Friday, November 29, 2019

Electronic Surveillance In The Workplace Essays - Nike, Inc., Swoosh

Electronic Surveillance In The Workplace In 1957, a Coach and an athlete met at the University of Oregon, and together they went on to establish the most successful athletic footwear company in the world. Bill Bowerman and Phil Knight are these founders. The history of Nike can be split up into sections of three decades. From 1961 to 1971, Knight decided that dealing Tiger, a Japanese company, would break up the World domination in athletic shoes by Germany. He traveled to Japan and met with the executives for Tiger. When asked what company he represented, Knight, caught off guard, uttered the words ?Blue Ribbon Sports,? giving birth to the forerunner of Nike. Soon the revenue on the company began to rise, and finally in 1971, student Carolyn Davidson designed the Swoosh for $35.00. From 1972 to 1980, Blue Ribbon Sports underwent quite a few changes. BRS split from Tiger and became Nike, named after the Greek Goddess of Victory. Nike also expanded to Australia, Europe, and Asia. By 1979, Nike claims 50 percent of the running market, and in 1980, the 2,700-employee company went public. Between 1981 and 1991, Nike began to expand their marketing strategies by sponsoring top athletes. Some of these athletes include Carl Lewis who won four gold metals at the L.A. Olympics and John McEnroe. In 1985, Nike discovered a rookie for the Chicago Bulls who would later become one of their biggest sellers, Michael Jordon. Air Jordon was established, and the next year, the revenue reached the 107 billion-dollar mark. By 1989, the Just Do It campaign had been in effect for two years From 1991 and on, Nike continues to grow. Not only does Nike corner the market in The United States, but also in other countries, including Canada, Japan, and Taiwan. Business Reports

Monday, November 25, 2019

BOOK Report ---the Death Of Ivan Ilyitch Example

BOOK Report BOOK Report The Death of Ivan Ilyitc Hypocrisy and deceit are a way of life among the people around Ivan. Worse yet, most peopleare aware of it but choose to ignore it. As Ivan grows becomes ill, the hypocrisy around him upsets him as much as his illness. Tolstoy portrays the society as selfish and greedy people who do not care for real human relationships. He suggests that greed creates obstacles to proper living.Peters crossing-bowing way upon entering the death-chamber depicts hypocrisy. Praskovya invited Peter into her drawing room. This was not for joint comfort. It was to find out how she could utilize her husband’s pension. The knickknacks and furniture postulate obstacles to communication. Praskovyas shawl, snagged by the magnificent table edge, is as an attack on the worthless society life.Peter and Fedor were Ivan’s friends, yet when they heard he is dead, their only concern was their own promotions (Tolstoy 18). Fedor did not bother to go to Ivans service, and Peter only went from a sense of compulsion. Schwartz is the most deceptive character. While Peter got quite affected by Ivans death at the service, Schwartz is entirely unaffected.Ivans widow is also false. Together with Peter, they go through mourning activities. They do things because it is correct than because they feel any grief for Ivan. Doing what is appropriate makes them feel better for themselves (Tolstoy 29). Gerasim appears to be the only honest person in Ivan’s world. He is the only one who sees that Ivan is dying and can reassure him. He understands that Ivan suffers from fear of death and shows him compassion. Gerasim is sincere because he aware of his ultimate death in a manner no other person is. He knows that he will die, as Ivan is dying now (Tolstoy 33).Though Ivans condition is discouraging, the doctor still is not open with him. The doctor does not tell Ivan that he is dying. Ivan recognizes this and relates the lying doctor with the common class. This got seen as an admission that his work life was false. Ivan concludes that perhaps his work life, family life, friendships, and everything else was false.Tolstoy, Leo. The Death of Ivan Ilyich and Other Stories. Hertfordshire: Wordsworth Editions, 2004.

Thursday, November 21, 2019

Marsden Threatened Rob Jr. with Being Thrown to Hell Research Paper

Marsden Threatened Rob Jr. with Being Thrown to Hell - Research Paper Example The tort of intentional infliction of emotional distress has three elements: outrageous conduct by the tortfeasor; conduct that causes severe mental anguish in the victim and; the mental anguish suffered by the victim because of such behavior. On the other hand, reckless infliction of emotional distress shares all the other elements as the intentional type except that there was no intent to cause the distress (Buckley 130). The element of â€Å"outrageous conduct† refers to behavior that is so outlandish or highly offensive as to result in the emotional distress of the victim. An example would be the case of Clifford v Hollander 6 Media L. Rep. (BNA) 2201 (NY Civ CT 1980) where the defendant published a picture in a pornographic magazine and deliberately incorrectly identified it as the plaintiff, who was a freelance journalist. As a result, the plaintiff received obscene telephone calls from obviously disturbed individuals. In another case, Martin v Municipal Publications, 510 F. Supp. 255, 259 (ED Pa 1981), the defendant published a picture which he labeled as â€Å"closet transvestites who got stinking drunk.† In both cases, the court ruled that the actions of the defendants can be classified as â€Å"outrageous.† It is also important that in intentional infliction of emotional distress, the plaintiff should be able to prove that the conduct of the defendant was intentional and that he so behaved deliberately so as to cause mental anguish on the victim. In some cases, this element came into conflict with the First Amendment â€Å"freedom of speech† as what happened in the celebrated case of Hustler Magazine v Falwell 485 US 46 (1988), where a Protestant Minister brought an action against Hustler Magazine, which, as a parody, featured him as having an incestuous rendezvous with his mother in an outhouse. The Court turned down the plaintiff’s  argument on the ground that he was a public figure and therefore as such may not sue for intentional infliction of emotional distress unless he can prove its falsity or that it was done in reckless disregard for the truth.

Wednesday, November 20, 2019

How might the development of professional learning communities enhance Essay

How might the development of professional learning communities enhance teaching and learning in Design and Technology in the primary school - Essay Example All these characteristics ensure that a professional demonstrates expertise and dominance over his or her trade. Thus, professionalisation became a common trend among different occupations, and one that has received great attention from sociologists (Wueste, 1997). Whilst professionalisation is generally accepted as an important direction among occupations, it has received various criticism coming from different angles. Andrew Abbott’s main critic about the notion of professionalism are particular claims of theorists that â€Å"the evolution of professions are unidirectional; that the development of individual professions does not depend on that of others; that what professions do—the work as well as the requisit expertise—is less important than how they are orgnised to do it; that professions are homogeneous units; and that the process of professionalisation does not change over time† (Wueste, 1997, p. 8). Related to the last element identified by Abbot, another major critcism relies on the manner that professionalism is instituted. A number of occupations have developed higher levels of training and standards of practice to enhance their claims to professional status. However, Wilensky (1964) said that many of the se groups rested on a knowledge base which was either too general and vague, or too narrow. Their knowledge base was weak and not directly used by them. Professionalism is further complicated by copmeting modes of institutionalising expertise, such as commodification and beurocratic organization (Wuestes, 1997). Thus, a more preferred term was used by Etzioni (1969) to classify these occupations: semi-professionals. The field of education has been historically in constant threat of de-professionalisation (Bottery & Wright, 2000), and teachers may be seen as being prime examples of what Etzioni (1969) call as semi-professionals. Much of the issues are traced to how the educational

Monday, November 18, 2019

Monetary Policy and the Stock Market Dissertation

Monetary Policy and the Stock Market - Dissertation Example One financial instrument that is normally used by governments is the issuance of treasury bills or government bonds wherein the earning interest rates will generally be followed by the banks of that country. By using the interest rates that will define the treasury-bill holder’s earnings will slowly influence the financial market to adjust its interest rates. In the absence of other economic indicators, the treasury-bill interest rates will not only be adopted by the banks in their own financial transactions but it will also be used as the bench mark for the amount of money that will be available to borrowers. In theory, if the interest rates are low more people will borrow money from the banks. If the interest rates are high, the theory sustains that little to no borrower will loan money from the banks and most economic activity will be financed from in-house sources. Other instruments or means of conducting monetary policy includes making the government as the lender of last resort wherein the government will be the source of funds that will be available to borrowers normally a function provided by banks and other financial institutions. Another means of conducting monetary policy includes changing the reserve requirements in banks in order for them to operate. Another is where the government announces its intent to reduce or control inflation or by simply indicating the interest rates it wants for the money it intends to loan out. And last but not the least is moral suasions.... Meanwhile the true value of money is dependent on several factors such as the actual value of the goods that can be bought by the money or its value as compared with other currencies. However, given that these factors are also dependent on other economic indicators such as inflation and the volume of foreign currency reserve a country has, the correlation of the monetary policy of a country with its interest rates, stock market performance, and inflation will be explored by this paper. Monetary policy is implemented by increasing or decreasing the interest rates that is in theory would be able to inversely increase or decrease the supply of currency in circulation. In fine, the monetary policy of a country controls the amount or volume of currency in circulation to stimulate growth or maintain the stability of its economy. The primary onus of a government’s monetary authority is to create the optimal monetary policy that will stabilize prices for its basic commodities and enco urage investment. The trick however is how to make banks and other financial institutions follow the interest rates the government’s monetary authorities’ desires. One financial instrument that is normally used by governments is the issuance of treasury bills or government bonds wherein the earning interest rates will generally be followed by the banks of that country. By using the interest rates that will define the treasury-bill holder’s earnings will slowly influence the financial market to adjust its interest rates. In the absence of other economic indicators, the treasury-bill interest rates will not only be adopted by the banks in their own financial transactions but it will also be

Saturday, November 16, 2019

Content-Based Video Retrieval Method

Content-Based Video Retrieval Method An Approach for Analyzing keyframes based on Self Adaptive Threshold and Scene Descriptors Suruthi.K, Tamil Selvan.T, Velu.S, Maheswaran.R, Kumaresan.A Abstract In this paper, we propose a CBVR (content based video retrieval) method for retrieving a desired object from the abstract video dataset. Recording and storing enormous surveillance video in a dataset for retrieving the main contents of the video is one of the complicated task in terms of time and space. Even though, methods are available for retrieving the main content of a video based on ROI as well as threshold values for retrieving background information key frames, determining the threshold values manually is a complex scenario. So, we propose a method, where we use self-adaptive threshold for determining the background information along with the use of several descriptors to increase the efficiency of determining the contents of the key frames. We can also use CBVR to retrieve the information of a desired object from our abstract dataset. Keywords: Self adaptive threshold, Keyframes, Descriptors, CBVR Introduction The process of providing security plays a major role in all organizations these days. This security can be provided in many ways considering the criticality of the information being secured. Theses security methodologies include providing manual guards around the perimeter or providing electric fence around the infrastructure or any other available effective means of technology available. In spite of the availability of these methodologies, an effective and 247 security could be provided with the help of installation of cameras at the crucial areas of an organization which should be out of reach for the humans. The optimal number of cameras to be installed in an environment could be calculated with respect to [1]. Since these cameras are recording videos with a time scale of 24 hours, the recorded videos are to be stored and analyzed where storing these videos require an enormous database and analyzing these videos require humans to play through the entire video in order to analyze t he incidents occurred where the biggest de-merit is that we cannot skip the videos being played since we would miss the important actions when we skip.so, we are in need of a method for extracting the essential events been occurred from the prolonged surveillance videos and storing these events alone in a separate database which would minimize the memory space being utilized for data storage along with minimization of human work to look through the entire videos. We know that the first step in observing videos is to convert it into individual frames or images since the broadcasting of moving visual images form a video. This can be termed as image retrieval. Image retrieval is the process of retrieving images from an enormous database based on the metadata added to the image which could be said as the annotations. But this annotations have some demerits. Annotating images manual is a time consuming work to be done and if images are annotated ambiguously, the user would never get the required results no matter the number of times he search the image database. Several methods for automatic image annotations have been under research due to the advancement in the field of semantic web and social web applications. In spite of the advancements, there is an effective methodology termed CBIR (content based image retrieval), in which feature extraction is basis. These features represent text based features representing keywords as well as annotations whereas visual features correspond to color, texture and faces along with shapes [2]. Since, features plays a major role here, when user inputs an input image, the pixel value of these images are com pared with all the images prevailing in the database and the results given to the user would contain all the images containing a part of the queried image which is an effective way of avoiding annotations to avoid ambiguity. Since we are dealing with videos here, we need an advanced approach from CBIR. 2. Related Work: Speech recognition is an important conc 3. Fast Clustering Method Based on ROI Since users find easy to access online videos easily these days, we are in need of finding an effective way to store and maintain enormous amount of video files facilitating easy and quick access for multiple users. In order to support research in this area, Guang-Hua-Song et al have proposed the fast clustering based on the region of interest (ROI). The authors have employed the average histogram algorithm for the purpose of extracting key frames from each shot. A shot could be defined as the depiction of a particular scene or action. A single shot refers to the action covered by a camera between the start and stop of the recording time which would be normally in the same angle. The extracted key frames are used for the generation of edge maps which contribute the next step in the video abstraction scenario. Based on the above methodologies, the authors have determined the key points. Calculation of threshold values from the respective key frames would be the next step which is done for the purpose of expanding and identifying the area surrounding the key points [9]. The authors have proposed the observation of main content in each of the key frame based on the threshold values defined and the concept of key points. As the final step of their proposed method, they have utilized the ROIs of the key frames and have performed the fast clustering method on them. The different methodologies involve before implementing the fast clustering method along with the implementation of fast clustering methodology is explained in the following sections. A. Key frame Extraction The representation of video sequence would be in the form of a hierarchical structure considering the scene, shot and frame contributing different levels on the hierarchy [10]. Different researches on video sequences requires the researches to deal with the different levels of the video sequence hierarchy with respect to the information needed for their research. Shot is to be considered first for the purpose of key frame extraction. The shot level is chosen at the hierarch among the other available levels due to certain reasons. The sequence of video frames captured continuously by a camera contributed a shot which also would include the moving objects, panning and zooming in terms of the recording camera. We also have a greatest merit with the shot as the two adjacent shot does not have the same content which would obviously eliminate redundancy. The authors have employed the use of algorithm proposed in [11] for the purpose of extracting key frames. The key frame extraction proces s also involves the average histogram method. A shot S = { } of length n is assumed. The kth frame in the assumed shot is represented as . Considering to be the gray level histogram containing L bins could be generated from frame, whereas the calculation of the average histogram H is done based on the following formula: Where represents the value of the ith frame of frame k. After the extraction of key frame, ROIs are generated by adopting a series of key frame analysis this process is followed by saliency map generation and edge map generation. B. Edge Map Detection It is a general concept that we would focus on objects which has a whole shape in the video. So there would be edges within these components. We are in need of determining the key points which would be available inside the objects and so determining edges would make our tracking process easier. The authors have used the canny edge detection scenario with respect to [12]. This process is followed by the location of key points and generation of ROI. C. Fast Clustering In a video sequence, though each shot would be having a different content to portray, some of the shots may look similar to one another in camera angle or facial expression of the people involved or in any other means. Sometimes, a shot would ne manually segmented into many shots and used at different places in a video sequence. The approach of the authors is to make the video sequence compact and thus they have clustered the key frames in order to avoid the redundant frames. Normally, clustering before the entire process of extracting the key frames is done would be of no use since the new frames could not be taken into account. In order to overcome this traditional approach, the authors have used fast clustering in which clustering process starts once the key frame extraction and identifying ROI are done. Even though this approach was good enough to an extent, the authors have not used more effective descriptors to extract more features from the frames for better observation. In addition to this manually setting the threshold to obtain the background information would not be so effective. 4. Application of Self Adaptive Threshold and Descriptors Though the use of assigning the threshold manually works in a better way, setting the threshold manually is a difficult task. So we are in need of an alternate way for setting the threshold which is the adaptive threshold methodology. We propose the use of adaptive threshold in our video abstraction method for the purpose of gaining more knowledge about the objects in the background. In addition to this, we have also made use of several descriptors such as FCTH (Fuzzy Color and Texture Histogram) and SCD (Scalable Color Descriptor). A descriptor is generally used for extracting different kinds of features from an image based on the functionality of a descriptor. Features refers to the different kinds of information that could be extracted from an image which may refer to the color, intensity, pixels, etc. the functionality of FCTH and SCD are discussed as follows: A. FCTH In this type of descriptor, fuzzy is used for gathering information about colors which lie between the pure black and pure white. Here, fuzzy is made used of since the general concept of fuzzy is to deal with all possible scenarios (partial true / partial false ) which lies between the True (1) and False (0) values. B. SCD (Scalable Color Descriptor) SCD is used here for the purpose of extracting information about the colors which are scalable. This scalable colors represent colors which are extended to the nearby boundaries and would be available in a different form within that boundary. C. Algorithm: Distance Vector We are using Distance Vector algorithm in this video abstraction process for the purpose of observing the distance travelled by an object in two subsequent frames in order to determine the motion of the object in a more likely scenario which involves the following steps: Detecting and identifying the boundaries of the moving objects. Extracting ROI (region of interest) of the object within the frame. Searching for the same object in the next subsequent frame. Detecting boundaries and location of the object. Comparing the location of the object and finding its distance moved from the previous frame to the current frame. Repeating the above steps for all the video frames would enable us to find the moving object distance covered for each frame. Updating the distance vector matrix. The overall methodology of the proposed methodology is shown in Figure 1. Figure 1. Block Diagram of the Proposed Methodology This scenario is applied for minimizing the memory complexity in terms of storing and retrieving enormous 247 surveillance videos where recording and storing of the entire video would increase the demand of memory as well as looking through the entire video to verify a crime scene would be a more complex scenario. In order to overcome this complexity, our method extract the key frames from the entire video and store it in a desired database where only the distinct images would be available minimizing the work of the user to look through a full length video. In addition to that, saving images would have a memory demand much lesser than the demand of the videos. Since we are using descriptors, more detailed information could be extracted from the images. Self-adaptive threshold enables the user to get more details above the objects available in the background which is an added advantage of this methodology. Any sort of frame can be given as a query into the system and the user would ge t the relevant video containing the respective key frame. If the frame is not available in any of the dataset, user would be shown with an error prompt. This process is termed as CBVR. CBVR is similar to CBIR but differs in a way that user would be given a frame (image) as a result in case of CBIR whereas result would be the entire video in case of CBVR. But in both the cases, data is compared and retrieved based on the contents available in the frames. 5. Experimental results We have conducted our experiment with videos available in the MATLAB dataset. First step would be the extraction of key frames based on self-adaptive threshold value which is shown in Figure 2. Figure 2. Window for Key frame Extraction Key frames are extracted and stored in a destined folder as shown in the Figure 3.     Ã‚   Figure 3. Key frames Stored in the Destined Folder After the key frame extraction, the user can input a key frame of their choice and the contents of all the available videos in the dataset are compared and the respective video containing the requested key frame would be found based on CBVR and retrieved as shown in Figure 4a. The user can click on the play button available at the bottom right to play the entire video containing the requested key frame. If the requested frame is ot found, the user would be prompted with an error message as shown in Figure 4b. Figure 4a. Video is retrieved based on the queried key frame using CBVR Figure 4a. User id prompted with an error message since the requested frame is not found Our experiment have showed a compromising result with more than 80% accuracy. As explained above, this methodology can decrease the memory space demands and the time of the user to spend in looking through the entire videos. 6. Conclusion In this paper, we have proposed a methodology for video abstraction based on several descriptors and self-adaptive threshold. This methodology facilitates user to minimize the memory demands and time demands for looking through the videos. Our methodology also makes use of CBVR for retrieving a video based on the contents with respect to the user requested key frame. The only problem that our methodology faces is the time taken for comparison if the key frame to be searched is available in the final video available in the dataset. Our future work is to concentrate on limiting the time space for comparison in a large video dataset. References [1] Tatsuya Hirahara Figure Captions Fig.1.Optimal Position fo

Wednesday, November 13, 2019

E-mail Essay -- Technology, Communication

Email is the most widely used communication tool within companies today. Email has been described as a curse and a blessing. Email reaches its recipients quickly and can be sent across the globe within seconds. Companies with multiple locations find this essential in communicating. Email can also reach a large number of individuals within a matter of keystrokes. Sending a mass email reaches many recipients with one consistent message. While there are many praises of email, its drawbacks must be considered as well. Email communication can financially impact an organization. Emails sent without a clear message can lead to misinterpretations which ultimately may cost the company money. Employees often complain of receiving up to and sometimes over 100 emails a day and often many do not pertain to them. For each email the employee must read to determine its value to them or spend time reading to perceive a clear message, it reduces the employee’s productivity. Managers and coworkers who use effective email techniques can increase communication accuracy, decrease frustration and increase productivity. BYRON, K. (2008). CARRYING TOO HEAVY A LOAD? THE COMMUNICATION AND MISCOMMUNICATION OF EMOTION BY EMAIL. Academy of Management Review, 33(2), 309-327. doi:10.5465/AMR.2008.31193163 This article provides a unique examination into how the emotion written in email affects its perception. Study results were measured on emails written with positive, negative and neutral emotions. Gender and relationship status were taken into account for this study. The conclusion results suggested that misinterpretations as a result of emotion written within email is inevitable and varies largely from the intended emotion of the sender and th... ...This article addresses the cost of email mistakes and the characteristics of an effective email. The charts provided not only indicate the cost of the mistakes but the hours lost in productivity. Accuracy, clarity, spelling, punctuation, grammar and conciseness were identified as characteristics of an effective email. While this article clearly identifies the cost of ineffective emails and the loss of productivity, it lacks solutions to improve efficient email writing. A source is referenced but lacks detail in study information. Studies within the literature researched support the thesis that the use of effective email techniques can increase communication accuracy, decrease frustration and increase productivity. Elements of a properly written email were identified. Training implementation and measurement proved to improve clarity and productivity.

Monday, November 11, 2019

Ethical Practice In Counselling Essay

What is ethical practice in counselling? How is this reflected in the skills, competencies and qualities of an effective counsellor? Part A The aim of this assignment is to show what ethical practice is in counselling and how carrying out ethical practices make a more effective and competent counsellor. The first part explains what is meant by ethical practice. The second part will examine boundaries implemented by counsellors to protect both parties. The second part focuses on the skill of listening along with other non – specific factors in order to be an effective counsellor. Next part defines a competent counsellor and the problems which occur when this is absent. The final part examines the ethical issue of advice and explains the implications of giving advice. Working in a counselling role whether it is voluntary or professional it is important you adhere to the ethics set out. There is a unified ethical code set out by the British Association for Counselling and Psychotherapy (BACP). The ethical framework in which counsellor’s ensure they carry out their roles appropriately along with the understandi ng that they be held accountable with regards to client wellbeing and safety. The BACP is not designed to hinder the counsellor but work alongside their values, morals and principles to protect clients in terms of expectation, rights and quality of care. General ethical commitments are expressed through their principles. These are fidelity; autonomy; beneficence; non-maleficence; justice and self-respect. Personal qualities of a counsellor are important and interlink with values and principles of the counsellor, these consist of empathy; sincerity; integrity; respect; resilience; competence; wisdom; humility and courage. The use of their skills, competencies and qualities combined with their principles should make an effective counsellor. (Langridge, 2008) (BACP, 2013) Boundaries could be defined as a framework in which the client and counsellor work together. It acts as a safety net to ensure that the client does not come to any harm. This works alongside the ethical practice of non-maleficence. The counsellor makes clear their expectations / limitations so it’s visible to the client and also helps avoid malpractice. These boundaries also help ensure the client / counsellor is kept safe. An example of these metaphorical boundaries would be a verbal agreement as it sets out the key  features and identifies what needs to be done to avoid misunderstandings. (Langridge,2008). Th e qualities needed from the counsellor to implement this would be sincerity and integrity. The sincerity to be consistent by doing what you said you were going to do. Integrity here can be seen as moral, straightforward and honest in stating your limitations and drawing up an agreement (BACP 2013). These boundaries are set out in a way to suit each counsellor some are fixed and some more flexible, some may argue that this can be damaging to the relationship if they are over or under boundaried (mcleod, p.229) An example of boundaries is shown in the DVD (OU, 2008, section 4) where Helen (counsellor) is talking to James she clearly sets out boundaries stating she was not qualified but could help in a listening capacity (a skill which is very important) and also that the conversation was confidential this ensured the clients well-being and also covered the counsellor from any ethical backlash i.e malpractice. Jamie understood this and continued the conversation. Counsellors use non-specific factors when engaging with clients. A vital skill involves actively listening, this requires the counsellor to absorb all information given to them by the client without pre judgement or imposing own ideas (this can be seen in emotional and mental safety). This demonstrates to client that you think they are very important and you care (Langridge, 2008). it is also important to pay attention to the non-verbal cues as well such as body language, eye contact (although can make client feel uncomfortable) and head movement. (Langridge, 2008). It can also be said it is very important in the therapeutic relationship to pay attention to what is not being said also. Rennie (1994b, citied by McLeod) found that if the client felt misunderstood they would conceal their feelings. Some may talk openly about the important thing whilst covering up what is really happening. Therefore the counsellor needs to gain as much access as possible into ‘hidden material’. The ethical way to do this would be to examine notes that look at inner experiences as well as what was said. Both experiences of the client and counsellor can be examined. This can be useful in training and well as looking at own techniques and re-examining them when fully qualified. P252. Also using open questions could draw out fuller responses from client and enable the  counsellor to access more information into the complex issue surrounding client. Interpersonal skills needed by the counsellor are listening, empathy, awareness, communication and responsiveness. This will enable a good therapeutic relationship to form which is key to ensuring goals are met on both parts. Bordin’s Therapeutic alliance model (1979, cited by McLeod) highlights the notion of these competencies along with the ability to use specific techniques in an appropriate manner. Empathy is an important quality identified as an ethical component and should be adhered to in order to become an effective counsellor. In the DVD (ou, section 1, 2008) there is clear evidence of the counsellor actively listening to client. She uses basic counselling skills such as clarification to check her understanding of the problem (awareness) and see the problem through the client’s world (empathy). She also uses open questions to identify the areas in which the client can reflect and understand her own problem (responsiveness & communication) and in turn she has empowered the client by not imposing judgement but by demonstrating that the most important skill a counsellor has is listening to the client. In contrast in DVD (OU, 2008, section 5 clip 1) we see the counsellor not listening to what the client said and made the client feel unimportant. In turn this heightened their anxiety and left them no further forward to finding a solution. This demonstrates lack of empathy and justice on the counsellor’s part which are highlighted by the BACP to ensure clients well-being. The ethical quality of competence works alongside what BACP determine Beneficence, to work within own competence using research and reflection to inform practice. This entails the willingness to pursue knowledge and understanding in order to develop skills further but also have a good set of skills to do the job already. To highlight what incompetence can do DVD (OU, 2008, section 5clip3) shows counsellor is out of her depth and could not give client a straight answer or any kind of guidance. Although ethically restrained to give advice the counsellor should have guided client through their feeling using basic counselling skills. However client left upset, confused and blaming herself for the issues she had. Personal qualities are lacking in order to make the counsellor effective. A counsellor is ethically bound not to give advice necessarily to the client but more to use the skills of encouragement and support to guide the client to find their own solutions to their problems  and for the client to become self-determining. Should the counsellor simply give advice on issues with the client they may simply be pressing upon the client their own views and beliefs rather than following the ethical framework that effective counsellors adhere to. (Landridge,2008). Sometimes the client expects the counsellor to tell them the answers to their problems and is disappointed when the counsellor is unable to do so. However the counsellor needs to use qualities such as resilience, competence and wisdom in order to work with the client in these situations. (McLeod, 2008 p.259). In contrast to the ethical principle of advice the DVD (OU, 2008, section 5 clip 2) where the counsellor is trying to solve practical problems of the client (the light bulb) instead of addressing emotional issues to do with her mother. She should not have been trying to give advice as this is unethical but instead allow her client to reach her own solution and explore her feelings toward her mother deeper. The support here was clearly not given. Instead the counsellor should have used her skills of listening, open questions and paraphrasing to guide client toward exploring her feelings. Competence and wisdom were clearly lacking making a very ineffective counsellor and potentially damaging the relationship. To surmise the ethical framework ensures the client and the counsellor are protected. Counselling skills are essentia l in order for any counselling relationship. Use of basic skills should enable the counsellor to be more effective in succeeding. However this assignment has highlighted what happens when basic skills are lacking. Possession of counselling qualities as mentioned at the start should enable client to strike up a good relationship with the counsellor. This is crucial in order for counselling to be successful. Therefore the skills, competencies and qualities combined should make counselling more successful for the client and the counsellor more effective. (Word count 1474)

Saturday, November 9, 2019

The voice of Faulkner

The voice of Faulkner Introduction William Faulkner’s writing in three short stories (‘A Rose for Emily’, ‘Barn burning’, and ‘As l lay dying’) is highly emotional, complex, gothic and has an unconventional choice of narrators. These attributes denote two literary elements and they are: language and style. One can analyze those two elements in order to understand William Faulkner’s voice.Advertising We will write a custom critical writing sample on The voice of Faulkner specifically for you for only $16.05 $11/page Learn More How Faulkner uses language and style in ‘A Rose for Emily’, ‘Barn burning’ and ‘As I lay dying’ Emotional and poetic language Faulkner has the ability to be intensely emotional in most of his pieces without really sacrificing the story line or the strengths of his characters. In ‘Barn burning’, the author evokes emotions by compressing deep meaning in jus t a few lines. In one scenario, Sarty says ‘Father! Father!’ (Faulkner, As I lay dying 14)These might seem like simple words, but they are packed with meaning. The reader is able to feel a sense of loss, sadness, and a hint of relief as the speaker makes this statement. The author allows his phrases to possess some level of ambiguity in order to give his readers room to interpret or create their own meaning. In ‘As I lay dying’, the author uses one of his characters to convey literary or poetic language. Darl is extremely articulate and his language is quite innovative. Gothic style Faulkner has the ability to bring out elements of death, decay, destruction, isolation and darkness in a unique way. This component in his writings caused him to stand out from his contemporaries. In ‘A rose for Emily’, Faulkner creates an image of a woman who clearly does not belong to her world. She refuses to leave her house for years on end; she stops talking to everyone, has an affair with a disapproved male, and finally murders her lover. Here was a woman who was trapped in the past, and had alienated herself from life. Emily had a lush and beautiful environment outside her house; she never bothered to look at it. She chose to live in darkness, both literally and metaphorically as she never drew her curtains. This depiction of deep darkness was something that Faulkner always focused on; it added a gothic element to his writings and made it distinctive. In ‘As I lay dying’, the author selects a relatively poor family- the Bundrens. Although the group is ignorant and has a series of other weaknesses, the author still conveys their experiences with empathy and grace. The setting of the community in which the Bundrens live has an element of grotesqueness because it focuses on members of the lower class. The death of Addie is also one of the dark and disturbing components of the narration. Additionally, Faulkner describes the des truction of Darl in such a tragic and dignified manner. One cannot help but feel the same devastation that surrounded that development. The gothic style in this narrative is therefore reflective of the author’s preference for dark tales. In ‘Barn burning’, the author’s preference for the bizarre is seen through his choice of characters. This is a dysfunctional family whose head has a need to burn houses. He causes his children to participate in his wrongdoings by instructing them to help him out with a few things.Advertising Looking for critical writing on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More It only gets worse for Sarty when the Major chooses to kill his father before he can destroy his barn. Eventually, the young boy keeps running until midnight, when he stops to sit at the crest of a hill. This must be a dark moment in Sarty’s life because he did not have a fathe r anymore, yet he also ran away from people who love him. These are all depressing issues that cause the reader to empathize deeply with Sarty. Complex style Faulkner had a complex style of writing owing to his treated of time, his use of long sentences and unconventional sentence structure, his preference for ambiguity, and his use of stream of unconsciousness. One of the most interesting component’s of Faulkner’s style of writing was his complicated treatment of time. He achieves this by changing from narrator to narrator and from character to character. The lack of chronology in his pieces is the reason why some unseasoned readers find his work difficult to follow. In ‘A rose for Emily’, the story commences with the main character’s death. This is followed by many events that occurred in the modern age to the period just before the Civil war in the South. The present is sometimes interrupted by events in the past and the past sometimes appears to be the present. One is able to deduce this interweaving of events through phrases such as: ‘thirty years before’ or ‘eight years later’ (Faulkner, A rose for Emily 17). It is almost as if Faulkner is giving his audience little pieces of a puzzle that must be put together in order to understand the whole narration. The time movements have been achieved through the use of flashbacks and foreshadows. The end of the story illustrates that the entire piece has been a flashback since it talks about the discovery of the corpse of Homer in Emily’s house. Faulkner did not just choose this non linear approach in order to make his work interesting or to confuse readers; he did it in order to make his readers engage more with the text. As one goes through the story, one is likely to be inspired to compare chronologies with other people so as to detect any possible misreading. In these discussions, one can then analyze the thematic repercussions of those chronol ogies. This unconventional style has a way of making readers more engrained in the narration, and hence more likely to admire his work. The same thing occurs in ‘As I lay dying.’ Although the story spans through a couple of days, the author utilizes the perspectives of several voices in order to bring in a different dimension to the story. Faulkner manages to create a sense of wholeness despite the fragmentary nature of the story. The various sub plots that are added from time to time seem to add more strength to the story. The ambiguity of the narrators requires meticulous analysis of their descriptions because not all of them are credible.Advertising We will write a custom critical writing sample on The voice of Faulkner specifically for you for only $16.05 $11/page Learn More Complexity is also created in ‘Barn burning through the use of long sentences. This method has also been employed in ‘As I lay dying’. The long sente nces can make it difficult to follow the narrative, if one does not pay close attention 9Faulkner, as I lay dying 65). He is fond of this style of writing because he wants to capture the action and emotions that his characters are going through. When Sarty starts chasing after de Spain, the author describes this experience using very lengthy sentences. As one reads them, one gets lost in the events of the moment. One can feel the confusion and sense of loss that Sarty is going through using this technique. Faulkner therefore achieves his objective by causing readers to get carried away. Since there is no slowing down in the sentences, there is also no slowing down with the actions being described. Unconventional choice of narrators as an element of style In ‘A rose for Emily’, the writer uses the town as the main voice in the short story. As the story continues, one learns about the habits and values of the people in Emily’s hometown. This narrator does not pre-e mpt anything in the short story. He seems to discover new things along with the audience. For instance, in one scenario, the narrator states that there was an awful smell from Emily’s house, and adds that it occurred as soon as her sweetheart died. He does not provide any correlation between these two components of the tale. It is only until the end of the story that the reader is able to know where the smell came from. The narrator, provides additional information, but still strives to maintain suspense in the story. In ‘Barn burning’, the author picks an omniscient narrator who seems very close to Sarty. The purpose of selecting such a voice was to make the main character get closer to readers. At one point, one feels as though one has entered Sarty’s mind. Since he is someone who understands things through symbols, the writer presented or explained things through such a perspective. For example, when Sarty went to court, he describes the crowd as having ‘a lane of grim faces’. Numerous metaphors have been used, that relate to a child’s perspective. In another instance, he describes his father’s voice as being harsh as tin and lacking heat as tin. However, the author manages to illustrate that Sarty was not in fact the real narrator when Sarty and his family are out camping and his father makes a small fire. It is noted that Abner does not hesitate to create large fires when burning other people’s barns. The narrator muses that had Sarty been older, he would have asked himself why this was the case. The author therefore plays with reader’s minds by providing more than one possibility for the narration. This kind of style was fundamental in providing essential details to the story while providing a mechanism for understanding the main character’s actions.Advertising Looking for critical writing on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More Perhaps the most complicated choice of narrators occurred when the author wrote ‘As I lay dying’; there are fifteen narrators in the story and each of the descriptions is highly subjective. Each narrator has his own kind of language and tone. Some of the narrators re confessional and seemingly neutral, but they end up loosing credibility later on. For instance, one of the first ones –Darl is an immensely articulate individual who seems to know what he is talking about. However, he is treated negatively by his family members who eventually take him to an asylum when he goes mad. To Faulkner, truth is debatable and depends upon the individual under consideration. The purpose for choosing such a complex interplay of narrators was to create a platform for adding more information to the story. Instead of depending upon one individual to describe everything, the author decides to use both real and interior monologues that the characters have with themselves and others in order to concretize the story. Objectivity is evasive in ‘As I lay dying’, and this causes readers to think a little bit more intensively about the developments in the story (Blotner 44). Stream of consciousness is also an important part of Faulkner’s complex writing. In ‘As I lay dying’, a number of narrators think about the death of the main character and they do this through continuous internal reflections. The same thing occurs in ‘Barn burning’. Sarty often describes his experiences as if they are flowing right out of his mind. For example, when his father walks in, he first describes what his father is wearing before he realizes that his father is in the house. Conclusion Faulkner was unsparing in his pieces; his words, plot and descriptions were intense and bold. His choice of characters and the lives they lived has grotesque or gothic inclinations. This author’s work was complex because of his sentence structures, his preference for ambiguity and his treatment of time. Lastly, the author’s choice of narrators was unconventional, but meaningful. Together, these components make Faulkner’s language and style exceptional in the literary world. Blotner, Joseph. Faulkner: A biography. NY: Random House, 1984 Faulkner, William. As I Lay Dying: The corrected text. NY: Vintage publishers, 1991. Print Faulkner, William. A rose for Emily. NY: Dramatic publishing, 1983. Print. Faulkner, William. Barn burning. NY: Harper and brothers, 1939. Print.

Wednesday, November 6, 2019

Evolution of Dogs from the Gray Wolf

Evolution of Dogs from the Gray Wolf Introduction The domestic dog is a member of the Canidae family. This is a biologically cohesive group of carnivores and consists of thirty-eight species (Serpell 10). thus far, man has managed to fully domesticate the dog (Canis familiaris) although he has also attempted to breed the raccoon dog (Nyctereutes procyonoides) and the red fox (Vulpes vulpes) in captivity for their fur (Klinghammer and Goodmann 36). Advertising We will write a custom research paper sample on Evolution of Dogs from the Gray Wolf specifically for you for only $16.05 $11/page Learn More The current paper tries to show the link between the modern domesticated dog and the grey wolf using documented evidence from morphological, molecular, and DNA investigations. Tracing the origin of the domesticated dog In 1868, Darwin argued that the various domesticated varieties of the dog could have originated from several wild species or from a single wild species. A number of authors contend tha t the domesticated dog could have originated from the jackal, the wolf, or other unknown and extinct species (Serpell 10). Darwin also suggested that it would be almost impossible to ascertain the origin of the domesticated dog. However, the combined results of vocalisation, morphological behavior and molecular biology of the domesticated dog now show that the wolf is the principle ancestor of the dog (Grandin and Johnson 87). In the 1950s, Konrad Lorenz proposed that certain modern breeds of the dog could have been the descendants of the wolf, while others could have originated from the jackal. However, Lorenz soon realised that the jackal had a characteristic and complicated howling repertoire that is quite different from that of the wolf or dog. This discovery made Lorenz to rescind his earlier view that the domestic dog could have been a descendant of the jackal (Serpell 11). Another hotly contested idea is the origin of the Australia dingo. Molecular and anatomical investigat ions indicate that the dingo may be categorized as a feral dog of ancient descent. In addition, these findings reveal close resemblance between the Australian dingo, the wolf, and the pariah dogs in South-east Asia. What are the ‘precursors of the modern domesticated dog? Bones belonging to wolves in the Middle Pleistocene period have been found alongside those of early hominida. This association is indicative of an overlapping of the hunting activities and occupation of wolves and humans. Human hunters may also have killed wolves occasionally for their skins which they used as clothing (Serpell 12). Advertising Looking for research paper on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More Once in a while, human hunters would be accompanied by a live pup that they ended up eating but occasionally, such a pup would get accustomed to the family group, effectively becoming tamed. The wolf pups that turned out to be less s ubmissive with maturity would undoubtedly be driven away or killed. Others that showed signs of submission were tamed by humans (Savolainen et al 1611). Such tamed wolves are the precursors of the true domesticated dog, although they are many generations apart. Some remains of these animals that were discovered at late glacial sites reveal slight morphological differences in comparison with the remains of wild wolves. Wolf skulls believed to belong to the last Ice Age have also been retrieved at Fairbanks, Alaska. This are thought to be approximately 10,000 years old. These wolf skulls are characterized by shortened facial regions and for this reason, they are thought to be the remains of tamed wolves. This information is supported by evidence of humans having crossed into North America via the Bering Straits around this time. Theories of domestication of dogs from wolves Although it is still not clear how the actual domestication of the Grey Wolf took place, nonetheless, a number of theories have been proposed on how the domestication process took place. One such theory has to do with the orphaned wolf-cubs. Several studies have suggested that humans were able to tame and socialize some wolf pups that they took while still young. One study has also endeavoured to show that it is possible to socialize the adult wolves successfully (Koler-Matznick 99). In contrast, other scholars contend that socializing adult wolves can be time consuming especially when pups are more than 21 days old. Many scientists are convinced that the early humans adopted orphaned wolf cubs and then proceeded to nurse them. Thereafter, the adopted wolves began to breed, in effect bringing forth â€Å"wolf-like† domesticated animals. As more generations of these â€Å"wolf-like† domesticated animals were born, they bore a lot of resemblance to dogs. Another theory holds that the early wolves were scavengers and as such, they would often be attracted by the refuse that huma ns left behind at campsites. Some of these wolves proved quite successful in their ability to interact with humans and as a result, these traits were passed on to future generations. Advertising We will write a custom research paper sample on Evolution of Dogs from the Gray Wolf specifically for you for only $16.05 $11/page Learn More Ultimately, there emerged a generation of wolves that had a tendency to be domesticated. Humans decided to keep those dogs that showed the least amount of fear and those that demonstrated high level of socialization. Consequently, the early dog developed unique traits that we can now recognize the modern day dog. One of the behavioural characteristics of the gray wolf that made it easier for humans to domesticate them is what is known as â€Å"flight distance†. Flight distance is a measure of the level of closeness that an animal can allow something that it considers dangerous before deciding to run away. If an animal has a shorter flight distance, it means that it is not scared by the presence of humans even when feeding. Such a behavioural trait might have been passed down to successive generations of the animals and over time it was amplified to the point that the animals felt comfortable in the presence of humans. Ideally, wolves are believed to have separated into two populations. The first group was made up of a pack of hunters while the second group was made up of village-oriented scavengers. Although there are scanty details as to how the next steps evolved, however, sustaining these two divergent populations must have required the presence of selective pressure. DNA evidence Prior to the development of the DNA technology, scientists held two schools of thought regarding the origin of the domesticated dog. Most of the researchers assumed that the early dogs were the descendants of the tamed wolves and through interbreeding and evolving, this had resulted in a domesticated species. We als o have another school of thought that suggests that the modern dog is the distant descendant of the wolf. The same school of thought also believes that the jackal and the coyote could also have been distant relatives of the modern dog. However, DNA evidence now points at the wolf as the sole ancestor of the domesticated dog. One scientist who has done a lot of DNA work on the ancestors of the domesticated dog is Carles Vila. Through his numerous studies, he has analyzed various types of wolf DNA from some 27 populations across North America, Europe and Asia (Vila et al 1687). He has also compared the results of his studies with DNA of some 67 breeds of modern dogs from various parts of the world.Advertising Looking for research paper on biology? Let's see if we can help you! Get your first paper with 15% OFF Learn More DNA evidence has revealed the most diverse group of wolves possess similar sequences to the ones found in the most ancient breeds of the domesticated dog, including the dingo of Australia. The German Shepherd Dog was shown to share a close resemblance to wolf sequences, in comparison with the sequences of the main dog group (Vila et al 1688). This is a sign that such breeds may have been produced by crossing wild wolves with dogs. Conclusion Over the years, a lot of research has been carried out on the origin of the domesticated dog, with scientists divided into two schools of through. The first and largest school of through believed that dogs could have been the descendants of the gray wolf. Other scientists suggested that the older domesticated dog could have been the descendant of the red fox, or even the raccoon. However, there is now compelling evidence to suggest that the early humans most likely domesticated the modern dog from the gray wolf. This assertion has been supporte d by molecular, morphological and DNA evidence that point at a closer relationship between the domesticated dog, and the gray wolf, more than the red fox and the raccoon. However, because the origins of some of the morphological differences between wolves and dogs are still not clear, there is need to undertake more DNA studies. Such studies also need to be supplemented by a re-evaluation of canidae fossil and archaeological records so that we can resolve the many questions regarding one of man’s ancient domesticated animal. Grandin, Temple and Catherine, Johnson. Animals in translation, New York, NY: Scriber, 2005. Print. Klinghammer, Erich and Goodmann, Patricia. Chapter 2: Socialization and management of wolves in captivity. In Frank, Harry. Man and Wolf: Advances, Issues, and Problems in Captive Wolf Research. The Hague, The Netherlands: Dr  W.  Junk Publishers, 1987. Print. Koler-Matznick, Janice. The origin of the dog revisited. Anthrozoos, 15.2(2002):98–11 8. Print. Savolainen, Peter, Zhang, Jing, Luo, Joakim Lundeberg, and Thomas Leitner. â€Å"Genetic Evidence for an East Asian Origin of Domestic Dogs. Science, 298. 5598(2002): 1610–1613. Print. Serpell, James. The domestic dog: its evolution, behavior, and interactions with people. Cambridge, Mass: Cambridge University Press, 1995. Print. Vila, Carles, Peter, Savolainen, Jesus, Maldonado, John, Rice and Rodney, Honeycutt. Multiple and ancient origins of the domestic dog. Science, 276.5397(1997): 1687-1689. Print.

Monday, November 4, 2019

Persuasive Memo Research Paper Example | Topics and Well Written Essays - 500 words

Persuasive Memo - Research Paper Example On the side of the company, the Affordable Care Act helps the company to attract more employees. These employees will want to apply for jobs in the company, this is because they know that there is good health insurance policy. If the Act is not active, this potential manpower will not be interested in the company. It is also an advantage to the company as the existing manpower will continue to serve in the company. This is because they are aware of the health insurance. Increase in productivity will be experienced by the company. This is the other thing that the company will benefit from the Affordable Care Act. This will be experienced as the number of employees increase in the company. This is because there will be enough manpower in the company. The Act will also reduce the number of absentees. Many of the employees will never want to be absent as they are aware of the Act (Burkhauser, 32). When an employer thinks of changing the company’s system, she should think of the expenses she will have to come across. Changing the system to have part-time employees will cost a lot to the company as the employees will need training before they are effective to their respective jobs. This will raise a marginal cost even if the part-time employees don’t change the system (Burkhauser, 92). In this Act, there is the employers’ mandate. This is a penalty made for those employers who do not abide by these rules. These are employers who have 50 and above employees in their firms and working full-time while they are not having the health insurance. These are also those employers who have the intension if changing their current health insurance system. The employers’ mandate ensures that the existing systems of these companies don’t change. There is a suggestion that a system of pay to play will be introduced so as to have direct taxation on the companies that do not obey this act. This can be done by having a percentage o the payrolls (Faguet,

Saturday, November 2, 2019

Women in the Second World War Essay Example | Topics and Well Written Essays - 500 words

Women in the Second World War - Essay Example This essay will compare and contrast the wartime experiences of these three great women. Therese Bonney achieved world fame as a photo journalist during the Second World War. She is greatly popular for her work which revealed the havocs of war on an innocent group of people. She initially acquired attention for her revelation of the war between Russia and Finland. Being the only correspondent who was there, she had the whole account to herself and was honored with the White Rose of Finland for her courage. Throughout the Second World War she toured all over western Europe capturing the miseries of the affected children in her photographs which she soon after included in her master work ‘Europe’s Children’. It was her objective to aid in building international ties between European populations, specifically the Americans and French. She also joined the Red Cross campaigns throughout France. She was grandly celebrated in the United States and Europe. Just like Bonney, Toni Frissell became a major female figure in photo journalism during the World War II. She voluntarily shared her photographic talents to the American Red Cross in 1941. Afterward she served the Eight Army Air Force and became the certified photo journalist of the Women’s Army Corps. She photographed a vast number of images of soldiers, nurses, and abandoned children for the services of the aforementioned organizations. Her moving pictures of African American air fighters and military women were employed to promote public support and sympathy for African-American and women in the service. Her only difference with Bonney is the extent of her fame. She is widely known locally but she did not achieve the same international fame that Bonney achieved. Meanwhile, a remarkable woman who became renowned during World War II, Janet Flanner, raised her name to the pedestal through writing. Janet