and make one payment for each quarter. PAYG allows the netting off Liabilities and credits. Tax payers like Individuals, Corporate, Trustees, Mutual insurance associates, etc having Business and Investment income are subjected to PAYG Installment system. A taxpayer is subjected to PAYG installment system if his most recent income tax assessment shows more than $2000 of gross investment or business income or if his recent income tax return resulted in a tax debt of over $500. PAYG installments are generally payable quarterly. The due dates by which quarterly installments are required to be paid are 28th July, 28th October, 28th February and 28th April. Certain tax payers like primary producers and Special professionals can pay two installments per year. These tax payers need to pay 75% of PAYG liability by 28th April and the balance by 28th July. A tax payer is eligible to opt for paying PAYG installment annually under the following circumstances: Payments made to tax payers having income other than business or Investment income like Salaries and wages, Pension Annuity, Dividend, Interest, Royalty are subjected to PAYG Withholding system. PAYG withholding is also applicable to payments to other businesses who do not quote Australian Business Number. Employers deduct tax according to the published tables from wages and the net amount is paid to employees. Employers send the amounts withheld to taxation office, hence this system is called Withholding system. Tax payer has to determine the status of the payees like

Thursday, September 26, 2019

Civil Committment of Sexual Offenders Essay Example | Topics and Well Written Essays - 1250 words

Civil Committment of Sexual Offenders - Essay Example Minnesota allows for civil commitment of sex offenders who have completed their jail terms, a provision that has been made in the Minnesota Commitment Act. The act reasons that civil commitment of sex offenders is a necessary measure to prevent dangerous sexual offences from occurring in the future (Barnickol, 2001). In California, civil commitment fro sex offenders is allowed under the Sexually Violent Predator Law. The provisions of the commitment law for sex offenders in California are the same as in Kansas and Minnesota. Other States that have adopted civil commitment laws for sex offenders who are deemed dangerous include: Washington, Missouri, Florida, Wisconsin, Massachusetts and Iowa (McCaffrey, 1994). One of the similarities that stand out in many of the sex offenders’ civil commitment laws in different states is the requirement that a criminal is likely to pose sexual offense danger to other people after he is released at the end of his jail term. The laws seek to ha ve violent sex predators who have some form of mental abnormality to be committed to involuntarily and indefinitely to appropriate facilities for treatment. The laws also require that such offenders must have completed their jail sentences. Although all the civil commitment laws in states that have adopted are largely similar, there are a few differences that exist. For instance, in the Texas legislation of civil commitment, a criminal is liable to commitment if he is found to have behavioral abnormality. This is different from the mental abnormality mentioned in other similar legislations (Prentky, Janus, and Barbaree, 2006). Different states have also taken different approaches in the management of civilly committed sexual offender populations. Florida for example, requires the offenders to be committed to be assessed by a qualified team so as to determine if they are sexually violent predators. The evaluation process is a civil proceeding after which those offenders found to meet the criteria are kept under watch at the Florida Civil Commitment Center together with other detainees who are still awaiting similar civil trials (McCaffrey, 1994). In Washington, evaluation of an offender’s state of mind is done by a Joint Forensic Unit whose members are forensic experts who deal specifically with risk evaluations related to sex offence. If the offender is fond to meet all the legal requirements for civil commitment, the King County Prosecutor’s Office or the Attorney General’s office then files a petition and a hearing is scheduled within 72 hours. If the superior court finds the offender to be a suitable candidate for a civil commitment trial, he is taken to the DSHS Special Commitment Center located on McNeil Island. During the trial, the jury or judge must determine without doubt that the offender is a sexually violent predator before he is transferred to a Secure Community Transition Facility (LaFond and Winick, 2003). Similar civil or c ourt hearings are scheduled for each offender who is regarded to have mental abnormality which makes him a danger to others in all the states where civil commitment for sexual predators has been legalized. After they are committed in specialized facilities, the sexual predators receive special treatment for a specified period to make them better members of society after which they are released to carry on with normal life. Costs vs. Benefits of Civil Commitment One of the benefits of civil

Wednesday, September 25, 2019

White Dwarf Stars Essay Example | Topics and Well Written Essays - 1250 words

White Dwarf Stars - Essay Example Mainly, white dwarfs’ string stretches through K-dwarf temperature region to approximately 4,000K (Kaler 182). Studies so far conducted refer these kind of stars as end state of evolved main sequence bodies having M less than 9M (Aerts & Christensen-Dalsgaard 111). However, their exact number is not well document due to numerous inaccuracies similar to the study of coolest main sequence dwarfs as well as brown dwarfs (Aerts & Christensen-Dalsgaard 111). Hence, prompting them to be more intriguing to study despite their varied aspects document by certain astronomical scholars including exact location in HRD diagram, which this study intends to highlight. Figure 1: Hertzsprung-Russel-Diagramm (HRD): White Dwarf location. 2010. Web. 16Th March 2014. Studies so far conducted contend temperatures for these stars in most cases usually range between 4,000K and 85,000K (Koupelis 408). However, these temperatures may be even higher under certain circumstances based on the extent of evolution or exhaustion of individual bodies comprising a given stream of galaxy (Koupelis 408). This implies exact measurements of their respective hotness are quite hard to ascertain and declare stars at certain region their exact temperature. Therefore, scientists end up giving temperatures with certain in term of ranges. Another intriguing aspect encompasses their respective masses whereby based on research they normally range between 0.02 and 1.4 solar masses (Koupelis 408). This is because a typical white dwarf is almost close to the size of planet earth (Koupelis 408). Hence, densities of these stars are quite high whereby approximately 106 cm3 grams. This implies a teaspoonful whose measure is about 5 cm3 would

Tuesday, September 24, 2019

Lecture Analysis & Plan Essay Example | Topics and Well Written Essays - 2500 words

Lecture Analysis & Plan - Essay Example Added to that, while some of the students have a health and life sciences background, obtained from courses taken at the university or high school, approximately half of the students had not. To further complicate matters, there are quite a few non-native speakers in the group numbering approximately nine. The implications of the aforementioned group characteristics are pertinent to lecture delivery and subsequent group absorption/assimilation, insofar as it means that some students have a pre-existing understanding of the material, while others do not, just as some will find the linguistic comprehension of the lecture quite challenging, while others will not. As for the lectures themselves, they are delivered in a large group lecture room in the science building. The lecture room is fitted with a number of technical visual aides. The diversity which characterizes this particular group means that group members have different learning styles and will respond best to particular teaching approaches. It is, accordingly, contingent upon the lecturer to vary his learning style as a strategy for reaching out to the audience and facilitating their understanding of lecture content. Some students are not cognizant of the university-level learning skills they need to develop, such as recognition of key lecture points, note-taking, critical thinking, and independent learning, such as which requires that they pursue independent learning and reading on lecture topics (Leonard, 2002). Conduct mini evaluation of lecture at the end so the lecturer will get an idea of how the students felt about the teaching/learning experience (these ideas have been produced from the authors own experience as a student & clinical teacher). Pace lectures so as not to cram too much information in too short a time, culminating in much of that information simply passing students by. In other words, â€Å"try to teach less, so students learn more† (Bligh, 2000, p. 216). Remind

Monday, September 23, 2019

My passion for Cooking Essay Example | Topics and Well Written Essays - 250 words

My passion for Cooking - Essay Example Cooking has been my passion since time immemorial; I have seen my mother cooking, and have always wished I was in her place. Cooking to me has come as second nature. I believe I have a unique skill set as far as cooking is concerned, not because I can cook everything, but because whatever I cook is always appreciated and liked by others. I may not be the jack of all trades, but surely I am the master of cooking. I love cooking for myself and for everyone else. So when it’s a friend’s party or a family dinner I am always approached for the right menu and right meals. I consider myself as a master in this field because I believe I know the right mix of ingredients even if they are not explicitly mentioned in the recipe. I have an intuitive power when it comes to cooking, I can figure out my way and determine the right approach to cooking without any rational thinking. Part of the reason behind my success in this field, is my curiosity and urge to find out more about cooki ng all the time. I spend several hours searching for tips on the web and exploring recipes of well-known experts round the globe. My favorite dish as far as cooking is concerned is the Italian Pizza. Many people find it difficult to bake the crust of the pizza and often do not end up getting the right crispiness (MacKenzie). Either the crust turns out to be too fluffy or too thin. However, my crust somehow is always appropriately baked; it is never burnt. Pizza is something I like cooking the most because it is something that I love the most whenever I’m hungry I know the pizza is just a few hours away.

Sunday, September 22, 2019

Grant proposal Research Example | Topics and Well Written Essays - 1250 words

Grant - Research Proposal Example In many instances, these convicted felons are injured while in correctional facilities and due to the lack of funds due to their poor backgrounds, LITTLE Engineers aim at improving the quality of life of such students in correspondence to CCPH aims by restoring their health. The drastic positive shift of this technology influences business, society, and government. We plan to collaborate with other organizations like the Federal Bonding Program, Work Opportunity Tax Credit, and Workforce Investment Act (WIA) that look into the welfare of such students including the University of Houston Graduate College, which will further the skills of the convicted felons. METHODS: The Work Opportunity Tax Credit and Federal Bonding Program help us manage our foundation with the local Houston community center. A family oriented approach incorporated in the rehabilitation process of the convicted felons. As a result, our program has a limited number of individuals, which leaves the convicted felons feeling like a family and embrace the new technologies that build their self-esteem and restores their health. Moreover, the training curriculum incorporated in the program is healthy in terms of preventing the felons from engaging in illegal activities. We have an on-the-job-training environment for technology, information, and training for customer skills. OBJECTIVE: In Houston, the number of convicted felons is rising and is affecting the development of Houston and other major Texas cities. There are programs offered by Houston and Texas governments, but they are not able to accommodate the rising numbers of convicted felons. As a result, our program plans to reach out to 100 students and give them a chance to reach their dreams by restoring their lives and that of their other convicts. The collaborative effort of employees and staff personnel has seen the convicts benefit from the information and skills impacted and offered by LITTLE Engineers. These convicts are the future lead ers and as an organization, we have seen the need to advocate for promoting hard work, commitment, and embracing of new technology in the society. The work ethic and dedication they learn from LITTLE Engineers will help them learn and utilize the knowledge for the rest of their lives. As a result, the lives of both college students and the community will be changed forever. LITTLE Engineers Overview The rise of immoral behavior is a factor that has contributed to the rise of school dropouts in major cities and towns (Marchevsky and Theoharis ). The Federal Bonding Program, Work Opportunity Tax Credit, and Workforce Investment Act (WIA) has been able to team up with the LITTLE Engineers in overseeing the activities of community building through healthy living education workshops. LITTLE Engineers are aware of the need to familiarize students with the technological systems in the medical field and have formed partnerships with other organizations to give rehabilitation services to be able to succeed in the current work environment. Background Convicted felons in the United States have increased at an alarming rate that has brought the attention of many organizations because the health of young people is in jeopardy. It

Saturday, September 21, 2019

Racial Diversity in Society Worksheet Essay Example for Free

Racial Diversity in Society Worksheet Essay Complete the following using the MySocLab Social Explorer Map: Income Inequality by Race (located on the student website) as a reference: †¢Select 1 racial group from the list below: African American Asian American Arab American Hispanic American/Latino White/Caucasian †¢Write a 150- to 300-word summary of the economic, social, and political standings of that group. Use additional resources if necessary, from the University Library or your textbooks. Provide citations for all the sources you use. Hispanic Americans or Latinos in America descend from many different countries such as Mexico, Puerto Rico, Cuba, and The Dominican Republic. They come to the United States as immigrants for a variety of different reasons, but the most common is that they come here in search of the American Dream. From an economic point of view Hispanics remain at the bottom of the job ladders due to the fact that many of them are not educationally equipped and are not fluent in English which are both necessities when it comes to the jobs in demand. Their lack of formal education is what is keeping them down in our nation’s technology run job market. Studies show that less and less Hispanic Americans are finishing high school, and without the skills that education will teach them they will continue to flounder in todays economy. When it comes to social statistics it is overwhelmingly clear that faith and family have and continue to be the cornerstone of the Hispanic American Family values and a huge part of their religious based culture. Politically, due to the fact that the majority of  Hispanic Americans are lower or middle cla ss, they tend to agree with the democratic views when it comes to politics. Part II Answer the following in 50 to 150 words each. Provide citations for all the sources you use. †¢What is racism? In what ways does racism affect diversity? Racism can be defined as the belief that a specific racial group is superior or inferior to another and that there is nothing that any individual who belongs to that racial group does (economically, socially, politically) can change it. Racism affects diversity through outlets such as discrimination and prejudice that we hold against one another due to the fact that our skin is not all the same color. Today, we hear words like that (prejudice and discrimination) and we are quick to object to the accusation that we can still, after all we as a nation have overcome when it comes to touchy subjects like this, be guilty of such negative ways of thinking. However, it is clear that some things clearly have not changed when we look at statistics that show that in American society whites are still hired for high paying jobs in greater numbers than minorities with the same credentials or that minorities still seem to make up the majority of inmate populations in todays prisons. †¢How do racial groups interact in contemporary America? Are interactions positive, negative, or neutral? Support your response using proper citations. Today, it is not uncommon for racial groups to interact with each other in a mostly positive way due to the fact that in most communities we are not separated based on our racial background when it comes to things such as the schools we attend and jobs that we are allowed to hold like we have been in the past. This is thanks to desegregation and affirmative action laws that have been put into action over the past several years. However, even with these laws we are not a perfect nation and there is still cases where social  inequities can allow discrimination and prejudices to rear their ugly heads in today’s society. Social inequities can affect a particular races basic human rights such as the right to live in a certain area, be hired for a certain job, be able to travel freely, acceptance into schools or colleges, and even the right to vote. †¢Are there existing social inequities based on race? Why or why not? Social inequities is one of those touchy subjects that some people say still exist and some people say does not. Like many subjects similar to this one (racism in general, prejudice, and discrimination) people’s views on it can differ tremendously. Some speak from experience and some speak on it based on facts that they are taught. I’ll touch on an example that I previously mentioned to support the argument that yes, social inequities are existent in today’s society. When you look at prisons today, it is clear that minorities make up a much larger chunk of the inmate population than whites. People who argue that social inequities are the cause of this say that this is a result if whites having always been a more protected race in the US and because of this so called protection, they are favored in the justice system and are given more access to better attorneys. People who support the idea that social inequities don’t exist can of course use the argument t hat the reason that minorities make up most of the inmate population is simply because they are the ones who are responsible for committing the crimes that get them in trouble in the first place. †¢What do you believe to be the causes of racial prejudice and discrimination in today’s society? Looking back at our Nation’s history, it’s clear that racism has and continues to be a problem here. However, it’s also clear that he have taken huge steps, which include legal actions, in order to eliminate it. Unfortunately it is not something that can be completely abolished overnight, and we have to have patience in order to keep the movement pressing forward. The awareness that courses such as this one provides are also great tools when it comes to educating more people on the issue, the  causes, and what can be done to keep it from spreading. I believe that the main cause of racial prejudices is the fact that although as a nation (united) we are against it there are still individual people and families amongst us who refuse to stop it in their personal lives and who continue to teach it to their children generation after generation. Racism is something that is taught, as there is now way for it to be passed genetically or inherently. References Braubach, M. (2010, January 4). Social inequities in environmental risks associated with housing and residential location—a review of evidence. Oxford Journals. Retrieved from http://eurpub.oxfordjournals.org/content/20/1/36.abstract?sid=4aa802c1-b338-41e1-b724-eef7ecee7791 Huffman, A. (2012, November 15). How Hispanics Impact Political, Social and Economic Climate. Charisma News. Retrieved from http://www.charismanews.com/us/34581-how-hispanics-impact-political-social-and-economic-climate Schaefer, R. T. (2012). Racial and Ethnic Groups (13th ed.). : Merrill Prentice Hall.

Friday, September 20, 2019

Advantages And Disadvantages Of Paging And Segmentation Computer Science Essay

Advantages And Disadvantages Of Paging And Segmentation Computer Science Essay To use the processor and the I/O facilities efficiently, it is desirable to maintain many processes, as possible, in main memory. In addition, it is desirable to free programmers from size restrictions in program development than to restrict them with small sizes (that happened in the older computers). The restriction to a predefined size redirects the programmers effort from the use of better programming techniques to a continuously effort to make fit in that size a solution, not necessarily the optimal one. The way to address both of these concerns is virtual memory (VM). Virtual memory systems are an abstraction of the primary memory in a von Neumann computer. Even in a time of decreasing physical memory costs, contemporary computers devote considerable resources to supporting virtual address spaces that are much larger than the physical memory allocated to a process. Contemporary software relies heavily on virtual memory to support applications such as image management with huge memory requirements. (Sami Hamed ,2007) . 1.1 Implementing Virtual Memory To basic approaches to providing virtual memory are: paging and segmentation. Paging. With paging, each process is divided into relatively small, fixed-size pages. Paging systems transfer fixed-sized blocks of information between primary and secondary memories. Because of the fixed pages size and page frame size, the translation from a binary virtual address to a corresponding physical address is relatively simple, provided the system has an efficient table lookup mechanism. Paging systems use associative memories to implement page translation tables. Paging uses single-component addresses, like those used to address cell within any particular segment. In paging, the virtual address space is a linear sequence of virtual address (a format that differs from the hierarchical segmentation address space. In a paging system, the programmer has no specific mechanism for informing the virtual memory system about logical units of the virtual address space, as is done in segmentation. Instead, the virtual memory manager is completely responsible for defining the fixed-s ize unit of transfer the page to be moved back and forth between the primary and secondary memories. The programmer need not be aware of the units of virtual address space loaded into or unloaded from the physical memory. In fact, the page size is transparent to the process. ( Philip ,1998) . Segmentation. Segmentation provides for the use of pieces of varying size. It is also possible combine segmentation and paging in a single memory-management scheme. Segmentation is an alternative to paging. It differs from paging in that the unit transfer between primary and secondary memories varies. The size of the segments, are also explicitly known by the programmer. Translating a segment virtual address to a physical. Segmentation is an extension of the ideas suggested by the use of relocation-limit registers for relocating and bound checking blocks of memory. The program parts to be loaded or unloaded are defined by the programmer as variable-sized segments. Segment may be defined explicitly by language directives it implicit by program semantics as the: text, data and stack segments created by the UNIX C compiler. Address is more complex that translating a paging virtual address. (Michael , 2008) . 1.2 Process Management Process management refers to the full spectrum of as services to support the orderly administration of a collection of processes. The processor manager is responsible for creating the environment in which the sequential process executes, including implementing resource management. The community of processes that exists in the as at any given time is derived from the initial process that is created when the computer begins operation. The initial process boots up the as , which, in turn, can create other processes to service interactive users, printers, network connections and so on. A program image is created from a set of source modules and previously compiled library modules in relocate-able form. The link-editor combines the various relocate-able object modules to create an absolute program in secondary memory. The loader places the absolute program into the primary memory when a process executes the program. The program image, along with other entities that the process can reference, constitutes the process address space. The address space can be stored in different parts of the machines memory hierarchy during execution. 1.3 compares their advantages and disadvantages of Paging and Segmentation Advantages of Paging and Segmentation Disadvantages of Paging and Segmentation Paging No external fragmentation Segments can grow without any reshuffling Can run process when some pages are swapped to disk Increases flexibility of sharing Segmentation Supports sparse address spaces Decreases size of page tables If segment not used, not need for page table Increases flexibility of sharing of Both Increases flexibility of sharing Share either single page or entire segment Overhead of accessing memory à ¢Ã¢â€š ¬Ã‚ ¢ Page tables reside in main memory à ¢Ã¢â€š ¬Ã‚ ¢ Overhead reference for every real memory reference Large page tables à ¢Ã¢â€š ¬Ã‚ ¢ Must allocate page tables contiguously à ¢Ã¢â€š ¬Ã‚ ¢ More problematic with more address bits Page table size Assume 2 bits for segment, 18 bits for page number, 12 bits for offset 2.0 Mapping Function Algorithm to block the memory card side cache lines. Method Which country is necessary to define a cache block busy. Three techniques used: direct, associative and associative. Associative Mapping In associative mapping, when a request is made for cash, the requested address is compared in the same directory with all entries in the directory. If the requested address is found (directory hit), the appropriate place in the cache is fetched and returned to the processor, otherwise, a miss occurs.(figure 1) . Associative Mapping Cache Figure (1), (Philip ,1998) Associative Mapping Summary Address length = (s+w) bits Number of addressable units = 2^(s+w) words or bytes Block Size = line size = 2^w words or bytes Number of blocks in main memory = 2^(s+w)/2^w = 2^s Number of lines in cache = undetermined Size of tag = s bits Associative Mapping Pros and Cons Flexibility as to which block to replace when a new block is read into cache Replacement algorithms designed to maximize cache hit ratio Complex circuitry required to examine the tags of all cache lines in parallel direct mapping In a direct mapping cache Lower Row address bits are used to access the directory. Several address line card in the same place in the cache directory, upper address bits (tag bits) should be compared with address to ensure a hit. If the comparison is not valid, the result is a cache miss, or simply a miss. The address given to the cache by the processor actually is subdivided into several pieces, each of which has a different role in accessing data (figure 2) . Direct Mapping Cache Figure (2), (Philip ,1998) set associative Mapping Operates in a fashion somewhat similar to the direct-mapped cache. Bits from the line address are used to address a cache directory. However, now there are multiple choices: two, four, or more complete line addresses may be present in the directory. Each of these line addresses corresponds to a location in a sub-cache. The collection of these sub-caches forms the total cache array. In a set associative cache, as in the direct-mapped cache, all of these sub-arrays can be accessed simultaneously, together with the cache directory. If any of the entries in the cache directory match the reference address, and there is a hit, the particular sub-cache array is selected and out gated back to the processor (figure 3 ) (William , 2000) Set Associative Mapping Cache Figure (3) ,(Philip ,1998) 2.4 Replacement Algorithms Direct Mapping No choice Each block only maps to one line Must replace that line Associative and Set Associative. Must be implemented in hardware for speed. Most effective Least Recently Used (LRU) Replace the block in the set that has been in cache the longest with no references to it . 2-way set associative each line includes a USE bit . First-in-first-out (FIFO) Replace the block in the set that has been in the cache the longest. Uses a round-robin or circular buffer technique . Least Frequently Used (LFU) . Replace the block in the set that has experienced the fewest references. Associate a counter with each line Pick a line at random not based usage . Only slightly inferior in performance to algorithms based on usage . 3.0What is RAID The basic idea of RAID (Redundant Array of Independent Disks) is to combine multiple cheap disks in an array of disk drives to obtain performance, capacity and reliability that exceeds that of a large disk. The array of drives appears to the host computer as one logical drive. The Mean Time Between Failure (MTBF) of the array is equal to the MTBF of an individual drive, divided by the number of drives in the array. Because of this, the MTBF of a non-redundant array (RAID 0) is too low for mission-critical systems. However, disk arrays can be made fault tolerant by redundantly storing information in various ways. Five types of array architectures, RAID 1 to RAID 5 were originally determined each provides disk fault tolerance with different compromises in features and performance. In addition to these five redundant array architectures, it has become popular to refer to a non-redundant array of disk drives as a RAID 0 array. RAID 0 is the fastest and most efficient array type but offers no fault tolerance. RAID 0 requires a minimum of two drives. (William , 2000). 3.1 Performance and Data Redundancy Increasing Logical Drive Performance Without an array controller, connecting extra physical disks to a system increases the total storage capacity. However, it has no effect on the efficiency of read/write operations, because data can only be transferred to one physical disk at a time (see Figure 3). Figure (3) ,(William , 2000) With an array controller, connecting extra physical disks to a system increases both the total storage capacity and the read/write efficiency. The capacity of several physical disks is combined into one or more virtual units called logical drives (also called logical volumes). The read/write heads of all of the physical disks in a logical drive are active simultaneously; improving I/O performance and reducing the total time required for data transfer (see Figure 4). (William, 2000) Figure (4), (William , 2000) Because the read/write heads for each physical disk are active simultaneously, the same amount of data is written to each disk during any given time interval. Each unit of data is called a block. The blocks form a set of data stripes that are spread evenly over all the physical disks in a logical drive (see Figure 5), (William, 2000). Figure (5) ,(William , 2000) For data in the logical drive to be readable, the data block sequence must be the same in every stripe. This sequencing process is performed by the Smart Array Controller, which sends the data blocks to the physical disk, writing the heads in the correct order. In a striped array, each physical disk in a logical drive contains the same amount of data. If one physical disk has a larger capacity than other physical disks in the same logical drive, the extra capacity cannot be used. A logical drive can extend over more than one channel on the same controller, but it cannot extend over more than one controller. Disk failure, although rare, is potentially catastrophic to an array. If a physical disk fails, the logical drive it is assigned to fails, and all of the data on that logical drive is lost. (Peng, Hai , Xinrong ,Qiong Jiangling , 1997) . 3.2 differences among all RAID levels RAID 0 is the fastest and most efficient array type but offers no fault tolerance. RAID 0 requires a minimum of two drives. RAID 1 is the best choice for performance-critical, fault-tolerant environments. RAID 1 is the only choice for fault-tolerance if no more than two drives are used. RAID 2 is seldom used today since ECC is embedded in all hard drives. RAID 2 is not supported by Adaptec RAID controllers. RAID 3 can be used to speed up data transfer and provide fault tolerance in single-user environments that access long sequential records. However, RAID 3 does not allow overlapping of multiple I/O operations and requires synchronized-spindle drives to avoid performance degradation with short records. Because RAID 5 with a small stripe size offers. Similar performance, RAID 3 is not supported by Adaptec RAID controllers. RAID 4 offers no advantages over RAID 5 and does not support multiple simultaneous write operations. RAID 4 is not supported by Adaptec RAID controllers. RAID 5 combines efficient, fault-tolerant data storage with good performance characteristics. However, write performance and performance during drive failure is slower than with RAID 1. Rebuild operations also require more time than with RAID1 because parity information is also reconstructed. At least three drives are required for RAID 5 arrays. RAID-6 Striped data with dual distributed parity RAID-6 is the same as RAID-5 except that it uses a second level of independently calculated and distributed parity information for additional fault tolerance. This extra fault tolerance provides data security in the event two drives fail before a drive can be replaced. While this RAID level does provide greater fault tolerance than level 5, there is a significant loss in write performance due to the requirement for storing parity twice for each write operation. A RAID-6 configuration also requires N+2 drives to accommodate the additional parity data, which makes it less cost effective than RAID-5 for an equivalent storage capacity. RAID 10 Stripe set of mirrored arrays RAID 10 (also called RAID 0/1) is a combination of RAID levels 0 and 1. In this type of implementation a RAID-0 stripe set of the data is created across a 2-disk array for performance benefits. A duplicate of the first stripe set is then mirrored on another 2-disk array for fault tolerance. While this configuration provides all of the performance benefits of RAID-0 and the redundancy of RAID-1, this level is very costly to implement because a minimum of four disks are necessary to create a RAID 10 configuration. NOTE A RAID 10 configuration can continue operations even when two disks have failed, provided that the two disks not part of the same RAID-1 mirror set. RAID 50 Stripe set of parity arrays RAID level 50 (also called RAID 0/5) is a combination of RAID levels 0 and 5. Multiple RAID-5 arrays are striped together using RAID-0. Parity is maintained separately for each RAID-5 group in the striped array. This level provides the same advantages of RAID-5 for small data transfers with the added performance of striping for disk read/write operations. Also, because parity is calculated independently for each RAID-5 component, if one array is degraded the effect on overall operations is not as significant as for a single RAID-5 array. However, the overhead incurred by RAID-5 parity generation is still present. Normally this does not cause noticeable degradation unless you are dependent on software-based XOR functionality or have a large number of disks in the array. RAID subsystems that support hardware-based XOR should provide performance nearly equal to a RAID-0 configuration with the added protection of data parity information in the event of a disk failure. A minimum of six disks are required for a RAID 50 configuration. NOTE A RAID 50 configuration can continue operations even when two disks have failed, provided that the two disks are not part of the same RAID-5 parity group.(Adaptec inc. (n. d.)) .

Thursday, September 19, 2019

Radio Shacks Termination of Employees Essay -- Corporate Communicatio

Radio Shack As the economy continues to be unstable companies, large and small, are making decisions to reduce their workforce. This is a daunting task that has to be handled delicately. When companies begin the process of reduction, even if the staff is aware, the communication must be honest, open and appropriate. If a company is a large retailer there is more at stake than just the current financial situation. The employees can become customers and advocates for the business. They can also become the customers of the competitors and communicate to others the bad experience. In 2006 Radio Shack was on a turnaround plan (O’Rourke, 2010). This plan included a reduction of workforce of about 400 employees. Employees were aware this was the plane, but were taken by surprise that when the â€Å"pink slip† came through as an email. Most employees received this at the same time and were given a limited amount of time to gather their belongings and say goodbye. This action cau sed a backlash of publicity. For Radio Shack to continue and regain trust of the employees and public they will need immediate training in communication standards to further avoid any other incidents. Secondly, they must reach out the employees that received the email and lastly work on a new mission statement and culture to match with where the company is heading. Communication training Understanding the audience is a very important piece to communication (O’Rourke, 2010). For Radio Shack to change perspectives of the current employees and public, and to avoid further incidents, the leadership team needs to complete communication training. When a company has made a decision that could impact current and future employees they must focus on how to n... ... because the this decision by communication training for remaining leadership, reaching out to the employees that were terminated and changing the culture an mission statement during a time of transition. By attempting to complete these tasks Radio Shack has a possibility of continued growth after transition and the possibility of not losing the successful employees they still have. Works Cited Finnie, R. r., Sniffin, P. B., & College and Univ. Personnel Association, W. C. (1984). Good Endings: Managing Employee Terminations. Retrieved from EBSCOhost. Krapels, R. H., & Davis, B. D. (2000). Communication Training in Two Companies. Business Communication Quarterly, 63(3), 104-110. Retrieved from EBSCOhost. O’Rourke, J. S., IV (2010). Management communication: A case-analysis approach (4th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN-13: 9780136079767 Radio Shack's Termination of Employees Essay -- Corporate Communicatio Radio Shack As the economy continues to be unstable companies, large and small, are making decisions to reduce their workforce. This is a daunting task that has to be handled delicately. When companies begin the process of reduction, even if the staff is aware, the communication must be honest, open and appropriate. If a company is a large retailer there is more at stake than just the current financial situation. The employees can become customers and advocates for the business. They can also become the customers of the competitors and communicate to others the bad experience. In 2006 Radio Shack was on a turnaround plan (O’Rourke, 2010). This plan included a reduction of workforce of about 400 employees. Employees were aware this was the plane, but were taken by surprise that when the â€Å"pink slip† came through as an email. Most employees received this at the same time and were given a limited amount of time to gather their belongings and say goodbye. This action cau sed a backlash of publicity. For Radio Shack to continue and regain trust of the employees and public they will need immediate training in communication standards to further avoid any other incidents. Secondly, they must reach out the employees that received the email and lastly work on a new mission statement and culture to match with where the company is heading. Communication training Understanding the audience is a very important piece to communication (O’Rourke, 2010). For Radio Shack to change perspectives of the current employees and public, and to avoid further incidents, the leadership team needs to complete communication training. When a company has made a decision that could impact current and future employees they must focus on how to n... ... because the this decision by communication training for remaining leadership, reaching out to the employees that were terminated and changing the culture an mission statement during a time of transition. By attempting to complete these tasks Radio Shack has a possibility of continued growth after transition and the possibility of not losing the successful employees they still have. Works Cited Finnie, R. r., Sniffin, P. B., & College and Univ. Personnel Association, W. C. (1984). Good Endings: Managing Employee Terminations. Retrieved from EBSCOhost. Krapels, R. H., & Davis, B. D. (2000). Communication Training in Two Companies. Business Communication Quarterly, 63(3), 104-110. Retrieved from EBSCOhost. O’Rourke, J. S., IV (2010). Management communication: A case-analysis approach (4th ed.). Upper Saddle River, NJ: Prentice Hall. ISBN-13: 9780136079767

Wednesday, September 18, 2019

The Message in John Miltons Paradise Lost :: free essay writer

Paradise Lost is an epic of epic proportions! It chronologs the designs of Satan, the fall of the angels, the creation and subsequent fall of man from paradise, and finally ends with some hope for a paradise regained. At first glance it seems to be two epics rolled into one. The book begins right away introducing us to the would be protagonist, Satan, up against an indominable force, God. We are made to sympathise with Satan's plight and almost admire him or hope for his success. There is a certain excitement and allure to Satan and even to Hell. But, quickly our hero begans to degenerate right before our eyes in book III with the introduction of God and Christ. The focus on Satan seems to be all but abandoned with the introduction of man, and now Satan only plays a sinister role in a new story centered around our greatest ancestor, Adam. We are painfully reminded of our initial affiliation with Satan and his doomed aspirations when Rapheal recounts the war in heaven in book VI. It seems the first epic revolving around Satan was over before it was started, and now our would be underdog threatens us by threatening our new protagonist in Adam. The brief warnings of Raphael are not enough to preserve paradise and save Adam & Eve from the vengence of the Devil. It seems our hero is destined to ruin once again, but this time there is hope. Man turns out to be more repentant than Satan, and God turns out to be a little more leniant to man. Adam and Eve are still banished from Paradise but the oppurtunity for inner paradise is still offered before them by the angel Michael. Which leads me to my comment earlier about Paradise Lost seeming like two epics (the plight of Satan and then that of man). But, really Paradise Lost is like three epics, because there is a third story, that of the reader. Milton paints the characters with such a humanity that they all become real people and not just the entities of some Sunday school lesson. Because of this, we find ourselves initially enamoured with Satan and his "heroic" aspirations, but quickly we get slapped on the hand by our hero's destruction. Then we are taken by the arguments of Eve & Adam and are made to question some of God's actions when it comes to informing them and protecting them, so we then go through the fall with them.

Tuesday, September 17, 2019

A Day In The Life Of A Gnome :: essays research papers

A Day in the Life of a Gnome Once upon a time there was a gnome named Knob, who lived the far off land of Gnomania. Gnomania is a huge underground lair with only one entrance. The only entrance to this lair is by swimming down to the bottom of the ocean floor and knocking on a large clam. On the other side of this clam is an old grouchy gnome named Stubby whose only job was to keep the clam clean, and listen for the knock of incoming visitors. To assist Stubby in guarding the clam, he had a pet snark. A snark is an animal or pet that can be used as a watchdog. One day Knob went to visit his grandmother in the land of Gnollie which is about a guzillion centimeters away from Gnomania. On his way to his grandmother's house he ran across a garden. Upon stumbling on the garden, he decided to be thoughtful and pick some tulips for his grandmother. Tulips were her favorite snack. While approaching his grandmother's house, he found something to be very strange. His grandmother was hovering on an hummingbird, while picking apples from her tall twenty-foot appletree. After contemplating on this strange doing, he decided not to let it bother him. After seeing Knob approach her house, Knob's grandmother whistled for the hummingbird to bring her down so she could greet him. She greeted him with a loud burp which was a common courtesy among Gnomanians. After greeting him she also sprinkled him with some of her fairy dust. She handily carried it around in her turban. She naturally invited him in for dinner where they ate lots of mosquitoes. After dinner, they watched a cheap imitation of television. They used a big box to put different animals in and called it the Discovery channel. By the end of the day Knob was getting a little weary, so he decided to return home. When he returned form Gnollie his pet snark was there to welocme him home. He welcomed his snark back by feeding it fisheyes or to us humans dog biscuits. After the short snack, Knob and his snark went back to his teepee where they hibernated until the next morning. The next day Knob met up with his friend Door. Door was a runaway gnome who lived on the streets of Gnomania. They met one day by accident. Since Door lived on the streets, he had to steal food to survive. One day when Door was running away from a gardener he ran full speed into Knob.

Monday, September 16, 2019

The Continual Emerging Threat and Use of Weapons of Mass Destruction By Terrorist Organizations to the United States of America

The utilization of Weapons of Mass Destruction (WMD) by terrorist groups and states alike will continue to threaten the U. S. Homeland and its interests abroad. The National Intelligence Council (NIC) provided the following estimate of this emerging threat in its December 2000 analysis of global trends through the year 2015 (Cordesman, 2002).Strategic WMD threats, including nuclear missile threats in which (barring significant political or economic changes) Russia, China, most likely North Korea, probably Iran, and possibly Iraq have the capability to strike the United States, and the potential for unconventional delivery of WMD by both state or non-state actors also will grow (p. 3).The NIC report additionally goes on to discuss the accessibility and advancement of technology for WMD will increase, saying: Prospects will grow that more sophisticated weaponry, including weapons of mass destruction–indigenously produced or externally acquired–will get into the hands of s tate and non-state belligerents, some hostile to the United States. The likelihood will increase over this period that WMD will be used either against the United States or is forces, facilities, and interests overseas (p. ). For these and other reasons, individuals in the security and law enforcement profession need to continue to maintain their focus on the capabilities and the potentiality of WMD use by a variety of interests. I use this paper as an opportunity to further educate myself on the use of WMD by terrorist organizations. I do this by giving an overview of the many types of threats that fall into the category of WMD, to include chemical, biological, radiological, and nuclear.I then continue my education by looking at the countries involved with WMD. I'll conclude the paper with looking specifically at some of Iraq's capabilities and programs. Chemical weapons pose significant threats to both the civilian populace and military organization. One of the biggest reason chemi cal weapons pose such a threat to both of these groups is the psychological effect caused by their use. Although chemical weapons are no more lethal then conventional weaponry, they cause great fear when even someone thinks of them being used.The most common example would be the exploitations of the media and the footage seen of the Kurds in Iraq when Saddam Hussein used blister and nerve agents. Not only were there dead civilians laying in the streets, but gruesome pictures of the effect that these agents have on the body, both to those killed and survivors. â€Å"Chemical weapons are weapons of terror and intimidation as well as a means of producing casualties and physical destruction† (Cordesman, 2002, p. 101). In 2003 the Department of Defense (DoD) stated that most forms of CW are employed in the liquid form, called droplets.Droplets make the substance more stable and easy for use in weaponry. The DoD also put chemical weapons into two categories, persistent and nonpersi stent–persistent lasting for days, and nonpersistent only lasting from minutes to hours (Defenselink, 2003). The U. S. Centers for Disease Control (CDC) put CWs into a few distinct categories, these being; nerve agents such as VX, blood agents like hydrogen cyanide, blister agents like sulfur mustards, and pulmonary agents like chlorine. The latter are the more commonly used and known, but there are also many more†¦ specially the ones that fall into the commercial category, such as metals, pesticides, etc†¦ (Kahn & Levitt, 2000). Most organizations wishing to use some type of WMD tend not to turn to chemicals as their primary weapon. There are many challenges facing someone that wants to effectively employing CWs. The DoD (Defenselink, 2003) lists a variety of issues concerning the factors that must be considered. These factors include; agent type, how it will be disseminated, amount available to be disseminated (droplet size), meteorological conditions, including t emperature, wind speed and direction.Without the right combination of all of these factors, the desired outcome will be greatly reduced. An additional challenge is that of actually acquiring and/or producing a chemical to be used as a weapon. The Gilmore Commission (1999) gives the following example for explaining just how difficult it would be. It has sometimes been claimed that producing sarin and other nerve agents is a relatively easy process, to the extent, according to one authority, that â€Å"ball-point pen ink is only one chemical step removed†.While sarin may be less complicated to synthesize than other nerve agents, the expertise required to produce it should not, however, be underestimated. The safety challenges involved would, at a minimum, require skill, training, and special equipment to overcome. For this reason, the level of competency required for producing sophisticated chemical nerve agents, including sarin, will likely be on the order of a graduate degree in organic chemistry and/or actual experience as a organic chemist–not simply a knowledge of college-level chemistry, as is sometimes alleges (p. 91).Although the Gilmore Commission points the necessity to have the required level of expertise for composing chemicals into weapons grade, there are many countries that already posses a vast array of CWs. Terrorist organizations without access to CWs or the expertise to produce them, resort to using resources they do have (normally money, but sometimes services) to exchange with countries that do have CWs. According to Cordesman (2002) the following countries are potential national threats because of their chemical weapons program: China, India, Iran, Iraq, Libya, North Korea, Pakistan, and Russia.Russia has the largest stockpile, 40,000 metric tons of chemical agents. Even more frightening is that reportedly some of this stockpile is comprised of â€Å"new agents†. These new agents are designed to circumvent Western detec tion methods and can be hidden within commercial chemical plants. The employment challenges of CWs are far out-weighed by the vast capability to acquire them, and the terror effect they have. Biological Weapons (BW) pose a significant risk to U. S. interests for many reasons. There are a wide range of agents with many different effects and they offer a wide range of ways to attack American citizens, crops, and livestock† (Cordesman, 2002, p. 135). The World Health Organization (2000) explained the significance of BW and diseases by recounting history, pointing out Napoleon's devastating retreat from Moscow. This wasn't caused by the great Russian Army or even the cold temperatures of the Russian winter, but because of typhus, a louse-borne infection that reduced his army from 655,000 to 93,000.Cordesman (2002) states that there are five categories: bacterial agents such as anthrax, rickettsial agents like the Rocky Mountain spotted fever, viral agents like small pox, toxins in cluding botulinum, and fungal agents. The above agents are the major ones that would be used to pose a threat to humans, there are many others that would affect plant and animal life. The Center for Disease Control (Kahn & Levitt, 2000) further categorizes agents that are a threat to national security, labeling them â€Å"high priority†. These high priority agents: â€Å"- can be disseminated or transmitted person-to-person cause high mortality, with potential for major public health impact – might cause public panic and social disruption; and – require special action for public health. † As with chemical weapons, biological weapons offer a psychological threat, but additionally the BWs bring a great deal of physiological issues. Much of the challenge with biological weapons occurs when trying to detect that one (or many) have been used. There are many ways that BWs could be used covertly, and the medical symptoms becoming visible long after the terrorist has departed.The CDC (Kahn & Levitt, 2000) outlines this fact and emphasizing the importance of early detection by the public health infrastructure by giving this scenario: Only a short window of opportunity will exist between the time the first cases are identified and a second wave of the population becomes ill. During that brief period, public health officials will need to determine that an attack has occurred, identify the organism, and prevent more casualties through prevention strategies (e. g. , mass vaccination or prophylactic treatment).As person-to-person contact continues, successive waves of transmission could carry infection to other worldwide localities. Another twist that a terrorist might use to inhibit the effective detection is to employ a variety of different BWs at the same time. Health care workers would potentially read the symptoms of only one of them used, while the other continues to grow, infect further, and kill. In addition to BWs being very opportunisti c for covert use, the DoD (Defenselink, 2003) says that BWs are preferable to chemical or nuclear WMD because of being very compact and low in weight.The DoD additionally went on to say that the â€Å"dissemination of infectious agents through aerosols, either as droplets from liquid suspensions or by small particles from dry powders, is by far the most efficient method† (Defenselink, 2003, p. 5). A Russian assessment of microbiological agents mostly likely to be used identified eleven. The top four were smallpox, plague, anthrax, and botulism. These were at the top because of the ability to be used as an aerosol, and their theoretical lethality rates being 30 percent to 80 percent and because of their capability to be massed produced (Henderson, 1999).There are two countries besides the United States that are well know for their pursuit of weaponizing biological weapons, Iraq and the Soviet Union. In 1975 the Soviet Union used the biotechnology industry as a front for its we apons program, called Bioprepart†. The program had the capability to mass thousands of tons of agents and distribute and store them strategically throughout the Soviet Union. The program also included the ability to rapidly produce these stored agents to weapons grade levels (Alibek, 1999).According to some intelligence analysis this program involved 60,000 to 70,000 personnel (Roberts, 2000). Even more alarming was that a vast amount of these were â€Å"infectious agents designed to follow up a strategic nuclear attack on the United States with contagious diseases designed to decimate the population (Alibek, 1999). Although the looming threat to the United States from the former Soviet Union isn't as prevalent with the ending of the Cold War, the possibility of these technologies and actual agents falling into the hands of rogue states or terrorists, is a very good possibility.The General Accounting Office (GAO) (2000) states that in addition to the large collections of dang erous pathogens, there are also as many as 15,000 underpaid scientists and researchers, and an additional vast amount of specialized equipment and facilities just waiting to be exploited. This concern, in addition to the many outlined above concretely justify the continued efforts by the United States to counter attacks to its interests through the use of biological weapons. The likelihood of a conventional explosive vehicle bomb like the one used in the Oklahoma City bombing by Timothy McVeigh still posses a serious risk.Recently there has been a concern of these conventional vehicle bombs also including radioactive material. â€Å"Radiological weapons are generally felt to be suitable largely for terror, political, and area denial purposes, rather than mass killings† (Cordesman, 2002, p. 194). Cordesman (2002) further goes on to explain that as opposed to nuclear weapons, radioactive material posses such a great threat because of its contamination capability. Therefore, rad ioactive weapons are best suited for use when wanting to deny accessibility of a specific area or building/s.A Gilmore Commission Report (1999) explained that, A combination fertilizer truck bomb, if used together with radioactive material, for example, could not only have destroyed one of the New York World Trade Center's towers but might have rendered a considerable chunk of prime real estate in one of the world's financial nerve centers indefinitely unusable because of radioactive contamination. Radioactive weapons are designated into two categories, â€Å"radiological dispersal devices† (RDD) and â€Å"simple radiological dispersal devices† (simple RDD).As Cordesman (2002) points out, the main difference between the two being that a RDD is designed to â€Å"include any explosive device utilized to spread radioactive material upon detonation†, and the simple RDD â€Å"spreads the radioactive material without an explosion†. There are a couple of differe nt types of radioactive material that could be used as RDD or as simple RDDs. The list includes hospital radiation therapy, radiopharmaceuticals, nuclear power plant fuel rods, and universities, laboratories, radiography and gauging (Cordesman 2002).The Gilmore Commission Report (1999) explains the harmful effects caused by radioactive material by saying, â€Å"Radiological weapons kill or injure by exposing people to radioactive materials, such as cesium-137, iridium-192, or cobalt-60. † The harm is caused by a variety of different ways including in-haling it, or ingesting it (contaminated food or water supply). The level of the harm caused is of course determinate of the amount of exposure to the radioactive material, long periods or short periods. The difficult thing to assess initially is the level of exposure.The U. S. Army (2002) explains that lethal and serious doses are very difficult to determine, even within the same geographical area. Additionally the U. S. Army (2 002) points out that symptoms and effects are largely changed if someone has burns on their body or their body has been through physical trauma, which is almost certainly the case if most scenarios (except for maybe covertly) that would involve radiological contamination. For these reasons, early detection of decontamination is imperative.The U. S. Army's USACHPPM report (2002) goes on to explain that once prompt detection has occurred, â€Å"about 95 percent of external agents can be removed by simple removing outer clothing and shoes†. So where would a terrorist group mostly likely acquire radioactive material to be used as a WMD, and furthermore, what is the likelihood that they would chose radioactive material as their weapon as opposed to, lets say nuclear? The former Soviet Union posses a threat regarding the lack of control over its any radiological materials, especially the â€Å"accumulation of large quantities of plutonium from reactors that is intended for reproce ssing and/or storage. † (Defenselink, 2002, p. 2). The DoD (Defenselink, 2002) also points out that Iraq and Chechnya have furthered their knowledge of radioactive weapons that could be used to contaminate water, food crops, and livestock. It further concludes that with many countries (Korea, etc†¦ ) advancing their nuclear power interests, radiological material will be tougher to monitor and control, and thus easier to acquire.One of our biggest threats may not be from a conventional weapon with radioactive material, or even the contamination of water or food, but direct contamination through the exploitation of a nuclear power plant right here in the United States. Even though an attack on a nuclear power plant would have to take a great deal of timing during the planning phase, it could produce very effective results. â€Å"The possible venting or overload of a reactor could then act as a radiological weapon, and cover hundreds of square kilometers as well as have a m ajor potential affect on regional power supplies (Cordesman, 2002, p. 97). † Some theorize that the method of using an existing nuclear power plant would elevate the hazards that go alone acquiring radioactive material. The Gilmore Commission Report (1999) points out that spent fuel rods are very hot, heavy and thus hard to handle. Cordesman (2002, p. 197) concurs with the Gilmore Commission stating, † A seizure of spent fuel would be particularly dangerous during the first 150 days after the downloading because iodine-131, and iodine-123 are present, which are extremely volatile, and affect the thyroid†.There is still a great deal to be learned about the potential loss and employment of radiological materials, and ultimately the use of it by a terrorist or state would have on a population or army. When it comes to the use of nuclear weapons of mass destruction, the retaliatory consequences of their use would probably discourage the would be state or terrorist to u se them. There are many other reasons that would prohibit a terrorist group from having the capability to do so, but as some experts have argued, when it comes to the homeland defense, security planners must look at a time-frame twenty five years from now (Cordesman, 2002).The DoD (Defenselink, 2002) makes the point by explaining that no one foresaw the Cold War ending so quickly, or that twenty five years ago the Persian Gulf War would have happened†¦ thus the need for such long range planning, and more importantly looking at what the capabilities could be out there, and the United States vulnerabilities to them. A great deal of the threat would come from countries that currently have nuclear programs, whether directly, or indirectly through the proliferation of technical expertise and equipment.Thus, we must look at these countries, and gain a firm understanding of their current programs. The DoD (OSD, 2001) gave the following overview in explaining the states with a potentia l nuclear threat to the United States. -Iran: Iran is currently actively pursuing the acquiring of fissile material and technology for nuclear weapons development. They are doing this by an elaborate system of military and civilian organizations. Iran's claim is that these elaborate systems are for the development of a civilian energy program–the DoD thinks otherwise. Much of the success of Iran's attempts will depend on Russia and China.Russia is currently in a mutual partnership with Iran to build a 1,000 megawatt power reactor. Iran is using this product to both acquire sensitive nuclear technologies, along with weapons-usable fissile material. China on the other hand ended its nuclear projects with Iran in 1997. Additionally, in 1998 China created new export controls over dual-use nuclear equipment†¦ it seems they're living up to their 1997 commitment. – North Korea: In 1994 an agreement between the United States and North Korea ended nuclear weapons material production at two of its facilities.In question, is whether North Korea was able to divert enough plutonium to make a nuclear weapon, the United States thinks it did. Also in question is the spent fuel from one of these reactors that was also removed in 1994. If this fuel was reprocessed it could've produced several nuclear weapons. – Pakistan: In response to India's testing, Pakistan tested six devices in 1998. Pakistan has a very good infrastructure to support a nuclear weapons program, especially facilities that allow for uranium conversion and enrichment.Much of the foreign assistance received by Pakistan was from China. The Pakistan's military government has been and will be for the foreseeable future be in control of its countries nuclear resources, to include research, and wartime command and control. Much of Pakistan's program is designed to deter the threat from India. Pakistan has publicly stated that it will not assemble or deploy its nuclear warheads, nor will it resume testing unless India does so first. – Syria: Syria has no current capability, but does have a small (China supplied) research reactor.Additionally, in 1999 Syria signed an agreement with Russian to build another research reactor. Although it has an interest in nuclear technology, it just doesn't have enough expertise and infrastructure to develop nuclear weapons, and therefore they are not pursuing it. Even though most believe that the retaliatory consequences of using a nuclear weapon would prohibit their use, there are still too many vulnerabilities to the United States which warrant careful consideration and homeland defense planning. One of these vulnerabilities is our communications and intelligence satellites.A nuclear weapon launched to a very high altitude would destroy the DoD's communications and intelligence satellites from the Electromagnet Pulse. We all know the significance of these satellites for the United States' war-fighting capability. Another vulner ability is the contamination of primary facilities, like ports and airfields. Both airfields and ports played an integral part of the success during Operation Desert Storm. The U. S. Air Forces' superiority over Iraq during the Gulf War would not have been as quick and extensive if it had to deal with contaminated and/or destroyed airfields. Defenselink, 2002). With Iraq being the major threat to the United States, both directly and indirectly (support of terrorist groups), Iraq's Weapons of Mass Destruction capabilities are addressed completely separate from the rest of this research. Laqueur (1999) noted that a great deal of Iraq's WMD program was unknown to the United States and world prior to the Gulf War, even though they had used in during the war with Iran and on the Kurds in their own country. Prior to the Gulf War, Iraq admitted to having 2,850 tons of ustard gas, 790 tons of sarin. Additionally, when the Gulf War began, Iraq had fifty missile warheads with chemical weapons . These figures were from Iraq, so the actual extent of their program was unknown (Laqueur, 1999). In October, 2002 the Central Intelligence Agency issued a report outlining its concerns for Iraq's continued development of WMD. Some of the conclusions made by the CIA (2002) include; – Iraq acquiring it's first nuclear weapon will depend mostly on its ability to acquire fissile-material.Once this is done it could have a nuclear weapon within one year. Additionally, Iraq has made an effort to purchase high-strength aluminum tubes that could be use for conventional weapons, but most conclude that it is for the nuclear centrifuge enrichment process. – It is believed that Iraq has stocked a few hundred metric tons of chemical agents, mostly consisting of mustard, sarin, and VX. – Efforts in the biological weapon program are very active and larger than prior to the Gulf War. Iraq still has a small missile force to include Short Range Ballistic Missiles with ranges of 650-900 km. Additionally, extensive research and tests have been done with unmanned arial vehicles, most likely to be used for delivery biological warfare agents. Concluding this review of Weapons of Mass Destruction, as the information provided above points out, there is an obvious threat to the United States' homeland and interests abroad from the use of WMD. Significant differences between nuclear and chemical or biological WMD exist.All three types of weapons can kill or injure personnel and spread contamination over broad areas, only nuclear weapons can destroy equipment and facilities. † (Defenselink, 2002) This of course has a cost factor. Many civilian chemical and biological production facilities can easily be turned into a weapons program, where a nuclear program would cost a great deal more. Henderson (2001, p. 29) makes the point about the attitude of 21st century terrorists by stating, â€Å"Weapons of mass destruction are becoming more accessible to terrorists.T hey appeal most to â€Å"new terrorist† who seek total destruction for symbolic reasons. † From a military standpoint, a great deal more emphasis must be placed on the policy makers and planners for DoD doctrine that applies to chemical, biological, radiological, and nuclear threats. As technology and capable means of proliferation of these threats, so will the use of them against us. Much of this planning as been done in the past, but we have only begun to prepare ourselves for the terrorist or state that is likely to use Weapons of Mass Destruction.Further emphasizing the importance of this issue, the Center for Strategic and International Studies in May of 2001 concluded, â€Å"There is no way to predict the nature of the WMD threat to the U. S. homeland in the near or long term. The U. S. military superiority in itself is no longer sufficient to ensure the safety of the United States. National security planning must be broadened to encompass WMD counterterrorism. à ¢â‚¬  (Cilluffo, Cardash, & Lederman, 2001, p. 9). Only a few months later on September 11, 2001 there point was further made.

Kim Jong UN Essay

Kim Jong UN could possibly start a terrible nuclear war. This would start if he were to launch an attack on Washington DC. This would then force the United States to launch a counter strike which would be of greater magnitude and probably destroy every last remnants of North Korea, ridding the world of one pathetic and dangerous country. However, all of the world would be recovering from this disaster, Iran will eventually finish its nuclear weapons program. They would then use their first bomb on the United States to show their revenge for their helper, North Korea. The United States would have been much damaged and would have to rely on other countries to launch a counter strike. So then one of the countries part of the United Nations would Nuke Iran and damage that country. In the end, Kim Jong UN would be long dead, but he would have started a tragedy, so far in depth, that would take lifetimes to rebuild. Kim Jong UN’s nuclear war would have a higher death toll than any war in the history of the world. There would be radiation going around in every part of the world. Many nations would be torn apart because of the magnitude of the situation. Although in the end Kim Jong UN wouldn’t actually get away with starting a nuclear war because he would have died along with his pathetic country, he would have started an event that would bring the world to a hard time in which it would consider human annihilation.

Sunday, September 15, 2019

Hurricane Igor

When going to cnn. com I found that right away it had the link that I could click on to see all of the information about how Bermuda is bracing for hurricane Igor. Also, there are links that you can click on to view videos and live feed to see how bad it actually is. This site tells you everything you need to know such as sustained winds, the wind gust, and the latitude and longitude of the hurricane. The one thing I found interesting is it gives you a picture of the projected path that it is going. It also tells you what category, or size, the hurricane is. As of right now CNN is saying that hurricane Igor is going to affect the United States east coast over the weekend. CNN also gives you a link that you can recommend this website to people on your Facebook. This is a good thing on their part because with the Facebook link people can like it and see this article on your Facebook. They can see that you went to this site and they might look at it and like it too. This means more publicity for CNN and more people will view the top stories on there. CNN has a big article on how sever and damaging hurricane Igor is. CNN also tells you about any other hurricanes or tropical storms that were or are going to be dangerous to the east coast or Bermuda and what their projected paths are. When I went onto MSNBC. com I found the article right away, with big bold letters that say â€Å"Bermuda braces for ‘long and punishing’ Igor. † This right away attracted me to click on that headline so I can get more information on the weather and Igor. After clicking on the link there is a big picture of someone boarding their house up to keep it safe. Down at the bottom of the website it gives you three options that you can tell people about this story. You can email this story to a friend, you can share it on Facebook or you can share it on twitter. These are three main ways that people can spread this story to others so that they are aware of how sever the hurricane is. MSNBC. com also gives you a huge, well detailed article written by Elizabeth Roberts. She stated how sever the weather was in the beginning of the week. It was a category four in the beginning of the week and it has now gone down to a category two hurricane. The reporter talks about the sustained winds and the location of hurricane Igor. She tells you where it is headed and where it is going to impact. They also have this interactive tracker that shows you three different hurricanes and you can click on each one to find out how sever each one is and where it is headed. This gets updated every couple of minutes. You can also put in your address and it will give you the 5 day forecast. You can also click on a link that will give you archives of previous storms. FOXnews. com was one if the difficult websites for me. I went to their site and I didn’t see anything on hurricane Igor that caught my attention. I had to really look for this story, and I found it as I scrolled down and there is a little box that has the latest news, most read, and videos. The Bermuda story was far down the list and you had to click on the link to go to the story. When going into this article, there are no pictures of hurricane Igor, it is all words. This site gives you an article by Rick Leventhal, in which he writes about hurricane Igor. In this article he states that hurricane Igor is a category two hurricane and how it makes landfall with sustained winds near 110 miles per hour, gusting to 130. Fox news also tells you that the last major storm was back in 2003. So that is a paragraph that was interesting because it showed how they haven’t had one since then. It gives you how a hotel business has gone down by 50% since hurricane season started; this isn’t good for Bermudas economy. You cannot share this with anyone on face book or twitter but there is a place that you can leave comments and you can get follow up via email if anyone comments on this story. There is a link that you can click on that will take you to the author’s biography. It also gives you a list of all the articles he has written and there are someone other hurricanes on there. There are many similar things that all of these websites have such as telling everyone where the hurricane is located. It also describes in detail the wind gust and when it is suspected to hit the targeted area. Now when it comes to the difference there is a bunch of them. CNN from the beginning of the home page gives you a picture to look at, but also gives you a link to click on so you can view more. When you are looking on CNN you can see how they use bold writing when it comes to the sustained wind and wind gust, also the latitude and longitude. MSNBC on the other hand uses the hurricane interactive tracker to tell you all of that. I found that this is very detailed and very helpful. It is a different kind of tool that you can use to really see where hurricanes are going and who will be affected by them. MSNBC and CNN give you the option to send the information to someone by emailing, facebooking, or placing it on twitter. This helps them get more viewers and makes their rating go up for how many people view the website. Fox news on the other hand is not at all appealing for the weather. You have to really look for the article and when you find it, all it gives you is the article. The difference here is that there is not enough information for me about the hurricane, Igor.

Saturday, September 14, 2019

The Marginal Population Of Mumbai Health And Social Care Essay

The paper tries to give an penetration about the exclusion of the unseeable population in Mumbai by a peculiar wellness strategy implemented in the province of Maharashtra. The paper besides highlights some of the issues faced by this peculiar group from the experience of the field as a pupil societal worker The chief statement of this paper is the usage of specific standards in placing donees for the strategy which is already debatable and has been contested by many intellectuals in India thereby excepting meriting donees which is beyond the purpose a public assistance province.Introductionâ€Å" Welfare province is a construct of authorities in which the province plays a cardinal function in the protection and publicity of the economic and societal wellbeing of its citizens. It is based on the rules of equality of chance, just distribution of wealth, and public duty for those unable to avail themselves of the minimum commissariats for a good life † ( Beginnings: hypertext tr ansfer protocol: //www.britannica.com ) . â€Å" The Encyclopaedia of Social Sciences describes a public assistance province as a province which takes up the duty to supply a minimal criterion of subsistence to its citizens. Therefore, in a public assistance province, the disposal enters into economic, political, societal and educational life of persons. And it provides services to persons, right from an person ‘s birth to decease † ( Social Welfare Administration: Concept, Nature and Scope, moodle.tiss.edu ) . In a public assistance province, the province takes the duty to function the aged, ill, orphans, widows, helpless, oppressed and the handicapped people whenever they are in demand of services. As a public assistance province the province implements assorted public assistance strategies for the citizens at big. The public assistance province typically includes proviso of wellness services, basic instruction, and lodging ( in some instances at low cost or free of c harge ) etc. for the populace at big. When we talk about a public assistance province, the policies are inclusive of Torahs, directive, and planning in the Fieldss of employment, revenue enhancement, societal insurance and societal aid and population policy etc. The modern usage of the term public assistance province is coupled with the wide-ranging steps of societal insurance adopted in 1948 by Britain on the footing of the study on Social Insurance and Allied ServicesA ( 1942 ) . In the twentieth century, as the earlier construct of the inert individualistic province was steadily abandoned, about all provinces ( in the western states ) sought to supply at least some of the steps of societal insurance associated with the rules of public assistance province. Therefore, in the United States came up with theA † New Deal † A of President Franklin D. Roosevelt, and theA † Fair Deal † A of President Harry S. Truman, and a big portion of the domestic plans of ulterior presidents were based on the rules of the public assistance province ( Beginnings: hypertext transfer protocol: //www.britannica.com ) . During the clip of British regulation in India, from the early nineteenth century till India ‘s independency, the welfare-political sphere of India has witnessed the formation of a great trade of societal motions, rooted from distinguishable, and aggressively divided societal categories like the dramatis personae and, subsequently on, spiritual communities of that clip who resentfully opposed the active badgering province of societal personal businesss ( Aspalter 2003 ) . Though it was excessively early to believe about societal security programs and other meaningful societal policy steps, during the British regulation in India, the Government did establish a series of societal policy statute law which focused chiefly on the decrease of societal diswelfare instead than the construct of new signifiers of public assistance plans and ordinances ( Aspalter 2003 ) . During that clip Social statute law, aimed at the stoping of harmful societal patterns and societal inequalities, patt erns like kid matrimony, limitation on widow rhenium matrimony, cast based favoritism etc. By presenting the first societal security statute law of modern India, Workmen ‘s Compensation Act 1923 the Indian societal security system made the first of import measure in way of a notable public assistance system. The act has proviso for compensation for accidents taking to decease, or entire or partial disability for more than three yearss, if the accident occurred in the class of employment, compensation for occupational disease etc ( Chowdhry 1985, Cited in Aspalter 2003, pp. 156-157 ) . The period following the divider, the Indian authorities passed a series of new Torahs with respect to labour and societal public assistance, even before the operation of the new fundamental law in 1950 ( Goel and Jain 1988, Cited in Aspalter 2003, pp 169-160 ) . After 1950, the Indian authorities of India undertook many attempts in the field of societal security ( Aspalter 2003 ) , â€Å" Over the old ages the authorities established, in add-on, illness insurance, a pension program, p regnancy benefits, particular disablement benefits, infirmary leave, a productivity-linked fillip strategy, assorted decreases of lodging, electricity, and H2O rates, a deposit-linked insurance strategy ( which functions similar to a life insurance ) , and death-cum-retirement tip for Cardinal Government employees. Employees of public sector projects and other independent organisations may gain from Employees State Insurance, Employees Family Pension Scheme, lodging benefits, particular societal aid strategies for handicapped individuals, widows, dependent kids, etc † ( Aspalter 2003 ) . Till now India has witnessed assorted strategies, policies, ordinances and statute laws etc aimed at the public assistance of its citizens, the lone inquiry remains is that how the province has been able to turn this policies into world, inclusive of all citizens of the state particularly the marginal ‘s. The ulterior portion of this paper will seek to critically see a wellness strategy launched in the State of Maharashtra meant of the poorer subdivision of the society which aims at supplying free wellness strategies to BPL households. It will be chiefly based on unrecorded experience from the Fieldss as a pupil Social Worker.Rajiv Gandhi Jeevandayee Arogya Yojana ( RGJAY )The Maharashtra authorities launched the Rajiv Gandhi Jeevandayi Arogya Yojana on 18th December 2011 with the purpose to enable households with one-year income of less than Rs. 1 million rupees to avail free medical installations deserving Rs. 1.5 million. The Maharashtra province Health Minister Suresh Shett y announced that said strategy, when to the full implemented, would profit close to 2.5 billion households ( The Hindu, 19 Dec. 2011 ) . The strategy will be implemented throughout the province of Maharashtra in phased mode for a period of 3 old ages. The strategy covers eight territory of the province boulder clay now ( Gadchiroli, Amravati, Nanded, Sholapur, Dhule, Raigad, Mumbai and Suburbs ) . The strategy is aimed at bettering medical entree installation for both BPL and APL households which will in bend enhance the quality of medical attention to BPL and APL households. The donees will each acquire a wellness insurance policy and the EMIs of which will be paid by the State authorities. The strategy will widen quality medical attention for identified forte services, necessitating hospitalization for surgeries and therapies or audiences, through an identified web of wellness attention suppliers. The Scheme will supply coverage for run intoing all disbursals associating to hospitalization of the beneficiary up to Rs. 1, 50,000/- per household per twelvemonth in any of the Empanelled Hospital topic to Box Ratess on cashless footing through Health cards or valid Orange/Yellow Ration Card. The benefit shall be available to each and every member of the household on floater footing i.e. the entire one-year coverage of 1.5 million rupees can be availed by one person or jointly by all members of the household. The Scheme will cover the full cost of intervention of the patient from day of the month of describing to his discharge from infirmary including complications if any, doing the dealing genuinely cashless to the patient. In case of decease, the passenger car of dead organic structure from web infirmary to the village/township would besides be portion of bundle. The Network Hospitals will besides supply free follow-up audience, nosologies, and medical specialties under the strategy up to 10 yearss from the day of the month of discharge. A When the beneficiary visits the selected web infirmary and services of selected web infirmary, harmonizing to the strategy shall be made available ( Capable to handiness of beds ) . In case of non- handiness of beds at web infirmary, the installation of cross referral to nearest another Network infirmary is to be made available and Arogyamitra ( the staff covering with the said strategy in a web infirmary ) will besides supply the donee with the list of nearby web infirmaries. All eligible households in the enforced territories will be provided with Rajiv Gandhi Jeevandayee Arogya Yojana Health Cards though this has non implemented wholly till now. For the clip being till the issue of wellness cards, the valid Orange/Yellow Ration Card with Aadhaar figure or, any Photo ID card of beneficiary ( if Aadhaar figure is non available ) issued by Government bureaus ( Driving License, Election ID, ) to correlate the patient name and exposure is accepted in stead of wellness card to avail the benefits by a donee. The Health Cards to be issued will be used for the intent of placing beneficiary households in the household under the said Scheme. The Family Health Cards will be issued by utilizing informations from valid Yellow or Orange ration cards coupled with Aadhaar Numberss issued by UID governments. Till now from July 2nd 2012 there is 78919 households have been registered under this strategy and 154571 patients have been benefited. Total of 43503 surgeries/therapies has been performed including both authorities and private infirmaries. ( Beginnings: hypertext transfer protocol: //www.jeevandayee.gov.in )The fringy population of Mumbai and the RGJAYOne-half of the population in Mumbai is either homeless or lives in informal or semi lasting lodging. Harmonizing to the 2001 nose count of India, out of 11.9 million people populating in the metropolis, 5.8 million people lives in shanty towns or slums or on pavings ( Levinson, 2004 ) . A turning figure ofA migrantsA looking for employment and better life criterions are rapidly fall ining Mumbai ‘s stateless population. NGO'sA are assisting to alleviate the homelessness crisis in Mumbai, but these organisations are non plenty to work out the full job. And there are less figure of NGO ‘s working with this population with respect to wellness issues of this peculiar population. As I have been working with this population since the beginning of the MA class in TISS, I have some basic apprehension of this peculiar population and their issues with wellness and entr ee to wellness attention. Health attention for stateless people or people in destitution is a major public wellness challenge in Mumbai. They are more likely to endure hurts and medical jobs because their life style on the street, which besides includes hapless nutrition, exposure to extreme conditions conditions, and a higher opportunity of indulging in force and dependence to chemical substance and alcohol addiction. Yet at the same clip, they have small or no entree to public medical services. Many a times working as a pupil societal worker at the bureau where I have been placed, had to reason with hospital governments to acquire a street patient admitted. Unless they are non accompanied by any 3rd party ( NGO or the Police ) the infirmaries barely admits them. They are denied of basic installations of wellness attention. This peculiar population frequently finds troubles in keeping their paperss like individuality cogent evidence paperss, Because stateless people normally have no topographic point at all to hive away their ownerships, they often lose their ownerships, including their designation and other paperss, or happen them destroyed by constabulary or BMC which is really common in Mumbai. One a young person from Murti Galli, Khar route narrated me how he lost his paperss in Mumbai inundations, 2006. Many times they are chased off from the railroad platforms, foot waies etc. Without an ID cogent evidence, they are denied to entree many societal services schemes. Many do non possess basic citizenship cards, like elector ‘s ID, ration cards etc. Sing at the scope of exposures that this peculiar population faces and their issues with wellness, I have the sentiment that they should be the precedence as a mark group in any public assistance strategies. As a typical societal public assistance strategy RGJAY has neglected this peculiar unseeable population by utilizing a debatable standard to aim population ‘Within India, there has been turning controversy around the appraisal of poorness, peculiarly in the period of economic reforms. First, there are relentless dissensions among economic experts on whether the rate of poorness diminution after economic reforms was slower than in the preceding period. Second, the displacement to targeted, instead than universal, public assistance strategies has witnessed the usage of poorness estimations to make up one's mind on the figure of families eligible to entree these strategies ‘ ( Ramakumar 2010 ) . The appraisal of poorness in India is controversial, with many committees coming up with different poorness lines. ‘Errors of â€Å" incorrect exclusion † in targeted programmes in India are due to the separation of the procedures of ( a ) the appraisal of the figure of hapless and ( B ) the designation of the hapless. It is for the absence of a dependable and executable method of uniting appraisal and designation that political and societal motions have been demanding the universalisation of public assistance strategies like the PDS ‘ ( Ramakumar 2010 ) . The RGJAY has besides used the undependable BPL/APL cards to place the donees excepting many of the population who needs such strategy the most. It ‘s high clip the authorities as a public assistance province device new aiming system for public assistance strategies which is inclusive of all the fringy and unseeable population, they are the 1 who needs such intercession the most, or universalise basic public assistance strategies with respect to wellness, nutrients and support etc.