Wednesday, July 31, 2019

Books of the Bible

The book of Luke is considered to be a gospel in the New Testament. The main people discussed in the book are Mary, Jesus and Joseph. This book describes the birth of Jesus which is the main theme. The audience of this book would have appealed to all intelligent gentiles and to any believer. The gospel of Luke does not disclose who the author is of these documents. The historical content leads us to believe this gospel was written a few years before 62 AD. This book narrates the story of events from Jesus birth to his ascension.This was written to provide a historical account of events which the write divided into three stages, John the Baptist, Jesus the earthly ministry and third the life of the church after Jesus’ resurrection. All while stating that Jesus Christ is the Son of God. The book of Revelation The book of Revelation is considered to be an apocalyptic genre. This book is the final book of the New Testament. The main character if Jesus himself, which this book expl ains his journey through the years.Many of Jesus’ challenges were discussed in this book during his struggle to reclaim his world, as the message was the end of days is near. The author of this book was credited to John the apostle, he states they were directed to the seven churches in Asia (Revelation 1:4). John was given orders to deliver messages to each of the churches to warn them as well as encourage them to repent before judgment day. Those who chose to follow would be rewarded and those who did not would endure the consequences. The book of ActsThe book of Acts in the New Testament is considered to be a narrative genre. The book of acts is a continuation of the book of Luke. Due to the narrators changing voice and person it creates a problem to confirm the authorship of the text. The book describes Jesus’s journey to spread the gospel throughout the world by the twelve apostles. The two main characters listed in this book were Peter and Paul the apostles. The f irst 12 chapters of this book discuss Peter while the remaining book is devoted to Apostle Paul.The book reviews how the disciples not only healed but end up persecuted for being believers and followers of Christ. Eventually it goes on to describe how Paul is placed in jail due to preaching the word of God. The book of Romans The book of Romans is considered to be an epistle genre in the New Testament. This book appears to be written around 57 or 58 AD. The main theme of this book was Paul’s journey of speaking to the Roman people of what would happen if they did not follow God’s path.The main character of the book Paul struggled to convince the Romans to convert being they were Gentiles and were not Christians. Paul continued to speak Gods way including writing numerous letters to describe their futures if they could have by following God’s way. As Paul believed and tried to teach that there is only one way to have an external life and that is through Jesus. Th e book of Ephesians The book of Ephesians is also an epistle in the New Testament, believed to be written by Paul to the Church of Ephesus around 61 AD.While Paul was in prison he had time to reflect and found that Christ came to united himself with man. This book details the letters composed by Paul that reference the different relationships that we have in life. His letters discussed not only relationships between husband and wife but those between Jesus and his believers as well. Paul preached in his letters to maintain compassion with others regardless of their background and to hold hast. Paul’s message was that Christianity was for all men, for whom all may enter, but it is only by grace, through faith in Christ. Books of the Bible The Book of LukeThe book of Luke is considered to be a gospel in the New Testament. The main people discussed in the book are Mary, Jesus and Joseph. This book describes the birth of Jesus which is the main theme. The audience of this book would have appealed to all intelligent gentiles and to any believer. The gospel of Luke does not disclose who the author is of these documents. The historical content leads us to believe this gospel was written a few years before 62 AD. This book narrates the story of events from Jesus birth to his ascension. This was written to provide a historical account of events which the write divided into three stages, John the Baptist, Jesus the earthly ministry and third the life of the church after Jesus’ resurrection. All while stating that Jesus Christ is the Son of God.The book of RevelationThe book of Revelation is considered to be an apocalyptic genre. This book is the final book of the New Testament. The main character if Jesus himself, which this book explains his journey through the years. Many of Jesus’ challenges were discussed in this book during his struggle to reclaim his world, as the message was the end of days is near. The author of this book was credited to John the apostle, he states they were directed to the seven churches in Asia (Revelation 1:4). John was given orders to deliver messages to each of the churches to warn them as well as encourage them to repent before judgment day. Those who chose to follow would be rewarded and those who did not would endure the consequences.The book of ActsThe book of Acts in the New Testament is considered to be a narrative genre. The book of acts is a continuation of the book of Luke. Due to the narrators changing voice and person it creates a problem to confirm the authorship of the text. The book describes Jesus’s journey to spread the gospel throughout  the world by the twelve apostles. The two main characters listed in this book were Peter and Paul t he apostles. The first 12 chapters of this book discuss Peter while the remaining book is devoted to Apostle Paul. The book reviews how the disciples not only healed but end up persecuted for being believers and followers of Christ. Eventually it goes on to describe how Paul is placed in jail due to preaching the word of God. The book of RomansThe book of Romans is considered to be an epistle genre in the New Testament. This book appears to be written around 57 or 58 AD. The main theme of this book was Paul’s journey of speaking to the Roman people of what would happen if they did not follow God’s path. The main character of the book Paul struggled to convince the Romans to convert being they were Gentiles and were not Christians. Paul continued to speak Gods way including writing numerous letters to describe their futures if they could have by following God’s way. As Paul believed and tried to teach that there is only one way to have an external life and that i s through Jesus.The book of EphesiansThe book of Ephesians is also an epistle in the New Testament, believed to be written by Paul to the Church of Ephesus around 61 AD. While Paul was in prison he had time to reflect and found that Christ came to united himself with man. This book details the letters composed by Paul that reference the different relationships that we have in life. His letters discussed not only relationships between husband and wife but those between Jesus and his believers as well. Paul preached in his letters to maintain compassion with others regardless of their background and to hold hast. Paul’s message was that Christianity was for all men, for whom all may enter, but it is only by grace, through faith in Christ.

Tuesday, July 30, 2019

Ibm Marketing Mix (Denmark)

Marketing: Foundations and applications Course code: BMAN-20390 Marketing analysis of IBM 1. 0 Thesis statement â€Å"Evaluate the marketing strategy of a blue-chip company you are familiar with. Your evaluation should critically discuss the concept of the marketing mix as applied to your chosen organisation and at least one other academic marketing theory. † 2. 0 Limitations IBM is a very large organization so the planning process of a marketing strategy that is coherent with the corporate strategy is made complicated and difficult because IBM operates in a number of significantly different markets.I have therefore since I am an employee of IBM Denmark decided that this is the â€Å"strategic business unit† that I am going to analyze in terms of their marketing strategy. Furthermore the portfolio of products that IBM Denmark supplies ranges from everything to hardware sales, software sales and consultancy services. There might be a significant difference in the way the se products are promoted, and I have therefore narrowed it further down to focus on the tertiary activities, meaning the marketing strategy of the consultancy services (in IBM known as GBS – Global Business Services).This limitation is convenient because it allows me to properly analyze the marketing strategy in this given area – as opposed to making an analysis based upon IBM as a whole with their entire portfolio of products, as this would not be fulfilling in a 2500 word essay. 3. 0 Preface IBM mission statement: â€Å"At IBM, we strive to lead in the invention, development, and manufacture of the industry’s most advanced information technologies, including computer systems, software, storage systems, and microelectronics.We translate these advanced technologies into value for our customers through our professional solutions, services, and consulting businesses worldwide†. From the mission statement above we can conclude that IBM wants to be a leader o n the blue-chip market – which we in terms of their size can conclude they are close to being. In the following essay the reader will be introduced to the marketing strategy of IBM. Furthermore the reader will be introduced to a SWOT analysis, in which it will be discussed and concluded which strategic position IBM has on the current market.In regards to the limitation above this will be an analysis based upon IBMs services provision in Denmark. The reader will find out that the classical approach with the 4ps of marketing doesn’t really apply to this part of the business that IBM conducts. Instead an additional three Ps has been added, and these will be discussed as well. SWOT Analysis One of the trustiest tools in business is the SWOT analysis. Corporations takes a calm, cool look down at the organisations Strengths, Weaknesses, Opportunities and Threat’s.Then they seek to capitalise on the strengths, eliminate the weaknesses, seize the best opportunities and counter the threats. Figure 4. 1 is a SWOT analysis of the global business services for IBM, and the end result of this analysis should help us to give a clear view of IBM’s strategic position on the market, which we then can use to discuss their marketing strategy. Figure 4. 1 – IBM DK GBS SWOT Strengths: IBM Denmark has been on the Danish market since 1950 – which leaves them with a significant amount of experience of the market.The wide range of their strategic competencies runs from everything from hardware-sales to business consultancy, the latter being one of their profitable areas of expertise. Furthermore IBM DK has a leading position on the Danish services market, being one of the biggest consultancy houses in the country. It is the combination of its size and experience on the market that leaves them to be one of the preferred business partners in Denmark and in the rest of the world. IBM Denmark like most companies believes it is necessary to have a t alented workforce.IBM is present at local universities promoting themselves with the purpose of future recruitment. Through this initiative they attract the students they believe is prospects as future IBM leaders, and sign them off before their competitors. Furthermore IBM is extremely flexible, meaning that leaders across country borders are stationed in different parts of the world. A lot of IBM DKs top leaders are individuals who have a history with IBM, but only in a different SBU. Weaknesses: Being located in Denmark one is urged to believe that it is inevitable to have high operating costs, especially labour cost.Denmark does have one of the highest salary rates in the world. And with a personnel count of nearly 5. 000 people this results in big money. Opportunities: With the increased focus on the environment in recent years – IBM must be innovative and continue to lead the market by supplying greener solutions to their customers. A growing body of evidence asserts th at corporations can do well, by doing good. IBM must differentiate their brand and reputation as well as their products and services, by taking responsibility for the wellbeing of the societies and environments in which they operate.Practicing corporate social responsibility can generate significant returns to their business. Furthermore if IBM could reduce their operating costs, then it would also be possible to reduce their prices, without compromising with the quality of their products. IBM has already taken initiatives to reduce their labour costs. Danish consultants requires a high salary rate, which is why IBM DK wherever possible tries to limit the amount of these consultants. Instead they will bring consultants from India and other low cost countries to Denmark and assign them to the project that is to be executed.This allows them to sell the service for a more competitive price. It has been discussed if IBM should completely shut down its locations in the EU, and outsource the entire European operations to low cost countries – however I personally believe that this would be compromising the quality of the service provided as it surely must be necessary to have people with local market knowledge assisting on the projects. Threats: As the world continues to get smaller, IBM like other big corporations faces the challenge of outsourcing.Especially IBM Denmark is threatened by outsourcing, as Denmark has the highest tax rate in the world, which will force IBM to have higher prices, than what is offered abroad – leaving them more vulnerable to the threat of outsourcing. Furthermore the introduction of changes in various services are not patentable (reference: http://www. mgutheses. org/page/? q=T%200984&search=&page=&rad=#43, page 32), meaning that the innovativeness of a company like IBM can easily be adopted by newcomers to the market.Also, as a service is not a manufactured product, but really a transaction of knowledge  œ it is hard to imagine that it is capital intensive to enter the service industry. Marketing mix â€Å"The marketing mix is an imperative concept in modern marketing and academically it is referred to as a set of controllable tools that the firm blends to produce the response it wants in the target market, so it consists of everything the firm can do to influence the demand for its products† (Kotler and Armstrong 2004).The easiest way to understand the main aspects of marketing is through the famous 4P’s marketing, which was introduced and suggested by McCarthy in 1960 (reference: http://university-essays. tripod. com/marketing_mix. html). It includes marketing strategies of product, price, placement and promotion. It is however interesting if this also applies to a company that sells services and not a material product. Given the unique and distinguishing features of the service industry, researchers have offered different models and approaches to the marketing of se rvices.It is suggested that services marketing does not only include external marketing reaching the customers, but also an internal marketing strategy to motivate the employees (reference: A service quality model and its implications, Christian Gronross, vol 18, No. 4, 1984, pp. 36-44). Figure 2 – The triangle model of services marketing Company Internal MarketingExternal Marketing Employees Customers Interactive Marketing As stated above the internal marketing is for the company to motivate their employees to serve its customers in the best possible way.External marketing is when the company makes its service available to its customers to increase the demand. The interactive marketing involves to the effort of employees to win customers loyalty in the process of their interaction with the customers in delivering the services. This must be closely related to internal marketing. In IBM DK, the consultants and salespeople are paid partly in a fixed salary scheme and a variable scheme depending on their results. Furthermore these same IBM representatives will receive an annual bonus, if IBM on the given project has reached a certain percentage of profit.These incentives through salaries and bonuses can be associated to what we clarify as internal marketing. For the external marketing side – the traditional marketing mix as we know them through the 4p’s can also be applied on services marketing as they are applied on tangible goods. But it is discussed to be difficult. Which is why for services marketing, a modified marketing mix has been developed. The services marketing mix comprises 7p’s and these include the following: * Product * Price * Place * Promotion * People * Process * Physical evidenceIt is important to look closer at some of these P’s, which will be done in the following. Product: The most important question to be asked here is â€Å"are these the right products or services for our customers today†? IBM cont inues to be the leading innovator on the market, spending billions of dollars every year in their research centers providing their customers with the newest technologies and always making sure that the quality of the products is of IBM’s usual reputed quality. Price: As anyone can imagine the price of the service provided is essential for whether or not IBM wins the customer over.As soon as the appropriate experts has analyzed the pre project resources that is to be needed for the project he informs the pricing department. The pricer then based on these assumptions, inflation, currency differences, management desired PTI % (pre tax income), and our cost case calculated a price that is then been presented to the customer. Promotion: When promoting their services IBM first make rational decions on which businesses to approach. Then they divide their promotion into how big the markets are, e. g a segment could be small and medium business†. Within a specific constituency m arket, IBM first identifies which businesses make the most sense to connect with. Then, the IBM determines the most efficient way to reach each of them. whether through individualized marketing or a creative combination of IBM's go-to-market strategies† IBM also enters the business community through professional associations and organizations. Such groups generate interest in IBM and may even help IBM identify new business partners. By sponsoring and participating with them, IBM is able to communicate its message of value to the member businesses.Furthermore IBM through their marketing incentives has adopted a more emotional approach in the way they promote themselves. Rai Cockfield VP Market development states that all people prior to purchase asks the following â€Å"Does this product or service meet my need? Is the company reputable? And is the price reasonable? † Today, he adds a more pressing question, â€Å"Are you reaching me in the way that I see myself? Ã¢â‚¬Ë œ â€Å"That's what endears a person to a company and a product,† he says. (reference: http://www-03. ibm. com/employment/us/diverse/50/ads. html. ) People: An important ingredient to any service provision, is as we have discussed above having qualified personnel. Recruiting the right staff and people and training them appropriately in the delivery of services is essential if IBM wants to continue having their competitive advantage. Providing a service is partly the quality of the service and the quality of the people that delivers it, as these are in constant contact with the customer. As mentioned above, IBM has had university partnerships in order to recruit students. Process:When selling their services IBM has two processes. Either the customer comes to IBM looking for an offer on a service they need provided. IBM then sends the appropriate people to analyse the resources that are needed to provide this service. An offer is then presented to the customer. A different proc ess is when we have existing customers, the client manager is responsible for looking for new business services that we can provide them. And then the process starts over, in regards to presenting an offer after calculating the resources we need for the project.Conclusion IBM wants to be the leader on the Danish market. And in terms of their size we can conclude that they are close to being just that. From the SWOT analysis above we saw that IBM has the needed experience and size to be one of the biggest consultancy houses in the country and in the world. Furthermore with the increasing focus on the environment IBM has the possibility to be the leading innovator for greener solutions – an opportunity that they have successfully capitalized on through their continued research for more environmental solutions.However despite IBM being a big player on the Danish services market, it is important that they reduce their high operating costs. By bringing Indian and other low cost co nsultants into the game, they have somewhat succeeded in doing this as these have lower salary rates. In the marketing of services we have concluded that an external marketing effort is not enough for successfully promoting itself. An internal marketing strategy is also essential for obtaining success. IBM must motivate its employees as these are the focalpoint to customer, in which case it is important that they are motivated and happy.In promoting and marketing themselves IBM has also realised that they in today’s world they must reach their customers on a more personal level, and not merely connect through reputation and price. Connecting with its customers on a personal level and delivering top quality services is what keeps IBM on top of their game and in even in rough financial times they have succeeded in being one of the top choices as business partner.References Websites:http://www. entrepreneur. om/marketing/article70824. htmlhttp://www. scribd. com/doc/10999474/IBM -Strategic-Analysishttp://www. simplemarketingblog. com/2009/06/sandy-carter-integrates-social-media. htmlhttp://www. itsma. com/ezine/analytics-optimize-marketing-mix/http://university-essays. tripod. com/marketing_mix. html

Monday, July 29, 2019

The ways in which community education fits into the holistic concept Research Paper

The ways in which community education fits into the holistic concept of lifelong learning - Research Paper Example , community education is gaining strength and people are getting more towards community education where people, specially adults and old age people learn simultaneously while they work for their community.(Smith and Gruenewald, 2007). The process of learning is a lifelong process and it ends with life. Every day, there is something new to learn but it all depends on a person whether he’s flexible enough to absorb changes or update his/her skills in this challenging world. In this era, people have changed their mindsets of completing sixteen years of education and lead the rest of their life earning and evaluating situations. In fact, people have now become aware of the fact that learning is a never ending process and it has to be done on community or social level to get positive results from a nation (Smith and Sobel, 2010). My thesis revolves around the awareness that have brought people to work together as a nation and adults should practice more to adopt changes of the growing world. Further, in this paper it is supported that academic education is a must, but community education with practical demonstrations work as threshold until perfected. For example, previous generations were never taught to contr ibute voluntarily for a society or plant trees to stop global warming. There was no concept of thinking on global issues. The preaching was all about a family. However, now issues are regarded as global issues and communities and societies have to come up together to work for the betterment of the global village. There are ways in which community education fits best into the holistic concept of lifelong learning. Community education is an integrated form of education based on informal process of learning things or experiencing things practically. There are no examinations and no bounding for aged group to learn by participating for different social issues. An example tells an idea for instance â€Å"say no to plastic bag†, the whole community will go to work

Sunday, July 28, 2019

Ethics case study Essay Example | Topics and Well Written Essays - 750 words

Ethics case study - Essay Example Thus, is it moral for Mr. Z to engage in sexual intercourse with his wife despite being in a critical condition? Moreover, did he have moral ethics to impregnate his wife despite knowing clearly that he was endangering her life due to her severe medical condition? This situation clearly proves that Mr. Z cannot control himself by avoiding such action on is wife as well as understanding her condition and the state of their marriage. The case has involved various ethical principles including the beneficence, respect for autonomy, justice and non – malfeasance. The principle of beneficence advocates doing of good things and that people should always strive to achieve it at its greatest level. This is because individuals benefit only from the best things (American Nurses association, n.d.). According to this case, Mr. Z believes that making love to his wife is good for them despite the prevailing conditions. Moreover, he argues that his wife would have wanted to maintain a physical relationship with him and thus, his action was meant to fulfill that desire and make his wife achieve the good at its greatest amount (UOP Library, 2010). Further, he believes the action unifies his family, which constitutes the greatest good for his family. However, his brothers in - law perceive his actions as bad and constitute rape, which is harmful to their severely ill sister. According to them, this step is the best for th eir critically ill sister, as it will see her removed from the abusive and egocentric husband. Secondly, the case involves respect for autonomy. According to the principle, individuals need to reign over their lives and be in a position to make decisions pertaining to their lives (American Nurses association, n.d.). Thus, individuals need to have autonomous control of the lives since they have an absolute understanding over their choice of lifestyle. Moreover, each person deserves respect since he is the only person who has been

Saturday, July 27, 2019

Self Reliance Term Paper Example | Topics and Well Written Essays - 1000 words

Self Reliance - Term Paper Example Self-Reliance – how to get that? The primary necessity for the presence of self-reliance in a leader is to understand what one is capable of doing and believe in the virtues of his/her values. If such belief is created within oneself, then there is every possibility for the emotional quotient of the human brain to generate energy that would motivate the leader to back every decision he makes and subsequently act on those decisions. So, it could be said that behind every successful organization or every successful team activity, there would always be a person who is able to display his motivations, inner self and as a result, will be capable of telling others who they are, why they do such things and what he wants them to do to in order to succeed in that activity. Any leader who is independent enough to act on his decisions can be considered as self-reliant. Advantage A major advantage of a self-reliant and an independent person is that they would be totally in control of thei r emotions while taking decisions. As a result, any problem could be dealt by them in a balanced manner and such a person would arrive at any decision only by understanding the pros and cons of that decision and would not allow any emotional leverage to pull them to any side. Also, when such decisions are made, one could easily motivate others in the team to act to their full potential because, they would be clearly aware that true and hard work will turn successful and be rewarded under the self-reliant person’s leadership. One exemplary example of self-reliance being the primary force of leadership could be the life and struggle of Gandhi, popularly called as the ‘father of India’ (Chadha, 1997). Gandhi brought into a country filled with chaos and fight, a sense of peacefulness and unity only through his self-reliance. He was not a well-built man and he was totally ignorant about the artilleries and nuances of war, but he was completely aware of what he is capa ble of. He understood his capabilities and fought with that. He always believed that to free India from the British, it can never be done through violence and action. Only with non-violent movements and consistent protests can there be any sort of positive movement. He stood in front of the British, took their beatings and still continued to fight in a non-violent way. His was a perfect example of how a leader can unite a nation just by his determination and self-reliance. His practices and preaches were clearly a result of understanding of his own true-self and the success that was tasted in the form of India’s freedom was actually a direct result of his self-reliant attitude (Chadha, 1997). It is evidently clear that from the above example, that unless one understands the true nature of himself, one can never become self-reliant and thus a good leader. It is an age old truth and even Emerson (1967), in his poem â€Å"Self-Reliance†, written several years ago has clea rly iterated this truth by stating that no man, irrespective of how much ever he tries and copies the attitude, living way or the behavior of other person, can never become another person and can only remain as his true self (Emerson, 1967). Negative-side There is another issue that could be considered as one of the negative effects of being self-reliant. If a person believes

Managment Essay Example | Topics and Well Written Essays - 2000 words - 1

Managment - Essay Example There are ten managerial roles that are seen to come under these three criteria. These are elucidated as under. Interpersonal roles: As the title implies, in these roles, a manager mainly concerns himself with the interpersonal relationships with people and providing them with useful information. These three underlined roles help managers build a network of contacts. Leader: This role defines the relationship between the manager and his employees and involves directing and coordinating activities of subordinates for the achievement of organizational goals. For a human resource manager, this involves roles such as staffing, motivating employees and problem solving. Figurehead: Here the manager represents the organization in all matters of formality. For example at the top level of an organization, a manager becomes a legal and social representative of his company to outsiders and may take on roles like greeting a touring dignitary. Here the manager demonstrates that he cares for his employees, customers and people who deserve recognition. Liaison: This role involves the manager dealing with people other than supervisors and subordinates. It could involve gains of favors, information or support from people like clients, government officials, suppliers, members of board etc. This role helps the manager to build information systems from outsiders that affects the organization's success. Informational roles: These three roles are important as they concern themselves with the manager obtaining and processing information for undertaking managerial work. These are, Monitor: Here the manager receives and collects information that affects the performance of a specific department or the organization as a whole. For example a sales manager, receives and collects information from sales representatives regarding number of product sales and success of a product. Disseminator: In this role the manager disseminates information to subordinates. For example, in a social organization working for child welfare, a manager has the role to inform his people on new child laws enacted upon by the government. Spokesperson: In this role, the manager transmits information of the organization to outsiders in an official capacity. At the top level of a social organization, a manager is seen as an expert in the line and if the manager says it, it is considered that the organization says it. However at middle management level of a social organization, the manager is seen as the expert of his or her department. Decisional roles: The access to information and the range of interpersonal relationships, put managers on the fore of using above information for decision making. This shoulders him the most important responsibility of four major decisional roles, Entrepreneur: In this role, a manager becomes an initiator of change and brings in new ideas to his organizational environment. Surveys are

Friday, July 26, 2019

Reading response Essay Example | Topics and Well Written Essays - 500 words - 7

Reading response - Essay Example They achieve this by exploring the genesis of biodiversity, as well as the implications of the fields of ecology and conservation biology in terms of shaping biodiversity. Maclaurin and Sterelny seek to define the various forms of biodiversity, which are critical to fields such as taxonomy, ecology, developmental biology and morphology. They construe that biological heritage is rich in all bio-diversities (Krishnamurthy 211). The reading concludes with the authors drawing focus to phenotype diversity by delving into the topic of development. They note that genes serve as paradigmatic developmental, as well as evolutionary resources, and form the basis of what all species depend upon for their fundamental existence. They ask a fundamental question in the field of biology; whether ecosystems of communities typically operate as crucial organized systems on a biological level. Maclaurin and Sterelny (25) argue that if ecosystems fail to function as biologically organized systems, the richness of each species encapsulates ecological diversity. Maclaurin and Sterelny consider the availability of crucial details regarding a species and the presence of vital environmental variables that impact the species as sufficient information to facilitate the comprehension of ecological results. However, the authors argue that these results cannot be attained in organized ecosystems. The authors further delve into the topic of biodiversity conservation through the use of option value theory, a concept derived from economics. Overall, I agree with the authors regarding the importance of diversity in biology. I strongly believe that biodiversity facilitates the existence of life, regardless of the organism found in the ecosystem. Without biodiversity, natural sustainability for every life form would be impossible to achieve. The significance of biodiversity primarily centers on the sustenance of

Thursday, July 25, 2019

Week 2 Hand-in Assignment Essay Example | Topics and Well Written Essays - 500 words

Week 2 Hand-in Assignment - Essay Example It consequently follows your every activity on the website that initiated it and the website proprietors receive this information. In E-commerce websites, cookies can and are frequently used to help in keeping the purchase details of each customer. E-commerce website requests for any present cookies when a customer accesses a page. The cookies tell the sites shopping cart what items are in the cart, and when the customer adds a new product or removes it, the server sends a new cookie to the browser that is up to date. When its checkout time, the updated cookie, tells the shopping cart what products have been purchased (Greenstein, 2001, p 35). The transport control protocol (TCP) is a connection-oriented service. This means that it usually has the client and server exchange transport-layer information with one another prior to the flow of the application level messages. Consequently, the client has the responsibility of starting the communication with the server and in order for the server to be able to respond to the client’s first communication, the server needs to be ready. This means that the server application cannot afford to be in an inactive state and must be running even before there is an attempt to generate the communication by the client. Thus, the server application must be executed before the client program (Rajinder, 2007, p

Wednesday, July 24, 2019

The Emperors Necropolis Assignment Example | Topics and Well Written Essays - 1250 words

The Emperors Necropolis - Assignment Example There are many mysteries spoken of in relation to the tomb and First Emperor. The overall scope and detailed complexity of the tomb have been called astonishing and astounding. Why did he build it? Did he really seal up living people inside the tomb to prevent its secrets from being revealed? How in a time so long ago was such a thing able to be built? Truly, it is a magnificent accomplishment, but the Tomb of Shi Huang Di is less about mystery or mythology, but a product of armies of manpower over the course of decades. In order to understand the creation of the Mausoleum, we must understand the man who claimed the title of the First Emperor of China. Yin Zheng took the throne in 246 BC, at the very young age of 13, and managed to unite several warring kingdoms. With these successes, he took the name Shi Huang Di, or First Emperor. He was a force to be reckoned with, but not all of his contributions to China were militant in nature. The Emperor standardized a coin system, universalizing potential commerce in the different kingdoms. He also created a standard of weights and measures, commissioned roads, and waterways to connect the states and the first to conceive the Great Wall of China. He was a man of great and immense power, amassing more wealth and control than any previous ruler before him. Not long after unifying the feuding kingdoms, he conceived and commissioned the tomb that would be so much more. Shi Huang Di was fixated on the afterlife and believed that he would continue on when his mort al life was over. This is entirely not unlike the ideology behind the Pharaohs of Egypt. The Emperor entirely planned for his rule, his kingdom, his actual court, would continue into the afterlife.

Tuesday, July 23, 2019

Contemporary Issue in the Chinese Economy Essay

Contemporary Issue in the Chinese Economy - Essay Example This research will begin with the statement that based on the results of the 6th national census carried out in 2010, the Chinese population’s average growth rate between 2000 and 2010 was 0.57%. In the same year, the population of people aged 60 and above reached hit the 178 million mark, representing 13.26% of the whole population and up to 5.64% starting 1982. The population in the 0-14 age group, however, represented 16.6%, a 16.99% decline compared with 1982. Reports forecast that the population of people aged 65 and above will represent between 15 and 20% in 2027 and 2035 accordingly. With a growth in the number of the aging people and decline in that of the working-age population, China’s dependency ratio of population will keep increasing and reach the 0.5 mark or above in 2033. This is a worrying statistic considering that it was 0.38 just 4 years ago. Based on forecasts by the United Nations, the dependency ratio of China’s population will reach an extr emely high level of 0.8 by 2070, meaning that 4 working-age people will be compelled to support at least two aged adults and one child by that time. This change in the population structure makes the challenge of an aging population a significant one for the country to confront so that it can guarantee social and economic development in the future. The past experiences of Japan show that even in a nation with a high-income level, advanced technology, highly-skilled workforce and developed infrastructure, an aging population is still likely to cause an economic downturn and even stagnation. In 2011, Chinese aged 65 and above represented 9.1% of the total population, a scenario very identical to what Japan faced in 1990. However, China is to some degree confronted with a more serious problem than Japan because it is currently still far from qualifying as a developed country. The negative effect on economic growth caused by the aging population can be summarized this way: First, the cou ntry will lose the benefits of backwardness prematurely in its pursuit of developed countries. Secondly, the country will lose its edge when competing with developing nations that still have a demographic share. Finally, China is yet to enjoy the innovative rewards of a developed country. Consequently, its original competitive benefits are dwindling, which in turn will surely magnify the need for a reform of China’s economic growth system.

Monday, July 22, 2019

Gullivers Travels Essay Example for Free

Gullivers Travels Essay When Blackadder and Prince George are faced with dilemma of bribing an MP to vote in the princes favour they provide us with a description of a member of parliament called Sir Talbot Buxomly who is corrupt, cruel, ineffectual and open to bribes. According to Blackadder he is a perfect candidate to become a High Court Judge and even Prince George thinks he is a little over qualified. Blackadder: Sir Talbot has the worst attendance record of any Member of Parliament but if we can get him to support us, were safe hes a violent, bigoted, mindless old fool The use of satire here suggests that the high court judge isnt necessarily as honest as you would expect a person with that much power to be. A comparison with this is Swifts description of the Emperor in chapter two. He describes how he is expensively dressed. He had on his head a light helmet of gold, adorned with jewels, and a plume on the crest. Swift compares him to the pompons King George the first. He was king of England but was brought over from Germany and did not speak the language. When the Emperor speaks at Gulliver he cannot understand a word and this is his bribe at the king. Like Sir Talbot Buxomly, the Emperor is useless and incompetent. When it comes to the actual election, Blackadder confesses that they will cheat in order to win votes. He is not alone in this outlook as one of his opponents, Pitt the Even Younger confesses what he did in order to be a decent politician bad mouthed the opposition. Bribed the newspapers. Threatened to torture the public if his party lost. Once again driving home the point that the politicians will do anything within their power to get a seat in parliament. You can tell that cheating is certainly not beneath them when Pitt the Even Younger told what was a decent politician is in his opinion. I fail to see what more a decent politician could have done Similar examples of satire, which criticise politics and the government are also found in Gullivers Travels. In Lilliput anybody who jumps over the highest rope gets a position in court and how candidates jump over and creep under a stick held at various heights win the silken threads which show the kings favourite. Just like in Blackadder getting a job in the court in lilliput is not to down how good you would be at the job but is down to how much you can creep, crawl and pander to the king. Whoever performs his part with the most agility and hold out the largest in creeping and crawling, is rewarded

Prejudice,Stereotypes and Discrimination Essay Example for Free

Prejudice,Stereotypes and Discrimination Essay Prejudice is an attitude that releases closely to intercultural sensitively. It is more commonly held and expressed by people in ethnocentric stages of the sensitivity model compared to people in the ethnorelatives stages. (Oetzel, 2009). Prejudice is the belief and feeling aspect of an attitude. It can be a pro or con but leads us to judging something based on our preconception. Prejudice is where you think against someone or something for no particular reason, thought or knowledge. It be because race , sex , age , or whatever . An would be like , â€Å" Oh I don’t like her , she’s a lesbian,† or she’s black or white or of any other race. Stereotype are overgeneralized cognitions about a group of people with no attempt to identify within –group variation . Stereotypes often based on learned and widely shared beliefs and another group that reinforce or justify prejudice (Oetzel, 2009) . A stereotype is a set of preconceived beliefs about those who share a trait in common . It is the narrow prejudice view of a particular social group . Such as â€Å"black people know how to dance† and â€Å"women are better at cooking and worst at driving†. They’re sometimes offensive and often unfair. Stereotypes is a view of social group that sticks , even though the social group is full of individuals who may not share any of the traits of the stereotype at all. It’s like â€Å"cheerleaders are bitches† or â€Å"geeks are smart†. Discrimination is action that maintain the dominance of one group of people over another. The power to enact the behavior is a key component to racism and discrimination. That power can be from a held position (being a boss) or social power (being part of a group that has political power). (Oetzel, 2009). Discrimination is where you actively are against someone for no reason , either on the basis of age , race , class or whatever . It’s different from a prejudice because you actually do an action , such as not giving that person a job because of your prejudice , or refusing to give them a room at a hotel. I remember when I was young , I use to live with my Father in a small town in Ohio. It was mainly white community , I had a friend that was white. She had invited me over her house and her Grandma was racist. When I walked in to her home , her grandma said to me â€Å"she can’t have company at all and you need to leave†. The next day I seen my friend , she had apologized to me, and said I don’t know why my grandma acts like that to black people. â€Å" She told her granddaughter not to play with blacks only with white children†, and she only would allow white children to come to her house . She never listened to her she still played with me anyway. I told her it wasn’t her fault that some people are just racist. Later on that week I was in the store with my grandma which is white also , we had seen my friend and her grandma . Her grandma tried to act as if nothing happen and spoke to my grandma and said to me you can come back over and play. I gave an example of prejudice stereotype and discrimination . People also stereotype for many of different reasons such as tattoos, race , religion, age gender and etc. Now days young folks now have a new way to rebel against society and ultimately and more honestly their parents . We began to see masses of young , dim witted teens getting idiotic tattoos just so they can feel like a badass (greengysywolf1 (How Prejudice and Fear). Children not knowing that when they get older that tattoos will affect them getting a job or the way society will look at them because of the tattoos they have on them. Even though it’s not right that’s the way society stereotypes and discriminates people because of their appearance. People get tattoos because they enjoy them , not to mark them as different , not to get jollies of the pain , or not to be the evil spawn of satan himself (greengysywolf1 (How Prejudice and Fear). People also stereotype people that have been in prison. It’s people that have went to prison and have changed their lives around completely . I have a friend that is about â€Å"6 4† and 200 pounds , but seems blessed with a baby face , so no one believes he ever been to prison . He usually waits until he meets someone in person to tell them , even though he knows there is a chance they will refuse to accept it . I’ve seen the look , the change behind the eyes that goes from listening to what the stereotypes say an ex-con is and should be . I found it interesting because he tends to be more truthful and respectful than people who have not done time. Prejudice exist everywhere; with prejudice comes a stereotype or discrimination. Most stereotypes are dealt with minorities , especially in the United States . Basically, It all depends on how a person was raised . Most of Americans assumes that every white person grew up either in the suburbs , or well-to-do apartments in the city. While sometimes that is true ,but some lives in bad areas like farming towns and many other diverse places. Where you raise your family depends on your income and your family situation most of the time. If they have a higher income than yours average American, than they probably live in the most high-class place they can buy. If they are middle class than suburbia is most likely option. If they exist in the lower class , your income is not so great. Then they would probably live in poorly developed neighborhoods , like a trailer park or apartment complex. African Americans continue to face the highest level of discrimination in renting , selling and insuring property, according to the National Fair Housing Alliance . People with disabilities field the second highest number of claims followed by families with children and Hispanics. (surge). The British did an research article in 2009. , with 60 people ranging from 18 to 65 years of age . The tests of implicit attitude used in this study are based on links to real world behaviour, so its likely that those participants with a very strong homophobic attitude would routinely behave in a discriminatory way. The four or five per cent with strong prejudices would find their attitudes often affect their behaviour and the 15 to 20 per cent with mid-range prejudices are probably unaware of their attitude, but their thoughts and feelings towards gay or lesbian people will probably surface when they are emotional, stressed, frustrated or threatened (Society, 2009). I think people should look at themselves before they try and judge others , without getting to know them or speak to them first. Before you judge a book by its cover at lease open a couple of pages and read about it first. Works Cited Oetzel, J. G. (2009). Intercultural Communication (A Layered Approach). New Jersy: Pearson Education Inc. Page, H. (n. d. ). How To Stereotypes Affect My Life. Retrieved 2012, from http://greengypsywolf1. hubpages. com/getwidget. Society, T. B. (2009, Jan 16). Prejudice Study Finds Gay Is The New Black. Medical News Today. Surge, H. D. (n. d. ). CNN Cable News. Retrieved 2012, from http://www. cnn. com/US/9705/21/briefs. pm/housing/index. html.

Sunday, July 21, 2019

Anti-inflammatory Function of Gut Macrophages

Anti-inflammatory Function of Gut Macrophages Colonic mucosa is a very peculiar immunological site daily exposed to a huge amount of harmless antigens. It is important for the immune system to be able to recognize this innocuous antigens from pathogens. Among all the immune cells, CX3CR1+ macrophages exploit this critical role. In this commentary on our recent publication on Immunobiology (Non-redundant role of the chemokine receptor CX3CR1 in the anti-inflammatory function of gut macrophages(1)we want to highlight the crucial and unique role of these macrophages in order to maintain homeostasis and avoid the rise of aberrant inflammation and tissue damage. The intestine is an exclusive tissue able to maintain balance between the immune system activation and the tolerance against the very huge amount of harmless antigens that are in contact with the intestinal lumen, including food antigens and microflora. It is fundamental for our health that our immune system is able to respond with a robust and appropriate response to potential dangerous antigens; but the same reaction against harmless antigens, like commensal bacteria or dietary proteins, could be very dangerous and could give rise to allergies or chronic inflammation that, in the end, can lead to tissue damage or cancer development. Many immune cells participate to the maintenance of the homeostasis in gut, with the role of understanding how an antigen is a potential danger for the organism and being silenced in response to commensal bacteria and food antigens. This complex landscape includes T and B lymphocytes, natural killer cells, innate lymphoid cells, eosinophils and mononuclear phagocytes: dendritic cells and macrophages. Among the latter, monocyte-derived macrophages, expressing the CX3CR1 receptor, constitute the most abundant population (2). The manuscript by Marelli et al., is focused on the role of CX3CR1+ macrophages in both steady state and acute colitis. In the last few years intensive research has been performed in order to clarify the role of these immune cells in the maintenance of homeostasis, but still, contrasting results have been reported regarding their role in the control of inflammatory response in the intestine (3,4). Considering this confused landscape, our paper aimed to clarify the role of CX3CR1+ cells in the development of acute colitis. By using mice lacking the receptor (CX3CR1GFP/GFP mice) we demonstrated that the absence of CX3CR1 on gut macrophages leads to a more severe degree of DSS-induced colitis, higher colon infiltration of inflammatory macrophages and Th17 lymphocytes and higher expression of inflammatory cytokines. Macrophages in the intestinal mucosa are considered mononuclear phagocytes that originate from a common myeloid progenitor which can differentiate also into dendritic cells (5). In contrast to others resident macrophages, they are continuously replenished from blood stream Ly6C+ monocytes, independently from the CX3CR1 receptor (6). This issue caused considerable misunderstanding in the past, generating the belief that these cells were dendritic cells (7,8). However, today it is recognized that Ly6Chi monocytes are recruited in the mucosa and there, in few days, they differentiate in mature macrophages, progressively loosing Ly6C and starting to express typical markers, such as F4/80, CD64, MHCII and CX3CR1 (6). As highlighted before, different authors investigated the role of CX3CR1+ gut macrophages with controversial outcomes. CX3CR1+ macrophages are supposed to maintain homeostasis in the gut (9). In accordance with this concept, our data revealed an exacerbated intestinal inflammation with a huge accumulation of macrophages in CX3CR1-KO mice. As reported also by different authors, (3,10) the natural consequence of the accumulation of macrophages is an increased production of cytokines, and hence a higher recruitment of immune cells in the colon, in particular T lymphocytes of the Th17 subset. On the contrary, other authors (4) suggested that the lack of the receptor impairs macrophages accumulation in the lamina propria. Moreover they suggested that the engagement of the receptor by its unique ligand (Fracktalkine/CX3CL1) resulted in an intensification of iNOS production, an inflammatory enzyme. Our data, instead, clearly demonstrate that the absence of the receptor increases the level of iNOS and of many other pro-inflammatory cytokines. This is a tissue-specific competence of the intestine, being colon ic resident macrophages an exemption from the rules. Indeed, in other tissues, the expression of CX3CR1 receptor is associated with a pro-inflammatory phenotype (11,12). In support of our data it is important to underline that, in the gut, CX3CR1 macrophages are fundamental to bring antigens and present them to DC in order to establish oral tolerance. When this mechanism is missing due to the lack of the receptor, the immune system is activated and this results in an acute inflammatory response (8). We have shown in Marelli et al. that if the CX3CR1 receptor is lacking, the ability of these cells to control inflammation is lost. Of note, CX3CR1-KO macrophages try counter-balance this aberrant situation by producing more IL-10, a major immune-suppressive and anti-inflammatory cytokine. In spite of this increase, IL-10 is not sufficient to control the inflammatory disease and mice have an exacerbated colitis. Overall, with our study we wanted to propose a definitive protective and anti-inflammatory role of CX3CR1+ macrophages during the processes of acute colitis; this concept may shed light also on the role of these cells in other pathological conditions of the gut associated with persistent inflammation. Our study established that macrophages expressing the functional CX3CR1 receptor have a non-redundant role in the control of aberrant intestinal inflammation, a harmful condition that may lead to tissue injury. CX3CR1 receptor expressed on intestinal macrophages is able to control colitis, avoiding the rise of aberrant inflammation. When the receptor is missing, the balance in the gut is broken, leading these cells to produce a huge amount of cytokines. Feeling the higher level of inflammation, CX3CR1 macrophages attempt to limit it by producing more IL-10, however this is not sufficient and the result is a higher accumulation of inflammatory Th17 lymphocytes and increased tissue injury.

Saturday, July 20, 2019

Edna Pontellier’s Fall from Grace in Kate Chopins The Awakening Essay

Edna’s Fall from Grace in The Awakening      Ã‚  Ã‚   In the novel The Awakening, Kate Chopin tells of Edna Pontellier's struggle with fate. Edna Pontellier awakens from a slumber only to find that her life is displeasing, but these displeasing thoughts are not new to Edna. The actions taken by Edna Pontellier in the novel The Awakening clearly determine that she is not stable. The neglect of her duties as a wife and mother and as a woman of society are all affected by her mental state. Her choices to have affairs and disregard her vow of marriage represent her impaired judgment. The change in her attitude and interests becomes quite irresponsible, and that change along with her final decision to commit suicide tell the reader that Edna Pontellier is not capable of making valid judgments. Had Edna Pontellier been of sound mind and body, she would not have ended her young life by suicide. The fact that she can clearly and easily turn to such an alternative suggests that she is depressed and obviously in opposition to the chu rch. The thoughts and actions of Edna Pontellier are solely determined by her manic depressive state, her apparent repressed abuse from her childhood, and her abandonment of Christianity.    Throughout the novel the reader gets a clear sense of Edna Pontellier's peculiar mind and her manic depressive state. She is continually plagued by the moment. Her mood shifts from highs to lows show the reader that a sadness is perpetually within her:    We are told there are days when she "was happy to be alive and breathing, when her whole being seemed to be one with sunlight.." On such days Edna "found it good to be alone and unmolested." Yet on other days, she is molested by despondencies so severe that "... ...manic depressive state which leads her to her suicide. She no longer has a will to repress any untold secrets from the past or perhaps the past. Since she has strayed far from her Christian beliefs, she has given in to the evil that has worked to overcome her. She believes she is finally achieving her freedom when she is only confining herself to one single choice, death. In taking her own life, she for the last time falls into an extremely low mood, disregards anyone but herself, and disobeys the church.    Works Cited Franklin, R. F. "The Awakening and the Failure of Psyche" American Literature 56 (Summer 1984): 510-526. Platizky, R. "Chopin's The Awakening." Explicator 53 (Winter 1995): 99-102. Seyersted, P. Kate Chopin: A Critical Biography. Baton Rouge: Louisiana State UP, 1969. Skaggs, P. Kate Chopin. Boston: Twayne Publishers, 1985.

Friday, July 19, 2019

The Telescope :: physics science space telescope

There is a beckoning about space—an indefinable pull towards its airless environment. While I share a childlike excitement of zero gravity far off planets, I don’t lose myself in heavenly dreaming. Infact, what is more my fascination, is the technology that allows children to have their dreams, that allow them to grow up and actually touch the stars! And thus, I put forward for your enjoyment and enlightenment, a detail and profile of the most landmark instrument ever created for observation of the stars! Two pieces of glass (three at most) are used to either refract or reflect light emitted by a far off source. Radio telescopes are similar (though will not be addressed here) in that they collect energy signals from far off sources. People commit hundreds of hours of their lives, willingly, to a continuous myopic view of the universe, generally very alone atop some secluded high mountain like a Buddhist monk. What do the efforts of these researchers matter to us? Wouldn't their time be better spent raising their children or contributing to their community? But these researchers do matter and their efforts are fruitful. What these martyrs of loneliness are providing is a biopic view for the rest of humanity. They are providing a complete and ever expanding image of our place in the solar system—an account of the space in which we live. Space is the substance of metaphysical conjecture and childhood visions. It is, to borrow famous words, "the final frontier"! Profound landmark discoveries have shaped our interpretation of our manner of habitation and altered our ways of living to live in a cleaner, more humble, relationship with the substantive universe around us. These researchers have studied the births and deaths of stars, the motions of planets and space bodies, the unbelievable natural phenomena of the heavens that, in their spectacular magnitude and power, seem to bring our universe back down to where is feels more real. We can only take in the reaches of space one eye at a time, but little by little, but picture becomes clearer. Politics The early 1600 were a time of church authority and undisputable tradition. Such were these high emotions that in 1616, an edict was past prohibiting support of the Copernican thought of a heliocentric system. At the slightest suggestion of any thought other than the earth being the center of the universe and the church would actively rise against the authors of those notions.

Farewell to Manzanar by Jeanne Wakatsuki Houston Essay -- essays resea

The book, Farewell to Manzanar was the story of a young Japanese girl coming of age in the interment camp located in Owens Valley, California. Less than two months after the Japanese bombed Pearl Harbor, President Roosevelt signed an Executive Order, which stated that the War Department had the right to declare which people were a threat to the country, and move them wherever they so pleased. Since the West Coast had a large number of Japanese immigrants at the time, the Executive Order was basically an act that authorized the government to remove Japanese residing on the West Coast away from their homes and put them in these interment camps. As harsh as it may sound, the interment camps were nothing like the infamous Nazi interment camps of World War II. Manzanar residents enjoyed relatively comfortable living conditions, and lived fairly comfortable lives as compared to those of German interment camps. However, it was still rough, as many families were separated and emotional scar s lingered long after the experience. Farewell to Manzanar is the story of one girl making the difficult transition to womanhood, at a difficult time, and at a difficult location. Two of the main life lessons that Jeannie learned during her stay at Manzanar dealt with the issues of her identity as an American against her Japanese heritage, and also with her treatment in school. During her time at Manzanar, Jeannie was surrounded by almost exclusively Japanese people, and did not have much exposure to Caucasians, or people of other races. Therefore, she did not know what to truly expect when she went out into the â€Å"school world† outside of Manzanar. She had received some schooling while in Manzanar; however, the American schools were drastically different from the schools inside of Manzanar. While inside Manzanar, Jeannie learned more skills in the fine arts, such as baton twirling, and ballet. Though â€Å"hard† subjects were taught, Jeannie didn’t mention them as much as she did about the baton twirling, ballet, and Catechesis. The schools at Manzanar were not much until the second year. The first year, volunteers taught the schools, and resources were pretty scarce. However, in the second year, teachers were hired, and the number of available supplies increased. One key thing that Jeannie remembers about her Manzanar schooling was her participation in the yearbook, and also with the ... ...he fact that she was pretending to be of a culture which she did not belong to. She was dressed as an American, acting as an American, even though she was of Japanese descent. Under Papa’s orders, she signed up for odori class, however, she performed terribly and was basically kicked out of class by the instructor. Jeannie Wakatsuki lived a very diverse life, as she was subjected to both life inside of an interment camp and American high school. Attending American high school was a character shaping experience, and even more so for someone of a minority race or gender. The experience lets them know where their race stands among others, and if they will be completely accepted in the â€Å"outside world†. Unfortunately for Jeannie, she was not totally accepted by others throughout her life, and that left psychological scars on her. However, she came out of these experiences a better and more well rounded person, so they were not totally negative for her. A note of interest is that she ended up marrying a non-Japanese person, possibly due to her growing up and maturing around non-Japanese. The book Farewell to Manzanar fully illustrates her thoughts and feelings throughout this process.

Thursday, July 18, 2019

End of Life Care: Family Health Essay

In nursing, the goal of care is usually to restore the patient back to the highest level of health possible. In some cases, however, the goals of care change when a curative approach is no longer appropriate. The new goals of care could simply be palliation and pain control rather than a restoration back to full health. This type of care is called palliative care. Palliative care is not the same as end-of-life care, but the two go hand-in-hand at times. The goal of end-of-life care is a â€Å"good† death, good being defined by the patient. Palliation is part of that â€Å"good† death. Both palliative care and end-of-life care are areas of patient care that can be highly sensitive for those involved. A nurse must be able to navigate these waters carefully. The physically and mentally exhaustive nature of illness and dying takes a huge toll on the patient and his/her family. Anyone can qualify for palliative or end-of-life care regardless of race, gender, age, or any othe r demographic factors. It simply depends on the disease-state, the recommendations of the health care providers, and the goals of the patient. It is estimated that 69%-82% of those who die in high income countries such as the United States will need palliative care (Murtagh, Bausewein, Verne, Groeneveld, Kaloki, & Higginson, 2013), illustrating the need for nurses to familiarize themselves with this type of care. One concern voiced by many nurses is a not knowing what to do or say during end-of-life care (Sherwen, 2014). In the case of cancer, in particular, which has become more of a long-term illness, nurses feel uncomfortable and may miss opportunities in patient care (Sherwen, 2014). The following will be a discussion of palliative/end-of-life care and what the nurse can do to help the family and patient during a difficult time. A successful case is one in which the patient and his/her family feel supported and listened to throughout the whole process and the goals of the patient are achieved. Discussion When does palliative care begin? When does end-of-life care begin? These are questions that can only be answered by the individual going through the disease process and the team of caregivers advising him/her. A simple answer to both questions would be this: when the goals of care change from full restoration to health to comfort, relief of symptoms, and maintaining as high a quality of life as possible given the disease-state. Palliative care has a broader definition in that it focuses mainly on the patient’s comfort and can be applied to many other cases besides the imminently dying patient. The original development of palliative care was primarily for patients with cancer, in which there may not be a cure, but symptom management and prevention of progression of the disease is the primary goal (Kaakinen, Coehlo, Steele, Tabacco, & Hanson, 2015, p. 278). It has since branched out to other illnesses with poor prognosis but long disease-course; it really depends on the care team and the individual as to when it is implemented. End-of-life care, on the other hand, is a series of decisions made by the family when death is imminent (projected in the next days to months). They must decide how much medical intervention they want done with their family member, where the â€Å"ideal† death would occur (in their home vs. in a facility), and what their definition of a â€Å"good† death would be. Every case is different and there is not always time to plan everything, but this is a general outline. Before approaching any new area of nursing, a nurse must assess his/her own personal beliefs and for the presence of any biases about death and illness. It may be that the nurse has never encountered death and dying face-to-face and may hold pre-conceived notions that may not be in harmony with the patient’s beliefs. Identifying these biases and correcting them is crucial to taking care of the patient. While it is not wise or possible to separate one’s own person from one’ person as a nurse, it is better to find ways to help the patient through the process without burdening them with your own beliefs. Dying is a process that involves the entire family; that is to say, the family that is defined by the person. The nurse must be aware that this is  not only an individual process but a family process. This involves recognizing family dynamics and communication patterns and facilitating healthy interactions. Kaakinen et al (2015) discusses the two types of health care teams that will be involved in the patient’s care: multiprofessional and interprofessional. The multiprofessional model is an older model that does not focus on holistic care. Care is fragmented with an autocratic leader, vertical communication, separate goals of the professionals involved, and families are peripheral to the process (Kaakinen et al., 2015). The preferred model is the interprofessional model emphasizing a team approach, holistic care of the patient, horizontal communication, and involvement of the family (Kaakinen et al., 2015). The nurse should keep this collaborative approach in mind when dealing with any patient case, involving all teams associated with the patient for the best outcome. It is important to remember that care of the patient does not end when the patient dies. After the death there is still work to be done in the form of comforting the bereaved family members. It has been reported that some families feel â€Å"abandoned† after the death of a loved one by the hospital staff and this simply should not be so (Kaakinen et al., 2015). The nurse’s role after death involves simply a comforting presence, providing resources, answering questions, and listening to concerns. It may also be helpful to give the family information about what to expect next, what information is needed from them (funeral home arrangements, organ donation, etc.), and provide a place for them to rest and process. The relationship the nurse has with the patient is integral to positive patient outcomes. Ways that a nurse can improve this relationship include being professional, being sensitive, listening, and establishing trust. The nurse needs to be able to communicate and be communicated with clearly and easily. This will be a challenge for some families who already have poor communication skills. Asking questions and taking time to listen go a long way in opening up communication. It is of benefit to the nurse to try and center his/her thinking on what the dying patient’s goals are. A dying person wants to feel some semblance of control, strengthen personal relationships, and be relieved of pain and suffering. Good end-of-life care involves finding these goals, describing to the patient what good end-of-life care might look like, talk about symptoms that may occur, and discuss the importance of good communication, good relationships, and the role of informal (family) caregivers (Sherwen, 2014, p. 51). When palliative care and end-of-life care are the direction care is taking, the nurse needs to shift gears in a positive way. One positive step the nurse can take is to empower the family during this time. Many families feel helpless against the diagnosis, but the nurse can show them that they still have an element of control. The nurse should provide them with information about the disease process, give the family resources in the community for support and services, and most of all offer encouragement. There will be negative feelings present in most cases, including feelings of hopelessness, depression, anxiety, and loss of control. The nurse must recognize these negative feelings and start a conversation. The nurse needs to be a facilitator of conversation between family members in order to identify common goals. Family meetings are a great tool to utilize throughout. It is held between caregivers and leaders in the family and can reveal concerns, answer questions, and establish go als of care. Parts of positively dealing with a dying loved one include balancing hope and preparing for death, as well as finding meaning in the situation (Kaakinen et al., 2015). These are things that may be beyond the scope of the nurse’s practice, but identifying them is important. The nurse can bring in social work, the palliative care team, and pastoral care to assist the family; whatever is appropriate. When the time comes for the actual death of the patient, there are clinical signs and symptoms that the nurse must recognize. Care at the time of active dying is crucial for a good death. Some symptoms such as sleeping, decreased hydration and food needs may be easy for the family to bear, but  others, such as restlessness, difficulty breathing, and confusion may be very difficult to bear (Kaakinen et al., 2015). The nurse and care team must work together to provide maximum comfort for the patient as well as emotional support for the family during this difficult time. Conclusion In conclusion, there is a point in a patient’s care where the focus shifts from curative to palliative, often in the case of cancers but in some other cases as well. The nurse needs to familiarize his/herself with this topic in order to provide optimal care. He/she must assess his/her beliefs and biases on the topic and address those that may be a source of conflict. The goals of the patient and his/her family must be established. Family meetings and conversations need to occur to facilitate communication, address concerns, and provide information. The nurse plays an important role in providing information for the family, managing negative feelings, encouraging hope, and preparing for the death. At the end-of-life and after the actual death the nurse can provide compassionate care, display sensitivity, and comfort the bereaved. Death is the inevitable outcome of this life that all must face and a nurse has a special opportunity to help a family through the process. Helping and comforting a family during this process can be a truly rewarding aspect of a nurse’s career. Reference Kaakinen, J., Coehlo, D., Steele, R., Tabacco, A., Hanson, S. (2015). Family Health Care Nursing: Theory, Practice, and Research. (5th ed.). Philadelphia PA: F.A. Davis Company Murtagh, F., Bausewein, C., Verne, J., Groeneveld, E., Kaloki, Y., & Higginson, I. (2013). How many people need palliative care? A study developing and comparing methods for population-based estimates. Palliative Medicine. 28(1). 49-58. Doi:10.1177/0269216313489367 ***Sherwen, E. (2014). Improving end of life care for adults. Nursing Standard, 28(32), 51-57. Trueland, J. (2014). All it takes is a bit of specialist knowledge. Nursing Standard, 29(3), 26-27. ***Research Article

Wednesday, July 17, 2019

Facial Identification Of Driver Fatigue Health And Social Care Essay

number one wood construct on is oft measure adept of the prima causes of traffic accidents. In this think twelvemonth under victorious, a com rambleing appliance vision ardor which exploits the gismo grindr s seventh cranial nerve conditionulation is considered, utilizing a conspiracy of the genus Viola-J bingles lay out detective work technique and nutrition vector machines to sort nervus facialis optical aspect and dislodge the form of put on duty.Section 1 DescriptionIntroductionStatisticss show that device device device device device device number one wood weariness is frequently champion of the prima causes of traffic accidents. oer the past few senile ages, a batch of look for and attempt has been put forth in planing dodges that monitor s get downly(prenominal) driver and driving reality presentation. A computing machine vision feeler which exploits the driver s facial look is considered in this concluding twelvemonth undertaking. The Viola-J unitarys real time prey perceive model p reppp atomic number 18s on a boosted cascade of Haar flux singularitys is take for casing detection. To find the pointedness of weariness, triplex trait categorization is so performed utilizing support vector machines. The motives for taking to set up the constitution in this mode ar the rapid confront signal detection times coupled with the simple and in big-ticket(prenominal) everywhere totally execution, avoiding the demand to put in expensive and complex hardw ar.Concise Literature refreshenThis subdivision gives a wide reappraisal of the literary work tie in to establishment feel in sc ar monitor placements and engineerings, concentrating peculiarly on what has been through with(p) in the field of driver weariness. In subdivision 1.2.1, some(prenominal)(prenominal) statistics of fatigue- think locomote vehicle accidents atomic number 18 mentioned and analysed. Section 1.2.2 juicy spots some of the a good deal successful bodys ( both commercial and non-commercial ) that expect been utilise in new obsolescent ages. On the sepa stride manus, subdivision 1.2.3 nowadayss an enlightening overview of the algorithms and techniques typically employ in the development of much(prenominal)(prenominal)(prenominal) agreements, particularly those refering to both tone and facial characteristic perception. Representative plants for betterly of these regularitys ord personal be included.Statisticss Related to number one wood harassdevice driver weariness has been one of the chief causes of route accidents and gracious deaths in recent old ages, and in this subdivision an reason is made to play up some of the to a greater extent of import statistics that deliver this interdict tendency.The National main road handicraft rubber eraser Administration ( NHTSA ) 1 estimations that 2-23 % of all vehicle clangs place be attributed to driver weariness. Every twelvemonth, some 1 00,000 traffic accidents and 71,000 hurts related to driver sleepiness atomic number 18 describe in the United States, out of which much than 1,300 ar fatal 2 . The NHTSA 3 likewise reports that in the twelvemonth 2005 entirely, thither were to the highest degree 5,000 route benignants deaths ( around 8.4 % ) which were ca apply any by driver omission ( 5.8 % ) or sleepy and fatigued drive ( 2.6 % ) . Further more than(prenominal), 28 % of fatal traffic accidents were collect adequate to(p) to lane maintaining failure, one of the indirect effects of weariness on drivers, ensuing in the loss of 16,000 lives. Undoubtedly, transport drivers are more cap satisfactory to tire chiefly because of the massive hours travelled on main roads, taking to inevit equal to(p) humdrum journeys. In fact, a survey by the U.S. National merchant vessels Safety Board ( NTSB ) 4 affirm that weariness was the finding factor in 51 out of 87 instances of truck accidents.These dismaying statistics pointed to the demand to plan and impose systems capable of introduce and analyzing a driver s facial features or fundamental structure provinces and giving a example signal at the maiden pronounced marks of weariness to seek and disallow the likely happening of an accident. In the interest subdivision of this writings reappraisal, a cypher of these systems go forth be presented.Existing fatigue monitor administrationsmany divers(prenominal) dishonors for systems undertaking the job of driver fatigue have been studied and implement over the past few old ages. Earlier devices tended to be kind of intrusive, necessitating corporeal contact to mensu vagabond fatigue characteristics dapple driving. These characteristics included bosom rate variableness, psychoanalysis of encephalon signals every stain genuine as the driver s physiological province. Other systems studied the relation of driver sleepiness to maneuvering clasp and vehicle motions, with so me also using lane bring in installations. However, the focal point nowadays is more towards independent non-intrusive systems that work in the scope without deflecting the driver in any manner, able to lionise and track header and eye motions by agencies of one or more tv cameras mounted on the vehicle s splashboard. The intensity of merchandises tracking weariness have been designed for on-road vehicles, much(prenominal)(prenominal) as elevator cars, trucks and engines, and these leave behind be reviewed in the undermentioned subdivision. In Section 1.2.2.2, diverse(a) vitrines of weariness observe systems that have been deployed give be analysed.On-Road drudge bring off governancesCommercially Implemented dodgesIn the system presented by Advanced Brain observe Inc. 5 , a caput mounted device in the configuration of a baseball game cap uses the encephalon s electroencephalogram ( Electroencephalography ) signals to mensurate weariness. Two electrodes in side the baseball cap are connected to the driver s scalp to capture these signals, guiding them via wireless moving ridges to a bear upon device 20 pess off from the driver. Russian seller Neurocom marketed the Engine number one wood solicitude Telemetric Control carcass ( EDVTCS ) 6 for system within the Russian railroad system. EDVTCS unceasingly track drivers physiological province by mensurating alterations in the electro cuticular activity ( EDA ) i.e. alterations in the peel s opposition to electrical energy ground on the eccrine sudor secretory organs of the humanity primitive structure, located chiefly on the laurel wreath of our custodies and the colloidal suspensions of our pess. atomic number 53 of the first non-intrusive driver weariness supervising systems was ASTiD ( Advisory musical arrangement for Tired device drivers ) 7 . It consists of an up-to-date knowledge-base hypothetic account exposing a 24-hour anticipation form sing the possibility of t he driver locomotion to kip piece at the wheel, and a guidance wheel detector system capable of placing humdrum driving intervals, such as those in main roads, every bit good as varied maneuvering motions as a consequence of driver weariness. Lane trailing is another(prenominal) ardor interpreted to place astonishment forms tour driving. SafeTRAC, by AssistWare Technology 8 , consists of a picture camera located on the windscreen of the vehicle ( confronting the route ) and a splashboard mounted having device to which it is connected. The camera is able to observe lane markers in roads and issues hearable, eyepiece or tactile warnings if fickle drive forms, such as changeless impetuss amid lanes, are observed. tittle-tattle the issues encountered in earlier systems, more impressiveness now started being minded(p) to systems that monitored driver head motions, buttock and facial characteristics. MINDS ( Micro no detecting System ) , described in 9 , paths head place and motion, with caput cernuous being the chief weariness characteristic utilize for observing micro-sleep ( terse periods of distraction ) while driving. Head motion is bring in by an array of three mental ability detectors located but above the driver s cockpit. Yet another oncoming was taken by David Dinges and Richard Grace 10 at the Carnegie Mellon Research Institute ( CMRI ) in the development of the PERCLOS proctor, which determines the optic culmination per centum over newspaper twingeping for fatigue spying. In 11 , PERCLOS is defined as the proportion of mag the eyes are unopen 80 % or more for a contract c prickle talk interval. pillowcasetLAB 12 focal points on both face and optic trailing, mensurating PERCLOS ( function of heart cube over clip ) and analyzing water chickweeds in existent clip ( including wink frequence and wink sequel ) . A substantial difference from other systems is that the absolute place of the eyelid, instead than the halt of the student, is use to mensurate oculus closing, insideng it much more accurate.The 2001 AWAKE undertaking of the European Union 13 foc utilise specifically on driver weariness, integrating many of the above mentioned move. The chief end of this undertaking, ( its acronym stand for System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic embark Estimation ) , was to supply research on the real-time, non-intrusive monitor of the driver s new province and driving public presentation. valet de chambrey spouses were involved in AWAKE, including developers, makers and providers of electronics, research institutes, universities, auto makers and terminal users. The undertaking s sign ends were those of accomplishing over 90 % dependability, a humiliate than 1 % false dismay rate and a user credence rate transcending 70 % .Car fabrication companies, such as Toyota, Nissan and DaimlerChrysler 9 are besides in the surgical operation of deve loping their ain weariness supervising systems.Research base Systems gayy research documents closely related to driver fatigue monitoring have been published in recent old ages. Assorted attacks have been proposed, among which strip food colouring visible education has been in reality popular. Smith 14 nowadayss a system ground on strip people of color satisfying predicates to find weariness from oculus wink rate and caput rotary motion information. Similarly, in the see way monitoring system proposed by Wahlstrom et Al. 15 , change solid predicates are used to turn up the lip part by finding those pixels that tote up the needed alter material values. display case extraction by skin coloring material cleavage utilizing the normalized RGB skin coloring material speculative account is espouse in both 16 and 17 . Veeraraghavan and Papanikolopoulos 16 develop a system to observe forms of micro-sleep by continuously tracking the driver s eyes. PERCLOS is the fatigue characteristic measured in Aryuanto and Limpraptono s system 17 . Horng and subgenus Chen 18 act to utilize the HSI coloring material conjectural account to take the consequence of brightness from the stick out. instrument acquisition is another normal attack to tire detection. Yang et Al. 19 lead to follow a Bayesian mesh topology found probabilistic model to find the fatigue degree. A Bayesian ne dickensrk theoretical account is besides constructed in 20 , where Zhu and Lan track triple ocular cues, including caput and oculus motions and facial looks via two cameras, one for the face and the other concentrating specifically on the eyes, every bit good as Infra-Red illuminators to illume up the needed countries of the face.A neuronal weave attack is pick out by DOrazio et Al. 21 and RibariA et Al. 22 in their proposed systems. In 21 , the oculus is detected based on the border information of the flag, with its darker coloring material insideng it much easier to turn up. A back extension anxious entanglement is skilled to sort the province of the eyes ( either unfastened or closed ) . On the other manus, in 22 , a intercrossed nervous web and a combination of the HMAX theoretical account and Viola-Jones perception element together with a Multi-Layer Perceptron ( MLP ) are used to turn up the face. The grade of caput rotary motion, oculus closing and spontaneous cavity openness are the fatigue steps calculated.To sort driver public presentation informations, Liang et Al. 23 make purpose of Support transmitter moulds ( SVMs ) . They focus on cognitive ( mental ) , instead than ocular driver distractions. For fast face and facial characteristic sensing, the method proposed by Viola and Jones affecting a boosted cascade of characteristics based on Haar ripples is adopted in a consider of documents, including 24 and 25 . Often, a loanblend of techniques are used to concur better consequences for driver we ariness sensing. Saradadevi and Bajaj 26 usage Viola-Jones method for sing sensing and SVMs to right sort normal and yawn oral cavity cases. On the contrary, the one presented by Narole and Bajaj 27 combines pixel-based skin coloring material cleavage for face sensing and a mixture of nervous webs and familial algorithms to optimally find the weariness index, with the nervous web being given as initial foreplay values for oculus closing and oscitance rate.Other jade Monitoring SystemsAs with drivers in autos, pilots in aircrafts are manifestly capable to tire, chiefly due to the protracted flight continuances. NTI Inc. and wisdom drills external fellowship ( SAIC ) 28 designed the daunt avoidance Scheduling Tool ( FAST ) , a system intended to track and annunciate weariness degrees for U.S. Air Force pilots, based on the SAFTE ( tranquillity, Activity, Fatigue and Task authorisation ) theoretical account created by Dr. Steven Hursh. another(prenominal) applicatio n in which weariness monitoring is utile is in the bar of information processing system mass Syndrome 29 , a status caused by working for drawn-out hours in forepart of show devices, such as computing machine proctors. Matsushita et Al. 30 besides developed a wearable weariness monitoring system which detects marks of weariness based on caput motions.The full assortment of antithetical applications developed to supervise weariness is an grounds of the turning immensity of this field. The focal point in the pursual portion of the literature reappraisal depart switch to the weariness analysis attack taken in this thesis the sensing of faces and their characteristics in stunt womans. The implicit in methods and algorithms typically used in this procedure go away be discussed.Reappraisal on face up and facial Feature sensing TechniquesKnowledge-based methods spotting faces in knowledge-based techniques involves the encryption of a set of simple regulations specifying the features of the human face, including pixel strengths in the images and the places and correlativities between the antithetic characteristics, since these are common to all human existences.In a knowledge-based method presented by Yang and Huang 31 , a hierarchy of grayscale images of different declarations together with three different breaks of regulations are used. The images are analysed for possible face campaigners by using regulations that have to make with the mobile phone strength distribution of the human face. An progression to this multi-resolution method was proposed by Kotropoulos and Pitas 32 . or else of ciphering the mean pixel strength of each cell, merely those for each image form and column are computed, organizing perpendicular and level profiles severally.To vouch a high sensing rate, the regulations in knowledge-based methods must neither be excessively general nor excessively specific, and and so, the generation of regulations for the face must b e performed really carefully. Because of the complexness required in cryptanalysis all possible face constellations, rule-based techniques do non provide for different face airss 33 , insideng them decidedly inappropriate for weariness monitoring applications.Feature-based methodsFeature-based attacks to confront sensing differ in a important manner from rule-based techniques in that they fore near attempt to place a individual s facial properties and posterior find whether the latter are well-grounded plenty to represent a human face, ensuing in the sensing of that face.Facial FeaturesThe movement of faces in images is frequently determined by trying to observe facial characteristics such as the eyes, olfactory organ and mouth. In a method presented by Sirehoy 34 , the prolate nature of the human face is used as the groundwork for face sensing in grayscale images with littered backgrounds. Due to the different ocular aspects of facial characteristics in images, Leung e t Al. 35 usage a combination of several local characteristic sensors utilizing Gaussian derivative perks together with a statistical theoretical account of the geometrical distances between these characteristics to cover accurate face localisation. Han et Al. 36 , on the other manus, usage morphological trading operations that focus chiefly on the oculus part in their efforts to observe faces, based on the logical thinking that this is the most consistent facial part in different light conditions. A more robust and flexible feature-based system was presented by Yow and Cipolla 37 . The theoretical account scholarship of the face that is used screens a wider country, including the superciliums, eyes, nose and mouth. A figure of Partial causa Groups ( PFGs ) , tantamount to a subset of these characteristic points ( 4 ) , are used to provide for incomplete face occlusions. give Textureanother(prenominal) face cue that is used for sensing intents is its textural form, this being specific to worlds and hence easy discriminable from other forms. Manian and Ross 38 present an algorithm that uses the symmetricalness and symmetry of the facial form as the footing of sensing. Rikert et Al. 39 tackle texture-based sensing in a different manner, utilizing a statistical method that learns to correctly sort whether an image contains a face or non. clamber ColourMany plants related to human clamber coloring material as a face sensing cue have been presented in recent old ages. detective work can be either pixel-based or region-based. The former attack is normally taken, in which each pixel is analysed and classified as either tegument or non-skin. Two chief picks are made during this procedure the coloring material infinite and tegument modeling method. Harmonizing to 40 , the normalized RGB, HSV and YCrCb coloring material infinites are typically used to pattern skin coloring material. zero(prenominal)malized RGB 41 45 is reported to be consistent i n different light conditions and face orientations. On the other manus, YCrCb 46 48 and HSV 49 51 are normally chosen since they specifically separate the luminosity and chrominance constituents of the images. In 40 , several other tegument patterning techniques normally adopted are mentioned. pathfinder matching methodsAnother proposed method for face sensing involves the storage of forms of the face and its characteristics, which are so compared to existent face images and given a correlation value ( i.e. the degree of similarity between the existent image and the stored form ) . The higher this value, the greater is the chance that the image contains a face. Works on scout fiting techniques in recent old ages have focused both on fixed and variable-size ( deformable ) templets.Fixed-size TemplatesFengjun et Al. 52 and Ping et Al. 53 usage a combination of skin coloring material cleavage and templet matching for face sensing. Two grayscale templets with predefined s izes one covering the whole face and the other concentrating merely on the part incorporating the two eyes are utilised in both systems. Fixed-size templets, although straightforward to implement, miss adaptability to different caput places since sensing is greatly alter by the orientation defined in the templet.Deformable TemplatesAn improved templet matching method is one in which the templet can be altered to better beam the input images and therefore would be able to place a wider assortment of faces in different airss. Yuille et Al. 54 propose deformable oculus and mouth templet matching in their work. Initially, the templets are parameterized through pre-processing to bespeak the expect form of both characteristics. The work presented by Lanitis et Al. 55 besides parameterizes the templets, concentrating on the contemporaries of flexible molded human face theoretical accounts through the usage of a Point Distribution Model ( PDM ) 56 which is trained on a figure o f images per individual with characteristic fluctuations within and between faces. behavior-based methodsRather than being based on a set of preset templets, appearance-based face sensing relies on machine larning techniques that identify the figurehead of faces and their major features after a procedure of developing on existent instauration informations. One of the most widely adopted machine larning attacks for face sensing are nervous webs, chiefly because of the success they achieved in other applications affecting pattern acknowledgment. Rowley et Al. 57 propose a robust multi-layer multi-network nervous web that takes as input pre-processed 2020 grayscale pel images to which a filter is applied at each pel place, returning a face correlativity value from -1 to 1. The concealed beds of the nervous web are designed to supervise different shaped countries of the human face, such as both eyes utilizing a 205 pel window and iodin eyes and other characteristics with the 55 and 1010 Windowss. The web so outputs another mark finding the presence or otherwise of a face in a peculiar window.Yang et Al. 58 establish their system on a Sparse mesh of cull outs ( Sno(prenominal) ) 59 . Two mark nodes ( linear units ) patterning face and non-face form characteristics are used in this instance. The active characteristics ( with binary representation ) in an input illustration are first identified and given as input to the web. The mark nodes are coupled via laborious borders to a subset of the characteristics. To update the weights for farther training, the Winnow update regulation method developed by Littlestone 60 is adopted.A linear categorization technique in the signifier of Support Vector automobiles ( SVMs ) was used to observe faces in an application presented by Osuna et al 61 in 1997. While the bulk of machine acquisition attacks ( including nervous webs ) effort to take down the empirical make , i.e. the demerit value in the groom ing procedure, SVMs attempt to cut down the fastness edge of the expected generalisation mistake in a procedure called structural happen minimisation .Viola and Jones 62 present a rapid object sensing system holding face sensing as its motive. A important difference from other proposed systems is that rectangular characteristics, instead than pels, nowadays in the inputted grayscale images are used as the bases for categorization. This has the consequence of increasing the speed of the overall procedure. Viola and Jones method will be discussed in item in the following chapter of this thesis.Purposes and forcesFamiliarization with the OpenCV tool.Literature Review about bing systems and methods to be used in this Dissertation. firm face sensing utilizing Viola-Jones technique.Execution of multiple facial characteristics used to find the fatigue degree. practical application of Support Vector Machine classifier to observe unsafe state of affairss such as driver kiping etc.r eal time execution of the proposed methods within OpenCV.MethodsViola-Jones technique for face sensing.Support vector machines to sort facial visual aspect ( e.g. open/closed eye/mouth ) .Features to be taken into consideration caput motion, oculus closing and frequence of oral cavity bedcover ( bespeaking yawning ) . gist weariness steps include PERCLOS ( PERcentage Eye CLOSure over clip ) and AECS ( Average Eye Closure Speed ) .EvaluationComparing the developed system to other systems found in literature in footings of precision, callback and truth.Deducing some campaign informations on which the algorithms will be tested. sort topics seeking out the application.Showing the consequences obtained.DeliverablesProgress Report.Review Report.2 page abstract for ICT lowest YearA Student Projects Exhibition. intromission Slides and Poster.Spiral and trying edge transcripts of the Dissertation Report.C++ application, preparation and testing resources.Section 2 Work PlanWork done so fa rCollected and read several documents related to bing driver weariness systems and face sensing in general.Completed the first promissory note of exchange of the literature reappraisal.Familiarized myself with the OpenCV environment. employ a webcam to capture two short cartridge holders inside a auto, one in sunny and the other in cloud-covered conditions.Collected 2000 positive and 4000 negative images for face sensing.Positive images 1500 taken from FERET grayscale face database, the other 500 from the captured cartridge holders. detrimental images created a C++ application to at random choice non-relevant countries of the frames of the two captured cartridge holders.Created another C++ application to be able to harvest the positive images to bespeak merely the needed rectangular countries, bring forthing a text file to be used in the preparation procedure. delectationd this information to bring forth a classifier for faces in XML format with OpenCV s Haar preparation public-s ervice corporation.SubtasksCompute truth, preciseness and callback values for the face sensing preparation.Trial with new picture cartridge holders and observing the consequences obtained.Perform Cross Validation. contain the classifier for oral cavities, once more utilizing positive and negative images. For oculus sensing, an already generated classifier will be used.Extract characteristics from face, oculus and mouth sensing.Integrate and utilize a C++ library for support vector machines, such as libSVM, to sort facial visual aspect. bring out Abstract, Introduction, Methodology, Evaluation, Results, Future Work and goal of the Dissertation Report.Write Review Report.Write 2 page abstract for ICT concluding YearA Student Projects Exhibition.Work on Presentation Slides and Poster.Schedule ( Gantt Chart )Section 3 Mentions 1 D. Dinges, M. Mallis, G. Maislin and J. Powell ( 1998 ) . last-place study Evaluation of Techniques for Ocular bill as an Index of Fatigue and the land fo r Alertness Management , U.S. Dept. superman, National driveway merchandise Safety Administration, online , delay accessed on fourth October 2010, functional at hypertext manoeuvre communications communications protocol //ntl.bts.gov/lib/jpodocs/edlbrow/7d01 .pdf 2 National Highway Traffic Safety Administration ( 2005 ) . NHTSA vehicle Safety Rulemaking and Supporting Research Priorities schedule Old ages 2005-2009 , online , outlive accessed on 4th October 2010, gettable at hypertext ship protocol //www.nhtsa.gov/cars/rules/rulings/priorityplan-2005.html 3 National Highway Traffic Safety Administration ( 2005 ) . Traffic Safety Facts 2005 A Compilation of Motor vehicle Crash Data from the Fatality analytic thinking Reporting System and the General Estimates System , National center field for Statistics and compend, U.S. Dept. Transportation, online , lastly accessed on 4th October 2010, gettable at hypertext impart protocol //www-nrd.nhtsa.d ot.gov/pubs/tsf2005.pdf 4 Hall, Hammerschmidt and Francis ( 1995 ) . Safety pass , National Transportation Safety Board, online , eventually accessed on twenty-first declination 2010, forthcoming at hypertext slay protocol //www.ntsb.gov/recs/letter/1995/H95_5D.pdf 5 J. Cavuoto, Alertness Monitoring Devices bug out from San Diego , Neurotech Business Report, online , give-up the ghost accessed on twenty-first family line 2010, functional at hypertext shift protocol //www.neurotechreports.com/pages/alertness.html 6 J-S Co. Neurocom, Engine Driver Vigilance Telemetric Control System EDVTCS , online , put up accessed on 2 foremost kinsfolk 2010, in stock(predicate) at hypertext agitate protocol //www.neurocom.ru/en2/pdf/edvtcs_adv_eng.pdf 7 Fatigue Management worldwide, ASTiD Advisory System for Tired Drivers , online , ending accessed on twenty-second September 2010, on hand(predicate) at hypertext reposition protocol //www.fmig.org/ASTID % 20Info rmation % 20Document.pdf 8 AssistWare Technology, Tired of Confronting Another Night Entirely? SafeTRAC can avail , online , destination accessed on 22nd September 2010, gettable at hypertext graft protocol //www.assistware.com/Downloads/SafeTRAC-Fleet % 20Datasheet.pdf 9 European Commission, Information lodge Technologies ( 2002 ) . System for effectual Assessment of driver watchfulness and Warning Harmonizing to traffic hazard Estimation , online , move accessed on 21st September 2010, functional at hypertext imparting protocol //www.awake-eu.org/pdf/d1_1.pdf 10 D. F. Dinges and R. Grace ( 1998 ) . PERCLOS A Valid Psychophysiological Measure of Alertness As Assessed by Psychomotor Vigilance , US Department of Transportation, Federal Highway Administration, online , goal accessed on 21st December 2010, usable at hypertext convertee protocol //www.fmcsa.dot.gov/documents/tb98-006.pdf 11 W. W. Wierwille ( 1994 ) . Overview of Research on Driver drowsiness Definition and Driver Drowsiness spying , fourteenth Technical Int. Conf. on deepen Safety of Drivers ( ESV ) , Munich, Germany, pp.23-26. 12 Sing Machines, faceLAB 5 , online , Last accessed on 21st September 2010, usable at hypertext transpose protocol //www.seeingmachines.com/pdfs/brochures/faceLAB-5.pdf 13 E. Bekiaris ( 2004 ) . AWAKE Project Aim and Objectives , Road Safety Workshop, Balocco, Italy, online , Last accessed on 21st September 2010, visible(prenominal) at hypertext fare protocol //www.awake-eu.org/pdf/aim_achievements.pdf 14 P. Smith, M. Shah and N. D. V. Lobo ( 2003 ) . find Driver Visual Attention with One Camera , IEEE transactions on salubrious Transportation Systems, Vol. 4, No. 4, pp. 205 218, online , Last accessed on 16th August 2010, operational at hypertext manoeuvre protocol //citeseerx.ist.psu.edu/viewdoc/ steer? inside=10.1.1.4.842 & A rep=rep1 & A casing=pdf 15 E. Wahlstrom, O. Masoud and N. Papanikolopoulos ( 2003 ) . great deal ground Methods for Driver Monitoring , IEEE Intelligent Transportation Systems Conf, pp. 903 908, online , Last accessed on twenty-eighth July 2010, Available at hypertext graft protocol //citeseerx.ist.psu.edu/viewdoc/ pitch? inside=10.1.1.3.4434 & A rep=rep1 & A attribute=pdf 16 H. Veeraraghavan and N. Papanikolopoulos ( 2001 ) . Detecting Driver Fatigue by means of the Use of Advanced reckon Monitoring Techniques , ITS Institute, Center for Transportation Studies, University of Minnesota, online , Last accessed on 28th July 2010, Available at hypertext murder protocol //www.cts.umn.edu/pdf/CTS-01-05.pdf 17 Aryuanto and F. Y. Limpraptono ( 2009 ) . A raft found System for Monitoring Driver Fatigue , Department of electrical Engineering, Institut Teknologi Nasional ( ITN ) Malang, Yogyakarta, Indonesia, online , Last accessed on 17th June 2010, Available at hypertext channelize protocol //aryuanto.files.wordpress.com/2008/10/teknoin09-1.p df 18 W.-B. Horng and C.-Y. Chen ( 2009 ) . Improved Driver Fatigue catching System Based on Eye bring in and ever-changing Template Matching , Department of calculator Science and Information Engineering, Tamkang University, Taipei, Taiwan, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //dspace.lib.fcu.edu.tw/bitstream/2377/11188/1/ce07ics002008000132.pdf 19 J. H. Yang, Z.-H. Mao, L. Tijerina, T. Pilutti, J. F. Coughlin and E. Feron ( 2009 ) . detecting of Driver Fatigue Caused by Sleep Deprivation , IEEE Transactions on Systems, Man and Cybernetics, Part A Systems and humanss, Vol. 39, No. 4, pp. 694 705, online , Last accessed on 16th September 2010, Available at hypertext transfer protocol //www.engr.pitt.edu/electrical/faculty-staff/mao/home/Papers/YMT09_DriverFatigue.pdf 20 Q. Ji, Z. Zhu and P. Lan ( 2004 ) . Real-time Nonintrusive Monitoring and prevision of Driver Fatigue , IEEE Transactions on Vehicular Technology, V ol. 53, No. 4, pp. 1052 1068, online , Last accessed on 16th August 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? inside=10.1.1.2.4714 & A rep=rep1 & A figure=pdf 21 T. DOrazio, M. Leo, P. Spagnolo and C. Guaragnella ( 2004 ) . A anxious System for Eye detecting in a Driver Vigilance Application , proceeding of the 7th International IEEE conclave on Intelligent Transportation Systems, pp. 320 325, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //pr.radom.net/pgolabek/its/A nervous system for oculus sensing in a driver watchfulness application.pdf 22 S. RibariA , J. LovrencI?icI? and N. PavesI?icI? ( 2010 ) . A Neural-Network-Based System for Monitoring Driver Fatigue , 1fifth IEEE Mediterranean Electrotechnical league, pp. 1356 1361. 23 Y. Liang, M. L. Reyes and J. D. downwind ( 2007 ) . Real-time Detection of Driver cognitive Distraction Using Support Vector Machines , IEEE Transa ctions on Intelligent Transportation Systems, Vol. 8, No. 2, pp. 340 350. 24 H. Ma, Z. Yang, Y. Song and P. Jia ( 2008 ) . A Fast Method for Monitoring Driver Fatigue Using Monocular Camera , minutes of the 11th Joint league on Information Sciences, Atlantis Press, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //www.atlantis-press.com/php/download_paper.php? id=1717 25 T. Brandt, R. Stemmer, B. Mertsching and A. Rakotonirainy ( 2004 ) . Low-cost Ocular Driver Monitoring System for Fatigue and monotony , 2004 IEEE International Conference on Systems, Man and Cybernetics, Vol. 7, pp. 6451 6456, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? inside=10.1.1.93.1899 & A rep=rep1 & A fictitious character=pdf 26 M. Saradadevi and P. R. Bajaj ( 2008 ) . Driver Fatigue Detection utilizing Mouth and Yawning analysis , International Journal of ready reckoner Science and Network Security, Vol. 8, No. 6, pp. 183 188, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //paper.ijcsns.org/07_book/200806/20080624.pdf 27 N. G. Narole and P. R. Bajaj ( 2009 ) . A Neuro-Genetic System Design for Monitoring Driver s Fatigue , International Journal of information processing system Science and Network Security, Vol. 9, No. 3, pp. 87 91, online , Last accessed on 28th July 2010, Available at hypertext transfer protocol //paper.ijcsns.org/07_book/200903/20090311.pdf 28 C. Trautvetter ( 2005 ) . Software Scheduling Tool Fights Crewmember Fatigue , Aviation International News, online , Last accessed on twentieth September 2010, Available at www.novasci.com/AIN-JL05.pdf 29 M. Divjak and H. Bischof ( 2009 ) . Eye Blink Based Fatigue Detection for Prevention of calculating machine Vision Syndrome , IAPR Conference on Machine Vision Applications, Keio University, Hiyoshi, Japan, online , Last accessed on 20th September 2010, Available at hypertext transfer protocol //www.icg.tugraz.at/Members/divjak/prework/MVA_2009_presentation % 20- % 20Divjak.pdf 30 S. Matsushita, A. Shiba and K. Nagashima ( 2006 ) . A wearable Fatigue Monitoring System Application of Human- computing machine Interaction Evaluation , legal proceeding of the seventh Australasian User Interface Conference, Vol. 50, online , Last accessed on 17th September 2010, Available at hypertext transfer protocol //crpit.com/confwritten document/CRPITV50Matsushita.pdf 31 G. Yang and T. S. Huang ( 1994 ) . Human Face Detection in Complex Background , trope Recognition, Vol. 27, No. 1, pp. 53 63. 32 C. Kotropoulos and I. Pitas ( 1997 ) . Rule-Based Face Detection in Frontal Views , minutes of the International Conference on Acoustics, Speech and planetary house Processing, Vol. 4, pp. 2537 2540, online , Last accessed on 16th October 2010, Available at hypertext transfer protocol //poseidon.csd.auth.gr/ pap er/PUBLISHED/CONFERENCE/pdf/Kotropoulos_ICASSP97.pdf 33 M.-H. Yang, D. J. Kriegman and N. Ahuja ( 2002 ) . Detecting Faces in regards A Survey , IEEE Transactions on proto figure Analysis and Machine Intelligence, Vol. 24, No. 1, pp. 34 58, online , Last accessed on 16th August 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.63.7658 & A rep=rep1 & A type=pdf 34 S. A. Sirehoy ( 1993 ) . Human Face sectionalisation and acknowledgment , electronic computer Vision Laboratory, Center for Automation Research, University of Maryland, online , Last accessed on twenty-fifth October 2010, Available at hypertext transfer protocol //drum.lib.umd.edu/bitstream/1903/400/2/CS-TR-3176.pdf 35 T. K. Leung, M. C. burl and P. Perona ( 1995 ) . Finding Faces in Cluttered Scenes utilizing haphazard Labelled Graph Matching , transactions of the fifth International Conference on computer Vision, Cambridge, Massachusetts, U.S.A. , online , Last accessed on twenty-fifth October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.8710 & A rep=rep1 & A type=pdf 36 C.-C. Han, H.-Y. M. Liao, K.-C. Yu and L.-H. Chen ( 1996 ) . Fast Face Detection via Morphology-based Pre-processing , proceedings of the 9th International Conference on Image Analysis and Processing, Florence, Italy, online , Last accessed on twenty-fifth October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.29.4448 & A rep=rep1 & A type=pdf 37 K. C. Yow and R. Cipolla ( 1996 ) . Feature-Based Human Face Detection , Image and Vision Computing, Vol. 15, No. 9, pp. 713 735, online , Last accessed on twenty-fourth October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.28.5815 & A rep=rep1 & A type=pdf 38 V. Manian and A. Ross ( 2004 ) . A Texture-based set out to Face Detectio n , Biometric consortium Conference ( BCC ) , Crystal City, VA, online , Last accessed on 26th October 2010, Available at hypertext transfer protocol //www.csee.wvu.edu/ross/pubs/RossFaceTexture_BCC04.pdf 39 T. D. Rikert, M. J. Jones and P. Viola ( 1999 ) . A Texture-Based Statistical Model for Face Detection , minutes of the IEEE Conference on Computer Vision and chassis Recognition, online , Last accessed on 26th October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.32.8916 & A rep=rep1 & A type=pdf 40 V. Vezhnevets, V. Sazonov and A. Andreeva ( 2003 ) . A Survey on Pixel-Based peel off polish Detection Techniques , GRAPHICON-2003, pp. 85-92, online , Last accessed on 24th October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.5.521 & A rep=rep1 & A type=pdf 41 D. Brown, I. Craw and J. Lewthwaite ( 2001 ) . A SOM Based Approach to uncase Detection wit h Application in Real Time Systems , Proceedings of the British Machine Vision Conference, online , Last accessed on 27th October 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.16.2675 & A rep=rep1 & A type=pdf 42 M. Soriano, B. Martinkauppi, S. Huovinen and M. Laaksonen ( 2000 ) . scratch up Detection in scene Under Changing flicker Conditions , Proceedings of the fifteenth International Conference on Pattern Recognition, pp. 839 842, online , Last accessed on thirteenth November 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download jsessionid=751F3CF514D95B2D7C8C425A1753714B? doi=10.1.1.16.2582 & A rep=rep1 & A type=pdf 43 N. Oliver, A. P. Pentland and F. Berard ( 1997 ) . LAFTER Lips and Face Real Time Tracker , Proceedings of the 1997 Conference on Computer Vision and Pattern Recognition, pp. 123 129, online , Last accessed on thirteenth November 2010, Available at hyper text transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.50.9491 & A rep=rep1 & A type=pdf 44 J. Yang, W. Lu and A. Waibel ( 1998 ) . Skin vividness Modelling and Adaptation , Proceedings of the Asian Conference on Computer Vision, pp. 687 694, online , Last accessed on 13th November 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.44.8168 & A rep=rep1 & A type=pdf 45 L. Mostafa and S. Abdelazeem ( 2005 ) . Face Detection Based on Skin color Using Neural Networks , Proceedings of the 1st International Conference on Graphics, Vision and Image Processing, Cairo, Egypt, pp. 53 58, online , Last accessed on 24th October 2010, Available at hypertext transfer protocol //www.icgst.com/GVIP05/papers/P1150535113.pdf 46 R.-L. Hsu, M. Abdel-Mottaleb and A. K. Jainist ( 2002 ) . Face Detection in Color Images , IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 24, No. 5, pp. 696 706, online , Last accessed on 30th August 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.4990 & A rep=rep1 & A type=pdf 47 J. Ahlberg ( 1999 ) . A System for Face Localization and Facial Feature descent , Technical Report, no. LiTH-ISY-R-2172, Linkoping University, online , Last accessed on 13th November 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.43.7504 & A rep=rep1 & A type=pdf 48 D. Chai and A. Bouzerdoum ( 2000 ) . A Bayesian Approach to Skin Color Classification in YCbCr Color Space , IEEE TENCON 2000, Vol. 2, pp. 421 424, online , Last accessed on 13th November 2010, Available at www.se.ecu.edu.au/dchai/public/papers/tencon2000.pdf 49 S. J. McKenna, S. Gong and Y. Raja ( 1998 ) . fashion model Facial Colour and Identity with Gaussian Mixtures , Proceedings of Pattern Recognition, pp. 1883 1892, online , Last accessed on 13th November 2010, Avail able at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.34.902 & A rep=rep1 & A type=pdf 50 L. Sigal, S. Sclaroff and V. Athitsos ( 2000 ) . Estimation and Prediction of Evolving Color Distributions for Skin sectionalisation Under Changing Illumination , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 152 159, online , Last accessed on 13th November 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.1.9735 & A rep=rep1 & A type=pdf 51 L. Jordao, M. Perrone and J. P. Costeira ( 1999 ) . Active Face and Feature Tracking , Proceedings of the tenth International Conference on Image Analysis and Processing, pp. 572 576, online , Last accessed on 13th November 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.33.893 & A rep=rep1 & A type=pdf 52 L. Fengjun, A. Haizhou, L. Luhong and X. Guangyou ( 2000 ) . Face Detection Based on Skin Color and Template Matching , Proceedings of the 1st International Conference on Image and Graphics, online , Last accessed on 14th November 2010, Available at hypertext transfer protocol //202.197.191.2068080/44/ persist/chap03/sourse/colorfacedetect.pdf 53 S. T. Y. Ping, C. H. Weng and B. Lau, Face Detection Through Template Matching and Color Segmentation , Stanford University, online , Last accessed on 14th November 2010, Available at hypertext transfer protocol //www.stanford.edu/class/ee368/Project_03/Project/reports/ee368group04.pdf 54 A. L. Yuille, P. W. Hallinan and D. S. Cohen ( 1992 ) . Feature inception from Faces utilizing Deformable Templates , International Journal of Computer Vision, Vol. 8, No. 2, pp. 99 111, online , Last accessed on 14th November 2010, Available at hypertext transfer protocol //www.ittc.ku.edu/potetz/EECS_741/SuggestedReadings/Lecture_14_Yuille_DeformableTemplates_IJCV92.pdf 55 A. Lanitis, C. J. Taylor and T. F. Cootes ( 1995 ) . An Automatic Face Identification System Using Flexible Appearance Models , Image and Vision Computing, Vol. 13, No. 5, pp. 393 401, online , Last accessed on 14th November 2010, Available at hypertext transfer protocol //www.bmva.org/bmvc/1994/bmvc-94-006.pdf 56 T. F. Cootes, A. Hill, C. J. Taylor and J. Haslam ( 1994 ) . The Use of Active Shape Models For Locating Structures in Medical Images , Image and Vision Computing, Vol. 12, No. 6, pp. 355 366, online , Last accessed on 1fifth November 2010, Available at hypertext transfer protocol //www.sci.utah.edu/gerig/CS7960-S2010/handouts/ivc95.pdf 57 H. A. Rowley, S. Baluja and T. Kanade ( 1998 ) . Neural Network Based Face Detection , IEEE Transactions On Pattern Analysis and Machine intelligence, Vol. 20, No. 1, pp. 23 38, online , Last accessed on 4th December 2010, Available at hypertext transfer protocol //citeseer.ist.psu.edu/viewdoc/download? doi=10.1.1.110.5546 & A rep=rep1 & A ty pe=pdf 58 M.-H. Yang, D. Roth and N. Ahuja ( 2000 ) . A SNoW-Based Face Detector , Advances in Neural Information Processing Systems 12, MIT Press, pp. 855 861, online , Last accessed on 4th December 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.41.152 & A rep=rep1 & A type=pdf 59 N. Rizzolo ( 2005 ) . SNoW Sparse Network of Winnows , Cognitive Computation Group, Department of Computer Science, University of Illinois at Urbana-Champaign, 2005, online presentation , Last accessed on fifth December 2010, Available at hypertext transfer protocol //cogcomp.cs.illinois.edu/tutorial/SNoW.pdf 60 N. Littlestone ( 1988 ) . tuition Quickly when Irrelevant Attributes Abound. A New Linear-threshold Algorithm , Machine Learning 2, Kluwer Academic Publishers, pp. 285 318, online , Last accessed on 5th December 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.130.9013 & A rep=rep1 & A type=pdf 61 E. Osuna, R. Freund and F. Girosi ( 1997 ) . Training Support Vector Machines An Application to Face Detection , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 130 136, online , Last accessed on 5th December 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.9.6021 & A rep=rep1 & A type=pdf 62 P. Viola and M. Jones ( 2001 ) . Rapid Object Detection utilizing a Boosted Cascade of Simple Features , Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pp. 511 518, online , Last accessed on 5th December 2010, Available at hypertext transfer protocol //citeseerx.ist.psu.edu/viewdoc/download? doi=10.1.1.137.9386 & A rep=rep1 & A type=pdf