Friday, December 27, 2019

Essay about The Role of Reflexivity in Ethnography

The Role of Reflexivity in Ethnography Reflexivity, as I understand it, is very well named.It is the practice of reflecting upon oneself and one’s work, of being self-aware and self-critical. In anthropology, it is well exemplified by the work of Renato Rosaldo, Ruth Behar, and Dorinne Kondo, among others. In its most obvious form (or at least the form most obvious to me), reflexivity is manifest in the practice of an ethnographer including herself in her own ethnographic research---seeing herself not as an â€Å"unbiased, impartial† (Malinowski 18) observer, but as an essential and un-removable part of her study. The effect of reflexivity on ethnographic writing has been, however, much broader than just that. It signals â€Å"a departure from†¦show more content†¦One should remember to be critical of one’s own work, to be open to the idea that one may be wrong. Among the semester’s readings, one in particular stands out for me as utterly self riteous and lacking in self-criticism. The introduction to Bronislaw Malinowski’s Argonauts of the Western Pacific is an assault upon my (admittedly) politically correct, postmodern (is that a bad word?), early 21st century sensibility. His â€Å"unbiased† writing is chalk-full of condescension, bigotry, and Eurocentricism. These are easy enough to dismiss (although not excuse) as the mind-frame of the era in which he was writing. It is, instead, his arrogant belief in his own irrefutable authority that (ironically) decreases his credibility for me. Malinowski writes of obtaining ethnographic success â€Å"by a patient and systematic application of a number of rules of common sense and well known scientific principles† (6). He refers alternately to missionaries, traders, and even natives as â€Å"untrained minds† (5) â€Å"and inferior amateur[s]† (6). He write s of ethnography as the be all and end all of understanding â€Å"primitive† cultures, of decoding the â€Å"chaotic and freakish† (9). I should say here that I do not wish to dismiss ethnography in any way. On the contrary, I believe it to be of great value in the study of any kind of culture. I don’t even entirely disagree with Malinowski. I suppose my main qualm with his work is in its total lackShow MoreRelatedEssay about Ethnography1634 Words   |  7 PagesEthnography One of the most complex and interesting aspects of cultural anthropology is the ethnography. The idea of being able to read stories about groups of individuals is something that is intriguing to many people. With the ethnography, the authors many times feel that they have control and understanding over the individuals that they are writing about. Furthermore, many of these authors assume that the individuals among whom they are living and studying exemplify the entire society asRead MoreEssay on The Role of the Reflexive Ethnographer1252 Words   |  6 PagesThe Role of the Reflexive Ethnographer Works Cited Missing The role of the reflexive ethnographer has been constantly defined and redefined since the beginning of the study of anthropology. The use of reflexivity has and will always be questioned in anthropology. Malinowski, who was a pioneer in the field of anthropology, discouraged the use of reflexivity; he, instead, believed that anthropology was scientific and could produce â€Å"concrete evidence† (Malinowski 17). Reflexivity is wayRead More Anthropology1316 Words   |  6 PagesAnthropology Anthropology what a vulnerable observer you are! You may well have to jump into the arms of the scientists if you are going to try to keep your grass hut at the academy! -- Ruth Behar Debates on the role the reflexive plague the field of cultural anthropology as postmodern critics join the bandwagon attempting to claim authority in this dubiously recognized discipline. In the borderline realm between the sciences and humanities, cultural anthropology has tried to find a nicheRead More Ethnography Essay1090 Words   |  5 PagesEthnography Works Cited Missing Reflexivity is a qualitative method of research that takes an ethnography one step further, displaying the personal thoughts and reflections of the anthropologist on his informants. Ethnographies generally take an outside or foreign perspective of a culture, like reading a text, and reflexivity introduces a new component of inside description. Here, the anthropologist may describe personal interactions and experiences with natives and use this inside informationRead MoreEssay on The Pros and Cons of Ethnographic Reflexivity849 Words   |  4 PagesThe Advantages and Limits of Ethnographic Reflexivity Awareness of writing choices generates an appreciation of the reflexivity of ethnographic research. Reflexivity involves the recognition that an account of reality does not simply mirror reality but rather creates or constitutes as real in the first place whatever it describes. Thus ‘the notion of reflexivity recognizes that texts do not simply and transparently report an independent order of reality. Rather, the texts themselves are implicatedRead More Ethnography Essay989 Words   |  4 PagesEthnography Works Cited Missing Anthropology is defined, in the most basic terms, as the study of other cultures. This field can subsequently be divided into more specific sects, and contain more precise defining characteristics, but this definition is essentially all that is needed. Anthropology is a science that attempts to look at other cultures and draw conclusions to questions that are raised while studying. An anthropologist is someone who accepts what is presented before them and isRead MoreAnalysis Of Robert Flaherty s Famous Work Nanook Of The North1235 Words   |  5 PagesThe challenge of accurately representing ethnography, the critical analysis and systematic inspection of everyday life across cultures, has been repeatedly attempted with myriad intentions and has subsequently evolved over time. This paper will examine four iconic anthropological filmmakers in the mid-twentieth century in their individual distinctive endeavors to contribute to and accomplish this goal of developing ethnographic film. F rom Robert Flaherty s objective to showcase culture as art, toRead MoreThe Presentation Of The Self By Irving Goffman1167 Words   |  5 Pagesperform a variety of social roles, like actors in a play, and that society is made up of groups of players working together to up hold various social realities and functional institutions such as work, school, home, medical, legal or leisure. The two key components of this theory are ‘front and back’ and ‘impression management’, which enable analysis of how identity is presented and understood through symbols, and the differing ways people behave when they are in and out of role: enabling preparation andRead MoreEssay on Reflexivity and Modern Works of Anthropology1090 Words   |  5 PagesReflexivity and Modern Works of Anthropology The role of reflexivity in Anthropology has changed a great deal over time. The effects of doing ethnography on the ethnographer was not considered an important mode of inquiry in the past. While inevitably, going to far distant lands and living with a culture so different from your own will at least cause the ethnographer to reflect on personal issues but most likely will cause profound changes in the way he or she will view the world. But in theRead MoreA Research Study On Anthropology And Sociology1308 Words   |  6 PagesEthnography is a strategy of analysis coming from anthropology and sociology where the researcher studies the common forms of a person’s actions,vocabulary, and movements of a complete social cluster in an ordinary location over a lengthy period of time. Documents gathering often includes clarifications and dialogues(Creswell, 2014).A qualitative researcher uses ordinary locations, they are the main mechanism, collects numerous origin of evidence, uses inductive and deductive statistics study, put

Thursday, December 19, 2019

Is The Statue of Liberty a Lie Essay - 1716 Words

Is The Statue of Liberty a Lie? The issue of immigration has shaped the history of the United States throughout the years of its existence. People from numerous different countries have immigrated to America in search of a better life and new opportunities. While Americans often ponder whether immigration is a benefit to society, legislators have recently enacted many anti-immigration laws which have been enforced to keep control over illegal immigration. Many different positions exist concerning illegal immigration in the United States. Advocates for Proposition 187 would suggest that illegal immigration is greatly increasing the population of the country, crowding schools, and denying many basic rights to citizens. Opponents†¦show more content†¦In Los Angles, California, elementary schools have been greatly affected by the anti-immigration laws. Teachers are forced to report to authorities which children they believe could possibly be illegal immigrants. Those children are then removed from scho ol and often times sent back to their home country. Tom Bradley, mayor of Los Angeles in 1994, stated â€Å"it is not fair to turn the children of illegal immigrants into scapegoats by ejecting them from public schools and denying them vital health services† (Ono 92). Even if children who are legal citizens are not forced out of their school, their parents will still be deported from the United States leaving the children with nothing. Fourteen-year-old Simon Romero says about his parents, â€Å"It’s not my fault my parents are here illegally†¦. If they have to leave, what am I going to do?† (Ono 94) This is true in many family situations. The parents may be illegal, but the child is born in the United States. One of the biggest controversies is how Proposition 187 will affect the children of illegal immigrants. Opponents to immigration say that immigrants are over crowding the public schools; therefore taking away the education those citizens’ children should be receiving. While it may not necessarily be the responsibility of the government to decide what should be done with the children of illegal immigrants, it is their responsiblitly to ensure the basic rights of Americans.Show MoreRelated Statue of Liberty: A Lie? Essay972 Words   |  4 PagesStatue of Liberty: A Lie? As I sat on a park bench in the middle of Manhattan, eating a pack of stale peanut butter crackers, I couldnt keep myself from thinking about the woman I had met the day before. The lady I met seemed to be a strong woman of high morale, but after our interaction I came to the conclusion that she was living a lie. Well-known and noticeably the tallest female in the community, many people looked up to her as somewhat of a motherly figure. Ill never forget the tattoo onRead MoreThe Illusion Of Justice892 Words   |  4 PagesIllusion of Justice Many people immigrate to the United States seeking new opportunities and a better lives as a citizen. Everyday citizens never think to question the validity of the pledge of allegiance, in particular the section that states For liberty and justice for all. Does the United States government abide by this pledge and give every citizen, including the lawbreakers, justice? In my opinion, I do not believe that every citizen is given a fair trial under the current drug laws created byRead MoreThe Significance of Radical Thought and Attitudes in the Civil War Period1444 Words   |  6 Pagesevident in violent clashes that culminated in their removal under Cromwells orders Lynch further poses an interesting idea that In an exact sense they were communists. He is suggesting that here may lie the original seeds that led to later Communism. That the first statue of Winstanly was erected in Russia after Lenins consolidation of power shows the extent of their influence in later history and more importantly is evidence of how radical and far reaching their ideasRead MoreThe Mystification of the Artistic Object1497 Words   |  6 Pagesstoic virtue that were traditionally associated with the Roman Republic, thus drawing parallels between that time and the contemporary struggle for liberty in France such as Jean-Auguste-Dominique Ingres 1827 Apotheosis of Homer which depicts the famous blind poet in a scene of regal bearing in a manner that is as idealistic and lifelike as a Grecian statue (Norfleet 2006). However, by the time that Impressionists such as Monet began to produce their works in the latter half of the 19th century, theRead MoreEssay on DISSAPOINTMENT926 Words   |  4 Pagesactuality, I felt more confined and trapped because of the crowds. I will admit that it was beautiful there, and I did partake in all of the touristy exhibits, but I didnt feel a need to belt out the star spangled banner from the top of the Statue of Liberty! All of my life I had this idea of going to New York, and siting in a little coffee shop and having the time of my life, much like the media portrays New York with all of its `artsy people and places, but I ultimately was disappointed whenRead MoreMy Most Memorable Trip1518 Words   |  7 Pageswere going to go. Regardless of the decision, any experiences enjoyed together would be moments to cherish. Ultimately, I surprised her with a short drive to the dock. A few moments later, we were on a ferry to Ellis Island to enjoy the Statue of Liberty. I quickly realized that enjoying the seven point spiked rays representing a nimbus (halo), holding a stone tablet close to her body in her left hand and a flaming torch high in her right hand would not be happening. The tablet bears the wordsRead MoreLife of Edgar Allen Poe from Immigration to Poet1035 Words   |  5 Pages Edgar Allan Poe was alive during the period of the 1800s though the 1850s. During this period of time there was a mass movement of European Immigration to the United States (Educating About Immigration). On the Statue of Liberty, which is located in The New York Harbor which many immigrants had to pass through, the words â€Å"Give me your tired, your poor, your huddled masses yearning to breathe free†¦Ã¢â‚¬  this quotation gave immigrants hope while entering the new land (Educating About Immigration). Immi grantsRead More The Marine Corp Memorial Essay example1756 Words   |  8 Pageslater a life size model of it. Gagnon, Hayes, and Bradley, the three survivors of the flag raising posed for the sculptor. The original statue which was cast in plaster went on display in front of the Old Navy Building in Washington D.C. from 1945-1946. It was used to promote war bonds around the country. In 1946 General Vandegrift was so moved by the statue that he had Felix de Weldon transferred from the Navy to the Marine Corps and commissioned him to produce the memorial we see today. Read MoreLiterary Response : The Handmaid s Tale1361 Words   |  6 Pagesoutspread. Her legs are apart, I lie between them, my head on her stomach, her pubic bone under the base of my skull,†¦She too is fully clothed.† c. The way that Serena and Offred are positioned in complete discomfort symbolizes how women have no say and must be submissive, even in such an intimate, â€Å"holy† act. a. Simile b. â€Å"She continues lying on the bed gazing up at the canopy above her, stiff and straight as an effigy.† c. The use of this simile compares Serena to a statue. This makes the reader wonderRead MoreThe Lewis And Clark Expedition1405 Words   |  6 Pages Sacajawea is a renowned Native American woman who played a significant role in the Lewis and Clark Expedition. As stated by Brown, â€Å"She turned to dreaming of the future, of what it might hold for Pomp (her son), as she had dreamed of what might lie ahead for her when she had learned she was to be going on the expedition. But it was no dream that she had become a part of history† (110). Although most of her history is unclear, one thing is definite - without the help of Sacajawea, the United States

Wednesday, December 11, 2019

Recreation And Sports Facilities In Ipswich â€Myassignmenthelp.Com

Question: Discuss About The Recreation And Sports Facilities In Ipswich? Answer: Introducation The plaintiff and the defendant entered into a contract to construct five multi-purpose recreation and sports facilities in Ipswich, Brisbane and Beaudeser, Toowoomba and Logan City. Although the plaintiff commenced manufacturing and designing but did not start the construction as was required by the contract and the defendant terminated the contract. Plaintiff claims reliance damages for the works done under the contract as the termination notice was an invalid exercise. Defendants Submissions Wrongful Termination The defendant had entered into a contract with the Plaintiff in July 2016 and the subject matter of the contact was to construct a five multi-purpose recreation and sports facilities in Ipswich, Brisbane and Beaudeser, Toowoomba and Logan City. The plaintiff failed to commence with the construction of the sports and the recreational facilities and merely initiated with the manufacturing and designing of the project. The defendant terminated the contact based on the ground that the plaintiff had repudiated when he failed to commence construction, which forms the subject matter of the contract. In Koompahtoo Local Aboriginal Land Council v Sanpine Pty Ltd [2007] 233 CLR 115, 135 party to a contract is said to have repudiated the contract when their conduct is such that any prudent person would believe that the party the does not have any intentions to be bound by the contract. Such conduct shall also imply that the plaintiff intends to fulfill the contract in a manner that is contrary to the obligations conferred on such party[1]. The plaintiff had initiated the design and manufacturing of the multi-purpose sports and recreational facilities but did not commence with the construction of the recreational and sports facility, which signifies that the plaintiff did not have any intention to perform the contract[2]. Hence, the defendant had terminated the contract on the ground of breach of the contract which in order to be considered as repudiation must be sufficiently severe to give rise to the right to terminate. The plaintiff committed a breach of contract by failing to commence construction of the multi-purpose sports and recreational facilities. In law of contract if either party to the contract commits a breach of the contractual terms, the innocent party is entitled to terminate the contract. This is particular when the contractual term infringed by the breaching party has been agreed to be an essential term (i.e. a condition) between the parties to the contract as was ruled in the Koompahtoos case. If the breached term is a condition, the aggrieved party shall be entitled to terminate the contract with respect to the breach of such contractual term. In order to determine whether the term breached was essential (i.e. condition) the test of essentiality must be applied. Thos would enable to comprehend whether the nature of the contract signifies that the promise made to the promise was so essential that in the absence of such promise, he would not have formed the contract if he had not been assured of the performance of the promise. If the contractual term breached by the plaintiff was a warranty or a non-essential term, the innocent party shall be entitled to claim damages but cannot end the contract. If the violated term is an intermediate or an innominate term, the contract is entitled to be terminated[3]. However, the termination depends on the seriousness of the breach of such contractual term. A contract can be terminated for breach of any non-essential or an intermediate contractual term. In Hongkong Fir Shipping Co Ltd v Kawasaki Kisen Kisha Ltd [1962] 2 QB 26[4], it was held that for claiming a breach of any contractual term, the innocent party must establish that the breach was of serious nature and the seriousness of the breach shall enable the innocent party to end the contract. The aggrieved party must establish that such breach has deprived him of the significant benefits that he was otherwise entitled to receive had the contract been performed. In Ankar v national Westminster Finance, it was held that in some cases the it becomes difficult to determine whether the term breached is intermediate term or not owing to the ambiguousness of the language of the term. Under such circumstances, such terms shall be considered as both an essential and non-essential term. The seriousness of the breach shall determine whether the termination of the contract was justified. The subject matter of the contract entered into between the defendant and the plaintiff as to construct multi-purpose sports and recreational facilities but the plaintiff failed to commence with the construction, which implies his intention of not performing his contractual obligation. Due to such failure on part of the plaintiff, the defendant had been deprived of the benefits he would have obtained otherwise, if the plaintiff had fulfilled his contractual obligations. As mentioned in the Hongkongs case, the defendant is entitled to repudiate the contract on the ground of breach of the contract on part of the plaintiff. Wrongful termination 2.1. If the defendant had not terminated the contract, even then it still would have been deprived of the benefits as the plaintiff had merely started with the designing and manufacturing process and the defendant could not make use of the sports and recreational facilities as its construction had not yet been commenced. It could be said that the breach had an overarching impact on the end objective of the contract. 2.2. In the case Piattchanine, Iouri v Phosagro Asia Pte Ltd [2015] SGHC 25[5], the High Court held that the employer is entitled to terminate a contract under Common Law on the ground of breach of a contractual term and the essence of the contractual term breached depends on the facts of the case. The plaintiff had failed to start the construction of the multi-purpose project, which formed the subject matter of the contract and hence can be considered as an essential term of the contract. The defendant is entitled to terminate the contract under Common Law on ground of breach of an essential contractual term. 2.3. If a party is free to terminate a contract on notice, there is no stipulated requirement under the Common law to provide reasons to the party for terminating the contract as was ruled in Intico (Vic) Pty Ltd Ors v Walmsley [2004][6]. 2.4. In order to end the contract on the grounds of breach of any contractual term, it is imperative to identify the term that is alleged to have been infringed and the nature of the term should also be determined. If the term breached is an essential term irrespective of the fact how minor the term is, it shall be considered as a breach of an essential contractual term and the innocent party shall become entitled to terminate the contract. 2.5. If the term is not an essential term, that nature of the breach should be taken into consideration. As was observed in the Koompahtoos case, it is essential for the defendant to establish that the plaintiff had committed a breach of the proviso of the contra and the term was fundamental to the contract, hence the breach is of serious nature. The breach goes to the root of the contract and deprives the defendant or the aggrieved party significantly of the benefits that the innocent party as entitled to if the breach of the contractual term had not taken place on part of the plaintiff[7]. 2.6. The termination of the contract by defendant was based on the ground of a breach of an essential term of the contract, which was to construct a multi-purpose recreational, and sports facilities in Ipswich, Brisbane and Beaudeser, Toowoomba and Logan City. Due to the failure to commence the construction, it amounted to a breach of an essential term of the contract, which formed the subject matter of the contract. Such breach is considered as a fundamental breach and goes to the root the contract, thus, depriving the defendant from significant benefits which he was entitled to, had the contract was not breached. The defendant is entitled to claim compensation as ruled in the Kommpahtoos case. 2.7. The defendant had terminated the contract based on the breach of contractual term, which is considered as condition that gives rise to the right of the innocent party to terminate the contract. The defendant had notified the plaintiff about the termination of the contract and that the termination was conducted based on the breach of the contractual terms and not on the basis of repudiatory breach. In case the breach was conducted on the grounds of repudiation, the defendant would have had a chance to raise new grounds for terminating the contract. 2.6. the plaintiff had claimed that he relied on the contractual promise stipulated in the contract that it shall not be terminated unless the defendant notifies the plaintiff regarding the termination of the contract by giving reasons for it. However, as observed in the Inticos case, the employer is entitled to end a contract without giving any reasons for such termination under the Common law. The failure of the plaintiff to construct the multi-purpose project was a willful breach and the defendant had notified the plaintiff about the termination of contract on the grounds of breach of the contractual term, which was fundamental to the contract. 2.7. The plaintiff had further contended under clauses 5.5 that the plaintiff had entered into the contract with the belief that this contract would led him to earn huge profits in the future and that the defendant would form future contracts with him as well[8]. However, in order to form a valid contract it is imperative that both the parties to the contract agree by the terms of the contract and have legal intend to become legally bound by the contractual terms. In other words, both the parties to the contract must have the intention to perform the contractual terms of the contract without committing any breach of the contract. The plaintiff was aware that the subject matter or an indispensable term of the contract was the construction of the multi-purpose project in the five locations. The plaintiff commenced with the designs and the manufacturing but did not commence the construction of the project which implies that the plaintiff did not have any legal intention to perform his p art of the obligations and by non-commencing the construction of the project, it signified breach of an essential contractual term or a condition. 2.8. The defendant would have entered into other contracts with the plaintiffs had the plaintiff not failed to perform his part of the contractual obligations. Further, the defendant did not compel the plaintiff to enter into the contract at the cost of incurring a loss of $250000. The plaintiff had agreed to the terms of the contract and had entered into the contract voluntarily. The defendant promised the plaintiff of the substantial performance of the contract and was willing to perform the contractual obligation on part of the defendant. The plaintiff had willfully committed a breach of the contractual term by not fulfilling his obligation to construct the multi-purpose sports and recreational facility project in the five stipulated locations. 2.9. The plaintiff claims reliance damages to recoup the expenses incurred by the plaintiff to the extent that the plaintiff would have been entitled to recoup, had the contract was performed and not terminated[9]. As observed in the Piattchanines case, the defendant dismissed the claim of the plaintiff with respect to expenses incurred on the ground that the plaintiff had committed a willful breach of a contractual term, which amounts to a fundamental breach of the contract. Such willful breach deprives the defendant from substantial benefits that he would have otherwise obtained if the contract as fulfilled. The plaintiff failed to exercise reasonable care while performing his part of the obligation and has failed to the act in the best interests of the defendant. Reference list Stewart, Andrew. Stewart's guide to employment law. Vol. 3. Sydney: Federation Press, 2013. Painter, Richard, and Ann Holmes. Cases and materials on Employment Law. Oxford University Press, USA, 2015. Selwyn, Norman M., and Astra Emir. Selwyn's law of employment. Oxford University Press, USA, 2014. McKendrick, Ewan. Contract law: text, cases, and materials. Oxford University Press (UK), 2014. Adriaanse, Mr John. Construction contract law. Palgrave Macmillan, 2016. Hughes, Will, Ronan Champion, and John Murdoch. Construction contracts: law and management. Routledge, 2015. Intico (Vic) Pty Ltd Ors v Walmsley [2004] Piattchanine, Iouri v Phosagro Asia Pte Ltd [2015] SGHC 25 Hongkong Fir Shipping Co Ltd v Kawasaki Kisen Kisha Ltd [1962] 2 QB 26 Koompahtoo Local Aboriginal Land Council v Sanpine Pty Ltd [2007] 233 CLR 115, 135 [1] [2007] 233 CLR 115, 135 [2] Stewart, Andrew. Stewart's guide to employment law. Vol. 3. Sydney: Federation Press, 2013. [3] Painter, Richard, and Ann Holmes. Cases and materials on Employment Law. Oxford University Press, USA, 2015. [4] [1962] 2 QB 26 [5] [2015] SGHC 25 [6] [2004] [7] Selwyn, Norman M., and Astra Emir. Selwyn's law of employment. Oxford University Press, USA, 2014. [8] Adriaanse, Mr John.Construction contract law. Palgrave Macmillan, 2016. [9] Hughes, Will, Ronan Champion, and John Murdoch.Construction contracts: law and management. Routledge, 2015.

Tuesday, December 3, 2019

The Secret Life of Bees free essay sample

The Secret Life of Bees Monk Kidd  «The Secret Life of Bees » is a historical novel by American author Sue Monk Kidd. It is a story of coming-of-age, of the ability of love to transform our lifes. Adressing the wounds of loss, betrayal and the scarcity of love, Kidd demonstratesthe power of women, coming together to heal those wounds, to mother each other and themselves, to create a new holy place – true family and home. The novel received much critical acclaim and was a New York Times bestseller. In 2005 it was adopted into a film by Ginn Prince-Bythewood. The Secret Life of Bees » is the story of Lily, a fourteen-year-old girl who runs away from her unloving father to search for secrets of her dead mother`s past. The setting of the novel is South Carolina in 1964, a time when racial tensions were inflamed by civil rights movement and white racists`frequently violent responses to it. We will write a custom essay sample on The Secret Life of Bees or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Against this backdrop, Lily and her house-keeper, Rosalin, find shelter in the home of the eccentric Boatwright sisters, three African American beekeepers who worship before the statue of a Black Madonna they call  «Our Lady in Chains ». There Lily finds love and acceptance and begins to come n terms with the quilt she feels over her mother`s death. Lily has a special relationship with bees. At night, they squeeze through the cracks of her bedroom wall by the hundreds and fly circles around her room until the air itself pulsating with wings. They seem to indicate to Lily where is her right path. Every chapter opens with a short description of he life of bees which is always has a connection with the plot. In the climax of the story the sisters Boatright, the beekeepers, empart to Lily the sectets of the Black Madonna, mother to thousands. T. Ray Owens is the hateful, peach-farming antagonist of the novel, is feeling particularly meen towards Lily. He is a monstrous and abusive father. There is not apparent love in his heart for Lily whatsoever, and living with him only deepens the ubiquitous pain of her motherless existence. Deborah Owens`death is a source of great anguish and mystery for the confused adolescent, a memory from when she was four that she still can`t quite get her head around. Lily`s only true friend is Rosalin, a large black peach-worker who T. Ray brought to the house to care for Lily when her mother died.  «The Secret Life of Bees » is growing-up tale wrapped into a search for one`s mother, plunked down into the racially – charged South Carolina during the Civil rights movement, set alight with feminine spirituality. It is an inspirational feminist tale with strong female characters. And while it has already proven its` mettle as a best-selling novel with universal appeal, it will particularly enchant the female reader.

Wednesday, November 27, 2019

How effectively does Shakespeare introduce the characters and themes of Hamlet Essay Example

How effectively does Shakespeare introduce the characters and themes of Hamlet Paper To be or not to be that is the question Hamlet famously declaims in the third act of William Shakespeares longest drama, and one of the most probing plays ever to be performed on stage. Shakespeares Hamlet was written around the year 1600 in the final years of the reign of Queen Elizabeth I, who had been the monarch of England for more than forty years and was then in her late sixties. The prospect of Elizabeths death and the question of who would succeed her was a subject of grave anxiety at the time, since Elizabeth had no children, and the only person with a legitimate royal claim, James of Scotland, was the son of Mary, Queen of Scots, and therefore represented a political faction to which Elizabeth was opposed. Hamlet and many other Shakespeare plays from this period, unsurprisingly, explore this theme of the transfer of power from one monarch to the next, particularly focusing on the uncertainties, betrayals, and upheaval that accompany such shifts in power, and the general sense of anxiety and fear that surround them. These themes of disorder, dilemma and indecision, madness and revenge and the discrepancy between appearance and reality are mainly explored through the main characters, principally Hamlet, Claudius, Gertrude, Polonius, Laertes and Ophelia, and through the plot itself. We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on How effectively does Shakespeare introduce the characters and themes of Hamlet specifically for you FOR ONLY $16.38 $13.9/page Hire Writer Therefore, the first two acts in this drama are paramount in introducing the characters, and thus also themes, of Shakespeares play Hamlet for it to be regarded as one of the greatest plays ever to be written and staged in universal drama. As one critic, T. S. Elliot, remarks in his book On Poetry and Poets, the opening scene of Hamlet is as well constructed as that of any play ever written . Immediately, from the opening of the play, Shakespeare establishes a mood of anxiety and dread by using fragments of conversation, for example, Nay, answer me, stand and unfold yourself and Long live the King! The verses do not flow and their broken rhythms generate an atmosphere of unease, apprehension and confusion; this, and the fact that the play begins with the question Whos there? and is followed by six more in the next twenty lines, reveals from this early point of the play the notion of distrust and uncertainty that is prevalent throughout the play. In addition, the supernatural appearance of the ghost on a chilling, misty night outside Elsinore Castle indicates immediately that something is wrong in Denmark. The ghost serves to enlarge the shadow King Hamlet casts across Denmark, indicating that something about his death has upset the balance of nature. The appearance of the ghost also gives physical from to the fearful anxiety that surrounds the transfer of power after the kings death, seeming to imply, as Horatio sees it, a dark and frightening future for all. In addition, Horatio in particular sees the ghost as an ill omen, an extravagant and erring spirit, boding violence and turmoil in Denmarks future. The introduction of this character in the scene is important in signalling to the audience that there can be no doubt of the Ghosts existence or of its striking resemblance to the last King of Denmark, the valiant warrior, King Hamlet. This is due to the establishment of this character as a good-honoured man who is also educated, intelligent and sceptical of supernatural events. Before he sees the ghosts, he insists, Tush, tush, twill not appear, and even after seeing it he is reluctant to give full credence to stories of magic and mysticism. However, on seeing the ghost, Horatios ability to accept the truth at once, even when his predictions had been proven wrong, indicates the fundamental trustworthiness of his character. His reaction to the ghost functions to overcome the audiences sense of disbelief, since for a man as sceptical, intelligent and trustworthy as Horatio to believe in and fear the Ghost is far more convincing than if its only witnesses had been a pair of superstitious watchmen. In this subtle way, Shakespeare introduces Horatio from the first scene of the play not only to inaugurate the themes of disorder and uncertainty but also to represent the audiences perspective throughout this dark and ghostly scene. In a seemingly stark contrast, the second scene of the play is devoted to the apparently jovial court of the recently crowned King Claudius. If the area outside the castle is murky with the aura of dread and anxiety, the rooms inside the castle are committed to an energetic attempt to banish that aura, as the king, queen, and the courtiers desperately pretend that nothing is out of the ordinary. Claudiuss opening speech appears relaxed, level-headed, eloquent and persuasive. In spite of this, Shakespeare signals to the audience, long before they hear Claudius confess it, that the Kings public mask conceals a troubled mind. The merriment of the court seems superficial largely due to the fact that the idea of balance Claudius pledges to follow is unnatural. Claudiuss speech is full of contradictory words, ideas and phrases, beginning with Though yet of Hamlet our late brothers death / The memory be green, which combines the idea of death and decay with the idea of greenery, growth, and renewal. He also speaks of defeated joy, an auspicious and a drooping eye and dirge (a lament for the dead) in marriage, ideas which are at unease with one another, theatrical means of hinting at the hypocrisy Claudius embodies. Consequently, as a result of this clear dishonesty, this scene portrays as dire a situation as the first scene does. While in the first scene Shakespeare illustrates the sense of disorder, fear and danger through the guards panicked and forceful exchanges and the appearance of the ghost, the second scene hints at the corruption and weakness of Claudius, through the incongruities in his speech and the fallaciousness of the setting around him. Contrary to the dishonesty of Claudiuss character is the way Hamlet is introduced through the first two acts. Prince Hamlet, devastated by his fathers death and betrayed by his mothers marriage, is introduced as the only character who is unwilling to play along with Claudiuss gaudy attempt to mimic a healthy royal court. His words to Claudius are cryptic so that he can be rude to the clever Claudius whilst giving little away to the court. His first words, A little more than kin and less than kind, suggest how Hamlet feels that he is neither kindly disposed towards his uncle, nor does he think that he is of the same kind, meaning from the same honourable class. His next response, Not so, my lord. I am too much in the sun adds more emphasis to this dark and mysterious side of Hamlet as he hints of his awareness of all the that is ongoing ever since his fathers death. The war of words is apparent in this scene between the two characters of Claudius and Hamlet as is the audiences sense that both of these characters know the truth but due to political concerns and fear of confrontation they do not openly say it, thereby highlighting a central theme in the play: that of the conflict between appearance and reality. While Claudius pretends to be unaware of the reasons for Hamlets anger and hatred, Hamlet in his uncertainty on how to exact revenge, is afraid to take decisive action and thus has to be content with making scathing comments in the hope of provoking some sort of admittance by Claudius of fowl play. His seven soliloquies are all centred on the most important existential themes: the emptiness of existence, suicide, death, suffering, action, a fear of death which puts off the most momentous decisions, the fear of the beyond, the degradation of the flesh, the triumph of vice over virtue, the pride and hypocrisy of human beings, and the difficulty of acting under the weight of a thought which makes cowards of us all. Thus, they probe his own situation, his mind and the problems attached to being human in a society characterised by duplicity and hypocrisy, and being an active agent in a moral universe. Hamlets first soliloquy in Act one Scene 2 opens with the emphatic line: O that this too too sullied flesh would melt, a cry of anguish and a longing for dissolution, which is however followed by an acknowledgement of the fundamental Christian injunction against suicide, thereby precluding escape from the burden of life. This question of the moral validity of suicide in an unbearable painful world haunts the rest of the play, reaching the height of its urgency in perhaps the most famous line in all of English Literature: To be, or not to be- that is the question. In this scene Hamlet mainly focuses on the appalling conditions of life, railing against Claudiuss court as an unweeded garden/ That grows to seed. Things rank and gross in nature/ Posses it merely. The listless tempo of the words How weary, stale, flat and unprofitable conveys his weariness. The speech contrasts dramatically with Claudiuss flowing lines as its verse starts and stops, punctuated by expressions of pain and confusion. This disjointed rhyme serves to reflect the dislocated progress of Hamlets thoughts which convey to the audience his inner turmoil. Moreover, in this soliloquy, Hamlets bewilderment and disgust at his mothers hasty remarriage and sexual depravity is revealed as he proceeds to a comparison in which his sanctified father is contrasted with his repugnant uncle, Hyperion to a satyr, the sun god is set against the mythical half-human, half-beast noted for sexual appetite. This disgust is not only apparent in the imagery but also in the sounds of Hamlets words. Hissing sibilants convey the young mans nausea as he imagines his other and his uncle in bed together: Oh most wicked speed, to post/ With such dexterity to incestuous sheets. The intensity of Hamlets disgust here underlines how impossible he finds it to come to terms with the incestuous union of his mother and his uncle and the indecent haste of his mothers re-marriage. In essence, Shakespeare uses this soliloquy to encapsulate and foreshadow several of the ideas, concepts and images that dominate this play: disillusionment so severe that suicide seems to be the only alternative, insincerity that leads to dramatic theatricality, Hamlets inability to express his feelings publicly or to replace his words with action which lead to further frustration, anger and passion, and a desperation and weakness that amounts to a betrayal of human decency, far beyond any religious considerations. Although the development of these ideas is gradual, the important role the first two acts play in illustrating the various concepts and in underlining their importance from early on, mainly through Hamlets soliloquies, cannot be exaggerated. A presentation of this can be seen through comparing Hamlets thoughts and actions in act one scene two to that of act two scene two, where he makes his second soliloquy. Again, Hamlet speaks in riddles, this time to Polonius. Although his words sound like nonsense, a thread of bitter satire runs through it giving the audience the impression that Hamlets remarks indeed are not madness, but forthright contempt, privileged rudeness in a court where no one speaks the truth. For example, importantly Hamlet declares, I am but mad north-north-west. When the wind is southerly, that is, he is only mad at certain calculated times, and the rest of the time he knows what is what. And, although he presents himself as sounding mad, a closer look at the directions reveals they do in fact point in one and the same way. Furthermore, in this scene, the longest by far in the play, Hamlet makes his second soliloquy following his involvement with the players. The presence of actors and the idea of a play within a play points to an important theme: that real life is in certain ways like play-acting. Hamlet professes to be amazed by the player kings ability to engage emotionally with the story he is telling even though it is only an imaginative recreation. He berates himself for displaying less passion when overwhelmed with grief and outrage than that displayed by an actor who is merely producing a performance. His self-disgust is evident through the insults he hurls at himself, calling himself among other things a rogue and pleasant slave and through his questioning of himself: Am I a coward? As his indignation reaches its zenith, assonance, rhythm and repetition illustrate the intensity of emotion, portraying his ever-worsening inner turmoil that threatens to erupt in the climax Bloody, bawdy villain! / Remorseless, treacherous, lecherous, kindles villain! only to collapse into a state of exhaustion due to the continual failure to take action. The theme of dilemma and indecision is clearly dominant here, and it is due to Hamlets apparent lack of willingness to take action here that many view Hamlet as a play of words and emotion rather than action. One such critic, who takes this view, T. S. Elliot, remarked that Hamlet presented a character dominated by an emotion which is inexpressible because it exceeds the events that occur, the absolute opposite of Macbeth.   Yet, in contrast to these interpretations, Hamlet by the end of the play evolves from a dreamer to a man of action. While the play begins with Hamlet contemplating his fathers death and later on, in the graveyard scene, death itself, in the key image of the play where he holds Yoricks skull, Hamlet by the end of the play is no longer just like a student of the concepts of death. Instead, he becomes the tragic action hero who finds a divinity working through action. Although it is true that the impulse for his actions is imposed on him by other characters or by events, another interpretation see Hamlet as nevertheless extremely active: he listens to the ghost (which his friends refuse to do), he adopts a coarse attitude verging on insubordination, he violently rejects Ophelia, he thwarts one after the other plots aimed at revealing his plans, he stages for the court a show which is nothing but a trap in which he hopes to catch the king, he confronts his mother in a scene of extreme violence, and he fights Laertes. Engaging further in pure physical violence he kills Polonius, sends his friends Rosencrantz and Guildenstern to their deaths, kills the king, and is indirectly responsible for the death of Laertes. In conclusion, through the first two acts of the play, Shakespeare is very successful in introducing the main characters and themes of the play. While his introduction of Horatio and the ghost in the first scene is very important in establishing a mood of distress and anxiety, as well as touching on the themes of uncertainty and disorder, Shakespeares following scene builds on that to a great extent through the contrast between Claudius and Hamlet, the conflict between appearance and reality and through Hamlets first soliloquy of the play. In this soliloquy not only are Hamlets true emotions revealed to the audience but with it many of the central themes and concepts of the play are explored, such as the concept of severe disillusionment leading to the idea that suicide is the only viable option. It is thoughts and emotions such as these that are gradually developed in the novel; and which has led to Hamlet being regarded by many critics as the most powerful and probing play Shakespeare has ever written. The different interpretations of Hamlet and the play in general is only a natural consequence to the ambiguity and uncertainty that Shakespeare creates from very early on in his play. As one critic, John Dover Wilson remarks, Hamlet is very much like a dramatic essay in mystery; that is to say, the more it is examined, the more there is to discover. In that context, the first two acts of this drama have served not only as a very effective means of introducing the main characters and themes of the play, but also through the beautifully crafted soliloquies, Shakespeare probes the most daring aspects of the psychology of man and the history of human thinking through pieces of pure poetry, written in blank verse, sustained by a rhythm now smooth, now rugged, by a fast or a slow pace, offering his audience surprises in every line.

Sunday, November 24, 2019

Free Essays on Barbarian

, â€Å"an intermediate generation between gods and mortals.† (Herodotus, pg. xxx) Herodotus The Histories is an amazing work. This work is titled a history, but it is important to remember that a history is not just a telling of past events. Even the most objective histories contain the biases and personal prejudices of the author. Herodotus is no exception. Within his many detailed stories and events, the reader can clearly sense his thoughts of Greek supremacy. The ancient Greek people were very proud of their culture for many different reasons. A main source of pride, however, was the Greek style of art and architecture. The Greek culture was very rich around the time of the fifth and sixth centuries BC, influencing many other cultures that came in contact with it. One such culture was that of the Persians. The Greek force defeated the Persian force, lead by Xerxes, in 479 BC. After this battle, there is evidence of Persian art having som... Free Essays on Barbarian Free Essays on Barbarian Barbarian. Within the text of Herodotus, this term meant â€Å"a non-Greek.† Originally, this term was not meant to be offensive or negative, but over time the Greeks began to think of themselves as culturally superior to the barbarians. The Greeks believed in a concept called â€Å"guest-friendship.† Guest friendship was when one man (or community) would extend his protection to an outsider visiting his community. Guest friendship involved reciprocal gift giving and was a very formal procedure. This process was eternally under the protection of the great Greek deity Zeus. Though the ancient Greeks entertained guests from various locations and cultures, they held to the fact that their own Greek culture was entirely pure and of their invention. Ancient Greeks did not cite the influences of others on their fine art. Within the ancient Greek culture, the term â€Å"hero† referred to a mortal made divine after death. In other words, â€Å"an intermediate generation between gods and mortals.† (Herodotus, pg. xxx) Herodotus The Histories is an amazing work. This work is titled a history, but it is important to remember that a history is not just a telling of past events. Even the most objective histories contain the biases and personal prejudices of the author. Herodotus is no exception. Within his many detailed stories and events, the reader can clearly sense his thoughts of Greek supremacy. The ancient Greek people were very proud of their culture for many different reasons. A main source of pride, however, was the Greek style of art and architecture. The Greek culture was very rich around the time of the fifth and sixth centuries BC, influencing many other cultures that came in contact with it. One such culture was that of the Persians. The Greek force defeated the Persian force, lead by Xerxes, in 479 BC. After this battle, there is evidence of Persian art having som...

Thursday, November 21, 2019

Slavery and Marriage in The Braggart Soldier Essay

Slavery and Marriage in The Braggart Soldier - Essay Example The position of the women in Plautus’s society is also brought out through this play, through the married and the unmarried women, in the play who live out different roles. Slavery and Marriage in The Braggart Soldier The influence of social institutions is seen in most of one’s activities and art is no exception. The art of Plautus, reflects the social realities that existed during his age. Slavery and marriage were two of the most important institutions that were prevalent during the period that Plautus wrote his plays. These plays portray a certain kind of subversion that is possible on the part of these subaltern groups. They are able to obtain a certain kind of superiority over their masters and their clients for a certain amount of time. However, the superiority that they attain over their superiors is something that is undercut by the fact that it is a temporary phenomenon that fails to challenge the institutions in themselves that remain deeply entrenched in the consciousness of the very people that seem to attempt the subversion. This subversion, by the end of the play, even though it succeeds in the downfall of the protagonist of the play, Pyrgopolynices, serves the ends of another member of the aristocracy, Pleusicles. In the end, the slaves and the prostitute do not do anything for themselves; what they do is to fulfill their roles as slaves, which essentially place them back in their social positions, irrespective of their masters. The actions of Palaestrio and Philocomasium, from the beginning of the play, seek to foil the actions that the protagonist of the play, Pyrgopolynices, seeks to bring about. Both these characters have certain features in common; both f them were captured by the soldier. The helplessness and the lack of agency that these two characters share happens as a result of their social positions that are defined by their economic and gender belonging. Philocomasium does not possess any agency since she is a woman and does not have any agency. Throughout the play, she is looked upon as a possession that the two men in the play fight for. Her identity too, is shaped by the man that she is with, rather than the position that she defines for herself. On the other hand, Palaestrio has some agency of his own, even though it manifests itself in his loyalty to his former owner, Pleusicles. This reveals a deeply entrenched system of slavery where the slave internalizes the system and mentally enslaves himself to his owner. Palaestrio is unable to think of himself as a person whose identity may be anything except that of the slave of Pleusicles. This manifests itself in his inability to accept Pyrgopolynices as his master. He however, possesses more ability to act than the Philocomasium, who is totally deprived of any agency, because of her position as a woman in a patriarchal society. The little agency that Palaestrio has does not lead to any awareness about his position as a slave that could lead to an y solidarity between him and the other slaves. This is evident from this speech of his. Palaestrio: Someone from our house has done a naughty thing, from what I hear- The old man’s commanded that my fellow slaves be beaten up. Well, he said except for me- who gives a hoot about the rest? (Plautus 8) It is this lack of solidarity that makes Palaestrio

Wednesday, November 20, 2019

Survey about CWsandbox tool which used for dynamic malware analysis Research Paper

Survey about CWsandbox tool which used for dynamic malware analysis - Research Paper Example General Sandbox Architecture: A sandbox is deployed to secure a computer system from external attacks that are attempted through malware (malicious program). According to Hoopes (2009), the approaches used are either to block the critical accessibility of a malware or to introduce a simulated environment with completely virtual computing resources like CPU, file system and the memory. This virtual environment enables the program to get executed in a completely isolated environment which is disconnected from the real execution environment within which it resides. The main idea is to monitor the accessibility of program (under observation) to system resources. This way the system can be brought back into the safe state after complete behavioral analysis of the suspected program. The fringe benefit of this approach is the usage of a lighter security protocol for the underlying system that improves its working efficiency. The behavioral analysis keeps the execution environment intact. Th is gives it an edge over instruction level analysis (basically done using debuggers or dis-assemblers). CWSandbox architecture and functioning: CW sandbox is one the sandbox applications that are in use. Every sandbox application has its own mechanism to secure the computer system environment. CWSandbox comprise of two executable files namely cwsandbox.exe and cwmonitor.dll. The former is the central application that initiates the malware and manages the complete process of analysis. The latter on the other hand is a DLL (Dynamic Link Library). This library is introduced into all processes in the malware that are under observation. This way the malware is actually executed and being interacted by the sandbox along with its own execution. The function of the DLL file is to catch each API critical call from malware and to inform the central application (cwsandbox.exe) about it. The sandbox (main application) then takes some time to analyze the call in order to either delegate the cont rol to the required API (in case of safe conclusion) or to answer the call with a virtual error message (in opposite case). Along with the keeping an eye on every malware call, the DLL also makes it certain that the sandbox is kept informed about other malware activities like injecting a code into an already executing process or creating a child process. In both cases the DLL is instantiated again to be injected into the child process or the already running process. Figure 1.0 below, elaborates the described functioning. The CWSandbox uses the native execution environment unlike other sandbox schemes. This in turn reduces the delay caused by the analysis mechanism. Enormous communication exists between the main application (executable) and planted instances of DLLs. Each notification call from a DLL to sandbox contains a lot of information that requires a formal and reliable mechanism of communication between processes. In order to fulfill this requirement the sandbox is usually equ ipped with high efficiency IPC (Inter Process Communication) mechanism. Figure 1.0. Sandbox Instance using CWSandbox (Source: Hoopes J. 2009. Virtualization for Security) CWSandbox Malware Handling and Analysis Mechanism: The mechanisms that are performed by a sandbox can be distinguished into three parts. These parts may

Sunday, November 17, 2019

Macroeconomic Position of Iceland as of 2006 Essay

Macroeconomic Position of Iceland as of 2006 - Essay Example This essay provides a thorough economic analysis of the economic developments in the Icelandic economy in the year of 2006. Ii is shown in the essay, that the national economy depended heavily on the fishing industry, which provided more than 60% of total export earnings and employs 12% of the work force. Iceland’s economy had been diversifying into manufacturing and service industries in the last decade and new developments in software production, biotechnology, and financial services were taking place. The tourism sector was also expanding, with trends in eco-tourism such as whale watching, hiking, and nature tours growing steadily. As Iceland had focused on leveling its financial landscape and opening its markets, it had created an imbalance in the economy. The resulting volatility threatened a return to the previous days of economic overheating. The employment numbers were good, but any disruption of current output woull change that immediately. Inflation, driven by overheating real estate and investment markets, was growing. These issues had to be resolved immediately. Through prudent monetary policy, inflation could be tamed. By implementing wise fiscal policy, expenses and debt could be reduced. In terms of fiscal policy, Iceland needed to adjust its approach so that the monetary policy could be adequately supported without resorting to continued and severe hikes in the interest rate. Simply, this meant tightening its budget maintenance, reducing its debt, and enhancing the environment for investment

Friday, November 15, 2019

Construct A Script By Using Scapy Computer Science Essay

Construct A Script By Using Scapy Computer Science Essay Wireless network generally can be defined as a network which is set up by using radio signal frequency to communicate among computers and other network devices. Wireless networks known as WiFi network or WLAN. As a network grows and expands wireless networks are extremely popular and easy to setup feature and no cabling involved. There are two main components to access the wireless network which are wireless router or access point and wireless clients. Wireless network normally used in 802.11a, 802.11b, 802.11g, and 802.11n standards protocol. Wireless network needs highly security to carry all kinds of confidential data which means at least enabling Wired Equivalent Privacy (WEP) on the access point. Without proper implementation of security measures, any wireless network adapter coming within the range can access the internet without permission. So, it will results in congestion and some of the authorized client cannot access the internet. So, this research will do wireless network auditing by sniffing some of the information within the access point and detect possible intrusions in Faculty of Computer and Mathematical Sciences. 1.1 Background Wireless network is a network which is setup by using radio signal frequency to communicate among multiple stations at one time. In addition, wireless network referred as WiFi network or WLAN. Although we have enable WEP encryption on the access point, there are still some weaknesses which can be easily crack by the users with the right equipment to crack. The attacker can sniff easily with several tools to crack the password to break in as unauthorized person. In order to verify the correct access point settings and detect intrusions in terms of security in wireless network, we construct the complete script to audit wireless networks. 1.2 Problem Statement Nowadays wireless network become a trend in communication. Each wireless system or access point was setup with certain policies. It is hard to verify whether each wireless access point setup correctly or not. Plus, nowadays we need to use many tools to verify the wireless access point status. Furthermore, most of network admin does not check back each wireless access point after its configuration. Moreover, we need some tools to identify the intrusions that come where they are try to access the Internet. Besides that, some of attackers send spoofing frame to try access the wireless network. So, we cannot identify the attackers MAC address. 1.3 Research Objectives The main objective of this project is: To construct a script by using Scapy To sniff and to find possible intrusion on wireless network related with wireless security. 1.4 Scope of the Research This project focuses in Faculty of Computer and Mathematical Sciences that has multiple access points which will enables to sniff all the information on wireless networks. We focuses on Data Link layer 2 to sniff the broadcast frame and identify possible intrusion. The main platform to run the tools:- Ubuntu10.10 We are use two main tools to construct the script which are:- Python2.6 Scapy 1.5 Significance of the Research This project is important to gain knowledge to construct the complete script by using Python2.6 and Scapy script. We can learn the easiest way by using this script with the shorter line compared to other script. This project also helps to learn 802.11 frame structure including beacon frame that has transmitted by the access point. 1.6 Organization of Thesis This project divided into 5 main chapters: Chapter 1: In this chapter, we discussed on the introduction generally of this topic. It includes problem statement, objectives, scope and significance of the research. Chapter 2: This chapter reviewed literature that relate to the topic with previous researches. We include the similar of related studies to our research. Chapter 3: In third chapter, we identify materials and methods that are described in methodology phases in order to get the desired information for the accomplishment of this research. Chapter 4: In fourth chapter, we discusses on the findings of the research. Chapter 5: Finally, the last chapter is focuses on the recommendations and suggestions where it will summarize the conclusion of the research. 1.7 Conclusion This introduction of this chapter had clearly explained the problem statement, objectives, scope, and significances of the research. This chapter gives a clear view of the overall content of the research. CHAPTER 2 LITERATURE REVIEW 2.0 Introduction This chapter examines the previous work done by prior researcher in the field of auditing wireless network, security of wireless network and any other related works. Section 2.1 discuss on main platform to install the tools. Section 2.2 discuss on the tools to be use to construct and run the script. Section 2.3 discuss on standard protocol fro wireless Lan(WLAN), IEE 802.11. Then, sections 2.4 discuss on frame for 802.11, 2.5 Wireless LAN components, 2.6 Wireless Network Sniffing, 2.7 reviews for the related works and lastly 2.8 Summarizations of Literature Reviews. 2.1 Platform 2.1.1 Ubuntu10.10 Ubuntu is a free operating system, developed by small team developers who are established Linux Debian projects. This free operating system was developed to facilitate the use of desktop linux, Ubuntu. It developed based on the Debian GNU/Linux distribution and distributed as free and open source software. Most Ubuntu packages are based on package from Debian. Both distributions are using Debians deb package format and package management tools, Apt and Synaptic. However, sometimes .deb packages need to be rebuild from source to be used in Ubuntu. Ubuntu have variant edition such as GNOME desktop, KDE edition, Kubuntu and server edition. In this project, we use Ubuntu 10.10 as our platform to run all the tools in it. 2.2 Tools 2.2.1 Python Python is the one of the programming language that can interpret in developing the applications such as web applications and integrate the system more effectively. Python can run on Windows, Linux/Unix, Mac OS X. All the Python programs can be packaged into stand-alone executable code for many using various tools. In this project, we use the latest version, Python2.6 tool to construct and run the complete script after install all the Python package in Ubuntu10.10. We use Python as a programming language because it is most powerful language and shorter to write the code than other languages. Compared to other programming languages, Python are readable syntax, intuitive object orientation, very high level dynamic data types, full modularity, supporting hierarchical packages and many more. 2.2.2 Scapy According to Philippe Biondi (2009), Scapy is a powerful interactive packet manipulation program from Python program that be able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery. For this project, we focused on 802.11 standard protocols. Scapy enable to sniff wireless network and generate the packet and can send it to the wireless network. 2.3 Wireless Protocol 2.3.1 IEEE 802.11 IEEE 802.11 is a standard protocol for wireless LAN (WLAN), which is uses RF technology to transmit and receive data over the air. Based on this standard protocol, it communicates between wireless client and a base stations or access point. There are several types of standard protocols which are 802.11a, 802.11b, 802.11g, and 802.11n. Here are briefly about types of standard protocols: 2.3.1.1 IEEE 802.11b IEEE 802.11b standard supports maximum bandwidth 11Mbps in 2.4 Ghz. The advantage of this protocol is lowest. Disadvantage using this protocol is lowest maximum speed because it may interfere if no determined the frequency band. 2.3.1.2 IEEE 802.11a 802.11a supports bandwidth up to 54 Mbps in 5 GHz. The advantage of this protocol is fast maximum speed. Disadvantage using this protocol is the cost is higher than IEE 802.11b 2.3.1.3 IEE 802.11g IEE 802.11g standard supports maximum bandwidth 54Mbps in the 2.4 GHz band in maximum range. The advantage is signal range is better with fastest maximum speed. Disadvantage using this protocol is higher cost than IEEE 802.11b. 2.3.1.4 IEEE 802.11n IEEE 802.11n is developed on previous IEEE 802.11 standards by adding MIMO. IEEE 802.11n offers high throughput wireless transmission at 100Mbps 200 Mbps. It is better performance compared with IEE 802.11g. 2.4 802.11 Frame 2.4.1 Frame header Each  frame  contains  a  standard  header  as  shown  in  Figure  2.1 Figure 2.1 Frame Header from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The  frame header  contains  all  the  information  needed  to  get  the  frame to  where  it  is  going  and  allow  the  receiver  to  understand  what message  the  frame  is  carrying. Frame Control FC contains control information used for defining the type of 802.11 MAC frame and providing information necessary. FC field as shown in Figure 2.2 Figure 2.2 Frame Control Field from http://technet.microsoft.com/en-us/library/cc757419(WS.10).aspx The details of frame control field as follows: Protocol Version Protocol Version provides the current version of the 802.11 protocol used. Type and Subtypes It is determines the function of the frame. There are three main different of type fields which are control, data and management and breaks into multiple subtypes. Three values of type field: 00 Management 01 Control 10 Data 11 Reserved/Unused Breaks into subtype field: 00/0000 Management/Association Request 00/1000 Management/Authentication 00/1100 Management/Deauthentication 01/1011 Control/Request To Send (RTS) 10/0000 Data/Data To DS and from DS Specify  the  addressing  type  of  the frame, either the frame is going to or exiting from the DS. More Fragments   Shows more fragments of the frame, either data or management type. Retry Retransmitted either data or management frame types. Power Management   shows whether the sending station is in active mode or power-save mode. More Data   shows to a station in power-save mode that the AP has more frames to send. It is also used for APs to show that additional broadcast/multicast frames are to follow. WEP   shows whether or not encryption and authentication are used in the frame. Order   Shows that all received data frames must be processed in order. Duration/ID Shows the remaining duration needed to receive the next frame transmission. Sequence Control (SEQ) SEQ used  for  fragmentation  and packet  reassembly. Frame body The frame body contains the data or information included in either management type or data type frames. Frame Check Sequence (FCS) The transmitting STA uses a cyclic redundancy check (CRC) over all the fields of the MAC header and the frame body field to generate the FCS value. 2.4.2 Beacon Frame Beacon frames are identified by the type field being set to 0 (Management Frame) and subtype of 8. Beacon frame are used by access point to advertise its presence and relay information, such as timestamp, SSID, and other parameters based on access point to radio NICs that are within range. Radio NICs continually scan all 802.11 radio channels and listen to beacons as the basis for choosing which access point is best to associate with. According to Robin Wood (2007), people  mostly believe that turning  off  beacons  will  hide  their  network  from  attacks  as  their SSID will no longer be broadcast. Unfortunately, SSID is transmitted in clear text in all management frames and when the network is hidden while there is no data being transmitted, attacker can collect a management frame they can find in network SSID. 2.5 Wireless LAN component 2.5.1 Access point Wireless access point (WAP) is a basically hardware equipment that allows wireless devices to connect to a wired network using Wi-Fi, Bluetooth or related standards. In a wireless network, an access point sends and receives signals to any number of other, local wireless devices. These are usually adapters and routers. The WAP is commonly use in offices, homes and educational institutions. WAP devices use in IEEE 802.11 standards. 2.6 Wireless Network Sniffing Wireless Sniffer is captures the data on wireless network without being detected. Wireless network sniffing works in 802.11, Ethernet as the physical and data link layers which is able of reporting raw packets (RFMON support), which include any prism2 based card (Linksys, D-Link, Rangelan, etc), Cisco Aironet cards, and Orinoco based cards. Moreover, sniffing can also help find the easy kill as in scanning for open access points that allow anyone to connect, or capturing the passwords used in a connection session that does not even use WEP, or in telnet, rlogin and ftp connections. Sniffing wireless network usually used by the attackers to capture the data and get the appropriate information from the beacon frame. There are several techniques used to sniff the wireless network. Some of them are as follows:- Passive Scanning Passive scanning is the first steps used to sniff the wireless networks. It is turn to mode RF into monitor mode that allows every frame appearing on a channel to be copied as the radio of the station tunes to various channels. A station in monitor mode can capture packets without associating with an AP or ad-hoc network. When the transmission of the data in the form of radio waves starts the attackers can scan the whole data passively and carry on the sniffing process. The so-called promiscuous mode allows the capture of all wireless packets of an associated network. In this mode, packets cannot be read until authentication and association are completed. With the help of this data sniffer can easily decodes the secret information of the wireless networks. SSID Detection After scan the data transmitted, it can detect the list of service set identifier (SSID) in the particular wireless network. The SSID shown in the Beacon frames is set to null in the hope of making the WLAN invisible unless a client already knows the correct SSID.  When the Beacon displays a null SSID, there are two possibilities.   Eventually, an Associate Request may appear from a legitimate station that already has a correct SSID.   To such a request, there will be an Associate Response frame from the AP.   Both frames will contain the SSID in the clear, and the attacker sniffs these.   If the station wishes to join any available AP, it sends Probe Requests on all channels, and listens for Probe Responses that contain the SSIDs of the APs.   The station considers all Probe Responses, just as it would have with the non-empty SSID Beacon frames, to select an AP. Normal association then begins.   The attacker usually waits to sniff these Probe Responses and extract the SSIDs. Otherwise, if the beacon transmission is disabled, the attacker has two choices.   The attacker can keep sniffing waiting for a voluntary Associate Request to appear from a legal station that already has a correct SSID and sniff that SSID.   Collection of MAC addresses After detecting the SSID, sniffer now take steps to sniff the wireless network by collecting the required MAC addresses with the help of passive scanning and also with the help of different types of software. The collected of MAC address used for constructing spoofed frame by using specific tool. In wireless sniffing, there are some reasons why attacker collects all the MAC address. Some of the reasons are the attacker used sniffing to hide his or her identity and their access points. The other reason, access points used in collecting the MAC would not be registered. 2.7 Review of Previous Related Works 2.7.1 Author: David Maynor Title of Paper: Beginners Guide to Wireless Auditing (2006) This paper is a study of how to find the vulnerabilities in wireless devices drivers with specific techniques. The researcher discuss on how to build auditing environment, how to construct tools and finally how to interpret the results. On this paper, although this was done on Dell Latitude D610, the internal wireless card of the machine was not used. The researcher was used wireless card, Netgear WPN511 to set up auditing environment that is supported with madwifi drivers. The combination with LORCON (Loss Of Radio CONnectivity) ability to craft the packet from scratch. Moreover, after setting up the good environment with patch madwifi and LORCON, the researcher construct the script with Scapy to generate a simple frame and inject it. The researcher use Wireshark to see the packets injected. 2.7.2 Author: Shreeraj Shah Title of Paper: Secure Your Wireless Networks with Scapy Packet Manipulation (2007) According to Shreej Shah, Scapy is scriptable and easy to use compared with Kismet and Airodump-ng. This paper focused on intrusion detection by using proven techniques. There are two techniques can be employed which are passive sniffing and active packet injection. The researcher discussed only passive sniffing methodology. In this project, there are several steps are used in passive sniffing methodology as follows:- Set up a station for radio frequency (RF) monitor mode Sniff packets and discover network access points Discover hidden access points and SSID (service set identifier) Harvest MAC and IP addresses Perform ongoing intrusion detection with sniffing. 2.7.3 Author: Robin Wood, Robin and freedomsoftware.co.uk Title: Programming Wireless Security (2007) This paper discussed some programming techniques to build wireless security tools. The researchers construct the script by using Python and Ruby script. There are several techniques that are used by using both scripts including deauthentication attack, sniffing wireless traffic and automating a Four-Way- Handshake capture. All the techniques will be brought together to create an applications to automate capturing an EAPOL handshake which can used to crack the Pre-Shared Key. This paper required several tools including Lorcon, Pylorcon, ruby lorcon and Scruby. Moreover, it also discussed about several issues on Scruby which means Ruby scripts will not work properly as exactly required. 2.8 Summarizations of some Literature Reviews No Author Year Project Title Project Similarities and Differences 1. Peter Seebach 2005 Getting practical about wireless security, Part 1: Building a wireless sniffer with Perl In this paper, lightweight wireless sniffer was build that runs on open source software. This paper show to use open source software by getting information about on wireless network and identified the common security problem. 2. TJ OConnor 2010 Detecting and Responding to Data Link Layer Attacks In this paper, Scapy is used to examine network traffic for data link layer attacks with identifying signatures and anomalies on both wired and wireless networks. 3. Petter Clutterbuck, Terry Rowlands, Owen Seamons 2007 Auditing the Data Confidentiality of Wireless Local Area Networks This paper describes how the software auditing artefact uses on sampled data packets to product a very detailed evaluation of the level of data confidentiality in effect across the WLAN. 4. Mingzhe Li, Mark Claypool, and Robert Kinicki 2005 How to Build and Use an IEEE 802.11 Wireless Network Sniffer In this paper, wireless sniffer is built on computers with Linux operating systems and prism GT-based wireless interface cards. The operating systems tested are SUSE (Novell) Linux release 9.0/9.1/9.2/10.0 and Linux Fedora Core 3 where the kernel version can be either 2.4.x or 2.6.x. The wireless network interface cards, Netgear WG 511 version 1 PCMCIA card and Allnet ALL0271 54Mbit Wireless PCI adapter are used Table 2.1: Summarization of related Literature Review 2.9 Conclusion All the information gathered from this literature review is very useful in order to identify potential information that can make this research more relevant. By understanding the scenario of past implementation, it will give a better view on how to achieve these research objectives and also inspire new ideas to be implemented or added into this research. CHAPTER 3 METHODOLOGY 3.0 Introduction This chapter presents about the methodology being used as a guideline to ensure the project will operate successfully. Methodology consists of hardware, software and method that being used in this research. We need to choose proper hardware and software to meet the research requirement. Methodology is very important part to audit the wireless network with sequence of phases. We need to follow all this phases in order to accomplish the final project with achieving the objective. We divide the methodology of our project to several phases, where every phase will include the important activities and its significant to be done. 3.1 Methodology Phase In this project, there are four phases of method that followed properly. First phase is planning, second phase is development, third phase is testing, fourth phase is result and evaluation and the last phase is documentation. All the flow of the methodology phase will be implementing systematically and efficiently as its role is vital to ensure the process of finishing this project in time. These phases are illustrated in methodology overview in Figure 3.1(i) and Figure 3.1(ii). PLANNING DEVELOPMENT TESTING RESULT AND EVALUATION DOCUMENTATION Figure 3.1 Project Phase (i) Documentation Development Testing Result and Evaluation Planning Problem Assessment Preliminary study of Literature Install OS Install Python package Install Scapy package Construct script Run Scapy script Sniff a list of access point. Sniff Intrusion Detection Writing a report Project Scope Project Objective Project Planning Determine hardware and software used Scapy script completed Result finding Final report completed. Figure 3.1 Project Phase (ii) 3.2 Research Methodology 3.2.1 Planning For planning phase, the activity is to define the objective of project by identifying problem assessment and by preliminary study of literature review. The deliverable of this phase can identify research objective and scope and also project planning. It consists of: 3.2.1.1 Preliminary study of literature review The purpose is to understanding the similar or related project to be done. We need to review and get the idea on how it can be implemented and find the objective, scope and others benefit can get for the project requirement. This preliminary study can review by journals, online resource (internet), articles or book. USER ACCESS POINT USER SNIFF3.2.2 Development Diagram 3.1: Structure of research project 3.2.2 [a] Install operating system We install Ubuntu 10.10 with interactive Graphical User Interface (GUI) on the laptop. It is easier to update the latest package. All the latest package including Python will updated on Ubuntu10.10 [emailprotected]:~# sudo apt-get update 3.2.2 [b] Install tools We install Scapy in Python program where the Scapy is interactive manipulation program that can construct with the shorter script compared to the other script. We install Python program as a main programming language and resides the entire package in it. a. Install Python 2.6 package [emailprotected]:~# sudo apt-get install python [emailprotected]:~# cd /tmp [emailprotected]: /tmp# fetch http://www.secdev.org/projects/scapy/files/scapy-latest.tar.gz [emailprotected]: /tmp# tar xvzf scapy-latest.tar.gz [emailprotected]: /tmp# cd scapy-2.1.0 [emailprotected]: /tmp/scapy-2.1.0 # python setup.py install b. Install python-scapy package [emailprotected]:~# sudo apt-get install python-libpcap c. Install libpcap and libdnet and their Python wrappers. [emailprotected]:~# sudo apt-get install python-libdnet d. Install additional software for special features. [emailprotected]:~# sudo apt-get install tcpdump graphviz imagemagick python-gnuplot python-crypto python-pyx 3.2.2 [c] Construct the script We construct the script with Python program for sniffing and detect possible vulnerabilities. The script will run on Ubuntu 10.10 in root terminal. 3.2.3 Testing Testing phase, the action is to test by sniffing wireless network in an area by running the completed script. Before we run the script, we need to setting up the station for radio frequency (FR) in monitor mode. We illustrates the steps in Figure 3.2 Construct the script Setting up the station for Radio Frequency (RF) to monitor mode Script run Enter the command Get the data from acces point including:- Name of access point SSID channel Radio Type Security Type Signal Collect the data: Intrusion Detection including:- Discovering Rogue Access Point Discovering Dummy Access Point Figures 3.2 Steps for testing 3.2.4 Result and Evaluation In this phase, we come out with the result by running the script. We collect all the information about SSID, MAC address, channel, radio type, security type, signal from broadcast frame that send by multiple access point. Next, we can detect possible intrusion by running other script using a same scripting language. 3.2.5 Documentation In this final phase, all the results and findings will be included in one report. From the documentation, the researcher can determine whether the project achieve the objectives or not. 3.3 Hardware and Software Required To execute this project successfully, some requirement need to be accomplish. Some of the requirement will be involving hardware and software. Hardwares that will be required are: 3.3.1 Hardware This project will used laptop. Processor at least 1 Gigahertz of CPU speed. 3GB of RAM 250 Gigabyte of hard disk space Intel WiFi Link 5100 wireless network interface card Motherboard that support the processor Monitor Network cable 3.3.2 Software This project will be running on LINUX platform: Ubuntu 10.10 3.3.3 Tools Python2.6 Scapy 3.4 Conclusion As a conclusion, this chapter is very important to gather all related and relevant information required. All the information will be used in order to achieve the objectives of this research. CHAPTER 4 RESULTS AND DISCUSSIONS 4.0 Introduction This chapter discusses on the results gathered from this research, which is obtained by implementing the methods in Chapter 3. The result based on running completed script on Ubuntu10.10. It will display all the available information of access point actively in an area after sniffing it. Moreover we can detect all the possible intrusion with display the list of rogue access point and dummy access point. 4.1 Sniff the wireless network First of all we set up Radio Frequency (RF) into monitor mode which is in wlan0 interface. Next, we run the completed script that is already saved in root on Ubuntu 10.10 with the name of file, sniffap.py. Then, we open the root terminal by enter ./sniffap.py wlan0. The result has shown in Figure 4.1 Figure 4.1 Sniff Wireless Networks sniffap.py name of saved file wlan0 monitor mode interface CHAPTER 5 CONCLUSIONS AND RECOMMENDATIONS 5.0 Introduction This final chapter discuss about the conclusion of this research. It also discusses the suggestions and recommendations that will help those who want to upgrade or refers to this project in the future. 5.1 Conclusion As you can see, having an effective wireless access policy is critical to the security of any organization that operates a wireless networks. Without appropriate policy, the attacker easily gain access the wireless networks. 5.2 Recommendation This project is hopefully can only use the fully script to get the data from the access point without purchase the tools. Moreover, the admin take the action to get access point more securely and get a better signal for client to access the Internet.

Tuesday, November 12, 2019

Michael Vick Case

On April 25, 2007, agents raided the Surry County, Virginia home owned by Michael Vick, NFL’s Atlanta Falcons quarterback. The authorities reportedly discovered 66 dogs, 55 of them being pit bulls, blood stained carpet, a dog fighting pit, and equipment which is commonly used in dog fighting rings such as dog treadmills and scales, a pry bar used to open a dog's mouth and an instrument used for breeding. At the time of the raid, Vick was not present at his home but denied having knowledge of dog fighting taking place on his property.On July 17, 2007, a federal jury indicted Vick as well as three other men, Purnell Peace, Quanis Phillips, and Tony Taylor on charges of competitive dog fighting, procuring and training pits to fight, operating an unlawful interstate dog fighting business by the name of Bad Newz Kennels. The four codefendants each face $350,000 in fines and six years in prison if convicted of the federal charges. According to reports, Michael Vick had been staging dog fights since his rookie year with the Falcons in 2001.The dogs found on the property were treated in a horrific manner. Losing dogs were either killed in the arena during the fight or at times they were later hung, electrocuted, shot or drowned. As part of their training to get them ready for fights the dogs were sometimes starved to make them hungry for the fight. On August 24, 2007 Vick entered a plea deal where he pled guilty to â€Å"conspiracy in a dog fighting ring and agreeing that the enterprise included killing pit bulls and gambling. He denied making side bets on the fights, but admitted to bankrolling them. (ESPN) He also admitted to sharing the proceeds from the dog fights with his Peace, Phillips, and Taylor but states that he never placed any bets or collected prize money for the fights. Vick was the last of his counterparts to enter into a plea deal with the prosecution. On December 10, 2007 Michael Vick was sentenced to 23 months in prison and three yearsâ€℠¢ probation at U. S. District Court in Richmond by Judge E. Henry Hudson for running a dog fighting operation. He will serve a longer sentence than two of his codefendants because he lied about his involvement upon ntering his plea agreement when he was supposed to be admitting to his wrong doing and accepting responsibility for his actions. According to his codefendants, Vick was more involved in the dog fights than he admitted to being. On November 30, Peace and Phillips were sentenced by Judge Hudson to 18 and 21 months in federal prison. Their punishments also included three years of supervised probation following their release from prison. On December 14, 2007, Tony Taylor, who was the first of the four men to plead guilty, received a lesser sentence of 60 days in jail because he agreed to testify against Vick.Michael Vick was released from prison on July 20, 2009. After his release from prison, Michael Vick is to start his three year probation term. As part of his probation, V ick was equipped with an electronic monitor and had to perform $10-an-hour job as a laborer for a construction company. Michael Vick is currently still on probation but he is now able to play football again and no longer has to work the construction job. Works Cited http://sports. espn. go. com/nfl/news/story? id=2989824 http://articles. cnn. com/2007-07-17/us/vick_1_bad-newz-kennels-dogfighting-investigation-quanis-phillips? _s=PM:US

Sunday, November 10, 2019

Outline and Evaluate Infradian Rhythms Including Research Essay

Infradian rhythms are biological rhythms that last for more than 24 hours. They are controlled by the hypothalamus, an endogenous pacemaker which requires input from exogenous zeitgebers so the rhythm can run correctly. An example of an infradian rhythms is the mentstrual cycle. This is controlled by the pituary gland which is an endogenous pacemaker. The pituary gland releases hormones which cause an egg in the ovaries to ripen and produce oestrogen. Whilst it is known to be biological due to its universal nature, there are large individual differences such as the length of time and the age the menstrual cycle begins. Reinberg conducted research into infradian rhythms where a woman spent 3 months in a cave only with dim lighting. Her sleep/wake cycle slightly lengthened whereas her menstrual cycle shortened suggesting that light affects menstrual cycles. However, this is a case study which means it lacks generalisability even more so as there are large individual differences with the menstrual cycle. On the other hand, Russell et al applied female donor’s underarm sweat which has been combined with alcohol to the upper lips of female participants. The menstrual cycles of the participants began to synchronises therefore suggesting that pheromones act as exogenous zeitgebers. Pheromones are biological substances similar to hormones but are secreted into the air and then transmitted to other animals of the same species, or in this case humans, before being absorbed into their bloodstream. However, despite the sample size being small it was a well controlled single blind study meaning that the participants didn’t know what experimental group they were in. McClinock and Stern provided further support for the study when they found pheromones in donor’s sweat affected the recipient’s menstrual cycles, therefore suggesting that exogenous zeitgebers have a regulating effect. It may be the cases the synchronised periods have an evolutionary significance because it allows women that are living together to synchronise pregnancies so they can share child care. However, it has also been found that women working in proximity to men have shorter cycles; an evolutionary advantage which provides more opportunity for pregnancy. Likewise, the purpose of a menstrual cycle is to conserve energy. Therefore it is better to restrict periods of fertility, highlighting the need for endogenous control. On the other hand there are ‘side effects’ of the menstrual cycle such as pre menstrual tension which has been associate with increased aggression. Lewis found that pre menstrual tensions has been cited as a defence in criminal trials. A second infradian rhythm is Seasonal Affective Disorder (SAD). It involves having severe depression in the winter months. Levels of melatonin are higher in winter and may lead to increased depression and sleepiness. However, it has led to a treatment called phototherapy which is being exposed to bright lights for several hours a day in order to reduced the effect of too much serotonin. This in turn, lowers melatonin levels. Hamster research again has provided us with more knowledge of infradian rhythms. Male hamsters have annual rhythms of testosterone secretion based on the amount of light that occurs each day. As the breeding season begins, the days lengthen thus when it ends, they shorten. Rusak and Zucker made lesions in the SCN, the Suprachiasmatic Nucleus, part of the hypothalamus in a hamster which destroyed their annual breeding cycles and led to male hamsters secreting testosterone all year. The 24 hour clock that daily light levels were measured against was destroyed so the seasons couldn’t be determined. Carlson found that if it was less than 12 hours of light for hamsters, it is winter where if it more than 12 hours it is summer, and therefore the breeding season. However, the research was invasive and led to brain damage, meaning it caused harm to the hamster. As it has also been conducted on animals, it cannot be generalised because it lacks population validity despite being informative. Circa-annual rhythms which means they happen once a year are also examples of infradian rhythms. When studying migration, Gwinner kept wild birds in cages exposing them to 12 hours of light and 12 hours of darkness. This lack of external stimuli led to migratory restlessness thus suggesting there is endogenous control. However, it may be triggered by the availability of food, an exogenous cue. As the wild birds were kept in cages, they also experienced harm because they were not in their natural setting either. Pengelly and Fisher conducted research into hibernation. Similar to Gwinner, they controlled squirrels artificially by exposing them to light 12 hours a day followed by 12 hours of darkness, keeping the temperature at 0 degrees. The squirrels hibernated from October to April. However, as the animals were not in their natural habitat, the studies lacked ecological validity because it was artificial. The research findings are positive as they have established the existence of endogenous pacemakers regulated by exogenous zeitgebers. However, to an extent the findings are deterministic because we need exogenous zeitebers to help our endogenous pacemakers as it has been found in studies by Siffre and Aschoff and Weber that without external cues, our biological rhythms are slower than what they need to be. In addition, some of the research is idiographic because they are small samples and or case studies meaning they lack population validity.

Friday, November 8, 2019

A Comparison of My Papas Waltz and Those Winter Sundays Essay Example

A Comparison of My Papas Waltz and Those Winter Sundays Essay Example A Comparison of My Papas Waltz and Those Winter Sundays Paper A Comparison of My Papas Waltz and Those Winter Sundays Paper Essay Topic: Literature Literature offers insight into human relationships. Poems, in particular, may uncover deep and often unresolved struggles that one may have with a loved one. In Theodore Roethkes My Papas Waltz and Robert Haydens Those Winter Sundays, the protagonists each have a troubled relationship with his father. It is evident that there is a central conflict between father and son, despite a genuine love for the former, which ultimately leads to an ironic response from the son. Both narrators in My Papas Waltz and Those Winter Sundays appear to have a conflict with their father. This can be seen in My Papas Waltz in that the narrator must cope with an apparent drunken father: The whiskey on your breath / Could make a small boy dizzy; (1-2). And when they waltz together, it is tragic, too, that the son must pay for his fathers mistakes: At every step you missed / My right ear scraped a buckle. (Roethke 11-12). The title of the poem itself in using the word My in My Papas Waltz rather than Our symbolizes his father being intoxicated, in that the waltz is actually his own drunken walk. The apparent agon is developed in to more than just a psychological struggle, in to what appears to be physical abuse: The hand that held my wrist was battered on one knuckle (Roethke 9-10). Breaking this statement in to two parts and with no further explanation as to why the fathers knuckle is battered, it implies that not only does he hit his loved ones, he moreover shows no love; The father should be holding his sons hand when they dance, yet he holds his wrist as if to say let go of me. Having a troubled father is evident as well in the eyes of the narrator of Those Winter Sundays, when after working hard all week, his father comes home to an ungrateful family: Sundays too my father got up early and put his clothes on in the blueblack cold, then with cracked hands that ached from labor in the weekday weather made blanked fires blaze. No one ever thanked him. (Hayden 1-5) There appears to be a conflict between members of the household, further illustrated by the statement which reveals there are chronic angers of that house. (Hayden 9). However, it is important to note that the narrator himself never once shows ingratitude for his fathers hard work he refers to the tension of that house, and may not have been referring to himself in pointing out that No one ever thanked him. (Hayden 5). Otherwise, he may have continued in the first person point of view and emphasized rather I never thanked him. Regardless, there appears to be a struggle at hand for both narrators. Despite conflicts of the household and obvious troubled fathers, the sons of each poem still have a genuine love for their dads. In My Papas Waltz, the son/narrator recognizes that his dad works hard for the family with a palm caked hard by dirt (14), and in turn wants to help his drinking problem. For this purpose, he dances with his dad willingly. He acknowledges his mothers presence, yet chooses not to dance with her. And although he claims Such waltzing was not easy (Roethke 4), he hung on like death (Roethke 3) in fear of what may happen if he falls asleep possibly, his father may drink again and physically abuse his mother. It is not until the final stanza of Those Winter Sundays where the son, too, shows appreciation for his fathers hard work, and in effect, a genuine love for him. He firstly emphasizes the word too in line 1: Sundays too my father got up early to acknowledge the fact that not only did he work during the blueblack cold (Hayden 2) days of winter, but even on Sundays a day reserved by most, to rest. Tone and order in this stanza are particularly important to demonstrate the sons love: Speaking indifferently to him, who had driven out the cold and polished my good shoes as well. What did I know, what did I know of loves austere and lonely offices? (Hayden 10-14) Naturally, if he had still wanted to show hatred toward his father, he would have put line two and line three of this stanza before line one, as if to say even though his father did good deeds, he still spoke cruelly to him. And although this one insensitive gesture of speaking indifferently to him is made known, the tone is immediately changed (as a sort of bildungsroman) to that of regret, shown by repetition (verse 13) in his look back at the way he treated his father. In truth, the narrator repeatedly acknowledges his fathers hard work, an irrefutable sign of love for him. Yet it is only the fear of that angry household mentioned earlier, which makes him act hostile toward his father. Both narrators seemingly love their father, yet their behavior ironically shows otherwise. An incongruity between expectation and reality is present in both poems. The son in My Papas Waltz speaks of an alcoholic and domineering father. The latter is ascertaining when the boy says: My mothers countenance could not unfrown itself. (Roethke 7-8). Using the words could not as opposed to did not explains a certain predicament the mother holds against her spouse that she has no choice but to show a distressing face and likely has no control over the unpleasant situation of the kitchen rumble. It seems the case that a small child would be fearful of this type of father figure, and consequently run away or repress from the burdens of a not-so-ideal relationship. However, he does just the opposite as he explains whilst his father brings him to bed, (I was) Still clinging to your shirt. (Roethke 16). Whereas the final line of this poem is the quite shocking denouement and petty resolution to a seemingly continuous agon, the conflict is resolved in Those Winter Sundays, yet not withstanding irony. Expectation holds that when a son realizes the warmth (figuratively and literally, in this case) his father brings, he will show sincere gratitude. Yet the reality of this case reveals that even while having a transparent love for his father, a negative demeanor is displayed. In the same way, the statement, When the rooms were warm, hed call, / and slowly I would rise and dress (Hayden 7-8) further illustrates paradoxical behavior; obviously there is the realization that a warm room had derived from his fathers hard work to set the fire ablaze. Still, the son shows no thanks by slowly responding to this kind gesture. It is not until after over three-quarters of the narrative is through does the author show remorse for his actions. He realizes he should have firstly overcome the disapproval that would have came from his family, and secondly, shown the love to his father that he truthfully felt as expected, rather than act antagonistic. The narrator of My Papas Waltz shows love toward an incompetent father, whereas the narrator of Those Winter Sundays shows a lack of appreciation to a hardworking father. In both Theodore Roethkes My Papas Waltz and Robert Haydens Those Winter Sundays, the narrators must each cope with a conflict with his father, and in spite of a sincere love for him, the son behaves ironically toward his parent as a result of this conflict. Just like these authors, many people are faced with family ordeals. The manner in which they are overcome, however, depends both on the weight of the problem at hand, and the internal strength of the person who chooses to manage such tribulations.