Monday, September 30, 2019

Legalize anabolic steroids

SummaryThere is a huge national concern over the misuse and abuse of anabolic steroids for enhancement of muscular stature and performance among competitive athletes.   Latest estimates have shown that approximately 5% of all high school students have used anabolic steroids, with almost half of the high students believing that these drugs are not harmful to their health.   Drug enforcement legislations have included anabolic steroids in its list of traffic-controlled substances (21 USC Sec. 801 1/22/02; Schedule III).   However, the bigger picture of the medical and research benefits of anabolic drugs have been overlooked due to the sensationalize media coverage of these drugs.   Current scientific researches are still inconclusive on whether anabolic steroids are extremely unsafe for administration, opposite to what has been actively claimed by anti-drug officials and government authorities.DatesThe Anabolic Steroid Control Act of 1990 (ASCA) was established to regulate the distribution of anabolic steroids in the United States.   The Drug Enforcement Administration of the U.S. Department of Justice has been mandated to implement measures to protect the people from these dangerous drugs.   A four-part definition of anabolic steroids serves as a blueprint to identify any analogues of the chemical substance that may be uncontrollably dispensed to athletes and other youths.The definition included substances that are chemically and pharmacologically similar to testosterone, estrogen, progesterone, as well as a very close likeness in its enhancement for muscle growth.   The Act classified anabolic steroids in the same category as barbiturates and LSD precursors and claim that these substances result in dangerous effects to the human body.   The Act declares that any individual caught in the possession of these anabolic steroids will be arrested and prosecuted.   The list of anabolic steroids in the Act are continuously being updated, as new versio ns of these drugs are progressively being created through the years.AddressesDrug Enforcement AdministrationU.S. Department of JusticeWashington, D.C.   20038-8083SUPPLEMENTARY INFORMATIONBackgroundAnabolic androgenic steroids are testosterone derivatives that are mainly used for muscle and performance enhancement.   These drugs are frequently used by competitive athletes in order to achieve an edge or better control of their physical strength and performance during professional sports games.   Retrospective surveys indicated that anabolic steroids have been used since the 1960s to date (Duchaine, 1983), with current national user rates ranging from 3% to 9% among high school students alone.   The exact effect of anabolic steroids in the developing human body has not been fully studied, and the increase in number of reports of teenage athletes committing suicide has called the attention of the legislation to assess and review drug enforcement laws covering this specific drug .It has been reported that the prolonged use of anabolic steroids have may cause a number of adverse effects to the human body, including liver damage, gynecomastia, atherogenesis, psychiatric disorders such as aggression and violence, and even death (Balbigian, 2001; Brower, 2002; Glazer, 1991; Pope and Katz, 1990; Malone et al. 1995).   Investigations on the nationwide use of anabolic steroids have prompted Congress to establish the Anabolic Steroid Control Act of 1990, which mainly indicates that the non-medical employment of anabolic steroids is punishable by law.   Any violations will be penalized by at least 15 days to 5 years imprisonment and/or $1,000 to $1,000,000 fine, depending on the extent of the violation.   So far, the general public has supported the Anabolic Steroid Control Act, mostly due to the massive and militant media coverage of the topic.However, the actual negative effects of the use of anabolic steroidal drugs have not been comprehensively investigate d to date, and that the reports that have been disclosed in the media have been isolated cases picked out from millions of cases of teenage users around the United States.   Scientifically, the adverse effects from the prolonged use of anabolic steroids remain inconclusive to date, and in actuality, anabolic steroid use has been shown to be beneficial in the treatment of medical disorders.In one report, it has lately been determined that the effect of an anabolic steroid to the treatment of weight loss in human immunodeficiency virus (HIV)-infected patients is equivalently effective and safe as compared to the commonly administered recombinant growth hormone that has been approved by the Food and Drug Administration (Storer et al. 2005).   In another scenario, the administration of an anabolic steroid has been beneficial in prostate cancer patients by preventing further migration of prostate cancer cells to other parts of the body (Guerini et al. 2005).   The anabolic steroid oxandrolone has been successfully used in the treatment of muscle loss in patients diagnosed with Duchenne muscular dystrophy and may be a potential powerful candidate for general treatment of such types of patients (Balagopal et al. 2006).Scientific research shows that anabolic steroids provide more beneficial effects than what has been claimed by legislation as serious, adverse effects to the human body.   More so, the negative reports that have associated with the use of anabolic steroids have not been investigated scientifically and have only achieved much attention through the help of media and press coverage.   Therefore, it is imperative that the legislative bodies review the restrictions associated with the Anabolic Steroid Control Act of 1990 and fully determine the actual effects of anabolic steroid intake.   It is regretful to know that there are other drugs and activities that are much more deleterious or harmful to people but are not actively controlled by the Sen ate, including smoking, cosmetic surgery and over-the-counter drugs such as aspirin and ibuprofen, which has caused even more cases of deaths and hospitalizations that anabolic steroids.The Proposed RuleBased on the above information on the current status, knowledge and use of anabolic steroids, we would like to propose that anabolic steroids be legalized for use in the United States.   In turn, we would like to emphasize the need for further scientific research to determine the mechanisms of action of each type of anabolic drug to gain a better understanding of its indications and contraindications.   There should be a comprehensive survey on the frequency of use of anabolic steroids across the human population, with stratified categories of users such as teenage athletes, geriatric patients, cancer patients, and so on.   Any cases that report any adverse effect from use of anabolic steroids should be properly documented and analyzed.   Should there be sufficient reason tha t anabolic steroids be stopped from circulation in the community, we are willing to review these effects once significant information has been gathered from reliable reports.Legal ConsiderationsAs the use of anabolic steroids is legalized, we in turn, propose that a nationwide surveillance program on the use of anabolic steroids be implemented by the Drug Enforcement Administration, as a measurement tool on the exact effects on the use of these substances.   The information that will be gathered will be integrated into an national anabolic steroid database for analysis and interpretation.   All anabolic steroid cases will be included in the database, including any advantages, disadvantages or no visible effects that may be related to the intake of this drug.The surveillance program will be conducted for 2 years, of which at its culmination, will be evaluated and further amendments will be based on the results of the analysis and interpretation of this database.   Such survey w ill provide a better understanding of the effects of anabolic steroid use, which will be more reliable, robust and scientific, and we will not have to depend on influences or propaganda from the media or other government officials.ReferencesBabigian A, Silverman RT (2001): Management of gynecomastia due to use of anabolic steroids in bodybuilders. Plast. Reconstr. Surg.   107:240–242.Balagopal P, Olney R, Darmaun D, Mougey E, Dokler M, Sieck G and Hammond D (2006):   Oxandrolone enhances skeletal muscle myosin synthesis and alters global gene expression profile in Duchenne muscular dystrophy.   Am. J. Physiol. Endocrinol. Metab. 290:E530–E539.Brower KJ   (2002): Anabolic steroid abuse and dependence. Curr. Psychiatry Rep.   4:377–383.Duchaine D., ed. (1983):   Underground Steroid Handbook, 1st Ed. California: HLR Technical Books, 84pp.Glazer G (1991): Atherogenic effects of anabolic steroids on serum lipid levels. Arch. Intern. Med. 151:1925–1 933.Guerini V, Sau D, Scaccianoce E, Rusmini P, Ciana P, Maggi A, Martini PGV, Katzenellenbogen BS, Martini L, Motta M and Poletti A (2005):   The androgen derivative 5ÃŽ ±-androstane-3ÃŽ ²,17ÃŽ ²-diol inhibits prostate cancer cell migration through activation of the estrogen receptor ÃŽ ² subtype.   Cancer Res.   65(12):5445-5453.Malone DA Jr, Dimeff R, Lombardo JA, Sample BRH (1995): Psychiatric effects and psychoactive substance use in anabolic-androgenic steroid users. Clin. J. Sports Med. 5:25–31.Pope HG Jr. and Katz DL (1990): Homicide and near-homicide by anabolic steroid users. J. Clin. Psychiatry   51:28–31.Storer TW, Woodhouse LJ, Sattler F, Singh FB, Schroeder ET, Beck K, Padero MC, Mac P, Yarasheski KE, Geurts P, Willemsen A, Harms MK and and Bhasin S   (2005):   A randomized, placebo-controlled trial of nandrolone decanoate in human   immunodeficiency virus-infected men with mild to moderate weight loss with recombinant human growth hormone a s active reference treatment.   J. Clin. Endocrinol. Metab.   90(8):4474–4482.

Sunday, September 29, 2019

Arthur Miller Essay

Between 1949 and 1953, Arthur Miller wrote two of his most famous plays. Both plays dealt with major problems in society. The main characters of the plays were similar. Also, the supporting characters of both plays were alike. Arthur Miller’s plays Death of a Salesman and The Crucible are similar in many ways. The main purpose of both Death of a Salesman and The Crucible was to show major problems in American society. In Death of a Salesman, Arthur Miller was trying to show the impossibilities of the American Dream. In The Crucible, he was trying to show how society is intolerant toward others and is prone to hysteria. Both plays dealt with society defeating the average, hard-working man. Each play showed a society that was full of deceit and liars. In both of these plays, society was depicted as an evil thing that would overpower the average person and create an unjust world. The main characters of Death of a Salesman and The Crucible, Willy Loman and John Proctor, were alike in many ways. Both of these men had extramarital affairs, and in both cases, the affairs ended up destroying their lives. Both of these men were hard-working, average men who were just trying to make a good life for themselves and their families. Names were important to both men, and they both took pride in their names. In both cases, many decisions the two made were because of their family members. One large similarity between Willy and John was the fact that they both eventually died, and the death was partly their choice. Both men could have avoided death, but instead, they chose to die because they believed it was the correct thing to do. In these two plays, there were also many similarities between the supporting characters. In both plays, children had much more power than they normally do. In Death of a Salesman, Willy’s son controlled much of his life. In The Crucible, the girls, led primarily by Abigail Williams, caused many people to be hanged, and even more to be imprisoned. Also, both John and Willy had wives that were very loyal to them throughout their lives and supported them until the end. Both plays showed a figure of power, seen as Howard in one play and Judge Danforth in the other. In both plays, the main character had a friend who stood up for them at the end. Willy had Charley, who had been his best friend for a long time, and John had Reverend Hale, who tried to prevent John’s death. There are many similarities between characters in the two plays. Death of a Salesman and The Crucible are alike in many ways. Arthur Miller created similar characters in both plays. He used both to show the many things wrong in America. These two plays are both powerful pieces of literature that should be read and appreciated by all people.Sources: Death of a Salesman and The Crucible by Arthur Miller Arthur Miller Essay Can the audience be certain that Abigail is pretending when she has her fits (pages thirty nine-forty and ninety one-ninety six) In sixteen ninety two there was an outbreak of hangings for witchcraft. Arthur Miller based â€Å"The Crucible† on the events that lead to this to create an allegory of the events that took place in the nineteen fifties, when Joseph McCarthy was the head of the investigations of the senate committee on internal security. When Abigail her fit on page ninety two, Miller leaves the audience confused because of the other girls’ reaction to what Abigail does and also to Mary Warren’s accusations. When Abigail starts imitating Mary Warren the girls copy Abigail and start using it to accuse Mary Warren of â€Å"sending a shadow on them,† so Abigail used its sudden entrance into the court to stop Mary Warren from telling the truth about what happened in the woods. The way they chose to accuse her was by imitating Mary Warren. â€Å"Mary Warren (screaming out at the top of her lungs, and raising her fists): Stop it!! Girls (raising their fists): Stop it!! † Arthur Miller adds more uncertainty by making other girls leading into the fits. This happens when Betty wakes upon page thirty nine and starts a fit off by saying, â€Å"I saw Goody Howe with the Devil! † This is effective because Betty is apparently ill at the time that this happens then â€Å"As she is speaking BETTY is rising from the bed, a fever in her eyes, and picks up the chant. † Then in a fit on page ninety two, Mercy Lewis says â€Å"Mercy Lewis (pointing): It’s on the beam! Behind the rafter! † This is when the bird has appeared and Danforth asks where it was. This is an effective strategy to employ and these points in the play because it keeps the audience guessing and wanting to know what will happen next. Mary Warren is present during both the fits that Abigail has, although in the second one on page ninety two she is the one both accusing and being accused. At the end of the fit Mary Warren has a real stress induced fit â€Å"only MARY is left there, staring up at the `bird’, screaming madly. All watch her terrified by this evident fit. † The fact that Mary Warren has now joined in isn’t the only thing that makes this effective it is that she has just changed her mind after being so resolute on telling the truth, also that this implicates Proctor as being a witch because he is the one that took her to the court. In the sixteen nineties the buildings were furnished in a minimalist fashion because people couldn’t afford much more that the essentials, for example in Betty’s bedroom would have a bed a little chest of drawers for her clothes and a chair. There would also be a few windows. Therefore it would be quite shocking seeing it filled up with mainly young girls, then when all the girls suddenly start shouting it would be overwhelming and quite confusing for an audience member seeing this for the first time. However, When Mary Warren is persuaded to go to court she seems scared of Abigail as she says; â€Å"She’ll kill me for sayin’ that! † The audience also know that Abigail has lied from the beginning about what happened in the woods, as Abigail told her uncle that all they did was dance but then Betty says â€Å"you drank a charm to kill Goody Proctor! Also in the same conversation Abigail tells Mary Warren to carry on lying, â€Å"Let either of you breathe a word about the other things and I will come to you in the black of some terrible night and I will bring pointy reckoning that will shudder you. † When the girls copy Abigail they never catch on straight away they always take a while to join in, such as in the court room on page ninety two Abigail has to repeat what Mary Warren says twice before the girls start repeating as well. â€Å"The Crucible† is an allegory of what was happening in America in the nineteen fifties. When Joseph McCarthy became a senator lots of people started having trouble with being accused of being a communist. It was mainly actors, actresses and writers that were accused but once you were accused there were only two things you could do to stop yourself from being blacklisted, which meant you would find it very hard to work again, you could either admit to being a communist and still be black listed or you could do the easier thing to prove you weren’t a communist which was accuse someone else. This is very similar to â€Å"The Crucible† as Abigail feels she has to accuse Tituba so that she isn’t accused of which craft. The only two differences when you were put in this situation ware that you wouldn’t be hung for being a communist you just wouldn’t be able to find work very easily. The other difference was that in Salem you had to be a witch to be hung, whereas in America you had to be a communist. There are certain similarities between Salem and today, such as today, lots of people treat Muslims differently because other people have turned Muslims into a scapegoat and projected everything wrong with the society that they live in and been blamed on a particular group of people, which in our case is Muslims. This prejudice against particular groups of people often isn’t fair. In America they projected their fears onto communists because they were that the communist uprising in Russia would spread to America, but now we are worried because a few Muslims out of millions decided to become suicide bombers and the government used them as a means to justify the war in Iraq by demonising the main faith in that country. Overall I think that the audience wouldn’t be able to whether Abigail was pretending while she was having her fits unless they had seen â€Å"The Crucible† before, because Arthur Miller uses a lot of tactics to confuse or scare the audience.

Saturday, September 28, 2019

Wisdom in Revenge

A Savage Wisdom is a novel that chronicled the fictionalized life of Toni Joe Henry as inspired by the life and crime of Annie Beatrice McQuiston. She was the first and only woman to suffer the penalty of dying in an electric chair at a basement in a courthouse at Lake Charles. She was convicted of murdering a Houston businessman that was her lover.She turned into a cold-blooded murderer because she was consumed with passion and feelings of betrayal. However, at the beginning of the novel she is depicted as beautiful, naà ¯ve, Southern girl that would elicit sympathy from the readers. Because of her naivety, she was taken advantage by Herald Nevers. It is unknown to the girl that Nevers is selling indecent pictures of her. Furthermore, Nevers allowed other men to watch them make love with each other.She then realized that this man has turned her into a prostitute. She was eventually rescued by Arkie Burk. One incident leads her to the killing, while she and Burk were traveling; they encountered a hitchhiker that turned out to be Nevers. Consumed by anger, she lost control and killed Nevers. After the death of her ex-lover, she was imprisoned. While in prison, she had a love affair with a deputy that impregnated her. Before she was executed, she gave birth to a child.The author has been successful in inciting feelings of sympathy towards the protagonist from the readers. That is exactly what I feel towards the protagonist’s predicament.I do not necessarily like and agree to her life’s choices and her life’s decisions; however, she is not to blame. She appears to be a very beautiful, good, and naive girl that deserves love and attention more than what was given to her by Nevers. I pity her because her naivety was taken advantage of by Nevers.Her act of killing him is a kind of revenge for the humiliation that he has done. Women abuse are palpable because of a common belief that women are naturally, biologically, and emotionally weak in relat ion to men. Cases of sexual abuse spawned from another common belief that it is difficult for women to defend themselves.However, this was proven wrong by Toni Jo Henry. Her act of killing Nevers is exemplary. It serves as a model for men and even for women to take heed on the fact that women should not in any way be taken advantage of because they have the capacity to defend themselves by any means. This is where the title of the novel best works. It suggests the wisdom and realization that people get from the incident despite a savage one.While the act of killing may serve a purpose and Henry had a reasonable justification for it, I still believe that she deserves to be punished. I understand that she did the crime because Nevers has done her wrong. She needs to fight for her right as a woman and as a human being that should be respected despite her status in life. But that does not justify the killing itself.I believe that she has to be punished for the crime that she has done. I t was no doubt an act of retaliation and revenge that would not be justified in the eyes of criminal justice. For her to attain justice is to make the law work for her and not against her. A wrong done would not be made right by doing another wrong. I believe she has reasons to kill but those reasons are never justified in the eyes of the law and morals.Works CitedGerman, Norman. A Savage Wisdom. Thibodaux: Thunder Rain, 2008.

Friday, September 27, 2019

Emergency Care Practitionera Essay Example | Topics and Well Written Essays - 500 words

Emergency Care Practitionera - Essay Example From 1999 till 2004 reform in areas of Ambulance services and emergency services were beginning to sprinkle upon and NHS as part of its focus on these new services NHS has decided to introduce in the year 2004 new type of Practitioner called as Emergency Care Practitioner (ECP). An ECP is usually picked up from Paramedics, people with nursing background and other healthcare professions like physiotherapy etc. An ECP is usually given training or they even take up courses at university level so as to get the required proficiency and in process enhance their role and its scope. Flexibility and adaptability is considered as key requisite in performing the roles and in obtaining success as a practitioner. Some of the other skills which an ECP should be able to perform are minor surgical procedures in the field, System based assessment & otoscopy/ opthalmoscopy and prescription of medicines like antibiotics. It is a requirement as apart of job role that they give immediate response to injuries in different environments like minor injury units, out of house services ands A& E departments (Accidents and Emergency departments). I feel that I would be able to contribute to this ever changing environment of Emergency Care Practitioner as I have gained a c

Thursday, September 26, 2019

Diversity at the work place Essay Example | Topics and Well Written Essays - 4000 words

Diversity at the work place - Essay Example ..........................................................................................................................5 Statement of the problem...............................................................................................................5 Literature review............................................................................................................................6 Findings .......................................................................................................................................10 Discussion.....................................................................................................................................12 Overcoming discrimination disability...........................................................................................15 Recommendations.........................................................................................................................17 Conclusion...................... ...............................................................................................................18 References .....................................................................................................................................20 Disability in the Workplace Abstract The issue of disability at workplaces has now taken a centre stage in many organizations and states for many years. Many governments have established policies, regulations and codes of conduct towards disabled individuals in terms of their involvement in organizational operations and responsibilities. As a result, management of companies have recognized the significance of implementing set policies on disabled individuals in their organizations. However, many disabled people in organizations across the world have been experiencing workplace discrimination based on their shortcomings. Disability discrimination is an illegal practice described by selective treatment of individuals with respec t to their physical abilities. Majority of the disabled individuals experience unfair treatment in the professional fields for many years. To date, some organizations have not completely gotten rid of the stigma. However, numerous organizations have implemented rules and regulations aimed at overcoming the disability in the workplace. Introduction Disability is a state of the body that limits the performance of an individual because of their physical or mental inability. A person with any physical or mental impairment or has a history of these conditions or is perceived to possess them is considered disabled in many organizations and countries across the world. Physical disability appears in many forms such as visual, hearing, mobility impairment, mental conditions such as autism and other chronic medical conditions such as diabetes, epilepsy and asthma. Disability discrimination in the work place still exists today with many disabled workers facing unfair treatment from either the employers or the co-workers. The management of all organizations are required to prevent and discourage any form of discrimination against the disabled. Disabled employees may receive lesser job benefits as compared to other workers because of their physical or mental conditions. Such benefits include less pay, minimal tasks assigned, limited training and other fringe benefits. The disabled employees may also be put under hardship working conditions that include being assigned difficult tasks with respect to

The 1882 Chinese Exclusion Act Research Paper Example | Topics and Well Written Essays - 2000 words

The 1882 Chinese Exclusion Act - Research Paper Example Because whatever occurs in history has an effect on the prospect, it is significantly imperative to understand the background of the Act along with how it influenced the North American community and other sections of society. Conceivably, by evaluating the past represented by implications of the Chinese exclusion Act, it might be achievable to build up a superior prospect in a perceptible way. This paper endeavors to provide research on the factors behind the Act, the implications of the Act particularly on North America and the milieu of the legislation. Additionally, the paper will give the results on the appraisal of the happenings adjacent to the Chinese exclusion Act, its execution along with issues emanating from its enactment and implementation. Obviously, any law touching on sensitive issues like race and immigration will derive numerous controversies and conflicts. The research paper will illuminate on the controversies of the incidence of the Act and its position in the vas t Asian American studies. Alternative perspectives of the Act, with respect to the 19th century, and its relationship with contemporary thought will form part of the discussion shedding more light on the Act. In essence, the exclusion Act led to a fall in economic production around the country because the Asians especially Chinese (barred from migrating to America) were hardworking individuals who played a prominent role in economic production (Powell 67). The enactment of legislations that focus on categories of people during times of need is of no gain to any population. The Cause and Effect of the Act The Chinese Exclusion Act of 1882, emanated from decades of Chinese intolerance signified by increased riots and campaigns against the mounting presence of Chinese laborers in parts of the United States. This culminated into the launch of decades of Chinese exclusion witnessed by the barring of Chinese people from migrating to America for ten years and later indefinitely (Daniels an d Graham 22). Enacted in 1882, the Act was the peak of three decades of continuous racism in America. Anti-Chinese perceptions had prevailed right from the momentous migration of the Chinese throughout the period of Gold Rush. In this period, miners and prospectors placed several taxes and legislations to obstruct the success of people of Chinese origin. The increase of Chinese migration into America augmented racial apprehensions, a factor that was significantly becoming a source of serious social misunderstandings. The migration of Chinese emanate from the ground of job rivalry by the whites who perceived the Chinese as a huge threat to their jobs and financial success. Though, the perceptions towards most perspectives were more of racial than economic nature and that the introduction of economic dimensions aimed at destructing the public from the inherent racial hatred towards the Chinese people. The exclusion act was, therefore, culmination of inherent racial mistrust directed t owards Chinese immigrants and primarily intended to last a period of ten years. However, the congress prolonged period of the Act to indefinite in 1902 thus cementing the existent racial perceptions against the Chinese group. The Chinese were not quick to react to Act as majority of them conflicted the idea of oppression, and many chose to stay silent on the issue. The advent of the Second World War was a significant development in the relationship

Wednesday, September 25, 2019

A global look at quality managemenr in universities Research Paper

A global look at quality managemenr in universities - Research Paper Example Universities across the world have been positing themselves as â€Å"world-class† in view of the market opportunities presented by globalization (Xavier and Alsagoff, 2013). In a global scenario, quality and perception of quality of a university is defined and determined by many internal as well as external mechanisms. In this context, quality of education has become a decisive factor while determining the management strategy for any university (Dobrzanski and Roszak, 2007, p.223). Xavier and Alsagoff (2013) have observed how universities present themselves as â€Å"world-class† to the global markets through many strategies, thereby attracting students from all over the world. Any examination of the quality of universities in global context will have to start with addressing the questions, what is defined by quality, and whether there are global standards of quality in education (Paradeise and Thoenig, 2013, p.189). Quality in the context of university education is ofte n defined as: Expression of significant range of educational effectiveness and reflection of a new approach in which need of systematic evaluation of undertaken activities is taking essential meaning including improvement and making endeavors towards accreditation which aim to confirm that all the standards of educational effectiveness are provided† (Dobrzanski and Roszak, 2007, p.223-4). Quality of university education can also be defined in terms of financial effectiveness, academic standards, and public usefulness as well (Dobrzanski and Roszak, 2007, p.224). ... This is an approach that ensures participation, plans long-term, aims at â€Å"customer satisfaction†, and brings benefits to all the academic and social stakeholders (Becket and Brookes, n.d., p.43). Fotopoulos and Psomas (2008) have studied TQM in the context of Greece and observed that any TQM model must have a â€Å"soft† and â€Å"hard† side, the â€Å"soft† side being a plan to address long term issues and related to â€Å"leadership, employee empowerment and culture† (p.151). The â€Å"hard† side on the other hand refers to â€Å"quality improvement tools and techniques† (Fotopoulos and Psomas, 2008, p.151). It is pointed out by Fotopoulos and Psomas (2008) that â€Å"there is no unique model for a good TQM programme and TQM is a network of interdependent elements, namely, critical factors, practices, techniques and tools† (Fotopoulos and Psomas, 2008, p.151). Yet, there have been a number of â€Å"TQM elements† id entified through various research projects and they are, leadership, strategic quality planning, employee management and involvement, supplier management, customer focus, process management, continuous improvement, information and analysis, knowledge and education, and TQM tools such as â€Å"flow charts, relations diagram, scatter diagram, control charts, pareto analysis, quality function deployment, design of experiments and so on† (Fotopoulos and Psomas, 2008, p.152-3). There are widely accepted quality frame works for universities other than TQM such as European Framework for Quality Management (EFQM) and SERVQUAL that approaches the issue from the customers' â€Å"perspective† (Becket and Brookes, n.d., p.43). The dynamics of the process of attaining

Tuesday, September 24, 2019

The factors of motivating saudi students in learning mathematics Research Paper

The factors of motivating saudi students in learning mathematics - Research Paper Example The samples that shall be used in this research involve 15 participants, majorly students from various learning institutions in Saudi. The selection criteria shall involve random selection of students from different learning institutions. The application of interviews as method of data collection is pertinent as it facilitates the collection of primary and more accurate information from the students as compared to secondary modes of data collection. The criteria of collecting data from various learning institutions is pertinent owing to the fact that it shall facilitate elimination of errors associated with biased data collection. This research is based on a qualitative approach; it shall basically entail collecting descriptive data that answers the questions: How; why; where and when. The specific method for data collection shall entail undertaking interviews among the selected participants answering the questions; how, why et cetera. The reason for selecting interviews as a method of data collection in this research is based on the fact that it entails direct engagement of the students in the study hence facilitating collection of primary and more accurate information. The process of data collection shall entail gathering data from students in various learning institutions. The data shall be collected from 15 randomly selected students among the various learning institutions in Saudi. This shall be facilitated by performing one-on-one interviews using questionnaires as the tools for data collections. The students (Selected Participants) shall be subjected to a ten question questionnaire during the data collection process. At least one student from the selected learning institutions shall be involved in the data collection process. The data that shall be analyzed in this study is qualitative data; the data collected shall be reviewed as notes of key information from the interview recorded. This shall be followed by coding of

Monday, September 23, 2019

Identity and Conflict in Bosnia and Macedonia Essay

Identity and Conflict in Bosnia and Macedonia - Essay Example The 2007 book Waiting for Macedonia: Identity in a Changing World and the documentary film We Are All Neighbours consider such matters. Thiessen writes of an â€Å"Us and Them† paradigm in Macedonia, an â€Å"Otherness† that Macedonians have adapted to meet their own perspective on the world and to gauge their place in that world (2007, p. 40). Identity in Macedonia is a fluid concept, with the country’s Slavic population reaching into the country’s ancient past in the effort to construct a national identity (Ibid). Macedonians have had only to consider the existence of a strong European identity in Germany, no stranger to fragmentation, to recognize the benefits of identification with the nation states that comprise the European Union. In Bosnia, identity was compromised in the wake of the Tito regime’s demise. Socialism in Yugoslavia, though coercive, fostered a form of national unity, which, when independence came to the former Yugoslav states, resulted in a gradual social incoherence. The ethnic violence that ensued was, perhaps, unsurprising given the conditions in the 1990s. But the suddenness with which it occurred, and its effects on a multi-ethnic Bosnian village, is the subject of We Are All Neighbours. The lingering effects of socialism and of life under a totalitarian regime have been blamed for the cataclysm of the 1990s. In Macedonia, Thiessen contends that it was not the absence of socialism but an absence of a national context that stirred up ethnic unrest (Thiessen, 2007, p. 25). Identity lay at the heart of the matter. Whereas the existence of Yugoslavia allowed Macedonians to think of themselves in terms of Europe, the post-socialist reality produced nostalgia for Yugoslavia that was tantamount to the desire for a future as part of the European community (Ibid).

Sunday, September 22, 2019

Policing in Kelsey Essay Example for Free

Policing in Kelsey Essay In this paper, I will discuss the budget cuts on the City of Kelsey. The mayor has assigned me as a budget director to review and perform budget cuts on the City’s Police Department, due to a 15% budget cut on the City deficit. The state legislature wants to hire less Police Officers and build more prisons. The Police Department currently has an annual budget of $16,177,678. With the 15% budget cut, the mayor is requesting from the Police Department, that leaves a new annual budget of $14,236,356, a decrease of ,941,322. The major change that will affect the fiscal cycle of this budget year is the decrease in the hiring of Police Officers. The City of Kelsey was in the process of hiring 10 new Police Officers to fill the 10 position that were vacant, due to six retiring Police Officers and four Police Officers finding other employment. Now with the 15% budget cut, the City will not be filling these opened positions, thus saving the City $1,200,000. New vehicle and maintenance cost will also decrease, due to not hiring the new officers. Last fiscal year the City Manager allotted $150,000 for 5 new vehicles and maintenance cost for the hiring of the new Police Officers. As a budget director, I went to the Police Union and request a 10% cut in wages or freeze the wages until the next fiscal year, thus saving $300,000. Also cutting 16 paid holidays a year will save the City $400,000. The Police Union Committee advised the Union has only agreed to a 1% pay cut within the next fiscal year, which will save the City $30,000. The Committee has also agreed to 10 paid holidays a year instead of 16. This will save the City an annual $150,000 a year. The Chief of Police has agreed to cut the training budget by 80%. The City will save an annual budget of $125,000. With these cuts alone, the City will save $1,655,000 alone. Another proposal will cut community programs and events within the next fiscal year. The annual â€Å"Shop with a Cop† or â€Å"Trunk or Treat† is in the annual budget for $10,000. Domestic violence programs can also be cut saving the City an  annual budget of $50,000 a year. Finally, the City will cut all overtime pay for the reminding of the fiscal year, saving the City an estimate of $500.000. With all the above-mentioned budget cuts, the City will project to see a 10% increase in crime. First, not filling the 10 Police Officers position will decrease the number of Police Officer per shifts, thus running the shift at staff minimal. Running the shift at staff minimal will decrease response time to service calls. The Mayor and City Council requested a 5 to 7 minute response time to every service call last fiscal year. With the decrease in personal, a new projective response time will be 10 to 12 minutes. The city has a collective bargaining contract with the Police Union. The Police Union has agreed to a 1% pay cut. Per the collective bargain contract, the City will repay the 1% back at the beginning of the next fiscal year, plus the cost of living increase (7%). I, as the Budget Director will have to go back to the Police Union next fiscal year and asked for an additional pay cuts. Per the collective bargaining contract, the Police Union does not have to cut pay or other benefits that the city provides. If the Police Union does not cut pay next fiscal year, the city will be forced to cut more position instead. Which means fewer Officers per shift, and longer response times to calls. Cutting the domestic violence program that helped victims and offenders will increase the number of incident of domestic violence more than 30% over the next six months. The program-helped victims relocate to a safer environment. The program also helped offenders with counseling. With the shifts at staff minimal, a plan of assigning Officers to areas will have to be established. The City is broken up into three sectors. Sector 1 is the business community and normally requires 40 Officers per shift. Sector 2 is residually areas that normally require 40 officers per shift. Lastly, sector 3 is rural area of the city, and this area requires 10 officers per shift. With the decrease in staff and overtime, area command staffs will assets the needs of each area and assign officers as needed. A federal grant was proposed for an additional $300,000 per year for the next three years is now in the works. The federal grant is for community police programs. The final approval for the grant will take up to 90 days. Inclusion, the 15% budget cut in this year’s fiscal year was successful. Hopeful the economy gets better and next fiscal year is a huge success. The City of Kelsey will continue to grow and  be a safe community to live. Reference Kelsey Annual Budget for the Fiscal Year 2005-06 (2012, Jan). Retrieved from https://ecampus.phoenix.edu/secure/ aapd/cist/vop/ Government/KelseyCity/citygovernment.asp

Saturday, September 21, 2019

Primary Healthcare Web Technology Application

Primary Healthcare Web Technology Application Primary health care ABSTRACT Primary Health Care is committed to helping patients take control of their health. This system is virtual, but our physicians and their dedication is real. Using secure, web-based technologies provided by Medical Web, our health-care providers offer advice and treatment for a variety of conditions. Patients can communicate securely and confidentially with our physicians throughout the treatment process using our messaging system. As a physician-owned company, we are committed to helping our patients receive the utmost care and medical attention. Primary Health Care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.1 INTRODUCTION TO PROJECT Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. ORGANIZATION PROFILE Software Solutions is an IT solution provider for a dynamic environment where business and technology strategies converge. Their approach focuses on new ways of business combining IT innovation and adoption while also leveraging an organizations current IT assets. Their work with large global corporations and new products or services and to implement prudent business and technology strategies in todays environment. Xxxxxxxs RANGE OF EXPERTISE INCLUDES: Software Development Services Engineering Services Systems Integration Customer Relationship Management Product Development Electronic Commerce Consulting IT Outsourcing We apply technology with innovation and responsibility to achieve two broad objectives: Effectively address the business issues our customers face today. Generate new opportunities that will help them stay ahead in the future. THIS APPROACH RESTS ON: A strategy where we architect, integrate and manage technology services and solutions we call it AIM for success. A robust offshore development methodology and reduced demand on customer resources. A focus on the use of reusable frameworks to provide cost and times benefits. They combine the best people, processes and technology to achieve excellent results consistency. We offer customers the advantages of: SPEED: They understand the importance of timing, of getting there before the competition. A rich portfolio of reusable, modular frameworks helps jump-start projects. Tried and tested methodology ensures that we follow a predictable, low risk path to achieve results. Our track record is testimony to complex projects delivered within and evens before schedule. EXPERTISE: Our teams combine cutting edge technology skills with rich domain expertise. Whats equally important they share a strong customer orientation that means they actually start by listening to the customer. Theyre focused on coming up with solutions that serve customer requirements today and anticipate future needs. A FULL SERVICE PORTFOLIO: They offer customers the advantage of being able to Architect, integrate and manage technology services. This means that they can rely on one, fully accountable source instead of trying to integrate disparate multi vendor solutions. SERVICES: Xxx is providing its services to companies which are in the field of production, quality control etc with their rich expertise and experience and information technology they are in best position to provide software solutions to distinct business requirements. 1.2 PURPOSE OF THE PROJECT The project is fully integrated with Customer Relationship Management (CRM) solution and developed in a manner that is easily manageable, time saving and relieving one form semi automated. Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.3 PROBLEM IN EXISTING SYSTEM The existing system is a manual system. Here the User of the system needs to save his information in the form of excel sheets or Disk Drives. There is no sharing is possible if the data is in the form of paper or Disk drives. There is no online appointment facility. The manual system gives us very less security for saving data; some data may be lost due to mismanagement. There is no rich user interface. Its a limited system and fewer users friendly. There is no email facility. Searching of particular information is very critical it takes lot of time. The users cannot able to restrict the information. There is no report generation. SOLUTION OF THESE PROBLEMS The development of the new system objective is to address the solutions for the drawbacks of existing problem domain. Using this new system the patient can register for making online appointment with doctor. For interaction between patient and doctor chatting has provided. By this facility patient would chat with doctor. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach. User Friendliness is provided in the application with various controls provided by system Rich User Interface. This system provides online appointment facility. The system makes the overall project management much easier and flexible. It can be accessed over the Intranet. It provides email facility. The user information files can be stored in centralized database which can be maintained by the system. his can give the good security for user information because data is not in client machine. Authentication is provided for this application only registered users can access. It provides search facility. There is no risk of data management at any level while the project development is under process. Report generation features is provided to generate different kind of data reports. SYSTEM ANALYSIS 2.1 INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. 2.2 ANALYSIS MODEL SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, â€Å"A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: Evaluating the first prototype in terms of its strengths, weakness, and risks. Defining the requirements of the second prototype. Planning an designing the second prototype. Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or any other factor that could, in the customers judgment, result in a less-than-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like: 2.3 STUDY OF THE SYSTEM In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browser interface. The GUIS at the top level have been categorized as Administrative user interface The operational or generic user interface The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Data updating along with the extensive data search capabilities. The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities NUMBER OF MODULES The system after careful analysis has been identified to be presented with the following modules: Administrator Managers Doctors Patients General Public Web Registration Search Reports Authentication Administrator Administrator is treated as a super user in this system. He can have all the privileges to do anything in this system. He is the person who received the Profile of a Doctor and accept/reject the registration. He is the person who receives the Complaints from the Patient and redirects to respective Doctor for response. He should have a facility to communicate using chat, email facility with other stakeholders. He should take care of Backup of Patient, Doctor details and maintain history. He should able to add Rooms availability and Ambulance details into the site for each Hospital. Another tasks done by the administrator is he can generates reports, log files, backup, recovery of data any time. Doctors He should able to see a Patients appointment details on a particular date. Also if the Patient is already visited, able to see the previous Prescription given the Patient, Disease History, Visiting details, etc. They should be able to see the Feedback given by the Patient. They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. Patients They should have a facility to register to the site with their Personal data along with Health details Height, Weight, Family inherited Diseases, Blood Group, etc. Being a Patient (after registration) should able to take an Appointment of a Doctor visit. They should have a facility to give Complaints about Kiosk Manager or Doctor service. They should able to Search for a Doctor and can see the Doctors Profile for an appointment. They should able to book Rooms or make request for an Ambulance to Kiosk Manager Managers He should be able to provide an Appointment of a Doctor to a Patient on request (based on Doctors available timings). They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. They should have a Search facility to find a Patient or Doctor and can check their Profile or History details. He should to receive the Rooms Booking or request for an Ambulance of a particular Hospital and make arrangement/approve the same for a Patient. General Public General Public (i.e. Guest visitors) should able to access the site Home page, Registration Page, etc. common pages of the site. This user should able to see the Doctors Schedules, Contact details, Specialization details, etc. They should able to Search for a Doctor. They should able to see the Rooms available, Ambulance availability of a particular Hospital. Web Registration The system has a process of registration. Every User need to submit his complete details in the form of registration. Whenever a User registration completed automatically he/she can get a user id and password. By using that user id and password he/she can log into the system. Search: This system provides search facility to the patients. Patient can search for Doctors and their available timings for take appointments Reports Different kind of reports is generated by the system. Patients History and prescriptions Doctors list Lab reports Daily Monthly Reports, Appointment list of Patients for Kiosk Managers Authentication: Authentication is nothing but providing security to the system. Here every must enter into the system throw login page. The login page will restrict the UN authorized users. A user must provide his credential like user Id and password for log into the system. For that the system maintains data for all users. Whenever a user enters his user id and password, it checks in the database for user existence. If the user is exists he can be treated as a valid user. Otherwise the request will throw back. 2.4 System Requirement Specifications Hardware Requirements: PIV 2.8 GHz Processor and Above RAM 512MB and Above HDD 40 GB Hard Disk Space and Above Software Requirements: WINDOWS OS (XP / 2000 / 200 Server / 2003 Server) Visual Studio .Net 2008 Enterprise Edition Internet Information Server 5.0 (IIS) Visual Studio .Net Framework (Minimal for Deployment) version 3.5 SQL Server 2005 Enterprise Edition 2.5 PROPOSED SYSTEM To debug the existing system, remove procedures those cause data redundancy, make navigational sequence proper. To provide information about users on different level and also to reflect the current work status depending on organization. To build strong password mechanism. NEED FOR COMPUTERIZATION We all know the importance of computerization. The world is moving ahead at lightning speed and everyone is running short of time. One always wants to get the information and perform a task he/she/they desire(s) within a short period of time and too with amount of efficiency and accuracy. The application areas for the computerization have been selected on the basis of following factors: Minimizing the manual records kept at different locations. There will be more data integrity. Facilitating desired information display, very quickly, by retrieving information from users. Facilitating various statistical information which helps in decision-making? To reduce manual efforts in activities that involved repetitive work. Updating and deletion of such a huge amount of data will become easier. FUNCTIONAL FEATURES OF THE MODEL As far as the project is developed the functionality is simple, the objective of the proposal is to strengthen the functioning of Audit Status Monitoring and make them effective and better. The entire scope has been classified into five streams knows as Coordinator Level, management Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will cover the information needs with respect to each request of the user group viz. accepting the request, providing vulnerability document report and the current status of the audit. 2.6 INPUT AND OUTPUT The major inputs and outputs and major functions of the system are follows: Inputs: Admin enter his user id and password for login Admin accept the Doctor registration. User enters his user id and password for login. Patient registers for the Appointment. New user gives his completed personnel, address and phone details for registration. Administrator giving information to generate various kinds of reports. Outputs: Admin can have his own home page. Admin get all Doctors details. Admin can view all Patients details. Users enter their own home page. Admin will get the login information of a particular user. The new users data will be stored in the centralized database. Admin get the search details of different criteria. Different kind of reports is generated by administrator. 2.7 PROCESS MODEL USED WITH JUSTIFICATION ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICAION The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) The user identification is that which is required by the server for access to its file system. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). PASSWORD (PASS) This command must be immediately preceded by the user name command, and, for some sites, completes the users identification for access control. Since password information is quite sensitive, it is desirable in general to mask it or suppress type out. Feasibility Report Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility 3.1. TECHNICAL FEASIBILITY The technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System. The current system developed is technically feasible. It is a web based user interface for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available in-house at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. 3.2. OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned out into information system. That will meet the organizations operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits? This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and user requirements have been taken into consideration. So there is no question of resistance from the users that can undermine the possible application benefits. The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. 3.3. ECONOMICAL FEASIBILITY A system can be developed technically and that will be used if installed must still be a good investment for the organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain. SOFTWARE REQUIREMENT SPECIFICATION The software, Site Explorer is designed for management of web sites from a remote location. INTRODUCTION Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. DEVELOPERS RESPONSIBILITIES OVERVIEW: The developer is responsible for: Developing the system, which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at clients location after the acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. Conducting any user training that might be needed for using the system. Maintaining the system for a period of one year after installation. 4.1. FUNCTIONAL REQUIREMENTS OUTPUT DESIGN Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the Users main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly. OUTPUT DEFINITION The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example Will decimal points need to be inserted Should leading zeros be suppressed. Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies. INPUT DESIGN Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user. INPUT STAGES: The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction INPUT TYPES: It is necessary to determine the various types of inputs. Inputs can be categorized as follows: External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue. INPUT MEDIA: At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability Keeping in view the above description of the input types and input media, it can be said that most of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the user, the keyboard can be considered to be the most suitable input device. ERROR AVOIDANCE At this stage care is to be taken to ensure that input data remains accurate form the stage at which it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by means of careful control each time the data is handled. ERROR DETECTION Even though every effort is make to avoid the occurrence of errors, still a small proportion of errors is always likely to occur, these types of errors can be discovered by using validations to check the input data. DATA VALIDATION Procedures are designed to detect errors in data at a lower level of Primary Healthcare Web Technology Application Primary Healthcare Web Technology Application Primary health care ABSTRACT Primary Health Care is committed to helping patients take control of their health. This system is virtual, but our physicians and their dedication is real. Using secure, web-based technologies provided by Medical Web, our health-care providers offer advice and treatment for a variety of conditions. Patients can communicate securely and confidentially with our physicians throughout the treatment process using our messaging system. As a physician-owned company, we are committed to helping our patients receive the utmost care and medical attention. Primary Health Care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.1 INTRODUCTION TO PROJECT Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. ORGANIZATION PROFILE Software Solutions is an IT solution provider for a dynamic environment where business and technology strategies converge. Their approach focuses on new ways of business combining IT innovation and adoption while also leveraging an organizations current IT assets. Their work with large global corporations and new products or services and to implement prudent business and technology strategies in todays environment. Xxxxxxxs RANGE OF EXPERTISE INCLUDES: Software Development Services Engineering Services Systems Integration Customer Relationship Management Product Development Electronic Commerce Consulting IT Outsourcing We apply technology with innovation and responsibility to achieve two broad objectives: Effectively address the business issues our customers face today. Generate new opportunities that will help them stay ahead in the future. THIS APPROACH RESTS ON: A strategy where we architect, integrate and manage technology services and solutions we call it AIM for success. A robust offshore development methodology and reduced demand on customer resources. A focus on the use of reusable frameworks to provide cost and times benefits. They combine the best people, processes and technology to achieve excellent results consistency. We offer customers the advantages of: SPEED: They understand the importance of timing, of getting there before the competition. A rich portfolio of reusable, modular frameworks helps jump-start projects. Tried and tested methodology ensures that we follow a predictable, low risk path to achieve results. Our track record is testimony to complex projects delivered within and evens before schedule. EXPERTISE: Our teams combine cutting edge technology skills with rich domain expertise. Whats equally important they share a strong customer orientation that means they actually start by listening to the customer. Theyre focused on coming up with solutions that serve customer requirements today and anticipate future needs. A FULL SERVICE PORTFOLIO: They offer customers the advantage of being able to Architect, integrate and manage technology services. This means that they can rely on one, fully accountable source instead of trying to integrate disparate multi vendor solutions. SERVICES: Xxx is providing its services to companies which are in the field of production, quality control etc with their rich expertise and experience and information technology they are in best position to provide software solutions to distinct business requirements. 1.2 PURPOSE OF THE PROJECT The project is fully integrated with Customer Relationship Management (CRM) solution and developed in a manner that is easily manageable, time saving and relieving one form semi automated. Primary health care delivers quality healthcare through innovative services. Using secure, web-based technologies provided by Medical Web, our physicians provide advice and treatment for a variety of healthcare conditions. Our services include: Treatment of Non-emergent Conditions Mental Health Naturopathic Advice Remedies Physician Advice Laboratory Interpretations All of our services are provided through the Internet in a secure and confidential manner. A secure communication portal is established between the patient and a Primary health care provider to allow one-on-one interaction. Physicians can discuss treatment options with patients and patients can respond. By building a trusting relationship, Primary health care can effectively provide a direct benefit to each and every patient. 1.3 PROBLEM IN EXISTING SYSTEM The existing system is a manual system. Here the User of the system needs to save his information in the form of excel sheets or Disk Drives. There is no sharing is possible if the data is in the form of paper or Disk drives. There is no online appointment facility. The manual system gives us very less security for saving data; some data may be lost due to mismanagement. There is no rich user interface. Its a limited system and fewer users friendly. There is no email facility. Searching of particular information is very critical it takes lot of time. The users cannot able to restrict the information. There is no report generation. SOLUTION OF THESE PROBLEMS The development of the new system objective is to address the solutions for the drawbacks of existing problem domain. Using this new system the patient can register for making online appointment with doctor. For interaction between patient and doctor chatting has provided. By this facility patient would chat with doctor. The development of this new system contains the following activities, which try to automate the entire process keeping in the view of database integration approach. User Friendliness is provided in the application with various controls provided by system Rich User Interface. This system provides online appointment facility. The system makes the overall project management much easier and flexible. It can be accessed over the Intranet. It provides email facility. The user information files can be stored in centralized database which can be maintained by the system. his can give the good security for user information because data is not in client machine. Authentication is provided for this application only registered users can access. It provides search facility. There is no risk of data management at any level while the project development is under process. Report generation features is provided to generate different kind of data reports. SYSTEM ANALYSIS 2.1 INTRODUCTION After analyzing the requirements of the task to be performed, the next step is to analyze the problem and understand its context. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. Both the activities are equally important, but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult, improper understanding of present system can lead diversion from solution. 2.2 ANALYSIS MODEL SDLC METHDOLOGIES This document play a vital role in the development of life cycle (SDLC) as it describes the complete requirement of the system. It means for use by developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. SPIRAL MODEL was defined by Barry Boehm in his 1988 article, â€Å"A spiral Model of Software Development and Enhancement. This model was not the first model to discuss iterative development, but it was the first model to explain why the iteration models. As originally envisioned, the iterations were typically 6 months to 2 years long. Each phase starts with a design goal and ends with a client reviewing the progress thus far. Analysis and engineering efforts are applied at each phase of the project, with an eye toward the end goal of the project. The steps for Spiral Model can be generalized as follows: The new system requirements are defined in as much details as possible. This usually involves interviewing a number of users representing all the external or internal users and other aspects of the existing system. A preliminary design is created for the new system. A first prototype of the new system is constructed from the preliminary design. This is usually a scaled-down system, and represents an approximation of the characteristics of the final product. A second prototype is evolved by a fourfold procedure: Evaluating the first prototype in terms of its strengths, weakness, and risks. Defining the requirements of the second prototype. Planning an designing the second prototype. Constructing and testing the second prototype. At the customer option, the entire project can be aborted if the risk is deemed too great. Risk factors might involved development cost overruns, operating-cost miscalculation, or any other factor that could, in the customers judgment, result in a less-than-satisfactory final product. The existing prototype is evaluated in the same manner as was the previous prototype, and if necessary, another prototype is developed from it according to the fourfold procedure outlined above. The preceding steps are iterated until the customer is satisfied that the refined prototype represents the final product desired. The final system is constructed, based on the refined prototype. The final system is thoroughly evaluated and tested. Routine maintenance is carried on a continuing basis to prevent large scale failures and to minimize down time. The following diagram shows how a spiral model acts like: 2.3 STUDY OF THE SYSTEM In the flexibility of the uses the interface has been developed a graphics concept in mind, associated through a browser interface. The GUIS at the top level have been categorized as Administrative user interface The operational or generic user interface The administrative user interface concentrates on the consistent information that is practically, part of the organizational activities and which needs proper authentication for the data collection. The interfaces help the administrations with all the transactional states like Data insertion, Data deletion and Data updating along with the extensive data search capabilities. The operational or generic user interface helps the users upon the system in transactions through the existing data and required services. The operational user interface also helps the ordinary users in managing their own information helps the ordinary users in managing their own information in a customized manner as per the assisted flexibilities NUMBER OF MODULES The system after careful analysis has been identified to be presented with the following modules: Administrator Managers Doctors Patients General Public Web Registration Search Reports Authentication Administrator Administrator is treated as a super user in this system. He can have all the privileges to do anything in this system. He is the person who received the Profile of a Doctor and accept/reject the registration. He is the person who receives the Complaints from the Patient and redirects to respective Doctor for response. He should have a facility to communicate using chat, email facility with other stakeholders. He should take care of Backup of Patient, Doctor details and maintain history. He should able to add Rooms availability and Ambulance details into the site for each Hospital. Another tasks done by the administrator is he can generates reports, log files, backup, recovery of data any time. Doctors He should able to see a Patients appointment details on a particular date. Also if the Patient is already visited, able to see the previous Prescription given the Patient, Disease History, Visiting details, etc. They should be able to see the Feedback given by the Patient. They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. Patients They should have a facility to register to the site with their Personal data along with Health details Height, Weight, Family inherited Diseases, Blood Group, etc. Being a Patient (after registration) should able to take an Appointment of a Doctor visit. They should have a facility to give Complaints about Kiosk Manager or Doctor service. They should able to Search for a Doctor and can see the Doctors Profile for an appointment. They should able to book Rooms or make request for an Ambulance to Kiosk Manager Managers He should be able to provide an Appointment of a Doctor to a Patient on request (based on Doctors available timings). They should be able to see the Complaints given by the Patient and must provide the Response for that. He should have a facility to communicate using chat, email facility with other stakeholders. They should have a Search facility to find a Patient or Doctor and can check their Profile or History details. He should to receive the Rooms Booking or request for an Ambulance of a particular Hospital and make arrangement/approve the same for a Patient. General Public General Public (i.e. Guest visitors) should able to access the site Home page, Registration Page, etc. common pages of the site. This user should able to see the Doctors Schedules, Contact details, Specialization details, etc. They should able to Search for a Doctor. They should able to see the Rooms available, Ambulance availability of a particular Hospital. Web Registration The system has a process of registration. Every User need to submit his complete details in the form of registration. Whenever a User registration completed automatically he/she can get a user id and password. By using that user id and password he/she can log into the system. Search: This system provides search facility to the patients. Patient can search for Doctors and their available timings for take appointments Reports Different kind of reports is generated by the system. Patients History and prescriptions Doctors list Lab reports Daily Monthly Reports, Appointment list of Patients for Kiosk Managers Authentication: Authentication is nothing but providing security to the system. Here every must enter into the system throw login page. The login page will restrict the UN authorized users. A user must provide his credential like user Id and password for log into the system. For that the system maintains data for all users. Whenever a user enters his user id and password, it checks in the database for user existence. If the user is exists he can be treated as a valid user. Otherwise the request will throw back. 2.4 System Requirement Specifications Hardware Requirements: PIV 2.8 GHz Processor and Above RAM 512MB and Above HDD 40 GB Hard Disk Space and Above Software Requirements: WINDOWS OS (XP / 2000 / 200 Server / 2003 Server) Visual Studio .Net 2008 Enterprise Edition Internet Information Server 5.0 (IIS) Visual Studio .Net Framework (Minimal for Deployment) version 3.5 SQL Server 2005 Enterprise Edition 2.5 PROPOSED SYSTEM To debug the existing system, remove procedures those cause data redundancy, make navigational sequence proper. To provide information about users on different level and also to reflect the current work status depending on organization. To build strong password mechanism. NEED FOR COMPUTERIZATION We all know the importance of computerization. The world is moving ahead at lightning speed and everyone is running short of time. One always wants to get the information and perform a task he/she/they desire(s) within a short period of time and too with amount of efficiency and accuracy. The application areas for the computerization have been selected on the basis of following factors: Minimizing the manual records kept at different locations. There will be more data integrity. Facilitating desired information display, very quickly, by retrieving information from users. Facilitating various statistical information which helps in decision-making? To reduce manual efforts in activities that involved repetitive work. Updating and deletion of such a huge amount of data will become easier. FUNCTIONAL FEATURES OF THE MODEL As far as the project is developed the functionality is simple, the objective of the proposal is to strengthen the functioning of Audit Status Monitoring and make them effective and better. The entire scope has been classified into five streams knows as Coordinator Level, management Level, Auditor Level, User Level and State Web Coordinator Level. The proposed software will cover the information needs with respect to each request of the user group viz. accepting the request, providing vulnerability document report and the current status of the audit. 2.6 INPUT AND OUTPUT The major inputs and outputs and major functions of the system are follows: Inputs: Admin enter his user id and password for login Admin accept the Doctor registration. User enters his user id and password for login. Patient registers for the Appointment. New user gives his completed personnel, address and phone details for registration. Administrator giving information to generate various kinds of reports. Outputs: Admin can have his own home page. Admin get all Doctors details. Admin can view all Patients details. Users enter their own home page. Admin will get the login information of a particular user. The new users data will be stored in the centralized database. Admin get the search details of different criteria. Different kind of reports is generated by administrator. 2.7 PROCESS MODEL USED WITH JUSTIFICATION ACCESS CONTROL FOR DATA WHICH REQUIRE USER AUTHENTICAION The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) The user identification is that which is required by the server for access to its file system. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). PASSWORD (PASS) This command must be immediately preceded by the user name command, and, for some sites, completes the users identification for access control. Since password information is quite sensitive, it is desirable in general to mask it or suppress type out. Feasibility Report Preliminary investigation examine project feasibility, the likelihood the system will be useful to the organization. The main objective of the feasibility study is to test the Technical, Operational and Economical feasibility for adding new modules and debugging old running system. All system is feasible if they are unlimited resources and infinite time. There are aspects in the feasibility study portion of the preliminary investigation: Technical Feasibility Operational Feasibility Economical Feasibility 3.1. TECHNICAL FEASIBILITY The technical issue usually raised during the feasibility stage of the investigation includes the following: Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required to use the new system? Will the proposed system provide adequate response to inquiries, regardless of the number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data security? Earlier no system existed to cater to the needs of ‘Secure Infrastructure Implementation System. The current system developed is technically feasible. It is a web based user interface for audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databases purpose is to create, establish and maintain a workflow among various entities in order to facilitate all concerned users in their various capacities or roles. Permission to the users would be granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy, reliability and security. The software and hard requirements for the development of this project are not many and are already available in-house at NIC or are available as free as open source. The work for the project is done with the current equipment and existing software technology. Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number of users using the system. 3.2. OPERATIONAL FEASIBILITY Proposed projects are beneficial only if they can be turned out into information system. That will meet the organizations operating requirements. Operational feasibility aspects of the project are to be taken as an important part of the project implementation. Some of the important issues raised are to test the operational feasibility of a project includes the following: Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application benefits? This system is targeted to be in accordance with the above-mentioned issues. Beforehand, the management issues and user requirements have been taken into consideration. So there is no question of resistance from the users that can undermine the possible application benefits. The well-planned design would ensure the optimal utilization of the computer resources and would help in the improvement of performance status. 3.3. ECONOMICAL FEASIBILITY A system can be developed technically and that will be used if installed must still be a good investment for the organization. In the economical feasibility, the development cost in creating the system is evaluated against the ultimate benefit derived from the new systems. Financial benefits must equal or exceed the costs. The system is economically feasible. It does not require any addition hardware or software. Since the interface for this system is developed using the existing resources and technologies available at NIC, There is nominal expenditure and economical feasibility for certain. SOFTWARE REQUIREMENT SPECIFICATION The software, Site Explorer is designed for management of web sites from a remote location. INTRODUCTION Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process. DEVELOPERS RESPONSIBILITIES OVERVIEW: The developer is responsible for: Developing the system, which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at clients location after the acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. Conducting any user training that might be needed for using the system. Maintaining the system for a period of one year after installation. 4.1. FUNCTIONAL REQUIREMENTS OUTPUT DESIGN Outputs from computer systems are required primarily to communicate the results of processing to users. They are also used to provides a permanent copy of the results for later consultation. The various types of outputs in general are: External Outputs, whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the Users main interface with the computer. Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly. OUTPUT DEFINITION The outputs should be defined in terms of the following points: Type of the output Content of the output Format of the output Location of the output Frequency of the output Volume of the output Sequence of the output It is not always desirable to print or display data as it is held on a computer. It should be decided as which form of the output is the most suitable. For Example Will decimal points need to be inserted Should leading zeros be suppressed. Output Media: In the next stage it is to be decided that which medium is the most appropriate for the output. The main considerations when deciding about the output media are: The suitability for the device to the particular application. The need for a hard copy. The response time required. The location of the users The software and hardware available. Keeping in view the above description the project is to have outputs mainly coming under the category of internal outputs. The main outputs desired according to the requirement specification are: The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the screen. Keeping in view these outputs, the format for the output is taken from the outputs, which are currently being obtained after manual processing. The standard printer is to be used as output media for hard copies. INPUT DESIGN Input design is a part of overall system design. The main objective during the input design is as given below: To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user. INPUT STAGES: The main input stages can be listed as below: Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction INPUT TYPES: It is necessary to determine the various types of inputs. Inputs can be categorized as follows: External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue. INPUT MEDIA: At this stage choice has to be made about the input media. To conclude about the input media consideration has to be given to; Type of input Flexibility of format Speed Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability Keeping in view the above description of the input types and input media, it can be said that most of the inputs are of the form of internal and interactive. As Input data is to be the directly keyed in by the user, the keyboard can be considered to be the most suitable input device. ERROR AVOIDANCE At this stage care is to be taken to ensure that input data remains accurate form the stage at which it is recorded up to the stage in which the data is accepted by the system. This can be achieved only by means of careful control each time the data is handled. ERROR DETECTION Even though every effort is make to avoid the occurrence of errors, still a small proportion of errors is always likely to occur, these types of errors can be discovered by using validations to check the input data. DATA VALIDATION Procedures are designed to detect errors in data at a lower level of