Saturday, August 31, 2019

Digital library Essay

Digital library An electronic library (colloquially referred to as a digital library) is a library in which collections are stored in electronic media formats (as opposed to print, microform, or other media) and accessible via computers. [1] Wikipedia:VerifiabilityThe electronic content may be stored locally, or accessed remotely via computer networks. An electronic library is a type of information retrieval system. In the context of the DELOS [2], a Network of Excellence on Digital Libraries, and DL. org [3], a Coordination Action on Digital Library Interoperability, Best Practices and Modelling Foundations, Digital Library researchers and practitioners and software developer produced a Digital Library Reference Model[4][5] which defines a digital library as: â€Å"A potentially virtual organisation, that comprehensively collects, manages and preserves for the long depth of time rich digital content, and offers to its targeted user communities specialised functionality on that content, of defined quality and according to comprehensive codified policies. â€Å"[6] The first use of the term digital library in print may have been in a 1988 report to the Corporation for National Research Initiatives[7]Wikipedia:Verifiability The term digital libraries was first popularized by the NSF/DARPA/NASA Digital Libraries Initiative in 1994. [8] These draw heavily on As We May Think by Vannevar Bush in 1945, which set out a vision not in terms of technology, but user experience. [9] The term virtual library was initially used interchangeably with digital library, but is now primarily used for libraries that are virtual in other senses (such as libraries which aggregate distributed content). A distinction is often made between content that was created in a digital format, known as born-digital, and information that has been converted from a physical medium, e. g. paper, by digitizing. It should also be noted that not all electronic content is in digital data format. The term hybrid library is sometimes used for libraries that have both physical collections and electronic collections. For example, American Memory is a digital library within the Library of Congress. Some important digital libraries also serve as long term archives, such as arXiv and the Internet Archive. Others, such as the Digital Public Library of America, seek to make digital information widely accessible through public libraries. [10] Academic repositories Many academic libraries are actively involved in building institutional repositories of the institution’s books, papers, theses, and other works which can be digitized or were ‘born digital’. Many of these repositories are made available to the general public with few restrictions, in accordance with the goals of open access, in contrast to the publication of research in commercial journals, where the publishers often limit access rights. Institutional, truly free, and corporate repositories are sometimes referred to as digital libraries. Digital archives Physical archives differ from physical libraries in several ways. Traditionally, archives are defined as: 1. Containing primary sources of information (typically letters and papers directly produced by an individual or organization) rather than the secondary sources found in a library (books, periodicals, etc. ). 2. Having their contents organized in groups rather than individual items. 3. Having unique contents. The technology used to create digital libraries is even more revolutionary for archives since it breaks down the second and third of these general rules. In other words, â€Å"digital archives† or â€Å"online archives† will still generally contain primary sources, but they are likely to be described individually rather than (or in addition to) in groups or collections. Further, because they are digital their contents are easily reproducible and may indeed have been 1 Digital library reproduced from elsewhere. The Oxford Text Archive is generally considered to be the oldest digital archive of academic physical primary source materials. The future Large scale digitization projects are underway at Google, the Million Book Project, and Internet Archive. With continued improvements in book handling and presentation technologies such as optical character recognition and ebooks, and development of alternative depositories and business models, digital libraries are rapidly growing in popularity. Just as libraries have ventured into audio and video collections, so have digital libraries such as the Internet Archive. Google Books project recently received a court victory on proceeding with their book-scanning project that was halted by the Authors’ guild. This helped open the road for libraries to work with Google to better reach patrons who are accustomed to computerized information. One factor that gave Google an advantage is the librarie’s fair use argument. According to Larry Lannom, Director of Information Management Technology at the nonprofit Corporation should be for National Research Initiatives, â€Å"all the problems associated with digital libraries are wrapped up in archiving. † He goes on to state, â€Å"If in 100 years people can still read your article, we’ll have solved the problem. † Daniel Akst, author of The Webster Chronicle, proposes that â€Å"the future of libraries — and of information — is digital. † Peter Lyman and Hal Varian, information scientists at the University of California, Berkeley, estimate that â€Å"the world’s total yearly production of print, film, optical, and magnetic content would require roughly 1. 5 billion gigabytes of storage. † Therefore, they believe that â€Å"soon it will be technologically possible for an average person to access virtually all recorded information. â€Å"[11] Searching Most digital libraries provide a search interface which allows resources to be found. These resources are typically deep web (or invisible web) resources since they frequently cannot be located by search engine crawlers. Some digital libraries create special pages or sitemaps to allow search engines to find all their resources. Digital libraries frequently use the Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH) to expose their metadata to other digital libraries, and search engines like Google Scholar, Yahoo! and Scirus can also use OAI-PMH to find these deep web resources. [12] There are two general strategies for searching a federation of digital libraries: 1. distributed searching, and 2. searching previously harvested metadata. Distributed searching typically involves a client sending multiple search requests in parallel to a number of servers in the federation. The results are gathered, duplicates are eliminated or clustered, and the remaining items are sorted and presented back to the client. Protocols like Z39. 50 are frequently used in distributed searching. A benefit to this approach is that the resource-intensive tasks of indexing and storage are left to the respective servers in the federation. A drawback to this approach is that the search mechanism is limited by the different indexing and ranking capabilities of each database, making it difficult to assemble a combined result consisting of the most relevant found items. Searching over previously harvested metadata involves searching a locally stored index of information that has previously been collected from the libraries in the federation. When a search is performed, the search mechanism does not need to make connections with the digital libraries it is searching – it already has a local representation of the information. This approach requires the creation of an indexing and harvesting mechanism which operates regularly, connecting to all the digital libraries and querying the whole collection in order to discover new and updated resources. OAI-PMH is frequently used by digital libraries for allowing metadata to be harvested. A benefit to this approach is that the search mechanism has full control over indexing and ranking algorithms, possibly 2 Digital library allowing more consistent results. A drawback is that harvesting and indexing systems are more resource-intensive and therefore expensive. Frameworks The formal reference models include the DELOS Digital Library Reference Model[13] and the Streams, Structures, Spaces, Scenarios, Societies (5S) formal framework. [14] The Reference Model for an Open Archival Information System (OAIS) provides a framework to address digital preservation. [15] Construction and organization See also Digital Collections Selection Criteria. Software There are a number of software packages for use in general digital libraries, for notable ones see Digital library software. Institutional repository software, which focuses primarily on ingest, preservation and access of locally produced documents, particularly locally produced academic outputs, can be found in Institutional repository software. This software may be proprietary, as is the case with the Library of Congress which uses Digiboard and CTS to manage digital content. Digitization In the past few years, procedures for digitizing books at high speed and comparatively low cost have improved considerably with the result that it is now possible to digitize millions of books per year. [16] Google book-scanning project [17] is also working with libraries to offer digitize books pushing forward on the digitize book realm. Advantages The advantages of digital libraries as a means of easily and rapidly accessing books, archives and images of various types are now widely recognized by commercial interests and public bodies alike. [18] Traditional libraries are limited by storage space; digital libraries have the potential to store much more information, simply because digital information requires very little physical space to contain it. As such, the cost of maintaining a digital library can be much lower than that of a traditional library. A physical library must spend large sums of money paying for staff, book maintenance, rent, and additional books. Digital libraries may reduce or, in some instances, do away with these fees. Both types of library require cataloguing input to allow users to locate and retrieve material. Digital libraries may be more willing to adopt innovations in technology providing users with improvements in electronic and audio book technology as well as presenting new forms of communication such as wikis and blogs; conventional libraries may consider that providing online access to their OPAC catalogue is sufficient. An important advantage to digital conversion is increased accessibility to users. They also increase availability to individuals who may not be traditional patrons of a library, due to geographic location or organizational affiliation. †¢ No physical boundary. The user of a digital library need not to go to the library physically; people from all over the world can gain access to the same information, as long as an Internet connection is available. †¢ Round the clock availability A major advantage of digital libraries is that people can gain access 24/7 to the information. †¢ Multiple access. The same resources can be used simultaneously by a number of institutions and patrons. This may not be the case for copyrighted material: a library may have a license for â€Å"lending out† only one copy at a time; this is achieved with a system of digital rights management where a resource can become inaccessible after expiration of the lending period or after the lender chooses to make it inaccessible (equivalent to returning the 3 Digital library †¢ †¢ †¢ †¢ †¢ resource). Information retrieval. The user is able to use any search term (word, phrase, title, name, subject) to search the entire collection. Digital libraries can provide very user-friendly interfaces, giving clickable access to its resources. Preservation and conservation. Digitization is not a long-term preservation solution for physical collections, but does succeed in providing access copies for materials that would otherwise fall to degradation from repeated use. Digitized collections and born-digital objects pose many preservation and conservation concerns that analog materials do not. Please see the following â€Å"Problems† section of this page for examples. Space. Whereas traditional libraries are limited by storage space, digital libraries have the potential to store much more information, simply because digital information requires very little physical space to contain them and media storage technologies are more affordable than ever before. Added value. Certain characteristics of objects, primarily the quality of images, may be improved. Digitization can enhance legibility and remove visible flaws such as stains and discoloration. [19] Easily accessible. Challenges Digital preservation. Digital preservation aims to ensure that digital media and information systems are still interpretable into the indefinite future. Each necessary component of this must be migrated, preserved or emulated. [20] Typically lower levels of systems (floppy disks for example) are emulated, bit-streams (the actual files stored in the disks) are preserved and operating systems are emulated as a virtual machine. Only where the meaning and content of digital media and information systems are well understood is migration possible, as is the case for office documents. [21][22] However, at least one organization, the WiderNet Project, has created an offline digital library, the eGranary, by reproducing materials on a 4 TB hard drive. Instead of a bit-stream environment, the digital library contains a built-in proxy server and search engine so the digital materials can be accessed using an Internet browser. Also, the materials are not preserved for the future. The eGranary is intended for use in places or situations where Internet connectivity is very slow, non-existent, unreliable, unsuitable or too expensive. Copyright and licensing Digital libraries are hampered by copyright law because, unlike with traditional printed works, the laws of digital copyright are still being formed. The republication of material on the web by libraries may require permission from rights holders, and there is a conflict of interest between libraries and the publishers who may wish to create online versions of their acquired content for commercial purposes. In 2010, it was estimated that twenty-three percent of books in existence were created before 1923 and thus out of copyright. Of those printed after this date, only five percent were still in print as of 2010. Thus, approximately seventy-two percent of books were not available to the public. [23] There is a dilution of responsibility that occurs as a result of the distributed nature of digital resources. Complex intellectual property matters may become involved since digital material is not always owned by a library. [24] The content is, in many cases, public domain or self-generated content only. Some digital libraries, such as Project Gutenberg, work to digitize out-of-copyright works and make them freely available to the public. An estimate of the number of distinct books still existent in library catalogues from 2000 BC to 1960, has been made. [25] The Fair Use Provisions (17 USC  § 107) under the Copyright Act of 1976 provide specific guidelines under which circumstances libraries are allowed to copy digital resources. Four factors that constitute fair use are â€Å"Purpose of the use, Nature of the work, Amount or substantiality used and Market impact. â€Å"[26] 4 Digital library Some digital libraries acquire a license to lend their resources. This may involve the restriction of lending out only one copy at a time for each  license, and applying a system of digital rights management for this purpose (see also above). The Digital Millennium Copyright Act of 1998 was an act created in the United States to attempt to deal with the introduction of digital works. This Act incorporates two treaties from the year 1996. It criminalizes the attempt to circumvent measures which limit access to copyrighted materials. It also criminalizes the act of attempting to circumvent access control. [27] This act provides an exemption for nonprofit libraries and archives which allows up to three copies to be made, one of which may be digital. This may not be made public or distributed on the web, however. Further, it allows libraries and archives to copy a work if its format becomes obsolete. [28] Copyright issues persist. As such, proposals have been put forward suggesting that digital libraries be exempt from copyright law. Although this would be very beneficial to the public, it may have a negative economic effect and authors may be less inclined to create new works. [29] Another issue that complicates matters is the desire of some publishing houses to restrict the use of digit materials such as e-books purchased by libraries. Whereas with printed books, the library owns the book until it can no longer be circulated, publishers want to limit the number of times an e-book can be checked out before the library would need to repurchase that book. â€Å"[HarperCollins] began licensing use of each e-book copy for a maximum of 26 loans. This affects only the most popular titles and has no practical effect on others. After the limit is reached, the library can repurchase access rights at a lower cost than the original price. † [30] While from a publishing perspective, this sounds like a good balance of library lending and protecting themselves from a feared decrease in book sales, libraries are not set up to monitor their collections as such. They acknowledge the increased demand of digital materials available to patrons and the desire of a digital library to become expanded to include best sellers, but publisher licensing may hinder the process†¦ Metadata creation In traditional libraries, the ability to find works of interest is directly related to how well they were cataloged. While cataloging electronic works digitized from a library’s existing holding may be as simple as copying or moving a record from the print to the electronic form, complex and born-digital works require substantially more effort. To handle the growing volume of electronic publications, new tools and technologies have to be designed to allow effective automated semantic classification and searching. While full text search can be used for some items, there are many common catalog searches which cannot be performed using full text, including: †¢ finding texts which are translations of other texts. †¢ linking texts published under pseudonyms to the real authors (Samuel Clemens and Mark Twain, for example) †¢ differentiating non-fiction from parody (The Onion from The New York Times, for example). References [1] Greenstein, Daniel I. , Thorin, Suzanne Elizabeth. The Digital Library: A Biography (http:/ / www. clir. org/ PUBS/ reports/ pub109/ pub109. pdf). Digital Library Federation (2002) ISBN 1-933645-18-0. Accessed June 25, 2007. [2] http:/ / www. delos. info [3] http:/ / www. dlorg. eu [4] L. Candela, G. Athanasopoulos, D. Castelli, K. El Raheb, P. Innocenti, Y. Ioannidis, A. Katifori, A. Nika, G. Vullo, S. Ross: The Digital Library Reference Model. April 2011 ( PDF (http:/ / bscw. research-infrastructures. eu/ pub/ bscw. cgi/ d222816/ D3. 2b Digital Library Reference Model. pdf)) [5] L. Candela et al. : The DELOS Digital Library Reference Model – Foundations for Digital Libraries. Version 0. 98, February 2008 ( PDF (http:/ / www. delos. info/ files/ pdf/ ReferenceModel/ DELOS_DLReferenceModel_0. 98. pdf)) [6] L. Candela, G. Athanasopoulos, D. Castelli, K. El Raheb, P. Innocenti, Y. Ioannidis, A. Katifori, A. Nika, G. Vullo, S. Ross: The Digital Library Reference Model. April 2011, 17. ( PDF (http:/ / bscw. research-infrastructures. eu/ pub/ bscw. cgi/ d222816/ D3. 2b Digital Library Reference Model. pdf)) 5 Digital library [7] Kahn, R. E. , & Cerf, V. G. (1988). The Digital Library Project Volume I: The World of Knowbots, (DRAFT): An Open Architecture For a Digital Library System and a Plan For Its Development (http:/ / hdl. handle. net/ 4263537/ 2091). Reston, VA: Corporation for National Research Initiatives. [8] Edward A. Fox. The Digital Libraries Initiative – Update and Discussion. (http:/ / www.asis. org/ Bulletin/ Oct-99/ fox. html), Bulletin of the America Society of Information Science, Vol. 26, No 1, October/November 1999. [9] Candela, L. ; Castelli, D. & Pagano, History, Evolution and Impact of Digital Libraries (http:/ / www. igi-global. com/ viewtitle. aspx? titleid=47467& sender=4dcefe4d-ef33-4836-8eea-f02af2cc374d). In P. Iglezakis, I. ; Synodinou, T. & Kapidakis, S. (ed. ) E-Publishing and Digital Libraries: Legal and Organizational Issues, IGI Global, 2011, 1- 30 [10] Yi, Esther, Inside the Quest to Put the World’s Libraries Online (http:/ / www. theatlantic. com/ entertainment/ archive/ 2012/ 07/ inside-the-quest-to-put-the-worlds-libraries-online/ 259967/ ), The Atlantic, July 26, 2012. [11] Akst, D. (2003). The Digital Library: Its Future Has Arrived. Carnegie Reporter, 2(3), 4-8. [12] Koehler, AEC. Some Thoughts on the Meaning of Open Access for University Library Technical Services Serials Review Vol. 32, 1, 2006, p. 17 [13] Agosti, M. , Candela, L. , Castelli, D. , Ferro, N. , Ioannidis, Y. , Koutrika, G. , Meghini, C. , Pagano, P. , Ross, S. , Schek, H. -J. , & Schuldt, H. (2006). A Reference Model for DLMSs Interim Report. In L. Candela, & D. Castelli (Eds. ), Deliverable D1. 4. 2 – Reference Model for Digital Library Management Systems [Draft 1]. DELOS, A Network of Excellence on Digital Libraries — IST-2002-2. 3. 1. 12, Technology-enhanced Learning and Access to Cultural Heritage. Online at: http:/ / 146. 48. 87. 122:8003/ OLP/ Repository/ 1. 0/ Disseminate/ delos/ 2006_WP1_D142/ content/ pdf? version=1 [14] Goncalves, M. A. , Fox, E. A. , Watson, L. T. , & Kipp, N. A. (2004). Streams, Structures, Spaces, Scenarios, Societies (5S): A Formal Model for Digital Libraries. ACM Transactions on Information Systems (TOIS),22 (2), 270-312. [15] â€Å"The DSpace team recognized the value of the OAIS framework and recast the repository’s architecture to accommodate this archival framework† [16] Committee on Institutional Cooperation: Partnership announced between CIC and Google (http:/ / www. cic. uiuc. edu/ programs/ CenterForLibraryInitiatives/ Archive/ PressRelease/ LibraryDigitization/ index. shtml), 6 June 2007, Retrieved 7. [17] http:/ / www. google. com/ googlebooks/ library. html [18] European Commission steps up efforts to put Europe’s memory (http:/ / europa. eu/ rapid/ pressReleasesAction. do? reference=IP/ 06/ 253& type=HTML& aged=0& language=EN& guiLanguage=en) on the Web via a â€Å"European Digital Library† Europa press release, 2 March 2006 [19] Gertz, Janet. â€Å"Selection for Preservation in the Digital Age. † Library Resources & Technical Services. 44(2) (2000):97-104. [20] Cain, Mark. â€Å"Managing Technology: Being a Library of Record in a Digital Age†, Journal of Academic Librarianship 29:6 (2003). [21] Breeding, Marshall. â€Å"Preserving Digital Information. †. Information Today 19:5 (2002). [22] Teper, Thomas H. â€Å"Where Next? Long-Term Considerations for Digital Initiatives. † Kentucky Libraries 65(2)(2001):12-18. [23] Van Le, Christopher, â€Å"Opening the Doors to Digital Libraries: A Proposal to Exempt Digital Libraries From the Copyright Act,† Case Western Reserve Journal of Law, Technology & The Internet, 1. 2 (Spring 2010),135. [24] Pymm, Bob. â€Å"Building Collections for All Time: The Issue of Significance. † Australian Academic & Research Libraries. 37(1) (2006):61-73. [25] Antique Books (http:/ / www. antiquebooks. net/ datatop. html) [26] Hirtle, Peter B. , â€Å"Digital Preservation and Copyright,† (http:/ / fairuse. stanford. edu/ commentary_and_analysis/ 2003_11_hirtle. html) Stanford University Libraries. Retrieved October 24, 2011. [27] United States Copyright Office, â€Å"The Digital Millennium Copyright Act of 1998 – U. S. Copyright Office Summary† (http:/ / www. copyright. gov/ legislation/ dmca. pdf) 1998, 2. [28] United States Copyright Office, â€Å"The Digital Millennium Copyright Act of 1998 – U. S. Copyright Office Summary† (http:/ / www. copyright. gov/ legislation/ dmca. pdf) 1998, 15. [29] Van Le, Christopher, â€Å"Opening the Doors to Digital Libraries: A Proposal to Exempt Digital Libraries From the Copyright Act,† Case Western Reserve Journal of Law, Technology & The Internet, 1. 2 (Spring 2010),145. [30] STROSS, RANDALL. â€Å"For Libraries and Publishers, an E-Book Tug of War – NYTimes. com. † The New York Times – Breaking News, World News & Multimedia. N. p. , n. d. Web. 6 Mar. 2013. 6 Digital library External links †¢ CNRI-DARPA: D-Lib Magazine (http://www. dlib. org/) Electronic publication that primarily focuses on digital library research and development †¢ http://www. librittio. com – World’s Most Advanced Professional Digital Library System †¢ / Democratization of Literature:The Rise of the Digital Libraries on the Internet (http://www. reflectionedu.com/ attachments/File/Barnolipi/EngT_8_11. pdf) by Tarun Tapas Mukherjee]. From BARNOLIPI: An Interdisciplinary Journal, Volume I, Issue II, 2011. [http://fbc. pionier. net. pl/ Search Engine of Free Resources, available online in Polish Digital Libraries (http://www. barnolipi. com/) Conferences †¢ †¢ †¢ †¢ †¢ TPDL (http://www. tpdl. eu/) – International Conference on Theory and Practice of Digital Libraries ECDL (http://ecdlconference. isti. cnr. it/) – European Conference on Digital Libraries ICADL (http://www. icadl. org/) – International Conference on Asian Digital Libraries JCDL (http://www. jcdl. org/) – ACM and IEEE Joint Conference on Digital Libraries ICSD (http://www. icsd-conference. org/) – International Conference for Digital Libraries and the Semantic Web 7 Article Sources and Contributors Article Sources and Contributors Digital library Source: http://en. wikipedia. org/w/index. php? oldid=570781509 Contributors: — April, 24fan24, 2A00:1620:C0:50:C8B0:1C9B:27C1:7990, A. B. , Aap3030, Aarontay, Abdullah Albluchi, Acc60, Adoniscik, Afl2784, Aladin p, Alain Caraco, Alaniaris, Alexius08, Alf7e, Andrejj, Andy Dingley, Andyjsmith, Aragor, Arctic Kangaroo, Artdhtml, Ashenfelder, Ata, Ata.rehman, Azpayel, BadBull, Badan barman, Baileycw, Beetstra. BlindWanderer, Bob103051, Bomzhik, Bonadea, Bujar, Buridan, CVCE, Candela, Catfoo, Cej10, Ceyockey, Charivari, Chhotu372, Choukimath, Coldmachine, CommonsDelinker, Conversion script, Creationlaw, Curious1i, CutOffTies, Cwconservation, DGG, DaGizza, DabMachine, Dalf, Danny lost, Dawnseeker2000, DebbieWiLS, Deborah-jl, Denverjeffrey, Diglibs, Disavian, Djstasiewski, Dlkwiki, Dthomsen8, Dylan furnas, Eanc, Eilthireach, Enduser, Epbr123, Erianna, Evil saltine, Fatalityonline, Feedmecereal, Femto, Filterking. Floating red, Fmccown, Gaius Cornelius, Galka, Gareth Owen, Gego, Gouwepv, Greenrd, Greenteablues, Grika, Harris7, Hhanke, Hiogui, Hollymorganelli, Hu12, Ilsessay, Ipigott, Irbisgreif, Irishguy, Ithinkhelikesit, Ixfd64, JLaTondre, JakobVoss, Jaqian, Jchang12, Jeremykemp, Jewers, Jo 316, John, John Hubbard, Jpbowen, Jpom, Jsweetin, Jua Cha, Jweise, Kanags, Kansoku, Karen Johnson, Kattmamma, Katywatson, Kbel32, Kggy, Killian441, Kinu, Klemen Kocjancic, Ktr101, LadislavNK, Lawandtech, Lawsonstu, LeeNapier, Leonardo. candela, Loonymonkey, Lquilter, Ltfhenry, Lyc. Cooperi, Lysy, MBisanz, MK8, Maristella. agosti, Marselan, Martinlc, Masgatotkaca, Materialscientist, Mboverload, Mcanabalb, Mean as custard, Mets501, Mica Gomes, Michael Hardy, Mike. lifeguard, Missenc, Mmj, Mogh, Morbusgravis, Mordsan, MrOllie, Mseem, Mwisotzky, Mxn, Mairtin, Ncschistory, Nealmcb, NeilN, Neilc, Neo3DGfx, Nigholith, Night eule, Noisy, NorwalkJames, Notinasnaid, Nurg, OSU1980, Oicumayberight, OlEnglish, Olexandr Kravchuk, Olgerd, Omegatron, Pamplemousse, Patrick, PeepP, Phauly, Pinethicket, Pinkadelica, Poindexter Propellerhead, Poor Yorick, Prajapati Reena, Ps07swt, Ptgraham, Puckly, Padraic MacUidhir, Quadell, RJBurkhart3, Racheltaketa, Raghith, Rajankila, Rich Farmbrough, Richard Arthur Norton (1958- ). Rickprelinger, Rlitwin, Robert Thibadeau, Rozek19, Russell Square, SRHMGSLP, Sander Sade, Sandox, Sayeedmd, Senu, Sfiga, Shanes, Shyamal, SimonP, Skomorokh, Skysmith, Smmurphy, Spdegabrielle, Stbalbach, Stephen Burnett, Stephen Gilbert, Stevertigo, Strabon, StradivariusTV, Stuartyeates, Supersion, Svchameli, TWWhiting, TakuyaMurata, Targi, Tentinator, The Anome, The Evil Spartan, TheNewPhobia, Thebt, Thingg, Timeshifter. Tl246, Tlearn, Trapow, Travczyk, Treemonster19, Tregoweth, Trek011, Ttm1974, User A1, Utcursch, Vamshi 12345, Vanprooi, Vector Potential, Vicky877, Victorlamp, Viriditas, Volphy, WJetChao, Wavelength, Wayland, Wikiborg, Wmahan, Wya, YVSREDDY, Yerpo, Yosri, Zack wadghiri, Zundark, Zzuuzz, 302 anonymous edits License Creative Commons Attribution-Share Alike 3. 0 //creativecommons. org/licenses/by-sa/3. 0/ 8.

Friday, August 30, 2019

Notes about officer’s Essay

You are the first officer at the scene of an outdoor assault. You find the victim bleeding but conscious, with two of the victim’s friends and several onlookers standing nearby. You call for backup and quickly glance around but see no one fleeing the scene. Describe the steps you would take while you wait for backup to arrive. What kind of search pattern(s) would investigators be most likely to employ in each of the following situations: Two people searching a small area with well-defined boundaries Several people searching a large area  A single person searching a large area Officer Bill Walter arrives at the scene of an apparent murder: a body bearing several gunshot wounds lies on the floor of a small, unair-conditioned house in late July. A pungent odor almost overwhelms him when he enters the house, so he opens a window to allow him to breathe so he can investigate the scene. While airing out the house, he secures the scene and interviews bystanders. When he inspects the scene, he discovers very little blood in the room and little evidence of a struggle. What mistake did Officer Walter make in his investigation? What conclusion did he draw about the scene from his observations? Officer Martin Guajardo is the first responder at an apparent homicide scene. After securing the area, interviewing the sole witness, and calling for backup, he begins to search for evidence. He makes note of a bloody knife lying next to the body, with a small scrap of bloody cloth clinging precariously to the knife. Because it is a very windy day, Officer Guajardo removes the scrap of fabric and seals it in a plastic bag. A few moments later, a crime-scene team, including a photographer, arrives to take over  the investigation. What mistakes, if any, did Officer Guajardo make before the crime-scene team arrived? During his search of a homicide scene, investigator David Gurney collects evidence that includes a bloody shirt. After the crime-scene team has completely processed the scene, Investigator Gurney packages the shirt in a paper bag, seals the bag, and labels it to indicate the contents. He then delivers the shirt to the laboratory with an evidence submission form. There, a forensic scientist breaks the seal, removes the shirt, and performs a series of tests on it. He replaces the shirt, discards the old seal, and places a new seal on the package containing his initials and the date on which it was resealed. What mistakes, if any, were made in handling the shirt? What important elements are missing from the following crime-scene sketch?

Thursday, August 29, 2019

Crusades: First Crusade and New Paragraph

The Crusades were a series of religiously sanctioned military campaigns waged by much of Western Christian Europe, particularly the Franks of France and the Holy Roman Empire. The specific crusades to restore Christian control of the Holy Land were fought over a period of nearly 200 years, between 1095 and 1291. There are several reasons for the Crusades, but the importance and relevance of some are debated by scholars even to this day. (NEW PARAGRAPH) In the Middle Ages, Christians considered Palestine the Holy Land because it was where Jesus had lived and taught.The Arabs had conquered Palestine in the 600s. Most Arabs were Muslims, but they usually tolerated other religions. Jews and Christians who paid their taxes and observed other regulations were free to live in Palestine and practice their own religion. The Arab rulers didn’t usually interfere with Christian pilgrims visiting Palestine, and European traders could generally do business there. During the 1000s the Seljuk Turks, people from central Asia who had adopted the Muslim faith, conquered Palestine and attacked Asia Minor, which was part of the Byzantine Empire. NEW PARAGRAPH) When the Turks threatened the capital city of Constantinople, the Byzantine emperor appealed to the pope in Rome.Because Christian pilgrims going to Palestine came home with reports of persecution from the Turks, the Byzantine emperor’s appeal for help found a reception in Europe. (NEW PARAGRAPH) Pope Urban I wanted to regain the Holy Land from the Muslims. He called a great meeting of church leaders and French nobles at Clermont France in 1095. At the meeting he encouraged the powerful feudal nobles to stop fighting with each other, and to join in one big war against the â€Å"unbelievers. Urban’s request made his listeners very enthusiastic and they joined in one big cry, â€Å"God wills it! † (NEW PARAGRAPH) From Clermont people traveled through France preaching the cause. The people who joined the expeditions sewed a cloth cross on their clothes. They were called crusaders, from the Latin word cruciata, which means, â€Å"marked with a cross. † People joined the Crusades, the expeditions to regain the Holy Land, for many different reasons. Most knights joined the crusades for the land and plunder in the rich Middle East. Merchants saw a chance to make money.The pope promised both heavenly and earthly rewards. Those who died on a Crusade were said to go strait to heaven. (NEW PARAGRAPH) The pope also guaranteed church protection of the crusader’s property and family during his absence. Debtors who joined a Crusade had their debts canceled. Criminals were relieved of punishment. The Crusades appealed to both a love of adventure and the promise of reward- the desire to escape debts or punishment. French and Norman nobles led the First Crusade that lasted from 1096 to 1099. In three organized armies, they marched across Europe to Constantinople. NEW PARAGRAPH) The crusaders received a hostile reception in Constantinople. The Byzantine emperor had asked for some assistance, but now, seeing three armies approaching the city, he feared they might capture and plunder the capitol. After much discussion the Byzantines allowed the crusaders to pass through Constantinople to begin their long, hot march across Asia Minor toward Palestine. In their wool and leather garments and their heavy armor, the crusaders suffered severely from the heat. Because they had few pack animals, a shortage of food and water plagued them.Additional problems erupted when the leaders quarreled over fiefs in the lands they captured. Despite these difficulties, however, the crusaders forged on to capture the city of Antioch. Then they marched toward Jerusalem. If the Turks had not also been quarreling and disunited, the expedition would have failed. (NEW PARAGRAPH) Conditions improved as the crusaders marched down the seacoast toward Palestine. Fleets of ships from the It alian cities of Genoa and Pisa brought reinforcements and supplies. The crusaders captured Jerusalem after a short battle and slaughtered the Muslim inhabitants.One leader wrote to the pope that his horse’s legs had been bloodstained to the knees from riding among the bodies of the dead Muslims. In the Middle East the crusaders set up four small states: the County of Edessa, the Principality of Antioch, the County of Tripole, and the Kingdom of Jerusalem. They introduced European feudalism and subdivided the land into fiefs controlled by vassals and lords. For almost a century, the Europeans occupied these lands. (NEW PARAGRAPH) Brisk European trade, with goods carried mostly in Italian ships, sprang up.Christians and Muslims lived in close proximity and grew to respect each other. Many Christians adopted Eastern customs and came to prefer Eastern food and clothing. The Second Crusade began in 1147, after the Turks had recaptured the important city of Edessa and threatened th e Kingdom of Jerusalem. In this Crusade, King Louis VII of France and the Holy Roman Emperor, Conrad III led their armies across Europe to the Holy Land. They were fighting separately, and didn’t join forces until they got to Damascus, which was held by the Turks.Luis and Conrad couldn’t capture the city and returned to Europe disgracefully in two years. In 1187 the Muslim leader Saladin recaptured Jerusalem. (NEW PARAGRAPH) Two years later the Third Crusade, the â€Å"Crusade of the Three Kings,† began and lasted until 1192. King Richard of England, King Philip Augustus of France, and Emperor Frederick Barboarossa of the Holy Roman Empire each started out at the head of a great army to regain the Holy Land. The Europeans failed once again, and an estimated 300,000 Christians and Muslims died.There were many more Crusades until 1291, when the Muslims captured the last Christian stronghold, in Acre. Fore 200 years a constant flow of Europeans streamed into the Ho ly Land. Over that period, however, the religious zeal of the crusaders had steadily dwindled. (NEW PARAGRAPH) From a military standpoint, all the Crusades except the first failed. The Muslims eventually recaptured Jerusalem and the rest of Palestine. However, Europeans learned many things of military importance, such as the crossbow, carrier pigeons and messengers, new siege tactics, and gunpowder.In Europe the Crusades increased the power of kings and decreased the power of feudal lords. Kings imposed new taxes and led armies drawn from their entire countries. The church also got more political power because of its leadership role in initiating the crusades. After the Crusades the status of women changed. When their husbands were gone they managed feudal estates. Europeans were influenced by the ideas exchanged among the crusaders form different countries and between the crusaders and the other people they met.

Wednesday, August 28, 2019

Constructing an argument Essay Example | Topics and Well Written Essays - 1000 words

Constructing an argument - Essay Example Rejection is a scenario where one feels a sense of discontentment as a result of not being capable of achieving something or being below other people’s expectations. The fear of rejection cannot be ignored since its consequences are so numerous due to emotional and psychological torture that comes with it. It does not make one a lesser being when one undergoes fear of rejection since it is something that is inevitable at one time in life. Trying to control your sub conscious mind to deviate from such thought is akin to running away from reality of life. Accepting every challenge that comes in life is a means and a remedy to making you a better person through self acceptance (Dooly 260). It is necessary to define fear of rejection before proceeding further. The fear of rejection can be defined as the act of intrinsic, irrational anxiety which is inherent out of the phobia of people unfamiliar to us otherwise known as xenophobia; fear of failure, fear of love (philophobia), tech nology (technophobia) or even resulting from socializing , also known as sociophobia. As a matter of fact, it must be acknowledged that the difference in people’s in born features and biological elements in them may cause them either to develop fear of being rejected by others or withstand challenges that may befall them. My arguments will thus be geared towards opposing the fear of rejection. However, the fact that fear of rejection is a natural occurrence should not deter one from attempting what they feel is a worthy duty, thanks to a number of counselors, books and therapies that are currently available (McDonald et al. 565). Despite a number of people’s stereotypic belief that science and psychological counseling and therapy are capable of doing little to avert incidences of fear of rejection, much can be done with the application of these exercises. For instance, there are people who are naturally born shy; others are not actually shy but fear trying out new and unfamiliar things. Such people can be helped to achieve and boost their ego and the necessary self esteem that result from such fears. This can be done by organizing interactive sessions that will help them articulate the genesis of their fear and trying to find long term solutions aftermath. Mentioning history of people who have managed to overcome fear in their lives can act as great examples to be emulated. This is just an example of tried and tested fear-elimination method through which one can be helped to realize his or her worth (Jarcho 1890). Acknowledging that fear exists typically in every aspect of one’s cycle is the first step to assisting those who constantly fall victims of the impulse of fear. One reason why, for example, most men do not get the right spouses is because they fear losing. In the event that they try to convince the ladies to accept a hand in marriage and fail, most of them easily give up. Little do they know that a woman may say no for the first time, but again accept the request another time. The ego in men does not permit them in most occasions to accept defeat; they would rather stop trying than fail in the event of trying. Unassertiveness is also a characteristic feature of people who experience fear of unknown. Fear that is not managed or harnessed

Tuesday, August 27, 2019

The Many sides of Tom Essay Example | Topics and Well Written Essays - 500 words

The Many sides of Tom - Essay Example Tom longs for controversy. The demands of Amanda and the incessant needs of Laura were not enough for Tom. He treasured the edges of conflict that his father had inherited to him. Tom, ever in search of new horizons, looks beyond his dull household members and finds that his family arrangements fall short of his own social expectations. He pronounces, "Here there was only shouting and confusion and labor disturbances, sometimes violent, in otherwise peaceful cities..." (11). With an emphasis on "only", Tom had read the news from Europe and was not above strapping his nuclear family with his own expectations. In many ways, Tom views himself as a savior, and in doing so tries vainly to pass his troubled present off as some superior placement from the past. The dominating mother can know nothing of his complicated life, and his poor, dimwitted sister will never be able to taste the love for life that he has. As if rising above his own surroundings he tells Amanda, "Mother, Laura lives in a world of little glass animals. She plays old phonograph records - and that's about all" (39).

Tthe Role of the Fashion Buyer Essay Example | Topics and Well Written Essays - 1500 words

Tthe Role of the Fashion Buyer - Essay Example The essay "Tthe Role of the Fashion Buyer" concerns the fashion buyer. In this perspective, the roles of a merchandiser and a buyer are complementary but deviate to distinct paths. In a traditional aspect, buyers focus on the visual aspects of garments while merchandising focuses on the analytical and numerical aspects of garments. A buyer’s principal objective pertains to identifying market appropriate garments that can as well satisfy the company’s profit requirements. This overall responsibility split into several roles. To begin with, it is crucial to consider types of buying roles in terms of high street and high end perspective. This splits in terms of retailers, wholesalers and manufacturers. In high street fashion, a buyer may be involved with stocking a shop that deals with designer brands. However, high street fashion deals with other garments apart from designer brands. In a multiple retail store, a buyer would concern with a whole process of product developm ent and arranging delivery of finished products. In independent clothes’ retailing, a buyer purchases garments from wholesalers and sell at one’s suitable price. In terms of a multiple retail store, a buyer possesses several specific tasks. To begin with, a buyer should select a range of garments that satisfy an optimum profit plan. Target margin refers to the profit that occurs after deductions of discounts and unsold stock. In this sense, a buyer’s task pertains to maximizing sales, of purchased stock, and minimizing unsold stock. Besides, a buyer should consider specific profit margin for single products. This necessitates that a buyer works with a merchandiser for a proper mix of stock. In addition, they observe trends of other businesses for interpretation to target customers. In addition, a buyer has a task of identifying a reliable supply base. Buyers must be knowledgeable of ineffective suppliers’ effect on sales and eventual profits (Jackson & Sh aw 2000, p. 67). More importantly, it is vital for a supplier to consider quality in terms of the cost that the supplier imposes. Furthermore, a buyer should consider the reputation of a manufacturer and supplier in terms of unethical practices. The media are so sensitive that it can pull down a major fashion store because of such an affiliation. After choosing a dependable supplier, a buyer considers the input from entities such as design garment technology and merchandising. This necessitates a process whereby the buyer negotiates of cost prices to supplies. This requires a buyer to possess skills of negotiation in terms of levers. Besides, buyers should evaluate and research on relevant and research market (Entwistle 2009, p. 57). This information is so diverse that it should include future fashion trends, past and current sales. In addition, the buyer should evaluate a consumer’s closest need. Buyers should also check competitor stores for evaluation of garments and price s. Besides, buyers should establish communication channels with the management, suppliers and product teams. For instance, supplier communication is vital for realistic, accurate and realistic about the specific terms of a placed order. Product range entails significant presentation in which creative details are clearly evaluated. In addition, buyers have the mandate of considering supplies within the constraints of a store’s budget. Other parameters include consideration such as historical orientation on sales and color trends. In addition, a

Monday, August 26, 2019

Professional Portfolio Assignment Example | Topics and Well Written Essays - 1000 words - 1

Professional Portfolio - Assignment Example She/he worked side by side with me for 8 months and I admire the strong sense of dedication and responsibility she displayed both to the hospital and her/his patients. I am sad to inform you that our institution is currently undergoing a restructuring and some of the employees have to be released and (Your Name) is one of the people we have been forced to release. She/he insisted that she would be pleased to work with your institution and that is why I endorse her to you. As a nurse, (Your Name) displayed professionalism that impacted her patients and all people around her/him. Everyone here respects him/her the entire nursing staff here like her/his work. This is because he/she has been used severally as a resource by other nurses for difficult crisis and cases. (Your Name) has always done more than expected to ensure that he/she is able to deliver the best service care to the patients She/he is a very reliable medical professional with enough knowledge about her/his job and treats every person with respect. She/he is a wonderful person to work with and, despite the fact that we would miss her and her strong passion, I strongly recommend her to you. (Your Name) is well educated and has valuable experience to be a great medical nurse. In the event that you need any more details, kindly feel free to call me at _______ or email me at ________________. It is my great honor to recommend (Your Name) as a staff nurse at Bethel Medical Center. Despite the fact that I will miss (Your Name)s skill, professionalism and expertise in my practice, I believe that she/he will be able to implicate the same effort and impact the community in your institution. I am certain that (Your Name) is the kind of nurse that will effectively serve the community well whenever patients come looking for treatments related to her area of expertise. (Your Name) has been a very crucial asset to my practice. She/he has been able to develop exceptional abilities and skills in

Sunday, August 25, 2019

All Quiet On the Western Front Assignment- Close Reading Essay

All Quiet On the Western Front Assignment- Close Reading - Essay Example The story concludes with Paul’s death at the hands of a French sniper on a day near the end of the war. This book is not written by a military general, a politician, a hired ghost writer, a professional historian, but a common solider that has deep respect for human values. He writes without any hidden agenda. Though Paul and his friends joined the army charged with patriotism and with high expectations, soon the brutalities and other realities of war disenchanted them. The captioned pages elaborate the realities of war. In this short passage, the author has provided everything as to how a good books needs to be written. The original company of 150 men of which he has described is a mini-war front, and the description of the sufferings of the individual soldiers is moving. Paul writes about the life of a soldier and how he learns to disengage oneself from human emotions like fear, love and sympathy and turn almost cynical. Not the actual war, but the aftermath of the war worri es Paul. In the above scene, the members of the Second Company, a unit of German army men fighting during World War I, are resting to enjoy a short reprieve from active duty in the warfront. They have suffered heavy casualties, only eighty have returned from the original strength of 150. Paul gives an admirable description about the soldiers and the literary talents of the author are showing. Tjadenis a glutton, but his body is wiry, Haie Westhus, with a heavy body, Detgering who always things about his wife at home, Katczinsky, the cunning old man and the experienced one, and the unwilling cook, who goes by the rule-book of the army to issue rations. The genius of the author is showing throughout their conversation. The passages above highlight the main themes of the novel: How an ordinary soldier is impacted by the horrors of war. The usual features with the war novels are romance, valour, and heroism in the battlefield. But Paul describes about the

Saturday, August 24, 2019

Problem-solving tools and techniques Essay Example | Topics and Well Written Essays - 500 words

Problem-solving tools and techniques - Essay Example For example a son desires to search out an extraordinary present for his grand parents 25th anniversary, but he doesn’t have knowledge of what would suit the best. He brainstorms many gift suggestions to choose a gift that would explain his parents that how much they value for him. Benchmarking is the procedure of deciding who is the most excellent, who places the standard, and what that standard is. For example: In cricket, the victory in five successive World Cup finals declared Australia the benchmark. Groupthink describes one process by which a group can make bad or irrational decisions. In a groupthink situation, each member of the group attempts to match up his or her opinions to what they believe to be the consensus of the group Groupthink, a name created by social psychologist Irving Janis (1972), takes place when a group takes flawed decisions for the reason that group strains escorts to a deterioration of â€Å"mental efficiency, reality testing, and moral judgment† (p. 9). Nominal group technique (NGT) is a prearranged technique for group brainstorming that supports offerings from every person of the group. For example a group of bankers functioning on improving a management account has a clearly organized work manner, and therefore use NGT instead of Brainstorming to come up with the correct format. Intuition is the capability to acquire a logic, image or sense regarding somebody or something. Intuition communicates by signs, thoughts and sentiments. Intuition is present in everyone since his/her birth. For instance, you can be a fine author, excellent listener,  observant, imaginative, responsive, high flier and cultured. You may have a leadership quality ad you may have a quality to take a right decision on a right time. These things are God gifted and help you make

Friday, August 23, 2019

Construction of Nuclear Power Station Case Study

Construction of Nuclear Power Station - Case Study Example Besides the special protected area under the Birds and Habitat Directives, it is testing time to get all the owners to agree on the development. I work for the EDG Energy and I have to comment on three aspects of development and these are: The international legal drivers behind the development of which the largest driver is the Kyoto protocol, how the development will be regulated between central and local government, and how the compulsory purchase mechanism is likely to work for this project. The Kyoto Protocol to the United Nations Framework Convention on Climate Change (UNFCCC) adopted on 11th December 1997 is the biggest single international driver behind the development. This treaty contains legally binding quantitative commitments for industrialized countries, in force from 16 February 2005. The European Union is signatory to the Kyoto Protocol. As such, the construction of the nuclear power station on the banks of the Six Estuary must satisfy the provisions of Kyoto Protocol. The Kyoto Protocol is a legally binding agreement making it mandatory for industrialized nations to reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990. The goal is to lower overall emissions from six greenhouse gases namely, carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, hydrofluorocarbons (HFCs) and perfluorocarbons (PFCs). The national target for the reduction in the European Union is 8%. Nuclear energy does not require coal or any other element that emits greenhouse gas. However, nuclear energy produces nuclear waste and it is the disposal of this nuclear waste that requires to be handled with abundant care as it can be hazardous to the environment. The issue of handling nuclear waste is exacerbated as a foolproof method has not yet been found. The damaging effects of the Chernobyl nuclear disaster during the 1990s are fresh in people's minds everywhere. Such disasters push back any prospect of nuclear venture right at the proposal stage. In order for favorable decision, it is necessary for the European Union to provide adequately satisfactory record on complying with the Kyoto Protocol directives. The data provided by the European Union on current nuclear facilities usage in Europe does not make satisfactory reading (UNFCCC chief sees Kyoto Protocol countries on their way to reach emissions target). The use of nuclear energy on long time basis does not appear to be the best idea if there is no satisfactory consensus on the safe disposal of the nuclear wastage. Thus, Europe's compliance to Kyoto Protocol is fraught with controversies. There are

Thursday, August 22, 2019

The Awakening - the Sea Essay Example for Free

The Awakening the Sea Essay The sea in The Awakening represents not only Edna’s self-awakening, evolution and growth, but also the combination of freedom and death. In her search for freedom, the sea plays a part in the realization that the only way to achieve freedom is through death: her true awakening. We go as far as to say that throughout the novel, Edna is aware of this dark truth, but only on a subconscious level, which is why she only sees the sea as place of self-expression and freedom, but nothing deeper until the very end. She is alone in this awareness, which really isn’t manifested until her one-on-one encounter with the sea and the abysses of solitude, even though she is quite the loner throughout the novel. These meetings with the sea show a progression in Edna’s life, from afraid and dependent, to confused and in transition, to confident and fully awakened to her inevitable fate, the truth, the answer and only way out. This marks a loss of innocence and naà ¯vetà © of sorts, her turning from a pretty selfish and capricious child to a kind of responsible, strong and illuminated adult. Edna’s awakening and full transition from childlike to knowing was one full of difficulty and obstacles to surmount. The sea is simply a symbol of that evolution: the two main encounters with it are completely representative of Edna Pontellier’s isolated shift from dissatisfied and confused to entirely free of any restriction. It helps her come to realize that she shouldn’t expect or hope for anything from the society she lived in, no matter what she attempted to gain freeness from, including love affairs with anyone, whether it be Alcà ©e or Robert. The sea is the one and only thing guiding her real awakening, because it’s the only possible way to progressively gain complete independence, and, in the end, freedom through her death.

Wednesday, August 21, 2019

Service Provider Essay Example for Free

Service Provider Essay Objective The objective of this report is to analyse the Service Provider named, StarHub and its success towards providing good service and being popular among the Singapore Consumers. To identify the factors that contributed to the success of StarHub using swot analysis. Background StarHub Limited is telecommunication Service Company and is Singapore’s fully-integrated info communication Company. StarHub Limited also provides other communication services like Mobile Network Services, Digital Cable Services, and Internet service for both consumer and corporate markets. It holds the second position in Mobile Operator Service and it has the fastest two-way High-Speed Downlink Packet Access (HSPDA) and mobile network that has fastest network speed that gives up to 21Mega bit per second (mbps) with the help of the new 3G mobile telephony communication protocol technology. StarHub has this Hybrid Fiber-Coax (HCF) network which satisfies the consumers by providing multi-channel cable TV services which includes High Definition Television and on-demand services. It also provides Internet services in the form of Residential dial-up internet service and broadband internet via cable. It also provides mobile broadband where anyone can use it anywhere they want with network coverage. It delivers Ultra High broadband speed to its consumers. StarHub also provides digital voice service via cable with superior clarity. StarHub is the fast-rising challenger in the Singapore telecommunications Industry, placing second behind former government monopoly Singapore Telecom (SingTel). StarHub is also that markets only telecommunications group capable of providing the full range of telecommunications services, combining fixed and wireless telephone networks, cable television service, and broadband. Scope This report covers the analysis of Starhub Service Provider. It also covers the services given by the telecommunication services in Singapore and History of StarHub over the 10 Years. Surveys are done to collect data information of communication service consumers. Methods of enquiry Surveys are given to Consumers to get the opinion on the service they get  from StarHub. Finding out the factors through the surveys which contributed to the success in getting good reputation among the consumers in Singapore. 2.1 Management History Of StarHub. Management Singapore Government decided to liberalise the telecommunication sector by 2000. The 49% cap on foreign ownership of public telecommunications will be lifted and will give room for newcomers. StarHub was formed in April 2000. StarHub was given the license to deliver fixed network and mobile service on 7 May 1998. It was formed officially formed with Singapore Technologies Telemedia, Singapore Power, British Telecom and Nippon Telegraph and Telephone (NTT) having the major shares in it. At the same time 2 other telecoms were formed, SingTel M1 (Mobile 1).Till then it was only providing mobile services. StarHub manage to sign agreement with 16 countries including china, USA and United Kingdom for its roaming services which even brought more consumers to them. StarHub further developed by winning the city’s 3G cellular phone licenses. During the period from 2003 to 2009, StarHub manage to develop in mobile services further. StarHub was the first mobile operator to launch Blackberry which is well known for its Smartphone service like e-mail, web browsing and other wireless data access. Wireless data services were even further developed by StarHub. By the end of 2009, StarHub was the first mobile operator in Asia to launch HSPA+ service having a high download speeds across nationwide. StarHub manage to get the License for Internet Service Provider and joint force with CyberWay service provider which was the first internet industry in Singapore and was announce as StarHub Internet on 3 Dec 1999. On the same day itself, a free surf plan was announce in conjunction of the new service provided and it became too popular that more than 180,000 people signed up for the surf plan less than few months. Consumers could surf the internet for via dial up and pay only normal local charges. In the year 2000, StarHub merged with Singapore Cable Vision which is the only paid TV media entertainment in Singapore. Due to th e merger, it obtained the SCV’s cable television together with the broadband internet access operations. In 2005, StarHub online was formed to provide broadband internet service. Both services came under StarHub. StarHub cable TV also manages to develop over the years. They had more  people subscribing to their service as the number of channel had start to increase and there were more variety channels to watch. Digital Television service was brought in 2004 and 11 interactive channels were added in. This made a tremendous change in subscriptions to their TV services. And now StarHub is the first service provider that provides with High Definition Television (HDTV) service and has 6 High definition channels. StarHub Launched the Maxonline plan where it is the connected 24 hours and has unlimited access to internet. They provided plans which suited for heavy and light users of internet. For light users, it came up plans like flexi surf where you pay as you use. Consumers only have to pay what they use for.It had the fastest download speed in Singapore when the MaxOnline Ultimate was launched. Now it provides 1Giga Bit Per Second (gbps) together with the Next Generation National Broadband Network. 2.2 Comparison In Singapore, We have 3 main telecommunication service providers which are StarHub, Singtel and M1. All have been a rising challenger to one another in a way with the service they have been providing for the past years. First we are going to compare what services they provide which defer from one another. These are the services provided by these service providers in a summary in the table below. Services Provided http://www.investorcentral.org/i/logo_starhub-a.gif http://topnews.com.sg/images/singtel_logo111.jpg http://blog.elyius.net/wp-content/uploads/m1-singapore-logo.jpg Mobile Service-Prepaid Service Mobile Service- Postpaid Service Broadband Service- Home( Fixed) Broadband Service- Mobile Digital TV services Home Fixed Line Service 2.3 Further Analysis From the above table, we could clearly see that M1 lacks in a Digital TV service where other service provider provides. Only StarHub and Singtel provide the Digital TV service. Another recent service just provided by M1  is the Home Fixed Line Service, meaning there were 2 services which M1 wasn’t providing before. But all the services are rather more similar if compared with one another which they are providing now. After seeing, the table you would have known the services provided is the same, we need to analyse further to see which service provider has better recognition among the consumers. Since our main focus is on communication services as a whole we shall remove M1 from the comparison as it doesn’t provide Digital TV service. So I would be comparing within StarHub and Singtel about their services. I have done some surveys using www.monkeysruvey.com using that I have collected some data from 80 people for my inferences. From the pie chart and bar graph below, we can clearly see that StarHub managed to dominate the graph by having 44% of the people surveyed using StarHub service. By looking at this, roughly we could estimate that StarHub is dominating the communication service industry in this Singapore. Followed by the Singtel which has 35 % and M1 21% from the people surveyed. I am going to explore the factors that contributed to this high percentage of StarHub consumers in Singapore. Survey on StarHub Consumers and other Consumers. Please Select the appropriate Answer. Which service provider do you subscribe to? StarHub b) Singtel c)Mobile 1(M1) Please proceed to the rest of the questions if you have selected â€Å"a† above. Which Service have you subscribed to? Mobile b) Cable TV c) Internet d) All services. Rate the Service Given by StarHub. Very Satisfied b) Satisfied c) Neutral d) Not Satisfied e) Very Not Satisfied Reasons for choosing StarHub? a)Cheap b) Good service c)Recommendations d) All of the above Would you recommend StarHub to others? Yes b) No 2.4 Factors Contributed We know that In order to be outstanding from one another we should have certain distinct characteristics or talent which differs from other people. This is case we have to explore How StarHub manage to obtain good  recognition among the consumers in Singapore even when there are other communication service Providers in Singapore. In order to be outstanding among the communication service providers they must be really competitive with other Service Providers. Getting updated with latest technology and offering services that go together with the latest technology. StarHub which follows this always provides its customers with up to date network service to serve them better. Also means that StarHub is readily available for changes and anticipate them accordingly. For example, when internet usage was getting higher in Singapore like surfing the net and online gaming increases they manage to help this consumers by having the highest internet download speed in Singapore. This made many co nsumers who prefer to be fast get attracted to their service. Next would be the quality of service. From the Survey I have done, below we can clearly see that StarHub provides with good service to the customers.service.PNG Higher percentage surveyed that their service is above average. StarHub has a very good recognition with their quality of service. They have a very coordinated system, which doesn’t have any severe problems and miscommunications. They provide 24 hrs customer service hotline, where people can call them 24 hours regarding their queries faced and technical difficulties, which makes consumers more accessible to them whenever they want. Next would be their promotions, which attract the customers to take their service up. They provide more promotions bundle services together so that consumers will take all the services together paying at a cheap price which eye catching for the customers. Hubbing promotion, where consumer will be subscribed to all 3 services at a cheaper rate compared subscribing to one service by one. From the survey done we can conclude that consumers with the higher percentage of 80% saying that their services charged at cheaper and worth it price. StarHub has done well in this area trying to attract the customers by providing its consumers cheaper services. Referring to this graph, we could roughly estimate that StarHub manage to get most of its consumers to subscribe to all its services. We can somehow conclude that the promotion above was effective after all in a way. StarHub also doesn’t focuses on getting new customers always but also tries to keep his current consumers by rewarding them by giving discounts to when they re-contract or waiving certain fee charge if they subscribe. They also have this point’s system feature, where the customers can redeem things in  return without paying full money for it. They also provide vouchers which can be used to re-contract their subscription with them without paying any fees. StarHub also gives birthday treat by giving free cake and vouchers on their customers birthdayreawrds.PNG StarHub have managed to attract new customers by giving them attractive promotions and cheap service. And as promise they also manage to give good service quality from the survey done. With good service provided, they also provide with reasonable cheap price which is really eye catchy for the customers. They also focus on attracting new customers and at the same time they also provide the current customers with good incentives making sure that they still prefer their service compared to other service providers. Customers satisfied with StarHub Service would tend to recommend the service and share the experience with their friends. With satisfied recommendations by friends People subscribe to the services also. This could be one of the reasons why it contributed 20 % to the graph above (4) on reasons for choosing for StarHub. We have explored certain factors on how StarHub manage to attract customer and the possible reasons on why they chose them. Next, we were going to analyse StarHub using SWOT analysis. 3.1 SWOT Analysis 3.11 Strengths StarHub strengths had made them a successful communication service provider. The strengths have enabled it to be successful and popular among the consumers in Singapore. One of it would be anticipating changes, as it becomes more and more competitive in the telecommunication industry its able to come up with new promoting ideas. StarHub manage to come up with new and innovative ideas on the service they give. For example, they were the first service provider to come with per second billing for outgoing calls and all day free incoming calls. This idea even boosted the service provider market. More people chose StarHub due to this reason. This is not the one idea they came up with, they were the first service provider who came up with unlimited internet access. This attractive idea of theirs had a huge jump of consumers subscribing to them. StarHub has this strength where many consumers preferred StarHub Services. Another good example would be when other communication services adapt th eir ideas to the services; StarHub has to come up with more new innovative ideas. When all services were the same  in all 3 communication services, StarHub manage to come with new idea with student Plan with an unlimited SMS service. When all the internet services provided by all providers were also the same, it came up with the highest and fastest internet service. They adapted to changes well and reacted to accordingly. Another important strength would be StarHub’s 24 hours customer service. With its 24 hours customer service department consumers and seek help anytime they want. All their problems can be addressed anytime they call the customer service. With this, consumers will feel more secured as there are people to support them with any kind of problem whenever they face. This would help the consumers to build trust on the service provider since they are assisted anytime. Next would be interactive. StarHub has Facebook which aids in connecting with all the people who have subscribe to their service. As most us know Face is becoming a the most popular social networking platform. StarHub uses this chance, to interact and have a better communication with the customers. People who cannot get through their customer service they can get their queries answered at facebook. StarHub also promote their service in the facebook so that everyone can see. Another interesting strength would be their Hub club and Platinum Club member scheme. This scheme is basically for those who subscribe to all their services will be provided certain discounts and special privileges. With this it helped StarHub to serve the customers better. With this discounts given more people preferred to treated specially by giving discounts. 3.12 Weakness StarHub’s weakness would be due to it’s one of its strength. When StarHub always come up with new attractive services these ideas would be adapted by communication service providers. Not only have other Communication service providers done that, in order to maintain the same level of other service providers, StarHub also adapts certain ideas from them. So due to this adaptation of ideas from one another to stand in the same level, StarHub needs to come with more so that they can be more outstanding from the rest. Coming with ideas isn’t easy; they have to consider certain factors at the same time. For example they have to come with ideas so that the company doesn’t make any loss but at the same time coming up with ideas with their current resources to attract and retain its current customers at the same  time. StarHub tries to make its new customers and existing customers at the same time. No questions to ask regarding about this. But when we really analyse this more in detail, we can say StarHub places most of its emphasis on attracting new customers. Equal emphasis isn’t given to both the sides. With this they have a chance of losing their existing customers. For example, for those who port over their mobile line to StarHub from other service providers were given $200 off any mobile phone they take and will be given whatever discount or fee waived for new sign up while for existing customers when they want to re- contract they are not given this privileges but only given vouchers that do not exceed the amount. 3.13 Opportunities StarHub has explored his opportunities well in telecommunication industry. When technology gets improved, it takes this chance to further more improve the service with the help of new technology. For example, it was the first to launch the 3G mobile service in 2004. It maximized the technology by providing the most 3G coverage around the whole Singapore and providing with the fastest HSPDA mobile internet speed up to 21Mbps. And also when Next Gen NBN service was out, StarHub made use of this and provided consumers with more faster and effective internet service. Another opportunity was for it to interact with customers and knowing what they want. As I have stated above of StarHub connecting themselves with the consumers through facebook social networking. Through facebook, consumers can ask the queries that need to be clarified. Consumers will also give ideas on how to improve their service and will give suggestions for them. From these, StarHub would roughly know what the issues that need to be solved are and know what the consumers really want. This helps StarHub to understand and provide service accordingly to reach the consumers standard and needs. When consumer’s needs are met, they would prefer more of StarHub service. StarHub manage to explore more of opportunities on the services they can provide. When StarHub merged with Singapore Cable vision with the cable services they also provided internet service. Providing 2 services due to the merger. These are some of the opportunities of StarHub. 3.14 Threats As this is competition based on Singapore, the only two threats faced would be Mobile One and Singtel communication Service Providers. As most of the  services provided by them are similar, StarHub has to do things making sure that they are outstanding among all the communication service providers. They must conquer well in most important 3 areas which will be Price, service quality and service they provide. 3.15 Suggestions My suggestion for StarHub would be really analyzing the consumer needs. For example, would be the lack of consideration for the existing consumers. The only provide more attention on attracting new customers. May be they could also give similar privileges to the current existing customers where everyone will be treated equally and will be fair, at the same sometime not having loss. Another suggestion could that, since it’s a very big company and they have many customers they could provide larger customer service serving customers as not all queries would be solved once they call. Most of the consumers hate waiting, thus having more people in customer service; consumers will have their queries solved immediately and with les waiting.

Tuesday, August 20, 2019

Assessing Pain in in Post Operative Breast Cancer Patients

Assessing Pain in in Post Operative Breast Cancer Patients Comparison between Brief  Pain  Inventory (BPI) and Numerical Rating Scale (NRS) for post-operative pain assessment in Saudi Arabian  breast cancer patients. Questions Does  BPI assess  post-operative breast cancer pain  more  accurately than NRS? Summary: Effective pain assessment is one of the  fundamental  criteria  of the  management of  pain. It involves  the  evaluation of pain intensity, location of the pain and response to treatment. There are  a  number  of multi and one-dimensional assessment tools  that  have already been established to assess cancer pain. Among these  are the  Brief Pain Inventory (BPI) and  the  Numerical Rating Scale (NRS), Breast cancer is  a growing public  concern in Saudi Arabia  as rates continue to escalate, with patients  also  suffering multiple problems after surgery. Therefore, my research aim is to  conduct a  comparative study  of tools  used to  assess post-operative breast cancer pain  in  Saudi Arabian  patients  and determine which is the most effective. In this process I will use questionnaires for both nurses and patients to collect data,  followed by statistical analysis and  a  comparative  study between  the  BPI and NRS. Research Hypothesis: BPI assesses  post-operative breast cancer pain  in Saudi Arabian  patients  more  accurately than NRS.   Null hypothesis: There is no significant difference between BPI and NRS  as tools for  assessing post-operative breast cancer pain  in  Saudi Arabian  patients Background: Pain is defined as  Ã¢â‚¬Ëœthe normal, predicted physiological response to an adverse chemical, thermal or mechanical stimulus related with surgery, trauma or acute illness’ (Carr and Goudas, 1999).  Pain assessment is a crucial component for the effective management of post-operative pain in relation to breast cancer. The patient’s report is the main  resource  of information  regarding the  characterisation and evaluation of pain; as such, assessment is  the ‘dynamic method of explanation of the syndrome of the pain, patho-physiology and  the basis for  designing a protocol for its management’  (Yomiya, 2011). A recent survey  questioned almost 900 physicians  897 and found  that  76% reported substandard  pain assessment  procedures  as the single most important barrier  to  suitable  pain management (Roenn  et al, 1993). Breast cancer is characterized by  a  lump or thickening in  the  breast, discharge or bleeding,  a  change in colour of  the  areola, redness or pitting of skin  and a  marble like area under  the  skin (WebMD, 2014[A1]). Breast cancer  has a high prevalence rate globally and is the second most diagnosed cancer in women. Approximately  1.7 million cases were reported in 2012  alone  (WCRFI, 2014). In 2014,  just over  15,000  women  have  already  been  diagnosed with breast cancer: this figure is predicted to rise to around 17,200 in 2020 Breast cancer  has also been identified  as one of the major cancer related problems in Saudi Arabia, with 6,922 women were  assessed[A2]  for breast cancer between 2001-2008 (Alghamdi,  2013[A3]). D  Pain assessment tools Polit  et al  (2006) conducted  a systematic review of the evidence base  and  recorded a total of  80 different assessment tools that  contained  at least one pain item. The  tools were then  categorised into pain tools  (n=48)  and general symptoms tools  (n=32) . They were then  separated into uni-dimensional  tools  (which measure the pain intensity)  and multi-dimensional tools  (include more than one pain dimension). 33%  of all pain tools  (n=16) were uni-dimensional, and  50% of all  general symptom tools  (n=16)were uni-dimensional. 58% of the uni-dimensional tools  employed  single  item scales such as  the  Visual  Analogue  Scale (VAS), Verbal Rating Scales (VRS)  and NRS (Numerical  Rating  Scale). The most common dimension  included  was pain intensity, present in 60% of  tools. In  the assessed tools, 60% assessed pain  in a  multi-dimensional  format. Among  pain tools,  67% were found   to be  multi-dimensional  compared with 50% of the general symptom tools.  38% of all multi-dimensional tools were two-dimensional.  The most  commonly used  dimension was  Ã¢â‚¬Ëœintensity’,  present  in 75% of  all  multi-dimensional tools. Other common  dimensions  include  interference, location  and beliefs. All the dimensions were specifically targeted by two particular tools which were disease-specific tools and tools that measure pains affect, beliefs, and coping-related  issues[A4]. Multidimensional Pain assessment tools: F  The  adequate measurement of pain  requires  more than one tool. Melzack and Casey (1968)  highlight that  pain assessment  Ã¢â‚¬Ëœshould include three dimensions which are sensory-discriminative, motivational-affective and cognitive-evaluative’.  This builds on the  earlier  proposal of  Beecher (1959)  who considered that all tools should include the  two dimensions  of  pain and reaction to pain. Cleeland (1989)  considered that  the  two dimensions  should be classified  as sensory and reactive. Sensory dimensions  should record  the intensity or severity  of pain  and the reactive dimensions should include accurate measures of interference  in the  daily function  of the patient.   Multi-dimensional pain assessments generally consist of  six  dimensions: physiologic, sensory, affective, cognitive, behavioural and sociocultural (McGuire, 1992). Cleeland (1989)  interviewed patients and  found  that  seven items could effectively measure the intensity and effects of the pain in daily activities: these  comprise  of  general activity, walking, work, mood, enjoyment of life, relations with others and sleep. These elements were later subdivided  into two groups: ‘REM’  (relations with others, enjoyment of life and mood) and  Ã¢â‚¬ËœWAW’  (walking, general activity and work). Later, Cleeland  et al  (1996) developed  the  Brief  Pain  Inventory (BPI) in both  its  short and long form.  It was designed  to capture two  categories  of interference such as  activity and affect on  emotions.  The  BPI provides  a relatively  quick and easy method  of measuring  the  intensity  of pa in  and the  level of  interference  in the  daily activities of the  sufferer. With the BPI  tool, patients are graded  on  a 0-10 and it  was  specifically  designed  for the  assessment of  cancer related pain. Patients  are  asked  about the intensity of the pain that they are experiencing at present, as well as the pain intensity over  the last 24 hours as  the  worst, least  or  average  pain (also  on a scale of 0-10). Each  scale is bound  by the words ‘no pain’  (0) and  Ã¢â‚¬Ëœpain as bad as you can imagine’  (10). Patients are also  requested  to rate the degree to which pain interferes  with their  daily activities within the seven  domains  on a scale of 0-10.  that comprise general activity, walking, mood, sleep, work, relations with other persons, and enjoyment of life using similar scales of 0 to  10[A5]. These scales are only confined by the words ‘does not interfere’ and ‘interferes  completely[A6]’ (Tan  et al, 2004).  Validation of BPI across the world among the different language people has already been justified.  [A7]Additionally, the localization of the pain in the body  could be  [A8]assessed and details of current medication are assessed (Caraceni  et al, 1996). Uni-dimensional pain assessment tool:   Previous studies  have  shown  that  the  Numerical  Rating  Scale (NRS) had the power to assess pain intensity for patients  experiencing chronic pain and was also an effective assessment tool for patients with cancer related pain. The  NRS consists of a numerical scale range between 0-100 where 0 was considered as one extreme point represented no pain and 100 was considered other extreme point which represented bad/ worse pain  (Jensen et al, 1986). Turk  et al  (1993) developed  an  11 point  NRS (scale 0-10) where 0 equalled  no pain and 10  equalled  worst pain. Though cancer pain differs from acute, postoperative and chronic  pain experiences, the most common feature is its subjective nature. [A9]  In this regard a consensus meeting on cancer pain assessment and classification was held in Italy in 2009  with the  recommendation that  pain intensity should be measured  on a  scale  of  0-10 with  Ã¢â‚¬Ëœno pain’à ‚  and  Ã¢â‚¬Ëœpain as bad as you can  imagine[A10]’  (Hjermstad  et al.,  2011). Krebs  et al.  (2007) categorised NRS scores as mild (1–3), moderate (4–6), or severe (7–10). A rating of  4 or 5  is  the most commonly recommended lower limit  for moderate pain and 7 or 8 for severe pain. Aimed at moderate pain assessment,  For the purpose of clinical and administrative use the  recommendation for moderate pain assessment on the scale is a score of 4. Importance of post- operative pain assessment: Post-operative pains  is  very common after surgery  and  the  use of  medication  often  depends  on the intensity of pain  that the patient is experiencing  (Chung  et al, 1997). Insufficient assessment of post-operative pain  can have a  Ã¢â‚¬Ëœsignificant detrimental  effect on raised levels of anxiety, sleep disturbance, restlessness, irritability, aggression, distress and suffering’  (Carr  et al,  2005). Additional  physiological  effects can include  increased  blood pressure, vomiting and paralytic ileus, increased adrenaline production, sleep vein thrombosis and pulmonary embolus (Macintyre and Ready, 2002). Effective post-operative pain assessment ensures better pain management  and can significantly reduce the risk of the symptoms listed above, giving minimal distress or suffering  to patients  and reducing  potential complications (Machintosh, 2007). References: Alghamdi IG, Hussain II, Alhamdi MS, El-Sheemy MA (2013) Arabia: an observational descriptive epidemiological analysis of data from Saudi Cancer Registry 2001-2008. Dovepress. Breast cancer: Targets and therapy; 5: 103-109. Caraceni A, Mendoza TR, Mencaglia E (1996) A validation study of an Italian version of the Brief Pain Inventory (Breve Questionario per la Valutazione del Dolore). Pain; 65: 87-92. Carr D and Goudas L. C. (1999) Acute pain. Lancet 353, 2051-2058. Carr EC, Thomas NV, Wilson-Barnet J (2005) Patient experiences of anxiety, depression and acute pain after surgery: a longitudinal perspective. International Journal of Nursing Studies. 42(5): 521-530. Chung F, Ritchie E, Su J (1997) Postoperative pain in ambulatory surgery. Anaesthesia and Analgesia 85: 808-816.   Cleeland CS (1989) Measurement of pain by subjective report. Issues in pain measurement. New York: Raven Press; pp. 391-403. Cleeland CS, Nakamura Y, Mendoza TR, Edwards KR, Douglas J, Serlin RC (1996) Dimensions of the impact of cancer pain in a four country sample: new information from multidimensional scaling. Pain 67 (2-3): 267-273. Hjermstad MJ, Fayers PM, Haugen DF, Caraceni A, Hanks GW, Loge JH, Fainsinger R, Aass N, Kaasa S (2011) Studies comparing numerical rating scale, verbal rating scale and visual analogue scales for assessment of pain intensity in adults: a systematic literature review. Journal of pain and symptom management. 41 (6): 1073-1093. Jensen MP, Karoly P, Braver S (1986) The measurement of clinical pain intensity: a comparison of six methods. Pain 27: 117-126. Krebs EE, Carey TS, Weinberger M (2007) Accuracy of the pain numeric rating scale as a screening test in primary care. Journal of general medicine. 22(10): 1453-1458. Machintosh C (2007) Assessment and management of patients with post-operative pain. Nursing Standard. 22 (5): 49-55. Macintyre PE, Ready LB (2002) Acute pain management. Second edition, WB Saunders, Edinburgh. McGuire DB (1992) Comprehensive and multidimensional assessment and measurement of pain. Journal of pain and symptom management; 7(5): 312-319. Melzack R and Casey KL (1968) Sensory, motivational and central control determinants of pain: a new conceptual model. In: Kenshalo DR, editor. The skin senses proceedings. Springfield IL: Thomas; pp. 423-439. National Breast Cancer Foundation (NBCF): 2014;  http://www.nbcf.org.au/Research/About-Breast-Cancer.aspx Polit JCHC, Hjermstad MJ, Loge JH, Fayers PM, Caraceni A, Conno FD, Forbes K, Furst CJ, Radbruch L, Kaasa S (2006) Pain assessment tools: Is the content appropriate for use in palliative care? Journal of pain and symptom management, 32 (6): 567-580. Roenn JHV, Cleeland CS, Gonin R, Hatfield AK, Pandya KJ (1993) Physician attitudes and practice in cancer pain management. A survey from the Eastern Cooperative Oncology Group. Annals of Internal Medicine, 119(2): 121-126. Tan G, Jensen MP, Thornby JI, Shanti BF (2004) Validation of the brief pain inventory for chronic non-malignant pain. The Journal of Pain. 5(2): 133-137. Turk DC, Rudy TE, Sorkin BA (1993) Neglected topics in chronic pain treatment outcome studies: determination of success. Pain (53):3–16. WebMD (2014)  http://www.webmd.com/breast-cancer/guide/overview-breast-cancer. World cancer research fund international (WCRFI): 2014;  http://www.wcrf.org/cancer_statistics/data_specific_cancers/breast_cancer_statistics.php. Youmiya K (2011) Cancer pain assessment. The Japanese Journal of Anesthesiology. 60(9): 1046-1052. [A1]I would consider using a more reputable source for describing medical symptoms themselves (Grey’s Anatomy, WHO guidelines etc) [A2]and treated? [A3]Is it worth commenting that breast cancer reporting rates in SA might be different from actual prevalence? Lack of awareness regarding certain cancers often results in late diagnosis or misdiagnosis. [A4]This sentence is unclear. I am assuming that you are stating that all dimensions are present in two particular tools? [A5]I’ve deleted this as you have highlighted the same domains in the previous paragraph and the reader will already be familiar with this term. [A6]Sentence shows up on copyscape / turnitin but it’s fine as a directly referenced quote. [A7]Is this sentence stating that the BPIs valid internationally because it has been adjusted culturally / linguistically for all groups? [A8]Are you making a suggestion that it could be assessed, or stating that sometimes people do assess localised pain in the body? [A9]Deleted as the next sentence deals with this already. [A10]Again shows up in turnitin: any quotes must be in inverted commas so that tutors / markers will not downgrade or suspect plagiarism.

King Leopolds Ghost Essay -- essays research papers

Book Review of King Leopold's Ghost, by Adam Hochschild   Ã‚  Ã‚  Ã‚  Ã‚  What some have considered to be the first international scandal of the modern era took place in the Congo from 1890 until 1910. King Leopold II of Belgium was at the head of this so-called scandal. Although Europe and the rest of the world seemed to have forgotten the victims of these crimes, there is a considerable amount of material to use when attempting to recreate the horror that took place in Leopold's Congo. This is exactly what Adam Hochschild is attempting to do by writing this book. By using the written words of mostly Europeans and Americans, which creates a distorted view of history, he wants to show that the Holocaust type event that took place in the Congo is something that should never be forgotten in our history. Hochschild also wants to show the heroism that took place afterwards in what became the first human rights movement of our time.   Ã‚  Ã‚  Ã‚  Ã‚  Hochschild does an excellent and detailed job of showing how clever and cunning (like a fox) Leopold was in obtaining and maintaining his hold in the Congo. Early on Leopold became obsessed with the idea of colonies and the profit that they could bring to his country. In the beginning he did not attempt to cover-up this ambition, but soon realized he needed to in order to have the approval of those countries around him. The metaphor Hochschild uses to explain Leopold's venture into the Cong...

Monday, August 19, 2019

Elvis Presley :: essays research papers

Elvis Aaron Presley was born on Jan 8, 1935 to Vernon and Gladys Presley, in Tupelo, Mississippi. The Presley’s were poor as people could be at the time and Vernon tried a variety of jobs to support his family. He was often away and Elvis developed a close bond with his mother. She had lost other son at birth and her ability to have other children. She put all her hopes on her one surviving son and was not to be let down. The family moved to Memphis in 1948 and that’s where Elvis’ musical talent began to bloom. Young Elvis showed his natural musical talent at an early age and pursued music through his youth. At age 19 he was signed by Sun Records and in 1955, at age 21, was signed by RCA records. He quickly shot to the top of the national charts with his first RCA single â€Å"Heartbreak Hotel† (1956). He followed with the enormously successful single record â€Å"Hound Dog†/†Don’t Be Cruel† (1956) and â€Å"All Shook Up† (1957). After that, his American sales have earned him gold, platinum or multiplatinum awards for 111 different albums and singles, far more than any other artist or group. Elvis also starred in 33 films and made history with his television appearances and specials. From 1956 to 1958, he starred in four motion pictures, all of which featured his soundtracks: Love Me Tender (1956), Jailhouse Rock (1957), Loving You (1957), and King Creole (1958). After serving in the USA Armed Forces from 1958 to 1960, Presley appeared in numerous musical films: Flaming Star, Blue Hawaii, Girls! Girls! Girls!, Viva Las Vegas, Roustabout, and others. He died at his beloved Memphis home, Graceland, on August 16th, 1977. Through the early morning of the 16th he takes care of the last minute tour details and relaxed with family and staff. He retires to his master suit around 7:00 AM to rest for his evening flight. By late morning, Elvis Presley was dead. His death has been officially attributed to heart failure, a likely result of his chronic overuse of prescription barbiturates.

Sunday, August 18, 2019

Business Complaint Letter :: Business Complaint Letters Email Credit Cards

1234 Orange Street Smallville, OH 01234 July 1, 2005 Mr. Steve Smith National Manager, Customer Service En Corporation Cool Building, Suite 222 111 Fountain Drive Happy, NH 98765 RE: EnCorp Credit Card: 111 222 333 4 555XX I had been an EnCorp credit card holder for the previous twelve years. Before that, I was a Rose card-holder for over 22 years. I seem to recall that when EnCorp took over/bought out Rose nine years ago, the switch of companies and credit cards was handled smoothly and seamlessly. I wish the same was the case eleven years later when EnCorp recently transferred its credit card operations to NHBank. I was aware of the impending changeover to NHBank a couple of months before it happened. I had received a notice in the mail of the planned change, and it had been discussed at my local EnCorp station when I paid for my gas (with my EnCorp credit card). More than once, I inquired, and was assured that I would receive a new credit card in the mail before the April 1st deadline. Unfortunately, that did not happen. April 1st came and went, without receiving a replacement card, or even an application for a new one. Apparently, I'm the only one that did not receive a replacement card. After realizing that I was without a gas credit card, after 27 years with one, I called a couple of your 1-800 numbers and I was advised that I would have to re-apply for a credit card with EnCorp via the NHBank. I requested an application and one was sent. It appears to be the same kind of application that someone fills out after walking in off the street. The fact that I had been a credit card-holder with EnCorp (and its predecessor Rose before that) for some 25 years in total, did not seem to matter to you, or your friends at the NHBank. It is hard to believe that companies are still doing business this way in the year 2005. Have you (or your colleagues at NHBank) ever heard of MVC (Most Valuable Customer)? Just in case you aren't familiar with this approach, the MVC is the customer that you already have (i.e. me). Normally, these are the customers you do not want to lose and try not to lose. After all, research has revealed that it will cost you six times as much to find a new customer as it does to keep an existing one (i.

Saturday, August 17, 2019

Odie clutched the can of orange juice

Odie clutched the can of orange juice. It was very cold against his palms which were very wet—either from the coldness or the sweat that was slowly forming in his callused hands. He had callused hands—hands which had been witnesses to the harsh realities of life and the absurdities of things—of fate and of faith. Odie smiled upon remembering his hands.The hands of a warrior. He was watching the battlefield in front of him—the warriors were armed. Only a simple command from him—their leader—and the thousands of warriors would be willing to sacrifice their lives for the survival of their tribe, of their nation.Odie raised his right hand, brandishing the gleaming sword in the air—the war has begun. He opened his mouth to give the command†¦ and a car screeched nearby and Odie was awakened from his day dreaming. He was no warrior and there was no sword.The can of orange juice had lost its coldness by then, and Odie walked up their path way into the confines of his home. No, it was a house. No, it was also not a house. It was a tiny apartment—just a very, very small space in this world where he can sleep, eat, take a bath, change clothes, and†¦ become someone else.Odie stepped into his room and looked at the computer—this is it—the moment when he stops from being the muddled and the ridiculed Odie. This is the moment when he stops from being the weird and tame Odie. In fact, this is where he stops from being Odie altogether—he can now be anything and anyone whom he wants to be.The only thing in the world right now is the computer screen, the people on-line who are impatiently waiting and clamoring for the attention of his other self—Brigade719.Odie logged on and Brigade719 has entered the world of cyberspace. He was now lost to the endless possibilities which can happen. He can be the warrior who brandishes the gleaming sword, he can be the courageous general who bravely stan ds on the front, he can be the destroyer of evil empires, and he can be the prince to the many princesses who are vying for his on-line attention.Odie clutched the can of orange juice. He walked slowly and silently along the hallways of his university—no one was paying him any attention. If a person looked at him now, in a matter of seconds, he would probably be forgotten. He was small, scrawny, and shy. In the room, he barely spoke; he barely talked even when he was addressed by his professors. Not that his professors actually talked to him.The average times of people actually addressing Odie would be the average times a Starbucks store would be closing down—which to say, was rarely. Yet, he was kind and gentle. In fact, he was too kind and too gentle that people rendered him to be non-existent. But that’s okay with Odie—since later on, in the confines of his tiny apartment, in that very messy room—he becomes someone else.Odie logged on and Brigad e719 has entered the world of cyberspace. There, in the screen, are over a hundred invitations to be his on-line friend. There, in the bright, bright screen, are over a thousand possibilities of showing his intelligence, his bravery, and his wit. Brigade719 smiled. He was ready—bringing his fingers closer to the keyboard, he took on the possibilities.