Friday, November 29, 2019

AI in cyber Defense Essay Example

AI in cyber Defense Essay The speed of procedures and the amount of data to be used in defending the cyber space cannot be controlled by humans without significant automation. On the other hand, It is hard to develop software with conservative fixed algorithms (hard-wired logic on decision making level) for efficiently defending In opposition to the vigorously evolving attacks in networks. The applications of artificial intelligence an be used to handle this situation that offers flexibility and learning potential to software. A brief review of artificial intelligence applications in cyber defense, and analysis of prospects of enhancing the cyber defense capabilities by increasing the intelligence of the defense systems have been presented in this paper. After surveying the papers available about artificial Intelligence applications In cyber defense, we conclude that useful applications are already present. They belong to applications of artificial neural nets in perimeter defense and some other cyber defense fields. So it has become clear that only AY techniques can guarantee successful solutions to many cyber defense problems. For instance, use of extensive knowledge Is essential In decision making, and Intelligent decision support Is so far one of unanswered problems in cyber defense. 1. INTRODUCTION: 1 . 1. Background of Study. 1. 1. 1 . Limitations in cyber security that are need to be addressed. Cyber security Is a multidisciplinary field that Is targeted on reduction of risks to the secrecy, affinity and integrity of data, information and resources in computer as well as in network systems. We will write a custom essay sample on AI in cyber Defense specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on AI in cyber Defense specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on AI in cyber Defense specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Modern systems have become much complex. Need for an intelligent, adaptive and multimode solution raises here for which best suited approach is artificial intelligence. [l]. There was not apparently strong collaboration between cyber security and artificial intelligence in early days. Researchers of AY were paying attention In making computers do things that only humans had been able to do, while security researchers Intended to fix the leaks In examining the computing communications or design communications they consider leak proof. Further, AY researchers were often most interested in building systems with behaviors that could hangs over time through knowledge or adaptation, and hence were to some degree unpredictable. From the security point of view, volatile system behavior seemed unwanted. But the two fields have developed closer over the years, mainly where human users but also at lower system layers. [2] 1. 1. 2. Why has the role of intelligent software in cyber operations augmented so rapidly? Looking closer at the cyber space, one can see the following answer. Artificial intelligence is required, first of all, for swift response to various scenarios in Internet. One has to be able to handle large annuity of information very fast in order to portray and investigate events that take place in cyber space and to make essential assessments. The speed of processes and the amount of data to be used cannot be controlled by humans without significant automation but, it is hard to develop software with conservative fixed algorithms (hard-wired logic on decision making level) for efficiently protecting against the assault in cyber space, because new deterioration become visible continuously. Here is a place for artificial intelligence methods. [3] 1. 2. PROBLEM DEFINITION: Do some artificial intelligence techniques exist to improve certain aspects of cyber security? 1. 2. 1 . Remarks concerning the problem definition. The aim of the thesis is to determine whether the possibilities in artificial intelligence can effectively address some of the limitations in todays cyber security. Figure : Cyber Attack. 2. ABOUT ARTIFICIAL INTELLIGENCE: AY as an area of research is very old. It is equally old to electronic computers. There is possibility of building devices more intelligent than human beings from the early days of AY on the realm. The time realm moves away when time passes. A number of intelligently hard problems have been witnessed to be solved by computers like playing good chess. Chess playing was deemed a benchmark showing a real intelligence during the initial days of computer. Even in seventies of the last century, when the computer chess has reached on the masters level, it appeared almost impossible to make a program that could smack the world champion. However, this came about faster than estimated. Three reasons are important to mention here for success of chess computer: computing power has been increased, efficient search algorithms have been developed (that can be used in many applications beside chess, see the section on search below), and knowledge bases has been organized so well that they became able to include all available chess knowledge(first of all, opening and end games). In core, the chess problem could be solved because it was a specific intellectual problem which was related to professed narrow artificial intelligence. A special instance is translating from one language into another that Chamoiss work in structural linguistics, it was expected that the natural language translation problem will be solved soon. It has not happened yet, although success is evident in some specific applications like, for example, Googles AY linguistics. The reason is that this demand of artificial general intelligence possessing of an aptitude to handle large quantity of information in every field associated to human actions. It is usually acknowledged that AY can be considered in two manners: as a science intended at attempting to determine the fundamental nature of intelligence and emerging generally intelligent machines, or as a science providing ways for solving complex problems that cannot be solved without applying some intelligence eke, for example, playing good chess or making right decisions based on large amounts of data. [3]Len the present paper we will take the second approach, supporter for applying specific AY methods to cyber defense problems, and will refer to the existing AY algorithms described in [4]. . CHALLENGES IN INTELLIGENT CYBER DEFENSE: If we talk about the future research in development and applications of artificial intelligence techniques in cyber defense, we need to make a distinction between immediate objectives and long-term goals. Numbers of AY techniques are immediately applicable in cyber defense and a lot of problems are yet need to be dressed. We have talked about alre ady present immediate applications. One can expect encouraging perspectives of completely new principles of knowledge handling in situation management and decision making process. Proposed principles are introduction of a modular and hierarchical knowledge architecture. Expert systems are already being used in many applications, sometimes hidden inside an application, like in the security measures planning software. Still, expert systems can get wider application areas, if large knowledge bases will be developed. This will need substantial investment in knowledge achievement, and development of large dollar knowledge bases. Also further development of the expert system technology will be required: modularity must be introduced in the expert system tools, and hierarchical knowledge bases must be used. A futurist Ray Kurt well has extrapolated the development to come up with Singularity in 2045 [5]. One need not to believe in the Singularity threat, but the rapid development of information technology will definitely enable one to build considerably better intelligence into software in coming years. (Consider the recent impressive performance of IBM-s Watson program)[6]. Elementally of whether the GAG is available or Singularity moms, it is critical to have the ability to use better AY in cyber defense than the offenders have it. 4. PRESENT WORK OF AY IN CYBER DEFENSE: There are numerous useful applications available in the field of AY application cyber defense. They all belong to application of artificial neural nets in perimeter defense, and they are helping in solving many cyber defense problems. Wide knowledge usage is necessary in decision making, and the intelligent decision support is still to problem, which required human interference. We have grouped all AY methods and architectures in several categories like neural nets, expert system, intelligent agents, reach and machine learning. 4. 1 . Neural NetsNeural nets have long history that begins with the invention of perception by Frank Reasonable in 1957. Perception is an artificial neuron, and popular element of neural nets. Small number of perceptions combined together can learn and solve interesting problem. Neural nets consist of a large number of artificial neuron, which provides a functionality of parallel learning and decision making. They are suitable for learning pattern recognition, for classification, for selection of response to attack etc. They can be implemented either in hardware or in footwear. Neural nets are well applicable in intrusion detection and intrusion prevention. There have been proposals to use them in DOS detection, computer worm detection, spam, detection, zombie detection, mallard classification and in forensic investigations. The neural nets in cyber defense are popular because of their high speed, if implemented in hardware or used in graphic processors. There are new developments in the neural nets technology like third generation neural nets, spiking neural network that mimic biological neurons more realistically, and provide more application opportunities. Figure : Intrusion Alarm System. . 2. Expert Systemsalt is most widely used AY tools. It can be directly used for decision support, in cyberspace. An expert system includes a knowledge base where expert knowledge about a specific application domain is stored, it also includes an inference engine for deriving answers based on this knowledge and possibly additional knowledge about a situation. Empty know ledge base and inference engine are together called expert system. Developing an expert system means first selection of an expert system shell and second acquiring expert knowledge and filling the knowledge base with knowledge. There are many different knowledge representation forms in expert system, the most common is rule based representation. But the usefulness of expert system depends mainly on the quality of knowledge in the expert system depends mainly on the quality of knowledge in the expert system knowledge base. Example of cyber defense expert system is one for security planning. This expert system facilitates considerably selection of security measure, and provides guidance for optimal usage of limited resources. 4. 3. Intelligent agentslengthier agents are software components that process some torture of intelligent behavior that makes them special like protectiveness, understanding of an agent communication language (CAL), reactivity etc. They possess planning ability, mobility and reflection ability. Intelligent agents can consisting of mobile intelligent agents after solving some legal and also commercial problems. This will require implementation of infrastructure for supporting the cyber agent mobility and communication. This will require cooperation with Sips. 4. 4. SearchSearch is a universal method of problem solving that can be applied in all cases. Very little must be known in order to apply some general search algorithm n the formal setting of the search problem, one has to able generate candidates of solution, and a procedure must be available for deciding. The search is hidden in the software and it is not visible as an AY application. Search on and or trees, up-search, maxima search and stochastic search are useful in decision making for cyber defense. 4. 5. LearningLearning is improving a knowledge system by extending or rearranging its knowledge base or by improving the inference engine. Machine learning comprises computational methods for acquiring new knowledge, new skill and new ways to organize existing knowledge. Problem of learning fluctuates with respect to the complex from simple parametric learning which means learning values of some parameters, to complicated forms of symbolic learning, for example learning of concept, grammars, functions and learning of behavior. AY provides methods for both supervised learning as well as unsupervised learning. Data mining has originally grown out of unsupervised learning in AY. Unsupervised learning can be a functionality of neural nets, in particular of self organizing maps. Parallel learning algorithms are suitable for execution on parallel hardware. These learning methods re represented by genetic algorithms and neural nets. 4. 6. Video and CATV semantic analysis for terrorist or criminal action detectionA new generation of intelligent CATV cameras that can hear as well as see will alert police to crimes in progress by recognizing clues such as a person running or the sound of a scream. Researchers hope the smart cameras will have a dramatic impact on crime detection and prevention by cutting response times and ensuring that more incidents are caught on tape. The Daily Telegraphs Gordon Earner reports that a team at the University of Portsmouth has already developed software which enables Amerada to spot visual clues to anything from violent crime to vandalism, by looking for tell-tale signs such as someone raising their arm suddenly or even a snapped car aerial. This artificial intelligence software is now being taught to recognize sounds associated with crimes, including breaking glass, shouted obscenities, and car alarms going off. Cameras which hear the sounds will automatically swivel to the direction they have come from, and will alert the person monitoring the system to a possible crime progress. [7]. 5. ANALYTICAL CONCLUSION: The present situation of hastily growing intelligence of mallard and erudition of Weber attacks advocates that it is obvious to develop intelligent cyber defense methods. The incident of Dodos(Denial-of-service attack) alleviation has revealed that even a defense against large-scale attacks can be successful with relatively limited resources with usage of intelligent methods. An analysis of publications illustrates research in artificial neural nets. Applications of neural nets will continue in cyber defense. There is also an vital need for application of intelligent cyber defense systems in numerous fields where neural nets are not the most appropriate technology. These fields include decision support, situation awareness and knowledge management. Expert system technology is the most promising in this context. We are not sure about how rapid development of general artificial intelligence is ahead, but a threat exists that a new level of artificial intelligence may be used by the invaders, as soon as it becomes accessible. Clearly, the latest developments in knowledge understanding, representation and handling also in machine learning will significantly boost the cyber defense competence of systems that will utilize them.

Monday, November 25, 2019

Free Essays on Paper On Toffler

Proven Prophet Management has changed due to society, technology, and consumers during Toffler’s three waves of social change. These three waves are actually ages of time, which include the age of agriculture, the age of industrialization and through the age of information. The drastic change’s of management has effected the way we operate businesses and change the types of businesses that are more successful. The United States started off as an agricultural society with predominantly farmland covering the country. This agricultural society was based on hard labor and long hours. Working on a farm for years myself I know that no matter the size of the farm there is always work to be done. These days usually begin when it is dark and when it is dark with physically demanding chores. The U.S was mostly blue collar. Population increase increased the number of consumers for agriculture and inevitably forced technology to move forward. Early agriculture started with the use of hand tools and then as the need for more increased they used animals to drag large farm equipment. These technologies helped to increase the number of food they could produce. Eventually tractors were invented so more could be harvested and technology kept evolving with all sorts of attachments for the tractor to cut down on time, money, and labor. For example an attachment that will cut corn stalks and then se parate the cob from the stalk. Before farmers would have to cut the corn by hand and then remove the cobs by hand as well. This shows how consumers and society can trigger technology and vice versa. The age of Industrialization brought a new way to look at business. People in the agriculture business for the first time saw trouble as industries took off. The production of textiles could not only be sold in the U.S. but they could be exported to other countries, which widens the market. Textiles could be produced in mass in the industry ... Free Essays on Paper On Toffler Free Essays on Paper On Toffler Proven Prophet Management has changed due to society, technology, and consumers during Toffler’s three waves of social change. These three waves are actually ages of time, which include the age of agriculture, the age of industrialization and through the age of information. The drastic change’s of management has effected the way we operate businesses and change the types of businesses that are more successful. The United States started off as an agricultural society with predominantly farmland covering the country. This agricultural society was based on hard labor and long hours. Working on a farm for years myself I know that no matter the size of the farm there is always work to be done. These days usually begin when it is dark and when it is dark with physically demanding chores. The U.S was mostly blue collar. Population increase increased the number of consumers for agriculture and inevitably forced technology to move forward. Early agriculture started with the use of hand tools and then as the need for more increased they used animals to drag large farm equipment. These technologies helped to increase the number of food they could produce. Eventually tractors were invented so more could be harvested and technology kept evolving with all sorts of attachments for the tractor to cut down on time, money, and labor. For example an attachment that will cut corn stalks and then se parate the cob from the stalk. Before farmers would have to cut the corn by hand and then remove the cobs by hand as well. This shows how consumers and society can trigger technology and vice versa. The age of Industrialization brought a new way to look at business. People in the agriculture business for the first time saw trouble as industries took off. The production of textiles could not only be sold in the U.S. but they could be exported to other countries, which widens the market. Textiles could be produced in mass in the industry ...

Friday, November 22, 2019

Faculty empowerment and the changing university environment Research Paper - 1

Faculty empowerment and the changing university environment - Research Paper Example As per traditional system of teaching, the duty of the teacher confined to the teaching process alone. However, the responsibilities of the current teachers are much more than teaching alone. Current teachers are perceived as leaders rather than mere teachers. Current teachers guide the students towards the target by adopting different strategies. Since the students have different abilities, it is difficult for the teachers to use a standardized way of teaching. The teacher should change his/her strategies based on the requirement of each students. In other words, current teaching strategies are student centered rather than teacher centered. Most of the teachers are unaware of these changes happening in the academic world and empowerment is the only way to educate teachers about their changing roles in the schools and colleges. â€Å"Educational leaders must evolve to meet the needs of both students and faculty because, faculty members struggle with changing curricula, non-tradition al learning environments and new technology. They need their leaders to assist them with the transitions† (Arenas et al, 2009). Science and technology have developed a lot over the last few decades and the effects of these developments can be witnessed everywhere. Educational sector is one area which undergone drastic changes as a result of the advancements in science and technology.

Wednesday, November 20, 2019

The Impact of Information Technology in the Vodafone Group Research Paper

The Impact of Information Technology in the Vodafone Group Organization - Research Paper Example This paper discusses and describes the Vodafone Group business Organization structure with a focus on the role of IT in its business Organization structure. Vodafone Group is a multinational British telecommunication company, whose main office is in London, with a registered office in Newburry Berkshire. Vodafone company started as a joint venture between Hambros Technology Trust , Millicom and the subsidiary of Racal Electronics PLC’s strategic Radio Ltd in 1982 with its name being derived from a company’s goal of establishing data services and voice services over mobile telephone networks. Hence its network was called Racal Vodafone. The company was renamed Recal Telecom in 1988. In 1991, Racal Telecom became demerged from the Racal Electronics there is when the mobile telephony giant came into existence. In 1996, the company bought people phone and acquired 80% of the Astec Communication, a move that so it increase its shares of UK mobile customers. According to the report findings since 9th December 2010, the key elements of the Vodafone Organizational structure are as described. The operating companies for the group are under two operating regions reflecting the different geographies or different nature of assets, as well as to reflect the differences in development of the sector considering various economies. These included Europe which comprise all existing controlled business located in Europe, in addition to Turkey, Hungary, Czech Republic, and Hungary. At the helm, as the regional CEO, Michel Combel is in charge of the Europe Region.

Monday, November 18, 2019

Case study Essay Example | Topics and Well Written Essays - 1500 words - 4

Case study - Essay Example Even though he was registering a good recovery following his multi-organ surgery in the lungs, kidneys, liver and splenectomy in the high-dependency unit, from the sixth postoperative day, he began to deteriorate, and this called for investigations about the possible aetiology of his sudden deterioration despite initial evidence of recovery. The potential risk factors for his deterioration are multiple bony traumas; multi-organ injuries and surgeries including lungs, liver, kidneys, and spleen; multiple blood transfusions; and hospital-acquired infection in the high-dependency unit. The provisional diagnosis could be one of acquired coagulopathy that may have resulted due to the above risk factors. The provisional diagnosis could be DIC or disseminated intravascular coagulation since the most common signs of this disorder are petechiae, ecchymosis, and oozing from venipuncture sites and catheter sites, as well as bleeding from surgical incisions (Attar et al., 1969, p. 939-965). In some situations, DIC becomes only evident after laboratory analysis with mild or no clinical symptoms at all. As in this case, these patients become symptomatic after stress situations, such as, surgery, or severe infections. The common denominator of DIC is the pathological generation of thrombin, which leads to widespread intravascular depo sition of fibrin and to the consumption of coagulation factors and platelets. DIC is as such not a disease entity, but the consequence of a variety of disorders that diffusely lead to the activation of coagulation mechanisms within the bloodstream (Carey and Rodgers, 1998, 65-73). The formation of thrombi in the microcirculation activates the fibrinolytic process as a compensatory mechanism to lyse the clots. This mechanism generates circulating fibrin degradation products, which in concert with the coagulation deficiencies and thrombocytopenia results in bleeding. DIC occurs in a wide spectrum of diseases.

Saturday, November 16, 2019

My Mentoring Account In Nursing Practice Nursing Essay

My Mentoring Account In Nursing Practice Nursing Essay This is my reflective account of my performance as a mentor in clinical setting, assessing the learning environment and the strategies used for teaching and assessing a student nurse. I have been mentoring student and newly qualified theatre practitioner for many years as a registered nurse for more than 20 years and as a qualified anaesthetic practitioner for 3 years. Working alongside with different mentors in the past help me to understand the different characteristics of being a mentor and developed my own style of facilitating learning within a clinical setting. I have unique experienced of conveying knowledge to others in a way that is comprehensible and significant through my work as a multi-skilled theatre practitioner. Because this assignment is a reflection of my performance in mentoring and assessing a student in nursing practice, Gibbs reflective cycle (1998) will be used the same model I used when I did my University post graduate course 3 years ago. Currently the hospital has program of mentoring university students and newly graduates. The program is in addition to the current program that familiarise students and new graduates to the theatre they will be assigned. It considers influencing the students learning experience by mentorship and assessment. The surgical setting as a learning environment will be examined and the accountability and value of the role of a mentor will be looked upon at. Finally, the overall performance of mentoring will be evaluated. To follow the Nursing and Midwifery Council (NMC2008) names will be changed and withheld confidential information and the student will be named as my mentee. According to the NMC (2006) students on NMC approved pre-registration nursing course be required to be supported and assessed by a mentor. The nurses / operating department practitioners selected to be mentors should be in the register and should be required to be up to date with their skills, knowledge and competencies with continuity. On the first day of my mentee right after her orientation, we have drawn up her learning opportunities so that there was an awareness of what my mentee hoped to gain from the operating theatre experience. As part of the course work one teaching session and one assessment were arranged. Teaching session includes informal and formal. The formal session happened in the theatre operating room and involved positioning of patients before surgery. My mentee was on her first clinical placement and is not familiar and no experience within a theatre setting. Present during the procedure were myself, my mentee, the rest of the theatre team and an unconscious patient under general anaesthesia. Before any learning lesson took place, it is crucial to build an effective working relationship with the student (Bally, J, 2007). Being kind to her and offering assistance for any needs she might have. My mentee feel that she is part of the team and that she wont feel alone. I build up her confidence by expressing to her that at any point of the teaching session if she did not understand a protocol, or why things were done, or why that thing is important, I will be there to explain and guide her. Learner must be made feel that they are welcome and important; this way will assist the learner to incorporate themselves into the clinical environment (Welsh and Swan 2006). Being approachable and friendly I was enabled to maintain a trusting and comfortable relationship beneficial to learning. My student felt that my character has a strong professional relationship throughout the learning experience. According to the student I am mentoring with, the relationship reduced her tension and anxiety which can affect her ability to learn. Anxiety in students happen to diminished when the mentors are capable of building good working relationship with the students for almost their entire placement (Slevin 2005). Openly welcoming and recognising my student in the team give her a sense of valued as an individual resulting in a positive effect on their self esteem. Personal attributes of the mentor is sometimes the number one barrier when creating effective learning experience. You need to be a good role model to be a good mentor. When I was a nursing student in my own country, I had mentors who were good role models where I learned more and given a chance to share my ideas and feel that I was valued. The results were I enjoyed my placement and excelled in my learning outcomes. To be a successful mentor, it is important that you will find ways to improve the learning environment. It can be a difficult task when creating suitable environment and can affect the learning experience. Nursing students has different backgrounds. Some had good experience working in a healthcare setting as healthcare assistant before entering to University while some just went straight to enrol in a nursing course; therefore, it is necessary to make an appropriate environment for each individual to take full advantage of the learning process (Lowenstein and Bradshaw 2004). The setting for the formal learning session was demanding as my mentee was not familiar working in a hospital theatre based environment. The chosen location was a theatre where it is located at the most secluded area to minimise interruption. This will ensure that my student will give her full attention during the teaching session. Evaluation of the learning process and assessment of the effectiveness of the session will help me to achieve by good planning of teaching session Hinchcliffe (2004). Numerous teaching sessions took place before assessment was done to guarantee that my mentee will feel confident and gained the necessary knowledge and skills to carry out the procedure. We involved each other thru direct questioning, discussion and observation and my mentee is fully aware that she has been assessed at the time of questioning. I taken into account in which the manner my mentee learns as it is important to recognize her learning style so that it can be incorporated to the learning material to facilitate effective learning (McNair et al 2007). Recognizing her individual learning style helps me to arrange her learning preferences. According to Kolb (1984) there are four distinct styles of learning or preferences which are based on four stages, diverging, assimilating, converging and accommodating learning styles. Although mentor and learner has different learning styles the NMC (2006) has developed a standard which point out that mentors have to strive and achieve best fit practice with the level and type of learners that they came upon in training as mentors and learners has different learning styles. It was felt that my mentee is a reflector as she likes to be given adequate time to think things through before reaching to conclusion. She also likes to observe in contrast to direct participation and slow to make up her mind and reach a decision as opposed to her as good in listening and assimilating information. For that reason the diverging learning style was applied for best possible learning. On a variety of occasions, it was clear that my mentee is good in watching a procedure before performing it. Prior to the start of any session, together we made proper visual checks and verbal questionings to the patient and noted in the pre-operative checklist. I pointed out that confirming the patients correct details is of paramount importance and one of the many safety issues she has to consider. Knowing that we have the correct person and the correct procedure, my mentee told me that she is happy and confident to proceed. Surgical room department is one of the most stressful environme nt in the hospital, thus, we give our student an assurance and support that they need from us. When doing the safety positioning of patient before surgery, I was talking to my mentee through the procedure step by step as I put the patient under anaesthesia, intubating and positioning the patient for a procedure. A number of questions followed to test my mentees understanding of the process and she correctly prioritised the order of step by step procedure. In this assessment, my mentee demonstrated theoretically her ability to integrate to the team to provide safe and effective care for the patient. It was also felt that my mentee was learning in an andragogical way, the teaching methods for adult learners, a term used by Knowles (1970). This became obvious when drawing up her learning opportunities. As the formal session involved not only my mentee it was felt that all different types of the learning styles should be consider as every student had their own styles of learning. Realising what the individual characters and needs is important for learning to be effective. Audio-visual materials were used for teaching as this type of learning aids can speed up learning through the use of diverse senses (Neeraja 2008).It is evident that group work allowed the student to produce a working relationship and expectation and it made the learning environment enjoyable and gives me a greater insight into different learning styles when doing it within a group. A written self-assessment followed the session to support my student to assess her strengths and weaknesses. This style of assessment can be valuable for the students as when they assessed themselves can occasionally focus on a negative or limitation. This gives me a chance to advise and correct the weakness and help to point out positi ve aspects of my mentees practice (Welsh and Swann 2006). I told my mentee that she needs to improve her self confidence to make a speedy safe decision before and during a procedure. I also pointed out some concerns on her practice document leaving it out to the last minute and be assertive enough to get it filled in at a regular intervals. Also discussed was her progress and conversely how she taught she was doing. At this point I discussed her development and that she is progressing well and that I was very pleased with her overall performance. I ended the review of her performance with a sandwich feedback (Hinchcliff 2004). It consists of giving not so good feedback inserted between positive feedbacks. My mentee was pleased to fulfil her learning objectives and that she enjoyed the way teaching happens as I took into consideration her individual learning style. She pointed out that an up to date induction pack before placement will be of big help as it makes her less anxious about working in the different surgical department after only having her hospital placements. An action plan has been drawn in response to this. The website directory of the university has been made up to date so students can now access up to date information in relation to this placement. Students should be provided with an induction pack as it will prepare them for the placement ahead (RCN 2007). On reflection the learning experience in general was very encouraging as my mentee was able to accomplish her competencies in an environment conducive to learning. I was able to established effective working relationship and leadership with by influencing and being a role model. By acting as a role model in clinical setting and looking to address natural obstacles in the surgical theatres as operating room are known to be full of activity and issues with staffing levels which contribute to effectiveness on the quality of assessing students (Phillips et al, 2000). I probably could not only develop myself and my student but also other mentors conduct and practice in a constructive way (Girvin 1998). My mentee has given me a positive feedback on my performance as her mentor and made very supportive and encouraging comments. She felt she was fully integrated into the learning environment and thought she was part of the surgical team. Upon reflecting on what I have found difficult about the learning experience, I found that as a mentor I can be faced with different forms of liability as I should be able to validate the marks given for an assessment. As a registered professional, I am accountable in the decisions I will make and must act in the best interests of service users (HCPC 2012). This is obviously no different to the role of the mentor and assessment of student in clinical practice. For that reason, assessing my students competencies brings the same responsibility I have to my patients (Jarvis and Gibson, 1997). After much examination and evaluation of the whole learning experience, I am looking forward to further develop my role as mentor to be a good contributor in educating future nurses. I will attempt to speak more slowly and clearly and learning more about my student before the assessment. I would consider gaining feedback of my student performance from my colleagues as it would allow taking into account the view of other professionals to promote clinical excellence and professionalism. To conclude, mentoring and assessing is fundamental in helping the student to have a complete learning experience. Mentors and student should outline their aims and objectives at the beginning and a professional relationship should be preserved throughout. Assessing nursing student is paramount in delivering a safe and competent nursing care.

Wednesday, November 13, 2019

Essay on Tom in The Glass Menagerie -- Glass Menagerie essays

The Character of Tom in The Glass Menagerie    Tom Wingfield has a dual role in The Glass Menagerie. The first Tom is the narrator, who introduces his second self, the character. In his fifth soliloquy, Tom the narrator indicates that time has detached him from the drama, "for time is the longest distance between two places" (Williams 1568). In the closing soliloquy Tom recounts how he lives and re-lives the story in his memory, though he is detached from the participants in the original affair. Like his father, "a telephone man who fell in love with long distances," (Williams 1523), Tom has fallen in love with the long distance that is time.    Tom is a sensitive, artistic man who is forced by circumstances into a phenomenological situation. He is compelled to live and re-live the situation of the play, in which he sought for and found what he believed to be freedom. Although he escapes the situation, he does not find freedom; his consciousness forces him to dwell upon the situation until he finds meaning in it. Because Mr. Wingfield, Laura, Amanda, and Jim are parts of ...

Monday, November 11, 2019

Oral traditions Essay

Many ancient scholars believed Africa had no history prior to colonialism because there was no documented evidence. Professor A.P. Newton, who was a distinguished British historian in the early 20th century, believed that there was no African history because most of the African society was illiterate before the European intrusion. ‘History’, he said, ‘only begins when men take to writing.’ He, as well as others who had the same opinion, failed to realize that African communities existed long before colonialism and so had their own history, even though it had not been put into writing at the time. Oral traditions have played and continue to play important roles in the history of Africa as well as its present. Songs, folklores, superstitions, etc. are just some of the things that have been passed from generation to generation orally. We see the evidence of some of these superstitions in J.P. Clark’s _Abiku_ as well as Wole Soyinka’s _Abiku_. Both poems are based on traditional superstitions and it is evident from the title, _Abiku_, which is a word from the Yoruba language of Nigeria that is used to describe a child that dies and is reborn, usually multiple times. It is believed that such children are not of the human world, but rather belong to the spirit world and so they keep going back and forth from one world to the other unless the child’s family is able to make the child stay in the human world, using traditional methods most times. These beliefs and actions are results of oral traditions and, even with the rise of western education in Yoruba communities and Nigeria in general, continue to be upheld by some people. Clark and Soyinka are evidence of the continued dependence and belief in oral traditions by a lot of Africans, even after extensive western  education. These Africans could be doing this as an indirect rebellion against western ideas and principles that have sought to ridicule and destroy African culture. During the colonial era, the Europeans did their best to destroy African culture, especially those that had to do with superstitions and religious beliefs that did not correspond with western principles. Concepts like reincarnation were frowned upon heavily by the European missionaries seeking to change the religious beliefs of Africans and since most aspects of life were based on religion at the time, changing one’s religious beliefs meant changing one’s political, social and economic beliefs as well. However, with the rise of cultural nationalisms, Africans began to reject European standards as the ideal and focus on bringing African culture back to the forefront. Hence, we see Soyinka and Clark as well as many other African poets bringing their cultural superstitions to their literary works, even though most of the m are written in European languages. In Soyinka’s _Abiku_ poem, almost every line is made up of cultural beliefs and practices as they relate to the _Abiku_ child. He even dips into non-African oral traditions in the line that says, â€Å"remember/ this, and dig me deeper still into/ the god’s swollen foot.† (14-16). Here, Soyinka is referring to Oedipus, the Greek mythological figure, and his use of this in his poem suggests that he wants to show that oral tradition is not just an African phenomenon but rather, exists in different cultures all around the world. While, he doesn’t expand on this line, it is important because it stands out from the rest of the poem as it is not connected to Yoruba tradition at all and it makes known to its readers the fact that oral traditions are universal. Also, Soyinka writes his poem from the subject’s point of view as a means of humanizing the character. The concept of _Abiku_ is usually explained as an other- worldly phenomenon, which made it easier for a lot of people to disassociate themselves with the idea. However, Soyinka writes his poem in first person in order to make known to people the fact that _Abiku_ children do exist and they are, in fact, human beings. He brings the _Abiku_ child to the forefront and though the rhetoric is tinged with superstitions and  cultural traditions, the fact that it is being told from the child’s perspective is a humanizing effort. There is no doubt that the poem emphasizes cultural and spiritual notions, especially through the child, however, the poem’s use of words like â€Å"Mothers† (line 26) paints a human picture in the minds of the readers. The juxtaposition of spiritual and human language used in the poem lets the readers know that both the spiritual and the human are present in this _Abiku_ child. Therefore, the poet brings to light the idea that the spiritual i.e. traditional and the human i.e. rational can exist and coincide with one another. He is saying that African culture can exist side by side with western culture and one doesn’t have to diminish the other, which is the direct opposite of what was preached by European missionaries. Also, it is important to note that these two poets as well as most African writers are invested in the concept of Africanism. Keeping African cultures alive is important and we see the poets using their poems to remind Africans and the world in general that African culture still exists and has not been destroyed by urbanization. Oral traditions have never been completely accepted as adequate sources with which to make any kinds of analyses because of the fickle nature of the human memory and so, writing these poems allows the poets show the readers that the culture is still there and these stories and beliefs have not been forgotten. It was important for Africans in historical times to repeatedly acknowledge the oral traditions so they would not forget any parts of it and this is also one of the reasons why African writers usually add some elements of oral tradition into their works. A lot of African communities did not have any means of recording their culture for future generations so they just made sure the younger generations became aware of these traditions from the early stages of their lives so these traditions became engrained in their minds by the time they were adults. However, with the colonization of Africa, a lot of Africans are now able read and write these oral traditions and because of this easy access, a lot of Africans have become unaware of a lot of cultural traditions that would have been passed orally. So, the writers include oral traditions in their written works to bring these stories, beliefs, practices, etc. back into the minds of Africans and the world. This is why  Soyinka and Clark include some traditional processes in their poetry. Soyinka writes about the charms that people believed would keep the _Abiku_ child from going back to the spirit world†¦ â€Å"Must I weep for goats and cowries/for palm oil and sprinkled ash?† He takes the reader into the world of the _Abiku,_ using cultural rituals, which then reminds the Africans who had forgotten and informs those who were not privy to this information initially. Clark takes his readers into the immediate environment of the _Abiku_ child, both the physical environment and the spiritual environment†¦ â€Å"Do stay out on the baobab tree/follow where you please your kindred spirits/if indoors is not enough for you.† In conclusion, oral traditions are very important in African culture as well as other cultures around the world and the use of written language in passing oral traditions has been helpful in bringing forgotten histories back into the minds of its people. BIBLIOGRAPHY Fage, J. D., and British Broadcasting Corporation. Africa Discovers Her Past. London: Oxford University Press, 1970. Henige, David P. The Chronology of Oral Tradition: Quest for a Chimera. Oxford: Clarendon Press, 1974. Adesanmi, Pius. You’re Not a Country, Africa: A Personal History of the African Present. Johannesburg: Penguin Books (South Africa), 2011.

Saturday, November 9, 2019

Museum Visit

The museum was a safe haven for housing art and historical facts of the many cultures all round the world. The Creation Stories at the Michael Carols Museum were fascinating and interesting. My favorite was the â€Å"God Spoke the Earth: Stories of Genesis in Prints and Drawings†. The exhibition was narratives from the book of Genesis. Marc Chloral born in 1889 was a F-ranch artist who traveled to Palestine after a 1930. His work was to illustrate stories from the Old Testament. His Jewish heritage lined up with his immediate connection to the Holy Land.There were many in the Holy Land that spoke his native Yiddish and Russian. His lithograph, The Bible II, found in his 2nd series was an expression to accentuate a narrative to the creation story. The painting was that of blues, grays and subtle yellows that evoked the sense of light, water, earth and life emerging but of the firmament. Chloral depicts Adam pulling the forbidden fruit rather than Eve. His painting put emphasis into the virtues of womanhood and female figures. The female images appear in almost every image of the painting.At this time was Chloral's first exploration into art in a Biblical expression, Hitler came to power over Germany. The Nazi party opposed the work of Chloral and deemed it as a threat to the Western violation. Chloral had a lot at stake being an artist from France exploring Jewish theories. Due to the disapproval, Chloral had to flee to the United States and by the help of an American journalist; he was able to obtain forged Visas to make the journey to the United States. John Waddled Barnes, American artist, born in 1921 and deceased in 2008.His illustrations were in pen and ink wash. His artwork was of the story of Joseph. The art on display was his pieces that reflected the different pieces of Josephs story such as; Jacob interprets the moon devoting son, Joseph, Jacob consoles Rachel, Joseph awake after wedding night, Joseph tries on the coat, Joseph tells dream, Jose ph sojourn in the well, Traveling merchants rescue Joseph, Joseph before the Sphinx, The ladies party, Joseph feels from Potash's wife, Joseph interprets the dream, Meeting of Jacob and Joseph in Egypt. The artwork is beautiful with dark and light colors.The paintings are like sketching that have expressions very felt by the viewer. â€Å"Birth of Cain† was an engraving piece of art by a Dutch artist, Adrian Collars (1560-?1618). This artwork was at a time were the Protestant Reform in North Europe was occurring. The Council of Trend convened between 1545-?1563 in discussing the reform of the Catholic Church. The key topic was on sacred images being permissible only if it didn't mislead or corrupt the viewer. In an order for an imagery to be accepted it should encourage the viewer devotion in connection to scripture.The scenes of Genesis depicted a hard life of God's creations Adam and Eve. The art was to allow the viewer to experience the agony and hardship that Adam and Eve endured outside of paradise. This reflected God's punishment which was painful birth, short life spent in a dangerous and inhospitable land. The ewer was also made aware of the first time an act of violence and malice in the story of Able being murdered by his own brother Cain. Collars wanted the viewer to mediate and have a sense of responsibility and loss that Adam and Eve felt as a result of sin.John Martin (1789-?1854) fourth series print, Adam and Eve hearing the Judgment of the Almighty, was a Mezzanine from 1831. Martin took a series of prints illustrated from the Bible in an effort to repeat the series from that of John Million's Paradise Lost. Adam and Eve were rebuked by God represented by rays of light shining from trees at the right: Have you eaten from the tree of which commanded you not to eat? † (Gene. 1) The Seated Buddha of India Peak period was in black stone. It represented touching the earth calling upon the earth goddess as witness to his ability to attai n enlightenment.The tree above his halo is a branch of the Booth tree under which he has reached the final stage of spiritual advancement. His throne is a typical lion's throne which reflects two lions and an elephant at the base. The Egyptian coffin lid was beautifully detailed. It was from the Egyptian dynasty of 1190- 1075 BC- The coffin was of wood, geese, pigment bronze, calcite (Egyptian alabaster). This was uniquely carved. The artist was very artistic in all aspects of the facial features and the perfect carved hands.Tablet with an account Of a Deluge was from the late Babylonian period of 1699-?1600 BC, Nipper Mesopotamia, of clay. The lower portion of the fragment of the clay tablet was written in Sumerian cruciform script and it relates to a tale of flood that destroyed mankind and it's parallel to the story of Noah in the Bible. I found it fascinating that it reads; â€Å"A flood will I send which will affect all mankind at once. But seek the deliverance before the floo d breaks forth for over all living beings. However, many there are will I bring annihilation, destruction and ruin.

Wednesday, November 6, 2019

Song for my mother Essay Example

Song for my mother Essay Example Song for my mother Paper Song for my mother Paper The title of the poem makes its subject clear, a praise song or a eulogy, is a traditional form from many African cultures and is often sung instead of being written down. This poem was written to honour the attributes of the poet’s mother; it is a metaphoric poem written from the child’s perspective, using imagery to describe the powerful emotional relationship she shared with her mother. The poet is grateful and rejoices her mothers presence using the term praise in her poem title whilst referring to her homeland simultaneously. With structure, â€Å"Praise Song for My Mother† is based around the first three stanzas, each of three lines. All of which are very similar in format, although, the rhythm is not carried all the way through. The fourth begins in the same way as the first three but is extended, emphasising the poem’s final line about the daughter’s â€Å"wide futures† and expanding horizons, as if reflecting the way her mother’s care allowed her to develop and move on. â€Å"Praise Song for My Mother† is a free verse, meaning it does not adhere to regular rhyme or rhythm, writing in this way augments the fluidity and the reading of the poem. The lack of punctuation means that there is no pause, adding to the flowing pace and has a softer effect and tone on the reader. By not using rhyme and following an unconventional order, the poet creates a sincere and honest atmosphere within the piece. The consistent use of past tense and repetition, for example â€Å"You were† – secures and anchors this poem. It illustrates the certainty and unfailing trust that the poet places in her mother. The repetition is effective in reinforcing the idea of security and sanctuary created by the mother. It also signals to the reader that the poet’s mother has in fact passed away and elucidates the point of view from which it is written – as if the speaker is reminiscing and remembering her childhood, along with the influence of her mother. The first three stanzas end with a line that lists repeatedly three qualities of her mother. The first four stanzas all end with a verb (â€Å"fathoming†//â€Å"mantling†// â€Å"streaming†//â€Å"replenishing†), indicating on going action, that this adoration is constant. Nichols uses plosives, fricatives and dentals (sounds of the words) they are harsh and assertive at times, if linking this to the final line of the poem, it is possible that it hints at the writer harbouring a certain degree of bitterness towards her mother for pushing her to independence; it is clear that she enjoyed being sheltered and protected. â€Å"Water†//â€Å"Moon’s eye†//â€Å"Sunrise† are all examples of the natural references that the poem includes. This could signify a mother’s love being natural, endless and essential to her. By comparing her to various natural and beautiful things, Nichols really captures the sense of awe and admiration she holds for her mother. She describes her as â€Å"water†. Traditionally water symbolizes life, healing and cleansing. She continues to describe her mother as â€Å"deep and bold and fathoming† this only accentuates the emotions and feelings within their relationship, the confidence, courage and bravery (all features of the sea if you perceive it metaphorically), and the quality of understanding that her mother has. Her mother is also said to be the â€Å"moon’s eye† to her, this conveys how she was a guidance to Nichols during her dark moments like the moon only appearing at night. In relation to the previous stanza’s theme of water, the moon is also known to control the tide. If seen in a metaphorical sense, her mother is the moon and Nichols is the tide, being pulled towards her mother for safety and protection as suggests in the line â€Å"pull and grained and mantling†. Her mother became her strength and foundation when she needed her to be. â€Å"Sunrise† could be a metaphor demonstrating the joy and happiness that her mother brought into her life. Sunrise meaning she never set, that she never ended; she was always fresh and new. â€Å"Rise and warm and streaming†, warmth indicates a sense of comfort, rise embodies a subtle power that her mother has and streaming displays a ceaseless love. Evocative words are used to give more strength towards Nichols’ opinion on her mother and expresses how much of a important character she was in her life. And in a way, causes us, as the readers to be able to relate and in turn think of our own relationships with our parents. The fourth stanza is concentrated on food, drawing on Nichols’ Caribbean roots thus giving a more personal insight into the poem. She uses the double verb; â€Å"replenishing replenishing†, because like her natural references; the tide, water or sunrise, her mother is always there. The use of the plural form of â€Å"future† in the final line is significant. What these â€Å"futures† will contain is undefined by the mother; she has faith in her daughter hence the addition of â€Å"wide† showing that the mother knew her daughter would take advantage of all the different opportunities offered to her. And as if her parenting has been about creating possibilities, rather than deciding or controlling her daughter’s future. The main idea of â€Å"Praise Song for My Mother† is that parents – specifically mothers – are a source of nourishment and sustenance for their children, consistently providing them with the necessities in order to flourish and advance. Water, the moon and the sun are all elements that add to the timeless quality created in the relationship between mother and daughter. The keyword within the piece is â€Å"replenishing†, repeated in order to strengthen the reliability of the mother when giving everything her daughter needs to overcome obstacles and life’s numerous challenges. The celebratory and commemorative nature of the poem can be seen in the active and positive language the poet displays. She is praised over and over again for the qualities that she presents to her daughter, when helping her to adulthood. The mother is seen as an inspiration. It is not just a command to â€Å"go to your wide futures† that directs and leads the daughter into maturity but the example that her mother has set. Show preview only The above preview is unformatted text This student written piece of work is one of many that can be found in our GCSE Other Poets section.

Monday, November 4, 2019

What Main Measures Of Economic Activity Fail Include CPI and GDP Essay

What Main Measures Of Economic Activity Fail Include CPI and GDP - Essay Example The nation's central measure of well-being works like a calculating machine that adds but cannot subtract. It treats everything that happens in the market as a gain for humanity, while ignoring everything that happens outside the realm of monetized exchange, regardless of the importance to well-being (Cobb, 1995). But GNP/GDP measures have some flaws in fully estimating economic development; the most common flaws are listed below: One should not neglect the way GDP ignores the contribution of the social realm--that is, thus the economic roles of household is not taken into account. This is where much of the nation's most important work gets done. Why this happens can be explained by the fact that money do not change hands. The GDP doesn't count it at all--which means that the more our families and communities decline and a monetized service sector takes their place, the more the GDP goes up. The GDP totally disregard the distribution of income, for example, so that enormous gains at the top appear as new prize for all. It makes no distinction between the person in the secure high-tech job and the "downsized" white-collar worker who has to work two jobs at lower pay. CPI CPI is used as an economic indicator to measure inflation. The CPI is an indicator of the effectiveness of government policy, besides it is used by business executives, labor leaders and other private citizens use the index as a guide in making economic decisions. The Columbia Encyclopedia defines The Consumer Price Index (CPI), as a measurement of the cost of living prepared by the U.S. Bureau of Labor Statistics, tracks changes in retail prices of an average "market basket." Changes are compared to prices in a previously selected base year, from which figures the percentage increase or decrease in the cost of living can be calculated. In addition to changes over time, such analyses must also consider regional variations in the cost of living, and the relative weighting of the components of the index must be reappraised periodically. Despite its enhancements over the years, the CPI still has considerable problems as an inflation measure. For instance, the index overstates many individual price increases by failing to fully adjust posted price changes for quality improvements and by underestimating the growth of sales by discount retailers (Bureau of Labor Statistics, 1997). Economists take into consideration the CPI when taking time-series measurements of financial instruments, since such measurements can only sense if they are expressed in "constant" money terms. One should bear in mind that the CPI is not an economic variable, as it is statistic measure of inflation. To calculate the monthly CPI, the US Department of Labor takes a weighted average of prices of various things that consumers purchase, and then its statisticians try to figure out the various proportions of different items in a "mythical" household budget. For example, the

Saturday, November 2, 2019

Organizational Problem Assignment Example | Topics and Well Written Essays - 750 words

Organizational Problem - Assignment Example Introduction With an ever-growing population in just about every part of the United States, there is also a growing problem with criminal acts, particularly where offenders are arrested and a case comes to trial. How to review any case that comes in is important in that all the information is in a database (MIS) and properly coded for easier review to all concerned, particularly the judge. Keeping it all together between the court systems is the job of the court administrator. 1. As the new court administrator through the County Human Resource Division, a consolidation must first be made of schedules, list of personnel connected to those five court systems, and whatever current operations conducted in those systems must filter in to a main database which the court administrator handles (Allen & Sawhney 2009). This will also include the County Clerks Office and the District Attorney’s Office as well. A first examination can be made to determine what the judges of the courts spe cialize in so that most of the cases that fit the judge’s expertise will be assigned to that court. ... The District Attorney’s office must also be in on the meetings in order to make any comments or suggestions about the restructuring of case distribution (BJA 2008). At the same time, other members of the Justice system, involved in administration, should also be involved to discuss current issues with the court system as it stands. Every time a case is logged into the computer system which tags into the main database at the administrator’s office, the case is reviewed first and tagged for either a court trial or a preliminary meeting by lawyers with the judge first to see whether it is a prosecutable case. If it is not, but it does require some type of action by the judge, then it can be done right away with a judge’s signed order. However, all sides of the judicial parties must be in full agreement as to the outcome and solution, such as a remediation to a community program (BJA 2008; Dempsey & Forst 2013). Other cases, based on evidence, are definitely lined up for a courtroom appearance, such as in drug trafficking and violent crimes. All judges must agree to this procedure and how cases are viewed when first logged in, must be handled consistently across the board with approved criteria applied on each case as it comes in. This requires the system of coding the level of crime or nuisance implied by the arresting officer (BJA 2008). Additionally, lawyers involved with the defendants, must also be logged into the system, particularly to note if there are any conflicts between cases to be tried at the same time in different courts (BJA 2008; Peak 2012). As a last step, weekly or bi-weekly meetings, initially, can be held with all the judges and court personnel in order to iron out any issues which arise and need