Saturday, December 28, 2019

Flatback Sea Turtle Facts

Flatback turtles (Natator depressus) live primarily on the continental shelf of Australia and nest only on Australian beaches. Despite their limited range, probably less is known about this sea turtle species than the other six sea turtle species, which are more wide-ranging. Initial classification of flatback turtles led scientists to think they were related to Kemps ridley or green sea turtles, but evidence in the 1980s led scientists to determine that they were a separate, genetically distinct species. Description The flatback turtle (also called the Australian flatback) grows to about 3 feet in length and weighs about 150-200 pounds. These turtles have an olive-colored or gray carapace and pale yellow plastron (bottom shell). Their carapace is soft and often turns up at its edge. Classification Kingdom: AnimaliaPhylum: ChordataClass: ReptiliaOrder: TestudinesFamily: CheloniidaeGenus: NatatorSpecies: depressus (referred to as depressa in the World Register of Marine Species (WoRMS)) Habitat and Distribution Flatback turtles are found in the Pacific Ocean, primarily in waters off Australia and Papua New Guinea and occasionally off Indonesia. They tend to frequent relatively shallow, coastal waters less than 200 feet deep. Feeding Flatback turtles are omnivores that  feed on invertebrates such as jellyfish, sea pens, sea cucumbers, crustaceans and mollusks, and seaweed. Reproduction Flatback turtles nest along the northern coast of Australia, from Western Australia to Queensland. Males and females mate offshore. Mating often results in bites and scratches in the females soft skin, which later heal. Females come ashore to lay their eggs. They dig a nest that is about 2 feet deep and lay a clutch of 50-70 eggs at one time. They may lay eggs every 2 weeks during the nesting season and return every 2-3 years to nest. Although the egg clutch size of flatback turtles is relatively small, flatbacks lay unusually large eggs - even though they are a medium-sized turtle, their eggs are almost as big as those of the leatherback - a much larger species. The eggs weigh about 2.7 ounces. The eggs incubate for 48-66 days. The length of time depends on how warm the nest is, with warmer nests hatching sooner. The baby turtles weigh 1.5 ounces when they hatch and carry undigested yolk, which will nourish them during their initial time at sea. Flatback turtle nest and hatchling predators include saltwater crocodiles, lizards, birds, and crabs. Once they reach the ocean, hatchlings do not go into deeper waters like other sea turtle species but stay in shallow waters along the coast. Conservation The flatback turtle is listed as Data Deficient on the IUCN RedList, and vulnerable under the Australian Environment Protection Biodiversity Conservation Act. Threats include harvesting for eggs, bycatch in fisheries, nest and hatchling predation, entanglement in or ingestion of marine debris and habitat destruction and pollution. References and Further Information Australian Government. EPBC Act List of Threatened Fauna.IUCN Marine Turtle Specialist Group. Flatback Turtle: Natator depressus .Red List Standards Petitions Subcommittee 1996. Natator depressus.  IUCN Red List of Threatened Species.Spotila, James R. Sea Turtles: A Complete Guide to Their Biology, Behavior and Conservation 2004. The Johns Hopkins University Press.SWOT. State of the Worlds Sea Turtles.Waller, Geoffrey, ed. SeaLife: A Complete Guide to the Marine Environment. Smithsonian Institution Press. Washington, D.C. 1996.

Friday, December 20, 2019

The Theory Of Evolution By Natural Selection - 1329 Words

The theory of evolution by natural selection proposes that all species are related (Eade, S. and profile, V. 2014). There is estimated to be between 6 million and 100 million different species in the world, with more species undiscovered than those discovered; this is all owing to the concept of evolution (Borenstein, S. 2014). Evolution is defined as the â€Å"change in the characteristics of a species over many generations (Linstead, 2012).† The most widely accepted theory of evolution is natural selection, which is the â€Å"process where an environmental factor acts on a population and results in some organisms having more offspring than others (Linstead, 2012).† Other forms of selection include artificial selection, which occurs when people†¦show more content†¦These successful genes are inherited by the offspring in order to recreate another healthy generation of species (Biology Online, 2014). However, natural selection will alter overtime due to selecti ve pressures meaning that particular characteristics will only be favourable for a certain amount of time as species can evolve to suit more successful features. There are three main scientists whose works contributed to the now-orthodox theory of natural selection; Jean-Baptiste Lamarck, Charles Darwin and Alfred Russel Wallace. Jean-Baptiste Lamarck Lamarck (1744 - 1829) was a French Biologist with a thorough knowledge of medicine and botany. He also recognised the similarities of species and came to the assumption that â€Å"life was not fixed (Florida State University, 2014).† He developed the first comprehensive theory of evolution (Wagner, J. 2013). He continued to contribute to the cell theory and suggested an alternative evolution hypothesis based on â€Å"acquired characteristics†. His mechanism was open-minded; believing that organisms had an â€Å"obsession to be perfect (Unknown, 2011).† When environments modified, organisms needed to alter themselves in order to survive. It was believed that if beings continued to use an organ more than they had previously, it would increase in size throughout its lifetime and vice versa (Strickberger, M. 2014). Lamarck applied this theory to giraffes. He assumed that a â€Å"nervous fluid† would flow into

Thursday, December 12, 2019

Causes of social fragmentation and participatory art Example For Students

Causes of social fragmentation and participatory art Outline1 Causes of societal atomization and participatory art1.0.1 Chapter one1.0.2 The Causes of Social Fragmentation1.0.3 Chapter Two1.0.4 Guy Debord and His Concept of The Society of Spectacle 1.0.5 Chapter Three1.0.6 Participatory Art Causes of societal atomization and participatory art Chapter one The Causes of Social Fragmentation Since the beginning of the 20th century, particularly under the government of late capitalist economy, some of the artistic groups expressed their concerns over the sprawling society prosecuting their pattern to react to it. Before I look at those artistic responses in the undermentioned chapters, in this chapter I will be reexamining the primary causes of the altering inter-human dealingss within society. The Fall of the Berlin Wall in 1989 and a twosome of old ages subsequently the reported End of the Cold War in 1991, was merely a beginning of a new epoch of neoliberalism or in other words an unrestrained type of capitalist economy. A brief definition of neoliberalism gives Elizabeth Marinez and Arnoldo Garcia on Global Exchange web site. They pick out five chief points: The regulation of the market, Cuting public outgo for societal services, Deregulation, Privatization and Extinguishing the construct of the public good or community . The focal point of all these affairs is the favourable conditions for concerns, minimising the authorities controls in order to let a free and efficient market place, nevertheless at the same clip it worked largely against the on the job category people because of the reduced societal security including subsidisation. Finally people were forced to take individual duty as an exigency to last. Former Prime Minister, Margaret Thatcher speaking to Wo men s Own magazine ( October 31 1987 ) emphasized: There is no such thing as society . A ; lt ; Deer, 1988 A ; gt ; In other words the denial of society s being turns us into persons constrained to run in private infinite being responsible for our ain public assistance. Less and less duty for people s societal security leads to the authorities leveling the welfare province , which was a proviso of services and security by the province, and a warrant of minimal criterions including minimal income A ; lt ; An Introduction to Social Policy A ; gt ; . These altering ordinances within the authorities and the earlier mentioned phenomenon of the twentieth century like denationalization have contributed tremendously to the turning gulf between people by pressing competition. This started to boom progressively because of the mounting figure of privatized companies and multi-national spread corporations, free endeavors and concerns within the boundaries of the western universe. This in clination automatically disregarded the jurisprudence of equality thereby spliting people into peculiar societal groups. All these procedures became the stimulation to the formation of consumer society, reconstituting the focal point from production to ingestion. In the capitalist economic system ware became the driving force to society thereby accomplishing the entire business of societal life ( Bourriaud, 2002:113 ) . These economic alterations less existent goods produced, more promises made through progressively sophisticated advertisement and the deceasing pant of capitalist economy are the real roots of postmodernism and its attendant thoughts, suggest the Marxist econo-historians . A ; lt ; Mizrach A ; gt ; Whereas despite the booming economic system of the strongest states, prosperity of the international corporations so the fluxing wealth to the art universe excessively the greatest consequence on art has non been on its economic system but its rhetoric ( Stallabrass, 2004:9 ) . This meant that some cultural barriers fell down every bit good. Increase of looking biennials, art event s, new modern-day art museums showed the influence of planetary alterations and disturbance. However, the activities of these museums became steadily more commercial as they adopted corporate ideals, set uping confederations with concern, conveying their merchandises closer to commercial civilization . ( 2004:10 ) It shows that our cultural, societal, economical and political life is intertwined every bit good as dependent upon each other. The fact of neglecting Democracy shows English economic expert and professor Noreena Herzt placing it as: societal unfairness, inequality and power dissymmetries , ( 2002:271 ) nevertheless the cause of the degrading society lies in the power of pull offing the society as a marionette which lacks its liberty being manipulated by others. A philosopher and author Raoul Vaneigem put it, the infinite of mundane life is encircled by every signifier of conditioning ( cited in Gardiner, 2000:107 ) , he continues, one of those steps is the trade good the venue of societal control ( p.108 ) . Stephen Willats calls it a society as a sort of inert natural stuff to be diversely processed and regulated both spatially and ideologically . ( cited in Kester, 2004:91 ) In stating this he distinguishes the communities treated as the passive or the invertebrate. Normally the duty for all these actions is carried by the province, the bureaucratic setup. However increasing corruptness is beside s the cause of Democracy failure. Hertz giving the illustration of increasing corruptness within the State organic structures disclaims the governor s power as to the full working. Today altruists are acute to donate to assorted causes but normally with the purpose to hold an influence all over the universe. Finally the authorities does non interfere in this affair as it used to be seen as stepping in to control their power ( 2001:206 ) . Therefore it is non surprising that the common people have even less power to do an impact. No admiration that the definitions: Government by the people, exercised either straight or through elected representatives and The common people, considered as the primary beginning of political power As ; lt ; The Free Dictionary A ; gt ; can be barely considered as still holding the same significance today. Apparently this transitional clip from one period to another, the displacement from Industrialism to Information Age, made an tremendous impact on the political, economic and societal clime. This displacement was the ground for non merely the antecedently discussed causes like neoliberalism or consumerism taking to the societal atomization and disaffection but besides the followers. The true footing of postmodern idea is the displacement to a post-industrial economic system. Many postmodernists would hold, proposing that in the new economic system, service and information will be more of import trade goods than goods or labour power in the new information society amp ; lt ; Mizrach A ; gt ; . Another factor impacting the societal battle is mentioned in this accent by Mizrach promoting the importance of being able to understand and do out a new environment, where the laterality of the information undisputedly is important in order non to fall behind by traveling manus in baseball mitt with the new technological accomplishment leting it to run the new information flow, as without information this endurance will non be possible. However art critic Nicolas Bourriaud speaking about the development of communicating tools every bit good as the mechanisation of societal maps Markss it as a weak nexus in societal exchanges, about replacing them. He gives common illustrations such as automated telephone services replacing the human voice, hard currency machines non necessitating human interaction for money dealing undertakings. ( 2002 ) This lone illustrates the non-stopping advancement in engineering development, in some facets to the hurt of world, finally turning against the adult male himself despite the great part for illustration to medicate and scientific discipline. Noreena Hertz in the Silent Takeover ( 2002 ) proves the fact, that engineering has facilitated a production procedure by contriving fabrication. In other words this is a exchanging from handcraft to high-tech. Indeed technological progresss have allowed machines to replace people ( p.61 ) . However there is concern if the same engineerings are replacing the human relationship excessively, in such a manner exposing the battle of our society. It is non a new thought but instead the on-going issue of the technological invasion into our lives, which is replacing non merely our existent demands but besides our existent values. Michael and Diane Medved present the flooring fact in the book Salvaging Childhood ( 1999 ) : The mean American kid will pass more clip watching Television by the age of 5 than they will pass speaking to their male parent in their life-time ( p.19 ) , which means the continuously turning withdrawal of kids from their parents. Unwittingly possible relationships are being superseded by engineering. Another illustration of human interaction being replaced through engineering is a good known eating house Inamo in Soho, which is sole because of a de-personalised procedure of telling nutrient. The synergistic system does everything for the server in relation to taking the orders. Apparently full of exhilaration clients enjoy taking the control into their custodies. However in the terminal there is a lost connexion in communicating between client and forces. This is an indicant of the enormously spread outing intercession of engineering into our mundane life, which is making disaffection by weakening the human relationships. This is one of the conducive factors for Bourriaud, whose thoughts will be explored in the following chapters in more item. Looking at these the illustrations we see that today engineering undisputedly is one of the tools that patterns our lives. Another instance of societal concern and a effect of engineering ingestion occurs non merely every bit physical force, but instead the electronic aggression As ; lt ; Centers for Disease Control and Prevention ( CDC ) A ; gt ; spread in practical infinite, where young persons utilizing new communicating avenues such as text messaging, chat suites, and societal networking web sites, can pull strings their namelessness and go against their equals. Youth can utilize electronic media to abash, harass or endanger them amp ; lt ; CDC A ; gt ; . The purpose of the force against others frequently arises from a antecedently experienced clang with force, no affair what beginning it comes from, whether it be a video game, cyberspace or media. Research workers in their work The influence of media force on young person confirm that a assortment of violent media is c ome ining the place and ask foring the active engagement of immature kids frequently with small parental supervising amp ; lt ; Anderson et al. , 2003:105 A ; gt ; . Finally as a consequence it permits media force to be seen as one of the complex influences on the behaviour of kids and young person amp ; lt ; 2003:105 A ; gt ; . These manifestations of force reveal a harmful atmosphere in the societal clime lifting from societal atomization. Computer Crime (1512 words) EssayHowever as society has confused the existent values in the context where being is equated with having under consumer capitalist economy ( Gardiner, 2000:110 ) . Art is non without a ground. Often it can make more than we can conceive of through the small appreciation of micro-utopias experienced in the graphicss altering the forms of our lives. Chapter Three Participatory Art German author Walter Benjamin has said: The work of art should actively step in in and supply a theoretical account for leting viewing audiences to be involved in the procedure of production: this setup is better, the more consumer it is able to turn into manufacturers that is, the more readers or witnesss into confederates . ( cited in Bishop, 2004:12 ) This is what most of participatory art is endeavoring to make. But the inquiry arises as to if art can move, like the Freudian metaphor would show, as the therapist ( Gardiner, 2000:120 ) which was used to qualify the curative activities of Situationists. Therefore this chapter will be looking at the different attacks in participatory art and if art can be the manner of work outing societal issues. A really interesting contemplation is raised by Felix Guattari a Gallic institutional clinical psychologist and philosopher: the merely acceptable end of human activities is the production of a subjectiveness that invariably self-enriches its relationship with the universe . ( cited in Bishop, 2006:169 ) . The thought has found favour with modern-day creative persons who create and set-up life forms with different tracts instead than peculiar objects, therefore they use clip as a natural stuff where administrative officials alternatively are handling the communities as a natural stuff ( Kester, 2004 ) . No uncertainty this comparing shows the contrast between the different attacks. Here modern-day art patterns suggest the production of subjectiveness as the chiefly facet to animate the lost entirety in a corporate effort ( Bishop, 2006:169 ) whereas the province as opposed to the creative person is absorbing the community to an homogeneous and inactive or even unvoiced status whic h has to be regulated by the province. By looking at this contrast, a adult male is seen as a topic or as an object depending on, who s manus holds the tool. Two different establishments two different perceptual experiences of the human-being. For this ground merger can be considered simply as implementing therefore it remains as a construct of micro-utopia in art. The undertaking 7000 Oaks for Documenta 7 ( 1982-87, fig.6 ) by Joseph Beuys is a good illustration of a societal sculpture to be participatory. This undertaking had been started with the purpose non to be ended for the ecological and green intents. However the usage of a tree in this undertaking I find more symbolic than actual. A tree itself has symbolic significance, particularly the oak tree for illustration, the oak is the mightiest of trees and symbolizes strength, bravery fulfilment amp ; lt ; Living Arts Originals A ; gt ; . However solidness and illustriousness as the characteristics of the tree may go evident merely after clip, as the tree grows, so certain procedures require clip until it consolidates. Therefore in this undertaking clip instead than the object is used as a natural stuff for a community to beef up societal connexions utilizing the planting of the oak tree as a tool merely. This undertaking is aimed more at assemblage people together for the intent, which amalgamates the people. Therefore to follow aspirations, the stability to non halt planting trees is really of import. This analogue shows that a certain aim has a manner of conveying people together, even if it entreaties merely to one group of people like Greens . Finally Joseph Beuys says: The context of art offers advantages when action involves besieging societal and bureaucratic hierarchies . ( cited in Kester, 2004:101 ) He confirms the fact of the inability of art to be to the full working without declining the appropriate governments. Supporting the thought which is raised by Beuys, creative person Rirkrit Tiravanija exposes this place by put ining his work Untitled ( tomorrow is another twenty-four hours ) ( 1997, fig.7, fig.8 ) into the gallery infinite. The scene of his ain flat in New York suggests that visitants to the gallery be involved into ritual plant we do everyday like cookery, rinsing, hanging out in the life room etc. Tiravanija himself asserts this as the alone combination of art and life offered an impressive experience of togetherness to everybody ( cited in Bishop, 2005:118 ) in a non-hierarchical sense. His other plants besides have similar subjects: parallel infinites to the environments of our day-to-day life. Cafes and dining suites tend to be with the ruling subject of inclusion into societal activities. It is like an effort to defy or as Beuys says circumvent the societal hierarchies or castes of the deep-seated system of capitalist economy by ask foring to trip the audience in engagement, in the whole procedure of the creative activity, whereas Kester identifies that as incarnations of art s power to exceed institutional and cultural boundaries and to make a Utopian infinite of free and unfastened exchange . ( p.105 ) One of such undertakings was implemented by the creative person Jay Koh within two months in 1995-6 in Thailand. His purpose to utilize art as an cosmopolitan linguistic communication ( Kester, 2004:104 ) in cultural exchanges was successfully fulfilled as a undertaking called Excha nging Thought. ( fig.9 ) In order for the thought of cross-cultural to work there is necessary to admit the bing differences sing the political and societal context. ( p.104 ) Continuing on from this undertaking, the thought was to give the graphicss of assorted international creative persons in exchange for the things and objects brought by townsfolk of Chiang Mai in a market place, therefore a strategic construct of duologue was interrupting different attitudes and traverse cultural barriers utilizing the professionals and the people dialoging on a one-on-one footing as dialogical art is non merely ocular but besides aural and haptic . ( p.189 ) In other words it is similar physical experience in all the senses. Since art is no longer a narrative for art history to discourse the issues through the position of the objects, modern-day art is to make with synergistic, user-friendly and relational constructs ( Bourriaud, 2002:8 ) . Some of the illustrations of such work are art installings by Cuban creative person Felix Gonzalez-Torres. The graphics Untitled ( Placebo ) ( 1991, fig.10 ) invites the spectator to pick up some Sweets off the floor covered by them, so prosecuting the audience to take part. The same creative person allows the witness freely to assist themselves taking postings with them off the paper tonss in his work Untitled ( 1989-90, fig.11 ) . Stallabrass calls this democratic ideal , where the audience plays an of import function holding the voice for the valuable part in footings of its ideas and actions over the creative person. Nicolas Bourriaud claims that art that encourages societal interactions is human and democratic nevertheless Stallabrass asserts that democracy b ing merely in art is a serious job, he prolongs: Governments hope that socially synergistic art will move as dressing for the grave lesions. ( 2004:123 ) , This statement of the willingness to implement democracy through art is the first indicant of the deficiency of democracy in our every twenty-four hours environment. Continuing on with the democratic graphicss, one of the earlier mentioned illustrations is the art installing of Tiravanija s flat which is conceived as political because of an thought of democracy , ( Bish op, 2005:119 ) which is seen in most of his plants, capable of manufacturing relationships. However Bishop argues against this construct as recent political theoreticians have shown that inclusiveness does non automatically compare with democracy: alternatively, the populace domain remains democratic merely in so far as its naturalized exclusions are taken into history and made unfastened to controversy . ( Bishop, 2005:119 ) This means that democracy is exposed merely when the oppositional attitudes are brought into treatment. Mentioning back to the already mentioned Koh s observation of the recognition of the bing differences, this can besides be the beginning of democratic dealingss between persons and cross-cultures. However the phenomenon of argument vanishes in Tiravanija s work as the work speaks merely to a community whose members have something in common: an involvement in art or free nutrient, continued Bishop ( p.119 ) . Apparently conveying different categories into t he gallery infinite such as the hapless and the intelligent individual, does non needfully take to arbitrary argument for the bing differences. Kester raises a different facet for the statement against Bourriaurd s thesis, speaking about Tiravanija s flat reconstructed in the Kolnischer Kunstverein. He argues for the institutional-transgress work as the menace for the establishment because of stateless people who cluster around the gallery. Udo Kittelmann supports the contradiction by doing a comment about the earlier mentioned Tiravanija s work. The frights of the desolation of art-space where the infinite is inhabited did non turn out but the infinite lost its institutional map and eventually turned into a free societal infinite ( cited in Bishop, p.119 ) . Again it is contradictory to the thesis of Bourriaud who upholds the thought of this art being human and democratic ( Stallabras, 2004:121 ) . This statement shows that today good established institutional infinite and strongly prevailing hierarchal society are acknowledging alterations really reluctantly. Looking at the different undertakings in this chapter it is seen how artists attack and respond to todays environment.

Wednesday, December 4, 2019

Assignment from readings free essay sample

8-17 Fairfax Recreation Center (Internal Controls at a Fitness Center) The Fairfax Recreation Center is a neighborhood fitness center equipped with an indoor swimming pool, exercise equipment, and a running track. The Center is open seven days a week, from 8:00 A. M. to 10:00 P. M. Stationed just inside the front doors is a turnstile. An employee oversees access through the turnstile. Before anyone can enter the facility, they must either present their membership card or pay a $6 daily fee. When the employee at the turnstile collects cash for daily fees, he or she also has the visitor complete a waiver form. The employee then deposits the cash in a locked box and files the forms. At the end of each day the Recreation Center accountant collects the cash box, opens it, removes the cash, and counts it. The accountant then gives a receipt for the cash amount to the employee on turnstile duty. We will write a custom essay sample on Assignment from readings or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The accountant takes the cash to the bank each evening. The next morning, the accountant makes an entry in the cash receipts journal for the amount indicated on the bank deposit slip. Susan Porcano, the Fairfax Recreation Center General Manager, has some concerns about the internal controls over cash. However, she is concerned that the cost of additional controls may outweigh the benefits. She decides to ask the organization’s outside auditor to review the internal control procedures and to make suggestions for improvement. Assume that you are the outside auditor. Indicate weaknesses in the existing internal control system over cash admission fees and recommend one improvement for each of the weaknesses you identified. Organize your answers as follows: 9-15. Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. Leslie Thomas, a secretary at the university, indicated that she had worked 40 hours on her regular time card. The university paid her for 400 hours worked that week. Apply a separation of duties control. The data processor will input the hours worked and that can be verified by the accounting manager for accuracy. Another control that can be added to this is to establish a limit in the AIS for total hours worked so that no value above that number can be inputted. This will detract from more hours worked being inputted in the first place. b. The aging analysis indicated that the Grab and Run Electronics Company account was so far in arrears that the credit manager decided to cut off any further credit sales to the company until it cleared up its account. Yet, the following week, the manager noted that three new sales had been made to that company—all on credit. Utilization of administrative controls would work in this instance. When designing the IS, there should be the ability to note an account for lack of payment and temporarily suspend the account until necessary action is taken. c. The Small Company employed Mr. Fineus Eyeshade to perform all its accounts receivable data processing. Mr. Eyeshade’s 25 years with the company and his unassuming appearance helped him conceal the fact that he was embezzling cash collections from accounts receivable to cover his gambling losses at the race track. The duel observation control and separation of duties would work here. Have two people document the receivables as they come in and have Mr. , Eyeshades reconcile the accounts based off of that. d. The Blue Mountain Utility Company was having difficulty with its customer payments. The payment amounts were entered directly into a terminal, and the transaction file thus created was used to update the customer master file. Among the problems encountered with this system were the application of customer payments to the wrong accounts and the creation of multiple customer master file records for the same account. The AIS should incorporate an unfound record test and also a check digit control procedure. This will ensure that the account number being entered is correct and that no other file has been produced. e. The Landsford brothers had lived in Center County all their lives. Ben worked for the local mill in the accounts payable department, and Tom owned the local hardware store. The sheriff couldn’t believe that the brothers had created several dummy companies that sold fictitious merchandise to the mill. Ben had the mill pay for this merchandise in its usual fashion, and he wrote off the missing goods as ‘‘damaged inventory. ’’ Ben does not appear to be a manager, so there should be a separation of duties with in the accounts payable department. The documents should be prepared by Ben, but should also be verified by a manger. There should also be internal audits that would bring to light any redundancies on approving officials or names within the organization. 9-16. Identify one or more control procedures (either general or application controls, or both) that would guard against each of the following errors or problems. a. A bank deposit transaction was accidentally coded with a withdrawal code. Feedback mechanism in the form of a receipt will identify this incident. The use of an edit test would check for b. The key-entry operator keyed in the purchase order number as a nine-digit number instead of an eight-digit number. AIS should have a check for the number of digits in that field. If the field is only 8 digits then it should be formatted not allow for anything more or less. c. The date of a customer payment was keyed 2001 instead of 2010. A feedback mechanism such as a payment slip/receipt would be used to verify the information. Also, a reasonable test would be appropriate to ensure that the date is not past a certain value. d. A company employee was issued a check in the amount of ? $135. 65 because he had not worked a certain week, but most of his payroll deductions were automatic each week. An edit test of sign†¦. meaning ensuring that the value was a positive number†¦. rejecting a negative value in the payroll system. e. A patient filled out her medical insurance number as 123465 instead of 123456. Edit test of reasonableness†¦the insurance number field would have to fall within a valid range of values to be accepted. f. An applicant for the company stock option plan filled out her employee number as 84-7634-21. The first two digits are a department code. There is no department 84. Unfound record test would work for this. If the master file is not found for department 84 then the master file would reject the transaction. g. A high school student was able to log onto the telephone company’s computer as soon as he learned what telephone number to call. The use of biometrics wouldn’t allow the student just to know a phone number and be able to log onto computers h. The accounts receivable department sent 87 checks to the computer center for processing. No one realized that one check was dropped along the way and that the computer therefore processed only 86 checks. A batch control document with a list of all the checks that need to be processed is appropriate. On the document will also contain a total dollar amount of all the checks.

Thursday, November 28, 2019

Nazism Essays (2206 words) - Adolf Hitler, Nazi Germany,

Nazism NAZISM The National Socialist German Workers' Party almost died one morning in 1919. It numbered only a few dozen grumblers' it had no organization and no political ideas. But many among the middle class admired the Nazis' muscular opposition to the Social Democrats. And the Nazis themes of patriotism and militarism drew highly emotional responses from people who could not forget Germany's prewar imperial grandeur. In the national elections of September 1930, the Nazis garnered nearly 6.5 million votes and became second only to the Social Democrats as the most popular party in Germany. In Northeim, where in 1928 Nazi candidates had received 123 votes, they now polled 1,742, a respectable 28 percent of the total. The nationwide success drew even faster... in just three years, party membership would rise from about 100,000 to almost a million, and the number of local branches would increase tenfold. The new members included working-class people, farmers, and middle-class professionals. They were both better educated and younger then the Old Fighters, who had been the backbone of the party during its first decade. The Nazis now presented themselves as the party of the young, the strong, and the pure, in opposition to an establishment populated by the elderly, the weak, and the dissolute. Hitler was born in a small town in Austria in 1889. As a young boy, he showed little ambition. After dropping out of high school, he moved to Vienna to study art, but he was denied the chance to join Vienna academy of fine arts. When WWI broke out, Hitler joined Kaiser Wilhelmer's army as a Corporal. He was not a person of great importance. He was a creature of a Germany created by WWI, and his behavior was shaped by that war and its consequences. He had emerged from Austria with many prejudices, including a powerful prejudice against Jews. Again, he was a product of his times... for many Austrians and Germans were prejudiced against the Jews. In Hitler's case the prejudice had become maniacal it was a dominant force in his private and political personalities. Anti-Semitism was not a policy for Adolf Hitler--it was religion. And in the Germany of the 1920s, stunned by defeat, and the ravages of the Versailles treaty, it was not hard for a leader to convince millions that one element of the nation's society was responsible for most of the evils heaped upon it. The fact is that Hitler's anti-Semitism was self-inflicted obstacle to his political success. The Jews, like other Germans, were shocked by the discovery that the war had not been fought to a standstill, as they were led to believe in November 1918, but that Germany had , in fact, been defeated and was to be treated as a vanquished country. Had Hitler not embarked on his policy of disestablishing the Jews as Germans, and later of exterminating them in Europe, he could have counted on their loyalty. There is no reason to believe anything else. On the evening of November 8, 1923, Wyuke Vavaruab State Cinnussuiber Gustav Rutter von Kahr was making a political speech in Munich's sprawling B?rgerbr?ukeller, some 600 Nazis and right-wing sympathizers surrounded the beer hall. Hitler burst into the building and leaped onto a table, brandishing a revolver and firing a shot into the ceiling. ?The National Revolution,? he cried, ?has begun!? At that point, informed that fighting had broken out in another part of the city, Hitler rushed to that scene. His prisoners were allowed to leave, and they talked about organizing defenses against the Nazi coup. Hitler was of course furious. And he was far from finished. At about 11 o'clock on the morning of November 9--the anniversary of the founding of the German Republic in 1919--3,000 Hitler partisans again gathered outside the B?rgerbr?ukeller. To this day, no one knows who fired the first shot. But a shot rang out, and it was followed by fusillades from both sides. Hermann G?ring fell wounded in the thigh and both legs. Hitler flattened himself against the pavement; he was unhurt. General Ludenorff continued to march stolidly toward the police line, which parted to let him pass through (he was later arrested, tried and acquitted). Behind him, 16 Nazis and three policemen lay sprawled dead among the many wounded. The next year, R?hm and his band joined forces with the fledgling National Socialist Party in Adolf Hitler's Munich Beer Hall Putsch. Himmler took part in that uprising, but he played such a minor role that he escaped arrest. The R?hm-Hitler alliance survived the Putsch, and ?hm's 1,500-man band grew into the

Sunday, November 24, 2019

buy custom The Home Schooling essay

buy custom The Home Schooling essay Home schooling is very helpful for children. First, students who engage in homeschooling get an opportunity to get individualized attention that is difficult to get at school. Parents get the opportunity to offer their children not only academic guidance but also religious and philosophical advice. Secondly, homeschooling guarantees flexibility that makes it possible for the student to study at his own pace. Through homeschooling, a student learns how to manager his time well in order to accommodate academic work, home duties and family vacations. For time management skills to be acquired, a student is forced to be disciplined. This can never happen at school, where learners have to wait to be driven into literally every activity, including classrooms, games, cleaning duties and all other extracurricular activities. Linda observes that when a child is at home, he has all the time to develop a strong, stable relationship with his parents, who can always influence him in matters of behavior, discipline and academic excellence. In this case, parents play a very important role not only as guardians, but also as teachers (372). This increases family cohesion and unity. Goldring, Cohen%u2010Vogel, and Smrekar observe that the home learning environment, while being highly individualized, affords the child an oportunity to learn about the pragmatic aspects of education (41). The child can readily associate learning tasks with the particular real-life events that relate to the lessons learned. At home, there are no limits to the line of thinking that a child can adopt in any topic. This makes the child become a confident, independent thinker who can use the concepts learned to solve day-to-day lifes problems. Medlin says that homeschooling denies children the valuable opportunity of interacting with other children (119). Interactions among children are a very important component of elementary education. The shared schooling experiences play a crucial role in physical, social, mental and emotional development among children. When the child is all alone at home, there is no one to challenge him with class work, physically strenuous games or intimate social encounters. At school, a child gets an opportunity to be exposed to the expertise of a teacher who is specially trained on how to manage interactions among children. Denying children this opportunity is not a good thing for their future academic lives. Since the parent is most likely not a trained teacher, he may end up using the wrong curriculum and interaction strategies. Socialization in the home setting is not as engaging as it is in the school environment. A child iis exposed to affectionate siblings, locking the child out of an opportunity to learn how to build his own affectionate relationships from scratch with classmates and schoolmates. Additionally, in a formal schooling setting, a child is exposed to children whose social backgrounds are very divergent. Therefore, a child has to learn how to adapt to behaviors and attitudes of children from diverse educational and social backgrounds as well as to build mutually beneficial relationships. Socialization, according to Aurini and Davies, gives children the confidence to argue and think critically (465). The capacity to think and argue critically is increased when one is exposed to people whose ideas and perspectives are very different from ones own. In the home setting, a child always lacks this wealth of divergent perspectives to stimulate his critical and creative thinking ability. In summary, home schooling is helpful in one way and detrimental in another. It is helpful in the sense that a child gets individualized attention, benefits from flexibility in time management practices and builds a stable relationship with all members of the family. However, the main disadvantage of homeschooling is that it denies children the valuable opportunity of becoming socialized into the outside world. Buy custom The Home Schooling essay

Thursday, November 21, 2019

The Automobile industry Essay Example | Topics and Well Written Essays - 2000 words

The Automobile industry - Essay Example The automobile industry is a textbook example of an industry where economies of scale pay a very important role. While there may be dozens of players around the world who produce, support and work with the industry, there are only a few producers who can claim to have a significant share of the market. Similarly, even though cars are produced in almost every developing and developed nation, only a few countries contribute in a significant manner to the global car production and consumption statistics. This can be attributed to the fact that the first automobiles were produced and developed soon after the industrial revolution by countries that had the required infrastructure and engineering skills. For example, the first steam powered three wheeler was built in France in 1769 and the first internal combustion engine was built in Belgium while the Germans made the predecessor of the modern car in 1885. Ford started his assembly line plans in 1896 and the mass production of motor vehicles was created as an established industry (Baki, 2004). In the modern world, there are just a few companies who define the overall structure of the automobile industry. They are: GM, Ford, Daimler-Chrysler, BMW, VW, Volvo, Toyota, Mazda, Mitsubishi and Nissan. These companies also formed an industry alliance which is called the Alliance of Automobile Manufacturers. In the last two decades, the industry has seen a spike in mergers and acquisitions which has consolidated many different brands of cars under the same company (Raisch and Zimmerman, 2006). Very recently, technology and innovation has come to the forefront of car manufacturing since the pervasive nature of technology has motivated car producers to accept it as a given focus. For the present companies in the automobile industry, there are several different challenges which must be addressed. The first and most important

Wednesday, November 20, 2019

Microcirculation and Blood Pressure Assignment Example | Topics and Well Written Essays - 250 words

Microcirculation and Blood Pressure - Assignment Example Notably, the enormous amount of protein in the urine leads to water and salt retention in the kidney. This situation often leads to increased build-up of fluid including blood in the limbs and lungs. These fluid usually leak from the legs’ capillaries into the interstitial spaces. Measurement of blood pressure is never an easy task, as the process often seems. Notably, some doctors often do not follow the right procedure in carrying out this process. The detailed minor process should be carried out to ensure that accurate measurements are obtained. Blood pressure in everyone’s body often fluctuates rapidly (Porth and Porth, 2011). Moreover, the complex body system often affects and regulates the blood pressure. For instance, standing up may lead to rise or fall in blood pressure. Therefore, when measuring one’s blood pressure, the involved doctor should advise his or her patient to sit in some definite positions. Closing of legs or hanging of a patient’s arms too low will automatically raise such patients’ blood pressure thereby leading wrong blood pressure reading. Thus, numerous guidelines are in effect and should be followed properly while measuring blood pressure to ensure accurate results (Porth and Porth,

Monday, November 18, 2019

Foodmaster company Case Study Example | Topics and Well Written Essays - 1000 words

Foodmaster company - Case Study Example At present, the company has 4Â  factories, 16Â  retail branches and two dairy farms across the country. Moreover, the FoodMaster factories have the capacity to process more than 100 tons of dairy products daily at present. Initially, the company was interested in the manufacturing of yoghurt alone; however the company is currently manufacturing many other dairy products such as Kefir (a healthy dairy drink), Lapped Milk BIO-C Immun+ (a sweet vanilla flavored or fruit jam lapped milk), Dolce Yoghurt Drink (a gentle creamy drinking yoghurt made from milk of the highest quality, with large cantles of natural juicy fruit), Lactel Milk with Vitamin D (a milk RANGE with vitamin D) and Nenny Yogurt Drink (a drink made from the milk of the highest quality with a wide range of fruit supplements). Arethe yogurt, the sour cream, the home curd, Dolce yogurts and Bio-C Immune+ curdled milk are extremely popular among the people of Kazakhstan (FoodMaster, N.d.). The company has the habit of updating and diversifying its product ranges every year, based on the changing trends among the consumers. It should be noted that consumers are always look out for new tastes and flavors. FoodMaster Company knows this fact very well and has developed more than 100 popular dairy products as of now. Some of the major landmarks of FoodMaster Company’s history are given below. One of the major success factors of FoodMaster Company is its commitments to the corporate social responsibility, environmental protection and sustainable development. The company’s vision is to provide dairy products with natural ingredients to the people of Kazakhstan. It should be noted that many other prominent dairy companies in other parts of the world are using artificial ingredients to stretch the life of dairy products as much as possible. The company is giving more importance to the health and safety of the people rather than the profitability

Friday, November 15, 2019

Wireless Sensor Networks: Applications and Forms

Wireless Sensor Networks: Applications and Forms 1 Wireless Sensor Network In this chapter, wireless sensor network (WSN) principles are being shortly introduced and discussed. In order to increase the level of understanding for analyzing Wireless Sensor Network (WSN) systems it is useful to study the technology behind them the technologies which are presented in this section. Wireless Sensor Networks (WSNs) are distributed and independent sensors that are connected and worked together to measure quantities such as temperature, humidity, pressure, noise levels or vibrations [5]. WSNs can measure vehicular movement (velocity, location, etc.) and monitor conditions such as lightning condition, soil makeup and motion [5]. Nowadays, WSNs are utilized in many common applications such as vehicle applications. Some of vehicle applications are: vehicle tracking and detection, tire pressure monitoring, vehicle speed detection, vehicle direction indicator, traffic control, reversing aid sensors etc. Such applications can be divided in major categories such as safety, security, environment and logistics. To implement WSN in an application and have an efficient system, first we need to consider about WSN technology, components and communication topology and protocols. Therefore, first, in this chapter, basic information about WSN components, the communication devices and process unit of WSN will be described. Then, the chapter will be followed by a description of the WSN topologies and protocols emphasizing on mesh WSN technology with ZigBee Protocol. 1.1 Wireless Sensor Network component To provide comprehensive view of WSN hardware, understanding of WSN components structure is required. Wireless sensors are small microcontrollers equipped with wireless communication device and an energy supplier. The architecture of WSNs is illustrated in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 . As Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 shows the components of WSNs are sensing unit, processing unit, power supplier and communication device. The sensing unit consists of sensors and Analog to Digital Converters (ADCs). ADCs are responsible for gathering the signals and converting them into digital signals data and transfer them through each other using network topology to the processor unit. In the sensing unit, each sensor is called an ‘end node and varies in size and cost. The mission of these multifunction sensor nodes are to sense, process data and collaborate with other nodes [8]. Wireless sensor network can be positioned in two ways, either using a complex technique with the large sensors far from the object or using several sensors with an engineered design on position and topology [5]. In addition, each node provided with a wireless communication transceiver as a communication component. In the process unit, the controller and small memory storage are responsible for managing the collaboration within the sensors to achieve the assigning task. In addition, the communication device with a transceiver makes the network connection. Above all, the essential component of WSN is the power unit, which supports the power for all units [5]. One of the unique characteristics of sensor networks is that they are equipped with an on-board processor. This feature enables them to locally process some simple computations and broadcast only necessary processed data [5]. Network communication is really complicated and needs years of study [8], but to be able to implement WSN, we need to know some basic primary concepts of communication technology such as; network topologies, network protocol and their standards and specifications. 1.2 Communication technology To cover technical aspects of WSN, network topology and network protocol studying is needed. This study will help to provide information about reliability, robustness, security and stability and of WSNs software aspect to answer the research questions RQ. 1 ,RQ. 2 and RQ. 3 . 1.2.1 Topologies in WSN Communication In network communication, the big issue is how data transfers through nodes and nodes interconnect with each other. Several basic network topologies may be used for transmitting to and receiving from a node. The Alliance for Telecommunications Industry Solutions (ATIS) the standards organization of telecommunication industry explained the network topology as â€Å"The physical, real, logical or virtual arrangement of the nods/elements of a network† [9]. The topology shows the diameter and the number of nodes between any two nodes. Moreover how a data process and the data routing complexities are relied on the chosen topology. Consequently, some characteristics of a sensor networks such as latency, robustness and capacity are changed by their topology [10]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 is a graphic mapping of networks topology which shows the links of one or more nodes and explains the physical topology of the network. Despite having the same topology, two networks can differ in transmission rates because of their physical interaction, signal types and distance between nodes [9]. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 describes the different types of network topology. Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 Topology TYPES [9]. Since Mesh topology is a main topic in the thesis, it is studied more in-depth in this section 1.2.1.1 Mesh Wireless Network Wireless mesh network is a term used when all wireless nodes are connected to each other within an ad-hoc multi-hob and mesh topology. In this network, any pair of nodes is able to communicate between each other within more than one path. In this network each node is used as a router to forward packets to the neighbor nodes which they have linked to. That means all nodes communicate directly or through other midway nodes without any manual configuration. Therefore, this network also called a self-configuration and self-organized network [11; 12]. As described in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1, there are two types of mesh topology ‘Partially connected and ‘Fully connected (See Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ3). In a fully connected topology each node has the ability to communicate with all other nodes in the network and creates an interconnection links. By increasing the number of nodes in a mesh network, the number of links increases as well. On the other hand, in a partially connected topology, instead of direct interconnection between nodes, each node has two or more links to others to provide alternate routing and traffic balancing. Due to more links and indirect connections between nodes, traffic can flow through one or more router nodes to the destination [7] and create more reliable interconnections between nodes. Moreover, in partial network, the nodes are connected to either the node with higher rate of data transaction or the nearest neighbor node while in fully connected network all nodes have a direct links with each other. This multiple link path conducts a reliable communication. Therefore, whenever a connection fails or a node breaks down, the packages can automatically change their path by ‘jumping from a disconnected node. This is often called the self-healing of the network. This means that the networks connection stability and reliability are not essentially affected by node failures [11]. Due to the characteristics of wireless sensor network mesh, this network is self-configuring and self-organizing network in which each end-node is also used as a router (dual role- data originator /data router) to forward the signal packages all the way back of the main gateway. Therefore, due to the characteristics of mesh networks, this network is becoming one of the most implemented networks which able to have the flexible architecture for the network, easy self-configuration and robust fault tolerance connectivity [11; 12]. Additionally, the self-configuring characteristic of mesh WSN, bring the ability for the network to connect or disconnect nodes from the network. This brings the ability to grow/decrease the network by adding/removing nodes of a system. Mesh WSN has reliable self-healing and robust fault tolerance. This means if ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­Ã‚ ­ a node fails or breaks down the signal packages jump from the disconnected node and automatically conducts a new path through the nearest node. However, the new path imposes re-routing and re-organizing to the network [5], which consumes too much power from the system. Therefore, having a power-aware protocol and algorithm is necessary for mesh network. ZigBee protocol is one of the protocols which provides this ability for WSN. 1.2.2 Protocols in WSN Communication WSN systems include variety of protocols for communication. Protocols need to program in different architectural layers. One of these architectural standard is OSI (Open System Interconnection) framework. In this session a brief introduction of each protocol and OSI are delineated. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ4 shows the graphic overview of all wireless network technologies. This figure illustrated IEEE PAN/LAN/MAN technologies and clearly shows how these standards and protocols can be used in different conditions. For instance, 3G protocol is used to cover a long range of audio information in a wide area network (WAN) while for the same information in a short range and personal area network (PAN), Bluetooth is better. The standard conceptual rules set for data representation, data communication and error detection across two ends in telecommunication, are called communication protocols. These abstract rules represent in different layers of communication. There are different protocol stacks introducing different architectures for these layers such as AppleTalk, Distributed Systems Architecture (DSA), Internet protocol suite (TCP/IP) and Open Systems Interconnect (ISO/OSI). Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (a) illustrates the different layers of an OSI Model and their functionalities. The OSI model has seven layers and each layer provides services for the upper layer and requests services from the lower layer. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 (b) shows the typical communication protocols layers. Each of these layers has to deal with different issues regarding the communication procedure. As the typical protocol stack model shows in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 the communication protocols should implement all layers from bottom to top. In addition, a management protocol needs to be applied in each layer to manage power efficiency, robust connectivity and connection reliability (see: Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ5 b). Below, rules and functionality for each layer are described: * Physical layer: is responsible for signal processing and physical interface connectivity between a device and physical medium and used bit stream in its data unit. It acted as communication channel for sensing and actuation in cost-efficient and reliable manner. Some examples of this layer are: IEEE 802.11b/g Wi-Fi, IEEE 802.15.1 Bluetooth, IEEE 802.15.4 ZigBee, etc. [7] * Data link layer: provides functionality toward channel sharing, Medium Access Control (MAC-Layer), timing (e.g. data time arrival), local link and capacity. It is responsible for detecting and correcting the data errors in physical layer and control the locality data comparison. It follows the protocols such as point-to-point protocol (PPP) and IEEE 802 Local Link Control (LLC). [7] * Network layer: is responsible for network routing functionality, network security, energy and power efficiency and reliability of the communication. It includes the network topology management and manages the information and detects errors in data transfer from router to router. A number of protocols is address in this layer such as: Internet protocol (IP), Threshold Sensitive Energy Efficient Sensor Network Protocol and etc. [7]. * Transport layer: provides end-to-end transportation (distributing and gathering) of data between end users. It includes storage and responds for caching and controlling the data to recover them back to the initial message that has been sent. Best-known protocols for this layer are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) [7]. * Upper layers: The Upper Layers are responsible for application processing, external query processing and etc. Upper layers include presentation layer session layer and application layer [7]. The summary of these standards and protocols are shown in Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ6 Among all the standard and protocols, IEEE PAN/LAN/MAN technologies are the ones applied in the majority of commercialWSNs to support physical layer and link-data layer signal transmission. As SOHRABY and ZNATI (2007) mentioned, the most common best-known protocols are:† (1) the IEEE 802.15.1 (also known as Bluetooth); (2) the IEEE 802.11a/b/g/n series of wireless LANs; (3) the IEEE 802.15.4 (ZigBee); (4) the MAN-scope IEEE 802.16 (also known as WiMax); and (5) radio-frequency identification (RFID) tagging† [7]. Each of these protocols has their own benefits and constraints. The comparisons between IEEE technologies are mentioned in Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2. As Table 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 shows the IEEE 802.15.4 standard provides data rate of 20 to 250 kbps and operates in the 2.4-GHz ISM band. This standard covers signals in range of 10 m and requires the lowest power among other IEEE class. While IEEE 802.11a/b/g/n transmits the data in the rate of 54 Mbps ideal for wi reless internet connections and operates in the 2.4-GHz ISM (Industrial, Scientific and Medical) radio band as well as the 5-GHz ISM / 5-GHz U-NII (Unlicensed National Information Infrastructure) radio band. However, it requires much higher power consumption than IEEE 802.15 [7]. Recently, researchers put much effort to develop â€Å"a cost-effective standards-based wireless networking solution that supports low-to medium data rates, has low power consumption, and guarantees security and reliability† [7]. ZigBee Alliance is an association of companies which aims to provide such a standard for WSN consumers. Their mission is to have a simple, reliable, low-cost, low-power and standards-based wireless platform 1.2.2.1 ZigBee standard The ZigBee standard builds on IEEE 802.15.4 and is suitable for remote monitoring and controlling applications. Although it has lower-data-rates than the other standards, its reliability, security, long life battery with less complexity mechanism make it ideal for building automation in industrial network applications. The architecture of the ZigBee stack is established on the Open System Interconnection (OSI) model. The IEEE 802.15.4 defines the physical layer (PHY) and medium access control (MAC) sub-layer and In addition, ZigBee Alliance defines other functionalities for upper layers [7]. Figure 3à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ7 is a graphic overview of ZigBee protocol stack and shows the responsibility areas of IEEE 802.15.4, ZigBee Alliance platform and users applications [7]. This picture also shows the basic functionality of each layer. The data transmission service is provided by PHY layer and the protocol in this layer enables the connection between data units and the physical radio channel. ZigBee provides three different frequency band options for PHY layer. First, the transmission data-rate of 250kbps in 16 channels at 2.45GHz (Global) frequency. Second, with 40Kbps in 10 channels at 915MHz (Americas). And the last one, with 20kbps in 1 channel at 868MHz (Europe). The higher data-rate causes a higher order in modulation design and the lower frequency cause a larger cover area and better sensitivity. Depending on the power output, the transmission distance rate can change from 1 to 100 meters. (For more detail information see: Table 7à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 in Appendix A) ZigBee WSN has the ability to have static or dynamic network/component with either star or mesh topology and it has three types of nodes: a ZigBee Coordinator (ZC), ZigBee Routers (ZR), and ZigBee End-Devices (ZED). In order to have a communication protocol and physical connection both PHY layer and MAC sub-layers of the architecture should be defined upon agreement between server and clients. These layers require manual administrative procedures setting for server/client gateway. The next three levels namely: the network layer, security protocol and transport layer are defined by ZigBee alliance platform automatically. The last layer, application layer, has to interact with the user-interface and other applications; it ought to be programmed with high-level language so that integration with any existing devices applications becomes more conveniently practical. The ZigBee stack in gateway is responsible for all the network functionality such as network process management, authentication of the joined nodes, binding nodes and routing the messages throughout the network. ZigBee stack as a standard protocol, has clusters and libraries for improving the implementation process, therefore, using ZigBee compare to other protocols makes the system (including both hardware and software) development process much faster and easier. On the other hand, such standardisation provides easiness of adopt with third party sensors regardless of manufacturer, which might be attached to the network later. 2 Software Aspects To address the research question regarding the reliability, robustness, and security of any WSN application, it is essential to investigate the software architecture of that network. For convenience in description of the architecture of a WSN application, it is divided into three segments: Physical devices (such as lamps, sensors, nodes), Communication Protocol (terminals and servers, bridge, switch, network topology and standard) and Carried Information (application, functions, etc.). Any attempts to retain a precise design on software architecture for each part will cause an effective data transmission, which ensures reliability and security of the system [7]. Hence achieving any desired data transmission precision level in a WSN, network management (NM) techniques are applicable. Such techniques assist in network status monitoring, reliability and security amendment, and cooperation supervision between components [7]. NM techniques could also detect and resolve network faults in addition to restoring the system respectively [7]. In practice, designing WSN application necessitates tailoring NM techniques for each architectural segment. Various NM techniques regarding each segment are summarized as follows [7; 12; 5]: a) Physical architecture: Sensing and processing management, operation and administration, fault tolerance, maintenance, energy efficiency management, configuration management, performance management, security management, network element management. b) Communication architecture: Network management, networking protocols, network topology, function management, monitoring functions, fault management, performance management, security management, service management and communication, maintenance management, network configuration and organization, network behavior, data delivery model, sensor mobility, naming and localization, sensing coverage area, communication coverage area energy efficiency management c) Information architecture: Real-time information management, mapping management, service management, analyze information, control application, business application management report management, sending and receiving commands or response, naming, localization, maintenance, fault tolerance Aforementioned NM techniques enhance quality of the system. According to ISO 9126-1 software quality model Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ1 [13; 14; 15], the quality characteristics of a system could be divided into six fundamental properties: functionality, reliability, usability, efficiency, maintainability, and portability. According to the same documentation, these characteristics are broken to sub-characteristics such as suitability, security, maturity, fault tolerance, adaptability, analyzability, stability, testability and so on [13]. However, focusing on all subcategories collectively exceeds the time horizon of this research, from this stance three dimensions namely reliability, robustness and security are brought into attention. This section will be divided to two subsections describing the architecture issues and NM techniques for (1) Reliability and Robustness, (2) Security, of WSN and other characteristics is relegated to future studies. 2.1 Reliability and Robustness In WSNs context, the probability that a network functions properly and aggregates trustworthy data without any interruption continuously, is usually referred to as reliability characteristic of the network [23; 20]. According to ISO 9126-1 software quality documentation, reliability characteristic shows the capability of a network to maintain or re-built (re-start) the service in certain period of time [13]. So, it is important that during long sensing, the network has to service up continuously. Reliable service of a network includes precise and proper sensing, delivering and sending acceptable data to the base station. In other words as Taherkordi et al. (2006) put: â€Å"The less loss of interested data, leads us to higher reliability of a system†. Systematic approach perceives reliability as probability of data delivery to the base station rather than point-to-point reliability [16]. Robustness defined by Sohraby et al. (2007) as: â€Å"a combination of reliability, availability, and dependability requirements†, reflects the degree of the protocol insensitivity to errors and misinformation†. Achieving system robustness in WSN, necessitates system capability to detect, tolerate and confine errors as well as reconfigure and restart the network respectively [7]. According to the given definition by Sohraby et al. (2007), it is apprehensible that reliability and robustness share commonalities with each other; this is the main rational behind discussing these two attributes together in this section [7]. Considering the nature of communication in WSN, a network is unpredictable and prone to fail caused by any physical damages in hardware devices, energy depletion, communication link error, information collapses in packages and etc. [17; 16]. Therefore, one of the critical issues in design phase of WSN is applying fault tolerance techniques to optimize the network so that reliability and robustness attained [17]. These techniques enable the network to withstand and recover any upcoming failure and restart operation [13]. Liu et al. (2009) categorized fault tolerance techniques into: node placement, topology control, target and event detection, data gathering and aggregation, and sensor surveillance. Reminding from the beginning of this chapter architecture design divided into three segments. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 depicted a summary of the plausible related faults and their solutions in each segment. In the following, each aforementioned fault tolerance techniques are being discussed in each design segment. Table 4à ¢Ã¢â€š ¬Ã¢â‚¬Ëœ2 The most probable fault and their fault tolerance solutions in WSN [17; 7; 18] 2.1.1 Reliability and Robustness of Physical Architecture: Fault: any physical interruption in sensor surveillance Solution: Node placement management and signal-effect management First item that should be considered in designing physical components architecture for reliability and Robustness is: physical placement and signal-effect management. As it is mentioned in section 3, although the mesh network communication is self-organize topology and does not need any manual configuration to bind the network for mobile sensors, the physical architecture and the location schema of the hardware components, sensors and gateways need to be designed carefully [7]. As a characteristic of mesh WSN, the sensors in network are free of any installation restrictions, even though, the placement should be far from any physical destruction or hostile locations. Inappropriate physical placement of sensor transmitters and gateway antenna can cause noise or significant lost in signals [7]. In addition, the signal coverage is decayed by surrounding objects and materials such as metal wall and the like. (E.g. exterior wooden, concrete, brick or gypsum frame, block or wall). Especially in the case of vehicles, the main body can impose such problem and henceforth installation of the sensors in this manner would be delicate. Moreover, the signal waves might be faded and affected during the transmission, due to various physical phenomena such as reflection, diffraction or scattering [7]. These effects would cause significant interruption in sensor surveillance. Therefore, it is important to manage these signal-effects in early stage of WSN physical architecture design. Reflection occurs when electromagnetic wave of signals is duplicated due to impinge of the wave on large object or surface such as walls, buildings and the Earth [7]. Therefore, all the reflection of the walls and also the Earth should be acknowledged in physical architecture design. Diffraction refers to any defection and obstruction in waves caused by irregular sharp edges during the data transmission between the transmitter and receiver [7]. In this case, designers have to be prudent in sensors placements in the proximity of sharp edges and corner angels. Scattering refers to any deviation from straight line. Environmental obstacles in the propagation path affect passing waves from their original structure. Even small irregular object such as street signs, and lampposts might encounter and scatter the wave. Hence WSN should be design to face with any irregular scattering during the wave transmission. Above all, the mobility of sensors and surrounding objects might fade the signals and add noises that should be considered in architecture design [7]. These issues are the basic physical factors, which cause major fault in data aggregation of WSN and cut down reliability and robustness. These destructive signals need to be subtracted from the received signal paths [7] before sending the data to gateway. Therefore, reflection, diffraction and scattering should be considered not only by designers in the physical components placements, but also by programmers in network development. Fault: Sensors failure Solution: Hardware replacement The next issue that needs to be considered in designing the physical architecture of a WSN is hardware failure. Sensors energy suppliers or any damages to the sensors and/or their transmitters are the sources of hardware failure. Regardless of source of failure, the WSN must be capable of functioning as well as replacing and switching sensors when necessary. Additionally, any changes in the physical components, on one hand, needs an explicit and well-defied consideration on security issue to prevent any potential threats, and on the other hand, needs an adaptable and configurable communication connection network [18]. 2.1.2 Reliability and Robustness of Communication Architecture Fault: communication link errors Solution:Topology control and event detection , Replicated services in communication model, Communication link error is an important concern in dealing with reliability and robustness of a network in communication architecture. The sensors in WSN are prone to fail and make link errors in point-to-point reliability of communication protocol. Therefore, it is the network topology responsibility to detect the errors and guarantee the overall reliability of the syste

Wednesday, November 13, 2019

Obsessive-Compulsive Disorder and Religion Essay examples -- Mental Il

Obsessive Disorder and Religion Obsessive-Compulsive Disorder (OCD) affects up to 2.1% of adults and features pervasive and intrusive thoughts that lead to repetitive uncontrollable behaviors aimed to reduce anxiety (APA, 2000). Further, these thoughts and behaviors impede and disrupt daily living and cause marked distress in the lives of the sufferer. The recurrent thoughts often center on fear of contamination, harming self or others, and illness (Himle, Chatters, Taylor, and Nguyen, 2011). Those who experience the compulsive behaviors associated with OCD report feeling as though they cannot stop or control the urge to perform the compulsive behavior and that the urge is alien or from outside conscious control. Behaviors often involve washing the hands or body, repeatedly checking, and mental acts such as counting and repeated prayers. (Himle, Chatters, Taylor, and Nguyen, 2011) According to Obsessive-Compulsive Working Group (1997, 2001, as cited by Abramowitz, Deacon, Woods, and Tolin, 2004) OCD can be classifi ed into six domains. The domains include inflated responsibility, beliefs about the importance of thoughts, importance of controlling thoughts, overestimation of threats, intolerance of uncertainty, and perfectionism. Inflated responsibility involve excessive feelings of responsibility for actions seen as harmful or failing to take action to prevent harm, whereas the domain of importance of thought involved attributing excessive authority or power to unwanted thoughts and beliefs. Similarly, the importance of controlling thoughts entailed the belief that one should be in control of every thought at all times. The unrealistic belief that unlikely events will always occur and bring with them extreme consequences characte... ...rurinsky, S., Rosmarin, D. H., & Pargament, K. I. (2009). Community attitudes towards culture-influenced mental illness: Scrupulosity vs. nonreligious OCD among Orthodox Jews. Journal of Community Psychology, 37(8), 949–958. doi:10.1002/jcop.20341 Rosmarin, D. H., Pirutinsky, S., & Siev, J. (2010). Recognition of scrupulosity and non-religious OCD by Orthodox and non-Orthodox Jews. Journal of Social and Clinical Psychology, 29(8), 930–944. doi:10.1521/jscp.2010.29.8.930 Siev, J., Baer, L., & Minichiello, W. E. (2011). Obsessive†compulsive disorder with predominantly scrupulous symptoms: Clinical and religious characteristics. Journal of Clinical Psychology, 67(12), 1188–1196. doi:10.1002/jclp.20843 Yossifova, M., & Loewenthal, K. M. (1999). Religion and the judgment of obsessionality. Mental Health, Religion & Culture, 2(2), 145–151. doi:10.1080/13674679908406343

Sunday, November 10, 2019

Black Women and the Abolition of Slavery

â€Å"Rachel Weeping for Her Children†: Black Women and the Abolition of Slavery by Margaret Washington Photograph of Sojourner Truth, 1864. (Gilder Lehrman Collection) During the period leading up to the Civil War, black women all over the North comprised a stalwart but now largely forgotten abolitionist army. In myriad ways, these race-conscious women worked to bring immediate emancipation to the South. Anti-slavery Northern black women felt the sting of oppression personally.Like the slaves, they too were victims of color prejudice; some had been born in Northern bondage; others had family members still enslaved; and many interacted daily with self-emancipated people who constantly feared being returned south. Anti-slavery women such as Sojourner Truth and Harriet Tubman were only the most famous of the abolitionists. Before either of these heroines came on the scene and before anti-slavery was an organized movement, black women in local Northern communities had quietly tur ned to activism through their church work, literary societies, and benevolent organizations.These women found time for political activism in between managing households, raising children, and working. In the late 1820s, Zion’s African Methodist Episcopal Church in New York City, Bethel Methodist Episcopal Church in Philadelphia, and the African Meetinghouse in Boston were centers of female anti-slavery activity. Black women proclaimed that their cause was â€Å"let the oppressed go free. † They organized bazaars to promote the purchase of goods made from free labor, met in sewing circles to make clothing for those fleeing bondage, and raised money for Freedom’s Journal, the nation’s first black newspaper.In 1830, when Boston editor William Lloyd Garrison proposed his idea of publishing a newspaper devoted solely to immediate emancipation, a committee of black women began raising funds for it. The first copy of the Liberator appeared on January 1, 1831, wi th strong financial backing from black women. At their literary-society meetings, black women switched from reading European classics to discussing the Liberator and anti-slavery pamphlets, and inviting male speakers to expound on the evils of slavery.Throughout the 1830s, black women engaged heavily in activism. They vowed to â€Å"heed the enslaved mothers’ cry for children torn away† and designated their dwellings as â€Å"free homes† for those fleeing bondage. For example, Hester Lane of New York City, a successful black entrepreneur, used her home as an Underground Railroad station. Lane also traveled south to purchase enslaved children whom she freed and educated. Mary Marshall’s Colored Sailors’ Boarding Home was another busy sanctuary.Marshall kept a vigilant eye out for refugees from bondage, and was determined that â€Å"No one who had the courage to start should fail to reach the goal. † Other black women organized petition drives , wrote anti-slavery poetry, hosted traveling abolitionists, and organized fairs. By 1832, black women had formed the first female anti-slavery society in Salem, Massachusetts. They also held executive offices in biracial female anti-slavery societies in Philadelphia, Boston, and elsewhere.Anti-slavery black men insisted that black women work only behind the scenes, but women sometimes refused to do so. In New York City, a group of black women confronted white authorities in a courtroom where several self-emancipated women were about to be returned to bondage. Black men accused the female protesters of bringing â€Å"everlasting shame and remorse† upon the black community and upon themselves. In 1831, black women in Boston organized the African American Female Intelligence Society. This organization became a forum for Maria Stewart, the first woman to speak publicly against slavery.Stewart proclaimed that she was called by God to address the issues of black emancipation and t he rights of black women. â€Å"We claim our rights,† she asserted, â€Å"as women and men,† and â€Å"we are not afraid of them that kill the body. † Stewart also published a pamphlet in the Liberator on behalf of black women and the enslaved, but Boston’s black male community censored Stewart for her public expressions and forced her into silence. She soon left the city. Although she never again spoke publicly, she remained active through women’s organizations and conventions.She joined other black women who held office, served as delegates, and otherwise participated in the biracial women’s anti-slavery conventions in 1837, 1838, and 1839. The anti-slavery movement took a more progressive turn in the 1840s, when the American Anti-Slavery Society (Garrisonians) welcomed women as officeholders and speakers. Most black women continued their quiet anti-slavery work, but some were outspoken. The first black woman to take the public stage for t he American Anti-Slavery Society was Sojourner Truth.Born into slavery in 1797 among the Hudson Valley Dutch and emancipated in adulthood, Truth was already known as a preacher when she joined the Garrisonians in 1844. She made anti-slavery speeches throughout New England, and in 1845, gave her first address at the American Anti-Slavery Society’s annual convention. Sojourner Truth became known from Maine to Michigan as a popular and featured anti-slavery speaker. Truth published a Narrative of her life and used the proceeds to purchase a home and finance her abolitionist work. Another surge of radicalism occurred in 1850 with the passage of the Fugitive Slave Law.It decreed that any citizen could be enlisted in the service of a slaveholder to capture an enslaved person, and it nullified the individual civil rights that a state guaranteed its citizens, including those formerly enslaved. That same year, Harriet Tubman, a thirty-year-old self-emancipated Marylander, began defyin g the Fugitive Slave Law by leading enslaved men, women, and children out of the South. With slave catchers lurking everywhere and a price on her head, Tubman safely conducted her charges through the Northern states and on to Canada.Mary Ann Shadd (Cary) was a twenty-five-year-old freeborn schoolteacher when the Fugitive Slave Law was passed. Inspired by her father, whom she described as a â€Å"chief breakman† on the Delaware Underground Railroad, Shadd soon moved to Canada and established herself as a militant abolitionist, influential emigrationist, and the first black woman newspaper editor (of the Provincial Freeman). In 1854, twenty-eight-year-old Frances Ellen Watkins (Harper) joined Sojourner Truth on the Garrisonian lecture circuit. Born into a well-connected Baltimore family, Watkins was a poet and teacher.She was drawn into the abolitionist struggle by the Kansas-Nebraska Act, which rescinded the restrictions on slavery in the remaining territories acquired under t he Louisiana Purchase. Watkins traveled throughout the Midwest, sometimes with Sojourner Truth. Watkins spoke eloquently of the wrongs inflicted upon her people; she sold her books of poetry at anti-slavery lectures and used the proceeds to support the Underground Railroad. In 1858, Watkins joined black male leaders in Detroit and led a large group of angry citizens in storming the jailhouse.The group attempted to remove from protective custody a black â€Å"traitor† to their cause, who had intended to expose the operations of the Underground Railroad. Despite the Fugitive Slave Law, the Underground Railroad remained the â€Å"heart’s blood† of black resistance. Black woman abolitionists played a vital role in this work. They were often the ones who intercepted refugees; who provided them with food, clothing, shelter, health care, and spiritual and psychological comfort; and who directed them to the next station. Women sometimes confronted slave catchers and kid nappers, who were often right on the heels of the â€Å"fugitives. Caroline Loguen, the wife of Syracuse, New York, abolitionist the Reverend Jermain Loguen, answered many a midnight knock during her husband’s frequent absences. Once she and her sister successfully fought off slave catchers attempting to enter her home in pursuit of â€Å"fugitives. † In 1858, Anna Murray Douglass, wife of black leader Frederick Douglass, hosted John Brown, the famous white abolitionist, for a month. Brown was in hiding after having been charged with murdering pro-slavery farmers in Missouri. In the Douglass home, Brown perfected his plans for the raid on Harpers Ferry.In an 1859 meeting with Brown in Maryland just before the assault on Harpers Ferry, Douglass gave him ten dollars from the wife of a Brooklyn couple, the J. N. Gloucesters, who like Douglass himself were close to Brown. Along with the money, Mrs. Gloucester â€Å"sent her best wishes. † When Brown was captured, t ried, and sentenced to death, black woman abolitionists sent money to his wife, Mary, and wrote letters expressing their deep regard for her husband. Frances Ellen Watkins also sent gifts as well as one of her poems, â€Å"Bury Me in a Free Land,† to Brown’s condemned men.During the antebellum era, black woman abolitionists moved, in keeping with the urgency of the times, from quiet activism to militancy. By 1858, even Sojourner Truth, the archpacifist, recognized that war with the South was inevitable if black people were to obtain their freedom. Black women furthered the goal of emancipation during the Civil War by continuing their abolition work. Harriet Tubman offered her services to the Union Army. Sojourner Truth lectured throughout the Midwest, where she confronted threatening pro-slavery (so-called â€Å"Copperhead†) mobs.Black women organized petition campaigns to Congress and the president; they sent food and clothing to the Union front lines for desti tute blacks; and they went into Union-occupied areas to provide education for black refugees. After the Emancipation Proclamation was signed on January 1, 1863, black women immediately began working on the next phase of their mission—the task of uplifting their race as a free people. Margaret Washington is a professor of history at Cornell University. Her publications include Sojourner Truth’s America (2009) and A Peculiar People: Slave Religion and Community-Culture among the Gullahs (1998)

Friday, November 8, 2019

20 Expository Essay Topics Meet the Top Ideas on the History of Art

20 Expository Essay Topics Meet the Top Ideas on the History of Art If you need interesting expository essay topics for your next writing assignment on the history of art, there are many ideas from which to choose. That being said, if you need some help getting started, consider the following 20: Religious Influence on Artwork How Art Depicts Religion Art as Historical Documentation for Buddhism Late Renaissance Artistic Tendencies Baroque Artistic Tendencies How Art Emphasized Relationships Between Political, Social, and Economic Atmospheres Transitional Artistic Periods of Time The Utilization of New Components for Human Features and Natural Beauty Biblical Depictions Paintings Versus Statues Mannerism Influence in Italy The High Renaissance Influence for Italian Composers and Artists Ancient Greek Artwork Ancient Native American Art How New Artists Include Themes and Techniques of Older Generations History of African Art History of Asian Art Cultural Influence In Artistic Trends How Local Natural Elements Influence Artistic Design Around the World Changes in Historically Important Artistic Periods Aren’t those topics cool? To get a better idea of some interesting facts on the History of Art, plus additional guidance on how to write an expository essay about it check the hyperlinks. Below is a sample expository essay on one of the topics listed above to give you additional assistance: 10 facts, how to. Sample Expository Essay on Art as the Historical Documentation of Buddhism Art has a long history of serving as a record keeper for historical events and this is also true of Buddhism. There are three foundations or Jewels of Buddhism. The first is the Buddha, and the second is Dharma which is the teachings. The third is the Sangha - the community. Buddhists are generally distinguished from non-Buddhists through taking refuge in the third Jewel. Other facets of the practice include supporting the monastic community, becoming a monk, developing a mindfulness in meditation, practicing meditation, cultivating higher discernment and wisdom, studying the scriptures, practicing devotion, and practicing traditional ceremonies (Kohn 143). In early South Asian artwork, the four great miracles of the Buddha’s life are described along with his life cycle. It is encompassed by the aforementioned ideals through a combination of influential styles and symbols which were indicative of the political, social, and economic condition of the specified period. From this transitional time period of the Buddhism expansion came the four panels depicting the stories from the holy text pertaining to the life of the Buddha. The stupas are depicted in chronological order, focusing on the four great miracles in the life of Buddha (Saunders). The Buddha is represented in symbols of trees, pillars, thrones, and the wheel of Dharma. All until the moment when Buddha is shown as human and has reached the enlightenment. Greek and Indian combinations in terms of the iconology are demonstrated throughout the forms that Buddha takes in all four panels. Form of the Buddha in the first panels shows the perfect oval egg for the head, eyebrows which show an Indian bow curve, lotus bud eyes, ears which represent a Sanskrit symbol, and the embodiment of a lion through the wide breast and narrow waist. The head is meant to represent a bull while the arms are indicative of elephant trunks. The hands are lotus petals (Saunders). Early text suggests that the Buddha was born on the Indian subcontinent during the 5th century BC where his father was an elected chieftain. The Theravada text states that he was born in modern-day Nepal in the year 563 BC, raised in Kapilavastu. One of the four great miracles, depicted as one of the four great events was this birth. In the common artwork, the Buddha emerges from the right hip of his standing mother Maya with a halo. The halo is the symbol of divine radiance and is affiliated with deities and royalty in South Asian communities. The artwork borrows from Greek and Roman art in terms of the wreaths placed around the woman’s head, the people holding cornucopias, and the long-sleeved clothing (Dehejia). The second great miracle was the Buddha’s enlightenment. After the birth of this prince, it was prophesized by an astrologer that he would either be a king like his father or a holy man upon leaving the palace walls. It is clear that his father was against the notion of a holy man because he was forbidden to leave. Upon his departure, he encountered an old suffering man, a sick suffering man, a corpse, and an ascetic holy man which all encouraged the four sights and his spiritual quest. He began studying under famous religious teachers that day, first mastering meditation. Discovering that mere meditation did not end suffering, the Buddha continued on his path to fasting, holding his breath, and exposing himself to pain in order to end suffering, but this did not work. It was through this near death experience and closeness to the earth that he discovered the idea of moderation in terms of self-mortification and self-indulgence. When he was 35, he sat in a sacred fig tree to m editate in Bodh Gaya, India. He did not rise until he achieved enlightenment. The second piece of artwork shows the Buddha under a tree meditating while he is attacked by demons of Mara. After achieving enlightenment, a monastic order was instituted at the first teaching of his new band of followers. Teaching the path to awakening, he traveled and taught until his death. The third panel is the first sermon, which is meant to portray the humanity in the Buddha as he preaches to a crowd. The deer in the panel is used to describe the location of Deer Park at Sarnath. The two deer here are meant to demonstrate the willingness and appreciation of the earth and all creations of the enlightenment that the human Buddha attained. Between the two deer the dharma is placed which is an icon from Hindu indicative of kingship. While normally attached to Hindi gods to demonstrate their materialistic authority, in this case it is used to demonstrate the spiritual authority. This panel demonstrates the period which was the first Buddhist law (Dehejia). The journey to nirvana is the concept demonstrated in the fourth panel. On this panel his death in India is indicative of the entire Buddhist belief. The panel shows chieftains mourning the immense loss while looking over his body with grief and lack of understanding while the monks are at peace, enlightened by the idea that his passing is nothing more than a release from the endless cycle of rebirth. References: Dehejia, Vidya. Stupas and Sculptures of Early Buddhism. Asian Art, Vol. 2 No. 2 1989. Freedberg, David. The power of images.  Art History  15.2 (1992): 275-278. Kohn, Michael. The Shambhala Dictionary of Buddhism and Zen. Shambhala. 1991. Gombrich, Richard. Theravada Buddhism: A Social History from Ancient Benares to Modern Colombo.  Routledge and Kegan Paul, 1988. Preziosi, Donald, ed.  The Art of Art History: A Critical Anthology: A Critical Anthology. Oxford University Press, 1998. Robinson et al.,  Buddhist Religions, page xx;  Philosophy East and West, vol 54, Williams,  Mahayana Buddhism, Routledge, 1st ed., 1989. Saunders, Dale. Murda: A Study of Symbolic Gestures in Japanese Buddhist Sculptur.e New York Pantheon Books, 1960 pl. 11.

Wednesday, November 6, 2019

The Story of Picchi

The Story of Picchi The story picchi (madness) presents a dilemma that has engulfed a family. The protagonist in this story is Ramana and the antagonist is his mother Damayanti. Ramana’s father was not lucky because Damayanti, his second wife, had turned mad. The first wife had hanged herself. Misfortunes were following Ramana’s father closely but fortunately he was lucky enough to have had a son with the second wife before she turned mad.Advertising We will write a custom essay sample on The Story of Picchi specifically for you for only $16.05 $11/page Learn More The story is narrated ten years after Damiyanti went mad; â€Å"Recover? I have no hopes that she will; she’s been mad these ten years† (Tharu and Lalita 359). This implies that by the time the story is being narrated, Ramana is ten years of age. It is worth noting that at this age he had not yet seen his mother even for once but he was pretty aware of the condition of his mum. Unfortunatel y or fortunately, at this age he had a rough picture of how his mum probably was, â€Å"He didn’t know what to think. She-his mother-that person-would probably have dirty, matted hair and would be wearing tattered clothes† (Tharu and Lalita 359); and this fact really scared him, â€Å"That madwoman, what is she to me? I have never even seen her all my life!† (Tharu and Lalita 359). It is evident that the ten years that Damayanti had been mad, the family suffered much. When Damayanti was accepted by the family as a daughter in law, she was popular among the family members: â€Å"she had been obedient and hardworking† (Tharu and Lalita 361). The family members were optimistic of her recovery even after all the ten years of madness: â€Å"she might get better if she sees the child; after all, she has to be cured somehow and brought home† (Tharu and Lalita 359). At the age of ten years, Ramana is subconsciously aware of the condition of his mum and the need for her to come home. At this age, it is also significant to point out that a child starts to be aware of his position in the society. The fact that the society is fully aware that Ramana’s mother was mad must have made Ramana uneasy. Probably Ramana had a hard time before his age mates. It was narrated in the story that one time some kids along with Ramana were laughing and jeering at a mad woman. He was embarrassed by this action. There was also this moment when Naraidu told the class about Ramana’s mother. By then Ramana was still new in school and it must have cost him a lot of psychological torture. It was clear that Ramana’s father could not go for another wife. The family was banking on the recovering of Damayanti so they could bring her back to the family. It is made clear in the story that Sundaramma did not always talk much in relation to Damayanti especially in the presence of Ramana. Nevertheless, Ramana was able to pick few fragments of inform ation which he coined together to form some vague opinion about his mother. The reaction of the society does not come out explicitly but it is clear that Raman was affected and embarrassed by the fate which had befallen his mum.Advertising Looking for essay on literature languages? Let's see if we can help you! Get your first paper with 15% OFF Learn More This kind of embarrassment would probably have far reaching effects on his personal life. It was clear that Ramana was at not at ease with the way he was viewed by the society. In the story, it is revealed that whenever people went on a journey to Madras, among the places they had to visit was the mental hospital specifically to see or say hallo to Damayanti. It is very possible that these constant visitations of the villagers were a constant reminder of the misfortune that had befallen Ramana. It is, therefore, right to argue that whenever the villagers went to Madras, Ramana was somehow reminded of his mo ther thus the visitations acted as a constant reminder of the situation that had befallen him. The fact that all the villagers including his age mates knew about his mother put him (Ramana) in a vulnerable position. It could be very easy for him to feel pitied. This could in turn lower his self esteem especially if somebody decided to make a joke out of his mother in his presence. Such a situation, fortunately, did not happen in the story. The village does not seem to alienate Ramana because of his mother but instead the society seems to take a collect responsibility to ensure that Damayanti is getting cured. It can be assumed that if Damayanti could have recovered within the narration, then all the villagers could have made a big party together with the family of Ramana. Conclusively, the story of picchi can be viewed as a suspense narration which ends without even hinting well what could happen to Damayanti. Through the narration of the story, Ramana is depicted as a disturbed chi ld who gets a lot of support from his grandmother and the villagers in general. Ramana has good relations with the society and the society was not shown scolding or mistreating him thus he developed positively in his values. Work Cited Tharu, Susie and Lalita, Ke. Women Writing in India: The twentieth century. New York, NY: Feminist Press, 1993. Print.