Saturday, August 31, 2019

Is Curleys wife a tragic figure? Essay

Throughout the book ‘Of Mice and Men’, Steinbeck portrays the character of Curley’s wife as unfortunate and a bit of an outcast. ‘Well you keep away from her, cause she’s a rattrap if ever I seen one’. But to what extent can she be regarded as a tragic character? The first time we hear about Curley’s wife, she is described as a ‘tart’ by another farm worker. This is because she is lonely so she hangs around the other farm workers wearing ‘red mules’ with ‘red ostrich feathers’ and ‘red finger nails’. Steinbeck uses the colour red to show she is dressing like a ‘tart’ because the colour red at the time was associated with prostitutes. ‘I ain’t never seen nobody like her’. The ranch hands, however, want nothing to do with her, so they ignore her, and so she becomes an outcast. ‘Curley’s wife can sure move quiet. I guess she’s had a lot of practice, though’. The reason they do not want to be seen with her is because she is married to Curley, a ‘pugnacious’ little man, who is very possessive. ‘†Have you seen a girl around here?† he demanded angrily’. The fact that Steinbeck never gave Curley’s wife a name other than ‘Curley’s wife’ is to show that she belongs to Curley. It shows her as his possession rather than a separate person. To get attention, she dresses up and hangs around the workers when Curley is not there. However, none of the farm workers want to fight with Curley, because he is the boss’ son and could get them fired. ‘She looked from one face to another, and they were all closed against her’. Curley’s wife seems unhappy in her marriage. ‘I don’t like Curley. He ain’t a nice fella’. He treats her badly, and even though he is married, he still goes to a ‘cathouse’, and she knows this ‘Think I don’t know where they al went? Even Curley!’ She also admits she is happy that Curley got ‘bust up’, because she resents Curley for the loneliness and for being ‘stick in that house alla time’. Curley’s wife has no children to keep her occupied or keep her company, and she has nothing to do with her time. Steinbeck uses language to show how frustrated she is at being unloved and unwanted. ‘Wha’s the matter with me?’. Even when she is dead she is unloved by Curley, who is more angry that someone â€Å"broke† HIS possession than the fact that his wife is dead. ‘I’ll kill the big son-of-a-bitch!’ Curley’s wife spends most of her time scheming ways to get attention and company from the other men. There are no other women on the ranch, and this is because men’s lifestyles at the time meant they were always travelling and never settled down and got married. This is why none of the other ranch workers have wives for her to talk to, and therefore no one else on the ranch understands her, or her situation. ‘Ranch with a bunch of guys on it ain’t no place for a girl, specially like her!’ Throughout the book, the reader does learn a little about Curley’s wife’s past, and about how a guy ‘who was in the pitchers’ said he was ‘gonna put [her] in the movies’ once he was back in Hollywood, and how she never received the letter. Curley’s wife says that she thought her ‘ol’ lady stole it’, and this shows the reader how naà ¯Ã‚ ¿Ã‚ ½ve and easily led she is, and also the reason she was so desperate to leave home, and why she married Curley. Even though Curley’s wife is so lonely and craving attention, she is still rude and has a short temper, and throughout most of the book is not liked by the reader. ‘ you keep your place then nigger. I could get you strung up on a tree so easily it ain’t even funny’. ‘She demanded, â€Å"You listenin’ to me?†Ã¢â‚¬Ëœ. When she is left alone with the ‘weak ones’ she treats them badly, as if she is taking out her frustration on them. ‘ Standin’ here talking to a bunch of bindle stiffs – a nigger, an’ a dum-dum an’ a lousy ol’ sheep, an’ liking it cause there ain’t nobody else!’ She is jealous that even though she counts them as the ‘weak ones’, some of them can talk to the other men, and are not all forced into the same solitary confinement that she is in. Steinbeck shows just how tragic this character is, by the fact that she has to take her anger out on people she herself counts as ‘weak’, and that is how bitter her lifestyle has made her. Finally once she has died, Steinbeck uses language to show just how tragic she is, even in death. ‘All the meanness and the planning and discontent and the ache for attention’ were all gone from her face. This extract gives us clues as to what Curley’s wife what thinking while she was alive, and how much of her life these things took up. It explains her behaviour and finally makes the reader feel sorry for her, because in the rest of the book this is difficult, despite her tragically horrible situation. I think that Curley’s wife is an incredibly tragic character. The fact that she was so desperate to escape from home that she married Curley, and she was so naà ¯Ã‚ ¿Ã‚ ½ve and had no one to tell her and advise her that it was such a bad idea. Also she had no purpose in life, no one to talk to, or to love and treat her well, that she turned so sour and bitter that she ruined the few moment s of company that she could snatch at. Even the fact she is not loved and wanted by the reader and is seen as ‘trouble’. The only time her worries and problems are over is in death! These are all reasons to show to the high extent that Curley’s wife was shown to be a tragic character.

Friday, August 30, 2019

Ghost Story Essay

Examinations are tests for evaluating a student’s knowledge. The present system of education ignores the student’s individual skills and intelligence. Parents and teachers judge a student’s potential through examinations. The Indian system of education is based on the pattern set up by the British. Nothing much is taught beyond the syllabus and only examinations determine the degree or grade of a student. Various Commission, which were set up to improve this system recommended practical training and periodical tests. Cheating, leaking of question papers and other corrupt practices, that have cropped up in the examination system should be checked. the aim of education should be to equip the student to face the tough battle of life. Examinations aim at judging a student’s knowledge in a specific time frame and in analyzing whether the student has gone through a certain course of study satisfactorily. Tests enable the teacher to know how well the student has understood the subject. A good result makes the teacher as well as the parents happy. The effort of the teacher is rewarded when a student passes an examination and vice versa. Thus, a teacher’s dedication towards his profession is judged through examination. Examinations help the parents to assess their child’s capability. Parents become proud of their children when they perform well in the examinations. Students become alert when examinations are at their door step. They utilize their time for preparation. Examinations make them work hard for scoring good marks. Some schools award citations and certificate and give scholarships to those students who excel. Such awards prompt the students to work hard. Examinations help the teachers and the parents in analyzing the amount of labor put in by the students in gaining knowledge. Teaching is always followed by tests because the tests give an impression as to how well the students have understood the subject. A good result helps the teacher feel relieved at his success in imparting education to his pupils while a bad result indicates that there is a need of more effort on the teacher’s part. Thus, examinations are also a means of judging a teacher’s dedication towards his profession. With the help of the result of examinations parents can make the right assessment of their child’ caliber. If he is weak in his studies, they could guide him further in the subject. f his performance is up to the satisfaction of his parents, they would be proud of him. However, there are certain flaws in the examination system. The system of education in India is based on the pattern set up by the British. The knowledge imparted is restricted to the syllabus. Students are taught according to the prescribed syllabus. Nothing much is taught beyond the syllabus. When a student is unable to gasp a particular subject, the seeks private tuitions or enrolls himself in a coaching institute. Students tend to learn their subjects by heart, without applying their mind. Thus, cramming enables many students to pass examinations. Most students look towards their examinations with an anxious mind. They, at a very young age, begin to feel the tension and stress of examinations. Examinations are just the first in a series of tests that initiate young ones into a competitive world. But the importance attached to them is unreasonably high. During the examination period and till the result is declared, not only the students but also their parents and tutors remain tensed. It is cast as a do-or-die battle. Students do not have enough spare time for games and are unable to give wings to their hobbies due to the burden of examinations. Failure in the examination arouses a felling of low self esteem and negative self-image in the minds of the students. At times, students break down under pressure to perform and resort to extreme measures like running away from their homes or even committing suicide. Today school psychologists or school counselors give them proper advice to increase the efficiency of learning in schools and handle to pressure of examination. A positive mental state can improve one’s chances of success. Leakage of question papers, copying and cheating in examination halls have become a common affair. Bribery and other corrupt practices also have crept into the examination system. Even some of the teachers check the examination papers without assessing them properly, as a result of which students suffers. Examinations give a degree or a grade to the student. The prevailing system of education does not help the students to make their career in life or to earn a decent living. The youth who fails to get the desired percentage of marks suffer the most. In order to overcome the shortcomings present in our educational system, many Education Commissions were set up from time to time to suggest changes in the pattern. Action on their suggestions Central Board of Secondary Education and other State Boards of Secondary Education decided to introduce a separate steam of vocational education. According to Educational experts, ongoing evaluation is more effective than board examinations. They have recommended that Class X examinations be made mandatory only for those who want to opt out of formal education. Further, it has been suggested that class XII examination be staggered over a two-year period. They have recommended the need for a new pattern which would impart education thought training. Educational experts feel that the educational system being obsolete and redundant is not serving the purpose of educating the youth. They have felt the need to evaluate a student’s performance during the whole year. This could make the examination system more acceptable. According to the new method adopted by many public schools, examinations would remain a part and parcel of the education system. However, periodic tests will be held at regular intervals. The syllabus would include practice exercise at the end of each lesson. This will help the student in grasping the subject matter properly. The aim of education should be to equip the student for the tough battle of life, build his character and personality, widen his sphere of knowledge and qualify him for employment. The student should not only be taught lessons from books but also lessons from practical life. The educational system should not only be theoretical and academic but also give practical knowledge. Students should not be encouraged for rote learning. Projects and term papers may encourage an engagement with the subject matter and are more likely to add sum and substance to a student’s knowledge base. When History, Geography and Maths are reduced to mere digits on a mark sheet, they cease to inspire, give joy, or nurture the faculty of inquiry. Nevertheless, the system of examination, prevalent for centuries, cannot be changed overnight. It will take some time to change the system. While this transition take place, the corrupt practices, cheating and leakage of question papers related to examinations should be checked. Parents should not make their love conditional to the performance of their children in the examinations. Their expectation level should be reasonable. With this and with the revised system of education, examination will prove beneficial for the students. Good health is a boon. It is the real jewel of life, the most precious possession of man. If a man losses his health, the world losses all it § charms for him. A good wealth of health can be obtained in a number of ways. It needs regular exercise, good food, good thoughts, and cleanliness. A healthy person does not spend money on medicines and visiting doctors. Just opposite, a sluggish person is another form of hell of diseases. The simplest and most traditional definition of health is that it is the freedom of sickness and diseases. According to World Health Organisation (WHO), a branch of the United Nations, health is physical, mental and social well being and not merely the absence of disease. Next to life itself, good health is the most precious gift and is necessary for a purposeful existence. ‘Sound mind in a sound body’ is an old saying. Healthy persons can work for long hours without getting tired. They can enjoy all the pleasures of life, whereas unhealthy pe rsons can’t. The world has no charm for them. They are always worried due to their physical complications. Wealth has no importance for them. To keep good health no money is needed. It can be achieved only through our efforts and proper health care. We can maintain good health only if we are aware of various factors which affect our health. There are certain things which are essential for keeping our body free from diseases. Nutritious food comes first. We should takeVpnly that food which has nutritious value. Some regularity in life is also important for good health. We should get up early in the morning, go out for a walk, breathe in fresh air to keep our lungs clean and in good order, and take brisk walk, move arms while walking. Maintaining clean habits is also important in this regard. If we don’t take bath regularly, don’t wear clean clothes, don’t eat fresh food, we may develop physical complications in the long run. Hence regularities, good habits and cleanliness have great value in maintaining good health. Balancing sleep and rest are also useful in this regard. We know that a great deal of the waste matter in our bodies escaped by means of the skin, which contains many millions of tiny drainpipes called ‘pores’. If we neglect keeping our bodies clean, these pores get choked up and the waste matter cannot escape. Hence we must keep this important point in our mind and do accordingly. Laughter is the best medicine of good health. So, we should keep calm by overcoming anger, greed, fear, envy and enmity. Life of a healthy man is his long lasting wealth. It makes him able to enjoy life to the full. Those who are wealthy may not always be healthy but the healthy people are always wealthy. Sayings about health and wealth have been noted throughout time. Benjamin Franklin was quoted as saying, â€Å"Early to bed and early to rise makes a man healthy, wealthy, and wise.† This has been a popular saying for centuries. The saying health is wealth may also inspire the belief that without good health, a wealthy man cannot fully enjoy his riches. Conversely, a healthy individual has the potential to achieve his goals. An individual in excellent health may have the ability to become wealthy, but a person who is ailing may never have the opportunity to bring his dreams to life. When a quote or saying becomes widely used and extremely popular, it generally tends to be passed on throughout the years. Health is wealth is one of those sayings that has remained popular for many years. In the study of language and humanities, the common phrase health is wealth can be classified as a mainstay expression. Quotes have been coined from many philosophers and authors throughout history. Health is wealth may be known as a phrase, a saying, or an expression. Another saying or expression that has similar meaning is â€Å"When you have your health, you have everything.† This saying means that the healthy individual is extremely wealthy in a fundamental way.

Adult Learning Theory on Healthcare Organizations

Healthcare organizations need regular updates on their instructional designs on their employees and staff. This instructional designs or curriculums are much needed to inform the manpower of the organization on recent developments on technologies and applications on cases and situations, new regulations needed to be implemented or any other pertinent information for the organization’s and its staff’s needs to know.However, the method of educating the staff, whom majority are already on their adult stage, should be effective for them, and for the company. One applicable theory on educating the adult is Malcolm Knowles’ theory of andragogy.  It outlines effective methodologies for adult learning. On his theory, adults need to know why they should learn. On this case, the educator or administrator of the organization should make it a point that the staff understood the importance of the new information they should learn. Moreover, adults tend to ask when and where they will be able to use their new learning on real-life situations.Again, the educator should explain that the series of discussions to be made is for their self-improvement inside the organization towards the company’s goal and vision. Finally, adult learners should be well motivated on their new experience and learning. Incentives such as increased, self-esteem, job satisfaction and quality of life are significant in giving adults a basis to learn.  The various methodologies on adult learning and adult education are important for every educator. They should be also be knowledgeable on different approaches and techniques on educating an adult. Knowles’ theory is imperative for an educator developing an educational program so that we can address the consistent growing demands of adult education.ReferenceHolton, E. F., Swanson, D. A., & Knowles, M. S. (2005). The Adult Learner.Butterworth-Heinemann

Thursday, August 29, 2019

History of Buffalo Research Paper Example | Topics and Well Written Essays - 1250 words

History of Buffalo - Research Paper Example It led to the decline in the Buffalo commercial industry, and by 1990, the town resembled the 1900 regarding population. Today, the main economic sectors concentrate on health care and education (Laura, 81). They are on an upward trend even with the slump in the country’s economy. The retail industry is strong because of the low costs and taxes, which has attracted Canadian shoppers. In 2011, Buffalo’s unemployment rate was at 7.3%, and Forbes magazine rated Buffalo as the 10th best location to raise a family in America. The Rise and fall of the Buffalo Economy The rise of the Buffalo manufacturing industry started from the inception of the Erie Canal, which was established in 1825. The canal provided an avenue for merchants and traders to venture into the region and establish a trading hub, which fostered the growth of the manufacturing industry. The latter was aided by the use of hydropower to supply the city with a large volume of energy, which was sufficient to sust ain the region and develop the steel industry. At the turn of the 20th century, the Niagara River was utilized as a source of hydroelectric power, which benefited the local mills. The strategy became significant in the region, with Buffalo earning the title ‘City of Light’, because of widespread electricity. ... They reopened their plant in 1940, in order to manufacture ammunition for the US army for the war period. The steel industry had grown because of the supply of resources through trading from the Erie Canal. The manufacturing industry centered on the use of steel and other metal in the development of products in the region, which served to increase the popularity of the town. The availability of steel in Buffalo meant that the region was an industry haven, and there was diversity in relation to product development based on metal use (Laura, 83). Steel is the main source of revenue for the region, after the development or use of the Niagara Falls as a source of power (electricity). Car industries would to Buffalo as the ideal location to set up manufacturing plants, because of their trading routes, which provided trading of various items and resources to push or sustain the manufacturing sector. The economy took a dive in the mid 1900s because of the opening of St. Lawrence Seaway. It diverted many trade routes from Buffalo, which limited the level of trade in the region causing deindustrialization in Buffalo. The trading provided the platform for suburb development, but the diversion of the trade led to the deterioration of the development. By 1950, the Buffalo population had peaked to over half a million individuals. Buffalo had become the 15th largest city in the country (United States), but the new seaway saw the population drop by 50%, as industries began to shutdown. It was the demise of the Buffalo economy. (Bisco, 34) Even with the development of the railroad system, the availability of steel became a problem for the region, which

Wednesday, August 28, 2019

MSc Practical UNIX Security ''LDAP'' Essay Example | Topics and Well Written Essays - 2000 words

MSc Practical UNIX Security ''LDAP'' - Essay Example The Light Weight Directory Access Protocol is a communication standard that provides a communication channel for the clients within a directory service. A comprehensive definition of LDAP is defined as â€Å"Lightweight Directory Access Protocol, a protocol which helps find people, computers and other resources on a network. Designed to work with existing address-book standards and improve compatibility between widely differing systems, the ldap standard was adopted by the ietf in 1997 and now forms the basis of many white-page directories on the web. It has also been incorporated directly into some software programs and operating systems, making it possible to find e-mail addresses without visiting a directory site† (Ldap. 2003). LDAP was established after X.500 protocol, which was also a directory service standard protocol. ... Active directory is â€Å"an implementation of LDAP directory services by Microsoft for use in Windows environments. Active Directory allows administrators to assign enterprise-wide policies, deploy programs to many computers, and apply critical updates to an entire organization. An Active Directory stores information and settings relating to an organization in a central, organized, accessible database. Active Directory networks can vary from a small installation with a few hundred objects, to a large installation with millions of objects† (Active Directory. 2007). Few checklists are applicable including the network connectivity testing and raising the Active directory domain functional level to Windows 2003. Moreover, for Linux / UNIX, ‘identity management module’ installation is required on the domain controller along with the configuration of NIS server. LDAP Account Management In order to manage account in the UNIX network environment, the Unix systems are con figured with Microsoft Active directory for centralized management of user accounts. Moreover, it also solidify network security by integrating role based access and Kereberized authentication. Consequently, the operational cost is minimized, for the management of UNIX accounts. Moreover, UNIX contains various features for authentication and authorization. The authentication is concerned with user authenticity and authorization is related to ensure that users have been granted to perform tasks. However, there are some issues associated with UNIX account management: Synchronization is not properly conducted Vulnerabilities related to NIS Operating on LDAP services without multiple platform support Standardized management for

Tuesday, August 27, 2019

The obsession of medical science Essay Example | Topics and Well Written Essays - 1000 words

The obsession of medical science - Essay Example We have an obsession with scientific methods and we sometimes try to overcomplicate certain issues and pregnancies are one of these issues. This perception is ill founded and in this essay arguments will be given as to why midwives can be more helpful than Obstetricians in the American maternity health care system. What is the difference between Obstetricians and Midwives? An obstetrician is a person who is a medical expert in child births and labor issues. These are people who have taken formal professional education of medical science and have knowledge of surgery. Midwives on the other hand are only equipped with handling low risk pregnancies. Midwives deals with the process of child birth and aim at natural process of child birth. A midwife is generally expected to complete a few courses on pregnancy and child birth but they cannot treat child illnesses. The specifically deal with child birth and pregnancies. There is a difference in the child birth philosophy of midwives and obs tetricians. Midwives consider child birth as a natural process and they have a natural perspective on pregnancies. Obstetricians have a medical perspective and view child birth as a medical risk. Pros and Cons of Obstetricians The major benefit of obstetricians is that they receive formal professional education with regards to child birth and labor procedure. They are medical expert and are aware of the functions of other body parts. They have in-depth knowledge about the human body therefore they can perform complex child births. Obstetricians can also perform surgical procedures like a cesarean which midwives cannot. High risk pregnancies can be handled by an obstetrician and not a midwife. Sometimes the mother has heart problem or diabetes so such child births are better taken care of by obstetricians. The most significant disadvantage of obstetricians is that they have a medical science perspective that views child birth as a risk and not a natural process. Therefore they are mo re inclined to use surgical procedures when there is no need of it. There is also a shortage of obstetricians therefore they are not able to focus on one pregnancy and this can sometimes lead to complications. Marsden Wagner says â€Å"In USA obstetrician plates are full to overflowing† (pp.6). They are so busy that they find it hard to concentrate on a particular case. In this regard a midwife does better as she spends more time with the mother. Pros and Cons of Midwives Midwives provide services that are monetarily affordable by people. They charge far lesser than an obstetrician for their services and this makes them more attractive to gynecologists. The medical philosophy of midwives allows them to view child birth as a natural process and not as a medical risk. This allows them to think differently from obstetricians and they can rely on natural methods. They also give considerable time to their patients so this allows them to understand the patient in a better way. Midw ives can perform child births in homes. This is an added advantage as valuable time is not lost in bringing the patient to the hospital. The lack of medical knowledge serves as a disadvantage for midwives. Any complication during a child birth cannot be solved by midwives. They are also oblivious to the current trend of medicine and in case of an

Monday, August 26, 2019

Supply chain operations and concepts Research Paper

Supply chain operations and concepts - Research Paper Example his endeavor, the rise of the computer age has provided some tools that reduce the level of paperwork in the supply chain while it has also blown apart many of the preconceived ideas regarding territory and boundary. Now, not only are companies attempting to compete with regional and national firms, but must also fend off the advances of international organizations while attempting to gain footholds in new countries. This introduces differing sets of criteria for the supply chain manager including the production of products, governmental regulations or specifications and available technology or resources each of which must be addressed before a product can be offered in a new or old market. To help cope with these multiple concurrent concerns, operations managers and scientists have developed a wide range of strategy sets that are capable of addressing each concern independently or a variety of concerns concurrently depending upon the operation of the firm which is further defined by the type of product produced and the methods by which it is created and delivered. Supply chain management encompasses the planning and management of all activities involved in sourcing and procurement, conversion and all logistics management behaviors. It also includes coordination and collaboration with channel partners, which can be suppliers, intermediaries, third-party service providers or customers. In essence, supply chain management integrates supply and demand management within and across companies. Logistics management is the element of supply chain management that plans, implements and controls the efficient forward and reverse flow and storage of goods, services and related information between the point of origin and the point of consumption in order to meet customers’ requirements (College of Business Administration, 2005). Many types of businesses and organizations most likely to employ supply chain managers include communication, consulting, military,

Sunday, August 25, 2019

What do subcultural theories have to offer our understanding of youth Essay

What do subcultural theories have to offer our understanding of youth crime - Essay Example You wonder why kids, especially the male gender before 18 years of age already have a bad reputation from school, which the criminal courts can also support. These young people already understand their cultural values and what their society upholds to be morally right and wrong, yet they go against it to prove it wrong. They form independent social structures, in which they set their own rules and conduct activities to satisfy their ambitions. Sub-cultural theories have put forward motives that drive most of the young people into crime and deviance. Lynch (2000) mentioned that crime does not necessarily happen because people have been imperfectly socialized, but instead occur, for they get to be socialized in a deviant group and learn its values. Their formulated values and beliefs are what they use to justify their illegal conduct in the midst of the dominant culture. It is the desire for most people to achieve and live the American dream in their lifetime. Acquiring wealth and living a satisfactory life seems challenging and only few in the society have managed that. Although people can get a good salary, the life standard has gone up increasing the expenses incurred. This puts a barrier between the rich and the poor in the society, which determines their power to access their needs and their position in the society. According to Vito, Maahs and Holmes, the American sub cultural theories stem out of anomie and social disorganisation perspective; focusing on the lower class in the society, and the formation and activities that explain the delinquent subcultures (2007, p. 160). The concept of psychological strain on the lower social group in their state of idleness and poverty, make the people to look for alternative means to sustain their lives. Often, it is possible to see states and countries that have low economic and safety nets than others, which have high crime rates. The chances of economic and socially powerful families

Saturday, August 24, 2019

Global Financial Crisis in Context Essay Example | Topics and Well Written Essays - 1500 words

Global Financial Crisis in Context - Essay Example There is the general consensus across the globe that the 2007-2010 global financial crisis (GFC) is the worst to have hit the world economies ever since the famous Great Depression during the 1030s. To some this crisis has grown to be known as the Great Recession of the time. One of the notable effects of the recent global financial crisis was brought to the fore in terms of failure by the world’s key businesses, significant decline in the wealth among consumers, as well as massive financial commitments by the various governments. In the overall, the aforementioned effects culminated into significant reduction in the economic activities amongst nations. The said financial crisis has its cradle in the bursting of America’s housing bubble. In particular, this housing bubble experienced its peak during the 2005- 2006 period. Immediately afterwards, there was a general increase in the Adjustable Rate Mortgages (ARM) and subprime default rates. As it is put forward by Taylor and Akila, (2009), a resultant increase in incentives of loans for example, simple easy terms as well as long-term trend of increasing prices of housing. As a result, borrowers had been motivated to take difficult mortgages with the hope of being able to quickly refinance them at favorable terms. However, with the increasing interest rates, prices of housing began to drop although moderately during the 2006-2007 period in several parts of the United States of America. Consequently, refinancing became much more difficult. This provided the much needed impetus to the increase in foreclosures and defaults due to the expiry of the simple initial terms.

Friday, August 23, 2019

Globalization and Employment Relations Essay Example | Topics and Well Written Essays - 2500 words

Globalization and Employment Relations - Essay Example A peek into their social and political structure from the beginning of the twentieth century to today's fast paced world and also a study of the hypothesis of convergence will help us in making definite conclusions about the subject. Katz evaluates three hypotheses that have been suggested to explain the trend towards decentralized bargaining: first, shifts in bargaining power from unions to employers; second, the emergence of new forms of work organization, which put a premium on flexibility and employee participation; and third, the decentralization of corporate structures and diversification of worker preferences. Katz concludes that the second hypothesis is the most convincing, on the grounds that labour and management appear to have gained distinct advantages from work restructuring that accomplished decentralization. However, shifts in bargaining power, as well as the diversification of corporate and worker interests, are important contributing factors to the decentralization process. Sweden became an industrial society later when compared to most other countries in Europe. At the start of the 20th century, Sweden was a poor agrarian society with high emigration rate. It is now a relatively wealthy, welfare-oriented, service society. Sweden has 25% of its civilian workforce employed in industry, only 2.4% are still in agriculture, while 73% are in services, partly as a result of the strong growth of local and regional government since the 1960s. Swedish employment relations have long fascinated foreign observers. With a total population of 9 million and with 4.4 million in labour force, Sweden is the smallest of the countries in Europe. However, 76% of its women are in the labour force which is the highest female participation rate of any OECD country. Employment relations in Sweden have passed through three broad stages since the nineteenth century. The beginning of the union movement was the first stage, which lasted from the 1890s to 1930s.Unions were established during this period and there were disputes between the capitalists and the laborers. The government was either passive or supported the capitalists. The second stage was approximately from mid-1930s to the early 1970s. The 'Swedish model' was established during this period, with a low level of industrial conflict, a 'solidaristic' wage policy, an active labour market policy and labour-management cooperation. An economic policy reliant on economic growth subsumed many of the pay-related problems for the unions and paved way for a pattern of employment relations with few industrial disputes. Emergence of a third stage can be traced to the 1970s. More radical union ambitions, the election of a non-socialist government in 1976 severe economic problems, and a strategy based on free enterprise and a market economy, on the employer side, represented significant changes. The 1980 dispute symbolized these developments. Wage earner funds were introduced after a bitter conflict, but were not seen as a complete victory by the unions. The wage earner fund system became a political burden for the Social Democratic Party and did not result in a basic change in Sweden's economic system. The employers tried to reverse the trend as much as

Thursday, August 22, 2019

Ecotourism in Washington DC Essay Example | Topics and Well Written Essays - 1000 words

Ecotourism in Washington DC - Essay Example The organization has some strategies, which are put in place for ensuring that the environment upon which it exists is sustainable and at the same time, the environment is upheld in the expected way. One of the ways through which this is done is with regards to the disposal of wastes that come from the institution. This is especially bearing in mind that most of the disposable products which come to the environment may be of danger to the environment and the people in it. These elements, according to the institution ought to be disposed in a manner, which will bring about the upholding of proper environmental standards within and around the institution. The institution also supports the aspect of practices, which bring about developments in the community in which it exists. In the course of people ought lives there to be the aspect of giving back to the society. This is because there are benefits, which people realize, and it would be beneficial to let other people also share these b enefits. The main intention of volunteering is for the purpose of bringing improvements to the lives of people. One thing, which should be noted, is that the act of volunteering can also be regarded as a way of serving the community. There are various ways through which voluntary services can be realized in a community. This may be done on an individual level or as a group. In the present world, voluntary services have moved from just an act, which is conducted by individuals as opposed to back in the days. Currently, organizations also engage in the acts that are meant to bring about service and benefit to the community. In the corporate world, this may be termed as corporate social responsibility. Which such organizations can bring about the elements that are associated with volunteering through various ways. For example, these individuals may opt to visit places where there exist less fortunate individuals. Another way that this can be made possible is by sharing things, which wi ll be beneficial to the recipients of the voluntary service. These acts are majorly to do with organizations and firms that want to engage in such services. Likewise, there is the aspect to do with personal feeling, which a person gets to experience at the thought of having volunteered something for the purpose of helping another person. Through voluntary activities. lives can be changed. This change is not only experienced by the people receiving the service. There is also the personal gratifying feeling, which the person giving the service receives. These are some of the things, which the organization greatly supports. The main idea is that there ought to be the development of the individual person, the environment and the community in general. With these revelations, there are various programs, which the organization is in support of. These are majorly those, which assist the young children and the old people in the society. In this case, the charity organizations will be orphana ges and houses for the elderly. Some of the ways through this assistance is realized is through the provision of health services and other services that will lead to the bettering of the lives of the people therein. Similarly, the organization engages in interactive days where

Understanding of the Old Testament Essay Example for Free

Understanding of the Old Testament Essay To what extent does archaeology inform us about our understanding of the Old Testament? The Jewish scriptures that made up the Old Testament were written over a period of a hundred years during a time when the Israelites were established and prosperous, but also during the times when the whole religion and lifestyle were under threat throughout exiles and national crises. Biblical scholars study the evidence within the scriptures themselves and also use other resources such as prehistoric documents and archaeological findings in order to inform us more thoroughly about the Old Testament. Archaeology is a modern science calling for much patience and skill. Generally speaking there are three kinds of archaeology. The first is ruins of buildings, homes, temples and fortifications. These reveal culture, worship, social structure and manner of life. The second is artefacts, pots, lamps, weapons and ornaments. These reveal something about wealth and culture. The third is inscriptions, also known as epigraphic material. This reveals what people wrote about. We have to be cautious about what archaeology can prove. From reading ancient texts, scholars can not always tell whether it is true or not. We can simply tell what the writer of the text wanted the world to believe. Archaeology can help to provide evidence that an event happened, but it cannot always show why it happened nor who was involved. Therefore it is most useful for corroboration. Through archaeology scholars can discover more about the times in which people in the Bible lived. What importance did they have as a nation among other nations? What were their everyday lives like? What animals did they keep? What did they eat? How did they trade? What were their social habits and family interactions? What was the nature of the other religions by which they were surrounded when Judaism was first beginning and much more? One of the main reasons scholars look for archaeological evidence is due to an issue that causes the most controversy- whether the events described really happened. For many people who are strong believers this is not an issue for them as the Bible, which is the Word of God is thought to them to be more true than any other foundation of information, so therefore the events portrayed in the Bible are true to them. If there is no outside evidence to support this, or discoveries of scholars contradict what the Bible says, then the Bible remains true to the believers as the people investigating the evidence are thought to be able to be fallible whereas for the believers, the Bible is not. Many people are also willing to accept that some of the Bibles accounts are true in a theological rather than a historical sense. However, it is argued that the accuracy of the historical accounts might have been sacrificed in order to put emphasis on the theological point. It is very difficult for events in the Old Testament to be accurately dated for many reasons. The main reason is that many of the written records have not survived. This is because many of the texts were written on insubstantial materials and the climate was not particularly dry and therefore could not preserve the texts. Another reason is that much of the Old Testament originated as oral traditions rather than written, which means whilst being passed on from one person to another, the real translation could have sometimes been changed through misunderstanding or false impression. This makes it extremely difficult for scholars to work out which parts are historically correct and which are not as elements may have been removed or added. Texts occasionally referred to features which were thought to be of a later date than the story itself and therefore scholars have to decide if the older parts of a narrative were correct or had been altered. Biblical writers also often exaggerated wha t was written in order to express that someone was particularly blessed by God. This means scholars have to make informed guesses where they do not know facts, which means they can easily make mistakes in accuracy as well as writing according to their own biases. A final reason why the Bible cannot be accurately dated is because Biblical writers primary purpose was not to write an accurate historical record. Their main interest was to illustrate the relationship between God and humanity, particularly the relationship between God and his chosen people, Israel. This meant important rulers and political events of global importance, which could give the Bible definite dates if they were mentioned in the texts, were ignored because they did not show any relevance for religious faith. Some people dispute that a date from the Bible can be found using the text itself as many do believe the Bible is historically accurate and reliable as the Bible is inspired by God. However, for many scholars this is thought to be very unreliable. As well as using documents to attempt to place the Bible in historical context, archaeologists have searched for evidence of the existence of cities and buildings mentioned in Biblical stories. Since the First World War, scholars have used archaeology to discover more reliable sources about events that were said to have happened in the Old Testament. For example, excavations on the southern bank of the river Euphrates in Syria revealed the existence of a city called Mari. From this city, archaeologists found cuneiform (wedge-shaped writing of ancient civilisations) tablets dating from the nineteenth and eighteenth centuries BC. They provided a wealth of information containing economic factors which helped scholars to understand the ways in which people lived in the Middle Bronze Age. In the past, thousands of tablets covered with cuneiform have been discovered. They provide information about the Biblical world before 100 BC. After that time alphabets with letters not made up of combinations of triangles begin to emerge and we are on our way to the Hebrew script known to Biblical scholars. Names found through archaeology can provide more clues to the dating or geographical setting of particular events in the Old Testament because when scholars find evidence of other people with comparable names to those of characters in the Bible, it can suggest a background for the Biblical writings. To conclude, archaeology can help to inform us more about events that happened in the Old Testament and help us understand what happened and who was involved more than we already do. However, we cannot always rely on archaeology to inform our understanding of the Old Testament as archaeologists and scholars do not always know the truth behind evidence found, they are only able to use what they see with their own eyes and make educated guesses with what they already know.

Wednesday, August 21, 2019

The Forms Of Femininity In Shakespeare English Literature Essay

The Forms Of Femininity In Shakespeare English Literature Essay Many modern critics claim that Shakespeare was a pioneering feminist. Shapiro claimed that Shakespeare was the noblest feminist of them all (Shapiro,1994,p111). Whilst this claim is supported by various Shakespearean works, this essay will consider that whilst his works can be interpreted as displaying feminist attitudes, whether these females are punished for displaying this transgressive behaviour. Over the centuries various empires and societies, such as classical Rome and ancient Egypt, were been built upon the foundation of a patriarchal society. These societies were sustained through the oppression of women, as they were continually treated as second class citizens, which pushed women towards acts of rebellion when they felt particularly mistreated. These settings therefore made an excellent backdrop for Shakespeare to project the attitudes of a male-dominated seventeenth century society. This technique occurs throughout Shakespeares plays, but is particularly evident in Titus Andronicus, where Tamora is motivated to act against a patriarchal society by the restrictions that she is forced to adhere to. Her actions are then punished by further repression, depicting the infectiveness of her actions against the dominant patriarchal order. Antony and Cleopatra also illustrates this battle of femininity against a patriarchal society, using Romans once again to represent the domineering male force. Shakespeare allows both Antony and Cleopatra to break free from their stereotypical roles by inverting their genders, to create two characters that possess traits from both sexes; so they refuse to fit into their traditional roles. Lastly I will look at Gertrude in the Hamlet, where Shakespeare depicts the effects of one womans transgressive actions on the patriarchal order. To appreciate why the actions of women in these plays are so subversive, and to comprehend the reactions of the male characters in the plays, it is vital to understand the position of women in Shakespeares society. Despite that both of Shakespeares plays were not set in the seventeenth century, his depiction of women would have been influenced by the society in which he lived. The general view was that there was a hierarchy of genders, with males at the top, in Miltons words Not equal, as their sex not equal seemed (Milton, 2008, p41). Society established woman as weaker, inferior and in need of masculine guidance and this was voiced as firmly by women, as by men (Keeble,1994,106). This essay will portray how the female characters transgressed from their stereotypical roles, and consider how and more intriguingly, why, these characters were punished for their perceived transgression. Shakespeares Antony and Cleopatra is believed to have been written in 1606 after a distinguished sequence of tragedies including Othello, King Lear and Macbeth (Farrell, 2004, p23). Shakespeare uses the play to consider the effects of a patriarchal society, and skilfully inverts gender roles so that it is the male, Antony, that is the victim. The patriarchal society of Rome expects Antony to only display his masculinity, and not to succumb to feminine qualities such as passion, feelings and love. When he develops a powerful love for Cleopatra, Antony is no longer able to abide by the stifling society, where the role of lover is considered inferior to a mans political responsibilities. The opening lines of the play demonstrates the rising disapproval of Antonys unconventional, or feminine, behaviour which is not confined within the measure of patriarchy, Nay but this dotage of our Generals / Oerflows the measure (Shakespeare, 2001,1.1.56). The males view Antonys dedication to Cleopatra as disgraceful, His captains heart become the bellows and the fan / To cool a gipsys lust (Shakespeare, 2001, 1.1.22). Antony also occasionally judges himself by these standards of patriarchy, such as at the end of the play where he is miserable and shamed by his reduced political power. He then becomes envious and irrational and claims that Cleopatra has emasculated him, O thy vile lady, / She has robbed me of my sword (Shakespeare, 2001, 4.14.2). Eventually Antony chooses love over political power, as Antony is not debased by his loss of power, but rather, through his love of Cleopatra develops a stronger sense of manhood, ran alternative masculinity(Woodbridge,1994,p34). However the reaction of the males within the Roman society shows that this feminine transgression is not suitable for a male in a patriarchal society. Whilst Antony displays feminine characteristics, Cleopatra transgresses her female role by exhibiting masculine virtues to counterbalance Antony and provide a relationship of surprising equality. Cleopatra, and the relationship, does not abide by the restrictions of a seventeenth century, patriarchal society. Their relationship blurs the roles of male and female by inverting gender roles, Cleopatra embraces masculine features, as Woodbridge states, Antony and Cleopatra can cross gender boundaries without losing their sex roles as man or woman (Woodbridge,1994,p45). This gender inversion is physically depicted in the scene where Cleopatra, wore his sword Philipan(Shakespeare, 2001, 2.5.30), this displays how Shakespeare clearly identifies masculine qualities within a female. Unlike many of Shakespeares female characters, Cleopatra dominates the play in terms of individual presence and theme. Also Shakespeare provided the audience with a real woman, as opposed to a stereotype, Velma Ri chmond claims further that in Cleopatra we can find Shakespeares finest embracing of the feminine(Richmond, 1991, p139). Cleopatra is a mixture of political prowess and sexual power; however this sexuality is condemned by the males in the play as she is referred to as a whore (Shakespeare, 2001, 1.1.1.32) and a strumpet (Shakespeare, 2001, 1.1.1.32) throughout the play. However this sexual power is presented positively on occasion, such as Enorbarbuss description of her: Age cannot wither her,   Nor custom stale her infinite variety. Other women cloy   The appetites they feed, but she makes hungry Where most she satisfies. For vilest things   Become themselves in her, that the holy priests Bless she is riggish. (Shakespeare, 2001, 2.2.43). Cleopatra declines to obey to the stereotype of a woman created by a patriarchal society, and uses her natural sexuality to gain power rather than allow it to be detrimental to her character. She also is intent on accomplishing a political role, despite the objections of the patriarchal men. This is clearly depicted when Enoebarbus attempts to stop her from carrying out her political role, and Cleopatra responds in a furious tirade: A charge we bear ithwar, And as the president of my kingdom will Appear there for a man. Speak not against it. I will not stay behind (Shakespeare, 3.4.44) Cleopatra therefore forces her admittance into the male arena against the wishes of the patriarchal society. Obedience and silence were very much part of the patriarchal conception of femininity, a conception of which Cleopatra refuses to adhere to. She contrasts the traditional silent woman; Cleopatra ensures that her voice is heard. She mocks Antony and quarrels with him. Challenging him with a masculine aggression when they argue I would I had thine inches. Thou shouldst know/ There were a heart in Egypt(Shakespeare, 2001, 1.3.10). Spirited and passionate, such displays of assertion as her physical attack on the messenger informing her of Antonys marriage to Octavia are a far cry from the passive silent role of the feminine in patriarchal society. In passionate disbelief and anger, she draws a knife on the messenger and strikes him with her bare hands. Charmian tries to appease her by telling her Good madam keep yourself within yourself (Shakespeare, 2001, 2.5.55), but Cleopatra e scapes the bounds of self-composure and the repression of self-hood. Shakespeare uses Cleopatras death to portray her final act of disobedience against the patriarchal society, as she emphasizes her individual identity. Her death develops into a victory over Caesar, who symbolises patriarchal Rome, as when the guard is confronted with the sight of her death he exclaims Caesars beguiled(Shakespeare, 2001, 5.2.33). Cleopatras death allows her to rise above the repression of society; she embraces her death as positive rather than with sadness: My desolation does begin to make a better life . . . And it is great   To do that thing that ends all other deeds, Which shackles accidents and bolts up change (Shakespeare, 2001, 5.2.76) Even in death Cleopatra merges both feminine and masculine features, as she declares to take on male qualities of rationality and strength, I have nothing of woman in me. Now from head to foot/ I am marble constant (Shakespeare, 2001, 5.1.22). She chooses to reject the traditional feminine qualities of water and the changeability of the moon (Ott,2001,p21) and changes herself into air and fire (Shakespeare,2001, 5.1.43). Therefore she embraces masculinity and Rome by dying in the True Roman fashion (Ott,2001,p20). However Shakespeare is also able to illustrate her portrayal of the power of womanhood, by adapting the image of death into a portrait of sensuality and motherhood. The pain that she suffers is described as a lovers pinch (Shakespeare, 2001, 5.1.10) and the asp is depicted as a baby at my breast/That sucks the nurse asleep (Shakespeare, 2001, 5.1.9). Her death is so poignant that even Caesar, the symbol of patriarchy, acknowledges her valour and the irrefutable dignity of the woman who Took her own way (Shakespeare, 2001, 5.1.68). This representation of womanhood shows how Cleopatra transcends the stereotype of women in Shakespeares time. Despite that she meets her death at the end of the play; Shakespeare ensures that her mixture of masculine and femininity is ultimately respected by Caesar. She escapes punishment for displaying masculine traits, and hence transgressing her role of female, by having the power to take her own life. The respect shown by Caesar is perhaps Shakespeares own view, that this woman, who refuses to abide by the role that a patriarchal society has given her, should be admired. The description throughout the play of Cleopatra shows her in a strong and positive light In Titus Andronicus, the character Tamora does not abide by the role of a proper woman in a seventeenth century society. Tamora feels as though she has been ill-treated and repressed by the acts of a patriarchal society. Her actions in the play are an attempt to gain some kind of equality, however ultimately she meets her death as a consequence, perhaps proving the futility of such resistance in a male dominated landscape. The death of Tamoras son Arlarbus, we have performed/Our Roman rites: Alarbus limbs are lopped/And entrails feed the sacrificing fire (Shakespeare, 2001, 1.1.145) serves as the basis of the plot, as Tamora plots her revenge on Titus for this act of barbarity. However Tamora must establish herself within the patriarchal society to gain the necessary power to exact her revenge. This movement corresponds to the masculinisation of her character; as Lavinia says to her O Tamora, thou bearest a womans face, before being interrupted (Shakespeare, 2001. 2.2.135). This disruption of normative gender traits in part relates to the threat Tamora poses as a sexually experienced woman, compared to the submissive Lavinia. This factor, combined with her visibly feminine position as a mother, leads Titus to form his unique, cannibalistic strategy for revenge. The insult that Lavinia throws at Tamora is based upon the presumption of a binary system (Ott, 2001, p77). Lavinia is the obvious stereotypica l female; this is evident from the beginning of the play where she is the victim of a patriarchal struggle and the bargaining chip (Ott, 2001, p77) in a matrimonial dispute. Tamora contrasts Lavinia, in that she possesses the sexuality and body of a woman, but as revenge consumes her she abandons the restrictions placed upon her and transgresses her feminine role. Tamora and Lavinia serve as polar opposite representations of women, the active Tamora and the passive Lavinia. Shakespeare effectively gives a platform to question gender identity within the play: When agreed-upon identities or agreed-upon dialogic structures, through which already established identities are communicated, no longer constitute the theme or subject of politics, then identities can come into being and dissolve depending on the concrete practices that constitute them (Butler,2004, p28) This is relatable to Tamora as her character is a stereotypical woman that has been unhinged by her vengeful actions. The obedient identities, which come into being and dissolve(Butler, 2004,p28), rely upon the supposition of other characters; most strongly in the character of Tamora, as the volatile nature of her character is shown to be based upon her visual female features, and the performative expectations set upon her as a woman. According to Butlers theory the continuing violence and vengeance compromise the concrete practices that create identity. The incessant compliance to the female role shown by Lavinia, after her rape and maiming, seal her fate as she is killed by Titus at the end of the play. Whilst Tamoras choice to refuse the female role ensures that she meets a similarly grisly fate. Shakespeare uses both female characters as bodies on which he can project the power of a patriarchal society upon, as Tamoras rejection of it is contrasted to Lavinias acceptance of it. Tamoras clearest rejection of the patriarchal society is her sexual freedom, as Renaissance society viewed women as possessed of a powerful, potentially disruptive sexuality (Henderson, 1985, p66). An example of this disruptive power is when she gives birth to a child fathered by Aaron, the child is described as as loathsome as a toad/Amongst the fair-faced breeders of our clime, (Shakespeare, 2001, 4.2.59). This suggests that the child has a mixed ethnicity; her transgressive actions are damned by the patriarchal society: DEMETRIUS: By this our mother is for ever shamed. CHIRON: Rome will despise her for this foul escape. NURSE: The emperor in his rage will doom her death. (Shakespeare, 2001, 4.2.111) Society may have had a different reaction if Saturninus had been culpable of having a secret child, however as Tamora has shown her sexual freedom through her actions, she will be condemned. Her promiscuity marks her as a threat to the male controlled society as it signifies that she will not allow a man, or society to control her. Her control over men is demonstrated repeatedly as she manipulates Saturninus, Aaron and her sons. Her affair with Aaron is a direct attack against the oppression the Romans would attempt to force on her. Tamoras reaction to her newborn son is a fascinating example of female independence; she realizes the danger that giving birth to a mixed race, bastard child will place her in and she refuses to be caught in this trap. Tamora instead opts to save herself, by sacrificing her child, The empress sends it thee, thy stamp, thy seal/ And bids thee christen it with thy daggers point (Shakespeare, 2001,4.2.61); while this action seems cruel and heartless it is st ill a self-governing move. Women were expected to be wives and mothers, and a womans child should be her most cherished possession In Titus Andronicus Shakespeare uses both of the main females bodies as physical metaphors for the dominance of males in society. Lavinias body is used as an inscriptive site; Titus asks Saturninus Was it well done of rash Virginius/To slay his own daughter with his own right hand/Because she was enforced, stained and deflowered? (Shakespeare, 2001, 5.3.25) before carrying out the duty of Roman patriarchy. The laws of men are written upon Lavinia, with her stumps, disfigured mouth and knife wounds. Tamoras body effectively transforms into a vessel, as when she dies her stomach is filled with her sons remains, the punishment that Titus finds compulsory for transgressing against the patriarchal law. Whilst Tamora is punished harshly for her transgression, Lavinia also suffers despite fulfilling her role. In Shakespeares Hamlet, there are two main female characters. Ophelia embodies femininity, as she obeys the patriarchal society that cares for her and flourishes within its strict boundaries. Gertrude juxtaposes Ophelia, as Shakespeare uses the same technique found in Titus Andronicus, whereby he uses Tamora and Lavinia as a binary pair to highlight the effect of patriarchy on both the passive and active. Gertrude is negating to the traditional standard of femininity, her rejection of her gender role eventually leads to the collapse of the patriarchal ordered power structure as well as her own demise. Ophelia is shown to be willing to comply to the patriarchal society, for example when Polonius instructs her not to see Hamlet anymore, she replies I shall obey, my lord, (Shakespeare, 2003, 1.3.139). Gertrude contrasts her attitude and defies the expectations of her role as a woman; she is not admired for her beauty, and most importantly she does not attempt to hide her sexuality. When she marries Claudius, Hamlet accuses her of living in in the rank sweat of an enseamed bed (Shakespeare, 2003, 3.5.91). Whilst Gertude may be hurt by these words, she does not deny his accusation. She recognises her identity and does not attempt to lie and conform to what society and Hamlet wants her to be. Gertrude shows more transgression from her feminine role as she rebels against religion by marrying her own brother as this was considered incestuous as Claudius marries his sometime sister. Gertrude is duly punished for her transgressive actions at the end of the play ,as she insists upon drinking poisoned wine despite her husband informing her do not drink(Shakespeare, 2003,5.3.122). It is fitting that her final act of defiance leads to her downfall. She falls dead, revealing Claudius plan and assuring his death. Her disobedience is responsible for causing the death of the king and the collapse of the patriarchal hierarchy. Because of her powerful political position, Gertrudes refusal of her prescribed role has grave consequences. The patriarchal nature of the social order emphasizes and rewards the obedience of women. Butlers theory can again be applied to Ophelia, as she commits suicide when she loses her father, as he is the source of both order and authority. Her identity dissolves when he is gone as his patriarchal views where the concrete in her life, and her personality. Gertrude meets her death as she refuses to bow to authority. She transgresses from her role as a woman by rejecting it and openly exuding her sexuality, similarly to both Tamora and Cleopatra, and is punished for her continued disobedience when she accidentally poisoned. Shakespeares punishment of female transgression is a complex subject to surmise. Whilst the three transgressive female characters in the three plays all meet their death, and hence can be considered to be punished by Shakespeare for transgressing their feminine role, it is not that black and white. Cleopatras death differs from both Tamora and Gertrudes death as she retains the power that she exhibits throughout the play, by taking her own life. Whilst Tamora and Gertrude are punished for transgressing their female role, Cleopatra escapes this fate Caesar, and shows respect for the woman who Took her own way (Shakespeare, 2001, 5.1.68). This could be construed as Shakespeare implying that women should not be chastised for not conforming to the standard female role, but instead be respected. This creates an intriguing dilemma when reading Hamlet and Titus Andronicus as Tamora and Gertrude deaths are not of their own will, and it can be interpreted is their punishment by society for th eir overt sexuality and disobedience to the patriarchal order. However both women are joined in death by their polar opposites in Ophelia and Lavinia, two women who complied implicitly with the rules of society, and fulfilled their expected role. This essay has considered that by applying Butlers theory, it can be concluded it is because of Tamora and Gertrudes transgression that women who obey society are harmed when it is brought down by others. This makes the two women culpable for their deaths, and adds another dimension to the debate as these women have been punished, yet they did not transgress from their prescribed role. This leads me to conclude that whilst some critics may laud Shakespeare as the first feminist, his ultimate stance is one of confusion. Whilst Cleopatra is presented as a woman able to embody both male and female attributes, she ultimately dies, even though it is by her own hand. Tamora and Gertrude also meet their death for transgressing their role; hence my conclusion is that Shakespeare displays the punishment of these women to show that their society is not ready to accept a woman like Cleopatra who is shown to be equal to man, as seventeenth century society is still stuck in the same rigid, patria rchal power structure as depicted in ancient Egypt. His presentation of her is undeniably one of admiration, which leads me to conclude that his punishment of women, innocent or guilty of transgression, is a depiction of a society not yet ready for a trasngressive woman, equal to man and that in seventeenth century society Women who comply with the social order are lost without it; those who defy it can know no other fortune than to be lost within it( Dollimore, 2003, p211).

Tuesday, August 20, 2019

Recruitment And Selection At Tesco

Recruitment And Selection At Tesco As a member of the HR department I need to research and make a report in order to check the quality of new staff being hired. The aim of this report is to explore what are the best means of testing and hiring new employees. It will also look into some benefits and drawbacks of recruitment process in two successful companies which are Tesco and McDonalds. Consequently, I will outline some suggestion which I think is the best for our company. 2.0 Procedures The information is collected from internet and using secondary research to gather data for my report. 3.0 Findings 3.1 Recruitment and selection at Tesco Tesco is the largest private sector employer and operating over 13 countries outside the UK. There is increasing all the time in the number of both store-based and non-store. In addition, in order to achieve business objectives, Tesco needs to make sure that they have the right number of workers in the right jobs at the right time. In order to do this, Tesco has a step by step process of recruitment and selection to appeal applicants for both operational and managerial roles. As the company is growing, it is important for Tesco to have workforce planning which is future needs for people in term of locations, numbers and skills. As regards of recruitment, it can be defined as the process of identifying which the organisation needs for a new employee. Tesco advertises vacancies in different methods. The process of recruiting depends on the job available. Firstly, Tesco looks at internal Talent Plan to fill posts. The lists of current employees who looking for a move or on promotion will be consider. If nobody is suitable in this talent plan, Tesco use internal advertising to post in intranet. However, external recruitment, the vacancies are posted in the Tesco websites or external vacancies board. When making applicant online for managerial position, the chosen applicants must have an interview. Consequently, people who are selected will attendance at an assessment centre for selecting process. Having the CV or register at Jobcentre Plus, candidates who interested in stored based jobs can apply stores in Tesco. The store prepares a waiting list of application which is not selected and calls them if vacancies become available. Furthermore, for the jobs with more specialists such as pharmacist, baker the external recruitment method will be used for example radio, magazine, television. As far as the selection are concerned, it involve in selecting a suitable candidates from applicants by using the job specification and job description. The important part of the selection process is screening candidates. This is ensure that people are selected have matched with the job requirements. Initially, each applicants CV which summarises the candidates education and job experience will be looked cautiously by the Human Resources in Tesco. The firm also provides a job type match on careers web page. Hence they can see where they fit or not. A person who passes screening attend assessment centre will be invited to second interview. If they are successful, they will receive an offer letter and contract. The assessment centre is take place in store and is run by managers. It will give to candidate several tasks which include problem solving, team working. These exercises can help candidate to deal with real problems at work. 3.2 Advantage of recruitment and selection method in Tesco With respect to recruitment process, Tesco will try to find the most cost-effective way of attracting people. Although it is not cheap to advertise on television and magazines, this is essential to get the right type of people for the vacancies. It is easy for applicants to seek about available jobs and also has a simple application process throughout the Tesco website. First of all, by using internal recruitment in Tesco lead to cut the cost of recruiting workers from outside. This is due to less training and orientation required In addition, the HR department know more about the candidates ability. This will increase productivity of current employee and stronger commitment to the company. There are a number of benefits by using external recruitment method. Because of new people, they will bring in Tesco new perspectives and ideas. Furthermore, Tesco have more choice to choose candidates; they have a wider range of experience. 3.3 Disadvantage of recruitment and selection method in Tesco As regards to internal recruitment, the number of applicants can be limited. Owing to already known about strength and weakness of candidate, Tesco could not have new ideas from outside. In addition, another vacancy will be creating which need to be filled. On the other hand, in external recruitment, it has more expensive because of advertising and longer process. The selection process might not be effective enough to find the best applicant. 3.4 Introduction to recruitment and selection methods in McDonalds McDonalds is a one of the largest scale employer. Most workers are paid by the hour and those people called as crew members. Their jobs are to prepare the food and serve customers in order to make the restaurants run more efficiency. With respect to recruiting hourly-paid workers McDonalds have created a two-step application process for potential crew members. Firstly, all candidates must do the psychometric test and then they need to go online and fill the application. Once successful, the candidate will be invited to a restaurant for an on job experience (oje) and interview. The purposes of OJE give a good opportunity to evaluate the candidates customer service skills, how they get on with other member in McDonald and allows candidate to see whether or not suits with working environment. After that, the candidate will work in customer facing areas about 2 day assessment and will be given full instruction on what to do. Consequently, they have a final interview with manager who will give the decision about the applicant. When crew member have been hired, they have to attend a welcome meeting to demonstrate their skills and behaviours. This meeting will show an overview of the company and then candidate must do h ealth safety and food safety test online. 3.5 Advantage and disadvantage of recruitment and selection methods As we can see, the way McDonalds recruitment people it appeal more people to apply because they offer employee with many rewards and bonus. This also increases competition between employees to get prizes. They also provide good working condition which help workers more flexible at work. The other thing here is that people are easily to find out and apply quickly which save a lot of time. On the other hand, there are some drawbacks of these methods. Firstly, owing to more reward, this lead to increasing cost for company. 4.0 Conclusion From my point of view, both companies have good recruitment and selection policy depends on what they are doing. McDonald believes that employees are a vital role in the company to achieve the success of the restaurants. Their aim is to recruit the best people and keep them by offering on-going training related to their position, therefore promoting them when they are ready. The recruitment policies to fulfil its aim. However, Tesco believes that workforce planning is vital for business. They got strong organisational structures. It provides user-friendly ways of applying for jobs and a consistent approach to recruitment and selection. 5.0 Recommendation Having finished research and analyses the recruitment process in both company, I would like to recommend some suggestion for our company which are application online, advertise on TV, using job specification and job description. First of all, application online help people easily to apply and attracting more people is due to developing of technology nowadays. Secondly, advertising is good way to grab attention of people. The reason is that most people like watching TV in leisure times. Although advertising is expensive in the short run, we will have more result in the long run. This is because we have right employee who will contribute to our company for a long time. Finally, when we have many applicants, using job specification and description are the good ways to choose the right person. These documents help us get the overview of candidates; what the qualification they have and their experience.

Monday, August 19, 2019

Andrew Jackson :: Presidents essays research papers

Like any hall of fame, its inductees are the best in whatever they do, from baseball or football to something like being President. If you are a member of any hall of fame (including the one for the Presidents), it means that you have done something special or have a certain quality about yourself that makes you worthy to be in a hall of fame. My nominee for the Presidents hall of Fame is our seventh President of the United States, Andrew Jackson. I'll go over his presidency, focusing on both the highs and the lows of his two terms in office, from 1829-1837. The issues that I'll focus on are states' rights, nullification, the tariff, the spoils system, Indian removal and banking policies; these controversies brought forth strong rivalry over his years of president. He was known for his iron will and fiery personality, and strong use of the powers of his office that made his years of presidency to be known as the "Age of Jackson." Andrew Jackson was born on March 15, 1767, in a settlement on the border of North and South Carolina. He was orphaned at age 14. After studying law and becoming a member of the Bar in North Carolina later he moved to Nashville Tennessee. Their he became a member of a powerful political faction led by William Blount. He was married in 1791 to Rachel Donelson Robards, and later remarried to him due to a legal mistake in her prior divorce in 1794. Jackson served as delegate to Tenn. in the 1796 Constitutional convention and a congressman for a year (from 1796-97). He was elected senator in 1797, but financial problems forced him to resign and return to Tennessee in less than a year. Later he served as a Tennessee superior court judge for six years starting in 1798. In 1804 he retired from the bench and moved to Nashville and devoted time to business ventures and his plantation. At this time his political career looked over. In 1814 Jackson was a Major General in the Tennessee Militia, here he was ordered to march against the Creek Indians (who were pro-British in the war of 1812). His goal was achieved at Horseshoe Bend in March of 1814. Eventually he forced All Indians from the area. His victory's impressed some people in Washington and Jackson was put in command of the defense of New Orleans. This show of American strength made Americans feel proud after a war filled with military defeats. Jackson was given the nickname "Old Hickory", and was treated as a national hero. In 1817 he was ordered against the Seminole Indians.

Sunday, August 18, 2019

INNER CHANGE FOR OUTER DEVELOPMENT Essay examples -- essays research p

Nowadays, people get so pre-occupied with their external environment that they don’t feel attention to themselves. This typical scenario has been the concern for almost every person in this planet. The ones who are affected are mostly those who belong to the urbane society. Professionals, self-employed individuals and students belong to this social order. The paradox of our time as shown here affects us always in our daily activities. We tend to forget ourselves and pay much interest on our day-to-day work. What is then the way for self-awareness to get back into our senses? Inner change for outer development is the main concern of this dissertation. First, the assessment of our own values must be taken into consideration. Let us reflect on what we want we did. Either on the school, offices, or even on the streets, let us contemplate what we have done. Did we do the right thing? If this query answers our trivial minds as no, then it’s time to change our ways. Change can either be on the lighter side: it can bring a rather exuding feeling of calmness and peace inside ourselves. Or, on the other hand, on the dark side of it: changing to become more egocentric and excluding yourself into the world. If we change, we must then aim for the better and not choose the latter. What is then the value of change if the results don’t give a positive outcome; a waste. We can start by accepting our own weaknesses as individuals. Let us not become intolerant to others feelings. Helping the...

Saturday, August 17, 2019

Home Security System

ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM MIOR MOHAMMAD HAFIIZH BIN ABD. RANI UNIVERSITI MALAYSIA PAHANG ABSTRACT Nowadays, house security system becomes the best solution to overcome house intrusion problem when user is not in house. As we know, there are many types of house security system which is too expensive and difficult to use. For that reason, an effective house security system at low cost is built where user can also program the security system by their own.This project is focusing on developing a house security system with an active infrared motion detector which is controlled by microcontroller Intel 8051. The overall project is divided into two parts. The first part is concern on the hardware development where all electronics component are connected via the circuit design using wrapping technique. An active infrared, the magnetic sensor, and keypad are the input components while buzzer, indicator, and LCD display are the output components where it’ s all controlled by controller circuit. The second part is base on software programming to operate the hardware structure.Program for security system based on microcontroller Intel 8051 assembly language is assemble using ASM51 assembler to get the binary file thus, to load into external memory of the hardware structure via serial communication. The process of downloading and executing the program is done using HyperTerminal’s communication software to the microcontroller serial port. In order to achieve the best house security system, more detectors or sensors can be connected to the microcontroller output port where it can be reprogram by user using their personal computer at home. Read this  Chapter 2 – Why Security is NeededAs the result, the infrared motion detector is capable to detect motion while the microcontroller is capable to control the whole operation of the security system. CHAPTER 1 INTRODUCTION 1. 1 Background Motion detection is the action of sensing physical movement in a given area. Motion can be detected by measuring change in speed or vector of an object in the field of view. This can be achieved either by mechanical devices that physically interact with the field or by electronic devices that quantifies and measures changes in the given environment.There are two device of motion detection which is the mechanical device, and the other one is electronic device. In the mechanical device, a tripwire is a simple form of motion detection. If a moving objects steps into the tripwire's field of view then a simple sound device like bells may alert the user. Mechanical motion detection devices can be simple to implement, but at the same time , it can be defeated easily by interrupting the devices' mechanics like â€Å"cutting the wire†. While in electronic device, the electronic motion sensing such as motion detectors, can prevent such mechanical intervention.The principal methods by which motion can be electronically identified are optical detection and acoustical detection. Infrared light or laser technology may be used for optical detection. Motion detection devices, such as motion detectors, have sensors that detect movement and send a signal to a sound device that produces an alarm or switch on an image recording device. There are motions detector which employ cameras connected to a computer which stores and manages captured images to be viewed over a computer network.The applications for such detection are detection of unauthorized entry, detection of cessation of occupancy of an area to extinguish lighting, and detection of a moving object which triggers a camera to record subsequent events. The motion det ector is thus a basic idea of electronic security systems. 1. 2 Project objective The objective of this project is to build a house security system using microcontroller Intel 8051 based on active infrared motion detection. 1. 3 Project scope This project concentrates on a development of an active infrared motion detector for house security system.To develop the whole project, it consists of three methods which are the concept of security system, the electrical structure, and the software programming. The concept of security system is on the detection of movement using active sensor to trigger alarm controlled by the microcontroller Intel 8051. The electrical structure consist of two systems which are the active infrared circuit that used to detect or sense motion and the microcontroller Intel 8051 circuit, used to control the whole operation of the security system. While the software programming is base on the microcontroller Intel 8051 instruction sets.It contains a program design ed for a security system as an interaction to operate the electrical structure. 1. 4 Literature review Motion detectors are mainly used in security systems [4]. It is typically positioned near exterior doorways or windows of a building to monitor the area around it. Since motion detectors are so flexible and have so many uses, it offers feelings of protection and security for the average homeowner as well as commercial organizations [4]. An electronic motion detector is a device used to detect any physical movement in a given area and transforms motion into an electric signal.It consist of sensor that electrically connected to other devices such as security system, lighting, audio alarms, and other applications. Motion sensors are used in a wide variety of applications and as a result, many different types of motion sensors are available including the infrared sensor. Infrared sensors are widely known in the arts of intrusion detection and in fire or smoke detection. It is a device that often used in automatic light switches and security systems to turn on a light or to activate some other form of alarm or warning indicator when a person enters a monitored area [4].The infrared sensors have basically two forms: active and passive. [4] An active infrared detector includes a radiation source and an infrared sensor which is sensitive to interruptions in the radiation sensed from the source. [4] These detectors are used as intrusion detectors by providing a path of radiation from the source to the sensor in a place where the path is likely to be interrupted by an intruder. The proposed active infrared method of motion detection has the advantage of fast speed response of a relatively large sensor.This advantage permits simpler optical system design, especially for wide fields of view. Besides, it is insensitivity to mechanical and acoustic noise, which presents substantial problems in the passive infrared (PIR) sensors. Low production cost is another advantage of these active infrared detectors. [4] Passive infrared motion detection detects heat energy radiated or emitted by an object, such as a body of a person, moving across a field of view of a heat sensor of the motion detection system. It is generally use an optical ollection system and multiple sensing elements of alternating polarity to create a detection pattern in the volume of interest. PIR detectors employ a group of radiation sensors coupled through amplifiers to a logic circuit. The radiation sensors detect changes in ambient infrared radiation. The detection system has an electrical circuit operatively coupled to the heat sensor for producing a detection signal in response to the heat sensor detecting a change of temperature caused by the body heat of a person entering the detection pattern. PIR motion detectors are perhaps the most frequently used home security device. 4] Passive IR motion detectors are usually designed to provide an indication to an alarm panel in response to detecting IR that is indicative of motion of the object. The alarm panel is responsive to receipt of the breach indication to cause an alarm condition to occur. The other motion detector used in security system is an ultrasonic motion detector. It is commonly used for automatic door openers and security alarms [4]. It is inexpensive and can operate with narrow beam-widths. The ultrasonic transducers are the sensor that used in ultrasonic motion detector.It can be used to detect motion in an area where there are not supposed to be any moving objects. This type of motion detector is most commonly used in burglar alarm systems since they are very effective in this application [4]. In an ultrasonic motion detector, there are two transducers; one emits an ultrasonic wave and the other picks up reflections from the different objects in the area. The reflected waves arrive at the receiver in constant phase if none of the objects in the area are moving. If something moves, the received sig nal is shifted in phase. A phase comparator detects the shifted phase and sends a triggering pulse to the alarm.Ultrasonic motion detectors have certain advantages and disadvantages when compared with other types of motion detectors. The main advantage is that they are very sensitive and extremely fast acting. However, the largest problem with this type of motion detector is that it sometimes responds to normal environmental vibration that can be caused by a passing car or a plane overhead. Besides, the installation options on this type of motion detector are limited because ultrasonic beams are easily blocked by thin materials, including paper. False triggering is easily caused by reflections from blowing curtains, pets, and flying insects.While the passive infrared motion detectors offers problem where it can be falsely triggered by warm air movement or other disturbances that can alter the infrared radiation levels in an area. In order to prevent this problem, newer systems use t wo infrared sensors, which monitor different zones within a protected area. Logic within system triggers the alarm only when the two zones are activated in sequence, as would occur if a person walked through the protected area. For that reason, the purpose of using the active infrared as a sensor to detect motion for this project is surely on the advantage offers by the sensor.Its capability on detecting motion with a simple design at lowest cost is needed to build an effective house security system based on motion detection. 1. 5 Thesis outline Chapter 1 explains the background of motion detection, the project objective, the project scope, and the literature review of motion detector for security system. The concepts of motion detector are the major element as a guide for the development of the security system. Chapter 2 explains the systems involved for the development of the active infrared motion detector for house security system.The understanding of three systems which are the active infrared, motion detector, and house security system stated in this chapter needed for the development of the whole project. Chapter 3 focuses on the methodologies for the development of the electrical structure and the implementations of microcontroller programming. It gives a brief review on the concept of active infrared motion detector, the electrical structure for hardware development, and the programming for the operation of the security system. Chapter 4 discusses on the results obtained of the whole project.All discussions are concentrating on the result and performance of the security system. The discussion is valuable for future development of the security system. Chapter 5 discusses about the conclusion on development of the active infrared motion detector for house security system. The recommendations and modification required on this project is stated in this chapter for further development. CHAPTER 2 ACTIVE INFRARED MOTION DETECTOR FOR HOUSE SECURITY SYSTEM 2. 1 Introduction There are two systems on a development of the active infrared motion detector for house security system.The first system is an active infrared motion detector and the other one is the controller system. The first system concentrates on a development of an active infrared motion detector. It is consists of three element, which are the active infrared, the motion detector, and the house security system. The motion detector circuit will be control by the second system which is the microcontroller Intel 8051 based system. The combination between this two systems will built a project called an active infrared motion detector for house security system. 2. 2 Active infrared (IR)Infrared is an electromagnetic spectrum at a wavelength that is longer than visible light. It cannot be seen but it can be detected. Objects that generate heat also generate infrared radiation and those objects include animals and the human body whose radiation is strongest at a wavelength of 9. 4 µ meter. Infrared in this range will not pass through many types of material that pass visible light such as ordinary window glass and plastic. However it can pass through, with some attenuation, material that is opaque to visible light such as germanium and silicon. The active infrared sensors use invisible light to scan a defined area.In active infrared systems, there are two-piece elements which are consisting of an infrared transmitter and an infrared receiver. There is a 3/8 inch infrared beam between the transmitter which is placed on one side of the trail and the receiver which is placed on the other side of the trail. The transmitter and the receiver can be separated by as much as 150 feet. The transmitter emits a beam of light into the scan zone. The light, which is reflected by the background returns to the receiver, which constantly monitors the scan zone. When a person or object enters the zone the infrared light is interrupted.It then sends a signal to the controller sys tem, which is wired into the door controls. One variation of this operating mode is called ‘background suppression’. This is when the receiver only detects a change in the reflected light when a person or object enters the scan zone thus causing a reflectance variation of the light, sending a signal to the microcontroller thus trigger the alarm of the security system. 2. 3 Motion detector A motion detector is a device that contains a motion sensor and is either integrated with or connected to other devices that alert the user of the pre-sense of motion.An electronic motion detector contains a motion sensor that transforms the detection of motion into an electric signal. The electric signal can be connected to a burglar alarm system which is used to alert the home owner or security service after it detects motion. An example of sensor that used in security system is an active sensor. Active sensors in motion detectors system are commonly used inside homes for a security system. An active motion detector emits optics or sound waves and measures feedback to detect motion. The simplest type of active motion detector is commonly used in commercial doorways to trigger a doorbell.A device is fixed to one side of the doorway, an optical sensor to the other. A beam of light will passes from the device through the sensor. When someone enters the establishment, the beam is broken, triggering the doorbell thus warn user for the intrusion. For that reason, active motion detectors can be purchased for home improvement security system. It is inexpensive devices that can add for more security to a home and provide peace of mind for home owners. 2. 4 House security system House security system is one of security that truly related to burglar or safety alarm system.Burglar and safety alarms are found in electronic form nowadays. Sensors are connected to a control unit via either a low-voltage hardwire which in turn connects to a means for announcing the alarm to el icit response. In a new construction systems are predominately hardwired for economy while in retrofits wireless systems may be more economical and certainly quicker to install. Some systems are dedicated to one mission; handle fire, intrusion, and safety alarms simultaneously. In common security system, the lights are triggered by motion gives the impression to user that someone is at home and able to see the burglar.Infrared motion detectors placed in house security system in crucial areas of the house can detect any burglars and alert the home owner or police. The first security system invented, house alarms were triggered by the release of a pressure button fitted into a door or window frame. This basic alarm was fundamentally flawed as the entire intruder needed to do to silence the alarm was to close the door or window. While various systems on the market ranging from inexpensive house security alarms to highly sophisticated systems requiring professional installation.All mode rn alarms are based on the same foundation, the electric circuit which is completed either when the door is opened or closed depending on the security system designed. The alarm is triggered when the circuit is altered and will not be silenced until a code is punched into the control panel. The most expensive and complicated alarm systems might also involve a combination of motion sensors and pressure pads to ensure even the most cunning intruder doesn’t get his hands on treasures. 2. 5 Microcontroller Intel 8051 The microcontroller 8051 is an 8-bit machine.Its memory is organized in bytes and practically all its instruction deal with byte quantities. It uses an Accumulator as the primary register for instruction results. Other operands can be accessed using one of the four different addressing modes available: register implicit, direct, indirect or immediate. Operands reside in one of the five memory spaces of the 8051. The five memory spaces of the 8051 are the Program Memo ry, External Data Memory, Internal Data Memory, Special Function Registers and Bit Memory. The Program Memory space contains all the instructions, immediate data and constant tables and strings.It is principally addressed by the 16-bit Program Counter (PC), but it can also be accessed by a few instructions using the 16-bit Data Pointer (DPTR). The maximum size of the Program Memory space is 64K bytes. The External Data Memory space contains all the variables, buffers and data structures that can not fit on-chip. It is principally addressed by the 16-bit Data Pointer (DPTR), although the first two general purposes register R0 and R1 of the currently selected register bank can access a 256-byte bank of External Data Memory. The maximum size of the External Data Memory space is 64K bytes.The external data memory can only be accessed using the indirect addressing mode with the DPTR, R0 or R1. The Internal Data Memory space is functionally the most important data memory space. In it resi des up to four banks of general purpose registers, the program stack, 128 bits of the 256-bit memory, and all the variables and data structures that are operated on directly by the program. The maximum size of the Internal Data Memory space is 256-bytes. The register, indirect and direct addressing modes can be used in different parts of the Internal Data Memory space.The Special Function Register space contains all the on-chip peripheral input and output registers as well as particular registers that need program access. The maximum number of Special Function Registers (SFRs) is 128, though the actual number on an 8051 family member depends on the number and type of peripheral functions integrated on. The SFRs can only be accessed using the direct addressing mode while the upper 128 bytes of the Internal Data Memory can only be accessed using the Indirect addressing mode. The Bit Memory space is used for storing bit variables and flags.There are specific instructions in the 8051 th at operate only in the Bit Memory space. The maximum size of the Bit Memory space is 256-bits. Bits can only be accessed using the bit instructions and the direct addressing mode. 2. 6 Summary The understanding on the elements of the systems involved for this project which are the active infrared, the motion detector, and the house security system is needed before proceed for the design and development process. This is important to ensure the project done according to the main idea of each part discuss in this chapter. CHAPTER 3 METHODOLOGY 3. 1 IntroductionThere are several steps to be applied in designing an active infrared motion detector for house security system. The relevant information is gathered through literature review from previous chapter. Data on motion detection and security system projects has been collected where the theoretical design is studied based on the motion detector for security concept. The understanding on the electrical structure for the hardware develop ment is needed for the design circuit process of the motion detector and the basic security circuit. The next is the hardware development according to the circuit designed.This process is just only being proceed if each part of the circuit being improved is valid, else, it will be repeated until it is valid as the theoretical. Once the hardware development circuits have the output as the expected, then, the comparison for both hardware and theoretical analysis will be done. Next is the step where software structure is developed for the security system to be interface with the hardware development. While the final step of this research is on applying the whole project to the real house entrance like doors and windows. 3. 2 The concept of motion detector for security systemFigure 3. 1 Active infrared motion detectors Figure 3. 2 shows the concept of an active infrared motion detector for a security system. In the active system each sensor consists of two housings. The first housing co ntains an infrared-emitting diode and an infrared-sensitive phototransistor as the infrared detector. The other housing contains an infrared reflector to reflect the infrared signal. When positioned in front of an entrance to a protected area, the two housings establish an invisible beam. Figure 3. 2 The concept of infrared motion detector for security systemA person who enters the area will interrupts the beam causing an alarm to be triggered. For this type of motion detector uses the basic concept of the active infrared motion detector. An interruption in the signal modulated pulsating beam transmit by an infrared diode while receive by an infrared detector will set ‘on’ or ‘off’ the alarm of the security system. 3. 3 Hardware development Figure 3. 3 Block diagram for the house security system The hardware development is divided into three stages as shown in block diagram above. The inputs stage of the security system is the motion detector circuit, keypa d, and magnetic sensor.The second stage is the controller unit which is the microcontroller Intel 8051. The purpose of using microcontroller is to control the whole system operation by sending data to the output stage which is the LCD display, indicator, and buzzers. 3. 3. 1 Motion detector circuit In designing the infrared motion detector circuit, it is based on two basic principle of active infrared motion detector which is the infrared transmitter and infrared receiver as shown in Figure 3. 4. Figure 3. 4 Basic principle of infrared operation 3. 3. 2 Infrared transmitterFor the infrared transmitter which is also known as emitter circuit, it is on a basic design of timer 555 astable operation. The output of timer is connected to the infrared transmitter is used to produce pulse using an astable timer circuit. In astable circuit operation, pulse will continually generated until the power supplied through the circuit is removed. The astable circuit produces a continuous train of pul ses at any frequency required. This means that the 555 timer can operate repeatedly; it will switch ‘on’ and ‘off’ continually to generate data for the infrared transmission. . 3. 3 Infrared receiver The infrared receiver which is also known as infrared detector receives the data transmitted by the infrared transmitter circuit. It is a simple electronics device on detecting infrared signal. This infrared detector can be directly connected into the controller circuit to produce logic high ‘1’ or low ‘0’ from the output terminal thus activate or deactivate the controller system operation. The range of infrared detector components according to datasheet stated that the infrared detector can fully operates on detecting the infrared signal of 38 to 45 kHz. . 3. 4 4 ? 4 hexadecimal keypad The purpose of using 4 ? 4 hexadecimal keypad in the project is as an input where secure code entries to activate of deactivate the security system ope ration. The keypad provides eight interface pins, where one pin for each row and column of the keypad matrix. This 4 ? 4 hexadecimal keypad is connected to the keypad encoder (MM74C922) to control the keypad bouncing in the hardware development. 3. 3. 5 Keypad encoder (MM74C922) The MM74C922 key encoders provide all the necessary logic to fully encode an array of 4 ? hexadecimal keypad. It is used to encode the data received from the keypad code entry thus convert into binary code. These binary code is in hexadecimal number is required in data bus of the microcontroller system. Figure 3. 5 Interaction between keypad, keypad encoder, and octal buffer The figure 3. 5 above shows the block diagram on the interaction between the 4 ? 4 hexadecimal keypad, keypad encoder (MM74C922), and the octal buffer (74LS244). The keypad is used as a switch to give logic configuration to the keypad encoder.While the encoder will encode the data configuration from the keypad into the binary code based on datasheet of the encoder. These binary codes will be stabilized using the octal buffer to be process in the microcontroller system. These data will be process by the microcontroller thus running the system operation based on software designed for the security system. 3. 3. 6 Octal buffer (74LS244) A buffer is simply a unity-gain amplifier, usually with very high input impedance and very low output impedance. It allows a connection of heavily loaded to another load which requires a lot of current like capacitive load.The octal buffer is used to isolate one device from another by eliminating loading effects. It provides a ‘buffer’ between the two devices. The 74LS244 are octal buffers and line drivers designed to be employed as the memory address drivers, clock drivers, and bus-oriented transmitters/ receivers which provide improvement on the controller board density. 3. 3. 7 Microcontroller circuit (Intel 8051 – expended mode) The controller systems that use to control the motion detector system and other electronic devices are the microcontroller Intel 8051 – expended mode.In expended mode configuration, external ROM and RAM are used to add the data memory to be more than internal memory provided by the Intel manufacturer. The purpose of using an expended mode for the project is to expend more data available on developing and designing an excellent operation of the security system. Figure 3. 6 Intel 8051 block diagram The microcontroller Intel 8051 is a widely used on controlling devices and instruments due to its flexibility, existence of multiple producers. It consists of a simple architecture introduced by Intel in the year of 80’s.It produced with 128 bytes of RAM, 4K bytes of on-chip ROM, 2 timers, one serial port, and 8-bits wide of ports. This type of microcontroller become very popular after Intel allowed another manufacturer to make and market any flavor of the 8051, and still remains compatible with 8051. There ar e various versions of 8051 with different speeds and amount of the on-chip ROM which is valuable on controlling a system designed. 3. 4 Software development The software structure is using the assembly language where a set of program based on security system is assembled using ASM51 assembler.The 8051 Cross Assembler (ASM51) takes an assembly language source file created with a text editor and translates it into a machine language object file. This translation process is done in two passes over the source file. During the first pass, the Cross Assembler builds a symbol table and labels that used in the source file. While the second pass of the Cross Assembler is actually translates the source file into the machine language object file. During the second pass, the listing file of the assembled is generated for the analysis purpose.A security program as shown in flow chart below were written in notepad based on 8051 instruction set before assembling process to get the binary code. Thi s binary code is then used to be load into the location of the memory thus operates the hardware developed. The flowchart as shown in Figure 3. 7 is a basic designed for the security system operation. In this security system, the security code is set as ‘1985’ to activate or deactivate security system. When user closed the door, the system will activate where the magnetic switch and infrared is in active condition.To deactivate the system where opening door without alarm, user must enter the deactivation code. The chance to deactivate the system is once before keypad locked, where user can not enter the code anymore. If deactivation code was correct, green LED will ‘on’ while alarm will ‘off’ condition. System at this time is successfully deactivated and user can open the door without alarm. Figure 3. 7 Flow chart of software design for the security system If deactivation code enters was incorrect, system is still activate and for that, red LED and alarm will ‘on’ where the system is in a warning mode.The system will keep in this mode until the correct deactivation code entered. When the correct deactivation codes enter, the reconfirm code is needed where user need to reenter the correct deactivation code before the system successfully deactivate; the green LED will ‘on’ and the alarm will ‘off’ condition. The reconfirm code is designed in the system to make more security for the system developed. If intruder open the magnetic switch without entered the correct security code, thus the alarm will ‘on’. User must enter the correct deactivation code to turn ‘off’ the alarm system.The activation and deactivate code for this system are ‘1985’ and the ‘enter’ button codes are ‘A’ for every codes entered. 3. 5 Summary There are three elements discussed in this chapter which are the concept of motion detector for security syste m, the hardware development, and the software designed for the security system. Each part of these elements is related to each other. The understanding of the concepts and methods on developing the project is very important to achieve the main objective for the whole project. CHAPTER 4 RESULTS AND DISCUSSIONS 4. 1 IntroductionThis chapter will briefly discuss on the results and discussions of the hardware development. There are three major modules in developing the hardware structure which are the active infrared motion detector circuit, keypad module circuit, and the most important; the controller circuit 4. 2 Motion detector circuit The hardware development of the active infrared motion detector system is divided into two parts, which are the infrared emitter circuit and the infrared detector component. 4. 2. 1 The emitter The emitter which also known as infrared transmitter circuit was build as shown in Figure 4. . A probe or the oscilloscope is attached to the infrared LED while the adjustable resistor is varied to calibrate the emitter to transmit 38 kHz square wave. The Figure 4. 1 shows the final configuration of the emitter circuit: Figure 4. 1 The emitter circuit Figure 4. 2 shows the result obtained from the oscilloscope where the frequency generated by the emitter circuit is 38. 67 kHz square wave. At this generated frequency, the voltage maximum produced is 1. 60V and the peak to peak voltage is 1. 16V. Figure 4. 2 The 38 kHz frequency generated by the emitter circuit