Friday, June 7, 2019

Unemployment Among University Graduates in Malaysia. Essay Example for Free

Un workplace Among University Graduates in Malaysia. EssayToday, we can see the unemployed graduates become increase until the certain parties have to destination this situation. The finding of the Ministrys Graduate Tracer Study 2006, 30. 7% of graduates remained unemployed six months after convocation, while 5. 7% were still waiting job placement . According to the diplomatic minister of Human Resources, the routine of unemployment female graduates is also much higher(prenominal) on comparison male graduates.In view of this, there is a pressing motivating for the education authorities and employers to look into the cause of unemployment among new university graduates and find solution to address this problem. Firstly, the cause of unemployed graduates nowadays is the repugnance in the focus of higher education institutions and the needs of labor market. The reason for that is lack in compatibility as compared to the situation twenty years ago. In addition, there is an inc rease of competitiveness and irritability in the labor market.The work environment nowadays require graduates to have some work mystifys in order to the requirement of qualified employee. Besides that, incompatibility in the knowledge acquired in higher education institution is one of the factor. The second reason is lack of experiences and skills among the university graduates. Most of organizations today prefer to have graduates with experience to ensure the employers sustain their economic competitiveness.The number of unemployed female graduates is much higher in comparison male graduates. Moreover, those graduates with essential skills are more favourite(a) compared to them who does not have any skills. They also should have proficiency in English. Other than that, university graduates have to possess their interpersonal skills in order to decrease the number of unemployment among them. One of the most appropriate way on how to overcome this problem is the responsible author ities should introduce programmes for fresh graduates.The Ministry of Human Resources Unemployed Graduates Training proposal is an example of training programme that is used to equip graduates with certain skills and experience . Furthermore, it is maintains that we should have the Ministry of Domestic Trade and Consumer Affairs recruitment programme to provide employment opportunities to graduates. Besides that, this programme is to expose graduates to opportunities in the private sectors. The last solution for unemployment among university graduates is the Ministry should review the tertiary education system.This includes the development of soft skills through extra curricular activities. This kind of activities not only to build character but to enhance interpersonal skills. In addition, it also develops a critical and creative thinking among those graduates. It is fundamental for a student to begin accumulating as much work related experience as early as they can. Moreover, th e Ministry must continually stimulates students minds through discussions and try case studies in order to help higher institutions produce high quality graduates.In conclusion, there are certain factors that leads to unemployment among university graduates in Malaysia such as mismatch in the focus of higher education and the needs of labor market, and those graduates have low experience and skill. There are many ways to address this situation for example provide specific and extra training to graduates to fulfill industrys needs, and enhance the management education system. Hopefully, this problem can be defeat slowly in order to expand the economy of our country.

Thursday, June 6, 2019

The Speckled Band Essay Example for Free

The Speckled telephone EssayLooking at The Speckled Band and two other stories comment on the way Conan Doyle uses the character Watson I the stories. I have read three stories of Sherlock Holmes, written by the famous author, Sir Conan Doyle. The three stories I have looked at are The Speckled Band, The Engineers Thumb and The worldly concern with the Twisted Lip. My main focus is on the character Dr Watson and how Doyle illustrates him.I screw that Dr Watson is affectionate by the way he approaches people, I saw this in The Engineers Thumb, when he is caring for Mr Hatherlys severed thumb, and how he treated it. Also in The Man with the Twisted Lip he cares for Kate Whitney and gives her advice to do about Isa because he has not been home for two days. He makes her feel comfortable when advising her we know this because it says in the textbook have some wine or water, and sit here comfortably and dissever us about it.Therefore it shows us that it is in his nature to tro op with people that are upset, and he is very good at doing it. Again in the The Man with the Twisted Lip when Kate comes to him late at night, because she is upset and call for advice, in the text it quotes I want the Doctors advice and help this immediately tells me and the audience that people seek Watson for help. Quote from the text we soothed and comforted her, again it tells us that he is kind I fri polish offly.Through this I kind of get the feeling that many people in the Sherlock Holmes stories people, made visits to Watson for advice, because he was a skillful and comfortable man to talk to and didnt push you quick so he could see another client, and understood how the client must feel. He is very partial(p) of Holmes and id a very good companion as he always does investigations with Holmes I refer to this in The Speckled Band when Holmes is at the end of go to sleep and tells Watson about a client and a investigation they are going to have to look into an investigati on and he replies I would not miss it for anything.This tells me that he will always be there for Holmes to help him out, in my words an acolyte. When you have a friend then you must have trust in the friend so Watson has a great level of trust in Holmes. Holmes is not the brightest person either as it is always Holmes that work out the investigation, as Holmes realised what the speckled band was in the The Speckled Band. He realised that it was a snake that was killing people, and it was one of the pets Dr Grimesby Roylott which he had brought over from India.Watson has no maintenance really either as he entered the room with the snake in which could kill people in a bite most people would charge to enter a room with something this deadly. Throughout the stories of Sherlock Holmes Watson appears to be the narrator, he tells the story as it goes along from what he sees of it and tells about his and Holmes investigations, but never works them out for himself, only when Holmes says the result of the investigation he realises.We know this by in The Man with the Twisted Lip he is saying what is going on We heard the door open this is just as the story goes and it tells us he is the narrator as when he speaks it is in speech marks. This tells us that Watson is notification the story for us, in other words the narrator. When Watson narrates though his voice is not impersonal to Holmes as he does have the greatest respect for him, we can tell this by when Holmes is at the end of his bed in The Speckled Band he narrates just a little resentment, for I was in myself in level(p) habits.This does not show hate to Holmes it just shows a bit of annoyance as he is at the end of the bed, when Watson is waking up in the morning, and Holmes is sightedness him do habits which everybody does when they wake in the morning. I can tell through this that he does not seem too pleased about Holmes at the end of the bed, but still even though he is he shows a lot of respect to Ho lmes.

Wednesday, June 5, 2019

Reversible Data Hiding on Color Images

rechargeable Data Hiding on Color ImagesREVERSIBLE DATA HIDING ON COLOR IMAGES USING DIFFERENCE HISTOGRAM qualifyingSubash David AAbstractData embedding is done by molding these selected coefficients of the modified zepband histograms. We present a high capacity correctable watermarking scheme apply the technique of difference average prize coefficients of project blocks by using the tool Matlab. This scheme takes advantage of difference average value coefficients, which permits low distortion amidst the watermarked run into and the current one caused by the LSB bit replacement operations of the watermarking technique specifically in the embedding process. By the proposed approach, compared with the conventional one-dimensional difference-histogram and one-dimensional prediction-error-histogram- found RDH methods 3 20, the image redundancy can be better exploited and an improved embedding performance is achieved.Keywords DPM, Histogram, LSB, Matlab, RDH, Watermarking,I .INTRODUCTIONFor most image info covert methods 1, the host image is permanently falsify and it can zero(prenominal) be restored from the marked content. But in some applications such as medical image sharing multimedia archive management and image trans-coding whatever distortion imputable to info embedding is intolerable and the availability of the original image is in high demand. To this end, a solution called reversible info hiding (RDH) is proposed, in which the host image can be fully restored after data embedding. RDH is a hybrid method which combines various techniques to ensure the reversibility. Its feasibility is mainly due to the lossless compressibility of natural images.Many RDH methods 10 have been proposed in recent years, e.g., the methods based on lossless compression, difference expansion (DE), histogram shifting (HS), and whole number render 5, etc. Many researchers algorithm plays as an important work of RDH. In DE algorithm, the host image is divided in to pixel pairs, and the difference value of two pixels in a pair is expanded to carry one data bit.All these methods aim at increasing the embedding capacity (EC) as high as come-at-able while keeping the distortion low. This method can provide an embedding rate (ER) up to 0.5 bits per pixel (BPP) and it outperforms the previous compression based works.For the proposed method, by con arrayring a pixel-pair and its context, a local image region is projected to a two-dimensional space to obtain a sequence of images that consisting of difference pixel variant pairs. because, a two-dimensional difference histogram is then generated by counting the difference-pairs. Here, the DPM is an injective mapping defined on difference-pairs, and it is a natural extension of expansion embedding and shifting techniques used in sure histogram-based methods.Finally, reversible data embedding is implemented according to a specifically designed difference-pair-mapping (DPM). By using the two-dimens ional difference-histogram and this specific DPM, compared with the conventional one-dimensional histogram based methods, more than pixels are used for carrying data while the number of shifted pixels is reduced as well, and thus an improved embedding performance is thus achieved.A new reversible stylemark technique for images embeds a significant amount of data while keeping high visual role. In order to verify the integrity of the image, we use a cryptographic hash function. The hash code is combined with a binary logo image by a bit-wise exclusive LSB replacement 9 or as well as difference pixel pair matching based on histogram matching technique in the difference image from the original image. On the other hand, a half the number of pixels of the image are added or subtracted by 1. Thus, the classification of pixels and also the terminal classification of the zeroth pixel and the extreme pixel are compared and shown together.II.PROPOSED WORK2.1. correctable Data HidingThe r eversible data hiding 1 7 in encrypted image is investigated. nigh of the work on reversible data hiding focuses on the data embedding/extracting 20 on the plain spatial domain. But, in some applications, an inferior assistant or a channel decision maker hopes to append some additional essence, such as the origin information, image notation or hallmark data, within the encrypted image though he does not know the original image content.And it is also hopeful that the original content should be recovered without any error after image decryption and message line of descent at receiver side. This presents a practical scheme satisfying the above-mentioned requirements. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content.Most of the existing watermarking algorithms are lossy. Permanent distortion is introduced into the host image d uring the embedding process and results in Peak Signal-to-Noise Ratio (PSNR) loss. In some applications such as legal, military and medical imaging, permanent loss of signal fidelity is not allowed. This highlights the necessity of lossless/reversible data hiding which can recover the original host signal perfectly after the watermark extraction.However, the payload of the reversible watermarking is typically lower than that of lossy watermarking algorithms. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the infix data and recover the original image according to the data-hiding key. In the scheme, the data extraction is not separable from the content decryption. In other words, the additional data must be extracted from the decrypted image, so that the principal content of original image is revealed ahead data extraction, and, if someone has the data-hiding key but not the encryption key, he ca nnot extract any information from the encrypted image containing additional data.In applications that image retrenchment is required the embedded information is extracted from the received image using lossless data hiding extraction method before the transcoding process. A thin progress location map is formed as side information for the image enhancement process.During image resizing, we divide the image into N x N blocks (for simplicity, meet N is a positive whole number larger in value. To share medical images with some concomitant data, one approach involves adding, when allowed by the image commit format, some extra header information. Unfortunately, header files are prone to manipulation and information loss may occur during file format conversion. Most data contained in the header of a Digital Imaging and Communications in Medicine (DICOM).fig 1 Input Original ImageIn the presented data-based results, the algorithm is applied to each color component of three 512 512 RGB i mages, for all images such as Baboon, Lena, and Fruits setting T1 = T2 = T3 in all experiments. The embedding capacity depends on the nature of the image itself.In this case, the images with a lot of low frequencies contents produce more expandable triplets with lower distortion than high frequency images such as Baboon. In particular with Fruits, the algorithm is able to embed some amount of bits with a PSNR rate in dB, but with alone reduced bits image quality increases at some amount of PSNR value in dB.Location MappingThe number of subgroup points, depth of riffle transforms and overflow/underflow book-keeping data are the necessary side information that should be embedded into the high frequency transformation coefficients besides the secret data. Below mentioned figure shows the embedding image retrieving process. In the first block the integer wavelet transform is applied on the original image. Then the coefficients of high frequency subbands are used for constructing the subgroups.fig 2 Location MappingThen the data and side information is cabalistic. The stego image carrying hidden data will be obtained after inverse integer wavelet transform. In image convalescence system, the integer wavelet transform is applied on the stego image.Then by using the side information level of wavelet applying and the points of high frequency sub bands are used to construct the subgroups. In this step the data is retrieved. Then each subband histogram is inverse modified according to its subgroup points.Embedding the normal image by considering the pixel values achieved the concept of data hiding, secret data communication, etc. We need an image, an audio a text file, a entanglement source to be hidden or these sources can also be used to hide a particular data or any types of files. Data hiding, secret data communication, encrypting the data plays an important role in making telemedicine applications, secrecy in defense communication, etc.Each subband histogram is modified according to its subgroup coefficients. Now the subbands are ready for data embedding. The data embedding stage hides the data by subband coefficient processing. This type of flow is called reversible data hiding. The reverse process can take the same flow of acquiring the image as input and doing some of watermarking procedure to hide the secret data.fig 3 Image in which the secret data is kept hiddenHiding Retrieving back the Hidden Web SourceEach and every data (any data can be hidden for instance image, audio, text file, web source, etc.) Here we have done with some updations in making the data hiding process with the new algorithm of histogram and data hiding which is used for hiding a web source and retrieving it back. These use the algorithm of reversible data hiding and that the web source link will be saved in a particular place and it can be hidden in an image. Then after that the process of decrypting the watermarked image will be carried out. Herewith unde r shown are the retrieved image and the web source.fig 4 Extracted Original ImageA sorting technique is used in this method to record prediction-errors based on the magnitude of local variance, and a pixel will be prior embedded if it has a small local variance. This method performs well and it is captain to some typical RDH schemes.fig 5 Retrieved web link source from the Watermarked imageNow the inverse formula of data embedding is applied. After that inverse integer wavelet transform is applied to obtain the image. Now the side information tells us that the Overflow/Underflow post processing is required or not. The original image is obtained after this step.In the histogram modification process, the watermark is embedded into the modified difference image. The modified difference image is scanned. Once a pixel with the difference value of -1 or 1 is encountered, we check the watermark to be embedded.III.CONCLUSION DISCUSSIONThis work is an attempt to employ higher dimensional h istogram as a hierarchical watermarking process along the pair mapping histogram level. Compared with the previously introduced one-dimensional histogram based methods, our technique exploits the image repetition as far as good and it achieves an improved performance. Since only one pixel of a pixel-pair is allowed to be modified by 1 in value. This issue should be investigated in the future.Moreover, utilizing more suitable two-dimensional histogram and innovation more meaningful Difference Pair Mapping (in arrangement of pixels) to achieve the best embedding performance is also a valuable problem.If the bit to be embedded is 1, we move the difference value of -1 to -2 by subtracting one from the odd-line pixel or 1 to 2 by adding one to the odd-line pixel. This correlation makes the pair easier to satisfy small thresholds and, hence, to produce a large portion of selected expandable pairs. The major drawback of reversible data hiding algorithm, is the size of the binary map.IV.R EFERENCES1 Y. Q. Shi, Reversible data hiding, in Proc. IWDW, 2004, vol. 3304, pp. 112, ser. Springer LNCS.2 Y. Q. Shi, Z. Ni, D. Zou, C. Liang, and G. Xuan, Lossless data hiding fundamentals, algorithms and applications, in Proc. IEEE ISCAS, 2004, vol. 2, pp. 3336.3 G. Coatrieux, C. L. Guillou, J. M. Cauvin, and C. Roux, Reversible watermarking for knowledge digest embedding and reliability control in medical images, IEEE Trans. Inf. Technol. Biomed., vol. 13, no. 2, pp. 158165, Mar. 2009.4 M. Fontani, A. D. Rosa, R. Caldelli, F. Filippini, A. Piva, and M. Consalvo, Reversible watermarking for image integrity verification in hierarchical pacs, in Proc. 12th ACM Workshop on Multimedia and Security, 2010, pp. 161168.5 S. Lee, C. D. Yoo, and T. Kalker, Reversible image watermarking based on integer-to-integer wavelet transform, IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 321330, Sep. 2007.6 R. Li, O. C. Au, C. K. M. Yuk, S. Yip, and T. Chan, Enhanced image trans-coding usin g reversible data hiding, in Proc. IEEE ISCAS, 2007, pp. 12731276.7 K.-L. Chung, Y.-H. Huang, P.-C. Chang, and H.-Y. Liao, Reversible data hiding-based approach for intra-frame error concealment in H.264/AVC, IEEE Trans. Circuits Syst. Video Technol., vol. 20, no. 11, pp. 16431647, Nov. 2010.8 J. Fridrich, M. Goljan, and R. Du, Lossless data embeddingnew paradigm in digital watermarking, EURASIP J. Appl. Signal Process., vol. 2002, no. 2, pp. 185196, Feb. 2002.9 M. U. Celik, G. Sharma, A. M. Tekalp, and E. Saber, Lossless generalized- LSB data embedding, IEEE Trans. Image Process., vol. 14, no. 2, pp. 253266, Feb. 2005.10 J. Tian, Reversible data embedding using a difference expansion, IEEE Trans. Circuits Syst. Video Technol., vol. 13, no. 8, pp. 890896, Aug. 2003.11 A. M. Alattar, Reversible watermark using the difference expansion of a generalized integer transform, IEEE Trans. Image Process., vol. 13, no. 8, pp. 11471156, Aug. 2004.12 W. L. Tai, C. M. Yeh, and C. C. Chang, Rever sible data hiding based on histogram modification of pixel differences, IEEE Trans. Circuits Syst. Video Technol., vol. 19, no. 6, pp. 906910, Jun. 2009.13 Z.Ni, Y.Q. Shi, N. Ansari, andW. Su, Reversible data hiding, IEEE Trans. Circuits Syst. Video Technol., vol. 16, no. 3, pp. 354362, Mar. 2006.14 S. K. Lee, Y. H. Suh, and Y. S. Ho, Reversible image authentication based on watermarking, in Proc. IEEE ICME, 2006, pp. 13211324.18 M. Fallahpour, Reversible image data hiding based on gradient adjusted prediction, IEICE Electron. Express, vol. 5, no. 20, pp. 870876, Oct. 2008.19 W. Hong, T. S. Chen, and C. W. Shiu, Reversible data hiding for high quality images using modification of prediction errors, J. Syst. Software, vol. 82, no. 11, pp. 18331842, Nov. 2009.20 D. M. Thodi and J. J. Rodriguez, Expansion embedding techniques for reversible watermarking, IEEE Trans. Image Process., vol. 16, no. 3, pp. 721730, Mar. 2007.

Tuesday, June 4, 2019

Creatinine Clearance Test to Estimate Renal Function

Creatinine Clearance Test to Estimate Renal FunctionIntroductionKidney is a part of group of organs that constitute the urinary tract clay which consists of 2 kidneys, two ureters, bladder and urethra. The kidneys do the major function of the urinary system. The other parts of the system are mainly passageways and storage areas. The kidneys are reddish, bean-shaped structure and located just above the waist between the peritoneum and the posterior wall of abdomen. A typical kidney in an adult is 10-12 cm persistent, 5-7 cm wide and 3 cm thick and has a mass of 135-150 g.Under normal circumstances the two kidneys are able to do the fol milding functionsRegulating of merchandise line PH the kidneys excrete an amount of hydrogen ions (H+) and conserve bicarbonate (HCO3-). Regulating product line insistency the kidneys produce rennin, which activate the rennin-angiotensin-aldosterone pathways. Maintaining blood osmolarity by regulating loss of water supply system and loss of sol utes in the piss, the kidneys have got constant blood osmolarity.Regulating blood glucose the kidneys burn work the a minuteo acids glutamine in gluconegenesis. So they can release glucose into blood to help maintain a normal blood glucose level. Production of hormones calctirriol (active form of vitamin D) which helps regulate calcium homeostasis and erythropoietin which stimulates the production of red blood cells. Excreting waste and inappropriate substances by forming water supply which contains the waste substances that have no useful functions in the body.The above mentioned kidney functions based on the functional unit of the kidney called nephron. apiece kidney contains close 1 million nephrons. The nephron is a tube closed at one end and open at the other and in between it consists of Bowmans capsule, Glomerulus, Proximal problematical tubule, Loop of Henle, Distal convoluted tubule and store tubule. About 170-200 liters of water are filtered with the kidneys eve ryday, but about 1-2 liters are excreted from the body as water.To produce peeing, nephrons and collecting ducts perform three basic processesglomerular filtration water and most blood solutes in the blood plasma move across the wall of glomerular capillaries into the glomerular capsule and then into the renal tubule.Tubular reabsorption as filtered fluid f paltrys along the renal tubule and through the collecting duct, tubule cells reabsorb about 99% of filtered water and many solutes.Tubular secretion as the fluid flows along the tubule and through the collecting duct, the tubule and duct cells secrete other materials, such as wastes, drugs and excess ions into the fluid.Each kidney connects to bladder by ureter, which is tube like structure that provides drainage from the kidney to the bladder during the process of urine formation. Bladder acts by means of contraction to expel urine from the body. In order for the kidney to work properly the renal arteries deliver about 25% of resting cardiac out put.Glomerular filtration (GF) normally march ons at rate of about 120-150 ml/min. There are significant mightinesss which are involved in glomerular filtration, glomerular capillary blood pressure which induced a blood pressure within the glomerular capillary depending on the heart contraction and on the peripheral resistance provided by efferent arterioles. The other significant force is the plasma colloid osmatic pressure which occurs due to imperme efficiency to protein through the glomerulus. The permeability depends on the molecular size and the electrical charges. The positively supercharged molecules easily filtered than the negatively charged one because the glomerular endothelium layer carry negative charges that repel the protein particles and not allowing them to be filtered.In Bowmans capsule hydrostatic pressure, there pass on be senior high school force to push fluid out of Bowmans capsule into glomerulus. Any changes occur in these forces will lead to change in glomerular filtration rate (GFR).Glomerular filtration rate (GFR) is a measurement of the amount of glomerular filtrate (a substance similar to blood plasma but without proteins) organise in the kidneys each minute. It can be assessed by measuring the excretory ability and the substance level in plasma that freely filtered through the glomerulus. Some of the substances will not step to the fore in the glomerular filtrate unless they have reached a certain concentration in blood. Glucose is such a substance that does not appear in the urine until it reaches high concentration in the blood (11.0 mmol/L). Whereas other substances like creatinine excreted without appreciable reabsorption. Creatinine is an endogenous substance, an end product of nitrogen metabolism formed through a series of enzymatic reaction in the liver. The contraction of skeletal muscle involves both creatine and ATP (adenosine triphosphate) in the presence of creatine kinase enzyme. The creatin e formed from phosphocreatine gives the final end product creatinine which is instantly filtered at glomerulus without any tubelike reabsorption. Therefore creatinine can be use to rate the head ability of kidney, but it is not a perfect marker as it is secreted. This involves the measurement of substance concentration in urine and plasma using the pursuit headroom formula(U/P) * (V/T) = mls/minRenal failureDiseases affecting the kidneys can damage glomerular or tubular function. Failure of renal function may occur rapidly producing the syndrome of acute renal failure which is characterized by rapid loss of renal function with retention of urea, creatinine, hydrogen ions and other metabolic products. However inveterate renal failure organises often over many years leading to end-stage of renal failure where patients require either long term dialysis or a successful renal transplant to survive. Diabetes and hypertension are the two commonest causes of chronic renal failure wit h other causes including glomerulonephritis of any typeAim of the campaignTo estimate renal function in two different patients using creatinine clearance test.Materials and methodPlease refer to medical biochemistry practical book (BMS2).ResultThe comparison obtained from the re demo used for the calculation of creatinine concentration isY = 0.0008 XWhere Y = absorbance X = concentration of creatinine in umol/L.P 1 X = 0.073/0.0008 = 91.25 umol/LP 2 X = 0.346/0.0008 = 432 umol/LU 1 X = 0.621/0.0008 = 776.25 x 21 = 16301.25 umol/LU 2 X = 0.736/0.0008 = 468.75 x 21 = 9843.75 umol/LKeyP1 is plasma of patient 1.P2 is plasma of patient 2.U1 is urine sample of patient 1U2 is urine sample of patient 2Therefore the creatinine clearance is calculated by using the following formula(U/P) * (V/T) mls/minU = urine creatinine umol/LP = plasma creatinine umol/LV = volume of urine passed in given timeT = time of collectionCreatinine clearance for patient 1= 16301.25/91.25 * 1000/1440= 211.438 * 0.694= 124 mls/minCreatinine clearance for patient 2= 9843.75/ 432 * 3000/1440= 22.786 * 2.083= 47.46 mls/minConclusionFrom the above gives I conclude that patient 1 has got normal renal function whereas patient 2 has renal failure.DiscussionThe creatinine calibration graph shows good linearity which indicates that the patients results obtained are correct.The clearance test more often concern about how much of a specific substance the kidney can set aside from a given volume of blood in a verbalise period. In this experiment the creatinine clearance test was used to estimate GFR in two different patients based on the principle of Jaffe reaction (picric acid with alkaline solution from red to orange complex). A standard curve was produced using the absorbance interpreting against the standard concentration. A straight linear relationship obtained which means that as the optical density increase the creatinine concentration will increase. The equation obtained from the graph (Y = 0.0008 X) is used to calculate the plasma and urine creatinine concentration of two patients.The plasma creatinine concentration for patient 1 is 91.25 umol/L, which means it is within the normal honorable mention ranges (adult 60-120 umol/L).Marshal, (2000). Also the urine creatinine concentration (19293.75umol/L) for the same patient support the plasma concentration in which simply means that creatinine excretion by kidney was regularly. In contrast, patient 2 has got increase plasma creatinine concentration when compared with normal reference range which is 432 umol/L. That means the creatinine being not filtered regularly into urine.There is no history of patient is provided and it is not stated whether the patient is male or female which can aid the diagnosis. However, there is not much difference between male and female normal reference ranges (adult 60-120 umol/L).The clinical data are good in detecting the presence of renal disorder, by its effect on renal function and is in assessing its get ahead but they will not assess the determination of the cause of the disease. Therefore several factors should be kept in mind when doing creatinine estimation. These factors are there will be reduced creatinine concentration in children, women and during pregnancy. Meals which contain meat will raise plasma creatinine, also certain drugs (e.g. salicylates, cimetidine) increase plasma creatinine by inhibiting tubular secretion of creatinine.From the result, it is noticeable that patient 1 has got normal creatinine clearance (124 mls/min) when compared with the reference ranges. This means that this patient got normal GFR and normal renal functioning units.The creatinine clearance for patient 2 is very low (47.4 mls/min) when compared with the normal reference range and with patient 1 who has normal GFR. As mentioned earlier the plasma creatinine was high and the urine creatinine was low for this patient which gives strong suggestion that this patient represent with kidney rowdiness mostly chronic failure. Although the clinical finding help the diagnosis, but the requirement of further test is needed to identify the cause and to confirm disorder.Renal failure is divided into two types, acute renal failure and chronic renal failure. An acute attempt is severe enough to cause kidney failure and is characterized by oliguria (less urine). The major cause of acute failure is tubular necrosis. Other common causes are loss of big amount of blood during accident or surgery, toxic drugs and poising e.g. lead, or infection. Acute renal failure may develop delayingly to a chronic renal failure.Chronic renal failure occurs when disease or disorder damages the kidneys so that they can no longer remove fluids and wastes from the body or maintain proper levels of kidney-regulated chemicals in the bloodstream. The four most common causes of chronic kidney failure areDiabetes Diabetes Mellitus (DM), both insulin dependent (IDDM) and non-insulin depend ent (NIDDM), occurs when the body cannot produce and/or use insulin, the hormone which is necessary for the body to process glucose. Long-term diabetes may cause the glomeruli to gradually loss function. In fact, progression may be slow gradual which means the symptoms do not occur until the GFR falls below 15 ml/min. Marshal, (2000).High blood pressure hypertension is both cause and result of kidney failure. The kidney can become stressed and ultimately sustain permanent damage from blood pushing through them at excessive pressure over long periods of time.Glomerulonephritis is an inflammation of glomeruli, or filtering units of the kidney. The filter in glomerulus is damaged often small holes are made mostly due to streptococcal infection.Polycystic kidney disease it is an inherited disorder that causes cysts to form in the kidneys. These cysts impair the regular functioning of the kidney. Less common causes of chronic kidney failure are kidney cancer, obstructions such as kidney gems, pyelonephtitis.Initially, symptoms of chronic kidney failure develop slowly. Even individuals with mild to moderate kidney failure may have few symptoms in spite of increased urea in their blood. Among sings and symptoms that may be present at this point are frequent urination during the night and high blood pressure. Most symptoms of chronic kidney failure are not apparent until kidney disease has progressed significantly. Common symptoms areAnaemia The kidneys are responsible for production of erythropoietin, a hormone that stimulates red cell production. If the kidney disease causes shrinking of the kidney, the red cell production is hampered.Bone and joint problems The kidneys produce vitamin D, which help in absorption of calcium and keeps bones strong. In patients with kidney failure, bones may become brittle, and in children, normal harvest-time may be stunted. Joint pain may also occur as a result of unchecked phosphate levels in the blood.Foamy or bloody urine Prote in in the urine may cause it to foam significantly. Blood in the urine may indicate bleeding from diseased or obstructed kidneys, bladder, or ureter.Hypertension or high blood pressure The retention of fluids and sodium causes blood volume to increase, which in turn causes blood pressure to rise.Low back pain Pain where the kidneys are located, in the small of the back below the ribs.Nausea, loss of appetite and vomiting Urea in the stomachal juices may cause upset stomach and this can lead to malnutrition and weight loss.QuestionsWhat protein would not be detected by dip sticks, and how would you detect it?Bence Jones proteins are low molecular weight proteins (light chains of immunoglobulin) and found in urine in patient with Myeloma. They are small enough to move quickly and easily through the kidney into urine.These proteins can be detected by doing protein electrophoresis of concentrated urineWhat is the clinical finding in the unusual condition orthostatic proteinuria? erect p roteinuria is a benign condition that effect children and young adults. The patients are only exhibiting proteinuria after they have been standing up. Orthostatic proteinuria arises as a result of an increase in the hydrostatic pressure in the renal veins. Protein will not be detectable in an early morning sample when tested using dipstick. The patient is instructed to empty the bladder just before going to bed, and the test for protein is performed on a specimen of urine passed the following morning, immediately after getting up the condition is usually observed in only some of the urine samples passed when up and about (with good chance). The prognosis is less good in patients in whom proteinuria is always detected when they are up and about.What are the factors predisposing to renal stone formation?A kidney stone is a hard mineral and crystalline material formed within the kidney or urinary tract. Kidney stones are a common cause of blood in the urine and pain in the abdomen.Th e factors predisposing to renal stone formation areReduction of fluid intakeIncreased exercise with dehydrationMedications that cause hyperuricemia (high uric acid) and excessive intake of calcium supplementsDiet can also influence stone formation e.g. oxalate (ice tea and colas)Urinary tract infectionsFamily history of urinary calculi indisputable diseases hyperparathyroidism (causes calcium loss from bone), renal tubular acidosis(causes a deficiency in urinary citrate, a stone inhibitor)Urinary stagnation

Monday, June 3, 2019

Analysis of the Combined Code of Corporate Governance

Analysis of the Combined encrypt of collective Governance bodied governance is the system or process by which companies are directed and chequerled (Cadbury,1992,p.2)Good corporate governance should contribute to better fraternity performance by helping a mount unclutter its duties in the best interests of shareholders if it is ignored, the consequence may well be vulnerability or poor performance. Good governance should facilitate businesslike, effective and entrepreneurial anxiety that can deliver shareholder value over the protracted term. The Combined Code on Corporate Governance (the Code) is published by the financial Reporting Council (FRC) to support these outcomes and promote confidence in corporate reporting andgovernanceThe Code is not a firm set of rules. Rather, it is a remove to the components of good posting practice distilled from consultation and widespreadexperience over m whatsoever years. While it is expected that companies allow comply wholly or cons iderably with its provisions, it is recognised that noncompliance may be justified in particular circumstances if good governance can be achieved by other means. A condition of noncompliance is that the reasons for it should be beg offed to shareholders, who may wish to discuss the position with the caller and whose voting intentions may be influenced as a result. This comply or explain approachhas been in operation since the Codes beginnings in 1992 and the flexibility it offers is valued by company boards and by investors in pursuing better corporate governance.The listing Rules require UK companies listed on the Main Market of theLondon Stock Exchange to describe in the annual report and accounts their corporate governance from two points of view, the first dealing frequently with their bond paper to the Codes main principles, and the second dealing specifically with non-compliance with any of the Codes provisions. The descriptions together should give shareholders a clear an d comprehensive picture of a companys governance arrangements in social intercourse to the Code as a criterion of good practiceThe reason for selecting this combined figure on corporate governance as topic of look into is that police detective is having a past experience of working with the organization and knows about the prows and corns of the business.1.2 INITIAL REVIEW OF THE LITERATURECorporate governance is an institutional arrangement by which suppliers of finance to corporations assure themselves of getting a proper return on their investment(shleifer and vishney ,1997,p.737).Transparency and accountability are the most significant elements of good corporate governance. This includesthe by the bye provision by companies of good eccentric knowledgea clear and credible company decision-making processshareholders giving proper consideration to the culture provided and making considered judgements.The origins of the current Revised Combined Code stem from the report of t he Committee on the financial Aspects of Corporate Governance (the Cadbury Report,1992) to which was attached a Code of high hat Practice. This was further developed through a series of reworkings including those of the Greenbury Committee, which made recommendations on decision maker pay and a Code of Best Practice. It was then decided that previous(prenominal) governance recommendations should be reviewed and broughttogether in a single code. The work was carried out under the chairmanship of Sir Ronald Hampel and culminated in the Final Report Committee on Corporate Governance with its Combined Code on Corporate Governance in 1998.In 2002 Derek Higgs was asked to report on the role and effectiveness of non-executive directors. His report, published in January 2003, suggested amendments to the Combined Code. At the same time a committee under Sir Robert Smith reported on guidance for audit committees. The revised Combined Code which was issued in July 2003 by the Financial Re porting Council (FRC) took into account both reports. The 2003 Code has been updated at regular intervals since then, most recently in June 2008. The 2008 edition applies to accounting periods beginning on or after 29 June 2008.The FRC concentrates regular reviews of the impact and continues to work effectively.According to Christine mallin(2007),Main principles of the Combined Code areDirectors1 The boardEvery company should be headed by an effective board which is collectievely responsble for the success of the company2 Chairman and chief executiveThere should be a clear divission of responsbilities at the head of the company between the running of the board and the executive responsbility for running of the companys business No one individual should comprise imaginative powers of decision.3 Board balance and emancipationThe board should include a balance of executive and nonexecutive directors (and, in pariticular, independent nonexecutive directors) such that no individual or small group of individuals can shadow the boards decision taking4 Appointments to the boardThere should be a formal, rigarous and translucent procedure for the appointment of new directors to the board5 Information and skipper developmentThe board should be supplied in a timely manner with information in a form and of a character apropriate to enable it to discharge its duteis. All directors should be given induction on joining the board and should regularly update and refresh their skills and knowledge.6 Performance evaluationThe board should undertake a formal and thorough annual evaluation of its own performannce and that of its commitees and individual directors7 Re-electionAll directors should be submited for re-election at regular intervals, subject to continued acceptable performance. The board should certify designed and progresive refreshing of the boardB Remuneration1 The level and make-up of remmuneration Levels of remuneration should be sufficcient to attract, retain and motivate directors of the quality required to run the companys succesfully, but a company should avoid paying more than is neccessary for this purpose. A significant proportion of directors remmuneration should be structured so as to link rewards to corporate and individual performance2 ProcedureThere should be a formal and transparent procedure for developing policy on executive remmuneration and for fixing the remmuneration packages of individual directors. No directors should be involved in deciding his or her own remmunerationC Accountability and audit1 Financial reporting(Andrew tylecote and francsca visintin,2008)The board should present a balanced and understandable asessment of the companysposition and prospects2 Internal controlThe board should maintain a sound system of intarnal control to safeguard shareholders investment and the companys assets3 Audit committee and auditorsThe board should establish formal and translucent arrangements for considering how they should apply the financial reporting and internal control principals and for maintainning an arrogate relationship with the companys auditorsD Relations with shareholders1 Dialogue with institutional shareholdersThere should be a discussion with shareholders based on the mutual understanding of objectives. The board as a whole has a responsbility for ensurring that a satisfactory dialogue with shareholders takes place.2 Constructive use of AGMThe board should use the AGM to communicate with investors and to encourage their participation.E Institutional shareholders1 Dialogue with companiesInstitutional shareholders should enter into a dialogue with companies based on the mutual understanding of objectives.2 Evaluation of governance disclosuresWhen evaluating a companies governannce arrangements, particularly those relating to board structure and composition, institutional shareholders should give due weight to all relavant factors drawn to their atenttion.3 Shareholder votingInstitutional shareholders have a responsbility to make considered use of their votes.1.3 RESEARCH PURPOSEThe look for purpose is to analyse the impact of failures and weaknesses in corporategovernance on the financial crisis, including happen management systemsand executive salaries. It concludes that the financial crisis can be to an significant level attributed to failures and weaknesses in corporate governance arrangements which did not serve their purpose to preserve against excessive risk taking in a number of financial services companies. Accounting principles and regulatory requirements have in like manner proved insufficient in some areas. brook but not least, remuneration systems havein a number of cases not been closely connected to the strategy and risk craving of the company and its longer term interests. The article similarly suggests that the importance of qualified board oversight and robust risk management is not limited to financial institutions. The remuneration of boards and precedential management also remains a highly controversial issue in many OECD countries. The current turmoil suggests a need for the OECD to re-examine the sufficiency of its corporate governance principles in these key areas.( FINANCIAL MARKET TRENDS ISSN 1995-2864 OECD 2008) All the UK reports and codes, including the 2003 Combined Code (the Code), have taken the comply or explain approach. Although totally quoted companies (those with a full London Stock Exchange listing) are obliged to report how they apply the Code principles and whether they comply with the Code provisions and, where they do not, explain their departures from them. The Code has had a noticeable wider impact ongovernance of physical compositions outside the commercial corporate sector where parallel codes of governance are emerging. For a quoted company reporting on its application of the Code is one of its continuing obligations under the Listing Rules published by the UK Listing Authority (UKLA). If quoted companies ignore the Code, then on that point will be penalties under the Listing rules. The Code is divided into main principles, supporting principles and provisions. For both main principles and supporting principles a company has to state how it applies those principles. In relation to the Code provisions a company has to state whether they comply with the provisions or where they do not give an explanation. It is the Code provisions that admit the detail on proceedss such as separation of the role of chairman and chief executive, the ratio of non-executive directors and the composition of the main board committees.The first principle of the Code states that Every company should be headed by an effective board. The boards effectiveness is widely regarded as a prerequisite for sustained corporate success. The quality and effectiveness of directors determines thequality and effectiveness of the board. Formal processes for appointment, induction and development should be adopted. Effectiveness of the board and its individual members has to be assessed. The Code states that no one individual should have unchained powers of decision-making. It sets out how this can be avoided by splitting the roles of chairman and chief executive, and specifies what the role of the chairmanshould be. The Code offers valuable guidance on the ratio of non-executive to executive directors and definitions of independence.( http//www.frc.org.uk/corporate/combinedcode.cfm) .1.4 OBJECTIVESIn the process of interrogation the re chaseer has to find out the answers for the spare-time activity questionsTo understand how critical governance issues in a established organisation can be solved with optimized corporate governanceTo formulate an effective method of governing corporates especially at the time of crisisTo find out how the land can overcome financial crisis in future with good corporate governance practice?1.5 SCOPE OF THE STUDYThis research has some limits as th e researcher has constraints of time and money. The information provided is of sample size.The research is done in India where the economy is developing. So the results vary from Indian developing economy and any other developed economy.The research is mainly concentrated in Hyderabad city so the research result would vary from that of any other city like Chennai, Mumbai, etc.The research is based on the information provided by SATYAM COMPUTERS on how it was bankrupted during financial crisis due to lack of proper governanace and financial reporting. So the result at the end of research will be useful for other companies inorder to benefit from the combined code of corporate governance.1.6 RESEARCH STRATEGYResearch the word basically means search for information or info compilation. It mostly means to gather information concerning firm question and to build up a certain approach for that question. If there was no word called research all the scientific and social projects would hav e been resulted in deduction work and approximated dataThe approach the researcher would be employ in this research is qualitative with an inductive outlook. Qualitative research is concerned with the growth of explanations, in order to know the reasons and motivations of social occurrence (Hussey Huseey 1997). The motto universe to know the world in which we live in, by taking into account individual opinions, experiences and feelingsAccording to Saunders et al (2003), in an inductive focal point theory will pursue data rather than vice versa in the deductive approach. Induction emphasizes on attaining an understanding of the meanings human attach to events, it approves in the gathering of qualitative data and at last, unlike deduction which is a highly prearranged process, induction is a more supple structure which permits changes as and when the research progresses. Case see A case study is research method to investigate the phenomenon of topic of research. In this case the researcher is looking at SATYAM COMPUTER SERVICES LTD.which is an IT firm and establish of SATYAM COMPUTERS at Indian Stock markets due to lack of proper corporate governance practice. In this research the researcher want to apply the combined code of corporate governance to other companies like SATYAMGrounded theory Grounded theory is a procedure that is designed to generate a theory around the central typography of data. So this theory would help the researcher in doing his research.1.7 entropy COLLECTIONSecondary DataThe information that is previously available is called secondary information. It is using the study previously undertaken in a particular field so that one does not replicate it while conducting native research. It is also very cost efficient and useful as this being a student project there are no funds at our disposal to conduct the research. It offers handiness and is slowly accessible on databases and also on company websites (Wright and Crimp, 2000). It wil l be used widely while reviewing the literature on the recommended topic. Some of the secondary sources that will be used are academic journals like HR journals. Also with online information coming to age EBSCO Host and Keynote research reports and statistics issued by the Corporate Governance team in India will also be used. Finally, a number of accomplished authors have written ample on this subject, these books will also be consulted. The secondary research will be used effectively to provide a good background to instigate a good primary research.Primary DataPrimary data will be collected through a sequence of recorded semi-structured interviews conducted by the researcher. Prior official control would be taken from those who would be interviewed. Semi-structured interviews are interviews where the interviewer would ask a set of questions to interviewees these questions differ from person to person depending on that persons position with respect to the research. Though the gener al topic remains the same, some questions will be omitted and some others might be counting depending on who is being interviewed. For example, questions to an HR manager would revolve around how to cope with abrasion and the management view on how they are looking at this problem, on the other hand in an interview with the software engineers.1.8 DATA ANALYSISThe researcher understands all the data he would obtain would be based on meaning expressed through words, this kind of information is called qualitative data. The process of qualitative study involves the development of information categories, allocating units of the original information to apt categories and developing and trying hypotheses to produce well grounded conclusions. Now it is enormously definitive that all this rich data must be transformed to information the researcher couldComprehend and manage Integrate related data from different transcripts and notes delineate key themes or patterns from them to further exp lorationDevelop or test hypothesis based on these apparent patterns Draw and verify conclusions (Saunders et al, 2003)This researcher would be using computing device Assisted Qualitative Data Analysis Software, (CAQDAS), to assist him with making good sense of the data, there are various softwares available which would help the researcher, quantifying qualitative information if need be, thus making a hypothesis and arriving at a conclusion.1.9 VALIDITY AND RELIABILITYThe question of reliability and validity of information in any research study is of highest importance. Unless the data obtained is consistent, correct conclusions cannot be drawn.In this study, the validity and reliability issues are associated to access to the correct people for interviews and to get the right information out of them. This will mean that the information should be balanced and unprejudiced. Interviewees should be able to provide the correct information linked to the subject without personal opinions o r beliefs.This problem can be conquered to a certain extent by asking to the point questions and framing them up in such a way that eliminates capacity for bias. For this purpose, the researcher will spend quality time on designing good interview questions and will get them checked from a sr. supervisor.The issue of access to the correct people for the data is also very important since the research will be based on the answers obtained from them.Another matter related to validity and reliability is the use of precise sources for obtaining secondary data. The researcher should gain contact to the right books, journals and articles for getting quality information about the topic. For this purpose, academic articles will be obtained from the library and internet.2.0 ACCESSThe researcher was providential to have some significant contacts in the IT sector back in Hyderabad, India, this was partly because he was born and brought up there and also because he comes from a strong IT backgr ound both academic and professional.The researcher intends to conduct semi structured interviews with the following people.Ms. Pratyusha gogineni (HR Team, Satyam computers, Hyd)Mr. suma Kirthi (HR Team, Satyam computers, Hyd )Mr. Madhusudhan Santhana (Project Manager, Satyam computers, Hyd)Mr. Prabhakar Govind (Analyst, Satyam computers, Hyd)Mrs. Amruta devi ( MD, HND Recruitment, Hyd )The first member, Nandini is an old friend who had grown quite fast in the organization has been handling recruitments since the past four years through her the researcher had got in contact with Mr. Kirthi, a senior HR manager who also assured official access.To get the other side of the story, the researcher has got in contact with Mr Santhana, who also is the researchers ex manager who used to work with SATYAM computers before. Mr Santhana promised he will do all he could to aid me with this research. Mr Govind along with a few of his colleagues would help in giving me the required information.The researcher intends to leave no stone unturned and would contact more people if need be to help him with this research.

Sunday, June 2, 2019

A Comparison of A Midsummer Nights Dream and Romeo and Juliet :: comparison compare contrast essays

Various par solelyels in Romeo and Juliet and A Midsummer Nights Dream tend to support the theory that the two plays are closely related. It is the purpose of this paper to show that wherever parallels exist, the relationship is probably from A Midsummer Nights Dream to Romeo and Juliet. A close analysis of the life sentence of the two plays, and of the different attitudes towards love and life that they present, leads us to the conclusion that A Midsummer Nights Dream is the natural reaction of Shakespeares mind from Romeo and Juliet. It will be inessential in this paper to present all the evidence bearing on the dates of composition of the two plays. There can be little doubt that the graduation version of Romeo and Juliet appeared about 1591. The date of the first version of the Dream is more problematical. The only bit of external evidence is the mention of the play in Francis Meress2 Palladis Tamiain 1598, precisely the strongest bit of internal evi dence-the supposed reference to the death of Robert Greene, in Act v, I, 52-3 The thrice three Muses mourning for the death Of Learning, late deceased in beggary-- would pee the date at 1592-3. Assuming, then, that the Dream was written soon, perhaps immediately, after Romeo and Juliet, let us see if a comparative study of the two plays will non support our hypothesis. Awake the pert and nimble spirit of mirth, Turn melancholy forth to funerals says Theseus in the first place setting of the Dream, and later in the first scene of Act v Lovers and madmen have such seething brains, Such shaping fantasies, that apprehend More than cool reason ever comprehends. The lunatic, the lover, and the poet Are of imagination all compact These two speeches of Theseus, to whom Shakespeare has given much of his own clear-eyed serenity and benignity, are, it seems to me, significant manifestations of the poets own mental attitude when he

Saturday, June 1, 2019

Comparing Measure for Measure and The Merchant of Venice, As You Like I

Parallels between notice for broadside and The Merchant of Venice, As You Like It, and one-twelfth NightWhat is comedy? take a hop and Wagnalls New Encyclopedia says A comedy depicts the follies and absurdities of human beings. Websters Dictionary defines comedy as A drama or narrative with a happy ending. Shakespeares play, handbill for Measure, fits both of these descriptions. Follies and absurdities are present in the play Lucio slanders the Duke, not realizing that his crude remarks are being spoken to the Duke himself Angelo abuses his power thinking that the Duke is not present to accredit and Ragozine happens to die in prison the day a head is needed to substitute for Claudios. The play to a fault ends on several merry notes, consistent with the description of comedy. For example, Angelos life is spared and he is forgiven Mariana is married to Angelo the Duke punishes Lucio humorously with marriage Barnardine is pardoned and Claudio is saved. The parallels between Measur e for Measure and three other Shakespearean comedies, The Merchant of Venice, As You Like It, and duodecimal Night, also help to classify Measure for Measure as a comedy. In Measure for Measure, like in The Merchant of Venice, As You Like It, and twelfth Night, an arbitrary law or obstacle is eventually overcome a disguised character affects the outcome of the play a clown adds humor to the maculation a female character bears a large responsibility for the final resolution and forgiveness and reconciliation mark the conclusion of the action. Some critics consider Measure for Measure a dark play because of the serious obstacles encountered by the characters. However, doesnt The Merchant of Venice also have near-tragic hindrances that af... ... only does Measure for Measure fit the definition of comedy, it also parallels Shakespeares other comedies. Like The Merchant of Venice, As You Like It, and Twelfth Night, the plot of Measure for Measure overcomes an adversarial obstacle, p ossesses a disguised character who affects the denouement, touches the audience with the humor of a clown or ruffian, endures the influence of a powerful a female character, and ends with forgiveness and reconciliation. The similarities between Measure for Measure and The Merchant of Venice, As You Like It, and Twelfth Night help to place Measure for Measure in the same category with Shakespeares other comedies. Furthermore, the problems many critics single out in Measure for Measure are also present in The Merchant of Venice, As You Like It, and Twelfth Night, and further help to classify Measure for Measure as a comedy.