Wednesday, July 31, 2019

Ise Determination of Fluoride Content in Various Substances

ISE Determination of Fluoride Content in Various Substances CHM 222 – A 4 / 20 / 2007 Introduction:The ion selective electrode used was made up of a silver / silver chloride reference electrode and a glass electrode. The pH of the electrochemical cell is determined by monitoring the electrical potential difference between the half-cells. The glass electrode is an ion selective electrode (ISE), which only responds to the hydronium ion concentration / activity in a solution under a large range of conditions. In this experiment, we are measuring the fluoride ion concentration, which means our electrode responds to fluoride ion concentrations. Procedure And Data: |Standard Solutions | |Concentration (M) |Potential (mV) | |0. 9967 x 10-6 |15. 0 | |0. 9967 x 10-5 |1. 4 | |0. 9967 x 10-4 |-42. | |0. 9967 x 10-3 |-101. 1 | |0. 9967 x 10-2 |-160. 8 | |0. 9967 x 10-1 |-219. 0 | Unknown #6 was used for this lab group. It produced a potential difference of -196. 8 mV. This was then used in the equation derived from our standard solutions and found to have a [F-] = 0. 0618 M. Preparation of the toothpaste sample was done by a sonicator. Then, the electrical potential difference was measured again, just as in the standard solutions and unknowns. It was found to have a potential of -85. 6 mV. Inserted into the equation, [F-] = 3. 31 x 10-4 M. Calculations:See attached sheets. Results:Toothpaste [F-] = 3. 31 x 10-4 M Unknown #6 [F-] = 0. 0618 M Label Value in Toothpaste 0. 15% w/v Calculated Value in Toothpaste 0. 8 mg / g 0. 8 mg/g converted to w/v (g/100 mL) is approximately 0. 1144% w/v. In comparison with the label, the calculated error is found to be about -24%. A potential source of error could be found in the method of dissolving the toothpaste. There were a lot of bubbles formed, thus allowing for greater possibility of misreported volumes of solution. Also, the pH / V meter had difficulty settling on values during the standard measurements, which would alter the regression line. The ISAB seemed to work better with stronger concentrations of [F-], as the regression line fit better toward the latter part of the plot. However, the pH region seemed to be less important than the [F-] concentration.

Technology In Private Healthcare Sector Health And Social Care Essay

There has been increasing usage of Health Information Technology ( HIT ) into governmental and private wellness attention sector. The authorities has already spent plenty on federally regulated wellness industries for implementing HIT, and achieved favourable results. The private health care organisations like place health care, group place, grownup Foster attention, private patterns, and rehabilitation centres are the targeted centres for implementing HIT to better the quality of attention, lessening wellness costs and diminish medical mistakes. The execution of HIT has many possible positive effects, but it besides has few negative effects that have to be resolve in close hereafter. The demand of implementing HIT is increasing twenty-four hours by twenty-four hours because of deceitful activities may endanger state ‘s wellness. This research survey concludes that execution of HIT has possible to better state ‘s wellness attention services. Section I: Definition OF THE PROBLEMBackgroundThe wellness attention system of United States began as a chiefly voluntary or generous system where patients paid small to no money for wellness attention services. Since its initial phases, this system has undergone some major alterations ( Thomas-Brogan, 2009 ) . Health attention has now evolved into a concern organic structure that requires considered planning, fiscal direction, equipped controls, and efficient fortes to keep its feasibleness in both governmental and private wellness sectors. Harmonizing to Thomas-Brogan ( 2009 ) , â€Å" the wellness attention industry is one of the largest industries in United States, using over 13 million workers with the jutting addition of over 3 million new occupations by the twelvemonth 2014 † . The mean life expectancy for U.S. citizen is 77.9 old ages of age, harmonizing to the National Center for Health Statistics. As the mean life anticipation bound additions, the aged citizens, whic h is the largest group of wellness attention consumers, will besides turn wellness attention industries ( Thomas-Brogan, 2009 ) . Due to current progresss in engineering and emerging jobs associated with efficiency and quality of wellness attention services, there are some chances to better quality life for underserved United States citizens through execution of information engineerings ( Moiduddin & A ; Moore, 2008 ) . The attending is being targeted towards the potency of Health Information Technology ( HIT ) in private health care industries to diminish wellness attention costs and to better quality, safety and efficiency of wellness attention services in United States of America ( kaiserEDU, 2008 ) . Harmonizing to Miller ( 2005 ) , in 1999 the Institute of Medicine ( IOM ) surprised the American population with its estimation that between 40,000 to 90,000 lives were lost due to medical mistakes. While the IOM established a balanced facet of the root causes, many wellness attention organisations seized a solution to better quality attention of the patient: Computerized Supplier Order Entry ( CPOE ) . The effectual drivers of investing in HIT contain the promise of quality and efficiency additions. Key privateness moralss for screening personal information have been in continuance for old ages and supply a charity for privateness Torahs, patterns, and policies ( Koontz & A ; Powner, 2007 ) . In 1996, the execution and ordinance of the Health Insurance Portability and Accountability Act ( HIPAA ) define the conditions under which an person ‘s privy wellness information may be used or disclosed. In April 2004, under the supervising of President Bush an executive order has been issued for the development and execution of interoperable HIT in both the populace and private sectors to better the effectivity of wellness attention services in United States, and developing the office of the National Coordinator for HIT ( ONC ) ( Koontz & A ; Powner, 2007 ) . The barriers of execution of Information Technology ( IT ) include the beginning cost and complex construction of IT execution, which often requires important procedures and cultural alterations ( Medpac, 2004 ) . Certain features of wellness attention like payment policies and fragmented bringing system can besides present barrier for IT acceptance. Over cumbrous informations and deficiency of convenience of doctor besides considered as barriers for implementing IT system in wellness attention. Security and privateness issues for patient information besides can play function as barriers in wellness information engineering.Statement of the jobThere is grounds to propose that Health Information Technology has potential to better the quality of attention in state ‘s wellness attention services.Purpose of the surveyThe intent of this survey is to heighten readers ‘ consciousness about benefits available sing Health Information Technology in private wellness attention sector which could better state ‘s wellness and wealth.Research QuestionsThe undermentioned research inquiries created the solid foundation for this research. The inquiry stated will assist to place how to utilize the information engineering in wellness attention system, what are the chief concentrated countries for the execution of HIT, and the negative and positive effects of HIT. Does wellness information engineering have capableness to better the quality attention, cut down medical mistakes and wellness attention costs? What are the positive and negative effects of implementing wellness information engineering in private wellness attention sector?Definition of footingsElectronic Health Record ( EHR ) : â€Å" The Electronic Health record ( EHR ) is a longitudinal electronic record of patient wellness information generated by one or more brushs in any attention bringing scene † ( himms.org, 2010 ) . These electronic wellness records include patients ‘ demographics, advancement sheets, diagnosing and medicine lists, research lab consequences and radiology studies. These wellness records streamline the doctor ‘s work procedure. Underserved U.S. citizens: Underserved U.S. citizens mean those citizens populating in U.S. still non having proper wellness attention services. The major features of this type of population are hapless ; uninsured ; have limited English linguistic communication proficiency ; lack acquaintance or complexness with wellness attention system ; and those who live in rural countries ( Koontz & A ; Powner, 2007 ) . E-Prescription: E-Prescription is â€Å" a prescriber ‘s ability to electronically direct an accurate, error-free and apprehensible prescription straight to a pharmaceutics from the point-of-care † ( CMS, 2010 ) . In 2003, the constitution of electronic prescribing in the Medicare Modernization Act ( MMA ) was the first measure, and in July 2006 the Institute of Medicine developed the function of e-prescribing in diminishing medical mistakes, and helped to heighten the apprehension of e-prescribing in patient safety. Computerized Physician Order Entry ( CPOE ) : CPOE is defined as a computing machine system that permits direct credence of medical orders by the professional who has licence and civil autonomies to make so. The benefit of direct come ining orders in COPE system is reduced mistakes by disregarding the uncertainness of hand-written medical orders ( CPOE, 2009 ) . Clinical Decision Support ( CDS ) : Cadmium is a information system premeditated to better clinical determination doing sing patients ‘ diagnostic and curative advancement of attention ( Koontz & A ; Powner, 2007 ) . Centers for Medicare & A ; Medicaid ( CMS ) : CMS is a federal bureau of U.S. Department of Health and Human Services, antecedently known as Health Care Financing Administration ( HCFA ) which governs Medicare Programs, Medicaid Programs, State Children ‘s Programs ( SCHIP ) , and other wellness portability plans. The Medicare and Medicaid were established through Social Security Act on July 30, 1965 by President Lyndon B. Johnson ( CMS, 2010 ) .RestrictionsDue to the six hebdomads clip restraint, it would be deficient to carry on more primary and secondary research on current proviso of wellness information engineering in wellness attention installations. Therefore, the figure of research will be limited due to the short clip period. Section II: Reappraisal OF LITERATUREIntroductionInformation Technology includes informations direction, networking, technology computing machine hardware, package design, database design and direction and disposal of systems. Information Technology uses electronic computing machine package which allows converting, hive awaying, protecting, processing, conveying and recovering the information in a unafraid manner. Information Technology allows sharing calculating power and split work load between different systems ( Hill, 2010 ) . Health Information Technology ( HIT ) is the wide model to depict the comprehensive direction of wellness information with the secure transmittal between wellness information consumer and wellness attention supplier. The wellness information engineering can be identified as the most promising tool to better the overall quality, safety every bit good as efficiency of the wellness bringing and receiving system ( NACCHO, 2010 ) . The wellness attention system of United States of America consists of governmental wellness organisations and private wellness organisations. Implementation of Health Information Technology has been playing function since 1990s, but Congress could non accomplish success in implementing HIT in private sectors of wellness industries such as, place wellness attention, nursing places, grownup Foster attention, group places, place doctor services, pressing attention, rehabilitation plans, skilled nursing installations, etc. The wellness attention services in these countries count about 40 % of entire wellness attention outgo by wellness insurance companies. Even though available benefits by federal, many wellness organisations are non ready to utilize advanced wellness information engineering to better quality services. The health care section of United States of America is puting over $ 1.7 trillion yearly in wellness attention services ; still the citizens are inundated with pathetic quality and inefficient services ( RAND Health, 2005 ) . The Institute of Medicine ( IOM ) , the National Committee on Vital and Health Statistics ( NCVHS ) , and other proficient panels have recognized information engineering as one of the most dominating cogwheels for cut downing medical mistakes, diminishing wellness attention costs, and educating the quality of wellness attention services. The end for these systems is to work impeccably as an component of a National Health Information Infrastructure ( NHII ) , which could ease wellness attention suppliers anyplace in the state to entree patient information at the point of attention ( Redhead, 2005 ) . In early 1987, a particular study was published on infirmary information system at the Veterans Administration sing its efficiency. That early attempt was the gradual oncoming of wellness information sciences, but absence of advanced engineerings ceased down the early success. But strong attempts by the authoritiess and fiscal bond outs helped Health Information Technology to deep their roots into the land. The lone drawback of implementing wellness information engineering in little wellness industries and organisations is an expensive initial apparatus of engineering ( RAND Health, 2005 ) . Most of the wellness attention suppliers need advanced information technological system to organize a patient ‘s attention with other wellness attention suppliers. This system transfers required wellness records, size up conformity with bar and disease direction rules, and buttocks and percolate up public presentations ( RAND Health, 2005 ) . Each province in United States has its ain health care squad to implement Health Information Technology into their wellness attention system. Michigan is the great illustration which has good developed health care squad called the Michigan Health Information Network ( MiHIN ) ( MiHIN, 2010 ) . The MiHIN is initiated by State of Michigan to concentrate in betterment of quality wellness attention services, efficiency, and safety of the patients. The MiHIN is a joint venture by the Michigan Department of Community Health ( MDCH ) and the Michigan Department of Information Technology ( MDIT ) . The MiHIN is seting indispensable attempt in wellness attention suppliers to utilize electronic wellness records in a important manner that permits patient ‘s medical records to be available as it needed ( MiHIN, 2010 ) .Why Healthcare System of United States Needs HITThe wellness attention system of United States becomes more and more expensive, and the entire outgo by the wellness attentio n section is about $ 1.9 trillion or $ 6,500 per capita each twelvemonth. The relationship between the growing of wellness attention disbursement and current economic system is per se compound and multidimensional. The addition in wellness attention outgo can be considered as a weight on immense economic growing and as a driving force of local prosperity. At a local degree, the growing in wellness attention disbursement is viewed as good portion, because its creates more occupations in wellness attention sector, increases wage criterions, expands local grosss, and increases usage of wellness related goods and services ( U.S. Department of Health & A ; Human Services, 2004 ) . The tabular array 1 shows passing on wellness attention services in comparing with other disbursals such as energy, labour, pension, judicial proceeding and adoption in twelvemonth 2004. Table 1. Greatest Cost Pressure on U.S. Businesss Beginning: The U.S. Department of Health & A ; Human Services ( 2004 ) . The effects of Healthcare disbursement on U.S. economic system. Retrieved March 17, 2010, from hypertext transfer protocol: //aspe.hhs.gov/health/costgrowth/ The tabular array 1 sum-ups entire per centum cost of wellness attention services by authorities in comparing with other disbursals. In the twelvemonth 2004, the entire wellness attention outgo counted for 43 % from the whole governmental outgo. The sky-rocketing cost of wellness attention services and increased fraudulent activities by wellness attention suppliers played a large function in weaving off authorities histories. The chief ground in holding HIT effectual into the health care system is to diminish the fraud activities and therefore lessenings healthcare disbursals. In the current health care market many wellness attention frauds were caught by FBI and Centers for Medicare and Medicaid. The biggest medical fraud was settled in June, 2003 paying $ 1.7 billion by HCA Inc – the health care company in amendss originating false claims to Medicare and other wellness insurance plans by federal. The proprietor of the company Bill Frist was involved in civil liability for fraud claims due to assortment of illegal activities, fraud charge and payment to doctors by hard currency kickbacks ( Bozita, 2009 ) .Tools of HIT in Private Health Care SectorThere are different types of tools for implementing HIT into the wellness attention system for private patterns, such as Electronic Health Records, E-prescription, Computerized Decision Support ( CDS ) , and the Computerized Physician Order Entry ( CPOE ) . The usage of these HIT tools varies by their maps, and besides depends on the medical installation utilizing them consequently. The usage and benefits of these tools concrete in improved quality attention, diminish medical mistakes, and cut down wellness attention costs. And the description of part replies absolutely to oppugn one of the research. The description of the widely recognized tools is following: Electronic Health Records The Electronic Health Record ( EHR ) can be defined as the electronically available wellness records of a patient, created for speedy and easy entree for both, physicians and patient, at any clip with unafraid cyberspace sites, and created by one or more than one wellness attention suppliers. This record covers the patient history, get downing from present reference, immunization/vaccination, any wellness conditions, any medicines or prescription, advancement notes, medical trials conducted and its consequences ( HIMSS, 2010 ) . An first-class illustration for implementing EHR into the system is Palo Alto Medical Foundation ( PAMF ) which has all its patients ‘ information electronically saved into their database. The handiness of electronic wellness record at unafraid internet site of PAMF by their patients let them to see of import constituents of their medical records, reexamine the medical trial consequences and discourse it with doctors, petition electronic prescription an d renew or do assignments ( PAMF, 2010 ) . EHR besides allows doctor and office member of private patterns to remain off from documents and at finger tip they can hold the patient history in forepart of them as needed. Health attention suppliers are besides able to reexamine patient ‘s insurance information along with the charge information. Physicians are now able to mention the patient to specialist or surgeon if they want to supply expertness intervention. Before ordering any drugs, they can reexamine the patient history or information if any drug interactions are at that place ( PAMF, 2010 ) . The study conducted in November 2007 shows 63 % of 2153 U.S. grownups had agreed that the sharing of the electronic wellness record allow patients to have better wellness attention as a ground of now physicians and research workers are available to portion the information and same clip are able to extinguish the medical mistakes ( Bright, 2007 ) . E-Prescription E-prescription has been explained as the key to better patient safety and to cut down expensive medicine costs. E-prescription is an electronic way to compose prescription by come ining informations through e-prescription package and reassign informations to take parting pharmaceuticss. It is estimated that due to medical prescription mistakes around 7000 deceases occur every twelvemonth in United States of America. These mistakes are fundamentally due to hand-writing illegibility, false dose information, and missed medicine-medicine or medicine-allergy reactions. Around 3 billion paper based prescription written yearly, which counts the biggest paper-based concerns in United States of America ( Pennell, 2009 ) . The construction and map of the e-prescription package are setup with full of benefits and extraordinary characteristics. The warning and watchful system of the package provide guidelines on holding the incorrect information on the prescribed drugs. The package is equipped with medicine direction procedure with the aid of Drug Utilization Review ( DUR ) plans. The DUR plans check patient ‘s current medicine program for drug-drug interactions, drug-allergy interactions, multiple diagnosings, right dose of prescribed drugs, inauspicious effects, etc. Many of the new soft-wares can besides entree patients ‘ program of wellness with the diagnosings and intervention at a clip of ordering drugs as an qui vive if there is any drug wrongness ( Pennell, 2009 ) . The private patterns and place wellness bureaus receive 1000000s of phone calls from pharmaceuticss sing the prescribed medical specialties, doses, and refill petitions. An E-prescription helps to cut down the phone calls and call-backs for pharmaceuticss and physician ‘s offices. The study conducted in 2003 by Medco Health Solutions has ruled out that doctors and the staff of doctors ‘ offices in Boston spend one tierce of their office clip in replying pharmaceutics phone calls, facsimiling prescriptions, draw out charts, replenishing charts, call-backs which reduces office work flow and productiveness ( Pennell, 2009 ) . Harmonizing to Pennell ( 2009 ) , it is estimated that 20 % of the hand-written prescription orders go lost and ne'er filled by the patient at pharmaceuticss. But the e-prescription systems increase patient conformity by progressing the filling of prescription and provides drug literature printed to the patient. It besides helps patients to better formulary attachment by look intoing generic substances at point of attention. It increases patient convenience by cut downing their visits to pharmaceuticss and diminishing their waiting periods ( Pennell, 2009 ) . Recent study by Pamela Dolan ( 2010 ) describes a important rise in the figure of wellness attention suppliers who prescribe medicine electronically. In private wellness attention sector, there is merely one doctor out of four seeking to utilize e-prescription. The Surecripts, state ‘s largest e-prescribing web, released advancement study which shows important advancement in utilizing e-prescription. Table 2 shows the drastic rush of Numberss of wellness attention suppliers utilizing engineering from 2007 to 2009. Table 2: E-prescription Growth Industry Beginning: Dolan, P. L. ( 2010, March 15 ) . E-prescribing growth, but most patterns still do non usage it. Retrieved March 16, 2010, from hypertext transfer protocol: //www.amaassn.org/amednews/2010/03/15/bisb0315.htm In sum-up of Table 2, it is cleared that the consciousness of benefits by utilizing wellness information engineering is widely spread out amongst the doctors and the infirmaries. The addition in Numberss itself says that the demand for wellness information technological tools is increasing twenty-four hours by twenty-four hours. The estimated growing of utilizing HIT tools will be more than 200 % from 2009 to 2010 ( Dolan, 2010 ) .Professionals of Implementing HIT in Private Healthcare SectorThe usage of computing machines and electronic devices enables doctors and other wellness attention suppliers to administer and entree medical records ( Bihari, 2010 ) . Health Information Technology helps to acquire the higher quality attention and is readily accessible by physicians at any location. As all the information is electronically available, physicians can rapidly entree to patient history any clip. This electronic information eliminate paperwork and the same clip cut down the storage infinite and cut down staff clip to keep medical records. As a consequence it helps wellness attention concerns to cut down costs and clip ( Wangia, 2009 ) . An electronic wellness record provides information about any immunization/vaccination that has been taken in past and any medical trials that have been conducted in past with its trial consequences. Therefore, it is easy for physicians to happen whether the immunization/vaccination or medical trial was already done or non and money salvaging for the patients, as they do n't necessitate to reiterate the immunization/vaccination or medical trial ( Bihari, 2010 ) . The Health Information Technology provides evidence-based reviews to the doctor about any type of radiological trial order to patients, and happening out whether the patient had that earlier or non with its consequences ( CBO, 2008 ) . This finally helps to command the costs. The electronic wellness records of infirmaries, which include the Clinical Decision System ( CDS ) every bit good as the Computerized Physician Order Entry ( CPOE ) to cut down the cost of prescription drugs. The electronic wellness records allow doctors to look into the list of medicines patient return, list of possible drug allergic reactions ( if any ) and any drug interactions or reaction of medicine. Therefore, physician before ordering any drug or medical specialty can travel through the electronic wellness record of patient to avoid or to minimise the hazard of any drug interactions or reactions ( CBO, 2008 ) . Besides these, the Health Information Technology ( HIT ) with the electronic wellness records allows patients to hold active entree of wellness attention records of medical history and intervention. This besides allows to see the refill a prescription and to reexamine any conducted medical trial consequences. Thus an electronic wellness record allows patients to discourse wellness job with the physician on phone without seeing really ( Bihari, 2010 ) . Harmonizing to 2005 drumhead study of infirmaries, because of wellness information engineering, the nurses have less paperwork and they use the saved clip productiveness work such as assisting patient to acquire appropriate preventative attention, supplying better instruction about their heath, etc ( CBO, 2008 ) . However the electronic wellness records of Health Information Technology are available on a really unafraid web that means it has strong privateness available. This allows a patient to inquire concerns to the physician by electronic mails without any vacillation. The electronic mails are merely accessible by physicians, which reduces the transmittal mistake of accurate information electronically every bit good as cut downing the opportunities of error that may happen while one misread physician ‘s script. The electronic wellness records of Health Information Technology cut down the duplicate hazard of any wellness attention supplier ‘s diagnostic process ( Wangi a, 2009 ) .Improvements in Governmental HIT SectorThe President Clinton and President Bush had besides applied compulsory usage of HIT in 1999, 2003, 2008 and now President Obama made it confirmed that by 2012 each and every medical installation must utilize wellness information engineering into their system. The Congress had declared bundles many times to deep the root of HIT into the system to do it truly effectual in bettering quality attention throughout the state, but merely the half success is achieved. An electronic wellness record is a systematic record of electronic wellness information of a patient and allows an person to hold large scope of informations in comprehensive or drumhead signifier such as medical history, medical conditions, allergic reactions or reactions of any medical specialties, immunization/vaccination taken, medical trial consequences every bit good as charge information. Therefore, late the quality of wellness record in the Veterans Hospital has improved a batch. Millions of pending or inactive documents are now active and are resolved. These were possible merely because of the electronic wellness record of wellness information engineering ( Goldstein, 2009 ) . An employee of Cedars-Sinai Medical Center in Los Angeles, was working in the charge section and was involved in the offense of stealing of patients ‘ record and earned tonss of money by victimizing the insurance companies or by bear downing patients for the intervention that they ne'er received it. But due to the handiness of electronics records both by patient and the physicians, this type of offense or fraud are now evitable easy and rapidly ( Goldstein, 2009 ) .Cons of Implementing HIT in Private Healthcare SectorEven though the wellness information engineering have rationalized the concern procedure, it has besides decreases occupation, downsizing every bit good as outsourcing of employees, these all leads to unemployment overall. For illustration, due to the wellness information engineering, there is less paper work for office employees which means with lesser figure of people the same sum of work can be done. And people start losing their occupations as there is no exces sively much paper work to make. Besides the quicker, easy and convenient communicating by the wellness information engineering, there are opportunities of interceptions to e-mail hacking. And besides people do non desire that their personal information is going public accessible. For illustration, to salvage their ain clip people send an electronic mail to their physician about their concern inquiry for their wellness and the electronic mail hacker can read their personal information in electronic mail and do it available for general populace. Therefore, sometimes people get more disquieted with electronically available information. However, as per the research survey conducted by Richard Hillestad and associate members at RAND, the Las Vegas Sun reports the execution of an Electronic Health Record ( EHR ) system would take about 15 old ages countrywide and initial puting cost of an Electronic Health Record ( EHR ) system in hospital apparatus is about $ 98 billion and in doctors is about $ 17 billion. This means that the mean annual cost in hospital apparatus is $ 6.5 billion whereas the mean annual cost in doctors ‘ apparatus is $ 1.1 billion ( MediLexicon, 2005 ) . It is in general being said by the industry experts that today ‘s biggest issue of occupation security is due to the cyberspace engineering. In the universe of invariably altering engineering, people have to do their egos cognizant and update about it, otherwise it would be hard to work for them and finally they lose their occupations. For illustration, the aged staff members at physicians ‘ office have to larn this electronic heath record maintaining system or they might lose their occupations because of non able to execute accurately. This besides relates to elder patients, who do non hold any thought about the computing machine systems and can non entree their personal information at a peculiar clip. As technological progresss take topographic point twenty-four hours by twenty-four hours, there is besides a menace of cyberspace viruses any minute on computing machine systems. Peoples learnt a lesson in earlier yearss, when Y2K virus infested many computing machine systems, and wipe out all informations from difficult thrust. If this could go on to damage patients ‘ informations in infirmaries, so there is no usage to hold wellness information engineering to continue medical records updated ( Koffey, 1999 ) . Some advocates sustain that put ining Health Information Technology ( HIT ) system in doctor ‘s office or private infirmary apparatus is harder and complex than put ining merely a Health Information Technology ( HIT ) system or package in a computing machine and connecting to the Internet Explorer ( NCPA, 2010 ) . The Health Information Technology ( HIT ) is fundamentally manus held device, intending the electronic wellness record is maintained and updated by worlds into the computing machine. Therefore, there might be possible opportunities of holding an mistake during the information direction. There might be possibility of an mistake during come ining the study or consequence of any medical trial consequence, which at later may do bigger or unsafe jobs. For illustration the medical trial consequence of X individual says the blood sugar degree is 120 and by misidentify the individual who come ining the information in the system typed 210, which means individual X is diagnosed with higher sugar degree and considered as diabetic patient.President Obama ‘s HIT Contribution in Healthcare Reform Plan of 2010The current economical drawback and increased fraud, maltreatment and waste in wellness attention disables consumers from acquiring economical medical benefits and leads to worsen in qua lity of wellness attention ( Hasan, 2010 ) . One of the biggest challenges for United States of America is to finalise scheme and thoughts which help consumers holding medical benefits with quality and economical coverage in private wellness attention sector. The recent scheme of President Obama is to welcome and appreciate any thought which can diminish the wellness attention outgo, bring quality attention, cut down fraud and maltreatment, and gives consumer pick of health care. The Major Constraints The major restraints in President Obama ‘s Health Care Reform Plan are ( Hasan, 2010 ) : Low-cost, Portable, and Quality Health Coverage for All Standardizing and Overhauling the U.S. Health Care System to Lower Costs & A ; Improve Quality Promoting Prevention and Strengthening Public wellness Description & A ; Coverage The President Obama ‘s vision to the health care system is so concrete that non even a individual U.S. citizen suffers from unequal health care. President Obama ‘s estimated cost for health care reform program is about $ 50 to $ 65 billion. The existent measure provides $ 5 million to Centers for Medicare & A ; Medicaid ( CMS ) in 2010 and $ 10 million every twelvemonth from 2011 to 2019 ( Brewin, 2010 ) . The health care reform program caters investing in HIT aimed at dropping extreme disbursals that occur from decreased medical mistakes and weave off uneffective paper-based charge system. The health care program ‘s chief docket is to give cosmopolitan wellness insurance which will decrease unsalaried health care services ( Hasan, 2010 ) . Benefits to HIT of Private Healthcare Sector The wellness reform measure calls to innovative centre construct up for inveterate sick patients. With the aid of wellness Information Technology, patients ‘ coordination of attention would be managed by a web of suppliers connected to a chronic disease register and tele-home wellness services. For an illustration, about 20 million U.S. citizens suffer from Diabetes, and for them tele-home wellness engineering provides patients to relay blood sugar degrees to their primary attention suppliers through remote glucose metres. The statute law provides $ 5 million every twelvemonth from 2011 to 2015 to develop the autonomy at Home Medical Practice Demonstration Program, which could incorporate homecare visits by doctors, distant patient monitoring and nomadic diagnostic machines. One of the centre parts of the program is that each household will salvage around $ 2,500 every twelvemonth ( Brewin, 2010 ) . Critics The chief critic is sing to make another plan for the citizens under age of 65 or merely like Medicare is itself an expensive thought, which would do cost switching instead than cost decrease. President Obama besides wants to give more power to governmental plans like Medicaid and State Children ‘s Health Insurance Program ( SCHIP ) . Another point of treatment is about doing an investing in HIT and sing HIT is an of import component of cost control scheme of the program. Obama finds the lone manner to decide these issues is important usage of wellness information engineering ( Hasan, 2010 ) .DrumheadThe private wellness attention sector of United States of America is at hazard due to increasing demand, intensifying costs, inconsistent wellness attention services, and inactive coordinated wellness attention systems. The groundss show that wellness information engineering can better the efficiency, cost effectivity, quality, and safety of wellness attention release by doing prop er rules available to doctors throughout the wellness attention web. The wellness information engineering consists of different types of tools such as Electronic Health Records ( HER ) or Electronic Medical Records ( EMR ) , E-prescription, Computerized Physician Order Entry ( CPOE ) , Clinical Decision Support ( CDS ) which have their ain functions to play consequently to better the wellness attention system in general. Though there are more positive effects of implementing HIT in private wellness attention sector, but some negative effects are besides present to blockade the complete success. Section III: MethodologyData Collection MethodThis research will use primary research methods to back up secondary research database with the aid of on-line databases. The secondary research methods include scholarly diaries, magazines, articles, intelligence paper, and texts will be used to back up the results of primary research database. The major portion of this research will be drawn from appropriate old surveies and well-performed researches that evaluated several facets of implementing wellness information engineering in governmental health care sector and private health care sector. The information aggregation method will be performed to find the possible success of implementing wellness information engineering in private health care sector. The on-line resources and studies conducted by different writers will be considered to measure the usage of wellness information engineering into their system. The demand of technological progresss into the wellness attention system of private patterns will be gathered on a proper manner to happen out the hereafter obstructions. Besides the informations aggregation method will assist to happen the grounds for hold in implementing HIT into their system. This research will besides assist to happen the ways to set e-prescription system effectual to work in private wellness attention sector to diminish hand-written prescription mistakes. The usage of electronic medical records besides can be evaluated easy in private wellness attention sector though research work. Section IV: Analysis OF DATA Evidence suggests the chances for implementing HIT is bit by bit lifting in United States health care system from governmental health care sector to private health care sector. The little private patterns and place health care bureaus have besides started seting more attempt in utilizing HIT tools to better the quality attention countrywide. The research inquiries have given solid foundation to this research undertaking and happening the nutshell was the nucleus intent of this research undertaking. These research inquiries were analyzed below: Table: 3 Does wellness information engineering have capableness to better the quality attention, cut down medical mistakes and wellness attention costs? Writers Statements Agree/Disagree Bihari, 2010. Computers and other electronic devices enable doctors to administer and entree the medical records at any clip. Agree Wangia, 2009 Due to wellness information engineering, doctors can cut down the clip in taking audiences which can salvage the clip and costs. Agree Bright, 2007 The sharing of the electronic wellness record allow patients to have better wellness attention as a ground of now physicians and research workers are available to portion the information and same clip are able to extinguish the medical mistakes. Agree Redhead, 2005 The commission on National Health Information Infrastructure facilitates easy exchange of wellness information amongst wellness attention suppliers. Agree RAND Health, 2005 Even though implementing HIT improves the quality of attention but initial set up is small expensive. Disagree KaiserEDU, 2008 The possible usage of Health Information Technology provides quality betterment, cost decrease and diminish medical mistakes into health care system Agree Moiduddin & A ; Moore, 2008 There are some chances to better quality life for underserved United States citizens through execution of information engineerings Agree This research survey has contained positive and negative effects of implementing Health Information Technology which answers inquiry two. Though private patterns are different from the big governmental health care sectors, but the positive and negative effects will be the same every bit far as they both related to quality attention and health care disbursals. The table 4 suggests analysis study for inquiry 2 of the survey: What are the positive and negative effects of implementing wellness information engineering in private wellness attention sector? Writers Statements Effectss ( Positive/Negative ) Bihari, 2010 Health Information Technology helps to acquire the higher quality attention and is readily accessible by physicians at any location. Positive Wangia, 2009 This electronic information eliminate paperwork and the same clip cut down the storage infinite and cut down staff clip to keep medical records Positive CBO, 2010 With the aid of HIT tools healthcare suppliers can entree any radiological trials any clip which provides evidence-based reviews Positive Dolan, 2010 The estimated growing of utilizing HIT tools will be more than 200 % from 2009 to 2010. Positive Koffey, 1999 Because of threatens from computing machine viruses, there is no usage to hold wellness information engineering to continue medical records updated. Negative MediLexicon, 2005 The execution of the EHR system would take about 15 old ages countrywide and initial puting cost of the EHR system in hospital apparatus is about $ 98 billion and in doctors is about $ 17 billion. Negative NCPA, 2010 Installing Health Information Technology ( HIT ) system in doctor ‘s office or private infirmary apparatus is harder and complex Negative The information analysis tabular array 4 summaries the positive and negative effects of implementing HIT into the private health care sector. The 80 per centum of the resources suggest implementing HIT into the little organisation besides has the positive effects, but 20 per centum of the resources suggest implementing HIT has negative effects in certain affairs. Section V: SUMMARY, CONCLUSION, AND RECOMMENDATIONSDrumheadThe wellness attention system of United States of America is confronting economic drawback in present clip, and truly needs reform in wellness attention engineering to better quality of attention and decreases cost and medical mistakes. The President Obama ‘s wellness reform measure boosted up the execution of wellness information engineering in both governmental and private wellness attention sector. The current governmental scheme seting more attempt in usage of advanced engineering into health care system to accomplish success by cut downing sky-rocketing wellness attention expenditures. The old bailout bundle counts around $ 19 billion helped a batch in implementing wellness information engineering in governmental entities. The different signifiers of HIT are Electronic Medical Records ( EMR ) , E-prescription, Computerized Physician Order Entry ( CPOE ) , Clinical Decision Support ( CDS ) , etc. are really utile tools and are really easy available to put up into the system these yearss. The initial set up is small expensive, but President Obama ‘s bundle offers fiscal aid for utilizing wellness information sciences. For an illustration, if any private physicians ‘ office wants to utilize EMR or E-prescription package, the package company will be paying to the company excess money at certain continuance on annual footing. Despite of first-class benefits such as capablenesss to cut down medical mistakes, utmost cost benefits, reduces paper-based system and thinks environmentally green, better quality of wellness attention services ; though execution of HIT has some negative effects and more researches are traveling on to diminish the cost for initial set up and do safer transit of computerized medical informations. With the aid of telephonic interviews and secondary resources, the research can do solid decision on possible benefits of implementing HIT in private wellness attention sector.DecisionIn decision, the execution of wellness information engineering has been turning from governmental wellness attention sector to private wellness attention sector. The potency of HIT has been achieved by implementing it into the wellness attention system with proper planning and proper vision. In governmental wellness attention sector, execution of HIT has reached to the success by diminishing medical mistakes, c ut downing costs, and bettering quality of attention. The execution of HIT in private wellness attention sector besides has the same capablenesss to accomplish the success in affair of quality services and diminishing medical frauds. However, there is no cogent evidence that all private patterns and place attention bureaus can take active portion in implementing wellness information engineering.RecommendationsBased on the findings of this research survey, there are some recommendations which should be implemented in private wellness attention sector for better result. In information analysis, most private patterns and place wellness attention bureaus agreed to utilize HIT tools to diminish the medical mistakes and better quality intervention. The President Obama ‘s program besides has possible to set adequate attempt, but there is no surety in following regulations and ordinances by private wellness organisations. The major recommendation is to set compulsory statute law for implementing wellness information engineering into their system to acquire choice consequences. There must be formation of a jurisprudence or the authorities has to go through a sentence for conformity to utilize HIT tools, and breaching of an Act cause important mulct or penalty. This will take definite consequences in bettering quality of attention by utilizing wellness engineering in proper manner. Other recommendations include mandatory application of wellness information engineering package for e-prescription. At least an applicable tool for e-prescription saves possible hand-written prescription mistakes and deceases occurred from these types of mistakes can be lower down finally. The same manner, EMR besides can be implemented for safety transportation and to keep the confidentiality of patients ‘ medical records. The authorities will besides do a database which can salvage all medical records of the patients countrywide. So, that manner if something happen to any private wellness organisation so at least authorities has entree to all informations and safety sedimentation of medical records can be achieved easy. The authorities besides has to do a HIT tool for electronic charge for private patterns, so they can diminish paper-based procedures and think green environmentally. This will besides take to diminish deceitful activities by the wellness attention suppliers at private patterns and place wellness bureaus.

Tuesday, July 30, 2019

Pornography Should Be Free from Government Control Essay

Whether one feels strongly about the viewing, making and distribution of pornography by consenting adults, one cannot argue that sex isn’t everywhere. Evident in videos, movies, pictures, and advertisements, it’s a fact that sex sells. Who is to say that because pornography can be viewed easily in many ways, that it’s not a bad thing? Yet in the discourse of pornography as a whole, where does morality and money come into play? To whatever extent pornography is considered immoral; everyone should be entitled their own intellectual freedom. The government has made some steps in order to limit the spread of pornography, yet it is apparent that little can be done to ultimately affect it. In 1968, the Supreme Court case of Ginsberg v. New York held that the government can legally prohibit children from accessing certain types of sexually explicit material, the same material that can’t be banned for adults. Even though the Supreme Court ruled that a minor does not have the constitutional right to the same content as an adult, the task of restricting content on the internet is shaky, due to the difficulty of distinguishing adults from children. In 1973, a following Supreme Court case, Miller v. California, established the phenomenon of â€Å"variable tolerance†. Leaving a variable tolerance existing for explicit material, the Supreme Court allowed communities to decide what was indecent or obscene. Different levels of tolerance of pornography from community to community could be a successful system if in fact, pornography distribution can be limited community by community. Because people are mobile and the internet is boundary-free, the government cannot effectively restrict its availability to everyone (and possibly to anyone). Another notable court case involved with pornography was the 1982 case, Ferber v. New York. This case basically addressed all material showing a ‘sexual performance’ by a child under the age of 16, as obscene. It defined a sexual performance as, â€Å"actual or simulated sexual intercourse, deviate sexual intercourse, sexual bestiality, masturbation, sado-masochistic abuse, or lewd exhibition of the genitals.† It’s a federal offense to knowingly receive child pornography. According to the International Federation of Library Associations and Institutions, â€Å"intellectual freedom is the right of every individual both to hold and express opinions and to seek and receive information.† The freedom of an adult to view pornography involving other adults is not really recognized as a recreational activity, mainly because it is scorned upon in many religions. Even the majority of parental figures in the world seem to demonize pornography when raising their youth. Yet no one really steps back and asks, why exactly is pornography immoral? One of the major arguments towards pornography being immoral is that in many pornographic depictions, people (usually women) seem to be victimized for a viewer’s pleasure. The only difference between an African American woman playing a role as a slave in the civil war era, an African American woman posing in shackle-like bracelets in a skinny jean advertisement, and an African American woman in a pornographic film, is that each different role requires certain talents and understandings that come together in order to entertain an audience. Immoral or not, pornographic material is nothing more than another way to make money. It’s seen or referenced to in many advertisements, and it’s difficult to find an â€Å"R† rated movie with out at least one nudity scene. Once again, sex sells. Wherever there is demand, there will be supply, and the statistics behind internet pornography are somewhat staggering. According to Information Science professor and researcher, Paul F Burton, â€Å"47% of the 11,000 most popular searches on the Internet are targeted towards pornography.† The money aspect of pornography is almost incomprehensible. There are over 1.5 million internet users viewing pornography every minute. From that audience, $3,075.64 is spent on pornography each second, and every 40 minutes, a new pornographic video is made in the United States alone. The market for pornography is huge.

Monday, July 29, 2019

Text in Context Essay Example | Topics and Well Written Essays - 1250 words

Text in Context - Essay Example This paper will seek to establish how this movie is fundamentally anti-romantic in its approach to love and life in general. Unlike other coming-of-age movies that offer up answers or possible ways out to this ‘quarter-life crisis’, Tiny Furniture merely brings out the humor in the situation; a situation that is necessarily devoid of meaning or significance and must, at best, be survived. The film opens with Aura (Lena Dunham) returning home from college. She enters her home with ‘Honey, I’m home!’ This going ignored, she calls out again ‘Family?’ This ironic opening sets the tone for the rest of the film which continuously makes fun of itself and its protagonists, most notably of Aura/Dunham herself. The hopelessness of Aura’s situation is ironically presented even in the film’s promotional poster which declares â€Å"Aura would like you to know that she’s having a very, very hard time.† Dunham, then, very consciously locates the film in the context of the comedic genre. The master of self-deprecatory ironic humor Woody Allen is also invoked in the film when Jed is seen, more than once, reading a copy of Without Feathers in bed. Although the movie is not replete with comic situations or dialogue, the ironic touch and the invocations of other comic legends places it quite firmly in the comic tradition. As far as generic contexts go, Tiny Furniture also belongs to that sub-genre of independent film called ‘mumblecore’ that has emerged recently. Characterized by its naturalist approach, often-improvised dialogue and low budget and production values, this new trend in independent films, has been grabbing critics’ attention over the last couple of years (‘Mumblecore’). Amy Taubin in her review of the genre declares that it is almost entirely homogenous: The directors are all male middle-class

Sunday, July 28, 2019

Mayos Theory of Management Coursework Example | Topics and Well Written Essays - 500 words - 1

Mayos Theory of Management - Coursework Example Mayo’s studies propose some specific views on employee-manager relations. He opined â€Å"a tension between workers’ ‘logic of sentiment’ and managers’ ‘logic of cost and efficiency’†, which have the potential to lead to organizational conflicts. Lussier argues that in an organizational setting, a manager is responsible for enlightening his workers about the planned organizational changes (41). Therefore, workers get a clear idea regarding their future assignments. When the managers do not pass relevant information to employees, they would be unaware of the implemented organizational changes. Under such situations, managers and other people at the helm of affairs may unethically manipulate the workers. In my opinion, a manager would be fully responsible for unethically manipulating the worker, if the worker is unaware of the change. According to Illouz, Mayo’s management theory reflects that the workers should be seen as me mbers of a group rather than isolated individuals (p.117). He continues that the demand to belong to a group is more important to an employee than acquiring monetary incentives or satisfactory working condition. These ‘social needs’ of the workers can be met only if the managers ensure that the workers are well informed of the changes. In total, in order to integrate the workforce with organizational interests, managers must consider the employee as an inevitable element of the organization.

Saturday, July 27, 2019

Select a topic you would like to write ( writing about drama) Essay

Select a topic you would like to write ( writing about drama) - Essay Example American women in the 19th century were deterred from lustrous careers and they were denied self independence by the men. Their main sphere of operation in the society was restricted to the kitchen and the bedroom. Women did not have the right to vote or sit as members of the jury. Their opinions were considered of less importance in making essential decisions in the American education system, politics, economy, legislation and many others. Men in the US, in the 19th century, dominated all aspects of life in the American society except the nurturing of children and families; an activity that was allocated to women. In the play â€Å"Trifles† by Susan Glaspell, women are considered less educated, less equipped, less qualified and inferior to compete in the male dominated society. The men claimed the society advanced due to their intellectual property, strength, skills and ability to develop emotional intelligence in solving societal problems. George Henderson is a young but professional county attorney (Glaspell 455). He is called upon by local residents to investigate a murder case of Mr. John Wright, who was strangled by a rope in the wee hours of the night in his sleep. The county attorney has great respect for the law although he is quick to dismiss the female characters’ vested interest in non-essential details concerning domestic work. He also disparages the suspect, Mrs. Wright, for what he observes as lack of proper and normal house cleaning abilities allocated to women. Henry Peters, a middle aged man, is the area sheriff and Mrs. Peter’s Husband (Glaspell 455). He is interested in the murder case because it is his duty as a law enforcer to protect and serve the locals. Like the county attorney, he teases the female characters on their topic of conversation, which is the suspect’s quilt. He uses laughs light-heartedly at the women’s less

Friday, July 26, 2019

Kinship Essay Example | Topics and Well Written Essays - 250 words

Kinship - Essay Example Though no material evidence suggests literacy with writing and reading, they can facilitate daily communication with composite form of language (Chagnon). Since the horticulture-inclined Yanomamo have become accustomed to waging village warfare, it is a normal tendency to form political allies and functions which, by the systematic principles of kinship, decide for the village people in the aspects of shelter, tribal relationships and other social issues, as well as the manner of adjusting with the environment. The Yanomamo, due to arranged violent encounters, have in a way manage to shape their culture by following certain behavior acquired in response to the sensitive call for survival (Chagnon). Through the system of kinships that constitute their living, social and familial ties are further enhanced as Yanomamo natives conduct frequent and periodic occasions of feasting and trading (Kittelson & Stafford). Arranged intermarriages via the kinship ruling are based upon the fighting skillfulness of a male relative after each combat with triumphant results.

Thursday, July 25, 2019

Advance project management Essay Example | Topics and Well Written Essays - 750 words

Advance project management - Essay Example There have been billion dollar resources, media infiltration in addition to celebrity supports, all in excess of what may possibly be illustrated as the effervescent water, by way of flavoring in addition to coloring. Nevertheless this list is not in excess of the product, however above the brand name. The reflection, the links, in addition to the standards that the brand corresponds to. As and when the customers tend to decide a well-known soft drink, they are not simply purchasing the element of refreshment, they are trading into the brand's individuality, in addition to what that brand signifies for. It was during the mid 0f 1990s that Diet Pepsi launched one of those refreshers within its artificial sweetener. In addition to that the market share set out up from an average 4.3 percent to an approximate 7 percent , towards the South of the boundary, Pepsi-Cola US was bundling up all their efforts , energy and creativeness up to inaugurate a new-fangled Diet Pepsi brand, Pepsi One. If Pepsi-Cola around the globe could not perk up the Diet Pepsi Cola business, they would have had to seize the costly stride of introducing Pepsi One. Coming face to face with this challenge, the Pepsi cola brand squad was stimulated to position a David in opposition to Goliath intention. This implied them to turn into the number one diet cola brand within the past few years. Not straightforward, at all. Pepsi Cola went ahead towards toiling to comprehend what may conceivably be giving life to the point of brand stagnation. While doing so, there had been more than a few viewpoints that were demystified. On the other hand, Pepsi-Cola around the globe has established a lot many times that they are capable of looking after their brands. Pepsi cola along with this had been assuming that Diet Pepsi, in addition to being a very well maintained as well as grown-up brand name, may perhaps position on its own grounds by way of its individual descriptions, looking all the more interesting to the more old-fashioned diet cola drinkers. Moreover, Pepsi cola had not been wrong in judging some major factions of the above expressions and statements. Whenever the consumers were requested to attribute brand distinctiveness to the Diet Pepsi, the customers resorted time and time again to expressions that explained Regular Pepsi. These similes had been weaseled to be able to be a focus for the youthful, open intellect Pepsi drinker moreover this was perceptibly quite attractive to the target market .at the same time as this was an acknowledgment to the efficiency of the customary Pepsi's advertising, it fashioned a genuine matter for Diet Pepsi (Vasconcellos, 2007, pg 218). There had been two foundations from which a relocated Diet Pepsi may perhaps resource the sales volume. The most significant was the Pepsi Transistioners, regular Pepsi drinkers on the verge of changing to a diet Pepsi cola. The additional was a subdivision of Diet Pepsi drinkers who felt less associated to the conventionality of the Diet carbonated drinks world. Pepsi put these objectives beneath the magnifying glass. Pepsi cola on the entirety of it had the demographic outline of consumers majorly in between the age of 20 to 40 year olds, although the consumers furthermore collectively were going through comparable modifications within their everyday lives. Despite the fact that Pepsi colas board acknowledged as well as established this growing, they in addition encompassed a common sense of failure. The

Legal issues Essay Example | Topics and Well Written Essays - 250 words

Legal issues - Essay Example Secondly, a punishment may be imposed to an employee in case they use abusive language at work sites. The person should be proved guilty to deserve the punishment before any punishment is imposed to the employee (Deipo & Guerin, 2011). There are different kinds of discipline imposed to the employee depending on the mistake done. Suspension is one of the kinds of discipline imposed to the employee. This is a temporary or an immediate removal of an employee from the work place with no pay as a consequence of the wrong done. The nature of misconduct should be included on the notice of suspension (Caisley, 2008). Secondly, a financial penalty may be used if gotten preferably. This type of penalty is appropriate in a situation involving isolated post where scheduling suspension and replacement of an employee may be difficult. The nature of misconduct should also be outlined in the notice without any correction (Davies, 2011). In conclusion, discipline is essential in any working environment. It shapes the working ethics of the organization leading to success. That is why various punishments are imposed to violators of the

Wednesday, July 24, 2019

The importance of initial (primary) education in the professional Thesis

The importance of initial (primary) education in the professional development of teachers - Thesis Example â€Å"Professional development is an essential way for teachers to refine their strategies, methods, and understanding of their work† (Myers, 2011). In this paper, we will discuss the role that training and college/university education can play in the professional development of teachers. Training is critical for every professional person. For teachers, it is even more critical because it helps them manage classrooms as well as students effectively and efficiently. Training helps teachers learn new teaching and management skills. Professional development means being able to succeed and flourish in the professional environment. â€Å"Ongoing professional development keeps teachers up-to-date on new research on how children learn, emerging technology tools for the classroom, new curriculum resources, and more† (Anonymous, 2008). In the present world, teachers need to understand the changes in the learning needs of children. Today, teachers need to use technology to make learning easy for children. Training provides the opportunity to teachers to learn ways to make proper use of new teaching technologies. Training programs help teachers learn ways to stimulate students’ learning desire. â€Å"Great induction programs create opportunities for novice teachers to learn from best practices and analyze and reflect on their teaching† (Anonymous, 2008). Education and training are two ends continuum of professional development of a teacher. Education gives knowledge, whereas training makes a teacher make the best use of the acquired knowledge. Training makes a teacher perform his/her job roles in an appropriate manner. Training brings perfection in professional practices of a teacher. For example, a teacher knows how to teach his/her students but does not know the best way to deal with a class of students having different backgrounds. It is training, which makes a teacher able to deal

Tuesday, July 23, 2019

The learning transfer practices at Camair-Co Dissertation

The learning transfer practices at Camair-Co - Dissertation Example However, the behavioural as well as cognitive traits perceived by the learners should also be considered as vital in this context as these factors also have a substantial impact on the overall efficiency of the learning transfer process. Acknowledgements Firstly, I would like to thank all the employees at Camair-Co who offered their cooperation, understanding and time when I was carrying out my research. I also extend my appreciation to my friends and family for being so supportive while I was completing this study. Finally, I offer my sincere thanks to God, for giving me the strength, perseverance and confidence to make all this possible. Table of Contents (INCLUDE WORD COUNT) Chapter 1 – Introduction 309 words (300) 1.1 Background Camair-Co is the national airline of the Republic of Cameroon that is based in Douala. The company offers passenger and cargo transportation to visiting friends and relatives, Government, NGOs and traders (History, 2011) Camair-Co employs 438 perso nnel comprising of both national and foreign expertise. Subedi (2004) suggests that a diverse workforce can raise significant challenges for the organisation in the execution of its learning or training transfer process (Subedi, 2004). Within today’s competitive business environment, strong talent is critical to the success of organisations. Consequently, management must ensure all employees are empowered through training to effectively transfer knowledge and skills back to the work place. 1.2 Statement of the problem Training activities at Camair-Co include on and off the job training. However, there is no evidence to suggest that the transfer of learning is... The paper tells that the notion behind the transfer of learning contributes significantly towards making the workforce effective. 10% of the overall staff salary at Camair-Co is spent on developing capabilities through training, learning and other development initiatives. In the writer’s experience, the most successful organisations have consistently invested a lot of money in training and developing their people however, evidence suggests the value derived from the training spend is not as encouraging. Only 10% and 34% of skills and knowledge gained from training is still applied by employees on-the-job a year later. Given the alarming statistics by researchers and the large amounts of money involved, monitoring and closing any gaps between what is invested and what is returned is critical. According to Cree & Macaulay, transfer of learning has been referred to the process of earlier learning which influences improved performance or learning. The transfer of learning is said to entail skills acquisition and knowledge gained in training that is transferred back to the job, as well as maintenance of the learned material over a period of time on-the-job. Broad & Newstrom describe it as ‘the effective and continuing application, by trainees to their jobs, of the knowledge and skills gained in training – both on and off the job’. This concept is of particular importance among organisations that seek to ensure peak performance amongst individuals and the organisation. Rothwell & Sredi assert that the transfer of learning also facilitates the organisations in the development of competitive advantage.

Monday, July 22, 2019

Breach of contract - contract law Essay Example for Free

Breach of contract contract law Essay Spanish Contract Law provides a broad notion of breach of contract for any behavior that departs from the specified behavior in the contract in any way (time, quality, substance, etc.) or is not specially justified on legal grounds (actions forbidden by the government are not breaches since they are justified on a legal ground). The general benchmark to determine breach is the contract agreed by the parties themselves, and not external notions. However, external notions are used in important situation such as the consumers market where the consumers expectations are the primary benchmarks to assess quality and performance since there is not an explicit contract. External notions are also important in other market, where a third party may have some duty or responsibility over the contract, and therefore, is responsible (at least in part) for any potential breach. The reason for breach does not exclude the breach. What matters is the breach. The analysis of breach takes place in objective terms. Subjective factors generally do not exclude breach, although they may affect remedies. In certain contractual areas, breach of duty and fault are generally required (professional contracts, management contracts: breach requires violation of a duty of care or a duty of loyalty). In professional contracts, the fault may be of a professional who was in contract with the firm, and in management contracts, it may be the fault of the manager. 2) Remedies: Spanish Contract Law provides a wide range of general remedies for breach of contract: †¢ Specific performance: the court forces the breacher to act as it was established in the contract. If for example, the contract stipulated that the promiser had to give the promisee a product of quality 2 and he delivers a good of quality 1, then as remedy the court force the promiser to deliver a good of quality 2. †¢ Damages: the court force the breacher to pay a certain amount of money  (damages) to the other party as compensation. It is a monetary remedy. The court calculate the amount to be paid. †¢ Liquidated damages: these are also monetary compensation, but with the difference that they are not calculated by the court, but they are instead specified in the contract itself. One example are the soccer players contracts, or sale contracts that specifies the amount to be paid for each day of delay. Other general remedies that we can find are: †¢ Termination: if a party suffers a breach, it can contract with another party and abandon its contractual obligation. If the breacher does not agree with this, court is necessary. †¢ Reduction of prices: in case of breach of a party, a general remedy is to reduce the price to equilibrate the contract. Generally, it is the aggrieved party who chooses the remedy to be imposed. 3) Specific performance: Specific performance is a remedy for breach characterized by the fact that a failed performance or departure from required action by the contract will be imposed upon breaching party. It is also characterized by several material variants of the remedy such as: forced delivery, forced action, injunction not to do, repair defective performance and replace non-conforming good. In the case of the injunction not to do, the court oblige the breacher not to do something, such as obliging a CEO to work for the competition if in the contract it was stipulated that he cannot. Specific performance conceptually includes repair and replacement of consumer goods. The main issue with specific performance, when it is feasible, is the issue of the balance of benefits and costs of the remedy. Specific performance implies that the breacher perform as the contract establishes. However, sometimes, the cost of this performance may be higher than the benefit in social welfare terms. Take the example of the mining firm, which has a contract with the owner of the land to mine for 10 years and then clean the land. When the 10 year pass, the firms breaches the contract and refuse to clean. The cost of cleaning the land is 20 millions, and the benefit for the  owner is 1 million. So if the court imposes a specific performance to firm, society will loose 19 millions. A good alternative would be to impose damages to the firm, which would be preferred by the owner, since an agreement between the firm and the owner will be reached that maximize the social welfare. In these cases, performance may be more costly than its value for promisee: performance may be ex post inefficient. There are both positive and negative features of specific performance as a remedy. As positive features, we can distinguish low informational requirements to apply remedy (avoids cost of error linked to estimating damages) and the party aggrieved by breach appears to be satisfied in its promissory expectation. As negative features, we find performance may be more costly than its value for promisee (performance may be ex post inefficient), requires a court order and takes time, for complex performances requires costly and difficult supervision by court and performance by a party forced to comply with contract may be perfunctory (lowest effort) at best. 4) Damages: Damages are understood as general remedies that can be applied to all types of contracts and breaches of contracts. It is a remedy defined in very broad terms: amount of money to compensate any harm suffered by the injured party as a consequence of any breach of contract. We can differentiate between two kinds of damages: expectation and reliance damages. This is why it is a remedy with a variable extension. Expectation damages: Expectation damages is the sum of money that will give the party damaged the same amount of welfare and utility than if the contract would not have been breached and the final result would have been attained. Therefore, the breach party would have to pay the aggrieved party an amount of money that would compensate for the harm caused and in addition an amount of money equal to the value of the performance for this party. There are however some problems with expectation damages since they are difficult to compute and some instances of moral hazard may appear. Those who seek for damages have to provide evidence of both the existence and amount of damages. This requirement has some exceptions in case of harm in re ipsa: illegitimate use of a productive good, deprivation of a productive good, and few other examples. Expectation damages is the general rule in Spanish Law for breach of contract. It is the damage measure that accompanies termination for breach and the replacement measure of specific performance. It is awarded when there is a breach of representations and warranties, advertising and promotional communications and in cases of pre-contractual fraud that are equivalent to breach of contracts. How can we compute expectation damages? When goods or services admit substitutes or cover transactions to avoid the negative consequences of the other party’s breach of contract, the price of these transactions is relevant. If the seller breaches the contract and the buyer has bought a good, generally fungible, then the expectation damages will be equal to the difference between the price of the substitute and the price established in the contract: Psub-Pc. If the buyer breaches the contract and the seller celebrates a cover sale the expectation damages would be equal to the difference between the price established in the contract and the price of the new sale: Pc-Psub. Other ways of computing expectation damages are the following: Market damages: (for fungible good with market price) buyer will receive expectation damages consisting of the difference between the market price when the breach of contract took place (Pm) and the contract price (Pc). Seller will receive the opposite difference. Expectation damages present some limitations that reduce it scope and amount. One of this limitations is the foreseeability rule. This rule state that the breacher should only be liable for the things that are foreseen or could have foreseen at the time of contracting and that are necessary  consequence of his failure to perform. For instance, if the foreseeable harm of a breach is 100 and the aggrieved party end up suffering a loss of 1000, the foreseeability rule states that damages will amount only to 100. The foreseeability rule gives incentives to give information in the time of contracting. Those who suffer from harm must declare the value of the performance. In tort law, there is no foreseeability rule, you pay the actual damage. Another limitation is the duty to mitigate damages: the aggrieved party is under the duty to mitigate damages that the other contracting party has caused with her / his breach of contract. Reliance damages: Reliance damages: sum of money that will give the party damaged the same amount of welfare and utility than if the contract would not have taken place (the initial situation). This is why reliance damages are generally lower than expectation damages. Reliance damages cover expenses for the injured party derived from concluding the contract, specific investments that the injured party has made in reliance of performance of the contract by the other party and opportunity costs. Limited assets: Damages do not always work well. Sometimes, individuals can bear the payment of these damages, and therefore, they will have incentives to reduce them. However, this is not always the case. When the breacher has not enough assets to pay damages up to the point of optimal care, damages do not work well, because people will not pay for the consequences of their acts, and therefore, their level of care will be the optimal according to what they can pay, and not what they should pay. This is known as judgement proof problem. Damages for pain and suffering: The traditional position of the Spanish Supreme Court and Spanish Courts is: †¢ To accept damages for pain and suffering for breach of contract †¢ To award damages for pain and suffering with a relative amplitude and generosity. †¢ To award damages for pain and suffering with several functions: †¢ To avoid the problems of calculating and justifying the amount of the damage award †¢ To compensate harm in personality rights (right to life, liberty, honor, etc.). †¢ To compensate non-patrimonial values joined to economic goods and rights (discomfort, inconvenience, disappointment, frustration) †¢ To punish intolerable or egregious behaviors of breach of contract. When an individual suffer harm, her utility decreases (she goes form point A to point B, but her utility function for money will not change). If this harm is economic, we can compensate this harm with money, which will leave her at point A again. However, the harm that an individual can suffer may be non-economic, and for the same amount of money her utility decreases (her utility function changes). Money cannot restore the initial utility (a huge amount would be needed). This is the case of pain and suffering (accident and death of a relative, discomfort, etc). This is why it is useless to take insurance for death, since it would not compensate the harm. The hairy hand example: What is the difference between expectation and reliance damage? Lets look at an example. An individual was injured in his hand and lost 50% of his use. He entered in a contract with a doctor who promised to reestablish the hand to a 100% of use in exchange for quantity of money. Before the contract was made, the individual was situated in an indifference curve that related all the   combination of hand use and money that let the individual indifferent. We assume that the individual is willing to give up hand use for money. After the contract and operation, the individual was worse off, with 25% of use. What should the doctor pay as damage? If expectation damages are used, the doctor should pay the individual a quantity of money that together with the 25% of hand use leave him with the same utiity as if the contract had succeded and he had 100% of use (situate him in a higher indifference curve). If reliance damages are imposed, the doctor should pay the individual a quantity of mon ey that, together with the 25% of hand use, leave him with the same utility as if the contract did not take place, with 50% of hand use (situate him in the initial indifference curve). 5) Liquidated damages: Liquidated damages are damages for breach that are not determined ex post breach by a Court or arbitration panel, but ex ante by the contract parties themselves into the contract. Such possibility of â€Å"privately stipulated† remedies for breach is acknowledged by most legal systems, typically in the form of payment of money, although other possibilities may exist. They typically replace Court damages and they can be agreed as added penalty for breach. The most important issue is whether Courts are forced to enforce liquidated damages, or they may disregard, or reduce, the amount of the liquidated damages award. The reasons why Courts allow liquidated damages are: †¢ Freedom of contract †¢ A large liquidated damages clause may be necessary to induce promisee to find promise credible and the contract sustainable. †¢ Parties are in a better position than Courts to assess benefits and costs of determining a given amount. †¢ Liquidated damages compensate systematic underestimation of damages by Courts. If liquidated damages are higher than the expectation damages, then the court will apply the second ones. There are however some economic arguments that may lead to reduce or at least control the level of liquidated damages clauses: †¢ â€Å"Excessive† damages clauses resulting from incorrect predictions or forecasts about future outcomes. †¢ External shocks unforeseen by parties that produce an unexpected increase in the damages payment. †¢ True â€Å"uncertainty† about future costs for one party. †¢ Behavioral biases that lead party to underestimate the true adverse impact of a damages clause (the â€Å"deferred cost problem†): †¢ Over-optimism concerning future performance and costs (the example of the gym) †¢ Hyperbolic discounting of future outcomes We can see the liquidated damages as barriers to entry. An excessive amount of LD is beneficial for the parties to the detriment of a third party who  may bid for the services of breaching party. Promisor agrees to pay an amount larger than ED, in exchange of higher price. Promisee uses high liquidated damages to extract larger payment from a third party interested in performance by promisor: larger payment from third party increases the surplus to the contract parties, that is shared between them. Also, excessive payment of third party are made possible by excessive damages clauses, which reduce efficient entry by third parties, and prevents them from successfully bidding for promisor’s performance. That is why the goal of reducing â€Å"excessive† liquidated damages is not to protect the breaching party, but third-parties. Sometimes, excessive LD for signaling are unwanted, since an unforeseeable contingency may appear that will cause a breach in the contract. A pooling equilibrium may be more desirable than a separating one when the distortion caused by the penalty on the â€Å"good type† is large enough. 6) Termination: Among the general remedies for breach, the last one is termination (or rescission, or cancellation, as it may also be called in Common Law jurisdictions). This remedy entitles the aggrieved party to cancel the contractual relationship with the breaching party, eliminating the obligations arising from the terminated contract. Once the contract is terminated the parties should give back what was received under the contract, unless the goods are now in lawful possession of a third party. In this case, the value of the goods would replace the goods themselves. The elimination of the effects of the contract is retroactive: it is considered that the contract did not exist. Spanish courts have established that termination does not require a lawsuit. However, if the other party disputes the termination or its conditions, restitution would require a lawsuit. Courts do not determine termination, but declare whether termination was or not properly effected by the party. The most contested issue about termination is when is termination available as a remedy. It is clear that not every breach or non-performance allows the  aggrieved party to terminate, but a qualified breach (material or fundamental breach) is required. We can define it as follow: †¢ Relevance: the breach must affect the central obligations or duties under the contract and not merely ancillary or incidental duties. †¢ Duration: the breach should not be merely sporadic or transitory, but likely to be repeated or continuing. †¢ Importance: the breach must substantially affect the interests of the non-defaulting party. Termination does not go alone, it does not exclude damages, and in fact it is naturally accompanied by damages payment.

Sunday, July 21, 2019

Content-based Image Retrieval (CBIR) System

Content-based Image Retrieval (CBIR) System Chapter 1. Introduction Nowadays, in the most of areas it is necessary to work with large amounts of growing visual and multimedia data, at the same time, the number of image and video files on the web is quite big and is still rising very rapidly. Searching through this data is absolutely vital. So, there is a high demand on the tools for image retrieving, which are based on visual information, rather than simple text-based queries. Content-based Image Retrieval (CBIR) consists of retrieving the most visually similar images to a given query image from a database or group of image files. It is a quite useful thing in a lot of areas such as Photography which may involve image search from the large digital photo galleries; Medicine it is used to assist in diagnosis. In most of diseases, their visual characteristics carry diagnostic information and visually similar images correspond to the same disease category. The output of a CBIR system can help to make a decision (Tahmoush, 2007); Military detection of e nemy soldiers or vehicles from screen photographs; Crime prevention it helps police in suspicious peoples identification from large image databases and in image retrieval of crime scene photos (Wen, 2005); Geography frequently used in Geographical information systems (GIS) (Hafiane, 2006) and many others. CBIR has been a subject of intense research over the last 15 years. It is one of the most difficult research areas in multimedia computing and information retrieval. During the research history many different image matching, indexing and retrieval algorithms have been tried. Practice shows that user queries described by visual information are more effective and more precisely meet user needs, than standard text search queries. It is because visual information is closer to the humans perception of the world. 1.1 CBIR Systems Many CBIR systems and tools have been developed to make queries based on visual content. During the 90-ies several notable commercial systems were introduced. IBM developed Query By Image Content (QBIC) system, which lets user to make queries of large image databases based on visual image content properties such as Example images; User-constructed sketches and drawings; Selected color and texture patterns. (Flickner, 1995) Soon after that â€Å"Virage Image Search Engine† of Virage Inc. was developed, which provides an open framework for building systems that explicitly manages image assets by directly representing their visual attributes. (Bach, 1996) Several online content-based web search engines can also be mentioned. â€Å"WebSEEk† developed by Image and Advanced Television Lab, Columbia University. It allows making queries by example and by desired color composition. â€Å"Chabot†, Developed by Department of Computer Science, University of California, which allows to search by colors, but offers limited options such as choosing one dominant color. (Veltkamp, 2002) Global Memory Net (GMNet) was launched for public access in late June 2006. It is a digital library of cultural, historical, and heritage image collections. Among other text-based searching types this web library has a possibility to search by image content. It has two basic options for content based searching. Search by example image, based on its color and shape and by user drawing. For CBIR, GMNet uses SIMPLIcity developed by Prof. James Z. Wang of Penn State University. (Chen 2006) Different CBIR systems use different types of user queries. Typically tools for the content-based image retrieval consist of query statement and a result presentation; this query can be done by providing an example image a sketch, or by choosing desired colors for the image. Results are presented by the top several similar images based on the similarity measure. 1.2 Research Questions Despite the large number of CBIR systems developed, there are still a lot of challenging problems in this area. The important sides that still need to be improved are speed of retrieving, when working with the large databases, accuracy and effectiveness of the retrieved results. So the researchers from multiple disciplines are deeply concerned with these aspects. Comparisons by image content are much more complicated task than by textual data. Generally, content-based image retrievals are based on comparison of image content descriptors that represent visual features of the image. Different features can be used to obtain the image descriptor. To meet specific user needs and in various cases some of them are more effective than others. Sometimes the implementation simplicity is as important as retrieval accuracy and effectiveness. Based on the previous discussion, research questions are the following: What are the basic retrieval techniques? What kind of features are usually used? How the features are obtained from the image? How these features are matched? How the retrieval results are presented to the user? How accurate can be the algorithms, which are relatively easy to implement? 1.3 Objectives The CBIR research often involves two areas computer vision and database systems. The database systems part studies database indexing, searching and retrieval techniques and computer vision part is about image processing, obtaining the image descriptors and image matching. In order to answer the research questions this dissertation focuses on a computer vision part. Image processing and image transformations are used by CBIR systems in order to extract image descriptors. CBIR systems are based on different image features descriptors matching. Some of these systems perform image comparison by multiple features at the same time and some of them use only one feature. In this dissertation we are going to investigate what are the basic techniques used in CBIR systems, which are based on different feature descriptors. We will make a detailed overview of these basic methods. We are also going to implement one of the most effective algorithms in the CBIR field. This is Scale Invariant Feature Transform (SIFT) algorithm (Lowe, 2004) and see how effective and accurate it can be. Chapter 2. Literature Survey 2.1 CBIR systems typical architecture Typical CBIR system has two main functionalities. This is Data insertion and query processing. Data insertion procedures are performed independent of user interaction.   They are applied to all the data. The purpose of this process is to extract visual features from the images in the database. These features are obviously smaller than the actual image and they are then stored for easy comparison reasons, as a characterizers of each image. Query processing starts with user specific request. Request can be done in several ways: By an example image, by giving desired pattern or object, color distribution and etc. Query processing module obtains the visual features from the given request, metric is defined. Then similarity is measured based on the chosen metric and some set of the most similar images are . Features extraction itself involves, selecting the features that have to be extracted, it depends on the type of user query. The feature extracting algorithm is chosen to create the feature vector from the selected features. Eventually, image descriptor is formed which are then used to compare the images. (Torres, 2006) 2.2 Semantic Gap Basically, similarity searching between the images is based on low-level and higher-levels of queries. (Eakins, 1996) Low-Level Similarity in this case visual features to describe the image are primitives such as color, texture and shape. Higher-Levels, Semantic Similarity at higher levels, similarity searching is not based on a simple features. In this case images are described by higher level of semantic attributes. This involves identification of the object types depicted in the image. These two levels of queries form the problem called semantic gap. Semantic gap can be defined in the following way: â€Å"The semantic gap is the lack of coincidence between the information that one can extract from the visual data and the interpretation that the same data has for a user in a given situation.† (Datta, 2008) In another words, images with high low-level feature similarities may still be different in terms of user perception. So similarity by low-level features, not always mean semantic similarity of these images. 2.3 Content Comparison Techniques This dissertation is concerned with low-level similarity features extraction .CBIR for low-level similarity queries needs techniques which can be used to obtain the image content descriptors to compare images based on their color, texture and shape. Color Image content comparison by color is based on matching images by their color distribution. In this case image feature identifies the proportion of pixels of specific color or colors within an image. So one can make color searches by indicating desired concentration of colors or by an example image with desired color distribution and get similar images. Color histograms are widely used to extract the color distribution descriptors from the image. It is a statistic of the color of pixels in the image. First color distribution is represented by appropriate color histogram, and then color vector is formed from that histogram. Lets discuss several color feature extraction histograms. Conventional Color Histogram (CCH) This histogram consists of occurrences of each color in the image. Each pixel is associated to only one its own histogram bin only on the basis of its own color. This color histogram uses the probability mass function of the image pixel intensities. (Suhasini, 2009) Fuzzy Color Histogram (FCH) as an opposite to CCH, in FCH each pixel is associated to all bins of histogram with different degrees of membership depending on color similarity of the pixel. This is done by fuzzy-set membership function. (ferone, 2008) Color Correlogram (CC) color correlogram of an image is a table which is indexed by color pairs, where the d-th entry of (i,j) cell shows the probability of finding the color j at a distance of d from a pixel of color i in the image extracting. Such a feature from the image is tolerant to the changes in appearance of the same scene which can be caused by changing the viewing positions, but color correlogram is more difficult to compute than color histograms. (Huang, 1997) Texture Retrieval by image texture in a similar to color-based feature extraction, but it looks for visual patterns in images rather than colors. So it looks at homogeneity that is not a result of a single color presence or intensity of a pixel value. Sometimes it also provides more spatial information. The most basic method used to extract the texture descriptor from the image is based on Fourier Transform. The initial image is transformed by the Fourier function. As the method works on digital images, Discrete Fourier Transform (DFT) is used. DFT converts images from the spatial domain into the frequency domain, where all the spatial frequencies of the original image are represented. In another words this transformed image shows intensity variations over a number of pixels. Transformed data is grouped to obtain several measures from it. Then descriptor is formed of these measures and is used for comparison. (Nixon, 2007) Shape Shape-based image retrieval comparison looks at shapes of regions within an image and searches for the shapes similar to given as in a query image. Edge and blob detections are important parts for the shape feature extraction. These edges and blobs are points or regions in the image that are either brighter or darker than the surrounding. Several methods are used for shape-based image retrieval, which involve different kind of image filtering and image transformations. One of the most effective algorithms for shape-based image retrieval is Scale Invariant Feature Transform (SIFT) algorithm, which was first developed by David Lowe in 1999, at the University of British Colombia. It takes a single image as an input and returns a set of detected image features. In SIFT algorithm image filtering is based on Gaussian function. After image filtering SIFT uses Difference of Gaussian (DoG) pyramid for blob (keypoint) detection. The image feature descriptor, which is called keypoint descriptor is 128 element feature vector and formed of gradient magnitudes and orientations computed for the area around the identified keypoints. (Lowe, 2004) Chapter 3. Research Method 3.1 Research approach Mathematical methods play key role in the most of CBIR algorithms. Often mathematical solution of the problem is difficult or impossible to implement practically, therefore it is important to assess the method in practice. Thats why Experimental approach will be used in this dissertation. This method of primary research forces to experience and overcome all the difficulties that can appear during the practical implementation of theory. It requires focusing on the details of algorithm and clearly shows advantages and disadvantages of the particular algorithm. It also gives possibility to assess the instruments used in experiment, which are not less important than algorithm itself. In this dissertation, one of the CBIR algorithms for shape-based image retrieval will be implemented for a number of images and the results will be assessed 3.2 Tools and Technologies used This study focuses on the algorithm which involves image processing. It will be implemented under the Microsoft .net framework platform and using GDI+ and C# programming language. .Net framework provides managed interface for GDI+; therefore its relatively easy to process images using this platform. Microsoft Visual Studio .Net will be used as an IDE. This experiment will also show how useful can be .net framework library and C# language for image processing purpose. References: Bach J., Fuler C., Gupta A., Hampapur A., Horowitz B., Humphrey R., Jain R., Shu C., (1996) The virage image search engine: An open framework for image management SPIE Conference on Storage and Retrieval for Image and Video Databases; Chen Ch. Ch. (2006),Using Tomorrows Retrieval Technology to Explore the Heritage: Bonding Past and Future in the Case of Global Memory Net; available at: http://ifla.queenslibrary.org/IV/ifla72/papers/097-Chen-en.pdf last accessed on 24th September 2009 Datta R., Joshi D., Li J. and Wang J. Z. (2008) Image Retrieval: Ideas, Influences, and Trends of the New Age. Eakins J.P. (1996) Automatic image content retrieval are we getting anywhere?Department of Computing, University of Northumbria at Newcastle, available at: http://www.cs.uu.nl/docs/vakken/mir/materials/literature/eakins.pdf last accessed on 24th September 2009 Ferone A., Maddalena L., Petrosino A., (2008) The Enhanced Color Histogram: a way for dealing with uncertainty in CBIR systems, University of Naples Parthenope, Department of Applied Science; Flickner M., Sawhney H., Niblack W., Ashley J., Huang Q., Dom B., Gorkani M., Hafher J., Lee D., Petkovie D., Steele D. and Yanker P.(1995) Query by Image and Video Content: The QBIC System, IBM Almaden Research Center; available at: http://www2.cs.ucy.ac.cy/~nicolast/courses/cs422/ReadingProjects/qbic.pdf last accessed on 24th September 2009; Hafiane A., Chaudhuri S., Seetharaman G., Zavidovique B. (2006) Region-based CBIR in GIS with local space filling curves to spatial representation Huang J., Kumar S. R., Mitra M., Zhu W. J., Zabih R. (1997) Image Indexing Using Color Correlograms, Cornell University; Lowe D. G. (2004), Distinctive Image Features from Scale-Invariant Keypoints, Computer Science Department University of British Columbia; available at: http://people.cs.ubc.ca/~lowe/papers/ijcv04.pdf last accessed on 24th September 2009 Nixon M. S., Aguado A. S. (2007) Feature Extraction and Image Processing, Academic Press; Suhasini P.S., Dr. K. Sri Rama Krishna, Dr. I. V. Murali Krishna (2009) CBIR Using Color Histogram Processing; VR Siddhartha Engineering College; available at: http://www.jatit.org/volumes/research-papers/Vol6No1/13Vol6No1.pdf last accessed on 24th September 2009; Tahmoush D.   Hanan S. (2007)A Web Collaboration System for Content-Based Image Retrieval of Medical imag;available at:http://www.cs.umd.edu/~hjs/pubs/medicalimagepapers/TahmoushSPIE07a.pdf last accessed on 24th September 2009; Torres R. S., Falcà £o A. X. (2006)Content-Based Image Retrieval: Theory and Applications; available at: http://www.dcc.unicamp.br/~rtorres/artigos/journal/torres06rita.pdf last accessed on 24th September 2009; Veltkamp R. C., Tanase M. (2002) Content-Based Image Retrieval Systems: A Survey; Department of Computing Science, Utrecht University; available at: http://give-lab.cs.uu.nl/cbirsurvey/cbir-survey.pdf last accessed on 24th September 2009; Wang J. Z. (2001) SIMPLIcity: Semantics-Sensitive Integrated Matching for Picture Libraries; available at: http://infolab.stanford.edu/~wangz/project/imsearch/SIMPLIcity/TPAMI/wang2.pdf last accessed on 24th September 2009; Wen Ch. Y, Yu Ch. Y., (2005) Image Retrieval of Digital Crime Scene Images, Forensic Science Journal; available at: http://fsjournal.cpu.edu.tw/content/vol4.no.1/06-95-04.pdf last accessed on 24th September 2009.