Monday, December 30, 2019

The Problem Of Violent Crime - 1505 Words

1.0 INTRODUCTION Violent crime is a serious problem and could not to be neglected in present society. It means all incidents of wounding and assault with or without injury in the Crime Survey for England and Wales (ONS, 2015). The crime rate in Liverpool was about 90.86 per 1000 population in police record by the end of June 2015 (HO, 2015). According to Liverpool City Council (2015), the violence rate per 1000 population was increase 16.6% from 2013 to 2014 and reach 10.2 from April 2014 to March 2015, higher than other crime. At the same time, the number in 1000 people that experience personal robbery was about 485, not all robberies would be reported to the police so maybe the real condition was graver. Hence, violence and robbery continue to be of increasing concern. In order to descend violent crime, arrange more police on the street might be a suitable option. Many researchers found this solution lead to the steady decline of crime rate (Ratcliffe et al, 2011). However, the expensive cost might limit the scale of this method. Correctional education is also an effectively solution of offender but take a long time. A combined system of hotspot policing and prison education may be possible if care is reducing crime rate. Therefore, this report will compare the feasibility of police patrol and correctional education in terms of cost and effectiveness, thereby exploring the more viable method to reduce violent crime in Liverpool. 2.0 BACKGROUNG Liverpool is a city inShow MoreRelatedThe Problem Of Violent Crime1319 Words   |  6 PagesViolent crime is a completely human characteristic. It has dominated our history books, been sensationalized by the media and created a pervasive fear which dominates our culture. Is there a way to possibly prevent violent crime? Neurocriminology, a classification of criminology centered on neuroscience and its relationship between the causes and cures of crime, may have the answer to that question. Adrian Raine, a criminal psychologist for more than thirty years, proposes that criminal behaviorRead MoreThe Problem Of Violent Crimes2169 Words   |  9 PagesViolent Crimes Introduction Violent crimes occur more than one could even imagine. However, there is definitely a questionable aspect to these crimes within their court procedures. If one were to take a closer look at specific court procedures of crimes having to deal with mental illnesses, it will be determined that it is viewed differently oppose to a sane person. When taking mental illnesses into consideration when referring to criminal behavior, there is an obvious difference between actionsRead MoreThe Crime Control Policy Of Canada Essay1425 Words   |  6 Pages Introduction Violent crime will always be a problem; just because Canada doesn’t face high rates of violent crime in comparison to other countries doesn’t deem it an unimportant issue. My knowledge about this topic, violent crime, has come from a variety of resources that will be discussed as this paper progresses. The crime control policies in Alberta and/or Canada to my knowledge are having a positive impact, but more could always be done. Overall, I believe an enhanced proactive approachRead MoreThe Effect of Violence in the Media on Children Essay1150 Words   |  5 Pageshas placed the blame on these mediums for the violent acts, however serious or trivial, that children commit way too easily, before they even begin to examine the parenting of todays society. Television, movies, and video games are not the primary causes for acts of violence and other crimes committed by kids. They are only singled out due to the violent images and plots that they depict which leads one to b elieve that since children view these violent scenes they will imitate unconditionally forRead MoreViolence in Television, Movies, and Video Games Should Not Be Censored1653 Words   |  7 Pagessimply because it is an easy target for laying the blame. The truth is that television, movies, and video games are nowhere near the actual causes for acts of violence and other crimes. Studies on the issue are, at best, inconclusive on the issue. Many people believe that television, movies, and video games are the cause of crime because they dont know the facts on the issue. They single out those three because they have violence images and suggestive themes and therefore believe that these will createRead More Violence in the Media is Not to Blame for the Effect on Children1158 Words   |  5 Pagesplaced the blame on these mediums for the violent acts, however serious or trivial, that children commit way too easily, before they even begin to examine the parenting of today’s societ y. Television, movies, and video games are not the primary causes for acts of violence and other crimes committed by kids. They are only singled out due to the violent images and plots that they depict which leads one to believe that since children view these violent scenes they will imitate unconditionally forRead MoreEssay on Recommended Prison Policy1621 Words   |  7 Pagesexamining the severity of armed robbery, rate of recidivism, budget needs, on crime, one will suggest that the minimum amount of time an offender of armed robbery is incarcerated should be increased. Severity of Armed Robbery One reason one believes the amount of time of incarceration should be increased for armed robbery is because the severity of the violent crime. The Federal Bureau of Investigation states, â€Å"The Uniform Crime Reporting (UCR) Program defines robbery as the taking or attempting toRead MoreNo Correlation Between Rising Crime Rates And Strength Of Police Force964 Words   |  4 PagesWithin the last two years, the city has seen a significant increase in violent crimes, while also suffering a decrease in patrol officers. It can be argued that the largeness and diversity of the area contributes to its increase in crime, especially issues of increasing poverty, unemployment, continuing racism, and, the collapse of families† (Moore, 1992, p. 111). It can also be argued that there is no correlation between rising crime rates and strength of police force. That said my need is to add 20Read MoreA Brief Note On Crime And Violent Crime982 Words   |  4 Pagesdisproportionately expos es violent crime because is more serious, but with crime in Canada at an all time low, why is it that the media only advertises the numbers associated with violent crime to be at an all time low and not all crime. How does online news outlets cover the decrease in crime in relation to violent crime and non-violent crime? The variables that will be used are online news outlets stories and articles regarding the crime drop, and the reduction in crime (violent vs non violent). The sampleRead MoreCommunity Policing And Community Crime1578 Words   |  7 Pages Community Policing and Community Crime Mackenzie L. Goehl Culver-Stockton College November 2015 Introduction Community policing is values that encourages organizational approaches such as strategies and policies. Community policing advises all parts of police business and also supports problem-solving practices. Community policing consist of strategies, tactics, and values. Thus, community policing is also sometimes know as problem-oriented policing. The sole purpose of community

Saturday, December 21, 2019

Theories On The Existence Of Religion - 1058 Words

Remi Gleich Moen 4063 December 15th, 2016 Theories on the Existence of Religion When an idea forms and flourishes into an existing discussion that travels through conversations among acquaintances, that idea progresses and solidifies into the minds of the curious thinkers. These â€Å"thinkers†, or theorists, then mold this idea into a hypothesis for experimentation. Unfortunately, even in modern times, some things are still unable to be experimented and proven correct or incorrect. This leaves us pondering on our own thoughts and curiosities of suppositions. Philosophical theories on the origin and evolution of religion vary in perspectives and ideas depending on individual views. The majority of theories relevant to modern times are dependent on a psychological, cultural, and social aspect according to most scientists and/or philosophers. Theorists philosophical attempt at understanding and interpreting why religion has played a significant part in human society from an early time period is a result of the humansâ⠂¬â„¢ thirst for knowledge. Scientific and intellectual advancement is the only way to achieve maximum potential in our lifetimes. For this sole purpose, scientists idealize theories that could potentially be a breakthrough in our knowledge of the beginning of religion. If scientists’ discovered this anomaly, our understanding from that time period could possibly open up many doors into research. According to B. A. Robinson, from a time when homo-sapiens brains wereShow MoreRelatedThe Differences Between Science And Religion913 Words   |  4 PagesOften claims are made that science and religion are incompatible; the two cannot coexist as to believe in God contradicts scientific belief. To look at science and think of it in a completely separate field to religion is not true a true reflection of the relationship between the two. Science and religion overlap in several ways. They both affect our everyday decisions and impact on the way we view and understand the world around us. They both address ‘the same world, the same reality.’ just in differentRead MoreControversy Between the Existence of God Essay example1451 Words   |  6 PagesIn â€Å"The Brothers Karamazov† by Fyodor Dostoevsky made a famous claim that establishes the link between the existence of God and morality. Apart from the controversy related to the scope of the quotation, the discussion on the proper translation and interpretation of the words of Ivan Karamazov. For instance, in his article â€Å"Dostoevsky did not say it† D.Cortesi claims that Dostoevsky did not make such claim (Cortesi 1). However, the research by Russian-speaking authors shows that the original textRead MoreAnalysis Of Barbara Kingsolvers A Fist In The Eye Of God1728 Words   |  7 PagesIs â€Å"theory† a contradictory scientific term? Many people define â€Å"theory† as a set of unjustifiable propositions, whereas others believe a â€Å"theory† is a â€Å"cohere nt set of principles used to explain a class of phenomena† (Kingsolver 208). The contrasting interpretation of â€Å"theory† results from the fluctuating amount of information circulating on this term. Although the word â€Å"theory† is a prime example of how people interpret ideas distinctively, people can develop new insights on their previous ideasRead MoreThe Nature of Faith Essay1335 Words   |  6 Pagesknowledge in religion and natural sciences. Faith is regarded in various ways; commonly as reliability on someone/thing, religion, beliefs, and others. An English dictionary generalizes faith is a â€Å"strong or unshakeable belief in something, especially without proof or evidence† . Essentially, in this context, faith is the solid unconditional belief of something with little evidence or proof. With the definition stated, we can now focus on the matter in hand, its strengths and weaknesses. Religions are,Read MoreThe Existence Of God By Pascal s Wager Essay1597 Words   |  7 PagesOne of the most well known theories about the existence of God is Pascal’s Wager. Upon first look, this theory seems fairly sound, even if not overly convincing. Under more thorough inspection, however, it quickly becomes clear the theory is rather counter productive. Not only does the wager fail to prove the existence of God or anything about the true nature of God, it also fails to prove what it was created to prove. Aside from simply being ineffective, Pascal’s Wager also leads to serious doubtsRead MoreThe Ethics Of Belief By William James972 Words   |  4 Pagesin a religion without prior evidence of its truth. William James was a well-distinguished philosopher as well as a psychologist and a physician. He with a few other philosophers like Charles sanders Pierce and John Dewey were fundamental in establishing modern philosophy in America and are thought to be the foundi ng fathers of pragmatism. James taught at several universities including both Brown and Yale where he often had arguments and lengthy discussions with his students about religion. In hisRead MoreThe Theory Of A Soul Essay1408 Words   |  6 Pagesand does this â€Å"force† survive after our physical death? The concept of a soul has long been rooted in religion and we still debate its existence to this day. As humans, we fear the unknown that follows this existence; after this physical life. Due to this fear we have created this idea of a force larger than ourselves. Many scientists and philosophers have contradicting viewpoints on the existence of a soul. However research and discussion still continues on the matter to hopefully uncover the answersRead MoreDivided Christianity: What Went Wrong 1468 Words   |  6 PagesEurope and America. It also marked the beginning of the effects of modern scientific theory and reasoning on Christian thought and beliefs. Scientific theories like Darwinism had grea t impacts on the churches leading to many of the Christians starting to question some of the beliefs and values they once held . These theories led to a mass move of initial Christians from the regular and traditional observance of religion and belief in Christian teachings, to secularism and a belief in a ‘personal god’Read MoreDoes God Exist1417 Words   |  6 PagesGods existence. There have been several arguments made using this definition both for and against the existence of God. Arguments for the existence of God typically include metaphysical, empirical, inductive, and subjective types. Arguments against typically include empirical, deductive, and inductive types. While no one of these arguments has been accepted as entirely accurate, they all have their respective strengths and weaknesses. A few of the better known arguments for the existence of GodRead MoreThe Doctrine Of The Existence Of God1470 Words   |  6 PagesOne of the most prevalent arguments for t he existence of God is the moral argument. It states that God alone makes sense of moral values, and since moral values exist, then God exists. A great number of people nowadays, including atheists and agnostics, trust in moral values. However, they do not agree with the Christian answer to provide a basis for those values. For many years homosexuality has been a debate over acceptance but has been for the most part considered an immoral act based on religious

Friday, December 13, 2019

Ultrasonic Speed Measurement Free Essays

string(76) " directly dependent on the performance of the transmitter and the receiver\." â€Å"ULTRA SONIC SPEED MEASUREMENT DEVICE† A PROJECT REPORT Submitted in partial fulfillment Of requirements for award of the degree Of BACHELOR OF TECHNOLOGY In ELECTRONICS COMMUNICATION ENGINEERING By: Nimisha Sharma Nishant Tyagi Gaurav Sharma [pic] Department of Electronics communication engineering Radha Govind Engineering College Meerut, U. P 2009-2010 ULTRA SONIC SPEED MEASUREMENT DEVICE By: Nimisha sharma Nishant tyagi Gaurav sharma [pic] Department of Electronics communication engineering Radha govind Engineering College Meerut, U. P 2009-2010 ACKNOWLEDGEMENT Before we get in to thick of things we would like to add a few heartfelt words for the people who were the part of the project in numerous ways. We will write a custom essay sample on Ultrasonic Speed Measurement or any similar topic only for you Order Now People who gave unending support right from the stage the idea were conceived. In particular, we wish to thank Mr. P. K Singh Head of the Department, Electronics Communication and Mr. Abhishek Singh lecturer, Electronics Communication Department for providing this opportunity to us. After doing this project we can confidently say that this experience would not only enriched us with technical knowledge but also has unparsed the maturity of thought and vision . he attributes required being a successful professional. Gaurav Sharma Nimisha Sharma Nishant Tyagi CANDIDATE’S DECLARATION We, here by certify that the work which is being presented in the project report entitled Ultra sonic speed measurement device in partial fulfillment of the requirement for the award of degree of BACHELOR OF TECHNOLOGY in Electronics Communication Engineering submitted in the department of Electronics Communication Engineering of the Institute, is an authentic record of our own work carried out d uring final year of B. tech degree under the supervision of Mr. P. K Singh Head of the Department, Electronics Communication and Mr. Abhishek Singh lecturer, Department Electronics Communication Project group:- Gaurav Sharma (0606931023) Nimisha Sharma (0606931045) Nishant Tyagi (0606931047) This is to certify that the above statement made by the above candidates is correct to the best of my knowledge. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Dept. of Electronics Comm. Dept. of Electronics Comm. R. G. E. C R. G. E. C Meerut, U. P Meerut, U. P Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Date†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. Place†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ Place†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ TABLE OF CONTENTS 1. INTRODUCTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. MEANING OF THE WORD PROJECT†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ . ABSTRACT †¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ c. PARTS OF SPEED MEASUREMENT DEVICE†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚ ¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 2. GENERAL DISCRIPTION AND FEATURES OF MICRO CONTROLLER †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 3. HARDWARE DISCRIPTION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. VOLTAGE REGULATOR LM 7805†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. b. COMPONENTS †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦. 4. PCB LAYOUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ a. STEPS FOR MAKING PCB †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. †¦ b. CIRCUIT LAY OUT †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 5. SOFTWARE PROGRAM †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 6. TESTING†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 7. TROUBLESHOOTING †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. 8. CONCLUSION†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 9. REFERENCES†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ 10. APPENDIX†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.. INTRODUCTION MEANING OF PROJECT The project gives the significance of the following field of engineering – P-signifies the phenomenon of planning which deals with symbolic nation and proper arrangement of sense and suggestion receptivity accordingly to the needs R-it is associate with the word resources wh ich guides to promote planning . OJ-this letter signifies the overhead expenses in unestimated expenses that may occur in the manufacture design or layout of the project. E- signifies the word engineering. C- signifies the convey about phenomenon of construction low cost. T-the word T stands for technique. unless there is a technique; it is impossible to complete the project . The conclusion thus arrived is that project is a systematic consideration discussed and proposal in a particular subject . we can say that project includes complete requirement of mechanism , tools , application and needs. It considers the circuit diagram and various operational performances in sequence and data about the instrument and in the last we can say about the project profit loss. CERTIFICATE This is to certify that Mr. GAURAV SHARMA, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed his project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period he was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). His performance during the project has been Excellent. We wish him all the best for his future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CERTIFICATE This is to certify that Ms. NIMISHA SHARMA, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed her project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period she was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). Her performance during the project has been Excellent. We wish her all the best for her future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CERTIFICATE This is to certify that Mr. NISHANT TYAGI, student of B. Tech (Electronics communication Engineering) Final year from Radha Govind Engineering College has successfully completed his project â€Å"ULTRA SPEED MEASUREMENT DEVICE†. During the project period he was working under the guidance of Mr. Abhishek Singh (lecturer, Electronics Communication Engineering Department). His performance during the project has been Excellent. We wish him all the best for his future. Mr. P. K Singh Mr. Abhishek Singh (H. O. D) (Lecturer) Electronics Comm. Dept. Electronics Comm. Dept. R. G. E. C R. G. E. C Meerut, (U. P) Meerut, (U. P) CHAPTER 1 ABOUT OUR PROJECT Our project the ultrasonic speed measurement device is used to measure speed of a vehicle moving in front of it using ultrasonic waves. The concept of using ultrasonic waves instead of any other communicating tools as infrared and RF is its high preciseness and very less interference by the surrounding. There can various methods that can be opted to design this instrument such as Doppler Effect etc. but we have used the concept of distance measurement at a regular interval. The pulse is being transmitted at a regular interval and the corresponding distance is measured of the two pulses. The difference in the distances is observed and is then divided by the time duration between the two pulses. As result the corresponding speed is obtained. The range of this device is directly dependent on the performance of the transmitter and the receiver. You read "Ultrasonic Speed Measurement" in category "Papers" Higher the transmitting and receiving frequency better will be its range. Mathematical analysis(hypothetical) The duration of pulse is 5 milliseconds. The distance for the signal1 be say 3 cm. The distance for the signal2 be say 2. 95 cm. Difference of distances is (3-2. 95) = . 05 cm. Speed = distance/ time Speed = . 05/5 = 10 meters/sec ADVANTAGE AND DISADVANTAGE The major advantages of our project are One of the major advantages our project is its multi utility. It can be used as 1 Speed measurement 2 Distance measurement 3 Car parking controller The other advantage of this project is its cost. Its cost is less than 1000 INR. The precise result is one more advantage of our project. Limitation of our project. The major disadvantage of our project is its range. Due to the use of low frequency transmitter and receiver. High frequency transmitter and receiver give higher range of upto 10 to 15 mtrs Block diagram [pic] Circuit diagram Working In our project Ultrasonic Speed Measurement Device we are going to measure the speed of a moving vehicle. For this we are using the Ultrasonic Sensors. We first generate a 40 KHz signal by taking the time period of 25 microseconds. Then we actually generate the pulse burst with a delay of 5 milliseconds. For this we programmed the microcontroller. We send the pulse by pressing the switch that is connected to the pin no. 1 of the microcontroller. At this moment the distance of the object from the device is measured and is stored in the microcontroller. Then after the delay of 5 milliseconds the second pulse hits the moving object. Again the distance of the object is measured and is stored in the microcontroller. Then we can easily find out the difference in the distance by simply subtracting these two distances. Now we have the distance and also the time. Therefore by the formula speed = distance / time we can find out the speed of the moving object. In the transmitter part we have LM311which is a voltage comparator and is used here as the precision squarer whose pin no. 2 is connected to the pin no. 2 of the microcontroller. Then at pin no. 7 and pin no. 8 the ultrasonic transmitter is placed. In the receiver part we have LM833 for amplification and 74HC14N as the Hex inverting Schmitt trigger. The pin no. 1 of 74HC14N is connected to the pin no. of LM833. The ultrasonic receiver is connected between pin no. 6 of LM833 and ground. These ultrasonic transmitter and receiver are placed close to each other so that there will be minimum noise. Why ultrasonic signal ? ‘ULTRA’-sonic is a sound wave with a frequency above the normal range of human hearing. Most humans can hear up to 16 ,000 Hertz. Young people can hear almost to 20,000 Hertz. Bats and mice and other small critters can hear much higher and use those sounds to ‘see’ the world around them. An ultrasonic imaging device sends a signal into a medium and then listens for the reflected waves. The more receiving transducers you use to pick up the sound the better you can tell what you are ‘looking’ at. Reflected waves will reach one receiver before the next based on where the reflecting object is located. Electronics are fast enough to determine the direction and distance to the reflected objects. Also the higher the frequency you broadcast the better resolution you will see. A computer is interfaced with an array of receiving tranceducers and it calculates the direction and distance that the many echos must represent and then it plots the picture of the results. The Image can be displayed or printed. In ultrasonic non destructive testing, high-frequency sound vibrations are transmitted into material by an ultrasonic transducer. The test instrument then analyzes the ultrasonic signals which are received using either a pulse-echo or through-transmission method. In the pulse-echo mode, the transmitting transducer also serves as the ultrasonic receiver and analyzes the reflected signal with respect to amplitude and time. In the through-transmission mode, the ultrasonic signal is received by a separate transducer which analyzes the amplitude loss of signal. These ultrasonic NDT methods will indicate material defects such as longitudinal and transverse cracks, inclusions and others as well as ID/OD dimensions and dimensional changes such as thickness and ovality. Components Component required 1. Ultrasonic Transmitter and Receiver 2. Resistor 3. Capacitor 4. Crystal 5. Preset 6. Switch 7. LCD 8. Power Supply 9. IC’s †¢ LM833 †¢ LM311 †¢ 74HC14N †¢ 7805 10. Micro controller †¢ AT89S52 11. Wires 12. Burst Strip 13. IC Base Specification ULTRASONIC SENSORS [pic] Selection and use of ultrasonic ceramic transducers : The purpose of this application note is to aid the user in the selection and application of the Ultrasonic ceramic transducers. The general transducer design features a piezo ceramic disc bender that is resonant at a nominal frequency of 20 – 60 KHz and radiates or receives ultrasonic energy. They are distinguished from the piezo ceramic audio transducer in that they produce sound waves above 20 KHz that are inaudible to humans and the ultrasonic energy is radiated or received in a relatively narrow beam. The â€Å"open† type ultrasonic transducer design exposes the piezo bender bonded with a metal conical cone behind a protective screen. The â€Å"enclosed† type transducer design has the piezo bender mounted directly on the underside of the top of the case which is then machined to resonant at the desired frequency. The â€Å"PT and EP† type transducer has more internal damper for minimizing â€Å"ringing†, which usually operates as a transceiver – oscillating in a short period and then switching to receiving mode. Comparative characteristics : When compared to the enclosed transducer, the open type receiver will develop more electrical output at a given sound pressure level (high sensitivity) and exhibit less reduction in output as the operating frequency deviates from normal resonant frequency (greater bandwidth). The open type transmitter will produce more output for a specific drive level (more efficient). The enclosed type transducer is designed for very dusty or outdoor applications. The face of the transducer must be kept clean and free of damage to prevent losses. The transmitter is designed to have low impedance at the resonant frequency to obtain high mechanical efficiency. The receiver is constructed to maximize the impedance at the specified anti-resonant frequency to provide high electrical efficiency. Sound propagation : In order to properly select a transducer for a given application, it is important to be aware of the principles of sound propagation. Since sound is a wave phenomenon, its propagation and directivity are related to its wavelength (? ). A typical radiation power pattern for either a generator or receiver of waves is shown in Figure 1. Due to the reciprocity of transmission and reception, the graph portrays both power radiated along a given direction (in case of wave production), and the sensitivity along a given direction (in case of wave reception). As an example of a typical situation, a transducer of 400ET250 has an effective diameter of 23 mm (1mm wall thickness) will produce a main beam (-6dB) with full width of 30 ° at a frequency of 40 KHz. For open type transducers, the beam is decided by the angular and diameter of conical cone attached on the bender inside of housing and the opening diameter so it can not be simply calculated by the diameter of the housing. The intensity of sound waves decrease with the distance from the sound source, as might be expected for any wave phenomenon. This decrease is principal a combination of two effects. The first is the inverse square law or spherical divergence in which the intensity drop 6dB per distance doubled. This rate is common to all wave phenomena regardless of frequency. The second effect causing the intensity to decrease is the absorption of the wave by the air (see figure 2). Absorption effects vary with humidity and dust content of the air and most importantly, they vary with frequency of the wave. Absorption at 20 KHz is about 0. 02dB/30 cm. It is clear that lower frequencies are better suited for long range propagation. Of course, the selection of a lower frequency will result in less directivity (for a given diameter of source of receiver). [pic] How far the transducer could reach? One of the most frequently asked questions is â€Å"How far the transducer could reach? †. This question can be answered by a simple calculation that is based on the published specifications in the Ultrasonic Ceramic Transducer Data Sheets. The basic procedure is to first determine the minimum sound pressure level developed at the front end of the receiver for a specific transmitter driving voltage and distance between the transmitter and receiver (transceiver has double distance between reflect target). This SPL must then be converted â€Å"Pa† (Pascal) or â€Å"? bar† (microbar) units. The sensitivity of the receiver must then be converted from a dB reference to an absolute mV/Pa or ? bar level resent to obtain the final output. Assume a 400ST160 transmitter is driven at a level of 20Vrms and a 400SR160 receiver is located 5 meters from the ransmitter and loaded with a 3. K Ohm resistor (loaded resistor value varies receiver sensitivity, please see â€Å"Acoustic Performance† of transducer data sheet). The analysis is necessary to the fundamental understanding of the principals of sound wave propagation and detection but it is tedious. The figure 10 below is a graphical representation of previous analysis which may be used once in the SPL at the receiver is determined. Enter the graph from the SPL axis and proceed upward to an intersection with –dB sensitivity level of the receiver using the 1V/? bar referenced data. Follow a horizontal line to the â€Å"Y† axis to obtain the receiver output in V. At Receiver Ultrasonic echo ranging : Ultrasonic ranging systems are used to determine the distance to an object by measuring the time required for an ultrasonic wave to travel to the object and return to the source. This technique is frequently referred to as â€Å"echo ranging†. The distance to the object may be related to the time it will take for an ultrasonic pulse to propagate the distance to the object and return to the source by dividing the total distance by the speed of sound which is 344 meters/second or 13. 54 inches/millisecond. IC’s [pic] BASIC OF LM833 Low noise dual operational amplifier It is a monolithic dual operational amplifier particularly well suited for audio applications. It Offers low voltage noise (4. 5nV/vHz) and high frequency performances (15MHz Gain Bandwidth Product, 7V/? s slew rate). In addition the LM833 has also a very low distortion (0. 002%) and excellent phase/gain margins. [pic] TOP VIEW AND PIN SET [pic] Features of LM833 †¢ LOW VOLTAGE NOISE: 4. 5nV/vHz †¢ HIGH GAIN BANDWIDTH PRODUCT: †¢ 15MHz †¢ HIGH SLEW RATE: 7V/? s †¢ LOW DISTORTION: 0. 002% †¢ EXCELLENT FREQUENCY STABILITY †¢ ESD PROTECTION 2kV Basic of LM311 The LM111 series are voltage comparators that have input currents approximately a hundred times lower than devices like the mA710. They are designed to operate over a wider range of supply voltages; from standard  ±15 V op amp supplies down to a single 3 V supply. Their output is compatible with RTL, DTL, and TTL as well as MOS circuits. Further, they can drive lamps or relays, switching voltages up to 50 V at currents as high as 50mA. Both the inputs and the outputs of the LM111 series can be isolated from system ground, and the output can drive loads referred to ground, the positive supply, or the negative supply. Offset balancing and strobe capability are provided and outputs can be wire-ORed. Although slower than the mA710 (200 ns response time versus 40 ns), the devices are also much less prone to spurious oscillations. [pic] TOP VIEW AND PIN SET [pic] features FEATURES †¢ Operates from single 3 V supply (LM311B) †¢ Maximum input bias current: 150 nA (LM311: 250 nA) †¢ Maximum offset current: 20 nA (LM311: 50 nA) †¢ Differential input voltage range:  ±30 V †¢ Power consumption: 135 mW at  ±15 V †¢ High sensitivity: 200 V/mV †¢ Zero crossing detector 7805 The 7805 series of three-terminal positive regulator are available in the TO-220/D-PAK package and with several fixed output voltages, making them useful in a wide range of applications. Each type employs internal current limiting, thermal shut down and safe operating area protection, making it essentially indestructible. If adequate heat sinking is provided, they can deliver over 1A output current. Although designed primarily as fixed voltage regulators, these devices can be used with external components to obtain adjustable voltages and currents. [pic] 1 2 3 [pic] Internal diagram [pic] Features †¢ Output Current up to 1A Output Voltages of 5, 6, 8, 9, 10, 12, 15, 18, 24V †¢ Thermal Overload Protection †¢ Short Circuit Protection †¢ Output Transistor Safe Operating Area Protection 74HC14N HEX SCHMITT TRIGGER INVERTER Basic of 7414 Each circuit functions as an inverter, but because of the Schmitt action, it has different input threshold levels for positive (VT+) and for negative going(Vt-) signals. These circuit are temperature compensated and can be triggered from the slowest Micro controller AT89S52 Basic of AT89S52 The AT89S52 is a low-power, high-performance CMOS 8-bit microcontroller with 8K bytes of in-system programmable Flash memory. The device is manufactured using Atmel’s high-density nonvolatile memory technology and is compatible with the industry- standard 80C51 instruction set and pinout. The on-chip Flash allows the program memory to be reprogrammed in-system or by a conventional nonvolatile memory programmer. By combining a versatile 8-bit CPU with in-system programmable Flash on a monolithic chip, the Atmel AT89S52 is a powerful microcontroller which provides a highly-flexible and cost-effective solution to many embedded control applications. The AT89S52 provides the following standard features: 8K bytes of Flash, 256 bytes of RAM, 32 I/O lines, Watchdog timer, two data pointers, three 16-bit timer/counters, a six-vector two-level interrupt architecture, a full duplex serial port, on-chip oscillator, and clock circuitry. In addition, the AT89S52 is designed with static logic for operation down to zero frequency and supports two software selectable power saving modes. The Idle Mode stops the CPU while allowing the RAM, timer/counters, serial port, and interrupt system to continue functioning. The Power-down mode saves the RAM contents but freezes the oscillator, disabling all other chip functions until the next interrupt or hardware reset. [pic] Features of AT89S52 †¢ Compatible with MCS-51 ® Products †¢ 8K Bytes of In-System Programmable (ISP) Flash Memory – Endurance: 1000 Write/Erase Cycles †¢ 4. 0V to 5. 5V Operating Range †¢ Fully Static Operation: 0 Hz to 33 MHz †¢ Three-level Program Memory Lock †¢ 256 x 8-bit Internal RAM †¢ 32 Programmable I/O Lines †¢ Three 16-bit Timer/Counters †¢ Eight Interrupt Sources †¢ Full Duplex UART Serial Channel †¢ Low-power Idle and Power-down Modes †¢ Interrupt Recovery from Power-down Mode Watchdog Timer †¢ Dual Data Pointer †¢ Power-off Flag †¢ Fast Programming Time †¢ Flexible ISP Programming (Byte and Page Mode) Coding ; line 1 ; #include CLINE0 ; end of line 0 ; line 1 ; /* CLINE1 ; end of line 1 ; line 2 ; SFR31. H CLINE2 ; end of line 2 ; line 3 ; Copyright 1995 SPJ Systems, Pune CLINE3 ; end of line 3 ; line 4 ; CLINE4 ; end of line 4 ; line 5 ; This header file contains SFR declarations for the CPU 8031 CLINE5 ; end of line 5 ; line 6 ; Please note that you will have to include SFR31. H in your program, if you CLINE6 ; end of line 6 ; line 7 ; wish to access the SFRs from your C program. CLINE7 ; end of line 7 line 8 ; */ CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; SFRACC0xe0 CLINE10 ACCequ0e0h ; end of line 10 ; line 11 ; SFRREG_B0xf0 CLINE11 REG_Bequ0f0h ; end of line 11 ; line 12 ; SFRPSW0xd0 CLINE12 PSWequ0d0h ; end of line 12 ; line 13 ; SFRSP0x81 CLINE13 SPequ081h ; end of line 13 ; line 14 ; SFRDPL0x82 CLINE14 DPLequ082h ; end of line 14 ; line 15 ; SFRDPH0x83 CLINE15 DPHequ083h ; end of line 15 ; line 16 ; SFRP00x80 CLINE16 P0equ080h ; end of line 16 ; line 17 ; SFRP10x90 CLINE17 P1equ090h ; end of line 17 ; line 18 ; SFRP20xa0 CLINE18 P2equ0a0h ; end of line 18 ; line 19 ; SFRP30x b0 CLINE19 P3equ0b0h end of line 19 ; line 20 ; SFRIP0xb8 CLINE20 IPequ0b8h ; end of line 20 ; line 21 ; SFRIE0xa8 CLINE21 IEequ0a8h ; end of line 21 ; line 22 ; SFRTMOD0x89 CLINE22 TMODequ089h ; end of line 22 ; line 23 ; SFRTCON0x88 CLINE23 TCONequ088h ; end of line 23 ; line 24 ; SFRTH00x8c CLINE24 TH0equ08ch ; end of line 24 ; line 25 ; SFRTL00x8a CLINE25 TL0equ08ah ; end of line 25 ; line 26 ; SFRTH10x8d CLINE26 TH1equ08dh ; end of line 26 ; line 27 ; SFRTL10x8b CLINE27 TL1equ08bh ; end of line 27 ; line 28 ; SFRSCON0x98 CLINE28 SCONequ098h ; end of line 28 ; line 29 ; SFRSBUF0x99 CLINE29 SBUFequ099h ; end of line 29 ; line 30 ; SFRPCON0x87 CLINE30 PCONequ087h ; end of line 30 ; line 31 ; CLINE31 ; end of line 31 ; line 2 CLINE0 ; end of line 0 ; line 1 ; /*float. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; #define FLT_RADIX2 CLINE7 ; end of line 7 ; line 8 ; #define FLT_DIG6 CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; #define FLT_MANT_DIG24 CLINE10 ; end of line 10 ; line 11 ; #define FLT_MAX_EXP+128 CLINE11 ; end of line 11 ; line 12 #define FLT_MIN_EXP-125 CLINE12 ; end of line 12 ; line 13 ; CLINE13 ; end of line 13 ; line 3 CLINE0 ; end of line 0 ; line 1 ; #definestart_timer0()asmsetbtcon. 4 CLINE1 ; end of line 1 ; line 2 ; #definestop_timer0()asmclrtcon. 4 CLINE2 ; end of line 2 ; line 3 ; #definestart_timer1()asmsetbtcon. 6 CLINE3 ; end of line 3 ; line 4 ; #definestop_timer1()asmc lrtcon. 6 CLINE4 ; end of line 4 ; line 5 ; #defineex0_edge()asmsetbtcon. 0 CLINE5 ; end of line 5 ; line 6 ; #defineex0_level()asmclrtcon. 0 CLINE6 ; end of line 6 ; line 7 ; #defineex1_edge()asmsetbtcon. 2 CLINE7 ; end of line 7 ; line 8 ; #defineex1_level()asmclrtcon. 2 CLINE8 ; end of line 8 ; line 9 ; #defineenable_rx()asmsetbscon. 4 CLINE9 ; end of line 9 ; line 10 ; #definedisable_rx()asmclrscon. 4 CLINE10 ; end of line 10 ; line 11 ; #defineclr_ti()asmclrscon. 1 CLINE11 ; end of line 11 ; line 12 ; #defineclr_ri()asmclrscon. 0 CLINE12 ; end of line 12 ; line 13 ; #defineenable_ex0()asmorlie,#81h CLINE13 ; end of line 13 ; line 14 ; #defineenable_t0()asmorlie,#82h CLINE14 ; end of line 14 ; line 15 ; #defineenable_ex1()asmorlie,#84h CLINE15 ; end of line 15 ; line 16 ; #defineenable_t1()asmorlie,#88h CLINE16 ; end of line 16 ; line 17 ; #defineenable_ser()asmorlie,#90h CLINE17 ; end of line 17 line 18 ; #defineenable_t2()asmorlie,#0a0h CLINE18 ; end of line 18 ; line 19 ; #defineenable_all()asmmovie,#0bfh CLINE19 ; end of line 19 ; line 20 ; #defineenable()asmsetbie. 7 ; sets only the MSB CLINE20 ; end of line 20 ; line 21 ; #definedisable_ex0()asmanlie,#0feh CLINE21 ; end of line 21 ; line 22 ; #definedisable_t0()asmanlie,#0fdh CLINE22 ; end of line 22 ; line 23 ; #definedisable_ex1()asmanlie,#0fbh CLINE23 ; end of line 23 ; line 24 ; #definedisable_t1()asmanlie,#0f7h CLINE24 ; end of line 24 ; line 25 ; #definedisable_ser()asmanlie,#0efh CLINE25 ; end of line 25 ; line 26 ; #definedisable_t2()asmanlie,#0dfh CLINE26 end of line 26 ; line 27 ; #definedisable_all()asmmovie,#0 CLINE27 ; end of line 27 ; line 28 ; #definedisable()asmclrie. 7 ; clears only the MSB CLINE28 ; end of line 28 ; line 29 ; #defineset_hi_ex0()asmorlip,#1h CLINE29 ; end of line 29 ; line 30 ; #defineset_hi_t0()asmorlip,#2h CLINE30 ; end of line 30 ; line 31 ; #defineset_hi_ex1()asmorlip,#4h CLINE31 ; end of line 31 ; line 32 ; #defineset_hi_t1()asmorlip,#8h CLINE32 ; end of line 32 ; line 33 ; #defineset_hi_ser()asmorlip,#10h CLINE33 ; end of line 33 ; line 34 ; #defineset_hi_t2()asmorlip,#20h CLINE34 ; end of line 34 ; line 35 ; #defineset_lo_ex0()asmanlip,#0feh CLINE35 ; end of line 35 ; line 36 ; #defineset_lo_t0()asmanlip,#0fdh CLINE36 ; end of line 36 ; line 37 ; #defineset_lo_ex1()asmanlip,#0fbh CLINE37 ; end of line 37 ; line 38 ; #defineset_lo_t1()asmanlip,#0f7h CLINE38 ; end of line 38 ; line 39 ; #defineset_lo_ser()asmanlip,#0efh CLINE39 ; end of line 39 ; line 40 ; #defineset_lo_t2()asmanlip,#0dfh CLINE40 ; end of line 40 ; line 41 ; #defineset_double_baud()asmorlpcon,#80h CLINE41 ; end of line 41 ; line 42 ; #defineclr_double_baud()asmanlpcon,#7fh CLINE42 ; end of line 42 ; line 43 ; #definepowerdown()asmorlpcon,#2 CLINE43 ; end of line 43 ; line 44 ; #definego_idle()asmorlpcon,#1 CLINE44 ; end of line 44 ; line 45 ; #defineset_t0_mode(gate,c_t,mode)asmorltmod,#((gate * 8) + (c_t * 4) + mode) CLINE45 ; end of line 45 ; line 46 ; #defineset_t1_mode(gate,c_t,mode)asmorltmod,#(((gate * 8) + (c_t * 4) + mode) * 16) CLINE46 ; end of line 46 ; line 47 ; #defineset_com_mode(mode,sm2,ren)asmmovscon,#((mode * 64) + (sm2 * 32) + (ren * 16)) CLINE47 ; end of line 47 ; line 48 ; CLINE48 ; end of line 48 line 4 CLINE0 ; end of line 0 ; line 1 CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; unsigned char inportb (unsigned int portid) ; CLINE7 ; end of line 7 ; line 8 ; void outportb (unsigned int portid, unsigned int value) ; CLINE8 ; end of line 8 ; line 9 ; unsigned char peekb (unsigned int addr) ; CLINE9 ; end of line 9 ; line 10 ; void pokeb (unsigned int addr, uns igned int value) ; CLINE10 ; end of line 10 ; line 11 ; void set_tcnt (int tnum, unsigned int count) ; CLINE11 ; end of line 11 ; line 12 ; void delay (int count) ; CLINE12 ; end of line 12 ; line 13 ; void delay_ms (int count) ; CLINE13 ; end of line 13 ; line 14 unsigned char lo_nibb (unsigned char ch) ; CLINE14 ; end of line 14 ; line 15 ; unsigned char hi_nibb (unsigned char ch) ; CLINE15 ; end of line 15 ; line 16 ; int getbyte () ; CLINE16 ; end of line 16 ; line 17 ; void sendbyte (unsigned char ch) ; CLINE17 ; end of line 17 ; line 18 ; int ser_rdy () ; CLINE18 ; end of line 18 ; line 19 ; void init_ser () ; CLINE19 ; end of line 19 ; line 20 ; CLINE20 ; end of line 20 ; line 21 ; #defineINT_EXT01 CLINE21 ; end of line 21 ; line 22 ; #defineINT_TMR02 CLINE22 ; end of line 22 ; line 23 ; #defineINT_EXT13 CLINE23 ; end of line 23 ; line 24 ; #defineINT_TMR14 CLINE24 ; end of line 24 line 25 ; #defineINT_SER5 CLINE25 ; end of line 25 ; line 26 ; #defineINT_TMR26 CLINE26 ; end o f line 26 ; line 27 ; CLINE27 ; end of line 27 ; line 5 CLINE0 ; end of line 0 ; line 1 ; /*math. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; #definepye3. 14285714285714 CLINE7 ; end of line 7 ; line 8 ; #definepyex26. 28571428571429 CLINE8 ; end of line 8 ; line 9 ; #definepye_2 1. 57142857142857 CLINE9 ; end of line 9 line 10 ; #definepyex3_2 4. 71428571428571 CLINE10 ; end of line 10 ; line 11 ; #defineLOG20. 30102999566 CLINE11 ; end of line 11 ; line 12 ; #defineNLOG20. 69314718056 CLINE12 ; end of line 12 ; line 13 ; #defineCONST_M0. 43429 CLINE13 ; end of line 13 ; line 14 ; CLINE14 ; end of line 14 ; line 15 ; float sin (float x) ; CLINE15 ; end of line 15 ; line 16 ; float cos (float x) ; CLINE16 ; end of line 16 ; line 17 ; float tan (float x) ; CLINE17 ; end of line 17 ; line 18 ; float asin(float x) ; CLINE18 ; end of line 18 ; line 19 ; float acos (float x) ; CLINE19 ; end of line 19 ; line 20 ; float sinh (float x) ; CLINE20 ; end of line 20 ; line 21 ; float cosh (float x) ; CLINE21 ; end of line 21 ; line 22 ; float tanh (float x) ; CLINE22 ; end of line 22 ; line 23 ; float exp (float x_flval); CLINE23 ; end of line 23 ; line 24 ; float log (float value) ; CLINE24 ; end of line 24 ; line 25 ; float log10 (float value) ; CLINE25 ; end of line 25 ; line 26 ; float pow (float x, float y) ; CLINE26 ; end of line 26 ; line 27 ; float sqrt (float x) ; CLINE27 ; end of line 27 ; line 28 ; float ceil (float x) ; CLINE28 ; end of line 28 ; line 29 ; float floor (float x) ; CLINE29 ; end of line 29 ; line 30 ; float fabs (float x) ; CLINE30 end of line 30 ; line 31 ; float ldexp (float number, int power) ; CLINE31 ; end of line 31 ; line 32 ; float frexp (float number, int *power) ; CLINE32 ; end of line 32 ; line 33 ; float modf (float x, float *ipart) ; CLINE33 ; end of line 33 ; line 34 ; float fmod (float n1, float n2) ; CLINE34 ; end of line 34 ; line 35 ; CLINE35 ; end of line 35 ; line 6 CLINE0 ; end of line 0 ; line 1 ; /*stdlib. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 line 6 ; CLINE6 ; end of line 6 ; line 7 ; float atof (char *s) ; CLINE7 ; end of line 7 ; line 8 ; int atoi (char *s) ; CLINE8 ; end of line 8 ; line 9 ; long int atol (char *s) ; CLINE9 ; end of line 9 ; line 10 ; int abs (int n) ; CLINE10 ; end of line 10 ; line 11 ; long int labs (long int n) ; CLINE11 ; end of line 11 ; line 12 ; CLINE12 ; end of line 12 ; line 13 ; void int2bcd (int value, char *dest, int ndigits) ; CLINE13 ; end of line 13 ; line 14 ; void itoa_c31 (int value, char *dest, int ndigits) ; CLINE14 ; end of line 14 ; line 15 ; void ui2a_c31 (unsigned int value, char *dest, int ndigits) ; CLINE15 end of line 15 ; line 16 ; void ui2bcd (unsigned int value, char *dest, int ndigits) ; CLINE16 ; end of line 16 ; line 17 ; CLINE17 ; end of line 17 ; line 18 ; void long2bcd (long int val, char *dest, int cnt) ; CLINE18 ; end of line 18 ; line 19 ; void ltoa_c31 (long int val, char *dest, int cnt) ; CLINE19 ; end of line 19 ; line 20 ; CLINE20 ; end of line 20 ; line 7 ; #include CLINE0 ; end of line 0 ; line 1 ; /*etc. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; int bcd2int (char *str, int ndigits) ; CLINE7 ; end of line 7 ; line 8 ; void flot2str (float value, char *dest) ; CLINE8 ; end of line 8 ; line 9 ; CLINE9 ; end of line 9 ; line 8 ; #include CLINE0 ; end of line 0 ; line 1 ; /*string. h CLINE1 ; end of line 1 ; line 2 ; CLINE2 ; end of line 2 ; line 3 ; Copyright (c) SPJ Systems 1998 CLINE3 ; end of line 3 ; line 4 ; All Rights Reserved. CLINE4 ; end of line 4 ; line 5 ; */ CLINE5 ; end of line 5 ; line 6 ; CLINE6 ; end of line 6 ; line 7 ; char * strcpy (char *dest, char *src) ; CLINE7 ; end of line 7 ; line 8 char * strncpy (char *dest, char *src, int maxlen) ; CLINE8 ; end of line 8 ; line 9 ; char * strcat (char *dest, char *src) ; CLINE9 ; end of line 9 ; line 10 ; int strcmp (char *s1, char *s2) ; CLINE10 ; end of line 10 ; line 11 ; unsigned int strlen (char *src) ; CLINE11 ; end of line 11 ; line 12 ; char * strlwr (char *s) ; CLINE12 ; end of line 12 ; line 13 ; char * strupr (char *s) ; CLINE13 ; end of line 13 ; line 14 ; CLINE14 ; end of line 14 ; line 15 ; void * memset (void *s, int c, int n) ; CLINE15 ; end of line 15 ; line 16 ; CLINE16 ; end of line 16 ; line 9 ; CLINE9 ; end of line 9 ; line 10 ; CLINE10 end of line 10 ; line 11 CLINE11 ; end of line 11 ; line 12 CLINE12 ; end of line 12 ; line 13 CLINE13 ; end of line 13 ; line 14 CLINE14 ; end of line 14 ; line 15 ; CLINE15 ; end of line 15 ; line 16 CLINE16 ; end of line 16 ; line 17 CLI NE17 ; end of line 17 ; line 18 ; float f1,f2,s1,s2; CLINE18 ; end of line 18 ; line 19 ; CLINE19 ; end of line 19 ; line 20 ; /*************************************************** CLINE20 ; end of line 20 ; line 21 ; * Prototype(s) * CLINE21 ; end of line 21 ; line 22 ; ***************************************************/ CLINE22 ; end of line 22 line 23 ; CLINE23 ; end of line 23 ; line 24 CLINE24 ; end of line 24 ; line 25 CLINE25 ; end of line 25 ; line 26 CLINE26 ; end of line 26 ; line 27 CLINE27 ; end of line 27 ; line 28 CLINE28 ; end of line 28 ; line 29 ; void LCD_init(); CLINE29 ; end of line 29 ; line 30 ; CLINE30 ; end of line 30 ; line 31 ; /*************************************************** CLINE31 ; end of line 31 ; line 32 ; * Sources * CLINE32 ; end of line 32 ; line 33 ; ***************************************************/ CLINE33 ; end of line 33 ; line 34 CLINE34 ; line 35 ; { CLINE35 _LCD_delay: end of line 35 ; line 36 ; unsigned char n; CLINE36 ; end of line 36 ; line 37 ; unsigned char i; CLINE37 ; end of line 37 ; line 38 CLINE38 pushbp movbp,sp incsp incsp for0: movr1,bp incr1 incr1 mov@r1,#0 for_in0: mova,bp adda,#0fdh movr1,a movmyacc,@r1 movr0,#myacc movr1,bp incr1 incr1 mova,@r1 clrc subba,@r0 clra movacc. 0,c mov@r0,a mova,myacc jnzfor_ok0 ljmpfor_out0 for_ok0: ; line 39 ; { CLINE39 ; line 40 CLINE40 for1: movr1,bp incr1 mov@r1,#0 for_in1: movr1,bp incr1 movr0,#myacc mova,@r1 clrc subba,#100 clra movacc. 0,c mov@r0,a mova,myacc jnzfor_ok1 ljmpfor_out1 for_ok1: ; line 41 ; { CLINE41 ; line 42 asm nop CLINE42 nop ; line 43 ; } CLINE43 for_inc1: movr1,bp incr1 inc@r1 ljmpfor_in1 for_out1: ; line 44 ; } CLINE44 for_inc0: movr1,bp incr1 incr1 inc@r1 ljmpfor_in0 for_out0: ; end of line 44 ; line 45 ; CLINE45 ; end of line 45 ; line 46 ; } CLINE46 movsp,bp popbp ret ; end of line 46 ; line 47 ; CLINE47 ; end of line 47 ; line 48 ; CLINE48 ; end of line 48 ; line 49CLINE49 ; line 50 ; { CLINE50 _LCD_command: ; end of line 50 ; line 51 CLINE51 pushbp movbp,sp mova,bp adda,#0fdh movr1,a mov160,@r1 ; end of line 51 ; line 52 CLINE52 clr P3. 2 ; end of line 52 ; line 53 CLINE53 clr p3. 1 ; end of line 53 line 54 CLINE54 setb P3. 0 ; end of line 54 ; line 55 CLINE55 clr P3. 0 ; end of line 55 ; line 56 CLINE56 mova,#01h pushacc lcall_LCD_delay decsp ; end of line 56 ; line 57 ; } CLINE57 movsp,bp popbp ret ; end of line 57 ; line 58 ; CLINE58 ; end of line 58 ; line 59 CLINE59 ; line 60 ; { CLINE60 _LCD_putc: ; end of line 60 ; line 61 ; P2 = ascii; CLINE61 pushbp movbp,sp mova,bp adda,#0fdh movr1,a mov160,@r1 ; end of line 61 ; line 62 CLINE62 setb P3. 2 ; end of line 62 ; line 63 ; asm clr p3. 1 CLINE63 clr p3. 1 ; end of line 63 ; line 64 CLINE64 setb P3. 0 ; end of line 64 ; line 65 ; asm clr P3. 0 CLINE65 How to cite Ultrasonic Speed Measurement, Papers

Thursday, December 5, 2019

Folahan Akinyemi free essay sample

The media, politicians, and many parents are blaming video games for violent acts among children and those less than 18 years of age. . I think in this day and age, It is safe to assume that everyone has played a video game, from Tetras to Final Fantasy Ill. The past week I have done researching on multiple resources about the effect of video game on youth A. Have looked at various scholarly and academic articles B. I can speak from personal experience IV- Today, I would like to inform you on the positive effects videos games on youth A.First, Video Games have a positive effects on youth sociologically B. Second, Video Games have positive effect on youths psyche C. Third, Video Games have positive effect on youth overall physical being (Transitions) Body l. First, Video Games have a positive effects on youth sociologically A. Social Development It is common that kids growing up this generation have played videos games whether it be educational or for entertainment. We will write a custom essay sample on Folahan Akinyemi or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Gaming has become part of he norm. B.Interaction with peers Contrary to the what some believe, the average gamer isnt some obese couch potato nerd that sits at home 24/7 by himself eating junk food and playing video game. It is your average person C. Relationships and Interpersonal skills . Second, Video Games have positive effect on youths psyche Ill. Academics 1. Educational Software 2. Positive Effects on learning and academic skills B. Behavior C. Psychiatric Symptoms IV. Third, Video Games have positive effect on youth overall physical being A.Stress Outlet B. Physical Attributes 1. Motor Skills 2. Decision-Making Skills Conclusion I. In Conclusion, ask you not to forget the overall benefits of couple button and direction pad II. Today I have talked about how video games are not harmful to youth A. First, Video Games have a positive effects on youth sociologically B.

Thursday, November 28, 2019

Compare and contrast Cousin Kate and The Birthday by Christina Rosseti Essay Example

Compare and contrast Cousin Kate and The Birthday by Christina Rosseti Paper Christina Rosseti was an 19th century poet. She was born in London on the 5th December 1830 to Gabriele and Frances Rosseti. In 1848 she became engaged to James Collinson, one of the pre-Raphaelite brethren. The engagement fell through when he became Roman Catholic. From the early 1860s on she was in love with Charles Cayley but refused to marry him because he was not a Christian and Milk-and-water Anglicanism was not to her taste. She was proud of her expertise at the game of chess that she liked to win but felt guilt at taking pleasure in winning. So she gave up chess because she enjoyed it so much. She also pasted paper strips over the antireligous parts of Swinburnes Atalanta in Calydon; objected to nudity in paintings, especially if the artist was a women; and refused to go see Wagners Parsifal, because it celebrated a pagan mythology. My heart is like a singing bird Whose nest is in a watered shoot: My heart is like an apple-tree We will write a custom essay sample on Compare and contrast Cousin Kate and The Birthday by Christina Rosseti specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Compare and contrast Cousin Kate and The Birthday by Christina Rosseti specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Compare and contrast Cousin Kate and The Birthday by Christina Rosseti specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Whose boughs are bent with thickset fruit; My heart is like a rainbow shell That paddles in a halcyon sea; My heart is gladder than all these Because my love is come to me. The simile used in the first verse are all derived from beauty as it might be seen to be expressed in nature. The poem is all joyful and uplifting. In view of the poets evangelical christian convictions it seems likely that the love referred to is the agape love referred to in the New Testament rather than sexual or romantic love. And that this was the poets intention. However a powerful repressed erotic component can be easily attributed to this verse. For example, if the term heart is substituted, then comparisons to watered shoots, thickset fruit and rainbow shells have a powerful sexual element. In that fruit is only produced by a plant for reproduction. On the other hand, taken at face value the poem has a lyrical brightness. Possibly in an era when Victorian sexual prudery is widely believed to mask desperate sexual repression dark and lustful motives are found where none actually exist. Raise me a dais of silk and down; Hang it with vair and purple dyes; Carve it in doves and pomegrantes, And peacocks with a hundred eyes; Work it in gold and silver grapes In leaves and silver fleurs-de-lys; Because the birthday of my life Is come, my love is come to me. In the second verse the imagery becomes more religious, and perhaps more sinister. The dias described sound like the exotic trappings of royalty as described in the old testament, particularly when associated with the colour purple. Although the furniture described may seem to resemble a throne it could also resemble a Hindu funeral bier. The references to peacocks and pomegranets seems particularly and evocatively Eastern, althuough it is also probably influenced by her reading of the Book of Solomon. Also the reference to the peacocks with a hundred eyes could have a meaning as being a sign of fertility or other sexual reference because the peacocks tail is only their to attract a mate and falls out after the mating season. Although this could also show eastern richness. The association of beauty with fertility thickset fruit, and choice fruits (Solomon 4:13) is imagery typical of this portion of the Old Testament. There is some evidence from accounts the poet had been in love with both Collison and Cayley during her life. Although they were romantically inclined she seemed not to have returned these feelings. The way the poem The Birthday is laid out seemed to send out the message that she is in love with Brett or she enjoys being chased by him. Brett an artist friend of her brother had apparently declared within it the commentators have proposed that this poem that is inspired by her relationship his love notion that it is she not the lover who is in the dominant position here. It seems not unreasonable that her pleasure at being in the dominant position in a romantic series of encounters with a man who desired her should be expressed in poetry, but the true feelings disguised in a religious allegory. In either case she feels guilt for doing so. Because of this she has disguised her feeling in the poem by suggesting she is going to die or has died and that her love is the love of God. Cousin Kate I was a cottage maiden, Hardened by sun and air, Contented with my cottage mates, Not mindful I was fair. Why did a great lord find me out And praise my flaxen hair? Why did a great lord find me out To fill my heart with care? This is a narrative poem that tells of a girl who goes from being a poor maiden to a mother of a lords son. The first thing we learn about the narrator, in the first stanza is that she is a maiden so she is unmarried and young. The lines hardened by sun and air suggest she lives out in the country and her family works the land. He lured me to his palace home- Woes me for joy thereof- To lead a shameless, shameful life, His plaything and his love. He wore me like a silken knot, He changed me like a glove; So now I moan, an unclean thing, Who might have been a dove. The way the second stanza starts saying the narrator was lured to the lords palace shows she was tricked into coming close and she feels like his prey. Thus is because a lure is something used when hunting to get the prey close enough to catch. The two lines describing the lord wearing her like a silken knot and changed me like a glove show how the narrator has been dehumanized and used. The narrator sees herself as an unclean thing because she was the Lords lover outside of marriage and this was scorned upon when the poem was written (the Victorian era). The narrator goes on to say she might have been a dove meaning all good and pure. The dove was associated with all things good because according to the holy Bible when john baptized Jesus the Baptist a dove appeared in the sky above them and the voice of god was heard. This also reflects back to Christina Rossettis belief in Christianity. O Lady Kate, my cousin Kate, You grew more fair than I. He saw you at your fathers gate, Chose you and cast me by. He watched your steps along the lane, Your work among the rye: He lifted you from mean estate To sit with him on high. The narrator addresses her cousin as Lady Kate because she is now married to a Lord and has gained the tittle of Lady. The narrator tends to blame the lord for whats happened because she refers to him doing everything like He lured me and He wore me showing how he used her. However the narrator also blames herself for what happened because she went willingly. Because you were so good and pure He bound you with his ring: The neighbours call you good and pure, Call me an outcast thing. Even so I sit and howl in dust, You sit in gold and sing: Now which of us has tenderer heart? You had the stronger wing. Here the narrator compares herself to her cousin Kate. She says Kate is good and pure whereas she referees to herself as an outcast thing. The last sentence, you had the stronger wing shows that the narrator believes Kate had better means than she did to get to a higher social position. Kate goes from being a cottage maiden to a lady. The question Now which of us has tenderer heart? shows that the narrator believes her love was stronger than cousin Kates. The second line of the fifth stanza reinforces this; your love was writ in sand. If something is written in sand then its there for all to see but is soon washed away. So the narrator is partly blaming her cousin here. O cousin Kate, my love was true. Your love was writ in sand: If he had fooled not me but you, If you stood where I stand, Hed not have won me with his love, Nor bought me with his land: I would have spit into his face And not have taken his hand. Here the narrator seems to partly blame her cousin for whats happened and says that if she had been in Kates place she wouldnt have married the Lord She would have spit into his face, and what Kate did wasnt right. She also blames the lord for what happened saying how he fooled her. This seemed to say that the lord led her to believe he loved her and would marry her but was only using her. Yet Ive a gift you have not got, And seem not like to get: For all your cloths and wedding ring Ive little dought you fret. My fair haired son, my shame, my pride, Cling closer, closer yet: Your father would give lands for one To wear his coronet. This is where the story is brought to an end, although the narrator seems to have nothing left we now learn that she is a mother but Kate is not and may never be. For the Victorian times when Christina Rosette was writing people frowned greatly on nudity and sexual references (they even covered the legs of tables so the sight of a naked leg didnt shock women). So she must have suffered great criticism for most of her work including The Birthday and Cousin Kate. These poems are both about love but are hard to compare, as the Birthday is purely about emotion where as the Cousin Kate poem is narrative. Both poems talk about love. The Birthday talks about positive things and Cousin Kate is negative, from the narrators point of view she has lost everything because she loved the lord. Christina Rosetti was very inflexible so why would she write such strong poems with what would seem sexual references when she objected to nudity in paintings? Perhaps the birthday is like the Song of Solomon in that it describes what appear to be sexual things but is actually talking about beauty, the beauty of Gods kingdom.

Sunday, November 24, 2019

How Does the Cell Membrane Function

How Does the Cell Membrane Function SAT / ACT Prep Online Guides and Tips All living things are made of cells and all cells have different parts that perform specific functions. One of the parts present in every cell is called the cell membrane. In this article, we’ll discuss the cell membrane structure and function, answering the questions â€Å"what does the cell membrane do?† and â€Å"why is the cell membrane important?† What Does the Cell Membrane Do? The main cell membrane function is to protect the inside of a cell. The cell membrane surrounds the cytoplasm of a cell (both plant and animal cells). As a thin, semi-permeable substance, the cell membrane lets some things pass through into the cell while keeping others out. The cell membrane is extremely important for keeping the cell safe. Because the cell membrane has a semi-permeable structure, it also gives a bit of shape to the cell. While not as thick or sturdy as the cell wall found in plant cells, the cell membrane does help support and give structure to the cell. The cell membrane is also responsible for helping cells grow through two processes known as endocytosis and exocytosis. What Is Endocytosis? During endocytosis, materials from outside of a cell are brought into the cell and then absorbed. Endocytosis helps cells get materials they need. There are three types of endocytosis. In pinocytosis, cells take in small amounts of extracellular fluids to help them hydrate. In receptor-mediated endocytosis, a large extracellular molecule, like a protein, is bound to a receptor on the cell membrane. In phagocytosis, cells ingest large objects, like chunks of dead organic matter, and seal them off into large vacuoles and digest the material. What Is Exocytosis? In exocytosis, a cell releases substances into its environment. During exocytosis, vesicles that contain substances are moved to the cell membrane and fuse with it. This cell membrane function has three results: the total surface of the membrane increases, toxins or waste products are eliminated, and proteins become part of the plasma membrane. Cell Membrane Structure Cell membranes are made up of mainly lipids and proteins. A lipid is a type of organic molecule found in living things. Lipids are oily or waxy. Fats are made from lipid molecules. Proteins are large, complex molecules found in living things. They are made up of amino acids and do work related to the structure, function, and regulation of the body’s tissues and organs. There are three types of lipids and two types of proteins found in cell membranes. Cell Membrane Lipids There are three types of lipids found in cell membranes: Phospholipids are the main component of cell membranes. They line up and form a double layer that all cell membranes have. The double layer phospholipids form helps to protect the cell by only allowing certain materials to pass through. Cholesterol is a lipid that helps cell membranes from becoming too stiff. Cholesterol acts a bit like a sheepdog - it herds the phospholipids and prevents them from crowding together. Glycolipids are found on the surface of the cell membrane and help the cell recognize other cells in the body. Cell Membrane Proteins Cell membranes have two main types of proteins that then have specific functions within the categories. Peripheral proteins are proteins that are attached to the outside of the cell membrane. They are involved with the cell membrane because of interactions with other types of proteins. Integral membrane proteins pass through the membrane itself. Classes of Peripheral and Integral Membrane Proteins There are four different classes of peripheral and integral membrane proteins. Both peripheral and integral membrane proteins have structural, receptor, transport molecule, and glycoproteins. First, there are structural proteins, which, as their name suggests, help give the cell its structure. Next, there are receptor proteins. These proteins help the cell communicate to other cells (think cell phone reception). They use hormones, neurotransmitters and other things to talk to other cells. Transport molecules are like ferryboats. They help carry material through the cell membrane. Finally, glycoproteins also help in communication and transportation. Cell Membrane Function: Key Takeaways There are many parts of the cell, like the chromosomes, nucleus, Golgi apparatus, and cell membrane. The cell membrane structure and function is to act as the gatekeeper to the cell. The cell membrane gives the cell its shape and helps keep bad material out while also ferrying good material in. All cells have cell membranes, which are composed mainly of lipids and proteins. What's Next? Are you studying clouds in your science class? Get help identifying the different types of cloudswith our expert guide. Working on a research paper but aren't sure where to start? Then check out our guide, where we've collected tons of high-quality research topics you can use for free. Need help with English class- specifically with identifying literary devices in texts you read? Then you'll definitely want to take a look at our comprehensive explanation of the most important literary devices and how they're used.

Thursday, November 21, 2019

Texas Instruments Case Study Example | Topics and Well Written Essays - 2000 words

Texas Instruments - Case Study Example Despite the sceptical outlook that a majority of executives had with respect to ERP, it was chosen as the methodology that could bring answers to the issues Texas Instruments faced in the late 1990s. As the case study outlines, the executives at TI felt that granted the fast paced trend of information technology, it was necessary for the company to make some considerable changes as to their methods and processes, in a manner that would allow them to compete more favourably in their market. According to the authors Sarkis et. al, TI was facing some serious issues in handling large international orders and delivery demands. For instance, the study refers to a Taiwan customer asking for product orders to be made in California and delivered at a given location to be decided just before delivery time. Such procedural complications in the ordering procedure would cause logistics issues that would eventually impact delivery time. As pointed out in the study, TI was facing several similar pr oblems where the customer requests would be delayed as the information system in place was not flexible enough to streamline the ordering process or to meet customer demands adequately. The executive decision to invest 250 million dollars in a brand new web based ERP system was made to help address the several issues caused by the internal and incompatible information systems used for inventory, manufacturing, and sourcing. Consequently the overall decision to implement a novel IS strategy to better meet customer demands was handled properly. In implementing a web based ERP system, the company would help reorganize the many processes that tie suppliers, manufacturers, and resellers on a worldwide scale, and thereby meet market demands in a preferred fashion to become competitive again. In upgrading their internal information system, I believe TI executives made the right choice in partnering with Andersen Consulting for their consulting expertise in the area. Considering the size and impact of the project in the long term, it makes perfect sense to consider that managers would employ significant resources to plan and execute this strategy for an up-to-date information system capable of handling customizable orders in an effort to enhance overall customer satisfaction and loyalty to the company. The team in charge of the project, after meeting and evaluating the solutions of several vendors, eventually choose the SAP solution for its ability to handle large amounts of data. Due to the widespread nature of the project, reli ance and pragmatism of the solution become imperative to make the transition to a more productive system. In considering the processes involved in the decision making for the adoption of the SAP based ERP system; there are few objections when taking into account the pre-established goals of the company. However, in considering the results that came off the newly implemented system, there were some methods and processes that could have been considered for a better turn out. In fact, Texas Instruments experienced issues of delivery and lower productivity immediately after product launch within their enterprise. As reported in the study, it appears that the 13,000 thousand users of the ERP system were not properly trained on the new system prior to its implementation. The previous reasoning would explain in part the apparent low productivity pattern which occurred during the "go live" phase of the ERP system. The report

Wednesday, November 20, 2019

Comparative Corporate Governance Assignment Example | Topics and Well Written Essays - 4000 words

Comparative Corporate Governance - Assignment Example Either way, the only time that accountability comes into play is when there is a crisis. In this way, managerial accountability issues are the same across jurisdictions. I. Corporate Governance in the United States Corporate governance and governance arrangements vary widely from country to country, and to illustrate this an in-depth examination will focus upon the UK and the United States. The first thing to understand about the United States’ corporate governance is that it evolved after the Enron and WorldCom scandals of the early 1990s to early 2000s. In order to understand why corporate governance in the UK and the United States evolved, one must under the precipitating factors in their evolutions, and that was the Enron and WorldCom scandals in the late 1990s-early 2000s. Corporate governance was different for the United States in the 1980s, because, during this period, hostile takeovers changed the way that corporations did business. 1 Leveraged buyouts were costly mane uvers, which made managers sensitive to the market price of their firm. This, in turn, led to great risks in inflating the stock prices. This was coupled with widespread deregulation and the rise of CEO pay.2 Since CEO pay was tied to the company’s performance, the CEO had reason to inflate the corporate numbers, because this, in turn, would inflate the salary of the CEO. The tie from the company’s performance to the CEO was further reason for the CEO to obsess about the day to day price of the firm. What this means was that, since the CEO pay was tied to the performance of the company, there was further reason for the CEO to inflate numbers, because it would also inflate his or her salary. Because of this tie from the performance of the company to the CEO pay, the CEO was given further reason to obsess over the day to day price of the firm. Moreover, there was a failure of accounting in catching the Enron and WorldCom debacles.3 Arthur Andersen, the accounting firm be hind the Enron scandal, went from being one of the most well-respected professional firms in the world to a shamed company that was not only responsible for the Enron scandal, but securities frauds in Waste Management, Sunbeam, HBOCMcKesson, The Baptist Foundation and Global Crossing as well.4 While the U.S. has also traditionally believed in the power of the free market,5 in the wake of the scandals, the U.S. implemented a series of rules, as codified in the Code of Federal Regulations, by which corporations must abide. Some of these rules involve transparency in the disclosure of executive compensation.6 According to the SEC, all corporations must disclose any remuneration made to the CEO, CFO and the three most highly paid officers.7 The rules apply to the following disclosures: â€Å"(1) tabular disclosures regarding executive remuneration and director remuneration;(2) narrative description of other types of remuneration and any information material to an understanding of the t abular information, and (3) a Compensation Discussion and Analysis (â€Å"CD&A†)†8 . The way that all companies must disclose this information is through their annual proxy statement, which the SEC's website makes available on-line.9 Additionally, there are other regulations that are designed to increase transparency about executive and director compensation. For instance, there are regulations that require disclosure regarding â€Å"(i) beneficial ownership of public company securities by persons owning 5% or more of

Monday, November 18, 2019

Divorce in united arab emirates Essay Example | Topics and Well Written Essays - 500 words

Divorce in united arab emirates - Essay Example Later, the councillor meets both parties to discuss their standoff (Sawma, 2012). After consultation with the councillor, they are given three-month time for them to go and try and solve their difference before they can begin the process of divorce. In case the couple insist on divorce, the divorce papers are forwarded to the court. This provides a good opportunity for the judge to study the case an aspect that is followed by the judges discussing the case and listening to all witnesses. Depending with the depth of the cases, it might take some few sessions before the judge can come into the conclusion of the case. Both parties are expected to attend all court proceedings (Momsen, 2009). In United Arab Emirates, a woman can be granted a divorce if she proves that she is physically hurt or tortured by her husband. In addition, she can sue her husband for divorce if she is abandoned by him for a period of not less than three months i.e. if he has not been providing for her and the children. Also, the law allows a woman to get a khula if she returns back the entire dowry to the husband (Goldschmidt, Puller & Darraj, 2008). In case the applicants of the divorce are both Muslims who emanates from different countries but are residents of United Arab Emirates, they can be divorced using the administrative laws in the country of residence or even United Arab Emirates laws. In case both parties are non-Muslim who are seeking a divorce, they can be granted a divorce according to the law of their country either at the embassy or even consulate. Another unique aspect of divorce in United Arab Emirates is the fact that a husband can divorce his wife by using a short message (SMS) or through the cell phone. United Arab Emirates, Kuwait and even Malaysia have allowed use of technology in terminating the marriage. Other technological method that is allowed in Sharia courts is use of email. This has been upheld as a result of

Friday, November 15, 2019

Occupational Hazards among Sanitary Staff in Hospital

Occupational Hazards among Sanitary Staff in Hospital Occupational Hazards among Sanitary Staff Working at Tertiary Care Hospitals of Karachi Abstract Improper waste management increases the risk of occupational hazard among staff working in hospital. The aim of this cross-sectional study was to identify awareness and practices associated with occupational hazards among the sanitary staff working at tertiary care hospitals. The study was conducted at 2 government hospitals in Karachi, from October 2012 to January 2013. An anonymous, self-descriptive questionnaire was used to collect data. Among 106 participants, only 39% (n=41) received training on managing hazardous waste. Moreover, only 51% (n=54) were able to differentiate between hazardous and non-hazardous waste. Around, 69% (n=73) respondents had provision of Personal Protective Equipment (PPE) whereas; only 36% (n=38) were compliant with it. Two third of the participants reported that they have encountered injury from hospital waste. Fisher’s Exact Test revealed that use of PPE is associated with education, experience, training and awareness. The study revealed great need of awareness about health hazards among sanitary staff working at hospitals along with provision of facilities. Keywords: Occupational Hazards, Personal Protective Equipment, Waste Management, Sanitary Staff. Hospital waste serves to be the most hazardous waste material which can lead to life threatening infectious diseases. Poor and improper handling of waste increases the risk of exposure to pathogenic organisms.1 Waste material generated from hospitals are considered as hazardous hence, it needs to be treated cautiously.2 In developing countries, there is scarce awareness and knowledge about proper management of hospital waste.3 All staff working at hospital is prone to acquire infections. However, sanitary staffs are at greater risk.4 A number of diseases can be transmitted via contact with hazardous hospital waste including Acquired Immunodeficiency Syndrome (AIDS), hepatitis B, and hepatitis C.5 Therefore, training of sanitary staff working at healthcare facilities is essential.4 All healthcare facilities needs to prepare their own policies to ensure proper management of hospital waste and provision of staff safety.6 Appropriate management of hospital waste is based upon hospital administration, policies, finance, staff training, and active participation of staff.7 The staff responsible for handling hospital waste needs to be provided with all essential PPE.8 This study focuses on awareness of occupational hazards among sanitary staff working at government hospitals in Karachi. The study was conducted at two tertiary care government hospitals of Karachi from October 2012 till January 2013. It was a cross sectional survey conducted on 106 participants that had given consent and who had minimum of 3 months of experience. The survey was conducted through a structured questionnaire and data was analyzed through SPSS. Among 106 participants 71% (n=75) were male and 29% (n=31) were females. Mean age of participants was 40.23 (+ 9.5 SD). As displayed in Table 1, among all participants 62% had work experience of more than 5 years. Majority (n=36, 34%) of the participants had received secondary education. Participants who had done intermediate (n=23, 22%) were working as shift supervisors. Job responsibility of participants included dusting and cleaning wards (n=41, 39%), collection of hospital waste (n=32, 30%), segregation of hospital waste (n=18, 17%), and disposal of waste material (n=15, 14%). Table 1 Demographic Profile of Study Participants 15 25 32 34 24 23 36 23 41 32 18 15 14 24 30 32 23 22 34 22 39 30 17 14 During job tenure, only 41 (39%) staff received formal training on handling hospital waste and preventing health hazards by following standard precautions. However, 54 (51%) of the respondents were aware about hazardous and non-hazardous waste products. Among all participants, only 19 (18%) underwent medical inspection and 67 (63%) of them received Hepatitis-B vaccination. However, among recipients of Hepatitis-B vaccine, only 37 (35%) received complete vaccination i.e. all 3 doses of Hepatitis-B. On inquiring about availability of PPE, 73 (69%) responded that PPE are provided by hospital whereas, only 38 (36%) of the respondents were using PPE. Among all participants, 87 (82%) were compliant with hand washing. With regard to separate collection of hazardous waste from non-hazardous waste, 47 (44%) of the respondents said that they collect waste separately. However, only 21 (20%) of the participants reported that they carry hazardous and non-hazardous waste separately. Majority (n=88, 83%) were using open containers for carrying waste material. Around 69 (65%) of the participants responded that they have encountered injury from hospital waste. Among them, 2 (2%) encountered needle stick injury, 30 (28%) experienced sharp injuries, 24 (23%) came in contact with blood and body fluids, and 14 (13%) got other types of injury. Only 18 (17%) of the participants didn’t experienced any illness, however 21 (20%) experienced gastrointestinal tract problems, 28 (27%) suffered from respiratory disorders, 14 (13%) got eye infections, 11 (10%) came in contact with skin diseases, and 14 (13%) encountered blood borne diseases. With regard to compliance of using standard precaution 34 (32%) of the participants always use gloves, only 7.5% of the participants always use apron, and 31 (29%) always use masks. The Fisher’s Exact test revealed a significant association between experience and use of PPE (P=0.027). Similarly, highly significant association has been identified between training and compliance with use of PPE (PPPP=0.078), was found to be insignificant (see Table 2). Table 2 Association between Compliance with Use of PPE and Demographic Characteristics * Significant ** Fisher’s Exact Test applied due to low cell count Generation of waste at hospitals demands for it proper disposal to avoid hazardous consequences associated with it. It is the prime responsibility of hospital to maintain clean and healthy environment to reduce infections associated with hospital wastes.6 Therefore, it is essential to provide appropriate training to ensure staff safety.9 In current study, less than half of the respondents received training and around half of the respondents displayed awareness about hazardous waste material. The study also displayed an association between training as well as awareness about hazardous waste with compliance to PPE use. Similarly, available evidences in the field also suggests that training of staff along with regular follow-ups can foster compliance with appropriate waste management practices.10 Available literature also suggests that for appropriate management of hospital waste and safety of hospital staff, continuous training programs needs to be organized.8 Current study revealed that only 18% of the sanitary staff went through medical inspection and around 35% of the staff received complete doses of hepatitis B vaccination. In contrast, previous study on sanitary staff working in tertiary care hospital of Rawalpindi reported that none of the sanitary staff went through medical checkup or received any vaccination before or during job tenure.4 The findings of current study revealed that availability of PPE was inadequate. However, it is essential to provide continuous supply of PPE and to bring change in attitude of staff towards use of PPE. The efforts of providing training, creating awareness, and providing personal protective equipment will not be of worth if staff will not comply with the appropriate waste handling and management strategies. Our study also demonstrated that only one third of the respondents were using available PPE. However, non-compliance with appropriate management of hospital waste makes sanitary staff prone to infections.10 Hence, efforts need to be made for providing training and creating awareness among sanitary staff for handling hazardous hospital waste. Moreover, organization should develop relevant policies and protocols to ensure appropriate handling and disposal of hospital waste. Organizations should also take initiatives for conducting medical inspection and vaccinating all hospital staff including sanitary staff. Availability of PPE should be adequate and staff needs to be encouraged to use PPE. Evidence based interventional research can be conducted to ensure appropriate handling of hazardous hospital waste for preventing sanitary staff from infectious diseases. References Hossain MS, Santhanam A, Nik Norulaini NA, Omar AK. Clinical solid waste management practices and its impact on human health and environment-A review. Waste Manag 2011; 31:754–6. Ross DE. Safeguarding public health, the core reason for solid waste management. Waste Manag Res 2011; 29:779–80. Janjua NZ, Khan MI, Mahmood B. Sharp injuries and their determinants among health care workers at first-level care facilities in Sindh Province, Pakistan. Trop Med Int Health 2010; 15:1244–51. Ahmed I, Farooq U, Rabia M, Naheed A, Maryum A, Asia A. Awareness among sanitary workers regarding their job: A survey at tertiary care hospital. Medical Forum Monthly: A Journal for all Specialties. Retrieved from http://www.medforum.pk/index.php?option=com_contentview=articleid=467:awareness-among-sanitary-workers-regarding-their-job-a-survey-at-tertiary-care-hospital. Hayashi Y. Proper disposal of medical wastes infection prevention and waste management at Hiroshima city, Asa Hospital. Rinsho Byori, 2000 (Suppl 112):26-31. Hashmi SK, Shahab S. Hospital and biomedical waste management. In: Iliyas M, Editor, Community medicine and public health. 4th ed. Karachi: Time Publishers, 2003, pp. 426-37. Yadav M. Hospital waste-A Major Problem. Hospital Today 2011; 8: 276-282. Pandit NB, Mehta HK, Kartha GP, Choudhary SK. Management of biomedical waste: Awareness and practices in a district of Gujarat. Indian J Public Health 2005; 49:245-7. Al-Khatib IA, Al-Qaroot YS, Ali-Shtayeh MS. Management of healthcare waste in circumstances of limited resources: a case study in the hospitals of Nablus city, Palestine. Waste Manag Res 2009; 27:305–12. Ikram A, Hussain Shah SI, Naseem S, Absar SF, Ullah S, Ambreen T, et al. Status of hospital infection control measures at seven major tertiary care hospitals of northern punjab. J Coll Physicians Surg Pak 2010; 20:266–70.

Wednesday, November 13, 2019

The Awakening Essay -- Kate Chopin essays research papers

The Awakening is a story full of symbolism and imagery that can have many different meanings to the many who have read it. I have read several different theories on Kate Chopin’s meaning and though some are vastly different, they all seem to make sense. It has been said that Kate Chopin might have been ambiguous just for this reason. At some point, almost everyone struggles with knowing or not knowing their purpose in life, and therefore it seems, that on some level, most who read the story about Edna Pontellier can relate to her in some way. I believe that those who have theorized about this story, have done so based upon their own struggles with the same issue. To me, life is all about self discovery and what one does upon their self discovery. Each time that I read this story, I can feel the pain and the turmoil that Edna experiences before and after her awakening.   Ã‚  Ã‚  Ã‚  Ã‚  The ocean is the center and foundation of this story. The ocean is also part of the scenery and the background, without the ocean, there would be no story. Not only is the ocean the center and the foundation, it is also a symbol of many things in this story. To me, the ocean in this story takes on human characteristics in that to me, it symbolizes a seducer or seductress. The ocean also becomes an escape from reality and symbolizes life itself. The ocean is important because it is what helps bring Edna into her awakening and that is good, in the sense that it helps Edna into finding herself. However, the ocean is evil in that it is responsible for Edna’s demise.   Ã‚  Ã‚  Ã‚  Ã‚  I believe that in the beginning of this story, Edna has not yet discovered who she is or what she really wants out of life. Edna has come to the Grand Isle as a dutiful wife and mother who grew up in an oppressive, unloving and un-nurturing home without her mother. Edna’s marriage is not a loving one, neither she, nor her husband have an emotional connection to each other. Edna goes about her life as a mother and wife in a mechanical fashion, she doesn’t have the mind for it and it’s obvious that her current position where she wants to be although at first she doesn’t see it yet. Edna most likely has never experienced any sort of love or connection with anyone. She doesn’t seem to think very highly about her husband, father, or sisters. Her love for her children is flighty at best. It’s as if she’s been locked in a cage m... ...is tragic to me that Edna had to choose suicide however, I don’t see Edna as a failure for what she did. I think that Edna was a woman who was ahead of her time, just as some have said Kate Chopin was ahead of hers. The ocean in this story also symbolized life for Edna. Tragically, Edna was not ever afforded the tools necessary to deal with her awakening. Edna was love starved due to her upbringing and her marriage, which made it impossible for her to live life as a lonely nonconformist as Madame Reisz had done. Edna was also born into a society where women were not aloud to be anything but mothers and wives, which are positions that Edna was intended for. At first, Edna feared the ocean and life as an individual, then she is awakened sexually, spiritually, creatively, and emotionally and throws herself into her discoveries, and she learns to swim in the ocean and the void in her life seems to be filled. However, Edna sees terror and death while swimming and begins to feel the terrors of isolation as she casts off her facade. Edna begins to struggle and fight life’s currents, getting caught within the tumult, she becomes exhausted with it all until she can no longer stay afloat.

Sunday, November 10, 2019

Attachment, Loss and Bereavement

This essay describes and evaluates the contributions of Bowlby, Ainsworth, Murray-Parkes, Kubler-Ross and Worden, as well as later theorists, to their respective fields. I demonstrate how I already work with some of these models, highlighting my strengths and areas for development. I emphasise some influences on Bowlby’s work, leading to his trilogy Attachment 1969; Separation 1973; and Loss, Sadness and Depression 1980; demonstrating how attachments in infancy may shape our attachment styles in later life.Pietromonaco and Barrett posit â€Å"A central tenet of attachment theory is that people develop mental representations, or internal working models that consist of expectations about the self, significant others and the relationship between the two. † (Pietromonaco and Barrett, 2000, 4:2, p156). I illustrate how this internal working model is developed via the relationship between infant and primary caregiver, demonstrating that maternal deprivation can create a †˜faulty’ internal working model, which may lead to psychopathology in later life.I also demonstrate how these internal working models influence our reactions to loss and bereavement in adulthood and their potential impact on the counselling relationship. In addition, I explore the multi-layered losses experienced by HIV+ gay men and finally draw some conclusions. Freud’s view on the infant’s attachment to its mother was quite simple â€Å"the reason why the infant in arms wants to perceive the presence of its mother is only because it already knows by experience that she satisfies all its needs without delay.† (Freud, 1924, p188 cited in Eysenck, 2005, p103).In contrast, behaviourists believed that feeding played a central role in the development of attachment. (Pendry, 1998; Eysenck, 2005). These theories were termed ‘secondary-drive theories’. In 1980, Bowlby recalled â€Å"this [secondary drive] theory did not seem to me to fit the facts †¦. but, if the secondary dependency was inadequate, what was the alternative? † (Bowlby,1980, p650 cited in Cassidy and Shaver, 1999, p3).Bowlby’s theory was influenced by his paper â€Å"Forty Four Juvenile Thieves†, where he concluded a correlation exists between maternal deprivation in infancy, leading to affectionless psychopathology and subsequent criminal behaviour in adolescents. (Bowlby, 1944, 25, p19-52). This led to him researching the impact of loss on children displaced through war and institutionalisation, resulting in ‘Maternal Care and Mental Health’ (1952), where he confirms a link between ‘environmental trauma’ and resultant disturbances in child development.As a result of this research, Bowlby concluded â€Å"it is psychological deprivation rather than the economic, nutritional or medical deprivation that is the cause of troubled children. † (Bowlby in Coates, 2004, 52, p577). He was further influenced by L orenz who found that goslings would follow and ‘attach’ themselves to the first moving object they saw. This following of the first moving object was called ‘imprinting’. (Lorenz, 1937 cited in Kaplan, 1998, p124).Clearly babies cannot follow at will – to compensate for this, †Bowlby noted that ‘imprinting’ manifested itself as a spectacularly more complex phenomenon in primates, including man, which he later labelled ‘attachment’. † (Hoover, 2004, 11:1, p58-60). He also embraced the work of Harlow and Zimmerman who worked with infant rhesus monkeys demonstrating that not only did the need for attachment give them security, but that this need took priority over their need for food. (Harlow and Zimmerman 1959 cited in Green and Scholes, 2003, p9).Dissatisfied with traditional theories, Bowlby embraced new understandings through discussion with colleagues from such fields as developmental psychology, ethology, cont rol systems theory and cognitive science, leading him to formulate his theory that the mechanisms underlying the infant’s tie to the mother originally emerged as a result of evolutionary and biological pressures. (Cassidy and Shaver, 1999; Green and Scholes, 2003).Defining his attachment theory as â€Å"a way of conceptualising the propensity of human beings to make strong affectional bonds to particular others.† (Bowlby, 1979 cited in Green and Scholes, 2003, p7), he posited â€Å"that it is our affectional bonds to attachment figures that engage us in our most intense emotions. † and that â€Å"this occurs during their formation (we call that ‘falling in love), in their maintenance (which we describe as ‘loving) and in their loss (which we know as ‘grieving’), (Green and Scholes, 2003, p8), thereby replacing the secondary-drive theory with a model emphasising the role relationships play in attachment and loss. (Waters, Crowell, Elliot t et all, 2002, 4, p230-242).Disregarding what he called Freud's ‘cupboard love’ theory of attachment, he believed instead that a child is born ‘biologically pre-disposed’ to become attached to its mother, claiming this bond has two essential features: the biological function of securing protection for survival and the physiological and psychological need for security. (Green and Scholes, 2003; Schaffer, 2004). Sonkin (2005) describes four features to this bond: secure base, separation protest, safe haven and proximity maintenance.The concept of a secure base is fundamental to attachment theory and is used to describe a dependable attachment to a primary caregiver. This secure base is established by providing consistent levels of safety, responsiveness and emotional comfort from within which the infant can explore his or her external and internal worlds and to which they can return, thus providing a sense of security. Separation protest is exhibited as a si gn of the distress experienced upon separation from an attachment figure, who may also be used as a safe haven to turn to for comfort in times of distress.When safety is threatened, infants attract the attention of their primary caregiver through crying or screaming. Maintaining attention and interest, e. g. vocalising and smiling, and seeking or maintaining proximity, e. g. following or clinging, all serve to promote the safety provided by the secure base (providing of course that parents respond appropriately). (Holmes, 1993; Cassidy and Shaver 1999; Becket, 2002; Green and Scholes, 2003).Proximity seeking is a two way process, for example child seeking parent or parent seeking child. (Weiss in Murray-Parkes, Stevenson-Hinde and Marris, 1991; Becket, 2004; Sonkin, 2007). Bowlby also recognised ‘unwilling’ separation caused by parents who were phsycially present but not able to respond, or who deprived infants of love or ill-treated them, left them with a sense of imme nse deprivation and that this unwilling separation and resultant loss leads to deep emotional distress. (Green and Scholes, 2003).At a recent conference, the Centre for Attachment based Psychoanalytical Psychotherapy (CAPP) asserts â€Å"Early interactions with significant others in which there are fundamental failures of empathy, attunement, recognition and regulation of emotional states, have been shown to cause the global breakdown of any coherent attachment strategy, thus engendering fears of disintegration and threatening psychic survival. In the face of such experiences, powerful dissociative defences may be employed, encapsulating overwhelming feelings of fear, rage and shame. † (CAPP, 2007).Together with Robertson and Rosenbluth, Bowlby demonstrated that even brief separation from the mother has profound emotional effects on the infant. Their research highlighted a three stage behavioural response to this separation: protest – related to separation anxiety; des pair – related to grief and mourning; and detachment – related to defences. (Robertson, Rosenbluth, Bowlby, 1952 in Murray-Parkes, Stevenson-Hinde and Marris, 1991). Ainsworth, Blehar, Waters and Wall (1978) later established the inter-relatedness between attachment behaviour, maternal sensitivity and exploration in the child.Under clinical settings, they sought to observe the effects of temporary separation from the mother, which was assessed via the ‘strange situation’ procedure. This study involved children between the ages of 12 to 18 months who experienced separation from their mother, introduction to an unfamiliar adult and finally reunion with their mother. Ainsworth et al reasoned that if attachment was strong, mother would be used as a secure base from which the infant could explore, thereby promoting self-reliance and autonomy. Upon separation, infants usually demonstrated separation anxiety.Upon re-union, the mother’s maternal sensitivity and the child’s responses were observed, thus providing a link between Bowlby’s theory and its application to individual experience. The trust/mistrust in the infant’s ability to explore their world from the secure base is re-inforced by Erikson’s (1965) examination of early development and the child’s experiencing of the world as a place that is nurturing, reliable and trustworthy (or not). Influenced by Ainsworth’s previous work in Uganda, the ‘strange situation’ led to the classification of secure or insecure attachment styles in infants.Insecure styles were further grouped into insecure/avoidant and insecure/resistant (ambivalent). (Pendry, 1998; Holmes, 2001; Eysenck, 2005). Main and Solomon later added a fourth attachment style – insecure/disorganised. (Main and Solomon, 1986 in Cassidy and Shaver, 1999, p290). Throughout all of these interactions, an ‘internal working model’ is developed, the cultivat ion of which relies on the dyadic patterns of relating between primary caregiver and infant (Bretherton, 1992, 28, p759-775), comprising the complex monitoring of internal states of primary caregiver and infant.  (Waters, Crowell, Elliott et al, 2002, 4, p230-242).According to Schore â€Å"These formative experiences are embedded in the developing attachment relationship – nature and nurture first come together in mother-infant psychobiological interactions. † (Schore, 2001, 17, p26). Over time, this leads to the infant’s ability to self-monitor their emotions (affect regulation), but until such time, Bowlby posited the mother acts as the child’s ego and super-ego †She orients him in space and time, provides his environment, permits the satisfaction of some impulses, restricts others.She is his ego and his super-ego. † (Bowlby, 1951, p53 cited in Bretherton, 1992, 28, p765). Bowlby concluded a healthy internal working model is â€Å"a worki ng model of an attachment figure who is conceived as accessible, trustworthy and ready to help when called upon†, whilst a ‘faulty’ model is â€Å"a working model of an attachment figure to whom are attributed such characteristics as uncertain accessibility, unwilllingness to respond helpfully, or perhaps the likelihood of responding hostilely. † (Bowlby, 1979, p141).Ainsworth suggests that positive attachment is more than explicit behaviour â€Å"it is built into the nervous system, in the course and as a result of the infant’s experience of his transactions with the mother. † (Ainsworth, 1967, p429), thus supporting Bowlby’s theory. Later descriptions of attachment styles describe secure attachment as â€Å"the development of the basic machinery to self-regulate affects later in life†, (Fonagy, Gergely and Jurist, 2002 cited in Sarkar and Adshead, 2006, 12, p297), whilst insecure attachment â€Å"prevents the development of a proper affect regulatory capacity.† (Sarkar and Adshead, 2006, 12, p297).This is supported by Schore (2003) who alludes to developmental affective neuroscience to set out a framework for affect regulation and dysregulation. Based on research into the development of the infant brain, he reviews neuro-scientific evidence to confirm the infant’s relationship with the primary caregiver has a direct effect on the development of brain structures and pathways involved in both affect regulation and dysregulation.The research and evidence suggests the internal working model begins as soon as the child is born and is the model upon which future relationships are formed. The quality of the primary caregiver’s response to infant distress provides the foundation upon which behavioural and cognitive strategies are developed, which in the longer term influence thoughts, feelings and behaviours in adult relationships. (Cardwell, Wadeley and Murphy, 2000; Pietromonaco and Barrett , 2000, 4:2, p155; Madigan, Moran and Pederson, 2006, 42:2, p293).A healthy, secure attachment to the primary caregiver would therefore appear essential for a child’s social, emotional and intellectual development, whilst interruption to this attachment would appear to promote the premise of psychopathology in later life. Whilst some evidence exists to demonstrate internal working models can be modified by different environmental experiences, (Riggs, Vosvick and Stallings, 2007, 12:6, p922-936), the extent to which they can change remains in question.Bowlby himself postulated â€Å"clinical evidence suggests that the necessary revisions of the model are not always easy to achieve. Usually they are completed but only slowly, often they are done imperfectly, and sometimes done not at all. † (Bowlby, 1969, p83). Whilst change may be possible, the unconscious aspects of internal working models are deemed to be specifically resistant to such change. (Prior and Glaser, 2006) . We can safely assume therefore, that in the majority of cases, internal working models tend to persist for life.I concur with Rutter’s criticism of Bowlby's concept of ‘monotropy’, i.e. Bowlby’s belief that babies develop one primary attachment, usually the mother, (Rutter, 1981 cited in Lucas, 2007, 13, p156 and in Eysenck 2005), accepting instead that infants form multiple attachments. This is supported by a study by Shaffer and Emmerson (1964) who concluded infants form a ‘hierarchy’ of attachments, often with the mother as the primary attachment figure, although nearly a third of children observed highlighted the father as the primary attachment figure. (Schaffer and Emmerson, 1964 in Cassidy and Shaver, 1999, p44-67).Collins, Dunlop and Chrysler criticise Bowlby’s ‘lens’ in that it was â€Å"limited by his own cultural, historical and class position. Bowlby’s culturally biased assumptions and empiricist metho ds of inquiry concentrated on individualised detachment and loss as part of the normal course of mourning loss, which perpetuated the Western tradition of preserving the autonomous individual self as the normal goal of development. † (Collins, Dunlop and Chrysler, 2002, p98), leading them to conclude Bowlby’s assumptions ignored other cultural practices (as did Ainsworths), with which I agree.They also suggest Bowlby’s concept of maternal deprivation was perhaps exploited to get women to return to the home post World War II – â€Å"Characterised as a choice, this ‘homeward bound’ movement was supported by the various governments, whose maternalist and pronatalist ideology of the 1930s continued into the post-war period to provide a rationale for sending women home to reproduce †¦ maternalism and the maternal deprivation hypothesis provided one conceptual framework for pronatal ideology as it intersected  with the demands of governments and industrialists. † (Collins, Dunlap and Chrysler, 2002, p102).We must also remember that Bowlby’s observations â€Å"were based on children who had been separated from their primary caregivers during the Second World War† (Lemma, 2003 cited in Lucas, 2007, 13, p156), and that these procedures â€Å"were based on behaviours that occurred during stressful situations rather than under normal circumstances. † (Lucas, 2007, 13, p156) [this latter criticism also applies to Ainsworth’s work].Nonetheless, in highlighting the damaging effects of institutionalised care on young children, Bowlby’s strengths lie in drawing attention to the role attachment, attachment behaviour and attachment behavioural systems play in a child’s development and the subsequent potential consequences of disruption to the bond between infant and primary caregiver. I concur with Cassidy and Shaver’s (1999) criticisms of the strange situation in that there a re too many unconsidered variables for a firm theory to be established at the time of Ainsworth’s writings, accepting their view that she did not consider the mood nor temperament of the child.Nonetheless, Ainsworth et al have provided a tool with which to measure attachment styles in infants, which is still in use today. Later research by George, Kaplan and Main assesses adult internal models through the use of the Adult Attachment Interview. This classification of adult attachment styles promotes the idea of models extending into adulthood as a template for future relationships. (George, Kaplan and Main 1985 cited in Pendry, 1998).Hazan and Shaver continued this line of research identifying patterns of attachment behavior in adult romantic relationships, concluding the same four attachment styles identified in infancy remain true for adult relationships. (Hazan and Shaver 1987 in Cassidy and Shaver, 1999, p355-377). Although theoretically rooted in the same innate system, a dult romantic attachment styles differ from parent-child bonds to include reciprocity of attachment and caregiving, as well as sexual mating.  (Hazan and Zeifman, 1999 in Cassidy and Shaver, 1999, p336-354).The literature on bereavement has become inseparable from Bowlby’s theory of attachment and, following from this, the way in which people react to the loss of this attachment. On reflecting on losses in adult life, Weinstein (2008) observes Bowlby’s persistence of formative attachments and how the pattern of protest, despair and detachment that follows a baby’s separation from its primary caregiver is re-activated and presented in full force in adult loss.Weinstein writes â€Å"The ability of the adult to cope with attachment in intimate relationships to negotiate independence, dependency and inter-dependency; and to manage loss is all about how successfully they coped with separation as an infant. As a baby they had to retain their sense of their mother e ven in her absence and now as adults, as part of the mourning process, they strengthen their own identity with the support of the internalised object. † (Weinstein, 2008, p34).According to Murray-Parkes (1996), the intensity and duration of this grief is relative to what is lost and the grief process is an emotional response to this loss. Murray-Parkes joined Bowlby at the Tavistock Centre in 1962. Together they presented a paper linking the protests of separation highlighted by Robertson, Rosenbluth and Bowlby (1952) in young children separated from their mothers, to grief in adults. (Bowlby and Murray-Parkes, 1970 in Murray-Parkes, Stevenson-Hinde and Marris, 1991, p20).Around the same time, Murray-Parkes visited Kubler-Ross who was conducting her own research into death and dying. This work was later published in ‘On Death and Dying’ (1969) which examines the process of coming to terms with terminal illness or grief in five stages: denial; anger; bargaining; de pression and acceptance. Murray-Parkes later produced a four-phase grief model consisting: shock or numbness; yearning and pining; disorganisation and despair; and re-organisation.In contrast to the passive staged/phased approaches by Kubler-Ross and Murray-Parkes, and perhaps more in line with Freud’s concept of having ‘to do grief work’, Worden developed a four-staged, task-based grief model: â€Å"to accept the reality of the loss; to work through the pain of grief; to adjust to an environment in which the deceased is missing; and to emotionally relocate the deceased and move on with life. † (Worden, 2003). All three models are deemed to be therapeutically useful in that they recognise grief as a process and provide a framework of descriptors for ‘normalising’ grief reactions.That said, they are clearly prescriptive and caution should be exercised in taking any of these prescriptive stages, phases or tasks literally. It is equally important to recognise the uniqueness of individual responses to loss and to avoid prescribing where a client ‘ought’ to be in their grieving process. Since these models were never designed as a linear process, it is likewise important not to steer clients through these stages. This is supported by Schuchter and Zisook (1993), who assert â€Å"Grief is not a linear process with concrete boundaries but, rather, a composite of overlapping, fluid phases that vary from person to person.† (Schuchter and Zisook, 1993 in Stroebe, Stroebe and Hansson, 1993, p23).I agree with Servaty-Seib’s observations â€Å"the stage/phase approaches emerged solely from a death-loss focus †¦ Worden’s work was an important development in the understanding of the process of coping adaptively with bereavement as each task is clearly defined in an action-oriented manner. † (Servaty-Seib, 2004, 26:2, p125). Stroebe and Schut’s dual process model brings together death- loss focus and task-based models. (Stroebe and Schut, 2001 cited in Servaty-Seib, 2004, 26:2, p125).In my work at Positive East, I work with HIV+ gay men experiencing multi-layered loss. My philosophy is to build and maintain a therapeutic relationship within a safe, confidential, contained space where clients can explore their issues. The archetype ‘working towards a model of gay affirmative therapy’ (Davies and Neal, 1996, p24-40) provides me with a framework within which to explore gay culture and to apply an assenting approach to the work, which I believe promotes empathy and helps me to work in the best interests of the client.Conducting my own assessments, I complete a full client history, genogram and timeline, which provides a comprehensive insight into clients attachments and losses. It is important to acknowledge the social context within which multi-layered loss takes place (e. g. heterosexism, homophobia, HIV-related stigma) as well as recognising that indiv idual attachment styles may influence individual reactions to these losses and may also impact on the counselling relationship.Losses experienced by HIV+ gay men include loss of identity, health, appearance, mobility, self-respect, career, financial security, relationships and intimacy. (Riggs, Vosvick and Stallings, 2007, 12:6, p922-936; Koopman, Gore-Felton, Marouf et al, 2000, 12:5, p663-672; Fernandez and Ruiz, 2006, p356). Corr, Nabe and Corr (1997) describe these losses as the cognitive, affective and behavioural responses to the impact of the loss. In identifying attachment styles in HIV+ adults, Riggs, Vosvick and Stallings (2007) found that 90% of gay and bisexual HIV+ adults recruited into their study demonstrated insecure attachment.They suggest the diagnosis of HIV produces a strong trauma reaction, impacting on adult attachment style. In the same study, they found that HIV+ heterosexual adults were more likely to be secure, whereas gay and bisexual adults were more like ly to be fearful, preoccupied, avoidant; or dismissing, respectively. This led them to conclude that gay and bisexual people must therefore contend with societal forces that their heterosexual counterparts do not.They hypothesise â€Å"A diagnosis of HIV may be reminiscent of the coming out process, particularly with respect to concerns regarding stigma and disclosure, and thus may provoke similar fears about rejection by loved ones and society as a whole that contribute to greater attachment insecurity. † (Riggs, Vosvick and Stallings, 2007, 12:6, p931). This is supported by Koopman, Gore-Felton, Marouf et al (2000) who cite attachment style as a contributing factor associated with the high levels of stress experienced by HIV+ individuals.They comment â€Å"From this perspective, perceived stress is likely to be greater among [HIV+] persons having a highly anxious attachment style because their hypervigilance in interpersonal relationships leads to misinterpreting othersâ⠂¬â„¢ behaviours as rejecting or critical of themselves. † (Koopman, Gore-Felton, Marouf et al, 2000, 12:5, p670). This would suggest that HIV+ gay men with insecure attachment style may experience difficulties in developing and maintaining relationships, which, in turn, may impact on the therapeutic relationship.Additionally, according to Kelly, Murphy, Bahr et al â€Å"Dependable and supportive attachments play a crucial role in adjusting to HIV infection. Lack of such attachments and social support has been shown to be a significant predictor of emotional stress among HIV+ adults. † (Kelly, Murphy, Bahr et al, 1993, 12:3, p215-219). This has significant implications for the psychological well being of HIV+ gay men whom, considering their perceived attachment difficulties, may experience difficulties in forming such supportive relationships.In examining the suitability of the common grief models when working with this client group, I accept Copp’s criticism of the Kubler-Ross model for its focus on psychosocial dynamics â€Å"to the exclusion of physical, and to a lesser extent, spiritual dimensions. † (Copp, 1998, 28:2, p383). I also agree with Knapp’s criticisms of the staged/phased grief models espoused by Kubler-Ross and Murray-Parkes. Knapp observes â€Å"while both of these models may be applicable to those experiencing a singular loss, neither model takes into  consideration the multiplicity of losses thrust upon the seropositive gay male population.These men experience overlapping losses, resulting in them being at differing stages with respect to different losses. † (Knapp, 2000, 6:2, p143). Knapp offers a similar criticism of the Worden model in that â€Å"task models fail to account for the continuity of loss in the lives of seropositive gay men. † (Knapp, 2000, 6:2, p143), with which I also concur. In addition, all three models incorporate an end point, which suggests the completion of a cycle, th ereby pre-supposing some sort of finality.These models are therefore limited in their application to my own work, since, as new losses take the place of old, my clients find themselves in a continual cycle of loss without the comfort of such an end point. Processing the loss of the ‘pre-infected self’ and re-defining the ‘HIV+ self’ often means working with the stage of identity vs role confusion in Erikson’s (1965) psychosocial model. Additionally, where partners stay together, a revisiting and re-negotiation of the adult stage of intimacy may be required since intimacy is often disrupted and sometimes lost due to HIV infection.This stage is also revisited by clients where a partner chooses to end the relationship with a HIV+ partner. Working through the loss of the partner (usually due to fear of infection); as well as other significant relationships (usually due to HIV related stigma); is also key to the work. To support this work, I use the †™multi-dimensional’ grief model by Schuchter and Zisook (1993), adopting four of their five dimensions: emotional and cognitive responses; emotional pain; changes in relationships and changes in identity.  (Schuchter and Zisook, 1993 in Stroebe, Stroebe and Hansson, 1993, p26-43).I have also used Worden’s grief model in supporting a HIV+ client whose HIV infected partner committed suicide. This work is clearly demanding and is informed by the client’s internal working model of self and other. Due to perceived stigma and fear of rejection, it is not unusual for the client’s attachment behavioural system to be activated throughout the therapeutic relationship. Recent research highlights the mirroring of Bowlby’s theory within such a relationship.Parish and Eagle (2003) and Sonkin (2005) draw attention to the manifestation of clients seeking proximity maintenance to the therapist; experiencing distress when the therapist is not available; seeking a safe haven when in distress; and using the therapist as a secure base. To cater for this, I strive to provide a secure base in therapy, ensuring I remain boundaried, punctual and professional, informing clients of any breaks and provide opportunities for clients to explore their anxieties. Clients in particular distress may also contact the agency, who in turn may contact me.My experience has taught me that clients with avoidant attachment styles take time to build trust in the therapeutic relationship. I have also found the avoidant attached usually need permission/re-assurance to grieve their losses, whilst the anxiously attached require permission/re-assurance to stop grieving their losses. I am cognisant that the therapeutic relationship promotes attachment yet at the same time acknowledge the paradox in severing this attachment at the end of therapy. Ending sensitively is therefore crucial. I recognise that clients may develop co-morbid conditions such as alcohol and recreati onal drug abuse.In line with the BACP ethical principles of beneficence, non-maleficence and self-respect (BACP Ethical Framework, 2007), I use supervision to monitor any emerging signs of such abuse, where a decision may be reached to refer these clients to external agencies or other, suitably experienced, internal counsellors. In assessing my strengths and areas for development, I am now much more aware of how early attachment experiences and internal working models impact on how clients process their losses as well as their potential impact on the counselling relationship and process.I have extensive experience of working with loss and bereavement, which is underpinned by my specialist training and practice at Positive East, as a bereavement counsellor with the Bereavement Service and as a counsellor providing support to those bereaved through homicide at Victim Support. I believe a healthy, secure attachment to a primary caregiver is necessary for a child’s social, emotio nal and intellectual development. In turn this promotes the development of a healthy internal working model, disruption to which may lead to psychopathology in later life.Whilst the internal working model tends to persist through the life course, I believe it can be modified by divergent experiences, but acknowledge this change may be difficult. Whilst I have extensive experience of working with loss, I now appreciate how early formative attachments influence our reactions to such loss and how these reactions may impact on the therapeutic relationship. Popular grief models clearly fall short in addressing the multi-layered losses experienced by this client group, demanding instead the integration of what is currently available.The high level of insecure attachment style demonstrated in HIV+ gay men may be due in part to the unique challenges they face within the context of HIV related stigma and negative social experiences. Finally, I believe my knowledge of theory and sensitive app lication of skills has proved to be an effective strategy in working competently, sensitively and safely with this client group. Nonetheless, I recognise the need for continuous professional development and aim to attend workshops on attachment; and mental health and HIV during the summer.