Saturday, August 31, 2019

Comparison of Rosemary Hills-Lyttonsville Local Park and The North Lynnwood Neighbourhood Park

1 Chapter FOUR ANALYSIS, FINDINGS AND DISCUSSIONS 4.1 Introduction This chapter will be discuss and explains about the analysis and findings which from two mention surveies every bit good as the literature reappraisal through comparative analysis. The facets that will be used to compare are site background, end and design attack, design layout, comfortss, hardscape and softscape choice, handiness and circulation every bit good as the activities. Those aspect are considered the dependable from literature reappraisal to be portion of urban park design planning. This chapter will stop up with treatment of analysis between both park which are Rosemary Hills-Lyttonsville Local Park every bit good as The North Lynnwood Park 4.2. Site Background Both of Rosemary Hills-Lyttonsville Local Park and The North Lynnwood Neighbourhood Park are different type of park but those park are similar in using Crime Prevention Through Environmental Design ( CPTED ) rules which seeks to hold a nothing offense in the park. Table 4.1 shows the comparing of basic background for both Parkss. Table 4.1 Comparison of site background for both Parkss.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkEntire country: 17 estates.Built by Maryland-National Capital Park and Planning Commission ( M-NCPPC ) Parks in 1962.Include community centre, features resort areas, a softball field, two multiuse Fieldss, four tennis tribunals, a football or association football field and a picnic country.Entire country: 6 estates.Developed in 1970 and initiated by Lynnwood Elementary School instructors, every bit good as the pupils.Include big active drama, picnic country, an out-of-door public presentation infinite, spray Parkss and new drama equipment known as â€Å"Dragon Park† .Based on the tabular array above, both Parkss attract public because it’s operation as a topographic point for socialize every bit good as there are besides provided several diversion installations for recreational activities. The Rosemary Hills-Lyttonsville Local Park consist of several installations within the park which may be used by batch of people in one clip. As compared to the Nort h Lynnwood Neighbourhood Park, it is besides consist of installations as usual for a park, but the figure of user may be somewhat different. 4.3 Goal and design attack Goal and design attack is of import and considered in design planning because of peculiar Parkss must lies on that facet. These facet is based on how the end will be achieved through the selected attack in developing a good park. From both mention surveies, it seem that both park have their ain end but used the same attack which is CPTED to accomplish a good park. For Rosemary Hills-Lyttonsville Local Park, it want to make a successful park every bit good as the unfastened infinite system in the hereafter through the devising of bing Parkss and unfastened infinites as utile and attractive as possible and besides making the right every bit good as suitable of new comfortss and linkages within the park. The North Lynnwood Neighbourhood Park besides have about the same purpose which is to supply appropriate new diversion installations every bit good as redevelop the bing 1s and make a new out-of-door public presentation infinite for Lynnwood Elementary School pupils and occupants. But, both Parkss have to accomplish the purpose through several aims that might be different. Table 4.2 The difference aims used by both Parkss to accomplish the end.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkI. Supply more visibleness to other installations in the park such as the resort area, hoops and others. two. Better a better entree control in covering with vehicular and prosaic traffic. three. Supply better natural surveillance for those who entered the park.I. Supply installations for diversion activities based on the user needs. two. Develop recreational resources and chances that are built-in in the landscape and outdoor atmosphere that may include walking, jogging, biking every bit good as continuing the natural countries.Harmonizing to the comparing of two mention surveies, both park are taking about the same end but different manner to accomplish it but still based on CPTED rules. The Rosemary Hills-Lyttonsville Local Park is indirectly giving a comfy and secured atmosphere for the users as to allow the relaxation for better natural surveillance and supply more visibleness to other installations. Compared to The North Lynnwood Neighbourhood Park had intended to repair up the installations with the new one within the park to make better atmosphere as the park is used by the school kids every bit good as the occupants which to maintain out fright of offenses. 4.4 Design Layout A good park design is due to the planning of a good layout puting which is the right and suited combination of workss every bit good as the characteristics will make a pleasing visual aspect and an environmentally friendly layout which mean a safer park. Through the two mention surveies, the design layout was compared to find the design which sing the offense bar schemes. Table 4.3 The difference design layout of two mention surveies.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkRosemary Hills-Lyttonsville Local Park was networking within the park linked to each other of the pathway and the cycleway every bit good as the planting strategy. These are the possibility to make hiding infinite within the full layout of the park.The Gwendolyn Coffield Community Center becomes a focal point of the park since the installations provided are around the centre.The installations that are provided is designated to be at the border of the park margin to guarantee the natural surveillance within the park.The North Lynnwood Neighbourhood Park is designed by positioning the looping pathway at the center of the park to be the focal point. The prosaic paseo was created to buffer by trees and other plantings.The design of the park every bit good as the external layout supplying more inclusion of corners that can hide people by twenty-four hours or dark.The planting strategy gives the obstructor of public’s position as the st ructural planting is planted at the margin of the park every bit good as to deny entree to offense marks and to make a perceptual experience of hazards to wrongdoers.Based on the tabular array above, the circulation and pathway every bit good as the cycleway is appropriate to the design counsel for both Parkss as a good park design. These is designed to let walking within the park every bit good as such a desire lines for the users. Planting strategy besides played the same function of circulation, pathway and cycleway due to the CPTED rules which is the natural entree control. Apart from that, both park have their ain focal point which is a topographic point that people will garner or play around. For Rosemary Hills-Lyttonsville Local Park, the community centre shown in Figure 3.6 act as a focal point of the park because the installations provided are around the centre which is to guarantee the natural surveillance within the park. While focal point for the North Lynnwood Neighbourhood Park is the looping pathway because of its place which is at the center of the park. The focal point is one of the facet for a good park design that act as natural surveillance. 4.5 Comfortss, hardscape and softscape choice Comfortss and hardscape choice of urban park is sensible to be compared with looking at the offense bar facet as these provided in those park is influence to make societal interaction among the users. For softscape choice every bit good as landscaping played function to heighten the natural agreeableness in the park. It is of import, nevertheless, to guarantee that heavy leaf and inappropriate planting does non take to chances for privacy and possible offense. Table 4.4 Comparison of comfortss, hardscape choice for both Parkss.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkA big unfastened space/ resort areaA multi-use football and association football fieldA baseball fieldTwo tennis tribunalsOne and a half hoops tribunalsCommunity centreSecurity illuming within the parkSpray parkReservable field day installationsLarge active drama countriesPlay EquipmentBasketball CourtOutdoor Stages/Performance AreaPublic toiletsParkingBased on the tabular array 4.4, the comfortss every bit good as the hardscape provided in Rosemary Hills-Lyttonsville Local Park are accessible in footings of security facet as the characteristics is accommodating security component as the comfortss and the infinite provided can make a societal atmosphere. Harmonizing to Cranz ( 1982 ) , people will utilize the park for their sociable infinite where people get to utilize ephemeral scene, run into friends do other recreational activities. Compared to The North Lynnwood Neighbourhood Park, the park provided good comfortss, but the hardscape characteristics of the park is rather unequal to back up the safety environment. Table 4.5 Comparison of softscape choice for both Parkss.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkThe park encompasses about 70 % of plantings. This is possible to do a fly-by-night country every bit good as to supply screen for related and suited activities.The planting choice need to suit the local ecology and recreational context.The workss choice is making a form which is covering at the border of the park.The usage of workss are to give and supply the coloring material every bit good as the texture of planting.Based on the tabular array 4.5, softscape choice is an of import component in a park which it’s played different function due to the local surrounding. This is because each seting strategy will be reflecting the image of the park. 4.6 Accessibility and circulation Accessibility and circulation aspect played function in developing a good and better park. The design fundamentally to heighten the existent and perceived safety of paseo users, by avoiding from taking people into unsafe state of affairss or countries. Table 4.6 Comparison of the handiness and circulation of both Parkss.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkThe handiness or street layout provided to take the motion of the users within the park is clearly where it is connects to the whole country.The form of park’s handiness or street layout is more to make the natural way scene and the circulation of the way design is excessively loopy.Based on table 4.6, both Parkss seem to give and allow the users enjoy the different atmosphere of the park through different form of handiness every bit good as circulation. Unfortunately, both circulation design is beliing to the design counsel of park. . The design of pathway should be more in the direct desire lines because the direct entree will allow in making more concealed topographic points ( Qolcuhoun, 2004 ) . 4.7 Activity Basically, each park will supply public societal infinite, lawn country every bit good as recreational installations as a topographic point that signifiers and creates activity for the societal and environmental wellness of communities. These will indirectly give some basic counsel for offense decrease within the park ( Singapore National Prevention Council, 2003 ) . Table 4.7 Activities of both Parkss.Rosemary Hills-Lyttonsville Local ParkThe North Lynnwood Neighbourhood ParkRosemary Hills-Lyttonsville Local Park supplying a batch of infinite for activities that may include athleticss, fittingness, dance, music, art, or the chance to fall in together with friends and neighbors for a particular jubilation or societal assemblage which to guarantee the park is full used.The North Lynnwood Neighbourhood Park supplying out-of-door public presentations infinite which include two phases, amphitheater seating and a big mounting bowlder for the intent of making other activities to do the park more energetic.Based on the tabular array above, both Parkss somewhat supplying the same activities which to maintain and guarantee the Parkss utile to the users every bit good as the occupants. Through the development of unfastened infinite programs which to heighten ocular agreeableness of an country do non hold the possible to endanger the safety of the users ( Christiansen, 1977 ) . So, the more ocular comfortss are provided within the park, there more activities will be occurred. 4.8 Drumhead From the comparative analysis made between Rosemary Hills-Lyttonsville Local Park and The North Lynnwood Neighbourhood Park, it can be concluded that the chief consideration of forestalling offense in urban park are site background, end and design attack, design layout, comfortss, hardscape and softscape choice, handiness and circulation every bit good as the activities aspect. These should go the design guidelines during the spacial design in developing successful urban park based on CPTED rules. Both Parkss shown a good attacks in using the CPTED rules through those aspect. Hence, the design guidelines for urban park should see the strengths from both Parkss order to make a zero offense environment every bit good as a comfy and safer atmosphere within the park. MentionsMcCormick, J. ( 2006 ) .Design Against Crime. National Recreation and Park AssociationDrakakis, S. and David, W. ( 1981 ) .Urbanization, Housing and the Development Procedure. London: Croom Helm.Jamil bin Abu Bakar ( 2002 ) .A Design Guide for Public Parks in Malaysia. Johor Darul Ta’zim: Universiti Teknologi Malaysia.Singapore National Crime Prevention Council ( 2003 ) .Crime Prevention Through Environmental Design Guidebook. Singapore: Singapore Public Affairs Department.

Was Robespierre More a Success Than a Failure as a Revolutionary Leader?

Introduction to Robespierre: Robespierre was a French lawyer, politician and one of the most influential figures of the French- Revolution. Influenced by 18th century philosophes such as Rousseau, he was a capable articulator of the beliefs of the left-wing bourgeoisie. Successes: Gained support of the majority: He gained the title â€Å"incorruptible†. Particularly interested in the rights of man and revolutionary virtue. Earned his reputation in the Estates General as a defender of the poor. He genuinely believed that the people of France were good and was therefore capable of achieving social and public well being in France.While the Constituent Assembly was preoccupied with drawing up a constitution, Robespierre turned from the assembly of lawyers and wealthy bourgeoisie to the people of France. He was very successful in voicing out his ideas for the Declaration of the Rights of man and constitutional provision. In the Jacobin Club, he found a sympathetic audience among th e intelligent artisans and small shopkeepers who became members of the club. His fanaticism won him supporters; his singularly sweet and sympathetic voice gained him hearers; and his upright life attracted the admiration of all Establishment of the Republic:Robespierre's main ideal was to ensure the virtue and sovereignty of the people. He disapproved of any acts which could be seen as exposing the nation to counter-revolutionaries and traitors, and became increasingly fearful of the defeat of the Revolution. He instigated the Terror and the deaths of his peers as a measure of ensuring a Republic of Virtue Establishment of the National Convention – to sweep away the enemies Supported execution of Louis â€Å"For Louis I have neither hate, not love.I only hate his crimes† Destruction of the Gironidsts – Maxim Isnard, Girondist, spoke about counter-revolution and on 2nd June, a crowed of armed men from the Commune of Paris arrested 32 deputies from the convention Reign of Terror: After Robespierre was elected to the Committee of Public safety (a revolutionary tribunal), he earned a dominat position after the fall of the monarchy and declared â€Å"It is time to horrify all the conspirators† The terror acted against real and suspected enemies of the evolution and extended into every corner of France. Victims were mostly the aristocracy, bourgeoisie and members of the clergy but also included members of other classes. In all, perhaps 40,000 people were executed. Leadership of War was decisive: A revolutionary war must be waged to free subjects and slaves from unjust tyranny, not for the traditional reasons of defending dynasties and expanding frontiers.Failures: Short-term rule (1793-1794) Enemies were paralysed briefly: Cecile Renault, woman who tried to murder Robespierre and other politicains who opposed him for being a dictator and associated with Danton’s death â€Å"the blood of Danton chokes him† Socio-religious and economic policies weren’t a success

Friday, August 30, 2019

The American Indian and the Problem of Culture Essay

The Native Americans are perhaps the most culturally storied and richly diversified culture in the America. Indeed, the historical narrations of the Indian culture, way of life and lifestyle are narrated as rich in strife, struggle as well as triumph. In fact, a majority of the modern ways of life and lifestyle in the United States are directly or indirectly inherited or borrowed from the ancient Indian cultures of centuries ago. Yet, most Americans take for granted the many familiar symbols that trace their origin from the Native Indian Americans. The purpose of this paper is to describe the culture of the American Indians. The American Indians used various symbols that interwove the tapestry of their lifestyle. Integral symbols such as the totem pole, the teepee, the moccasins and the peace pipe formed a special cultural trait of the American Indians life (Barrett, 2004). Native animals and plants as houses and weather had a special cultural relationship with the American Indians. For instance, the American Indians revered animals for spiritual believes and ties in spite of their hunting practices. Animal hides and skins made drums and clothes while the meat was preserved and never wasted to nourish the community. The American Indians believed that the spirit of the animals killed lived through the community by inhabiting the tribe’s minds. The American Indians cultivated and later harvested various plants for different reasons and seasons such as making blankets and dyes (Biolsi & Martin, 1989). Weather elements bore cultural meanings, attachments and endearments to the community, as well. For instance, the American Indians believed that the sun and the rain were supernatural powers and represented a change in the Indian’s seasons. Totem poles formed a special part of the America Indian’s culture (Hallowell, 1957). For instance, they believed that every person’s spirit in the community was attached to particular animal’s spirit. Therefore, the community believed that, at death, a person’s spirit was absorbed by his or her attached animal to live on or regenerate as another person at birth. As a tall and large wooden carving, the totem pole was framed to represent various animals with a certain animal representing a cherished but deceased member of the family. Today, it is easy to observe a dangling dream catcher hanged from rearview mirrors on cars driving in the United States’ roads. However, people rarely know or acknowledge the significance of the dream catchers. Indeed, this symbol traces back to the Lakota tribe’s legendary stories (Hallowell, 1957). It is a symbol of holding onto dearest things in a person’s life. In addition, the perforated holes in a dream catcher serve to filter ill feelings and thoughts. Another Interesting aspect of the American Indian’s culture is smoke signaling. The American Indians used smoke signals to send and relay messages over long distances and bore a proud heritage amongst the American Indians. The American Indians also believed in spirits and depended on them for the well being and nourishment of the society (Barrett, 2004). Spirits were tied to various outcomes in the society such as bumper harvest, natural disasters and tragedies and community health. As a result, the spirits were kept pleased to see to the survival and good harvest in the tribe. Sacrifices and offerings were made at sacred places to the spirits. For instance, the Pueblo tribes regarded various plants as sacred while the Aztecs offered human sacrifices to appease the spirits. References Barrett, C. A. (2004). American Indian culture. Pasadena, Calif.: Salem Press. Biolsi, T., & Martin, C. (1989). The American Indian and the Problem of Culture. American Indian Quarterly, 13(3), 261. Hallowell, A. I. (1957). The Impact of the American Indian on American Culture. American Anthropologist, 59(2), 201-217. Source document

Thursday, August 29, 2019

It's organizational leadership , How to convince and get people's Essay

It's organizational leadership , How to convince and get people's trusts so that they will follow me and my instruction - Essay Example Debatably, proficiency with a prominent vision is one of the most crucial aspects in getting people’s attention. People will give credit to an individual if impressed by the person’s capability to overcome unexpected circumstances. Heathfield (2013) asserts that in order to follow a leader, individuals must be confident with the course which the leader pursues. This ability will assist in consolidating people together into a group with similar objectives, which will result to company success. Needless to say, the subordinates will follow the leader’s instructions entirely. For instance, Steve Job’s leadership qualities allow cultivation of innovation capabilities among his employers, which ensures production of new company products such as computers and cell phones, company progress and customer satisfaction. Additionally, personality is extremely imperative to a leader. This is all about human’s common sense that determines which is right and wrong. Therefore, people can judge whether a person is outstanding or not. In this regard, individuals with a good personality can gather numerous people as their followers. Arguably, the society will love their personalities, follow them and obey their instructions. In essence, â€Å"the leader needs to have an attractive character combined with a pleasing behavior that leaves a lasting impression† (Cheng, 2010). For instance, Mother Teresa is one of the prominent examples of a great leader who expressed outstanding personality of helping impoverished children, people, and society. Until today, everyone still remembers her as a one of the great people in history. She is a leader who made people follow her attitude by doing great things. It’s difficult to attract people to follow what one does. However, if an individual has a prominent vision and expertise, it marks the first step to having followers.

Wednesday, August 28, 2019

Wk 5 BA541 Asign Mass Customization Essay Example | Topics and Well Written Essays - 750 words

Wk 5 BA541 Asign Mass Customization - Essay Example A good thing about mass customization is that it gives a company the competitive edge because the company does not just create any product, but those that customers need based on the company’s research. Another advantage of this strategy is that it promotes innovativeness on the part of the manufacturer and results to customer satisfaction for the consumer. (Babiarz, P., Piotrowski, M., et. al., 2008) Another benefit that mass customization brings is cost-reduction since companies, aware of what products or services are needed, are able to streamline processes. (Peppers, D. & Rogers, M, 2011). As mentioned earlier, there are also drawbacks in using mass customization as a strategy to build lasting customer relationships. One of these is that there is no standard per se in mass customization. (Peppers, D. & Rogers, M, 2011) For example, in some methods, customers can choose to change the color or style of a product once they have it. For others, it is different. As a result, some companies may lose their competitive edge because the method they chose may not give them information on what the customers want. For instance, companies who create interactive dress-up games for children may not know what colors or styles are designed by the consumers. Another disadvantage of mass customization is that, unlike in mass production, there is no inventory of finished goods so the customer may have to wait. (Zipkin, P., 2001) Because mass customization is dissimilar to mass production wherein the products are based on customer information, the company can project the quantity to be made. As a result, if there is an unexpected need, the quantity will not be enough. There have been several companies that successfully managed to shift to mass customization and received the loyalty of their customers. One of these that come to mind is Lutron Electronics Company. Specializing in lighting systems, Lutron listened to its customers and came up with a

Tuesday, August 27, 2019

Frankford Avenue Bridge (Pennsylvania) Essay Example | Topics and Well Written Essays - 3750 words

Frankford Avenue Bridge (Pennsylvania) - Essay Example Frankford Avenue Bridge was constructed in Poquessing Creek of Bristol Pike-Frankford Avenue, Route 13 between Cornwells Heights of Bucks County in the state of Pennsylvania and Philadelphia city in Philadelphia County (Beckman 200). The bridge was constructed in 1904 by JohnMcMenamy, Webster and Henry H as chief and assistant engineer respectively. The Bridge is current owned by Transportation Department of Pennsylvania. The bridge provides an early example of concrete bridges that were supported by steel with closed-spandrel arch that was single spanned. The exterior parts of the bridge resemble stonework with scored spandrel walls that demarcate voussoirs surrounding the arch ring. The parapet of the bridge is decorated by urn-shaped balusters that was common in the early 20th century Introduction There was a rapid evolution of bridge engineering in America during 19th century. During this period, patents were mostly given to contractors who had new designs with new construction m odes. By the year 1900, wooden timber was no longer used to construct bridges across rivers and streams. Wood was replaced by iron and steel as the latter constructed strong massive bridges that supported heavy locomotives. Wood was also sidelined because it could easily burn and be washed away when the river overflows. Steel bridges became more common in the late 19th century and they gave birth to a new era of designing and constructing bridges. Many Americans did not accept this new bridge design because of their industrial outlook. Steel bridges had no or minimal ornamentation and were vulnerable to rust. By late 19th century, France invented concrete, a new material that was accepted by many American engineers because of its comprehensive strength. In addition, concrete could be combined with steel to make bridges that were strong and fireproof (Beckman 215). By the year 1900, there were a small number of concrete-steel constructions of bridges in Midwestern US. Many eastern pa rts of the country had not explored the new technology but useful bridge making ideas and technology, begun in eastern US in late 19th century (Condit 39). In 1904, Philadelphia city and Bucks county begun the construction of a barrel arch bridge (7T-0") using steel and concrete. It had ornamented balustrade that was urn-shaped with a facade that resembled masonry. The bridge signified an important moment in bridge engineering history (Bromley 17). The construction of Frankford Avenue Bridge begun in 1895 and continued up to 1910.Steel-concrete bridges at this time were characterized by spandrel arches that were closed that later declined after 1910. Spandrel arches were meant to ensure that performs the intended function while at the same time reducing the amount of concrete used (Condit 42). Concrete and Steel Frankford Avenue Bridge was the first bridge in southeast US that utilized concrete and steel and was constructed along Pine Road over Penny pack Greek in Philadelphia (1983 -94).It was a two-span bridge with arches of 25’-5†. It also had a wire mesh which acted as a binding element. Bridge’s exterior resembled masonry. The most popular concrete reinforcing system in USA in the year 1904 was the system patented by Joseph Melan. It was used in construction concrete arch bridge in America. It included curved soffit steel I-beams which later developed other variations that included

Monday, August 26, 2019

Organized Criminality and Terrorism in France Essay

Organized Criminality and Terrorism in France - Essay Example A â€Å"triangular trade† is progressively developing. It includes contraband of weapons, drugs and other goods. New al-Qaeda units such as Groupe Salafiste pour la Prà ©dication, Moroccan Islamic Combatant Group were formed and they use primarily created European channels to implement triangular trade. This activity is highly developed in France and Spain. At first, their activity was reduced to exchanges and then turned into a direct sale. It was revealed that the money received from drug sale was used to finance the terrorist attacks happened in Spain on May 16, 2003, and March 11, 2004, and in America in September 2001 (Rothe, 2006). Terrorists are also actively involved in contraband of precious stones and metals. In Germany, a travel agency was exposed after it used its activity to contraband gold and silver. The police are concerned with the fact that the channels established by terrorists will be used for contraband of heavy weapons and weapons of mass destruction, especially after the case, when Russian heavy weapon was planned to be solved to al-Qaeda through a man who worked for FBI (Berdal, 2002).

Sunday, August 25, 2019

Impact of traditional and ABC cost allocation on decision making Research Paper

Impact of traditional and ABC cost allocation on decision making - Research Paper Example The cost of direct materials and direct labors are easy to trace to products. However, allocating indirect overhead costs are very complicated and not easily traced to products. Such indirect costs require predetermined overhead rates to be allocated. In this study, I will focus on the impact of traditional and activity-based cost allocations on decision makers. Decision-making is a function preceded by a series of information gathering and analysis. The business environment is becoming more dynamic and volatile not to mention the ever increasing competition. Companies operate under the famous accounting concept (the going concern), which implies that the business’ operations should continue indefinitely. However, the life span of a business and more importantly, the performance are heavily influenced by the decisions made. Therefore, decision-making is a critical function in the organization. The managerial accounting is the organization’s department charged with the responsibility of providing the necessary information for decision-making. Consequently, the management accountant’s role is significant in the organization (Kaye, 1988; pp. 1-5). Managerial accounting includes the following activities: data distinguishing proof, measuring, information examination, and correspondence. The transmission of the data is important to upgrade educated choice making to encourage the accomplishment of the associations targets (Sawsan and Mostafa, 2012; pp. 1-5). It is the commitment of the administration bookkeeper to guarantee the usage of the procedure specified previously. The role of the administration bookkeeping and the administration bookkeeper are to plan, organize, control, direct, communicate and motivate. To start with, Planning is the essential capacity of the administration by a method for which the supervisors choose the objectives to be fulfilled and the course of activities to convey the objectives (Sawsan and Mostafa, 2012;

Saturday, August 24, 2019

Inequalities in Education Essay Example | Topics and Well Written Essays - 1500 words

Inequalities in Education - Essay Example Hence, it is easy to understand that there is a strong correlation between policies of the political parties in power, and the impetus given to the field of education, especially in the present day context of multiculturalism. This essay shall briefly analyze the dimensions of inequality, the causal factors and the policy implications in the field of education, in the United Kingdom since the close of the twentieth century. It shall consider three major inequalities namely, a) economic gap/social class b) gender/sex c) race/ethnic minority, and study how policies have impacted these inequalities as regards education in general. It shall also discuss education with particular relevance to early years, and conclude that while the policies have positively impacted reduction of gender inequalities, more efforts are required to eradicate ethnic inequalities. Peter Taylor-Gooby in his work "Attitudes to Social Justice" published by the Institute for Public Policy Research (2005) cites David Miller to identify four principles of social justice namely, a) Equal Citizenship, b) The Social Minimum, c) Equality of Opportunity, and d) Fair Distribution (p. 2). Of these four, the third has particular relevance to education, and the inequalities within it. ... unity of opportunity is said to exist only when the chances of an individual getting education and jobs, depend solely on their own motivation and aptitudes rather than on other factors such as gender, class or ethnicity. When the differences in Social Class, Gender and Race/Ethnic origins prevent or deny educational or job opportunities, then these are considered to be impediments to achieving social justice, they are inequalities that obstruct fair distribution of opportunities and rewards. While Education is considered to be a tool that aids equality in society, "as the principle means of creating a more equal society", it is also said to contribute to "the reproduction of social inequalities" (Moore 7) and has important implications in ensuring 'social mobility' (DfES 7). Given that educations is a potential tool for implementing social justice, it is essential to study and record the inequalities that affect the process of education. Foremost among the factors affecting education is the difference in income levels; poverty affects educational possibilities. Poverty/Class as an Inequality: It is important to distinguish between "inequality and poverty" even though they are closely linked (Hills & Stewart 232). Poverty is measured by taking into account the incomes of the poorest households and comparing them against the median income; generally poverty line is defined at 60% of current median income, after adjustments. The differences in incomes lead to two types of inequalities - Vertical and Horizontal. The former indicates the difference between the topmost and bottommost income earners, while the latter indicates communities or nations with similar incomes (biz/ed 1). The New Labour government has changed its policies since the 1970s, and now no longer

Friday, August 23, 2019

Retail logistic Essay Example | Topics and Well Written Essays - 2000 words

Retail logistic - Essay Example The service sector is growing faster than the goods and manufacturing sector globally. Service retailing can again be subdivided into rented goods services, owned goods services and non-goods services. Very often, emails are found, which are least expected, in the inbox. These are commercial mails that promote a product or a service and generally ask you to click on a specific link given in the mail. If the person is interested, then he/she will visit that site, otherwise he can just delete the mail from the inbox. This is one of the popular online marketing strategies that marketers are adopting to reach potential customers. Technology has become the predominant element in many businesses. IT has added to the capabilities of companies enabling them to set new standards in business. The power of the Internet has transformed everything. E-commerce has redefined markets, industries and the way one does business. The growth of online marketing has just begun and it is at an early stage of evolution. The Internet has not only revolutionized personal lives, but has even transformed the world of business to a great extent. Every company today, irrespective of whether it is a dotcom comp any or not, has a presence on the net. The Internet has become an effective medium for reaching potential customers all over the globe. The rapid increase in the growth on online marketing can be attributed to many factors. Goods, services and ideas can move across continents efficiently at the click of a mouse. Anyone can link up with anyone else, anytime and anywhere in the world. With the advent of e-commerce, the rapid growth of the Internet and online transactions taking place at all times of the day and night, today’s markets, businesses and customers never sleep. This is not only a new challenge for global businesses attempting to serve a client base that spans time zones, but also for local enterprises that can no longer

Symbolism in the swimmer by John Cheever Research Paper

Symbolism in the swimmer by John Cheever - Research Paper Example The real meaning of the story is revealed through the use of symbolic elements. The Story starts with couples gathered near a pool to get rid of the weariness of the cocktail party which they attended the previous night. Neddy Merril is an athlete who wishes to do extraordinary things. The youthfulness in him leads to do adventurous things like reaching his home by swimming in fifteen pools to the south. As he changes pools his total experiences also change. The story begins with realistic note. The energy of the youth, his power etc adds to the initial exhilaration of the story. The pleasant time and mood of the couples symbolizes the optimism, the swimmer has in his mind at the beginning of the journey. â€Å" It was one of those midsummer Sundays when everyone sits around saying â€Å" I drank too much last night â€Å" (Cheever 1) . Thus the story begins with a realistic note. With the paces of the ‘swimmer’, the mood of the story also changes. In the third paragr aph we see the lovely mood again. â€Å"...the day was lovely, and that he lived in a world so generously supplied with water seemed like a clemency , a beneficence. His heart was high and he ran across the grass (Cheever 515). The readers feel the pleasant mood of the writer and also that of Neddy. The’ light green water ‘waiting for such a swimmer symbolizes the freshness of his mind when he started the journey. The swimming pools that Neddy has to go through stand for the journey of life itself. It is essential for him to be adventurous to ‘swim the country ‘. The destiny of man to complete his life journey to reach the end is very effectively symbolized with the phrase â€Å"‘swimming the country’. Neddy expresses the high level of optimism that he considers himself as a legendary figure. Neddy is running from pool to pool. At Graham’s pool he was a guest to whom they want to give drink and share their mind. The image of happiness a nd blissfulness slowly disappears, and Neddy meets emptiness at Welcher’s house.† the pool furniture was folded, stacked, and covered with tarpaulin. The bath house was locked. All the windows of the house were shut , and when we went around to the driveway in front he saw a For Sale sign nailed to a tree† ( (Cheever 518) . The protagonist begins to feel the loss. It is a fact that he is addicted to alcohol and is living in an imaginary world. But now he slowly faces the reality. He sees the board ‘For Sale ‘. Neddy slowly deteriorates. Cheever uses weak dictions to convey the plight of Neddy. Neddy’s arms were lame â€Å". His legs felt rubbery and ached at the joints ( Cheever 520). The slow movement of the time and the resultant transformation occurs to Neddy, is shown in the words. The mind of the readers also moves with Neddy. The weakness in body and mind is the symbol of his social decline. In the words of Hal Blythe and Charlie Sweet; à ¢â‚¬Ëœa montage of Neddy Merrill’s physical and social decline’ is carefully drawn by the writer. Neddy denies the universal fact that disability, both physical and mental, is part of growing old. He is swimming to his own home. But the journey through water symbolizes a kind of escape from the realities he meets in the land. Thus water, in other term alcohol itself, keeps him away from his family and his friends. The different pools he swims across symbolize the

Thursday, August 22, 2019

The Process of Analyzing the Concept Essay Example for Free

The Process of Analyzing the Concept Essay Introduction This analysis is based on Apple Inc. case study in which the strategic management is analyzed. In the process of analyzing this concept, the article also indentifies the issues and problems as they are presented together with the identification of the major issues surrounding the organization and individuals that are involved with the Apple Inc. Alternative course of action is addressed together with the recommendation that is based on the analysis. Understanding strategic management Through strategic management, a series of moves are developed and executed with an aim of enhancing the organization to be successful in the current situation and also in the future. As the Apple Inc aggressive history is analyzed, a slew of examples are unveiled with an illustration of the irreproducible ability in the effort to have an adoption as well as own market creation. Apple’s strategic management The success of Apple Inc. has been based on its ability to integrate into its model of business operation a management that is strategic. Through strategic management diligent involvement, Apple Inc. has been able to ensure that it is not maneuvered; a strategy that has enabled the company for the past 3 decades to emerge as successful in the competition. However, believing that Apple Inc. has not gone through some setbacks would be illogical. In fact, this is one of the companies that have their good testimony of how the tread of emerging as successful in an already established market can be challenging. However, Apple Inc. has been able to maintain a steady pace as it makes effort to continue with the market analysis, which has been enhanced through having a strategic plan that has been implemented properly, and through capitalizing on strengths that have been highlighted, the analysis has indentified. In the philosophy simple terms, the strategic management is perceived to be basically important to every leading business in any sector of the economy. A model example happens to be presented by Apple Inc. on how the strategic management incorporation can assist in making a firm to successfully be able to meet its expectations and objectives (Yoffie and Slind, 2008). Through the strategic management development, Apple Inc. has benefited in many ways despite the challenges that have been witnessed in the process. Emerging as an industrial giant in the modern business is not an easily achievable goal, but will require a strategy in place that clears the path to success. Internal growth has in one way or the other enhanced the competitive growth of Apple Inc. and through maintaining an aggressive business tread, its importance has been realized in the lucrative success that has been enjoyed by Apple Inc (HBSWK, 2004). In technology, Apple Inc. has advanced from the initial computer industry to involvement of the peripherals which has been based on its products and services that have been on a wide scope. The Apple’s mission highlights a company that is with no doubt in the process of revolving the technology industry. The short term goals of Apple have not been well defined, which presents one of the major shortcomings Of Apple Inc’s strategies. Due to its major goal which has in the past been aimed at ensuring that the customers are provided with the best personal computers globally, finding other specific objectives has proved difficult to Apple. Of late, it has been realized that due to the modern emerging competition, Apple Inc. has continued losing its customers to the alternative companies that are offering their products at a lower market price, especially in the iPod music; this has strongly been attributed to the increasing hackers of the code and the piracy. Other challenges facing has been failure to draw a specific target to a customer group that is focused and failing to take advantage of the customers that already exist. Product integration failure coupled with the technologies that are available readily has been another challenge that has continued to establish it self into this company, which has been critical its success. These problems have however not been very critical to the business. The inability of Apple Inc. to be comparable to other companies has been based on the fact that Apple has not been specializing in one product scope , thus providing a more complicated scope of products. This can be an advantage as well as well as a disadvantage. Looking at Apple Inc. initial mission, the specification has been based on the computer development. With a new product development (consider the iPhone), a new mission was redefined, leaving uncertainty in evaluation of Apples initial goal (Freedman, 1998). Is it a company which has found opportunities in the market that is appropriate resulting to incorporation or is it a company that has from the onset been aimed at clearly known goals? Recommendation Apple Inc. has enjoyed success of growth in the market through development of products that have been widely accepted. The company however needs to improvise its technology and products to eliminate the problem that it has faced involving loss of its customers to the competitors. The identification of a specific group of customers would be very relevant in the process of ensuring certainty of existence in the market. The introduction of iPhone for example targeted the category of young men; a group which is likely to be very dynamic and slippery to new technology. Having a specific group of customer will thus enable Apple Inc. to progress with a strategy that will result in continuous market of its products. Just like any other company, Apple Inc. is prone to dynamic business environment and the appropriate strategic management is what is required if the business has not only to exist in the market, but also result in continuous profits. References Freedman, R., (1998). Apple Computer Inc. New York University Leonard N. School of Business HBSWK (2004). Where Does Apple Go from Here?. HBS Working Knowledge Yoffie, B. and Slind, M., (2008). Apple Inc., 2008. Harvard Business School

Wednesday, August 21, 2019

Organisational Structures in Social Work

Organisational Structures in Social Work Organisations Working Separately and Individuals Working in Isolation are no Longer an Option Introduction This paper will consider the key ideas and theories underlying organizations. In doing so there will be particular concentration on the areas of mental health and social services. There will be an examination of the legislative context and policy changes as they apply to the chosen areas. Since the 1990 NHS and Community Care Act there has been considerable emphasis on partnership working and the importance of this to mental health and social services will be examined. Attention will also be paid to the experiences of users and carers, particularly as it relates to issues of power and inequality. The paper will begin with a general introduction to the areas under consideration. It is no longer an option for organizations to work in isolation, this is particularly the case with organization concerned with services to the public. The organizations which come under the umbrella of what is known as human services operate in both the public and the private arenas. The introduction of market principles into areas that were once the sole responsibility of the state welfare system, has meant that an increasing number of human service workers are employed in the private sector. Human Service organisations are comprised of medical staff and others such as administrators, cooks and cleaners employed by the NHS or in private practice, the police and probation services, the prison services, social services, and to a limited extent those working in education. Certainly the pre-school sector could be described as a human service organisation because of the many different services the sector performs. Many of these are voluntary organisations. The voluntary human services might also include organisations that help the disabled, organisations such as Adaction which work with alcoholics and people with drug problems, and Mind, a voluntary sector organisation which caters for people with mental health problems. Social Services People seeking to work in the human services usually do better if they have had some prior experience. This might be through undertaking work placements or by undertaking voluntary work for a time. In social work, this is likely to be even more the case because prior community involvement is seen as a valuable asset. This may be a result of the fact that the social services has its roots in the voluntary charity work of the late nineteenth century. The role of a social worker is primarily defined by what used to be known as personal social services. This is because on the whole social workers are concerned with individuals and the care they may need. In the field of human services social work may be seen as both typical, and untypical , firstly its aim is to provide a personal service that benefits other people, social workers are more likely than other human service workers to be involved with people on an individual basis, often for a prolonged period of time. In other areas of the human services contact with the public is usually more fleeting. As a result of current Government policy a social worker who may be involved with clients with mental health needs, may find themselves in partnership with the NHS (or community mental health team) and a voluntary organisation such as Mind. More importantly, Government expects social care and health professionals to work closely and collaboratively with service users. What social work consists of is decided by Parliament. This is because the Government defines the statutes that outline social workers responsibilities and the people towards whom they have that responsibility, also the ma nner in which such responsibilities should be undertaken, and the legislative framework that underpins the professional practice of social work (Brayne and Martin, 1995).[1] Social workers have to abide by the code of practice set by the General Social Care Council, and are bound by the 1970 Social Services Act as it applies to local authorities. Since the Human Rights Act of 1998 social workers are bound by law to respect the inherent rights and dignity of every human person. Social workers are bound by the 1990 Community Care Act and subsequent legislation. Local Authorities are also by the Disability Discrimination Act and social workers whose clients who have mental or physical disabilities Social workers have to be familiar with this Act as well as the Chronically Sick and Disabled Persons Act of 1970. Social workers also need to be aware of what defines a person with mental or physical or disabilities and how their needs might best be addressed. Local authorites have to regulate services to deal accommodate both their own financial restraints and people’s needs and disabilitie. The social worker is bound by the same terms as their employer. Local Authority Social Service Departments have a legal duty to find out if there are people with disabilities in their area, what the number is, and what help the Department is able to offer. Details of services should be published and the department has a duty to inform clients of their rights in relation to the services they provide.[2] The Local Authority and also the social worker have to take into account the major implications of the 1995 Disability Discrimination Act when dealing with people who have mental or physical difficulties. Disability is defined under this Act disability as: Disability is defined as a physical or mental impairment which has a substantial and long-term adverse effect on ability to carry out normal day-to-day activities (Brayne and Martin, 1999:460). Social workers have a duty to assess the service needs that disabled service users may have and decide whether they can help the person with that need. There is also a considerable emphasis within social services on encouraging the user to participate in decisions regarding their care. At the same time social workers are encouraged to lessen the power differential between themselves and service users, this means engaging in anti-oppressive practice e.g. accessible language, and doing what they can to empower individuals. Policy Changes Changes in Government social policy during the 1970s and 1980s resulted in significant changes to those organizations which provided services for people with disabilities, people with learning disabilities, and older people (Kirk, 1998). As a result of Government spending cuts numbers of institutions were closed and this resulted in care being increasingly focused on the community. The Griffiths Report (1988) was commissioned by the Government and it recommended that local authorities should be enablers, who organized and directed community care. Local authorities would no longer be the sole providers of care, but would have their own budgets to purchase care from the private and voluntary sector. This policy became a matter of statute under the 1990 NHS and Community Care Act. The Act stipulated that individual care packages would be organised by local authorities with input from voluntary and charitable organisations. The terms of the Act resulted in an increase in the burden of care for the social work profession. Under the 1990 Act social workers are required to make initial assessments and then refer clients to the appropriate services. The Act emphasized partnership working in all areas and social workers now have to consult with professionals from all walks of life in order to adequately provide for their clients needs. The Government has been committed to this idea of partnership working and has regularly updated the terms since coming to power, and produced a white paper on the delivery of integrated health and social care in July of last year.[3] When it comes to clients with mental health needs many social workers may find themselves working in conjunction with the organization known as Mind. Mind Mind is the leading mental health charity in both England and Wales.[4] Mind has over 200 local associations which run drop in centres, help lines, give housing advice and work with mental health professionals and social workers to improve the lives of people with mental health difficulties. The aims of Mind are as follows Advancing the views, needs and ambitions of people with mental health problems Challenging discrimination and promoting inclusion Influencing policy through campaigning and education Inspiring the development of quality services which reflect expressed need and diversity Achieving equal rights through campaigning and education.[5] Their aims demonstrate that Mind is geared towards the minimalisation of inequalitites and the promotion of the needs and rights of people with mental health difficulties. Mind aims to empower its users and to encourage their participation in assessing and providing for their needs. Mind campaigns to improve the lives of those with mental health problems and to raise awareness in the wider community so that the public and the Government are more accepting of people with these needs. Mind also advises Government, Health Authorities, and Social Services Departments on what is best practice for addressing mental health needs. In this way Mind might be said to be a good advertisement for partnership working which, as Molyneux (2001)[6] reminds us can sometimes be problematic. Social Services and Mind Mind is aware of the contribution that social workers make and points out that the right kind of social care can go a long way to alleviating the stress that mental health difficulties may bring. At present mental health users receive only a small amount of social care and are often referred for medical help alone. However, this course of action neglects the enormous social consequences that mental health difficulties can have and how it affects family units. Greater availability of social care would go a long way to alleviating such difficulties. The increasing Government emphasis on partnership working should lead to a greater connection between those who work for social services and the staff of mind. The two of them together could be of considerable help in assisting sufferers to reintegrate back into society after a long hospital stay. Conclusion This paper has examined some of the theories and structures underlying social service departments and the charity called Mind. It has looked at the legislative and policy contexts as they apply to people who need social care and who may also have mental health problems. It has looked at partnership working and how the responsibilities that are incumbent upon social workers are intended to minimalise inequalities and to substantially lessen the power differential between service users and service providers. Bibliography Banks, S. 2003 From oaths to rulebooks: a critical examination of codes of ethics for the social professions European journal of Social Work Volume 6 No. 2 July 2003 p. 133-144 Brayne and Martin 6th ed. 1999 Law for Social Workers London, Blackstone Press http://www.dh.gov.uk/PublicationsAndStatistics/PressReleases/PressReleasesNotices/fs/en?CONTENT_ID=4116486chk=zOTHS/ Molyneux, J 2001 â€Å"Interprofessional team working: What makes teams work well?† Journal of Inter-professional Care 15 (1) 2001 p.1-7 http://www.dh.gov.uk/PublicationsAndStatistics/PressReleases/PressReleasesNotices/fs/en?CONTENT_ID=4116486chk=zOTHS/ http://www.mind.org.uk/About+Mind/ p.1 Disability Discrimination Act 1995 http://www.drc-gb.org/thelaw/thedda.asp http://www.after16.org.uk/pages/law5.html http://www.after16.org.uk/pages/law5.html 1 Footnotes [1] Brayne and Martin 6th ed. 1999 Law for Social Workers London, Blackstone Press [2] http://www.after16.org.uk/pages/law5.html [3] http://www.dh.gov.uk/PublicationsAndStatistics/PressReleases/PressReleasesNotices/fs/en?CONTENT_ID=4116486chk=zOTHS/ [4] http://www.mind.org.uk/About+Mind/ [5] http://www.mind.org.uk/About+Mind/ p.1 [6] Molyneux, J 2001 â€Å"Interprofessional team working: What makes teams work well?† Journal of Inter-professional Care 15 (1) 2001 p.1-7

Tuesday, August 20, 2019

Cryptography: Theories, Functions and Strategies

Cryptography: Theories, Functions and Strategies Abstract Digital signing is a mechanism for certifying the origin and the integrity of electronically transmitted information. In the process of digitally signing, additional information called a digital signature is added to the given document, calculated using the contents of the document and some private key. At a later stage, this information can be used to check the origin of the signed document. The mathematical base of the digital signing of documents is public key cryptography. This work presents the theory behind digital signatures, signature schemes and attacks on signatures and provides a survey of application areas of the digital signing technology. Moreover, there are lab exercises developed in Mathlab, to reinforce the understanding of this technology. 1. Introduction The Concise Oxford Dictionary (2006) defines cryptography as the art of writing or solving codes, however modern cryptography does not met this definition. Therefore, this work starts with a literature review defining some key concepts, like what cryptography and cryptographic system are and the different types of cryptographic system are presented. The other interesting and preliminary concept is the notion of cryptosystem functions which are also discussed in the introductory section. Furthermore, it is stated that public-key encryption represents a revolution in the field of cryptography, and this work poses some basic definitions on this topic trying to explain the theory behind. The rest of the literature review is concentrated on public key cryptography and it focuses on the theory behind digital signatures, signature schemes and attacks on signatures. And finally, the literature review presents a survey of application areas on digital signatures. One part of the contribution of this work, is an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. The main part though, is the implementation of AES and RSA by utilizing Mathlab. The code of all these implementations is thoroughly discussed and explained in this work. Moreover, a comparison is also presented subsequently. 2. Cryptography The Greek words â€Å"krypt ´os† standing for â€Å"hidden† and the word â€Å"l ´ogos† that means â€Å"word†, are in essence the base from where the word cryptology was derived. As these words denote, cryptology can be best explained by the meaning â€Å"hidden word†. In this context, the original purpose behind cryptology is hiding the meaning of some specific combination of words which in turn would insure secrecy and confidentiality. This is a very limited viewpoint in today’s perspective and a wide range of security applications and issues now come under the term of cryptology (rest of the portion of this section will clarify this point of view). As field of mathematical science, Cryptology includes the study of both cryptanalysis as well as cryptography. On one hand, cryptography is a very broad term and represents any process used for data protection. On the other hand, the study of security related issues and the probabilities of breaking the cryptographic systems and a technique is known as cryptanalysis. By making reference to (Shirey, 2000), the field cryptanalysis can be best described as the â€Å"mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide.† In simple words, cryptanalyst can be regarded as the opponent of the cryptographer i.e. he/she has to get around the security which cryptographer devised on his/her part. (Buchmann, 2004) claims that a cryptographic system (or in short a cryptosystem) describes â€Å"a set of cryptographic algorithms together with the key management processes that support use of the algorithms in some application context.† This is a diverse explanation that includes all sorts of cryptographic algorithms as well as protocols. However, hidden parameters like cryptographic keys may or may not be used by a cryptographic system (Delfs, 2007). Similarly, participants of the undergoing communication may or may not share those secret parameters. Thus, cryptographic can be classified into following three types: a cryptographic system in which no secret parameters are employed (called an un-keyed cryptosystem); a cryptosystem which makes use of secret parameters and at the same time shares the parameters between the participants (known as a secret key cryptographic system); and a system that utilizes the secret parameters, but not sharing them with the participants (call ed a public key cryptographic system) (Shirey, 2000; Buchmann, 2004). Cryptography aims at designing and implementing cryptographic systems and utilizing such systems which are secure effectively. The first a formal definition about the term cryptography dates from relatively past time. Back then, the approach known by the name â€Å"security through obscurity† was being used (Dent, 2004). There are a lot of examples based on this approach by which security of the system was improved by keeping internal working and design secret. Majority of those systems do not serve the purpose and security may well be violated. The Kerckhoffs’ principle is a very famous cryptographic principle which states that (Kerckhoffs, 1883): â€Å"Except for parameters clearly defined to be secret, like the cryptographic keys, a cryptosystem must be designed in such a way as to be secure even with the case that the antagonist knows all details about the system†. However, it might be noted that one important aspect is that a cryptosystem is perfectly securing theoretically grounds, but it may not remain the same when implemented practically. Different possibilities of generating attacks on security of such systems can arise while having the practical implementation (Anderson, 1994). Attacks which make use of exploitation of side channel information are the examples of such attacks. If a cryptosystem is executed, it can result in the retrieval of side channel information with unspecified inputs and outputs (Anderson, 1994). In encryption systems, the input is plaintext message plus the key, while the specific output is the cipher text. Thus, there are chances on information leakage. Power consumption, timing characteristics along with the radiation of all types are some examples in this regard. On the other hand, side channel attacks are the types of network attacks which extract side channel information. Since the mid 1990s there were many di fferent possibilities have been found by the researchers in order to build up side channel attacks. A few examples in this regard are the differential power analysis (Bonehl, 1997), and fault analysis (Biham, 1997; Kocher, 1999) as well as the timing attacks (Kocher, 1996). It is a very practical statement that any computation performed on real computer systems represents some physical phenomena which can be examined and analyzed to provide information regarding the keying material being employed. Cryptography does not help to cope with this situation because of the inherent nature of this problem. 2.1 Cryptosystem functions Other than the usual random bit generators as well as the hash functions, there are no secret parameters that are used in cryptosystem functions. These are the junketed functions that characterize the cryptographic system functions. In cryptographic functions, the elements used are usually one-way and it is difficult or almost impossible to invert them. This follows that it is easy to compute a cryptographic function whereas it is hard to invert the functions and also to compute the results of the relationships (Kerckhoffs, 1883). It is difficult to apply any mathematical method for inverting the cryptographic system functions in a way that will be coherent and meaningful. For example, a cryptographic system functions such as F: X → Y is easy to comfortably use mathematical knowledge to compute while it is hard to use the same to invert (Buchmann, 2004; Shirey, 2000). There are many examples of one-way functions that we can use to demonstrate the meaning of the cryptosystems. In a situation where one has stored numbers on the cell phone, computation of the same is possible and easy due to the fact that the names are stored in an alphabetical manner (Garrett, 2001). If one inverts the relationship of these functions, it will be impossible to compute because the numbers are not arranged numerically in the storage phonebook. It is notable that a lot of other things that we do in daily life are comparable to cryptosystem function in the sense that you cannot invert or undo them. For example, if one breaks a glass, the process is one way because it is not possible for these pieces to be restored together again (Goldreich, 2004). Similarly, when one drops something into water, it is not practically possible to reverse the action of dropping this item (Mao, 2003). The English corresponding action would be to un-drop the item as opposed to picking it. Cry ptosystem functions cannot be demonstrated as purely one-way and this is the branching point between cryptosystem functions and the real world of things and circumstances. The only one-way functions in mathematics can be exemplified by discrete exponentiation, modular power and modular square functions. Public key cryptography uses these functions in its operations but it has not been well documented whether they are really one-way or not. There has been debate in practice whether one-way functions really exist in the first place or not (Garrett, 2001). In the recent day cryptographic discussions a lot of care should be applied when referring to the one-way functions so as not to interfere or make false claims to the functional attributes of these parameters. There is a need to look for extra information and knowledge concerning one-way functions so that efficient and meaningful inversions are possible and mathematically coherent. Therefore, functions such as F: X → Y is considered to be a one-way function (Koblitz, 1994; Schneier, 1996). This follows that if F can successfully and coherently inverted, the need for extra information is needed. This will hence bring the notion of the meaning of the other parameters in relation to F. Computer science uses the hash functions in its operations. This is because these functions are computable and generates output dependent on the input that was used (Katz, 2007; Koblitz, 1994). 3. Digital signatures The public-key encryption presents a revolution in the field of cryptography and until its invention the cryptographers had relied completely on common, secret keys in order to achieve confidential communication (Smart, 2003). On the contrary, the public-key techniques, allow for the parties to communicate privately without the requirement to decide on a secret key in advance. While the concept of private-key cryptography is presented as two parties agree on a secret keyk which can be used (by either party) for both encryption and decryption; public-key encryption is asymmetric in both these respects (Stinson, 2005). Namely, in public-key encryption: One party (the receiver) generates a pair of keys (pk, sk), where pk is called the public key and ps is the private key, The public key is used by a sender to encrypt a message for the receiver, and The receiver uses the private key to decrypt that message. There three parts of information form part of public key certificate: Some naming information A Public key Digital signatures (this can be one or more) Encryptions and digital signatures were introduced to make the web transactions secure and manageable. The use of cryptographic techniques was applied to enhance and provide security layer such that the encrypted information and files would remain secure and confidential. Very frequently, a digital signature is mistaken with the inverse of a public-key encryption, but this is not entirely true. In the history, a digital signature could be obtained by reversing, but today in the majority of the situations this process would be impossible to be performed. Basically, a digital signature is a form of a mathematical scheme for signifying the genuineness of a digital message. A valid digital signature would provide a proof to the person that receives the message or the document that these information is indeed created by a specified sender. Moreover, it would prove that message or the document was not altered during the transportation. Digital signatures are usually used for software distribution or mainly money transactions, where it is very important to detect the possibility of forgery. As a part of the field in asymmetric cryptography, it might be noted that a digital signature is somehow equivalent of the traditional handwritten signatures. On the other hand, in order to be effective, a digital signature should be correctly implemented. Another very important concept is the notion of non-repudiation. This means that if somebody signs a document by using a digital signature, they can not say that it was not signed by them, even though their private key remains as a secret. On the other hand, there is a time stamp, so that even if the private key of a sender is compromised in future, the digital signature will remain valid. Examples of such messages are: electronic mail contracts messages sent via some cryptographic protocol A digital signature usually is comprised of: An algorithm for producing a key. This algorithm would find a private key by chance from all the possible private keys available. Then it will output that private key with a matching public key. A signing algorithm that, given a message and a private key, produces a signature. A signature authenticating algorithm that, given a message, public key and a signature, it will accept or reject the message. Primary, a signature produced from a fixed message and a private key verifies that the genuineness of that message is ok, by means of the matching public key. Then, it has to be computationally infeasible to make an appropriate signature for a party that doesn’t have the private key 4. Algorithms 4.1. Introduction to SHS This section provides an overview of the secure hash standard (SHS) and implementation of the secure hash algorithm (SHA-1), required for use with digital signature algorithms. SHA-1 is used for computing a compressed version of a message or a data file. If that data has a length smaller than 264 buts, then the output will be 160-bit and is called a message digest. The message digest used for an input to the Digital Signature Algorithm (DSA). This algorithm will verify the signature for the message. Signing the message digest instead of the originall message itself, might advance the effectiveness of the procedure. This is since the message digest is usually much slighter in size than the original message. Very important is that the same hash algorithm should be used by both the verifier and the digital signature creator. The usage of the SHA-1 with the DSA can be presented as follows: Interesting for SHA-1 is that it is computationally impossible to discover a message which matchs to a given digest. Moreover, it is also impossible to find two dissimilar messages which create an identical message digest. 4.2. Implementation of SHA-1 The following functions were implemented for the SHA-1 algorithm: Name of source file: secure_hash_algorithm.m. Function in the source file: secure_hash_algorithm (message). This function takes an input a string of characters. Example: Hello, How are you? How is it going on? Output is the message digest, the hash value of the message. Thus, the hash value of the above message is F418F52AE6DC208599F91191E6C40FA876F33754. Name of source file: arithematic_shift_operations.m. Function in the source file: arithematic_shift_operations (number, position, op). The inputs are: number: it is a hexadecimal large number of any size. The number is represented in base 16 and is stored as a string. Ex: ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’ position: the number of positions to be shifted by. It is a decimal number in base 10. Op: it is the type of operation done. Inputs are ‘SRA’ -> shift right arithematic and ‘SLA’ -> shift left arithematic. For example, the function: arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SRA’) would return ‘1FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, and arithematic_shift_operations(‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF’, 3, ‘SLA’) would return ‘FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF8’. Name of source file: bi2hex.m. Function in the source file: bi2hex (number). The input to this function is a vector of ones and zeros and the result is a hexadecimal output represented in string. For example, for the input â€Å"Number = [1 1 1 1]† bi2hex (Number) returns ‘F’ and for â€Å"Number = [1 1 1 1 0 0 0 1 ]† bi2hex (Number) returns ‘F1’. Name of source file: hex2bi.m. Function in the source file: hex2bi (number). The input to this function is a number stored in form of a string in base 16 and the result is a vector containing the binary representation of input string. For example, for the input â€Å"Number = ‘F’ †, hex2bi (Number) returns â€Å"[1 1 1 1]† and for â€Å"Number = ‘F1’ â€Å", bi2hex (Number) returns â€Å"[1 1 1 1 0 0 0 1]†. Name of source file: hexadecimal_big_number_adder.m. Function in the source file: hexadecimal_big_number_adder (number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and carry, a decimal number. After using this function, it has to be checked if the carry is generated, Incase if it is generated then the carry has to be appended in the beginning to the result. For example: Number_one = ‘FFFFFFFF’ Number_two = ‘EEEEEEEE’ [result, carry] = hexadecimal_big_number_adder (Number_one, Number_two) Result = ‘EEEEEEED’ , carry = 1; Hence the real sum is Result = strcat(dec2hex(0), Result); this results to ‘1EEEEEEED’ Name of source file: hexadecimal_big_number_subtractor.m. Function in the source file: hexadecimal_big_number_subtractor(number_one, number_two). The inputs to this function are numbers stored in hexadecimal string format. Output is the result, a hexadecimal string and sign, a decimal number. If sign is -1, then the result generated is a negative number else is a positive number. . For example: Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’ [result, sign] = hexadecimal_big_number_subtractor(Number_one, Number_two) Result = ‘11111111’ Sign = -1. Name of source file: hexadecimal_big_number_multiprecision_multiplication.m. Function in the source file: hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier). The input is a multiplicand stored in string format is a hexadecimal number. And so is multiplier. The output is a result and is stored in form of a string. For example: multiplicand= ‘EEEEEEEE’ multiplier= ‘FFFFFFFF’ hexadecimal_big_number_multiprecision_multiplication(multiplicand, multiplier) result is ‘EEEEEEED11111112’ Name of source file: comparision_of.m. Function in the source file: comparision_of(number_one, number_two, index). This function compares two numbers in hexadecimal format stored in form of strings. Always input index as decimal 1. Therefore, it: Returns 1 if Number_one > Number_two, Returns 0 if Number_one = Number_two, and Returns -1 if Number_one For example, if Number_one= ‘EEEEEEEE’ Number_two= ‘FFFFFFFF’, the result would be: comparision_of(Number_one, Number_two, 1) returns -1. Name of source file: hexadecimal_big_number_modular_exponentiation.m. Function in the source file: hexadecimal_big_number_modular_exponentiation (base, exponent, modulus). This function calculates (power(base, exponent) % modulus). Here the input base, exponent and modulus are hexadecimal strings of any size. For example: Base = ‘FFF’ Exponent = ‘EEE’ Modulus = ‘AAAA’ hexadecimal_big_number_modular_exponentiation (Base, Exponent, Modulus) returns ‘8BAB’ Name of source file: hexadecimal_big_number_multiplicative_inverse.m. Function in the source file: Z = hexadecimal_big_number_multiplicative_inverse(number_one, number_two). This function returns multiplicative inverse of number_two modulo number_one. If az = 1 (mod m) then z is the multiplicative inverse of a mod m. Here â€Å"number_one = m†, â€Å"number_two = a†, â€Å"number_one = ‘FFFF’ †, â€Å"number_two = ‘1235’ â€Å" andresult is ‘634D’, which in turn is the multiplicative inverse of number_two.Hence : (result * number_two) mod number_one = 1 Name of source file: hexadecimal_big_number_test_for_primality.m. Function in the source file: hexadecimal_big_number_test_for_primality(number). The input to this function is an ODD number stored in hexadecimal format as a string. This function returns 1 if the input is a prime and returns -1 if input is composite. Name of source file: power_of_two_conversion_to_hexadecimal.m. Function in the source file: power_of_two_conversion_to_hexadecimal(power). The input is the number, the power to which two has to be raised to. It is a decimal number and the output is a hexadecimal number in form of string. For example, power_of_two_conversion_to_hexadecimal(4) returns ‘10’ i.e 16 in decimal system. Name of source file: hexadecimal_big_number_division.m. Function in the source file: hexadecimal_big_number_division (dividend, divisor). This function returns quotient and remainder both in hexadecimal string format. The inputs to this function are strings of hexadecimal format. This function uses other two functions in turn which are defined in source file Get_multiplier.m, multiplication_by_single_digit_multiplier.m. Name of source file: remove_leading_zeros.m. Function in the source file: remove_leading_zeros (number). This function takes number in hexadecimal string format as input and removes the leading zeros in the string and returns it. For example, if â€Å"Number = ‘000000012345’ â€Å", then the function returns ‘12345’. Some of the most prominent functions are presented in Appendix A. 4.3. Introduction to MD5 The MD5 Message-Digest Algorithm is a extensively utilised in cryptographic hash functions. Basically this is the case for cryptographic hash functions with a 128-bit (16-byte) hash value. MD5 is used in many security applications, and in addition it is frequently used to check data integrity. An MD5 hash is typically expressed as a 32-digit hexadecimal number. The following figure represents a schematic view of the MD5 Message-Digest Algorithm. 4.4. Implementation of MD5 This algorithm would compute MD5 hash function for files. For example, if as input is given the d = md5(FileName), then the function md5() will computes the MD5 hash function of the file specified in the string FileName. This function will returns it as a 64-character array dwhere d is the digest. The following methodology that the MD5 algorithm was implemented: Initially, the function Digestis called. This function would read the whole file, and will make it uint32 vector FileName = C:\md5InputFile.txt [Message,nBits] = readmessagefromfile(FileName); Then, it would append a bit in the last one that was read from that file: BytesInLastInt = mod(nBits,32)/8; if BytesInLastInt Message(end) = bitset(Message(end),BytesInLastInt*8+8); else Message = [Message; uint32(128)]; end Consequetly, it will append the zeros: nZeros = 16 mod(numel(Message)+2,16); Message = [Message; zeros(nZeros,1,uint32)]; And a bit length of the original message as uint64, such as the lower significant uint32 first: Lower32 = uint32(nBits); Upper32 = uint32(bitshift(uint64(nBits),-32)); Message = [Message; Lower32; Upper32]; The 64-element transformation array is: T = uint32(fix(4294967296*abs(sin(1:64)))); The 64-element array of number of bits for circular left shift: S = repmat([7 12 17 22; 5 9 14 20; 4 11 16 23; 6 10 15 21].,4,1); S = S(:).; Finally, the 64-element array of indices into X can be presented as: idxX = [0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 1 6 11 0 5 10 15 4 9 14 3 8 13 2 7 12 5 8 11 14 1 4 7 10 13 0 3 6 9 12 15 2 0 7 14 5 12 3 10 1 8 15 6 13 4 11 2 9] + 1; The initial state of the buffer is consisting of A, B, C and D. such as: A = uint32(hex2dec(67452301)); B = uint32(hex2dec(efcdab89)); C = uint32(hex2dec(98badcfe)); D = uint32(hex2dec(10325476)); The message is reshaped, such as: Message = reshape(Message,16,[]); The look between the blocks, such that X is an extraction of the next block: for iBlock = 1:size(Message,2) X = Message(:,iBlock); The buffer states are stored as: AA = A; BB = B; CC = C; DD = D; The buffer is transformed by utilizing the X block from above, and the parameters from S, T and idxX k = 0; for iRound = 1:4 for q = 1:4 A = Fun(iRound,A,B,C,D,X(idxX(k+1)),S(k+1),T(k+1)); D = Fun(iRound,D,A,B,C,X(idxX(k+2)),S(k+2),T(k+2)); C = Fun(iRound,C,D,A,B,X(idxX(k+3)),S(k+3),T(k+3)); B = Fun(iRound,B,C,D,A,X(idxX(k+4)),S(k+4),T(k+4)); k = k + 4; end end The old buffer state is also being added: A = bitadd32(A,AA); B = bitadd32(B,BB); C = bitadd32(C,CC); D = bitadd32(D,DD); end The message digest is being formed the following way: Str = lower(dec2hex([A;B;C;D])); Str = Str(:,[7 8 5 6 3 4 1 2]).; Digest = Str(:).; The subsequent functionality is performed by the following operations: function y = Fun(iRound,a,b,c,d,x,s,t) switch iRound case 1 q = bitor(bitand(b,c),bitand(bitcmp(b),d)); case 2 q = bitor(bitand(b,d),bitand(c,bitcmp(d))); case 3 q = bitxor(bitxor(b,c),d); case 4 q = bitxor(c,bitor(b,bitcmp(d))); end y = bitadd32(b,rotateleft32(bitadd32(a,q,x,t),s)); And the bits are rotated such as: function y = rotateleft32(x,s) y = bitor(bitshift(x,s),bitshift(x,s-32)); The sum function is presented as: function sum = bitadd32(varargin) sum = varargin{1}; for k = 2:nargin add = varargin{k}; carry = bitand(sum,add); sum = bitxor(sum,add); for q = 1:32 shift = bitshift(carry,1); carry = bitand(shift,sum); sum = bitxor(shift,sum); end end A message is being read frm a file, such as: function [Message,nBits] = readmessagefromfile(FileName) [hFile,ErrMsg] = fopen(FileName,r); error(ErrMsg); Message = fread(hFile,inf,ubit32=>uint32); fclose(hFile); d = dir(FileName); nBits = d.bytes*8; Lastly, the auto test function is the following: function md5autotest disp(Running md5 autotest); Messages{1} = ; Messages{2} = a; Messages{3} = abc; Messages{4} = message digest; Messages{5} = abcdefghijklmnopqrstuvwxyz; Messages{6} = ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789; Messages{7} = char(128:255); CorrectDigests{1} = d41d8cd98f00b204e9800998ecf8427e; CorrectDigests{2} = 0cc175b9c0f1b6a831c399e269772661; CorrectDigests{3} = 900150983cd24fb0d6963f7d28e17f72; CorrectDigests{4} = f96b697d7cb7938d525a2f31aaf161d0; CorrectDigests{5} = c3fcd3d76192e4007dfb496cca67e13b; CorrectDigests{6} = d174ab98d277d9f5a5611c2c9f419d9f; CorrectDigests{7} = 16f404156c0500ac48efa2d3abc5fbcf; TmpFile = tempname; for k=1:numel(Messages) [h,ErrMsg] = fopen(TmpFile,w); error(ErrMsg); fwrite(h,Messages{k},char); fclose(h); Digest = md5(TmpFile); fprintf(%d: %sn,k,Digest); if ~strcmp(Digest,CorrectDigests{k}) error(md5 autotest failed on the following string: %s,Messages{k}); end end delete(TmpFile); disp(md5 autotest passed!); 4.4.1 Results This algorithm is tested with the input: university of Portsmouth department of electronic and computer engineering. This was written on the file: â€Å"C://md5InputFile.txt†. The outpus results are as in the following fugures: Textual description of the output results follows: OUTPUT FileName = C:\md5InputFile.txt Running md5 autotest FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 1: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 2: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 3: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 4: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 5: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 6: 3129b41fa9e7159c2a03ad8c161a7424 FileName = C:\md5InputFile.txt 1986621045 1769173605 1864399220 1867522150 1836282994 1752462703 1885692960 1836348001 544501349 1696622191 1952671084 1768845170 1851859043 1868767332 1953853549 1696625253 1852401518 1769104741 26478 7: 3129b41fa9e7159c2a03ad8c161a7424 md5 autotest passed! 4.5. Introduction to Caesar cipher The Caesar cipher in cryptography, is in essence a shift cipher. It represents as one of the simplest and most widely known encryption methodologies. The Caesar cipher is a kind of substitution cipher. It means that each letter in a given plaintext is replaced by another letter. This is done due shifting by some fixed number of positions down the alphabet. Julius Caesar was the first to use this ci

Monday, August 19, 2019

Code Of Hummurabi :: Hummurabi Code of Law

In his position as King of Babylonia, Hammurabi managed to organize the world's first code of laws and establish Babylon as the dominant and successful Amorite city of its time. "Records written on clay tablets show that Hammurabi was a very capable administrator and a successful warrior. His rule spanned from 1792 B.C. to 1750 B.C. When he became king in 1792, he was still young, but had already become entrusted with many official duties in his administration" (Grolier). In the early years of his reign, Hammurabi mostly participated in traditional activities, such as repairing buildings, digging canals, and fighting wars. Yet later in his rule, Hammurabi organized a unique code of laws, the first of its kind, therefore making himself one of the world's most influential leaders. Hammurabi was primarily influential to the world because of his code of laws. This code consisted of 282 provisions, systematically arranged under a variety of subjects. He sorted his laws into grou ps such as family, labor, personal property, real estate, trade, and business. This was the first time in history that any laws had been categorized into various sections. This format of organization was emulated by civilizations of the future. For example, Semitic cultures succeeding Hammurabi's rule used some of the same laws that were included in Hammurabi's code. Hammurabi's method of thought is evident in present day societies which are influenced by his code. Modern governments currently create specific laws, which are placed into their appropriate family of similar laws. Hammurabi had his laws recorded upon an eight foot high black stone monument. Hammurabi based his code on principles like, the strong should not injure the weak, and that punishment should fit the crime. As for punishment, "legal actions were initiated under the code by written pleadings; testimony was taken under oath. The code was severe in it's penalties, prescribing "an eye for an eye, a tooth f or a tooth.""(Grolier). This code of laws was able to be maintained by invoking the authority of the gods and the state. Although the punishments were different than those of today, the authority of the state (government) is similar. Currently, punishments are issued through the state's law enforcement system, comparable to the way punishment was determined and enforced in ancient Babylon. In the code, crimes punishable by death required a trial in front of a bench of judges. Included in these crimes were: bigamy, incest, kidnapping, adultery and theft.

Sunday, August 18, 2019

John Fowles The Collector Essay -- essays research papers

John Fowles' The Collector John Fowles gives one a glimpse into insanity in, The Collector. A lonely, single man comes into some money, and suddenly his fantasies can become reality. He collects butterflies, killing them and posing them in little glass plates. Is he evil? It is hard to say, and as one reads the lines are blurred and morals questioned. Is that which is wrong always done with bad intentions?   Ã‚  Ã‚  Ã‚  Ã‚  Frederick, the main character, is in love with a beautiful, young girl who he has never spoken to. They lived in the same town, and occasionally he would see Miranda, the art student, walking about as he looked out of windows from home and from work. When Fred wins the lottery, he realizes that he will be able to have Miranda, but he does not believe he ...

Saturday, August 17, 2019

Drama assignment Essay

Hale is one of the most important characters in The Crucible. All of the characters contribute to the problems in Salem to some extent. But Hale is the catalyst to the hysteria beginning and it is how is awareness of this increases through the play that causes the major changes we see in his character.  Hale himself, as we are told by miller, â€Å"†¦nearing forty, a tight skinned eager eyed intellectual.† He feels great pride at being asked to come and identify the signs of witchcraft and sees it as a compliment to his experience in his chosen field. Unlike the other characters his experience gives him no reason to jump to the immediate conclusion of the involvement of the devil. Because of this he is perhaps the most common sense of the officials in Salem. Hales entrance in act 1 creates a big change in the direction of the scene, but it is important to remember he is unaware of this. How miller uses Hales entrances effectively is that he calms down the situation between Giles and Putnam when they cease their argument at his arrival but eventually he will excite the scene even more with his powerful redemption of Tituba and Abigail.  After his initial entrance in act 1 Hales attitude is reasonably light hearted as he greets the other characters, he refers to the devil in an of hand way as â€Å"the old boy†. Yet he still treats the situation in all seriousness as he listens to the Putnams talking about their daughters ailment, picking up clues from what people say. When Hale is investigating the supernatural, leafing through his books, asking questions and listening to the other characters etc, it should be shown that he does not treat this as a chore or just his job, but that he is genuinely interested and eager, his investigations are what drives him.  His attitudes to the other characters in the early part of act 1 are interest in meeting people he has heard of, and his respect for the more â€Å"†¦distinguished company.† who are there. His use of the phrase shows a wish to make a good impression with those who are higher in the village, but his interest in meeting Rebecca Nurse and talking to Giles shows that he is in no way biased to position. As we enter the increasingly hysterical ending to this act, Hales role in causing this is obvious. His quickening questioning of her is perhaps caused by his anger at her apparent lack of concern for Bettys condition and her attempts to evade answering his questions. † (grasping Abigail): abigail it may be your cousin is dying. Did you call the devil last night? † â€Å"you cannot evade me, Abigail.†Ã‚  Hale is excited at the end of act 1 because he believes he has got to the root of the problem when Tituba and Abigail â€Å"redeem† themselves and pass the blame to Good and Osburn. Because of this both hale and Parris see the problem as ending not beginning. Hale has obviously seen the situation last a lot longer than he expected when he enters in act 2. â€Å"he is different now- drawn a little, and there is a quality of deference, even of guilt, about his manner now.† This shows us the beginning of his realisation of the consequences of the accusations that he has caused to be made.  This is the second time Hales entrance changes the course of events in both this act and for the rest of the play without him knowing it, his entrance has stopped John Proctor from leaving just when he had built himself up to confront Abigail to stop the accusations, so he makes things worse again, but still unintentionally. His attitudes to the Proctors in this act are mixed. He sees them as good and honest people, but knows that there is evidence that would say otherwise even if none of its serious enough to entirely incriminate them. His nervousness is also caused by him being unsure how to tell them Elizabeth has been accused, without making it sound like he is accusing them himself.  We last see Hale in the final scene of Act Four we see the total change in his opinions to the authority of the court, the guilt of those charged and in his faith. His motivation is now to try and save proctor from his fate. He is confused and wrought because of how his faith has caused so many problems. To conclude, Hale changes most of all the characters, yet like the others he changes in that his main characteristics are strengthened. His honesty and sense of public duty are there throughout the play, how they change is to which end they’re directed. He is initially convinced of the presence and existence of witchcraft, and works vigorously to combat it in the only he knows how. Yet he is the only of the prosecutors who is convinced of the innocence of the accused, he still believes his first duty is the protection of others, but loses his principles to do so at the end. He is more open minded and humane than the others, but the message of the play tells us to reject the position to which he finally comes. He doesn’t reject just the religious fanaticism of the times but rejects religion itself. His attempts to save John Proctor ultimately fail, because in turning his back on the church, he has turned his back on what Elizabeth believes is right, and so his argument is worthless to her.  Perhaps Millers idea in Hale is that where the simple farmer sees the mistake in preferring life over personal integrity the learned Hale does not.

Do Parents Matter

Within today’s society and the way the family is portrayed within the media, the family life has changed considerably. The family setup and how parents now discipline their children and their skills to do so, have come under attack. With the increase of children committing crimes and anti social behaviour orders being handed out like sweets its seems that almost everyone is looking for someone to blame for the up rise in bad behaviour with the children of our country. There has been blame pointed at the lack of discipline given out by the courts, the television and media, how family’s are structured in today’s society’ compared to years ago and the majority of blame lies with the parents. This essay will look at â€Å"Do parents matter† as this is a huge issue and has vast implications I am going to look at the issue of Divorce. I will be looking at the theories of attachment and separation and how children who are involved with divorce cope and if the issue of gender, culture or ethnicity differs ahead to the outcome of â€Å"Do Parents Matter† The government’s reports that roughly 50% of all marriages in today’s society fail, reasons for the failure include poor communication or lack of communication, financial issues and even the circumstances of the marriage all contribute to the ending of what once seemed the perfect relationship. Within these failed marriages are children, confused and unsure of what the future holds for them. Unsure of how to deal with the split, having to choose which parent to leave behind and which parent to stay at residence with, decisions like these can cause trauma within certain children, thus the question is raised â€Å"Do parents matter? † According to John Bowlby, Attachment is a special emotional relationship that involves an exchange of comfort, care, and pleasure. John Bowlby devoted extensive research to the concept of attachment, describing it as a â€Å"lasting psychological connectedness between human beings† Bowlby shared the psychoanalytic view that early experiences in childhood have an important influence on development and behaviour later in life. Our early attachment styles are established in childhood through the infant/caregiver relationship. In addition to this, Bowlby believed that attachment had an evolutionary component, it aids in survival. The propensity to make strong emotional bonds to particular individuals is a basic component of human nature† (Bowlby, 1988) Bowlby believed that there are four distinguishing characteristics of attachment: Proximity Maintenance – The desire to be near the people we are attached to. Safe Haven – Returning to the attachment figure for comfort and safety in the face of a fear or threat. Secure Base – The attachment figure acts as a base of security from which the child can explore the surrounding environment. Separation Distress – Anxiety that occurs in the absence of the attachment figure. With James Robertson he identified three stages of separation response amongst children, Protest to the mother figure for re-attachment (related to separation anxiety) Despair and pain at the loss of the mother figure despite repeated protests for re-establishment for relationship. (related to grief and mourning), and Detachment or denial of affection to the mother-figure. (related to defence). These phases are universally seen in children who go through separation, either by loss of parent/s due to death, divorce or through boarding school. Bowlby identified that infants need one special relationship for internal development. No variables have more far-reaching effects on personality development than a child's experiences within the family. Starting during his first months in his relation to both parents, he builds up working models of how attachment figures are likely to behave towards him in any of a variety of situations, and on all those models are based all his expectations, and therefore all his plans, for the rest of his life. † (J. Bowlby, Attachment and Loss (1973, p. 369)) Children’s parents, who separate in the younger years of the child, are more likely to suffer under Bowlby’s theory, due to the absent of the early attachment bond. Bowlby in 1951 produced a report which argued that infants form a special relationship with their mother which is different from any relationship which they form with any other kind of person. Attachment is formed with the mother within the first six months of life and if the attachment or bond is broken either by death or separation the child would suffer considerable consequences. Although the attachment to either parent is still a considerable one, Bowlby’s work looks at the mother in particular or a significant caregiver. Bowlby theory of separation has great strengths within the family structure, it explains how early attachment is essential for a stable life span of the child. â€Å"The Nature of the Child’s Tie to His Mother† (1958), â€Å"Separation Anxiety† (1959), and â€Å"Grief and Mourning in Infancy and Early Childhood† (1960) are Bowlby’s first formal statements of attachment theory, building on concepts from ethology and developmental psychology. Bowlby theories of attachment are followed closely by Byng-Hall and Mary Ainsworth. Byng-Hall suggests that the family contributes to attachment by providing a secure family base. He’s definition of secure base is â€Å"a family that provides a reliable and readily available network of attachment relationships, and appropriate caregivers, from which all members of the family are able to feel sufficiently secure to explore their potential†. Byng-Hall suggests that there are two factors associated with a secure family base. First, he suggests that there is a shared awareness that attachment relationships are important and care for others is a priority in the family. Second, he contends that family members should support one another in providing care for each other. The weakness factors that undermine a secure base in families include fear of losing an attachment figure or actual loss of an attachment figure. A child clings to one caregiver and rejects relationships with other caregivers. Byng-Hall refers to this as â€Å"capturing† an attachment figure. Turning to an inappropriate attachment figure (i. e. , if one parent is not supporting the other parent, a child may be used as an attachment figure). Conflict within relationships particularly abusive relationships. Negative self-fulfilling prophecies, there is an expectation that losses from other generations will be repeated. Mary Ainsworth â€Å"Strange Situation Procedure† study confirms the theory of Bowlby and investigates how a child makes an attachment to its mother or main caregiver. Ainsworth's research revealed key individual differences among children, demonstrated by the child's reaction to the mother's return. Ainsworth categorised these responses into three major types. Anxious/avoidant—the child may not be distressed at the mother's departure and may avoid or turn away from her on her return. Securely attached—the child is distressed by the mother's departure and easily soothed by her on her return. Anxious/resistant—the child may stay extremely close to the mother during the first few minutes and become highly distressed at her departure. When she returns, the child will simultaneously seek both comfort and distance from the mother. The child's behaviour will be characterised by crying and reaching to be held and then attempting to leave once picked up. Using the Strange Situation procedure, many researchers have studied the development of child attachment to the mother and significant caregiver. However, the weaknesses show there continues to be much debate about the origins of the child's reaction in the Strange Situation, and about what factors influence the development of an infant's attachment relationships. The attachment and separation theory is apparent when Divorce occurs within the family home. Children involved show emotional upset to a parent that leaves the residential home, thus causing a disturbance to the dynamics of the family structure. Behaviour of children is displayed in a number of formats from acceptance to the extreme of being issued an anti social behaviour order. The development of a child is determined by the nature of the environment and the nurture that has been given. The different stages of attachment are related to the age of the child, thus gender, culture, ethnicity and socio-economic status are not considered, however all of these areas do influence the situation considerably. Children are known to favour one parent more so than another, Divorce within a white European family compared to a black West Indian family can have extreme differences. Due to culture beliefs’ and family pressures. West Indian and Asian family divorce rates are far lower than the European statistics. Ethnicity of a family also influences the up bringing of a child and how the parents are treated and perceived. Bowlby theory states that the mother or main caregiver is needed for a stable upbringing. Younger children in particular have a hard time dealing with the changes that are occurring at this time. A child’s reaction to this depends upon their age and their ability to comprehend what is happening. Consistency is very import to younger children and the trauma of their parents separating is extremely difficult for them to handle. The loss of routine, the change in daily habits and the loss of friend’s school and other familiar patterns is especially difficult. When a father is excluded from the family home, reports show that the majority of crime and anti social behaviour are committed from one parent families, studies of young criminals show that over 70% of juveniles imprisoned come from fatherless homes, once the influence of a strong male character disappears the child reacts in a negative manner, acting up, causing a disturbance are some of the symptoms a child goes through. It appears that father absence may have different effects on boys and girls. Boys tend to experience more academic and social disruption when fathers are not present in the household. Father absence challenges girl’s emotional stability but does not seem to undermine their school performance. A boy who lives alone with his mother does not have a male role model in the home to teach him how to shave or kick a football or ask a girl out for a date, all of these things are extremely important to our social integration. Children who grow up without fathers in the home seem to have more likelihood to experience, drug and alcohol abuse, poverty, lack of opportunity to succeed, sex at an early age, pregnancy, behaviour problems, crime involvement, dropouts from school. These experiences are more likely to occur during adolescence because changes are happening so fast in this age group. Much supervision is needed at this time and is hard to enforce without a dad in the house, especially with teenage boys. As teens enter these years they tend to be closer to the same sex parent and look in that direction for guidance. Girls are stressed and likely to be depressed having no father in the home. â€Å"Stepmothers are found to have more problematic relationship with stepchildren; while children, particularly girls, also experience higher stress when they are living with their stepmothers. (Jacobson, 1987 in Visher ; Visher, 1993). Visher ; Visher (1979) suggested that teenage daughters identify strongly with their mothers and resent any woman who replaces their mother for the father's affection. Teenage daughters also exhibit much competitiveness with their stepmothers for their father's affection. These findings suggested that there are strong situational dynamics at work that create special relationship problems for stepmother families. Difficulty between the children's mother and stepmother has also been mentioned as a possible contribution to the greater stress in stepmother families. (Visher & Visher 1988)† Boys are more likely to act out and become discipline problems which upsets the mother. They try to take over the role of the dominant male in the household. Girls show their longing for a father figure by getting â€Å"boy-crazy† and can tend to end up with men who treat them badly. Girls need a father to demonstrate how a man acts in a family relationship. It seems that girls who have to guess pick the wrong boys and men. † Biblarz and Raftery (1999) show that mother-absence is much more detrimental than father-absence to children's educational and occupational attainment. They find that once parents' socioeconomic status is taken into account, children raised by single mothers are much better off than children raised by single fathers or fathers and stepmothers, and are just as likely to succeed as children raised by both birth parents. Biblarz and Raftery conclude that the pattern of effects across family types and over time is consistent with an evolutionary perspective which emphasizes the importance of the birth mother in the provision of children's resources (Trivers 1972). According to this view, children raised by their birth mothers do better than children raised apart from their birth mothers. Furthermore, being raised by a single birth mother is better than being raised by a birth mother and step-father since step-fathers compete with children for mother's time and lower maternal investment. Dealing with children who suffer from the separation of a loved parent is difficult. Social Services and Social Workers have to treat and understand the child’s needs in relation to its personal case. The Children’s Act 2004 assists with the legal framework and legislation of needs but it is that of a Social Worker and their ability and knowledge that assists with the emotional needs of the children, thus enabling them to deal with the separation to the best of their ability and co-ordinate any addition services that may be required. Behaviour, socialisation skills, and how we treat other people are pronominally learnt through our parents. It is the nurture of a parent that encourages a child to develop into a citizen that society requires and needs. It is fully reported that Divorce causes catastrophic effects on certain children; I believe that this is true due to non communication from the parents involved, what, how and the effects the children experienced are due to how the situation was tackled. Parents have an integral position in children’s lives whether they own biological offspring or offspring obtained via a separation or new relationship. Children from a Divorced separated family background are more likely to experience difficulties later on into adult life, male children having anger related issues, female children having trust and insecurity problems all transpiring from the divorce of the parents. These extremely worrying issues can be overcome with the communication, knowledge and experience of the parents in educating their children and showing a positive influence in their lives, with the theory of Bowlby and Ainsworth, I would like to conclude that in my opinion, yes parents do matter. References http://www.litnotes.co.uk/mass_media.htm http://www.sociology.emory.edu/tdowd/SOC769rsyllabus.htm http://www.psychology.sunysb.edu/attachment/online/inge_origins.pdf