Monthly Archives: April 2013

The Student

From the point of view of e-learning platforms, there is a software that has a number of features that allow you to scan and manage educational content, where the student access to the same and undertakes certain activities. On these platforms it is converging a mix of synchronous, asynchronous tools and e-learning training and collaborative. There is a marked trend towards an e-learning that allows the student to develop content and an implicit collaborative system. In the literature on e-learning it is called e-learning for action or learning by doing. In this mode, when raises the student activity, the result of it is contained in the learning environment where the course is being held. Making a comparison with what would be a face-to-face class, teacher seeks opinions students students express the same, the teacher write down ideas on a Blackboard, but then delete it, instead, the equivalent of that interaction is recorded in a database, and this is equivalent to the teacher asks a question and the student has a channel to answer it, the student uses a form to generate a response, then, at the end of a course that is on the one hand is the result of knowledge in the mind of the student, but on the other hand is a tangible result, a mini knowledge base that has relationship with everything what occurred and interactions generated throughout the course. This clear trend usually appears under the expression learning by doing: while it makes you learn and also is a product of learning that can be taken by other participants. But e-learning is also moving to offer a virtual campus, members of the community to provide a framework for the exchange of information, which at the same time becomes a means of communication. At present, begin to appear in the e-learning some tools in the web world like blogs or wikis, where your content has been generated by community members on a voluntary basis, that when it is well done, and the community interacts in pursuit of a certain quality of content, really works.

Calcifications

Breast cancer is one of the most predominant tumors among women and is caused by an abnormal growth of cells in the breast, and may even spread to other organs in the body. For the cure of breast cancer, its detection on time is very important and most widely used for this purpose tests are:-self-examination and clinical examination: self-examination is based on observation and breast palpation by women to detect irregularities. The auto scan is recommended on a monthly basis to all women over age 20. The same woman is capable of timely detecting injury when it does well and even though you don’t have a very big impact on mortality, lesions in the early stages of the disease are detected and the majority of breast cancers are detected by the same patient, discovering a lump or nodule. After the detection has to be a clinical breast examination with what should be a complete medical history of the patient. Medical history includes the family history of breast cancer and hormone status. Clinical breast examination is based on a physical examination of the breast with its palpation, overseeing addition nipples and armpits. With the physical examination of the breast are allowed to detect a high percentage of lesions not detected by mammography.

-Mammography: screening mammography, also called mammography, consists of a flat image of the breast obtained through exposure to X rays. You get two projections with three-dimensional information of the situation of the lesion, so if we want to do a mastografico study to detect possible injury to a woman, we take two pairs of images: a craneo-caudal and another medio-lateral – oblique, for each breast. Due to the structure of the breast becomes difficult to be able to see an abnormality, since all their fabrics are identical. In a mammogram can find us with: 1. injuries which could not have been palpable, smaller than 0.5 cm if you are nodules. 2 Calcifications can never become palpable by its small size. 3. Asymmetries in the mammary density.

4. Distortion of the structure of the gland. Nodules appear in two photos, blending with the glandular tissue. The calcifications are calcium crystal deposits very small only detectable by mammography. After x-rays and depending on the concentration of the malign particles, a biopsy of the suspicious part will be taken to make a pathological analysis of the sample and thus determine the extent of the injury.

Michael Lewis

These scholars, from time series, detected the existence of an inverse relationship between democracy and poverty. To greater poverty, less democracy, or, put another way; rich countries would show stronger democracies, while those under-developed or developing nations would present democracies more fragile, broken or systems of Governments with absolutistic regimes. These conclusions can be constantadas part of a random sample of rich and poor nations. We could establish a direct relationship between GDP per capita (leaving the complexity of the term development for a moment) and democratic level of quality. This surface scan gives at least one elementary idea: stable and developed democracies generally boast a gross domestic product per capita of more than USD 1000.

The linkages between development and democracy have been studied since the middle of last century. Sociologist and American politician Semour Martin Lipset, already by the year 1959, in his book political man (2), argues that wealth favors the emergence of democracy, since more wealth means less conflict distributive and therefore less pressure on the political system. Wealth, argued, also favors the growth of base the middle class and education, all of which softens the social conflicts and generates an equality that promotes democracy. Other findings resulting from the work of the pair of academico-investigadores Michael Lewis-Beck and Ross Burkhart are that, although economic development would lead to the emergence of democracies, these, by themselves, do not lead to economic growth and the reduction of poverty. Low levels Educational, characteristic of groups immersed in poverty, infeasible formations of members well informed and predisposed for the democratic organization. There are also streams opposing proposed by Lipset, above the concept of democratic State to economic stability and even rank him as a requirement to achieve the growth and proilferacion of the economy. The International Monetary Fund (IMF), in its 2005 World Economic Outlook report argues that the transition towards economic institutions of good quality is more likely to occur in countries that are more open, have a greater obligation to political accountability () and are located in the same region than others that have relatively good institutions.

Systems Points

Access control systems facilitate the task of controlling rights of entry or use of certain particular inside a building areas, as well as information systems to the authorities of a particular institution. In general, it is considered to control systems of accesoss as a second layer in the security of a physical structure. In addition, access control systems can be physical or digital. Digital, are generally responsible for safeguarding the security of networks, limit or deny access to certain files, data, applications or other resources in an information system or a network of computers. A lot of security companies is responsible for providing these services. Physical access control systems to a group or a person controlling entry to certain areas within a facility or information stored on a computer. In terms of physical security, there are many components related to this type of systems.

An access control point control points It can be a door, a tourniquet, an elevator, the entrance of a parking lot or any other barrier where access must be authorized or denied. Most access points are the doors and can be controlled by electric locks. These locks are not handled by human operators, but by an electronic reader that determines the level of accessibility that is awarded to the visitors. Readers are many different types of readers who are used to control access points. Readers can use biometric to scan fingerprints, use boards for entering a password, or be used to read cards. Advances in networking technology developed over the past decade have led to increased use of IP readers.

Readers of control, generally do not take decisions, but yes they transmit information to a control panel where the appropriate level of access is checked. Control panels usually, control systems are based on the model hub and spokes, where readers are circulating as nodes around a center that is the own panel. Readers communicate with control panel via RS485 serial connections. Currently there are IP-based systems. This type of system uses standard networking and advanced computer programs to verify and evaluate the entry into access points. Integration of systems of control in addition to the above components listed, access control systems can be integrated with a wide variety of alarm systems. Alarm systems can be combined with control points extending coverage to prevent the misuse of some object. Fire alarm systems can be integrated with control points of accesoss to help a rapid evacuation in an emergency.