Wednesday, October 30, 2019

Gendered-Language Essay Example | Topics and Well Written Essays - 1750 words

Gendered-Language - Essay Example This paper seeks to discuss aspects of gendered language. Through this, the paper will focus on sociolinguistic variations and the varying aspects employed during conversations. Sociolinguistics is the study of society and language. Sociolinguistics attempts to analyze the social factors which leading to the diversity of human languages, whereas many linguists concentrate on exploring unity under the diversity of human languages. In a nut shell, sociolinguists focus on the differences in languages and variation within a particular society language. As stated earlier, this paper will focus on the aspects of sociolinguistic variations in terms of gender based conversations. For instance, in the past few days when I was walking around, I heard two women chatting and discussing their issues. Naturally, I have never been interested in listening to them sharing their views but on this occasion, their subject attracted my attention. I listened keenly how they were praising their mode of presentation. The first woman was commenting on how her colleague had plaited her hair. â€Å"Jane! You look smart. Who plaited your hair? I like it! † The second woman laughed, showing a sense of appreciation. â€Å"My husband took me out over the weekend where I was plaited. Imagine am proud of him.† The first woman was so curious, â€Å"Do you mind giving me directions so that I may go too? I should be as cute as you look!† â€Å"Oh please, I am not sure of the place, but it was so far that you can’t make it alone. It cost me good money to achieve this. I doubt if can afford. Probably you can look for another salon within this town.† The other woman seemed to break the heart of her colleague so that she could not trace the salon. â€Å"No, I don’t care! I need the same even it means selling part of my other belongings.† The woman replied with a lot of determination. Their conversation continued but I didn’t bother to listen more (Li, 2002). On another occasion when I had gone for a ride to my nearest shopping centre, I engaged in a discussion with my friends who were shaving. At some point, they began discussing on the recent men hair styles. I was keen on the on their dialogue. â€Å"Martin, have you seen my friend’s hair style who arrived recently from abroad? The guy is smart!† One gentleman came up. â€Å"Yeah! But that style isn’t all that new. I’ve seen many people shave like him.† Jack replied with very cool voice. â€Å"In fact I don’t see any need of one straining to cope that style. It may cost you a lot for nothing, after all our nearest barb er shop can do it. You can save that money and do other things other than just shaving.† Most men in the discussion agreed on Jack’s opinion and all seem not to be interested on the topic again. They switched to discussing other issues (Chambers, 2003). From the set of the conversations, it is evident that women and men have different language of approach. Although they could have the same subject of discussion, women could approach differently as men could. In the instance above, women are seen to be admiring each other in the way they have dressed. One could realize how her colleague has plaited her hair and show admiration up to an extent of digging out where and how it can be done. Women are seen to invest much of their time on what the outsiders can see. Although the other woman wants to look beautiful as her fellow, it is clear that the first woman is possessive and wants to own the beauty alone. She tries all the impossibilities to ensure that the efforts

Monday, October 28, 2019

Post-Compulsory Education and Training Essay Example for Free

Post-Compulsory Education and Training Essay * Learning Objectives Justify your choice by reference to the cohort analysis, scheme of work and the assessment schedule.LO1 To be introduced to the meaning of Autism and Asperger’s syndrome, and compare and contrast the difference between the two conditions.LO2 After watching a video, all learners will be able to discuss the triad of impairments linked with autism.LO3 All learners will be introduced to the term ‘Theory of Mind’ and how this develops in children.LO4 All learners will be able to identify the key components of The Sally Anne study. Most learners will able to summarise its strengths and weaknesses in supporting Theory of Mind.LO5 Most learners will correctly answer an OCR past paper exam question on Baron-Cohen.LO6 All learners will consolidate their learning with an interactive plenary on the topic covered in today’s session.The aims and objectives in this lesson were chosen in order to relate to OCR Psychology (3.2 AS Unit G542: Core Studies) Allowing the students to be aware of this link to the assessment criteria will keep them motivated, and give their learning purpose to aim for a long term goal. The Learning Objectives have been differentiated to allow for learning to take place at all levels, and to allow for inclusion for all, despite the fact that candidates may have difficulties i.e. one learner has Asperger’s syndrome, and another has dyspraxia. These objectives will be achieved using all 3 VAK learning styles.(Honey and Mumford 1992)The learning objectives are differentiated and specific, measureable, achievable, realistic and timely (SMART) to ensure accessibility (Wallace, 2011) * Teaching and Learning Activities Justify your choice of methods and resources to be used by matching them against learning objectives using reasons and evidence from appropriate models of learning. The teaching and learning activities for this session have been designed to introduce a new topic in Psychology, Core Studies. As this is an introductory lesson to a topic, I have prepared learning activities which are accessible to all the learners, to ensure that nobody is excluded at any time. (Wallace 2005) All activities are varied to accommodate all levels and learning styles (VAK) as pupils are often a combination of visual, audio and kinaesthetic. (Claxton 2002)I will promote inclusiveness during the session by having a list of key words if at any point they are unsure; have specific instruction written down as well as reading them out. Hand-outs will be given out with a choice of colour, and supporting any learners one to one where necessary. I intend to keep learners motivated by making everyone feel comfortable and safe in the classroom environment, ensuring a sense of belonging and to meet all learners self-esteem needs encouraging praise and independence where necessary and promote optimism so that all students are self-actualised (Maslow 1908-1970) Ensuring the humanistic learning theory is addressed, I will allow drinks of water when necessary, and provide fairness and equality for all learners. (Disability and Equality Act 2010)Room set-up- Arrange the tables into groups. This will encourage all learners to get involved (every learner matters) and to make sure that no learner is seated with their back to me and that I am not sitting behind a desk as this creates a physical barrier between the teacher and learner and encourages eye contact. (Wallace 2007)Questioning- Non directed questions will be asked at the beginning of the session to assess prior knowledge, which will be demonstrated through a thought-shower on the board (visual and auditory). Through-out the session the questions will become directed and scaffolded (Bruner, cited in Jarvis 2004) to assist in gaining knowledge and answers from learners.When asking questions, use learners names your and prior knowledge of their ability and personality (as I have never taugh t this class before, they have been given name stickers) This ensures that learners feel valued and supported. (Keeley-Browne 2007)Pre-starter – I have included a pre-starter activity, as with it being a 3pm class, students can often come in lethargic and unmotivated. They often need some immediate stimulation, to wake them up and encourage a productive lesson.Starter – We will create a though shower (visual) on the board to assess prior knowledge of this new topic being covered, and it gives the learners ownership of their own work, as their input is what gets written on the board. Prior learning experiences have the potential to enhance or interfere with new learning’ (Knox, 1997)Main Learning Process – The majority of the lesson is based around PowerPoint slides, videos and group discussion/work. This ensures that all three domains of learning are being addressed – cognitive (thinking in their groups and whilst listening to the presentation), affective (feeling how autistic people may feel after watchi ng the video clips), and psychomotor (applying their knowledge in a hands on task) (Bloom et al, 1971) This adopts VAK learning styles. Everyone benefits from using a wide variety of styles also known as whole brain learning. (Coffield et al 2004) When learners make an interesting observation/ comment, or get an answer correct, it is vital to give them praise. Many learners in sixth form can have low self-esteem; therefore giving out praise when warranted can enhance their feeling of self-worth and competence by acknowledging their qualities and strengths (Vizard 2007.)Group Work Group work can be a largely effective way of learning, taking strengths from each individual and combining it for model answers. In this session, learners will be split up into groups for part of the task, ‘As well as being an enjoyable activity in itself, this provides huge opportunities for learning. It requires that learners process the new material and make personal sense of it.’ (Petty 2009) From the cohort analysis, I am aware of who works well and encourages/motivates each other. The learners are aware of this themselves, and usually sit with the people/person they work well with. If people are distracted then I will take action by changing the group dynamics. In their groups they will discuss one of the triad of impairments from their prior knowledge and information given on a video. This shows that they can apply the knowledge they have gained the thought shower and video into a new situation. (Blooms Taxonomy – application of knowledge.) Once they have completed their group work, they will now share and discuss their ideas with the rest of the class, by sticking their A3 sheet of ideas on the board. (Think, pair, share.)Hand-out- All work sheets are on coloured paper (if possible), which aids any dyslexic learners without them standing out, as the whole class will have the same colours. ‘Everyone who can benefit from further education should be able to participate’ (John Tomlinson 1996) The PowerPoint presentation will be accessible on Moodle for future reference and revision purposes.Assessment for Learning- A past paper question will be asked in order to assess their level of understanding from the lesson. They will complete the question under exam conditions (no notes or talking, and timed) and peer mark the question. They will be given feedback on which is a model answer, and which isn’t sufficient, and I will collect in and monitor progress. It is imperative feedback is given (Black William, 1998).Plenary- All learners will participate in an interactive activity to assess and ensure learning has taken place (formative assessment.) Looking at the cohort analysis, and after a couple of lessons observing this group, I have noticed they work well as a whole class and enjoy interactive plenaries. The Deal or No Deal task will allow learners to gain feedback from the teacher, peers and feedback from themselves as they answer questions. It has been suggested that formative feedback has some of the most positive effects on learners. The greatest effect is on the weakest learners (Black and William, 1998) The group can become a little bit chatty and excitable when completing a group task, therefore I will need to manage the noise levels.Rewarding good behaviour and achievement allows learners to be respected and valued for who they are, how hard they have tried and what they have achieved and build up a mutual and trusting relationship between the teacher and learner, allowing the learner to feel safe and valued in class. This is expressed as ‘unconditional positive regard’ (Rodgers 1983)Try and make students feel good about themselves, even when you are criticising their work/ answer and trying to guide them onto the right path (two stars and a wish) Articulate the standards you have identified, i.e. elaborate what will actually happen in terms of teaching and learning activities against each standard, Do not just list or re-state the standards you have ticked off.You may group related standards together where they are addressed through one activity.Standard(s): AP 4.1 Use relevant theories of learning to support the development of practice in learning and teaching.Articulation: Use of Maslows Hierarchy of Needs. Proving a safe and comfortable learning environment, using praise to build up self- esteem on order to achieve self-actualisation. Blooms Taxonomy was also used applying the knowledge from the video clips and PowerPoint in the session to the group work on The Triad of Impairments.Standard(s): AP 4.2 Reflect on and demonstrate commitment to improvement of own personal and teaching skills through regular evaluation and use of feedbackArticulation: I write a reflection after every taught session. I plan to use De Bonos Thinking Hats after this session, using the feedback gained on the scales given to the class at the beginning and the end of the session.Standards(s): AP 6.2 Demonstrate good practice through maintaining a learning environment which conforms to statutory requirements and promotes equality, including appropriate consideration of the needs of children, young people and vulnerable adults.Articulation: This lesson meets the statutory requirements of a teacher required by Cronton Sixth Form College, meets the requirements of the examining body. The lesson filly includes all learners, and the cohort analysis has allowed me to be aware of individual needs and requirements.Standard(s): BP 1.1 Establish a purposeful learning environment where learners feel safe, secure, confident and valued. Articulation: Again this links to Abraham Maslows ‘hierarchy of needs’, providing a safe classroom environment, allowing for students to pass through all the stages to become self-actualised. Applying Rodgers ‘unconditional positive regard’ throughout the session, rewarding and praising good behaviour will allow for learners to feel valued and respected. Standard(s): BP 2.1 Provide learning activities which meet curriculum requirements and the needs of all learners. Articulation: The aims and objectives in this lesson were chosen in order to relate to OCR Psychology (3.2 AS Unit G542: Core Studies)The Learning Objectives are all differentiated, which will meet all learners various needs so ensure learning takes place. This links into Every Learner Matters.Standard(s): BP 2.4 Apply flexible and varied delivery methods as appropriate to teaching and learning practice.Articulation: There are many different delivery methods used for learning in this session, allowing for all types of learners to learn and achieve (VAK.) Such methods used are throughout the session are thought showers, questioning, practical hands-on activity, video clips, group work, peer assessment an interactive assessment activity.Standards(s): BP 3.1 Communicate effectively and appropriately using different forms of language and media, including written, oral and non-verbal communication, and new and emerging technologies to enhance learningArticulation: I will use various forms of communication during the session. Using theory on paralanguage to ensure my body language is open, e.g. no folded arms, eye contact and make sure I circulate the room so everybody feels included. I will have a steady pace, clarity and tone in my discussion and instruction (behaviourist). All meta-language used is listed on a key terms sheet to help with meaning of words, and the PowerPoint is clear and concise. I have implemented video clips on PowerPoint to keep up with emerging technologies, as oppose to me talking all of the time. This breaks up the lesson into chunks (cognitive theory) which makes them gain fulfilment and enjoyment out of the tasks (humanism)Standard(s): BP 3.3 Structure and present information clearly and effectively.Articulation: All information is presented on a PowerPoint, on hand outs and also read out so that it is clear for all students and their learning style. The lesson is all structured, differentiated and timed to allow for learning to take place in all learners. The presentation (including video clips) will be made available on Moodle for future reference and revision purposes.Standards(s): BP 5.1 Select and develop a range of effective resources, including appropriate use of new and emerging technologies.Articulation: The resources chosen for this session are varied in learning styles (VAK) and include all 3 theories of learning to ensure the lesson appeals to all, and doesn’t get monotonous. There is a PowerPoint presentation, group work, key words hand-out, a booklet to fill in whilst being accompanies by new and emerging ICT technologies. This includes video clips in the PowerPoint and an interactive Deal or No Deal Plenary.Standards(s): CP 1.1 Ensure that knowledge of own specialist area is current and appropriate to the teaching context.Articulation: I have ensured my knowledge of the topic autism is totally up to date and current. Figures and facts change yearly, so it is important to keep up to date. I have broken down my knowledge of Psychology from my degree to A level standard, so it can be inclusive to all learners, whilst still capable of stretching and challenging the more able learners.Standards(s): DP 1.2 Plan teaching sessions which meet the aims and needs of individual learners and groups, using a variety of resources, including new and emerging technologiesArticulation: This session meets the aims of the curriculum for this module, meets the schemes of work and is differentiated so that it is inclusive to all learners in this cohort (from Aspergers syndrome through to gifted and talented student). The resources compliment the plan and are varied in learning style and theory, whilst adopting new technology methods, such as interactive games for plenary in formative assessment.Standards(s): EP 1.3 Develop, establish and promote peer and self-assessment tools, including where appropriate, those which exploit new and emerging technologies. Articulation: This lesson will consist of them self-assessing their initial knowledge of autism, whilst continually self-assessing through the lesson. I will reinforce this with praise at correct answers and good feedback, and guide it through direct and non-directed questioning. Peer assessment will take place during the formative assessment (past paper questioning) Standard(s): EP 2.1 Apply appropriate methods of assessment fairly and effectively.Articulation: Directed and non-directed questioning is used; giving learners at all levels the opportunity to participate in the lesson. The Deal or No Deal formative assessment task allows all learne rs to participate, and makes assessing what they have learnt interactive and fun.

Saturday, October 26, 2019

Conflict Perspective :: essays research papers

  Ã‚  Ã‚  Ã‚  Ã‚  The conflict perspective is very apparent in modern day issues affecting the environment. Environmental groups, both government and non-government based like The Sierra Club and the EPA (Environmental Protection Agency) are often at odds with industries with conflicting goals such as logging and oil industries. The industries want their right to manufacture products from natural resources, while environmental groups want to protect and preserve these limited natural resources. For example, conservationist groups lobby to industries in the energy field and people in general to reduce and conserve their use of natural resources and to develop alternate sources for this energy. On the other hand, preservationists strive to preserve these resources as much as possible. Various other environmental groups have specific purposes and goals such as eliminating air pollution from automobiles and stopping the dumping of chemicals into ocean waters. The general goal of all o f these groups is to preserve and ensure the existence of all living beings on earth. While this may sound simple or easy, it is far from it. When big businesses like oil companies have billions of dollars and tremendous influences on government, small time environmental groups only get secondary attention.   Ã‚  Ã‚  Ã‚  Ã‚  The majority of these groups have been started in very recent history and continue in growing force. This is mainly due to growing awareness, as well as growing concern for environmental issues. Despite this, industries have also grown and so has their consumption and exploitation of mother nature. Pollution and waste resulting from the depletion and usage of many natural resources and fossil fuels has plagued the earth recently. Two examples are the growing hole in the ozone layer and the greenhouse effect, which will continue to haunt us in the future. Along with this destruction comes the elimination of various species of animals and plants alike. The dollar sign is the biggest obstacle in combating this and although awareness and protection of Earth’s resources has steadily grown, this conflict is still being won by big business.   Ã‚  Ã‚  Ã‚  Ã‚  Along with the multitude of private groups trying to win this conflict, the government is also making attempts to do so as well. This fight to preserve and protect mother nature through legislation and activism is being waged by the EPA (Environmental Protection Agency). Through politics and lobbying by these groups, the government has passed many new laws, rules and regulations to aid in the cause of protecting our environment.

Thursday, October 24, 2019

Life For Young People Essay

Life for young people in sg was better in the past than it is today (OV) Life was less stressful and moved at a slower pace in the past. There was less competitiveness in the society then. Students have packed schedules of tuition, school, and enrichment classes, to the extent that they have little time left to enjoy other activities. Higher stress is linked with not only physical but also psychological ailments like depression, hence the incidences of young people committing suicide due to inability to cope with studies, relationships etc. In the past, education was a simple process, there was no streaming, ranking of schools, or other initiatives which would apparently increase the level of stress in students. The burden of university loans and proportion of income that has to be spent on necessities have become more oppressive than ever It is increasingly challenging to make decisions and commit to them as young people are inundated with the pressures of adult life, the access to a variety of opportunities lead to increasing uncertainty about the future. Yet, it is an undeniable fact that the youths today not worse off in any aspect than those in the past. One common argument is that youths today are under much more pressure to succeed due to parental pressure as well as pressure from social media. As such, many youths today are studying, day in day out, â€Å"mugging†, as they affectionately termed, evident from the fact that Singapore’s tuition industry is one of the world’s most lucrative. They have little or no free time for themselves, resulting in low quality of life as their recreational and spiritual needs are not met. Unlike the carefree days in the past, when times were simpler and there was no need to live up to expectations of self and others. Hence, I concede to Singaporean youths having it worse than those in the past due to pressures to do well. Young people today have unprecedented access to knowledge and information. The Internet has provided a plethora of information across almost all of areas of knowledge, making informed decisions more accessible. Education standards have improved greatly to the extent of recognition by the United States, a global power, for its teaching methods, especially in the field of mathematics. With effective and up-to-date teaching materials and methods, the Ministry of Education (MOE) ensures that the education system produces skilled and competent youths who are able to actively participate in the society and the economy. This is evident from Singapore’s Gross Domestic  Product (GDP) growth of 5.5% in 2011, which has been sustained since 2005. Many educational initiatives were introduced to empower the young in this modern age. (EG IT master plan). Edusave accounts and subsidies are given to allow more students to take up enrichment courses. With economic growth, the youth are able to enjoy better amenities and higher standard of living due to the surplus in the nation’s earnings. High education standards also allow better opportunities to undertake well-paid jobs because Singapore’s education system does not only emphasise on knowledge accquisation, but also the development of the twenty-first century skills, increasing the competitiveness of the youth in Singapore. As such, the youth in Singapore are better able to compete in the global market and are able to enjoy high standards of living, much higher than those in the past. Some say that the working environment was less competitive and job requirements were less demanding. While I will not deny that though jobs are more specialised today, people will need to be able to multi-task in order to stand out among the rest. Now, more jobs require advanced skills and fewer high-paying factory jobs require a little more than a high school diploma. The influx of foreign labour and foreign talent further increase the intense competitiveness in Singapore now, making it more difficult for young people today to find jobs. Foreign talents including expatriates may cause youths, or fresh university graduates to be unable to find jobs, and thus be unable to pay for their university loans, making life tougher today as compared to the past. However, there is a fairer working system today based on meritocracy that gives equal opportunities to females and the minorities. Moreover, the unemployment rate in Singapore has actually decreased to 1.9% in the fourth quarter of 2014 from 2.0% in the third quarter of 2014. The cost of living is lower in the past as compared to the present. Higher costs manifest through GST increase and transport hikes, etc. Young people are also consumers of certain goods and services which have costs increasing over the years like movie ticketsIn the present society, despite material wealth and comfort, children forced to grow up faster due to parental neglect. Family ties were stronger in the past, as there were larger families, and thus more adults to see to the need of the youth. With Singapore’s declining birth rate, people have on the average only one or two children, and single children may feel more lonely and dependent on their  parents. Moreover, with access to social media now, stories of fame and success are all but the same, about money. Young people in the past were contented with the simple pleasures and entertainment in life. Young people today are induced to think that being successful, having money and fame is what matters. They no longer appreciate non-tangible side of success, such as strong familial ties and a good moral upstanding. They have a greater dissatisfaction with life and believe that there is a better way of living, which in turn makes young people today keep their options open in hopes of something better in terms of career choices or personal relationships. 2 Life for young people in sg was not better in the past than it is today (SV) The modernization and growth of Singapore’s economy due to globalisation has enabled people today to bask in material satisfication, comfort, wellness and protection. There are more opportunities open to different sectors of the youth population. (The age of technological dominance. ) Young people have inherited a world that is acutely aware of human rights and equality among people. After the era of colonization, revolutions and 2 world wars, young people today enjoy an unprecedented standard of welfare protection, voting rights and rights to education. There is more gender equality, many women are part of Singapore’s workforce. People today enjoy a cleaner environment and have proper sanitation and enjoy good physical health. Improvements in health standards due to technological advancements in medical science has brought about more comfort which may not have been readily available back in the past. Today, general practioners are located in the hearts of every estate and neighbourhood, providing easy access to medication and consultations. Children today are vaccinated against many diseases which have previously endangered and taken the lives of many children in impoverished states. There is little worry that any ailments or nasty symptoms experienced cannot be treated due to the advanced medical science in Singapore now. There is an undisputable argument that health standards today contributes to better lives for young people. The high standards of living today leads to a lower infant mortality rate, and more young people own branded goods and make use of services of higher quality like eating in restaurants. Many young working adults also own credit cards, making it very easy to spend. They own state-of-the-art gadgets, toys, branded apparel and have domestic helpers to tend to their every beck and  call. There is little need to fear for safety due to the general stability of the country and harmonious society. Young people today enjoy rich and diverse experiences and have many choices and variety in what they do. Technology gives many benefits and comforts, many choices in recreational and entertainment activities such as TV programmes. There are many computer and online games to keep ourselves entertained in the comfort of an air-conditioned room, with fast food and snacks to munch on. Good standard of living, more joy. Though life may appear more stressful now, the range of entertainment and leisure activities that young people can choose to engage in has increased. People are more able and willing to pamper themselves.

Wednesday, October 23, 2019

Harris Bergeron & by the Waters of Babylon Essay

In the story, Harrison Bergeron, one learns that the author, Kurt Vonnegut, does not like the way society is. He does not like how people judge one another because one is not as attractive, or smarter, or funnier. He portrays this idea into the story by creating a society full of people that are equal. For example, in the beginning one gets to know that George is actually really intelligent as was all Hazel, but not as much as George. George cannot be smarter than Hazel or anyone, so to control the way he thinks he has to wear a mental handicap that receives different sounds to scatter his thoughts (Vonnegut, p. 34). Although, many people are fine with the way this society is being ran, in one section George explains to Hazel what would happen if he took his handicaps off then he will not be equal with everyone else, it is not fair to Hazel either because she has to keep wearing hers, â€Å"And pretty soon we’d be right back to the dark ages again†¦Ã¢â‚¬ (Vonnegut, p. 3 7). However, Harrison Bergeron, a 14 year-old boy, does not agree with this. â€Å"Now watch me come what I can become!† (Vonnegut, p. 39). He believes people should not be equal and be able to use the skills others do not have. On page 39, Harrison storms in and announces he is the emperor, and then he chooses his Empress and removes the handicaps from her and himself. Harrison does not want to be ruled by someone but rule himself; he wants to change the way things are being ran in this town. In the story By the Waters of Babylon, John, a son of a priest and becomes a priest himself, lives in a society where the people have many different believes. For example, many things are forbidden like going east, going into a Dead Place, unless one is a priest or a son of a priest and to search for metal, cross the river and look at the place that was once the â€Å"Place of Gods.† On page 292, John’s father is reviewing all of the forbidden places. â€Å"All these things are forbidden,† I said, but it was my voice that spoke but not my spirit,† (Benet, p. 292). â€Å"My heart was troubled about going east, yet I knew that I must go.† (Benet, p. 293). John knows going to these places is a sin, but for some reason he seems to knot agree with this. As the story progresses, John is now a man and goes off into his journey. He searches for signs; his first sign was an eagle that went east. John knows it is a sin to go east, but his gut is telling him he should go. However, he believes this was a bad spirit trying to convince him to the wrong thing. His next sign were three deers, as well as a white fawn, another sin. Then he sees a black panther which attacks the white fawn. This represents a ying and a yang, good and evil. John says it is better to die than loose his spirit (Benet, p. 294). At the John decides he will travel to the Place of Gods, even though he might die he wants to know the truth. Once John arrived he realizes all those stories he was told as a boy were false. â€Å"†¦ the tales say, that the ground burned forever, for I have been there†¦.. It is not true either, what some of our priests say, that the island covered with fogs and enchantments.† (Benet, p. 296). John then explains that the Place of Gods is a regular dead place, with cracked roads, damaged buildings and high towers. The knowledge John has gained burned in him, he said on page 296. At the end of his journey he realizes that the god s were regular men that lived before him. He explains to his father there were never any real ‘gods’. John wants to share this knowledge with the people of his town; however his father says it is better to tell the knowledge little by little because if one ate too much truth at once, one may die of the truth. (Benet, p. 301). John says he learned that being a priest, ate knowledge too fast. (Benet, p. 301).

Tuesday, October 22, 2019

History of American Economic Growth in the 20th Century

History of American Economic Growth in the 20th Century As the American economy matured in the 20th century, the freewheeling business mogul lost luster as an American ideal. The crucial change came with the emergence of the corporation, which appeared first in the railroad industry. Other industries soon followed. Business barons were being replaced by technocrats, high-salaried managers who became the heads of corporations. By the start of the 20th century, the era of the industrialist and the robber baron was coming to a close. It was not so much that these influential and wealthy entrepreneurs (who generally personally owned majority and controlling stakes in their industry) disappeared, but rather that they were replaced with corporations.  The rise of the corporation triggered, in turn, the rise of an organized labor movement that served as a countervailing force to the power and influence of business. The Changing Face of the Early American Corporation The largest early 20th-century corporations were much larger and more complicated than the commercial enterprises that came before. To maintain profitability in a changing economic climate, American companies in industries as diverse as oil refining to whiskey distilling began to emerge in the late 19th century. These new corporations, or trusts, were exploiting a strategy known as horizontal combination, which granted those corporations the ability to limit production in order to raise prices and maintain profitability. But these corporations regularly ran into legal trouble as violations of the Sherman Antitrust Act. Some companies took another route, employing a strategy of vertical integration. Instead of maintaining prices through control of the production supply as in horizontal strategies, vertical strategies relied on obtaining control in all aspects of the supply chain required to produce their product, which gave these corporations more control over their costs. With more control over costs came more stable and protected profitability for the corporation. With the development of these more complicated corporations came the need for new management strategies. Though the highly centralized management of previous eras did not entirely disappear, these new organizations gave rise to more decentralized decision-making through divisions. While still overseen by central leadership, divisional corporate executives would eventually be given more responsibility for business decisions and leadership in their own piece of the corporation. By the 1950s, this multi-divisional organizational structure became the growing norm for large corporations, which generally moved corporations away from reliance on high-profile executives and solidified the fall of the business barons of the past.  Ã‚   The Technological Revolution of the 1980s and 1990s The technological revolution of the 1980s and 1990s,  however, brought a new entrepreneurial culture that echoed the age of tycoons. For instance, Bill Gates, the head of Microsoft, built an immense fortune developing and selling computer software. Gates carved out an empire so profitable that by the late 1990s, his company was taken into court and accused of intimidating rivals and creating a monopoly by the U.S. Justice Departments antitrust division. But Gates also established a charitable foundation that quickly became the largest of its kind. Most American business leaders of today do not lead the high-profile life of Gates. They differ greatly from the tycoons of the past. While they direct the fate of corporations, they also serve on boards of charities and schools. They are concerned about the state of the national economy and Americas relationship with other nations, and they are likely to fly to Washington to confer with government officials. While they undoubtedly influe nce the government, they do not control it - as some tycoons in the Gilded Age believed they did.

Monday, October 21, 2019

Make Sugar and String Crystal Easter Eggs

Make Sugar and String Crystal Easter Eggs Sugar and string Easter egg ornaments are a fun family craft idea, plus you can include a lot of science in this project. You can make smaller hollow string ornaments to hang or put in baskets or you can make a large crystal egg to use as an Easter basket. Sugar and String Easter Egg Materials There are a few different ways to do this project. You can make either small eggs or very large eggs. Large eggs require multiple layers of sugar in order to support their size. Small eggs can be made such that they are open, revealing the abstract-looking string pattern. If you are concerned that the sugar will attract ants, there are two ways to avoid this problem. One is to spray the completed project with clear spray paint. The other is to change the ingredients altogether, using a mixture of spray starch or glue and water instead of sugar with egg whites or water. If you use glue instead of sugar your project will not be as stiff or sparkly, plus you wont get crystals. Balloons:Â  Use very small balloons if you want to make small eggs that you can put into Easter baskets or hang as ornaments. Use larger balloons if you want to use the egg as an Easter basket or as a larger decorationString:Â  You can use any type of string that you want, such as embroidery floss, thread, yarn, or even ribbon.Sugar: Normal white sugar (sucrose) produces the most sparkle and largest crystals. You can use confectioners or powdered sugar.Egg whites or water:Â  Egg whites contain water plus the protein albumin. The albumin helps you get a stiffer, glossier Easter egg, but you can use water instead with comparable results.Scissors: (optional) Make the Easter Egg The basic instructions are to blow up the balloon until it is the size you want for your Easter egg. Next, make the balloon sticky by coating it with sugar-water. Wrap string around and around the balloon until you have enough string to support the shape (more is better). Allow the string to dry. Apply more layers of sugar, allowing the balloon to dry between layers. Carefully pop the balloon and remove it. Use the sugar-string Easter egg as it is or else cut a hole in it using scissors.Here are detailed instructions for the Easter egg that has larger sugar crystals and can be used as an Easter basket. Mix together three egg whites and as much sugar as it takes (about 3 cups powdered sugar, somewhat less granulated sugar) to make a glaze that is thick enough to spread, but will not drip. Add food coloring if you wish. The consistency is important. If the glaze drips, the egg will take a very long time to dry and wont be as thick and strong. The amount of sugar that will dissolve in the egg white (solubility) is highly dependent on temperature. Much more sugar will dissolve in room temperature egg whites than in cold egg whites.Blow up a balloon to the desired size. Tie it off with a knot. Tie a string around the knot. You will use this string to hang the balloon while it dries.Coat the balloon with the sugar and egg white mixture.Wrap the balloon with string. It may help to use several smaller lengths of string than to wrap one long piece.Hang the balloon and allow the string to dry.Coat the balloon with the sugar and egg white mixture. Fill in the gaps between the strings and try to get even coverage. You may want to add more coats of sugar. For your final coat, one option is to sprinkle very coarse sugar onto the wet mixture. This will result in a very sparkly egg.When you are satisfied with the thickness of the egg, allow 24 hours for the egg to completely harden. Pierce the balloon so that it slowly deflates. Your goal is to carefully remove the balloon from the inside of the egg. The crystallization that you get will depend on how well the sugar had dissolved in the egg white and the rate of evaporation.You can use scissors to cut a hole in the egg. The cut edge of the egg may be covered with ribbon or frosting or whatever you like. Open String Eggs Another option is to make an egg that is simply stiffened string. This is a much simpler and quicker project. The egg must be relatively small since the eggs shape is maintained by hardening thread or yarn with sugar. You could use the glaze described in this version of the project on the larger egg in order to make translucent glass windows in the thicker egg, but you will need to apply several coats of glaze. Blow up a balloon to make a small egg.Heat a little water until it boils. Remove the water from heat. Stir in sugar until no more will dissolve. If you dont have enough sugar in this solution, your egg will not harden, so its better to add sugar until crystals start to settle out. If you arent using colored string, you may wish to add food coloring to the sugar solution.Dampen the balloon with the sugar solution. Dont burn yourself! You can let the liquid cool down a bit.Wrap the balloon with string. Use enough string to provide adequate support for the shape.Either dip the Easter egg in the solution or else drip solution over the egg to make certain the string is thoroughly saturated with sugar solution.Suspend the egg from another string until the egg is dry.Carefully pop the balloon and remove it.Enjoy your Easter egg! After the holiday, you can save the egg for next year by wrapping it in tissue paper and storing it in a dry location.

Sunday, October 20, 2019

The Urban Legend About Drugs Smuggled in a Dead Baby

The Urban Legend About Drugs Smuggled in a Dead Baby This urban legend is also known as The Stuffed Baby story. It has appeared in books and online websites many times. Generally, the text of the story reads something like the following: A woman and her 4-year-old son are visiting a border town on the Mexican side of the Texas/Mexico border. As they are walking towards the border crossing to return to the U.S., a man runs up to her and takes her child. She immediately runs to the authorities and a search ensues. The lady and the authorities begin walking among the cars, looking for her son. The woman spots her child in a truck a couple of rows over. Her son is laying his head on the shoulder of a man and appears to be sleeping. As the authorities close in on the vehicle, the driver jumps out of line and makes a run for it. As they are driving off, the passenger opens his door and dumps the child out into the street. As the woman and the authorities reach the child they find, to their horror, that the child has not only been murdered but has been cut open and illegal drugs have been put inside his body. It appears that the persons in the vehicle were drug smugglers and had decided to kidnap a child, kill them and place the drugs in the body. They would then hold the child as they approached the border and the border agents would think that the child was quietly sleeping on the shoulder of the passenger. Another Version Another version of the story circulated the internet in the late 90s. The text of the email/forum post is similar to this story: My sisters co-worker has a sister in Texas, who with her husband was planning a weekend trip across the Mexican border for a shopping spree. At the last minute, their baby sitter canceled, so they had to bring along their two-year-old son with them. They had been across the border for about an hour when the baby got free and ran around the corner. The mother went chasing, but the boy had disappeared. The mother found a police officer who told her to go to the gate and wait. Not really understanding the instructions, she did as she was instructed. About 45 minutes later, a man approached the border carrying the boy. The mother ran to him, grateful that he had been found. When the man realized it was the boys mother, he dropped the boy and ran himself. The police were waiting for him and got him. The boy was dead. In the 45 minutes he was missing, he was cut open, ALL of his insides removed, and his body cavity was stuffed with COCAINE. The man was going to carry him across the border as if he were asleep. A two-year-old boy, dead, discarded as if he were a piece of trash for somebodys cocaine. If this story can get out and change one persons mind about what drugs mean to them, we are helping. Please send this e-mail to as many people as you can. If you have a home PC send it out there, too. Lets hope and pray it changes a lot of minds. The saddest thing about the whole situation is that those persons who suffer are innocent and people we love. God bless you in this united effort to spread the word. You just might save a life! Its always a treat to see a well-worn urban legend retooled for circulation on the Internet. Such is the case with a familiar horror story dating from the early 1970s claiming that drug smugglers have been known to use the corpses of abducted, murdered children to transport their illegal goods across national borders. The story continues to circulate to this day. In all the decades this grisly legend has been in circulation, no real instances matching the descriptions above have been confirmed or documented. The legend (or the bare bones of it, anyway) got its first mainstream media airing in 1985 when the Washington Post recounted it as factual in a feature about crime problems in Miami. As folklorist Jan Harold Brunvand noted in his mid-80s collection of urban legends The Mexican Pet, the Post quickly found out that the story was untrue and retracted it a week later. The published correction read, in part: In the opening paragraph of an article last Monday on crime in Miami, the Washington Post recounted a story that cannot be substantiated. The story, told to a Post reporter several years ago by a Miami undercover agent, involves the smuggling of cocaine into the United States in the body of a dead baby. Clifton Stallings, a spokesman for the U.S. Customs Service in Miami, said the story has been in circulation for some time. No one at Customs in Miami can verify it. One customs official told the Post he had heard the story as long ago as 1973. As it was told in those days, he said, a suspiciously immobile child was spotted by an attendant on a flight from Colombia to Miami. Customs agents investigated and found that the baby, apparently deceased for some time, had been cut open, stuffed with cocaine, and sewn shut. It was considered a prime example of just how ruthless of international drug traffickers can be. As told on the internet, it has become a much more compelling story. Set just across the U.S.-Mexico border and recounted in true friend of a friend fashion (my sisters co-worker has a sister in Texas, a frequently shared variant begins), the cautionary tale now carries a dual moral message: Drugs are evil, and never let your children out of your sight. Represented as a parents true nightmare, the online version concluded with a prayer that the story would convince people to stop using drugs. The more likely result is that has reinforced many peoples already well-entrenched fears. Sources Brunvand, Jan Harold. Be Afraid, Be Very Afraid: The Book of Scary Urban Legends. Kindle Edition, W.W. Norton Company, March 17, 2014. Brunvan, Jan Harold. The Mexican Pet: More New Urban Legends and Some Old Favorites. Kindle Edition, Reprint edition, W. W. Norton Company, December 20, 2012. Buchanan, Edna. The Corpse Had a Familiar Face. Paperback, Reprint edition, Gallery Books, July 14, 2009. Childs body used for smuggling drugs into the U.S.-Fiction! Truth or Fiction, March 17, 2015. Sadistic_Killer. The Stuffed Baby. Wattpad.

Saturday, October 19, 2019

South Korea Research Paper Example | Topics and Well Written Essays - 1000 words

South Korea - Research Paper Example In any country, the daily life of people is guided by cultural practices and believes. In South Korea the daily lives of the South Korean people is guide by Century-old Confucian principles. These principles include among others dedication to hard work and a devotion to family and society. Another unique cultural aspect of the South Korean Society is the use of both the Gregorian calendar and the lunar calendar. The Lunar calendar, with its ties to the land and awareness of changing of seasons assist them in identifying seasons and activities of those seasons. Unlike other societies, their festivals and holidays are based on the lunar calendar so it is advisable that one take necessary measures when planning a visit to this country (Lee 13). According to Lee (13), another part of Confucianism deeply practiced among the South Koreans is the idea of the patriarchic system that regards fathers as the most responsible members of the family and gives elders very much honor. In addition, i n this kind of system, the fathers can only undertake certain activities of the society and in most cases; the father is expected to lead in everything a family does. The problem with such a system is when the father turns to be irresponsible or he is not there at all. These can lead to some of the important family activities failing. In addition, Lee (13) states that the most predominant traditional festival among the South Koreans is the traditional Jesa. This is a ceremony organized to honor the ancestors. In South Korea rice is the most popular food in South Korea, taken as the main dish at almost every meal. Other parts of the meals may include vegetables, soups, fish, and meat. The most common food among the South Koreans is kuk (soup) and chim (stew) made with vegetables, rice, and meat. In addition to this, they also eat kimch’i. This is a spicy, pickled vegetable dish, which is served with other dishes (Davis 13). Changing from a developing to a developed nation has resulted in the change of the diet of the South Koreas. These changes include the importation of beef that has encouraged meat eating and the availability Americans’ food such as bread, dairy foods, baked goods and fast foods (Drago and Goody 150). Therefore, no one visiting South Korea should be afraid of the issue of food. Like the Chinese, the South Koreans have the culture of using chopsticks to eat instead of the cutlery used by the Western countries (Davis 13). It is important to note that some in-depth South Korean issues can be of interest to us. Some of these issues include ceramics, paintings, sculptures, Architecture, and religion. In this case, I will discuss the issue of religion. This does not mean that other issues are trivial; they are equally important as they are rooted to this community and have been practiced for years. They have also been developing from generation to generation. There are various religions practiced in the country of South Korea. Accordi ng to Clark (29), these religions are in three main categories, which include established religions, newly raising religions and the popular religion. Established religions include Buddhism, Christianity, newly rising religion include unification of churches, and the popular religion include shamanism (Clark 29). The oldest religions in South Korea are ideas, shamanism, and animism. In these kinds of religion, adherence

Friday, October 18, 2019

Math Problem Speech or Presentation Example | Topics and Well Written Essays - 500 words

Math Problem - Speech or Presentation Example According to the rejection rule, if the value of Z calculated by the test statistic lies in critical area, then we reject the null hypothesis in favour of alternative hypothesis. On the other hand, if the value of test statistic does not fall in critical area then null hypothesis is accepted and alternative hypothesis is rejected. The given test is a left tailed test. The significance value given in the question is 0.05, so the z-score corresponds to 0.05 is -1.645. The critical area for the given testing is the area less than -1.645 or the area left to the -1.645. In the particular z-test, the value of test statistic -1.56 is greater than -1.645, that is why it does not lie in rejection region, so null hypothesis is accepted and alternative hypothesis is rejected. The above test shows that the population mean price for used Motor Bikes at the dealership is $A 20,000. The statistical assessment shows that the sample of 100 used cars has actually helped the manager of the company to determine the actual mean price of used cars in the market. This statistical data analysis can be used in future to determine the potential prices of the cars. In future the manager can use historical pricing data to price the products and it will be recognised as historical based pricing methodology. For example, in future if the manager of Brisbane Motor Bike wants to determine the potential price of its specific model motor bike, he can collect the sample of same model motor bikes from the market and he can determine the potential price for the bike. The price data can be collected from the market. In this way, the manager will not only be able to price his products rightly but he will be also able to keep his prices market competitive, thereby, attracting

The Cuban Revolutionary War Research Paper Example | Topics and Well Written Essays - 1250 words

The Cuban Revolutionary War - Research Paper Example According to Minster, the Cuban revolutionary war was started by the former Sergeant army Fulgencio Batista who took power following a highly contested and disputed presidential election. History has it that Batista became president of Cuba from 1940 to 1944 and again attempted to resume power in the 1952 presidential election. Upon realizing that he was likely to lose in the election, retired Sergeant Batista seized power before actual election date. In the reports of Minster, the presidential election of 1952 was projected to favor a new presidential candidate, Fidel Castro. Upon cancellation of election results due to the ensuing political upheaval, Mr. Fidel Castro begun to plan strategies by which he could oust President Batista. In order to fight the ruling government, Mr. Fidel Castro had to organize for weapons to wage attacks specially destined against Moncada Barracks, which was perceived to bear the power of the government military force. In July1953, Castro organized 138 militia men with whom they attacked Moncada Barracks resulting in the capture of the rebel militia men and death of nineteen federal soldiers (Minster). The war also led to the arrest of Fidel Castro and Raul Castro alongside some of the rebel soldiers. Other soldiers died of gun shots of the fierce federal armies. Fidel Castro and Raul Castro together with the rebels faced to public trial for their involvement in the botched coup. Hutsell, Sanders and Kuntz report that being a professional lawyer; Fidel Castro defended himself by claiming that he waged a just war against the perceived dictatorial regime under the leadership of Batista. Despite the justification of Castro’s defense speech, he was sentenced to fifteen year imprisonment. Minster reports that in May 1955, Batista’s government faced numerous accusations from the international spectrum accusing him of tyrannical leadership. In the effect, the government released all the prisoners including the rebels who took part in the attacks on Moncada Barracks. Hutsell, Kuntz and Sanders further confirm that upon release, Fidel Castro and Raul Castro flew to Mexico to organize another strategy for more sustained attacks on Batista’s government. In Mexico, Raul and Fidel met the exiled Cubans with whom they joined hands to form the 26th July Movement typically named as a commemoration of the Moncada militia attacks. In the group of the organ ized revolutionary militia in Mexico organized to propagate war against Batista’s government, were the Camilo Cienfuegos and the Argentine doctor by the name Ernesto Che Guevara. In November of 1956, the top leaders comprising of Fidel, Raul, Camilo and Ernesto together with other eighty two men sailed to Cuba in full preparation for the revolutionary war against the government of President Batista (Hutsell, Kuntz and Sanders). Minster illustrates that the arrival of the militia group from Mexico was well discerned by Batista’s administration and had therefore prepared to face them off. However, the ingenuity of Raul and Fidel made them to lead their group to the thick and impenetrable woodland located in the center of Cuba. Minster confirms that the revolutionary group used the opportunity in the forest to regroup and attract other new members. The period spent on the highland forest also assisted towards collection of weapons for waging the guerrilla war against the armies of the ruling government. On 26th July

Thursday, October 17, 2019

Exercise Chapter 4 Assignment Example | Topics and Well Written Essays - 500 words

Exercise Chapter 4 - Assignment Example Aligning IT with a project is necessary is essential to improve administration and service delivery. Good administration improves accountability, risk-return balance and cost structures (Guglielmo, 2009). It integrates all aspects of project management from plan execution to monitoring the success of all components of the project. Managing project work is an intricate process that involves coordination of efforts from different levels of an organization. It demands exemplary integration of project management principles and techniques. The management of two projects, Adelaide Desalination Project Adelaide, Australia SA Water Corporation, and Prairie Waters Project, Aurora, Colorado, USA, commendably directed and managed their project work. The projects received recognition in the â€Å"PMI Project of the Year award† in the year 2013 and 2011 respectively. The Adelaide Desalination Project, which the South Australian and Australian governments, AdelaideAqua, and the Kaurna community undertook, was a project completed by South Australian Water Corporation (Kumar and Farinola, 2012). Communication was the overall consideration by the organization because it involved the coordinated efforts of separate authorities, (AdelaideAqua, a consortium of McConnell Dowell Constructors, Abigroup Contractors, Acciona A gua and Trilit), and community leaders. Agility and risk management were also two considerations that ensured success of the project. The team maintained an aggressive schedule through creating inspection processes and strict risk-assessment (Kelly, 2013). Separately, Prairie Waters Project, Aurora, Colorado, USA, was completed two months before its proposed date of completion because of exemplary project management skills (Learnard and Kelly, 2011). The project managers attribute the success of the project, which was also below budget, to trimming unnecessary features from the plant and excellent planning (Illescas,

IBM's HCI Business Agenda and its competitors Case Study

IBM's HCI Business Agenda and its competitors - Case Study Example There are several other companies operating in the sector of computer related technologies like IBM. These companies have also developed some sites that allow the human computer interaction with the aim of enhancing the customer loyalty and sale of their products. For instance, Google Inc has created a Google accessibility page that demonstrates its accessibility mission and also offers hiring opportunities to the people. The site contains the links that lead to the requirements of the job position and provides the contact information to apply for the job. The accessibility blogs shares the experiences and opinions of the site administrator as well as the users (http://www.google.com/accessibility/) Another HCI site has been developed by ICITA (Illinois Centre for Information Technology and Web Accessibility). The site interacts with the users to teach them about HTML practice. It explains the purpose of the accessibility design and lists the rule development principles followed by the explanations of different rule evaluation definition. There are some links also provided in between the text that takes the users towards the web accessibility guidelines and section 508 IT accessibility standards page. The site also provides the links to the IITA web accessibility standards and Illinois IT accessibility Act. (http://html.cita.illinois.edu/) The website developed by Mozilla contains detailed account of information about add-on for Firefox. The site offers downloading the software Firefox accessibility Extension and also includes the reviews of the users that have used the software. The detailed information about the add-ons and the software has been provided through three links present below the download box. Moreover, the users are also allowed to add their own comments and response to the site and the software. The related collection

Wednesday, October 16, 2019

Exercise Chapter 4 Assignment Example | Topics and Well Written Essays - 500 words

Exercise Chapter 4 - Assignment Example Aligning IT with a project is necessary is essential to improve administration and service delivery. Good administration improves accountability, risk-return balance and cost structures (Guglielmo, 2009). It integrates all aspects of project management from plan execution to monitoring the success of all components of the project. Managing project work is an intricate process that involves coordination of efforts from different levels of an organization. It demands exemplary integration of project management principles and techniques. The management of two projects, Adelaide Desalination Project Adelaide, Australia SA Water Corporation, and Prairie Waters Project, Aurora, Colorado, USA, commendably directed and managed their project work. The projects received recognition in the â€Å"PMI Project of the Year award† in the year 2013 and 2011 respectively. The Adelaide Desalination Project, which the South Australian and Australian governments, AdelaideAqua, and the Kaurna community undertook, was a project completed by South Australian Water Corporation (Kumar and Farinola, 2012). Communication was the overall consideration by the organization because it involved the coordinated efforts of separate authorities, (AdelaideAqua, a consortium of McConnell Dowell Constructors, Abigroup Contractors, Acciona A gua and Trilit), and community leaders. Agility and risk management were also two considerations that ensured success of the project. The team maintained an aggressive schedule through creating inspection processes and strict risk-assessment (Kelly, 2013). Separately, Prairie Waters Project, Aurora, Colorado, USA, was completed two months before its proposed date of completion because of exemplary project management skills (Learnard and Kelly, 2011). The project managers attribute the success of the project, which was also below budget, to trimming unnecessary features from the plant and excellent planning (Illescas,

Tuesday, October 15, 2019

The impact of mobile computing on the enterprise Essay

The impact of mobile computing on the enterprise - Essay Example It was a one-to-one relationship if seen from the constructive perspective. Negative points were summed up in the losses incurred on the company’s part whereby these message boards and the like didn’t help the business from any fiscal outlook. Many big companies like Microsoft, WebEx, Intraspect and the like have been facing barriers as concerns with the interaction between the employees who are spread in different locations. These companies were in the need to put up such a system, which could eliminate excessive and undue business travels and easily provide for interaction and more so straightforward communication between the people. Thus, collaboration software was devised and put forthwith and has been going on for a number of years ever since. The collaboration software like Usenet services and others accounted for targeted markets in the field of manufacturing, supply-chain management and product development, not to forget sales and marketing. These types of softw are do not usually work in every kind of workplace and within every other system. Actually, its one thing fitting these into the old system and another to make people change the way they work in the business world of today and interact and communicate with everyone concerned. These services are providing the most benefits in the real-time online dealings of the business and this is one factor, which takes lead over all others, at least in the business corporations. Mobile media is also known as the Portable media which in essence gives a description regarding the 21st century ideology encompassing the viewing of different forms of media, known more popularly as the multimedia on a device which is considered easily portable from place to place at any convenient location dependent on the mercy of the user of mobile media. This mobile media consists of either a mobile phone, a personal

Family in African-American Literature Essay Example for Free

Family in African-American Literature Essay In literary pieces such as Alice Walker’s story â€Å"Everyday Use†, Langston Hughes’ â€Å"My People†, and Robert Hayden’s poem â€Å"Those Winter Sundays†, the theme of family relationships is significantly evident. In â€Å"Everyday Use†, Walker presents one stage and aspect of a family life when one adult child chooses to live on her own while the other one stays with the family. Hughes’ poem portrays his love for his people which he considers to be a family as a whole. Meanwhile, Hayden’s â€Å"Those Winter Sundays†, talks about the narration and description of a boy about his father whom he is not well acquainted with. As the first piece speaks of a story about a family in relation to their heritage, the latter speaks of a boy’s reminiscence of a father who was never able to show his love directly to his children. These two aspects of family relationships reveal several angles to look upon.   Such family situations are influenced by authors’ own race and heritage. Alice Walker portrays the story of a fully grown-up daughter, Dee, who goes back to home to her home to visit her mother, Mrs. Johnson and her younger sister, Maggie. She arrives accompanied by an African American Muslim man who is currently dating her. She comes home to collect some family possessions which she intends to turn into artistic pieces to be exhibited in a museum. Meanwhile, her sister Maggie grimaces as her sister takes some of their personal belongings including a quilt that her mother has promised to give her as a wedding present. Dee tells her mother that Maggie would only ruin the quilt by using it everyday which puzzles Mrs. Johnson as she could not think of any way to use the quilt than to spread them. When Mrs. Johnson sees the sadness in her younger daughter’s eyes upon Dee taking the quilt, she snatches it away and gives it to Maggie. Dee walks away after claiming that their problem is they do not understand their own heritage (Walker). In this story, Walker portrays a family whose eldest daughter has become estranged from them. In the first part of the story, Mrs. Johnson recounts how Dee had hated living in their house and even almost set it on fire when she was young. The concept of a dysfunctional family is quite present here; however, it focuses more on the mother-child relationship rather than every member of the family. It is important to note that Walker made use of the damaged relationship of Dee to her mother and sister to show and illustrate the different types of African American people. On the other hand, Langston Hughes shows his love and appreciation for his people in his poem â€Å"My People†. He does not speak of family but his tone and use of words make it seem as if he is speaking of his beloved family. â€Å"The night is beautiful, / So the faces of my people† (lines 1-2). The possessive pronoun â€Å"my† indicates a certain intimacy between him and â€Å"his† people which is usually used for referring to a small group of people who shares something intimate and common such as â€Å"my family†. In this regard, Hughes speaks highly of his race as if he is talking about a family he loves most. â€Å"The stars are beautiful, /  So the eyes of my people† (3-4). The comparison of his people to the heavens indicates the depth of his love and care for them as he would to his family. â€Å"Beautiful, also, is the sun. / Beautiful, also, are the souls of my people† (5-6). In the poem â€Å"Those Winter Sundays†, it can be assumed that Robert Hayden personally speaks through the voice of the speaker in his poem â€Å"Those Winter Sundays†. His distant relationship with his father is evident. In this melancholic poem, he narrates about the concealed appreciation of a son for his father’s acts of love by means of writing it in a prose. The narrator tells about the labors of his father even on a cold winter Sunday. However, in the poem, the speaker emphasizes that his father’s great efforts are usually ignored. The title of the poem itself already suggests a background for the readers. The speaker is obviously focused only on the â€Å"winter Sundays† and why it means too much work for the father. In the first stanza of the poem, the detailed description of the speaker’s father is very noticeable. He illustrated him by means of mentioning his physical condition as he works on cold Sundays. He could have described it in a clearer way by going straight to the point.   Nevertheless, he expressed his father’s poor countenance in a way that the reader can visualize the father’s hands cracked hands and the busy Sundays. The first two lines of the poem somewhat develops a thesis that would cover the whole idea in the poem. â€Å"Sundays too my father got up early / And put his clothes on in the blueblack cold,† (1-2). Sundays should be a day of rest but the speaker stresses that his father still wakes up even before the sun rose to go to work. He further highlights the weary countenance of his father as he describes his father’s â€Å"cracked hands that ached / from labor in the weekday weather made / Banked fires blaze† (3-5). The poem further shows how heartbreaking the father’s situation must be by writing the last line of the first stanza with, â€Å"No one ever thanked him† (5). With the last line, it is reasonable to consider that the speaker is one of those people who failed to thank him. In this regard, it can be assumed that the speaker is already in his old or middle age when he remembers how his father has shown him love in his own way. Clearly, these renowned African-American writers have frequently used the theme of family relationships to further address the problems of their society. The issues of racism, nationalism, and love are the implicit ideas which are present in the three literary pieces discussed. These authors portrays different types of African-American families which serves as the representation of the current society that they are in. since the family is the basic unit of society, it is the primary target of societal effects such as racism and other social issues. Every problem of the society can become the problem of the family which is why the most meaningful literary works of art somewhat involves the theme of family relationships. Works Cited Hayden, Robert. â€Å"Those Winter Sundays.† The Oxford Anthology of African-American Poetry. Ed. Arnold Rampersad, Hilary Herbold. United States of America: Oxford University Press US, 2006. 261. Hughes, Langston. â€Å"My People.† Poem Hunter. 19 April 2009. http://www.poemhunter.com/poem/my-people/ Walker, Alice. Everyday Use. Ed. Barbara Christian. United States of America: Rutgers University Press, 1994.

Sunday, October 13, 2019

Impact of Slavery on a Child

Impact of Slavery on a Child Life of a Slave Child It is hard to imagine growing up in the slave era. With the luxuries that even the poorest of children have in current times, makes the life a slave child even more unbelievable to say the least. A child that grew up as a slave suffered a very brutal, harsh childhood on a number of different levels. Not only was the suffering physical it was also psychological. The psychological far outweighing the physical, in my opinion. From birth to the end of many slaves lives, they often felt powerless, inferior, shame, and perhaps the most damaging psychological effect was the sense of not having family ties and fearing separation from family. Physically, slave children suffered from physical labor at young ages, poor nutrition and sanitation. Often times this conditions lead to many serious if not fatal diseases. Slave children were valued assets to slave owners and were given a monetary value and while some young toddler aged children lived in the masters homes, there lives were far from lux urious. Toddler aged children were often held responsible for taking care of infant children of the master. As they got older, they were responsible for domestic chores, such as, housekeeping, fanning their masters, cooking, etc. and eventually were sent to the fields to work as young teenagers. Growing up in the 1990s and early 2000s this world seems so far from what I ever knew as a child. During play, slave children would create games that would help them deal with their surroundings. They wanted to feel they had some control over the things that were going on around them and teach them how to be adults. Games such as Hide the Switch and Auction were just a couple of the games slave children played to prepare them for the actual beating or selling of a family member. They also did not have manufactured toys. They would create balls to play with out of yarn and old socks. Games also were used as learning tools for slave children that were deprived of education. For example, Hide and Seek was used to learn to count. Several other games were used to enhance verbal usage and ring games were a way of release of emotions a child may be feeling by allowing them to make rhythms. Slave children often hunted and fished as competitive sports, which also allowed them to make their families a little better off, they tended to stay away from games that required someone to lose. Old er children would be on watch to notify the younger children that a master was approaching by singing a song. This is also something children in modern times do, they look out for someone of authority coming but the roles are reversed, the younger children are usually the one watching out. Slave children looked forward to being able to work in the fields. They were at that time allowed to receive some of the same benefits as the adults, such as rations of food and more clothing. This usually happened at around the age twelve. Again, it is hard to image as a child of twelve that I had to go work to receive a full meal or clothes. At twelve, my parents made sure that I had better clothes than them and was never denied food when I was hungry. Not only was it hard being a child during the slave era, it was as equally hard, if not harder, being a parent. While in todays world becoming a parent, regardless of age, is one of the best moments of your life that was not the case with slave parents. Slave parents would deliver their children with bitter sweet emotion as they knew what suffrage lay in wait of their children. This was especially the case with female children. Female children were sexually exploited starting as a very young age. The sexual assaults physically were brutal, not to mention the emotional and mental effects sexual assaults had on female slaves. Children that were conceived in the manner of sexual assault by slave masters and considered mulatto were mistreated on an entirely different level than other slave children and were most likely separated from their mothers because the mistress of the plantation didnt want them around. Fathers had a hard time dealing with being able to protect their families from the harshness surrounding them. When a father did attempt to protect his children, they or he was sold to a different plantation, so in an effort to keep his family together he would stand by and watch injustices done to his family. In my opinion, being able to keep his composure in certain situations made him a better father than by not keeping his composure. Slave owners in justification of working pregnant women in the field and lowering their rations of food where in fact one of the biggest reason that the slave child morality rate was so high. I do not believe that slave owners actually thought that working the fields actually made delivery of a child easier nor do I believe they thought not feeding the mother would lower birth weight of the child. It has often been said that children were resilient and this is proven over and over again with slave children. Children born into slavery learned to deal with there conditions on away no other child has ever had to do. They rose above these transgressions by learning how to read and write, learning racial etiquette, taking personal responsibility for themselves and looking to a higher power to end their suffering. At the onset of the Civil War, women and children slaves sought refuge with the Union while boys as young as ten joined the military to fight in the war. Others such as Frederick Douglas escaped slavery, became educated, and fought for rights of slaves on a national level. The hate slavery generated between black slaves and white slave owners over 150 years ago was so I posit that even after 150 years have passed it is still one of the causes of racial tension in the world today.

Saturday, October 12, 2019

All People are Equal Within the World of Work Essay -- Papers

All People are Equal Within the World of Work I do not agree with the statement at all, allthough in a right normal world of work, it should be true. Many people often judge people by thier appearence, or past experience. It could be anything, discriminating someone is easilly done. And its often simple things like hair styles or piercings, disability or gender than can stop you from working where you want to. With nearly all jobs these days; you'll have to fill out an application form, which can be a nightmare to many people. But no just for things like trying to remember their old school grades or when they left school, its often because they have something they feel will jeapordise thier employment chances. Criminal records is a good one. In companies or bussiness' these days, they will ask if you have a spent or unspent conviction. Spent means that its been a certain while since your conviction, unspent being the opposite. Some places feel that if you havent 'spent' your conviction, (meaning you havent 'changed'...

Friday, October 11, 2019

Learning Styles Inventory Essay

Taking the Learning Styles Inventory Test was an insightful, informational, and introspective experience as a whole. It measures seven areas of standards or measure that clearly define an individual’s behavioral approach on learning – the visual, social, physical, aural, verbal, solitary, and logical learning styles. Each question within the test inquires about an individual’s leaning or inclination to harboring the outcomes of learning from each means or scenario indicated. The questions provide a learning situation where one will determine how he identifies with it, and one’s identification with each specific scenario determines how one learns through various situations. Putting oneself within each scenario allows one to review or evaluate one’s motivations in learning in order to understand clearly how one’s behavior and learning environment would and should be altered to facilitate greater learning. The result of the Learning Styles Inventory Test clearly indicates my personality or takes on the learning situation. Out of the seven learning styles, the Memletic Learning Styles Graph, as shown below, depicts that I am more inclined to learn effectively when I utilize my physical functions. The rating for each of the learning styles was remote that the bodily-kinesthetic learning style (18 points) stands out among the seven. (â€Å"Learning Styles Inventory – Results Page,† 2007) This piece of information I find true as I do tend to want or need to manipulate or experiencing things in order to learn or realize the structures or dimensions of objects, concepts, occurrences, and such. (â€Å"The Physical (Bodily-Kinesthetic) Learning Style,† 2007) Therefore, the result from the test did not surprise me at all. Next to the physical learning style, the aural learning style (15 points) follows as the second dominant one that applies to me. This is yet another factual information because I do find myself enjoying the learning experience when I work with music or sounds in the background. (â€Å"The Aural (Auditory-Musical-Rhythmic) Learning Style,† 2007) Music, as part of the learning environment, sets the mood or rhythm that motivates me to carry on and finish, not to mention enjoy, what I am doing. On the contrary, the least learning styles that I can identify my learning behaviors with is the verbal learning style (11 points), also including the visual, social, and solitary learning styles (12 points each). This means that I am not motivated enough to learn by reading or writing, looking at or watching visuals, socializing with other people, and even keeping to myself. The results of the test suggest that my strengths lie in my motivations and capabilities to do, or to become more productive by being actively involved during the learning experience. However, it might be difficult to become motivated within the learning environment as learning media such as visuals, written texts, the processes of socialization and independent learning are part of learning strategies or approaches being utilized in most cases. Moreover, the learning environment is balanced, such that it fosters various methods or approaches in learning; and my unbalanced learning styles suggest that I will not be able to keep up with the learning environment. Perhaps the most logical thing to do at this point is to try to even out or balance the learning styles that I should be accustomed to in order to draw out the advantages from it whenever the learning environment or situation calls for it. If it remains to be unbalanced, like my test results indicate, inflexibility will not facilitate learning but hinder the process of acquiring knowledge and skills as learning environments vary every time. Accomplishing this goal means that I would have to expose myself to varying learning situations, and understand the importance of each one in order to balance out my learning inclinations for the seven learning styles indicated. With this in mind, as the realization of the need to balance out these learning styles I have come to realize, I believe that taking the test allows one to understand the importance of being exposed to various learning situations and experiences which fosters creativity, flexibility, and competence in the workplace. References â€Å"Learning Styles Inventory – Results Page. † (2007). Retrieved November 26, 2008, from Advanogy. com. Website: http://www. learning-styles-online. com/inventory/results. asp â€Å"The Aural (Auditory-Musical-Rhythmic) Learning Style. † (2007). Retrieved November 26, 2008, from Advanogy. com. Website: http://www. learning-styles-online. com/style/aural-auditory-musical/ â€Å"The Physical (Bodily-Kinesthetic) Learning Style. † (2007). Retrieved November 26, 2008, from Advanogy. com. Website: http://www. learning-styles-online. com/style/physical-bodily-kinesthetic/

Thursday, October 10, 2019

Design of a New Security Protocol Using Hybrid Cryptography

Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS S. Subasree and N. K. Sakthivel School of Computing, Sastra University, Thanjavur – 613401, Tamil Nadu, INDIA. ABSTRACT A Computer Network is an interconnected group of autono mous computing nodes, which use a well defined, mutually agreed set of rules and conventions known as protocols, interact with one -another meaningfully and allow resource sharing preferably in a predictable and controllable manner.Communication has a majo r impact on today? s business. It is desired to communicate data with high security. Security Attacks compromises the security and hence various Symmetric and Asymmetric cryptographic algorithms have been proposed to achieve the security services such as Authentication, Confidentiality, Integrity, Non-Repudiation and Availability. At present, various types of cryptographic algorithms provide high s ecurity to information on controlled networks. These algorithms are required to provide data security and users authenticity.To improve the strength of these security algorithms, a new security protocol for on line transaction can be designed using combination of both symmetric and asymmetric cryptographic techniques. This protocol provides three cryptographic pr imitives such as integrity, confidentiality and authentication. These three primitives can be achieved with the help of Elliptic Curve Cryptography, Dual -RSA algorithm and Message Digest MD5. That is it uses Elliptic Curve Cryptography for encryption, Dual -RSA algorithm for authentication and MD-5 for integrity.This new security protocol has been designed for better security with integrity using a combination of both symmetric and asymmetric cryptographic techniques. Keywords: Network Security, Elliptic Curve Cryptography, Dual-RSA, Message Digest-5. 1. INTRODUCTION Curiosity is one of the most common human traits, matche d by the wish to conceal private information. Spies and the military all resort to information hiding to pass messages securely, sometimes deliberately including misleading information [12]. Steganography, a mechanism for hiding information in apparently innocent pictures, may be used on its own or with other methods.Encryption fundamentally consists of scrambling a message so that its contents are not readily accessible while decryption is the reversing of that process[14]. These processes depend on particular algorithms, known as ciphers. Suitably scrambled text is known as cipher text while the original is, not surprising ly, plain text. Readability is neither a necessary nor sufficient condition for something to be plain text. The original might well not make any obvious sense when read, as would be the case, for example, if something already encrypted were being further encrypted.It's also quite possible to construct a mechanism whose output is readable text but which actually bears no relationship to the unencrypted original. A key is used in conjunction with a cipher to encrypt or decrypt text. The key might appear meaningful, as would be the case with a character string used as a password, but this transformation is irrelevant, the functionality of a key lies in its being a string of bits determining the mapping of the plain text to the cipher text. 1. 1 Why we need cryptography?Protecting access to information for reasons of security is still a major reason for using cryptography. However, it's also increasingly used for identification of individuals, for authentication and for non -repudiation. This is particularly important with the growth of the Internet, global trading and other activities[12]. The identity of e -mail and Web users is trivially easy to conceal or to forge, and secure authentication can give those interacting remotely confidence that they're dealing with the right person and that a message hasn't been forged or changed.In commercia l situations, non-repudiation [12] is an important concept ensuring that if, say, a contract has been agreed upon one party can't then renege by claiming that they didn't actually agree or did so at some different time when, perhaps, a price was higher or lower. Digital signatures and digital timestamps are used in such situations, often in conjunction with other mechanisms such as message digests and digital certificates. 95 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010The range of uses for cryptography and related techniques is considerable and growing steadily. Passwords are common but the protection they offer is often illusory, perhaps because security policies within many organizations aren't well thought out and their use causes more problems and inconvenience than seems worth it[14,15]. In many cases where passwords are used, for example in protecting word processed documents, the ciphers used are extremely lightweight and can be attac ked without difficulty using one of a range of freely available cracking programs. 2.TYPES OF CRYPTOGRAPHIC ALGORITHMS 2. 1. Elliptic Curve Encryption When using elliptic curves in cryptography[11], we use various properties of the points on the curve , and functions on them as well. Thus, one common task to complete when using elliptic curves as an encryption tool is to find a way to turn information m into a point P on a curve E. We assume the information m is already written as a number. There are many ways to do this, as simple as setting the letters a = 0, b = 1, c = 2, . . . or there are other methods, such as ASCII, which accomplish the same task.Now, if we have E : y2 = x3 + Ax + B (mod p), a curve in Weierstrass form, we want to let m = x. But, this will only work if m3 + Am + B is a square modulo p. Since only half of the numbers modulo p are squares, we only have about a 50% chance of this occurring. Thus, we will try to embed the information m into a value that is a squa re. Pick some K such that 1/2K is an acceptable failure rate for embedding the information into a point on the curve. Also, make sure that (m + 1)K ; p. Let xj = mK + j for j = 0, 1, 2, . . . ,K ? 1 Compute x 3j + Axj + B.Calculate its square root yj (mod p), if possible. If there is a square root, we let our point on E representing m be P m = (xj , yj) If there is no square root, try the next value of j[4,5]. So, for each value of j we have a probability of about 1/2 that xj is a square modulo p. Thus, the probability that no xj is a square is about 1/2K, which was the acceptable failure rate[6]. In most common applications, there are many real-life problems that may occur to damage an attempt at sending a message, like computer or electricity failure.Since people accept a certain 16 amount of failure due to uncontrollable phenomenon, it makes sense that they could agree on an acceptable rate of failure for a controllable feature of the process. Though we will not use this specific process in our algorithms[10]. 2. 2. Dual RSA In practice, the RSA decryption computations are performed in p and q and then combined via the Chinese Remainder Theorem (CRT) to obtain the desired solution in ? N, instead of directly computing the exponentiation in ? N. This decreases the computational costs of decryption In two ways.First, computations in ? p and ? q are more efficient than the same computations in ? N since the elements are much smaller. Second, from Lagrange? s Theorem, we can replace the private exponent d with dp = d mod (p – 1) for the computation in ? p and with dq = d mod (q – 1) for the computation in ? p, which reduce the cost for each exponentiation when d is larger than the primes. It is common to refer to dp and dq as the CRT -exponents. The first method to use the CRT for decryption was proposed by Quisquater and Couvreur [7,8].Since the method requires knowledge of p and q, the key generation algorithm needs to be modified to output the private key (d, p, q) instead of (d,N). Given the pri vate key (d, p,q) and a valid ciphertext C ? ? N, the CRTdecryption algorithm is as follows: 1) Compute Cp = Cdp mod p. 2) Compute Cq = Cdq mod q. 3) Compute M0 = (Cq – Cp) . p-1 mod q. 4) Compute the plaintext M = Cp + M0 . p. This version of CRT-decryption is simply Garner? s Algorithm for the Chinese Remainder Theorem applied to RSA.If the key generation algorithm is further modified to output the private key (dp, dq, p, q, p -1 mod q), the computational cost of CRT-decryption is dominated by the modular exponentiations in steps 1) and 2) of the algorithm. When the primes p and q are roughly the same size (i. e. , half the size of the modulus), the computational cost for decryption using CRT -decryption (without parallelism) is theoretically 1/4 the cost for decryption using the original method[7]. Using RSA-Small-e along with CRT-decryption allows for extremely fast encryption and decryption that is at most four times faster than standard RSA. 96IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ? Design of a New Security Protocol 2. 3 MD5 Algorithm MD5[2] consists of 64 of these operations, grouped in four rounds of 16 operations. F is a nonlinear function; one function is used in each round. Mi denotes a 32 -bit block of the message input, and Ki denotes a 32 -bit constant, different for each operation. s is a shift value, which also varies for each operation[1]. MD5 processes a variable length message into a fixed -length output of 128 bits. The input message is broken up into chunks of 512-bit blocks; the message is padded so that its length is divisible by 512.The padding works as follows: first a single bit, 1, is appended to the end of the message. This is followed by as many zeros as are required to bring the length of the message up to 64 bits less than a multiple of 512. The re maining bits are filled up with a 64-bit integer representing the length of the original message[9]. The main M D5 algorithm operates on a 128 -bit state, divided into four 32-bit words, denoted A, B, C and D. These are initialized to certain fixed constants. The main algorithm then operates on each 512 -bit message block in turn, each block modifying the state.The processing of a message block consists of four similar stages, termed rounds; each round is composed of 16 similar operations based on a non -linear function F, modular addition, and left rotation. Many message digest functions have been proposed and are in use today. Here are just a few like HMAC, MD2, MD4, MD5, SHA, SHA-1. Here, we concentrate on MD5, one of the widely used digest functions. 3. HYBRID SECURITY PROTOCOL ARCHITECTURE It is desired to communicate data with high security. At present, various types of cryptographic algorithms provide high security to information on controlled networks.These algorithms are required to provide data security and users authenticity. This new security protocol has been designed for better security using a combination of both symmetric and asymmetric cryptographic techniques. Figure 1 : Hybrid Protocol Architecture As shown in the figure, the Symmetric Key Cryptographic Techniques such as Elliptic Curve Cryptography, and MD5 are used to achieve both the Confidentiality and Integrity. The Asymmetric Key Cryptography technique, Dual RSA used for Authentication. The above discussed three primitives can be achieved with the help of this Security Protocol Architecture.The Architecture is as shown in the Figure 1. As shown in the figure, the Symmetric Key Cryptographic Techniques such as Elliptic Curve Cryptography, and MD5 are used to achieve bo th the Confidentiality and Integrity. The Asymmetric Key Cryptography technique, Dual RSA used for Authentication. 97 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 The new Security Protocol has been designed for better security. It is a combination of both the Symmetric and Asymmetric Cryptog raphic Techniques.It provides the Cryptographic Primitives such as Integrity, Confidentiality and Authentication. The given plain text can be encrypted with the help of Elliptic Curve Cryptography, ECC and the derived cipher text can be communicated to the destination through any secured channel. Simultaneously, the Hash value is calculated through MD5 for the same plain text, which already has been converted into the cipher text by ECC. This Hash value has been encrypted with Dual RSA and the encrypted message of this Hash value also sent to destination. The intruders may try to hack the original information from the encrypted messages.He may be trapped both the encrypted messages of plain text and the hash value and he will try to decrypt these messages to get original one. He might be get the hash value and it is impossible to extract the plain text from the cipher text, because, the hash value is encrypted with Dual RSA and the plain text is encrypted with ECC. Hence, the messag e can be communicated to the destination with highly secured manner. The new hash value is calculated with MD5 for the received originals messages and then it is compared with decrypted hash message for its integrity.By which, we can ensure that either the origi nal text being altered or not in the communication medium. This is the primitive feature of this hybrid protocol. 4. RESULTS AND CONCLUSION 4. 1 Comparison of RSA and Dual RSA 1) The Public Key Algorithms, RSA and Dual-RSA have been implemented in VC++ and we got the following results. As shown in the Figure 2, the original message for communication is stored in MyFile. txt and its size is 547 Bytes, which is shown in the report file. Figure 2 : Input File MyFile. txt Figure 3 shows that the project main menu, which consists of various features. They are i. RSA Encryption, ii.RSA Decryption, iii. Dual RSA Encryption, iv. Dual RSA Decryption, and v. Graph, which is used to compare the computational costs of both the RSA and D ual -RSA Figure 4 shows that RSA Encryption and Figure 5 shows that Dual RSA encryption. From the figure 6 it is clear that the RSA take one block at a time for encryption and decryption at a time. But the dual RSA take more time for encryption of two block at a time, but it take less time for decryption of two blocks. So, the RSA encryption and decryption time is greater than Dual RSA because Dual RSA perform the encryption and decryption operation for two blocks. 8 IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ? Design of a New Security Protocol Figure 3 : Process of RSA and Dual RSA Encryption/Decryption Figure 4 : RSA Encryption 99 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 Figure 5 : Dual – RSA Encryption 5. 2 Performance analysis of RSA and Dual RSA Figure 6 : RSA vs Dual RSA 100 IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ? Design of a New Security Protocol Figure 7 : Computational costs of RSA vs Dual RSA Figure 6 s hows that the Perfor mance Analysis of RSA vs Dual RSA.From this figure, it is clear that the total computation time for Encryption and Decryption of Dual -RSA is less than that of ordinary RSA. From the Figure 7, it is observed that the total computation time for Encrypt ion and Decryption of RSA is 4314ms as compared with the total computation time for Encryption and Decryption of Dual – RSA is 3203ms for the file size 547 Bytes. From the analysis it is clear that Dual RSA is better than RSA algorithm. So, for authentic ation we are going to use Dual RSA. Dual RSA take two block for encryption and decryption simultaneously. . 3 Results of Hybrid protocol Architecture Here, we are using three different mode of operation. The sender, Receiver and Intruder. We have t o select the mode and process the information. The following figure represent the three different mode. Figure 8 : Mode selection If the mode is the sender, then we have to provide the key val ue and messages in t he specified location. Figure 9 : Sender Mode 101 Subasree & Sakthivel ? Design of a New Security Protocol IJRRAS 2 (2) ? February 2010 Figure 10 shows that the Receiver received the sender message with the key.From the figure, it is noted that, the intruder also received the key and not the message. Because, the message is encrypted with ECC and key is encrypted by using Dual RSA. And also noted that, the intruder derived different key for decryption, which is equivalent to the original key. Even though the intruder got the key he cannot able to get the orig inal message because of Dual RSA. Because of Dual RSA we got two advantages one is the message cannot be decrypted and time required to perform the encryption and decryption operation less compare to RSA because Dual RSA perform encryption and decryption by two block at a time.The new Public Key Cryptographic algorithm, Dual – RSA has been developed for better performance in terms of computation costs and memory storage requirements. It is also called RSA -CRT, because it is used Chinese Remainder Theorem, CRT for its Decryption. From the output, it is noted that Dual -RSA improved the performance of RSA in terms of computation cost and memory storage requirements. It achieves parallelism. The CRT Decryption is achieved roughly ? times faster than original RSA. Figure 10 : Secured communication of Hybrid Protocol 102 IJRRAS 2 (2) ? February 2010 Subasree & Sakthivel ?Design of a New Security Protocol 6. REFERENCES [1] [2] [3] [4] [5] [6] [7] B. den Boer and A. Bosselaers, â€Å"An attack on the last two rounds of MD4†, Advances in Cryptology, Crypto ? 05, pages 194-203, Springer-Verlag, 2005. B. den Boer and A. Bosselaers, â€Å"Collisions for the compression function of MD5†, Advances in Cryptology, Eurocrypt „07, pages 293-304, Springer-Verlag, 2007. D. Bleichenbacher and A. May, â€Å"New attacks on RSA with small CRTexponent in Pub lic Key Cryptography†, PKC 2006, vol ume 3968 of Lecture Notes in Computer Science, pages 1 –13. Springer-Verlag, 2006. D. Bleichenbacher and A.May, â€Å"New attacks on RSA with small secret CRT -exponents,† in Public Key Cryptology—PKC 2006, ser. Lecture Notes in Computer Science. New York: Springer, 2006, vol. 3958, pp. 1–13. D. Boneh and G. Durfee, â€Å"Cryptanalysis of RSA with private key d less than N ,† IEEE Trans. Inf. Theory, vol. 46, no. 4, pp. 1339–1349, Jul. 2000. E. Jochemsz and A. May, â€Å"A polynomial time attack on standard RSA with private CRT -exponents†, 2007. Hung-Min Sun, and et al. , â€Å"Dual RSA and its Security Analysis†, IEEE Tra nsaction on Information Theory,Aug 2007, pp 2922 – 2933,2007 [8] H. -M. Sun, M. J.Hinek, and M. -E. Wu, On the design of Rebalanced-RSA, revised version of [37] Centre for Applied Cryptographic Research, Technical Report CACR 2005 -35, 2005 [Online]. Available: http://www. cacr. math. uwaterloo. ca/te chreports/2005/cacr2005 -35. pdf [9] H. Dobbertin, â€Å"The Status of MD5 after a Recent Attack†, CryptoBytes, 2(2): 1-6, 2007. [10] M. J. Hinek, â€Å"Another look at small RSA exponents,† in Topics in Cryptology-CT-RSA 2006, ser. Lecture Notes in Computer Science, D. Pointcheval, Ed. New York: Springer, 2006, vol. 3860, pp. 82 –98. [11] N. Gura, A. Patel, A. Wander, H. Eberle, and S.C. Shantz, â€Å"Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs†. Proceedings of Workshop on Cryptographic Hardware and Embedded Systems (CHES 2004), 6th International Workshop, pages 119 –132, 2004. [12] Ravindra Kumar Chahar and et. al. , â€Å" Design of a new Security Protocol†, IEEE International Conference on Computational Intelligence and Multimedia Applications, pp 132 – 134, 2007 [13] Ramaraj, E and Karthikeyan, S, â€Å" A Design of Enhanced Security Protocol for Wireless Communication using Hybrid Encryption Technique, Indian Jo urnal of Computing Technology, pp 22 -29, May, 2006. 14] S. D. Galbraith, C. Heneghan, and J. F. McKee, â€Å"Tunable balancing of RSA†, 2005. Updated ACISP 2005. version of [15] S. D. Galbraith, C. Heneghan, and J. F. McKee, â€Å"Tunable balancing of RSA,† in Proc. Inf. Security and Privacy, 10th Australasian Conf. , ACISP 2005, C. Boyd and J. M. G. Nieto, Eds. , 2005, vol. 3574, pp. 280 – 292, Springer, Lecture Notes in Computer Science. BIOGRAPHY Dr. S Subasree got Bachelor Degree from Madras university in 1991 and she done her post graduate degree from Bharathidasan Univeristy in 1995 and M. hil from Manonmaniam Sundaranar Univeristy in 2001. She done her M. Tech and Ph. D in SASTRA University in 2006 and 2009 respectively. She got 13 years teaching experience. Now she will be serving as a Senior Assistant Professor in SASTRA Univeristy, Tamil Nadu, India. She has published more than 15 papers in International and National Journals and Conferences. Her rese arch area includes Network Security, High Performance Soft Computing Techniques, Communication Network, and B iometric Cryptography. Dr. N K Sakthivel got Bachelor Degree from Madras university in 1991 and she one her post graduate degree from Bharathidasan Univeristy in 1994 and M. phil from Bharathidasan Univeristy in 2000. She done her M. Tech and Ph. D in SASTRA University in 2004 and 2009 respectively. She got 15 years teaching experience. Now She will be serving as a Professor in SASTRA Univeristy, Tamil Nadu, India. She has published more than 18 papers in International and National Journals and Conferences. Her research area includes High Speed Communication Networks, Network Security, High Performance Computing, and Biometric Cryptography. 103