Thursday, December 26, 2019

What Are Sawflies Learn to ID These Stingless Wasps

Sawflies dont have much of an identity of their own. As adults, they resemble flies or wasps, and when immature they look much like caterpillars. Theres no single neat and tidy taxonomic group to which all sawflies belong. Unless youre an insect enthusiast or perhaps, a gardener, you probably wouldnt know a sawfly if it landed on you. And if youve spent much time outside, one probably has! What Is a Sawfly? Theyre often described as stingless wasps. They get their common name from the females ovipositor, which unfolds like a jackknife. It functions like a saw blade, allowing her to cut into stems or foliage and deposit her eggs. People unfamiliar with sawflies may mistake this feature for a stinger, but theres no cause for concern. Sawflies are harmless to people and pets. Sawflies look somewhat like flies, but a closer look will reveal four wings, not the single pair that is characteristic of the order Diptera. Some sawflies mimic bees or wasps, and in fact, theyre related to both. Sawflies belong to the order Hymenoptera. Entomologists have traditionally grouped sawflies, horntails, and wood wasps in their own suborder, Symphyta. Sawfly Larvae Look Like Caterpillars Gardeners most often encounter sawflies when the larvae feed on their plants. At first glance, you might think youve got a caterpillar problem, but sawflies have behavioral and morphological differences that differentiate them from Lepidopteran larvae. If the larvae are all feeding along the leaf margins, and rear up their hind ends when disturbed, those are good signs that your pests are sawflies. Keep in mind that pest control products labeled for caterpillars, such as Bt, will not work on sawfly larvae. Most Sawflies Are Specialists Many sawflies are specialist feeders. The Willow sawfly, for example, defoliates willows, while several kinds of pine sawflies focus their feeding on pines. The table below lists some of the more common North American sawflies that might present problems in the garden or landscape, and their host plants. Within the 9 families of sawflies, we find some with unusual habits. Cephid sawflies live within the stems of grasses or inside twigs. Certain Tenthredinidae​ are gall makers. And perhaps the oddest sawflies of all belong to the family Pamphiliidae. These crafty sawflies spin silk webs or use their silk-producing glands to fold leaves together into well-camouflaged shelters. Common Sawfly Species in North America Common Name Scientific Name Preferred Host Plants black-headed ash sawfly Tethida barda ash columbine sawfly Pristiphora aquilegia columbine currant sawfly Nematus ribesii gooseberry, currant dogwood sawfly Macremphytus tarsatus dogwood dusky birch sawfly Croesus latitarsus birch elm sawfly Cimbex Americana elm, willow European pine sawfly Neodiprion sertifer pine introduced pine sawfly Diprion similis pine, especially white pine mountain ash sawfly Pristiphora geniculata mountain ash pear slug Caliroa cerasi pear, plum, cherry, cotoneaster, hawthorn, mountain ash red-headed pine sawfly Neodiprion lecontei pine, especially red and jack pine rose slug sawfly Endelomyia aethiops rose white pine sawfly Neodiprion pinetum eastern white pine willow sawfly Nematus ventralis willow, poplar yellow-headed spruce sawfly Pikonema alaskensis spruce, especially white, black, and blue spruce

Wednesday, December 18, 2019

The Effects Of Music On Children With Autism - 1476 Words

Each day that goes by more people are becoming aware of the problem of autism. With the overall number of children effected with autism increasing everyday, there is a panic to find a solution to better treatment and therapy. As a result, the costs of autism care could reach an all time high of well over one hundred billion dollars. Without proper research this number could rise even more. Therefore, there is a need for better groundwork to bring the predicted cost of autism care down. To assure that the explorartion will truly get done there needs to be someone who can appreciate the topic and I can fulfil that requirement, having an autistic nephew. There are many experiments in scholarly journals written by researchers trying to find out if music is truly an effective method of therapy on children with autism or if it is just a myth. Most of the information out there shows the effect of music on children with autism as positive. Whether it be with problems related to vocal stereo typy or lack of social skills, there are facts to back up the positive outcomes of the delving so far. However, there needs to be more research to make this known among autism associations. Everything on this Earth revolves around a small green piece of paper called money. Every person loves to save money whether it be ninety dollars or fifty cents. The benefits of researching this topic is saving money for the households that experience autism first hand, along with associationsShow MoreRelatedThe Effects Of Music Therapy On Children With Autism1406 Words   |  6 Pageshealing methods is Music Therapy. Music Therapy has been shown to help many people of all age groups, a specific group being children with autism. It helps benefit children with autism by improving their communication and social skills. Just simply listening to music calms and puts the brain at ease. Music Therapy is beneficial to this specific group because though they may have deficits socially, they show none w hen it comes to musical affect. This form of therapy allows autistic children to improve thoseRead MoreThe Effects Of Music Therapy On Children With Autism Spectrum Disorder Essay2292 Words   |  10 PagesFrom 1997 to about 2007 the number of children with autism spectrum disorder has increase from 42,517 to about 258,305 and has risen since (Reschke-Hernà ¡ndez, 2011). With this rise of children who have autism, the rise of music therapy has since appeared greatly. When music therapy was first documented, the music was used in both group and individual settings. It was used with those who lacked social skills, those who needed rehabilitation, for self-expression, for psychological improvement and alsoRead MoreMusic And Children With Autism881 Words   |  4 PagesInformative Speech Topic: Music and Children with Autism Purpose: To inform audiences about the effect of music to the children with autism Thesis: Music effect children with autism in a powerful significant way. Introduction: †¢ Do you know that 1 in every 68 children in the United States has an autism? (Miriam, 2014) †¢ Boys are more likely to have autism than girl. †¢ What is autism means to us? In 1943, according to Dr. Leo Kannar who was the first described autism as a distinct condition thatRead MoreTherapies For Autistic Children.Individuals Take For Granted1678 Words   |  7 PagesTherapies for Autistic Children Individuals take for granted the luxury of embodying qualities such as communication, interaction, and social and motor skills. Although, individuals may determine the aforementioned skills are more difficult to obtain because of a disability. Autism or autism spectrum disorder is a developmental disorder that effects many children in the United States of America. Communication, interaction, and motor and social skills are usually effected in the autistic child. Read MoreMusic Therapy and Children Essay1603 Words   |  7 Pagesal., 2002, p. 379). In the nineteenth century, there was a desire to use the sounds of music to minimize pain. In the 1980s, the use of music therapy was documented, but it had not proved any effectiveness (Barrera et al., 2002, p.379). Also, Munro et al. (1987) reported that the Greeks used music in psychology treatment (p. 1029). Music therapy was defended by Munro et al. (1987) as â€Å"the controlled use of music, its elements and their influences on t he human being to aid in the physiologic, psychologicRead MoreBenefits Of Music Therapy On Children Essay1651 Words   |  7 PagesBenefits of Music Therapy in Autistic children Benefits of Music Therapy in Autistic children Literature Review Zuleima Haskins â€Æ' Introduction Autism Spectrum Disorder (ASD) is a group of conditions of the brain development. (Vries, 2015). The main characteristic of individuals with Autism Spectrum Disorder (ASD), is that they have difficulties to adapt and interact with other people. Also, individuals with Autism have problems with their development of verbal and nonverbal communicationRead MoreTreatment Options Used for Children with Autism Spectrum Disorder1440 Words   |  6 PagesIntroduction Autism spectrum disorder (ASD) is known as a neurodevelopmental disorder that is capable of weakening communication, behavior and socialization. The term ASD includes three major subtypes which is Autism Spectrum Disorder, Pervasive Developmental Disorder and Asperger’s Disorder. About 9.0 in 1000 children have ASD and certain types of autism might not be identified until three years of life. The probability of boys being diagnosed is higher compared to girls (Bravaccio et al. 2013)Read MoreThe Implementation Of Music Therapy Workshop Essay1398 Words   |  6 PagesResources. Time: Parents will need eight hours of proper training in the implementation of music therapy, such as songs, improvisation, and movement to music. Professional Proctors: Training will be provided alongside proctors in the eight-hour â€Å"implementation of music therapy workshop† to promote competence of the therapy. Money: Participants will be paid a stipend for participating for the duration of the workshop. An estimated financial need is $2,500. An $825 budget will be set aside forRead MoreMusic Therapy For Children And Adults With Learning Disabilities1662 Words   |  7 Pagestypes of literature on the topic of music therapy, the background of music therapy, how it takes place and how it helps clients with autism. A lot of the literature found on the topic music therapy found it helped children and adults with learning disabilities. This section of the dissertation will analyse the literature that is already available on music therapy and autism. It will also analyse literature on drug therapies. I will explore the history of music therapy how and why it is used, howRead MoreMusic Therapy For Children With Autism Spectrum Disorder1699 Words   |  7 Pagesfunctions in life. This special kind of creativity can help some children on the autism spectrum with regulating behaviors, help the m cope with anxieties and frustration, and improve focus and attention. This art may also help a child to socially interact with their peers. May also help a non-verbal child to open up and begin to communicate, whether it would be verbally or non verbally (New Hope for Autism: Music Therapy for Children with Autism and Asperger s Syndrome). Now imagine that you were a parent

Monday, December 9, 2019

Risk and Due Intelligence Blue Scope Steel Producers in Australia

Question: Discuss about the Risk and Due Intelligence Blue Scope Steel. Answer: Introduction Blue Scope is one of the largest steel producers in Australia with operations in Australia, New Zealand, North America and Asia. In 2002, the organization was demerged from BHP Billiton and renamed Blue Scope steel. It has headquarters in Melbourne, Australia and employs over 16,000 employees. It is one of the largest steel operating plants in Australia and has the largest plant in New South Wales. In 2011, the company decided to exit from the export market and reduced its production capacity by fifty percent (Blue Scope, 2017). In order to sustain in the market, the business organizations need to conduct thorough risk analysis of the organization and the business environment and implement appropriate risk mitigation strategies. In the vulnerability assessment, the business organizations identify different risks which it is currently exposed to or might get exposed in near future. There are some common steps in all the vulnerability assessment methods which include identifying the re sources and capabilities in a system, assigning importance to the risk in alignment with their probability of occurrence and impact on the organization, identifying the vulnerability or potential threat to each resources and mitigation of serious vulnerabilities. The vulnerability analysis is different from the risk analysis as risk analysis emphasizes on the object being studied whereas the vulnerability analysis emphasizes on the object being studied as well as on the surrounding environment (Zsidisin and Ritchie, 2008). The vulnerability assessment refers to the process of identifying, quantifying and ranking the vulnerabilities or the risk assessment in a business organization. The vulnerability assessment can be performed on an organizations or system. In the later section of report, precautionary recommendations are made which can mitigate the impact of the exposed risk. Vulnerability Assessment The vulnerability analysis is focused towards the mission of the system or the organization and ensuring its survival in the industry. In the vulnerability assessment, the organization can focus on extended set of threats and consequences, resources which can mitigate the risk in the system and identification of the disruption time wherein stability can be created in the system. In the vulnerability analysis, two types of risk can identified, namely, downside risk and the upside risk. The downside risk refers to the pure risk whereas the upside risk refers to the speculative risk. The pure risk is a category of risk in which loss is the only possible outcome. In order to mitigate these risks, the organization can buy insurance. It includes safety hazards. In contrast to pure risk, the speculative risk refers to the category of risks which can have both good as well as bad outcome. Risk associated with share market or successful completion of projects comes in the category of project risk. In the vulnerability assessment, the success factors of the organization as well as the assets to the organization are identified and potential threat to them is identified (Dalezios, 2017). Success Factors Blue Scope is one of the largest steel producing organizations in Australia. Although, the organization has exited from the international operations, it has a strong customer base in the country. It has a strong brand image and abundant physical resource as it is backed by BHP Billiton. The success factors of the Blue Scope can be identified as it public image and consumer confidence, ability to perform the operations accurately, its physical resources, customer loyalty and its human resources (Camilleri, 2016). Threats: The threats can be identified as factors which can bring harm to the operations of the organization. A business organization is constantly exposed to a large number of threats which includes natural hazards, manmade hazards, plant failure or failure of supplier or the aggravation by the workers of the organization (White, 2014). Similarly, Blue Scope is also exposed to a large number of threats of natural and man-made hazards. Any natural hazard such as smoke, fire or explosion can impact negatively on the operations and the profitability of the organization. The organization deals with the manufacturing of steel; therefore, furnaces and fires are a part of the operations of the organization. Therefore, it has high vulnerability to get exposed to the fire hazards and explosion. Other threats include the failure in some sections of plant which can halt the operations of the organization. It is important to keep high maintenance of the steel plant so that no such risk can occur. If the suppliers are not able to supply the raw materials necessary for the operations or fail to do it in adequate quality, it can impact on operations of organization. It is important for the organization to recruit skilled and talented staff because if it failed to do so, it will impact on the operations of the organization (Lewis, et al., 2006). Vulnerability Assessment: In the vulnerability assessment, vulnerability refers to the physical entities which can be attacked or harmed by the external forces. In this regard, the vulnerability of the organization can be categorized as physical vulnerability, personal vulnerability or notional vulnerability. In the physical vulnerability, the threat to the physical property of the organization can be identified. The physical property of an organization can be equipment, money or buildings (Allen and Derr, 2015). The equipment can be damaged; buildings can be damaged by fire or other hazard, money or financial assists can be stolen. The personal vulnerability refers to the harm to the human resources of the organization. The employees of the organization can be exposed to several hazards such as injury or vehicle accidents, ill health, chemical exposure and increase in stress due to overtime or lack of work-life balance. In steel manufacturing companies, the people are exposed to several chemical and workplac e injury hazard (Rausand, 2013). In addition to it, the organization is also exposed to notional risk which refers to the exposure to the vulnerability which can damage the public image of the organization or change the perception of the organization in front of its stakeholders. The image of the organization can be tarnished by failure of its major plants, confidence loss due to financial loss of the organization or disruption in the business due to the incompetence of supplier. The physical vulnerability refers to the harm to the physical property of the organization. Critical success Factors /// Threats People On-time Delivery of Product Product quality Equipment Assets Compliance Shareholder Satisfaction Equipment Failure High Impact Impact Medium Impact Discrimination High Impact Impact Impact Fire/Explosion High Impact High Impact High Impact Impact IT Infrastructure failure Medium Impact Medium Impact Supplier Failure High Impact High Impact High Impact Changes in Regulation High Impact High Impact High Impact Lack of Skills High Impact Low Impact Low Impact High Impact Precautionary Analysis In the above section, a large number of vulnerabilities have been identified which can harm the business. Blue Scope is a steel business organization which is also exposed to several different vulnerabilities. It is important that the organization develop vulnerability control or treatment plans so that it can minimize its exposure to different risks. In the below section, several precautions are discussed which can reduce the impact of vulnerabilities identified for the organization (Camilleri, 2016). Equipment Failure: The equipment failure refers to the failure of the major equipment of the organization or plant, which can impact on the operations of Blue Scope organization. The business organization should buy equipment and all the components from reputable organizations. Buying the products from high quality vendors will assure their quality and longevity. Moreover, the before installing a new system or equipment in the organization, the company must provide training to all the employees so that they can easily handle the equipment. If the untrained employees will handle the product, it can result in equipment damage (Lewis et al., 2006). Whenever a new system is employed in the organization, it can result in employee grievance as they need to require learning how to operate it. The organization can minimize this dissatisfaction and ease the learning process by keeping the basis of the product operations on the designs of the previous products. The designing of the product can also be enhanced, when an experienced professional handles it (Menoni and Margottini, 2011). Employee Discrimination: Employee discrimination is one of the serious issues in the business organizations. Blue Scope is one of leading organization which deals with the steel production. Due to the complexity of operations, a large number of employees are hired from all across the globe. It is important that all the employees work in close harmony with each other. Moreover, in certain situations, the women employees also face gender discrimination. The discrimination impacts negatively on the productivity of the employees and create mental stress for them. In order to combat it, the organization must design stringent policies which can control the employee discrimination. The HR manager should also implement strategies to create a positive organization culture within the organization so that the employee discrimination could be minimized in the organization (Matsukawa and Habeck, 2007). Fire and other Natural Hazards A business organization cannot prevent the natural disasters to happen; however, it can remain vigilant in the structure designing so that the impact of these disasters can be minimized. It is important to adhere to the safety standards and measurers in the construction of the building so that the impact of the natural disasters can be minimized (Sadgrove, 2016). IT Infrastructure Failure In order to combat the failure of the IT infrastructure, the organization should provide employee training so that the employees can operate basic IT related operations. Moreover, the organization should also hire employees who are dedicated for smooth operations and maintenance of the IT infrastructure of the organization (D'Addario, 2013). Supplier Failure In order to address the supplier failure, the organization should try to establish ling-term relationships with the suppliers which are based on the mutual trust. Threat Critical Success Factor Proposed Control or Treatment plan Equipment Failure Productivity of the organization Buy equipment from experienced and reputable suppliers Provide Training to the employees for proper handling of the equipment Easy designing of the product A comprehensive design review process Experienced Design Professional Discrimination Employee Satisfaction Human Resource manager Effective HR policies Strict action against discrimination Fire/Explosion Service Capability, flexibility, Implementation of safety measures Construction of building and plant according to the safety standards Effective HR policies Training employees for safe handling of equipment IT Infrastructure failure Customer satisfaction, Employee productivity Employee Training for handling IT related task Hiring employees to maintain the IT infrastructure of the organization Supplier Failure On-time Delivery and Establishing long-term contracts with reliable and experienced contractors (Snedaker,2013) Reducing the reliance on one supplier by buying from more than one supplier Changes in Regulation Compliance, employee and customer satisfaction The management should remain aware regarding the changes in regulations and laws and implement them to avoid legal actions Lack of Skills Productivity and Efficiency Employee training, Recruitment of skilled employees (Smith, 2016) Conclusion It can be concluded that vulnerability assessment is crucial for the business organizations to maintain sustainable operations in the organization. Blue Scope is leading steel manufacturing organization in Australia which has operations all across the globe. The vulnerability assessment refers to examination of the potential risk faced by the system as well as the surrounding environment. It has been identified that the safety risk and the maintenance of the organization structure are critical risk to the organization. The business organization can implement several strategies and methods to address these vulnerabilities. It includes implementation of HR policies which can reduce the instances of workplace discrimination in the organization. Other than that, the organization must construct its plant and other site according to the safety guidelines. The organization should also focus on establishing long term relationships with its suppliers to increase their reliability and build tr ustworthy relationships. References Allen, G. and Derr, R. (2015). Threat Assessment and Risk Analysis: An Applied Approach. Butterworth-Heinemann. Blue Scope. (2017). About us. [Online]. Available at: https://www.bluescope.com/ [Accessed on: 8 May 2017]. Camilleri, E. (2016). Project Success: Critical Factors and Behaviours. CRC Press. D'Addario, F.J. (2013). Influencing Enterprise Risk Mitigation. Elsevier. Dalezios, N.R. (2017). Environmental Hazards Methodologies for Risk Assessment and Management. IWA Publishing. Lewis, P., Goodman, S, Fandt, P. and Michlitsch, J. (2006). Management: Challenges for Tomorrow's Leaders. Cengage Learning. Matsukawa, T. and Habeck, O. (2007). Review of Risk Mitigation Instruments for Infrastructure Financing and Recent Trends and Developments. World Bank Publications. Menoni, S. and Margottini, C. (2011). Inside Risk: A Strategy for Sustainable Risk Mitigation. Springer Science Business Media. Rausand, M. (2013). Risk Assessment: Theory, Methods, and Applications. John Wiley Sons. Sadgrove, K. (2016). The Risk Mitigation Handbook: Practical steps for reducing your business risks. Routledge. Smith, J.BB. (2016). The Art of Integrating Strategic Planning, Process Metrics, Risk Mitigation, and Auditing. ASQ Quality Press. Snedaker, S. (2013).Business Continuity and Disaster Recovery Planning for IT Professionals. Newnes. White, J.M. (2014). Security Risk Assessment: Managing Physical and Operational Security. Butterworth-Heinemann. Zsidisin, G.A. and Ritchie, B.(2008). Supply Chain Risk: A Handbook of Assessment, Management, and Performance. Springer Science Business Media.

Monday, December 2, 2019

Narrator Description Essays - Style, Fiction, Point Of View

Narrator Description What is narrator? Narrator is the voice the author creates to tell the story. The possible ways of telling a story are many, and more than one way can be worked into a single story. Conventionally, the various narrators that storytellers draw upon can be grouped into four broad groups: the third-person narrator, the first-person narrator, the omniscient narrator and the witness narrator. After reading William Faulkner's "A Rose For Emily" ,Edora Welty's "A Worn Path", Richard Wright's "The Man Who Was Almost A Man" and Katherine Anne Porter's "The Jilting of Granny Weatherall", I want to discuss what type of the narrative voice the four writers create in their own stories. A witness narrator is who tells only what they see or hear through their perspectives. For example, in William Faulkner's "A Rose for Emily" which is about an insane woman who kills her man and sleeps with the dead man for ten years, I can find that there is an example of witness narrator. The author, William Faulkner, uses the Jefferson town people as witness to create the town's view about Emily. After the town noticed there was a stinky smell from Miss Grierson house , they asked Judge Stevens to "send her word to stop it"( Faulkner,337). The town people discussed about the stinky smell from Emily 's house, they were the observers. A first-person narrator is when the narrator speaks using "I" or "We" pronouns. We can see such first-person narrator in both "A Rose For Emily" and " The Man Who Was Almost A Man". Faulkner uses the town people as observers in "A Rose For Emily" but his we, though plural and representative if the town's view of Emily, is definitely a first-person narrator. Just as in the article where it says "We did not say she was crazy then. We believed she had to do that. We remembered all the young men her father driven away, and we knew..."(338).

Wednesday, November 27, 2019

Write About What You Know

Write About What You Know Write About What You Know Write About What You Know By Michael For thirty years, the mid-term exam for Dr. McAnellys Biblical Literature class was always the same essay question: Describe the wandering journeys of the Apostle Paul. So a college football fullback and his roommate decided they wouldnt study anything else, thereby leaving them more time for other attractive pursuits. Imagine their surprise when the question instead was, Critique the major themes of Jesus Sermon on the Mount. Now, imagine the fullbacks surprise when his roommate nevertheless began to write furiously for the next hour. The fullback stared at his blank test paper for a long time before giving up and leaving the room, but his curiosity was so strong that he peeked at his roommates essay as he walked past. The first sentence read, Who am I to critique the words of the Lord Jesus? Let me rather describe the wandering journeys of the Apostle Paul. Seasoned authors advise, Write about what you know. In fact, you have to write about what you know. Try to write about what you dont know, about which you havent got a clue, and youll be staring at a blank piece of paper for a long time. Its one of the surest ways to contract writers block. If you succeed in actually getting words onto the page, your readers will be staring at it for a long time, trying to figure out what you just said, if not why you wrote it in the first place. Why would anybody write about what they dont know? Why would people do something like that? Because someone important told them to. Essay tests in school are a good example. Your instructor asks you to write about one of the (several) chapters in the textbook that you never got around to studying. Your job, should you choose to accept it, is to employ your literary skills to make your instructor believe that you read and understood the chapter. Changing the question rarely works. Because what they dont know seems more interesting than what they do know. Young writers frequently make that mistake. When you move into the cloud of unknowing to write your piece, youre increasing your competition. In the mid-60s, without having any personal experience with them, lots of American teenagers were probably writing about monsters and spaceships, though these markets were already fully stocked with experienced grown-up writers. None of them wrote about being a real American teenager except S.E. Hinton. So her book The Outsiders got published and their books didnt. Because they value style over communication. Poets sometimes make this mistake. They write about the universal life force, instead of about a tree. Down-to-earth, brass-tacks writing doesnt seem stylish enough. But uninformed writing is less interesting than informed writing. The details which make writing vivid and readable are missing, like a price tag in a store, or somehow off, like a carton of old milk. Writing about what you know is a cure for writers block. Thats one reason why journaling or blogging is so popular among writers. Something must have happened to you today, unless you were dead. Write about it. It didnt happen to anyone else, unless youre a clone. Nobody has the same brain or biography as you, so nobody has the same perspective as you. If they do, I suggest you get your own perspective. You need your own. Dont try to share with your neighbor. Thats cheating. Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Writing Basics category, check our popular posts, or choose a related post below:When to Capitalize Animal and Plant NamesComma Before ButAppropriate vs. Apropos vs. Apt

Saturday, November 23, 2019

Nelson Rolihlahla Mandela - Former President of South Africa

Nelson Rolihlahla Mandela - Former President of South Africa Date of birth: 18 July 1918, Mvezo, Transkei.Date of death: 5 December 2013, Houghton, Johannesburg, South Africa Nelson Rolihlahla Mandela was born on 18 July 1918 in the small village of Mvezo, on the Mbashe River, district of Umtata in Transkei, South Africa. His Father named him Rolihlahla, which means pulling the branch of the tree, or more colloquially troublemaker. The name Nelson was not given until his first day at school. Nelson Mandelas father, Gadla Henry Mphakanyiswa, was the chief by blood and custom of Mvezo, a position confirmed by the paramount chief of the Thembu, Jongintaba Dalindyebo. Although the family is descended from Thembu royalty (one of Mandelas ancestors was paramount chief in the 18th century) the line had passed down to Mandela through lesser Houses, rather than through a line of potential succession. The clan name of Madiba, which is often used as a form of address for Mandela, comes from the ancestral chief. Until the advent of European domination in the region, chieftaincy of the Thembu (and other tribes of the Xhosa nation) was by patrimonial decent, with the first son of the major wife (known as the Great House) becoming automatic heir, and the first son of the second wife (the highest of the lessor wives, also known as the Right Hand House) being relegated to creating a minor chiefdom. The sons of the third wife (known as the Left Hand House) were destined to become advisors to the chief. Nelson Mandela was the son of the third wife, Noqaphi Nosekeni, and could have otherwise expected to become a royal advisor. He was one of thirteen children, and had three elder brothers all of whom were of higher rank. Mandelas mother was a Methodist, and Nelson followed in her footsteps, attending a Methodist missionary school. When Nelson Mandelas father died in 1930, the paramount chief, Jongintaba Dalindyebo, became his guardian. In 1934, a year during which he attended three month initiation school (during which he was circumcised), Mandela matriculated from Clarkebury Missionary school. Four years later he graduated from Healdtown, a strict Methodist college, and left to pursue higher education at the University of Fort Hare (South Africas first university college for Black Africans). It was here he first met his lifelong friend and associate Oliver Tambo. Both Nelson Mandela and Oliver Tambo were expelled from Fort Hare in 1940 for political activism. Briefly returning to Transkei, Mandela discovered that his guardian had arranged a marriage for him. He fled towards Johannesburg, where he obtained work as a night-watchman on a gold mine. Nelson Mandela moved into a house in Alexandra, a Black suburb of Johannesburg, with his mother. Here he met Walter Sisulu and Walters fiancà ©e Albertina. Mandela started working as a clerk in a law firm, studying in the evening through a correspondence course with the University of South Africa (now UNISA) to complete his first degree. He was awarded his Bachelors degree in 1941, and in 1942 he was articled to another firm of attorneys and started upon a law degree at the University of Witwatersrand. Here he worked with a study partner, Seretse Khama, who would later become the first president of an independent Botswana. In 1944 Nelson Mandela married Evelyn Mase, a cousin of Walter Sisulu. He also began his political career in earnest, joining the African National Congress, ANC. Finding the existing leadership of the ANC to be a dying order of pseudo-liberalism and conservatism, of appeasement and compromise., Mandela, along with Tambo, Sisulu, and a few others formed the African National Congress Youth League, ANCYL. In 1947 Mandela was elected as secretary of the ANCYL, and became a member of the Transvaal ANC executive. By 1948 Nelson Mandela had failed to pass the exams required for his LLB law degree, and he decided instead to settle for the qualifying exam which would allow him to practice as an attorney. When DF Malans Herenigde Nationale Party (HNP, Re-united National Party) won the 1948 election, Mandela, Tambo, and Sisulu acted. The existing ANC president was pushed out of office and someone more amenable to the ideals of the ANCYL was brought in as a replacement. Walter Sisulu proposed a programme of action, which was subsequently adopted by the ANC. Mandela was made president of the Youth League in 1951. Nelson Mandela opened his law office in 1952, and a few months later teamed up with Tambo to create the first Black legal practice in South Africa. It was difficult for both Mandela and Tambo to find time for both their legal practice and their political aspirations. That year Mandela became president of the Transvaal ANC, but was banned under the Suppression of Communism Act – he was prohibited from holding office within the ANC, banned from attending ANY meetings, and restricted to the district around Johannesburg. Fearing for the future of the ANC, Nelson Mandela and Oliver Tambo initiated the M-plan (M for Mandela). The ANC would be broken down into cells so that it could continue to operate, if necessary, underground. Under the banning order, Mandela was restricted from attending meeting, but he drove down to Kliptown in June 1955 to be part of the Congress of the People; and by keeping to the shadows and the periphery of the crowd, Mandela watched as the Freedom Charter was adopted by all the groups involved. His increasing involvement in the anti-Apartheid struggle, however, caused problems for his marriage and in December that year Evelyn left him, citing irreconcilable differences. On 5 December 1956, in response to the adoption of the Freedom Charter at the Congress of the People, the Apartheid government in South Africa arrested a total 156 people, including Chief Albert Luthuli (president of the ANC) and Nelson Mandela. This was almost the entire executive of the African National Congress (ANC), Congress of Democrats, South African Indian Congress, Coloured Peoples Congress, and the South African Congress of Trade Unions (collectively known as the Congress Alliance). They were charged with high treason and a countrywide conspiracy to use violence to overthrow the present government and replace it with a communist state. The punishment for high treason was death. The Treason Trial dragged on, until Mandela and his 29 remaining co-accused were finally acquitted in March 1961. During the Treason Trial Nelson Mandela met and married his second wife, Nomzamo Winnie Madikizela. The 1955 Congress of the People and its moderate stance against the policies of the Apartheid government eventually led to the younger, more radical members of the ANC to break away: the Pan Africanist Congress, PAC, was formed in 1959 under the leadership of Robert Sobukwe. The ANC and PAC became instant rivals, especially in the townships. This rivalry came to a head when the PAC rushed ahead of ANC plans to hold mass protests against the pass laws. On 21 March 1960 at least 180 black Africans were injured and 69 killed when the South African police opened fire on approximately demonstrators at Sharpeville. Both the ANC and PAC responded in 1961 by setting up military wings. Nelson Mandela, in what was a radical departure from ANC policy, was instrumental in creating the ANC group: Umkhonto we Sizwe (Spear of the Nation, MK), and Mandela became the MKs first commander. Both the ANC and PAC were banned by the South African government under the Unlawful Organisations Act in 1961. The MK, and the PACs Poqo, responded by commencing with campaigns of sabotage. In 1962 Nelson Mandela was smuggled out of South Africa. He first attended and addressed the conference of African nationalist leaders, the Pan-African Freedom Movement, in Addis Ababa. From there he went to Algeria to undergo guerrilla training, and then flew to London to catch up with Oliver Tambo (and also to meet members of the British parliamentary opposition). On his return to South Africa, Mandela was arrested and sentenced to five years for incitement and illegally leaving the country. On 11 July 1963 a raid was undertaken on Lilieslief farm in Rivonia, near Johannesburg, which was being used by the MK as headquarters. The remaining leadership of the MK was arrested. Nelson Mandela was included at trial with those arrested at Lilieslief and charged with over 200 counts of sabotage, preparing for guerrilla warfare in SA, and for preparing an armed invasion of SA. Mandela was one of five (out of the ten defendants) at the Rivonia Trail to be given life sentences and sent to Robben Island. Two more were released, and the remaining three escaped custody and were smuggled out of the country. At the end of his four hour statement to the court Nelson Mandela stated: During my lifetime I have dedicated myself to this struggle of the African people. I have fought against white domination, and I have fought against black domination. I have cherished the ideal of a democratic and free society in which all persons live together in harmony and with equal opportunities. It is an ideal which I hope to live for and to achieve. But if needs be, it is an ideal for which I am prepared to die. These words are said to sum up the guiding principles by which he worked for liberation of South Africa. In 1976 Nelson Mandela was approached with an offer by Jimmy Kruger, the Minister for Police serving under President BJ Vorster, to renounce the struggle and settle in the Transkei. Mandela refused. By 1982 international pressure against the South African government to release Nelson Mandela and his compatriots was growing. The then South African president, PW Botha, arranged for Mandela and Sisulu to be transferred back to the mainland to Pollsmoor Prison, near Cape Town. In August 1985, approximately a month after the South African government declares a state of emergency, Mandela was taken to hospital for an enlarged prostate gland. On his return to Pollsmoor he was placed in solitary confinement (having a whole section of the jail to himself). In 1986 Nelson Mandela was taken to see the Minister of Justice, Kobie Coetzee, who requested once again that he renounce violence in order to win his freedom. Despite refusing, restrictions on Mandela were somewhat lifted: he was allowed visits from his family, and was even driven around Cape Town by the prison warder. In May 1988 Mandela was diagnosed with tuberculosis and moved to Tygerberg hospital for treatment. On release from hospital he was moved to secure quarters at Victor Verster Prison near Paarl. By 1989 things were looking bleak for the Apartheid regime: PW Botha had a stroke, and shortly after entertaining Mandela at the Tuynhuys, the presidential residence in Cape Town, he resigned. FW de Klerk was appointed as his successor. Mandela met with De Klerk in December 1989, and the following year at the opening of parliament (2 February) De Klerk announced the unbanning of all political parties and the release of political prisoners (except those guilty of violent crimes). On 11 February 1990 Nelson Mandela was finally released. By 1991 the Convention for a Democratic South Africa, CODESA, was set up to negotiate constitutional change in South Africa. Both Mandela and De Klerk were key figures in the negotiations, and their efforts were jointly awarded in December 1993 with the Nobel Peace Prize. When South Africas first multi-racial elections were held in April 1994, the ANC won a 62% majority. (Mandela revealed later that he was worried that it would achieve the 67% majority that would allow it to re-write the constitution.) A Government of National Unity, GNU, was formed – based on an idea proffered by Joe Slovo, the GNU could last for up to five years as a new constitution was drawn up. It was hoped that this would allay the fears of South Africas whites population suddenly faced with majority Black rule. On 10 May 1994 Nelson Mandela made his inaugural presidential speech from the Union Building, Pretoria: We have at last, achieved our political emancipation. we pledge ourselves to liberate all our people from the continuing bondage of poverty, deprivation, suffering, gender, and other discrimination. Never, never, and never again shall it be that this beautiful land will again experience the oppression of one by another... Let freedom reign. God Bless Africa! Shortly after he published his autobiography, Long Walk to Freedom. In 1997 Nelson Mandela stepped down as leader of the ANC in favour of Thabo Mbeki, and in 1999 he relinquished the post of president. Despite claims to have retired, Mandela continues to have a busy life. He was divorced from Winnie Madikizela-Mandela in 1996, the same year that the press realised he was having a relationship with Graà §a Machel, the widow of Mozambiques former president. After heavy prompting by Archbishop Desmond Tutu, Nelson Mandela and Graà §a Machel were married on his eightieth birthday, 18 July 1998. This article first went live on 15 August 2004.

Thursday, November 21, 2019

Implementation of triage protocol for nurses Dissertation

Implementation of triage protocol for nurses - Dissertation Example Assigning degree of urgency to patients based on the health conditions and nature of the disease increases the effectiveness of the treatment, and reduces the time lag between the patient’s visit and treatment. Triage protocols useful in this regard are highly specialized and needs thorough training to the professionals especially, the nurses. For example, pediatric triage protocols include pediatric cough, pediatric vomiting and several other types. Triage services need to be reliable and cost effective for their application in hospitals or private nursing homes. The process starts from the visits of the patients or the calls received from the patients (telephone triage). Correct protocol needs to be identified based on the symptoms as explained by the patients. The patients are asked the relevant questions based on the check-list for confirmation to make the preliminary diagnostic procedure effective to provide the appropriate health care required. This will make the process simpler down the line for treatment and nursing. Nursing triage protocol system in an organization enhances the efficiency level and improves patient health care. The implementation of Triage Protocol in an organization involves establishment of infrastructure required for triage practice including the support services and training to the triage nurses in the triage policies of the organization and the triage procedures to be adopted on day-to-day work in triage practice. Initiating treatment in triage room calls for broader understanding and knowledge about the triage practices for efficiency in performance. Search strategy There are several permutations and combinations involved in deciding the appropriate course of treatment based on the analysis of symptoms. Triage protocols makes it easier since the diagnostic procedures are seamlessly integrated into the treatments required and the timeline. Inclusion and exclusion criteria in diagnostic process with reference to a particular treatment proposed are standardized. Search strategy mainly depends upon the Key Words. The search is conducted on the components for its causal link with the formal problem. This is followed by clinical trials. The validation of the proposed solution, the evidence of its usefulness, criteria for inclusion and exclusion are the important aspects of the search strategy development. For example, Stacey et al (2012) have found in a study â€Å"Acceptability and usability testing of the symptom populated template with 12 practicing oncology nurses revealed: high readability (n=12), just the right amount of information (n=10), appropriate terms (n=10), fit with clinical work flow (n=8), and self-evident for how to complete (n=5).† The important principles governing the template features in respect of clinical nursing protocol are given in Annexure - I. Review of the evidence based literature on triage protocol This paper seeks to provide evidence based literature review on triage protocol covering various aspects related to it. The guidelines issued by the international bodies, articles published in the medical journals and books have been used for the purpose the study. In the Literature Review Grid given under Appendix –III, the study/research type, method used or information available and the results and comments related to the source materials are given for highlighting the reliability of the materials used and its relevance to the study. There are various types of triage scales used in different countries. â€Å"Of note is the Manchester Triage System (MTS) used in the United Kingdom, the Emergency Severity Index (ESI) used in America and the Canadian Emergency Department Triage and Acuity Scale (CTAS).† (Monash Institute of Health Services Research, 2001) Triage decisions in respect of nursing are related to emergency care and normal patient care. In a study to assess the workability of triage system in community palliative care, it was found â€Å"