Tuesday, February 18, 2020

Fruit Delight Essay Example | Topics and Well Written Essays - 1750 words

Fruit Delight - Essay Example They want to look and behave like the celebrities who have high influence on them. Hence, as described by Kelman, source attractiveness would be an important characteristic of our communication messenger (Egan 2007). Word Of Mouth marketing using the brand’s current customers would also influence the target audience as they are highly image-conscious and trust their peers more than others. Fruit Winders already has a positive image (especially with the mums) as far as health benefits are considered. Using these indirect customers to propagate the benefits of the product can be effectively used for viral marketing as was done by â€Å"Dove†. They used the real customers in their ads to spread a credible word of mouth (Dahlen, Lange and Smith 2009). Critique of current/recent campaigns to the same target audience The target audience of Fruit Delight overlaps that of Fruit winders for the 10-12 year olds. This can have both favorable and unfavorable implications. A major d isadvantage of this can be the confusion it can create in the minds of this age group. So, far this group of audience has been used to the symbols and self-association with these symbols. With the introduction of the new product which would propagate a different image association, the target audience would not know which one to adopt. There will be a symbol clash in this kind of brand extension. This will erode some customers from the Fruit Winder’s basket which may or may not fall into the Fruit Delight basket as they might get attracted towards other brands in the same product range. This is because they have already perceived this brand as one for smaller kids and they may not be able to associate with the new one as being for older kids. This is what happened with the global brand â€Å"Pierre Cardin†. The company diversified into so many product lines that people did not associate with the core line of business. The brand eventually died (Mininni 2006). Thus, we c an see that any failure of strategy implementation by inappropriate transfer and linkages of brand associations of the parent brand to the new product can lead not only to the failure of the new brand but also that of the parent brand (Juda 2007). However, a major advantage of this brand extension is that it is not moving very far away from its core brand values. This is an important factor to consider before going into a product line. Positive images and strengths of the current brand, Fruit Winders, can easily be leveraged to achieve a successful brand launching into a new segment (Juda 2007). This is one of the ways of â€Å"increasing the rate of new acceptance and purchase intention of customers† (Juda 2007). It can help in penetrating into a new segment while achieving advertising and promotion expenditure efficiencies. Thus, using viral marketing can be a very easy strategy to launch the new product using old customer base. Using the same TV commercials with extra info rmation on the new product can help in promoting the Fruit Delight through the younger siblings of the target audience. Current websites can be used to promote the product but content of the websites for this audience can be designed according to their interest. Using the same billboards and TV commercials to promote websites will help in promoting the product to a great extent. Positioning statement Positioning consists of two main factors –

Monday, February 3, 2020

Why Sortware As a Service Is Going to Dominate the Next Several Years Essay

Why Sortware As a Service Is Going to Dominate the Next Several Years - Essay Example This creates a process which is quick and efficient and allows for a two-way dissemination of information on a global basis. For businesses that have sales forces constantly updating contact information on their laptops, this is an essential point for the main office to know exactly at any given time, what the sale representatives are doing on a daily basis in regard to customers. Alternatively, a company can upload training videos and sales information to the representatives so they can stay updated with the latest outputs (Sensible Computer Help, 2008). The idea of sharing work began in the late 1990s when large businesses and corporations developed the idea of being able to communicate within a common net arrangement, allowing for documents to be accessed by those approved to open and change information within those documents. It also saved the company email system from being overloaded by employees emailing documents back and forth to different departments. Instead, documents cou ld be placed on the Intranet which was accessible only by onsite employees. Extended sales forces and contract labor had to dial in whenever updating or uploading information into the secure Intranet (Canlas & Gonzales, n.d.). This arrangement later developed into the Client Server Network, a far more efficient means of utilizing management principles within the workplace, such as allocating software programs and other functions to specific people. A diagram of one is shown below. Fig.1 (Sensible Computer Help, http://www.sensible-computer-help.com/computer-network.html) While the Client Server Network is an excellent solution for the workplace, such as being able to utilize a close-by printer, there are some problems with this arrangement. One, if someone turns off their computer, is when a shared file is no longer available to the other computers on that path. Additionally, there is an unreasonable lack of security for the network and the company’s data system (Sensible Com puter Help, 2008). In 2010, there began a new type of system which changed how business software was being used. Professor Clayton Christensen of Harvard Business School called it the â€Å"disruptive innovation.† The term refers to the advanced technology in delivery services of a product that, because of changes within technological access and subsequent pricing, alters the game face of how resources are used and the baseline revenue streams. Microsoft, Oracle and SAP were the first few major leaguers in this area and SAP is also the first company to offer services â€Å"in the cloud’ (Fornes, 2010). A diagram below shows the trend from initial small business usage, through redevelopment over time, to finally being able to target the enterprise solution requirements. Fig.2 (Fornes, 2010) As an example, Microsoft began offering Office 365 over a year ago and what the current subscription provides is the use of Microsoft cloud services with the option to also subscrib e and download Microsoft Office Professional or Standard software program to use so long as the cloud subscription is active. For a small business owner who does not have the financial resources to purchase full-blown software programs, this service is a great way to get the software at a very affordable price, plus utilize the cloud while working with clients through the cloud Lync system. This year, Microsoft celebrated its first year with the Office 365 service by providing a free edition of the 365 cloud service for educational purposes to all schools, colleges and universities (Nagel, 2012). Another company that has recently jumped onto the same bandwagon is Adobe, software provider of Photoshop, InDesign, Illustrator, Fireworks,

Sunday, January 26, 2020

Review on Video Steganography Technique

Review on Video Steganography Technique Kamred Udham Singh Abstract In the era of information security, Steganography is a most secure method, used for concealing existence of secret data in any digital cover object such as image, audio, video and text files. In the last several decades broad research has been done on image steganography technique due to their easiness of data embedding and data extraction. Hide the existence of the embedded data in any digital object is the main objective of steganography. The main key factors of steganography are Undetectability, robustness and capacity of the concealed data that separate it from related techniques like cryptography and watermarking. Nowadays, video files are much more accepted because of large size and memory requirements. This paper intends to provide a survey on various video steganographic technique and covering its fundamental concepts. Keywords: Video steganography, data hiding, spatial domain, Transform domain, DWT, DCT. Introduction Today’s digital world it is very important for secret communication of any private information in safe and secure manner, it has created new challenge of information security. Here a most important question arise that which method we choose for containing its integrity and degree of security. Several methods have been proposed for addressing the issue of information security like cryptography, steganography and watermarking. In Cryptography information encrypted in such form that it becomes meaningless to eavesdroppers using any encryption algorithms such as DES but how strong is the encryption algorithm, it could be broken. Data can be easily replicated and distributed without owner’s consent due to lack of security. Watermarking modified the original data by embedding a watermark containing key information such as logo or copyright codes to protect the intellectual properties of digital content. Moreover, in some situation it was necessary to distribution of informati on without anyone detecting that the communication happened. So steganography comes arise in digital world to handle this case. Steganography technique is the art and science of invisible data communication. The word steganography originated from the Greek language and derived from two Greek words â€Å"stegos† which stands for â€Å"cover† and â€Å"grafia† which stands for â€Å"writing† [1]. Figure 1.The different disciplines of information hiding [21] Steganography developed driven by the necessity to conceal the existence of a secret data communication. Although steganography and cryptography both technique are try to protect data, but neither steganography nor cryptography alone is perfect. Consequently it is better to combine both technique together to increase the degree of security of the system [2]. Though steganography is technique for the communication being between two parties. So main concern of steganography is to conceal the existence of the data communication and protecting the hidden data against any alterations that may happen during communication such as format change or compression but integrity should be maintain. The major difference between Steganography and Cryptography is that the cryptography keeps the contents of information secret while steganography keeps the existence of information secret [3]. As video steganography is the focus of this review paper which can be viewed as an extension of image steganography. Really, video is a stream of a sequence of successive and equally time-spaced still images. So several image steganographic techniques are relevant to videos as well. Hu et al. [28],], Langelaar et al. [38], Shang [74], and Sherlyetal [76] extended various image data hiding techniques to video. Video steganographic techniques There are various applications such as intelligence agencies and military communications where video steganography can be employed [4]. Lie et al. [5], Yilmaz et al. [6] and Robie et al. [7] proposed another types of applications like video error correction during communication and for transmitting additional information without requiring more band-width [8]. Video steganography was used for hiding data in a video captured by a surveillance system was demonstrated by Zhang et al. [9]. There are various signal processing transform like DWT, FFT and DCT, any one of them can be used as video stenographic technique to hide data in the frequency domain of the cover object. Secret data can be hide either on per pixel basis or group of pixels called blocks [10]. Video steganographic techniques can classify in a number of ways. Sherly et al. [11] categorize them according to compression, compressed techniques [12, 13] and uncompressed video techniques [15]. Video steganographic techniques can also be classified on the basis of domain of embedding, these are transform domain techniques [14, 16] and spatial domain techniques [17]. Shirali-Shahreza [18] stated that video steganographic techniques can be also categorized on the basis of considering the video as a sequence of still images [17, 19]. Or utilizing the video saving format for data hiding [20]. Or finding new dimensions in the video which helps in the steganographic process [12, 15]. The fallowing figure depicts th ese possible classifications. Figure 2: Various Classification of video Steganography This paper will discuss classification based on embedded domain and cover-up all the literature related to video steganography. Bit Substitutions Methods Least Significant Bit (LSB) Bit Substitution-based steganography techniques replace the cover bit with the binary equivalent of secret data bit. The main advantages of bit substitution methods are the simple implementation and the high data hiding capacity in comparison to other techniques. Bit Substitution-based technique have many methods such as Least Significant Bit (LSB) method, Bit Plane Complexity Segmentation (BPCS) and Tri-way Pixel Value Differencing (TPVD) etc. Least significant bit (LSB) insertion is an oldest and most famous bit substitution-based approach for embedding data in a carrier file like video or image and it is capable of embedding huge secret data. Least significant bit technique operates by altering LSB bits of the cover file to conceal the secret data bit. Most of the bit substitution-based methods that exist are really inspired by the LSB technique. Data hiding technique developed to hide the secret data in definite frames of the video file and in definite position of the frame by LSB substitution using different polynomial equation. In this technique data will be hidden on the basis of stego key which is in the form of polynomial equations with different coefficients [22]. A. T. Thahab [23] proposed Digital Color Video Steganography Using YCbCr Color Space and Dynamic Least Significant Bit technique is apply to hide video data file inside the other video cover object .This techniques also found on the basis of least significant bit algorithm. Bit Plane Complexity Segmentation (BPCS) Normally the idea behind the LSB technique is to modify the least significant bits of the pixel with the binary equivalent of secret data. If more significant bits are used to hide the data then it deteriorating the quality of image. Due to this disadvantage of this technique leads to evolution of other technique which trying to overcome this disadvantage. Kawaguchi and Eason proposed Bit Plane Complexity Segmentation (BPCS) technique [24] and Chang et al. proposed Tri-Way Pixel-Value Differencing [25] .BPCS technique can be applied in the both spatial domain and transform domain [26,13] to address this problem. The basic idea of BPCS technique is to break down an image/frame into the bit planes and every bit plane treated as a slice of the image which is made up from all the bits of a definite significant location from each binary digit. Regions in the bit plane are categorized into informative and noise-like after that noise-like regions are substituted with the secret information and maintain the perceived quality. Jalab et al. [19] implemented the BPCS technique for hiding data in MPEG video format frames. This technique works in the YCbCr colour space instead of red, green and blue (RGB) components of a pixel for removing the correlation between the RGB and also decreasing the distortion produced by data embedding process. It is well-known that Human Visual System (HVS) are sensitive modifications in smooth parts than noise-like. Therefore, the BPCS method was applied for computing the complexity of every region in the cover frame. The complexity of every region of the bit plane is computed as the number of on edge transitions from 0 to 1 and 1 to 0, both vertically and horizontally. Tri-way Pixel-Value Differencing (TPVD) It is another bit substitution-based method is the Tri-way Pixel-Value Differencing (TPVD) [13] which is a modified form of the Pixel-Value Differencing method. To maintain the visual quality of cover object it is intuitive to think that data should be concealed in complex parts of the object. It hides the data in the difference of two neighbour pixels value which are classified into ranges, larger range index shows a sharp area where more secret data can be concealed and smaller range index shows a smooth area where less secret data can be concealed. In the data hiding process first partitioning the cover object image/frame into non-overlapping chunks of two neighbour pixels and its range are determined. After that number of secret data bits to be concealed is computed based on the range index. Lastly, the essential number of secret data bits is extracted from the secret data and corresponding their decimal value is used to generate a new difference and the pixel values are adjusted accordingly. This method provides high capacity and imperceptibility for human vision of the concealed secret data. Sherly et al. [11] implemented this technique to hide data in MPEG compressed videos and stated that secret data are hidden in the macro-blocks of the â€Å"I† frame with maximum scene modification and in macro-blocks of the P and B frames with maximum magnitude of motion vectors. Transform domain techniques Although Bit substitution-based methods are the simplest way for data hiding, but vulnerability is main disadvantage to any cover alteration like compression, format change, etc. This data embedding techniques can be easily cracked by an attacker. Transform domain methods are more complex than Bit substitution-based methods and try to improve the perceptual transparency and the robustness of the generated stego-objects. Any transform-domain technique contains of at least these phases, first transformed the cover object into the frequency domain, in second phase secret data is concealed in some or all of the transformed coefficients. In final phase modified coefficients are transformed back to the original form of the cover. Discrete Cosine Transform (DCT), Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) are types of transform domain. Raja et al. [27] Stated that DFT methods introduce round-off errors which do not make it ideal for data hiding applications. So du e to this reason Discrete Fourier Transform methods are not popular in steganography. But, few techniques in steganography used DFT based steganography like McKeon [28] used the 2D DFT for steganography in videos. Discrete Cosine Transform (DCT) Discrete Cosine Transform (DCT) is a very popular transform and broadly used with image and video compression methods. Chae et al. [29] presented an algorithms in this field using texture masking and multidimensional lattice structure and used MPEG-2 compressed videos. Secret data and the cover video frames both are transformed using 88 Ãâ€"8 non-overlapping blocks. The secret data coefficients are quantized and then encoded by the multidimensional lattices, after that concealed into the cover frame DCT coefficients. Data hiding is adaptive to the local content of the video frame blocks. Steganographic techniques facing the challenge of improving the data embedding capacity without affecting visual quality. Large quantity of secret data can be embedding in the cover video is main objective of High bitrate techniques. A high bitrate algorithm is proposed by Yang et al. [16] which works on H.264/AVC Compressed videos. This method first convert the cover video frames to YUV colour spac e and then 1 data bit is embedded in each 4Ãâ€"4 DCT coefficient block . Strength points of this algorithm are large amount of data embedding capacity, robust to H.264 and MPEG-4 video compression techniques and also tamper resistant. Discrete Wavelet Transform (DWT) Discrete Wavelet Transform (DWT) is popular in signal processing and video/ image compression. Wavelet transform fragmented a signal into a set of basic functions called wavelets. The DWT has many advantages over DCT like providing a multi-resolution description and permitting for better modelling of Human Visual System (HVS). DWT delivers a multi-resolution analysis which analyzes the signal at diverse frequencies produce different resolutions. Temporal resolution is main advantage of DWT. It captures frequency and frame location information. At each level of transformation, a frame which is transformed with Haar wavelet transform [30] is decomposed into four bands. One of them is approximation band which represents the input frame after implementing a low pass filter and compressing it to half. Other remaining three bands are high pass filter and called detail band. High-resolution sub-bands permit simple detection of features like edges or textured parts in transform domain. DWT d oes not need to decompose the input cover object into non-overlapping 2-D blocks, which reduce the blocking artifacts. Wavelet transform produces floating point coefficients which are used to perfectly rebuild the original signal. Some video steganography techniques trusted on the integer-to-integer wavelet transform. Xu et al. [15] proposed an approach on this technique. In proposed scheme data is embedded in the motion component of video due to these two reasons first is not more affected by compression and second is HVS are not more sensitive to catch the changes in motion areas of video. The methodology of this algorithm is that, in first step motion component of video is computed from frame-by-frame basis, after that computed motion component are decomposed in two-level wavelet decomposition. In last step secret data bit are concealed into low frequency coefficients which are based on the values of coefficients. This technique maintaining the quality of video after the data embedding process. Requires a cover video with large motion component because data hiding capacity is depend on motion comp onent is the disadvantage of this algorithm. Adaptive steganographic techniques Adaptive steganography technique is a special case of the two former techniques which is also known as ‘‘Statistics-aware embedding’’ [31], ‘‘Masking’’ [32]. An adaptive technique basically implemented by studying the statistical structures of the cover object before changing with the secret data which helps to identify the best regions to embedded data [33]. Sur et al. [34] proposed an algorithm on temporal redundancy which select macro-blocks with low inter frame velocity and high prediction error as their regions-of-interest (ROI). Furthermore, the number of DCT coefficients used for data hiding is adaptively computed based on the relative stability of the prediction error block. This algorithm offers a very low data hiding capacity. Mansouri et al. [12] proposed a technique which combined the features of both spatial and temporal of the video and utilized a spatial key property. The objective of this technique is maximizing both perceptual invisibility and robustness by choosing frame regions which are perceptually unimportant. High data hiding capacity as it uses both temporal and spatial features of the cover video stream is the main advantage of this algorithm. Conclusion This paper presents a short review on video steganographic techniques and the key algorithms of video steganography. Steganography, cryptography, and watermarking technique and their differences is also discussed. An overview of steganography is presented and mainly focus on video steganography and its applications. Various video steganography techniques and classification of the existing video techniques are explained which are based on spatial domain, transform domain and other techniques. Advantages and disadvantages of these techniques are focused. Steganography techniques are mainly struggling for achieving a high data embedding rate. It is a good substitute channel for hide data in video files because it have many outstanding features such as large capacity and good imperceptibility. This paper delivers effective review on the design of a video steganographic system.

Saturday, January 18, 2020

Returning to School Essay

Pregnant at seventeen and no foundation of stability, I dropped out of school to prepare to raise my child. I then began to struggle and had a hard time making ends meet, so at that time I got on track to seek help and guidance. I started the process to get enrolled in school but backed out due to finding out at nineteen I was expecting my second child. I finally went back to school and got my GED and graduated my program in summer of 2010. I walked across the stage to receive my diploma carrying my son Joziah Jah’Von (5 months) and holding my daughter Ajiona Amory’s hand (2 years). I was very proud and felt extremely accomplished. The importance returning to school will have on my life is that I will be able to provide a stable life for my children, become successful and self-fulfilled through a career in business, and rise above the negative expectations some people have of me. Being a young mother of two children, I had a rough time finding childcare and being comfortable with strangers caring for my babies. I tried to find work but wasn’t able to find flexible hours. I was at a hard spot in my life. I didn’t know what step to make. I enrolled in cosmetology school and did the best at my classwork and tests but my attendance was poor due to unreliable sitters. I ended up withdrawing from the program to be a mother to my children. Two years later I am now a mother to three intelligent, beautiful, amazing children. I want nothing but the best for them so I’ve decided to make the best move to better our futures and got back on the wagon and got my head back in the books. Returning to school is the best decision I could’ve made for my family. We now have a chance at success and stability. Not having much stability present in my childhood is why I want more for my children. Growing up in a broken home, constantly moving, my mother struggling to make ends meet, and not having happy memories; was miserable. As a child, I always promised myself I’d do whatever it took to make sure my children never had to experience what I did. But I feel I failed my babies, because it has taken me so long to get on track and we have been in a struggle. I am upset that I allowed them to experience not having stability in their lives. But things will now be different. Ajiona Amory, Joziah Jah’Von and Marcella Pamela are my life, my reason for living, my everything and I will give them the best of the best. I am dedicated and devoted to my family; I’ll do whatever it takes to make sure they have the greatest lives I can possibly give them. I want my daughters and my son to be happy and have what they need. I never want to see them wanting or needing anything. My children and I have struggled enough throughout the years, it’s our time to rise above and live the lives we deserve. School will help me to do so and I want stop until they have it all. Education is one of the keys that will open many doors for us. By furthering my education it will help me to get a good job so that I won’t struggle to make ends meet and it will help to keep stability in our lives. With the struggles and lack stability I now am ready to be successful and do what needs to be done for my family. I, Angelique, have always wanted and dreamt of being the successful business type. I’ve always wanted to wear the fancy suits and the sexy heels, while carrying a leather brief case. It’s something I just never stopped wanting, no matter what other careers came my way. Desiring to be successful and have power, respect and money; I knew a good career was the only way. There is no room for trial and error. I got 100 percent devotion and motivation to fulfill my dream get the job I’ve always wanted and I deserve to have. Nothing will stand in my way; I’m on the rise to the top. Majoring in business and management is the start to our new life, new beginnings, new ways and new accomplishments. Finally with striving to have a good professional career and stability, I am ready to prove everyone wrong. I have always had family, friends, and others downing and doubting me, telling me I’ll never amount to nothing nor be a somebody. Not having the support and extra push from the ones that you think love and care for you really take a toll on you in every aspect of life and emotion. But dwelling will hold you back. Yes I have failed myself by not following through with things I have started but I had my reasoning-‘s. I taught myself to take the positive and negative criticism and shift what you can use out and just toss the unnecessary shit aside and keep moving forward. If you sit and ponder on why no wants to see you succeed and why they strive to see you fail, it will eat you alive and stop you from doing what it is that you want to do. It will disable you to be motivated and crush your dreams and dedication. Never let someone reserve space in your mind to the point it stops your life. If they hate they hate. Stand up, smile and strive for the top and don’t stop until you’ve reached it. Prove that you can be who you want to be and that they can’t stop your shine. I as a single mother will keep moving forward and never again let a negative empower me and my life. Indeed, while I have made mistakes, and they pierced my will power to stay motivated these failures also made me work harder to succeed. Being a young mother is very hard and has its ups and downs. But just because I now have major responsibilities on my hands doesn’t mean I won’t be able to travel smooth roads throughout life. I will cross the bumps and dips in life but its normal; everyone goes through it here and there. It now has showed me that it’s okay to fall off the horse a few times but it is most important for me to get up and keep trying until I get it right and succeed. Returning to school was the best choice I could make for not only myself but for my children. Wanting nothing but the best for my family I decided to make the best move to better our futures and got up, got back on the wagon and got my head back in the books. Now having a chance at success and stability, we are happy and anxiously waiting to rise above the negative and evil.

Friday, January 10, 2020

Genetics and Child Development Essay

Genetics play a vital role in our development and that of our children. Our genetic make-up, or traits, directly affects our children’s development, from the moment of conception and the beginnings of a new person, throughout his or her life. The child’s developmental fate is all in the deoxyribonucleic acid, (DNA). Deoxyribonucleic acid, is fashioned in the shape of a double helix; a twisted ladder of genetic code, which along with various proteins, which are essential to aid the DNA in proper cell division, are found in chromosomes. These are the microscopic structures that contain all an individual’s genetic information which are found in every cell of the human body except red blood cells, which have no nuclei (TGC, 2013). Half our chromosomes (23) come from our father, and the other half from our mother, for a total of 46. Together, this set of 23 pairs of chromosomes is responsible for giving us our hair color, eye color, height, the shape of our earlobes, our facial features, our shape, and the color of our skin; our genotype, or inherited traits from both parents’ genes (Mossler, 2011). Child development is dependent on genetics and the compatibility and health of the combined parental sets of chromosomes (GSLC, n.d). Things can go wrong, and parts of essential chromosomes may be deformed, rearranged, abnormal or missing; this can wreak havoc on the well-being of the developing fetus, resulting in deformities, mental retardation, and birth defects (GTC, 2013, para.1, sub sect. 2). Risk factors for a higher incidence of these chromosomal abnormalities include maternal age, and sometimes paternal age, and/or they may be due to a glitch in meiosis; the process where gametes or sex cells are formed; the egg (ovum), and the sperm, each containing 23 chromosomes (GSLC, n.d). Genetic counselors talk to couples before conception or during their pregnancy, regarding any worries they may have with their combined family genetic history. The counselor is consulted to assess the outcomes of possible genetic disorders such as Tay-Sachs, Cystic Fibrosis, Down syndrome, and many others. Fetal intervention may be a distinct possibility for some inherited diseases with which a genetic counselor may assist couples. Down syndrome is one of the most common chromosome abnormalities, which is recognized by a duplicate copy of chromosome 21. Babies with Down syndrome have flat features, including extra skin behind their necks, short, stubby hands, and recessed chins. Their eyes look as if they were born of Mongolian heritage, and Down syndrome was formerly known as Mongolism in the pre-1965 era, due to this exact feature, even though it has nothing whatsoever to do with this particular syndrome. The term â€Å"Mongolism† was dropped in 1965 by the World Health Organization (WHO), (Lowe, 1949). Maternal age is relevant when it comes to an elevated risk of Down syndrome; according to a study, 1/350 normal live births born to mothers age 35 resulted in Down syndrome; whereas, one Down syndrome birth in 85 normal live births occurred when the maternal age was 41. Mothers over 45 years of age, had a 1/25 chance of giving live birth to a baby with Down syndrome (Hook, 1983). Oddly enough, 80 percent of Down syndrome occurs at a maternal age of less than 35 (TGC, 2013, para.1, sub sect. 2). Child development of the child with Down syndrome is held on a parallel with normal children; however, the child with Down syndrome may achieve with less competence than that of his normal classroom counterpart. Evidence reveals that children with Down syndrome benefit from integration and interaction with others in a normal school environment. In particular, they show significant gains i n spoken language, reading, writing and arithmetic. This enhances their ability at a later stage to successfully interact with adults and become productive members of society (Buckley & Sachs, 2001). When I had my youngest child at almost 42 years-old, I had amniocentesis to test for Down syndrome and other abnormalities, as I was an older mother. My obstetrician believed I may be carrying twins; however, he came to the conclusion that my single baby absorbed his twin in utero, which today is quite commonplace. â€Å"Cystic Fibrosis is the most common genetic disease in Caucasians. The incidence is 1/300, and 4 – 5 percent of Americans are carriers. Chromosome 7 is the one affected here, whereby it is caused by a change in a single nucleotide (a phosphoric ester of a nucleoside; the basic structural unit of nucleic acids, DNA or ribonucleic acid (RNA). This disease affects the respiratory tract, in that it becomes clogged by mucus, which increases the incidence of pulmonary infection. Additionally, secretions obstruct the pancreas, which leads to dietary problems (GSLC, n.d).† Cystic Fibrosis or â€Å"55 Roses† as it is commonly called by children suffering from the disease, affects child development by posing cognitive, emotional and behavioral challenges. To conclude, in writing this paper I have developed a better understanding regarding the world of genetics and chromosomal diseases and their effect on child development. Children and their individual development through the various stages of these chromosomal diseases and disorders pose many challenges for them to overcome, and are more often than not, life-changing events for their families. Life expectancy for CF sufferers is not longevity; however, the quality of their limited lifestyles should be paramount within their family’s goals to make their child’s life on Earth as pleasant a time as possible. Down syndrome, however, although outwardly obvious to the perfect stranger, is nevertheless one of the milder forms of chromosomal diseases that can be worked through, albeit a challenge, to transform the sufferer into a fully functioning productive member of society. References Buckley S.J., Sacks B., (2001) An overview of the development of children with Down syndrome (5-11 years). Down syndrome Issues and Information. Retrieved February 12, 2013, from: http://www.down- syndrome.org/information/development/childhood/ Ernst, M.M., Johnson, M.C., Stark, L.J., (2010). Developmental and psychosocial issues in cystic fibrosis. Retrieved February 12, 2013, from: http://www.ncbi.nlm.nih.gov/pubmed/20478499 GSLC, (n.d). Genetics and child development. Retrieved February 12, 2013, from: http://gslc.genetics.utah.edu/units/disorders/karyotype/ Hook, E. B., (1983). Frequency of Down syndrome per maternal age. Jama 249:2034- 2038. Retrieved February 12, 2013, from: http://www.ds-health.com/risk.htm Lowe, R. F., (1949) The eyes in mongolism. Br J Ophthalmol. Retrieved February 12, 2013, from: Mar;33(3):131–174, http://www.ncbi.nlm.nih.gov/pmc/articles/PMC505809/ Mossler R. A., (2011) Child and Adolescent Development San Diego, CA. Bridgepoint Edu TGC, (2013). Genetics and chromosome analysis. Retrieved February 12, 2013, from: http://www.thegeneticscenter.com/chroman.htm

Thursday, January 2, 2020

Is Vaccines A Cause Of Autism Spectrum Disorder - 1179 Words

Precious or Poisonous: A Choice All Parents Must Make â€Å"Ever since the smallpox vaccine in 1798 there has been an argument over the safety, effectiveness and morality of vaccinations† (Immunization Action Timeline). In 2015 we have progressed as far as to find a vaccine for Ebola but the controversy still continues. In Tennessee, residents can refuse vaccines because of a religious reason. Many other states also allow their residents to refuse vaccines for religious and philosophical reasons (National Vaccine Information Center). Because states allow people to refuse vaccines, there is a chance that epidemics and vaccine prevented diseases could return. Many people question the safety of vaccines, therefore they refuse them. Most popular is the idea that vaccines can be a cause of Autism Spectrum Disorder. The CDC, Centers for Disease Control and Prevention, states that this is false. The CDC repeatedly says that there is no link between these two. They have studies showing that the ingredients in vaccines are not the cause of Autism. â€Å"One vaccine ingredient that has been studied specifically is thimerosal, a mercury-based preservative used to prevent contamination of multidose vials of vaccines. Research shows that thimerosal does not cause ASD† (Centers for Disease Control). â€Å"The most recent Cochrane systematic review of research on the MMR vaccine included six self-controlled case series studies, two ecological studies, one case crossover trial, five timeShow MoreRelatedIs Vaccines A Cause Of Autism Spectrum Disorder?1257 Words   |  6 PagesMake â€Å"Ever since the smallpox vaccine in 1798 there has been an argument over the safety, effectiveness and morality of vaccinations† (Immunization Action Timeline). In 2015 we have progressed as far as to find a vaccine for Ebola, however, the controversy still continues. In Tennessee, residents can refuse vaccines because of a religious reason. Many other states also allow their residents to refuse vaccines for religious and philosophical reasons (National Vaccine Information Center). BecauseRead MoreMmr Vaccine Can Cause Autism Spectrum Disorder Essay2192 Words   |  9 Pageseradicated by the use of vaccinations. Although vaccines are said to reduce the chance of receiving certain infections or diseases, controversial ideas believe that the MMR vaccine can cause autism spectrum disorder. Autism is a developmental disorder that impairs communication and interaction; it has no confirmed cause. Usually, a child begins to show signs of autism around 12 to 18 months, which is also the same age when a child receives the MMR vaccine. Because of this correlation, apprehensive parentsRead MoreAutism Is A Brain Based Disorder Essay1628 Words   |  7 PagesAutism is a brain based disorder that causes social-communication challenges. Autism is often diagnosed when children are very young. They can be diagnosed as early as 18 months according to the Autism Spectrum Disorder. Many expecting parents will prepare for a pregnancy by the usual healthy diet to make sure that they have a healthy baby, however, many children are still getting diagnosed with autism every day. There is a statistic stated on the Autism Spectrum Disorder that about 1 in every 68Read MoreAutism Spectrum Disorders784 Words   |  3 PagesIntroduction Autism is the main form of autism spectrum disorders (ASD). Autism is a developmental disorder that is manifested in problems with communication, impairment of social functioning, and repetitive behaviours. According to the fifth edition of the Diagnostic and Statistical Manual of Mental Disorders (DSM-V), ASD diagnoses must meet four different areas of criteria. There are three symptoms of deficits in social communication and interaction across contexts, four symptoms of restrictedRead MoreVaccines And Its Effect On Health Care1163 Words   |  5 Pages The introduction of vaccines has been a great advancement in the world of medicine. This ground- breaking discovery has a tremendous effect on health care by putting an end to diseases that might otherwise be untreatable. Diseases such as typhoid, whooping cough, and polio which threaten many countries worldwide are now preventable after the discovery of the vaccine. Although the development of vaccines has led to the prevention o f deadly illnesses, there has been may controversy based on whetherRead MoreAutism Spectrum Disorder ( Asd )1280 Words   |  6 PagesComposition 1 Autism Spectrum Disorder â€Å"Autism is a neurological disorder. It s not caused by bad parenting. It s caused by an abnormal development in the brain. The emotional circuits in the brain are abnormal. And there also are differences in the white matter, which is the brain s computer cables that hook up the different brain departments† â€Å"Temple Grandi†BrainyQuote.com. Xplore Inc, 2015. 30 April 2015. http://www.brainyquote.com/quotes/quotes/t/templegran451380.html. Autism Spectrum Disorder (ASD)Read MoreChildren With Autism Spectrum Disorder1502 Words   |  7 Pagesby a disorder that affects the very things we need to fit in to society. The ability to be able to fit in, communicate and behave in proper ways, allows us to function, work and survive in life. For many children and adults, they live with a disorder that dictates these behaviors and language skills to be very different from the average American. These skills they are challenged with, make it very difficult to live independ ently. The disorder these individuals live with is called Autism SpectrumRead MoreAutism Spectrum Disorder ( Asd )1261 Words   |  6 PagesAutism spectrum disorder (ASD)  is a serious  disorder  which affects the child’s neurological and behavior functions and may cause different levels of disability. Autism is a regressive neurodevelopment disorder that impacts social interactions, verbal and nonverbal, as well as negative behaviors. It is a disorder that is connected to abnormal biology and chemistry within the brain. Also, autism appears within the first three years of life. A child can seem developmentally normal and meeting all milestonesRead MoreVaccinations For Common Illnesses And Disease Essay1660 Words   |  7 Pagesvaccination came about when the Measles, Mumps, and Rubella vaccines were all combined (Cave 54). After the release of this new vaccination, the number of kids being diagnosed with autism rose tremendously. Some people were very interested in t his sudden spike of autistic children and decided to follow up on it. Many studies were done to see if there was any correlation between the MMR vaccination and the increasing diagnosis of children with autism. Some findings contradict one another. What I believeRead MoreA Research Topic On Autism Spectrum Disorder Essay965 Words   |  4 PagesResearch Topic: NEW 9-28-16 Ariel Robinson Autism Spectrum Disorder is a developmental disorder that displays characteristics of impairments in social interactions and communication, obsessive interests, and repetitive behaviors.1 The DSM-5 characterizes Autism Spectrum Disorder as range of symptoms with varying severity, hence the term â€Å"spectrum†.2 Currently, scientists do not know the exact cause of autism. However, it is agreed upon that the underlying cause is highly likely to be influenced by genetic

Wednesday, December 25, 2019

The War Of The American Civil War - 960 Words

Abraham Lincoln once stated â€Å"America will never be destroyed from the outside. If we falter and lose our freedoms, it will be because we destroyed ourselves.† Abraham Lincoln is a hero for the citizens of America because his determination and courage to ending slavery even if it meant war caused peace in this nation. Slavery was the vital cause of the American Civil War. The north and the south both had their differences on how to run the country. People in the North believed in unity and that slavery should not exist because â€Å"all men are created equally.† On the other hand, the South believed in continuing slavery. People tried to talk it out and come to a middle ground after both sides compromising, however that didn’t work and caused war. Ideological differences were a vital role to making the American Civil War an inevitable event. The American Civil War took place from 1861-1865 was an inevitable event in the American history. More than 640,000 people were killed and millions more were injured during this massive war. The civil war was between the northern and the southern states where its most leading cause was slavery. Along with that, economic, political and social ideologies caused the civil war. The northern states, also known as the union, were more successful and antislavery compare to the southern confederates states. The northern states were more populated, had more industries, and believed in the Declaration of Independence statement that â€Å"all men areShow MoreRelatedAmerican War And The American Civil War1551 Words   |  7 Pageswhich then caused the Southern states of America to decide to leave the American Union and create their own Southern Confederacy. This tore our nation apart. The American Civil War had begun and the very people that were once neighbors had each other’s blood on their hands. Many American lives had been lost. The American lives lost in the Civil War even exceeded the number of American lives lost during World War I and World War II. We were divided. The North wanted to reunite with the southern statesRead MoreThe War Of The American Civil War1376 Words   |  6 PagesThe American Civil War was arguably the most important war in the history of the country. The War of Independence may have allowed American to become its’ own country, but the Civil War resulted in something even more important than that, the end of slavery in the southern states. All of the issues that caused the Civil war were based around slavery, such as states’ rights that involved how slavery would be handled in each state, and trying to preserve the Union since the south seceded from the northRead MoreThe War Of The American Civil War856 Words   |  4 PagesSlavery may have been established as the catalyst of the American Civil War, but the beginning of the dispute began in the time of the Revolution with a weak decentralized government under the Articles of Confederation. Later gained momentum as territorial expansion set Americans against each other on debating whether the new states should be slave states or free states, it questioned the power of the Federal government regarding state rights, and brought about instability in the unity of the UnitedRead MoreThe War Of The American Civil War1618 Words   |  7 Pages A Civil War is a battle between the same citizens in a country. The American Civil War was fought from 1861 to 1865 to determine the independence for the Confederacy or the survival of the Union. By the time Abraham Lincoln was elected president in 1861, in the mist of 34 states, the constant disagreement caused seven Southern slave states to their independence from the United States and formed the Confederate States of America. The Confederacy, generally known as the South, grew to include elevenRead MoreThe War Of The American Civil War991 Words   |  4 PagesThe American Civil War is known to most as the bloodiest war anyone has ever witnessed. It claimed the life of thousands of Americans and animosity that was built up over several years prior to it can be to blame. Most people think that slavery was the cause of this battle, and although slavery did play a part, it was not the main cause. The biggest roles played in the American Civil War were states’ rights, unfair bills, feelings of inferiority and threats to economy. The tension started duringRead MoreThe War Of The American Civil War1324 Words   |  6 PagesThere were many events that led to the cause of one of America’s most devastating war, the American Civil War. The American Civil War was an unfortunate war that cost more than the lives of six hundred thousand people. Events such as the Missouri Compromise, Kansas Nebraska Act, Dred Scott Decision, and the Election of Abraham Lincoln resulted in the four yearlong battles between the Northern and Southern states due to social and economic differences on the idea of slavery. In the 19th century,Read MoreThe War Of The American Civil War Essay1472 Words   |  6 PagesThe American Civil War lasted from April 12, 1861 to May 9, 1865. It was the bloodiest war in American history, killing approximately 620,000 soldiers in total. The War was fought and won by the North, ensuring that all the United States would stay united and slavery would be illegal in The United States. However, history is one of the most complicated things in the world. It’s also one of the most important things in the world because history is what made the present possible. Historians have debatedRead MoreThe War Of The American Civil War1439 Words   |  6 PagesWhen the American Civil War began in the spring of 1861, those flocking to enlistment stations in states both north and south chiefly defined their cause as one of preservation. From Maine to Minnesota, young men joined up to preserve the Union. From Virginia to Texas, their future foes on the battlefield enlisted to pr eserve a social order, a social order at its core built on the institution of slavery and racial superiority . Secession had not been framed by prominent Southerners like Robert ToombsRead MoreThe Civil War And The American War1318 Words   |  6 PagesThe question of what caused the Civil War is debatable because there are several events that may have influenced the war such as the Western Expansion, Manifest Destiny and the Mexican-American War. The war also stems from slavery, the North and South basically fought over whether or not slavery should be permitted. Another point that may have influenced the Civil War is the economic and social structure of the country, which also falls under slavery because the South main source of income was slaveryRead MoreThe War Of The American Civil War913 Words   |  4 Pagesdisputed over the vast majority of causes of the American Civil War for ages. While some explanations may appear easier to pinpoint, the primary underlying catalyst to t he start of the war was the controversy over slavery. Though the northern and southern regions of the United States fostered contrasting views on a range of issues, they shared the common perspective of promoting Manifest Destiny. Manifest Destiny was the prevalent attitude that induced Americans to expand from coast to coast. This inclination