Wednesday, May 6, 2020

The Debate Over Physician Assisted Suicide - 951 Words

In today’s society, suicide, and more controversially, physician assisted suicide, is a hotly debated topic amongst both every day citizens and members of the medical community. The controversial nature of the subject opens up the conversation to scrutinizing the ethics involved. Who can draw the line between morality and immorality on such a delicate subject, between lessening the suffering of a loved one and murder? Is there a moral dissimilarity between letting someone die under your care and killing them? Assuming that PAS suicide is legal under certain circumstances, how stringent need be these circumstances? The patient must be terminally ill to qualify for voluntary physician-assisted suicide, but in the eyes of the non-terminal patients with no physical means to end their life, the ending of their pain through PAS may be worth their death; at what point is the medical staff disregarding a patient’s autonomy? Due to the variability of answers to these questions, the debate over physician-assisted suicide is far from over. However, real life occurrences happen every day outside the realm of debate and rhetoric, and decisions need to be made. In the context of Case Study #1, the doctor must decide on whether or not he will hasten the woman’s death to alleviate her pain; he must decide whether or not there is a moral difference between killing someone and hastening their death to relieve suffering. The woman described has a continuously declining and invariably fatalShow MoreRelatedThe Debate Over Euthanasia And Physician Assisted Suicide Essay1441 Words   |  6 PagesLegalization of Euthanasia in the United States The debate over Euthanasia and Physician Assisted Suicide is becoming progressively complicated as doctors develop a better understanding of its purpose and usefulness. Euthanasia, a Greek term meaning â€Å"good death† and it can portray as a killing of a patient who chooses to take this course of action by applying, administrating, and enduring a procedure to terminate their life (Euthanasia Debate). Prescribed when a patient is in intense pain or sufferingRead MorePhysician Assisted Suicide1226 Words   |  5 Pagesï » ¿ Physician Assisted Suicide There are instances when people who are terminally ill or severely injured who want to terminate their own lives. Sometimes, due to the state of their injuries or conditions, those people are unable to end their own pain. It is in many of these cases that the patients request assistance in their suicides. This kind of request is like to happen in facilities where the patient receives long term or permanent care. Physician assisted suicide is a hotly contested issueRead MoreThe Debate Of Physician Assisted Suicide1321 Words   |  6 PagesThe Debate Surrounding the Topic of Physician Assisted Suicide Who gets to make the choice whether someone lives or dies? If a person has the right to live, they certainly should be able to make the choice to end their own life. The law protects each and everyone’s right to live, but when a person tries to kill themselves more than likely they will end up in a Psychiatric unit. Today we hear more and more about the debate of Physician assisted suicide and where this topic stands morally and ethicallyRead MorePHI 103 Final1311 Words   |  6 Pagesï » ¿ Should Physician-Assisted Suicide Be Legal? Eileen K. Cordova PHI 103 Instuctor James Hardy July 11, 2013 SHOULD PHYSICIAN ASSISTED SUICIDE BE LEGAL Physician-assisted suicide has been a controversial topic for over a decade now. In today’s society, physician-assisted suicide brings so many ehtical questions as such, who is the true owner of our lives? Should releiving pain and suffering always be the highest priority, or does it occure for a reason?Read MoreSince The Fifteen Century, Society Has Viewed Suicide Or1178 Words   |  5 PagesSince the fifteen century, society has viewed suicide or intentional death as immoral. It was not until the twentieth century that these â€Å"immoral† attitudes were challenged. As of 2016, the Netherlands, Belgium, Luxembourg, and Colombia have unambiguously legalized direct assisted dying. Other areas, having to undergo a process of either a judicial or legislative decision, include Canada, Japan, and Germany. Currently in the United States, following the same process of a judicial or legislative processesRead More Physician-Assisted Suicide is Morally and Ethically Acceptab le1160 Words   |  5 Pages   Ã‚  Ã‚   The long time debate over medically assisted suicide, the presence of a doctor at a patient’s suicide, resurfaced again with the conviction of doctor Jack Kevorkian.   Kevorkian was convicted of second degree murder when he euthanized, or administered the injection himself, Thomas Youk on September 17, 1998.   Dr. Kevorkian, an advocate and practitioner of medically assisted suicides, has many opponents on the issue. Opponents say that it is unethical and even with the consent of the patientRead MoreThe debate of Physician Assisted Suicide993 Words   |  4 PagesOver the years the medical field has developed many miraculous ideas and procedures. From organ transfers to blood transfusions, tons of lives have been saved. A doctor’s whole purpose is to help those dying to live. Yet, doctors have developed PAS, Physician Assisted Suicide, also known as Physician Assisted Death, and not to be mixed up with Euthanasia. Physician Assisted Suicide is morally wrong, gives doctors too much power, and it opens a door for those less critical patients to receive treatmentRead MoreNew Client. Professor__. English___. 2/28/17. The Implications1182 Words   |  5 Pagesvia euthanasia it becomes an extensively debate regarding the rights of an individual to make that choice. The article â€Å"A Doctor-Assisted Disaster for Medicine† loosely examines the negative implications of assisted suicide laws on patients. Toffler’s article sheds light upon how the law has changed the relationship between patients and their medical provider. Toffler suggests that many individuals are forcefully driven to pursue physician assisted suicide as treatment. In result, many mentally illRead MoreLegalizing Physician Assisted Suicide And Active Euthanasia843 Words   |  4 PagesFatal Differences The civil argument in the U.S. over whether or not to authorize physician-assisted suicide and active euthanasia has reached new levels of vehemence. Oregon, California, Vermont, and Washington (and Montana, via court ruling) have become the first states to legalize physician-assisted suicide. There has, too, been campaigning, ballot measures, bills, and litigation in other states in attempts to legalize one or both practices. Supporters increasingly urge either absolute legalizationRead MoreThe Legal And Ethical Issues Involving Physician Assisted Suicide1134 Words   |  5 Pageswhat conditions is physician assisted suicide morally acceptable, is the question at hand and did these states make the right decision on such a slippery slope debate. This paper will go on to explain one side of this very touchy debate, it will also consider objections from the other side, and ultimately defend the position physician assisted suicide is wrong not only morally but also, ethically. My argument for this thesis is provided below: P1: Physician assisted suicide violates the doctor’s

Essay on You Are What You Eat - 884 Words

You Are What You Eat It is indeed true that the quality of food that you take in will do a great deal to determine the quality of life that goes on in each cell of your body. Food has a huge effect on your health, and a diet rich in any one aspect would be an unhealthy diet, in the same way that a diet lacking in a certain nutrient would also affect your health. A balanced diet consists of carbohydrates, fats, protein, vitamins, minerals and water. Carbohydrate provides us with energy. Fats (lipids) with healthy cell membranes and an energy reserve. Proteins are essential for growth and repair or body tissues. Vitamins are needed to keep our cells working properly and minerals build molecules†¦show more content†¦The averages for male and female are two thousand-nine hundred for males and two thousand-one hundred for females. Protein is recommended seventy grams for males and fifty-eight for females. Fat is ninety grams for a male and seventy for a female (Samuels Henett, 1973). Although some amounts vary for male and female most vitamins are consistent for both sexes, like seventy milligrams of vitamin C. What types of food you eat determine whether your diet is healthy. By looking at the nutritional information of food packaging we can see what we get out of what we eat. Per one hundred grams of chocolate we are provided with four hundred and ninety-one calories, six point one grams of protein and twenty-three grams of fat. Where as per one hundred grams of cereal, such as corn flakes, we are provided with three hundred and seventy calories, six grams of protein and only one gram of fat. By comparing these two foods we can clearly see which one is healthier, as chocolate has and extremely high fat content. In this way could say that maybe what you eat is what you are because if you ate a diet rich in chocolate with few vitamins etc then your skin would not be as healthy and weight gain would be inevitable with such high levels of saturated and unsaturated lipids into your system. The absence of proteins, would cause weak bones, your cells would not operate so well asShow MoreRelatedYou Are What You Eat1840 Words   |  8 PagesYou Are What You Eat Introduction I didn’t start reading The Omnivore’s Dilemma with noble intentions of learning about the secrets of the food industry. I didn’t try to learn how they might affect our health and the environment. I didn’t start reading it because I wanted to know more about the organic-conventional debate. I only found it because I was looking for a book that would allow me to research irradiation for school (that didn’t happen). Even though The Omnivore’s Dilemma didn’t allow meRead MoreEssay Are You What You Eat4582 Words   |  19 PagesDay One: September 24, 2012 Do Now: Are you what you eat? How do you know? Prove it! I think in a way you are what you eat because most things you eat were alive at one point and the nutrition from the food gives you energy to keep living and moving. Also, if you eat unhealthy, your body will become affected and be unhealthy, but if you eat healthy your body will remain healthy. It also all depends on a person’s metabolism because some people are more affected by certain foods than othersRead MoreYou Are What You Eat By Michael Pollan1385 Words   |  6 Pagesâ€Å"You are what you eat† is a famous quote said by French physician Anthelme Brillat-Savarin. If this were to be true we would be walking talking corn people according to Michael Pollan’s book the Omnivores Dilemma. In his book he tried to answer a question so simple yet complex :†What should I have for dinner?† At first glance this question can be very simple basing solely off personal experience yet when truly looked at you have more questions you have to ask yourself;How many calories are in thisRead MorePublic Health : You Are What You Eat1696 Words   |  7 Pages EN 101: English Composition I 14 September 2015 Public Health: You Are What You Eat The food you eat says a lot about your lifestyle. Everything you put into your mouth is affecting you somehow and someway. The affects can be good or bad but you don’t always know which it is. Eating a salad compared to eating a burger and fries will impact your body differently. People of the lower class can’t always afford the more costly salad compared to the cheaper burger. Fast food in the tri-state is oneRead MoreThe Common Saying, You Are What You Eat, Is A Famous1742 Words   |  7 PagesThe common saying, you are what you eat, is a famous aphorism, that explains how to be healthy, you should eat healthy. However, many people, outside of the neurobiology or medicine discourse community, won’t know much about nutrition. If someone were to ask a stranger on a street a series of basic questions about nutrition, they wouldn’t be able to answer in detail. This is mostly due to a lack of exposure of information that is only obtained through science-re lated classes, articles, journalsRead MoreWhat You Eat Is Your Business868 Words   |  4 Pagesâ€Å"What You Eat Is Your Business,† by Radley Balko In the article of Radley Balko, he considers obesity a problem in the nation. Balko believes that it is unhealthy for children to be eating bad food but it’s their choices to eat that food. Balko is saying that if people are eating unhealthy and are having health problems everyone shouldnt have to pay for their health problems. Balko says, â€Å"In other words, bringing the government between you and your waistline.† Basically he is saying that theRead MoreWhat You Eat Is Your Business Essay1140 Words   |  5 Pages In Radley Balko’s essay â€Å"What You Eat Is Your Business,† Balko argues that what we put into our bodies is our business, not the government’s, and that personal responsibility should be primary in our nutrition choices. I agree wholeheartedly. However, while I do agree that personal responsibility is paramount, in the new age of the Affordable Care Act (which had not been implemented prior to Balko’s writing), it is becoming hard to say that the government should stay out of my business, when healthcareRead MoreWhat You Eat Is Your Business894 Words   |  4 Pagesis favorable to society as a whole. But on closer investigation, it is easily seen that the governments influence on such a personal matter produces the antithesis of beneficial and ultimately aids in nurturing obesity. In Radley Balko’s essay â€Å"What You Eat Is Your Business†, he is rightfully insists that the anti-obesity regulations and restrictions set by the government wrongfully alleviates American consumers of their individual responsibility for their own well-being by transforming health careRead MoreWhat You Eat Is Your Business1315 Words   |  6 Pageseven the family of 4, finding time to eat a healthy meal fells like it can be impossible. Some might argue everyone can find time to eat a healthy meal, but as a full time college student with a family of 4 with another kid on the way. Even the little time I do have at home doesn’t change that I have not had a chance to get to the store for two weeks to buy food. Given the little time and lack of food, the options can be slim, but fast food addictions can cause you to make bad choices too. So when doesRead MoreYou Are What You Eat: The Detrimental Effects of a Poor Diet789 Words   |  3 PagesYou are What You Eat You are what you eat is an idiom that most everyone can recall being told at some point. The phrase was gotten from Anthelme Brillat-Savarin who wrote in 1826 Dis-moi ce que tu manges, je te dirai ce que tu es. Translated into English it means â€Å"tell me what you eat and I will tell you what you are†. Many people especially in the United States do not really give the food that they eat very much thought. The people in this country eat because of the taste of food, the experience

Telecommunication Management Network Organization

Question: Discuss about the Telecommunication Management Network Organization. Answer: Introduction The report focuses on the organization Telecom Australia which has network management environment across Victoria. The organization faces challenges in providing services to the customers due to expensive as well legacy tool sets. The organization also wants to expand their customer base and therefore they want to provide better customer experience to the customers in the marketplace. For this, the organization wants to research telecommunication network software, which can be helpful in providing service assurance platform considering TMN and FCAPS. The report illustrates various protocols in the TMN architecture model, fault management process, fault identification, configuration state and software network of the level resources. The report also discusses disaster recovery plan, quality of service management and identification of various monitoring parameters in the fault management model. Identification of various protocols in the TMN architectures model The TMN architecture is defined as an approach of hierarchical telecommunication management. The main aim of the architecture model is to divide the various functional areas or regions of management into various protocols (Kim and Feamster 2013). The TMN architecture model helps in identifying different protocols in the functional level of telecommunication management. The protocols of TMN architecture model includes Business Management Layer, Service Management layer, Network Management Layer, Element Management Layer and the Network Element Layer (Ghezzi, Cortimiglia and Frank 2015). The protocols are described below: Network Element Layer: The network management layer helps in defining various interfaces of the network elements that helps in instantiating different functions, which are associated with device instrumentation (Mijumbi et al. 2016). They also assist in covering all the areas related with FCAPS. Element Management Layer: It helps in providing various management functions for connecting different network elements on an individual or in the group. It also assists in supporting an abstraction of different functions, which are provided by different network element layer (Han et al. 2015). The examples include determination of various equipment error, measuring temperatures of device, collection of various statistical data for accounting purpose and notification of various logging event as well as performance statistics. Network Management Layer: It helps in offering a holistic view of the network between the various pieces of equipment as well as independent types. It helps in managing a network, which is generally supported by the element management layer (Bolla et al. 2013). The examples of network management layer include end-to-end report of network utilization, root cause analysis as well as traffic engineering. Service Management Layer: It generally deals with various contractual aspects of services, which are provided to the customers. The main functions of this layer include service creation, handling of orders, implementation of service, monitoring of service, handling of complaint as well as invoices (Dotcenko, Vladyko and Letenko 2014). Examples of service management layer include QoS management, VPN and monitoring as well as verification of SLA. Business Management Layer: The layer is responsible for total enterprise. The protocol is considered as a goal setting approach. The information as well as data is related with the level of abstraction addresses of the objectives (Cohn et al. 2013). TMN implementation and standards provide proper specification, which are related with all the protocols except BML. Analyzing the fault management process and fault identification Fault management in telecommunication management network includes all the procedures as well as processes that are required for handling various systems for responding properly to the complaints of the customers. The fault management process includes the following: Alarm: TMN must have the capability of monitoring the failures of NE in real time. Indication is generally created by NE when a failure occurs. TMN helps in determining both the severity as well as nature of the fault basing (Wood et al. 2015). It also helps in determining the effect of various fault on the services which are supported by the fault equipment by using two methodologies. Correction: The procedure of automatic restoration from NE to TMN helps in indicating a specific line, equipment, service as well as system that helps in switching the protection procedures of NEs. Telecommunication management network requests NE so that they start hot-standby procedures for the system for letting a redundant unit that is further helpful in minimizing disruption (Monza et al. 2016). Reloading process includes a request to NE from telecommunication management network for reconstructing a system or a service from a specific dumb record. Reload report is the procedure of reporting a service or a system from NE to TMN. Testing: The procedure of testing can be completed using two ways. In the first way, a TMN orders a NE for carrying out analysis about the circuit as well as characteristics of the equipment. The procedure is entirely done with the NE. The results of testing are provided to the TMN automatically as well as immediately on a delayed basis. Another procedures analysis is completed within the TMN (Forbes Causam Energy 2016). It assists NE for providing proper as well as effective access to the different circuit and it is analyzed that there are no more messages which are exchanged with the NE. The main purpose of fault identification within a specific system is to identify various replaceable units. The level of granularity is fully dependent on the system under some specific consideration (John et al. 2013). The fault identification technique includes experienced based technique and model based technique that involves models of some expected system as well as behavior. Description of the configuration state and software level of the network resources Configuration state helps in providing proper as well as effective functions for exercising control, proper identification, collection of data and providing effective data to NEs. It includes the following: NE installation: Telecommunication management network helps in supporting the installation of equipment that assists in generating telecommunication networks. It helps in covering the extension as well as reduction of a system. Some of the NEs call in order to exchange data between themselves and TMN (Lara, Kolasani and Ramamurthy 2014). Another example, is the installation of various programs into NE Provisioning: It consists of different procedures, which are needed for bringing equipment inside the device including the process of installation. The supporting programs are generally initialized with the help of TMN when the unit is ready for providing service (Peng et al. 2013). The various state of service including in-service, out-of-service, stand-by as well as selected parameters are controlled by provisioning different functions. It mainly comprises of NE configuration, NE administrative functions and NE database management. NE status as well as Control: The TMN helps in providing proper capability for monitoring as well as for controlling various aspects of NE. TMN will be helpful in enabling the exclusion for some faulty equipment as a result it assists in rearranging as well as re-route traffic. (Kanode et al. 2013). It helps in enabling the entry of various proposed configuration for automatically analyzing the feasibility of the design before implementing it. It generally includes generic NE status as well as control functions, message-handling systems as well as network status, leased circuits as well as transmission network status. The management information modeling consists of an abstraction of the management aspect of network resources and the associated support management activities. The network resources present helps in determining the various scope of information and data which can be exchanged in a standardized manner (de Assis et al. 2014). The network architecture also helps in providing a set of generic components for network resources. The components also provide high-level abstraction of resources that is connection. It is mainly used by several service applications for providing the network resources to the management. Development of a disaster recovery plan for a telecommunication network with required procedures and policies The disaster recovery plan for a telecommunication network includes the following steps: Constitute a Disaster Recovery Team: The organization Telecom Australia should form a DR team for assisting the entire disaster recovery operations. The team must comprise of core member from all departments of the organization with representative from the top management of Telecom Australia (Tingfang et al. 2015). The team members must be responsible for overseeing the implementation as well as development of the DR Paln. Performing risk assessment: Proper risk analysis as well as business impact analysis must be conducted which includes various possible disasters both natural as well as man-made. Various disaster scenarios must be conducted for determining the security of various crucial resources. Prioritizing various processes as well as operations: The critical requirements of the organization that is pertained to each department must be determined properly with respect to various data, documentation, service as well as processes (Sun et al. 2015). They must be categorized properly depending on the priority essential, non-essential as well as important. Data Collection: Complete data about Telecom Australia must be collected as well as documented. The documentation must include inventory of forms, proper policies as well as procedures, communications, equipments, applications, systems as well as various retention schedules. Creation of Recovery Plan: The DR plan must be generated in a standard format for enabling various detail procedures. All significant procedures must be outlined completely for explaining the plan (Yu et al. 2014). The plan helps in providing systematic information about the disasters. It must all includes different procedures for maintaining as well as updating the plan. Plan Testing: The disaster recovery plan is mainly developed as well as tested in order to enhance the efficiency. It also assists in providing a platform where proper analysis can be done for making proper adjustments in the plan (Mavromoustakis et al. 2015). The plan should be tested using test like simulation test, parallel test, full interruption test and many more. Quality of Service or Service Level Agreement management for supporting different modes of accounting and alarm handling Quality of Service as well as Service Level Agreement management is needed for supporting various modes of accounting as well as alarm handling. Quality of service data is generally needed by the Telecommunication management network from NE either with the help of threshold or with the help of schedule (Lara, Kolasani and Ramamurthy 2014). It comprises of raw data, which either are required in order to process in a TMN or in a NE, which is very much capable of analyzing the data before the report, is forwarded. Quality of Service includes monitoring as well as recording of various parameters, which are associated with establishment, retention as well as quality of connection for cooperating properly with the fault management in order to establish possible failure of resources. It also cooperates with various configuration management for changing routing as well as load parameters for links. Element Management Systems helps in detecting the performance threshold crossings, which include SLIPS and BERs, which further assist in forwarding those to the fault manager of NML (Kim and Feamster 2013). This data helps in identifying various degrading facilities before they become apparent to various customers. It also helps in storing the performance measurement data from NEs in order to make it available to EMA report generators to various SML performance management as well as QoS systems. EMSs sometimes help in providing the capability to perform various diagnostics depending on the ability of NE as well as EMS. It is related with various communication facilities on a scheduled as well as demand basis (Ghezzi et al. 2015). Quality of service components is fully dependent on the ability of pinpointing the cause of a problem quickly for repairing the resources quickly. The main objective is to achieve the minimum mean time in order to repair the MTTR. In some situations, the procedure of repair can be done from either by NOC or by a customer under the direction of NOC technician (Yaz?c?, Kozat and Sunay 2014). It also helps in reflecting the application of cable telephony for diagnosing the RSU on the customer house. It also helps in performing tests for determining the problem in the customers telephone equipment or inside wiring. Identification of monitoring parameters in fault management context The availability of the system is compromised if the failure of the system is not handled correctly. In order to ensure availability of various computing resources, it is quite important to have an effective framework for fault management. An ARMA model is utilized as a parameter prediction method for the framework (Dotcenko, Vladyko and Letenko 2014). The fault management framework helps in predicting the future state of a system by utilizing some components or parameters. The five parameters that are utilized by the framework include monitoring module, pre-processing module, availability analysis module, resource manager module and migration module (Monza et al. 2016). The different modules are connected with the database of the system for storing as well as retrieving various predicted as well as historical data. The monitoring module helps in capturing various set of hardware parameters from each of the physical machine. The different parameters of fault management are observed p eriodically, which is dependent on a predefined interval. ARMA model of time series are mainly utilized in order to formulate a system model for predicting various future value of the systems. Results from the model are used for analyzing availability by the fault tree. Fault tree helps in analyzing the structure, which is mainly utilized in reality analysis field. The prediction model is generally created with the help of the data training set. When the real time data is analyzed with the help of the monitoring module, it is mainly fed in order to predict with the help of ARMA prediction model that is generally formulated in the Availability Analyzing module (Yaz?c?, Kozat and Sunay 2014). The output is fed into the module for storing data back into the database of the system. The leaf nodes as well as fault tree are mainly helpful in analyzing the threshold value in order to collect various parameters for calculating the state. Conclusion It can be concluded that proper research about the telecommunication network software, helps in providing proper service assurance platform considering TMN and FCAPS. The telecommunication management network not only helps in resolving the issues which are associated with the challenges in providing services to the customers due to expensive as well legacy tool sets. It also assists in expanding the customer base of the organization for providing better customer experience to the customers in the marketplace. It is analyzed that the assignment also provides proper information about development of a disaster recovery plan for a telecommunication network with required procedures and policies. Proper fault management is created in order to resolve the challenges that occurred due to improper fault management. It is identified that fault management includes all the procedures as well as processes that are required for handling various systems for responding properly to the complaints of the customers. In order to ensure availability of various computing resources, it is quite important to have an effective framework for fault management. It is analyzed that an ARMA model is utilized as a parameter prediction method for the framework. References Bolla, R., Bruschi, R., Davoli, F., Di Gregorio, L., Donadio, P., Fialho, L., Collier, M., Lombardo, A., Recupero, D.R. and Szemethy, T., 2013. The green abstraction layer: A standard power-management interface for next-generation network devices.IEEE Internet Computing,17(2), pp.82-86. Cohn, A.W., Battles, R.E., Proft, D. and Shumate, S.W., Icontrol Networks, Inc., 2013.Method and system for automatically providing alternate network access for telecommunications. U.S. Patent 8,451,986. de Assis, M.V., Rodrigues, J.J. and Proena, M.L., 2014. A seven-dimensional flow analysis to help autonomous network management.Information Sciences,278, pp.900-913. Dotcenko, S., Vladyko, A. and Letenko, I., 2014, February. A fuzzy logic-based information security management for software-defined networks. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE. Forbes Jr, J.W., Causam Energy, Inc., 2016.System, method, and apparatus for electric power grid and network management of grid elements. U.S. Patent 9,513,648. Ghezzi, A., Cortimiglia, M.N. and Frank, A.G., 2015. Strategy and business model design in dynamic telecommunications industries: A study on Italian mobile network operators.Technological Forecasting and Social Change,90, pp.346-354. Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization: Challenges and opportunities for innovations.IEEE Communications Magazine,53(2), pp.90-97. John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R. and Meirosu, C., 2013, November. Research directions in network service chaining. InFuture Networks and Services (SDN4FNS), 2013 IEEE SDN for(pp. 1-7). IEEE. Kanode, M.E., Karmarkar, K.K., McCann, T.M., Sprague, D.M., Tomar, M., Wallace, D.E. and Marsico, P.J., Tekelec, Inc., 2013.Methods, systems, and computer readable media for diameter network management. U.S. Patent 8,498,202. Kim, H. and Feamster, N., 2013. Improving network management with software defined networking.IEEE Communications Magazine,51(2), pp.114-119. Lara, A., Kolasani, A. and Ramamurthy, B., 2014. Network innovation using openflow: A survey.IEEE communications surveys tutorials,16(1), pp.493-512. Mavromoustakis, C.X., Bourdena, A., Mastorakis, G., Pallis, E. and Kormentzas, G., 2015. An energy-aware scheme for efficient spectrum utilization in a 5G mobile cognitive radio network architecture.Telecommunication Systems,59(1), pp.63-75. Mijumbi, R., Serrat, J., Gorricho, J.L., Latre, S., Charalambides, M. and Lopez, D., 2016. Management and orchestration challenges in network functions virtualization.IEEE Communications Magazine,54(1), pp.98-105. Monza, J.V., McCord, A.W. and Anderson, D.H., Genesys Telecommunications Laboratories, Inc., 2016.Method and system for providing adaptive and proactive interaction management for multiple types of business interactions occurring in a multimedia communications environment. U.S. Patent RE46,181. Peng, M., Liang, D., Wei, Y., Li, J. and Chen, H.H., 2013. Self-configuration and self-optimization in LTE-advanced heterogeneous networks.IEEE Communications Magazine,51(5), pp.36-45. Sun, S., Kadoch, M., Gong, L. and Rong, B., 2015. Integrating network function virtualization with SDR and SDN for 4G/5G networks.IEEE Network,29(3), pp.54-59. Tingfang, J.I., Song, O., Damnjanovic, A., Gaal, P., Luo, T. and Malladi, D.P., Qualcomm Incorporated, 2015.Heterogeneous network (HetNet) user equipment (UE) radio resource management (RRM) measurements. U.S. Patent 9,125,072. Wood, T., Ramakrishnan, K.K., Hwang, J., Liu, G. and Zhang, W., 2015. Toward a software-based network: integrating software defined networking and network function virtualization.IEEE Network,29(3), pp.36-41. Yaz?c?, V., Kozat, U.C. and Sunay, M.O., 2014. A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management.IEEE Communications Magazine,52(11), pp.76-85. Yu, T., Zhou, Z., Zhang, D., Wang, X., Liu, Y. and Lu, S., 2014, April. INDAPSON: An incentive data plan sharing system based on self-organizing network. InINFOCOM, 2014 Proceedings IEEE(pp. 1545-1553). IEEE.

Impact of Demographic Variables

Question: Describe the impact of demographic variables on African-American student athletes academic performance. Answer: Introduction The academic performance of the student is generally considered as the critical aspect of assessing the quality of education. The academic scores alone are not sufficient enough to fully understand the cause of academic success or failure. Various institutes have enrolled students based on their athletic character; most of them do not possess the reasonable possibility to pass the academic tests (Reynolds, Fisher, Cavil, 2012). Several academic researchers have shown the significant effect of demographic characteristics on their academic career. Especially of the African-American athletic student, various factors play the vital role in for both men and women athletics to succeed in academic life. In this particular study, the detailed analysis needs to be performed to understand fully the factor affecting the academic performance of the African-American Student Athletes. In this particular study, the researcher needs to choose descriptive procedure for conducting the research. Furthermore, the analyst will consider both qualitative and quantitative data collection process for having a detailed idea and understanding the research topic. 1. Research questions Research questions are believed to be the most useful area for understanding the research topic in detailed and easy manner. The research questions emphasize in the area of research that provides the analyst with better understanding collecting useful and relevant data for analysis. The research questions set for this particular topic are: Do the African-American athletic students have external influence over the academic performance? How much the demographic characteristics of athletic students affect the academic career? 2. Hypothesis The hypothesis set for conducting the research is: Hypothesis 1: H0: The gender, age, cultural background, occupation, family background effect has a significant impact on their academic performance. H1: The gender, age, cultural background, occupation, family background effect has no impact on their academic performance. Hypothesis 2: H0: The demographic characteristics do affect the academic performance of the African-American Student Athletes. H1: The demographic characteristics do not affect the academic performance of the African-American Student Athletes. 3. Research purpose Conducting the research on the topic Impact of Demographic Variables on African-American Student Athletes Academic Performance will help the researcher understand the relationship between academic performance and demographic variables. In terms of academic performance, there are usually two types of students who can improve their performance and who cannot (Carrell, Sacerdote, West, 2013). Thus, conducting the research will provide the analyst understand the influence of characters like gender, age, cultural background, occupation, family background upon the academic performance of the African-American students athletics. 4. Research Design Choosing a particular research design helps the researcher in explaining the detailed framework for that will provide a better selection of data collection and analysis pattern. During the data collection and data analysis process following a particular approach helps in better defining the selected research design (Traynowicz et al., 2016). In academic researchers, three particular research designs are followed, namely exploratory, explanatory and descriptive. The exploratory research design is utilized by the researcher to acknowledge several kinds of thoughts and ideas required to complete the analysis. In explanatory design, the events and incidents occurrence are described on the pattern of their occurrence. The Explanatory research design is limited only by the cause and effect characteristics of events (Busch et al., 2014). Apart from that, the descriptive design seeks the detailed description along with the occurrence of the incidents or events. Justification: For this particular research topic, the researcher should be avid the explanatory research design since the longitudinal study was not possible to research of this particular topic (Johnson, Wessel Pierce, 2013). For the analysis of this particular topic, the researcher will need to follow the descriptive research design for analysis the impact of demographic characteristics on the African American student athletes academic performance. 4.1. Elements of the design The essential elements of the research design help in describing the conceptual structure of the research design. The vital elements of research design are sample size, types of data collected and data collection procedure to conduct the research. Sample: Population in the research study is defined as the number of people who are indirectly or directly concerned with the research topic (Mertens, 2014). In this particular research study, the African-American basketball players of university and colleges are taken into consideration. Since the number of the population concerned with the research is not possible to represent, the researcher will consider football players of Arkansas, Mississippi, Louisiana, Texas and Alabama universities. Sample size: The sample size is considered to be the number of people on whom the research is conducted. The researcher will consider total 100 football players twenty from each of the area to conduct research. The sample size will be selected on random from different universities. Types of Data: For conducting the research study, the analyst needs to collect various kinds of data. There are two types of data, namely Quantitative and Qualitative. The researcher will collect both qualitative and quantitative data from valid and reliable sources. The Qualitative data are usually defined as the narrative form of data collected from the secondary sources that provide theoretical and better description of the research topic (Mazanov et al., 2013). The quantitative data assists in defining the data collected from the primary sources. The quantitative data provides a statistic representation of the collected data. In this research topic, the data collected from interviews with the professors of the different universities are considered for qualitative data collection and the data collected from students will be considered as the quantitative data. Data Collection Procedure: For the data collection procedure, the researcher needs to consider the face-to-face interview with the professors about the impact of demographic character on students academic performance (Voyer, Voyer, 2014). The interaction session and interview will provide the researcher with qualitative data for analysis. On the other hand, the athletic students of the universities will be given an online survey for collection of primary raw data. 4.2. Data Analysis Measure: The data collected from the secondary source will be considered for providing a theoretical background to the research topic. For the analysis of the data, the primary data will be taken into consideration. The researcher will conduct qualitative and qualitative and quantitative analysis of data. The students will be asked on participating in an online survey that will comprise of various questions. The response of the students will be collected on rating according to Likerts Scale from 1 to 5 (Blumer, 2016). Here, 1 rating means strongly agree, and 5 rating means strongly disagree, and the 3 rating will represent neutral answer towards the question. Statistical Analysis: For analyzing the data collected from the primary sources, the researcher will consider an application of regression models for data analysis (Lewis, 2015). As motioned in the above sections, the researcher has considered various aspects such as academic performance, demographic characteristics, and others. In order to advance with the first hypothesis The gender, age, cultural background, occupation, family background effect has the significant impact on their academic performance" the researcher will consider applying the multiple regression analysis models. For this regression model, the academic performance is considered as the dependent variable whereas gender, age, cultural background, occupation, family background are the dependent variable. Therefore, the regression model will look like- Academic Performance = A + B*Gender + C*Age + D*Cultural Background + E*Occupation + F*Family background Where A = Intercept of the Model B = Coefficient of Gender C = Coefficient of Age D = Coefficient of Cultural background E = Coefficient of occupation F = Coefficient of Family Background On the other hand, for the analysis of the second hypothesis- "The demographic characteristics do affect the academic performance of the African-American Student Athletes, the researcher will also utilize multiple regression models. For this analysis of data, Academic performance is considered as the dependent variable whereas the African-American Student Athletes and demographic characteristics have been considered as the independent variable. Thus, after applying the second hypothesis, the regression model will look like: Academic performance = A + B* African-American Student Athletes + C* demographic characteristics Where A = Intercept of the Model B = Coefficient of African-American Student Athletes C = Coefficient of demographic characteristics 4.3. Strengths and Weaknesses of the Envision Design and Methods Strength: Conducting the descriptive research design for the data analysis and collection of data provides various significant aspects of having in-depth knowledge of the research topic. The significant aspect of the research design is that it will provide a multi-facet approach for the collection of data (Kowalczyk, 2014). This research approach will provide insight details of the academic performance of the athletic students. Apart from that, one of the major advantages of this study that it will maintain data confidentiality of the information collected through the research (Voyer, Voyer, 2014). Apart from that, the data collected for this research will be considered for voluntary involvement of the participants. No external pressure will be exerted on the students for the online survey processes. Weakness: The research procedure allows the researcher in gaining in-depth description and details of the research topic. But there is no denying the fact that, there do exist various limitation and weaknesses that are both non-avoidable and avoidable in nature (Li, 2013). The weaknesses in the research process restrict the scope of the research topic. In spite of the various advantages of conducting the research in the said procedure, there is no denying the fact that there do exists some weaknesses. Reliability: The athletic students involved in the process of online survey were not influenced by any kind of external pressure. However, the students can be biased towards the university and professor that may have affected the findings of the research procedure (Boone, Boone, 2012). Thus, the issues regarding the reliability of the data are existent in the research study. Furthermore, due to the cross-sectional characteristics of the research study, the analyst has the time limitation for conducting the data collection and analysis procedure. Thus, various in-depth information and details will not be able to consider during the study. Another weakness of the research is the budget constraint in this investigation. Lack of sufficient resources has limited the data collection to fewer students and universities that will not provide the accurate research conclusion. 4.4. Quantitative: How you will address threats to validity One of the most vital manifestations of Quantitative Data in the research paper is the validity. The ultimate question that lies while accounting the quantitative data collection and analysis is whether the research can draw a valid conclusion to the research questions (Rosenkrantz at al., 2013). The threat for ensuring the validity of the data lies throughout the research. For mitigating the threats to ensure valid data the researcher need to have sufficient knowledge about the contradiction of logic. The internal validity issues may occur while using the appropriate instrument for the research. To address the threats to validity, the researcher must not be biased against using particular instrument should be avoided. Furthermore, the threats to address the external data validity need to be also considered (Little, Rubin, 2014). The external validity refers to the reliability of the data collected from the sample size of the research. For ensuring the validity of data, the researcher needs to select the sample size on random. Furthermore, the researcher must not exert any external pressure on the respondents for providing responds to the online survey. 4.5. Quantitative: the constructs to measure to operationalize them For measuring the quantitative data collected in the data collection process, the researcher will use Likerts scale for collecting the data on a range of 1 to 5. The responses will be collected on the basis of five entities strongly agree, agree, neutral, disagree, and strongly disagree with the analysis (Mandel, 2012). Furthermore, the researcher will consider the application of multiple regression models for the analysis of collected data on the basis of the hypothesis (Voyer, Voyer, 2014). The data will be stored in tabular form, and statistical representation will be provided for the better understanding and representation of the collected data. 4.6. Qualitative: ensuring the quality of findings The Qualitative data needs to concern about the generalized theoretical concept of the research topic. The qualitative data have empirical applicability, theoretical generalizability and practical usefulness that have threats to the quality of the data. The researcher needs to compare between the empirical findings of the data with the previously conducted research (Fulton, Meyer, 2014). The researcher can ensure the quality of the data findings by maintaining some code of standards and standard instruction for measurement of the collected data. The ambiguous data can be preserved by following the standard procedure in data collection process while interviewing the professors. 6. Data Collection/ Method of Data Analysis The data collection process mentioned in the study helps in better extracting the information and better analysis of the data. The accurate data collected through the data collection procedure helps in driving the research procedure in the appropriate direction. Various sources of data are utilized by the researcher to have a transparent idea about the research process (Hosmer Jr, Lemeshow, Sturdivant, 2013). The researcher will utilize both the primary and secondary sources for collecting the data for conducting the research. The primary source of data will provide raw information about the topic while the secondary data source will help in providing a theoretical background to the research. The data analysis procedure will help in concluding the research. The analyst will use the multiple regression models for the detailed analysis of the collected data. The data analysis of the quantitative data allows the researcher to cross check the previous researchers and qualitative data collected. The multiple regression models will assist the researcher in statistically estimating the relationship existing between the academic performance and demographic character of the African-American student athletics (Krmer, Sonnberger, 2012). 7. Data Collected Will Enables the Researcher to Answer the Research Questions and Contribute To Theory The researcher ill collect the data through personal interviews with the professors and online surveys of the football athletes of various universities. By analyzing the collected data, the researcher will be able to understand the relationship between the academic performance and demographic characteristics among the student athletes (Creswell, 2013). Understanding the relation will help the researcher to utilize the significant area in order to improve the academic performance of the African-American Students. Apart from that, the successfully conducted research will allow the analyst in answering the research questions. Conclusion The entire research focuses on realizing the impact of demographic character on the academic performance of the students. The descriptive research design will allow the researcher in conducting the research while completely monitoring and controlling every procedure of the research study. Based on the data analysis procedure, the analyst will link the relevant data that will improve the success rate of the research. The findings of the research will help the students in overcoming the academic inabilities through the clear understanding of the scope of improvement. References Blumer, H. (2016). Research Purpose, Aim and Questions. InInternal Communication in Bangladeshi Ready-Made Garment Factories(pp. 49-50). Springer Fachmedien Wiesbaden. Boone, H. N., Boone, D. A. (2012). Analyzing likert data.Journal of extension,50(2), 1-5. Busch, V., Loyen, A., Lodder, M., Schrijvers, A. J., van Yperen, T. A., de Leeuw, J. R. (2014). The Effects of Adolescent Health-Related Behavior on Academic Performance A Systematic Review of the Longitudinal Evidence.Review of Educational Research, 0034654313518441. Carrell, S. E., Sacerdote, B. I., West, J. E. (2013). From natural variation to optimal policy? The importance of endogenous peer group formation.Econometrica,81(3), 855-882. Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Fulton, B. A., Meyer, J. S. (2014). Development of a regression model to predict copper toxicity to Daphnia magna and site specific copper criteria across multiple surface water drainages in an arid landscape.Environmental Toxicology and Chemistry,33(8), 1865-1873. Hosmer Jr, D. W., Lemeshow, S., Sturdivant, R. X. (2013). Logistic Regression Models for Multinomial and Ordinal Outcomes.Applied Logistic Regression, Third Edition, 269-311. Johnson, J. E., Wessel, R. D., Pierce, D. A. (2013). Exploring the influence of select demographic, academic, and athletic variables on the retention of student-athletes.Journal of College Student Retention: Research, Theory Practice,15(2), 135-155. Kowalczyk, D. (2014). Purposes of research: Exploratory, descriptive, and explanatory. Krmer, W., Sonnberger, H. (2012).The linear regression model under test. Springer Science Business Media. Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches.Health promotion practice, 1524839915580941. Li, Q. (2013). A novel Likert scale based on fuzzy sets theory.Expert Systems with Applications,40(5), 1609-1618. Little, R. J., Rubin, D. B. (2014).Statistical analysis with missing data. John Wiley Sons. Mandel, J. (2012).The statistical analysis of experimental data. Courier Corporation. Mazanov, J., Dunn, M., Connor, J., Fielding, M. L. (2013). Substance use to enhance academic performance among Australian university students.Performance Enhancement Health,2(3), 110-118. Mertens, D. M. (2014).Research and Evaluation in Education and Psychology: Integrating Diversity With Quantitative, Qualitative, and Mixed Methods: Integrating Diversity With Quantitative, Qualitative, and Mixed Methods. Sage Publications. Reynolds, L., Fisher, D., Cavil, J. K. (2012). Impact of demographic variables on African-American student athletes' academic performance.The Journal of Educational Foundations,26(3/4), 93. Rosenkrantz, A. B., Kim, S., Lim, R. P., Hindman, N., Deng, F. M., Babb, J. S., Taneja, S. S. (2013). Prostate cancer localization using multiparametric MR imaging: comparison of Prostate Imaging Reporting and Data System (PI-RADS) and Likert scales.Radiology,269(2), 482-492. Traynowicz, L., Harrison, C. K., McPherson-Botts, G., Bukstein, S., Lawrence, S. M. (2016). A Quantitative Analysis Of The Academic, Athletic, And Social Domain Perceptions Of Division I Football Players.College Student Affairs Journal,34(1), 17-32. Voyer, D., Voyer, S. D. (2014). Gender differences in scholastic achievement: A meta-analysis.Psychological Bulletin,140(4), 1174.

Wednesday, April 22, 2020

Williamson Ether Synthesis of Phenacetin free essay sample

The procedure stated in Chem 2120 experiment 6 Williamson Ether Synthesis of Phenacetin laboratory manual was followed without any major changes. Data and results CompoundAmount used MW (g/mol) Moles Stoichiometry/Comments acetaminophen0. 354 g151. 162. 34 x 10-3limiting reagent ethyl iodide0. 3mL155. 973. 75 x 10-31. 6 equivs sodium ethoxide 2. 6mL 68. 05 3. 3 x 10-2 catalyst, reaction solvent crude product obtained: phenacetin0. 32g179. 221. 78 x 10-3yield = 76. 06% Recrystallized product: phenacetin0. 16g179. 228. 92 x 10-4yield = 38. 12% Table 1-Reagent and yield Data for the synthesis of Phenacetin Calculations Crude phenacetin: Mass of crude phenacetin product = Crude + watch glass mass Pre-weighed watch glass mass =27. 44g-27. 12g = 0. 32g Recrystallized phenacetin: Mass of recrystallized phenacetin product = Crystals + watch glass mass Pre-weighed watch glass mass = 31. 27g-31. 11=0. 16g Theoretical yield Acetaminophen: Moles = = 2. 34 x 10-3 yield = {mol product / (mol limiting reagent x 1 mol product / 1 mol reactant)} x 100%) Yield for crude phenacetin obtained = * 100% = 76. 06% Yield for recrystallized phenacetin = *100% = 38. 12% For this experiment, acetaminophen was the limiting reagent; hence the crude product gave a yield of 76. We will write a custom essay sample on Williamson Ether Synthesis of Phenacetin or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page 06% while the recrystallized product gave a yield of 38. 12%. Physical appearance for products: On addition of acetaminophen to sodium ethoxide there was a brown coloured solution formed. The crude product obtained was observed to have a beige appearance, and the crystals formed where powdery in texture. On the other hand, the pure recrystallized product gave a shiny white colour appearance, with its crystals being needle like in texture. TLC results: Legend: i= acetaminophen standard ii= phenacetin standard iii = Recrystallized product Figure 1: TLC plate with acetaminophen and phenacetin standard, experimental phenacetin spots. Table2- Qualitative analysis using Chromatography. The Rf values of the standards and re-crystallized sample. The TLC results seen in table 2 above were used to determine the true identity of the experimental product. The standard acetaminophen sample spot had a retention factor value of 0. 16, the standard phenacetin sample spot had a retention factor value of 0. And the spot done for the crude and re-crystallized product gave a retention factor value of 0. 31 and 0. 27 respectively. The Mel Temp temperature had a range of 134-1370C and the standard documented melting point for Phenacetin is 133-1360C. Discussion: Sodium ethoxide (NaOEt) was used to react with acetaminophen. An alternative procedure would include use of weak base potassium carbonate (K2CO3, pKa = 10. 3). K2CO3 is anhydrous, and the Williamson ether synthesis majorly involves the removal of a proton from an alcohol using an SN2 nucleophilic reaction. Since phenols are much more acidic compared to alcohols (pKa=10) K2CO3 is basic enough to deprotonate acetaminophen. When potassium carbonate is present in a solution with acetaminophen it generates the conjugate base of acetaminophen which is powerful enough to pull apart iodoethane. Iodide is left in solution while the CH3CH2 is bonded to acetaminophen and phenacetin is the product. However, Williamson ether synthesis process requires a strong base such as sodium hydride or sodium metal. Recrystallization requires careful techniques which if not followed properly could lead to loss of recrystallized product. Some loss, resulting from transferring solids from one container to another and leaving a little material behind, cannot be avoided. But it can be ignored by improving the techniques employed in transferring the product. Also, because of the solubility of the solid in the recrystallization solvent, even at low temperatures, any unnecessary prolonged contact with recrystallization solvent, especially if the solvent is not ice-cold will result in loss of product. For that reason, the following problems commonly occur: if too much solvent is added in the recrystallization, a poor or no yield of crystals will result. If the solid is dissolved below the boiling point of the solution, too much solvent will be needed, resulting in a poor yield. In order to obtain optimal results, a minimum of near-boiling solvent should be used for the recrystallization, and a minimum of ice cold solvent should be used for the rinse. The recrystallized product was considered to be pure due to the fact that, when ran through the TLC plate, an Rf value of 0. Was obtained which is similar to the Rf value of the standard phenacetin (0. 27) that was given in the lab. Acetaminophen produced Rf value of 0. 16, its low Rf value is due to its affinity to the stationary phase as its comparatively more polar than phenacetin. Acetaminophen consists of hydroxyl group which is more polar than phenacetin consisting of ethoxide group. This causes acetaminophen to travel much slowly up the column; phenacetin is more soluble and hence travels faster up the column (less affinity to stationary phase) in the mobile phase. When the Mel-Temp apparatus was used to observe the melting point of the recrystallized product, it was discovered that the melting point of the experimental phenacetin (134-137oC) was just a fraction off the literature melting point of phenacetin (133-136 oC), the mel range of the experimental product is narrow same as the literature melting point thus revealing the purity and the identification of the phenacetin product attained in this experiment. Phenacetin can also be made by the Schotten-Baumann reaction which is an organic reaction used to convert an acyl halide or anhydride to an amide if reacted with an amine and base. In this reaction there is use of added base to drive the equilibrium in the formation of amides from amines and acid chlorides. The acylation of amines with carboxylic acid chlorides leads to the production of one equivalent acid, which will form a salt with unreacted amine and diminish the yield. The addition of an additional equivalent of base to neutralise this acid is a way to optimise the conditions. Normally, aqueous base is slowly added to the reaction mixture. References: Baar, Marsha R., Danielle Falcone, and Christopher Gordon. Microwave-Enhanced Organic Syntheses for the Undergraduate Laboratory: Diels− Alder Cycloaddition, Wittig Reaction, and Williamson Ether Synthesis. Journal of chemical education 87.1 (2009): 84-86. Pilcher, Spence C., and Joshua Coats. Preparing 4-Ethoxyphenylurea Using Microwave Irradiation: Introducing Students to the Importance of Artificial Sweeteners and Microwave-Assisted Organic Synthesis (MAOS). Journal of Chemical Education (2016). Oauf, A. A., M. A. Eldawy, and H. H. Farag. New compounds: Synthesis of certain p†alkoxyphenylacetamide derivatives as potential analgesic agents. Journal of pharmaceutical sciences 60.1 (1971): 158-159. Volker, Eugene J., Ernest Pride, and Charles Hough. Drugs in the chemistry laboratory: The conversion of acetaminophen into phenacetin. J. Chem. Educ 56.12 (1979): 831. Jackson, Paul F., Keith M. Maclin, and Jie Zhang. Alkoxy-substituted compounds, methods, and compositions for inhibiting PARP activity. U.S. Patent No. 6,197,785. 6 Mar. 2001. Mulder, Gerard J., Jack A. Hinson, and James R. Gillette. Generation of reactive metabolites of N-hydroxy-phenacetin by glucuronidation and sulfation. Biochemical pharmacology 26.3 (1977): 189-196.

Wednesday, April 15, 2020

Good Causal Analysis Essay Topics

Good Causal Analysis Essay TopicsGood causal analysis essay topics are very crucial for students to get the desired result. Students must be able to judge whether or not a given causal analysis essay topic has any relevance in the specific topic of the particular assignment they have taken. You will be glad to know that in case a student is unable to do so, he or she is more likely to fail the assignment than succeed it.Good causal analysis essay topics do not necessarily need to be an exact science based or even directly related to the subject matter at hand. Instead, they should be researched to find out whether or not the overall concept behind the study is indeed relevant.This method is what I call 'seeding' in the field of good causal analysis essay topics. When doing this method, it is best if the essay is centered around a real world example or an actual situation that students may come across in their day to day life. There is no use in doing a one-sided study about a matter that does not pertain to the actual topic, unless it will lead to an insight that can be relevant to the essay.Seeding is especially effective when the topic is any form of business. Many business owners and executives to keep up with current trends and studies to make business decisions and do whatever is necessary to produce a profit. For this reason, business owners will often use these studies to make decisions on the best course of action to take in order to maximize their profits. However, the same cannot be said for business school students, who do not really understand the concept behind such studies.In order to make a good causal analysis essay topics, your research should be grounded in actual and relevant findings that may arise from studies done in the business world. In other words, you must use these findings to draw conclusions that are not simply based on hearsay and conjecture. Instead, you must cite your sources in your conclusion in order to support your arguments .Your final step is to ensure that the information presented in your causal analysis essay topics are backed by scientific research. Students may use data and figures out of context and just do it as a matter of fact. On the other hand, if they have carefully researched the issue, they will show their work with proper citations, at least where this is relevant.When students follow these steps, they will be better able to show their work with proper attribution. Good causal analysis essay topics will take place in academic arenas, where students must learn how to properly present their own and others' ideas. It is vital that this should be one of the fundamental skills of students.Again, good causal analysis essay topics do not necessarily have to be an exact science based or even directly related to the subject matter at hand. Instead, they should be researched to find out whether or not the overall concept behind the study is indeed relevant. You will be glad to know that in case a student is unable to do so, he or she is more likely to fail the assignment than succeed it.

Monday, March 16, 2020

Religious grievances rather than political and social discontent explain why rebellions broke out in England in both 1549 and 1554 Essays

Religious grievances rather than political and social discontent explain why rebellions broke out in England in both 1549 and 1554 Essays Religious grievances rather than political and social discontent explain why rebellions broke out in England in both 1549 and 1554 Essay Religious grievances rather than political and social discontent explain why rebellions broke out in England in both 1549 and 1554 Essay Essay Topic: Religion In 1549, two rebellions broke out in England, the Kets and the Western (Prayer Book) rebellion. There was no single cause of these rebellions. Religious, political and social factors all intertwined to create distress resulting in the rebellions. Religious policies initiated by Somerset continued to make their impact of the country. The prayer book rebellion was a catholic rebellion so religion was obviously important. The Kets rebellion was against rising rents, entry fines and over grazing of the common lands. This shows how social discontent may be the reason they broke out. In 1554, Wyatts rebellion broke out which publicly was against the Spanish marriage. However there were underlying religious factors as well. Source A only touches on religious reasons because the main causes of the rebellion were rising rents, entry fines and over grazing of the common lands. The debasing of the coinage led to the rising prices and social distress. It says We pray that all freeholders and copyholders may take the profits of all common lands and the Lords not to use the commons or take profits from the same. Lords using the commons led to overgrazing. This shows social discontent did help cause the rebellions. The Kets rebels were against the enclosure of common lands but in East Anglia there had not been that much enclosure so it was just an excuse to rebel. Source A says that if priests and vicars were unable to preach the words of God then their parishioners should be able to choose another priest. This indicates they wanted to raise standards of the clergy so religious grievances was a factor in causing the Kets rebellion. However religion was not a main cause of the Kets rebellion. Kets rebels accepted the prayer book but would have liked it to be more radical so religious grievance wasnt important unlike in the Western. The Western rebellion resented the Prayer Book and was against the Edwardian reformation. They didnt like the fact the Prayer Book was written in English rather than Latin. They couldnt understand the London dialect. Source B says We will have the mass in Latin as before. Religious grievances rather than political and social discontent may explain the reasons for the Western rebellion breaking out but not all three of the rebellions. Source B also says how they want images in every church, dont want the new service and that Cardinal Pole should not only be freely pardoned but recalled from Rome. The rebels were of a lower class than the gentry and hated the government officials who were desecrating their churches. They wanted monastery lands to be restored. Even in the Western rebellion there was other factors leading to it but religion was very important. The economic and social distress was the reason the commons rebelled so readily against the Prayer Book. Source B only comments on religious factors but it was the clergy who drew up the rebels demands for the western rebellion so therefore are going to concentrate on the religious factors. In the year before the rebellions their had been a hot summer and crops had failed. Possibly 40% of the population lived on or below the poverty line. Things were made worse by price increases. The introduction of the sheep tax in Devon caused rioting because the commons couldnt afford to pay it. Source C says You ask for a relief (tax) granted to us by Parliament on cloth and shearing sheep to be remitted, saying we have no need for it. The king even recognises the dislike of it. The economic and social distress helped fuel the anger for the rebellions. There also was influence from political factors. There was intense unpopularity of the governments agent, William Body who was eventually killed of the 6th April. He was disliked as identified with the new religious policy so religious factors are important as well. The sources are only about the Kets and Western rebellion not Wyatts. The public aim of the Wyatts rebellion was to stop the Spanish marriage. However historian such as Fletcher and MacCulloch believe that religion was the reason why rebels wanted to stop Marys marriage. The rebellion was led by the reforming faction of Edwards reign which suggests religion was important. Wyatts couldnt use religious factors as the aim of the rebellion because this would split the country as some of the population was still Catholic. This would therefore limit his support. If Wyatts rebellion had been successful, Elizabeth would become Queen and she was Protestant anyway. Wyatts knew there was already wide-spread resentment of the Spanish marriage so used this to gain support. This indicates religious grievances do help explain why the Wyatts rebellion broke out. Some people thought the marriage was a political mistake as through the marriage she could give England away to a foreign empire. However the marriage treaty meant Philip had no power to rule England, he couldnt take Mary or their children out of the country without the consent of the council or drag England into Spanish wars. Also the nobility could resist the marriage to protect their own power and self-interest. Unlike the uprising in 1549, this was a political conspiracy among the elites and there was little popular support. The rebellion was led by Croft, Carew and Wyatt who all held important offices at court. They feared the Spanish influence would endanger their own careers. This shows political discontent helped to provoke the Wyatts rebellion. Overall, although religious grievances do help explain why rebellions broke out in 1549 and 1554, there are other important factors. Religious grievances were very important especially in the Kets and Wyatts rebellions but no single factor caused all the rebellions. Each rebellion started for different reasons. Poverty was worsening because of the debased coinage leading to inflation and price increases. This caused distress which help fuel the rebellions. Kets rebels accepted the pray book so religious grievances wasnt a main cause. The western rebellion resented the Prayer Book and was against the Edwardian reformation but the economic and social distress was the reason the commons rebelled so readily against the Prayer Book. For this rebellion religious grievances was an important factor in why it broke out but political and social discontent was also important. In Wyatts rebellion political discontent of the leaders, religion grievances and social discontent were all important for causing the rebellions. Religious, political and social factors all intertwined to create distress resulting in the rebellions.