Saturday, August 31, 2019
Psychological Disorders Essay
Psychological Disorder Analysis This psychological analysis is about Maria a 42 year old Hispanic female who comes into the mental health clinic complaining of feeling jumpy all of the time, she has trouble sleeping and is enable to concentrate on her work as an accountant. These symptoms are causing problems for her at work. There can be many causes for her symptoms but to get to the root of her issue a clinical assessment, diagnoses, and proper treatment for her disorder will be submitted. Maria comes into the clinic complaining of having trouble sleeping, feeling jumpy all the time, she has trouble concentrating on her work which seems to be causing an issue. A clinical interview is done first on Maria to attain some background information. Clinical interviews questions are 1. What brings her to the clinic? 2. When did these feelings start and did an event trigger them? 3. Do these feelings last long? 4. What is her relationship with her parents? 5. What is her relationship with her siblings? 6. What type of work does she do? 7. What are her romantic relationships like? 8. What was her childhood experiences like? 9. What makes her happy? 10. Does she have any medical problems or medication she is taking? A possible disorder is causing her symptoms. Because information was not given concerning her background, family or social life Mariaââ¬â¢s symptoms coincide with Dysthymic Disorder with major depression (University Of Phoenix, 2007). Dysthymic Disorder is known as double depression (Comer, 2011). It has symptoms of chronic and low level depression which reduces oneââ¬â¢s ability to function. Some individuals with Dysthymia experience insomnia, or hypersomnia, poor appetite and overeating. They also experience poor concentration or have difficulty making decisions. Some fail to attend to daily hygiene, some experience low energy and low self esteem which cause them to overlook their daily duties or job responsibilities (University Of Phoenix, 2007). Most say they have been unhappy or sad all of their lives which cause them not maintain healthy relationships (University Of Phoenix, 2007). Dysthymia also causes changes in feeling, thinking, and physical well-being (University Of Phoenix, 2007). Dysthymic disorder share symptoms with major depression. Both disorders share symptoms such as sleep difficulties, shyness, and social withdrawal; poor work performance,à irritability, and conflict with family and friends (University Of Phoenix, 2007). The main difference between the two disorders is the intensity and duration of the disorder. With major depression symptoms are more severe such as the individual may be so depressed they cannot get out of bed and have thoughts of suicide whereas with Dysthymia the depression is more muted where the person is able to function on some level, he or she may be getting out of bed, but they may not groom themselves (University Of Phoenix, 2007). The other difference is major depression needs episodes that last for at least two weeks whereas dysthymic disorder symptoms persist for at least two years (University Of Phoenix, 2007). Major depression is also common with minorities. Minority groups that live below poverty or come from family wh ose environment was impoverished tend to suffer from depression in higher numbers (Comer, 2011). Gender also plays a role in major depression women are twice as likely as men to receive a diagnosis of depression (Comer, 2011). To assess her case the DSM-IV is used. According to what Maria says her symptoms meet the criteria on the DSM-IV. Maria must display two of her symptoms for a period of 2 weeks or longer (University Of Phoenix, 2007). Maria did not indicate in this case study how long she had been experiencing symptoms. The case study did not indicate Mariaââ¬â¢s dress condition or hygiene neither did it indicate that she was shy or socially withdrawn. Maria may have developed dysthymic disorder through a behavioral process called learned helplessness. (University Of Phoenix, 2007). During an experiment dogs were placed in a cage with barricades and were exposed to a stimulus light which was followed by a shock (University Of Phoenix, 2007). They learned quickly through classical conditioning to fear the light (University Of Phoenix, 2007). In phase two of the experiment the shock was turned off and when the first group of dogs was exposed to the light they jumped over the barricade jumping to safety (Comer, 2011). When the second group of dogs encountered a large barrier they could not jump from the fear producing light to safety. When the light came on they ran around the cage barking and when they discovered escape was impossible they lay down and whimpered (University Of Phoenix, 2007). In ph ase 3 of this experiment all the barriers were removed, and the dogs could escape easily however, when the light came on the dogs that had been trapped made no effort to leave the cage, instead they lay down and whimpered (University Of Phoenix, 2007). What the experiment revealed is the dogs learned that even though they can escape nothing they can do will improve their conditions so in effect the dogs learned to be helpless (University Of Phoenix, 2007). Because Maria is Hispanic the multicultural perspective plays a role. Because of social norms, family structure, and background this should be all taken into account with minorities. Maria probably grew in an impoverish environment. Research shows that Hispanics are more likely to live a poorer environment that White American (Comer, 2011). Maria may feel that her life was precondition to remain this way even though she has made a life for herself as an accountant. Just like the dogs in her thinking she feels nothing she can do will change her conditions, even though she has opportunities to improve her life she has learned to be helpless which makes her sad and depressed which are symptoms of the disorder (University Of Phoenix, 2007). Multicultural research also shows that prejudice and discrimination against multicultural groups leads to higher anxiety and depression in minorities (Comer, 2011). Other probably causes for Mariaââ¬â¢s disorder is a biological imbalance or hormonal imbalance like those seen in major depression. Biological theorist believes abnormal behavior as an illness is brought on by a malfunctioning organism in the brain or brain chemistry (Comer, 2011). The brain is made up of billions of nerve cells called neurons (Comer, 2011). When an electrical impulse reaches a neuron it is stimulated to release a certain chemical called a neurotransmitter which travels to receptors (Comer, 2011). These receptors travel to other neurons telling them to fire or not fire (Comer, 2011). Neurotransmitters play a key role in carrying information through the brain. In Mariaââ¬â¢s case her neurotransmitters may be defective causing her symptoms (Comer, 2011). A hormonal imbalance can also trigger depressio n (Comer, 2011). A womanââ¬â¢s biological life changes as she ages triggering different hormone levels (Comer, 2011). Although hormonal changes cannot alone cause depression alone important social and life events that occur with puberty, pregnancy, or menopause can (Comer, 2011). To treat dysthymic disorder biological treatments such as psychotherapy and medications like Prozac and Tofranil have proven to be helpful in reducing symptoms (University Of Phoenix, 2007). A variety of psychotherapeutic approaches can work as well. Cognitive behavioral therapy can challenge Marias unrealistic ideas,à pessimistic expectations and self-critical evaluations (University Of Phoenix, 2007). Therapy can help her to have a more positive outlook on her life, and can help her to prioritize both opportunities and challenges concerning her life (University Of Phoenix, 2007). Multicultural treatments such as culture-sensitive therapy can be used in which the therapist addresses issues faced by minority groups (Comer, 2011). In addition behavioral oriented therapy can help her adapt better coping skills and help her communicate more effectively with friends and coworkers (University Of Phoenix, 2007). In this case study Maria went to the mental health clinic complaining of having trouble sleeping, feeling jumpy all the time, an inability to concentrate on her work as an accountant. Interview questions were asked which lead to a diagnosis of dysthymic disorder with major depression. Probable causes for her disorder are rooted in a neuro chemical imbalance or a learned helplessness from her environment (University Of Phoenix, 2007). Treatment for dysthymic disorder is psychotherapy and medication to reduce the symptoms (University Of Phoenix, 2007).
Friday, August 30, 2019
Network Design Essay
The objective at hand was to build a network from the ground up. This was accomplished by breaking down all of the sections and building upon all previous assignments. This was a good course as I learned a lot about all of the different sections of building a network. The pros are now I know how to build a network on the design side from the ground up. I learned quite a bit about using a lot of the technologies associated with networking and it allowed me to learn quite a few new concepts. Some of the downfalls about this course and what I have learned are I did not feel I accomplished much as there is no hands on training associated with the course. I do not feel like concepts and design ideas are a great resource to actually learn how to use any of the systems but they do give a pretty good idea. Cabling SpecificationsEthernet is a Local Area Network (LAN) technology with a transmission rate of 10 Mbps and has a typical star topology. Computers and devices must wait-and-listen for transmission time on the network as only one device can transmit at any one time. In order to operate with this network strategy, Ethernet incorporates CSMA/CD (Carrie Sense Multiple Access with Collision Detection). Each device on the network listens for the network to be clear before transmitting data. If more than one computer or device transmits data at the same time, then collisions occur. Once collisions are detected, all devices stop transmitting for a period of time until one of the devices senses the line is free and will then gain control of the line to transmit its data. Receiving devices just sit there waiting and listening for transmissions that are meant for them, which are determined by an IP (Internet Protocol) address. The main advantage to Ethernet is it is one of the cheapest networks to put into service. Compared to other hardware for Token Ring, Ethernet equipment such as hubs, switches, network interface cards, and cable (Cat5 common) is inexpensive. The main disadvantage to Ethernet is related to the collisions that occur on the network. Even though Ethernet cable (Cat5) is fairly inexpensive, it can become a cost issue if designing a large network as each device or computer requires its own cable connection to the central hub. Another disadvantage is distance limitation for node connections. The longest connection that can occur within an Ethernet network without a repeater is 100 meters. Todayââ¬â¢s Ethernet standards, 100 Mbps and 1000 Mbps, incorporate switched technology, which for the most part, eliminates collisions on the network. The IEEE (Institute of Electrical and Electronics Engineers) specification for Ethernet is 802.3 with three-part names designating the different types. For example, 10BASE-T is for 10 Mbps, and 100BASE-TX is for 100 Mbps. Token RingToken was developed by IBM as an alternative to Ethernet. The network is physically wired in star topology, but is arranged in a logical ring. Instead of a hub or switch like in an Ethernet network, a MAU (Multistation Access Unit) is used. Access to the network is controlled by possession of a token that is passed around the ring from computer to computer as data can only travel in one direction at a time. A computer that wishes to transmit data on the network takes possession of the token and replaces the token frame with data. The data goes around the ring and returns to the transmitting computer, which removes the data, creates a new token, and then forwards it to the next computer. The IEEE specification for Token Ring is 802.5 and it comes in two different speeds: 4 Mbps and 16 Mbps. The main advantage to Token Ring is there are never any collisions within the network, which makes it a highly reliable solution for high-traffic networks. The disadvantage to Token Ring is the network cards and MAU are more expensive than equivalent Ethernet hardware. FDDIFDDI (Fiber-Distributed Data Interface) is an architecture designed for high-speed backbones that operate at 100 Mbps, which are used to connect and extend LANs. A ring topology is used with two fiber optic cable rings. Ità passes a token on both rings and in opposite directions. The specification for FDDI is designated by the American National Standards Institute as ANSI X3T9.5. The advantage to FDDI is that it uses two rings for protection in case one ring breaks. When a break occurs, data is rerouted in the opposite direction using the other ring. It is also considered reliable because it uses a token-passing strategy. The disadvantage to FDDI is the expensive network cards and fiber optic cable. In addition, the amount of fiber optic cable is doubled because it has redundant rings. WirelessLocal Area Network (LAN) TopologiesA mesh topology has a point-to-point connection to every other device (node) within the topology. The point-to-point link is dedicated between each device so it will only carry traffic to the two devices that is connected by that link. The advantage of a mesh topology is it works on the concept of routes, which means that traffic can take one of several paths between the source and destination. The network is also robust in that it will not be crippled if one path becomes unavailable or unstable due to each device being connected to every other device. The Internet uses a mesh topology to operate efficiently. The main disadvantage to a mesh topology is the fact that it requires a large number of cables, which is very expensive. A bus topology is a multipoint topology that entails each device being connected to a common link or path. The common link can be thought of as the backbone to the network. All devices typically connect to the backbone with a T-connector and coax cable. The main advantages of a bus topology are that it is easy to install and is not expensive (cost effective) because it uses very little cable to build. The main disadvantage is if there is a problem with the one backbone cable, then the entire network will no longer have the ability to communicate.à These networks are also very difficult to troubleshoot because any small problem such as a cable break, loose connector, or cable short can cause the outage. The entire length of cable and each connector must be inspected during troubleshooting. Another disadvantage is the lack of amplification of the signal, which results in a limited network size based on the characteristics of the cable because of how far a signal can travel down that cable. A ring topology means that each device is connected in a ring, or daisy-chain fashion, one after another. A dedicated connection only exists between a device and the device on each side of it. Data flows around the ring in one direction. Each device contains a repeater that regenerates the signal before passing it to the next device. The main advantage of a ring topology is that it is easy to install. One disadvantage includes difficulty to troubleshoot because data flows in one direction and it could take time to find the faulty device when there are problems. The entire network could be taken off line if there is a faulty device or cable break within the ring. The star topology has each device in the network connected to a central device called a hub, which can actually be a hub or switch. All traffic must pass through the hub in order to communicate with any other device on the network. There is no direct communication between devices like in a mesh topology. One advantage to a star topology is any failure to one cable or device connected to the hub will not bring the entire network down. Repairs can be done to individual nodes without disrupting traffic flow. Another advantage is expandability of the network. Additional devices can be added to the network without disrupting any of the current users. All that is required is an additional cable run from the device to the hub. One disadvantage includes cable costs because each device must have its own cable connected back to the hub. The other disadvantage is the hub itself.à Since all traffic runs through one device, it becomes the single point of failure. If the hub goes down, so does the entire network. Wide Area Network (WAN) DesignA WAN, also known as a Wide Area Network, is an essential part to bigger corporate networks most government networks and companies with multiple sites as well. A WAN, basically, is 2 or more LANs (Local Area Networks) stuck together and running as one big network over a big geographical area. Although a WAN could cover very small distances, most WANs cover much larger geographical areas such as a country or possibly even the world. The largest WAN today would technically be the internet or the World Wide Web. The internet is, in short, one giant WAN because it consists of many smaller LANs and servers. Most WANs can cover a fairly large geographical area, but some, such as the World Wide Web can cover the globe. The United States Government has quite a big WAN as a lot of their LANs are in other countries. They need to get data from one place to another almost instantaneously, and this is one of the quickest and easiest ways to be able to do so. To be able to get on the internet, a subscriber must go through an ISP (Internet Service Provider) and they will give the subscriber access to the internet for a certain price every month. There are different ways to get access to the internet depending on the geographical location in which you live. A subscriber can go through dial up, which is one of the slowest methods, but it is also one of the most common. There is also DSL (Digital Subscriber Line) through most phone companies if they have access in the area and cable which is usually one of the fastest and most expensive methods to access the internet. The last common method is using a satellite to obtain access. This is usually the most expensive ways to access the internet because the equipment usually needs to be bought. When talking about telephone lines, we start getting into analog versus digital signals and degradation over longer distances. A telephone system works on analog signals. These work by a computer transmitting a digitalà signal to the modem which converts the signal into an analog signal (this is the beeping heard when a computer dials up to access the internet) and later being converted by a different computer back into a digital signal with the use of a modem. DSL is digital all the way, along with T1 and T3 lines. When using DSL or T1/T3 lines, a filter of some sort is used to filter out the digital and analog signals, so the phone and computer are receiving different signals. Companies usually use faster lines to access the internet or to have access to their other sites. Smaller companies can use DSL or Cable internet services, but when talking about larger corporations or the government, most use public systems such as telephone lines or satellites. Usually, when talking about larger companies and going through a public system, we are talking much faster speeds that can hold many more users. T1 and T3 lines are usually used, satellites are commonly used and fiber-optic is becoming much more common. When getting into many users on a WAN, we need to start talking about Network Latency. According to Javvin.com network latency is defined as Ãâlatency is a measure of how fast a network is running. The term refers to the time elapsed between the sending of a message to a router and the return of that message (even if the process only takes milliseconds, slowdowns can be very apparent over multi-user networks). Latency problems can signal network-wide slowdowns, and must be treated seriously, as latency issues cause not only slow service but data losses as well. At the user level, latency issues may come from software malfunctions; at the network level, such slowdowns may be a result of network overextension or bottlenecking, or DoS or DDoS activity.ÃâDos or DDos stands for Denial of Service and Distributed Denial of Service respectively. These types of attacks are usually by hackers or someone who does not want others to access a certain service. There was a recent DoS threat on the CNN webpage as some hackers wanted CNN to stop talking about a certain issue. This works by one or multiple people talking all of the networks latency or bandwidth from them and thus causing other not to be able to access their site or services. There are other issues that may slow down a users PC as well. Not all issues revolve around hacker attacks. A lot of problems could be caused by malicious software, such as, Spyware, Malware, Viruses, or other programs that may be problematic. These can usually be taken care of by installing anti-virus software or even a spyware removal tool. The issue here is instead of the malicious software causing slowdowns on a PC, there are slowdowns due to the software protecting a certain computer in the background. Sometimes a simple fix to this problem is to defragment a hard drive. This can tremendously speed up a PC, because the files will be closer together and easier and quicker to access. On a network, a simple way to test latency is to use the trace route program. To do this, simply go to a command prompt and type tracert and then an IP address if internal or a website if external. This will send out packets of information and check how much time has passed to receive a packet back. The time passed would be the latency time. Usually it says it only took a certain amount of milliseconds which does not seem like very much time, but it was only a tiny packet of information. The higher the milliseconds the higher the latency time. The higher the latency time, the longer it will take to do anything in a network. If a high latency time is present, there is bound to be lag somewhere down the line. In a WAN, the equipment that will be used is as follows. In each LAN there will be PCs connected to a router somewhere (this is a ring topology example) and that router should be connected into a switch. There may be more but this is a basic example. Each of these LANs then connects to a central HUB somewhere which should interconnect all of the LANs. All of the information then travels to the central hub which is then separated out to the correct switch, router and then PC. There are usually central servers that can store and backup all of the data on the network as well, but this was an example of a crude network. Most companies also a very repetitious and redundant with their WANs. This is because they do not want a central failure point to bring the entire company to itÃâs knees. There are usually multiple switches that can tie theà entire system together. If a huge corporations Wan decided to fail, the company could lose a few million dollars in a matter of minutes. This is the main reason redundancy in this situation makes more than enough sense. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. A WAN is an imperative part to any corporation, government agency or company with multiple locations, as it allows them to transfer data quickly, easily and over great distances at the click of a button. There seems to be more and more need for employees in the networking field today, because more and more corporations need to transfer data quicker and easier. There will be new technology soon that will improve our current technology such as fiber optic. Network ProtocolsThere are many solutions to remote access and the most common and one of the most cost efficient methods is the VPN (Virtual Private Network). VPN technology is already built in to most operating systems and is very easy to implement. With bigger environments and corporations, a consideration for concentrated VPN hardware should be in place because of the simultaneous users and stress on the servers. There are a few different types of VPN including IPsec, PPTP and SSL. Once the connection from remote access has been made, you need to make sure the files are readily accessible for the user logging in remotely. One way to do so is to use Samba which is an open source file access system. Thereà are other ways to allow access as well. Using remote desktop connection, the user has the ability to log directly in to their PC and use it as if they were sitting at their desk, rather than away from the company. A lot of companies use software called VPN software. This software will let users login from the outside into their computer inside the company. This is a very nice system because if an employee needs to do work from home, they have access to everything they working on onsite. This is also helpful from an Information Technology perspective as it allows the Tech who is working on a remote problem login remotely and find out what the issue is, make any configuration changes and fix most software related issues without actually having to be onsite. This works well when being on call from an offsite location. There are other software packages that work well too. A lot of companies use PCAnywhere to do this type of work and Bomgar is another solution to be able to remotely login. Network Remote AccessMost companies need to be able to access their work from many locations, including home and while traveling. The solution that allows them to access the network is one of two ways to access their network. The first is through a VPN (virtual private network) that allows the user access to remotely log in easily and quickly. The other way is through a dial up remote connection; this way is a bit easier to set up but can become very costly in the long run. The problem with being able to do this is it can be very costly and can eat up much of the IT departments time to set up, configure and implement this system into the current hardware. The definition from whatis.com about a VPN is Ãâ virtual private network (VPN) is a network that uses a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organizationââ¬â¢s network. A virtual private network can be contrasted with an expensive system of owned or leased lines that can only be used by one organization. The goal of a VPN is to provide the organization with the same capabilities, but at a much lower cost. VPN works by using the shared public infrastructure while maintaining privacy through security procedures and tunneling protocols such as the Layer Two Tunnelingà Protocol (L2TP). In effect, the protocols, by encrypting data at the sending end and decrypting it at the receiving end, send the data through a ââ¬Å"tunnelâ⬠that cannot be ââ¬Å"enteredâ⬠by data that is not properly encrypted. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses.ÃâA VPN, also known as a Virtual Private Network is a helpful tool that allows users of a specific domain to be able to log in to their PC from anywhere in the world with the help of another PC. With this tool, they would log in with a special piece of software, using their user name and password to gain access to all functionality of the PC they want to log in to. This allows for a lot of comfortable solutions, such as if an employee is sick, they may still have an option to work from home. This allows a flexible company schedule as well because if a user needs to access a document from their home PC, they can essentially log in to their work PC and download the document. Network Business ApplicationsA second way to access oneÃâs computer from a different location would be using a dial up service, with this you can basically dial in to access all of their resources available within the server. Using this is a very secure and easy route to go, and allows the user access to files they may desperately need. Another good thing about using a remote connection to access a server is if the user is on a business trip, they have the ability to access all of their much needed documents easily and securely with out much fuss. The explanation between these two pieces of technology is Ãâwith dial-up remote access, a remote access client uses the telecommunications infrastructure to create a temporary physical circuit or a virtual circuit to a port on a remote access server. After the physical or virtual circuit is created, the rest of the connection parameters can be negotiated.With virtual private network remote access, a VPN client uses an IP internetwork to create a virtual point-to-point connection with a remote access server acting as the VPN server. After the virtual point-to-point connection is created, the rest of the connection parameters can be negotiated. ÃâThere are many advantages and disadvantages to using a dial up remote connection over VPN. The biggest advantage I have been able to find is, it is easier to setà up and maintain while using VPN makes you set up and maintain individual accounts for both the VPN and the users name and password on the system. Another advantage of dialing up in to the system would be the fact that no matter where the user is all they need to do is plug into a phone jack and they should be able to log in. The disadvantage of this is depending on where the user is long distance charges may apply and it could rank up a pretty penny or two. Another disadvantage is although the system is cheaper in the short term, the system may be more expensive than VPN in the long run. There are also other methods of using VPN. One specific way is certain ISPs (Internet Service Providers) and other third party support companies are assisting in setting up the VPN and supporting it without a great deal of time spent on it by the current department. This may or may not be more cost efficient than setting it up yourself, but it does remove a lot of the headache that VPNââ¬â¢s can give due to different errors. There are also many advantages and disadvantages to using a VPN over a dial up system. One of the biggest advantages to this system over a dial up system is in the long run this is a much cheaper system than a dial up system. This system is a little bit quicker than a dial up system as well. This system is cheaper than a dial up system because using a dial up system, long distance fees may apply, with the virtual private network, you do not need to worry about this as the user may call into a local internet service provider to gain access. Any internet connection will gain a user access to the companyÃâs network through a VPN. Through all of this, there still needs to be security measures put in place to keep unwanted users off of the system while allowing employees or other authorized users access without down time. VPNââ¬â¢s can work well with firewalls, all the IT department would need to do is allow the ports to be accessed by the VPN and the user should have full access. All in all, there are two very cost effective solutions at a companyÃâs finger tips and both are fairly easy to set up. The company needs to decide if they want to save money up front and make it easier so they do not needà to set up multiple accounts per user, or if they would rather have a better solution and save more money down the road. The choice also depends on the amount of users logging in at any given moment. Backup and Disaster RecoverySecurity, back ups and disaster recovery are all important very parts of all networks in todayââ¬â¢s world. The problem with today is information on how to hack, destroy and program any type of malicious software (or malware) is easily accessible via the Internet and other easy to access sources. There are roughly 1.4 billion people on the Internet or that at least have access to the Internet in the world, which is about 25% of the worldââ¬â¢s population. All of these people have extremely easy access to hacking networks, creating malware and destroying any personal or private data a user may have and wish to keep. There is not really any way to stop these people from harming our personal software and data from their side, this is why a user needs to make sure they have security on the userââ¬â¢s side. There are other things that happen besides people trying to maliciously harm a userââ¬â¢s files and data. Accidents can happen and destroy data as well. There could be many things that can harm a userââ¬â¢s data such as a fire, earthquake, power surge or worst case scenario, some sort of electro magnetic pulse (EMP). This is where data back ups and disaster recovery come in nicely. There are many companies that specialize in helping a user or company back up their data and store it off site such as SunGard (mostly used in bigger company settings). There are other ways to store a userââ¬â¢s data as well. One way is to make a physical copy of everything needed on CDââ¬â¢s, DVDââ¬â¢s, Flash Drive or some other type of media and store it at a friendââ¬â¢s house or some other personââ¬â¢s house they trust. This keeps a hard copy of all of their data off site just in case something happens and it can now be restored. There are a few other companies as well that offer on line backups. For this a user downloads their software and it automatically backs up to a few different location for redundancy which allows the customer more safety and easier access to all of their files. One of the first steps to a business that wishes to be very secure in allà that they do is to set up a backup and disaster recovery plan to start it all off. Like I stated earlier, there are many way s to do it. If this is a larger company they probably want to hire someone internally to make a physical back up of all the data and send it to an off site company for storage. They should also keep another copy close to them at all times, preferably away from where the physical data lies. They should put it on the opposite side of the building than where the file server is. If anything happens to the servers, they can quickly and easily use their backed up copy of all the data and recover it on to the servers in which they lie. Most companies have 2 or 3 backup units on site for redundancy and this allows that if one of those go down as well there are still a couple others in which they can restore all of the data from. Although this can become a little more expensive than just a regular back up system, sometimes it can be well worth it. Network SecurityAccording to devx.com Ãâthe first step in drafting a disaster recovery plan is conducting a thorough risk analysis of your computer systems. List all the possible risks that threaten system uptime and evaluate how imminent they are in your particular IT shop. Anything that can cause a system outage is a threat, from relatively common man made threats like virus attacks and accidental data deletions to more rare natural threats like floods and fires. Determine which of your threats are the most likely to occur and prioritize them using a simple system: rank each threat in two important categories, probability and impact. In each category, rate the risks as low, medium, or high. For example, a small Internet company (less than 50 employees) located in California could rate an earthquake threat as medium probability and high impact, while the threat of utility failure due to a power outage could rate high probability and high impact. So in this companyââ¬â¢s risk analysis, a power outage would be a higher risk than an earthquake and would therefore be a higher priority in the disaster recovery plan.ÃâAnother big part of any security system development is the company (or department) needs to look at their budget and how much they are willing to spend on their system. A company can get a basic security system for their network (including firewall) for fairly cheap and this may do most of what is needed, but larger companies are going to need to spend quite aà bit more money than that of a small company. Most larger companies spend quite a bit because they usually have higher priced clients that they can not afford to lose and all of their data is invaluable to the company. Some companies actually have their own Information System Security employees to monitor the network in case of any type of attack. They also make sure all of the anti-virus and anti-malware softwares are running and updating properly. Lastly, another thing most companies forget about after they have their equipment and software installed is there is more than just the implementation of the hardware and software to save them. They need to make sure everything continues to run and update itself from newer and bigger threats. These companies need to make sure they continually test and check what needs to be done to continually maintain a network that can not be broken in to. There are people out there that can be hired to try and break into a companies network. They get paid and let the company know what needs to be fixed so others can not break into it as well. In conclusion, a company can be nothing or brought to itââ¬â¢s knees with out itââ¬â¢s network and servers. There are many things that can cripple a company without the help of man. The only way to avoid these is to have a proper disaster recovery plan and to make sure the network is not vulnerable in any way. References About, Inc. (2004). Network topologies : bus, ring, star, and all the rest. RetrievedOctober 12, 2004, from http://compnetworking.about.com /library/weekly/aa041601a.htmBrain, M. (2004). How stuff works : how wifi works. Retrieved October 12, 2004,from http://computer.howstuffworks.com/wireless-network.htm/printableNetwork Latency. (n.d.). Retrieved April 27, 2008, fromhttp://www.javvin.com/etraffic/network-latency.htmlBroadband Internet. (n.d.). Retrieved April 27, 2008, fromhttp://www.pcworld.idg.com.au/index.php/id;988596323Wide Area Networks.(n.d.). Retrieved April 27, 2008, fromhttp://www.erg.abdn.ac.uk/users/gorry/course/intro-pages/wan.htmlVirtual Private Network. (n.d.).retrieved May 11, 2008, fromhttp://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci213324,00.html#VPN vs. Dial up. (n.d.). Retrieved May 11, 2008, fromhttp://technet2.microsoft.com/windowsserver/en/library/d85d2477-796d-41bd-83fb-17d78fb1cd951033.mspx?mfr=trueHow to Create a Disaster Recovery Plan, RetrievedMay 23, 2008, from http://www.devx.com/security/Article/16390/1954World Internet Usage Statistics, RetrievedMay 23, 2008, from http://www.internetworldstats.com/stats.htm
Thursday, August 29, 2019
Philosophy and Society Assignment Example | Topics and Well Written Essays - 250 words
Philosophy and Society - Assignment Example Men benefit from philosophy through defining the sense of the world. Different theories are on hand and more theories are yet to be discovered. Hence, these theories allow a person to see the world in varying perspectives, providing different perceptions and allowing one to establish his or her own standards which can help him make the best decision for his self. Contemplating and deciding on oneââ¬â¢s future education and career is more rational through philosophy. Having a philosophy in life aids in having a clearer vision of what one wishes to believe in, what one wishes to pursue and where path one wishes to go. Philosophy is in great correlation with ethics as ethics gives one an idea on what you ought to do in a particular situation and why one ought to do it. Moreover, philosophy also aids in discovering oneââ¬â¢s self. The main value of philosophy is thinking and questioning the realities of the world like why one does a thing and why one does not. According to Bertrand Russel, ââ¬Å"The man who has no tincture of philosophy goes through life imprisoned in the prejudices derived fromâ⬠¦habitual beliefs of his age or his nationâ⬠(Carroll, n.d.). Philosophy opens windows and doors that lead to continually liberate manââ¬â¢s mind from certain beliefs passed on by their forbearers by discovering oneââ¬â¢s perception of the world. The importance of philosophy lives in every individualââ¬â¢s desire to seek knowledge, learn and unravel the mysteries of the world. This further leads into innovation, progress and development of the self and of the world where one lives. Oneââ¬â¢s thoughtfulness fuel the need to continuously see beyond what is visible, listen beyond what is audible and think beyond what is
Wednesday, August 28, 2019
Paradise Lost by John Milton term paper Essay Example | Topics and Well Written Essays - 2250 words
Paradise Lost by John Milton term paper - Essay Example venge over this, Satan or the Lucifer, in other words, decided to bring the downfall of man by making them to eat the forbidden fruit in the Paradise or the Garden of Eden. Consequently, one may have the temptation not to believe in Christianity by basing on the reason on what could make God allow Serpent to revenge on His creation (God) if He truly loved them. The story of the Paradise begins from hell where both the Lucifer and his followers recover from the defeat after losing the battle initially in the war they had with God. For example, they constructed a monument that they referred to the Pandemonium where they were weighing the options of making a return to battle or just to forfeit it by accepting the defeat. Consequently, they also had the considerations of exploring the new world contained in the prophesies of creation for effecting the safe infliction of their planned revenge against mankind. As a way of enforcing their mission with full force, Satan decided to undertake the task alone minus engaging his followers. He feared that his followers might suffer extreme damage or run away from him during the battle (Driven, 45). At the onset of the mission, Satan made a return to the earth through the serpent. As a serpent, Satan enticed Eve upon meeting her alone to have a taste of the fruit of the forbidden tree. Adam also with no fate also decided to eat the fruit (McGovern 45). Consequently, the two lost their innocence and, as a result, came to their senses that they are naked. Followed by the urge to protect themselves from shame and despair of such scenario, they became hostile to each other. However, Adam and Eve reconciled with each other despite Gods order to angel Michael to expel them from Paradise. In addition, the angel showed the pair the consequences of disobedience to God due to eating the fruit from the forbidden tree. Adam got saddened upon imagining the consequences of the sin told to him by Angel Michael though he got relieved from
Tuesday, August 27, 2019
Strategic planning challenges in community health sectors, and ways to Research Paper
Strategic planning challenges in community health sectors, and ways to use strategic planning to address these challenges - Research Paper Example The budget is to be followed strictly to ensure financial discipline and ultimate success (Vinten, 2005). In strategic planning, the employment of strategy and the allocation of resources appropriately will lead to eventual success. In fact, budgeting can be a part of the allocation of resources in strategic planning. Community health sector is on such are that requires a well-designed strategic plan. A community health sector is an inextricably linked web of individuals and institutions that provide health services to the community. The members of this sector include service providers, non-governmental agencies, the health workers hospitals and the government. Since all these stakeholders operate within the community, members of that community cannot be left out. The concept of community health sector, therefore, can be understood as a replica of the national or statewide health sector but implemented with the context if a community. It involves all the stakeholders like in the national government but at a smaller scale (Stahl, 2004).). The complex interplay between the non-governmental organization, the pharmaceutical companies, drug suppliers hospitals and the community is the central focus of the community health sector. This paper discuses the development of the strategic plan for the community health sector through the commonly known strategy tools. It reviews the benefits of strategic planning within the context of health care and in other settings and draws a conclusion on the best way forward in managing health care within the community. The concept of strategic planning can trace its way to many contributors in the recent past. For instance, Michael Porter introduced the concept of five forces analysis in strategic business planning. In this view, there are five forces affecting any organization and can deter it from providing quality service to its clients. The same author also
Monday, August 26, 2019
Encryption Exploitation Technologies Research Paper
Encryption Exploitation Technologies - Research Paper Example It is in this regard that organizations have come up with security policies which define how data should be secured for confidentiality, authenticity, privacy, integrity, access control and nonrepudiation (Knott & Steube, 2011). The process of encryption employs different methods with a view of ensuring that information in its original and natural format is altered or converted into formats which cannot be read by systems attackers. Hence encryption is basically viewed at ascertaining that it is only the intended receivers who are able to read the message. This research paper gives a critical discussion of the nature and approaches of execution of the common methods that are used in the exploitation of encryption technologies. Symmetric Encryption Symmetric encryption is one of the major methods that are used in computer security in the exploitation of encryption technologies. In symmetric encryption, both the receiver and the sender of data or information have the same key or encryp tion key (Ackerman, 2008). In this regard, symmetric encryption is also known as shared secret encryption or shared key encryption (Lian, Liu, Ren & Wang, 2007). The encryption key in symmetric encryption method is applied both when encrypting and decrypting data. The security behind symmetric encryption lies in the fact that it is only the individuals with the same key who are able access and read data, information or messages which have been encrypted by the use of the symmetric key (Knott & Steube, 2011). Symmetric encryption has existed as the oldest methods on utilizing encryption technologies. It is essentially used for secure transmission of data. As a result, data that has been transmitted through the symmetric encryption is said to be confidential (Bhargava, Shi & Wang, 2007). In this sense confidentiality means that the understanding of meaning which is carried within the data can only be achieved by systems or individuals that share the same key. In this regard, it is evi dent that symmetric encryption is aimed at preventing unauthorized entities from understanding data rather than preventing them from accessing it (Dent, 2008). Therefore even if attackers access data, they are not able to understand its meaning since it is encrypted (Ackerman, 2008). Figure 1: Symmetric Encryption (PacketLife.net, 2010) It is important to note that encrypted data remains to be data. What changes is the inability for unauthorized entities to have and understanding or acquires the meaning that is contained therein (Moore, 2007). Due to encryption, the purpose of messages serves only the intended recipients (Al-Riyami, Malone-Lee & Smart, 2009). Symmetric encryption makes use of various algorithms. An encryption algorithm the word used to describe the mathematical formula which is employed in both the encryption and decryption of data files during the process of electronic data transfer or communication (Toubba, 2008). It is therefore the function of the encryption alg orithm to convert electronic formats of data into formats that are difficult to understand by the unintended audience. Since the intended receivers have the same key as the sender, symmetric methods in encryption allows them to read and comprehend the encrypted data. This is made possible by the use of the key and the symmetric algorithm to
Sunday, August 25, 2019
Social Media Plan Essay Example | Topics and Well Written Essays - 1750 words
Social Media Plan - Essay Example This essay stresses that various market factors have shaped the summer occupancy numbers. Initially, what drove the summer business was the international bus tours, this formed bout 62 percent of the summer offseason business. The increasing value of the Canadian dollar, forest fires in 2003, global recession and changes in the bus tour operator policy of 2007, seriously eroded the international market of the resort. Since the summer of 2008, the tour bus business dropped sharply. Consequently, the summer room rates shot down to the same levels as they were in the 1990ââ¬â¢s.à This paper discusses that as much as it is not necessary to compare Sun Peaks to other mountain resorts since their economies are more diverse, it is worth noting that Sun Peaks are competing for the same regional consumer market. With such competition, new efficient ways have to be designed to come up with a marketing strategy that will deliver, and, for this reason, the social media offers that platform. Sun Peaks faces stiff competition from other regional resort municipalities such as Whistler not only for the regional consumer market but also for the international consumer market.à The target market is both regional and international in nature, thus when it comes to the consideration of demographics, and then it is the entire world that is considered especially those who fancy Canada as tourist destination resort.
Saturday, August 24, 2019
Answer 5 Questions Regarding Business, and Marketing Essay
Answer 5 Questions Regarding Business, and Marketing - Essay Example Franchisees privately own three-quarters of this corporation. The major requirement necessary for the purchase of a franchise include availability of funds to facilitate running of operations; possession of essential management expertise as required by the franchise; and ability to satisfy legal requirements mandated by the selected business. (3, 1) Foreign ownership of franchises is usually subjected to a number of legal restrictions. This varies among countries. Moreover, it is usually faced with a number of setbacks, a useful example being language barrier (1,1; 2, 1) Advertisement is an industry that cannot be separated from the media, production and business sector. Advertisement restrictions are limitations meant to control what is advertised through the media sector. These restrictions limit advertisement by preventing marketing of certain commodity. Consequently, this leads to reduced net income of respective businesses. (1, 1; 5, 1) Advertisement restriction differs among countries. A useful example is Brazil. The advertisement of some products (cigarettes and alcoholic drinks) is only allowed from 2100 hours to 0600 hours. Thus, businesses have been unable to achieve their economic goals on time. Reason being, by restricting advertisement consumer interest and awareness regarding the products will be low. In addition, the market promotion strategy will be negatively affected. Thus, businesses will opt for regions with less restriction. (5, 1) American fast food, music and movies are popular around the world with little production adaptation. U.S retailers, banks and the beer firms have had to make major adaptation to their products. Why? Provide examples. Adaptation involves changes in methods of business. It may include price promotions; and changing the product to make fit the preference of the consumers. Adaptation occurs if a single or more factors are changed. It occurs for attaining competitive gains in the markets.
Victimology and Policing Case Study Example | Topics and Well Written Essays - 3500 words
Victimology and Policing - Case Study Example When the rest of the passengers moved towards them, they tried to escape. However, the bus driver was notified to close the doors and the two boys were trapped inside the bus. The police centre was notified about the incident. I, as a police officer, was sent to the area to identify and evaluate the conditions of the incident and provide the necessary support to the victim. We found the offenders in the bus and we arrested them. The victim was in a very bad psychological condition and was not able to describe the incident. She followed us to the police station where she described the conditions of the. Within short time - in about an hour - Yasaf left the police station with her parents, who were notified for the incident by the police officers. Yasaf and her parents were asked whether they are going to sue the two young boys; they replied negatively. When the police arrived at the place of the incident, the victim was under severe stress and mental trauma. In fact, the trauma was proved to be more psychological than physical. Apart from a few bruises, the victim did not have any damage in her health; however she was shocked that people in her age treated her in this way without any reason. The police officers were notified on the conditions of the attack which could be more dangerous without the immediate reaction of the other passengers. Her parents were also called and were notified on all the circumstances of the specific event. The victim and her parents decided not to proceed with criminal actions against the young people involved in the specific event. They only asked the police officers to make appropriate notice to them in order to avoid similar actions in the future. A police officer talked with Yasaf for about 30 minutes. She explained to Yasaf the potential motives of the offenders notifying that there was the case that they reacted in this way because they were drunk. 1.3 Circumstances related with the victim Yasaf used to travel in the same route every day. She never faced a risk of her life in the
Friday, August 23, 2019
Unethical Business Behavior (Monastato company) Essay
Unethical Business Behavior (Monastato company) - Essay Example Unethical Business Behavior (Monastato company) This can be furthered with the ideologies of libertarians or Aristotle, specifically which helps to develop a deeper understanding of what the moral and ethical problems are within a company. When analyzing Monsanto, an agricultural company, there is an understanding of the deeper problems of ethics as well as why this becomes important to alter with the company. Background of the Problem: The company Monastato was chosen because it is recognized as the top unethical company in the world. The company is located in Missouri and offers agricultural products to grocery stores. The company is known for providing genetically modified foods and seed to the world as well as agricultural products that are used to change the quality of foods. The company is known for being unethical first because of the approach taken to competition. If there is a farmer that is working ethically or which provides organic food, then Monsanto will try to sue them for offering the wrong products. The companyââ¬â¢s strategy isnââ¬â¢t one based on winning or losing the suit, but instead of driving the farmers out of business because of the amount of money that is spent on putting them through court.The company moves beyond this with the foods and weed killer that is used. The particular company was chosen because of the current controversy which they are under as well as the controversies that are associated with the food and agriculture, both politically and in society. There are several that are now pressuring companies to begin altering the way in which food is provided with the concept of processing food and other components being difficult with those that are looking at the different processes for agriculture. The current health issues which many are facing and which are causing difficulties are leading to problems in becoming more renowned in political and social groups. Examining the different layers of Monsanto and the unethical behaviors that are associated with this then builds a deeper understanding of why it is important to pay attention to the problems that the company currently is sending to others while developing a deeper understanding of how ethics in terms of agricultural reform need to be reconsidered with this particular company as an example (Cesca, 2010: 1). Theories on Ethics The concepts that are associated with Monsanto relate directly to theories on ethics and the association which this creates with how the corporation needs to alter policies specifically for ethics. The first concept which can be looked into in terms of reform for ethics is the libertarian point of view. According to this viewpoint, every individual should have rights while restricting the political or corporate affiliations that are linked to this. More important, there needs to be a sense of independence and freedom that is associated with how one is able to maintain their own needs and concepts within society. This moves into the understanding that each individual has specific rights and expressions that are associated with the individual while creating the understanding that there needs to be a sense of balance with different needs. The belief is that this will associate with changes with class struggle as well as understanding wha t oneââ¬â¢s natural rights are within society (Sandel, 2009: 60). The libertarian viewpoint is one which is looked at with the different policies and practices of Monsanto. The first is with
Thursday, August 22, 2019
Secret Life of Bees in-Class Writing Assignment Essay Example for Free
Secret Life of Bees in-Class Writing Assignment Essay How would you describe Lilys feelings about her mother? Do they change throughout the novel? Lily loves her mother very much and misses her lot, especially when she canââ¬â¢t sleep. The guilt she feels for her role in Deborahââ¬â¢s death haunts her. Later when Lily learns that her perfect, fantasy mother abandoned her she quickly grows to resent her mother for leaving her with T. Ray. Finally she comes to terms with her real mother, a flawed, complex, very real person. As a result of all these revelations, Lilyââ¬â¢s relationship with her deceased mother, Deborah, is very complicated. When the Secret Life of Bees starts, Lily loves her mother very much and blames herself for her motherââ¬â¢s death. As stated on page 52, ââ¬Å"My motherââ¬â¢s name was Deborah. I thought it was the prettiest name I had ever heardâ⬠¦Ã¢â¬ Lily spends a lot of time thinking about her and fantasizing. She creates a perfect mother in her mind, a mother who would make her pretty and happy. When she finds some of her motherââ¬â¢s gloves in the attic, ââ¬Å"I feel foolish about it now, but one time I stuffed the gloves with cotton balls and held them through the night. â⬠(p. 5) Because nobody in her community is willing to talk to her about her mother she is clinging on to whatever part of her she can get, even if it is just a pair or old gloves. The guilt of her motherââ¬â¢s death is also present when she says, ââ¬Å"This is what I know about myself. She was all I wanted. And I took her away. â⬠(p. 40) She is overwhelmed with emotions and has no way to effectively deal with them other than let her feelings boil and fester inside of her. This combination of unlimited love and regret reflect how Lily feels for about the first half of the novel. Later, Lilyââ¬â¢s feelings for her mother change drastically when August admits that Deborah abandoned her with her abusive father instead of taking Lily with her to Tiburon. As she puts it, ââ¬ËUnwantedââ¬â¢, I thought. ââ¬ËI was an unwanted babyââ¬â¢ (p. 628), and, ââ¬Å"My mother had left me. â⬠(p. 634) This admission and realization throws Lily into a whole world of hurt. Instead of the glorious, perfect, loving mother she though Deborah had been, she is appalled to find that her mother is far from flawless. Lily realizes, ââ¬Å"Iââ¬â¢d spent most of my life imagining all the ways sheââ¬â¢d love me, what a perfect specimen of a mother she was. All of it was lies. I had completely made her up. â⬠(p. 635) In fact Deborah was suffering from severe depression. As August put it, ââ¬Å"When I picked her up at the bus station, she didnt even look like herself. She had gotten so thin and had these dark circles under her eyes. â⬠(p. 633) In shock and feeling betrayed, Lily finishes her conversation with August hating her mother. Finally, Lily had to come to terms with her motherââ¬â¢s abandoning her and with the new, flawed image that is now emerging. As she says, ââ¬Å"Iââ¬â¢d traded a pack of lies for a pack of truths, and I didnââ¬â¢t know which one was heavier. â⬠(p. 25) She is confused and stuck between hating her mother for leaving her and being disgusted with herself for feeling this way. She describes it as; ââ¬Å"I felt my heart in my chest. It hurt so badly. Like it had been stepped on. â⬠(p. 655) However when August gives Lily a collection of her motherââ¬â¢s possessions, she finds a photo of her and Deborah that allows her to finally begin to move on. In it, ââ¬Å"her face was tipped toward mine, our noses just touching, how wide and gorgeous her smile was, like sparklers going offâ⬠¦I figured May mustââ¬â¢ve made it to heaven and explained to my mother about the sign I wanted. The one that would let me know I was loved. â⬠(pgs 693-694) In a way Lilyââ¬â¢s feeling about her mother, however complicated, come almost full circle. While she starts off with loving a fantasy, her dreams are soon crushed when she learns the bitter truth about her mother. With time comes acceptance however, and Lily soon begins to allow herself to love and lose the new version of Deborah, flawed yes, but still a version filled with love and hope.
Wednesday, August 21, 2019
Transdermal fentanyl patch in the use of chronic and non chronic pain
Transdermal fentanyl patch in the use of chronic and non chronic pain What is Fentanyl? Transdermal Fentanyl is a synthetic narcotic analgesic that is widely used in clinical anaesthesia which was originally synthesised by Dr Paul Janssen in the early sixties. It is approximately one hundred times more potent that morphine; which is thought of a the golden standard for opiods; this is where other opiods are compared and tested against morphine. Due to its potency, Fentanyl is mainly used for chronic long term illnesses such as cancer; however it is also used in short term acute pain for example child birth (a Fentanyl epidural would be used in this situation). Fentanyl can be administrated in many ways, which include: patch, ionysys, lollipop, injection and epidural. Biochemistry Janssens synthesis of fentanyl was to reactN-phenethylpiperidone with aniline to create 4-anilino-N-phenethylpiperidine. This compound is then reacted with propionyl chloride to give pure fentanyl, which is toxic and must be diluted in order to administrate to patients. American Chemical society 2005. Transdermal Fentanyl works by binding itself to the à µ-opioid receptors found in the Central Nervous System and the Gastro-Intestinal tract. It has high lipid solubility therefore it binds strongly to plasma proteins and can quickly cross the blood-brain barrier. This in turn causes the patient to have a sense of euphoria by increasing the patients pain threshold (the amount of discomfort a person feels enough to consider pain) and reducing the sensitivity of pain. Side effects and Benefits Transdermal Fentanyl is a more popular choice among patients as it provides a better quality of life and produces fewer side effects compared to that of other opiods. The side effects of Fentanyl are generic for all opiods, these include; respiratory depression (where the patients breathing becomes depressed and slow) muscle spasms, abnormal blood pressure (could be both high or low), nausea, vomiting, blurred vision, itching (caused by the substance making direct contact with the skin), euphoria, dizziness, weight loss and constipation. On the other hand there are many benefits that come from using the drug, example; A longer period of release i.e. Fentanyl patch can be released throughout the body for a seventy two hour period using the patch; and according to clinical studies provides an improved pain relief compared to that of morphine. A smaller volume is needed due to its potency and less constipation and less sedation occurs (the patient recovers motor function quicker). Converting a patient onto Transdermal Fentanyl Patch from Morphine The direct adaptation from Morphine to Fentanyl was first determined and tried by cancer patients. These patients are seen to have a steady and unvarying level of pain, and are receiving a constant dosage of Morphine to relieve it. On unstable pain Fentanyl does not work at its best. Below is an example of a patient receiving 100mg IV Morphine Sulphate and is going home on Fentanyl patch. 1) Convert to 24h oral MS dose 100mg/ IV MS = x 10mg/d IV MS 30mg/d oral MS 2) Adjust for cross-Tolerance 300mg/d oral MS x 0.65â⬠= 200mg/d oral MS â⬠Deriving a 35% reduction is equivalent to multiplying by 0.65 3) Convert adjusting to dose to Fentanyl Transdermal Patch dose 200mg/d oral MS = 55à µ/hr Fentanyl Patch 3.6 4) Round to closest Fentanyl Patch dosage from (25, 50, 75, 100) 55à µ/hr ââ â 50à µ/hr Fentanyl patchâ⬠â⬠â⬠â⬠Replace patch every 3 days 5) Provide oral morphine q2-4h for a break-through -pain at 10% of 24hr period total 200mg/d oral MS x 0.10 = 20mg oral MS q2-4h prn breakthrough pain Ali Olyaei PharmD, 2005 Fentanyl patch The Fentanyl patch is generally deliberated if there is no access oral for the patient and is unable to take Fentanyl orally in a tablet/lozenge form or If the patient is reluctant to continue on morphine to due unpleasant side effects such as constipation, tolerance; or if the patient is know to overdose or not taking the medication this is where the patient will become supervised. The Transdermal Fentanyl patch is often seen as the most common and easy way to treat chronic and non-chronic pain. It allows the patient to self administer the drug at home and has the longest effect on the body. (Margaret Gibbs 2009) The Patch can also be assisted by the lollipop, by using it as a top up mechanism to pain relief. Many health care professionals suggest that the patch should only be used for patients who are opioid-tolerant and cannot successfully manage there pain with other dugs such as morphine. The Patch can come in two forms which include; a Reservoir patch, where the patch is suspended in a matrix and placed onto the skin; and a Matrix patch where the drug is distributed evenly throughout a matrix. Reservoir Patch The principle of this patch is to understand and evaluate the stability and skin penetration profiles of Fentanyl. For this patch the Fentanyl is limited within a reservoir within the patch in a gel form. Dangerous drugs, Justinian Lane 2010 Matrix Patch Unlike the Reservoir patch there is no Fentanyl gel contained within the patch. This style of patch places the Fentanyl within the adhesive so it makes direct contact with the skin. (Causing the side effect of itching). This design of patch is seen as safer as is it unable to leak gel. Dangerous drugs, Justinian Lane 2010 How to apply the Patch There are many guidelines according to Drug and Therapeutics Committee August 2009; that a patient is required to follow in order to use the patch successfully. * Apply to clean, hairless skin such as the upper arm (which has not exposed to radiotherapy) and seize in place for 1 minute. * The patch works by creating a deposit of drug under the skin through the pores of the skin. * The patch should be replaced every 72 hours. Rotate position so not to irritate the skin. * Avoid direct heat and if the patient has a fever observe for opioid toxicity. * Fentanyl is causes less constipation than morphine. Therefore use half the dose of laxative if needed and repeat. * Prescribe strong opioid for breakthrough with either immediate release morphine sulphate /oxycodone or subcutaneous strong opioid The Patch works by releasing Fentanyl (either from the matrix gel or the Fentanyl Adhesive) into the body fats through the pores of the skin, which in turn releases the drug slowly and constantly around the bloodstream eventually passing the blood brain barrier allowing it to bind to à µ-opiod receptors, giving a constant pain relief of between forty-eight and seventy-two hours which is usually constant. However, it takes approximately four- twelve hours for the patch to begin releasing Fentanyl into the body. At this point the Fentanyl lollipop would be used to keep the patients pain relief up. Dosage is based on the size of the patch and absorption rate is usually regular, depending on many factors which include body temperature, size of the patient, skin type, quantity of body fat, and placement of the patch; can all have major effects on pain relief and dosage. Fentanyl patches are manufactured in five sizes: 12.5 à µg/h,25à µg/h, 50à µg/h, 75à µg/h and 100à µg/h. Fentanyl Lollipop The Transdermal Fentanyl Lollipop is a fast end effective method of administrating the drug, as the drug enters the body via mucous membranes in the mouth. It is primarily used as a top up method of pain relief in conjunction to the Fentanyl Patch, when the patient requires it. It is an beneficial form of administration as the lollipop doesnt require trained medical staff regarding administration Richard Payneb et al. It is preferred among patient as it is portable and fast-acting. The dosages for the lollipop are the following: 200 à µg in gray 400 à µg in blue 600 à µg in orange 800 à µg in purple 1200 à µg in green 1600 à µg in burgundy Fentanyl is prescribed after an assessment of the patients condition, medical history and known tolerance to pain medication, such as Morphine. In addition, the dosage is decided based on the severity of the pain over a twenty-four hour period. Conclusion To summarise Transdermal Fentanyl is a potent synthetic analgesic which was manufactured for the treatment of both chronic and non chronic pain management which include situations such as cancer or childbirth. It is widely used for the treatment of cancer as is it approximately one hundred times more potent than morphine which is described as the golden standard for opiods. The Fentanyl patch is manufactured in two different styles; Matrix and Reservoir; they work by diffusing the drug through the pores of the skin and allowing it to be transported around the bodys blood system furthermore crossing the blood barrier binding to the à µ-opiod receptors. The lollipop as a top up mechanism in conjunction according to the patients pain level. The patch is effective and preferred by patients as it has fewer side effects than the majority of opiods i.e. morphine, and provides the patient with a better quality of life as it can be administrated at home and last for approximately seventy-two hours. References ~ Margaret Gibbs, The role of transdermal fentanyl patches in the effective management of cancer painhttp, (June 2009) ://www.internurse.com Last accessed 1ts December 2009 ~ Last accessed 1st march 2010 (Online) http://www.medicinenet.com/fentanyl_transdermal_system/article.htm ~ Figure 1 (online) http://pubs.acs.org/cen/img/83/i25/8325fentanyl.gif ~ American Chemical society 2005 (online) Last accessed 10th March 2010 http://pubs.acs.org/cen/coverstory/83/8325/8325fentanyl.html ~ Drug and Therapeutics Committee August 2009 (online) Last accessed 12th March 2010 http://www.typepad.com/services/trackback/6a00d8341c716c53ef011571115245970c ~ Figure 2 (online) http://corpreform.typepad.com/.a/6a00d8341c716c53ef01157205fb1a970b-pi ~ Figure 3 (online) http://corpreform.typepad.com/.a/6a00d8341c716c53ef01157205fb2a970b-pi ~ Figure 4 (online) http://pi.watson.com/product_shot_images/00591_3213_72.jpg ~ Last accessed 12th march 2010 (online) http://www.fifeadtc.scot.nhs.uk/support/Fentanyl%20palliative%20care.pdf ~ Last accessed 12th march 2010 (online) http://www.typepad.com/services/trackback/6a00d8341c716c53ef011571115245970c ~ Richard Payneb et al (online) Oral transmucosal fentanyl citrate (OTFC) for the treatment of breakthrough pain in cancer patients: a controlled dose titration study, (1999) Pain 79 303-312, Last accessed www.sciencedirect.com 21/01/2010
Tuesday, August 20, 2019
Medical Data Analytics Using R
Medical Data Analytics Using R 1.) R for Recency => months since last donation, 2.) F for Frequency => total number of donation, 3.) M for Monetary => total amount of blood donated in c.c., 4.) T for Time => months since first donation and 5.) Binary variable => 1 -> donated blood, 0-> didnt donate blood. The main idea behind this dataset is the concept of relationship management CRM. Based on three metrics: Recency, Frequency and Monetary (RFM) which are 3 out of the 5 attributes of the dataset, we would be able to predict whether a customer is likely to donate blood again based to a marketing campaign. For example, customers who have donated or visited more currently (Recency), more frequently (Frequency) or made higher monetary values (Monetary) are more likely to respond to a marketing effort. Customers with less RFM score are less likely to react. It is also known in customer behavior, that the time of the first positive interaction (donation, purchase) is not significant. However, the Recency of the last donation is very important. In the traditional RFM implementation each customer is ranked based on his RFM value parameters against all the other customers and that develops a score for every customer. Customers with bigger scores are more likely to react in a positive way for example (visit again or donate). The model constructs the formula which could predict the following problem. Keep in repository only customers that are more likely to continue donating in the future and remove those who are less likely to donate, given a certain period of time. The previous statement also determines the problem which will be trained and tested in this project. Firstly, I created a .csv file and generated 748 unique random numbers in Excel in the domain [1,748] in the first column, which corresponds to the customers or users ID. Then I transferred the whole data from the .txt file (transfusion.data) to the .csv file in excel by using the delimited (,) option. Then I randomly split it in a train file and a test file. The train file contains the 530 instances and the test file has the 218 instances. Afterwards, I read both the training dataset and the test dataset. From the previous results, we can see that we have no missing or invalid values. Data ranges and units seem reasonable. Figure 1 above depicts boxplots of all the attributes and for both train and test datasets. By examining the figure, we notice that both datasets have similar distributions and there are some outliers (Monetary > 2,500) that are visible. The volume of blood variable has a high correlation with frequency. Because the volume of blood that is donated each time is fixed, the Monetary value is proportional to the Frequency (number of donations) each person gave. For example, if the amount of blood drawn in each person was 250 ml/bag (Taiwan Blood Services Foundation 2007) March then Monetary = 250*Frequency. This is also why in the predictive model we will not consider the Monetary attribute in the implementation. So, it is reasonable to expect that customers with higher frequency will have a lot higher Monetary value. This can be verified also visually by examining the Monetary outliers for the train set. We retrieve back 83 instances. In order, to understand better the statistical dispersion of the whole dataset (748 instances) we will look at the standard deviation (SD) between the Recency and the variable whether customer has donated blood (Binary variable) and the SD between the Frequency and the Binary variable.The distribution of scores around the mean is small, which means the data is concentrated. This can also be noticed from the plots. From this correlation matrix, we can verify what was stated above, that the frequency and the monetary values are proportional inputs, which can be noticed from their high correlation. Another observation is that the various Recency numbers are not factors of 3. This goes to opposition with what the description said about the data being collected every 3 months. Additionally, there is always a maximum number of times you can donate blood per certain period (e.g. 1 time per month), but the data shows that. 36 customers donated blood more than once and 6 customers had donated 3 or more times in the same month. The features that will be used to calculate the prediction of whether a customer is likely to donate again are 2, the Recency and the Frequency (RF). The Monetary feature will be dropped. The number of categories for R and F attributes will be 3. The highest RF score will be 33 equivalent to 6 when added together and the lowest will be 11 equivalent to 2 when added together. The threshold for the added score to determine whether a customer is more likely to donate blood again or not, will be set to 4 which is the median value. The users will be assigned to categories by sorting on RF attributes as well as their scores. The file with the donators will be sorted on Recency first (in ascending order) because we want to see which customers have donated blood more recently. Then it will be sorted on frequency (in descending order this time because we want to see which customers have donated more times) in each Recency category. Apart from sorting, we will need to apply some business rules that have occurred after multiple tests: For Recency (Business rule 1): If the Recency in months is less than 15 months, then these customers will be assigned to category 3. If the Recency in months is equal or greater than 15 months and less than 26 months, then these customers will be assigned to category 2. Otherwise, if the Recency in months is equal or greater than 26 months, then these customers will be assigned to category 1 And for Frequency (Business rule 2): If the Frequency is equal or greater than 25 times, then these customers will be assigned to category 3. If the Frequency is less than 25 times or greater than 15 months, then these customers will be assigned to category 2. If the Frequency is equal or less than 15 times, then these customers will be assigned to category 1 RESULTS The output of the program are two smaller files that have resulted from the train file and the other one from the test file, that have excluded several customers that should not be considered future targets and kept those that are likely to respond. Some statistics about the precision, recall and the balanced F-score of the train and test file have been calculated and printed. Furthermore, we compute the absolute difference between the results retrieved from the train and test file to get the offset error between these statistics. By doing this and verifying that the error numbers are negligible, we validate the consistency of the model implemented. Moreover, we depict two confusion matrices one for the test and one for the training by calculating the true positives, false negatives, false positives and true negatives. In our case, true positives correspond to the customers (who donated on March 2007) and were classified as future possible donators. False negatives correspond to the customers (who donated on March 2007) but were not classified as future possible targets for marketing campaigns. False positives correlate to customers (who did not donate on March 2007) and were incorrectly classified as possible future targets. Lastly, true negatives which are customers (who did not donate on March 2007) and were correctly classified as not plausible future donators and therefore removed from the data file. By classification we mean the application of the threshold (4) to separate those customers who are more likely and less likely to donate again in a certain future period. Lastly, we calculate 2 more single value metrics for both train and test files the Kappa Statistic (general statistic used for classification systems) and Matthews Correlation Coefficient or cost/reward measure. Both are normalized statistics for classification systems, its values never exceed 1, so the same statistic can be used even as the number of observations grows. The error for both measures are MCC error: 0.002577Ãâà and Kappa error:Ãâà 0.002808, which is very small (negligible), similarly with all the previous measures. REFERENCES UCI Machine Learning Repository (2008) UCI machine learning repository: Blood transfusion service center data set. Available at: http://archive.ics.uci.edu/ml/datasets/Blood+Transfusion+Service+Center (Accessed: 30 January 2017). Fundation, T.B.S. (2015) Operation department. Available at: http://www.blood.org.tw/Internet/english/docDetail.aspx?uid=7741pid=7681docid=37144 (Accessed: 31 January 2017). The Appendix with the code starts below. However the whole code has been uploaded on my Git Hub profile and this is the link where it can be accessed. https://github.com/it21208/RassignmentDataAnalysis/blob/master/RassignmentDataAnalysis.R library(ggplot2) library(car) Ãâà # read training and testing datasets traindata à ¯ÃâÃ
¸Ãâà read.csv(C:/Users/Alexandros/Dropbox/MSc/2nd Semester/Data analysis/Assignment/transfusion.csv) testdata à ¯ÃâÃ
¸Ãâà read.csv(C:/Users/Alexandros/Dropbox/MSc/2nd Semester/Data analysis/Assignment/test.csv) # assigning the datasets to dataframes dftrain à ¯ÃâÃ
¸ data.frame(traindata) dftest à ¯ÃâÃ
¸ data.frame(testdata) sapply(dftrain, typeof) # give better names to columns names(dftrain)[1] à ¯ÃâÃ
¸ ID names(dftrain)[2] à ¯ÃâÃ
¸ recency names(dftrain)[3]à ¯ÃâÃ
¸frequency names(dftrain)[4]à ¯ÃâÃ
¸cc names(dftrain)[5]à ¯ÃâÃ
¸time names(dftrain)[6]à ¯ÃâÃ
¸donated # names(dftest)[1]à ¯ÃâÃ
¸ID names(dftest)[2]à ¯ÃâÃ
¸recency names(dftest)[3]à ¯ÃâÃ
¸frequency names(dftest)[4]à ¯ÃâÃ
¸cc names(dftest)[5]à ¯ÃâÃ
¸time names(dftest)[6]à ¯ÃâÃ
¸donated # drop time column from both files dftrain$time à ¯ÃâÃ
¸ NULL dftest$time à ¯ÃâÃ
¸ NULL #Ãâà sort (train) dataframe on Recency in ascending order sorted_dftrain à ¯ÃâÃ
¸ dftrain[ order( dftrain[,2] ), ] #Ãâà add column in (train) dataframe -Ãâà hold score (rank) of Recency for each customer sorted_dftrain[ , Rrank] à ¯ÃâÃ
¸ 0 #Ãâà convert train file from dataframe format to matrix matrix_train à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftrain, as.numeric)) #Ãâà sort (test) dataframe on Recency in ascending order sorted_dftest à ¯ÃâÃ
¸ dftest[ order( dftest[,2] ), ] #Ãâà add column in (test) dataframe -hold score (rank) of Recency for each customer sorted_dftest[ , Rrank] à ¯ÃâÃ
¸ 0 #Ãâà convert train file from dataframe format to matrix matrix_test à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftest, as.numeric)) # categorize matrix_train and add scores for Recency apply business rule for(i in 1:nrow(matrix_train)) { if (matrix_train [i,2] Ãâà Ãâà Ãâà Ãâà matrix_train [i,6] à ¯ÃâÃ
¸ 3 } else if ((matrix_train [i,2] = 15)) { Ãâà Ãâà Ãâà Ãâà matrix_train [i,6] à ¯ÃâÃ
¸ 2 } else {Ãâà matrix_train [i,6] à ¯ÃâÃ
¸ 1Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà } # categorize matrix_test and add scores for Recency apply business rule for(i in 1:nrow(matrix_test)) { if (matrix_test [i,2] Ãâà Ãâà Ãâà Ãâà matrix_test [i,6] à ¯ÃâÃ
¸ 3 } else if ((matrix_test [i,2] = 15)) { Ãâà Ãâà Ãâà Ãâà matrix_test [i,6] à ¯ÃâÃ
¸ 2 } else {Ãâà matrix_test [i,6] à ¯ÃâÃ
¸ 1 } Ãâà Ãâà Ãâà Ãâà Ãâà } # convert matrix_train back to dataframe sorted_dftrain à ¯ÃâÃ
¸ data.frame(matrix_train) # sort dataframe 1rst by Recency Rank (desc.) then by Frequency (desc.) sorted_dftrain_2à ¯ÃâÃ
¸ sorted_dftrain[order(-sorted_dftrain[,6], -sorted_dftrain[,3] ), ] # add column in train dataframe- hold Frequency score (rank) for each customer sorted_dftrain_2[ , Frank] à ¯ÃâÃ
¸ 0 # convert dataframe to matrix matrix_train à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftrain_2, as.numeric)) # convert matrix_test back to dataframe sorted_dftest à ¯ÃâÃ
¸ data.frame(matrix_test) # sort dataframe 1rst by Recency Rank (desc.) then by Frequency (desc.) sorted_dftest2 à ¯ÃâÃ
¸ sorted_dftest[ order( -sorted_dftest[,6], -sorted_dftest[,3] ), ] # add column in test dataframe- hold Frequency score (rank) for each customer sorted_dftest2[ , Frank] à ¯ÃâÃ
¸ 0 # convert dataframe to matrix matrix_test à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftest2, as.numeric)) #categorize matrix_train, add scores for Frequency for(i in 1:nrow(matrix_train)){ Ãâà if (matrix_train[i,3] >= 25) { Ãâà Ãâà Ãâà matrix_train[i,7] à ¯ÃâÃ
¸ 3 Ãâà } else if ((matrix_train[i,3] > 15) (matrix_train[i,3] Ãâà Ãâà Ãâà matrix_train[i,7] à ¯ÃâÃ
¸ 2 Ãâà } else {Ãâà matrix_train[i,7] à ¯ÃâÃ
¸ 1Ãâà } Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà Ãâà } #categorize matrix_test, add scores for Frequency for(i in 1:nrow(matrix_test)){ Ãâà if (matrix_test[i,3] >= 25) { Ãâà Ãâà Ãâà matrix_test[i,7] à ¯ÃâÃ
¸ 3 Ãâà } else if ((matrix_test[i,3] > 15) (matrix_test[i,3] Ãâà Ãâà Ãâà matrix_test[i,7] à ¯ÃâÃ
¸ 2 Ãâà } else {Ãâà Ãâà matrix_test[i,7] à ¯ÃâÃ
¸ 1Ãâà } } #Ãâà convert matrix test back to dataframe sorted_dftrain à ¯ÃâÃ
¸ data.frame(matrix_train) # sort (train) dataframe 1rst on Recency rank (desc.) 2nd Frequency rank (desc.) sorted_dftrain_2 à ¯ÃâÃ
¸ sorted_dftrain[ order( -sorted_dftrain[,6], -sorted_dftrain[,7] ), ] # add another column for the Sum of Recency rank and Frequency rank sorted_dftrain_2[ , SumRankRAndF] à ¯ÃâÃ
¸ 0 # convert dataframe to matrix matrix_train à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftrain_2, as.numeric)) #Ãâà convert matrix test back to dataframe sorted_dftest à ¯ÃâÃ
¸ data.frame(matrix_test) # sort (train) dataframe 1rst on Recency rank (desc.) 2nd Frequency rank (desc.) sorted_dftest2 à ¯ÃâÃ
¸ sorted_dftest[ order( -sorted_dftest[,6],Ãâà -sorted_dftest[,7] ), ] # add another column for the Sum of Recency rank and Frequency rank sorted_dftest2[ , SumRankRAndF] à ¯ÃâÃ
¸ 0 # convert dataframe to matrix matrix_test à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftest2, as.numeric)) # sum Recency rank and Frequency rank for train file for(i in 1:nrow(matrix_train)) { matrix_train[i,8] à ¯ÃâÃ
¸ matrix_train[i,6] + matrix_train[i,7] } # sum Recency rank and Frequency rank for test file for(i in 1:nrow(matrix_test)) { matrix_test[i,8] à ¯ÃâÃ
¸ matrix_test[i,6] + matrix_test[i,7] } # convert matrix_train back to dataframe sorted_dftrain à ¯ÃâÃ
¸ data.frame(matrix_train) # sort train dataframe according to total rank in descending order sorted_dftrain_2 à ¯ÃâÃ
¸ sorted_dftrain[ order( -sorted_dftrain[,8] ), ] # convert sorted train dataframe matrix_train à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftrain_2, as.numeric)) # convert matrix_test back to dataframe sorted_dftest à ¯ÃâÃ
¸ data.frame(matrix_test) # sort test dataframe according to total rank in descending order sorted_dftest2 à ¯ÃâÃ
¸ sorted_dftest[ order( -sorted_dftest[,8] ), ] # convert sorted test dataframe to matrix matrix_test à ¯ÃâÃ
¸ as.matrix(sapply(sorted_dftest2, as.numeric)) # apply business rule check count customers whose score >= 4 and that Have Donated, train file # check count for all customers that have donated in the train dataset count_train_predicted_donations à ¯ÃâÃ
¸ 0 counter_train à ¯ÃâÃ
¸ 0 number_donation_instances_whole_train à ¯ÃâÃ
¸ 0 false_positives_train_counter à ¯ÃâÃ
¸ 0 for(i in 1:nrow(matrix_train)) { Ãâà if ((matrix_train[i,8] >= 4) (matrix_train[i,5] == 1)) { Ãâà Ãâà Ãâà count_train_predicted_donations = count_train_predicted_donations + 1Ãâà } if ((matrix_train[i,8] >= 4) (matrix_train[i,5] == 0)) { Ãâà Ãâà Ãâà false_positives_train_counter = false_positives_train_counter + 1} Ãâà if (matrix_train[i,8] >= 4) { Ãâà Ãâà Ãâà Ãâà Ãâà counter_train à ¯ÃâÃ
¸ counter_train + 1 Ãâà Ãâà Ãâà } Ãâà if (matrix_train[i,5] == 1) { Ãâà Ãâà Ãâà number_donation_instances_whole_train à ¯ÃâÃ
¸ number_donation_instances_whole_train + 1 Ãâà } } # apply business rule check count customers whose score >= 4 and that Have Donated, test file # check count for all customers that have donated in the test dataset count_test_predicted_donations à ¯ÃâÃ
¸ 0 counter_test à ¯ÃâÃ
¸ 0 number_donation_instances_whole_test à ¯ÃâÃ
¸ 0 false_positives_test_counter à ¯ÃâÃ
¸ 0 for(i in 1:nrow(matrix_test)) { Ãâà if ((matrix_test[i,8] >= 4) (matrix_test[i,5] == 1)) { Ãâà Ãâà Ãâà count_test_predicted_donations = count_test_predicted_donations + 1Ãâà } if ((matrix_test[i,8] >= 4) (matrix_test[i,5] == 0)) { Ãâà Ãâà Ãâà false_positives_test_counter = false_positives_test_counter + 1} Ãâà if (matrix_test[i,8] >= 4) { Ãâà Ãâà Ãâà Ãâà Ãâà counter_test à ¯ÃâÃ
¸ counter_test + 1 Ãâà Ãâà Ãâà } Ãâà if (matrix_test[i,5] == 1) { Ãâà Ãâà Ãâà Ãâà number_donation_instances_whole_test à ¯ÃâÃ
¸ number_donation_instances_whole_test + 1 Ãâà Ãâà } } # convert matrix_train to dataframe dftrain à ¯ÃâÃ
¸ data.frame(matrix_train) # remove the group of customers who are less likely to donate again in the future from train file dftrain_final à ¯ÃâÃ
¸ dftrain[c(1:counter_train),1:8] # convert matrix_train to dataframe dftest à ¯ÃâÃ
¸ data.frame(matrix_test) # remove the group of customers who are less likely to donate again in the future from test file dftest_final à ¯ÃâÃ
¸ dftest[c(1:counter_test),1:8] # save final train dataframe as a CSV in the specified directory reduced target future customers write.csv(dftrain_final, file = C:\Users\Alexandros\Dropbox\MSc\2nd Semester\Data analysis\Assignment\train_output.csv, row.names = FALSE) #save final test dataframe as a CSV in the specified directory reduced target future customers write.csv(dftest_final, file = C:\Users\Alexandros\Dropbox\MSc\2nd Semester\Data analysis\Assignment\test_output.csv, row.names = FALSE) #train precision=number of relevant instances retrieved / number of retrieved instances collect.530 precision_train à ¯ÃâÃ
¸Ãâà count_train_predicted_donations / counter_train # train recall = number of relevant instances retrieved / number of relevant instances in collect.530 recall_train à ¯ÃâÃ
¸ count_train_predicted_donations / number_donation_instances_whole_train # measure combines PrecisionRecall is harmonic mean of PrecisionRecall balanced F-score for # train file f_balanced_score_train à ¯ÃâÃ
¸ 2*(precision_train*recall_train)/(precision_train+recall_train) # test precision precision_test à ¯ÃâÃ
¸ count_test_predicted_donations / counter_test # test recall recall_test à ¯ÃâÃ
¸ count_test_predicted_donations / number_donation_instances_whole_test # the balanced F-score for test file f_balanced_score_test à ¯ÃâÃ
¸ 2*(precision_test*recall_test)/(precision_test+recall_test) # error in precision error_precision à ¯ÃâÃ
¸ abs(precision_train-precision_test) # error in recall error_recall à ¯ÃâÃ
¸ abs(recall_train-recall_test) # error in f-balanced scores error_f_balanced_scores à ¯ÃâÃ
¸ abs(f_balanced_score_train-f_balanced_score_test) # Print Statistics for verification and validation cat(Precision with training dataset: , precision_train) cat(Recall with training dataset: , recall_train) cat(Precision with testing dataset: , precision_test) cat(Recall with testing dataset: , recall_test) cat(The F-balanced scores with training dataset: , f_balanced_score_train) cat(The F-balanced scores with testing dataset:Ãâà , f_balanced_score_test) cat(Error in precision: , error_precision) cat(Error in recall: , error_recall) cat(Error in F-balanced scores: , error_f_balanced_scores) # confusion matrix (true positives, false positives, false negatives, true negatives) # calculate true positives for train which is the variable count_train_predicted_donations # calculate false positives for train which is the variable false_positives_train_counter # calculate false negatives for train false_negatives_for_train à ¯ÃâÃ
¸ number_donation_instances_whole_train count_train_predicted_donations # calculate true negatives for train true_negatives_for_train à ¯ÃâÃ
¸ (nrow(matrix_train) number_donation_instances_whole_train) false_positives_train_counter collect_trainà ¯ÃâÃ
¸c(false_positives_train_counter, true_negatives_for_train, count_train_predicted_donations, false_negatives_for_train) # calculate true positives for test which is the variable count_test_predicted_donations # calculate false positives for test which is the variable false_positives_test_counter # calculate false negatives for test false_negatives_for_test à ¯ÃâÃ
¸ number_donation_instances_whole_test count_test_predicted_donations # calculate true negatives for test true_negatives_for_testà ¯ÃâÃ
¸(nrow(matrix_test)-number_donation_instances_whole_test)- false_positives_test_counter collect_test à ¯ÃâÃ
¸ c(false_positives_test_counter, true_negatives_for_test, count_test_predicted_donations, false_negatives_for_test) TrueCondition à ¯ÃâÃ
¸ factor(c(0, 0, 1, 1)) PredictedCondition à ¯ÃâÃ
¸ factor(c(1, 0, 1, 0)) # print confusion matrix for train df_conf_mat_train à ¯ÃâÃ
¸ data.frame(TrueCondition,PredictedCondition,collect_train) ggplot(data = df_conf_mat_train, mapping = aes(x = PredictedCondition, y = TrueCondition)) + Ãâà geom_tile(aes(fill = collect_train), colour = white) + Ãâà geom_text(aes(label = sprintf(%1.0f, collect_train)), vjust = 1) + Ãâà scale_fill_gradient(low = blue, high = red) + Ãâà theme_bw() + theme(legend.position = none) #Ãâà print confusion matrix for test df_conf_mat_test à ¯ÃâÃ
¸ data.frame(TrueCondition,PredictedCondition,collect_test) ggplot(data =Ãâà df_conf_mat_test, mapping = aes(x = PredictedCondition, y = TrueCondition)) + Ãâà geom_tile(aes(fill = collect_test), colour = white) + Ãâà geom_text(aes(label = sprintf(%1.0f, collect_test)), vjust = 1) + Ãâà scale_fill_gradient(low = blue, high = red) + Ãâà theme_bw() + theme(legend.position = none) # MCC = (TP * TN FP * FN)/sqrt((TP+FP) (TP+FN) (FP+TN) (TN+FN)) for train values mcc_train à ¯ÃâÃ
¸ ((count_train_predicted_donations * true_negatives_for_train) (false_positives_train_counter * false_negatives_for_train))/sqrt((count_train_predicted_donations+false_positives_train_counter)*(count_train_predicted_donations+false_negatives_for_train)*(false_positives_train_counter+true_negatives_for_train)*(true_negatives_for_train+false_negatives_for_train)) # print MCC for train cat(Matthews Correlation Coefficient for train: ,mcc_train) # MCC = (TP * TN FP * FN)/sqrt((TP+FP) (TP+FN) (FP+TN) (TN+FN)) for test values mcc_test à ¯ÃâÃ
¸ ((count_test_predicted_donations * true_negatives_for_test) (false_positives_test_counter * false_negatives_for_test))/sqrt((count_test_predicted_donations+false_positives_test_counter)*(count_test_predicted_donations+false_negatives_for_test)*(false_positives_test_counter+true_negatives_for_test)*(true_negatives_for_test+false_negatives_for_test)) # print MCC for test cat(Matthews Correlation Coefficient for test: ,mcc_test) # print MCC err between train and err cat(Matthews Correlation Coefficient error: ,abs(mcc_train-mcc_test)) # Total = TP + TN + FP + FN for train total_train à ¯ÃâÃ
¸ count_train_predicted_donations + true_negatives_for_train + false_positives_train_counter + false_negatives_for_train # Total = TP + TN + FP + FN for test Ãâà total_test à ¯ÃâÃ
¸ count_test_predicted_donations + true_negatives_for_test + false_positives_test_counter + false_negatives_for_test # totalAccuracy = (TP + TN) / Total for train values totalAccuracyTrain à ¯ÃâÃ
¸ (count_train_predicted_donations + true_negatives_for_train)/ total_train # totalAccuracy = (TP + TN) / Total for test values totalAccuracyTest à ¯ÃâÃ
¸ (count_test_predicted_donations + true_negatives_for_test)/ total_test # randomAccuracy = ((TN+FP)*(TN+FN)+(FN+TP)*(FP+TP)) / (Total*Total)Ãâà for train values randomAccuracyTrainà ¯ÃâÃ
¸((true_negatives_for_train+false_positives_train_counter)*(true_negatives_for_train+false_negatives_for_train)+(false_negatives_for_train+count_train_predicted_donations)*(false_positives_train_counter+count_train_predicted_donations))/(total_train*total_train) # randomAccuracy = ((TN+FP)*(TN+FN)+(FN+TP)*(FP+TP)) / (Total*Total)Ãâà for test values randomAccuracyTestà ¯ÃâÃ
¸((true_negatives_for_test+false_positives_test_counter)*(true_negatives_for_test+false_negatives_for_test)+(false_negatives_for_test+count_test_predicted_donations)*(false_positives_test_counter+count_test_predicted_donations))/(total_test*total_test) # kappa = (totalAccuracy randomAccuracy) / (1 randomAccuracy) for train kappa_train à ¯ÃâÃ
¸ (totalAccuracyTrain-randomAccuracyTrain)/(1-randomAccuracyTrain) # kappa = (totalAccuracy randomAccuracy) / (1 randomAccuracy) for test kappa_test à ¯ÃâÃ
¸ (totalAccuracyTest-randomAccuracyTest)/(1-randomAccuracyTest) # print kappa error cat(Kappa error: ,abs(kappa_train-kappa_test))
Subscribe to:
Posts (Atom)