Sunday, January 26, 2020

Privacy Preserving Data Mining in Partitioned Databases

Privacy Preserving Data Mining in Partitioned Databases A survey : Privacy preserving data mining in horizontally partitioned databases Komal Kapadia, Ms.Raksha Chauhan _______________________________________________________________________________________________________ Abstract – Privacy preserving data mining techniques are introduced with the aim of extract the relevant knowledge from the large amount of data while protecting the sensible information at the same time. The success of data mining relies on the availability of high quality data. To ensure quality of data mining, effective information sharing between organizations becomes a vital requirement in today’s society. Privacy preserving data mining deals with hiding an individual’s sensitive identity without sacrificing the usability of data. Whenever we are concerning with data mining, Security is measure issue while extracting data. Privacy Preserving Data Mining concerns with the security of data and provide the data on demand as well as amount of data that is required. Index Terms – data mining, privacy preserving, ECC cryptography, randomized response technique. _______________________________________________________________________________________________ INTRODUCTION Data mining techniques have been widely used in many areas especially for strategic decision making. The main threat of data mining is to security and privacy of data residing in large data stores. Some of the information considered as private and secret can be bought out with advanced data mining tools. Different research efforts are under way to address this problem of privacy preserving and preserving security. The privacy term has wide range of different meanings. For example, in the context of the health insurance accountability and portability act privacy rule, privacy means the individual’s ability to control who has the access to personal health care information. In organization, privacy means that it involves the definition of policies stating which information is collected, how it is used, how customers are involved and informed in this process. We can considering privacy as â€Å"Individual’s desire and ability to keep certain information about themselves hi dden from others.† Privacy preserving data mining refers to the area of data mining that seeks to safeguard sensitive information from unsolicited disclosure. Historically, issues related to PPDM were first studied by the national statistical agencies interested in collecting private social and economical data, such as census and tax records, and making it available for analysis by public servants, companies, and researchers. Building accurate socio-economical models is vital for business planning and public policy. Yet, there is no way of knowing in advance what models may be needed, nor is it feasible for the statistical agency to perform all data processing for everyone, playing the role of a â€Å"trusted third party†. Instead, the agency provides the data in a sanitized form that allows statistical processing and protects the privacy of individual records, solving a problem known as privacy preserving data publishing. There are many methods for preserving the priva cy. In this surevey many methods try to compute the answer to the mining without revealing any additional information about user privacy. Progress in scientific research depends on the sharing and availability of information and ideas. But the researchers are mainly focusing on preserving the security or privacy of individuals. This issue leads to an emerging research area, privacy preserving data mining. For privacy preserving data mining, many authors proposed many technologies. The main aim of this paper is, to develop efficient methodology to find privacy preserving. LITERATURE SURVEY We have studied some of the related work for the privacy preserving in horizontally partitioned databases. Existing work for privacy preserving in horizonatally partitioned database has different types of techniques. TYPES OF PRIVACY PRESERVING TECHNIQUES Semi honest party Without trusted party With trusted party In without trusted party each party will calculate their own partial support and add their own random number and sends the result to the next party in the ring so that the other party will never know the result of others and in last the initiator party will disclose the result that is global support. In trusted party each party will calculate their partial support and send to the trusted party and add the own random number and send to the next coming site in the ring so that other party will never know the result of other parties after that trusted party will disclose the result and send to all sites that presents in the ring. Fig. 1 Framework of privacy preserving data mining[5] SECURE MULTIPARTY COMMUNICATION Approximately all Privacy Preserving data mining techniques rely on Secure multi party communication protocol. Secure multi party communication is defined as a computation protocol at the last part of which no party involved knows anything else except its own inputs the outcome, i.e. the view of each party during the execution can be effectively simulated by the input and output of the party. Secure multi party communication has commonly concentrated on two models of security. The semi-honest model assumes that every party follows the rule of the protocol, but is free to later use what it sees during execution of the protocol. The malicious model assumes that parties can arbitrarily cheat and such cheating will not compromise moreover security or the outcome, i.e. the results from the malicious party will be correct or the malicious party will be detected. Most of the Privacy Preserving data mining techniques assume an intermediate model, Preserving Privacy with non-colluding parties . A malicious party May dishonest the results, but will not be able to learn the private data of other parties without colluding with another party. (1)MHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE M. Hussein et al.’s Scheme (MHS) was introduced to improve privacy or security and try to reduce communication cost on increasing number of sites. Behind this main idea was to use effective cryptosystem and rearrange the communication path. For this, two sites were discovered. This algorithm works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites. This scenario was able to decrease communication time. Fig. shows MHS algorithm. The working of the algorithm is as follows: The initiator generates RSA public key and a private key. It sends the public key to combiner and all other client sites. 2. Each site, except initiator computes frequent itemset and local support for each frequent itemset using Local Data Mining . 3. All Client sites encrypt their computed data using public key and send it to the combiner. 4. The combiner merges the received data with its own encrypted data, encrypts it again and sends it to initiator to find global association rules. 5. Initiator decrypts the received data using the private key. Then it merges its own local data mining data and computes to find global results. 6. Finally, it finds global association rules and sends it to all other sites. Fig.2 MHS algorithm[11] (2) EMHS ALGORITHM FOR HORIZONTALLY PARTITION DATABASE Enhanced M. Hussein et al.’s Scheme (EMHS) was introduced to improve privacy and reduce communication cost on increasing number of sites. This algorithm also works with minimum 3 sites. One site acts as Data Mining Initiator and other site as a Data Mining Combiner. Rests of other sites were called client sites . But this algorithm works on the concept of MFI (Maximal Frequent Itemset) instead of Frequent Itemset. a) MFI (Maximal Frequent Itemset): A Frequent Itemset which is not a subset of any other frequent itemset is called MFI. By using MFI, communication cost is reduced . b) RSA (Rivest, Shamir, Adleman) Algorithm: one of the widely used public key cryptosystem. It is based on keeping factoring product of two large prime numbers secret. Breaking RSA encryption is tough. (3)MODIFIED EMHS ALGORITHM FOR HORIZONTALLY PARTIOTION DATABASE In this technique, they used modified EMHS algorithm for improving its efficiency by using Elliptic curve cryptography. Here Elgamal cryptography technique is used which is of ECC for homomorphic encryption. ELLIPTIC CURVE CRYPTOGRAPHY Elliptic curve cryptography provides public cryptosystem based on the descrete logarithm problem over integer modulo a prime. Elliptic curve cryptosystem requires much shorter key length to provide a security level same as RSA with larger key length. In this elgamal cryptography is used. ELGAMAL CRYPTOGRAPHY a)A wishes to exchange message M with B[9]. b) B first chooses Prime Number p, Generator g and private key x. c)B computes its Public Key Y = gx mod p and sends it to A. d) Now A chooses a random number k. e) A calculates one time key K = Yk mod p. f) A calculates C1 = gk mod p and C2 = M*K mod p and sends (C1,C2) to B. g) B calculates K = C1x mod p h) B calculates K-1 = inverse of K mod p i)B recovers M = K-1 * C2 mod p j) Thus, Message M is exchanged between A and B securely. In this system, Elgamal cryptography paillier cryptosystem is used. Here, Elgamal cryptography is used for security purpose. Compared to EMHS algorithm here performance is better in terms of computation time. RANDOMIZED RESPONSE TECHNIQUE In this technique, here mainly focused on CK secure sum in randomized response technique for privacy preserving. Here, the multi party transaction data who discover frequent item sets with minimum support. In the randomized response technique, consider the data sets I = {I1, I2, I3†¦Ã¢â‚¬ ¦In} and the random number or noise part are denoted by R= {R1, R2, R3 †¦Rn}, the new set of records are denoted by I1+R1, I2+R2 †¦.In+Rn and after that take a partial support Pij = {Pi1, Pi2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..Pin} so that partial support is P ij=I+R[10] I=Pij-R[10] In Randomized response secure sum technique, secure sum each site will determine their own data value and send to predecessor site that near to original site and this goes on till the original site collects all the value of data after that the parent site will determine the global support. CK SECURE SUM ALGORITHM[10] Step1:-Consider parties P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Pn. Step2:-Each party will generate their own random number R1, R2†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.RN Step3:-Connect the parties in the ring (P1, P2, P3†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦PN) and let P1 is a protocol initiator. Step4:-Let RC=N, and Pij=0 (RC is round counter and Pij is partial support) Step5:-Partial support P1 site calculating by using following formula Psij = Xij.support – Min support * |DB| + RN1 – RNn Step6:-Site P2 computes the PSj for each item received the list using the List using the formula, PSij= PSij + Xij. Support – minimum support * |DB| +Rn1-Rn (i-1) Step7:-While RC! =0 begin for j=1 to N do begin for I=1 to N do Step8:-P1 exchange its position to P (j+1) mod N and RC=RC-1 end Step9:-Party P1 allowance the result Pij Step10:-End In ck secure sum technique, mainly focused on for computing global support within a scenario of homogeneous database and provides the high security to the database and hacking of data is zero. CONCLUSION In this paper we reviewed five privacy preserving technique in horizontally partitioned database. In MHS algorithm RSA cryptography is used. In EMHS algorithm, by using MFI approach accuracy is high compared to MHS. Modified EMHS algorithm used elgamal technique so privacy is high than EMHS technique. Randomized response technique provides high security to the database compared to other techniques. In future we can compute less number of rounds instead of n number of rounds. Here , we can use encryption technique for encrypting random number and sends it to the predecessor. REFERENCES [1] Neelamadhab Padhy, Dr. Pragnyaban Mishra Rasmita Panigrahi. â€Å"The Survey of Data Mining Applications and Feature Scope.† 2012 IJCSEIT. [2] Xinjun qi, Mingkui zong. â€Å"An overview of privacy preserving data mining.† 2011 ICESE. [3] Kishori pawar, Y.B. gurav. â€Å"Overview of privacy in horizontally distributed databases.† 2014 IJIRAE. [4] Manish Sharma, Atul chaudhary , Manish mathuria Shalini chaudhary. â€Å"A review study on the privacy preserving data mining techniques and approaches.†. 2013 IJCST. [5] Shweta taneja, shashank khanna, sugandha tilwalia, ankita. â€Å"A review on privacy preserving data mining: techniques and research challenges.† 2014 IJCSIT. [6] Jayanti dansana, Raghvendra kumar Jyotirmayee rautaray. â€Å"Techniques for privacy preserving association rule mining in distributed database.† 2012 IJCSITS. [7] Xuan canh nguyen, Tung anh cao. â€Å"An enhanced scheme for privacy preserving association rules minig on horizonatally distributed databases.† 2012 IEEE. [8] Manish Sharma, Atul chaudhary, Manish mathuria, Shalini chaudhary Santosh kumar. â€Å"An efficient approach for privacy preserving in data mining.† 2014 IEEE. [9] Rachit v. Adhvaryu, Nikunj h. Domadiya. â€Å"Privacy preserving in association rule mining on horizontally partitioned database.† 2014 IJARCET. [10] Jayanti Dansana , Raghvendra Kumar , Debadutta Dey. â€Å"Privacy preservation in horizontally partitioned databases using randomized response technique.† 2013 IEEE. [11] Rachit v. Adhvaryu, Nikunj h. Domadiya, â€Å"Research Trends in Privacy Preserving in Association Rule Mining (PPARM) On Horizontally Partitioned Database†. 2014 IJEDR. [12] Agrawal D. Aggarwal C. C. On the Design and Quantification of Privacy-Preserving Data Mining Algorithms.ACM PODS Conference, 2002. [13] D.W.Cheung,etal.,Ecient Mining of Association Rules in Distributed Databases, IEEE Trans. Knowledge and Data Eng., vol. 8, no. 6, 1996,pp.911-922.

Saturday, January 18, 2020

Informative Paper Essay

Introduction I. Attention-Grabbing introduction: Staple center, Los Angeles, California. Friday November, 4th 2013 1:24PM The Championship match. After a weekend full of ups and downs, twist and turns it all comes to this. 1 week earlier, the previous Friday thousands have flown down to the heart of it all. Crowded around the event hall doors, people everywhere, spectators itching to get the best seats. Players going over in game builds, timings, and strategies just one more time until the doors finally open. 8 teams of 5 players to a team were seated into the week long tournament and now only two remain. Royal Club and SK Telecom are season veterans of League of Legends and now they sit on opposite ends on top of the world championship main stage. Ready to compete head to head for the grand prize of 1 million dollars in front of 1000s right there in Los Angeles and millions watching from all around the world. II. Topic: These millions from around the world have emitted their love for gaming into a hugely popular phenomena known as Electronic sports or better known as of E-Sports. Viewership has seen explosive growth in 2013 and is still growing with no sign of deterrence. Now with the integration of technology into our culture a new type of athlete has risen. One that doesn’t achieve victory heavily based on the bronze that is armed but with the critical thinking and reflex of the mind. An outsider might find this such a concept laughable but these pro gamers are far from any negative stereotypes you may have. III. Ethos & Audience Adaptation: My name is Jonathon Allen and I have been a fan and member of the E-Sports community for nearly a decade. I have had opportunities to play professionally at the MLG North American Regionals in Columbus and New York  in 2012 which I have placed 2nd and 3rd in out of 30 teams. Over the years I have also conducting extensive research on E-Sports ranging from players and teams to the technology side of running and mending events in the industry. E-Sports can be a lot to digest for someone looking in for the first time so I’ll explain exactly what and how big E-Sports really is including the potential E-Sports has to expand and grow. Before we go any further I’d like to present this video to visually show you exactly what E-Sports is and most importantly what it feels like. Visual Aid! Body I.This is E-Sports, competition at its finest. Players competing for cash prizes ranging from thousands to millions. Top players make 6 figure incomes and are even sponsored by big corporations such as Monster, Intel, Redbull, Asus, and Kingston. Pro gamers are locked into head to head combat in games like League of Legends. A DOTA-MMO style game that’s played as a team of 5 people VS 5 people. The object of the game is strategizing on how to win by taking the enemies base while leveling up and generating gold. Most games usually last around 40 minutes. II.You may ask; why would someone watch someone else play a video game? That’s simple; the excitement from watching others play video games stands as the same excitement we get from watching other athletes perform at sports such as football. T.J. Heffer from PC gamer Magazine states â€Å"What makes any competition interesting is watching very skilled individuals struggle for victory in a setting where the outcome is uncertain and the moment to moment back and forth keeps you on your toes.† Heffer continuous â€Å"Rather or not you want to call them sports they showcase people with amazing critical thinking, planning, and decision making skills and frankly inhuman reflexes as well. The level of professional level in a game lie League of Legends is mind boggling.† Professional gamers put their heart and soul into the game. They have drive, passion, hard work and dedication just like any professional athlete you can think of. III.As I’m assuming E-Sports may be alien to many of you but in nations like South Korea games such as StarCraft have already become something of a national sport. Paul Tassi of Forbs Magazine said â€Å"Overseas, top players are treated like professional Athletes.† Though South Korea has become atoned to the notion of playing games professionally North America believe it or not is where the biggest interest for pro gaming lies. In North American E-Sports, leagues and organizations have risen and grown in the past 3 years. In of these leagues the biggest E-Sports organization is Major League Gaming or MLG. Founded in 2002 Major League Gaming features numerous tournaments in a year where various gamers fly out to major cities across the US like Columbus to compete. In MLG’s Annual Viewership Report for the 2013 season they reported 15 million unique viewers tuned into watch online during the 2013 season. As those 15 million viewers tuned in last year it’s clear that E-Sports has already landed a very stable footing into the hearts of Americans across the United States. But perhaps even more thrilling and exciting is the growth that E-Sports has already shown. Between 2010 – 2013 MLG has seen a 733% growth in viewership from 1.8 million to 15 Million. Comparing that to the NFLS record growth of 18% in the past 3 years that’s 715% more than the NFL. Let’s not down play the viewership of the NFL which has recorded a record of 28.1 Million viewers for their 2013 – 2014 season. But you start to understand thus to how much potential E-Sports has when MLG a company that’s only been around for 11 years has acquired a viewership of 15 million. Just a little above half of the NFLS record viewer count 28.1 an organization that has been around for nearly a 100 years. Conclusion With these statistics of expansion and with how overseas treats E-Sports like a national sport and with pro gamers possessing the same set of virtues that any professional athlete has along the millions around the globe that  already are a part of the community only drives E-Sports. It’s not really a question of is it, it’s really a question of when! When asked about where he sees E-Sports going and what to expect of the industry. MLG Co-Founder Sundance DiGiovanni in a position that puts him at the hell of the entire E-Sports industry told Forbs Magazine in 2012 â€Å"that in 5 years he expects E-Sports to be a globally recognized phenomena. A truly established global sport.†

Friday, January 10, 2020

Equality, Diversity and Inclusion Essay

Diversity – The differences between individuals in society, differences could stem from ethnicity, gender, sexuality, disabilities and appearance. Equality – Each individual having the same opportunities to achieve and experience life to the same standard as other individuals Inclusion – The process of identifying differences and barriers in individuals and working towards adapting activities or experiences to enable the individual to participate Discrimination – Treating someone less favourably than other individuals because of differences such as; ethnicity, gender, sexuality, disabilities and appearance Participation – Enabling all individuals to join in and experience activities to their highest capability According to the ‘Every Child Matters’ government publication there are 5 outcomes that can directly link to the importance of equality, diversity and inclusion and how they can be achieved; †¢Being Healthy – ‘so that they are physically, mentally, emotionally and sexually healthy, have healthy lifestyles and choose not to take illegal drugs’. A child or young person who has been enabled to participate and be included among others is more likely to develop well emotionally, physically and mentally †¢Staying safe – ‘from maltreatment, neglect, violence, sexual exploitation, accidental injury and death, bullying and discrimination, crime and anti-social behaviour in and out of school, have security and stability and are cared for’ A child or young person who has been educated from an early age about different cultures and backgrounds will be less likely to grow up to discriminate, bully or show anti-social behaviour to people of different cultures and backgrounds †¢Enjoying and achieving – ‘so that they are ready for school, attend and enjoy school, achieve stretching national educational standards at primary and secondary school, achieve personal and social development and enjoy recreation’ A child or young person who has gone through their school life being discriminated against may not achieve personal and social development resulting in them not achieving the grades they need to go on to further education, employment and not being able to successfully deal with significant life changes in later life. †¢Making a positive contribution – ‘so that they engage in decision-making, support their community and environment, engage in law-abiding and positive behaviour in and out of school, develop positive relationships, choose not to bully and discriminate, develop self-confidence, successfully deal with significant life changes and challenges and develop enterprising behaviour’ A child or young person who has not been educated well about diversity and has grown up discriminating and being prejudice against others are less likely to grown up to be law-abiding and show positive behaviour or build positive relationships. †¢Achieving economic well-being – ‘so that they engage in further education, employment or training on leaving school, are ready for employment, live in decent homes and sustainable communities, have  access to transport and material goods, live in households free from low income’ Again, if a child or young person has been discriminated against at school they may not finish their education and not go on to achieve the grades they need to go on to further education or employment. SHC 33 – 1.2 Discrimination on an individual can cause them to lose their potential in society and not develop fully in their abilities, talents and education. In later life they may not be able to make a full contribution to society. It will affect friends and family by making them not feel welcome for example; in child care settings, schools or employment settings. Those who inflict discrimination on others may go on to have a false and distorted outlook on life; they may also go on to not be law-abiding as they grow up as discrimination itself is against the law. SHC 33 – 2.1/CYP 3.7 – 2.1 There are legislations and codes of practise that relate to equality, diversity and discrimination such as: Every Child Matters – is a government initiative for England and Wales. It was set up partly in response to the  death of Victoria Climbià © to ensure that children, no matter what background or circumstance they come from will be supported to; †¢Stay safe †¢Be healthy †¢Enjoy and Achieve †¢To achieve economic wellbeing †¢To then go on to provide a positive contribution to their community` UN convention on the Rights of the Children – in 1989 world leaders officially agreed that children under the age of 18 should have the right to †¢An education – children have the right to free primary and secondary school educations. Discipline in schools must respect the child’s human dignity †¢To be healthy – the government must provide good quality health care, clean environments, clean water and nutritious food. Rich countries must help poorer countries to achieve this also †¢Knowledge of information and rights – All children should be able to access reliable information from the media that they will understand. The government must also make rights of children known to adults and children. †¢To live without discrimination – the convention applies to every child no matter what ethnicity, gender, religion and abilities they have. The convention also gives children the freedom of speech and thoughts of their own SHC 33 à ¢â‚¬â€œ 3.3 Discrimination should be challenged when we encounter it. If adults or children behave in discriminatory ways in the setting, there should be strategies to carefully challenge what has been said or done. It is important to support anyone who has been discriminated against however, it is also important to support anyone who is behaving or speaking in a discriminatory way. So that hopefully they will change their behaviour for the future. It is important to challenge discrimination in a way that promotes change. Children are easily influenced by the adult world around them and can pick up prejudiced views and even behave in discriminatory ways. Settings should be celebrating our differences, abilities, ethnicities and cultures so children and parents can see them in a positive way. This could be done by implementing celebration boards, having dressing up clothes from different cultures, having books about different cultures/abilities/religions. CYP 3.7 – 1.1, 3.1 There are many social, economic and cultural factors that can impact on the lives of children and young people. Children and young people who are in care may suffer educationally e.g if a child or young person has recently been fostered or adopted there may be a lot for them to deal with emotionally especially in cases where abuse has been involved. Poverty can affect the mental and physical health of children and the parents as the income may not be enough to provide for the family as CYP 3.7 – 1.1, 3.1 – continued hoped and accommodation may be poor e.g. may have damp which can cause health problems. Living in a community amongst others with anti-social behaviour can isolate some families making parents reluctant to let children play out and socialise with others. Rural communities can also get isolated from others due to being far away from educational and health facilities with limited transport. A parent or child who has a disability could have their educational development greatly affected. A child with a disability could miss a lot of school due to illness or hospitalisation; this could also affect their social and emotional development due to missing out on communicating with peers in educational and every day environments. A child whose parent has a disability may be a carer to their parent and miss out on every day activities and communication with children their own age. Bereavements in families can affect the emotional and physical health of children and their parents e.g. if a parent loses a child it could have a knock on effect on the remaining children, seeing a parent finding it difficult to cope with the loss could make it even more difficult for the remaining children to come to terms with the loss. Different cultures can affect children and young people e.g. families that live in a way that varies from the norm; same sex couples may be discriminated against by  anti-social individuals, which can affect the family as a whole emotionally and socially. Children from travelling families can have their educational development affected if they change schools often. CYP 3.7 – 1.2 The income of parents can determine the outcome of children’s prospects of life choices and good health. Income affects the different types of areas in which children are brought up e.g. inner-city/suburban/rural, the quality of housing and the quality of food provided. †¢Infant mortality rates are highest in families that earn the lowest incomes †¢The chances of poor health in later life are greater †¢Child accident rates are more than twice as higher †¢Statistically, children from lower income families are likely to have poorer health than those from higher income families, often resulting from poor housing conditions, poor quality food, stress or depression †¢Young adults may have less chance of employment in the future resulting from low achievement in education †¢Children from lower income families are more likely to be involved in crime later on in life †¢At school children are less likely to achieve to their full potential

Thursday, January 2, 2020

Reflection Journal - 935 Words

Reflection Journal – Pierce Fire Department Charity Rominger Before my shift with the fire department, if an emergency arose, I would call 911 and watch as they cared for the individual and whisked them away. This time, however, I was part of the emergency response team and was able to observe their inner workings. My time at the fire department was eye-opening to the various roles that everyone fulfills and the multitude of equipment and protocols that they must know and perform. My day started with a tour of the facility and an overview of the equipment. I was also able to observe as they checked and restocked equipment and passed off from one shift to the next. They have multiple people in each unit that are cross-trained to†¦show more content†¦I also had the opportunity to practice reading a 12-lead ECG strip. The atrial fibrillation was obvious on the strip and I could see that the rhythm was irregularly irregular. The medic referred to it as afib with RVR but I was unsure and could not remember what RVR meant. I was abl e to look it up afterward and now I know that it Is rapid ventricular rate. While we were at the hospital dropping off this patient, another medic had arrived with a possible stroke patient and I was able to go with them to the CT and see them prep the patient and watch as the CT was done. It was a very interesting process to see in person. Seeing the CT first hand helped solidify the different aspects of a CT that I have read about in our textbook such as how long it takes, and what type of preparation is needed. It was also cool to watch the machine as it adjusted to the angle set by the operator and then to see the slices of the brain come up on the screen. Our final call of the day happened during training. I had gone with everyone from the station to the headquarters for a training session, but we had to leave their training session early to transport a patient experiencing low blood pressure. The individual had existing Wernicke’s encephalopathy. When we were receiving the report on the patient and Wernicke’s was mentioned along with CVA symptoms, I originally thought that they were referring to the Wernicke speech area. I learned later that theyShow MoreRelated Journals, Reflection, and Learning Essay2135 Words   |  9 PagesJournals, Reflection, and Learning A journal is a crucible for processing the raw material of experience in order to integrate it with existing knowledge and create new meaning. Among the many purposes for journal writing are the following: to break habitual ways of thinking; enhance the development of reflective judgment and metacognition; increase awareness of tacit knowledge; facilitate self-exploration and personal growth; and work out solutions to problems (Andrusyszyn and Davie 1997; MitchellRead MoreReflection Of The Learning Journal740 Words   |  3 PagesThe Learning Journal is an important component of your learning in this course. Only you and your instructor will have access to the Learning Journal. You are expected to use it each week to: †¢ Reflect on your learning. †¢ To complete assigned tasks, such as summarizing articles and engaging in self-reflection on assignments. †¢ Note down unfamiliar words and their definitions. The Learning Journal comprises 10% of your Final Grade. Days of the week Activities during the week Thursday 07/06/2017Read MoreReflection On The Practicum Journal1185 Words   |  5 PagesJournal: Week 7 The practicum journal allows for the joining of knowledge, practice and reflection. In week five, the subject matter was atypical presentation. In week six, the subject was the impact of dementia, delirium and depression on the elderly. The purpose of this paper is to reflect on my practicum from weeks five and six while covering atypical presentation and dementia. Week Five: Atypical Presentation Patient is a 68-year-old WF who was admitted for extended recovery from sepsisRead MoreA Reflection Of A Reflective Journal1593 Words   |  7 PagesA ‘reflective journal’ which is a document written by a student to record the progress of learning. It is a personal record of the student s learning experiences and is a space where a learner can record and reflect upon their observations and responses to situations, which can be used to explore and analyse ways of thinking. The aim of this particular journal is to show thoughts, reflections and experience recorded during the Postgraduate Diploma in Business Enterprise (PGDipBE) which I followedRead MoreReflection Paper : Awareness Reflection Journal Essay968 Words   |  4 PagesMindful Awareness Reflection Journal 1. Acknowledge Describe your experience Chapter 8 from Tools for Mindful Living converged on how to mindfully accept my emotions, so they preserve less control over my actions. Emotions, whether positive or negative, acquire the power to modify behaviors, thoughts, and judgments. This power lies controversial, as society dictates the acceptance of emotional responses. For example, many men believe that they must conceal their emotions to prevent shame, whileRead MoreReflection Paper : Diversity Reflection Journal2144 Words   |  9 PagesDiversity Reflection Journal I had the pleasure of interviewing five great people that talk about their lives and how it all unfold before their eyes. Some shredded tears, laughed, took me on tours, and even shared photos of their lives. I had a great opportunity to share some background information about myself in so many ways, that most of them did not know that person lived in me. The five people that I interviewed were kept anonymous I have included their first initial, their full last name,Read Morereflection of a journal article2417 Words   |  10 Pagesexploring and generalizing English and Welsh children’s views on science and its assessment and ascertaining the extent to which decline in children’s engagement in science may be led by science assessment. This essay attempts to evaluate this journal article by analyzing its strengths and weaknesses from perspectives of the literature review, the research design, and trustworthiness of the research findings and conclusions. 1. Literature review Rather than presented in a separate sectionRead MoreNegotiation reflection journal1951 Words   |  8 PagesRudolph-Lama I played Chris Rudolph in this case, and did well in this negotiation by not only focusing on the final price, but also on the extra agreement of letting Lama provided high quality work to our company. When we started the negotiation, I suggested us to divide the total price into two parts, the first one was Market Research fee, and the second one was the Lama-Lee’s charge. After some initial discussion, I realized the Market Research fee was hard to negotiate, so I planed toRead MoreEssay on Clinical Reflection Journal700 Words   |  3 PagesClinical Experience Reflection Journal Name: Date: Week 1. Choose one patient (new mother, newborn, or pregnant/laboring woman) and identify the priority problem. What did you contribute toward resolving or easing the problem? N/A for this week 2. Provide an example of an incident during clinical that reinforced the theory you have learned in OB lectures. An incident that reinforced what I have learned in lecture was the postpartum hemorrhage simulation. I learned how chaoticRead MoreReflection Journal in International Business1692 Words   |  7 Pages1. When I was given the slides by Mr Dasilva, my heart pounded. Oh no†¦. International Business. It sounded so global and dry. I was hoping that it will be somewhat similar like Marketing. However, we were told that International Business is defined as Globalisation of Business where countries are more integrated and are interdependent on world economy. Which is similar like Marketing but in a wider view. Approaching to the learning of International Business, students were told on the Problem Based