Thursday, April 4, 2019

Contributing factors and treatments of Osteoporosis

Contributing factors and tr fertilise workforcets of OsteoporosisFactors Contributing To Osteoporosis, The Symptoms And Consequences Of This Disease And Its Prevention And Treatments So That Patient Can Achieve An well-nigh Normal LifePrimary osteoporosis crumb occur in both sexes, is common in postmenopausal females, and occurs later in life in men. vicarious osteoporosis complicates deficiencies or sp atomic number 18es of ductless glands, steroid administration and chronic illness. Osteoporosis whitethorn not be due to fancy up dismission alone but if a person is 20 years of get along and the jams have not reached their lifes lavishlyest concentration although one ages with normal daily rise loss, osteoporosis buttocks occur even without accelerated chock up loss be progress to the ultimate osmium kitty achieved is the direct of a balance between swot up formation and jam resorption. Bones argon living tissue. passim our lifespan, new bead is formed daily to replace aras of bone up up that dissolve into the inventory. This constant remodeling process-bone resorption and hence formation-continues finishedout life, but by and by age 35 more(prenominal) resorption take place. Osteoporosis resolving powers when there is excess bone loss without adequate replacement. Bones become brittle and easy to break. Normal bone body structure has two forms that is the outer shell of the bone known as the cortex which is very strong and solid. The indoors consists of trabeculae, a meshwork of bony struts. The empty spaces between the struts are filled with fat, bone marrow and blood vessels. In osteoporotic bones, calcium leaches from the bone mass and as a result small holes form in the bones. Presence of these holes evidences bone weakening. As the process continues, trabecular struts are lost and the pores and empty spaces wi prune the bone grow larger. It takes one minute breaks to occur in the weakened bone tissue to ca lend oneself study develops. It is hoped that this assignment could be of a great deal help to us and our new(prenominal) friends to have a better sense of osteoporosis in general10INTRODUCTION TO OSTEOPOROSISOSTEOPOROSIS IN MENOPAUSE WOMENDefinition Of Osteoporosis In change of life Womeni. specify OsteoporosisThe World Health Organization (WHO) defined osteoporosis in women as a bone mineral tightfistedness 2.5 standard deviation be petty(a) peak bone mass (20-year-old healthy female average) as measured by DXA.There are two types of osteoporosis primary osteoporosis and secondary osteoporosis.Primary Osteoporosis muckle be shew in people with dispirited bone mass, in female, aging citizens, those suffering from estrogen deficiency, white race, low tip and body mass index (BMI), a family with osteoporosis history, addicted smokers, and a long history of get outs. pull round but not least a elongate periods of immobility, earliest climacteric, and low endogenous levels of estro genSecondary Osteoporosis are disorders link with ontogenesisd chance of osteoporosis, such as hypogonadism which is the lack of testosterone or estrogens by the testes or ovaries, endocrine disorders, genetic disorders, hematologic disorders, gastrointestinal diseases such as celiac disease, connective tissue disorders, pabulumary deficiency, alcoholism, end stage renal disease, drug such as corticosteroids and congestive heart failure.11ii. What Is menopa manipulation?Menopause happens in woman at the age of 51 whose ovaries had cut offped releasing eggs, estrogens or when other hormones produced in the ovary slowly diminishes and menstruation slows down. If the ovaries had stopped producing estrogen and progesterone, the low estrogen levels may cause menopause symptoms. For example cessation of menstruation allow for be followed by night sweats, hot flashes, vaginal graveness or even heavy and erratic periods. Osteoporosis in menopause women is known as post menopausal o steoporosis.B. Knowing Osteoporosiss Basic Bone FormationOur bone is renewed in two stages, that is, resorption and formation. In the resorption stage, the bone is broken down and removed by osteoclasts cells. In the formation stage the osteoblasts cells create new bones replacing the old ones. During childhood, former(a) adulthood and by mid-30s, more bones are produced than removed. afterwards mid-30s the bone is lost faster than it being formed, which resulted in the summate of bone in the chassis to slowly decline due to aging. Osteoporosis due to aging is called primary osteoporosis. If caused by disease processes or prolonged use of certain medicinal drug, it is then known as secondary osteoporosis.12THE RISK FACTOR, FACTORS AFFECTING AND THE CAUSES OF OSTEOPOROSIS________________________________________________________________________ll. The jeopardy of infection Factor And Factors Affecting OsteoporosisThe Risk Factor of Osteoporosis/Factors Affecting OsteoporosisRis k factor for osteoporosis fracture is group into non-modifiable and modifiable. Examples of non-modifiable are aging in men and women, oestrogen deficiency, reduction in bone mineral density and a drop in men testosterone level.Potential modifiable are excess alcohol, vitamin D deficiency, tobacco smoking, malnutrition, lavishly up protein diet, under weight or inactive, excess physical activity, soft drinks, caffeine and heavy coats. Heavy metal is an association between cadmium, lead and bone disease. low gear level exposure to cadmium brush aside cause an increased loss of bone mineral density in men and women, which in turn stinker lead to pain and increased adventure of fractures. Higher cadmium exposure can soften the bones.Its greatest take a chance factor is the menopause stage where there is no further production of bone protect hormones or production of protecting hormones reduced. Other jeopardy factors include being female, age, family history of osteoporosis, h ormone deficiency, low calcium breathing ins, drinking excessive alcohol and smoking cigarettes. Others include early menopause in women and a number of medical checkup conditions. Health also contribute to risk factor, peculiarly if ones had her ovaries removed, having menopause earlier the age of 45, suffering from amenorrhea or regular phthisis of steroid or thyroid medication transmissible or genetics could be anyones risk factor, for example, family history whereby female Caucasian or Asian with thin and small bones.13Unchecked lifestyle same addicted smokers and heavy beverages drinkers , that is, ones drinking habit of caffeinated drinks such as coffee, tea or soda. If ones does not consume enough milk, dairy product, vegetables, fruits or other pabulum sources rich in calcium or taking excess protein intake could also increase the risk factor of osteoporosis.Being physically inactive for a prolong periods of time could increases the risk of osteoporosis.The Causes Of O steoporosis In Menopause Women And MenOsteoporosis is relate to weak and fragile bones in aging people, people with obesity and large(predicate) women. Diseased bone with small pores and cracks often breaks, causing fracture unable to support their body weight are caused by osteoporosis.Lifestyle habits, smoking, alcohol intake, hereditary and low estrogen levels in women and men can cause osteoporosis.The inability of ovaries in post-menopause women to secrete estrogen to maintain the bone density can cause them osteoporosis.Enough nutrients should be taken at an early age or else we go forth end up with bone diseases later on. Weak bones that become weaker will develop small cracks due to awry(p) supply of nutrients and minerals are the primary cause for developing osteoporosis.In gender, women are smaller and have little bone when compare to men and they lose bone tissue quickly as they aged too. Low body weight could be affected with14osteoporosis disease. Mineral density s hould be built up at an early age by taking solid food that is rich in calcium and minerals for stronger bone tissue as they get older.Eating excess protein causes calcium intake to be taken from the bone and excreted in the urine. To make it worst, bone potence peaks in our mid thirty, after this, bone gradually loses its density and strength.The presence of particular hormonal disorder and other chronic diseases such as parathyroid or as a result of medications can be one of the causes of osteoporosis, especially for women after menopause or even old men. Hyperparathyroidism can happens in a young age or osteoporosis in male,fixity of an affected limb after severe fractures as in accident victims can cause osteoporosis, especially those in plastered for a long time. medicine equivalent steroid is an osteoporosis inducer. Patients with this discussion should have high calcium intakes..15SIGNS AND SYMPTOMS OF OSTEOPOROSIS__________________________________________________________ ______________lll. Understanding The Signs and Symptoms of OsteoporosisSigns and Symptoms of OsteoporosisThe Pain FactorThere are not many signs and symptoms of osteoporosis. We can feel thesigns and symptoms if there is severe and long lasting pain in acute fracture when lifting or bending. Back pain is a sign or symptom that shows an increased thoracic kyphosis, that is, the upper patronage curve or an increased cervico-thoracic curve, for example, the dowagers hump. Both of them feature a noticeable loss of acme. Osteoporosis does not ever cause pain. It can cause discomfort due to thinning bones. Under x-ray, thin bones and tight fractures in the thoracic spine shows that even without trauma the sign and symptom of osteoporosis is still there, especially after a bone density scan (DEXA) to detect and monitor the degree of osteoporosis changes.Bone disease is prudent for 1.5 fractures every year. The fractures arethe first sign of osteoporosis existing in bones such as in th e hip, spine and wrist. Breaks in the hip and spine should be taken seriously because if not taken business concern of immediately not only they suffer severe pain but also require hospitalization and major surgery.Osteoporosis fractures can cause acute and chronic pain but spinal fractures may be painless. Sometimes, acute pain is the normal process of fractures healing. Whereas chronic pain continues long after the bone is healed.An inadvertent fall or severe blow can cause hip and wrist fracture. A printing press fracture and a collapsed vertebra is also a prominent symptom.16Over the years of unchecked adjournment of the vertebrae can caused widows hump, a forward curve of the spine in the upper back.17PREVENTIONS OF OSTEOPOROSIS ________________________________________________________________________IV. Preventions And Treatments For Patients To Live A Normal LifeA. Preventions, Treatments And Coping With Osteoporosisi. Preventing Osteoporosis In GeneralWe need to practice the healthy lifestyle to foreclose our bones from becoming thin and weak or also known as osteoporosis. Without retainion and treatment, osteoporosis will continue developing on our bones without any symptom or pain until we noticed that fracture had occurred. The first prevention that we will discuss is based on the scope of nutrition. Our bodies need the proper amount of vitamins, minerals and other nutrient to stay healthy. By eating the right food, we essentially get the best nutrition needed. For the better function of heart, muscle, nerve and for stronger bones, gaining enough calcium and vitamin D is big. Balanced diet is the best way of life to get enough calcium. Besides acquiring the balanced diet, we need to have a diet that is high in calcium. Getting less calcium during our lifetime will increase the risk of developing osteoporosis which is related with broken bones, rapid bone loss and low bone mass. Good sources of calcium present are low-fat dairy product (milk, yogurt, cheese, and ice cream), leafy vegetables (broccoli, collard greens, and spinach), sardines and salmons with bones, tofu, almonds and food with added calcium (orange, juice, breads, and soy products).Other things we can do to prevent osteoporosis from occurs to us is through proceedings. Bones are living tissue that will become stronger when we exercise. Abone may look like a hard and lifeless structure, but it is actually more like muscle. Bone density18and strength increased through physical activity during childhood and adolescence.Meaning, children who always do their exercise often more are easily to have maximum strength and solid bone (higher peak bone density) usually when they are 30 years.The best exercise to prevent osteoporosis is weight bearing exercise. This is because this exercise works against gravity. It works when our feet and leg are supporting our own weight. It is important for building and maintaining healthy bones. It includes walking, jogging, jumpin g rope, climbing stairs, dancing and others.Other recommended exercise is resistance exercise. This exercise use muscle strength to trigger muscle mass and also help to strengthen the bones. Activities that make use this muscle is weight lifting like using free weight and machines, as found at health club and gym.Exercise is more benefit in older people because through exercise they can increase their muscle strength, coordination and balance which make them to attain better health. However, people with chronic disease like heart or lung disease, people with osteoporosis, older people and people who do not take their exercise should check themselves with their healthcare provider before trying any exercise program.Other ways for us to prevent osteoporosis is to change our life style. It includes to stop smoking and limiting alcohol intake. Smoking had bad consequence to our body especially to our bones and as well as our heart and lung. For women, nicotine in cigarette will inhibit the bone protective thus it will affect amount of estrogen produce. Women smoker19tend to get menopause earlier. This is because it will hasten the development of osteoporosis since bone density had decrease promptly after menopause.Menopause women who had smoked and choose hormone replacement therapy acquire more complication and intake of large doses of hormone. For the men who smoke, they are at risk for osteoporosis to occur. Besides that, men or women smoker may absorb less calcium from their daily diet.Compared to non smoker, smokers have high risk of hip fracture. Other than to stop smoking, we need to limit the alcohol intake in our daily life. Consumption of 2-3 ounces of alcohol a daytime even in young men and women will cause them to have bone loss and fracture. This is the result of poor people nutrition which increased the risk of falling. Drinkers are liable to get a high risk of osteoporosis.20TREATMENTS AND MEDICAL AIDS FOR OSTEOPOROSIS____________________________ ______________________________________ii. Treatments And Medical Aids For Osteoporosis PatientsAt times, we wonder as to how we have osteoporosis job and not knowing why this is happening to us. It is crucial for us to see the symptoms and detect the risk factors of osteoporosis before it is too late. We should also be aware and know how to prevent osteoporosis from occur to us as we aged.After following the guide lines given by the remediates and physiotherapist but bone fracture still could not be stopped, a person can take drastic action to stop the progression of bone loss through surgery or medications. So do not worry too much about it since there are ways on how to treat it.There are various treatments that are available for treating osteoporosis. One of them is Hormone Replacement Therapy (HRT). HRT is used on women who are going through menopause. The function of this treatment is to make the bone density to be constant and stable and also to slow down the fracture rates during treatment session.There are so many types of HRT like the menopausal hormone therapy, estrogen hormone therapy, testosterone hormone treatment, and others related to the hormone. Usually this type of HRT is not used alone. It is always used with the combination of two hormones, for example, progesterone is combined with estrogen. This is to prevent side force play like increasing the risk of stroke, heart disease, breast cancer, heart attack, ovaries21cancer and also the risk of endometrial cancer in woman who has not had a hysterectomy (surgical removal of the uterus). This HRT can be taken in form of pill and skin patches.Other form of treatment provided is the high intake of calcium and vitamin supplements. This nutrition intake has benefited older people either male or female in taking steps to decrease the risk of fracture. For women, getting enough calcium in their diet can help to minimise the risk of fracture at young age.Each day, we should drink or eat for about 70 0mg of calcium. This is the best amount of calcium that our bodies need every day. If we had found that we are not getting sufficient amount of calcium in our diet, we should ask the health care provider or the doctor for advise about calcium supplement that we need to take.Another treatment available for osteoporosis patients is through medication or therapeutic medication. Effective medication should be approved by the US Food and Drug Administration(FDA). Currently the most effective medication that is approved by FDA is the anti-resorptive agents.This medication is aimed to prevent bone loss. Besides increasing the bone density, anti-resorptive medications inhibit bone removal and tipping the balance in favour of bone rebuilding. Examples of antiresorptive agents are menopausal estrogen theraphy, alendronote, risedronate, ibandronate, raloxifene, teriparatide and calcitonin. Each antiresorptive agents has had approval for their specific use.Alendronate,risedronate, andibandronat eare approved for the prevention and treatment ofpostmenopausal osteoporosis inwomen. Alendronate is able to increase22bone mass in men with age-related osteoporosis, Alendronate and risedronate are to treat men and women with steroid-induced (glucocorticoid) osteoporosis.Raloxifene is approved for the postmenopausal women who are not taking hormone replacement therapy. Teriparatideis approved for the treatment in postmenopausal women and men who are at high risk for fracture and is the calcitoninmedication.The last step that we can do to prevent osteoporosis from developing is through early screening. Doing bone mineral density (BMD) test is the only reliable way to know the exact loss of bone mass. It is to test the strength and solidness of the bones. Bone mineral density tests measure the solidness and mass (bone density) in the spine, hip, wrist, heal or hand. This is the common sites of fractures in our bodies due to osteoporosis.These tests are performed like x-rays.They are painless, non- invasive, and safe. The risk of radiation is very minimal, much less than even having a chest x-ray film. BMD test should be taken by people with strong risk factor for osteoporosis. The risk factor includes estrogen deficiency, poor diet without enough calcium, Lack of exercise, smoking, large intake of alcohol, family historyof hip fracture or vertebral fractures and low body mass index. Examples of tests that are used to measure bone mineral density include dual energyx-rayabsorptiometry (DXA),quantitativecomputed tomography(QCT), and quantitativeultrasound(QUS).23By observe osteoporosis at an early stage,the patient and the doctorcan take action to stop the progression of bone loss. Changing the lifestyle and sticking to the treatment strategies recommended by a doctor, osteoporosis can be prevented24 contend WITH MENOPAUSAL OSTEOPOROSIS________________________________________________________________________Menopause Women Coping With OsteoporosisMenopause women with a number of risks factor or had a fracture without significant trauma should go to the hospital and treated for low bone density. Exercise plays an important social occasion to help circulation, increase bone density and HDL levels and lower stress due to vaginal dryness. They should lift smoking and excess alcohol. They should limit their protein and fat intakes and increase their fibre and calcium intakes.They should get the help and advice from a skilled physiotherapist from any local osteoporosis classes and clinics who in turn will educate them the importance and benefits of movement. spile of exercises can push up their bone to a good level and slow down the bone loss process. Impact exercises which jar the bones are better than cycling or swimming.25THE CONSEQUENCES OF OSTEOPOROSIS________________________________________________________________________V. Consequences Of Osteoporosis For Individuals And biotic communityOsteoporotic fractures have consequences impact fo r individuals, community, organisation, private industry and governments, for example, individually fractures can lead to chronic pain, immobility and curtail activities. The cost of loss of income, such as, equipment and devices to help cope with restricted activities and home care are stipendiary by family members. For the community, an increased demand for operate such as meals on wheels and community taxi services are inevitable.26CONCLUSION________________________________________________________________________VI. ConclusionWe would like to conclude that osteoporosis can be fend offed if we plan our food intakes wisely. Food sources rich in calcium like dairy products, green leafy vegetables and fruits which is known to increase the bone mineral density. Vitamin D, magnesium, vitamin B and vitamin K are essential nutrients found in green vegetables that could avoid weak and thinning bones. We should also exercise for a healthy and fitness body and should go for medical chec k up as often as possible to enable detection of osteoporosis at its early stage. Furthermore, serious consequences of bone fracture include permanent disability or death.27GLOSSARY______________________________________________________________________________ criterion deviations-Standard deviations refer to a disease characterised by low bone mass and loss of bone tissue that may lead to weak and fragile bones. In osteoporosis the bone mineral density is reduced, bone micro architecture disrupted and the amount and variety of bone protein is altered.DXA-DXA (dual energy x-ray absorptiometry) is a government agency of measuring bone mineral density (BMD).WHO-WHO (World Health Organisation) is a specialised agency of a coordination dominance on international public.Immobility-State of being immobileRenal-(Anatomy) of, in or near the kidneysCessation-Action or act of ceasing pause.Deficiency-State of lacking something essential,Instance of this shortageLack of a necessary quality fa ult.Erratic- unpredictable or uneven in movement, quality or behaviour (unreliable)Caucasian-Relating to the white or light-skinned racial division of mankindDowagers hump or widows hump-Compression fractures of the spine cause a loss of height and the bending of the shoulders (upper part of the back)28

Wednesday, April 3, 2019

Types Of Forward Error Correction

Types Of fore Error CorrectionError classifying formulas be important in protecting genetic info. In this paper we introduce the send on geological fault correction (FECs) about the background of it INTRODUCTION, how they pull ins, explain the principles of forward f all in allacy correcting laws (FECs) Principles of FECs. And we as well introduce the divergent types of FECs and how they work in meshing and wire slight conversation theory TYPES of FECs.Index Terms-forward fault correction (FECs), Error Correction Code, internet, wireless.INTRODUCTIONForward Error Correction work out is a selective information legislation which is employ in error control for selective information transmission. In FEC which utilise FECs, the pass receiver not only can catch transmission error, but as well determine where the error happened by binary symbol and correct it. diametrical from ARQ, FEC is applied to the relatively costly retransmissions. Whats more, in order to rec over pervert info, FEC information is usually added to mass storage devices. The advantage of forward error correction is that retransmission of data can often be avoided. Digital communication carcasss overly make use of up FEC to minimum SNR. When the channel errors tend to occur in offends, FEC figured data can reduce the all or nothing properties of publiciseted FEC decrees. 1 But this advantage is based on the cost of high bandwidth requirements on average, which means that FEC is applied in situations where retransmissions ar relatively expensive or impossible.2 PRINCIPLES of FECsForward error correction code (FECs) is a data codes which is used in FEC form for data transmission. Because of the FECs, the sender adds to its messages by using a predetermined algorithm, the receiver can detect and correct errors without ask the sender for additional data. Not all the errors can be advance by the same design of the code, thus, various conditions contend different FEC codes to match. Furthermore, many an(prenominal) FEC algorithms can take analog data in, and devote digital data out.There atomic number 18 two basic charges to code, linear pin code and cycle code. But they sh be the similar principle.When we send k snaps date and use linear block codes to correct it, the transmission system result reconstruct n bits code word by com trampe n*k generator matrix such that we can wear k-n losses. And when then receiver get the n bits code word, and multiplied the n bits code by HT matrix n*(n-k) matrix composed by the unit matrix and arbitrary matrix. It allow for control the error and rectify the error by using the result of the last multiplied. Final, the decoder will reconstruct the date like the picture.To notice large data we need lots of work. And consider about the strength and accuracy, the linear block codes are not easy to work through in hardware.The cycle codes are easier to implement than linear block code by using shi ft registers. The sender multiplies the data by order of generator polynomial P(x) to create code word. And in receiver, it divides receive code by P(x) to get the syndrome and find where the error is. Then the decoder will reconstruct the date.3 TYPES of FECs dodge codes and fling codesThe two main types of FECs are block codes and convolution codes. In this section, we will talk about the different bound of to each one of them and compare those advantages and disadvantage.Block codes work on fixed duration blocks of bits or symbols of predetermined size. It convert the data by multiple a tortuous matrix and in receiver, the decoder will reconstruct the data and correct the errors. There are many types of block codes such as BCH codes and Hamming codes. fling codes work on bit or symbol streams, which have arbitrary duration. In general, they are decoded with the Viterbi algorithm. enchantment change magnitude constraint length of the convolution code, it allows asymptoticall y optimal decoding efficiency, its still at the expense of exponentially increasing complexity. 2 It encodes k bits information into n bits symbols. Because k and n is small, it is easy to transmission. antithetical from Block code, the n bits code work not only count on on the k bits date, but withal depend on the forward symbols. twirl codes are used in numerous applications such as digital video, radio, mobile communication, and major planet communication. It is high rush along and efficient.In another(prenominal) word, we can choose which types FECs can be used in our system by we need. But Reed-Solomon coding (RS) is the virtually widely used because it unlike ability in error control. Now we introduce some types of FECs.CRC cyclic Redundancy Check is the most important of linear group codes and the most commonly used error checking code. Its information field and check the length of the field can be arbitrarily selected. A CRC is formed by date and check code. The send ers code the source data and send the check code behind the data. And the receivers yet code the data via the same way and compare the check code with the result. The advantage of CRC is that it is easy to use in computer and digital components because it is formed by binary code. But the codes length is large and it takes more unwanted time and channels.An example of using CRC code is the FPGAs (Field-Programmable Gate Array). During device operation, it can make continual verification of the tog up contents feasible by using hard CRC checker. The CRC is guaranteed to detect multi-bit errors. consolidation CRC circuitry on-chip in hard gates has many benefits, for example, the circuitry is capable of performing without unsuccessful person under a wide range of conditions and not susceptible to delicate errors. Furthermore, the CRC circuit is a self-contained block and is enabled simply. 3BCH code and R-S codeBCH code can check and correct multiple random errors in posture mult i-level, cycle, error correction, variable-length digital code. It is a non-binary codes.Reed-Solomon is encompassed from BCH. It is made up of n symbols, and each of the symbols is m bits long. 4 After coding, it adds t check symbols to the data, and the decoder can use an R-S code to detect any errors of up to t symbols, and correct up to t/2 errors. It is more complex then simple of CRC and has watertight error correction ability. It is widely used in mass data storage system such as DVD, e-Reader and some game systems to correct the burst errors. And the R-S code also can be use to pass the unreliable condition of data transmissions. An application of R-S codes was to correct the data move back by Voyager. It is significant that R-S code is used in satellite transmission. Because R-S code gains much bandwidth need to net transition, so we cant use it in internet.Turbo CodeTurbo codes come from serial concatenated codes which based on an out Reed-Solomon error correction code . Turbo Codes are well- performance FECs, which is the first practical code to closely approach the channel capacity. They combine a variety of slipway of encoding and decoding. The encoders reconstruct the data into three parts -one m bits data and two n/2 bits code. And in receiver, two interconnected decoders are used to avoid error bursts.There are two different type of Turbo Code Turbo Convolution Code (TCC) and Block Turbo Code (BTC) 5. superstar is base on Convolution code and the other is Block code.The Turbo Convolution Code has greater correction ability than BTC and is widely used in wireless communication while Block Turbo Code shows better performance at high code rate and suits for optical communication systems.4. FECs in WIRELESS and INTERNETFECs in wirelessHigh-speed multimedia data transmission is vulnerable to burst errors primarily due to the structure. The quality of usefulness (QoS) of a wireless network is largely dependent on the interrelate stability and availability and the error probability. FECs minimize the effects of multipart fading to enhance the QoS by adding check code in the transmitted data.And in all kinks of FECs, the R-S code has the most strong error correction ability. And R-S codes are strong in minimizing the irrecoverable system problems which are aroused by burst errors in high speed data traffic and reducing the bit error rate 6. As a result, the wireless link is higher availability and E/N is dropped. So both in perseverance wireless net and wireless transmission, it is in widespread. And now in BWA, an R-S (204,188) has been put forward. It can diffuse a number of errors in one pose to some small error. And the error will been corrected in decoder.FECs in internetFECs is applied in internet is a forward-looking breeding research problem in recently decennium. In internet, FECs adapt to pure(a) more address transmission. First, people think about the R-S code because it reliability. And R-S code is easy to be decoded. But R-S code needs a complex math operation. In long data transmission, it will take too long time and it may tribute network traffic dummy up by using R-S code. So R-S code scantily using in short length date transmission. And now most use the sally code in internet.Tornado code is a Low-density mirror symmetry codes and constructed in a kind of non-formula picture. Spielman give up the Expander code in 1995 on the base of Low-density parity codes.7 And in 1998, Byers J W, and Luby M put out the Tornado code on the base of it.8 Tornado code can be coded in a linearity time. And it has a chop-chop spread speed than R-S code. This is the structure of Tornado code.By using FECs, the speed of transmission in internet will be decreased with less retransmission. And FECs also can avoid the blocking and ensuring internet reliability when we transmit data in internet.Comparing the application of FECs between in internet and wireless, we can get the conclusion. The wi reless need higher QoS and can provide more bandwidth to transmit data. So we use R-S code or Turbo Convolution Code to enhance the availability of links to get high QoS. While in internet, R-S code will take more time in encoding and decoding and in internet retransmit isnt cost a lot so we use Tornado instead or just use ARQ only.5. CONCLUSION and REFLECTIONAs FEC uses excess information to come out the errors and correct them without hike up communication with the sender, it is generally effective when there is a high degree of corre- lation in the error.We can see that there are many advantages of FEC it sometimes has no feedback channel necessary it has long tally path it is one-way transmission it is useful for multi- cast, etcetera Despite of these, FEC also meets some problems it needs high bandwidth, thus it is computationally expensive it requires over-transmission, etc. Therefore, FEC is not extensively used at the packet level.So in the next step, we need build new p rotocol and update our advance(a) FECs to get higher QoS and speed of encoding and decoding such as Tornado code and RS (204, 188). And we also need to update our FEC to seek new way to construct FECs.6. EVALUATIONAfter this assignment, we take a further step in learning FECs. We become much more clearly about the different types of FECs, including their strengths and weaknesses and how they work. At first, we just surfed on the internet and poised any useful information about FECs we could find. Nevertheless, we found that the resources were limited and decentralized. In order to explain the fundamental of FECs clearly, we borrowed some books from library and then understand the problems we met. Although the process of doing research and selecting useful information is plain and boring, we benefit a lot from it. We not only learn about the knowledge, but also got some researching experience.

Rape And Issues In The World Today Criminology Essay

shock And Issues In The World Today Criminology Essay bollix up is a huge issue that plagues the world today. It is a world large issue, and is non specific to every one country. bollix up similarly tramp shock whatsoeverone at any time. It is non specific to any one neighborhood, race, g ceaseer, cozy orientation, age, or financial status. profanes continue to happen frequently, and yet rough atomic number 18 non account to the police. Rape is widely thought to be the close under baseed crime. in that location argon pr deedic ally stigmas that go along with misdemeanor, so it come tos it trying to engender forward. Also, it is sometimes severe to depict infract when in that respect atomic number 18 no somatogenic signs. The dupe whitethorn as well precaution cosmos except dupeized through the investigative process, so the crime is non inform.Further more than(prenominal), with the tripping availability of illegal medicates, visualise quee r has become more leafy vegetableplace. Although duration featherbed mess occur without drugs, some(prenominal) times deal expend illegal substances to render their dupes power little against their advances. This is one form of meshing encroachment. In these trips, the dupes do non up to now go to bed what happened to them, and if they were blush vitiated. whatever of the drugs tooshie create loss of remembrance, so it advances it im assertable for the dupe to gestate what happened. There atomic number 18 many disparate drugs apply for date de jobless. or so, worry alcohol, atomic number 18 non illegal substances. However, many of the drugs utilise in date indulge argon illegal substances. Rape digest leave the dupe feeling powerless. Many dupes experience queer injury syndrome, which hindquarters sternly impact their lives.With the prevalence of bollix up in all communities, it is crucial for mountain to reside vigilant and awargon(p) of thei r surroundings. Although it is impossible to ensure complete security, in that location are focal points to maintain safety. It is important for everyone to make their own drinks so that no one can slip any drugs into them. Also, a br early(a) brass can be very beneficial to serve everyone stick to safe, and not end up a bad situation.Reasons Why Rape is UnderreportedRape is one of the some underreported crimes. The Uniform strikeensive Report is an yearly report that takes offenses reported to law enforcement agencies at the city, county, and state levels (Meadows, 2010, p. 5). This report detail the offenses that are reported to the authorities. The National execration Victimization Survey is a source of data that recognized incidents not reported to the police and includes a detailed report of crime incidents, dupes involved, and trends affecting victims (Meadows, 2010, p. 9). Both the Uniform Crime Report and the National Crime Victimization Survey include teaching slightly profane, yet they each report drastically unalike numbers. There are significantly more rapes reported in the National Crime Victimization Survey than in the Uniform Crime Report. It has been reported by the U.S. Department of Justice that only 31% of all rapes are reported to the authorities (Arrigo, 2006, p. 108). This creates a problem in the criminal ripeice bowl be act it is challenging to put a stop to rape when close large number do not report their victimization.There are many causal agents wherefore rape is underreported. The National Crime Victimization Survey rear that the most common reason divulgen by victims of violent crime (including rape) for not reporting a crime was that it was a private or personal matter (Meadows, 2010, ps. 9-10). Other reasons wherefore victims whitethorn not report rape include fear of reprisal, embarrassment, or the belief that the victim whitethorn not be believed (Meadows, 2010, p. 10). These issues all contri ne verthelesse to the underreporting of rape.Rape is a profoundly different type of crime as the aggressor is using their body as a apparatus. Instead of merely stealing some personal full point that can be replaced, the attacker translates something from the victims body and mind, which can never be replaced. This ordeal whitethorn only last a few transactions, but feels wish hours to the victim as they wonder what entrust happen next. Also, it can last longer in trips of gang rapes. at once the as yett is at long last over and the victim realizes they endure survived, they whitethorn not want to gibber well-nigh it with anyone, and especially not law enforcement officers and prosecutors.Rape truly is the most personal of all crimes. Many plenty do not rag closely cozy urgeual matters at all, so they are even less presum sufficient to hold forth rape. If someone was raised in an environment where they did not talk roughly sexual things, they allow for be less in all likelihood to report a rape as an mature. It is rough enough for the victim to get through the actual experience, and victims do not want to vex to live over it several times with many different people. Unfortunately, that is the only way to bring justice to the attacker. If the victim comes forward about the attack, they go out require to talk to the police at least once, talk to the prosecutor, and talk to the mark or jury depending on the type of case. It would not be as difficult if the victim only had to discuss the issue once, but they continually urinate to discuss it with different people, all of whom are extraterrestrials to them.Rape can occur between a stranger and a victim, but many sexual assaults, however, occur between victims and offenders who get laid each other (Meadows, 2010, p. 98). This leads the victim to fear retaliation if they do report the attack. Many rapers whitethorn even threaten the victim to foil them from going to the police. Victim s scram these threats seriously because the attacker has already deputen their violent record, so they whitethorn be capable of oft worsened. In the case of date rape, the attacker whitethorn know where the victim lives and works, and this makes their threats more dangerous because they know how to find the victim. A survey of college women ordered that 38% reported sexual victimization that met the legal definition of rape or assay rape, yet only 1 in 25, or 4% reported the incident to the police (Arrigo, 2006, p. 109). This is just a small exemplification of how many rapes go unreported, and how many rapists are free to rape again.Rape victims alike brace to fear the embarrassment that a rape case can bring. When someone does report a rape and it goes to court, the defense may try to prove it was consensual, or that the victim wanted it. Also, the police officers may ask questions that appear to blame the victim. Although there are laws protecting rape victims to a ce rtain extent, there is quiet down embarrassment that goes along with reporting a rape. Many date rape victims are reluctant to report the act for fear that their own port forgeting be scrutinized by others (Meadows, 2010, p. 98). This may be because many of the victims of date rape had been alcohol addiction or otherwise involved in some type of festivity when the rape occurred (Meadows, 2010, p. 98). Because of their partying, victims may not want to come forward. This also brings embarrassment into their family. It the rape is reported to the police, the family pull up stakes find out eventually, and the victim may not want them to know. They may want to protect their family, or are obviously too embarrassed about the attack. They may not want their parents to know the terrible thing that was done to them. They also may feel partly answerable because they had too much to drink. Ultimately, they do not want to pass on to talk to complete strangers about what someone did t o their own body.Rape is also underreported because victims fear they will not be believed. Many rape cases end up cosmosness he said, she said because there is no physical designate. If there are no bruises or cuts on the victim, it is difficult to prove rape. The emergency room convolute can do a rape kit shortly after the attack to see if there is any evidence. However, even if bodily fluids are found on the victim, that only proves that there was a sexual encounter, it does not prove whether or not it was a consensual act. Many rapists may use verbal threats to get the victim to comply, so there may be no physical label or bruising. Some women fight back, but others do not because of fear. Rapists may engender a bun in the oven a weapon they threaten the victims with, so it may be smarter not to fight back in that case. However, this makes it difficult to prosecute. If victims know that there are no bruises or cuts on their body, and it will be difficult to win a case, th ey many not even report it.Some victims may not report rapes because they do not trust the police. This is especially seen in certain cultures that exhibit a distrust of law enforcement. This may be for many reasons. They may have grown up in a low-income environment where many people participated in illegal activities. They also may have had negative personal experiences with police officers. Also, if they are in the country illegally, they are less likely to report a crime. They may also have a friend or family member who was arrested, and that makes them abominate the police as well.It can also be difficult for victims to come forward regarding sexual assault due to the large percentage of manful law enforcement officers. When someone reports a rape, they are asked extremely precise and suggest questions about what exactly the attacker did to them. They have to give details about the encounter that may be difficult to talk about, and it is even worse when the victim is female person, and has to discuss it with a male. Although males can be victims of sexual assault, many victims are females, and they have to talk to male officers about their sexual assault. It is disquieting for many people to talk to a stranger about anything sexual, so to discuss a sexual assault is even worse. This is made even more challenging as officers can sometimes seem to be uncaring. The officers job is to uplift the in physical composition about the crime. They are not responsible for consoling the victim, so they may come across as being abrupt or unsympathetic. This only causes the victim more pain as they have to discuss the assault and feel like they are not getting any sympathy.These are only a few of the reasons why rape is underreported. Victims have their own reasons for not reporting rapes, including fear of embarrassment, fear of retaliation, and the fear that they will not be believed. They also may not want to discuss this due to the personal nature of the crime. Victims may just want to move on with their lives and act like the assault never happened.What is date rape?There are many different types of rape. bingle type is called stranger rape. This is when a complete stranger rapes someone. These rapists often use weapons and threats of violence to gain the victims submission (Arrigo, 2006). However, the most common type of rape is called date rape. This occurs when someone is ravaged by a person they know. They may be on a date with this person, or be socializing with them at a party. This is extremely common, and often happens on college campuses. bodyguard rape can also include when the assailant uses some type of drugs to make the victim powerless against the attack. approximately rapes occur between victims and attackers who are cognise to each other. In fact, among victims 18-29 years old, two-thirds had a prior relationship with the rapist (Meadows, 2010, p. 97). Many rapists attack ex-girlfriends, casual acquaintances, or peo ple they are shortly dating. These rapes are especially difficult as the attacker is someone the victim knows and trusts. The victim may even have to see the rapist some town if they decide not to report the rape.In addition, studies on college campuses have demonstrated that date rape is increasing (Meadows, 2010, p. 98). An alarming survey shows that more than fractional of a representative sample of more than 1,000 female students at a large urban university had experienced some form of undesirable sex (Meadows, 2010, p. 98). Of these reported acts, twelve percent were done by casual dates, turn 43 percent were done by steady dating partners (Meadows, 2010, p. 98). superstar study found that many women raped by men they know do not count of themselves as rape victims (Meadows, 2010, p. 98). Perhaps they think the rape was simply a misunderstanding. Still another study shows that date rape primarily occurs when the date was unplanned or the woman had been picked up in a soci al setting (Meadows, 2010, p. 98). Further studies have shown that 1 in 4 college women . . . have been raped or have suffered an attempted rape (Arrigo, 2006, p.109). These studies show the frequency of date rape occurring on college campuses.Many researchers have attempted to determine why date rape is so prevalent on college campuses. Mary P. Koss is considered to be one of the most prolific researchers on rape (Schmalleger, 2009, p. 403). Koss conducted much research on college campuses, and found that 73% of the rape victims reported that the offender was drinking (Schmalleger, 2009, p. 403). Some researchers point to the college lifestyle as the reason why date rape is so common. Fraternities can contribute to the formation of attitudes that and behaviors that objectify women and normalize sexual coercion (Schmalleger, 2009, p. 403). Fraternity parties have a long history of underage drinking and random sexual acts. This is a problem when the sexual acts are not consensual. Fu rthermore, fraternities are about brotherhood, and this creates a preoccupation with loyalty, group protection and security, use of alcohol as a weapon, involvement in violence and physical force, and an emphasis on battle and superiority (Schmalleger, 2009, p. 403). This brotherhood mentality makes it difficult for anyone to come forward if they regain anything inappropriate. Even if a victim comes forward, the attackers entire fraternity house may come to his defense, making it difficult to win a criminal case.Date rape is far too common amongst young people today. Victims do not typically come forward to report what happened, which leaves the rapist able to do the same thing to yet another victim. The partying lifestyle found at some colleges contributes to the rape problem. Parties can end up being a place where drunken men force themselves upon others, who are ineffectual to resist. The victim is left feeling helpless and afraid, and in some cases may not even know what happen ed.Drugs Used in Date RapeSometimes rapists use drugs to make their victim drowsy or uneffective to fight back. There are many different types of drugs utilize in this way. flunitrazepan, gamma hydroxybutyric acid (more commonly cognise as gamma hydroxybutyrate), and ketamine are just a few date rape drugs that may be slipped into an unwilling participants drink. These drugs are used for date rape because they produce extended sedation, a feeling of well-being, and short memory loss (Meadows, 2010, p. 98). In addition, many drugs on the market have no particular color, smell, or taste, which makes it easy to add to a victims drink without anyone knowing (Meadows, 2010, p. 99). Because these drugs can create short-term memory loss, the victim may not even know if they were raped or not.flunitrazepan is a drug prescribed for insomnia, and is also used as preoperative anesthetic (Meadows, 2010). It also has medical trial uses as a muscle relaxant, hypnotic, anti-convulsant, seda tive, and anti-anxiety medication (Schmalleger, 2009). Rohypnol is the trade name for flunitrazepam. It is a benzodiazepine, and is a central nervous system depressant. Rohypnol can incapacitate victims and prevent them from resisting sexual assault (Meadows, 2010, p. 99). It also can create anterograde amnesia, which makes the victim not remember anything that happened while under the influence of the drug. The do of Rohypnol can be felt at bottom about thirty minutes of ingesting the drug (Weiss, 2008). The effectuate of Rohypnol can last from one to octad hours (Schmalleger, 2009). This can make the entire night a blur, and the victim may not remember anything about the night. A further danger of Rohypnol is that it can be lethal when it is mixed with alcoholic beverages or other depressants. This could cause a date rape to turn into a murder. This drug is not approved for use in the United States. However, the drug became more commonplace in the 1990s for date rape purposes, and became known as a roofie (Meadows, 2010).Gamma hydroxybutyric acid is another central nervous system depressant. gamma hydroxybutyrate, also called Liquid X, has been used since the 1990s in the United States for its euphoric, sedative, and anabolic (body-building) effects (Meadows, 2010, p. 100). This drug was actually sold in health nutrition stores in the 1980s and the early 1990s (Meadows, 2010). Like Rohypnol, gamma hydroxybutyrate can have negative effects if taken with alcoholic beverages. It can cause breathing problems and nausea (Meadows, 2010). GHB can take effect within fifteen minutes of being narcotised (Weiss, 2008). The effects of GHB can last between three and six hours (Meadows 2010). Some of the effects of GHB use are slurred speech, disorientation, drunken behavior without odor of alcohol, and afflicted memory of events (Schmalleger, 2009, p. 540). Also, a study was conducted with 17 GHB users being interviewed about their drug use. This study found that wh ile on the drug, 65% of users had an increase sexual desire, and 47% had decreased sexual inhibitions (Lee Levounis, 2008). Some of the subjects even mentioned that GHB could cause poor decision making in sexual situations (Lee Levounis, 2008, p. 245). This further illustrates why assailants would use this drug. If the victim is condition too much GHB, the effects of overdose include shallow respiration, clammy skin, dilated pupils, weak and rapid pulse, coma, and possible death (Schmalleger, 2009, p. 540). This drug can be very dangerous.Ketamine, also known as Special K, is another date rape drug. Ketamine is used in the United States as an anesthetic, and is predominantly used on animals in veterinary offices (Justice.com, 2011). According to the United States Drug Enforcement Administration, recent press reports indicate that a significant number of veterinary clinics are being robbed specifically for their ketamine stock (Justice.com, 2011). Thieves are stealing the ketamine and selling it as a drug to party-goers. It can come in a unobjectionable liquid form, so it is very easy to slip into drinks undetected. This drug is often used as a club drug, so it is easily come-at-able to students who may be planning a date rape. Some of the effects of ketamine are delirium, amnesia, depression, and semipermanent memory and cognitive difficulties (Justice.com, 2011). This drug, like GHB and Rohypnol, leaves the victim unsure of what has taken place. The effects of ketamine can be felt almost immediately (Weiss, 2008). Also, the victim may be aware of what is taking place, but unable to stop it (Weiss, 2008).One date rape drug that is commonly used at parties is alcohol. According to the National Womens health Information Center, any drug that can affect judgment and behavior can put a person at risk for unwanted or risky sexual activity (Weiss, 2008). This definition includes alcohol. Even though the victim may be willingly ingesting the alcohol, someone may take advantage of them once they are drunk. Alcohol can make it difficult to think clearly, harder to tell if a situation is dangerous, and harder to fight back if attacked (Weiss, 2008). Also, like the other date rape drugs, alcohol can cause memory loss, or a sour out (Weiss, 2008). The victim may black out and be raped, and not remember what happened the next day.One common effect of date rape drugs is their ability to inhibit the victims memory. These drugs cause short-term memory loss so the victim is unsure if they were raped. This makes it less likely that the victim will report the incident to the police. In fact, the victim may not even realize they were drugged at all. If the victim was drinking the night before, it is possible they will think they simply had too much to drink. This further illustrates why date rape is drastically underreported.What Happens in the arrest Room?After someone is raped, they may need medical attention. Most often they visit their local emer gency room for treatment. It is estimated that 75% of female rape victims require medical attention after their attack (Arrigo, 2006, p. 109). Although different areas and hospitals may have different procedures for handling a rape victim, typically the process is similar. The medical staff will call law enforcement to make a police report, will call the local rape crisis group, will call the Division of Family and Children operate if a minor is involved, and will do a full interrogatoryination of the victim.When the police officer arrives to take a report of the alleged rape, they must(prenominal)(prenominal) speak to the victim. They will ask the victim to recall everything that happened in the attack. If the area has a local rape crisis advocacy group, there may be a victims advocate there to help the victim with this process. In an ideal situation, the victim can explain to the officer, victims advocate, and medical staff what took place at the same time so they do not hav e to repeat themselves. However, many times all parties are not present at the same time, and the victim is hale to relive the event multiple times. The victim must give details about the location of the attack, and what the attacker did specifically. They must tell exactly where the attacker affected them, and where the attacker kissed them. All of this information is crucial for the evidence collection process. once the police officer has made the report, they will leave.The victim will support a thorough medical examination to ensure there are no health concerns. Depending on the nature of the attack, the victim may have a pregnancy test done. Charlotte Murton, a rape crisis specialist, noted that it is also common for the medical staff to check for gonorrhea and Chlamydia (Rape Crisis and Sexual spoil Services Volunteer Training, 2010). The victims must follow up with their personal doctor or local health department to have a more complete sexually transmitted disease screen at a later time. Most victims are also given antibiotics to ward off possible infection. The medical staff will also check for any tearing or irritation in the areas of the attack.When the victim goes to the emergency room, they may have the option to do a rape kit or evidence kit. If the assault happened within 120 hours of the emergency room visit, the medical staff can do the evidence kit (Rape Crisis and Sexual colza Services Volunteer Training, 2010). This will help collect evidence for a possible trial if the victim decides to press charges. This process is extremely encroaching(a) and can even be fearful, but it is the only way to collect certain evidence. Typically a rape crisis advocate will stay with the victim throughout the entire process. The process for collecting evidence in Augusta, Georgia is very specific, although the order may be changed. First, the victim must stand on a large piece of theme and undress. The authorship is there to collect any loose fibers as the victim undresses. The victims dress will then be bagged up separately in case there is evidence on the clothes (Rape Crisis and Sexual offend Services Volunteer Training, 2010). All of the clothes, including underwear, will be kept as evidence. Once the victim is undressed, the medical staff will do a visual inspection to see if there are any obvious injuries. If so, these injuries will be documented and photographed. Then the victim will have to give 25 hairs from their head (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). This serves to show the DNA of the victim. Any areas the victim was licked or kissed will be mop upbed for possible DNA. There also may be a swab of the victims mouth if there was any type of oral contact.The victim will then lie down with a large piece of paper below them to catch any loose hairs or fibers. The cherish will use a comb on the victims pubic hair to store up any loose hairs that may be from the attacker (Rape Crisis a nd Sexual Assault Services Volunteer Training, 2010). The nurse must then use a special comb that rips out hair to gather 25 of the victims pubic hairs from the root (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). This process is especially painful. The nurse will also use a black light to see if there are any fluids that fluoresce. If something does show up, that area will be swabbed (Rape Crisis and Sexual Assault Services Volunteer Training, September 17, 2010). If the victim fought against the attacker, the nurse will clean under the victims nails to get possible debris. The nurse will also swab the victims vagina, anus, or penis depending on the nature of the attack (Rape Crisis and Sexual Assault Services Volunteer Training, 2010). If the victim was drugged and is unsure what happened, all areas will be swabbed. There will be several swabs of each area. The victim will then be given clothes or scrubs to wear home.In areas that have a rape crisis center, vol unteer advocates are on call at all times to help a victim in need. They are called in to be with the victim throughout the entire emergency room visit, and will follow up with the victim at a later date. These advocates act as liaisons between the victim, medical staff, and police officers. They can let the victim know what to expect in the examinations, and what to expect if they press charges. They also have information about places to obtain counseling and support. This is particularly important for victims who do not have family or friends with them in the emergency room.The process that victims abide at the emergency room can be very painful and draining. They have to relive the experience to many different people and discuss extremely private matters. Many times, law enforcement officers are male, and the victim must discuss sexual things with this male. This proves to be a difficult experience as sometimes victims are not even able to articulate what happened. They may want to forget about it or not talk about it. Then they have to go through a medical examination to make sure they are healthy. If they decide not to do an evidence kit, it is still recommended that a doctor do a pelvic exam and take swabs for possible sexually transmitted diseases. If the victim does decide to go through with an evidence kit, it is a painful and invasive process. There may even be pictures taken of the victims body if there are bruises or cuts. In addition, in some areas the rape kits may not even be tested. The Texas Tribune reports that the state is so behind in testing rape kits that it is impossible to catch up (Grissom, 2011). Some unprocessed rape kits in Texas date back to the 1980s (Grissom, 2011). Even if the kits are processed, it can take a year before the results are known (Grissom, 2011). This gives insight into why so many rapes go unreported, and why so many people choose not to have an evidence kit.Consequences of RapeRape is a horrifying and invasive c rime. It has the potential to completely change the victims life. With some crimes, once the actual crime is over, the victim can move on with their life. This is not the case with rape victims. Once the attack is over, there are many other issues the victim will encounter. Many victims of rape experience long-term consequences of their attack. There may be physical consequences deriving from the attack. There also may be emotional consequences. Many rape victims have difficulties reapinging(a) to their normal lives after the attack. They may exhibit symptoms of rape trauma syndrome, a type of post-traumatic stress disorder.There are many physical consequences that can arise from rape. The victim may become pregnant from the attack. This leads to a difficult decision for the victim, made even more difficult if they do not believe abortion is an appropriate option. Some women may have religious or personal views that prevent them from getting an abortion, and thus are forced to go through a pregnancy resulting from a rape. In addition, the adult rape pregnancy rate is actually increasing based on United States Census Reports (Meadows 2010). It is estimated that there may be 32,100 rape-related pregnancies annually among the States women over the age of 18 years (Meadows, 2010, p. 102). This statistic does not even include all the minors who become pregnant due to a sexual assault.Rape victims can also contract sexually transmitted diseases from the attack. Depending on the disease, there may be an easy cure, or they may have to live with the disease for the rest of their lives. If they contract acquired immune deficiency syndrome, more commonly known as AIDS, their life may actually be shortened. This is why many emergency rooms administer antibiotics when someone claims they have been raped. This is an attempt to cure a disease before it is even diagnosed. Also, some emergency rooms may have prophylactic treatment for those who may have been exposed to AIDS. Rape victims may also have nifty injuries resulting from the rape (Meadows 2010). Depending on the level of violence in the rape, these injuries can be minimal to severe. Typically the most violent rapes are stranger rapes. This is because stranger rapists are more likely to involve the use of a weapon (Arrigo, 2006, p. 109). This weapon is most frequently a knife (Arrigo, 2006). If the attacker used the knife to stab the victim, there may be internal injuries or bleeding. Attackers also may beat their victims. This can lead to simple cuts and bruises or more complex injuries like broken ribs. In addition, the victim may experience vaginal or rectal tears from the rape.There are both emotional and psychological issues resulting from rape that are included in rape trauma syndrome. There are two levels of rape trauma syndrome. The first phase is the acute phase. In the acute phase, the victim experiences a complete disruption of her life, resulting from the violence she experienced (Meadows, 2010, p. 38). The victim may have a range of emotions during the acute phase, including crying, shouting, swearing, or laughing inappropriately (Meadows, 2010, p. 38). The victim may experience severe mood swings, and change emotions very quickly. They may be fearful to even leave their home. If the attack happened in their home, they may not feel safe living there anymore.The second phase of rape trauma syndrome is the reorganization phase. In the reorganization phase, victims must regroup their lives (Meadows, 2010). This is accomplished with help from friends and family members (Meadows, 2010). During this phase, the victims have to learn ways to cope with their day by day lives, and the disturbing thoughts that may enter their minds at any time. They may return to work and attempt to move on, but the pain and fear is still present in their minds.There are many different symptoms of rape trauma syndrome. Some of the symptoms include fear, helplessness, shock, disbelie f, guilt, humiliation, embarrassment, anger, self-blame, flashbacks of the rape, dodging of previously pleasurable activities, avoidance of the place or circumstances in which the rape occurred, depression, sexual dysfunction, insomnia, and impaired memory (Meadows, 2010, p. 102). These symptoms greatly inhibit the victims ability to heal and move on with their life. They may be happy one moment, and then suddenly be overcome with sadness and not able to understand where the sadness originated. charm in the acute phase they may experience a wide range of emotions. When they enter the reorganization phase, they may not have quite as many mood swings, but may experience flashbacks of the attack. This contributes to their insomnia. Victims are afraid to go to sleep because they may have nightmares of the attack. They also garbled their sense of control when they were attacked, and going to sleep leaves them vulnerable yet again.

Tuesday, April 2, 2019

Theories of Unemployment: Application to the UAE

Theories of Un involution Application to the UAEIntroductionUnemployment is be when an individual is actively seeking the for the chisel but is unable to have the campaign (Solow, 1980). This constitution attempts to explore various unemployment theories and then find the outgo suitable theory to apply to the UAE economy. Advantages and disadvantages of the chosen theory will besides be discussed in the paper. Recommendations will be provided to annul the unemployment in the UAE. The paper is organized as follows next section defines and discusses five unemployment theories, while the outperform suited theory/theories will be discussed in the third section. The quarter section will be composed of the strategies to be employed to reduce unemployment in the UAE. Recommendation and conclusion will be provided in the expiry section.Unemployment theoriesSince the great recession in December 2007, many countries whether developed or developing has experienced a high rate of unem ployment. There argon different types of unemployment. In this section, following five types of unemployment are discussed with reference to the experiential evidence.Frictional unemploymentA switching or transition between the line of descents is called as a frictional employment. The transition between the job can be for many reasons which include looking for a better- paid job, migration from wizard state to an other(a), from vocalization time to full time employment or the vice versa. If a soul who seeks a job, stupefys according to his requirement or desires within a week will not be counted as a frictional unemployment, but this is not possible in a real career situation. Monetary and fiscal policy can also not form the frictional unemployment down without putting an extra inflationary pressure on the economy (Bruce and Marshal, 1976).Structural unemploymentA mismatch between the kind of the job and the availability of the achievement causes a structural unemployment in a sphere (Peter, 1969). It is the case with most of the countries that employers do not find the required skill and the labor does not find the required or an interested job (Peter, 1969). So, the workers do not take the jobs which are not highly paid or for which they do not have an interest, which adjoins the unemployment in the country. On the other hand, companies also do not hire individuals who do not let the right skills and required expertise, so a structural unemployment takes place.Technological unemploymentBoinovasky and Trautwein (2010) discussed the proficient unemployment in their research paper and focused on the Schemputers writing on unemployment from 1908 to 1954. Shumpter (1926, 1928, and 1931). Schumpeter concluded that all frictional, structural, and cyclical unemployed can be summed into one unemployment type which we may call as a technical unemployment. harmonise to Neiser (1942) a technological unemployment is the stepchild of economic science and h ence cannot be avoided.regionalunemploymentUnemployment due to the regional differences is called a regional unemployment. Therefore, a structural unemployment occurs in the local anesthetic or regional area it is called regional unemployment. For example, an unemployment in the wise York instead of the USA is k todayn as a regional unemployment.seasonal worker unemploymentUnemployment due to seasonal changes is called seasonal unemployment. Many individuals get unemployed in extreme hot season in UAE and in extreme wintertime in the UK.Best unemployment theories for UAE (200)Chart 1 UAE unemployment rate Historical information ChartThe unemployment in the UAE is presented in the chart 1. United Arab Emirates faced an ontogeny in the unemployment Rate from 4.3 in 2010 to 4.6 in 2011 (Central Bank of UAE, 2011). Since 1985 till 2011, a high unemployment rate was observed in 2011, which was 4.6. Ann unemployment has amplificationd substantially oer the last six years and it jumpe d from 2.17% in 2007 to 4.6% in January 2012. The definition of winnow unemployment in the UAE is the same as in other countries a person looking actively for the job but unable to find the work is called an unemployment.Technological unemployment best identifies the UAE economy. The study reasons behind an increase in the technological unemployment in the UAE are listed belowIncrease in the population which is bungled or not technologically advanced.Technological advancement has substituted kind-hearted with machines and capital.An increase in the migrants from other countries in the UAE has increased the competition. So there is an increase in the technological unemployment.Few other causes have been identified in the report TANMIA (2011), which is presented in the chart 2 below.Source TANMIA, 2011How to reduce unemployment in the UAEEmiratisationTo employ the residents and citizens of the country in a meaningful and efficient itinerary by the government is called an emirati sation. This is a very active program in the UAE. It basically promotes the countrys human resource in an optimal manner to get employed and encourage the multinationals to rely on the countries own human resource.Advantageson a humiliate floor is the list of advantages of the EmiratisationIt adds to the growth and sustainability of the companies and manufacturers when they have to rely heavily on the local residents of the country.The UAE culture will be promoted and spread.It supports and contributes to the growth and learning of the UAE nationals for the betterment and benefits of the human capital development.Disadvantages of EmiratizationThe major disadvantage of the Emiratization is the forced reliance on the employment of the UAE nationals. The head-to-head heavens is still lagging behind the public domain and the UAE national are not willing to work in the private sector.Conclusion and RecommendationThe report presents an overview of different unemployment theories with reference to the academic literature. The major theories discussed in this report include structural, regional, seasonal, frictional, and the technological unemployment. The analysis of these theories reveals that UAE is mostly suffered without the technological unemployment. As, the country is one of the freest economy in the world with the lowest tax revenue rates, so it is the center of all big multinationals to set-up their plants in the UAE. After having installed their plants and machinery, now their employers seek for highly technical and skilled employee.To overcome the unemployment in the UAE, the government will have to take the following actionsIt should initiate active and strong labor market programs which should target at least 5000 job seekers per annum to lower the unemployment in the region.Khalifa fund should be established for amortization empowerment, which will recruit the domestic labor force demand. governing should focus on the overseas labor policy to re strict the jobs for them and improve an employment rate for the UAE nationals. Government should also improve the participation rate in the private sector which will help lower the unemployment rate due to technological advancement.

Monday, April 1, 2019

Characteristics and Gambling Habits of Bingo Players

Characteristics and Gambling Habits of beano PlayersAn Investigation into the Characteristics and Gambling Habits of Bingo Players in the UKIntroductionBingo is a popular pastime in the UK, and has bounteous as an exertion all everyplace recent historic period, moving away from topical anesthetic community centres to dedicated beano halls and numerous online sites. As with all industries, to take c atomic number 18 that on that point is a continual renewal of customers, those in the beano industry must be fitted to take their grocery storeing strategies effectively. This recollects that they film to be able to identify who their target audience is for them to be able to deliver an effective marketing campaign which is aimed predominantly at those sight (Aaker et al., 2000).Studies in the past have suggested that bingo is considered to be a kinda low- take aim leisure activity. As a result, it has as well been precedingly associated hard with being a pastime of p redominantly working class women (Dixey, 1987). In addition, it is generally associated with pensioners, largely due to the sedentary but social constitution of the game (Cousins Witcher, 2007). Although this whitethorn have been the case a number of years ago, on that point is pocket-sized recent empirical register to determine whether this is stable the main market for bingo. Given the changing nature of the game and its delivery, it is believable that changes in the main demographic of players whitethorn also be in a process of change. This lease hence uses pre-collected data to evaluate whether this may be the case.Rationale of StudyGathering in frame of referenceation on the demographics of large number who play bingo, or are interested in acting bingo, is liable(predicate) to be utilitarian to bingo halls for targeting their marketing campaigns. In addition, with the advent of online gambling, judgment whether current online gamblers would be likely to particip ate in bingo games if they were accessible may be chief(prenominal) in design of online gaming sites. merchandise opportunities online may also be improved if inference is obtainable of the demographics of the target audience. Consideration allow also be given to the pulmonary tuberculosis of diametrical demographic groups on bingo, as this cultivation may be effectual in the industry for determining customer value.Study Hypothesisestablish on the foregoing literature, it is guessinged that the main demographic of bingo players will be predominantly women, but that there will be a considerable number of younger players. It is also expected that there will be an necktie between those gaming online and those contend bingo. Finally, it is expected that there will be no passing in the uptake on bingo between progress groups.MethodologyOrigins of the DataThe data which is used in this battleground was taken from the British Gambling Prevalence Study 2007, which was the largest study of its kind to be conducted in the UK to the present date. The study was commissioned by the National Centre for Social Research and aimed to collect cultivation on gambling habits and demographics in order to assess the prevalence of problem gambling within the UK.Study PopulationThe study was designed to be congresswoman of all adults in the UK aged 16 years and older who were vivification within private households.Study SampleAll residences in the UK were free into Primary Sampling Units (PSUs) and 317 of these were randomly selected for the study. The probability of selecting for each one was apportioned fit in to the number of addresses within them, but no other demographics were taken into peak. For each PSU which was selected, 32 addresses were selected randomly, and this gave a total of 10,144 addresses. After non-completion, the total sample visible(prenominal) in the data-set was 9003.Study InstrumentThe study was conducted using a multiple-choice qu estionnaire. This clearly explained at the beginning the goal of the study, and explained clearly how the survey form should be completed. A coding document was then compiled to code the answers into statistical software packages, and this was included alongside the data-set. A copy of the questionnaire which was used is for sale from http//www.data-archive.ac.uk/findingData/snDescription.asp?sn=5836. The data which was included in the data-set was already weighted to mark for non-response and bias, and this was completed by the researchers who completed the data collection and original analysis.Results equaliser of Bingo Players in the SampleThe results of the analysis indicate that only a small minority of the commonwealth sampled had vie bingo in the stand twelve calendar months, with a total of 7.5% of the sample. This is shown graphically in signifier 1. dodge 2 then details the absolute absolute frequency with which that small group had play bingo. It may be seen that 45% of those who had played bingo in the outlive twelve months had make so little than at a time a month. A total of 36.4% of those who played bingo in the utmost(a) twelve months had done so once a week or more, and a win 15.6% report play at least once a month. This information is then presented graphically in rule 2.Table 1. The frequency with which respondents describe play bingo in the run short twelve months.For those who had played bingo in the last twelve months, the remember age was 47.78 with a type conflict of 18.08, while it was 47.75 for those who had not played bingo in the last twelve months, with a standard deviation of 18.33. playacting an independent two-sample t-test on the data produced a p-value of 0.963, which indicates that the unreal system may not be rejected. This means that there is no signifi displacet difference between the mean age of the two groups at the 95% confidence level.Age of Bingo PlayersTable 2 displays the mean age of each g roup when those playing bingo within the last twelve months were grouped tally to frequency of playing. Alongside the mean, the standard deviation is also given. This information is presented in the box-plot in guess 3. This shows that the mean age of the players reckons to increase as the frequency of playing increases. In addition, it would also push through that the variation in age is smallest in the group who play at least twice a week. Performing a one-way analysis of variance analysis indicates that there is an tie-up between age and the frequency of playing bingo and that the null hypothesis of no connection may be rejected at the 5% level (p Table 2. Mean and standard deviation of the age of players grouped according to the frequency with which they play bingo.Gender of Bingo PlayersOf those who had played bingo in the last twelve months, 71.4% were female, and this percentage is show graphically in Figure 4. A chi-squared analysis indicates that there is indicate th at the null hypothesis may be rejected at the 5% level (p Player uptake on BingoExpenditure and GenderAnalysis of the data shows that females who had played bingo in the last twelve months wooly a mean of 319 all oer the previous 7 days, with standard deviation 506. In contrast, males lost a mean of 60.50 oer the 7 days, with a standard deviation of 4.95. An independent samples t-test revealed that there is depict at the 0.95 significance level against the null hypothesis of no association. This therefore indicates that there is a significant difference between the keep down lost by males and females (p = 0.045).Expenditure and AgeFigure 5 shows a scatter-plot of the total amount which each respondent describe losing at bingo in the last seven days plot against their age. The black dots represent female participants while red dots represent males. It would appear from this plot that there is no association between the amount of money lost at bingo and the age of the player, f or either males or females. A bivariate regression analysis of this data confirms this. It indicated that there was no evidence against the null hypothesis of no association, and so age was not lay down to be a significant predictor of the amount lost at bingo over the seven day period (p = .489).Figure 6 presents a scatter-plot of age against expenditure on bingo over the previous seven days when winnings are also taken into account in addition to losses. There was far more data available for this analysis, but it would still appear that there is no particular association between age and expenditure on bingo, for either males or females. This was corroborate by regression analysis, which indicated there was no evidence against the null hypothesis of no association (p = .187). whence it was concluded that there was no association between age and general expenditure on bingo over the previous week.Expenditure and Frequency of Playing BingoFigure 7 presents a box-plot of the amoun ts lost at bingo according to the frequency of playing bingo in the last twelve months. It would appear from this graph that those playing twice a week lost less than those who played less often, as the mean is lower and the variation is less. An ANOVA analysis withal indicated that there was no evidence against the null hypothesis of association. This indicates that there is therefore no association between the frequency of playing bingo over the last twelve months and the amount lost at bingo (p = .925).Figure 8 presents a similar box-plot analysis which takes account of the winnings of players in addition to losses. When comparing the different frequency of playing groups it would appear that overall expenditure appears to be relatively consonant. The variation in expenditure does even appear to be somewhat larger in the group which play two times or more a week. one and only(a)-way ANOVA analysis of this data confirms that there is no evidence against the null hypothesis of no association (p = .731). Therefore it may be concluded that frequency of playing bingo over the last twelve months did not involve on the overall expenditure of the player on bingo over the last week.Online Gamblers and BingoTable 3 presents a cross-tabulation of the number of participants who reported having played bingo over the previous twelve months and those who reported having gambled online over the previous twelve months. This shows that of those who had reported playing bingo in the last twelve months, only 8% reported gambling online during that time (Figure 9). In contrast, 26.3% of those who had gambled online over the last twelve months reported that they had also played bingo during that period (Figure 10). A chi-squared analysis of this data indicates that there is strong evidence against the null hypothesis of no association (p Table 3. The number of respondents who had gambled online over the previous twelve months and the number who had played bingo over the pre vious twelve months.Figure 11 presents a scatter-plot of the net expenditure on bingo in comparison to the net expenditure on online gambling, both over the previous seven day period. From this chart it would appear that there is no association between the two. A regression analysis confirms that there is no evidence against the null hypothesis of no association (p = .882). Therefore it must be concluded that there is no significant association between the total expenditure of the respondents on online gambling and their total expenditure on bingo over the same time period.DiscussionFrom this study it may be seen that there are certain demographic characteristics which are associated with playing bingo. It would appear from the results that bingo players are in the minority, with only 7.5% of the population estimated to have played in 2007, and only 2.7% of the population playing once a week or more. As hypothesised at the beginning, there was no particular age group which was assoc iated with playing bingo. There is tho evidence that it is an older age group which is associated with playing bingo regularly, with the mean age being in the mid- to late-fifties for those playing once a week or more. Despite this, there was no association between age and the amount spent on bingo in a week. This indicates that older mickle are still the main demographic for the industry but that they are not particularly more valuable than younger people. They may however be more valuable if their spend is consistent week later on week, when compared to younger players who may play only once a month or less.There was also no association between frequency of playing and expenditure within the week. This is an important implication as it suggests that customers who can be attracted to regularly play bingo will be consistent with their spending, and not reduce spending as they play more over the year.Almost three quarters of players were female, and it was also females who were as sociated with much larger expenditure on bingo. This finding is however somewhat limited, as only information on the expenditure of two males was available for analysis. Therefore this finding may not have a high statistical power.Finally, there is evidence that there is an association between bingo players and those gambling online. This is important as it suggests that there is potential in both advertising for bingo online and also in online bingo rooms. The extent to which an individual gambles online does not however appear to be associated with how much they spend on bingo. Therefore online players may not be more valuable than those attracted through offline methods.Although this study has provided some useful insights for those interested in the demographics of bingo players, there are some limitations. One of the main limitations is that there was little social information available in the study which related to income and social status of the respondents. It is possible th at this may clashing on gambling habits, including playing bingo (Barry et al., 2007). This may be important in areas where there are either large levels of population in higher or lower social classes. Therefore further market research in particular areas may be useful in determining the potential for marketing in that particular area.ReferencesAaker, J.L., Brumbaugh, A.M. Grier, S.A. (2000) Nontarget markets and viewer strong suit The impact of target marketing on advertising. daybook of Consumer Psychology, 9(3), 127-140.Barry, D.T., Maciejewski, P.K., Desai, R.A. Potenza, M.N. (2007) Income differences and recreational gambling. Journal of Addiction Medicine, 1(3), 145-153.Cousins, S.O. Witcher, C.S.G. (2007) Who plays bingo in later life? The sedentary lifestyles of little old ladies. Journal of Gambling Studies, 23(1), 95-112.Dixey, R. (1987) Its a great odour when you win Women and bingo. Leisure Studies, 6(2), 199-214.National Centre for Social Research (2007) British Gambling Prevalence Survey 2007. Available online from http//www.data-archive.ac.uk/findingData/snDescription.asp?sn=5836 Accessed 12/12/2008.

Computer Generated 3D Animation Computer Science Essay

electronic computer Gene trampd 3D Animation estimator Science try outComputer life force (or CGI keep) is the art of creating moving stunt mans with the accustom of ready reck unityrs. Increasingly it is make waterd by means of 3D reckoner prowess, though 2D calculating machine graphics be mollify widely utilise for sty tiltic, low bandwidth, and faster veritable-time definition needs. It is as well as referred to as CGI ( computing device- god mental reachry or electronic computer-generated imaging), especially when utilize in moving-picture shows.2. PRINCIPLES OF ANIMATIONComputer life force is essentially a digital successor to the art of stop interrogation vivification of 3D clay sculptures and vomit up-by- prepare animation of 2D illustrations. For 3D animations, objects ( regulates) are built on the computer manage (modeled) and 3D figures are rigged with a realistic skeleton. Then the limbs, eyes, mouth, c servinghes, etc. of the figure are ch oked by the animator on see frames. The differences in appearance between key frames are automatically careful by the computer in a process known as tweening or morphing. netly, the animation is rendered. For 3D animations, all frames must be rendered by and by modeling is complete. For 2D vector animations, the rendering process is the key frame illustration process, while tweened frames are rendered as needed.To create the illusion of movement, an image is displayed on the computer screen and repeatedly replaced by a revolutionary image that is similar to the previous image, muchover advanced s lowerly in the time do main(prenominal), usually at a rate of 24 or 30 frames/second. This technique is identical to how the illusion of movement is achieved with television and interrogative sentence pictures.To trick the eye and read/write head into thinking they are seeing a in recreateively moving object, the pictures should be drawn at rough 12 frames per second (frame/s) o r faster (a frame is one complete image). With rank above 70 frames/s no improvement in naive realism or smoothness is perceivable due to the foc employ the eye and brain process images. At rates below 12 frame/s to the highest degree people jakes detect jerkiness associated with the gulp of virgin images which detracts from the illusion of lifelike movement. Conventional hand-drawn cartoon animation often uses 15 frames/s in order to save on the number of drawings needed, but this is usually accepted because of the stylized nature of cartoons. Because it produces to a greater extent realistic imagery computer animation demands higher frame rates to reinforce this realism.The actor no jerkiness is seen at higher speeds is due to persistence of vision. From spot to moment, the eye and brain clearing to aspireher actually store whatsoever one waits at for a fraction of a second, and automatically smooth out minor jumps. Movie demand seen in theaters in the unify States runs at 24 frames per second, which is sufficient to create this illusion of continuous movement.3. HOW DOES IT transactionThe process of creating 3D animations tramp be sequentially divided into triplet fundamental phases 3D modeling which describes the process of degreeing the shape of an object, layout and animation which describes the motion and placement of objects deep down a opinion, and 3D rendering which produces an image of an object.a)The 3D model describes the process of forming the shape of an object. The two well-nigh common sources of 3D models are those originated on the computer by an artist or manoeuver apply some kind of 3D modeling turncock, and those s offerned into a computer from real-world objects. Models can also be produced procedurally or via physical simulation. 3D computer graphics are often referred to as 3D models. Apart from the rendered graphic, the model is contained within the graphical data file. However, there are differences. A 3D mod el is the mathematical example of any terzetto-dimensional object. A model is not technically a graphic until it is displayed. Due to 3D printing, 3D models are not confined to virtual space. A model can be displayed visually as a two-dimensional image through a process called 3D rendering, or employ in non-graphical computer simulations and calculations. 3D computer animation combines 3D models of objects and programmed movement.Models are constructed out of geometric vertices, faces, and edges in a 3D coordinate system. Objects are sculpted lots like real clay or plaster, working from general forms to circumstantial details with assorted sculpting tools. A bone/joint system is get along up to deform the 3D plight (e.g., to make a mechanical man model walk). In a process called rigging, the virtual marionette is prone various controllers and handles for controlling movement.b)Before objects are rendered, they must be placed (laid out) within a pic. This is what defines the spatial relationships between objects in a scene including spot and size. Animation refers to the temporal description of an object, how it moves and deforms over time. Popular methods include keyframing, contrary kinematics, and motion detain, though many of these techniques are employ in federation with each some other. As with modeling, physical simulation is another way of specifying motion.In most 3D computer animation systems, an animator creates a change representation of a roughages anatomy, analogous to a skeleton or bunk figure. The position of each segment of the osseous model is defined by animation variables, or Avars. In military personnel race and animal characters, many split of the skeletal model correspond to actual bones, but skeletal animation is also used to animate other things, much(prenominal) as nervus facialis signs (though other methods for facial animation exist). The character Woody in playact Story, for example, uses 700 Avars, inclu ding 100 Avars in the face. The computer does not usually render the skeletal model directly (it is invisible), but uses the skeletal model to compute the need position and orientation of the character, which is eventually rendered into an image. Thus by changing the set of Avars over time, the animator creates motion by making the character move from frame to frame.There are several methods for generating the Avar values to obtain realistic motion. Traditionally, animators manipulate the Avars directly. Rather than set Avars for every frame, they usually set Avars at strategic points (frames) in time and let the computer interpolate or tween between them by keyframing. Keyframing puts control in the hands of the animator, and has roots in hand-drawn traditional animation.In contrast, a newer method called motion capture makes use of gain out action. When computer animation is driven by motion capture, a real performer acts out the scene as if they were the character to be anima ted. His or her motion is recorded to a computer using picture show cameras and markers, and that performance is then applied to the animated character.Each method has their advantages, and as of 2007, pluckys and pictures are using either or both of these methods in productions. Keyframe animation can produce motions that would be difficult or impossible to act out, while motion capture can reproduce the subtleties of a finicky actor. For example, in the 2006 film Pirates of the Caribbean Dead Mans Chest, actor Bill Nighy provided the performance for the character Davy Jones. Even though Nighy himself doesnt appear in the film, the pic benefited from his performance by recording the nuances of his body language, posture, facial expressions, etc. Thus motion capture is appropriate in situations where believable, realistic behavior and action is infallible, but the types of characters required exceed what can be done through conventional speak touming.c)Rendering converts a mo del into an image either by simulating light transport to get videorealistic images, or by applying some kind of style as in non-photorealistic rendering. The two basic operations in realistic rendering are transport (how much light gets from one place to another) and scattering (how surfaces interact with light). This dance step is usually performed using 3D computer graphics bundle or a 3D graphics API. The process of altering the scene into a suitable form for rendering also involves 3D jutting which allows a three-dimensional image to be viewed in two dimensions.Lets step through the rendering of a simple image of a mode with flat timber walls with a grey pyramid in the centralise of the room. The pyramid result book a spotlight shining on it. Each wall, the floor and the ceiling is a simple polygon, in this case, a rectangle. Each corner of the rectangles is defined by three values referred to as X, Y and Z. X is how far left and right the point is. Y is how far up and down the point is, and Z is far in and out of the screen the point is. The wall nearest us would be defined by four points (in the order x, y, z). Below is a representation of how the wall is defined(0, 10, 0) (10, 10, 0)(0,0,0) (10, 0, 0)The far wall would be(0, 10, 20) (10, 10, 20)(0, 0, 20) (10, 0, 20)The pyramid is make up of five polygons the rectangular base, and four triangular posts. To draw this image the computer uses math to calculate how to project this image, defined by three dimensional data, onto a two dimensional computer screen.First we must also define where our view point is, that is, from what vantage point leave behind the scene be drawn. Our view point is inside the room a bit above the floor, directly in front of the pyramid. First the computer will calculate which polygons are visible. The near wall will not be displayed at all, as it is behind our view point. The far side of the pyramid will also not be drawn as it is hidden by the front of the pyramid.N ext each point is spatial relation projected onto the screen. The portions of the walls furthest from the view point will appear to be shorter than the nearer areas due to perspective. To make the walls search like wood, a wood pattern, called a texture, will be drawn on them. To accomplish this, a technique called texture mapping is often used. A small drawing of wood that can be repeatedly drawn in a matching tiled pattern (like wallpaper) is stretched and drawn onto the walls final shape. The pyramid is square grey so its surfaces can just be rendered as grey. further we also have a spotlight. Where its light falls we lighten colors, where objects blocks the light we darken colors. Next we render the complete scene on the computer screen. If the numbers describing the position of the pyramid were changed and this process repeated, the pyramid would appear to move.4. 3D COMPUTER GRAFICS SOFTWARE3D computer graphics software refers to programs used to create 3D computer-generat ed imagery. 3D modelers are used in a wide variety of industries. The medical industry uses them to create detailed models of organs. The word picture industry uses them to create and manipulate characters and objects for animated and real-life motion pictures. The film plucky industry uses them to create assets for icon games. The science sector uses them to create passing detailed models of chemical compounds. The architecture industry uses them to create models of proposed buildings and landscapes. The engineering partnership uses them to design new devices, vehicles and structures as well as a soldiers of other uses. There are typically many stages in the air that studios and manufacturers use to create 3D objects for film, games, and production of hard goods and structures.Many 3D modelers are general-purpose and can be used to produce models of various real-world entities, from plants to automobiles to people. Some are specially designed to model certain objects, su ch(prenominal) as chemical compounds or internal organs.3D modelers allow users to create and alter models via their 3D mesh. Users can add, subtract, stretch and otherwise change the mesh to their desire. Models can be viewed from a variety of angles, usually simultaneously. Models can be rotated and the view can be zoomed in and out. 3D modelers can export their models to files, which can then be imported into other applications as long as the metadata is compatible. Many modelers allow importers and exporters to be plugged-in, so they can read and write data in the native formats of other applications. around 3D modelers contain a number of related features, such as ray tracers and other rendering alternatives and texture mapping facilities. Some also contain features that support or allow animation of models. Some whitethorn be able to generate full-motion video of a serial publication of rendered scenes .Computer animation development equipmentComputer animation can be created with a computer and animation software. Some impressive animation can be achieved even with basic programs however the rendering can take a lot of time on an ordinary home computer. Because of this, video game animators tend to use low resolution, low polygon count renders, such that the graphics can be rendered in real time on a home computer. Photorealistic animation would be impractical in this context. pro animators of movies, television, and video chronological successions on computer games make photorealistic animation with high detail. This take aim of quality for movie animation would take tens to hundreds of years to create on a home computer. Many powerful workstation computers are used instead. fine art workstation computers use two to four processors, and thus are a lot more than powerful than a home computer, and are specialized for rendering. A large number of workstations (known as a render farm) are networked unitedly to effectively act as a giant computer. The r esult is a computer-animated movie that can be completed in about one to five years . A workstation typically costs $2,000 to $16,000, with the more big-ticket(prenominal) stations being able to render much faster, due to the more technologically advanced hardware that they contain. Pixars Renderman is rendering software which is widely used as the movie animation industry standard, in competition with rational Ray. It can be bought at the official Pixar website for about $3,500. It will work on Linux, Mac OS X, and Microsoft Windows based graphics workstations along with an animation program such as Maya and Softimage XSI. Professionals also use digital movie cameras, motion capture or performance capture, bluescreens, film editing software, props, and other tools for movie animation.Major software packages3ds pocket (Autodesk), originally called 3D studio MAX, is a comprehensive and versatile 3D application used in film, television, video games and architecture for Windows. It can be extended and customized through its SDK or scripting using a Maxscript. It can use third party rendering options such as Brazil R/S, finalRender and V-Ray.Maya (Autodesk) is currently used in the film and television industry. Maya has developed over the years into an application computer program in and of itself through extendability via its MEL programming language. It is available for Windows, Linux and Mac OS X.Softimage (Autodesk) Softimage (formerly SoftimageXSI) is a 3D modeling and animation package that integrates with mental ray rendering. It is feature-similar to Maya and 3DS Max and is used in the production of professional films, commercials, video games, and other media.LightWave 3D (NewTek), prototypical developed for the Amiga, was originally bundled as part of the Video wassailer package and entered the market as a low cost way for TV production companies to create quality CGI for their programming. It first gained public precaution with its use in the TV series Babylon 5 and is used in several contemporary TV series. Lightwave is also used in film production. It is available for both Windows and Mac OS X.ZBrush (Pixologic) is a digital sculpting tool that combines 3D/2.5D modeling, texturing and painting tool available for Mac OS X and Windows. It is used to create normal maps for low resolution models to make them look more detailed.Cinema 4D (MAXON) is a light package in its basic configuration. The software is for lay users. It has a lower initial entry cost due to a modular a-la-carte design for purchasing additional functions as users need them. Originally developed for the Amiga, it is also available for Mac OS X, Windows and Linux.4. ANIMATION ALONG TIMECGI was first used in movies in 1973s Westworld, a science-fiction film about a society in which robots live and work among adult males, though the first use of 3D Wireframe imagery was in its sequel, Futureworld (1976), which featured a computer-generated hand and face crea ted by then University of gray California graduate students Edwin Catmull and Fred Parke. The third movie to use this technology was aesthesis Wars (1977) for the scenes with the wireframe Death admirer plans and the targeting computers in the X-wings and the Millennium Falcon. The Black Hole (1979) used raster wire-frame model rendering to depict a black hole. The science fiction-horror film Alien of that kindred year also used a raster wire-frame model, in this case to render the image of navigation monitors in the place where a spaceship follows a beacon to a land on an unacquainted(predicate) planet.In 1978, graduate students at the New York Institute of Technology Computer Graphics Lab began work on what would have been the first unmown CGI film, The Works, and a trailer for it was shown at SIGGRAPH 1982, but the film was never completed. Star Trek II The Wrath of Khan premiered a short CGI sequence called The Genesis Wave in June 1982. The first two films to make plodd ing investments in Solid 3D CGI, Tron (1982) and The Last Starfighter (1984), were commercial failures, causing most directors to relegate CGI to images that were supposed to look like they were created by a computer.It was the 1993 film Jurassic Park, however, in which dinosaurs created with CGI were seamlessly integrated into live action scenes, that revolutionized the movie industry. It label Hollywoods transition from stop-motion animation and conventional optical cause to digital techniques. The following(a) year, CGI was used to create the special effects for Forrest Gump. The most noteworthy effects shots were those that featured the digital removal of actor Gary Sinises legs. Other effects include a napalm strike, the fast-moving Ping-Pong balls, and the digital insertion of Tom Hanks into several scenes of diachronic footage.Two-dimensional CGI progressively appeared in traditionally animated films, where it supplemented the use of hand-illustrated cels. Its uses range d from digital tweening motion between frames, to eye-catching quasi-3D effects, such as the ballroom scene in Beauty and the Beast. In 1993, Babylon 5 became the first television series to use CGI as the primary method for its visual effects (rather than using hand-built models). It also marked the first TV use of virtual sets. That same year, Insektors became the first full-length completely computer animated TV series. before long after, in 1994, the hit Canadian CGI show ReBoot aired. wager Story(1995) was the first fully computer-generated feature film.In 1995, the first fully computer-generated feature film, Disney-Pixars playact Story, was a resounding commercial success. Additional digital animation studios such as Blue Sky Studios (20th Century Fox), DNA Productions (Paramount Pictures and Warner Bros.), Omation Studios (Paramount Pictures), Sony Pictures Animation (Columbia Pictures), van Animation (Walt Disney Pictures, Lions Gate Entertainment and 20th Century Fox), B ig conceit Productions (Universal Pictures and FHE Pictures), Animal Logic (Warner Bros.) and Pacific Data Images (Dreamworks SKG) went into production, and existing animation companies, such as The Walt Disney Company, began to make a transition from traditional animation to CGI. amongst 1995 and 2005 the average effects budget for a wide-release feature film skyrocketed from $5 million to $40 million. According to one studio executive, as of 2005update, more than half of feature films have significant effects. However, CGI has made up for the expenditures by grossing over 20% more than their real-life counterparts.In the early 2000s, computer-generated imagery became the ascendant form of special effects. The technology progressed to the point that it became possible to include virtual stunt doubles. Camera tracking software was refined to allow increasingly complex visual effects developments that were previously impossible. Computer-generated extras also became used extensive ly in crowd scenes with advanced flocking and crowd simulation software. Virtual sets, in which part or all of the background of a shot is digitally generated, also became commonplace. The timeline of CGI in film and television shows a detailed list of pioneering uses of computer-generated imagery in film and television.CGI for films is usually rendered at about 1.4-6 megapixels. Toy Story, for example, was rendered at 1536-922 (1.42MP). The time to render one frame is typically around 2-3 hours, with ten times that for the most complex scenes. This time hasnt changed much in the last decade, as image quality has progressed at the same rate as improvements in hardware, since with faster machines, more and more complexity becomes feasible. exponential increases in GPUs processing power, as well as massive increases in parallel CPU power, storage and memory speed and size have greatly increased CGIs potential.In 2001, Square Pictures created the CGI film Final legerdemain The Spirit s Within, which made headlines for attempting to create photo-realistic human actors. The film was not a box-office success. Some commentators have suggested this whitethorn be partly because the lead CGI characters had facial features which fell into the uncanny valley. Square Pictures produced only two more films using a similar visual style Final Flight of the Osiris, a short film which served as a prologue to The Matrix Reloaded and Final envisage VII Advent Children, based on their extremely popular video game series.Developments in CGI technologies are reported each year at SIGGRAPH, an annual conference on computer graphics and interactive techniques, go to each year by tens of thousands of computer professionals. Developers of computer games and 3D video cards strive to achieve the same visual quality on personal computers in real-time as is possible for CGI films and animation. With the rapid development of real-time rendering quality, artists began to use game engines t o render non-interactive movies. This art form is called machinima.This is a chronological list of films and television programs that have been recognised as being pioneering in their use of computer-generated imagery.5. THE FUTURE OF ANIMATIONOne sensory(a) challenge in computer animation is a photorealistic animation of humans. Currently, most computer-animated movies show animal characters, fantasy characters, anthropomorphic machines or cartoon-like humans. The movie Final Fantasy The Spirits Within is often cited as the first computer-generated movie to attempt to show realistic-looking humans. However, due to the enormous complexity of the human body, human motion, and human biomechanics, realistic simulation of humans remains largely an feed problem. Another problem is the distasteful psychological response to viewing about perfect animation of humans, known as the uncanny valley. It is one of the consecrated grails of computer animation. Eventually, the goal is to create software where the animator can generate a movie sequence showing a photorealistic human character, undergoing physically-plausible motion, unneurotic with clothes, photorealistic hair, a complicated natural background, and possibly interacting with other simulated human characters. This could be done in a way that the viewer is no longer able to tell if a particular movie sequence is computer-generated, or created using real actors in front of movie cameras. cop human realism is not likely to happen very soon, and when it does it may have major repercussions for the film industry.For the moment it looks like three dimensional computer animation can be divided into two main directions photorealistic and non-photorealistic rendering. Photorealistic computer animation can itself be divided into two subcategories real photorealism (where performance capture is used in the creation of the virtual human characters) and stylized photorealism. Real photorealism is what Final Fantasy tri ed to achieve and will in the future most likely have the ability to give us live action fantasy features as The Dark crystallisation without having to use advanced puppetry and animatronics, while Antz is an example on stylistic photorealism . no(prenominal) of them mentioned are perfected as of yet, but the progress continues.The non-photorealistic/cartoonish direction is more like an extension of traditional animation, an attempt to make the animation look like a three dimensional version of a cartoon, still using and perfecting the main principles of animation articulated by the Nine elderly Men, such as squash and stretch.While a single frame from a photorealistic computer-animated feature will look like a photo if done right, a single frame vector from a cartoonish computer-animated feature will look like a painting (not to be confused with cel shading, which produces an even simpler look).